suse-su-2024:1645-1
Vulnerability from csaf_suse
Published
2024-05-14 14:30
Modified
2024-05-14 14:30
Summary
Security update for the Linux Kernel

Notes

Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 SP3 RT kernel was updated to receive various security bugfixes. The following security bugs were fixed: - CVE-2024-26840: Fixed a memory leak in cachefiles_add_cache() (bsc#1222976). - CVE-2021-47113: Abort btrfs rename_exchange if we fail to insert the second ref (bsc#1221543). - CVE-2021-47131: Fixed a use-after-free after the TLS device goes down and up (bsc#1221545). - CVE-2024-26852: Fixed net/ipv6 to avoid possible UAF in ip6_route_mpath_notify() (bsc#1223057). - CVE-2021-46955: Fixed an out-of-bounds read with openvswitch, when fragmenting IPv4 packets (bsc#1220513). - CVE-2024-26862: Fixed packet annotate data-races around ignore_outgoing (bsc#1223111). - CVE-2024-0639: Fixed a denial-of-service vulnerability due to a deadlock found in sctp_auto_asconf_init in net/sctp/socket.c (bsc#1218917). - CVE-2024-27043: Fixed a use-after-free in edia/dvbdev in different places (bsc#1223824). - CVE-2022-48631: Fixed a bug in ext4, when parsing extents where eh_entries == 0 and eh_depth > 0 (bsc#1223475). - CVE-2024-23307: Fixed Integer Overflow or Wraparound vulnerability in x86 and ARM md, raid, raid5 modules (bsc#1219169). - CVE-2022-48651: Fixed an out-of-bound bug in ipvlan caused by unset skb->mac_header (bsc#1223513). - CVE-2024-26906: Disallowed vsyscall page read for copy_from_kernel_nofault() (bsc#1223202). - CVE-2024-26816: Fixed relocations in .notes section when building with CONFIG_XEN_PV=y by ignoring them (bsc#1222624). - CVE-2021-47207: Fixed a null pointer dereference on pointer block in gus (bsc#1222790). - CVE-2024-26610: Fixed memory corruption in wifi/iwlwifi (bsc#1221299). - CVE-2024-26689: Fixed a use-after-free in encode_cap_msg() (bsc#1222503). - CVE-2021-47041: Don't set sk_user_data without write_lock (bsc#1220755). - CVE-2021-47074: Fixed memory leak in nvme_loop_create_ctrl() (bsc#1220854). - CVE-2024-26744: Fixed null pointer dereference in srpt_service_guid parameter in rdma/srpt (bsc#1222449). The following non-security bugs were fixed: - dm rq: do not queue request to blk-mq during DM suspend (bsc#1221113). - dm: rearrange core declarations for extended use from dm-zone.c (bsc#1221113). - net/tls: Remove the context from the list in tls_device_down (bsc#1221545). - tls: Fix context leak on tls_device_down (bsc#1221545).
Patchnames
SUSE-2024-1645,SUSE-SUSE-MicroOS-5.1-2024-1645,SUSE-SUSE-MicroOS-5.2-2024-1645
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).



{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for the Linux Kernel",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "The SUSE Linux Enterprise 15 SP3 RT kernel was updated to receive various security bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2024-26840: Fixed a memory leak in cachefiles_add_cache() (bsc#1222976).\n- CVE-2021-47113: Abort btrfs rename_exchange if we fail to insert the second ref (bsc#1221543).\n- CVE-2021-47131: Fixed a use-after-free after the TLS device goes down and up (bsc#1221545).\n- CVE-2024-26852: Fixed net/ipv6 to avoid possible UAF in ip6_route_mpath_notify() (bsc#1223057).\n- CVE-2021-46955: Fixed an out-of-bounds read with openvswitch, when fragmenting IPv4 packets (bsc#1220513).\n- CVE-2024-26862: Fixed packet annotate data-races around ignore_outgoing (bsc#1223111).\n- CVE-2024-0639: Fixed a denial-of-service vulnerability due to a deadlock found in sctp_auto_asconf_init in net/sctp/socket.c (bsc#1218917).\n- CVE-2024-27043: Fixed a use-after-free in edia/dvbdev in different places (bsc#1223824).\n- CVE-2022-48631: Fixed a bug in ext4, when parsing extents where eh_entries == 0 and eh_depth \u003e 0 (bsc#1223475).\n- CVE-2024-23307: Fixed Integer Overflow or Wraparound vulnerability in x86 and ARM md, raid, raid5 modules (bsc#1219169).\n- CVE-2022-48651: Fixed an out-of-bound bug in ipvlan caused by unset skb-\u003emac_header (bsc#1223513).\n- CVE-2024-26906: Disallowed vsyscall page read for copy_from_kernel_nofault() (bsc#1223202).\n- CVE-2024-26816: Fixed relocations in .notes section when building with CONFIG_XEN_PV=y by ignoring them (bsc#1222624).\n- CVE-2021-47207: Fixed a null pointer dereference on pointer block in gus (bsc#1222790).\n- CVE-2024-26610: Fixed memory corruption in wifi/iwlwifi (bsc#1221299).\n- CVE-2024-26689: Fixed a use-after-free in encode_cap_msg() (bsc#1222503).\n- CVE-2021-47041: Don\u0027t set sk_user_data without write_lock (bsc#1220755).\n- CVE-2021-47074: Fixed memory leak in nvme_loop_create_ctrl() (bsc#1220854).\n- CVE-2024-26744: Fixed null pointer dereference in srpt_service_guid parameter in rdma/srpt (bsc#1222449).\n\nThe following non-security bugs were fixed:\n\n- dm rq: do not queue request to blk-mq during DM suspend (bsc#1221113).\n- dm: rearrange core declarations for extended use from dm-zone.c (bsc#1221113).\n- net/tls: Remove the context from the list in tls_device_down (bsc#1221545).\n- tls: Fix context leak on tls_device_down (bsc#1221545).\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "SUSE-2024-1645,SUSE-SUSE-MicroOS-5.1-2024-1645,SUSE-SUSE-MicroOS-5.2-2024-1645",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_1645-1.json"
      },
      {
        "category": "self",
        "summary": "URL for SUSE-SU-2024:1645-1",
        "url": "https://www.suse.com/support/update/announcement/2024/suse-su-20241645-1/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for SUSE-SU-2024:1645-1",
        "url": "https://lists.suse.com/pipermail/sle-updates/2024-May/035262.html"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1190576",
        "url": "https://bugzilla.suse.com/1190576"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1192145",
        "url": "https://bugzilla.suse.com/1192145"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1200313",
        "url": "https://bugzilla.suse.com/1200313"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1201489",
        "url": "https://bugzilla.suse.com/1201489"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203906",
        "url": "https://bugzilla.suse.com/1203906"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203935",
        "url": "https://bugzilla.suse.com/1203935"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1204614",
        "url": "https://bugzilla.suse.com/1204614"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1211592",
        "url": "https://bugzilla.suse.com/1211592"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1218562",
        "url": "https://bugzilla.suse.com/1218562"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1218917",
        "url": "https://bugzilla.suse.com/1218917"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1219169",
        "url": "https://bugzilla.suse.com/1219169"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1219170",
        "url": "https://bugzilla.suse.com/1219170"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1219264",
        "url": "https://bugzilla.suse.com/1219264"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1220513",
        "url": "https://bugzilla.suse.com/1220513"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1220755",
        "url": "https://bugzilla.suse.com/1220755"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1220854",
        "url": "https://bugzilla.suse.com/1220854"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1221113",
        "url": "https://bugzilla.suse.com/1221113"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1221299",
        "url": "https://bugzilla.suse.com/1221299"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1221543",
        "url": "https://bugzilla.suse.com/1221543"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1221545",
        "url": "https://bugzilla.suse.com/1221545"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222449",
        "url": "https://bugzilla.suse.com/1222449"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222482",
        "url": "https://bugzilla.suse.com/1222482"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222503",
        "url": "https://bugzilla.suse.com/1222503"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222559",
        "url": "https://bugzilla.suse.com/1222559"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222624",
        "url": "https://bugzilla.suse.com/1222624"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222666",
        "url": "https://bugzilla.suse.com/1222666"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222709",
        "url": "https://bugzilla.suse.com/1222709"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222790",
        "url": "https://bugzilla.suse.com/1222790"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222792",
        "url": "https://bugzilla.suse.com/1222792"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222829",
        "url": "https://bugzilla.suse.com/1222829"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222876",
        "url": "https://bugzilla.suse.com/1222876"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222881",
        "url": "https://bugzilla.suse.com/1222881"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222883",
        "url": "https://bugzilla.suse.com/1222883"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222894",
        "url": "https://bugzilla.suse.com/1222894"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222976",
        "url": "https://bugzilla.suse.com/1222976"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223016",
        "url": "https://bugzilla.suse.com/1223016"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223057",
        "url": "https://bugzilla.suse.com/1223057"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223111",
        "url": "https://bugzilla.suse.com/1223111"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223187",
        "url": "https://bugzilla.suse.com/1223187"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223202",
        "url": "https://bugzilla.suse.com/1223202"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223475",
        "url": "https://bugzilla.suse.com/1223475"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223482",
        "url": "https://bugzilla.suse.com/1223482"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223509",
        "url": "https://bugzilla.suse.com/1223509"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223513",
        "url": "https://bugzilla.suse.com/1223513"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223522",
        "url": "https://bugzilla.suse.com/1223522"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223824",
        "url": "https://bugzilla.suse.com/1223824"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223921",
        "url": "https://bugzilla.suse.com/1223921"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223923",
        "url": "https://bugzilla.suse.com/1223923"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223931",
        "url": "https://bugzilla.suse.com/1223931"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223941",
        "url": "https://bugzilla.suse.com/1223941"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223948",
        "url": "https://bugzilla.suse.com/1223948"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223952",
        "url": "https://bugzilla.suse.com/1223952"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1223963",
        "url": "https://bugzilla.suse.com/1223963"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-46955 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-46955/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47041 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47041/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47074 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47074/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47113 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47113/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47131 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47131/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47184 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47184/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47194 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47194/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47198 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47198/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47201 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47201/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47203 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47203/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47206 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47206/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47207 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47207/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47212 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47212/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47216 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47216/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48631 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48631/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48638 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48638/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48650 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48650/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48651 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48651/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48654 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48654/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48672 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48672/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48686 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48686/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48687 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48687/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48693 