File _patchinfo of Package patchinfo.37471
<patchinfo incident="37471">
<issue id="1194869" tracker="bnc">[TRACKERBUG] 5.14 powerpc base kernel fixes</issue>
<issue id="1216813" tracker="bnc">'unregister_netdevice: waiting for lo to become free. Usage count = 2' on busy container hosts [ref:_00D1igLOd._5005qYD2yg:ref]</issue>
<issue id="1223384" tracker="bnc">VUL-0: CVE-2024-26923: kernel: af_unix: fix garbage collector racing against connect()</issue>
<issue id="1225736" tracker="bnc">VUL-0: CVE-2024-36898: kernel: gpiolib: cdev: fix uninitialised kfifo</issue>
<issue id="1226848" tracker="bnc">VUL-0: CVE-2024-38599: kernel: jffs2: prevent xattr node from overflowing the eraseblock</issue>
<issue id="1226980" tracker="bnc">HST:SVT1060:Rain:Virt:Seeing HTX TCP connection errors during LPM on SLESS15.5</issue>
<issue id="1228537" tracker="bnc">VUL-0: CVE-2024-41047: kernel: i40e: Fix XDP program unloading while removing the driver</issue>
<issue id="1228592" tracker="bnc">L3: Kernel crash with ceph client function ceph_read_iter [ref:_00D1igLOd._500TrEkpYw:ref]</issue>
<issue id="1230341" tracker="bnc">VUL-0: CVE-2024-26758: kernel: md: Don't ignore suspended array in md_check_recovery()</issue>
<issue id="1230432" tracker="bnc">VUL-0: CVE-2024-45019: kernel: net/mlx5e: Take state lock during tx timeout reporter</issue>
<issue id="1230527" tracker="bnc">VUL-0: CVE-2024-26943: kernel: nouveau/dmem: handle kcalloc() allocation failure</issue>
<issue id="1230697" tracker="bnc">VUL-0: CVE-2024-8805: kernel: BlueZ HID over GATT Profile Improper Access Control Remote Code Execution Vulnerability</issue>
<issue id="1231088" tracker="bnc">VUL-0: CVE-2024-46858: kernel: mptcp: pm: Fix uaf in __timer_delete_sync</issue>
<issue id="1231847" tracker="bnc">L3: performance degradation after kernel update from 5.3.18-150300.59.167 to 5.3.18-150300.59.170 - ref:_00D1igLOd._500TrKqPID:ref</issue>
<issue id="1232914" tracker="bnc">VUL-0: CVE-2024-50136: kernel: net/mlx5: Unregister notifier on eswitch init failure</issue>
<issue id="1233028" tracker="bnc">VUL-0: CVE-2024-50142: kernel: xfrm: validate new SA's prefixlen using SA family when sel.family is unset</issue>
<issue id="1233055" tracker="bnc">VUL-0: CVE-2024-50151: kernel: smb: client: fix OOBs when building SMB2_IOCTL request</issue>
<issue id="1233097" tracker="bnc">VUL-0: CVE-2024-50210: kernel: posix-clock: posix-clock: Fix unbalanced locking in pc_clock_settime()</issue>
<issue id="1233103" tracker="bnc">VUL-0: CVE-2024-50195: kernel: posix-clock: Fix missing timespec64 check in pc_clock_settime()</issue>
<issue id="1233112" tracker="bnc">VUL-0: CVE-2024-50199: kernel: mm/swapfile: skip HugeTLB pages for unuse_vma</issue>
<issue id="1233464" tracker="bnc">VUL-0: CVE-2024-50275: kernel: arm64/sve: Discard stale CPU state when handling SVE traps</issue>
<issue id="1233488" tracker="bnc">VUL-0: CVE-2024-50299: kernel: sctp: properly validate chunk size in sctp_sf_ootb()</issue>
<issue id="1233642" tracker="bnc">VUL-0: CVE-2024-53095: kernel: smb: client: Fix use-after-free of network namespace.</issue>
