File _patchinfo of Package patchinfo.34560

<patchinfo incident="34560">
  <issue id="1186716" tracker="bnc">[NetApp SLES15 SP6 Bug]: NVMe/TCP host attempts to reconnect despite connect failure with DNR set</issue>
  <issue id="1195775" tracker="bnc">apparmor fails to build with 5.16.7</issue>
  <issue id="1204562" tracker="bnc">L3-Question: Improve visibility of created and bound - but not connected nor listening - TCP ports</issue>
  <issue id="1209834" tracker="bnc">An upgrade from SLES 15 sp3 to SLES 15 sp4 on ppc64le machines provoked a sudden loss of paths to LUN-s.</issue>
  <issue id="1217481" tracker="bnc">s390/dasd: protect device queue against concurrent access</issue>
  <issue id="1217912" tracker="bnc">L3: Soft lockups in nfsd while nfsserver.service is stopped</issue>
  <issue id="1218442" tracker="bnc">[SLES-15-SP6-beta2][xfs] NFS v3/v4 fio random write 4k block size got 10%-33% decline VS 15SP5 GM+MU</issue>
  <issue id="1219224" tracker="bnc">OCFS2 writes delay on large volumes - slow la window lookup from global_bitmap</issue>
  <issue id="1219478" tracker="bnc">Fix for: KVM: arm64: Always invalidate TLB for stage-2 permission faults</issue>
  <issue id="1219596" tracker="bnc">dm-raid/md/raid: regression related to dm-raid456 IO concurrent with reshape</issue>
  <issue id="1219633" tracker="bnc">L3-Question: kernel workqueue and soft lockups for extended periods with NFS involved in backtraces</issue>
  <issue id="1219847" tracker="bnc">Request to truncate file on NFS results in file not truncated</issue>
  <issue id="1219953" tracker="bnc">SLE15-SP6 locking and clocksource backports and fixes</issue>
  <issue id="1221086" tracker="bnc">VUL-0: CVE-2024-26625: kernel: llc: call sock_orphan() at release time</issue>
  <issue id="1221777" tracker="bnc">Update Broadcom Emulex lpfc driver for SLES15 SP6 to 14.4.0.1</issue>
  <issue id="1221958" tracker="bnc">Checksum errors on SCTP traffic through IPVS  [ref:_00D1igLOd._500Tr7dsRC:ref]</issue>
  <issue id="1222011" tracker="bnc">[Regression] SLES15SP6:[6.4.0-150600.9] LPAR reboot crashes the kernel after PCI injection (everest/1060_023/shinner)</issue>
  <issue id="1222015" tracker="bnc">L3: TSC clocksource spuriously declared invalid in 12+ socket Sapphire Rapids systems</issue>
  <issue id="1222080" tracker="bnc">VUL-0: CVE-2023-52622: kernel: ext4: avoid online resizing failures due to oversized flex bg</issue>
  <issue id="1222241" tracker="bnc">[Bug Fix/Enhancement] Extend size of the MCE Records pool</issue>
  <issue id="1222380" tracker="bnc">VUL-0: CVE-2024-26676: kernel: af_unix: Call kfree_skb() for dead unix_(sk)-&gt;oob_skb in GC</issue>
  <issue id="1222588" tracker="bnc">VUL-0: CVE-2024-26780: kernel: af_unix: Fix task hung while purging oob_skb in GC.</issue>
  <issue id="1222617" tracker="bnc">VUL-0: CVE-2024-26750: kernel: kernel: af_unix: ask hung in __unix_gc()</issue>
  <issue id="1222619" tracker="bnc">VUL-0: CVE-2023-52880: kernel: tty/n_gsm: 0day with exploit dropped on Github</issue>
  <issue id="1222809" tracker="bnc">VUL-0: CVE-2024-26813: kernel: vfio/platform: NULL pointer dereference</issue>
  <issue id="1222810" tracker="bnc">VUL-0: CVE-2024-26814: kernel: vfio/fsl-mc: Block calling interrupt handler without trigger</issue>
  <issue id="1223018" tracker="bnc">VUL-0: CVE-2024-26845: kernel: scsi: target: core: uncompleted abort leaving the kernel leaving a never-ending task</issue>
  <issue id="1223265" tracker="bnc">[TRACKER] CONFIG_SENSORS_XGENE is not enable for Ampere platforms</issue>
  <issue id="1224049" tracker="bnc">[NetApp SLES15 SP6 Bug]: Long I/O outages seen occasionally during heavy I/O on NVMe/TCP TLS connections</issue>
  <issue id="1224187" tracker="bnc">VUL-0: CVE-2023-52656: kernel: io_uring: drop any code related to SCM_RIGHTS</issue>