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48693/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48695 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48695/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48701 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48701/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48702 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48702/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-0639 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-0639/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-23307 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-23307/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26610 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26610/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26688 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26688/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26689 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26689/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26739 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26739/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26744 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26744/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26816 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26816/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26840 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26840/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26852 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26852/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26862 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26862/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26898 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26898/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26903 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26903/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26906 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26906/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-27043 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-27043/"
      }
    ],
    "title": "Security update for the Linux Kernel",
    "tracking": {
      "current_release_date": "2024-05-14T14:30:22Z",
      "generator": {
        "date": "2024-05-14T14:30:22Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "SUSE-SU-2024:1645-1",
      "initial_release_date": "2024-05-14T14:30:22Z",
      "revision_history": [
        {
          "date": "2024-05-14T14:30:22Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-devel-rt-5.3.18-150300.169.1.noarch",
                "product": {
                  "name": "kernel-devel-rt-5.3.18-150300.169.1.noarch",
                  "product_id": "kernel-devel-rt-5.3.18-150300.169.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-rt-5.3.18-150300.169.1.noarch",
                "product": {
                  "name": "kernel-source-rt-5.3.18-150300.169.1.noarch",
                  "product_id": "kernel-source-rt-5.3.18-150300.169.1.noarch"
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cluster-md-kmp-rt-5.3.18-150300.169.1.x86_64",
                "product": {
                  "name": "cluster-md-kmp-rt-5.3.18-150300.169.1.x86_64",
                  "product_id": "cluster-md-kmp-rt-5.3.18-150300.169.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "cluster-md-kmp-rt_debug-5.3.18-150300.169.1.x86_64",
                "product": {
                  "name": "cluster-md-kmp-rt_debug-5.3.18-150300.169.1.x86_64",
                  "product_id": "cluster-md-kmp-rt_debug-5.3.18-150300.169.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-rt-5.3.18-150300.169.1.x86_64",
                "product": {
                  "name": "dlm-kmp-rt-5.3.18-150300.169.1.x86_64",
                  "product_id": "dlm-kmp-rt-5.3.18-150300.169.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-rt_debug-5.3.18-150300.169.1.x86_64",
                "product": {
                  "name": "dlm-kmp-rt_debug-5.3.18-150300.169.1.x86_64",
                  "product_id": "dlm-kmp-rt_debug-5.3.18-150300.169.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-rt-5.3.18-150300.169.1.x86_64",
                "product": {
                  "name": "gfs2-kmp-rt-5.3.18-150300.169.1.x86_64",
                  "product_id": "gfs2-kmp-rt-5.3.18-150300.169.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-rt_debug-5.3.18-150300.169.1.x86_64",
                "product": {
                  "name": "gfs2-kmp-rt_debug-5.3.18-150300.169.1.x86_64",
                  "product_id": "gfs2-kmp-rt_debug-5.3.18-150300.169.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-5.3.18-150300.169.1.x86_64",
                "product": {
                  "name": "kernel-rt-5.3.18-150300.169.1.x86_64",
                  "product_id": "kernel-rt-5.3.18-150300.169.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-devel-5.3.18-150300.169.1.x86_64",
                "product": {
                  "name": "kernel-rt-devel-5.3.18-150300.169.1.x86_64",
                  "product_id": "kernel-rt-devel-5.3.18-150300.169.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-extra-5.3.18-150300.169.1.x86_64",
                "product": {
                  "name": "kernel-rt-extra-5.3.18-150300.169.1.x86_64",
                  "product_id": "kernel-rt-extra-5.3.18-150300.169.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-livepatch-devel-5.3.18-150300.169.1.x86_64",
                "product": {
                  "name": "kernel-rt-livepatch-devel-5.3.18-150300.169.1.x86_64",
                  "product_id": "kernel-rt-livepatch-devel-5.3.18-150300.169.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-optional-5.3.18-150300.169.1.x86_64",
                "product": {
                  "name": "kernel-rt-optional-5.3.18-150300.169.1.x86_64",
                  "product_id": "kernel-rt-optional-5.3.18-150300.169.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt_debug-5.3.18-150300.169.1.x86_64",
                "product": {
                  "name": "kernel-rt_debug-5.3.18-150300.169.1.x86_64",
                  "product_id": "kernel-rt_debug-5.3.18-150300.169.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt_debug-devel-5.3.18-150300.169.1.x86_64",
                "product": {
                  "name": "kernel-rt_debug-devel-5.3.18-150300.169.1.x86_64",
                  "product_id": "kernel-rt_debug-devel-5.3.18-150300.169.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt_debug-extra-5.3.18-150300.169.1.x86_64",
                "product": {
                  "name": "kernel-rt_debug-extra-5.3.18-150300.169.1.x86_64",
                  "product_id": "kernel-rt_debug-extra-5.3.18-150300.169.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt_debug-livepatch-devel-5.3.18-150300.169.1.x86_64",
                "product": {
                  "name": "kernel-rt_debug-livepatch-devel-5.3.18-150300.169.1.x86_64",
                  "product_id": "kernel-rt_debug-livepatch-devel-5.3.18-150300.169.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt_debug-optional-5.3.18-150300.169.1.x86_64",
                "product": {
                  "name": "kernel-rt_debug-optional-5.3.18-150300.169.1.x86_64",
                  "product_id": "kernel-rt_debug-optional-5.3.18-150300.169.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-rt-5.3.18-150300.169.1.x86_64",
                "product": {
                  "name": "kernel-syms-rt-5.3.18-150300.169.1.x86_64",
                  "product_id": "kernel-syms-rt-5.3.18-150300.169.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-rt-5.3.18-150300.169.1.x86_64",
                "product": {
                  "name": "kselftests-kmp-rt-5.3.18-150300.169.1.x86_64",
                  "product_id": "kselftests-kmp-rt-5.3.18-150300.169.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-rt_debug-5.3.18-150300.169.1.x86_64",
                "product": {
                  "name": "kselftests-kmp-rt_debug-5.3.18-150300.169.1.x86_64",
                  "product_id": "kselftests-kmp-rt_debug-5.3.18-150300.169.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-rt-5.3.18-150300.169.1.x86_64",
                "product": {
                  "name": "ocfs2-kmp-rt-5.3.18-150300.169.1.x86_64",
                  "product_id": "ocfs2-kmp-rt-5.3.18-150300.169.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-rt_debug-5.3.18-150300.169.1.x86_64",
                "product": {
                  "name": "ocfs2-kmp-rt_debug-5.3.18-150300.169.1.x86_64",
                  "product_id": "ocfs2-kmp-rt_debug-5.3.18-150300.169.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "reiserfs-kmp-rt-5.3.18-150300.169.1.x86_64",
                "product": {
                  "name": "reiserfs-kmp-rt-5.3.18-150300.169.1.x86_64",
                  "product_id": "reiserfs-kmp-rt-5.3.18-150300.169.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "reiserfs-kmp-rt_debug-5.3.18-150300.169.1.x86_64",
                "product": {
                  "name": "reiserfs-kmp-rt_debug-5.3.18-150300.169.1.x86_64",
                  "product_id": "reiserfs-kmp-rt_debug-5.3.18-150300.169.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Micro 5.1",
                "product": {
                  "name": "SUSE Linux Enterprise Micro 5.1",
                  "product_id": "SUSE Linux Enterprise Micro 5.1",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:suse-microos:5.1"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Micro 5.2",
                "product": {
                  "name": "SUSE Linux Enterprise Micro 5.2",
                  "product_id": "SUSE Linux Enterprise Micro 5.2",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:suse-microos:5.2"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-5.3.18-150300.169.1.x86_64 as component of SUSE Linux Enterprise Micro 5.1",
          "product_id": "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.169.1.x86_64"
        },
        "product_reference": "kernel-rt-5.3.18-150300.169.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-rt-5.3.18-150300.169.1.noarch as component of SUSE Linux Enterprise Micro 5.1",
          "product_id": "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.169.1.noarch"
        },
        "product_reference": "kernel-source-rt-5.3.18-150300.169.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-5.3.18-150300.169.1.x86_64 as component of SUSE Linux Enterprise Micro 5.2",
          "product_id": "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.169.1.x86_64"
        },
        "product_reference": "kernel-rt-5.3.18-150300.169.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-rt-5.3.18-150300.169.1.noarch as component of SUSE Linux Enterprise Micro 5.2",
          "product_id": "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.169.1.noarch"
        },
        "product_reference": "kernel-source-rt-5.3.18-150300.169.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-46955",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-46955"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nopenvswitch: fix stack OOB read while fragmenting IPv4 packets\n\nrunning openvswitch on kernels built with KASAN, it\u0027s possible to see the\nfollowing splat while testing fragmentation of IPv4 packets:\n\n BUG: KASAN: stack-out-of-bounds in ip_do_fragment+0x1b03/0x1f60\n Read of size 1 at addr ffff888112fc713c by task handler2/1367\n\n CPU: 0 PID: 1367 Comm: handler2 Not tainted 5.12.0-rc6+ #418\n Hardware name: Red Hat KVM, BIOS 1.11.1-4.module+el8.1.0+4066+0f1aadab 04/01/2014\n Call Trace:\n  dump_stack+0x92/0xc1\n  print_address_description.constprop.7+0x1a/0x150\n  kasan_report.cold.13+0x7f/0x111\n  ip_do_fragment+0x1b03/0x1f60\n  ovs_fragment+0x5bf/0x840 [openvswitch]\n  do_execute_actions+0x1bd5/0x2400 [openvswitch]\n  ovs_execute_actions+0xc8/0x3d0 [openvswitch]\n  ovs_packet_cmd_execute+0xa39/0x1150 [openvswitch]\n  genl_family_rcv_msg_doit.isra.15+0x227/0x2d0\n  genl_rcv_msg+0x287/0x490\n  netlink_rcv_skb+0x120/0x380\n  genl_rcv+0x24/0x40\n  netlink_unicast+0x439/0x630\n  netlink_sendmsg+0x719/0xbf0\n  sock_sendmsg+0xe2/0x110\n  ____sys_sendmsg+0x5ba/0x890\n  ___sys_sendmsg+0xe9/0x160\n  __sys_sendmsg+0xd3/0x170\n  do_syscall_64+0x33/0x40\n  entry_SYSCALL_64_after_hwframe+0x44/0xae\n RIP: 0033:0x7f957079db07\n Code: c3 66 90 41 54 41 89 d4 55 48 89 f5 53 89 fb 48 83 ec 10 e8 eb ec ff ff 44 89 e2 48 89 ee 89 df 41 89 c0 b8 2e 00 00 00 0f 05 \u003c48\u003e 3d 00 f0 ff ff 77 35 44 89 c7 48 89 44 24 08 e8 24 ed ff ff 48\n RSP: 002b:00007f956ce35a50 EFLAGS: 00000293 ORIG_RAX: 000000000000002e\n RAX: ffffffffffffffda RBX: 0000000000000019 RCX: 00007f957079db07\n RDX: 0000000000000000 RSI: 00007f956ce35ae0 RDI: 0000000000000019\n RBP: 00007f956ce35ae0 R08: 0000000000000000 R09: 00007f9558006730\n R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000\n R13: 00007f956ce37308 R14: 00007f956ce35f80 R15: 00007f956ce35ae0\n\n The buggy address belongs to the page:\n page:00000000af2a1d93 refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x112fc7\n flags: 0x17ffffc0000000()\n raw: 0017ffffc0000000 0000000000000000 dead000000000122 0000000000000000\n raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000\n page dumped because: kasan: bad access detected\n\n addr ffff888112fc713c is located in stack of task handler2/1367 at offset 180 in frame:\n  ovs_fragment+0x0/0x840 [openvswitch]\n\n this frame has 2 objects:\n  [32, 144) \u0027ovs_dst\u0027\n  [192, 424) \u0027ovs_rt\u0027\n\n Memory state around the buggy address:\n  ffff888112fc7000: f3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00\n  ffff888112fc7080: 00 f1 f1 f1 f1 00 00 00 00 00 00 00 00 00 00 00\n \u003effff888112fc7100: 00 00 00 f2 f2 f2 f2 f2 f2 00 00 00 00 00 00 00\n                                         ^\n  ffff888112fc7180: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00\n  ffff888112fc7200: 00 00 00 00 00 00 f2 f2 f2 00 00 00 00 00 00 00\n\nfor IPv4 packets, ovs_fragment() uses a temporary struct dst_entry. Then,\nin the following call graph:\n\n  ip_do_fragment()\n    ip_skb_dst_mtu()\n      ip_dst_mtu_maybe_forward()\n        ip_mtu_locked()\n\nthe pointer to struct dst_entry is used as pointer to struct rtable: this\nturns the access to struct members like rt_mtu_locked into an OOB read in\nthe stack. Fix this changing the temporary variable used for IPv4 packets\nin ovs_fragment(), similarly to what is done for IPv6 few lines below.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.169.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.169.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.169.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.169.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-46955",
