File _patchinfo of Package patchinfo.34168

<patchinfo incident="34168">
  <issue id="1065729" tracker="bnc">[trackerbug] 4.12 powerpc base kernel fixes</issue>
  <issue id="1151927" tracker="bnc">Continuous stable update tracker for SLE15-SP2</issue>
  <issue id="1152472" tracker="bnc">[TRACKERBUG] Backported kernel graphics patches for SLE15-SP2</issue>
  <issue id="1154353" tracker="bnc">Update skb/net-sched kernel API</issue>
  <issue id="1156395" tracker="bnc">[TRACKERBUG] 5.3 powerpc base kernel fixes</issue>
  <issue id="1174585" tracker="bnc">kernel lock up on IBS worker with 15-SP2</issue>
  <issue id="1176447" tracker="bnc">TRACKERBUG Network Infrastructure backports for 15SP3</issue>
  <issue id="1176774" tracker="bnc">Mellanox mlxsw/platform driver update for SLE15-SP3</issue>
  <issue id="1176869" tracker="bnc">SLES 12 SP4 - Tainted Kernel - rpadlpar_io lacking DESCRIPTION</issue>
  <issue id="1178134" tracker="bnc">[TRACKERBUG] git-fixes pile for SLE15-SP3</issue>
  <issue id="1181147" tracker="bnc">patch list required for mellanox (19.01.2021)</issue>
  <issue id="1184631" tracker="bnc">bcache kernel BUG at ../drivers/md/bcache/bset.c:884</issue>
  <issue id="1185570" tracker="bnc">New kernel breaks bcache mounted rootfs</issue>
  <issue id="1185589" tracker="bnc">NFC driver on HP Comet Lake system does not load</issue>
  <issue id="1185902" tracker="bnc">System crash in refresh_cache_worker() due to CIFS server being freed.</issue>
  <issue id="1186885" tracker="bnc">Launching SLE15-SP3 under SEV fails when kernel parses MOKVar EFI table</issue>
  <issue id="1187357" tracker="bnc">Important bcache fixes up to Linux v5.13</issue>
  <issue id="1188616" tracker="bnc">Pull the latest changes submitted to libfc.</issue>
  <issue id="1188772" tracker="bnc">kvm: LAPIC: Restore guard to prevent illegal APIC register access</issue>
  <issue id="1189883" tracker="bnc">VUL-0: CVE-2021-3743: kernel-source-azure,kernel-source,kernel-source-rt: out-of-bound Read in qrtr_endpoint_post in net/qrtr/qrtr.c</issue>
  <issue id="1190795" tracker="bnc">ocfs2: part of the file is zeroed out upon write</issue>
  <issue id="1191452" tracker="bnc">[PATCH] blktrace: Fix uaf in blk_trace access after removing by sysfs</issue>
  <issue id="1192107" tracker="bnc">VUL-0: CVE-2021-43056: kernel-source: powerpc: KVM guest can trigger host crash on Power8</issue>
  <issue id="1194288" tracker="bnc">[EAR - NOT FOR USA Citizens] PTF request for libfreebl3 to fix CVE-2021-43527 on sles12-sp2-ltss on x86_64 flavor ref:_00D1igLOd._5001io9v9G:ref</issue>
  <issue id="1194591" tracker="bnc">[PATCH] isofs: Fix out of bound access for corrupted isofs image</issue>
  <issue id="1196956" tracker="bnc">VUL-0: CVE-2021-39698:  kernel-source-rt,kernel-source-azure,kernel-source: use-after-free due to missing POLLFREE handling in aio</issue>
  <issue id="1197760" tracker="bnc">[PATCH] ocfs2: mount fails with buffer overflow in strlen</issue>
  <issue id="1198029" tracker="bnc">VUL-0: CVE-2022-1195: kernel-source: A possible race condition (use-after-free) in drivers/net/hamradio/6pack ( mkiss.c) after unregister_netdev</issue>
  <issue id="1199304" tracker="bnc">defragfs.ocfs2 triggered kernel crash</issue>
  <issue id="1200619" tracker="bnc">VUL-0: CVE-2022-20132: kernel-source-rt,kernel-source-azure,kernel-source: several potential out of bounds reads via malicious HID device</issue>
  <issue id="1203389" tracker="bnc">VUL-0: CVE-2022-3202: kernel: jfs: Null Pointer Deference in jfs_evict_inode leads to Denial of Service</issue>
  <issue id="1206646" tracker="bnc">[PATCH] udf: Fix NULL pointer dereference in udf_symlink function</issue>
  <issue id="1209657" tracker="bnc">VUL-0: CVE-2023-0160: kernel-source,kernel-source-azure,kernel-source-rt: possibility of deadlock in libbpf function sock_hash_delete_elem()</issue>
  <issue id="1210335" tracker="bnc">VUL-0: CVE-2023-1829: kernel: Linux kernel: Vulnerabilities in the tcindex classifier</issue>
  <issue id="1210629" tracker="bnc">VUL-0: CVE-2023-2176: kernel: Slab-out-of-bound read in compare_netdev_and_ip</issue>
  <issue id="1213476" tracker="bnc">L3: cifs.ko - CIFS VFS: leaving cifs_get_tcon (xid = 2074919) rc = -2</issue>
  <issue id="1215420" tracker="bnc">VUL-0: CVE-2023-4244: kernel-source-rt,kernel-source-azure,kernel-source: netfilter: nf_tables UAF</issue>
  <issue id="1216702" tracker="bnc">VUL-0: CVE-2023-47233: kernel: Use after Free bug in brcmf_cfg80211_detach</issue>
  <issue id="1217169" tracker="bnc">VUL-0: CVE-2023-52655: kernel: malicious USB device impersonating an aqc111 device can make the kernel overstep a buffer</issue>
  <issue id="1220137" tracker="bnc">VUL-0: CVE-2023-52433: kernel-source,kernel-source-azure,kernel-source-rt: in netfilter nft_set_rbtree skip sync GC for new elements in this transaction</issue>
  <issue id="1220144" tracker="bnc">VUL-0: CVE-2024-26581: kernel-source,kernel-source-azure,kernel-source-rt: nftables nft_set_rbtree skip end interval element from gc</issue>
  <issue id="1220754" tracker="bnc">VUL-0: CVE-2021-47040: kernel: io_uring: fix overflows checks in provide buffers</issue>
  <issue id="1220877" tracker="bnc">VUL-0: CVE-2023-52581: kernel: netfilter: nf_tables: fix memleak when more than 255 elements expired</issue>