<issue id="1233778" tracker="bnc">VUL-0: kernel: nf_tables: lack of proper validation of user-supplied data within the handling of packet filtering tables (ZDI-24-1454)</issue>
<issue id="1234024" tracker="bnc">VUL-0: CVE-2024-53103: kernel: hv_sock: Initializing vsk->trans to NULL to prevent a dangling pointer</issue>
<issue id="1234025" tracker="bnc">VUL-0: CVE-2024-53104: kernel: media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format</issue>
<issue id="1234078" tracker="bnc">VUL-0: CVE-2024-53121: kernel: net/mlx5: fs, lock FTE when checking if active</issue>
<issue id="1234087" tracker="bnc">VUL-0: CVE-2024-53112: kernel: ocfs2: uncache inode which has failed entering the group</issue>
<issue id="1234153" tracker="bnc">VUL-0: CVE-2024-53127: kernel: Revert "mmc: dw_mmc: Fix IDMAC operation with pages bigger than 4K"</issue>
<issue id="1234155" tracker="bnc">VUL-0: CVE-2024-53129: kernel: drm/rockchip: vop: Fix a dereferenced before check warning</issue>
<issue id="1234223" tracker="bnc">VUL-0: CVE-2024-53138: kernel: net/mlx5e: kTLS, Fix incorrect page refcounting</issue>
<issue id="1234381" tracker="bnc">VUL-0: CVE-2024-53141: kernel: netfilter: ipset: add missing range check in bitmap_ip_uadt</issue>
<issue id="1234683" tracker="bnc">L3: Azure - RCA for kernel message - BUG: workqueue lockup - SFSC 01562800 - ref:_00D1igLOd._500TrObEsc:ref</issue>
<issue id="1234690" tracker="bnc">VUL-0: CVE-2024-53144: kernel: Bluetooth: hci_event: Align BR/EDR JUST_WORKS paring with LE</issue>
<issue id="1234825" tracker="bnc">ISST-LTE:P10:redlp95: lpar crashed during LPM at NIP [c0000000004f2eb0] unmap_page_range+0x290/0x5b0</issue>
<issue id="1234829" tracker="bnc">VUL-0: CVE-2024-53151: kernel: svcrdma: address an integer overflow</issue>
<issue id="1234832" tracker="bnc">VUL-0: CVE-2024-53148: kernel: comedi: flush partial mappings in error case</issue>
<issue id="1234884" tracker="bnc">VUL-0: CVE-2024-53166: kernel: block, bfq: fix bfqq uaf in bfq_limit_depth()</issue>
<issue id="1234889" tracker="bnc">VUL-0: CVE-2024-53171: kernel: ubifs: authentication: Fix use-after-free in ubifs_tnc_end_commit</issue>
<issue id="1234896" tracker="bnc">VUL-0: CVE-2024-53177: kernel: smb: prevent use-after-free due to open_cached_dir error paths</issue>
<issue id="1234899" tracker="bnc">VUL-0: CVE-2024-53174: kernel: SUNRPC: make sure cache entry active before cache_show</issue>
<issue id="1234900" tracker="bnc">VUL-0: CVE-2024-53169: kernel: nvme-fabrics: fix kernel crash while shutting down controller</issue>
<issue id="1234905" tracker="bnc">VUL-0: CVE-2024-53229: kernel: RDMA/rxe: fix the qp flush warnings in req</issue>
<issue id="1234909" tracker="bnc">VUL-0: CVE-2024-53208: kernel: Bluetooth: MGMT: Fix slab-use-after-free Read in set_powered_sync</issue>
<issue id="1234916" tracker="bnc">VUL-0: CVE-2024-56567: kernel: ad7780: fix division by zero in ad7780_write_raw()</issue>
<issue id="1234918" tracker="bnc">VUL-0: CVE-2024-56754: kernel: crypto: caam - Fix the pointer passed to caam_qi_shutdown()</issue>