  <issue id="1224439" tracker="bnc">VUL-0: CVE-2024-27414: kernel: rtnetlink: fix error logic of IFLA_BRIDGE_FLAGS writing back</issue>
  <issue id="1224497" tracker="bnc">VUL-0: CVE-2024-35900: kernel: netfilter: nf_tables: reject new basechain after table flag update</issue>
  <issue id="1224498" tracker="bnc">VUL-0: CVE-2024-35898: kernel: netfilter: nf_tables: Fix potential data-race in __nft_flowtable_type_get()</issue>
  <issue id="1224515" tracker="bnc">VUL-0: CVE-2024-35892: kernel: net/sched: fix lockdep splat in qdisc_tree_reduce_backlog()</issue>
  <issue id="1224520" tracker="bnc">VUL-0: CVE-2024-35884: kernel: udp: do not accept non-tunnel GSO skbs landing in a tunnel</issue>
  <issue id="1224523" tracker="bnc">VUL-0: CVE-2024-35880: kernel: io_uring/kbuf: hold io_buffer_list reference over mmap</issue>
  <issue id="1224539" tracker="bnc">VUL-0: CVE-2024-36005: kernel: netfilter: nf_tables: honor table dormant flag from netdev release event path</issue>
  <issue id="1224540" tracker="bnc">VUL-0: CVE-2024-36008: kernel: ipv4: check for NULL idev in ip_route_use_hint()</issue>
  <issue id="1224549" tracker="bnc">VUL-0: CVE-2024-35998: kernel: smb3: fix lock ordering potential deadlock in cifs_sync_mid_result</issue>
  <issue id="1224572" tracker="bnc">VUL-0: CVE-2024-35979: kernel: raid1: fix use-after-free for original bio in raid1_write_request()</issue>
  <issue id="1224575" tracker="bnc">VUL-0: CVE-2024-35976: kernel: xsk: validate user input for XDP_{UMEM|COMPLETION}_FILL_RING</issue>
  <issue id="1224583" tracker="bnc">VUL-0: CVE-2024-35962: kernel: netfilter: complete validation of user input</issue>
  <issue id="1224584" tracker="bnc">VUL-0: CVE-2024-35970: kernel: af_unix: Clear stale u-&gt;oob_skb.</issue>
  <issue id="1224606" tracker="bnc">VUL-0: CVE-2024-35827: kernel: io_uring/net: fix overflow check in io_recvmsg_mshot_prep()</issue>
  <issue id="1224612" tracker="bnc">VUL-0: CVE-2024-35848: kernel: eeprom: at24: fix memory corruption race condition</issue>
  <issue id="1224614" tracker="bnc">VUL-0: CVE-2023-52672: kernel: pipe: wakeup wr_wait after setting max_usage</issue>
  <issue id="1224619" tracker="bnc">VUL-0: CVE-2024-35857: kernel: icmp: prevent possible NULL dereferences from icmp_build_probe()</issue>
  <issue id="1224655" tracker="bnc">VUL-0: CVE-2024-35926: kernel: crypto: iaa - Fix async_disable descriptor leak</issue>
  <issue id="1224659" tracker="bnc">VUL-0: CVE-2023-52699: kernel: sysv: don't call sb_bread() with pointers_lock held</issue>
  <issue id="1224661" tracker="bnc">VUL-0: CVE-2024-35925: kernel: block: prevent division by zero in blk_rq_stat_sum()</issue>
  <issue id="1224662" tracker="bnc">VUL-0: CVE-2024-35896: kernel: netfilter: validate user input for expected length</issue>
  <issue id="1224670" tracker="bnc">VUL-0: CVE-2024-35886: kernel: ipv6: Fix infinite recursion in fib6_dump_done().</issue>
  <issue id="1224673" tracker="bnc">VUL-0: CVE-2024-35957: kernel: iommu/vt-d: Fix WARN_ON in iommu probe path</issue>
  <issue id="1224698" tracker="bnc">VUL-0: CVE-2024-35831: kernel: io_uring: Fix release of pinned pages when __io_uaddr_map fails</issue>
  <issue id="1224735" tracker="bnc">VUL-0: CVE-2024-35807: kernel: ext4: fix corruption during on-line resize</issue>
  <issue id="1224751" tracker="bnc">VUL-0: CVE-2024-35843: kernel: iommu/vt-d: Use device rbtree in iopf reporting path</issue>
  <issue id="1224759" tracker="bnc">VUL-0: CVE-2024-27419: kernel: netrom: Fix data-races around sysctl_net_busy_read</issue>
  <issue id="1224928" tracker="bnc">VUL-0: CVE-2023-52840: kernel: Input: synaptics-rmi4 - fix use after free in rmi_unregister_function()</issue>
  <issue id="1224930" tracker="bnc">VUL-0: CVE-2023-52796: kernel: ipvlan: add ipvlan_route_v6_outbound() helper</issue>
