File _patchinfo of Package patchinfo.34159

<patchinfo incident="34159">
  <issue id="1065729" tracker="bnc">[trackerbug] 4.12 powerpc base kernel fixes</issue>
  <issue id="1151927" tracker="bnc">Continuous stable update tracker for SLE15-SP2</issue>
  <issue id="1154353" tracker="bnc">Update skb/net-sched kernel API</issue>
  <issue id="1156395" tracker="bnc">[TRACKERBUG] 5.3 powerpc base kernel fixes</issue>
  <issue id="1174585" tracker="bnc">kernel lock up on IBS worker with 15-SP2</issue>
  <issue id="1176869" tracker="bnc">SLES 12 SP4 - Tainted Kernel - rpadlpar_io lacking DESCRIPTION</issue>
  <issue id="1184631" tracker="bnc">bcache kernel BUG at ../drivers/md/bcache/bset.c:884</issue>
  <issue id="1185589" tracker="bnc">NFC driver on HP Comet Lake system does not load</issue>
  <issue id="1185902" tracker="bnc">System crash in refresh_cache_worker() due to CIFS server being freed.</issue>
  <issue id="1188616" tracker="bnc">Pull the latest changes submitted to libfc.</issue>
  <issue id="1188772" tracker="bnc">kvm: LAPIC: Restore guard to prevent illegal APIC register access</issue>
  <issue id="1189883" tracker="bnc">VUL-0: CVE-2021-3743: kernel-source-azure,kernel-source,kernel-source-rt: out-of-bound Read in qrtr_endpoint_post in net/qrtr/qrtr.c</issue>
  <issue id="1190795" tracker="bnc">ocfs2: part of the file is zeroed out upon write</issue>
  <issue id="1191452" tracker="bnc">[PATCH] blktrace: Fix uaf in blk_trace access after removing by sysfs</issue>
  <issue id="1192107" tracker="bnc">VUL-0: CVE-2021-43056: kernel-source: powerpc: KVM guest can trigger host crash on Power8</issue>
  <issue id="1194288" tracker="bnc">[EAR - NOT FOR USA Citizens] PTF request for libfreebl3 to fix CVE-2021-43527 on sles12-sp2-ltss on x86_64 flavor ref:_00D1igLOd._5001io9v9G:ref</issue>
  <issue id="1196956" tracker="bnc">VUL-0: CVE-2021-39698:  kernel-source-rt,kernel-source-azure,kernel-source: use-after-free due to missing POLLFREE handling in aio</issue>
  <issue id="1200619" tracker="bnc">VUL-0: CVE-2022-20132: kernel-source-rt,kernel-source-azure,kernel-source: several potential out of bounds reads via malicious HID device</issue>
  <issue id="1208813" tracker="bnc">requesting fix "nfsd: fix use-after-free due to delegation race" for 15 SP2 ESPOS</issue>
  <issue id="1209657" tracker="bnc">VUL-0: CVE-2023-0160: kernel-source,kernel-source-azure,kernel-source-rt: possibility of deadlock in libbpf function sock_hash_delete_elem()</issue>
  <issue id="1210335" tracker="bnc">VUL-0: CVE-2023-1829: kernel: Linux kernel: Vulnerabilities in the tcindex classifier</issue>
  <issue id="1210629" tracker="bnc">VUL-0: CVE-2023-2176: kernel: Slab-out-of-bound read in compare_netdev_and_ip</issue>
  <issue id="1215356" tracker="bnc">After booting 'Call Trace' seen in journalctl output on AMD 7453 CPU</issue>
  <issue id="1215420" tracker="bnc">VUL-0: CVE-2023-4244: kernel-source-rt,kernel-source-azure,kernel-source: netfilter: nf_tables UAF</issue>
  <issue id="1216702" tracker="bnc">VUL-0: CVE-2023-47233: kernel: Use after Free bug in brcmf_cfg80211_detach</issue>
  <issue id="1217169" tracker="bnc">VUL-0: CVE-2023-52655: kernel: malicious USB device impersonating an aqc111 device can make the kernel overstep a buffer</issue>
  <issue id="1220137" tracker="bnc">VUL-0: CVE-2023-52433: kernel-source,kernel-source-azure,kernel-source-rt: in netfilter nft_set_rbtree skip sync GC for new elements in this transaction</issue>
  <issue id="1220144" tracker="bnc">VUL-0: CVE-2024-26581: kernel-source,kernel-source-azure,kernel-source-rt: nftables nft_set_rbtree skip end interval element from gc</issue>