<issue id="1234922" tracker="bnc">VUL-0: CVE-2024-56756: kernel: nvme-pci: fix freeing of the HMB descriptor table</issue>
<issue id="1234930" tracker="bnc">VUL-0: CVE-2024-56562: kernel: i3c: master: fix miss free init_dyn_addr at i3c_master_put_i3c_addrs()</issue>
<issue id="1234931" tracker="bnc">VUL-0: CVE-2024-56661: kernel: tipc: fix NULL deref in cleanup_bearer()</issue>
<issue id="1234934" tracker="bnc">VUL-0: CVE-2024-56747: kernel: scsi: qedi: fix a possible memory leak in qedi_alloc_and_init_sb()</issue>
<issue id="1234962" tracker="bnc">VUL-0: CVE-2024-53215: kernel: svcrdma: fix miss destroy percpu_counter in svc_rdma_proc_init()</issue>
<issue id="1234999" tracker="bnc">VUL-0: CVE-2024-53217: kernel: NFSD: prevent NULL dereference in nfsd4_process_cb_update()</issue>
<issue id="1235002" tracker="bnc">VUL-0: CVE-2024-53209: kernel: bnxt_en: fix receive ring space parameters when XDP is active</issue>
<issue id="1235009" tracker="bnc">VUL-0: CVE-2024-53224: kernel: RDMA/mlx5: move events notifier registration to be after device registration</issue>
<issue id="1235011" tracker="bnc">VUL-0: CVE-2024-53227: kernel: scsi: bfa: fix use-after-free in bfad_im_module_exit()</issue>
<issue id="1235053" tracker="bnc">VUL-0: CVE-2024-56533: kernel: ALSA: usx2y: use snd_card_free_when_closed() at disconnection</issue>
<issue id="1235057" tracker="bnc">VUL-0: CVE-2024-56531: kernel: ALSA: caiaq: Use snd_card_free_when_closed() at disconnection</issue>
<issue id="1235059" tracker="bnc">VUL-0: CVE-2024-56532: kernel: ALSA: us122l: use snd_card_free_when_closed() at disconnection</issue>
<issue id="1235100" tracker="bnc">VUL-0: CVE-2024-56558: kernel: nfsd: make sure exp active before svc_export_show</issue>
<issue id="1235122" tracker="bnc">VUL-0: CVE-2024-56557: kernel: iio: adc: ad7923: Fix buffer overflow for tx_buf and ring_xfer</issue>
<issue id="1235123" tracker="bnc">VUL-0: CVE-2024-56588: kernel: scsi: hisi_sas: create all dump files during debugfs initialization</issue>
<issue id="1235133" tracker="bnc">VUL-0: CVE-2024-56644: kernel: net/ipv6: release expired exception dst cached in socket</issue>
<issue id="1235134" tracker="bnc">VUL-0: CVE-2024-56645: kernel: can: j1939: j1939_session_new(): fix skb reference counting</issue>
<issue id="1235217" tracker="bnc">VUL-0: CVE-2024-56600: kernel: net: inet6: do not leave a dangling sk pointer in inet6_create()</issue>
<issue id="1235222" tracker="bnc">VUL-0: CVE-2024-56597: kernel: jfs: fix shift-out-of-bounds in dbSplit</issue>
<issue id="1235230" tracker="bnc">VUL-0: CVE-2024-56601: kernel: net: inet: do not leave a dangling sk pointer in inet_create()</issue>
<issue id="1235249" tracker="bnc">VUL-0: CVE-2024-56664: kernel: bpf, sockmap: fix race between element replace and close()</issue>
<issue id="1235410" tracker="bnc">VUL-0: CVE-2024-56595: kernel: jfs: add a check to prevent array-index-out-of-bounds in dbAdjTree</issue>
<issue id="1235430" tracker="bnc">VUL-0: CVE-2024-56650: kernel: netfilter: x_tables: fix LED ID check in led_tg_check()</issue>
<issue id="1235433" tracker="bnc">VUL-0: CVE-2024-56642: kernel: tipc: fix use-after-free of kernel socket in cleanup_bearer().</issue>