          "url": "https://www.suse.com/security/cve/CVE-2021-46955"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1220513 for CVE-2021-46955",
          "url": "https://bugzilla.suse.com/1220513"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1220537 for CVE-2021-46955",
          "url": "https://bugzilla.suse.com/1220537"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.169.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.169.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.169.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.169.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:30:22Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-46955"
    },
    {
      "cve": "CVE-2021-47041",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47041"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvmet-tcp: fix incorrect locking in state_change sk callback\n\nWe are not changing anything in the TCP connection state so\nwe should not take a write_lock but rather a read lock.\n\nThis caused a deadlock when running nvmet-tcp and nvme-tcp\non the same system, where state_change callbacks on the\nhost and on the controller side have causal relationship\nand made lockdep report on this with blktests:\n\n================================\nWARNING: inconsistent lock state\n5.12.0-rc3 #1 Tainted: G          I\n--------------------------------\ninconsistent {IN-SOFTIRQ-W} -\u003e {SOFTIRQ-ON-R} usage.\nnvme/1324 [HC0[0]:SC0[0]:HE1:SE1] takes:\nffff888363151000 (clock-AF_INET){++-?}-{2:2}, at: nvme_tcp_state_change+0x21/0x150 [nvme_tcp]\n{IN-SOFTIRQ-W} state was registered at:\n  __lock_acquire+0x79b/0x18d0\n  lock_acquire+0x1ca/0x480\n  _raw_write_lock_bh+0x39/0x80\n  nvmet_tcp_state_change+0x21/0x170 [nvmet_tcp]\n  tcp_fin+0x2a8/0x780\n  tcp_data_queue+0xf94/0x1f20\n  tcp_rcv_established+0x6ba/0x1f00\n  tcp_v4_do_rcv+0x502/0x760\n  tcp_v4_rcv+0x257e/0x3430\n  ip_protocol_deliver_rcu+0x69/0x6a0\n  ip_local_deliver_finish+0x1e2/0x2f0\n  ip_local_deliver+0x1a2/0x420\n  ip_rcv+0x4fb/0x6b0\n  __netif_receive_skb_one_core+0x162/0x1b0\n  process_backlog+0x1ff/0x770\n  __napi_poll.constprop.0+0xa9/0x5c0\n  net_rx_action+0x7b3/0xb30\n  __do_softirq+0x1f0/0x940\n  do_softirq+0xa1/0xd0\n  __local_bh_enable_ip+0xd8/0x100\n  ip_finish_output2+0x6b7/0x18a0\n  __ip_queue_xmit+0x706/0x1aa0\n  __tcp_transmit_skb+0x2068/0x2e20\n  tcp_write_xmit+0xc9e/0x2bb0\n  __tcp_push_pending_frames+0x92/0x310\n  inet_shutdown+0x158/0x300\n  __nvme_tcp_stop_queue+0x36/0x270 [nvme_tcp]\n  nvme_tcp_stop_queue+0x87/0xb0 [nvme_tcp]\n  nvme_tcp_teardown_admin_queue+0x69/0xe0 [nvme_tcp]\n  nvme_do_delete_ctrl+0x100/0x10c [nvme_core]\n  nvme_sysfs_delete.cold+0x8/0xd [nvme_core]\n  kernfs_fop_write_iter+0x2c7/0x460\n  new_sync_write+0x36c/0x610\n  vfs_write+0x5c0/0x870\n  ksys_write+0xf9/0x1d0\n  do_syscall_64+0x33/0x40\n  entry_SYSCALL_64_after_hwframe+0x44/0xae\nirq event stamp: 10687\nhardirqs last  enabled at (10687): [\u003cffffffff9ec376bd\u003e] _raw_spin_unlock_irqrestore+0x2d/0x40\nhardirqs last disabled at (10686): [\u003cffffffff9ec374d8\u003e] _raw_spin_lock_irqsave+0x68/0x90\nsoftirqs last  enabled at (10684): [\u003cffffffff9f000608\u003e] __do_softirq+0x608/0x940\nsoftirqs last disabled at (10649): [\u003cffffffff9cdedd31\u003e] do_softirq+0xa1/0xd0\n\nother info that might help us debug this:\n Possible unsafe locking scenario:\n\n       CPU0\n       ----\n  lock(clock-AF_INET);\n  \u003cInterrupt\u003e\n    lock(clock-AF_INET);\n\n *** DEADLOCK ***\n\n5 locks held by nvme/1324:\n #0: ffff8884a01fe470 (sb_writers#4){.+.+}-{0:0}, at: ksys_write+0xf9/0x1d0\n #1: ffff8886e435c090 (\u0026of-\u003emutex){+.+.}-{3:3}, at: kernfs_fop_write_iter+0x216/0x460\n #2: ffff888104d90c38 (kn-\u003eactive#255){++++}-{0:0}, at: kernfs_remove_self+0x22d/0x330\n #3: ffff8884634538d0 (\u0026queue-\u003equeue_lock){+.+.}-{3:3}, at: nvme_tcp_stop_queue+0x52/0xb0 [nvme_tcp]\n #4: ffff888363150d30 (sk_lock-AF_INET){+.+.}-{0:0}, at: inet_shutdown+0x59/0x300\n\nstack backtrace:\nCPU: 26 PID: 1324 Comm: nvme Tainted: G          I       5.12.0-rc3 #1\nHardware name: Dell Inc. PowerEdge R640/06NR82, BIOS 2.10.0 11/12/2020\nCall Trace:\n dump_stack+0x93/0xc2\n mark_lock_irq.cold+0x2c/0xb3\n ? verify_lock_unused+0x390/0x390\n ? stack_trace_consume_entry+0x160/0x160\n ? lock_downgrade+0x100/0x100\n ? save_trace+0x88/0x5e0\n ? _raw_spin_unlock_irqrestore+0x2d/0x40\n mark_lock+0x530/0x1470\n ? mark_lock_irq+0x1d10/0x1d10\n ? enqueue_timer+0x660/0x660\n mark_usage+0x215/0x2a0\n __lock_acquire+0x79b/0x18d0\n ? tcp_schedule_loss_probe.part.0+0x38c/0x520\n lock_acquire+0x1ca/0x480\n ? nvme_tcp_state_change+0x21/0x150 [nvme_tcp]\n ? rcu_read_unlock+0x40/0x40\n ? tcp_mtu_probe+0x1ae0/0x1ae0\n ? kmalloc_reserve+0xa0/0xa0\n ? sysfs_file_ops+0x170/0x170\n _raw_read_lock+0x3d/0xa0\n ? nvme_tcp_state_change+0x21/0x150 [nvme_tcp]\n nvme_tcp_state_change+0x21/0x150 [nvme_tcp]\n ? sysfs_file_ops\n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.169.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.169.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.169.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.169.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47041",
          "url": "https://www.suse.com/security/cve/CVE-2021-47041"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1220755 for CVE-2021-47041",
          "url": "https://bugzilla.suse.com/1220755"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.169.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.169.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.169.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.169.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:30:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47041"
    },
    {
      "cve": "CVE-2021-47074",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47074"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvme-loop: fix memory leak in nvme_loop_create_ctrl()\n\nWhen creating loop ctrl in nvme_loop_create_ctrl(), if nvme_init_ctrl()\nfails, the loop ctrl should be freed before jumping to the \"out\" label.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.169.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.169.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.169.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.169.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47074",
          "url": "https://www.suse.com/security/cve/CVE-2021-47074"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1220854 for CVE-2021-47074",
          "url": "https://bugzilla.suse.com/1220854"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.169.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.169.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.169.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.169.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:30:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47074"
    },
    {
      "cve": "CVE-2021-47113",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47113"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: abort in rename_exchange if we fail to insert the second ref\n\nError injection stress uncovered a problem where we\u0027d leave a dangling\ninode ref if we failed during a rename_exchange.  This happens because\nwe insert the inode ref for one side of the rename, and then for the\nother side.  If this second inode ref insert fails we\u0027ll leave the first\none dangling and leave a corrupt file system behind.  Fix this by\naborting if we did the insert for the first inode ref.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.169.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.169.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.169.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.169.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47113",
          "url": "https://www.suse.com/security/cve/CVE-2021-47113"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1221543 for CVE-2021-47113",
          "url": "https://bugzilla.suse.com/1221543"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.169.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.169.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.169.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.169.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:30:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47113"
    },
    {
      "cve": "CVE-2021-47131",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47131"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/tls: Fix use-after-free after the TLS device goes down and up\n\nWhen a netdev with active TLS offload goes down, tls_device_down is\ncalled to stop the offload and tear down the TLS context. However, the\nsocket stays alive, and it still points to the TLS context, which is now\ndeallocated. If a netdev goes up, while the connection is still active,\nand the data flow resumes after a number of TCP retransmissions, it will\nlead to a use-after-free of the TLS context.\n\nThis commit addresses this bug by keeping the context alive until its\nnormal destruction, and implements the necessary fallbacks, so that the\nconnection can resume in software (non-offloaded) kTLS mode.\n\nOn the TX side tls_sw_fallback is used to encrypt all packets. The RX\nside already has all the necessary fallbacks, because receiving\nnon-decrypted packets is supported. The thing needed on the RX side is\nto block resync requests, which are normally produced after receiving\nnon-decrypted packets.\n\nThe necessary synchronization is implemented for a graceful teardown:\nfirst the fallbacks are deployed, then the driver resources are released\n(it used to be possible to have a tls_dev_resync after tls_dev_del).\n\nA new flag called TLS_RX_DEV_DEGRADED is added to indicate the fallback\nmode. It\u0027s used to skip the RX resync logic completely, as it becomes\nuseless, and some objects may be released (for example, resync_async,\nwhich is allocated and freed by the driver).",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.169.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.169.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.169.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.169.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47131",
          "url": "https://www.suse.com/security/cve/CVE-2021-47131"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1221545 for CVE-2021-47131",
          "url": "https://bugzilla.suse.com/1221545"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222402 for CVE-2021-47131",
          "url": "https://bugzilla.suse.com/1222402"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.169.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.169.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.169.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.169.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:30:22Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-47131"
    },
    {
      "cve": "CVE-2021-47184",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47184"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ni40e: Fix NULL ptr dereference on VSI filter sync\n\nRemove the reason of null pointer dereference in sync VSI filters.\nAdded new I40E_VSI_RELEASING flag to signalize deleting and releasing\nof VSI resources to sync this thread with sync filters subtask.\nWithout this patch it is possible to start update the VSI filter list\nafter VSI is removed, that\u0027s causing a kernel oops.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.169.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.169.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.169.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.169.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47184",
          "url": "https://www.suse.com/security/cve/CVE-2021-47184"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222666 for CVE-2021-47184",
          "url": "https://bugzilla.suse.com/1222666"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.169.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.169.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.169.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.169.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:30:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47184"
    },
    {
      "cve": "CVE-2021-47194",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47194"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncfg80211: call cfg80211_stop_ap when switch from P2P_GO type\n\nIf the userspace tools switch from NL80211_IFTYPE_P2P_GO to\nNL80211_IFTYPE_ADHOC via send_msg(NL80211_CMD_SET_INTERFACE), it\ndoes not call the cleanup cfg80211_stop_ap(), this leads to the\ninitialization of in-use data. For example, this path re-init the\nsdata-\u003eassigned_chanctx_list while it is still an element of\nassigned_vifs list, and makes that linked list corrupt.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.169.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.169.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.169.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.169.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47194",
          "url": "https://www.suse.com/security/cve/CVE-2021-47194"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222829 for CVE-2021-47194",