  <issue id="1220754" tracker="bnc">VUL-0: CVE-2021-47040: kernel: io_uring: fix overflows checks in provide buffers</issue>
  <issue id="1220877" tracker="bnc">VUL-0: CVE-2023-52581: kernel: netfilter: nf_tables: fix memleak when more than 255 elements expired</issue>
  <issue id="1220960" tracker="bnc">VUL-0: CVE-2021-47104: kernel: IB/qib: Fix memory leak in qib_user_sdma_queue_pkts()</issue>
  <issue id="1221044" tracker="bnc">VUL-0: CVE-2023-52591: kernel: reiserfs: potential filesystem corruption on directory rename</issue>
  <issue id="1221829" tracker="bnc">VUL-0: CVE-2024-26643: kernel: netfilter: nf_tables: mark set as dead when unbinding anonymous set with timeout</issue>
  <issue id="1222251" tracker="bnc">L3: Btrfs balance failing, FS marked ROref:_00D1igLOd._500Tr80inh:ref</issue>
  <issue id="1222619" tracker="bnc">VUL-0: CVE-2023-52880: kernel: tty/n_gsm: 0day with exploit dropped on Github</issue>
  <issue id="1223084" tracker="bnc">VUL-0: CVE-2024-26828: kernel: cifs: underflow in parse_server_interfaces()</issue>
  <issue id="1223384" tracker="bnc">VUL-0: CVE-2024-26923: kernel: af_unix: fix garbage collector racing against connect()</issue>
  <issue id="1223390" tracker="bnc">VUL-0: CVE-2024-26925: kernel: netfilter: nf_tables: release mutex after nft_gc_seq_end from abort path</issue>
  <issue id="1223934" tracker="bnc">VUL-0: CVE-2022-48673: kernel: net/smc: Fix possible access to freed memory in link clear</issue>
  <issue id="1224099" tracker="bnc">VUL-0: CVE-2023-52654: kernel: io_uring/af_unix: disable sending io_uring over sockets</issue>
  <issue id="1224174" tracker="bnc">VUL-0: CVE-2024-27398: kernel: Bluetooth: fix use-after-free bugs caused by sco_sock_timeout</issue>
  <issue id="1224438" tracker="bnc">VUL-0: CVE-2024-27413: kernel: efi/capsule-loader: fix incorrect allocation size</issue>
  <issue id="1224482" tracker="bnc">VUL-0: CVE-2024-35914: kernel: nfsd: Fix error cleanup path in nfsd_rename()</issue>
  <issue id="1224511" tracker="bnc">VUL-0: CVE-2024-35895: kernel: bpf, sockmap: Prevent lock inversion deadlock in map delete elem</issue>
  <issue id="1224592" tracker="bnc">VUL-0: CVE-2024-35811: kernel: wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach</issue>
  <issue id="1224831" tracker="bnc">VUL-0: CVE-2021-47246: kernel: net/mlx5e: Fix page reclaim for dead peer hairpin</issue>
  <issue id="1224832" tracker="bnc">VUL-0: CVE-2021-47255: kernel: kvm: LAPIC: Restore guard to prevent illegal APIC register access</issue>
  <issue id="1224834" tracker="bnc">VUL-0: CVE-2021-47260: kernel: NFS: Fix a potential NULL dereference in nfs_get_client()</issue>
  <issue id="1224841" tracker="bnc">VUL-0: CVE-2021-47236: kernel: net: cdc_eem: fix tx fixup skb leak</issue>
  <issue id="1224843" tracker="bnc">VUL-0: CVE-2021-47240: kernel: net: qrtr: fix OOB Read in qrtr_endpoint_post</issue>
  <issue id="1224846" tracker="bnc">VUL-0: CVE-2021-47239: kernel: net: usb: fix possible use-after-free in smsc75xx_bind</issue>
  <issue id="1224849" tracker="bnc">VUL-0: CVE-2021-47231: kernel: can: mcba_usb: fix memory leak in mcba_usb</issue>
  <issue id="1224854" tracker="bnc">VUL-0: CVE-2021-47229: kernel: PCI: aardvark: Fix kernel panic during PIO transfer</issue>
  <issue id="1224859" tracker="bnc">VUL-0: CVE-2021-47220: kernel: usb: dwc3: core: fix kernel panic when do reboot</issue>
  <issue id="1224882" tracker="bnc">VUL-0: CVE-2021-47252: kernel: batman-adv: Avoid WARN_ON timing related checks</issue>
  <issue id="1224888" tracker="bnc">VUL-0: CVE-2021-47254: kernel: gfs2: Fix use-after-free in gfs2_glock_shrink_scan</issue>