  <issue id="1220960" tracker="bnc">VUL-0: CVE-2021-47104: kernel: IB/qib: Fix memory leak in qib_user_sdma_queue_pkts()</issue>
  <issue id="1221044" tracker="bnc">VUL-0: CVE-2023-52591: kernel: reiserfs: potential filesystem corruption on directory rename</issue>
  <issue id="1221113" tracker="bnc">L3-Question: SLES15SP3 ppc_64 - Oops: Kernel access of bad area, sig: 11</issue>
  <issue id="1221829" tracker="bnc">VUL-0: CVE-2024-26643: kernel: netfilter: nf_tables: mark set as dead when unbinding anonymous set with timeout</issue>
  <issue id="1222251" tracker="bnc">L3: Btrfs balance failing, FS marked ROref:_00D1igLOd._500Tr80inh:ref</issue>
  <issue id="1222619" tracker="bnc">VUL-0: CVE-2023-52880: kernel: tty/n_gsm: 0day with exploit dropped on Github</issue>
  <issue id="1222838" tracker="bnc">VUL-0: CVE-2021-47200: kernel: drm/prime: Fix use after free in mmap with drm_gem_ttm_mmap</issue>
  <issue id="1222867" tracker="bnc">VUL-0: CVE-2021-47192: kernel: scsi: core: sysfs: Fix hang when device state is set via sysfs</issue>
  <issue id="1223084" tracker="bnc">VUL-0: CVE-2024-26828: kernel: cifs: underflow in parse_server_interfaces()</issue>
  <issue id="1223138" tracker="bnc">VUL-0: CVE-2024-26921: kernel: inet: inet_defrag: prevent sk release while still in use</issue>
  <issue id="1223384" tracker="bnc">VUL-0: CVE-2024-26923: kernel: af_unix: fix garbage collector racing against connect()</issue>
  <issue id="1223390" tracker="bnc">VUL-0: CVE-2024-26925: kernel: netfilter: nf_tables: release mutex after nft_gc_seq_end from abort path</issue>
  <issue id="1223512" tracker="bnc">VUL-0: CVE-2022-48636: kernel: s390/dasd: fix Oops in dasd_alias_get_start_dev due to missing pavgroup</issue>
  <issue id="1223932" tracker="bnc">VUL-0: CVE-2022-48704: kernel: drm/radeon: panic on invalid kernel paging request</issue>
  <issue id="1223934" tracker="bnc">VUL-0: CVE-2022-48673: kernel: net/smc: Fix possible access to freed memory in link clear</issue>
  <issue id="1224099" tracker="bnc">VUL-0: CVE-2023-52654: kernel: io_uring/af_unix: disable sending io_uring over sockets</issue>
  <issue id="1224174" tracker="bnc">VUL-0: CVE-2024-27398: kernel: Bluetooth: fix use-after-free bugs caused by sco_sock_timeout</issue>
  <issue id="1224438" tracker="bnc">VUL-0: CVE-2024-27413: kernel: efi/capsule-loader: fix incorrect allocation size</issue>
  <issue id="1224482" tracker="bnc">VUL-0: CVE-2024-35914: kernel: nfsd: Fix error cleanup path in nfsd_rename()</issue>
  <issue id="1224511" tracker="bnc">VUL-0: CVE-2024-35895: kernel: bpf, sockmap: Prevent lock inversion deadlock in map delete elem</issue>
  <issue id="1224592" tracker="bnc">VUL-0: CVE-2024-35811: kernel: wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach</issue>
  <issue id="1224816" tracker="bnc">VUL-0: CVE-2020-36788: kernel: drm/nouveau: avoid a use-after-free when BO init fails</issue>
  <issue id="1224826" tracker="bnc">VUL-0: CVE-2021-47228: kernel: x86/ioremap: Map EFI-reserved memory as encrypted for SEV</issue>
  <issue id="1224830" tracker="bnc">VUL-0: CVE-2021-47237: kernel: net: hamradio: fix memory leak in mkiss_close</issue>
  <issue id="1224831" tracker="bnc">VUL-0: CVE-2021-47246: kernel: net/mlx5e: Fix page reclaim for dead peer hairpin</issue>
  <issue id="1224832" tracker="bnc">VUL-0: CVE-2021-47255: kernel: kvm: LAPIC: Restore guard to prevent illegal APIC register access</issue>
  <issue id="1224834" tracker="bnc">VUL-0: CVE-2021-47260: kernel: NFS: Fix a potential NULL dereference in nfs_get_client()</issue>
  <issue id="1224841" tracker="bnc">VUL-0: CVE-2021-47236: kernel: net: cdc_eem: fix tx fixup skb leak</issue>
  <issue id="1224842" tracker="bnc">VUL-0: CVE-2021-47241: kernel: ethtool: strset: fix message length calculation</issue>
  <issue id="1224843" tracker="bnc">VUL-0: CVE-2021-47240: kernel: net: qrtr: fix OOB Read in qrtr_endpoint_post</issue>
  <issue id="1224844" tracker="bnc">VUL-0: CVE-2021-47235: kernel: net: ethernet: fix potential use-after-free in ec_bhf_remove</issue>
  <issue id="1224846" tracker="bnc">VUL-0: CVE-2021-47239: kernel: net: usb: fix possible use-after-free in smsc75xx_bind</issue>
  <issue id="1224849" tracker="bnc">VUL-0: CVE-2021-47231: kernel: can: mcba_usb: fix memory leak in mcba_usb</issue>
  <issue id="1224852" tracker="bnc">VUL-0: CVE-2021-47227: kernel: x86/fpu: Prevent state corruption in __fpu__restore_sig()</issue>
  <issue id="1224853" tracker="bnc">VUL-0: CVE-2021-47230: kernel: KVM: x86: Immediately reset the MMU context when the SMM flag is cleared</issue>
  <issue id="1224854" tracker="bnc">VUL-0: CVE-2021-47229: kernel: PCI: aardvark: Fix kernel panic during PIO transfer</issue>
  <issue id="1224859" tracker="bnc">VUL-0: CVE-2021-47220: kernel: usb: dwc3: core: fix kernel panic when do reboot</issue>
  <issue id="1224882" tracker="bnc">VUL-0: CVE-2021-47252: kernel: batman-adv: Avoid WARN_ON timing related checks</issue>
  <issue id="1224886" tracker="bnc">VUL-0: CVE-2021-47253: kernel: drm/amd/display: Fix potential memory leak in DMUB hw_init</issue>
  <issue id="1224888" tracker="bnc">VUL-0: CVE-2021-47254: kernel: gfs2: Fix use-after-free in gfs2_glock_shrink_scan</issue>
  <issue id="1224889" tracker="bnc">VUL-0: CVE-2021-47288: kernel: media: ngene: Fix out-of-bounds bug in ngene_command_config_free_buf()</issue>