<issue id="1235441" tracker="bnc">VUL-0: CVE-2024-56658: kernel: net: defer final 'struct net' free in netns dismantle</issue>
<issue id="1235451" tracker="bnc">VUL-0: CVE-2024-56648: kernel: net: hsr: avoid potential out-of-bound access in fill_frame_info()</issue>
<issue id="1235458" tracker="bnc">VUL-0: CVE-2024-56596: kernel: jfs: fix array-index-out-of-bounds in jfs_readdir</issue>
<issue id="1235466" tracker="bnc">VUL-0: CVE-2024-56623: kernel: scsi: qla2xxx: Fix use after free on unload</issue>
<issue id="1235473" tracker="bnc">VUL-0: CVE-2024-56629: kernel: HID: wacom: fix when get product name maybe null pointer</issue>
<issue id="1235480" tracker="bnc">VUL-0: CVE-2024-56631: kernel: scsi: sg: Fix slab-use-after-free read in sg_release()</issue>
<issue id="1235491" tracker="bnc">VUL-0: CVE-2024-56698: kernel: usb: dwc3: gadget: fix looping of queued SG entries</issue>
<issue id="1235495" tracker="bnc">VUL-0: CVE-2024-56678: kernel: powerpc/mm/fault: fix kfence page fault reporting</issue>
<issue id="1235496" tracker="bnc">VUL-0: CVE-2024-56701: kernel: powerpc/pseries: fix dtl_access_lock to be a rw_semaphore</issue>
<issue id="1235521" tracker="bnc">VUL-0: CVE-2024-56602: kernel: net: ieee802154: do not leave a dangling sk pointer in ieee802154_create()</issue>
<issue id="1235557" tracker="bnc">VUL-0: CVE-2024-56681: kernel: crypto: bcm - add error check in the ahash_hmac_init function</issue>
<issue id="1235563" tracker="bnc">VUL-0: CVE-2024-56745: kernel: PCI: Fix reset_method_store() memory leak</issue>
<issue id="1235570" tracker="bnc">VUL-0: CVE-2024-56722: kernel: RDMA/hns: Fix cpu stuck caused by printings during reset</issue>
<issue id="1235584" tracker="bnc">VUL-0: CVE-2024-56704: kernel: 9p/xen: fix release of IRQ</issue>
<issue id="1235611" tracker="bnc">VUL-0: CVE-2024-56739: kernel: rtc: check if __rtc_read_time was successful in rtc_timer_do_work()</issue>
<issue id="1235635" tracker="bnc">VUL-0: CVE-2024-56778: kernel: drm/sti: avoid potential dereference of error pointers in sti_hqvdp_atomic_check</issue>
<issue id="1235641" tracker="bnc">VUL-0: CVE-2024-56777: kernel: drm/sti: avoid potential dereference of error pointers in sti_gdp_atomic_check</issue>
<issue id="1235643" tracker="bnc">VUL-0: CVE-2024-56765: kernel: powerpc/pseries/vas: Add close() callback in vas_vm_ops struct</issue>
<issue id="1235645" tracker="bnc">VUL-0: CVE-2024-56759: kernel: btrfs: fix use-after-free when COWing tree bock and tracing is enabled</issue>
<issue id="1235647" tracker="bnc">VUL-0: CVE-2024-56776: kernel: drm/sti: avoid potential dereference of error pointers</issue>
<issue id="1235723" tracker="bnc">VUL-0: CVE-2024-54680: kernel: smb: client: fix TCP timers deadlock after rmmod</issue>
<issue id="1235739" tracker="bnc">VUL-0: CVE-2024-50051: kernel: spi: mpc52xx: Add cancel_work_sync before module remove</issue>
<issue id="1235747" tracker="bnc">VUL-0: CVE-2024-55916: kernel: Drivers: hv: util: avoid accessing a ringbuffer not initialized yet</issue>