  <issue id="1224889" tracker="bnc">VUL-0: CVE-2021-47288: kernel: media: ngene: Fix out-of-bounds bug in ngene_command_config_free_buf()</issue>
  <issue id="1224891" tracker="bnc">VUL-0: CVE-2021-47296: kernel: KVM: PPC: Fix kvm_arch_vcpu_ioctl vcpu_load leak</issue>
  <issue id="1224892" tracker="bnc">VUL-0: CVE-2021-47315: kernel: memory: fsl_ifc: fix leak of IO mapping on probe failure</issue>
  <issue id="1224893" tracker="bnc">VUL-0: CVE-2021-47314: kernel: memory: fsl_ifc: fix leak of private memory on probe failure</issue>
  <issue id="1224904" tracker="bnc">VUL-0: CVE-2021-47485: kernel: IB/qib: Protect from buffer overflow in struct qib_user_sdma_pkt fields</issue>
  <issue id="1224907" tracker="bnc">VUL-0: CVE-2021-47483: kernel: regmap: Fix possible double-free in regcache_rbtree_exit()</issue>
  <issue id="1224909" tracker="bnc">VUL-0: CVE-2021-47482: kernel: net: batman-adv: fix error handling</issue>
  <issue id="1224916" tracker="bnc">VUL-0: CVE-2021-47301: kernel: igb: Fix use-after-free error during reset</issue>
  <issue id="1224917" tracker="bnc">VUL-0: CVE-2021-47302: kernel: igc: Fix use-after-free error during reset</issue>
  <issue id="1224922" tracker="bnc">VUL-0: CVE-2021-47344: kernel: media: zr364xx: fix memory leak in zr364xx_start_readpipe</issue>
  <issue id="1224923" tracker="bnc">VUL-0: CVE-2021-47341: kernel: KVM: mmio: Fix use-after-free Read in kvm_vm_ioctl_unregister_coalesced_mmio</issue>
  <issue id="1224924" tracker="bnc">VUL-0: CVE-2021-47338: kernel: fbmem: Do not delete the mode that is still in use</issue>
  <issue id="1224928" tracker="bnc">VUL-0: CVE-2023-52840: kernel: Input: synaptics-rmi4 - fix use after free in rmi_unregister_function()</issue>
  <issue id="1224953" tracker="bnc">VUL-0: CVE-2021-47259: kernel: NFS: Fix use-after-free in nfs4_init_client()</issue>
  <issue id="1224954" tracker="bnc">VUL-0: CVE-2021-47261: kernel: IB/mlx5: Fix initializing CQ fragments buffer</issue>
  <issue id="1224961" tracker="bnc">VUL-0: CVE-2021-47307: kernel: cifs: prevent NULL deref in cifs_compose_mount_options()</issue>
  <issue id="1224963" tracker="bnc">VUL-0: CVE-2021-47308: kernel: scsi: libfc: Fix array index out of bound exception</issue>
  <issue id="1224965" tracker="bnc">VUL-0: CVE-2021-47275: kernel: bcache: avoid oversized read request in cache missing code path</issue>
  <issue id="1224966" tracker="bnc">VUL-0: CVE-2021-47276: kernel: ftrace: Do not blindly read the ip address in ftrace_bug()</issue>
  <issue id="1224968" tracker="bnc">VUL-0: CVE-2021-47305: kernel: dma-buf/sync_file: Don't leak fences on merge failure</issue>
  <issue id="1224981" tracker="bnc">VUL-0: CVE-2021-47285: kernel: net/nfc/rawsock.c: fix a permission check bug</issue>
  <issue id="1224982" tracker="bnc">VUL-0: CVE-2021-47280: kernel: drm: Fix use-after-free read in drm_getunique()</issue>
  <issue id="1224984" tracker="bnc">VUL-0: CVE-2021-47289: kernel: ACPI: fix NULL pointer dereference</issue>
  <issue id="1224987" tracker="bnc">VUL-0: CVE-2021-47284: kernel: isdn: mISDN: netjet: Fix crash in nj_probe:</issue>
  <issue id="1224990" tracker="bnc">VUL-0: CVE-2021-47274: kernel: tracing: Correct the length check which causes memory corruption</issue>
  <issue id="1224993" tracker="bnc">VUL-0: CVE-2021-47267: kernel: usb: fix various gadget panics on 10gbps cabling</issue>
  <issue id="1224996" tracker="bnc">VUL-0: CVE-2021-47269: kernel: usb: dwc3: ep0: fix NULL pointer exception</issue>
  <issue id="1224997" tracker="bnc">VUL-0: CVE-2021-47270: kernel: usb: fix various gadgets null ptr deref on 10gbps cabling.</issue>