  <issue id="1224891" tracker="bnc">VUL-0: CVE-2021-47296: kernel: KVM: PPC: Fix kvm_arch_vcpu_ioctl vcpu_load leak</issue>
  <issue id="1224892" tracker="bnc">VUL-0: CVE-2021-47315: kernel: memory: fsl_ifc: fix leak of IO mapping on probe failure</issue>
  <issue id="1224893" tracker="bnc">VUL-0: CVE-2021-47314: kernel: memory: fsl_ifc: fix leak of private memory on probe failure</issue>
  <issue id="1224899" tracker="bnc">VUL-0: CVE-2021-47258: kernel: scsi: core: Fix error handling of scsi_host_alloc()</issue>
  <issue id="1224904" tracker="bnc">VUL-0: CVE-2021-47485: kernel: IB/qib: Protect from buffer overflow in struct qib_user_sdma_pkt fields</issue>
  <issue id="1224907" tracker="bnc">VUL-0: CVE-2021-47483: kernel: regmap: Fix possible double-free in regcache_rbtree_exit()</issue>
  <issue id="1224909" tracker="bnc">VUL-0: CVE-2021-47482: kernel: net: batman-adv: fix error handling</issue>
  <issue id="1224916" tracker="bnc">VUL-0: CVE-2021-47301: kernel: igb: Fix use-after-free error during reset</issue>
  <issue id="1224917" tracker="bnc">VUL-0: CVE-2021-47302: kernel: igc: Fix use-after-free error during reset</issue>
  <issue id="1224922" tracker="bnc">VUL-0: CVE-2021-47344: kernel: media: zr364xx: fix memory leak in zr364xx_start_readpipe</issue>
  <issue id="1224923" tracker="bnc">VUL-0: CVE-2021-47341: kernel: KVM: mmio: Fix use-after-free Read in kvm_vm_ioctl_unregister_coalesced_mmio</issue>
  <issue id="1224924" tracker="bnc">VUL-0: CVE-2021-47338: kernel: fbmem: Do not delete the mode that is still in use</issue>
  <issue id="1224926" tracker="bnc">VUL-0: CVE-2021-47337: kernel: scsi: core: Fix bad pointer dereference when ehandler kthread is invalid</issue>
  <issue id="1224928" tracker="bnc">VUL-0: CVE-2023-52840: kernel: Input: synaptics-rmi4 - fix use after free in rmi_unregister_function()</issue>
  <issue id="1224953" tracker="bnc">VUL-0: CVE-2021-47259: kernel: NFS: Fix use-after-free in nfs4_init_client()</issue>
  <issue id="1224954" tracker="bnc">VUL-0: CVE-2021-47261: kernel: IB/mlx5: Fix initializing CQ fragments buffer</issue>
  <issue id="1224955" tracker="bnc">VUL-0: CVE-2021-47263: kernel: gpio: wcd934x: Fix shift-out-of-bounds error</issue>
  <issue id="1224957" tracker="bnc">VUL-0: CVE-2021-47265: kernel: RDMA: Verify port when creating flow rule</issue>
  <issue id="1224961" tracker="bnc">VUL-0: CVE-2021-47307: kernel: cifs: prevent NULL deref in cifs_compose_mount_options()</issue>
  <issue id="1224963" tracker="bnc">VUL-0: CVE-2021-47308: kernel: scsi: libfc: Fix array index out of bound exception</issue>
  <issue id="1224965" tracker="bnc">VUL-0: CVE-2021-47275: kernel: bcache: avoid oversized read request in cache missing code path</issue>
  <issue id="1224966" tracker="bnc">VUL-0: CVE-2021-47276: kernel: ftrace: Do not blindly read the ip address in ftrace_bug()</issue>
  <issue id="1224968" tracker="bnc">VUL-0: CVE-2021-47305: kernel: dma-buf/sync_file: Don't leak fences on merge failure</issue>
  <issue id="1224981" tracker="bnc">VUL-0: CVE-2021-47285: kernel: net/nfc/rawsock.c: fix a permission check bug</issue>
  <issue id="1224982" tracker="bnc">VUL-0: CVE-2021-47280: kernel: drm: Fix use-after-free read in drm_getunique()</issue>
  <issue id="1224983" tracker="bnc">VUL-0: CVE-2021-47281: kernel: ALSA: seq: Fix race of snd_seq_timer_open()</issue>
  <issue id="1224984" tracker="bnc">VUL-0: CVE-2021-47289: kernel: ACPI: fix NULL pointer dereference</issue>
  <issue id="1224987" tracker="bnc">VUL-0: CVE-2021-47284: kernel: isdn: mISDN: netjet: Fix crash in nj_probe:</issue>
  <issue id="1224990" tracker="bnc">VUL-0: CVE-2021-47274: kernel: tracing: Correct the length check which causes memory corruption</issue>
  <issue id="1224993" tracker="bnc">VUL-0: CVE-2021-47267: kernel: usb: fix various gadget panics on 10gbps cabling</issue>
  <issue id="1224996" tracker="bnc">VUL-0: CVE-2021-47269: kernel: usb: dwc3: ep0: fix NULL pointer exception</issue>
  <issue id="1224997" tracker="bnc">VUL-0: CVE-2021-47270: kernel: usb: fix various gadgets null ptr deref on 10gbps cabling.</issue>
  <issue id="1225026" tracker="bnc">VUL-0: CVE-2021-47323: kernel: watchdog: sc520_wdt: Fix possible use-after-free in wdt_turnoff()</issue>
  <issue id="1225030" tracker="bnc">VUL-0: CVE-2021-47324: kernel: watchdog: Fix possible use-after-free in wdt_startup()</issue>
  <issue id="1225058" tracker="bnc">VUL-0: CVE-2021-47320: kernel: nfs: fix acl memory leak of posix_acl_create()</issue>
  <issue id="1225060" tracker="bnc">VUL-0: CVE-2021-47321: kernel: watchdog: fix possible use-after-free by calling del_timer_sync()</issue>
  <issue id="1225083" tracker="bnc">VUL-0: CVE-2021-47329: kernel: scsi: megaraid_sas: Fix resource leak in case of probe failure</issue>
  <issue id="1225084" tracker="bnc">VUL-0: CVE-2021-47330: kernel: tty: serial: 8250: serial_cs: Fix a memory leak in error handling path</issue>
  <issue id="1225091" tracker="bnc">VUL-0: CVE-2021-47332: kernel: ALSA: usx2y: Don't call free_pages_exact() with NULL address</issue>
  <issue id="1225112" tracker="bnc">VUL-0: CVE-2021-47334: kernel: misc/libmasm/module: fix two use after free in ibmasm_init_one</issue>
  <issue id="1225113" tracker="bnc">VUL-0: CVE-2021-47333: kernel: misc: alcor_pci: fix null-ptr-deref when there is no PCI bridge</issue>
  <issue id="1225128" tracker="bnc">VUL-0: CVE-2021-47353: kernel: udf: fix NULL pointer dereference in udf_symlink function</issue>
