File _patchinfo of Package patchinfo.35900
<patchinfo incident="35900">
<issue id="1216223" tracker="bnc">L3: ibmvfc max_xfer_size is missing ref:_00D1igLOd._5005qXBPNc:ref</issue>
<issue id="1223600" tracker="bnc">L3: RT kernel - IRQ appears on isolated cores when it shouldn't appear based on the irqbalance and kernel args configuration</issue>
<issue id="1223958" tracker="bnc">L3: /dev/disk/by-path not populated for certain RAID controllers [ref:_00D1igLOd._500Tr9pGs4:ref]</issue>
<issue id="1225272" tracker="bnc">soft lockup on non-responding NFS server after blocking NFS port [ref:_00D1igLOd._500TrA9Uu1:ref]</issue>
<issue id="1227487" tracker="bnc">powerpc/rtas: Prevent Spectre v1 gadget construction in sys_rtas()</issue>
<issue id="1228466" tracker="bnc">VUL-0: CVE-2024-41087: kernel: ata: libata-core: Fix double free on error</issue>
<issue id="1229407" tracker="bnc">VUL-0: CVE-2024-42301: kernel: dev/parport: fix the array out-of-bounds risk</issue>
<issue id="1229633" tracker="bnc">VUL-0: CVE-2022-48911: kernel: netfilter: nf_queue: fix possible use-after-free</issue>
<issue id="1229662" tracker="bnc">VUL-0: CVE-2022-48923: kernel: btrfs: prevent copying too big compressed lzo segment</issue>
<issue id="1229947" tracker="bnc">VUL-0: CVE-2022-48944: kernel: sched: fix yet more sched_fork() races</issue>
<issue id="1230015" tracker="bnc">VUL-0: CVE-2024-44946: kernel: kcm: Serialise kcm_sendmsg() for the same socket.</issue>
<issue id="1230398" tracker="bnc">VUL-0: CVE-2022-48945: kernel: v4l: vivid: unpriviledged user can cause an unchecked pointer to the heap to be followed abusing V4L2_SEL_TGT_CROP</issue>
<issue id="1230434" tracker="bnc">VUL-0: CVE-2024-45021: kernel: memcg_write_event_control(): fix a user-triggerable oops</issue>
<issue id="1230507" tracker="bnc">VUL-0: CVE-2024-46674: kernel: usb: dwc3: st: fix probed platform device ref count on probe error path</issue>
<issue id="1230767" tracker="bnc">VUL-0: CVE-2024-46774: kernel: powerpc/rtas: Prevent Spectre v1 gadget construction in sys_rtas()</issue>
<issue id="1231016" tracker="bnc">L3: Intermittent nfs mount failures (may be due to SUNRPC over UDP)</issue>
<issue id="2022-48945" tracker="cve" />
<issue id="2024-46774" tracker="cve" />
<issue id="2022-48944" tracker="cve" />
<issue id="2024-46674" tracker="cve" />
<issue id="2022-48911" tracker="cve" />
<issue id="2022-48923" tracker="cve" />
<issue id="2024-42301" tracker="cve" />
<issue id="2024-44946" tracker="cve" />
<issue id="2024-45021" tracker="cve" />
<issue id="2024-41087" tracker="cve" />
<category>security</category>
<rating>important</rating>
<packager>alix82</packager>
<reboot_needed/>
<description>
The SUSE Linux Enterprise 15 SP4 kernel was updated to receive various security bugfixes.
The following security bugs were fixed:
- CVE-2022-48911: kabi: add __nf_queue_get_refs() for kabi compliance. (bsc#1229633).
- CVE-2022-48923: btrfs: prevent copying too big compressed lzo segment (bsc#1229662)
- CVE-2024-41087: Fix double free on error (bsc#1228466).
- CVE-2024-42301: Fix the array out-of-bounds risk (bsc#1229407).
- CVE-2024-44946: kcm: Serialise kcm_sendmsg() for the same socket (bsc#1230015).
- CVE-2024-45021: memcg_write_event_control(): fix a user-triggerable oops (bsc#1230434).
- CVE-2024-46674: usb: dwc3: st: fix probed platform device ref count on probe error path (bsc#1230507).
The following non-security bugs were fixed:
- blk-mq: add helper for checking if one CPU is mapped to specified hctx (bsc#1223600).
- blk-mq: do not schedule block kworker on isolated CPUs (bsc#1223600).
- kabi: add __nf_queue_get_refs() for kabi compliance.
- scsi: ibmvfc: Add max_sectors module parameter (bsc#1216223).
- scsi: smartpqi: Expose SAS address for SATA drives (bsc#1223958).
- SUNRPC: avoid soft lockup when transmitting UDP to reachable server (bsc#1225272 bsc#1231016).
</description>
<summary>Security update for the Linux Kernel</summary>
</patchinfo>