  <issue id="1225026" tracker="bnc">VUL-0: CVE-2021-47323: kernel: watchdog: sc520_wdt: Fix possible use-after-free in wdt_turnoff()</issue>
  <issue id="1225030" tracker="bnc">VUL-0: CVE-2021-47324: kernel: watchdog: Fix possible use-after-free in wdt_startup()</issue>
  <issue id="1225058" tracker="bnc">VUL-0: CVE-2021-47320: kernel: nfs: fix acl memory leak of posix_acl_create()</issue>
  <issue id="1225060" tracker="bnc">VUL-0: CVE-2021-47321: kernel: watchdog: fix possible use-after-free by calling del_timer_sync()</issue>
  <issue id="1225084" tracker="bnc">VUL-0: CVE-2021-47330: kernel: tty: serial: 8250: serial_cs: Fix a memory leak in error handling path</issue>
  <issue id="1225091" tracker="bnc">VUL-0: CVE-2021-47332: kernel: ALSA: usx2y: Don't call free_pages_exact() with NULL address</issue>
  <issue id="1225112" tracker="bnc">VUL-0: CVE-2021-47334: kernel: misc/libmasm/module: fix two use after free in ibmasm_init_one</issue>
  <issue id="1225113" tracker="bnc">VUL-0: CVE-2021-47333: kernel: misc: alcor_pci: fix null-ptr-deref when there is no PCI bridge</issue>
  <issue id="1225140" tracker="bnc">VUL-0: CVE-2021-47354: kernel: drm/sched: avoid data corruptions</issue>
  <issue id="1225143" tracker="bnc">VUL-0: CVE-2021-47356: kernel: mISDN: fix possible use-after-free in HFC_cleanup()</issue>
  <issue id="1225164" tracker="bnc">VUL-0: CVE-2021-47369: kernel: s390/qeth: fix NULL deref in qeth_clear_working_pool_list()</issue>
  <issue id="1225177" tracker="bnc">VUL-0: CVE-2021-47347: kernel: wl1251: Fix possible buffer overflow in wl1251_cmd_scan</issue>
  <issue id="1225181" tracker="bnc">VUL-0: CVE-2021-47350: kernel: powerpc/mm: Fix lockup on kernel exec fault</issue>
  <issue id="1225192" tracker="bnc">VUL-0: CVE-2021-47473: kernel: scsi: qla2xxx: Fix a memory leak in an error path of qla2x00_process_els()</issue>
  <issue id="1225193" tracker="bnc">VUL-0: CVE-2021-47375: kernel: blktrace: Fix uaf in blk_trace access after removing by sysfs</issue>
  <issue id="1225201" tracker="bnc">VUL-0: CVE-2021-47378: kernel: nvme-rdma: destroy cm id before destroy qp to avoid use after free</issue>
  <issue id="1225206" tracker="bnc">VUL-0: CVE-2021-47381: kernel: ASoC: SOF: Fix DSP oops stack dump output contents</issue>
  <issue id="1225207" tracker="bnc">VUL-0: CVE-2021-47382: kernel: s390/qeth: fix deadlock during failing recovery</issue>
  <issue id="1225208" tracker="bnc">VUL-0: CVE-2021-47383: kernel: tty: Fix out-of-bound vmalloc access in imageblit</issue>
  <issue id="1225214" tracker="bnc">VUL-0: CVE-2021-47388: kernel: mac80211: fix use-after-free in CCMP/GCMP RX</issue>
  <issue id="1225223" tracker="bnc">VUL-0: CVE-2021-47425: kernel: i2c: acpi: fix resource leak in reconfiguration device addition</issue>
  <issue id="1225224" tracker="bnc">VUL-0: CVE-2021-47441: kernel: mlxsw: thermal: Fix out-of-bounds memory accesses</issue>
  <issue id="1225232" tracker="bnc">VUL-0: CVE-2021-47434: kernel: xhci: Fix command ring pointer corruption while aborting a command</issue>
  <issue id="1225238" tracker="bnc">VUL-0: CVE-2021-47405: kernel: HID: usbhid: free raw_report buffers in usbhid_stop</issue>
  <issue id="1225244" tracker="bnc">VUL-0: CVE-2021-47436: kernel: usb: musb: dsps: Fix the probe error path</issue>
  <issue id="1225251" tracker="bnc">VUL-0: CVE-2021-47460: kernel: ocfs2: fix data corruption after conversion from inline format</issue>
  <issue id="1225256" tracker="bnc">VUL-0: CVE-2021-47456: kernel: can: peak_pci: peak_pci_remove(): fix UAF</issue>
