File _patchinfo of Package patchinfo.34192

<patchinfo incident="34192">
  <issue id="1065729" tracker="bnc">[trackerbug] 4.12 powerpc base kernel fixes</issue>
  <issue id="1174585" tracker="bnc">kernel lock up on IBS worker with 15-SP2</issue>
  <issue id="1190569" tracker="bnc">[trackerbug] 15 SP4 nvme subsystem update</issue>
  <issue id="1191949" tracker="bnc">VUL-1: CVE-2021-42327: kernel-source: dp_link_settings_write in drivers/gpu/drm/amd/display/amdgpu_dm/amdgpu_dm_debugfs.c</issue>
  <issue id="1192107" tracker="bnc">VUL-0: CVE-2021-43056: kernel-source: powerpc: KVM guest can trigger host crash on Power8</issue>
  <issue id="1193983" tracker="bnc">VUL-0: CVE-2021-4148: kernel-source-rt, kernel-source, kernel-source-azure: Improper implementation of block_invalidatepage() allows users to crash the kernel</issue>
  <issue id="1194288" tracker="bnc">[EAR - NOT FOR USA Citizens] PTF request for libfreebl3 to fix CVE-2021-43527 on sles12-sp2-ltss on x86_64 flavor ref:_00D1igLOd._5001io9v9G:ref</issue>
  <issue id="1194869" tracker="bnc">[TRACKERBUG] 5.14 powerpc base kernel fixes</issue>
  <issue id="1196869" tracker="bnc">cgroup/cpuset: Fix a race between cpuset_attach() and cpu hotplug</issue>
  <issue id="1196956" tracker="bnc">VUL-0: CVE-2021-39698:  kernel-source-rt,kernel-source-azure,kernel-source: use-after-free due to missing POLLFREE handling in aio</issue>
  <issue id="1197915" tracker="bnc">btrfs: backport, from upstream, several fsync related performance patches and bug fixes</issue>
  <issue id="1200313" tracker="bnc">[NetApp SLES15 SP4 Bug]: Host crash at nvme_tcp_init_iter() with header digest enabled</issue>
  <issue id="1201308" tracker="bnc">HP Z2 G8 Workstation:  supportconfig reboots on systool command</issue>
  <issue id="1201489" tracker="bnc">[NetApp SLES15 SP4 Bug]: Host crash at crypto_ahash_digest() during NVMe re-auth</issue>
  <issue id="1208149" tracker="bnc">backport commit 462a8e08e0e6 ("Fix page corruption caused by racy check in __free_pages")</issue>
  <issue id="1209657" tracker="bnc">VUL-0: CVE-2023-0160: kernel-source,kernel-source-azure,kernel-source-rt: possibility of deadlock in libbpf function sock_hash_delete_elem()</issue>
  <issue id="1209799" tracker="bnc">sched/psi: Fix use-after-free in ep_remove_wait_queue()</issue>
  <issue id="1209834" tracker="bnc">Partner-L3: An upgrade from SLES 15 sp3 to SLES 15 sp4 on ppc64le machines provoked a sudden loss of paths to LUN-s.</issue>
  <issue id="1210335" tracker="bnc">VUL-0: CVE-2023-1829: kernel: Linux kernel: Vulnerabilities in the tcindex classifier</issue>
  <issue id="1211592" tracker="bnc">VUL-0: CVE-2023-2860: kernel-source-azure,kernel-source,kernel-source-rt: Linux Kernel IPv6 Segment Routing Out-Of-Bounds Read Information Disclosure Vulnerability</issue>
  <issue id="1213863" tracker="bnc">s390/decompressor: specify __decompress() buf len to avoid overflow</issue>
  <issue id="1216702" tracker="bnc">VUL-0: CVE-2023-47233: kernel: Use after Free bug in brcmf_cfg80211_detach</issue>
  <issue id="1217169" tracker="bnc">VUL-0: CVE-2023-52655: kernel: malicious USB device impersonating an aqc111 device can make the kernel overstep a buffer</issue>
  <issue id="1217515" tracker="bnc">s390/dasd: protect device queue against concurrent access</issue>
  <issue id="1218447" tracker="bnc">VUL-0: CVE-2023-6531: kernel: GC's deletion of an SKB races with unix_stream_read_generic()  leading to UAF</issue>
  <issue id="1218917" tracker="bnc">VUL-0: CVE-2024-0639: kernel: potential deadlock on &amp;net-&gt;sctp.addr_wq_lock leading to DOS</issue>
  <issue id="1220492" tracker="bnc">SLES15SP6 - kdump is failing over NFS configured over HNV device with IOMMU call traces</issue>
  <issue id="1220783" tracker="bnc">synth uevent: /devices/vio: failed to send uevent - ref:_00D1igLOd._500Tr56lz5:ref</issue>
  <issue id="1221044" tracker="bnc">VUL-0: CVE-2023-52591: kernel: reiserfs: potential filesystem corruption on directory rename</issue>
  <issue id="1221645" tracker="bnc">SLES15 SP6 - [P10] - LPAR crashes and hangs on running ksefltest powerpc/mce/inject-ra-err with parameter "percpu_alloc=page" enabled</issue>
  <issue id="1221958" tracker="bnc">L3: Checksum errors on SCTP traffic through IPVS  [ref:_00D1igLOd._500Tr7dsRC:ref]</issue>
  <issue id="1222011" tracker="bnc">[Regression] SLES15SP6:[6.4.0-150600.9] LPAR reboot crashes the kernel after PCI injection (everest/1060_023/shinner)</issue>
  <issue id="1222559" tracker="bnc">VUL-0: CVE-2024-26739: kernel: net/sched: act_mirred: don't override retval if we already lost the skb</issue>
  <issue id="1222619" tracker="bnc">VUL-0: CVE-2023-52880: kernel: tty/n_gsm: 0day with exploit dropped on Github</issue>
  <issue id="1222721" tracker="bnc">VUL-0: CVE-2024-26764: kernel: fs/aio: WARNING in kiocb_set_cancel_fn</issue>
  <issue id="1222976" tracker="bnc">VUL-0: CVE-2024-26840: kernel: cachefiles: memory leak in cachefiles_add_cache()</issue>
  <issue id="1223057" tracker="bnc">VUL-0: CVE-2024-26852: kernel: net/ipv6: UAF in ip6_route_mpath_notify()</issue>
  <issue id="1223084" tracker="bnc">VUL-0: CVE-2024-26828: kernel: cifs: underflow in parse_server_interfaces()</issue>
  <issue id="1223111" tracker="bnc">VUL-0: CVE-2024-26862: kernel: packet: data-races in ignore_outgoing</issue>
  <issue id="1223138" tracker="bnc">VUL-0: CVE-2024-26921: kernel: inet: inet_defrag: prevent sk release while still in use</issue>
  <issue id="1223191" tracker="bnc">powerpc: Avoid nmi_enter/nmi_exit in real mode interrupt</issue>
  <issue id="1223384" tracker="bnc">VUL-0: CVE-2024-26923: kernel: af_unix: fix garbage collector racing against connect()</issue>
  <issue id="1223390" tracker="bnc">VUL-0: CVE-2024-26925: kernel: netfilter: nf_tables: release mutex after nft_gc_seq_end from abort path</issue>
  <issue id="1223481" tracker="bnc">VUL-0: CVE-2022-48632: kernel: i2c: mlxbf: prevent stack overflow in mlxbf_i2c_smbus_start_transaction()</issue>
  <issue id="1223501" tracker="bnc">VUL-0: CVE-2022-48634: kernel: drm/gma500: Fix BUG: sleeping function called from invalid context errors</issue>
  <issue id="1223505" tracker="bnc">VUL-0: CVE-2022-48662: kernel: drm/i915/gem: GPF in i915_perf_open_ioctl</issue>
  <issue id="1223512" tracker="bnc">VUL-0: CVE-2022-48636: kernel: s390/dasd: fix Oops in dasd_alias_get_start_dev due to missing pavgroup</issue>
  <issue id="1223520" tracker="bnc">VUL-0: CVE-2022-48652: kernel: ice: Fix crash by keep old cfg when update TCs more than queues</issue>
  <issue id="1223532" tracker="bnc">VUL-0: CVE-2024-26928: kernel: smb: client: fix potential UAF in cifs_debug_files_proc_show()</issue>
  <issue id="1223626" tracker="bnc">VUL-0: CVE-2024-26930: kernel: scsi: qla2xxx: double free of the ha-&gt;vp_map pointer</issue>
  <issue id="1223715" tracker="bnc">VUL-0: CVE-2024-26929: kernel: scsi: qla2xxx: double free of fcport</issue>
  <issue id="1223894" tracker="bnc">VUL-0: CVE-2022-48675: kernel: IB/core: fix a nested dead lock as part of ODP flow</issue>
  <issue id="1223921" tracker="bnc">VUL-0: CVE-2022-48701: kernel: ALSA: usb-audio: out-of-bounds bug in __snd_usb_parse_audio_interface()</issue>
  <issue id="1223922" tracker="bnc">VUL-0: CVE-2022-48697: kernel: nvmet: fix a use-after-free</issue>
  <issue id="1223923" tracker="bnc">VUL-0: CVE-2022-48702: kernel: ALSA: emu10k1: out of bounds access in snd_emu10k1_pcm_channel_alloc()</issue>
  <issue id="1223924" tracker="bnc">VUL-0: CVE-2022-48703: kernel: thermal/int340x_thermal: NULL point dereference in  data_vault_read() when accessing the 0x10</issue>