  <issue id="1225140" tracker="bnc">VUL-0: CVE-2021-47354: kernel: drm/sched: avoid data corruptions</issue>
  <issue id="1225143" tracker="bnc">VUL-0: CVE-2021-47356: kernel: mISDN: fix possible use-after-free in HFC_cleanup()</issue>
  <issue id="1225148" tracker="bnc">VUL-0: CVE-2021-47340: kernel: jfs: fix GPF in diFree</issue>
  <issue id="1225155" tracker="bnc">VUL-0: CVE-2021-47343: kernel: dm btree remove: assign new_root only when removal succeeds</issue>
  <issue id="1225164" tracker="bnc">VUL-0: CVE-2021-47369: kernel: s390/qeth: fix NULL deref in qeth_clear_working_pool_list()</issue>
  <issue id="1225177" tracker="bnc">VUL-0: CVE-2021-47347: kernel: wl1251: Fix possible buffer overflow in wl1251_cmd_scan</issue>
  <issue id="1225178" tracker="bnc">VUL-0: CVE-2021-47348: kernel: drm/amd/display: Avoid HDCP over-read and corruption</issue>
  <issue id="1225181" tracker="bnc">VUL-0: CVE-2021-47350: kernel: powerpc/mm: Fix lockup on kernel exec fault</issue>
  <issue id="1225192" tracker="bnc">VUL-0: CVE-2021-47473: kernel: scsi: qla2xxx: Fix a memory leak in an error path of qla2x00_process_els()</issue>
  <issue id="1225193" tracker="bnc">VUL-0: CVE-2021-47375: kernel: blktrace: Fix uaf in blk_trace access after removing by sysfs</issue>
  <issue id="1225198" tracker="bnc">VUL-0: CVE-2021-47478: kernel: isofs: Fix out of bound access for corrupted isofs image</issue>
  <issue id="1225201" tracker="bnc">VUL-0: CVE-2021-47378: kernel: nvme-rdma: destroy cm id before destroy qp to avoid use after free</issue>
  <issue id="1225206" tracker="bnc">VUL-0: CVE-2021-47381: kernel: ASoC: SOF: Fix DSP oops stack dump output contents</issue>
  <issue id="1225207" tracker="bnc">VUL-0: CVE-2021-47382: kernel: s390/qeth: fix deadlock during failing recovery</issue>
  <issue id="1225208" tracker="bnc">VUL-0: CVE-2021-47383: kernel: tty: Fix out-of-bound vmalloc access in imageblit</issue>
  <issue id="1225214" tracker="bnc">VUL-0: CVE-2021-47388: kernel: mac80211: fix use-after-free in CCMP/GCMP RX</issue>
  <issue id="1225223" tracker="bnc">VUL-0: CVE-2021-47425: kernel: i2c: acpi: fix resource leak in reconfiguration device addition</issue>
  <issue id="1225224" tracker="bnc">VUL-0: CVE-2021-47441: kernel: mlxsw: thermal: Fix out-of-bounds memory accesses</issue>
  <issue id="1225230" tracker="bnc">VUL-0: CVE-2022-48710: kernel: drm/radeon: fix a possible null pointer dereference</issue>
  <issue id="1225232" tracker="bnc">VUL-0: CVE-2021-47434: kernel: xhci: Fix command ring pointer corruption while aborting a command</issue>
  <issue id="1225233" tracker="bnc">VUL-0: CVE-2021-47422: kernel: drm/nouveau/kms/nv50-: fix file release memory leak</issue>
  <issue id="1225237" tracker="bnc">VUL-0: CVE-2021-47451: kernel: netfilter: xt_IDLETIMER: fix panic that occurs when timer_type has garbage value</issue>
  <issue id="1225238" tracker="bnc">VUL-0: CVE-2021-47405: kernel: HID: usbhid: free raw_report buffers in usbhid_stop</issue>
  <issue id="1225243" tracker="bnc">VUL-0: CVE-2021-47444: kernel: drm/edid: In connector_bad_edid() cap num_of_ext by num_blocks read</issue>
  <issue id="1225244" tracker="bnc">VUL-0: CVE-2021-47436: kernel: usb: musb: dsps: Fix the probe error path</issue>
  <issue id="1225247" tracker="bnc">VUL-0: CVE-2021-47435: kernel: dm: fix mempool NULL pointer race when completing IO</issue>
  <issue id="1225251" tracker="bnc">VUL-0: CVE-2021-47460: kernel: ocfs2: fix data corruption after conversion from inline format</issue>
  <issue id="1225252" tracker="bnc">VUL-0: CVE-2021-47458: kernel: ocfs2: mount fails with buffer overflow in strlen</issue>
  <issue id="1225256" tracker="bnc">VUL-0: CVE-2021-47456: kernel: can: peak_pci: peak_pci_remove(): fix UAF</issue>
  <issue id="1225261" tracker="bnc">VUL-0: CVE-2021-47445: kernel: drm/msm: Fix null pointer dereference on pointer edp</issue>
  <issue id="1225262" tracker="bnc">VUL-0: CVE-2021-47443: kernel: NFC: digital: fix possible memory leak in digital_tg_listen_mdaa()</issue>
  <issue id="1225263" tracker="bnc">VUL-0: CVE-2021-47442: kernel: NFC: digital: fix possible memory leak in digital_in_send_sdd_req()</issue>
  <issue id="1225301" tracker="bnc">VUL-0: CVE-2021-47402: kernel: net: sched: flower: protect fl_walk() with rcu</issue>
  <issue id="1225303" tracker="bnc">VUL-0: CVE-2021-47404: kernel: HID: betop: fix slab-out-of-bounds Write in betop_probe</issue>
  <issue id="1225316" tracker="bnc">VUL-0: CVE-2021-47387: kernel: cpufreq: schedutil: Use kobject release() method to free sugov_tunables</issue>
  <issue id="1225318" tracker="bnc">VUL-0: CVE-2021-47391: kernel: RDMA/cma: Ensure rdma_addr_cancel() happens before issuing more requests</issue>
  <issue id="1225320" tracker="bnc">VUL-0: CVE-2021-47392: kernel: RDMA/cma: Fix listener leak in rdma_cma_listen_on_all() failure</issue>
  <issue id="1225321" tracker="bnc">VUL-0: CVE-2021-47393: kernel: hwmon: (mlxreg-fan) Return non-zero value when fan current state is enforced from sysfs</issue>
  <issue id="1225322" tracker="bnc">VUL-0: CVE-2021-47480: kernel: scsi: core: Put LLD module refcnt after SCSI device is released</issue>
  <issue id="1225326" tracker="bnc">VUL-0: CVE-2021-47395: kernel: mac80211: limit injected vht mcs/nss in ieee80211_parse_tx_radiotap</issue>