  <issue id="1225261" tracker="bnc">VUL-0: CVE-2021-47445: kernel: drm/msm: Fix null pointer dereference on pointer edp</issue>
  <issue id="1225262" tracker="bnc">VUL-0: CVE-2021-47443: kernel: NFC: digital: fix possible memory leak in digital_tg_listen_mdaa()</issue>
  <issue id="1225263" tracker="bnc">VUL-0: CVE-2021-47442: kernel: NFC: digital: fix possible memory leak in digital_in_send_sdd_req()</issue>
  <issue id="1225301" tracker="bnc">VUL-0: CVE-2021-47402: kernel: net: sched: flower: protect fl_walk() with rcu</issue>
  <issue id="1225303" tracker="bnc">VUL-0: CVE-2021-47404: kernel: HID: betop: fix slab-out-of-bounds Write in betop_probe</issue>
  <issue id="1225318" tracker="bnc">VUL-0: CVE-2021-47391: kernel: RDMA/cma: Ensure rdma_addr_cancel() happens before issuing more requests</issue>
  <issue id="1225321" tracker="bnc">VUL-0: CVE-2021-47393: kernel: hwmon: (mlxreg-fan) Return non-zero value when fan current state is enforced from sysfs</issue>
  <issue id="1225326" tracker="bnc">VUL-0: CVE-2021-47395: kernel: mac80211: limit injected vht mcs/nss in ieee80211_parse_tx_radiotap</issue>
  <issue id="1225327" tracker="bnc">VUL-0: CVE-2021-47396: kernel: mac80211-hwsim: fix late beacon hrtimer handling</issue>
  <issue id="1225328" tracker="bnc">VUL-0: CVE-2021-47399: kernel: ixgbe: Fix NULL pointer dereference in ixgbe_xdp_setup</issue>
  <issue id="1225336" tracker="bnc">VUL-0: CVE-2021-47416: kernel: phy: mdio: fix memory leak</issue>
  <issue id="1225341" tracker="bnc">VUL-0: CVE-2021-47465: kernel: KVM: PPC: Book3S HV: fix stack handling in idle_kvm_start_guest()</issue>
  <issue id="1225346" tracker="bnc">VUL-0: CVE-2021-47468: kernel: isdn: mISDN: fix sleeping function called from invalid context</issue>
  <issue id="1225351" tracker="bnc">VUL-0: CVE-2021-47495: kernel: usbnet: sanity check for maxpacket</issue>
  <issue id="1225354" tracker="bnc">VUL-0: CVE-2021-47496: kernel: net/tls: fix flipped sign in tls_err_abort() calls</issue>
  <issue id="1225355" tracker="bnc">VUL-0: CVE-2021-47497: kernel: nvmem: fix shift-out-of-bound (UBSAN) with byte size cells</issue>
  <issue id="1225360" tracker="bnc">VUL-0: CVE-2021-47500: kernel: iio: mma8452: fix trigger reference couting</issue>
  <issue id="1225366" tracker="bnc">VUL-0: CVE-2021-47423: kernel: drm/nouveau/debugfs: fix file release memory leak</issue>
  <issue id="1225367" tracker="bnc">VUL-0: CVE-2021-47424: kernel: i40e: Fix freeing of uninitialized misc IRQ vector</issue>
  <issue id="1225384" tracker="bnc">VUL-0: CVE-2021-47565: kernel: scsi: mpt3sas: Fix kernel panic during drive powercycle test</issue>
  <issue id="1225390" tracker="bnc">VUL-0: CVE-2021-47431: kernel: drm/amdgpu: fix gart.bo pin_count leak</issue>
  <issue id="1225393" tracker="bnc">VUL-0: CVE-2021-47464: kernel: audit: fix possible null-pointer dereference in audit_filter_rules</issue>
  <issue id="1225400" tracker="bnc">VUL-0: CVE-2021-47505: kernel: aio: fix use-after-free due to missing POLLFREE handling</issue>
  <issue id="1225404" tracker="bnc">VUL-0: CVE-2021-47506: kernel: nfsd: fix use-after-free due to delegation race</issue>
  <issue id="1225411" tracker="bnc">VUL-0: CVE-2021-47511: kernel: ALSA: pcm: oss: fix negative period/buffer sizes</issue>
  <issue id="1225427" tracker="bnc">VUL-0: CVE-2021-47516: kernel: nfp: Fix memory leak in nfp_cpp_area_cache_add()</issue>
  <issue id="1225437" tracker="bnc">VUL-0: CVE-2021-47522: kernel: HID: bigbenff: prevent null pointer dereference</issue>
  <issue id="1225448" tracker="bnc">VUL-0: CVE-2021-47538: kernel: rxrpc: Fix rxrpc_local leak in rxrpc_lookup_peer()</issue>