<issue id="1235759" tracker="bnc">VUL-0: CVE-2024-57791: kernel: net/smc: check return value of sock_recvmsg when draining clc data</issue>
<issue id="1235764" tracker="bnc">VUL-0: CVE-2024-57792: kernel: power: supply: gpio-charger: fix set charge current limits</issue>
<issue id="1235768" tracker="bnc">VUL-0: CVE-2024-57793: kernel: virt: tdx-guest: just leak decrypted memory on unrecoverable errors</issue>
<issue id="1235806" tracker="bnc">VUL-0: CVE-2024-57876: kernel: drm/dp_mst: fix resetting msg rx state after topology removal</issue>
<issue id="1235812" tracker="bnc">VUL-0: CVE-2024-57850: kernel: jffs2: prevent rtime decompress memory corruption</issue>
<issue id="1235814" tracker="bnc">VUL-0: CVE-2024-57849: kernel: s390/cpum_sf: handle CPU hotplug remove during sampling</issue>
<issue id="1235818" tracker="bnc">VUL-0: CVE-2024-57798: kernel: drm/dp_mst: ensure mst_primary pointer is valid in drm_dp_mst_handle_up_req()</issue>
<issue id="1235842" tracker="bnc">VUL-0: CVE-2024-53690: kernel: nilfs2: prevent use of deleted inode</issue>
<issue id="1235920" tracker="bnc">VUL-0: CVE-2024-57893: kernel: ALSA: seq: oss: fix races at processing SysEx messages</issue>
<issue id="1235969" tracker="bnc">VUL-0: CVE-2024-57897: kernel: drm/amdkfd: Correct the migration DMA map direction</issue>
<issue id="1236628" tracker="bnc">Partner-L3: Crashes on SP4 through SP6 in idpf</issue>
<issue id="2024-26758" tracker="cve" />
<issue id="2024-26943" tracker="cve" />
<issue id="2024-36898" tracker="cve" />
<issue id="2024-38599" tracker="cve" />
<issue id="2024-41047" tracker="cve" />
<issue id="2024-45019" tracker="cve" />
<issue id="2024-46858" tracker="cve" />
<issue id="2024-50051" tracker="cve" />
<issue id="2024-50136" tracker="cve" />
<issue id="2024-50142" tracker="cve" />
<issue id="2024-50151" tracker="cve" />
<issue id="2024-50195" tracker="cve" />
<issue id="2024-50199" tracker="cve" />
<issue id="2024-50210" tracker="cve" />
<issue id="2024-50275" tracker="cve" />
<issue id="2024-50299" tracker="cve" />
<issue id="2024-53095" tracker="cve" />
<issue id="2024-53103" tracker="cve" />
<issue id="2024-53104" tracker="cve" />
<issue id="2024-53112" tracker="cve" />
<issue id="2024-53121" tracker="cve" />
<issue id="2024-53127" tracker="cve" />
<issue id="2024-53129" tracker="cve" />
<issue id="2024-53138" tracker="cve" />
<issue id="2024-53141" tracker="cve" />
<issue id="2024-53144" tracker="cve" />
<issue id="2024-53148" tracker="cve" />
<issue id="2024-53151" tracker="cve" />
<issue id="2024-53166" tracker="cve" />
<issue id="2024-53169" tracker="cve" />
<issue id="2024-53171" tracker="cve" />
<issue id="2024-53174" tracker="cve" />
<issue id="2024-53177" tracker="cve" />
<issue id="2024-53208" tracker="cve" />
<issue id="2024-53209" tracker="cve" />
<issue id="2024-53215" tracker="cve" />
<issue id="2024-53217" tracker="cve" />
<issue id="2024-53224" tracker="cve" />
<issue id="2024-53227" tracker="cve" />
<issue id="2024-53229" tracker="cve" />
<issue id="2024-53690" tracker="cve" />
<issue id="2024-54680" tracker="cve" />
<issue id="2024-55916" tracker="cve" />
<issue id="2024-56531" tracker="cve" />