  <issue id="1225327" tracker="bnc">VUL-0: CVE-2021-47396: kernel: mac80211-hwsim: fix late beacon hrtimer handling</issue>
  <issue id="1225328" tracker="bnc">VUL-0: CVE-2021-47399: kernel: ixgbe: Fix NULL pointer dereference in ixgbe_xdp_setup</issue>
  <issue id="1225330" tracker="bnc">VUL-0: CVE-2021-47409: kernel: usb: dwc2: check return value after calling platform_get_resource()</issue>
  <issue id="1225333" tracker="bnc">VUL-0: CVE-2021-47413: kernel: usb: chipidea: ci_hdrc_imx: Also search for 'phys' phandle</issue>
  <issue id="1225336" tracker="bnc">VUL-0: CVE-2021-47416: kernel: phy: mdio: fix memory leak</issue>
  <issue id="1225341" tracker="bnc">VUL-0: CVE-2021-47465: kernel: KVM: PPC: Book3S HV: fix stack handling in idle_kvm_start_guest()</issue>
  <issue id="1225346" tracker="bnc">VUL-0: CVE-2021-47468: kernel: isdn: mISDN: fix sleeping function called from invalid context</issue>
  <issue id="1225351" tracker="bnc">VUL-0: CVE-2021-47495: kernel: usbnet: sanity check for maxpacket</issue>
  <issue id="1225354" tracker="bnc">VUL-0: CVE-2021-47496: kernel: net/tls: fix flipped sign in tls_err_abort() calls</issue>
  <issue id="1225355" tracker="bnc">VUL-0: CVE-2021-47497: kernel: nvmem: fix shift-out-of-bound (UBSAN) with byte size cells</issue>
  <issue id="1225357" tracker="bnc">VUL-0: CVE-2021-47498: kernel: dm rq: don't queue request to blk-mq during DM suspend</issue>
  <issue id="1225358" tracker="bnc">VUL-0: CVE-2021-47499: kernel: iio: accel: kxcjk-1013: fix possible memory leak in probe and remove</issue>
  <issue id="1225360" tracker="bnc">VUL-0: CVE-2021-47500: kernel: iio: mma8452: fix trigger reference couting</issue>
  <issue id="1225361" tracker="bnc">VUL-0: CVE-2021-47501: kernel: i40e: fix NULL pointer dereference in i40e_dbg_dump_desc</issue>
  <issue id="1225366" tracker="bnc">VUL-0: CVE-2021-47423: kernel: drm/nouveau/debugfs: fix file release memory leak</issue>
  <issue id="1225367" tracker="bnc">VUL-0: CVE-2021-47424: kernel: i40e: Fix freeing of uninitialized misc IRQ vector</issue>
  <issue id="1225369" tracker="bnc">VUL-0: CVE-2021-47502: kernel: ASoC: codecs: wcd934x: handle channel mappping list correctly</issue>
  <issue id="1225370" tracker="bnc">VUL-0: CVE-2021-47426: kernel: bpf, s390: Fix potential memory leak about jit_data</issue>
  <issue id="1225372" tracker="bnc">VUL-0: CVE-2021-47518: kernel: nfc: fix potential NULL pointer deref in nfc_genl_dump_ses_done</issue>
  <issue id="1225374" tracker="bnc">VUL-0: CVE-2021-47503: kernel: scsi: pm80xx: do not call scsi_remove_host() in pm8001_alloc()</issue>
  <issue id="1225384" tracker="bnc">VUL-0: CVE-2021-47565: kernel: scsi: mpt3sas: Fix kernel panic during drive powercycle test</issue>
  <issue id="1225386" tracker="bnc">VUL-0: CVE-2021-47540: kernel: mt76: mt7915: fix NULL pointer dereference in mt7915_get_phy_mode</issue>
  <issue id="1225387" tracker="bnc">VUL-0: CVE-2021-47428: kernel: powerpc/64s: fix program check interrupt emergency stack path</issue>
  <issue id="1225390" tracker="bnc">VUL-0: CVE-2021-47431: kernel: drm/amdgpu: fix gart.bo pin_count leak</issue>
  <issue id="1225393" tracker="bnc">VUL-0: CVE-2021-47464: kernel: audit: fix possible null-pointer dereference in audit_filter_rules</issue>
  <issue id="1225400" tracker="bnc">VUL-0: CVE-2021-47505: kernel: aio: fix use-after-free due to missing POLLFREE handling</issue>
  <issue id="1225404" tracker="bnc">VUL-0: CVE-2021-47506: kernel: nfsd: fix use-after-free due to delegation race</issue>
  <issue id="1225405" tracker="bnc">VUL-0: CVE-2021-47507: kernel: nfsd: fix nsfd startup race (again)</issue>
  <issue id="1225409" tracker="bnc">VUL-0: CVE-2021-47509: kernel: ALSA: pcm: oss: limit the period size to 16MB</issue>
  <issue id="1225411" tracker="bnc">VUL-0: CVE-2021-47511: kernel: ALSA: pcm: oss: fix negative period/buffer sizes</issue>
  <issue id="1225424" tracker="bnc">VUL-0: CVE-2021-47512: kernel: net/sched: fq_pie: prevent dismantle issue</issue>
  <issue id="1225427" tracker="bnc">VUL-0: CVE-2021-47516: kernel: nfp: Fix memory leak in nfp_cpp_area_cache_add()</issue>
  <issue id="1225435" tracker="bnc">VUL-0: CVE-2021-47521: kernel: can: sja1000: fix use after free in ems_pcmcia_add_card()</issue>
  <issue id="1225437" tracker="bnc">VUL-0: CVE-2021-47522: kernel: HID: bigbenff: prevent null pointer dereference</issue>
  <issue id="1225438" tracker="bnc">VUL-0: CVE-2021-47523: kernel: IB/hfi1: Fix leak of rcvhdrtail_dummy_kvaddr</issue>
  <issue id="1225439" tracker="bnc">VUL-0: CVE-2021-47493: kernel: ocfs2: fix race between searching chunks and release journal_head from buffer_head</issue>
  <issue id="1225446" tracker="bnc">VUL-0: CVE-2021-47535: kernel: drm/msm/a6xx: Allocate enough space for GMU registers</issue>
  <issue id="1225447" tracker="bnc">VUL-0: CVE-2021-47536: kernel: net/smc: fix wrong list_del in smc_lgr_cleanup_early</issue>
  <issue id="1225448" tracker="bnc">VUL-0: CVE-2021-47538: kernel: rxrpc: Fix rxrpc_local leak in rxrpc_lookup_peer()</issue>
  <issue id="1225450" tracker="bnc">VUL-0: CVE-2021-47494: kernel: cfg80211: fix management registrations locking</issue>
  <issue id="1225453" tracker="bnc">VUL-0: CVE-2021-47541: kernel: net/mlx4_en: Fix an use-after-free bug in mlx4_en_try_alloc_resources()</issue>