  <issue id="1225453" tracker="bnc">VUL-0: CVE-2021-47541: kernel: net/mlx4_en: Fix an use-after-free bug in mlx4_en_try_alloc_resources()</issue>
  <issue id="1225455" tracker="bnc">VUL-0: CVE-2021-47542: kernel: net: qlogic: qlcnic: Fix a NULL pointer dereference in qlcnic_83xx_add_rings()</issue>
  <issue id="1225499" tracker="bnc">VUL-0: CVE-2021-47562: kernel: ice: fix vsi-&gt;txq_map sizing</issue>
  <issue id="1225500" tracker="bnc">VUL-0: CVE-2021-47563: kernel: ice: avoid bpf_prog refcount underflow</issue>
  <issue id="1225534" tracker="bnc">VUL-0: CVE-2023-52871: kernel: soc: qcom: llcc: handle a second device without data corruption</issue>
  <issue id="2021-47275" tracker="cve" />
  <issue id="2021-47289" tracker="cve" />
  <issue id="2021-47332" tracker="cve" />
  <issue id="2021-47381" tracker="cve" />
  <issue id="2021-47404" tracker="cve" />
  <issue id="2022-20132" tracker="cve" />
  <issue id="2021-47522" tracker="cve" />
  <issue id="2021-47405" tracker="cve" />
  <issue id="2021-47485" tracker="cve" />
  <issue id="2021-47104" tracker="cve" />
  <issue id="2021-43056" tracker="cve" />
  <issue id="2021-47465" tracker="cve" />
  <issue id="2021-47341" tracker="cve" />
  <issue id="2021-47442" tracker="cve" />
  <issue id="2021-47443" tracker="cve" />
  <issue id="2021-47259" tracker="cve" />
  <issue id="2023-2176" tracker="cve" />
  <issue id="2021-47391" tracker="cve" />
  <issue id="2021-39698" tracker="cve" />
  <issue id="2021-47505" tracker="cve" />
  <issue id="2021-47464" tracker="cve" />
  <issue id="2021-47375" tracker="cve" />
  <issue id="2021-47456" tracker="cve" />
  <issue id="2021-47307" tracker="cve" />
  <issue id="2021-47305" tracker="cve" />
  <issue id="2021-47280" tracker="cve" />
  <issue id="2021-47431" tracker="cve" />
  <issue id="2021-47445" tracker="cve" />
  <issue id="2021-47423" tracker="cve" />
  <issue id="2021-47354" tracker="cve" />
  <issue id="2021-47338" tracker="cve" />
  <issue id="2021-47276" tracker="cve" />
  <issue id="2021-47393" tracker="cve" />
  <issue id="2021-47425" tracker="cve" />
  <issue id="2021-47424" tracker="cve" />
  <issue id="2021-47563" tracker="cve" />
  <issue id="2021-47562" tracker="cve" />
  <issue id="2021-47301" tracker="cve" />
  <issue id="2021-47302" tracker="cve" />
  <issue id="2021-47468" tracker="cve" />
  <issue id="2021-47284" tracker="cve" />
  <issue id="2021-47399" tracker="cve" />
  <issue id="2021-47356" tracker="cve" />
  <issue id="2021-47388" tracker="cve" />
  <issue id="2021-47396" tracker="cve" />
  <issue id="2021-47395" tracker="cve" />
  <issue id="2021-47344" tracker="cve" />
  <issue id="2021-47333" tracker="cve" />
  <issue id="2021-47334" tracker="cve" />
  <issue id="2021-47441" tracker="cve" />
  <issue id="2021-47482" tracker="cve" />
  <issue id="2021-47541" tracker="cve" />
  <issue id="2021-47285" tracker="cve" />
  <issue id="2021-47542" tracker="cve" />
  <issue id="2021-47516" tracker="cve" />
  <issue id="2021-47320" tracker="cve" />
  <issue id="2021-47506" tracker="cve" />
  <issue id="2021-47460" tracker="cve" />
  <issue id="2021-47416" tracker="cve" />
  <issue id="2021-47350" tracker="cve" />
  <issue id="2021-47483" tracker="cve" />
  <issue id="2021-47538" tracker="cve" />
  <issue id="2021-47369" tracker="cve" />
  <issue id="2021-47382" tracker="cve" />
  <issue id="2021-47308" tracker="cve" />
  <issue id="2021-47565" tracker="cve" />
  <issue id="2021-47473" tracker="cve" />
  <issue id="2021-47527" tracker="cve" />
  <issue id="2021-47274" tracker="cve" />
  <issue id="2023-52880" tracker="cve" />
  <issue id="2021-47330" tracker="cve" />