  <issue id="1223929" tracker="bnc">VUL-0: CVE-2022-48671: kernel: cgroup: Add missing cpus_read_lock() to cgroup_attach_task_all()</issue>
  <issue id="1223931" tracker="bnc">VUL-0: CVE-2022-48672: kernel: of: fdt: fix off-by-one error in unflatten_dt_nodes()</issue>
  <issue id="1223932" tracker="bnc">VUL-0: CVE-2022-48704: kernel: drm/radeon: panic on invalid kernel paging request</issue>
  <issue id="1223934" tracker="bnc">VUL-0: CVE-2022-48673: kernel: net/smc: Fix possible access to freed memory in link clear</issue>
  <issue id="1223941" tracker="bnc">VUL-0: CVE-2022-48695: kernel: scsi: mpt3sas: Fix use-after-free warning</issue>
  <issue id="1223948" tracker="bnc">VUL-0: CVE-2022-48686: kernel: nvme-tcp: fix UAF when detecting digest errors</issue>
  <issue id="1223952" tracker="bnc">VUL-0: CVE-2022-48687: kernel: ipv6: sr: fix out-of-bounds read when setting HMAC data.</issue>
  <issue id="1223953" tracker="bnc">VUL-0: CVE-2022-48688: kernel: i40e: fix kernel crash during module removal</issue>
  <issue id="1223957" tracker="bnc">VUL-0: CVE-2022-48700: kernel: vfio/type1: unpin zero pages</issue>
  <issue id="1223962" tracker="bnc">VUL-0: CVE-2022-48692: kernel: RDMA/srp: Set scmnd-&gt;result only when scmnd is not NULL</issue>
  <issue id="1223963" tracker="bnc">VUL-0: CVE-2022-48693: kernel: soc: brcmstb: pm-arm: Fix refcount leak and __iomem leak bugs</issue>
  <issue id="1223964" tracker="bnc">VUL-0: CVE-2022-48694: kernel: RDMA/irdma: Fix drain SQ hang with no completion</issue>
  <issue id="1223996" tracker="bnc">VUL-0: CVE-2022-48699: kernel: sched/debug: fix dentry leak in update_sched_domain_debugfs</issue>
  <issue id="1224085" tracker="bnc">L3-Question: Request for addition of patch "filemap: Remove use of wait bookmarks" to 15 SP4 and 15 SP5</issue>
  <issue id="1224099" tracker="bnc">VUL-0: CVE-2023-52654: kernel: io_uring/af_unix: disable sending io_uring over sockets</issue>
  <issue id="1224137" tracker="bnc">IDPF needs a longer watchdog timeout</issue>
  <issue id="1224174" tracker="bnc">VUL-0: CVE-2024-27398: kernel: Bluetooth: fix use-after-free bugs caused by sco_sock_timeout</issue>
  <issue id="1224438" tracker="bnc">VUL-0: CVE-2024-27413: kernel: efi/capsule-loader: fix incorrect allocation size</issue>
  <issue id="1224482" tracker="bnc">VUL-0: CVE-2024-35914: kernel: nfsd: Fix error cleanup path in nfsd_rename()</issue>
  <issue id="1224488" tracker="bnc">VUL-0: CVE-2024-35905: kernel: bpf: Protect against int overflow for stack access size</issue>
  <issue id="1224494" tracker="bnc">VUL-0: CVE-2024-35904: kernel: selinux: avoid dereference of garbage after mount failure</issue>
  <issue id="1224511" tracker="bnc">VUL-0: CVE-2024-35895: kernel: bpf, sockmap: Prevent lock inversion deadlock in map delete elem</issue>
  <issue id="1224592" tracker="bnc">VUL-0: CVE-2024-35811: kernel: wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach</issue>
  <issue id="1224611" tracker="bnc">VUL-0: CVE-2023-52690: kernel: powerpc/powernv: Add a null pointer check to scom_debug_init_one()</issue>
  <issue id="1224664" tracker="bnc">VUL-0: CVE-2024-35867: kernel: smb: client: fix potential UAF in cifs_stats_proc_show()</issue>
  <issue id="1224678" tracker="bnc">VUL-0: CVE-2024-35868: kernel: smb: client: fix potential UAF in cifs_stats_proc_write()</issue>
  <issue id="1224682" tracker="bnc">VUL-0: CVE-2023-52686: kernel: powerpc/powernv: Add a null pointer check in opal_event_init()</issue>
  <issue id="1224685" tracker="bnc">VUL-0: CVE-2024-35815: kernel: fs/aio: Check IOCB_AIO_RW before the struct aio_kiocb conversion</issue>
  <issue id="1224730" tracker="bnc">VUL-0: CVE-2023-52676: kernel: bpf: Guard stack limits against 32bit overflow</issue>
  <issue id="1224736" tracker="bnc">VUL-0: CVE-2024-35817: kernel: drm/amdgpu: amdgpu_ttm_gart_bind set gtt bound flag</issue>
  <issue id="1224763" tracker="bnc">VUL-0: CVE-2024-35863: kernel: smb: client: fix potential UAF in is_valid_oplock_break()</issue>
  <issue id="1224816" tracker="bnc">VUL-0: CVE-2020-36788: kernel: drm/nouveau: avoid a use-after-free when BO init fails</issue>
  <issue id="1224895" tracker="bnc">VUL-0: CVE-2021-47365: kernel: afs: Fix page leak</issue>
  <issue id="1224898" tracker="bnc">VUL-0: CVE-2021-47492: kernel: mm, thp: bail out early in collapse_file for writeback page</issue>
  <issue id="1224900" tracker="bnc">VUL-0: CVE-2021-47491: kernel: mm: khugepaged: skip huge page collapse for special files</issue>
  <issue id="1224901" tracker="bnc">VUL-0: CVE-2021-47489: kernel: drm/amdgpu: Fix even more out of bound writes from debugfs</issue>
  <issue id="1224902" tracker="bnc">VUL-0: CVE-2021-47488: kernel: cgroup: Fix memory leak caused by missing cgroup_bpf_offline</issue>
  <issue id="1224903" tracker="bnc">VUL-0: CVE-2021-47486: kernel: riscv, bpf: Fix potential NULL dereference</issue>
  <issue id="1224904" tracker="bnc">VUL-0: CVE-2021-47485: kernel: IB/qib: Protect from buffer overflow in struct qib_user_sdma_pkt fields</issue>
  <issue id="1224905" tracker="bnc">VUL-0: CVE-2021-47484: kernel: octeontx2-af: Fix possible null pointer dereference</issue>
  <issue id="1224907" tracker="bnc">VUL-0: CVE-2021-47483: kernel: regmap: Fix possible double-free in regcache_rbtree_exit()</issue>
  <issue id="1224909" tracker="bnc">VUL-0: CVE-2021-47482: kernel: net: batman-adv: fix error handling</issue>
  <issue id="1224910" tracker="bnc">VUL-0: CVE-2021-47481: kernel: RDMA/mlx5: Initialize the ODP xarray when creating an ODP MR</issue>
  <issue id="1224911" tracker="bnc">VUL-0: CVE-2021-47479: kernel: staging: rtl8712: fix use-after-free in rtl8712_dl_fw</issue>
  <issue id="1224912" tracker="bnc">VUL-0: CVE-2021-47477: kernel: comedi: dt9812: fix DMA buffers on stack</issue>
  <issue id="1224913" tracker="bnc">VUL-0: CVE-2021-47476: kernel: comedi: ni_usb6501: fix NULL-deref in command paths</issue>
  <issue id="1224914" tracker="bnc">VUL-0: CVE-2021-47475: kernel: comedi: vmk80xx: fix transfer-buffer overflows</issue>
  <issue id="1224915" tracker="bnc">VUL-0: CVE-2021-47474: kernel: comedi: vmk80xx: fix bulk-buffer overflow</issue>
  <issue id="1224920" tracker="bnc">VUL-0: CVE-2021-47358: kernel: staging: greybus: uart: fix tty use after free</issue>
  <issue id="1224928" tracker="bnc">VUL-0: CVE-2023-52840: kernel: Input: synaptics-rmi4 - fix use after free in rmi_unregister_function()</issue>
  <issue id="1224931" tracker="bnc">VUL-0: CVE-2023-52747: kernel: IB/hfi1: Restore allocated resources on failed copyout</issue>
  <issue id="1224932" tracker="bnc">VUL-0: CVE-2023-52856: kernel: drm/bridge: lt8912b: Fix crash on bridge detach</issue>
  <issue id="1224937" tracker="bnc">VUL-0: CVE-2023-52870: kernel: clk: mediatek: clk-mt6765: Add check for mtk_alloc_clk_data</issue>
  <issue id="1224942" tracker="bnc">VUL-0: CVE-2022-48708: kernel: pinctrl: single: fix potential NULL dereference</issue>
  <issue id="1224944" tracker="bnc">VUL-0: CVE-2023-52877: kernel: usb: typec: tcpm: Fix NULL pointer dereference in tcpm_pd_svdm()</issue>
  <issue id="1224945" tracker="bnc">VUL-0: CVE-2023-52702: kernel: net: openvswitch: fix possible memory leak in ovs_meter_cmd_set()</issue>
  <issue id="1224947" tracker="bnc">VUL-0: CVE-2023-52798: kernel: wifi: ath11k: fix dfs radar event locking</issue>
  <issue id="1224956" tracker="bnc">VUL-0: CVE-2023-52730: kernel: mmc: sdio: fix possible resource leaks in some error paths</issue>
  <issue id="1224988" tracker="bnc">VUL-0: CVE-2023-52853: kernel: hid: cp2112: Fix duplicate workqueue initialization</issue>
  <issue id="1225000" tracker="bnc">VUL-0: CVE-2023-52878: kernel: can: dev: can_put_echo_skb(): don't crash kernel if can_priv:echo_skb is accessed out of bounds</issue>