          "url": "https://bugzilla.suse.com/1222829"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.169.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.169.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.169.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.169.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:30:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47194"
    },
    {
      "cve": "CVE-2021-47198",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47198"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: lpfc: Fix use-after-free in lpfc_unreg_rpi() routine\n\nAn error is detected with the following report when unloading the driver:\n  \"KASAN: use-after-free in lpfc_unreg_rpi+0x1b1b\"\n\nThe NLP_REG_LOGIN_SEND nlp_flag is set in lpfc_reg_fab_ctrl_node(), but the\nflag is not cleared upon completion of the login.\n\nThis allows a second call to lpfc_unreg_rpi() to proceed with nlp_rpi set\nto LPFC_RPI_ALLOW_ERROR.  This results in a use after free access when used\nas an rpi_ids array index.\n\nFix by clearing the NLP_REG_LOGIN_SEND nlp_flag in\nlpfc_mbx_cmpl_fc_reg_login().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.169.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.169.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.169.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.169.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47198",
          "url": "https://www.suse.com/security/cve/CVE-2021-47198"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222883 for CVE-2021-47198",
          "url": "https://bugzilla.suse.com/1222883"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.169.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.169.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.169.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.169.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:30:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47198"
    },
    {
      "cve": "CVE-2021-47201",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47201"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\niavf: free q_vectors before queues in iavf_disable_vf\n\niavf_free_queues() clears adapter-\u003enum_active_queues, which\niavf_free_q_vectors() relies on, so swap the order of these two function\ncalls in iavf_disable_vf(). This resolves a panic encountered when the\ninterface is disabled and then later brought up again after PF\ncommunication is restored.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.169.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.169.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.169.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.169.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47201",
          "url": "https://www.suse.com/security/cve/CVE-2021-47201"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222792 for CVE-2021-47201",
          "url": "https://bugzilla.suse.com/1222792"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.169.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.169.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.169.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.169.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:30:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47201"
    },
    {
      "cve": "CVE-2021-47203",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47203"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: lpfc: Fix list_add() corruption in lpfc_drain_txq()\n\nWhen parsing the txq list in lpfc_drain_txq(), the driver attempts to pass\nthe requests to the adapter. If such an attempt fails, a local \"fail_msg\"\nstring is set and a log message output.  The job is then added to a\ncompletions list for cancellation.\n\nProcessing of any further jobs from the txq list continues, but since\n\"fail_msg\" remains set, jobs are added to the completions list regardless\nof whether a wqe was passed to the adapter.  If successfully added to\ntxcmplq, jobs are added to both lists resulting in list corruption.\n\nFix by clearing the fail_msg string after adding a job to the completions\nlist. This stops the subsequent jobs from being added to the completions\nlist unless they had an appropriate failure.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.169.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.169.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.169.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.169.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47203",
          "url": "https://www.suse.com/security/cve/CVE-2021-47203"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222881 for CVE-2021-47203",
          "url": "https://bugzilla.suse.com/1222881"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.169.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.169.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.169.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.169.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:30:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47203"
    },
    {
      "cve": "CVE-2021-47206",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47206"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: host: ohci-tmio: check return value after calling platform_get_resource()\n\nIt will cause null-ptr-deref if platform_get_resource() returns NULL,\nwe need check the return value.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.169.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.169.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.169.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.169.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47206",
          "url": "https://www.suse.com/security/cve/CVE-2021-47206"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222894 for CVE-2021-47206",
          "url": "https://bugzilla.suse.com/1222894"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.169.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.169.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.169.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.169.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:30:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47206"
    },
    {
      "cve": "CVE-2021-47207",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47207"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: gus: fix null pointer dereference on pointer block\n\nThe pointer block return from snd_gf1_dma_next_block could be\nnull, so there is a potential null pointer dereference issue.\nFix this by adding a null check before dereference.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.169.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.169.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.169.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.169.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47207",
          "url": "https://www.suse.com/security/cve/CVE-2021-47207"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222790 for CVE-2021-47207",
          "url": "https://bugzilla.suse.com/1222790"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.169.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.169.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.169.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.169.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:30:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47207"
    },
    {
      "cve": "CVE-2021-47212",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47212"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5: Update error handler for UCTX and UMEM\n\nIn the fast unload flow, the device state is set to internal error,\nwhich indicates that the driver started the destroy process.\nIn this case, when a destroy command is being executed, it should return\nMLX5_CMD_STAT_OK.\nFix MLX5_CMD_OP_DESTROY_UCTX and MLX5_CMD_OP_DESTROY_UMEM to return OK\ninstead of EIO.\n\nThis fixes a call trace in the umem release process -\n[ 2633.536695] Call Trace:\n[ 2633.537518]  ib_uverbs_remove_one+0xc3/0x140 [ib_uverbs]\n[ 2633.538596]  remove_client_context+0x8b/0xd0 [ib_core]\n[ 2633.539641]  disable_device+0x8c/0x130 [ib_core]\n[ 2633.540615]  __ib_unregister_device+0x35/0xa0 [ib_core]\n[ 2633.541640]  ib_unregister_device+0x21/0x30 [ib_core]\n[ 2633.542663]  __mlx5_ib_remove+0x38/0x90 [mlx5_ib]\n[ 2633.543640]  auxiliary_bus_remove+0x1e/0x30 [auxiliary]\n[ 2633.544661]  device_release_driver_internal+0x103/0x1f0\n[ 2633.545679]  bus_remove_device+0xf7/0x170\n[ 2633.546640]  device_del+0x181/0x410\n[ 2633.547606]  mlx5_rescan_drivers_locked.part.10+0x63/0x160 [mlx5_core]\n[ 2633.548777]  mlx5_unregister_device+0x27/0x40 [mlx5_core]\n[ 2633.549841]  mlx5_uninit_one+0x21/0xc0 [mlx5_core]\n[ 2633.550864]  remove_one+0x69/0xe0 [mlx5_core]\n[ 2633.551819]  pci_device_remove+0x3b/0xc0\n[ 2633.552731]  device_release_driver_internal+0x103/0x1f0\n[ 2633.553746]  unbind_store+0xf6/0x130\n[ 2633.554657]  kernfs_fop_write+0x116/0x190\n[ 2633.555567]  vfs_write+0xa5/0x1a0\n[ 2633.556407]  ksys_write+0x4f/0xb0\n[ 2633.557233]  do_syscall_64+0x5b/0x1a0\n[ 2633.558071]  entry_SYSCALL_64_after_hwframe+0x65/0xca\n[ 2633.559018] RIP: 0033:0x7f9977132648\n[ 2633.559821] Code: 89 02 48 c7 c0 ff ff ff ff eb b3 0f 1f 80 00 00 00 00 f3 0f 1e fa 48 8d 05 55 6f 2d 00 8b 00 85 c0 75 17 b8 01 00 00 00 0f 05 \u003c48\u003e 3d 00 f0 ff ff 77 58 c3 0f 1f 80 00 00 00 00 41 54 49 89 d4 55\n[ 2633.562332] RSP: 002b:00007fffb1a83888 EFLAGS: 00000246 ORIG_RAX: 0000000000000001\n[ 2633.563472] RAX: ffffffffffffffda RBX: 000000000000000c RCX: 00007f9977132648\n[ 2633.564541] RDX: 000000000000000c RSI: 000055b90546e230 RDI: 0000000000000001\n[ 2633.565596] RBP: 000055b90546e230 R08: 00007f9977406860 R09: 00007f9977a54740\n[ 2633.566653] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f99774056e0\n[ 2633.567692] R13: 000000000000000c R14: 00007f9977400880 R15: 000000000000000c\n[ 2633.568725] ---[ end trace 10b4fe52945e544d ]---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.169.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.169.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.169.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.169.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47212",
          "url": "https://www.suse.com/security/cve/CVE-2021-47212"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222709 for CVE-2021-47212",
          "url": "https://bugzilla.suse.com/1222709"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.169.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.169.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.169.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.169.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:30:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47212"
    },
    {
      "cve": "CVE-2021-47216",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47216"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: advansys: Fix kernel pointer leak\n\nPointers should be printed with %p or %px rather than cast to \u0027unsigned\nlong\u0027 and printed with %lx.\n\nChange %lx to %p to print the hashed pointer.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.169.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.169.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.169.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.169.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47216",
          "url": "https://www.suse.com/security/cve/CVE-2021-47216"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222876 for CVE-2021-47216",
          "url": "https://bugzilla.suse.com/1222876"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.169.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.169.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.169.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.169.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:30:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47216"
    },
    {
      "cve": "CVE-2022-48631",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48631"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: fix bug in extents parsing when eh_entries == 0 and eh_depth \u003e 0\n\nWhen walking through an inode extents, the ext4_ext_binsearch_idx() function\nassumes that the extent header has been previously validated.  However, there\nare no checks that verify that the number of entries (eh-\u003eeh_entries) is\nnon-zero when depth is \u003e 0.  And this will lead to problems because the\nEXT_FIRST_INDEX() and EXT_LAST_INDEX() will return garbage and result in this:\n\n[  135.245946] ------------[ cut here ]------------\n[  135.247579] kernel BUG at fs/ext4/extents.c:2258!\n[  135.249045] invalid opcode: 0000 [#1] PREEMPT SMP\n[  135.250320] CPU: 2 PID: 238 Comm: tmp118 Not tainted 5.19.0-rc8+ #4\n[  135.252067] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.15.0-0-g2dd4b9b-rebuilt.opensuse.org 04/01/2014\n[  135.255065] RIP: 0010:ext4_ext_map_blocks+0xc20/0xcb0\n[  135.256475] Code:\n[  135.261433] RSP: 0018:ffffc900005939f8 EFLAGS: 00010246\n[  135.262847] RAX: 0000000000000024 RBX: ffffc90000593b70 RCX: 0000000000000023\n[  135.264765] RDX: ffff8880038e5f10 RSI: 0000000000000003 RDI: ffff8880046e922c\n[  135.266670] RBP: ffff8880046e9348 R08: 0000000000000001 R09: ffff888002ca580c\n[  135.268576] R10: 0000000000002602 R11: 0000000000000000 R12: 0000000000000024\n[  135.270477] R13: 0000000000000000 R14: 0000000000000024 R15: 0000000000000000\n[  135.272394] FS:  00007fdabdc56740(0000) GS:ffff88807dd00000(0000) knlGS:0000000000000000\n[  135.274510] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[  135.276075] CR2: 00007ffc26bd4f00 CR3: 0000000006261004 CR4: 0000000000170ea0\n[  135.277952] Call Trace:\n[  135.278635]  \u003cTASK\u003e\n[  135.279247]  ? preempt_count_add+0x6d/0xa0\n[  135.280358]  ? percpu_counter_add_batch+0x55/0xb0\n[  135.281612]  ? _raw_read_unlock+0x18/0x30\n[  135.282704]  ext4_map_blocks+0x294/0x5a0\n[  135.283745]  ? xa_load+0x6f/0xa0\n[  135.284562]  ext4_mpage_readpages+0x3d6/0x770\n[  135.285646]  read_pages+0x67/0x1d0\n[  135.286492]  ? folio_add_lru+0x51/0x80\n[  135.287441]  page_cache_ra_unbounded+0x124/0x170\n[  135.288510]  filemap_get_pages+0x23d/0x5a0\n[  135.289457]  ? path_openat+0xa72/0xdd0\n[  135.290332]  filemap_read+0xbf/0x300\n[  135.291158]  ? _raw_spin_lock_irqsave+0x17/0x40\n[  135.292192]  new_sync_read+0x103/0x170\n[  135.293014]  vfs_read+0x15d/0x180\n[  135.293745]  ksys_read+0xa1/0xe0\n[  135.294461]  do_syscall_64+0x3c/0x80\n[  135.295284]  entry_SYSCALL_64_after_hwframe+0x46/0xb0\n\nThis patch simply adds an extra check in __ext4_ext_check(), verifying that\neh_entries is not 0 when eh_depth is \u003e 0.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.169.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.169.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.169.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.169.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48631",