  <issue id="2021-47269" tracker="cve" />
  <issue id="2021-47267" tracker="cve" />
  <issue id="2021-47270" tracker="cve" />
  <issue id="2021-47436" tracker="cve" />
  <issue id="2021-47495" tracker="cve" />
  <issue id="2021-47321" tracker="cve" />
  <issue id="2021-47324" tracker="cve" />
  <issue id="2021-47323" tracker="cve" />
  <issue id="2021-47347" tracker="cve" />
  <issue id="2021-47434" tracker="cve" />
  <issue id="2023-0160" tracker="cve" />
  <issue id="2024-35895" tracker="cve" />
  <issue id="2023-52591" tracker="cve" />
  <issue id="2024-35914" tracker="cve" />
  <issue id="2023-47233" tracker="cve" />
  <issue id="2024-35811" tracker="cve" />
  <issue id="2021-47296" tracker="cve" />
  <issue id="2021-47260" tracker="cve" />
  <issue id="2021-47229" tracker="cve" />
  <issue id="2021-47252" tracker="cve" />
  <issue id="2021-47231" tracker="cve" />
  <issue id="2021-47255" tracker="cve" />
  <issue id="2021-47288" tracker="cve" />
  <issue id="2021-47315" tracker="cve" />
  <issue id="2021-47314" tracker="cve" />
  <issue id="2021-47236" tracker="cve" />
  <issue id="2021-47246" tracker="cve" />
  <issue id="2021-3743" tracker="cve" />
  <issue id="2021-47240" tracker="cve" />
  <issue id="2021-47239" tracker="cve" />
  <issue id="2021-47220" tracker="cve" />
  <issue id="2024-26643" tracker="cve" />
  <issue id="2024-26925" tracker="cve" />
  <issue id="2024-26581" tracker="cve" />
  <issue id="2023-6531" tracker="cve" />
  <issue id="2023-52654" tracker="cve" />
  <issue id="2023-52581" tracker="cve" />
  <issue id="2023-52433" tracker="cve" />
  <issue id="2021-47378" tracker="cve" />
  <issue id="2021-47496" tracker="cve" />
  <issue id="2021-47402" tracker="cve" />
  <issue id="2022-48673" tracker="cve" />
  <issue id="2023-52871" tracker="cve" />
  <issue id="2024-26828" tracker="cve" />
  <issue id="2021-47497" tracker="cve" />
  <issue id="2021-47500" tracker="cve" />
  <issue id="2024-27413" tracker="cve" />
  <issue id="2021-47383" tracker="cve" />
  <issue id="2021-47511" tracker="cve" />
  <issue id="2023-52840" tracker="cve" />
  <issue id="2021-47261" tracker="cve" />
  <issue id="2021-47254" tracker="cve" />
  <issue id="2024-27398" tracker="cve" />
  <issue id="2024-26929" tracker="cve" />
  <issue id="2024-26930" tracker="cve" />
  <issue id="2023-52655" tracker="cve" />
  <issue id="2023-4244" tracker="cve" />
  <issue id="2023-424" tracker="cve" />
  <issue id="2023-1829" tracker="cve" />
  <issue id="2023-52686" tracker="cve" />
  <category>security</category>
  <rating>important</rating>
  <packager>jdelvare</packager>
  <reboot_needed/>
  <description>
The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security bugfixes.

The following security bugs were fixed:

- CVE-2021-47497: Fixed shift-out-of-bound (UBSAN) with byte size cells (bsc#1225355).
- CVE-2021-47500: Fixed trigger reference couting (bsc#1225360).
- CVE-2021-47383: Fiedx out-of-bound vmalloc access in imageblit (bsc#1225208).
- CVE-2021-47511: Fixed negative period/buffer sizes (bsc#1225411).
- CVE-2024-27398: Fixed use-after-free bugs caused by sco_sock_timeout (bsc#1224174).
- CVE-2023-4244: Fixed a use-after-free in the nf_tables component, which could be exploited to achieve local privilege escalation (bsc#1215420).
- CVE-2023-4244: Fixed a use-after-free in the nf_tables component, which could be exploited to achieve local privilege escalation (bsc#1215420).
- CVE-2023-1829: Fixed a use-after-free vulnerability in the control index filter (tcindex) (bsc#1210335).
- CVE-2021-47378: Destroy cm id before destroy qp to avoid use after free (bsc#1225201).