<issue id="2024-56532" tracker="cve" />
<issue id="2024-56533" tracker="cve" />
<issue id="2024-56557" tracker="cve" />
<issue id="2024-56558" tracker="cve" />
<issue id="2024-56562" tracker="cve" />
<issue id="2024-56567" tracker="cve" />
<issue id="2024-56588" tracker="cve" />
<issue id="2024-56595" tracker="cve" />
<issue id="2024-56596" tracker="cve" />
<issue id="2024-56597" tracker="cve" />
<issue id="2024-56600" tracker="cve" />
<issue id="2024-56601" tracker="cve" />
<issue id="2024-56602" tracker="cve" />
<issue id="2024-56623" tracker="cve" />
<issue id="2024-56629" tracker="cve" />
<issue id="2024-56631" tracker="cve" />
<issue id="2024-56642" tracker="cve" />
<issue id="2024-56644" tracker="cve" />
<issue id="2024-56645" tracker="cve" />
<issue id="2024-56648" tracker="cve" />
<issue id="2024-56650" tracker="cve" />
<issue id="2024-56658" tracker="cve" />
<issue id="2024-56661" tracker="cve" />
<issue id="2024-56664" tracker="cve" />
<issue id="2024-56678" tracker="cve" />
<issue id="2024-56681" tracker="cve" />
<issue id="2024-56698" tracker="cve" />
<issue id="2024-56701" tracker="cve" />
<issue id="2024-56704" tracker="cve" />
<issue id="2024-56722" tracker="cve" />
<issue id="2024-56739" tracker="cve" />
<issue id="2024-56745" tracker="cve" />
<issue id="2024-56747" tracker="cve" />
<issue id="2024-56754" tracker="cve" />
<issue id="2024-56756" tracker="cve" />
<issue id="2024-56759" tracker="cve" />
<issue id="2024-56765" tracker="cve" />
<issue id="2024-56776" tracker="cve" />
<issue id="2024-56777" tracker="cve" />
<issue id="2024-56778" tracker="cve" />
<issue id="2024-57791" tracker="cve" />
<issue id="2024-57792" tracker="cve" />
<issue id="2024-57793" tracker="cve" />
<issue id="2024-57798" tracker="cve" />
<issue id="2024-57849" tracker="cve" />
<issue id="2024-57850" tracker="cve" />
<issue id="2024-57876" tracker="cve" />
<issue id="2024-57893" tracker="cve" />
<issue id="2024-57897" tracker="cve" />
<issue id="2024-8805" tracker="cve" />
<category>security</category>
<rating>important</rating>
<packager>Jeffreycheung</packager>
<reboot_needed/>
<description>
The SUSE Linux Enterprise 15 SP5 RT kernel was updated to receive various security bugfixes.
The following security bugs were fixed:
- CVE-2024-57897: drm/amdkfd: Correct the migration DMA map direction (bsc#1235969).
- CVE-2024-57893: ALSA: seq: oss: Fix races at processing SysEx messages (bsc#1235920).
- CVE-2024-57876: drm/dp_mst: Fix resetting msg rx state after topology removal (bsc#1235806).
- CVE-2024-57849: s390/cpum_sf: Handle CPU hotplug remove during sampling (bsc#1235814).
- CVE-2024-57798: drm/dp_mst: Ensure mst_primary pointer is valid in drm_dp_mst_handle_up_req() (bsc#1235818).
- CVE-2024-57793: virt: tdx-guest: Just leak decrypted memory on unrecoverable errors (bsc#1235768).
- CVE-2024-57792: power: supply: gpio-charger: Fix set charge current limits (bsc#1235764).
- CVE-2024-57791: net/smc: check return value of sock_recvmsg when draining clc data (bsc#1235759).
- CVE-2024-56759: btrfs: fix use-after-free when COWing tree bock and tracing is enabled (bsc#1235645).