          "url": "https://www.suse.com/security/cve/CVE-2022-48631"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223475 for CVE-2022-48631",
          "url": "https://bugzilla.suse.com/1223475"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.169.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.169.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.169.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.169.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:30:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-48631"
    },
    {
      "cve": "CVE-2022-48638",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48638"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncgroup: cgroup_get_from_id() must check the looked-up kn is a directory\n\ncgroup has to be one kernfs dir, otherwise kernel panic is caused,\nespecially cgroup id is provide from userspace.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.169.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.169.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.169.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.169.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48638",
          "url": "https://www.suse.com/security/cve/CVE-2022-48638"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223522 for CVE-2022-48638",
          "url": "https://bugzilla.suse.com/1223522"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.169.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.169.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.169.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.169.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:30:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-48638"
    },
    {
      "cve": "CVE-2022-48650",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48650"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qla2xxx: Fix memory leak in __qlt_24xx_handle_abts()\n\nCommit 8f394da36a36 (\"scsi: qla2xxx: Drop TARGET_SCF_LOOKUP_LUN_FROM_TAG\")\nmade the __qlt_24xx_handle_abts() function return early if\ntcm_qla2xxx_find_cmd_by_tag() didn\u0027t find a command, but it missed to clean\nup the allocated memory for the management command.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.169.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.169.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.169.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.169.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48650",
          "url": "https://www.suse.com/security/cve/CVE-2022-48650"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223509 for CVE-2022-48650",
          "url": "https://bugzilla.suse.com/1223509"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.169.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.169.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.169.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.169.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:30:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-48650"
    },
    {
      "cve": "CVE-2022-48651",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48651"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipvlan: Fix out-of-bound bugs caused by unset skb-\u003emac_header\n\nIf an AF_PACKET socket is used to send packets through ipvlan and the\ndefault xmit function of the AF_PACKET socket is changed from\ndev_queue_xmit() to packet_direct_xmit() via setsockopt() with the option\nname of PACKET_QDISC_BYPASS, the skb-\u003emac_header may not be reset and\nremains as the initial value of 65535, this may trigger slab-out-of-bounds\nbugs as following:\n\n=================================================================\nUG: KASAN: slab-out-of-bounds in ipvlan_xmit_mode_l2+0xdb/0x330 [ipvlan]\nPU: 2 PID: 1768 Comm: raw_send Kdump: loaded Not tainted 6.0.0-rc4+ #6\nardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.14.0-1.fc33\nall Trace:\nprint_address_description.constprop.0+0x1d/0x160\nprint_report.cold+0x4f/0x112\nkasan_report+0xa3/0x130\nipvlan_xmit_mode_l2+0xdb/0x330 [ipvlan]\nipvlan_start_xmit+0x29/0xa0 [ipvlan]\n__dev_direct_xmit+0x2e2/0x380\npacket_direct_xmit+0x22/0x60\npacket_snd+0x7c9/0xc40\nsock_sendmsg+0x9a/0xa0\n__sys_sendto+0x18a/0x230\n__x64_sys_sendto+0x74/0x90\ndo_syscall_64+0x3b/0x90\nentry_SYSCALL_64_after_hwframe+0x63/0xcd\n\nThe root cause is:\n  1. packet_snd() only reset skb-\u003emac_header when sock-\u003etype is SOCK_RAW\n     and skb-\u003eprotocol is not specified as in packet_parse_headers()\n\n  2. packet_direct_xmit() doesn\u0027t reset skb-\u003emac_header as dev_queue_xmit()\n\nIn this case, skb-\u003emac_header is 65535 when ipvlan_xmit_mode_l2() is\ncalled. So when ipvlan_xmit_mode_l2() gets mac header with eth_hdr() which\nuse \"skb-\u003ehead + skb-\u003emac_header\", out-of-bound access occurs.\n\nThis patch replaces eth_hdr() with skb_eth_hdr() in ipvlan_xmit_mode_l2()\nand reset mac header in multicast to solve this out-of-bound bug.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.169.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.169.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.169.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.169.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48651",
          "url": "https://www.suse.com/security/cve/CVE-2022-48651"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223513 for CVE-2022-48651",
          "url": "https://bugzilla.suse.com/1223513"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223514 for CVE-2022-48651",
          "url": "https://bugzilla.suse.com/1223514"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.169.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.169.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.169.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.169.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:30:22Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-48651"
    },
    {
      "cve": "CVE-2022-48654",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48654"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nfnetlink_osf: fix possible bogus match in nf_osf_find()\n\nnf_osf_find() incorrectly returns true on mismatch, this leads to\ncopying uninitialized memory area in nft_osf which can be used to leak\nstale kernel stack data to userspace.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.169.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.169.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.169.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.169.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48654",
          "url": "https://www.suse.com/security/cve/CVE-2022-48654"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223482 for CVE-2022-48654",
          "url": "https://bugzilla.suse.com/1223482"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.169.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.169.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.169.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.169.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:30:22Z",
          "details": "low"
        }
      ],
      "title": "CVE-2022-48654"
    },
    {
      "cve": "CVE-2022-48672",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48672"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nof: fdt: fix off-by-one error in unflatten_dt_nodes()\n\nCommit 78c44d910d3e (\"drivers/of: Fix depth when unflattening devicetree\")\nforgot to fix up the depth check in the loop body in unflatten_dt_nodes()\nwhich makes it possible to overflow the nps[] buffer...\n\nFound by Linux Verification Center (linuxtesting.org) with the SVACE static\nanalysis tool.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.169.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.169.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.169.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.169.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48672",
          "url": "https://www.suse.com/security/cve/CVE-2022-48672"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223931 for CVE-2022-48672",
          "url": "https://bugzilla.suse.com/1223931"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.169.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.169.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.169.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.169.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:30:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-48672"
    },
    {
      "cve": "CVE-2022-48686",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48686"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvme-tcp: fix UAF when detecting digest errors\n\nWe should also bail from the io_work loop when we set rd_enabled to true,\nso we don\u0027t attempt to read data from the socket when the TCP stream is\nalready out-of-sync or corrupted.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.169.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.169.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.169.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.169.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48686",
          "url": "https://www.suse.com/security/cve/CVE-2022-48686"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223948 for CVE-2022-48686",
          "url": "https://bugzilla.suse.com/1223948"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1226337 for CVE-2022-48686",
          "url": "https://bugzilla.suse.com/1226337"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.169.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.169.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.169.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.169.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:30:22Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-48686"
    },
    {
      "cve": "CVE-2022-48687",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48687"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv6: sr: fix out-of-bounds read when setting HMAC data.\n\nThe SRv6 layer allows defining HMAC data that can later be used to sign IPv6\nSegment Routing Headers. This configuration is realised via netlink through\nfour attributes: SEG6_ATTR_HMACKEYID, SEG6_ATTR_SECRET, SEG6_ATTR_SECRETLEN and\nSEG6_ATTR_ALGID. Because the SECRETLEN attribute is decoupled from the actual\nlength of the SECRET attribute, it is possible to provide invalid combinations\n(e.g., secret = \"\", secretlen = 64). This case is not checked in the code and\nwith an appropriately crafted netlink message, an out-of-bounds read of up\nto 64 bytes (max secret length) can occur past the skb end pointer and into\nskb_shared_info:\n\nBreakpoint 1, seg6_genl_sethmac (skb=\u003coptimized out\u003e, info=\u003coptimized out\u003e) at net/ipv6/seg6.c:208\n208\t\tmemcpy(hinfo-\u003esecret, secret, slen);\n(gdb) bt\n #0  seg6_genl_sethmac (skb=\u003coptimized out\u003e, info=\u003coptimized out\u003e) at net/ipv6/seg6.c:208\n #1  0xffffffff81e012e9 in genl_family_rcv_msg_doit (skb=skb@entry=0xffff88800b1f9f00, nlh=nlh@entry=0xffff88800b1b7600,\n    extack=extack@entry=0xffffc90000ba7af0, ops=ops@entry=0xffffc90000ba7a80, hdrlen=4, net=0xffffffff84237580 \u003cinit_net\u003e, family=\u003coptimized out\u003e,\n    family=\u003coptimized out\u003e) at net/netlink/genetlink.c:731\n #2  0xffffffff81e01435 in genl_family_rcv_msg (extack=0xffffc90000ba7af0, nlh=0xffff88800b1b7600, skb=0xffff88800b1f9f00,\n    family=0xffffffff82fef6c0 \u003cseg6_genl_family\u003e) at net/netlink/genetlink.c:775\n #3  genl_rcv_msg (skb=0xffff88800b1f9f00, nlh=0xffff88800b1b7600, extack=0xffffc90000ba7af0) at net/netlink/genetlink.c:792\n #4  0xffffffff81dfffc3 in netlink_rcv_skb (skb=skb@entry=0xffff88800b1f9f00, cb=cb@entry=0xffffffff81e01350 \u003cgenl_rcv_msg\u003e)\n    at net/netlink/af_netlink.c:2501\n #5  0xffffffff81e00919 in genl_rcv (skb=0xffff88800b1f9f00) at net/netlink/genetlink.c:803\n #6  0xffffffff81dff6ae in netlink_unicast_kernel (ssk=0xffff888010eec800, skb=0xffff88800b1f9f00, sk=0xffff888004aed000)\n    at net/netlink/af_netlink.c:1319\n #7  netlink_unicast (ssk=ssk@entry=0xffff888010eec800, skb=skb@entry=0xffff88800b1f9f00, portid=portid@entry=0, nonblock=\u003coptimized out\u003e)\n    at net/netlink/af_netlink.c:1345\n #8  0xffffffff81dff9a4 in netlink_sendmsg (sock=\u003coptimized out\u003e, msg=0xffffc90000ba7e48, len=\u003coptimized out\u003e) at net/netlink/af_netlink.c:1921\n...\n(gdb) p/x ((struct sk_buff *)0xffff88800b1f9f00)-\u003ehead + ((struct sk_buff *)0xffff88800b1f9f00)-\u003eend\n$1 = 0xffff88800b1b76c0\n(gdb) p/x secret\n$2 = 0xffff88800b1b76c0\n(gdb) p slen\n$3 = 64 \u0027@\u0027\n\nThe OOB data can then be read back from userspace by dumping HMAC state. This\ncommit fixes this by ensuring SECRETLEN cannot exceed the actual length of\nSECRET.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.169.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.169.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.169.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.169.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48687",
          "url": "https://www.suse.com/security/cve/CVE-2022-48687"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223952 for CVE-2022-48687",