- CVE-2021-47496: Fix flipped sign in tls_err_abort() calls (bsc#1225354)
- CVE-2021-47402: Protect fl_walk() with rcu (bsc#1225301)
- CVE-2022-48673: kABI workarounds for struct smc_link (bsc#1223934).
- CVE-2023-52871: Handle a second device without data corruption (bsc#1225534)
- CVE-2024-26828: Fix underflow in parse_server_interfaces() (bsc#1223084).
- CVE-2024-27413: Fix incorrect allocation size (bsc#1224438).
- CVE-2023-52840: Fix use after free in rmi_unregister_function() (bsc#1224928).
- CVE-2021-47261: Fix initializing CQ fragments buffer (bsc#1224954)
- CVE-2021-47254: Fix use-after-free in gfs2_glock_shrink_scan (bsc#1224888).
- CVE-2023-52655: Check packet for fixup for true limit (bsc#1217169).
- CVE-2023-52686: Fix a null pointer in opal_event_init() (bsc#1065729).

The following non-security bugs were fixed:

- NFC: nxp: add NXP1002 (bsc#1185589).
- PCI: rpaphp: Add MODULE_DESCRIPTION (bsc#1176869 ltc#188243).
- af_unix: Do not use atomic ops for unix_sk(sk)->inflight (bsc#1223384).
- af_unix: Replace BUG_ON() with WARN_ON_ONCE() (bsc#1223384).
- af_unix: annote lockless accesses to unix_tot_inflight &amp; gc_in_progress (bsc#1223384).
- btrfs: do not start relocation until in progress drops are done (bsc#1222251).
- md: Replace snprintf with scnprintf (git-fixes).
- netfilter: nf_tables: GC transaction race with abort path (git-fixes).
- netfilter: nf_tables: GC transaction race with netns dismantle (git-fixes).
- netfilter: nf_tables: defer gc run if previous batch is still pending (git-fixes).
- netfilter: nf_tables: fix GC transaction races with netns and netlink event exit path (git-fixes).
- netfilter: nf_tables: fix kdoc warnings after gc rework (git-fixes).
- netfilter: nf_tables: fix memleak when more than 255 elements expired (git-fixes).
- netfilter: nf_tables: mark newset as dead on transaction abort (git-fixes).
- netfilter: nf_tables: mark set as dead when unbinding anonymous set with timeout (git-fixes).
- netfilter: nf_tables: nft_set_rbtree: fix spurious insertion failure (git-fixes).
- netfilter: nf_tables: release mutex after nft_gc_seq_end from abort path (git-fixes).
- netfilter: nf_tables: skip dead set elements in netlink dump (git-fixes).
- netfilter: nf_tables: use correct lock to protect gc_list (git-fixes).
- netfilter: nft_set_hash: try later when GC hits EAGAIN on iteration (git-fixes).
- netfilter: nft_set_rbtree: Add missing expired checks (git-fixes).
- netfilter: nft_set_rbtree: Detect partial overlap with start endpoint match (git-fixes).
- netfilter: nft_set_rbtree: Detect partial overlaps on insertion (git-fixes).
- netfilter: nft_set_rbtree: Do not account for expired elements on insertion (git-fixes).
- netfilter: nft_set_rbtree: Drop spurious condition for overlap detection on insertion (git-fixes).
- netfilter: nft_set_rbtree: Handle outcomes of tree rotations in overlap detection (git-fixes).
- netfilter: nft_set_rbtree: Introduce and use nft_rbtree_interval_start() (git-fixes).
- netfilter: nft_set_rbtree: Switch to node list walk for overlap detection (git-fixes).
- netfilter: nft_set_rbtree: bogus lookup/get on consecutive elements in named sets (git-fixes).
- netfilter: nft_set_rbtree: fix null deref on element insertion (git-fixes).
- netfilter: nft_set_rbtree: fix overlap expiration walk (git-fixes).
- netfilter: nft_set_rbtree: overlap detection with element re-addition after deletion (git-fixes).
- netfilter: nft_set_rbtree: skip elements in transaction from garbage collection (git-fixes).
- netfilter: nft_set_rbtree: skip end interval element from gc (git-fixes).
- netfilter: nft_set_rbtree: skip sync GC for new elements in this transaction (git-fixes).
- netfilter: nft_set_rbtree: use read spinlock to avoid datapath contention (git-fixes).
- x86/pkeys: Revert a5eff7259790 ("x86/pkeys: Add PKRU value to init_fpstate") (bsc#1215356).
</description>
<summary>Security update for the Linux Kernel</summary>
</patchinfo>
openSUSE Build Service is sponsored by