- CVE-2024-56747: scsi: qedi: Fix a possible memory leak in qedi_alloc_and_init_sb() (bsc#1234934).
- CVE-2024-56704: 9p/xen: fix release of IRQ (bsc#1235584).
- CVE-2024-56664: bpf, sockmap: Fix race between element replace and close() (bsc#1235249).
- CVE-2024-56658: net: defer final 'struct net' free in netns dismantle (bsc#1235441).
- CVE-2024-56650: netfilter: x_tables: fix LED ID check in led_tg_check() (bsc#1235430).
- CVE-2024-56648: net: hsr: avoid potential out-of-bound access in fill_frame_info() (bsc#1235451).
- CVE-2024-56642: tipc: Fix use-after-free of kernel socket in cleanup_bearer() (bsc#1235433).
- CVE-2024-56631: scsi: sg: Fix slab-use-after-free read in sg_release() (bsc#1235480).
- CVE-2024-56623: scsi: qla2xxx: Fix use after free on unload (bsc#1235466).
- CVE-2024-56602: net: ieee802154: do not leave a dangling sk pointer in ieee802154_create() (bsc#1235521).
- CVE-2024-56601: net: inet: do not leave a dangling sk pointer in inet_create() (bsc#1235230).
- CVE-2024-56600: net: inet6: do not leave a dangling sk pointer in inet6_create() (bsc#1235217).
- CVE-2024-56588: scsi: hisi_sas: Create all dump files during debugfs initialization (bsc#1235123).
- CVE-2024-53227: scsi: bfa: Fix use-after-free in bfad_im_module_exit() (bsc#1235011).
- CVE-2024-53209: bnxt_en: Fix receive ring space parameters when XDP is active (bsc#1235002).
- CVE-2024-53177: smb: prevent use-after-free due to open_cached_dir error paths (bsc#1234896).
- CVE-2024-53166: block, bfq: fix bfqq uaf in bfq_limit_depth() (bsc#1234884).
- CVE-2024-53141: netfilter: ipset: add missing range check in bitmap_ip_uadt (bsc#1234381).
- CVE-2024-53104: media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format (bsc#1234025).
- CVE-2024-50299: sctp: properly validate chunk size in sctp_sf_ootb() (bsc#1233488).
- CVE-2024-50199: mm/swapfile: skip HugeTLB pages for unuse_vma (bsc#1233112).
- CVE-2024-50151: smb: client: fix OOBs when building SMB2_IOCTL request (bsc#1233055).
- CVE-2024-50142: xfrm: validate new SA's prefixlen using SA family when sel.family is unset (bsc#1233028).
- CVE-2024-46858: mptcp: pm: Fix uaf in __timer_delete_sync (bsc#1231088).
- CVE-2024-36898: gpiolib: cdev: fix uninitialised kfifo (bsc#1225736).
The following non-security bugs were fixed:
- NFS: Adjust the amount of readahead performed by NFS readdir (bsc#1231847).
- NFS: Do not flush the readdir cache in nfs_dentry_iput() (bsc#1231847).
- NFS: Improve heuristic for readdirplus (bsc#1231847).
- NFS: Trigger the "ls -l" readdir heuristic sooner (bsc#1231847).
- VFS: use system_unbound_wq for delayed_mntput (bsc#1234683).
- ceph: improve error handling and short/overflow-read logic in __ceph_sync_read() (bsc#1228592).
- ibmvnic: Free any outstanding tx skbs during scrq reset (bsc#1226980).
- netfilter: nf_tables: validate family when identifying table via handle (bsc#1233778 ZDI-24-1454).
- powerpc/pseries/vas: Add close() callback in vas_vm_ops struct (bsc#1234825).
- tipc: fix NULL deref in cleanup_bearer() (bsc#1235433).
- x86/static-call: Remove early_boot_irqs_disabled check to fix Xen PVH dom0 (git-fixes).
</description>
<summary>Security update for the Linux Kernel</summary>
</patchinfo>