  <issue id="1224932" tracker="bnc">VUL-0: CVE-2023-52856: kernel: drm/bridge: lt8912b: Fix crash on bridge detach</issue>
  <issue id="1224933" tracker="bnc">VUL-0: CVE-2023-52780: kernel: net: mvneta: fix calls to page_pool_get_stats</issue>
  <issue id="1224935" tracker="bnc">VUL-0: CVE-2023-52837: kernel: nbd: fix uaf in nbd_open</issue>
  <issue id="1224937" tracker="bnc">VUL-0: CVE-2023-52870: kernel: clk: mediatek: clk-mt6765: Add check for mtk_alloc_clk_data</issue>
  <issue id="1224939" tracker="bnc">VUL-0: CVE-2023-52786: kernel: ext4: fix racy may inline data check in dio write</issue>
  <issue id="1224941" tracker="bnc">VUL-0: CVE-2023-52861: kernel: drm: bridge: it66121: Fix invalid connector dereference</issue>
  <issue id="1224944" tracker="bnc">VUL-0: CVE-2023-52877: kernel: usb: typec: tcpm: Fix NULL pointer dereference in tcpm_pd_svdm()</issue>
  <issue id="1224946" tracker="bnc">VUL-0: CVE-2023-52784: kernel: bonding: stop the device in bond_setup_by_slave()</issue>
  <issue id="1224947" tracker="bnc">VUL-0: CVE-2023-52798: kernel: wifi: ath11k: fix dfs radar event locking</issue>
  <issue id="1224949" tracker="bnc">VUL-0: CVE-2023-52849: kernel: cxl/mem: Fix shutdown order</issue>
  <issue id="1224951" tracker="bnc">VUL-0: CVE-2023-52843: kernel: llc: verify mac len before reading mac header</issue>
  <issue id="1224988" tracker="bnc">VUL-0: CVE-2023-52853: kernel: hid: cp2112: Fix duplicate workqueue initialization</issue>
  <issue id="1224992" tracker="bnc">VUL-0: CVE-2023-52777: kernel: wifi: ath11k: fix gtk offload status event locking</issue>
  <issue id="1224998" tracker="bnc">VUL-0: CVE-2023-52767: kernel: tls: fix NULL deref on tls_sw_splice_eof() with empty record</issue>
  <issue id="1225000" tracker="bnc">VUL-0: CVE-2023-52878: kernel: can: dev: can_put_echo_skb(): don't crash kernel if can_priv:echo_skb is accessed out of bounds</issue>
  <issue id="1225001" tracker="bnc">VUL-0: CVE-2023-52769: kernel: wifi: ath12k: fix htt mlo-offset event locking</issue>
  <issue id="1225004" tracker="bnc">VUL-0: CVE-2023-52768: kernel: wifi: wilc1000: use vmm_table as array in wilc struct</issue>
  <issue id="1225006" tracker="bnc">VUL-0: CVE-2023-52801: kernel: iommufd: Fix missing update of domains_itree after splitting iopt_area</issue>
  <issue id="1225008" tracker="bnc">VUL-0: CVE-2023-52803: kernel: SUNRPC: Fix RPC client cleaned up the freed pipefs dentries</issue>
  <issue id="1225009" tracker="bnc">VUL-0: CVE-2023-52867: kernel: drm/radeon: possible buffer overflow</issue>
  <issue id="1225014" tracker="bnc">VUL-0: CVE-2023-52850: kernel: media: hantro: Check whether reset op is defined before use</issue>
  <issue id="1225015" tracker="bnc">VUL-0: CVE-2023-52862: kernel: drm/amd/display: Fix null pointer dereference in error message</issue>
  <issue id="1225022" tracker="bnc">VUL-0: CVE-2023-52821: kernel: drm/panel: fix a possible null pointer dereference</issue>
  <issue id="1225025" tracker="bnc">VUL-0: CVE-2023-52842: kernel: virtio/vsock: Fix uninit-value in virtio_transport_recv_pkt()</issue>
  <issue id="1225028" tracker="bnc">VUL-0: CVE-2023-52794: kernel: thermal: intel: powerclamp: fix mismatch in get function for max_idle</issue>
  <issue id="1225029" tracker="bnc">VUL-0: CVE-2023-52765: kernel: mfd: qcom-spmi-pmic: Fix revid implementation</issue>
  <issue id="1225031" tracker="bnc">VUL-0: CVE-2023-52838: kernel: fbdev: imsttfb: fix a resource leak in probe</issue>
  <issue id="1225036" tracker="bnc">VUL-0: CVE-2023-52876: kernel: clk: mediatek: clk-mt7629-eth: Add check for mtk_alloc_clk_data</issue>
  <issue id="1225041" tracker="bnc">VUL-0: CVE-2023-52773: kernel: drm/amd/display: fix a NULL pointer dereference in amdgpu_dm_i2c_xfer()</issue>
  <issue id="1225044" tracker="bnc">VUL-0: CVE-2023-52868: kernel: thermal: core: prevent potential string overflow</issue>