  <issue id="1225003" tracker="bnc">VUL-0: CVE-2023-52743: kernel: ice: Do not use WQ_MEM_RECLAIM flag for workqueue</issue>
  <issue id="1225005" tracker="bnc">VUL-0: CVE-2023-52738: kernel: drm/amdgpu/fence: Fix oops due to non-matching drm_sched init/fini</issue>
  <issue id="1225009" tracker="bnc">VUL-0: CVE-2023-52867: kernel: drm/radeon: possible buffer overflow</issue>
  <issue id="1225022" tracker="bnc">VUL-0: CVE-2023-52821: kernel: drm/panel: fix a possible null pointer dereference</issue>
  <issue id="1225031" tracker="bnc">VUL-0: CVE-2023-52838: kernel: fbdev: imsttfb: fix a resource leak in probe</issue>
  <issue id="1225032" tracker="bnc">VUL-0: CVE-2023-52745: kernel: IB/IPoIB: Fix legacy IPoIB due to wrong number of queues</issue>
  <issue id="1225036" tracker="bnc">VUL-0: CVE-2023-52876: kernel: clk: mediatek: clk-mt7629-eth: Add check for mtk_alloc_clk_data</issue>
  <issue id="1225044" tracker="bnc">VUL-0: CVE-2023-52868: kernel: thermal: core: prevent potential string overflow</issue>
  <issue id="1225076" tracker="bnc">VUL-0: CVE-2023-52825: kernel: drm/amdkfd: Fix a race condition of vram buffer unref in svm code</issue>
  <issue id="1225077" tracker="bnc">VUL-0: CVE-2023-52826: kernel: drm/panel/panel-tpo-tpg110: fix a possible null pointer dereference</issue>
  <issue id="1225082" tracker="bnc">VUL-0: CVE-2021-47397: kernel: sctp: break out if skb_header_pointer returns NULL in sctp_rcv_ootb</issue>
  <issue id="1225086" tracker="bnc">VUL-0: CVE-2023-52865: kernel: clk: mediatek: clk-mt6797: Add check for mtk_alloc_clk_data</issue>
  <issue id="1225092" tracker="bnc">VUL-0: CVE-2023-52781: kernel: usb: config: fix iteration issue in 'usb_get_bos_descriptor()'</issue>
  <issue id="1225095" tracker="bnc">VUL-0: CVE-2022-48709: kernel: ice: switch: fix potential memleak in ice_add_adv_recipe()</issue>
  <issue id="1225096" tracker="bnc">VUL-0: CVE-2023-52875: kernel: clk: mediatek: clk-mt2701: Add check for mtk_alloc_clk_data</issue>
  <issue id="1225106" tracker="bnc">VUL-0: CVE-2023-52788: kernel: i915/perf: Fix NULL deref bugs with drm_dbg() calls</issue>
  <issue id="1225108" tracker="bnc">VUL-0: CVE-2023-52791: kernel: i2c: core: Run atomic i2c xfer when !preemptible</issue>
  <issue id="1225109" tracker="bnc">VUL-0: CVE-2023-52707: kernel: sched/psi: Fix use-after-free in ep_remove_wait_queue()</issue>
  <issue id="1225118" tracker="bnc">VUL-0: CVE-2023-52739: kernel: Fix page corruption caused by racy check in __free_pages</issue>
  <issue id="1225121" tracker="bnc">VUL-0: CVE-2023-52744: kernel: RDMA/irdma: Fix potential NULL-ptr-dereference</issue>
  <issue id="1225122" tracker="bnc">VUL-0: CVE-2021-47360: kernel: binder: make sure fd closes complete</issue>
  <issue id="1225123" tracker="bnc">VUL-0: CVE-2021-47367: kernel: virtio-net: fix pages leaking when building skb in big mode</issue>
  <issue id="1225125" tracker="bnc">VUL-0: CVE-2021-47390: kernel: KVM: x86: Fix stack-out-of-bounds memory access from ioapic_write_indirect()</issue>
  <issue id="1225126" tracker="bnc">VUL-0: CVE-2021-47389: kernel: KVM: SVM: fix missing sev_decommission in sev_receive_start</issue>
  <issue id="1225127" tracker="bnc">VUL-0: CVE-2021-47463: kernel: mm/secretmem: fix NULL page-&gt;mapping dereference in page_is_secretmem()</issue>
  <issue id="1225129" tracker="bnc">VUL-0: CVE-2021-47448: kernel: mptcp: fix possible stall on recvmsg()</issue>
  <issue id="1225131" tracker="bnc">VUL-0: CVE-2021-47398: kernel: RDMA/hfi1: Fix kernel pointer leak</issue>
  <issue id="1225132" tracker="bnc">VUL-0: CVE-2023-52864: kernel: platform/x86: wmi: Fix opening of char device</issue>
  <issue id="1225145" tracker="bnc">VUL-0: CVE-2021-47359: kernel: cifs: fix soft lockup during fsstress</issue>
  <issue id="1225151" tracker="bnc">VUL-0: CVE-2021-47361: kernel: mcb: fix error handling in mcb_alloc_bus()</issue>
  <issue id="1225153" tracker="bnc">VUL-0: CVE-2021-47362: kernel: drm/amd/pm: update intermediate power state for SI</issue>
  <issue id="1225156" tracker="bnc">VUL-0: CVE-2021-47363: kernel: nexthop: fix division by zero while replacing a resilient group</issue>
  <issue id="1225158" tracker="bnc">VUL-0: CVE-2021-47364: kernel: comedi: fix memory leak in compat_insnlist()</issue>
  <issue id="1225160" tracker="bnc">VUL-0: CVE-2021-47366: kernel: afs: fix corruption in reads at fpos 2G-4G from an OpenAFS server</issue>
  <issue id="1225161" tracker="bnc">VUL-0: CVE-2021-47368: kernel: enetc: fix illegal access when reading affinity_hint</issue>
  <issue id="1225164" tracker="bnc">VUL-0: CVE-2021-47369: kernel: s390/qeth: fix NULL deref in qeth_clear_working_pool_list()</issue>
  <issue id="1225167" tracker="bnc">VUL-0: CVE-2021-47371: kernel: nexthop: fix memory leaks in nexthop notification chain listeners</issue>
  <issue id="1225180" tracker="bnc">VUL-0: CVE-2023-52789: kernel: tty: vcc: Add check for kstrdup() in vcc_probe()</issue>
  <issue id="1225183" tracker="bnc">VUL-0: CVE-2021-47370: kernel: mptcp: ensure tx skbs always have the MPTCP ext</issue>
  <issue id="1225184" tracker="bnc">VUL-0: CVE-2021-47372: kernel: net: macb: fix use after free on rmmod</issue>
  <issue id="1225186" tracker="bnc">VUL-0: CVE-2021-47470: kernel: mm, slub: fix potential use-after-free in slab_debugfs_fops</issue>
  <issue id="1225187" tracker="bnc">VUL-0: CVE-2021-47471: kernel: drm: mxsfb: Fix NULL pointer dereference crash on unload</issue>
  <issue id="1225189" tracker="bnc">VUL-0: CVE-2021-47472: kernel: net: mdiobus: Fix memory leak in __mdiobus_register</issue>
  <issue id="1225190" tracker="bnc">VUL-0: CVE-2021-47373: kernel: irqchip/gic-v3-its: Fix potential VPE leak on error</issue>
  <issue id="1225191" tracker="bnc">VUL-0: CVE-2021-47374: kernel: dma-debug: prevent an error message from causing runtime problems</issue>
  <issue id="1225192" tracker="bnc">VUL-0: CVE-2021-47473: kernel: scsi: qla2xxx: Fix a memory leak in an error path of qla2x00_process_els()</issue>
  <issue id="1225193" tracker="bnc">VUL-0: CVE-2021-47375: kernel: blktrace: Fix uaf in blk_trace access after removing by sysfs</issue>
  <issue id="1225195" tracker="bnc">VUL-0: CVE-2021-47376: kernel: bpf: Add oversize check before call kvcalloc()</issue>
  <issue id="1225198" tracker="bnc">VUL-0: CVE-2021-47478: kernel: isofs: Fix out of bound access for corrupted isofs image</issue>
  <issue id="1225201" tracker="bnc">VUL-0: CVE-2021-47378: kernel: nvme-rdma: destroy cm id before destroy qp to avoid use after free</issue>
  <issue id="1225203" tracker="bnc">VUL-0: CVE-2021-47379: kernel: blk-cgroup: fix UAF by grabbing blkcg lock before destroying blkg pd</issue>
  <issue id="1225205" tracker="bnc">VUL-0: CVE-2021-47380: kernel: HID: amd_sfh: Fix potential NULL pointer dereference</issue>
  <issue id="1225206" tracker="bnc">VUL-0: CVE-2021-47381: kernel: ASoC: SOF: Fix DSP oops stack dump output contents</issue>
  <issue id="1225207" tracker="bnc">VUL-0: CVE-2021-47382: kernel: s390/qeth: fix deadlock during failing recovery</issue>
  <issue id="1225208" tracker="bnc">VUL-0: CVE-2021-47383: kernel: tty: Fix out-of-bound vmalloc access in imageblit</issue>
  <issue id="1225209" tracker="bnc">VUL-0: CVE-2021-47384: kernel: hwmon: (w83793) Fix NULL pointer dereference by removing unnecessary structure field</issue>
  <issue id="1225210" tracker="bnc">VUL-0: CVE-2021-47385: kernel: hwmon: (w83792d) Fix NULL pointer dereference by removing unnecessary structure field</issue>
  <issue id="1225214" tracker="bnc">VUL-0: CVE-2021-47388: kernel: mac80211: fix use-after-free in CCMP/GCMP RX</issue>