          "url": "https://bugzilla.suse.com/1223952"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224043 for CVE-2022-48687",
          "url": "https://bugzilla.suse.com/1224043"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.169.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.169.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.169.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.169.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:30:22Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-48687"
    },
    {
      "cve": "CVE-2022-48693",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48693"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsoc: brcmstb: pm-arm: Fix refcount leak and __iomem leak bugs\n\nIn brcmstb_pm_probe(), there are two kinds of leak bugs:\n\n(1) we need to add of_node_put() when for_each__matching_node() breaks\n(2) we need to add iounmap() for each iomap in fail path",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.169.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.169.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.169.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.169.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48693",
          "url": "https://www.suse.com/security/cve/CVE-2022-48693"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223963 for CVE-2022-48693",
          "url": "https://bugzilla.suse.com/1223963"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.169.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.169.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.169.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.169.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:30:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-48693"
    },
    {
      "cve": "CVE-2022-48695",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48695"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: mpt3sas: Fix use-after-free warning\n\nFix the following use-after-free warning which is observed during\ncontroller reset:\n\nrefcount_t: underflow; use-after-free.\nWARNING: CPU: 23 PID: 5399 at lib/refcount.c:28 refcount_warn_saturate+0xa6/0xf0",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.169.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.169.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.169.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.169.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48695",
          "url": "https://www.suse.com/security/cve/CVE-2022-48695"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223941 for CVE-2022-48695",
          "url": "https://bugzilla.suse.com/1223941"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.169.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.169.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.169.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.169.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:30:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-48695"
    },
    {
      "cve": "CVE-2022-48701",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48701"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: usb-audio: Fix an out-of-bounds bug in __snd_usb_parse_audio_interface()\n\nThere may be a bad USB audio device with a USB ID of (0x04fa, 0x4201) and\nthe number of it\u0027s interfaces less than 4, an out-of-bounds read bug occurs\nwhen parsing the interface descriptor for this device.\n\nFix this by checking the number of interfaces.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.169.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.169.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.169.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.169.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48701",
          "url": "https://www.suse.com/security/cve/CVE-2022-48701"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223921 for CVE-2022-48701",
          "url": "https://bugzilla.suse.com/1223921"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.169.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.169.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.169.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.169.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:30:22Z",
          "details": "low"
        }
      ],
      "title": "CVE-2022-48701"
    },
    {
      "cve": "CVE-2022-48702",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48702"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: emu10k1: Fix out of bounds access in snd_emu10k1_pcm_channel_alloc()\n\nThe voice allocator sometimes begins allocating from near the end of the\narray and then wraps around, however snd_emu10k1_pcm_channel_alloc()\naccesses the newly allocated voices as if it never wrapped around.\n\nThis results in out of bounds access if the first voice has a high enough\nindex so that first_voice + requested_voice_count \u003e NUM_G (64).\nThe more voices are requested, the more likely it is for this to occur.\n\nThis was initially discovered using PipeWire, however it can be reproduced\nby calling aplay multiple times with 16 channels:\naplay -r 48000 -D plughw:CARD=Live,DEV=3 -c 16 /dev/zero\n\nUBSAN: array-index-out-of-bounds in sound/pci/emu10k1/emupcm.c:127:40\nindex 65 is out of range for type \u0027snd_emu10k1_voice [64]\u0027\nCPU: 1 PID: 31977 Comm: aplay Tainted: G        W IOE      6.0.0-rc2-emu10k1+ #7\nHardware name: ASUSTEK COMPUTER INC P5W DH Deluxe/P5W DH Deluxe, BIOS 3002    07/22/2010\nCall Trace:\n\u003cTASK\u003e\ndump_stack_lvl+0x49/0x63\ndump_stack+0x10/0x16\nubsan_epilogue+0x9/0x3f\n__ubsan_handle_out_of_bounds.cold+0x44/0x49\nsnd_emu10k1_playback_hw_params+0x3bc/0x420 [snd_emu10k1]\nsnd_pcm_hw_params+0x29f/0x600 [snd_pcm]\nsnd_pcm_common_ioctl+0x188/0x1410 [snd_pcm]\n? exit_to_user_mode_prepare+0x35/0x170\n? do_syscall_64+0x69/0x90\n? syscall_exit_to_user_mode+0x26/0x50\n? do_syscall_64+0x69/0x90\n? exit_to_user_mode_prepare+0x35/0x170\nsnd_pcm_ioctl+0x27/0x40 [snd_pcm]\n__x64_sys_ioctl+0x95/0xd0\ndo_syscall_64+0x5c/0x90\n? do_syscall_64+0x69/0x90\n? do_syscall_64+0x69/0x90\nentry_SYSCALL_64_after_hwframe+0x63/0xcd",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.169.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.169.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.169.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.169.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48702",
          "url": "https://www.suse.com/security/cve/CVE-2022-48702"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223923 for CVE-2022-48702",
          "url": "https://bugzilla.suse.com/1223923"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.169.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.169.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.169.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.169.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:30:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-48702"
    },
    {
      "cve": "CVE-2024-0639",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-0639"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A denial of service vulnerability due to a deadlock was found in sctp_auto_asconf_init in net/sctp/socket.c in the Linux kernel\u0027s SCTP subsystem. This flaw allows guests with local user privileges to trigger a deadlock and potentially crash the system.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.169.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.169.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.169.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.169.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-0639",
          "url": "https://www.suse.com/security/cve/CVE-2024-0639"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1218917 for CVE-2024-0639",
          "url": "https://bugzilla.suse.com/1218917"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.169.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.169.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.169.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.169.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:30:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-0639"
    },
    {
      "cve": "CVE-2024-23307",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-23307"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Integer Overflow or Wraparound vulnerability in Linux Linux kernel kernel on Linux, x86, ARM (md, raid, raid5 modules) allows Forced Integer Overflow.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.169.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.169.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.169.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.169.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-23307",
          "url": "https://www.suse.com/security/cve/CVE-2024-23307"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1219169 for CVE-2024-23307",
          "url": "https://bugzilla.suse.com/1219169"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1220145 for CVE-2024-23307",
          "url": "https://bugzilla.suse.com/1220145"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.169.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.169.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.169.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.169.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:30:22Z",
          "details": "important"
        }
      ],
      "title": "CVE-2024-23307"
    },
    {
      "cve": "CVE-2024-26610",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26610"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: iwlwifi: fix a memory corruption\n\niwl_fw_ini_trigger_tlv::data is a pointer to a __le32, which means that\nif we copy to iwl_fw_ini_trigger_tlv::data + offset while offset is in\nbytes, we\u0027ll write past the buffer.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.169.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.169.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.169.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.169.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26610",
          "url": "https://www.suse.com/security/cve/CVE-2024-26610"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1221299 for CVE-2024-26610",
          "url": "https://bugzilla.suse.com/1221299"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1221302 for CVE-2024-26610",
          "url": "https://bugzilla.suse.com/1221302"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.169.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.169.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.169.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.169.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:30:22Z",
          "details": "important"
        }
      ],
      "title": "CVE-2024-26610"
    },
    {
      "cve": "CVE-2024-26688",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26688"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super\n\nWhen configuring a hugetlb filesystem via the fsconfig() syscall, there is\na possible NULL dereference in hugetlbfs_fill_super() caused by assigning\nNULL to ctx-\u003ehstate in hugetlbfs_parse_param() when the requested pagesize\nis non valid.\n\nE.g: Taking the following steps:\n\n     fd = fsopen(\"hugetlbfs\", FSOPEN_CLOEXEC);\n     fsconfig(fd, FSCONFIG_SET_STRING, \"pagesize\", \"1024\", 0);\n     fsconfig(fd, FSCONFIG_CMD_CREATE, NULL, NULL, 0);\n\nGiven that the requested \"pagesize\" is invalid, ctxt-\u003ehstate will be replaced\nwith NULL, losing its previous value, and we will print an error:\n\n ...\n ...\n case Opt_pagesize:\n ps = memparse(param-\u003estring, \u0026rest);\n ctx-\u003ehstate = h;\n if (!ctx-\u003ehstate) {\n         pr_err(\"Unsupported page size %lu MB\\n\", ps / SZ_1M);\n         return -EINVAL;\n }\n return 0;\n ...\n ...\n\nThis is a problem because later on, we will dereference ctxt-\u003ehstate in\nhugetlbfs_fill_super()\n\n ...\n ...\n sb-\u003es_blocksize = huge_page_size(ctx-\u003ehstate);\n ...\n ...\n\nCausing below Oops.\n\nFix this by replacing cxt-\u003ehstate value only when then pagesize is known\nto be valid.\n\n kernel: hugetlbfs: Unsupported page size 0 MB\n kernel: BUG: kernel NULL pointer dereference, address: 0000000000000028\n kernel: #PF: supervisor read access in kernel mode\n kernel: #PF: error_code(0x0000) - not-present page\n kernel: PGD 800000010f66c067 P4D 800000010f66c067 PUD 1b22f8067 PMD 0\n kernel: Oops: 0000 [#1] PREEMPT SMP PTI\n kernel: CPU: 4 PID: 5659 Comm: syscall Tainted: G            E      6.8.0-rc2-default+ #22 5a47c3fef76212addcc6eb71344aabc35190ae8f\n kernel: Hardware name: Intel Corp. GROVEPORT/GROVEPORT, BIOS GVPRCRB1.86B.0016.D04.1705030402 05/03/2017\n kernel: RIP: 0010:hugetlbfs_fill_super+0xb4/0x1a0\n kernel: Code: 48 8b 3b e8 3e c6 ed ff 48 85 c0 48 89 45 20 0f 84 d6 00 00 00 48 b8 ff ff ff ff ff ff ff 7f 4c 89 e7 49 89 44 24 20 48 8b 03 \u003c8b\u003e 48 28 b8 00 10 00 00 48 d3 e0 49 89 44 24 18 48 8b 03 8b 40 28\n kernel: RSP: 0018:ffffbe9960fcbd48 EFLAGS: 00010246\n kernel: RAX: 0000000000000000 RBX: ffff9af5272ae780 RCX: 0000000000372004\n kernel: RDX: ffffffffffffffff RSI: ffffffffffffffff RDI: ffff9af555e9b000\n kernel: RBP: ffff9af52ee66b00 R08: 0000000000000040 R09: 0000000000370004\n kernel: R10: ffffbe9960fcbd48 R11: 0000000000000040 R12: ffff9af555e9b000\n kernel: R13: ffffffffa66b86c0 R14: ffff9af507d2f400 R15: ffff9af507d2f400\n kernel: FS:  00007ffbc0ba4740(0000) GS:ffff9b0bd7000000(0000) knlGS:0000000000000000\n kernel: CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n kernel: CR2: 0000000000000028 CR3: 00000001b1ee0000 CR4: 00000000001506f0\n kernel: Call Trace:\n kernel:  \u003cTASK\u003e\n kernel:  ? __die_body+0x1a/0x60\n kernel:  ? page_fault_oops+0x16f/0x4a0\n kernel:  ? search_bpf_extables+0x65/0x70\n kernel:  ? fixup_exception+0x22/0x310\n kernel:  ? exc_page_fault+0x69/0x150\n kernel:  ? asm_exc_page_fault+0x22/0x30\n kernel:  ? __pfx_hugetlbfs_fill_super+0x10/0x10\n kernel:  ? hugetlbfs_fill_super+0xb4/0x1a0\n kernel:  ? hugetlbfs_fill_super+0x28/0x1a0\n kernel:  ? __pfx_hugetlbfs_fill_super+0x10/0x10\n kernel:  vfs_get_super+0x40/0xa0\n kernel:  ? __pfx_bpf_lsm_capable+0x10/0x10\n kernel:  vfs_get_tree+0x25/0xd0\n kernel:  vfs_cmd_create+0x64/0xe0\n kernel:  __x64_sys_fsconfig+0x395/0x410\n kernel:  do_syscall_64+0x80/0x160\n kernel:  ? syscall_exit_to_user_mode+0x82/0x240\n kernel:  ? do_syscall_64+0x8d/0x160\n kernel:  ? syscall_exit_to_user_mode+0x82/0x240\n kernel:  ? do_syscall_64+0x8d/0x160\n kernel:  ? exc_page_fault+0x69/0x150\n kernel:  entry_SYSCALL_64_after_hwframe+0x6e/0x76\n kernel: RIP: 0033:0x7ffbc0cb87c9\n kernel: Code: 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 \u003c48\u003e 3d 01 f0 ff ff 73 01 c3 48 8b 0d 97 96 0d 00 f7 d8 64 89 01 48\n kernel: RSP: 002b:00007ffc29d2f388 EFLAGS: 00000206 ORIG_RAX: 00000000000001af\n kernel: RAX: fffffffffff\n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.169.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.169.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.169.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.169.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26688",