  <issue id="1225049" tracker="bnc">VUL-0: CVE-2023-52874: kernel: x86/tdx: Zero out the missing RSI in TDX_HYPERCALL macro</issue>
  <issue id="1225050" tracker="bnc">VUL-0: CVE-2023-52869: kernel: pstore/platform: Add check for kstrdup</issue>
  <issue id="1225076" tracker="bnc">VUL-0: CVE-2023-52825: kernel: drm/amdkfd: Fix a race condition of vram buffer unref in svm code</issue>
  <issue id="1225077" tracker="bnc">VUL-0: CVE-2023-52826: kernel: drm/panel/panel-tpo-tpg110: fix a possible null pointer dereference</issue>
  <issue id="1225078" tracker="bnc">VUL-0: CVE-2023-52827: kernel: wifi: ath12k: fix possible out-of-bound read in ath12k_htt_pull_ppdu_stats()</issue>
  <issue id="1225081" tracker="bnc">VUL-0: CVE-2023-52829: kernel: wifi: ath12k: fix possible out-of-bound write in ath12k_wmi_ext_hal_reg_caps()</issue>
  <issue id="1225085" tracker="bnc">VUL-0: CVE-2023-52795: kernel: vhost-vdpa: fix use after free in vhost_vdpa_probe()</issue>
  <issue id="1225086" tracker="bnc">VUL-0: CVE-2023-52865: kernel: clk: mediatek: clk-mt6797: Add check for mtk_alloc_clk_data</issue>
  <issue id="1225090" tracker="bnc">VUL-0: CVE-2023-52776: kernel: wifi: ath12k: fix dfs-radar and temperature event locking</issue>
  <issue id="1225092" tracker="bnc">VUL-0: CVE-2023-52781: kernel: usb: config: fix iteration issue in 'usb_get_bos_descriptor()'</issue>
  <issue id="1225096" tracker="bnc">VUL-0: CVE-2023-52875: kernel: clk: mediatek: clk-mt2701: Add check for mtk_alloc_clk_data</issue>
  <issue id="1225097" tracker="bnc">VUL-0: CVE-2023-52807: kernel: net: hns3: fix out-of-bounds access may occur when coalesce info is read via debugfs</issue>
  <issue id="1225098" tracker="bnc">VUL-0: CVE-2023-52846: kernel: hsr: Prevent use after free in prp_create_tagged_frame()</issue>
  <issue id="1225101" tracker="bnc">VUL-0: CVE-2023-52879: kernel: tracing: Have trace_event_file have ref counters</issue>
  <issue id="1225103" tracker="bnc">VUL-0: CVE-2023-52782: kernel: net/mlx5e: Track xmit submission to PTP WQ after populating metadata map</issue>
  <issue id="1225104" tracker="bnc">VUL-0: CVE-2023-52783: kernel: net: wangxun: fix kernel panic due to null pointer</issue>
  <issue id="1225105" tracker="bnc">VUL-0: CVE-2023-52787: kernel: blk-mq: make sure active queue usage is held for bio_integrity_prep()</issue>
  <issue id="1225106" tracker="bnc">VUL-0: CVE-2023-52788: kernel: i915/perf: Fix NULL deref bugs with drm_dbg() calls</issue>
  <issue id="1225108" tracker="bnc">VUL-0: CVE-2023-52791: kernel: i2c: core: Run atomic i2c xfer when !preemptible</issue>
  <issue id="1225120" tracker="bnc">VUL-0: CVE-2023-52866: kernel: HID: uclogic: Fix user-memory-access bug in uclogic_params_ugee_v2_init_event_hooks()</issue>
  <issue id="1225132" tracker="bnc">VUL-0: CVE-2023-52864: kernel: platform/x86: wmi: Fix opening of char device</issue>
  <issue id="1225180" tracker="bnc">VUL-0: CVE-2023-52789: kernel: tty: vcc: Add check for kstrdup() in vcc_probe()</issue>
  <issue id="1225300" tracker="bnc">[MI300A] Bug Fix in AMD Address translation support for MI300A</issue>
  <issue id="1225391" tracker="bnc">VUL-0: CVE-2021-47432: kernel: lib/generic-radix-tree.c: Don't overflow in peek()</issue>
  <issue id="1225472" tracker="bnc">VUL-0: CVE-2023-52799: kernel: jfs: fix array-index-out-of-bounds in dbFindLeaf</issue>
  <issue id="1225475" tracker="bnc">VUL-0: CVE-2023-52735: kernel: bpf, sockmap: Don't let sock_map_{close,destroy,unhash} call itself</issue>
  <issue id="1225476" tracker="bnc">VUL-0: CVE-2023-52749: kernel: spi: Fix null dereference on suspend</issue>
  <issue id="1225477" tracker="bnc">VUL-0: CVE-2023-52792: kernel: cxl/region: Do not try to cleanup after cxl_region_setup_targets() fails</issue>
  <issue id="1225478" tracker="bnc">VUL-0: CVE-2023-52753: kernel: drm/amd/display: Avoid NULL dereference of timing generator</issue>