  <issue id="1225455" tracker="bnc">VUL-0: CVE-2021-47542: kernel: net: qlogic: qlcnic: Fix a NULL pointer dereference in qlcnic_83xx_add_rings()</issue>
  <issue id="1225468" tracker="bnc">VUL-0: CVE-2021-47557: kernel: net/sched: sch_ets: don't peek at classes beyond 'nbands'</issue>
  <issue id="1225499" tracker="bnc">VUL-0: CVE-2021-47562: kernel: ice: fix vsi-&gt;txq_map sizing</issue>
  <issue id="1225500" tracker="bnc">VUL-0: CVE-2021-47563: kernel: ice: avoid bpf_prog refcount underflow</issue>
  <issue id="1225508" tracker="bnc">VUL-0: CVE-2021-47549: kernel: sata_fsl: fix UAF in sata_fsl_port_stop when rmmod sata_fsl</issue>
  <issue id="1225534" tracker="bnc">VUL-0: CVE-2023-52871: kernel: soc: qcom: llcc: handle a second device without data corruption</issue>
  <issue id="2021-47228" tracker="cve" />
  <issue id="2021-47275" tracker="cve" />
  <issue id="2021-47493" tracker="cve" />
  <issue id="2021-47200" tracker="cve" />
  <issue id="2021-47343" tracker="cve" />
  <issue id="2021-47435" tracker="cve" />
  <issue id="2021-47289" tracker="cve" />
  <issue id="2021-47509" tracker="cve" />
  <issue id="2021-47281" tracker="cve" />
  <issue id="2021-47332" tracker="cve" />
  <issue id="2021-47381" tracker="cve" />
  <issue id="2021-47502" tracker="cve" />
  <issue id="2021-47404" tracker="cve" />
  <issue id="2022-20132" tracker="cve" />
  <issue id="2021-47522" tracker="cve" />
  <issue id="2021-47405" tracker="cve" />
  <issue id="2021-47523" tracker="cve" />
  <issue id="2021-47485" tracker="cve" />
  <issue id="2021-47104" tracker="cve" />
  <issue id="2021-43056" tracker="cve" />
  <issue id="2021-47465" tracker="cve" />
  <issue id="2021-47341" tracker="cve" />
  <issue id="2021-47230" tracker="cve" />
  <issue id="2021-47442" tracker="cve" />
  <issue id="2021-47443" tracker="cve" />
  <issue id="2021-47259" tracker="cve" />
  <issue id="2021-47265" tracker="cve" />
  <issue id="2023-2176" tracker="cve" />
  <issue id="2021-47391" tracker="cve" />
  <issue id="2021-47392" tracker="cve" />
  <issue id="2021-39698" tracker="cve" />
  <issue id="2021-47505" tracker="cve" />
  <issue id="2021-47464" tracker="cve" />
  <issue id="2021-47375" tracker="cve" />
  <issue id="2021-47426" tracker="cve" />
  <issue id="2021-47456" tracker="cve" />
  <issue id="2021-47521" tracker="cve" />
  <issue id="2021-47494" tracker="cve" />
  <issue id="2021-47307" tracker="cve" />
  <issue id="2021-47387" tracker="cve" />
  <issue id="2021-47498" tracker="cve" />
  <issue id="2021-47305" tracker="cve" />
  <issue id="2021-47280" tracker="cve" />
  <issue id="2021-47348" tracker="cve" />
  <issue id="2021-47253" tracker="cve" />
  <issue id="2021-47431" tracker="cve" />
  <issue id="2021-47444" tracker="cve" />
  <issue id="2021-47445" tracker="cve" />
  <issue id="2021-47535" tracker="cve" />
  <issue id="2020-36788" tracker="cve" />
  <issue id="2021-47423" tracker="cve" />
  <issue id="2021-47422" tracker="cve" />
  <issue id="2022-48710" tracker="cve" />
  <issue id="2021-47354" tracker="cve" />
  <issue id="2021-47241" tracker="cve" />
  <issue id="2021-47338" tracker="cve" />
  <issue id="2021-47276" tracker="cve" />
  <issue id="2021-47263" tracker="cve" />
  <issue id="2021-47393" tracker="cve" />
  <issue id="2021-47425" tracker="cve" />
  <issue id="2021-47501" tracker="cve" />
  <issue id="2021-47424" tracker="cve" />
  <issue id="2021-47563" tracker="cve" />
  <issue id="2021-47562" tracker="cve" />
  <issue id="2021-47301" tracker="cve" />
  <issue id="2021-47302" tracker="cve" />
  <issue id="2021-47499" tracker="cve" />
  <issue id="2021-47468" tracker="cve" />
  <issue id="2021-47284" tracker="cve" />
  <issue id="2021-47478" tracker="cve" />
  <issue id="2021-47399" tracker="cve" />
  <issue id="2021-47340" tracker="cve" />
  <issue id="2021-47356" tracker="cve" />
  <issue id="2021-47388" tracker="cve" />
  <issue id="2021-47396" tracker="cve" />
  <issue id="2021-47395" tracker="cve" />
  <issue id="2021-47344" tracker="cve" />
  <issue id="2021-47333" tracker="cve" />
  <issue id="2021-47334" tracker="cve" />
  <issue id="2021-47441" tracker="cve" />
  <issue id="2021-47540" tracker="cve" />
  <issue id="2021-47482" tracker="cve" />
  <issue id="2021-47235" tracker="cve" />
  <issue id="2022-1195" tracker="cve" />
  <issue id="2021-47237" tracker="cve" />
  <issue id="2021-47541" tracker="cve" />
  <issue id="2021-47285" tracker="cve" />
  <issue id="2021-47542" tracker="cve" />
  <issue id="2021-47512" tracker="cve" />
  <issue id="2021-47557" tracker="cve" />
  <issue id="2021-47536" tracker="cve" />
  <issue id="2021-47451" tracker="cve" />
  <issue id="2021-47518" tracker="cve" />
  <issue id="2021-47516" tracker="cve" />
  <issue id="2021-47320" tracker="cve" />
  <issue id="2021-47507" tracker="cve" />
  <issue id="2021-47506" tracker="cve" />
  <issue id="2021-47460" tracker="cve" />
  <issue id="2021-47458" tracker="cve" />
  <issue id="2021-47416" tracker="cve" />
  <issue id="2021-47428" tracker="cve" />
  <issue id="2021-47350" tracker="cve" />
  <issue id="2021-47483" tracker="cve" />
  <issue id="2021-47538" tracker="cve" />
  <issue id="2022-48636" tracker="cve" />
  <issue id="2021-47369" tracker="cve" />
  <issue id="2021-47382" tracker="cve" />
  <issue id="2021-47549" tracker="cve" />
  <issue id="2021-47337" tracker="cve" />
  <issue id="2021-47258" tracker="cve" />