  <issue id="1225223" tracker="bnc">VUL-0: CVE-2021-47425: kernel: i2c: acpi: fix resource leak in reconfiguration device addition</issue>
  <issue id="1225224" tracker="bnc">VUL-0: CVE-2021-47441: kernel: mlxsw: thermal: Fix out-of-bounds memory accesses</issue>
  <issue id="1225225" tracker="bnc">VUL-0: CVE-2021-47427: kernel: scsi: iscsi: Fix iscsi_task use after free</issue>
  <issue id="1225227" tracker="bnc">VUL-0: CVE-2021-47417: kernel: libbpf: Fix memory leak in strset</issue>
  <issue id="1225228" tracker="bnc">VUL-0: CVE-2021-47430: kernel: x86/entry: Clear X86_FEATURE_SMAP when CONFIG_X86_SMAP=n</issue>
  <issue id="1225229" tracker="bnc">VUL-0: CVE-2021-47438: kernel: net/mlx5e: Fix memory leak in mlx5_core_destroy_cq() error path</issue>
  <issue id="1225230" tracker="bnc">VUL-0: CVE-2022-48710: kernel: drm/radeon: fix a possible null pointer dereference</issue>
  <issue id="1225232" tracker="bnc">VUL-0: CVE-2021-47434: kernel: xhci: Fix command ring pointer corruption while aborting a command</issue>
  <issue id="1225233" tracker="bnc">VUL-0: CVE-2021-47422: kernel: drm/nouveau/kms/nv50-: fix file release memory leak</issue>
  <issue id="1225235" tracker="bnc">VUL-0: CVE-2021-47457: kernel: can: isotp: isotp_sendmsg(): add result check for wait_event_interruptible()</issue>
  <issue id="1225236" tracker="bnc">VUL-0: CVE-2021-47408: kernel: netfilter: conntrack: serialize hash resizes and cleanups</issue>
  <issue id="1225237" tracker="bnc">VUL-0: CVE-2021-47451: kernel: netfilter: xt_IDLETIMER: fix panic that occurs when timer_type has garbage value</issue>
  <issue id="1225238" tracker="bnc">VUL-0: CVE-2021-47405: kernel: HID: usbhid: free raw_report buffers in usbhid_stop</issue>
  <issue id="1225239" tracker="bnc">VUL-0: CVE-2021-47453: kernel: ice: Avoid crash from unnecessary IDA free</issue>
  <issue id="1225240" tracker="bnc">VUL-0: CVE-2021-47446: kernel: drm/msm/a4xx: fix error handling in a4xx_gpu_init()</issue>
  <issue id="1225241" tracker="bnc">VUL-0: CVE-2021-47403: kernel: ipack: ipoctal: fix module reference leak</issue>
  <issue id="1225242" tracker="bnc">VUL-0: CVE-2021-47401: kernel: ipack: ipoctal: fix stack information leak</issue>
  <issue id="1225243" tracker="bnc">VUL-0: CVE-2021-47444: kernel: drm/edid: In connector_bad_edid() cap num_of_ext by num_blocks read</issue>
  <issue id="1225244" tracker="bnc">VUL-0: CVE-2021-47436: kernel: usb: musb: dsps: Fix the probe error path</issue>
  <issue id="1225245" tracker="bnc">VUL-0: CVE-2021-47437: kernel: iio: adis16475: fix deadlock on frequency set</issue>
  <issue id="1225246" tracker="bnc">VUL-0: CVE-2021-47439: kernel: net: dsa: microchip: Added the condition for scheduling ksz_mib_read_work</issue>
  <issue id="1225247" tracker="bnc">VUL-0: CVE-2021-47435: kernel: dm: fix mempool NULL pointer race when completing IO</issue>
  <issue id="1225248" tracker="bnc">VUL-0: CVE-2021-47440: kernel: net: encx24j600: check error in devm_regmap_init_encx24j600</issue>
  <issue id="1225249" tracker="bnc">VUL-0: CVE-2021-47461: kernel: userfaultfd: fix a race between writeprotect and exit_mmap()</issue>
  <issue id="1225250" tracker="bnc">VUL-0: CVE-2021-47462: kernel: mm/mempolicy: do not allow illegal MPOL_F_NUMA_BALANCING | MPOL_LOCAL in mbind()</issue>
  <issue id="1225251" tracker="bnc">VUL-0: CVE-2021-47460: kernel: ocfs2: fix data corruption after conversion from inline format</issue>
  <issue id="1225252" tracker="bnc">VUL-0: CVE-2021-47458: kernel: ocfs2: mount fails with buffer overflow in strlen</issue>
  <issue id="1225253" tracker="bnc">VUL-0: CVE-2021-47459: kernel: can: j1939: j1939_netdev_start(): fix UAF for rx_kref of j1939_priv</issue>
  <issue id="1225254" tracker="bnc">VUL-0: CVE-2021-47455: kernel: ptp: Fix possible memory leak in ptp_clock_register()</issue>
  <issue id="1225255" tracker="bnc">VUL-0: CVE-2021-47454: kernel: powerpc/smp: do not decrement idle task preempt count in CPU offline</issue>
  <issue id="1225256" tracker="bnc">VUL-0: CVE-2021-47456: kernel: can: peak_pci: peak_pci_remove(): fix UAF</issue>
  <issue id="1225257" tracker="bnc">VUL-0: CVE-2021-47452: kernel: netfilter: nf_tables: skip netdev events generated on netns removal</issue>
  <issue id="1225258" tracker="bnc">VUL-0: CVE-2021-47450: kernel: KVM: arm64: Fix host stage-2 PGD refcount</issue>
  <issue id="1225259" tracker="bnc">VUL-0: CVE-2021-47449: kernel: ice: fix locking for Tx timestamp tracking flush</issue>
  <issue id="1225260" tracker="bnc">VUL-0: CVE-2021-47447: kernel: drm/msm/a3xx: fix error handling in a3xx_gpu_init()</issue>
  <issue id="1225261" tracker="bnc">VUL-0: CVE-2021-47445: kernel: drm/msm: Fix null pointer dereference on pointer edp</issue>
  <issue id="1225262" tracker="bnc">VUL-0: CVE-2021-47443: kernel: NFC: digital: fix possible memory leak in digital_tg_listen_mdaa()</issue>
  <issue id="1225263" tracker="bnc">VUL-0: CVE-2021-47442: kernel: NFC: digital: fix possible memory leak in digital_in_send_sdd_req()</issue>
  <issue id="1225268" tracker="bnc">VUL-0: CVE-2021-47386: kernel: hwmon: (w83791d) Fix NULL pointer dereference by removing unnecessary structure field</issue>
  <issue id="1225301" tracker="bnc">VUL-0: CVE-2021-47402: kernel: net: sched: flower: protect fl_walk() with rcu</issue>
  <issue id="1225303" tracker="bnc">VUL-0: CVE-2021-47404: kernel: HID: betop: fix slab-out-of-bounds Write in betop_probe</issue>
  <issue id="1225304" tracker="bnc">VUL-0: CVE-2021-47406: kernel: ext4: add error checking to ext4_ext_replay_set_iblocks()</issue>
  <issue id="1225306" tracker="bnc">VUL-0: CVE-2021-47407: kernel: KVM: x86: Handle SRCU initialization failure during page track init</issue>
  <issue id="1225316" tracker="bnc">VUL-0: CVE-2021-47387: kernel: cpufreq: schedutil: Use kobject release() method to free sugov_tunables</issue>
  <issue id="1225318" tracker="bnc">VUL-0: CVE-2021-47391: kernel: RDMA/cma: Ensure rdma_addr_cancel() happens before issuing more requests</issue>
  <issue id="1225320" tracker="bnc">VUL-0: CVE-2021-47392: kernel: RDMA/cma: Fix listener leak in rdma_cma_listen_on_all() failure</issue>
  <issue id="1225321" tracker="bnc">VUL-0: CVE-2021-47393: kernel: hwmon: (mlxreg-fan) Return non-zero value when fan current state is enforced from sysfs</issue>
  <issue id="1225322" tracker="bnc">VUL-0: CVE-2021-47480: kernel: scsi: core: Put LLD module refcnt after SCSI device is released</issue>
  <issue id="1225323" tracker="bnc">VUL-0: CVE-2021-47394: kernel: netfilter: nf_tables: unlink table before deleting it</issue>
  <issue id="1225326" tracker="bnc">VUL-0: CVE-2021-47395: kernel: mac80211: limit injected vht mcs/nss in ieee80211_parse_tx_radiotap</issue>
  <issue id="1225327" tracker="bnc">VUL-0: CVE-2021-47396: kernel: mac80211-hwsim: fix late beacon hrtimer handling</issue>
  <issue id="1225328" tracker="bnc">VUL-0: CVE-2021-47399: kernel: ixgbe: Fix NULL pointer dereference in ixgbe_xdp_setup</issue>
  <issue id="1225329" tracker="bnc">VUL-0: CVE-2021-47400: kernel: net: hns3: do not allow call hns3_nic_net_open repeatedly</issue>
  <issue id="1225330" tracker="bnc">VUL-0: CVE-2021-47409: kernel: usb: dwc2: check return value after calling platform_get_resource()</issue>
  <issue id="1225331" tracker="bnc">VUL-0: CVE-2021-47410: kernel: drm/amdkfd: fix svm_migrate_fini warning</issue>
  <issue id="1225332" tracker="bnc">VUL-0: CVE-2021-47412: kernel: block: don't call rq_qos_ops-&gt;done_bio if the bio isn't tracked</issue>
  <issue id="1225333" tracker="bnc">VUL-0: CVE-2021-47413: kernel: usb: chipidea: ci_hdrc_imx: Also search for 'phys' phandle</issue>
  <issue id="1225334" tracker="bnc">VUL-0: CVE-2021-47414: kernel: riscv: Flush current cpu icache before other cpus</issue>