          "url": "https://www.suse.com/security/cve/CVE-2024-26688"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222482 for CVE-2024-26688",
          "url": "https://bugzilla.suse.com/1222482"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.169.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.169.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.169.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.169.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:30:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26688"
    },
    {
      "cve": "CVE-2024-26689",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26689"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nceph: prevent use-after-free in encode_cap_msg()\n\nIn fs/ceph/caps.c, in encode_cap_msg(), \"use after free\" error was\ncaught by KASAN at this line - \u0027ceph_buffer_get(arg-\u003exattr_buf);\u0027. This\nimplies before the refcount could be increment here, it was freed.\n\nIn same file, in \"handle_cap_grant()\" refcount is decremented by this\nline - \u0027ceph_buffer_put(ci-\u003ei_xattrs.blob);\u0027. It appears that a race\noccurred and resource was freed by the latter line before the former\nline could increment it.\n\nencode_cap_msg() is called by __send_cap() and __send_cap() is called by\nceph_check_caps() after calling __prep_cap(). __prep_cap() is where\narg-\u003exattr_buf is assigned to ci-\u003ei_xattrs.blob. This is the spot where\nthe refcount must be increased to prevent \"use after free\" error.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.169.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.169.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.169.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.169.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26689",
          "url": "https://www.suse.com/security/cve/CVE-2024-26689"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222503 for CVE-2024-26689",
          "url": "https://bugzilla.suse.com/1222503"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.169.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.169.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.169.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.169.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:30:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26689"
    },
    {
      "cve": "CVE-2024-26739",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26739"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: act_mirred: don\u0027t override retval if we already lost the skb\n\nIf we\u0027re redirecting the skb, and haven\u0027t called tcf_mirred_forward(),\nyet, we need to tell the core to drop the skb by setting the retcode\nto SHOT. If we have called tcf_mirred_forward(), however, the skb\nis out of our hands and returning SHOT will lead to UaF.\n\nMove the retval override to the error path which actually need it.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.169.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.169.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.169.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.169.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26739",
          "url": "https://www.suse.com/security/cve/CVE-2024-26739"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222559 for CVE-2024-26739",
          "url": "https://bugzilla.suse.com/1222559"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.169.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.169.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.169.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.169.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:30:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26739"
    },
    {
      "cve": "CVE-2024-26744",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26744"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/srpt: Support specifying the srpt_service_guid parameter\n\nMake loading ib_srpt with this parameter set work. The current behavior is\nthat setting that parameter while loading the ib_srpt kernel module\ntriggers the following kernel crash:\n\nBUG: kernel NULL pointer dereference, address: 0000000000000000\nCall Trace:\n \u003cTASK\u003e\n parse_one+0x18c/0x1d0\n parse_args+0xe1/0x230\n load_module+0x8de/0xa60\n init_module_from_file+0x8b/0xd0\n idempotent_init_module+0x181/0x240\n __x64_sys_finit_module+0x5a/0xb0\n do_syscall_64+0x5f/0xe0\n entry_SYSCALL_64_after_hwframe+0x6e/0x76",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.169.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.169.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.169.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.169.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26744",
          "url": "https://www.suse.com/security/cve/CVE-2024-26744"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222449 for CVE-2024-26744",
          "url": "https://bugzilla.suse.com/1222449"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.169.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.169.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.169.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.169.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:30:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26744"
    },
    {
      "cve": "CVE-2024-26816",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26816"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nx86, relocs: Ignore relocations in .notes section\n\nWhen building with CONFIG_XEN_PV=y, .text symbols are emitted into\nthe .notes section so that Xen can find the \"startup_xen\" entry point.\nThis information is used prior to booting the kernel, so relocations\nare not useful. In fact, performing relocations against the .notes\nsection means that the KASLR base is exposed since /sys/kernel/notes\nis world-readable.\n\nTo avoid leaking the KASLR base without breaking unprivileged tools that\nare expecting to read /sys/kernel/notes, skip performing relocations in\nthe .notes section. The values readable in .notes are then identical to\nthose found in System.map.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.169.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.169.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.169.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.169.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26816",
          "url": "https://www.suse.com/security/cve/CVE-2024-26816"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222624 for CVE-2024-26816",
          "url": "https://bugzilla.suse.com/1222624"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.169.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.169.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.169.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.169.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:30:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26816"
    },
    {
      "cve": "CVE-2024-26840",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26840"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncachefiles: fix memory leak in cachefiles_add_cache()\n\nThe following memory leak was reported after unbinding /dev/cachefiles:\n\n==================================================================\nunreferenced object 0xffff9b674176e3c0 (size 192):\n  comm \"cachefilesd2\", pid 680, jiffies 4294881224\n  hex dump (first 32 bytes):\n    01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................\n    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................\n  backtrace (crc ea38a44b):\n    [\u003cffffffff8eb8a1a5\u003e] kmem_cache_alloc+0x2d5/0x370\n    [\u003cffffffff8e917f86\u003e] prepare_creds+0x26/0x2e0\n    [\u003cffffffffc002eeef\u003e] cachefiles_determine_cache_security+0x1f/0x120\n    [\u003cffffffffc00243ec\u003e] cachefiles_add_cache+0x13c/0x3a0\n    [\u003cffffffffc0025216\u003e] cachefiles_daemon_write+0x146/0x1c0\n    [\u003cffffffff8ebc4a3b\u003e] vfs_write+0xcb/0x520\n    [\u003cffffffff8ebc5069\u003e] ksys_write+0x69/0xf0\n    [\u003cffffffff8f6d4662\u003e] do_syscall_64+0x72/0x140\n    [\u003cffffffff8f8000aa\u003e] entry_SYSCALL_64_after_hwframe+0x6e/0x76\n==================================================================\n\nPut the reference count of cache_cred in cachefiles_daemon_unbind() to\nfix the problem. And also put cache_cred in cachefiles_add_cache() error\nbranch to avoid memory leaks.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.169.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.169.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.169.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.169.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26840",
          "url": "https://www.suse.com/security/cve/CVE-2024-26840"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222976 for CVE-2024-26840",
          "url": "https://bugzilla.suse.com/1222976"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.169.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.169.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.169.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.169.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:30:22Z",
          "details": "low"
        }
      ],
      "title": "CVE-2024-26840"
    },
    {
      "cve": "CVE-2024-26852",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26852"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/ipv6: avoid possible UAF in ip6_route_mpath_notify()\n\nsyzbot found another use-after-free in ip6_route_mpath_notify() [1]\n\nCommit f7225172f25a (\"net/ipv6: prevent use after free in\nip6_route_mpath_notify\") was not able to fix the root cause.\n\nWe need to defer the fib6_info_release() calls after\nip6_route_mpath_notify(), in the cleanup phase.\n\n[1]\nBUG: KASAN: slab-use-after-free in rt6_fill_node+0x1460/0x1ac0\nRead of size 4 at addr ffff88809a07fc64 by task syz-executor.2/23037\n\nCPU: 0 PID: 23037 Comm: syz-executor.2 Not tainted 6.8.0-rc4-syzkaller-01035-gea7f3cfaa588 #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024\nCall Trace:\n \u003cTASK\u003e\n  __dump_stack lib/dump_stack.c:88 [inline]\n  dump_stack_lvl+0x1e7/0x2e0 lib/dump_stack.c:106\n  print_address_description mm/kasan/report.c:377 [inline]\n  print_report+0x167/0x540 mm/kasan/report.c:488\n  kasan_report+0x142/0x180 mm/kasan/report.c:601\n rt6_fill_node+0x1460/0x1ac0\n  inet6_rt_notify+0x13b/0x290 net/ipv6/route.c:6184\n  ip6_route_mpath_notify net/ipv6/route.c:5198 [inline]\n  ip6_route_multipath_add net/ipv6/route.c:5404 [inline]\n  inet6_rtm_newroute+0x1d0f/0x2300 net/ipv6/route.c:5517\n  rtnetlink_rcv_msg+0x885/0x1040 net/core/rtnetlink.c:6597\n  netlink_rcv_skb+0x1e3/0x430 net/netlink/af_netlink.c:2543\n  netlink_unicast_kernel net/netlink/af_netlink.c:1341 [inline]\n  netlink_unicast+0x7ea/0x980 net/netlink/af_netlink.c:1367\n  netlink_sendmsg+0xa3b/0xd70 net/netlink/af_netlink.c:1908\n  sock_sendmsg_nosec net/socket.c:730 [inline]\n  __sock_sendmsg+0x221/0x270 net/socket.c:745\n  ____sys_sendmsg+0x525/0x7d0 net/socket.c:2584\n  ___sys_sendmsg net/socket.c:2638 [inline]\n  __sys_sendmsg+0x2b0/0x3a0 net/socket.c:2667\n do_syscall_64+0xf9/0x240\n entry_SYSCALL_64_after_hwframe+0x6f/0x77\nRIP: 0033:0x7f73dd87dda9\nCode: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 \u003c48\u003e 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48\nRSP: 002b:00007f73de6550c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e\nRAX: ffffffffffffffda RBX: 00007f73dd9ac050 RCX: 00007f73dd87dda9\nRDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000005\nRBP: 00007f73dd8ca47a R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000\nR13: 000000000000006e R14: 00007f73dd9ac050 R15: 00007ffdbdeb7858\n \u003c/TASK\u003e\n\nAllocated by task 23037:\n  kasan_save_stack mm/kasan/common.c:47 [inline]\n  kasan_save_track+0x3f/0x80 mm/kasan/common.c:68\n  poison_kmalloc_redzone mm/kasan/common.c:372 [inline]\n  __kasan_kmalloc+0x98/0xb0 mm/kasan/common.c:389\n  kasan_kmalloc include/linux/kasan.h:211 [inline]\n  __do_kmalloc_node mm/slub.c:3981 [inline]\n  __kmalloc+0x22e/0x490 mm/slub.c:3994\n  kmalloc include/linux/slab.h:594 [inline]\n  kzalloc include/linux/slab.h:711 [inline]\n  fib6_info_alloc+0x2e/0xf0 net/ipv6/ip6_fib.c:155\n  ip6_route_info_create+0x445/0x12b0 net/ipv6/route.c:3758\n  ip6_route_multipath_add net/ipv6/route.c:5298 [inline]\n  inet6_rtm_newroute+0x744/0x2300 net/ipv6/route.c:5517\n  rtnetlink_rcv_msg+0x885/0x1040 net/core/rtnetlink.c:6597\n  netlink_rcv_skb+0x1e3/0x430 net/netlink/af_netlink.c:2543\n  netlink_unicast_kernel net/netlink/af_netlink.c:1341 [inline]\n  netlink_unicast+0x7ea/0x980 net/netlink/af_netlink.c:1367\n  netlink_sendmsg+0xa3b/0xd70 net/netlink/af_netlink.c:1908\n  sock_sendmsg_nosec net/socket.c:730 [inline]\n  __sock_sendmsg+0x221/0x270 net/socket.c:745\n  ____sys_sendmsg+0x525/0x7d0 net/socket.c:2584\n  ___sys_sendmsg net/socket.c:2638 [inline]\n  __sys_sendmsg+0x2b0/0x3a0 net/socket.c:2667\n do_syscall_64+0xf9/0x240\n entry_SYSCALL_64_after_hwframe+0x6f/0x77\n\nFreed by task 16:\n  kasan_save_stack mm/kasan/common.c:47 [inline]\n  kasan_save_track+0x3f/0x80 mm/kasan/common.c:68\n  kasan_save_free_info+0x4e/0x60 mm/kasan/generic.c:640\n  poison_slab_object+0xa6/0xe0 m\n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.169.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.169.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.169.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.169.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26852",