  <issue id="2021-47480" tracker="cve" />
  <issue id="2021-47192" tracker="cve" />
  <issue id="2021-47308" tracker="cve" />
  <issue id="2021-47329" tracker="cve" />
  <issue id="2021-47565" tracker="cve" />
  <issue id="2021-47503" tracker="cve" />
  <issue id="2021-47473" tracker="cve" />
  <issue id="2021-47527" tracker="cve" />
  <issue id="2021-47274" tracker="cve" />
  <issue id="2023-52880" tracker="cve" />
  <issue id="2021-47330" tracker="cve" />
  <issue id="2021-47353" tracker="cve" />
  <issue id="2021-47413" tracker="cve" />
  <issue id="2021-47409" tracker="cve" />
  <issue id="2021-47269" tracker="cve" />
  <issue id="2021-47267" tracker="cve" />
  <issue id="2021-47270" tracker="cve" />
  <issue id="2021-47436" tracker="cve" />
  <issue id="2021-47495" tracker="cve" />
  <issue id="2021-47321" tracker="cve" />
  <issue id="2021-47324" tracker="cve" />
  <issue id="2021-47323" tracker="cve" />
  <issue id="2021-47347" tracker="cve" />
  <issue id="2021-47227" tracker="cve" />
  <issue id="2021-47434" tracker="cve" />
  <issue id="2023-0160" tracker="cve" />
  <issue id="2024-35895" tracker="cve" />
  <issue id="2023-52591" tracker="cve" />
  <issue id="2024-35914" tracker="cve" />
  <issue id="2023-47233" tracker="cve" />
  <issue id="2024-35811" tracker="cve" />
  <issue id="2021-47296" tracker="cve" />
  <issue id="2021-47260" tracker="cve" />
  <issue id="2021-47229" tracker="cve" />
  <issue id="2021-47252" tracker="cve" />
  <issue id="2021-47231" tracker="cve" />
  <issue id="2021-47255" tracker="cve" />
  <issue id="2021-47288" tracker="cve" />
  <issue id="2021-47315" tracker="cve" />
  <issue id="2021-47314" tracker="cve" />
  <issue id="2021-47236" tracker="cve" />
  <issue id="2021-47246" tracker="cve" />
  <issue id="2021-3743" tracker="cve" />
  <issue id="2021-47240" tracker="cve" />
  <issue id="2021-47239" tracker="cve" />
  <issue id="2021-47220" tracker="cve" />
  <issue id="2024-26929" tracker="cve" />
  <issue id="2024-26930" tracker="cve" />
  <issue id="2024-26643" tracker="cve" />
  <issue id="2024-26925" tracker="cve" />
  <issue id="2024-26581" tracker="cve" />
  <issue id="2023-6531" tracker="cve" />
  <issue id="2023-52654" tracker="cve" />
  <issue id="2023-52581" tracker="cve" />
  <issue id="2023-52433" tracker="cve" />
  <issue id="2022-48704" tracker="cve" />
  <issue id="2024-26921" tracker="cve" />
  <issue id="2021-47378" tracker="cve" />
  <issue id="2021-47496" tracker="cve" />
  <issue id="2021-47402" tracker="cve" />
  <issue id="2022-48673" tracker="cve" />
  <issue id="2023-52871" tracker="cve" />
  <issue id="2024-26828" tracker="cve" />
  <issue id="2021-47497" tracker="cve" />
  <issue id="2021-47500" tracker="cve" />
  <issue id="2024-27413" tracker="cve" />
  <issue id="2021-47383" tracker="cve" />
  <issue id="2021-47511" tracker="cve" />
  <issue id="2023-52840" tracker="cve" />
  <issue id="2021-47261" tracker="cve" />
  <issue id="2021-47254" tracker="cve" />
  <issue id="2024-27398" tracker="cve" />
  <issue id="2023-52655" tracker="cve" />
  <issue id="2023-4244" tracker="cve" />
  <issue id="2023-424" tracker="cve" />
  <issue id="2023-1829" tracker="cve" />
  <issue id="2023-52686" tracker="cve" />
  <category>security</category>
  <rating>important</rating>
  <packager>vliaskovitis</packager>
  <reboot_needed/>
  <description>
The SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security bugfixes.

The following security bugs were fixed:

- CVE-2021-47378: Destroy cm id before destroy qp to avoid use after free (bsc#1225201).
- CVE-2021-47496: Fix flipped sign in tls_err_abort() calls (bsc#1225354)
- CVE-2021-47402: Protect fl_walk() with rcu (bsc#1225301)
- CVE-2022-48673: kABI workarounds for struct smc_link (bsc#1223934).
- CVE-2023-52871: Handle a second device without data corruption (bsc#1225534)
- CVE-2024-26828: Fix underflow in parse_server_interfaces() (bsc#1223084).
- CVE-2021-47497: Fixed shift-out-of-bound (UBSAN) with byte size cells (bsc#1225355).
- CVE-2021-47500: Fixed trigger reference couting (bsc#1225360).
- CVE-2024-27413: Fix incorrect allocation size (bsc#1224438).
- CVE-2021-47383: Fiedx out-of-bound vmalloc access in imageblit (bsc#1225208).
- CVE-2021-47511: Fixed negative period/buffer sizes (bsc#1225411).
- CVE-2023-52840: Fix use after free in rmi_unregister_function() (bsc#1224928).
- CVE-2021-47261: Fix initializing CQ fragments buffer (bsc#1224954)
- CVE-2021-47254: Fix use-after-free in gfs2_glock_shrink_scan (bsc#1224888).
- CVE-2024-27398: Fixed use-after-free bugs caused by sco_sock_timeout (bsc#1224174).
- CVE-2024-26921: Preserve kabi for sk_buff (bsc#1223138).
- CVE-2023-52655: Check packet for fixup for true limit (bsc#1217169).
- CVE-2023-4244: Fixed a use-after-free in the nf_tables component, which could be exploited to achieve local privilege escalation (bsc#1215420).
- CVE-2023-4244: Fixed a use-after-free in the nf_tables component, which could be exploited to achieve local privilege escalation (bsc#1215420).
- CVE-2023-1829: Fixed a use-after-free vulnerability in the control index filter (tcindex) (bsc#1210335).
- CVE-2023-52686: Fix a null pointer in opal_event_init() (bsc#1065729).

The following non-security bugs were fixed:

- af_unix: annote lockless accesses to unix_tot_inflight &amp; gc_in_progress (bsc#1223384).