  <issue id="1225335" tracker="bnc">VUL-0: CVE-2021-47415: kernel: iwlwifi: mvm: Fix possible NULL dereference</issue>
  <issue id="1225336" tracker="bnc">VUL-0: CVE-2021-47416: kernel: phy: mdio: fix memory leak</issue>
  <issue id="1225337" tracker="bnc">VUL-0: CVE-2021-47418: kernel: net_sched: fix NULL deref in fifo_set_limit()</issue>
  <issue id="1225338" tracker="bnc">VUL-0: CVE-2021-47419: kernel: net/sched: sch_taprio: properly cancel timer from taprio_destroy()</issue>
  <issue id="1225339" tracker="bnc">VUL-0: CVE-2021-47420: kernel: drm/amdkfd: fix a potential ttm-&gt;sg memory leak</issue>
  <issue id="1225341" tracker="bnc">VUL-0: CVE-2021-47465: kernel: KVM: PPC: Book3S HV: fix stack handling in idle_kvm_start_guest()</issue>
  <issue id="1225342" tracker="bnc">VUL-0: CVE-2021-47466: kernel: mm, slub: fix potential memoryleak in kmem_cache_open()</issue>
  <issue id="1225344" tracker="bnc">VUL-0: CVE-2021-47467: kernel: kunit: fix reference count leak in kfree_at_end</issue>
  <issue id="1225346" tracker="bnc">VUL-0: CVE-2021-47468: kernel: isdn: mISDN: fix sleeping function called from invalid context</issue>
  <issue id="1225347" tracker="bnc">VUL-0: CVE-2021-47469: kernel: spi: fix deadlock when adding SPI controllers on SPI buses</issue>
  <issue id="1225351" tracker="bnc">VUL-0: CVE-2021-47495: kernel: usbnet: sanity check for maxpacket</issue>
  <issue id="1225353" tracker="bnc">VUL-0: CVE-2021-47421: kernel: drm/amdgpu: handle the case of pci_channel_io_frozen only in amdgpu_pci_resume</issue>
  <issue id="1225354" tracker="bnc">VUL-0: CVE-2021-47496: kernel: net/tls: fix flipped sign in tls_err_abort() calls</issue>
  <issue id="1225355" tracker="bnc">VUL-0: CVE-2021-47497: kernel: nvmem: fix shift-out-of-bound (UBSAN) with byte size cells</issue>
  <issue id="1225357" tracker="bnc">VUL-0: CVE-2021-47498: kernel: dm rq: don't queue request to blk-mq during DM suspend</issue>
  <issue id="1225358" tracker="bnc">VUL-0: CVE-2021-47499: kernel: iio: accel: kxcjk-1013: fix possible memory leak in probe and remove</issue>
  <issue id="1225360" tracker="bnc">VUL-0: CVE-2021-47500: kernel: iio: mma8452: fix trigger reference couting</issue>
  <issue id="1225361" tracker="bnc">VUL-0: CVE-2021-47501: kernel: i40e: fix NULL pointer dereference in i40e_dbg_dump_desc</issue>
  <issue id="1225366" tracker="bnc">VUL-0: CVE-2021-47423: kernel: drm/nouveau/debugfs: fix file release memory leak</issue>
  <issue id="1225367" tracker="bnc">VUL-0: CVE-2021-47424: kernel: i40e: Fix freeing of uninitialized misc IRQ vector</issue>
  <issue id="1225368" tracker="bnc">VUL-0: CVE-2021-47528: kernel: usb: cdnsp: Fix a NULL pointer dereference in cdnsp_endpoint_init()</issue>
  <issue id="1225369" tracker="bnc">VUL-0: CVE-2021-47502: kernel: ASoC: codecs: wcd934x: handle channel mappping list correctly</issue>
  <issue id="1225370" tracker="bnc">VUL-0: CVE-2021-47426: kernel: bpf, s390: Fix potential memory leak about jit_data</issue>
  <issue id="1225372" tracker="bnc">VUL-0: CVE-2021-47518: kernel: nfc: fix potential NULL pointer deref in nfc_genl_dump_ses_done</issue>
  <issue id="1225373" tracker="bnc">VUL-0: CVE-2021-47529: kernel: iwlwifi: Fix memory leaks in error handling path</issue>
  <issue id="1225374" tracker="bnc">VUL-0: CVE-2021-47503: kernel: scsi: pm80xx: do not call scsi_remove_host() in pm8001_alloc()</issue>
  <issue id="1225375" tracker="bnc">VUL-0: CVE-2021-47537: kernel: octeontx2-af: Fix a memleak bug in rvu_mbox_init()</issue>
  <issue id="1225376" tracker="bnc">VUL-0: CVE-2021-47526: kernel: serial: liteuart: Fix NULL pointer dereference in -&gt;remove()</issue>
  <issue id="1225377" tracker="bnc">VUL-0: CVE-2021-47524: kernel: serial: liteuart: fix minor-number leak on probe errors</issue>
  <issue id="1225379" tracker="bnc">VUL-0: CVE-2021-47550: kernel: drm/amd/amdgpu: fix potential memleak</issue>
  <issue id="1225380" tracker="bnc">VUL-0: CVE-2021-47513: kernel: net: dsa: felix: Fix memory leak in felix_setup_mmio_filtering</issue>
  <issue id="1225383" tracker="bnc">VUL-0: CVE-2021-47556: kernel: ethtool: ioctl: fix potential NULL deref in ethtool_set_coalesce()</issue>
  <issue id="1225384" tracker="bnc">VUL-0: CVE-2021-47565: kernel: scsi: mpt3sas: Fix kernel panic during drive powercycle test</issue>
  <issue id="1225386" tracker="bnc">VUL-0: CVE-2021-47540: kernel: mt76: mt7915: fix NULL pointer dereference in mt7915_get_phy_mode</issue>
  <issue id="1225387" tracker="bnc">VUL-0: CVE-2021-47428: kernel: powerpc/64s: fix program check interrupt emergency stack path</issue>
  <issue id="1225388" tracker="bnc">VUL-0: CVE-2021-47429: kernel: powerpc/64s: Fix unrecoverable MCE calling async handler from NMI</issue>
  <issue id="1225390" tracker="bnc">VUL-0: CVE-2021-47431: kernel: drm/amdgpu: fix gart.bo pin_count leak</issue>
  <issue id="1225392" tracker="bnc">VUL-0: CVE-2021-47433: kernel: btrfs: fix abort logic in btrfs_replace_file_extents</issue>
  <issue id="1225393" tracker="bnc">VUL-0: CVE-2021-47464: kernel: audit: fix possible null-pointer dereference in audit_filter_rules</issue>
  <issue id="1225396" tracker="bnc">VUL-0: CVE-2021-47559: kernel: net/smc: Fix NULL pointer dereferencing in smc_vlan_by_tcpsk()</issue>
  <issue id="1225400" tracker="bnc">VUL-0: CVE-2021-47505: kernel: aio: fix use-after-free due to missing POLLFREE handling</issue>
  <issue id="1225404" tracker="bnc">VUL-0: CVE-2021-47506: kernel: nfsd: fix use-after-free due to delegation race</issue>
  <issue id="1225405" tracker="bnc">VUL-0: CVE-2021-47507: kernel: nfsd: fix nsfd startup race (again)</issue>
  <issue id="1225409" tracker="bnc">VUL-0: CVE-2021-47509: kernel: ALSA: pcm: oss: limit the period size to 16MB</issue>
  <issue id="1225410" tracker="bnc">VUL-0: CVE-2021-47510: kernel: btrfs: fix re-dirty process of tree-log nodes</issue>
  <issue id="1225411" tracker="bnc">VUL-0: CVE-2021-47511: kernel: ALSA: pcm: oss: fix negative period/buffer sizes</issue>
  <issue id="1225425" tracker="bnc">VUL-0: CVE-2021-47514: kernel: devlink: fix netns refcount leak in devlink_nl_cmd_reload()</issue>
  <issue id="1225427" tracker="bnc">VUL-0: CVE-2021-47516: kernel: nfp: Fix memory leak in nfp_cpp_area_cache_add()</issue>
  <issue id="1225431" tracker="bnc">VUL-0: CVE-2021-47520: kernel: can: pch_can: pch_can_rx_normal: fix use after free</issue>
  <issue id="1225435" tracker="bnc">VUL-0: CVE-2021-47521: kernel: can: sja1000: fix use after free in ems_pcmcia_add_card()</issue>
  <issue id="1225436" tracker="bnc">VUL-0: CVE-2021-47490: kernel: drm/ttm: fix memleak in ttm_transfered_destroy</issue>
  <issue id="1225437" tracker="bnc">VUL-0: CVE-2021-47522: kernel: HID: bigbenff: prevent null pointer dereference</issue>
  <issue id="1225438" tracker="bnc">VUL-0: CVE-2021-47523: kernel: IB/hfi1: Fix leak of rcvhdrtail_dummy_kvaddr</issue>
  <issue id="1225439" tracker="bnc">VUL-0: CVE-2021-47493: kernel: ocfs2: fix race between searching chunks and release journal_head from buffer_head</issue>
  <issue id="1225441" tracker="bnc">VUL-0: CVE-2021-47525: kernel: serial: liteuart: fix use-after-free and memleak on unbind</issue>
  <issue id="1225445" tracker="bnc">VUL-0: CVE-2021-47533: kernel: drm/vc4: kms: Clear the HVS FIFO commit pointer once done</issue>
  <issue id="1225446" tracker="bnc">VUL-0: CVE-2021-47535: kernel: drm/msm/a6xx: Allocate enough space for GMU registers</issue>
  <issue id="1225447" tracker="bnc">VUL-0: CVE-2021-47536: kernel: net/smc: fix wrong list_del in smc_lgr_cleanup_early</issue>
  <issue id="1225450" tracker="bnc">VUL-0: CVE-2021-47494: kernel: cfg80211: fix management registrations locking</issue>