  <issue id="1225485" tracker="bnc">VUL-0: CVE-2023-52750: kernel: arm64: Restrict CPU_BIG_ENDIAN to GNU as or LLVM IAS 15.x or newer</issue>
  <issue id="1225490" tracker="bnc">VUL-0: CVE-2023-52754: kernel: media: imon: fix access to invalid resource for the second interface</issue>
  <issue id="1225527" tracker="bnc">VUL-0: CVE-2023-52813: kernel: crypto: pcrypt - fix hungtask for PADATA_RESET</issue>
  <issue id="1225529" tracker="bnc">VUL-0: CVE-2023-52816: kernel: drm/amdkfd: fix shift out-of-bounds issue</issue>
  <issue id="1225530" tracker="bnc">VUL-0: CVE-2023-52818: kernel: drm/amd: fix UBSAN array-index-out-of-bounds for SMU7</issue>
  <issue id="1225532" tracker="bnc">VUL-0: CVE-2023-52819: kernel: drm/amd: fix UBSAN array-index-out-of-bounds for Polaris and Tonga</issue>
  <issue id="1225534" tracker="bnc">VUL-0: CVE-2023-52871: kernel: soc: qcom: llcc: handle a second device without data corruption</issue>
  <issue id="1225548" tracker="bnc">VUL-0: CVE-2023-52757: kernel: smb: client: fix potential deadlock when releasing mids</issue>
  <issue id="1225550" tracker="bnc">VUL-0: CVE-2023-52804: kernel: fs/jfs: Add validity check for db_maxag and db_agpref</issue>
  <issue id="1225553" tracker="bnc">VUL-0: CVE-2023-52805: kernel: jfs: fix array-index-out-of-bounds in diAlloc</issue>
  <issue id="1225554" tracker="bnc">VUL-0: CVE-2023-52806: kernel: ALSA: hda: Fix possible null-ptr-deref when assigning a stream</issue>
  <issue id="1225555" tracker="bnc">VUL-0: CVE-2023-52808: kernel: scsi: hisi_sas: Set debugfs_dir pointer to NULL after removing debugfs</issue>
  <issue id="1225556" tracker="bnc">VUL-0: CVE-2023-52809: kernel: scsi: libfc: Fix potential NULL pointer dereference in fc_lport_ptp_setup()</issue>
  <issue id="1225557" tracker="bnc">VUL-0: CVE-2023-52810: kernel: fs/jfs: Add check for negative db_l2nbperpage</issue>
  <issue id="1225559" tracker="bnc">VUL-0: CVE-2023-52811: kernel: scsi: ibmvfc: Remove BUG_ON in the case of an empty event pool</issue>
  <issue id="1225560" tracker="bnc">VUL-0: CVE-2023-52759: kernel: gfs2: ignore negated quota changes</issue>
  <issue id="1225564" tracker="bnc">VUL-0: CVE-2023-52812: kernel: drm/amd: check num of link levels when update pcie param</issue>
  <issue id="1225565" tracker="bnc">VUL-0: CVE-2023-52814: kernel: drm/amdgpu: Fix potential null pointer derefernce</issue>
  <issue id="1225566" tracker="bnc">VUL-0: CVE-2023-52858: kernel: clk: mediatek: clk-mt7629: Add check for mtk_alloc_clk_data</issue>
  <issue id="1225568" tracker="bnc">VUL-0: CVE-2023-52815: kernel: drm/amdgpu/vkms: fix a possible null pointer dereference</issue>
  <issue id="1225569" tracker="bnc">VUL-0: CVE-2023-52817: kernel: drm/amdgpu: Fix a null pointer access when the smc_rreg pointer is NULL</issue>
  <issue id="1225570" tracker="bnc">VUL-0: CVE-2023-52763: kernel: i3c: master: mipi-i3c-hci: Fix a kernel panic for accessing DAT_data.</issue>
  <issue id="1225571" tracker="bnc">VUL-0: CVE-2023-52764: kernel: media: gspca: cpia1: shift-out-of-bounds in set_flicker</issue>
  <issue id="1225572" tracker="bnc">VUL-0: CVE-2023-52774: kernel: s390/dasd: protect device queue against concurrent access</issue>
  <issue id="1225573" tracker="bnc">VUL-0: CVE-2023-52762: kernel: virtio-blk: fix implicit overflow on virtio_max_dma_size</issue>
  <issue id="1225577" tracker="bnc">VUL-0: CVE-2023-52832: kernel: wifi: mac80211: don't return unset power in ieee80211_get_tx_power()</issue>
  <issue id="1225581" tracker="bnc">VUL-0: CVE-2023-52857: kernel: drm/mediatek: Fix coverity issue with unintentional integer overflow</issue>
  <issue id="1225583" tracker="bnc">VUL-0: CVE-2023-52855: kernel: usb: dwc2: fix possible NULL pointer dereference caused by driver concurrency</issue>