- af_unix: Do not use atomic ops for unix_sk(sk)->inflight (bsc#1223384).
- af_unix: Replace BUG_ON() with WARN_ON_ONCE() (bsc#1223384).
- btrfs: do not start relocation until in progress drops are done (bsc#1222251).
- btrfs: do not start relocation until in progress drops are done (bsc#1222251).
- cifs: add missing spinlock around tcon refcount (bsc#1213476).
- cifs: avoid dup prefix path in dfs_get_automount_devname() (bsc#1213476).
- cifs: avoid race conditions with parallel reconnects (bsc#1213476).
- cifs: avoid re-lookups in dfs_cache_find() (bsc#1213476).
- cifs: avoid use of global locks for high contention data (bsc#1213476).
- cifs: check only tcon status on tcon related functions (bsc#1213476).
- cifs: do all necessary checks for credits within or before locking (bsc#1213476).
- cifs: do not block in dfs_cache_noreq_update_tgthint() (bsc#1213476).
- cifs: do not refresh cached referrals from unactive mounts (bsc#1213476).
- cifs: do not take exclusive lock for updating target hints (bsc#1213476).
- cifs: fix confusing debug message (bsc#1213476).
- cifs: fix missing unload_nls() in smb2_reconnect() (bsc#1213476).
- cifs: fix potential deadlock in cache_refresh_path() (bsc#1213476).
- cifs: fix refresh of cached referrals (bsc#1213476).
- cifs: fix return of uninitialized rc in dfs_cache_update_tgthint() (bsc#1213476).
- cifs: fix source pathname comparison of dfs supers (bsc#1213476).
- cifs: fix status checks in cifs_tree_connect (bsc#1213476).
- cifs: fix use-after-free bug in refresh_cache_worker() (bsc#1213476).
- cifs: get rid of dns resolve worker (bsc#1213476).
- cifs: get rid of mount options string parsing (bsc#1213476).
- cifs: handle cache lookup errors different than -ENOENT (bsc#1213476).
- cifs: ignore ipc reconnect failures during dfs failover (bsc#1213476).
- cifs: match even the scope id for ipv6 addresses (bsc#1213476).
- cifs: optimize reconnect of nested links (bsc#1213476).
- cifs: prevent data race in smb2_reconnect() (bsc#1213476).
- cifs: refresh root referrals (bsc#1213476).
- cifs: remove duplicate code in __refresh_tcon() (bsc#1213476).
- cifs: remove unused function (bsc#1213476).
- cifs: remove unused smb3_fs_context::mount_options (bsc#1213476).
- cifs: return DFS root session id in DebugData (bsc#1213476).
- cifs: reuse cifs_match_ipaddr for comparison of dstaddr too (bsc#1213476).
- cifs: set correct ipc status after initial tree connect (bsc#1213476).
- cifs: set correct status of tcon ipc when reconnecting (bsc#1213476).
- cifs: set correct tcon status after initial tree connect (bsc#1213476).
- cifs: set DFS root session in cifs_get_smb_ses() (bsc#1213476).
- cifs: set resolved ip in sockaddr (bsc#1213476).
- cifs: share dfs connections and supers (bsc#1213476).
- cifs: split out ses and tcon retrieval from mount_get_conns() (bsc#1213476).
- cifs: use fs_context for automounts (bsc#1213476).
- cifs: use origin fullpath for automounts (bsc#1213476).
- cifs: use tcon allocation functions even for dummy tcon (bsc#1213476).
- netfilter: nf_tables: defer gc run if previous batch is still pending (git-fixes).
- netfilter: nf_tables: fix GC transaction races with netns and netlink event exit path (git-fixes).
- netfilter: nf_tables: fix kdoc warnings after gc rework (git-fixes).
- netfilter: nf_tables: fix memleak when more than 255 elements expired (git-fixes).
- netfilter: nf_tables: GC transaction race with abort path (git-fixes).
- netfilter: nf_tables: GC transaction race with netns dismantle (git-fixes).
- netfilter: nf_tables: mark newset as dead on transaction abort (git-fixes).
- netfilter: nf_tables: mark set as dead when unbinding anonymous set with timeout (git-fixes).
- netfilter: nf_tables: nft_set_rbtree: fix spurious insertion failure (git-fixes).
- netfilter: nf_tables: release mutex after nft_gc_seq_end from abort path (git-fixes).
- netfilter: nf_tables: skip dead set elements in netlink dump (git-fixes).
- netfilter: nf_tables: use correct lock to protect gc_list (git-fixes).
- netfilter: nft_set_hash: try later when GC hits EAGAIN on iteration (git-fixes).
- netfilter: nft_set_rbtree: Add missing expired checks (git-fixes).
- netfilter: nft_set_rbtree: bogus lookup/get on consecutive elements in named sets (git-fixes).
- netfilter: nft_set_rbtree: Detect partial overlap with start endpoint match (git-fixes).
- netfilter: nft_set_rbtree: Detect partial overlaps on insertion (git-fixes).
- netfilter: nft_set_rbtree: Do not account for expired elements on insertion (git-fixes).
- netfilter: nft_set_rbtree: Drop spurious condition for overlap detection on insertion (git-fixes).
- netfilter: nft_set_rbtree: fix null deref on element insertion (git-fixes).
- netfilter: nft_set_rbtree: fix overlap expiration walk (git-fixes).
- netfilter: nft_set_rbtree: Handle outcomes of tree rotations in overlap detection (git-fixes).
- netfilter: nft_set_rbtree: Introduce and use nft_rbtree_interval_start() (git-fixes).
- netfilter: nft_set_rbtree: overlap detection with element re-addition after deletion (git-fixes).
- netfilter: nft_set_rbtree: skip elements in transaction from garbage collection (git-fixes).
- netfilter: nft_set_rbtree: skip end interval element from gc (git-fixes).
- netfilter: nft_set_rbtree: skip sync GC for new elements in this transaction (git-fixes).
- netfilter: nft_set_rbtree: Switch to node list walk for overlap detection (git-fixes).
- netfilter: nft_set_rbtree: use read spinlock to avoid datapath contention (git-fixes).
- NFC: nxp: add NXP1002 (bsc#1185589).
- PCI: rpaphp: Add MODULE_DESCRIPTION (bsc#1176869 ltc#188243).
- smb: client: fix dfs link mount against w2k8 (git-fixes).
- smb: client: fix null auth (bsc#1213476).
- smb: client: set correct id, uid and cruid for multiuser automounts (git-fixes).
- x86/xen: Drop USERGS_SYSRET64 paravirt call (git-fixes).
</description>
<summary>Security update for the Linux Kernel</summary>
</patchinfo>
openSUSE Build Service is sponsored by