  <issue id="1225453" tracker="bnc">VUL-0: CVE-2021-47541: kernel: net/mlx4_en: Fix an use-after-free bug in mlx4_en_try_alloc_resources()</issue>
  <issue id="1225455" tracker="bnc">VUL-0: CVE-2021-47542: kernel: net: qlogic: qlcnic: Fix a NULL pointer dereference in qlcnic_83xx_add_rings()</issue>
  <issue id="1225461" tracker="bnc">VUL-0: CVE-2023-52756: kernel: pwm: Fix double shift bug</issue>
  <issue id="1225463" tracker="bnc">VUL-0: CVE-2021-47544: kernel: tcp: fix page frag corruption on page fault</issue>
  <issue id="1225464" tracker="bnc">VUL-0: CVE-2021-47553: kernel: sched/scs: reset task stack state in bringup_cpu()</issue>
  <issue id="1225466" tracker="bnc">VUL-0: CVE-2021-47554: kernel: vdpa_sim: avoid putting an uninitialized iova_domain</issue>
  <issue id="1225471" tracker="bnc">VUL-0: CVE-2023-52740: kernel: powerpc/64s/interrupt: Fix interrupt exit race with security mitigation switch</issue>
  <issue id="1225472" tracker="bnc">VUL-0: CVE-2023-52799: kernel: jfs: fix array-index-out-of-bounds in dbFindLeaf</issue>
  <issue id="1225478" tracker="bnc">VUL-0: CVE-2023-52753: kernel: drm/amd/display: Avoid NULL dereference of timing generator</issue>
  <issue id="1225479" tracker="bnc">VUL-0: CVE-2023-52741: kernel: cifs: Fix use-after-free in rdata-&gt;read_into_pages()</issue>
  <issue id="1225482" tracker="bnc">VUL-0: CVE-2023-52742: kernel: net: USB: Fix wrong-direction WARNING in plusb.c</issue>
  <issue id="1225483" tracker="bnc">VUL-0: CVE-2023-52708: kernel: mmc: mmc_spi: fix error handling in mmc_spi_probe()</issue>
  <issue id="1225486" tracker="bnc">VUL-0: CVE-2023-52736: kernel: ALSA: hda: Do not unset preset when cleaning up codec</issue>
  <issue id="1225488" tracker="bnc">VUL-0: CVE-2023-52733: kernel: s390/decompressor: specify __decompress() buf len to avoid overflow</issue>
  <issue id="1225490" tracker="bnc">VUL-0: CVE-2023-52754: kernel: media: imon: fix access to invalid resource for the second interface</issue>
  <issue id="1225492" tracker="bnc">VUL-0: CVE-2021-47558: kernel: net: stmmac: Disable Tx queues when reconfiguring the interface</issue>
  <issue id="1225495" tracker="bnc">VUL-0: CVE-2021-47560: kernel: mlxsw: spectrum: protect driver from buggy firmware</issue>
  <issue id="1225499" tracker="bnc">VUL-0: CVE-2021-47562: kernel: ice: fix vsi-&gt;txq_map sizing</issue>
  <issue id="1225500" tracker="bnc">VUL-0: CVE-2021-47563: kernel: ice: avoid bpf_prog refcount underflow</issue>
  <issue id="1225501" tracker="bnc">VUL-0: CVE-2021-47564: kernel: net: marvell: prestera: fix double free issue on err path</issue>
  <issue id="1225508" tracker="bnc">VUL-0: CVE-2021-47549: kernel: sata_fsl: fix UAF in sata_fsl_port_stop when rmmod sata_fsl</issue>
  <issue id="1225510" tracker="bnc">VUL-0: CVE-2021-47551: kernel: drm/amd/amdkfd: Fix kernel panic when reset failed and been triggered again</issue>
  <issue id="1225529" tracker="bnc">VUL-0: CVE-2023-52816: kernel: drm/amdkfd: fix shift out-of-bounds issue</issue>
  <issue id="1225530" tracker="bnc">VUL-0: CVE-2023-52818: kernel: drm/amd: fix UBSAN array-index-out-of-bounds for SMU7</issue>
  <issue id="1225532" tracker="bnc">VUL-0: CVE-2023-52819: kernel: drm/amd: fix UBSAN array-index-out-of-bounds for Polaris and Tonga</issue>
  <issue id="1225534" tracker="bnc">VUL-0: CVE-2023-52871: kernel: soc: qcom: llcc: handle a second device without data corruption</issue>
  <issue id="1225549" tracker="bnc">VUL-0: CVE-2023-52703: kernel: net/usb: kalmia: Don't pass act_len in usb_bulk_msg error path</issue>
  <issue id="1225550" tracker="bnc">VUL-0: CVE-2023-52804: kernel: fs/jfs: Add validity check for db_maxag and db_agpref</issue>
  <issue id="1225553" tracker="bnc">VUL-0: CVE-2023-52805: kernel: jfs: fix array-index-out-of-bounds in diAlloc</issue>
  <issue id="1225554" tracker="bnc">VUL-0: CVE-2023-52806: kernel: ALSA: hda: Fix possible null-ptr-deref when assigning a stream</issue>
  <issue id="1225557" tracker="bnc">VUL-0: CVE-2023-52810: kernel: fs/jfs: Add check for negative db_l2nbperpage</issue>
  <issue id="1225559" tracker="bnc">VUL-0: CVE-2023-52811: kernel: scsi: ibmvfc: Remove BUG_ON in the case of an empty event pool</issue>
  <issue id="1225560" tracker="bnc">VUL-0: CVE-2023-52759: kernel: gfs2: ignore negated quota changes</issue>
  <issue id="1225565" tracker="bnc">VUL-0: CVE-2023-52814: kernel: drm/amdgpu: Fix potential null pointer derefernce</issue>
  <issue id="1225566" tracker="bnc">VUL-0: CVE-2023-52858: kernel: clk: mediatek: clk-mt7629: Add check for mtk_alloc_clk_data</issue>
  <issue id="1225569" tracker="bnc">VUL-0: CVE-2023-52817: kernel: drm/amdgpu: Fix a null pointer access when the smc_rreg pointer is NULL</issue>
  <issue id="1225570" tracker="bnc">VUL-0: CVE-2023-52763: kernel: i3c: master: mipi-i3c-hci: Fix a kernel panic for accessing DAT_data.</issue>
  <issue id="1225571" tracker="bnc">VUL-0: CVE-2023-52764: kernel: media: gspca: cpia1: shift-out-of-bounds in set_flicker</issue>
  <issue id="1225572" tracker="bnc">VUL-0: CVE-2023-52774: kernel: s390/dasd: protect device queue against concurrent access</issue>
  <issue id="1225577" tracker="bnc">VUL-0: CVE-2023-52832: kernel: wifi: mac80211: don't return unset power in ieee80211_get_tx_power()</issue>
  <issue id="1225583" tracker="bnc">VUL-0: CVE-2023-52855: kernel: usb: dwc2: fix possible NULL pointer dereference caused by driver concurrency</issue>
  <issue id="1225584" tracker="bnc">VUL-0: CVE-2023-52854: kernel: padata: Fix refcnt handling in padata_free_shell()</issue>
  <issue id="1225588" tracker="bnc">VUL-0: CVE-2023-52847: kernel: media: bttv: fix use after free error due to btv-&gt;timeout timer</issue>
  <issue id="1225589" tracker="bnc">VUL-0: CVE-2023-52873: kernel: clk: mediatek: clk-mt6779: Add check for mtk_alloc_clk_data</issue>
  <issue id="1225590" tracker="bnc">VUL-0: CVE-2023-52844: kernel: media: vidtv: psi: Add check for kstrdup</issue>
  <issue id="1225591" tracker="bnc">VUL-0: CVE-2023-52872: kernel: tty: n_gsm: fix race condition in status line change on dead connections</issue>
  <issue id="1225592" tracker="bnc">VUL-0: CVE-2023-52841: kernel: media: vidtv: mux: Add check and kfree for kstrdup</issue>
  <issue id="1225595" tracker="bnc">VUL-0: CVE-2023-52833: kernel: Bluetooth: btusb: add date-&gt;evt_skb is NULL check</issue>
  <issue id="1225599" tracker="bnc">VUL-0: CVE-2023-52834: kernel: atl1c: work around the DMA RX overflow issue</issue>
  <issue id="2023-52736" tracker="cve" />
  <issue id="2023-52806" tracker="cve" />
  <issue id="2023-52833" tracker="cve" />
  <issue id="2023-52739" tracker="cve" />
  <issue id="2023-52745" tracker="cve" />
  <issue id="2023-52747" tracker="cve" />
  <issue id="2023-52840" tracker="cve" />
  <issue id="2023-52744" tracker="cve" />
  <issue id="2023-52834" tracker="cve" />
  <issue id="2023-52878" tracker="cve" />
  <issue id="2023-52741" tracker="cve" />
  <issue id="2023-52875" tracker="cve" />
  <issue id="2023-52870" tracker="cve" />
  <issue id="2023-52873" tracker="cve" />
  <issue id="2023-52865" tracker="cve" />
  <issue id="2023-52858" tracker="cve" />
  <issue id="2023-52876" tracker="cve" />
  <issue id="2023-52819" tracker="cve" />
  <issue id="2023-52818" tracker="cve" />
  <issue id="2023-52753" tracker="cve" />
  <issue id="2023-52817" tracker="cve" />
  <issue id="2023-52814" tracker="cve" />
  <issue id="2023-52738" tracker="cve" />
  <issue id="2023-52825" tracker="cve" />
  <issue id="2023-52816" tracker="cve" />
  <issue id="2023-52856" tracker="cve" />
  <issue id="2023-52821" tracker="cve" />
  <issue id="2023-52826" tracker="cve" />