  <issue id="1225584" tracker="bnc">VUL-0: CVE-2023-52854: kernel: padata: Fix refcnt handling in padata_free_shell()</issue>
  <issue id="1225585" tracker="bnc">VUL-0: CVE-2023-52845: kernel: tipc: Change nla_policy for bearer-related names to NLA_NUL_STRING</issue>
  <issue id="1225586" tracker="bnc">VUL-0: CVE-2023-52863: kernel: hwmon: (axi-fan-control) Fix possible NULL pointer dereference</issue>
  <issue id="1225587" tracker="bnc">VUL-0: CVE-2023-52851: kernel: IB/mlx5: Fix init stage error handling to avoid double free of same QP and UAF</issue>
  <issue id="1225588" tracker="bnc">VUL-0: CVE-2023-52847: kernel: media: bttv: fix use after free error due to btv-&gt;timeout timer</issue>
  <issue id="1225589" tracker="bnc">VUL-0: CVE-2023-52873: kernel: clk: mediatek: clk-mt6779: Add check for mtk_alloc_clk_data</issue>
  <issue id="1225590" tracker="bnc">VUL-0: CVE-2023-52844: kernel: media: vidtv: psi: Add check for kstrdup</issue>
  <issue id="1225591" tracker="bnc">VUL-0: CVE-2023-52872: kernel: tty: n_gsm: fix race condition in status line change on dead connections</issue>
  <issue id="1225592" tracker="bnc">VUL-0: CVE-2023-52841: kernel: media: vidtv: mux: Add check and kfree for kstrdup</issue>
  <issue id="1225594" tracker="bnc">VUL-0: CVE-2024-36010: kernel: igb: Fix string truncation warnings in igb_set_fw_version</issue>
  <issue id="1225595" tracker="bnc">VUL-0: CVE-2023-52833: kernel: Bluetooth: btusb: add date-&gt;evt_skb is NULL check</issue>
  <issue id="1225599" tracker="bnc">VUL-0: CVE-2023-52834: kernel: atl1c: work around the DMA RX overflow issue</issue>
  <issue id="1225602" tracker="bnc">VUL-0: CVE-2023-52835: kernel: perf/core: bail out early if the request AUX area is out of bound</issue>
  <issue id="1225605" tracker="bnc">blk-cgroup: fix list corruption from resetting io stat</issue>
  <issue id="1225609" tracker="bnc">VUL-0: CVE-2023-52836: kernel: locking/ww_mutex/test: fix potential workqueue corruption</issue>
  <issue id="1225611" tracker="bnc">VUL-0: CVE-2023-52881: kernel: tcp: do not accept ACK of bytes we never sent</issue>
  <issue id="1225681" tracker="bnc">VUL-0: CVE-2024-36017: kernel: rtnetlink: Correct nested IFLA_VF_VLAN_LIST attribute validation</issue>
  <issue id="1225702" tracker="bnc">VUL-0: CVE-2024-36024: kernel: drm/amd/display: Disable idle reallow as part of command/gpint execution</issue>
  <issue id="1225723" tracker="bnc">VUL-0: CVE-2024-36882: kernel: mm: use memalloc_nofs_save() in page_cache_ra_order()</issue>
  <issue id="1225726" tracker="bnc">VUL-0: CVE-2024-36900: kernel: net: hns3: fix kernel crash when devlink reload during initialization</issue>
  <issue id="1225731" tracker="bnc">VUL-0: CVE-2024-36887: kernel: e1000e: change usleep_range to udelay in PHY mdic access</issue>
  <issue id="1225732" tracker="bnc">VUL-0: CVE-2024-36904: kernel: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique().</issue>
  <issue id="1225737" tracker="bnc">VUL-0: CVE-2024-36899: kernel: gpiolib: cdev: Fix use after free in lineinfo_changed_notify</issue>
  <issue id="1225741" tracker="bnc">VUL-0: CVE-2024-36903: kernel: ipv6: Fix potential uninit-value access in __ip6_make_skb()</issue>
  <issue id="1225758" tracker="bnc">VUL-0: CVE-2024-36915: kernel: nfc: llcp: fix nfc_llcp_setsockopt() unsafe copies</issue>
  <issue id="1225759" tracker="bnc">VUL-0: CVE-2024-36916: kernel: blk-iocost: avoid out of bounds shift</issue>
  <issue id="1225760" tracker="bnc">VUL-0: CVE-2024-36934: kernel: bna: ensure the copied buf is NUL terminated</issue>
  <issue id="1225761" tracker="bnc">VUL-0: CVE-2024-36938: kernel: bpf, skmsg: Fix NULL pointer dereference in sk_psock_skb_ingress_enqueue</issue>
  <issue id="1225762" tracker="bnc">VUL-0: CVE-2024-36957: kernel: octeontx2-af: avoid off-by-one read from userspace</issue>