          "url": "https://www.suse.com/security/cve/CVE-2024-26852"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223057 for CVE-2024-26852",
          "url": "https://bugzilla.suse.com/1223057"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223059 for CVE-2024-26852",
          "url": "https://bugzilla.suse.com/1223059"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.169.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.169.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.169.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.169.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:30:22Z",
          "details": "important"
        }
      ],
      "title": "CVE-2024-26852"
    },
    {
      "cve": "CVE-2024-26862",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26862"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\npacket: annotate data-races around ignore_outgoing\n\nignore_outgoing is read locklessly from dev_queue_xmit_nit()\nand packet_getsockopt()\n\nAdd appropriate READ_ONCE()/WRITE_ONCE() annotations.\n\nsyzbot reported:\n\nBUG: KCSAN: data-race in dev_queue_xmit_nit / packet_setsockopt\n\nwrite to 0xffff888107804542 of 1 bytes by task 22618 on cpu 0:\n packet_setsockopt+0xd83/0xfd0 net/packet/af_packet.c:4003\n do_sock_setsockopt net/socket.c:2311 [inline]\n __sys_setsockopt+0x1d8/0x250 net/socket.c:2334\n __do_sys_setsockopt net/socket.c:2343 [inline]\n __se_sys_setsockopt net/socket.c:2340 [inline]\n __x64_sys_setsockopt+0x66/0x80 net/socket.c:2340\n do_syscall_64+0xd3/0x1d0\n entry_SYSCALL_64_after_hwframe+0x6d/0x75\n\nread to 0xffff888107804542 of 1 bytes by task 27 on cpu 1:\n dev_queue_xmit_nit+0x82/0x620 net/core/dev.c:2248\n xmit_one net/core/dev.c:3527 [inline]\n dev_hard_start_xmit+0xcc/0x3f0 net/core/dev.c:3547\n __dev_queue_xmit+0xf24/0x1dd0 net/core/dev.c:4335\n dev_queue_xmit include/linux/netdevice.h:3091 [inline]\n batadv_send_skb_packet+0x264/0x300 net/batman-adv/send.c:108\n batadv_send_broadcast_skb+0x24/0x30 net/batman-adv/send.c:127\n batadv_iv_ogm_send_to_if net/batman-adv/bat_iv_ogm.c:392 [inline]\n batadv_iv_ogm_emit net/batman-adv/bat_iv_ogm.c:420 [inline]\n batadv_iv_send_outstanding_bat_ogm_packet+0x3f0/0x4b0 net/batman-adv/bat_iv_ogm.c:1700\n process_one_work kernel/workqueue.c:3254 [inline]\n process_scheduled_works+0x465/0x990 kernel/workqueue.c:3335\n worker_thread+0x526/0x730 kernel/workqueue.c:3416\n kthread+0x1d1/0x210 kernel/kthread.c:388\n ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147\n ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:243\n\nvalue changed: 0x00 -\u003e 0x01\n\nReported by Kernel Concurrency Sanitizer on:\nCPU: 1 PID: 27 Comm: kworker/u8:1 Tainted: G        W          6.8.0-syzkaller-08073-g480e035fc4c7 #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/29/2024\nWorkqueue: bat_events batadv_iv_send_outstanding_bat_ogm_packet",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.169.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.169.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.169.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.169.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26862",
          "url": "https://www.suse.com/security/cve/CVE-2024-26862"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223111 for CVE-2024-26862",
          "url": "https://bugzilla.suse.com/1223111"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.169.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.169.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.169.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.169.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:30:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26862"
    },
    {
      "cve": "CVE-2024-26898",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26898"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\naoe: fix the potential use-after-free problem in aoecmd_cfg_pkts\n\nThis patch is against CVE-2023-6270. The description of cve is:\n\n  A flaw was found in the ATA over Ethernet (AoE) driver in the Linux\n  kernel. The aoecmd_cfg_pkts() function improperly updates the refcnt on\n  `struct net_device`, and a use-after-free can be triggered by racing\n  between the free on the struct and the access through the `skbtxq`\n  global queue. This could lead to a denial of service condition or\n  potential code execution.\n\nIn aoecmd_cfg_pkts(), it always calls dev_put(ifp) when skb initial\ncode is finished. But the net_device ifp will still be used in\nlater tx()-\u003edev_queue_xmit() in kthread. Which means that the\ndev_put(ifp) should NOT be called in the success path of skb\ninitial code in aoecmd_cfg_pkts(). Otherwise tx() may run into\nuse-after-free because the net_device is freed.\n\nThis patch removed the dev_put(ifp) in the success path in\naoecmd_cfg_pkts(), and added dev_put() after skb xmit in tx().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.169.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.169.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.169.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.169.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26898",
          "url": "https://www.suse.com/security/cve/CVE-2024-26898"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1218562 for CVE-2024-26898",
          "url": "https://bugzilla.suse.com/1218562"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223016 for CVE-2024-26898",
          "url": "https://bugzilla.suse.com/1223016"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223017 for CVE-2024-26898",
          "url": "https://bugzilla.suse.com/1223017"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.169.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.169.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.169.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.169.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:30:22Z",
          "details": "important"
        }
      ],
      "title": "CVE-2024-26898"
    },
    {
      "cve": "CVE-2024-26903",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26903"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security\n\nDuring our fuzz testing of the connection and disconnection process at the\nRFCOMM layer, we discovered this bug. By comparing the packets from a\nnormal connection and disconnection process with the testcase that\ntriggered a KASAN report. We analyzed the cause of this bug as follows:\n\n1. In the packets captured during a normal connection, the host sends a\n`Read Encryption Key Size` type of `HCI_CMD` packet\n(Command Opcode: 0x1408) to the controller to inquire the length of\nencryption key.After receiving this packet, the controller immediately\nreplies with a Command Completepacket (Event Code: 0x0e) to return the\nEncryption Key Size.\n\n2. In our fuzz test case, the timing of the controller\u0027s response to this\npacket was delayed to an unexpected point: after the RFCOMM and L2CAP\nlayers had disconnected but before the HCI layer had disconnected.\n\n3. After receiving the Encryption Key Size Response at the time described\nin point 2, the host still called the rfcomm_check_security function.\nHowever, by this time `struct l2cap_conn *conn = l2cap_pi(sk)-\u003echan-\u003econn;`\nhad already been released, and when the function executed\n`return hci_conn_security(conn-\u003ehcon, d-\u003esec_level, auth_type, d-\u003eout);`,\nspecifically when accessing `conn-\u003ehcon`, a null-ptr-deref error occurred.\n\nTo fix this bug, check if `sk-\u003esk_state` is BT_CLOSED before calling\nrfcomm_recv_frame in rfcomm_process_rx.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.169.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.169.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.169.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.169.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26903",
          "url": "https://www.suse.com/security/cve/CVE-2024-26903"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223187 for CVE-2024-26903",
          "url": "https://bugzilla.suse.com/1223187"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.169.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.169.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.169.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.169.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:30:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26903"
    },
    {
      "cve": "CVE-2024-26906",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26906"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nx86/mm: Disallow vsyscall page read for copy_from_kernel_nofault()\n\nWhen trying to use copy_from_kernel_nofault() to read vsyscall page\nthrough a bpf program, the following oops was reported:\n\n  BUG: unable to handle page fault for address: ffffffffff600000\n  #PF: supervisor read access in kernel mode\n  #PF: error_code(0x0000) - not-present page\n  PGD 3231067 P4D 3231067 PUD 3233067 PMD 3235067 PTE 0\n  Oops: 0000 [#1] PREEMPT SMP PTI\n  CPU: 1 PID: 20390 Comm: test_progs ...... 6.7.0+ #58\n  Hardware name: QEMU Standard PC (i440FX + PIIX, 1996) ......\n  RIP: 0010:copy_from_kernel_nofault+0x6f/0x110\n  ......\n  Call Trace:\n   \u003cTASK\u003e\n   ? copy_from_kernel_nofault+0x6f/0x110\n   bpf_probe_read_kernel+0x1d/0x50\n   bpf_prog_2061065e56845f08_do_probe_read+0x51/0x8d\n   trace_call_bpf+0xc5/0x1c0\n   perf_call_bpf_enter.isra.0+0x69/0xb0\n   perf_syscall_enter+0x13e/0x200\n   syscall_trace_enter+0x188/0x1c0\n   do_syscall_64+0xb5/0xe0\n   entry_SYSCALL_64_after_hwframe+0x6e/0x76\n   \u003c/TASK\u003e\n  ......\n  ---[ end trace 0000000000000000 ]---\n\nThe oops is triggered when:\n\n1) A bpf program uses bpf_probe_read_kernel() to read from the vsyscall\npage and invokes copy_from_kernel_nofault() which in turn calls\n__get_user_asm().\n\n2) Because the vsyscall page address is not readable from kernel space,\na page fault exception is triggered accordingly.\n\n3) handle_page_fault() considers the vsyscall page address as a user\nspace address instead of a kernel space address. This results in the\nfix-up setup by bpf not being applied and a page_fault_oops() is invoked\ndue to SMAP.\n\nConsidering handle_page_fault() has already considered the vsyscall page\naddress as a userspace address, fix the problem by disallowing vsyscall\npage read for copy_from_kernel_nofault().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.169.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.169.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.169.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.169.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26906",
          "url": "https://www.suse.com/security/cve/CVE-2024-26906"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223202 for CVE-2024-26906",
          "url": "https://bugzilla.suse.com/1223202"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.169.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.169.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.169.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.169.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:30:22Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26906"
    },
    {
      "cve": "CVE-2024-27043",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-27043"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: edia: dvbdev: fix a use-after-free\n\nIn dvb_register_device, *pdvbdev is set equal to dvbdev, which is freed\nin several error-handling paths. However, *pdvbdev is not set to NULL\nafter dvbdev\u0027s deallocation, causing use-after-frees in many places,\nfor example, in the following call chain:\n\nbudget_register\n  |-\u003e dvb_dmxdev_init\n        |-\u003e dvb_register_device\n  |-\u003e dvb_dmxdev_release\n        |-\u003e dvb_unregister_device\n              |-\u003e dvb_remove_device\n                    |-\u003e dvb_device_put\n                          |-\u003e kref_put\n\nWhen calling dvb_unregister_device, dmxdev-\u003edvbdev (i.e. *pdvbdev in\ndvb_register_device) could point to memory that had been freed in\ndvb_register_device. Thereafter, this pointer is transferred to\nkref_put and triggering a use-after-free.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.169.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.169.1.noarch",
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.169.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.169.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-27043",
          "url": "https://www.suse.com/security/cve/CVE-2024-27043"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1218562 for CVE-2024-27043",
          "url": "https://bugzilla.suse.com/1218562"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223824 for CVE-2024-27043",
          "url": "https://bugzilla.suse.com/1223824"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1223825 for CVE-2024-27043",
          "url": "https://bugzilla.suse.com/1223825"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.169.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.169.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.169.1.noarch",
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.169.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.169.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-05-14T14:30:22Z",
          "details": "important"
        }
      ],
      "title": "CVE-2024-27043"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…