  <issue id="2023-52867" tracker="cve" />
  <issue id="2023-52838" tracker="cve" />
  <issue id="2023-52810" tracker="cve" />
  <issue id="2023-52804" tracker="cve" />
  <issue id="2023-52759" tracker="cve" />
  <issue id="2023-52853" tracker="cve" />
  <issue id="2023-52791" tracker="cve" />
  <issue id="2023-52763" tracker="cve" />
  <issue id="2023-52788" tracker="cve" />
  <issue id="2023-52743" tracker="cve" />
  <issue id="2023-52799" tracker="cve" />
  <issue id="2023-52805" tracker="cve" />
  <issue id="2023-52847" tracker="cve" />
  <issue id="2023-52764" tracker="cve" />
  <issue id="2023-52754" tracker="cve" />
  <issue id="2023-52841" tracker="cve" />
  <issue id="2023-52844" tracker="cve" />
  <issue id="2023-52708" tracker="cve" />
  <issue id="2023-52730" tracker="cve" />
  <issue id="2023-52742" tracker="cve" />
  <issue id="2023-52702" tracker="cve" />
  <issue id="2023-52703" tracker="cve" />
  <issue id="2023-52854" tracker="cve" />
  <issue id="2023-52864" tracker="cve" />
  <issue id="2023-52740" tracker="cve" />
  <issue id="2023-52686" tracker="cve" />
  <issue id="2023-52690" tracker="cve" />
  <issue id="2023-52756" tracker="cve" />
  <issue id="2023-52774" tracker="cve" />
  <issue id="2023-52733" tracker="cve" />
  <issue id="2023-52707" tracker="cve" />
  <issue id="2023-52871" tracker="cve" />
  <issue id="2023-52868" tracker="cve" />
  <issue id="2023-52872" tracker="cve" />
  <issue id="2023-52880" tracker="cve" />
  <issue id="2023-52789" tracker="cve" />
  <issue id="2023-52781" tracker="cve" />
  <issue id="2023-52855" tracker="cve" />
  <issue id="2023-52877" tracker="cve" />
  <issue id="2023-52798" tracker="cve" />
  <issue id="2023-52832" tracker="cve" />
  <issue id="2022-48710" tracker="cve" />
  <issue id="2022-48709" tracker="cve" />
  <issue id="2022-48708" tracker="cve" />
  <issue id="2021-47511" tracker="cve" />
  <issue id="2021-47509" tracker="cve" />
  <issue id="2021-47381" tracker="cve" />
  <issue id="2021-47502" tracker="cve" />
  <issue id="2021-47380" tracker="cve" />
  <issue id="2021-47404" tracker="cve" />
  <issue id="2021-47522" tracker="cve" />
  <issue id="2021-47405" tracker="cve" />
  <issue id="2021-47523" tracker="cve" />
  <issue id="2021-47485" tracker="cve" />
  <issue id="2021-43056" tracker="cve" />
  <issue id="2021-47465" tracker="cve" />
  <issue id="2021-47389" tracker="cve" />
  <issue id="2021-47450" tracker="cve" />
  <issue id="2021-47390" tracker="cve" />
  <issue id="2021-47407" tracker="cve" />
  <issue id="2021-47442" tracker="cve" />
  <issue id="2021-47443" tracker="cve" />
  <issue id="2021-47391" tracker="cve" />
  <issue id="2021-47392" tracker="cve" />
  <issue id="2021-47398" tracker="cve" />
  <issue id="2021-47481" tracker="cve" />
  <issue id="2021-47366" tracker="cve" />
  <issue id="2021-39698" tracker="cve" />
  <issue id="2021-47505" tracker="cve" />
  <issue id="2021-47464" tracker="cve" />
  <issue id="2021-47360" tracker="cve" />
  <issue id="2021-47379" tracker="cve" />
  <issue id="2021-47375" tracker="cve" />
  <issue id="2021-47412" tracker="cve" />
  <issue id="2021-47376" tracker="cve" />
  <issue id="2021-47426" tracker="cve" />
  <issue id="2021-47433" tracker="cve" />
  <issue id="2021-47510" tracker="cve" />
  <issue id="2021-47457" tracker="cve" />
  <issue id="2021-47459" tracker="cve" />
  <issue id="2021-47520" tracker="cve" />
  <issue id="2021-47456" tracker="cve" />
  <issue id="2021-47521" tracker="cve" />
  <issue id="2021-47494" tracker="cve" />
  <issue id="2021-47488" tracker="cve" />
  <issue id="2021-47359" tracker="cve" />
  <issue id="2021-47364" tracker="cve" />
  <issue id="2021-47477" tracker="cve" />
  <issue id="2021-47476" tracker="cve" />
  <issue id="2021-47474" tracker="cve" />
  <issue id="2021-47475" tracker="cve" />
  <issue id="2021-47387" tracker="cve" />
  <issue id="2021-47514" tracker="cve" />
  <issue id="2021-47435" tracker="cve" />
  <issue id="2021-47498" tracker="cve" />
  <issue id="2021-47374" tracker="cve" />
  <issue id="2021-47550" tracker="cve" />
  <issue id="2021-47551" tracker="cve" />
  <issue id="2021-47362" tracker="cve" />
  <issue id="2021-47431" tracker="cve" />
  <issue id="2021-47421" tracker="cve" />
  <issue id="2021-47420" tracker="cve" />
  <issue id="2021-47410" tracker="cve" />
  <issue id="2021-47444" tracker="cve" />
  <issue id="2021-47445" tracker="cve" />
  <issue id="2021-47447" tracker="cve" />
  <issue id="2021-47446" tracker="cve" />
  <issue id="2021-47535" tracker="cve" />
  <issue id="2021-47471" tracker="cve" />
  <issue id="2021-47423" tracker="cve" />
  <issue id="2021-47422" tracker="cve" />
  <issue id="2021-47490" tracker="cve" />
  <issue id="2021-47533" tracker="cve" />
  <issue id="2021-47368" tracker="cve" />
  <issue id="2021-47556" tracker="cve" />
  <issue id="2021-47406" tracker="cve" />
  <issue id="2021-47393" tracker="cve" />
  <issue id="2021-47386" tracker="cve" />
  <issue id="2021-47385" tracker="cve" />
  <issue id="2021-47384" tracker="cve" />
  <issue id="2021-47425" tracker="cve" />
  <issue id="2021-47501" tracker="cve" />
  <issue id="2021-47424" tracker="cve" />
  <issue id="2021-47453" tracker="cve" />
  <issue id="2021-47563" tracker="cve" />
  <issue id="2021-47449" tracker="cve" />
  <issue id="2021-47562" tracker="cve" />
  <issue id="2021-47499" tracker="cve" />
  <issue id="2021-47437" tracker="cve" />
  <issue id="2021-47500" tracker="cve" />
  <issue id="2021-47403" tracker="cve" />
  <issue id="2021-47401" tracker="cve" />
  <issue id="2021-47373" tracker="cve" />
  <issue id="2021-47468" tracker="cve" />
  <issue id="2021-47478" tracker="cve" />
  <issue id="2021-47529" tracker="cve" />
  <issue id="2021-47415" tracker="cve" />
  <issue id="2021-47399" tracker="cve" />
  <issue id="2021-47467" tracker="cve" />
  <issue id="2021-47417" tracker="cve" />
  <issue id="2021-47388" tracker="cve" />
  <issue id="2021-47396" tracker="cve" />
  <issue id="2021-47395" tracker="cve" />
  <issue id="2021-47361" tracker="cve" />
  <issue id="2021-47560" tracker="cve" />
  <issue id="2021-47441" tracker="cve" />
  <issue id="2021-47462" tracker="cve" />
  <issue id="2021-47463" tracker="cve" />
  <issue id="2021-47466" tracker="cve" />
  <issue id="2021-47470" tracker="cve" />
  <issue id="2021-47370" tracker="cve" />
  <issue id="2021-47448" tracker="cve" />
  <issue id="2021-47540" tracker="cve" />
  <issue id="2021-47482" tracker="cve" />
  <issue id="2021-47513" tracker="cve" />
  <issue id="2021-47439" tracker="cve" />
  <issue id="2021-47440" tracker="cve" />
  <issue id="2021-47400" tracker="cve" />
  <issue id="2021-47372" tracker="cve" />
  <issue id="2021-47564" tracker="cve" />
  <issue id="2021-47472" tracker="cve" />
  <issue id="2021-47541" tracker="cve" />
  <issue id="2021-47438" tracker="cve" />
  <issue id="2021-47542" tracker="cve" />
  <issue id="2021-47402" tracker="cve" />
  <issue id="2021-47419" tracker="cve" />
  <issue id="2021-47559" tracker="cve" />
  <issue id="2021-47536" tracker="cve" />
  <issue id="2021-47558" tracker="cve" />
  <issue id="2021-47496" tracker="cve" />
  <issue id="2021-47418" tracker="cve" />
  <issue id="2021-47408" tracker="cve" />
  <issue id="2021-47452" tracker="cve" />
  <issue id="2021-47394" tracker="cve" />
  <issue id="2021-47451" tracker="cve" />
  <issue id="2021-47363" tracker="cve" />
  <issue id="2021-47371" tracker="cve" />
  <issue id="2021-47518" tracker="cve" />
  <issue id="2021-47516" tracker="cve" />
  <issue id="2021-47507" tracker="cve" />
  <issue id="2021-47506" tracker="cve" />
  <issue id="2021-47378" tracker="cve" />
  <issue id="2021-47497" tracker="cve" />