  <issue id="1225763" tracker="bnc">VUL-0: CVE-2024-36935: kernel: ice: ensure the copied buf is NUL terminated</issue>
  <issue id="1225767" tracker="bnc">VUL-0: CVE-2024-36919: kernel: scsi: bnx2fc: remove spin_lock_bh while releasing resources after upload</issue>
  <issue id="1225770" tracker="bnc">VUL-0: CVE-2024-36917: kernel: block: fix overflow in blk_ioctl_discard()</issue>
  <issue id="1225815" tracker="bnc">VUL-0: CVE-2024-36923: kernel: fs/9p: fix uninitialized values during inode evict</issue>
  <issue id="1225820" tracker="bnc">VUL-0: CVE-2024-36924: kernel: scsi: lpfc: Release hbalock before calling lpfc_worker_wake_up()</issue>
  <issue id="1225823" tracker="bnc">VUL-0: CVE-2024-36945: kernel: net/smc: fix neighbour and rtable leak in smc_ib_find_route()</issue>
  <issue id="1225827" tracker="bnc">VUL-0: CVE-2024-36962: kernel: net: ks8851: Queue RX packets in IRQ handler instead of disabling BHs</issue>
  <issue id="1225834" tracker="bnc">VUL-0: CVE-2024-36937: kernel: xdp: use flags field to disambiguate broadcast redirect</issue>
  <issue id="1225866" tracker="bnc">VUL-0: CVE-2024-36964: kernel: fs/9p: only translate RWX permissions for plain 9P2000</issue>
  <issue id="1225872" tracker="bnc">VUL-0: CVE-2024-36960: kernel: drm/vmwgfx: fix invalid reads in fence signaled events</issue>
  <issue id="1225898" tracker="bnc">VUL-0: CVE-2024-36952: kernel: scsi: lpfc: Move NPIV's transport unregistration to after resource clean up</issue>
  <issue id="1225903" tracker="bnc">bpf: backport of iterator and callback handling fixes</issue>
  <issue id="1226022" tracker="bnc">L3: Backport of cephfs client fix addressing hangs [ref:_00D1igLOd._500TrBZugw:ref]</issue>
  <issue id="1226131" tracker="bnc">VUL-0: CVE-2024-36967: kernel: KEYS: trusted: Fix memory leak in tpm2_key_encode()</issue>
  <issue id="1226145" tracker="bnc">VUL-0: CVE-2024-36971: kernel: fix __dst_negative_advice() race</issue>
  <issue id="1226149" tracker="bnc">VUL-0: CVE-2024-36965: kernel: remoteproc: mediatek: Make sure IPI buffer fits in L2TCM</issue>
  <issue id="1226155" tracker="bnc">VUL-0: CVE-2024-36969: kernel: drm/amd/display: Fix division by zero in setup_dsc_config</issue>
  <issue id="1226158" tracker="bnc">SLE-15SP6: Kernel oops during boot on Intel Xeon</issue>
  <issue id="1226163" tracker="bnc">VUL-0: CVE-2024-36972: kernel: af_unix: update unix_sk(sk)-&gt;oob_skb under sk_receive_queue lock</issue>
  <issue id="1226211" tracker="bnc">kernel-obs-build missing network modules for Docker build</issue>
  <issue id="1226212" tracker="bnc">kernel-obs-build doesn't find "iso9660" when building containers with podman</issue>
  <issue id="1226226" tracker="bnc">L3: Backport request for commit b6a1f9a, "avoid infinite loop in pnfs_update_layout" — ref:_00D1igLOd._500TrBmceA:ref</issue>
  <issue id="1226457" tracker="bnc">VUL-0: CVE-2024-36973: kernel: misc: microchip: pci1xxxx: fix double free in the error handling of gp_aux_bus_probe()</issue>
  <issue id="1226503" tracker="bnc">SLES15SP6: kernel tasks hang while using errinject and drmgr(NVME/Denali/P10)</issue>
  <issue id="1226513" tracker="bnc">VUL-0: CVE-2024-36977: kernel: usb: dwc3: Wait unconditionally after issuing EndXfer command</issue>
  <issue id="1226514" tracker="bnc">VUL-0: CVE-2024-36978: kernel: net: sched: sch_multiq: fix possible OOB write in multiq_tune()</issue>
  <issue id="1226520" tracker="bnc">VUL-0: CVE-2024-36975: kernel: KEYS: trusted: Do not use WARN when encode fails</issue>
  <issue id="1226582" tracker="bnc">VUL-0: CVE-2024-38540: kernel: bnxt_re: avoid shift undefined behavior in bnxt_qplib_alloc_init_hwq</issue>
  <issue id="1226587" tracker="bnc">VUL-0: CVE-2024-38541: kernel: of: module: add buffer overflow check in of_modalias()</issue>
  <issue id="1226588" tracker="bnc">cachefiles: remove requests from xarray during flushing requests</issue>