  <issue id="2021-47460" tracker="cve" />
  <issue id="2021-47493" tracker="cve" />
  <issue id="2021-47458" tracker="cve" />
  <issue id="2021-47537" tracker="cve" />
  <issue id="2021-47484" tracker="cve" />
  <issue id="2021-47416" tracker="cve" />
  <issue id="2021-47429" tracker="cve" />
  <issue id="2021-47428" tracker="cve" />
  <issue id="2021-47454" tracker="cve" />
  <issue id="2021-47455" tracker="cve" />
  <issue id="2021-47483" tracker="cve" />
  <issue id="2021-47414" tracker="cve" />
  <issue id="2021-47486" tracker="cve" />
  <issue id="2021-47369" tracker="cve" />
  <issue id="2021-47382" tracker="cve" />
  <issue id="2021-47549" tracker="cve" />
  <issue id="2021-47553" tracker="cve" />
  <issue id="2021-47480" tracker="cve" />
  <issue id="2021-47427" tracker="cve" />
  <issue id="2021-47565" tracker="cve" />
  <issue id="2021-47503" tracker="cve" />
  <issue id="2021-47473" tracker="cve" />
  <issue id="2021-47397" tracker="cve" />
  <issue id="2021-47527" tracker="cve" />
  <issue id="2021-47526" tracker="cve" />
  <issue id="2021-47524" tracker="cve" />
  <issue id="2021-47525" tracker="cve" />
  <issue id="2021-47469" tracker="cve" />
  <issue id="2021-47358" tracker="cve" />
  <issue id="2021-47479" tracker="cve" />
  <issue id="2021-47544" tracker="cve" />
  <issue id="2021-47383" tracker="cve" />
  <issue id="2021-47528" tracker="cve" />
  <issue id="2021-47413" tracker="cve" />
  <issue id="2021-47409" tracker="cve" />
  <issue id="2021-47436" tracker="cve" />
  <issue id="2021-47495" tracker="cve" />
  <issue id="2021-47461" tracker="cve" />
  <issue id="2021-47554" tracker="cve" />
  <issue id="2021-47367" tracker="cve" />
  <issue id="2021-47430" tracker="cve" />
  <issue id="2021-47434" tracker="cve" />
  <issue id="2021-47534" tracker="cve" />
  <issue id="2023-52766" tracker="cve" />
  <issue id="2023-52811" tracker="cve" />
  <issue id="2023-52800" tracker="cve" />
  <issue id="2023-0160" tracker="cve" />
  <issue id="2024-35895" tracker="cve" />
  <issue id="2024-26764" tracker="cve" />
  <issue id="2024-35815" tracker="cve" />
  <issue id="2023-52591" tracker="cve" />
  <issue id="2024-35914" tracker="cve" />
  <issue id="2023-47233" tracker="cve" />
  <issue id="2024-35811" tracker="cve" />
  <issue id="2023-52676" tracker="cve" />
  <issue id="2021-47365" tracker="cve" />
  <issue id="2021-47489" tracker="cve" />
  <issue id="2021-4148" tracker="cve" />
  <issue id="2021-47491" tracker="cve" />
  <issue id="2021-47492" tracker="cve" />
  <issue id="2020-36788" tracker="cve" />
  <issue id="2023-6531" tracker="cve" />
  <issue id="2023-52654" tracker="cve" />
  <issue id="2023-52655" tracker="cve" />
  <issue id="2022-48699" tracker="cve" />
  <issue id="2024-26739" tracker="cve" />
  <issue id="2022-48702" tracker="cve" />
  <issue id="2022-48701" tracker="cve" />
  <issue id="2022-48694" tracker="cve" />
  <issue id="2022-48692" tracker="cve" />
  <issue id="2022-48671" tracker="cve" />
  <issue id="2022-48704" tracker="cve" />
  <issue id="2022-48688" tracker="cve" />
  <issue id="2023-2860" tracker="cve" />
  <issue id="2022-48687" tracker="cve" />
  <issue id="2022-48673" tracker="cve" />
  <issue id="2022-48686" tracker="cve" />
  <issue id="2022-48697" tracker="cve" />
  <issue id="2022-48672" tracker="cve" />
  <issue id="2022-48695" tracker="cve" />
  <issue id="2022-48693" tracker="cve" />
  <issue id="2022-48703" tracker="cve" />
  <issue id="2022-48700" tracker="cve" />
  <issue id="2022-48662" tracker="cve" />
  <issue id="2022-48675" tracker="cve" />
  <issue id="2022-48634" tracker="cve" />
  <issue id="2022-48632" tracker="cve" />
  <issue id="2022-48652" tracker="cve" />
  <issue id="2022-48636" tracker="cve" />
  <issue id="2024-26921" tracker="cve" />
  <issue id="2024-35905" tracker="cve" />
  <issue id="2024-26828" tracker="cve" />
  <issue id="2024-35863" tracker="cve" />
  <issue id="2024-35867" tracker="cve" />
  <issue id="2024-35868" tracker="cve" />
  <issue id="2024-26928" tracker="cve" />
  <issue id="2024-36926" tracker="cve" />
  <issue id="2024-26925" tracker="cve" />
  <issue id="2024-27413" tracker="cve" />
  <issue id="2024-35817" tracker="cve" />
  <issue id="2024-35904" tracker="cve" />
  <issue id="2024-26929" tracker="cve" />
  <issue id="2024-27398" tracker="cve" />
  <issue id="2024-26930" tracker="cve" />
  <issue id="2024-26840" tracker="cve" />
  <issue id="2024-26862" tracker="cve" />
  <issue id="2024-0639" tracker="cve" />
  <issue id="2024-26852" tracker="cve" />
  <issue id="2023-1829" tracker="cve" />
  <issue id="PED-8111" tracker="jsc" />
  <category>security</category>
  <rating>important</rating>
  <packager>alix82</packager>
  <reboot_needed/>
  <description>
The SUSE Linux Enterprise 15 SP4 kernel was updated to receive various security bugfixes.

The following security bugs were fixed:

- CVE-2024-35905: Fixed int overflow for stack access size (bsc#1224488).
- CVE-2024-26828: Fix underflow in parse_server_interfaces() (bsc#1223084).
- CVE-2024-35863: Fix potential UAF in is_valid_oplock_break() (bsc#1224763).
- CVE-2024-35867: Fix potential UAF in cifs_stats_proc_show() (bsc#1224664).
- CVE-2024-35868: Fix potential UAF in cifs_stats_proc_write() (bsc#1224678).
- CVE-2024-26928: Fix potential UAF in cifs_debug_files_proc_show() (bsc#1223532).
- CVE-2024-36926: Fixed LPAR panics during boot up with a frozen PE (bsc#1222011).
- CVE-2024-26925: Release mutex after nft_gc_seq_end from abort path (bsc#1223390).
- CVE-2024-27413: Fix incorrect allocation size (bsc#1224438).
- CVE-2024-35817: Set gtt bound flag in amdgpu_ttm_gart_bind (bsc#1224736).
- CVE-2024-35904: Avoid dereference of garbage after mount failure (bsc#1224494).
- CVE-2024-26929: Fixed double free of fcport (bsc#1223715).
- CVE-2024-27398: Fixed use-after-free bugs caused by sco_sock_timeout (bsc#1224174).
- CVE-2024-26930: Fixed double free of the ha->vp_map pointer (bsc#1223626).
- CVE-2024-26840: Fixed a memory leak in cachefiles_add_cache() (bsc#1222976).
- CVE-2024-26862: Fixed packet annotate data-races around ignore_outgoing (bsc#1223111).
- CVE-2024-0639: Fixed a denial-of-service vulnerability due to a deadlock found in sctp_auto_asconf_init in net/sctp/socket.c (bsc#1218917).
- CVE-2024-26921: Preserve kabi for sk_buff (bsc#1223138).
- CVE-2024-26852: Fixed use-after-free in ip6_route_mpath_notify() (bsc#1223057).
- CVE-2023-1829: Fixed a use-after-free vulnerability in the control index filter (tcindex) (bsc#1210335).

The following non-security bugs were fixed:

- af_unix: Do not use atomic ops for unix_sk(sk)->inflight (bsc#1223384).
- af_unix: Replace BUG_ON() with WARN_ON_ONCE() (bsc#1223384).
- af_unix: annote lockless accesses to unix_tot_inflight &amp; gc_in_progress (bsc#1223384).
- filemap: remove use of wait bookmarks (bsc#1224085).
- idpf: extend tx watchdog timeout (bsc#1224137).
- ipvs: Fix checksumming on GSO of SCTP packets (bsc#1221958)
- powerpc/kasan: Do not instrument non-maskable or raw interrupts (bsc#1223191).
- powerpc/powernv: Add a null pointer check in opal_event_init() (bsc#1065729).
- powerpc/powernv: Add a null pointer check to scom_debug_init_one() (bsc#1194869).
- powerpc/pseries/iommu: IOMMU table is not initialized for kdump over SR-IOV (bsc#1220492 ltc#205270).
- powerpc/pseries/vio: Do not return ENODEV if node or compatible missing (bsc#1220783).
- powerpc: Avoid nmi_enter/nmi_exit in real mode interrupt (bsc#1221645 ltc#205739 bsc#1223191).
- powerpc: Refactor verification of MSR_RI (bsc#1223191).
</description>
<summary>Security update for the Linux Kernel</summary>
</patchinfo>
openSUSE Build Service is sponsored by