  <issue id="1226592" tracker="bnc">VUL-0: CVE-2024-38615: kernel: cpufreq: exit() callback is optional</issue>
  <issue id="1226593" tracker="bnc">VUL-0: CVE-2024-38546: kernel: drm: vc4: Fix possible null pointer dereference</issue>
  <issue id="1226594" tracker="bnc">VUL-0: CVE-2024-38543: kernel: lib/test_hmm.c: handle src_pfns and dst_pfns allocation failure</issue>
  <issue id="1226595" tracker="bnc">VUL-0: CVE-2024-38545: kernel: RDMA/hns: Fix UAF for cq async event</issue>
  <issue id="1226597" tracker="bnc">VUL-0: CVE-2024-38544: kernel: RDMA/rxe: fix seg fault in rxe_comp_queue_pkt</issue>
  <issue id="1226607" tracker="bnc">VUL-0: CVE-2024-38555: kernel: net/mlx5: Discard command completions in internal error</issue>
  <issue id="1226608" tracker="bnc">VUL-0: CVE-2024-38539: kernel: RDMA/cma: Fix kmemleak in rdma_core observed during blktests nvme/rdma use siw</issue>
  <issue id="1226610" tracker="bnc">VUL-0: CVE-2024-38580: kernel: epoll: be better about file lifetimes</issue>
  <issue id="1226612" tracker="bnc">VUL-0: CVE-2024-38575: kernel: wifi: brcmfmac: pcie: handle randbuf allocation failure</issue>
  <issue id="1226613" tracker="bnc">VUL-0: CVE-2024-38602: kernel: ax25: Fix reference count leak issues of ax25_dev</issue>
  <issue id="1226630" tracker="bnc">VUL-0: CVE-2023-52883: kernel: drm/amdgpu: Fix possible null pointer dereference</issue>
  <issue id="1226632" tracker="bnc">VUL-0: CVE-2024-38547: kernel: media: atomisp: ssh_css: Fix a null-pointer dereference in load_video_binaries</issue>
  <issue id="1226633" tracker="bnc">VUL-0: CVE-2024-38550: kernel: ASoC: kirkwood: Fix potential NULL dereference</issue>
  <issue id="1226634" tracker="bnc">VUL-0: CVE-2024-38578: kernel: ecryptfs: fix buffer size for tag 66 packet</issue>
  <issue id="1226637" tracker="bnc">VUL-0: CVE-2024-38579: kernel: crypto: bcm - fix pointer arithmetic</issue>
  <issue id="1226657" tracker="bnc">VUL-0: CVE-2024-38581: kernel: drm/amdgpu/mes: fix use-after-free issue</issue>
  <issue id="1226658" tracker="bnc">VUL-0: CVE-2024-38582: kernel: nilfs2: fix potential hang in nilfs_detach_log_writer()</issue>
  <issue id="1226734" tracker="bnc">VUL-0: CVE-2024-38594: kernel: net: stmmac: move the EST lock to struct stmmac_priv</issue>
  <issue id="1226735" tracker="bnc">VUL-0: CVE-2024-38549: kernel: drm/mediatek: Add 0 size check to mtk_drm_gem_obj</issue>
  <issue id="1226737" tracker="bnc">VUL-0: CVE-2024-38571: kernel: thermal/drivers/tsens: Fix null pointer dereference</issue>
  <issue id="1226738" tracker="bnc">VUL-0: CVE-2024-38591: kernel: RDMA/hns: Fix deadlock on SRQ async events.</issue>
  <issue id="1226739" tracker="bnc">VUL-0: CVE-2024-38573: kernel: cppc_cpufreq: Fix possible null pointer dereference</issue>
  <issue id="1226740" tracker="bnc">VUL-0: CVE-2024-38605: kernel: ALSA: core: Fix NULL module pointer assignment at card init</issue>
  <issue id="1226741" tracker="bnc">VUL-0: CVE-2024-38595: kernel: net/mlx5: fix peer devlink set for SF representor devlink port</issue>
  <issue id="1226742" tracker="bnc">VUL-0: CVE-2024-38554: kernel: ax25: Fix reference count leak issue of net_device</issue>
  <issue id="1226744" tracker="bnc">VUL-0: CVE-2024-38553: kernel: net: fec: remove .ndo_poll_controller to avoid deadlocks</issue>
  <issue id="1226746" tracker="bnc">VUL-0: CVE-2024-38608: kernel: net/mlx5e: fix netif state handling</issue>
  <issue id="1226747" tracker="bnc">VUL-0: CVE-2024-38565: kernel: wifi: ar5523: enable proper endpoint verification</issue>
  <issue id="1226749" tracker="bnc">VUL-0: CVE-2024-38597: kernel: eth: sungem: remove .ndo_poll_controller to avoid deadlocks</issue>
  <issue id="1226754" tracker="bnc">VUL-0: CVE-2024-38618: kernel: ALSA: timer: Set lower bound of start tick time</issue>
  <issue id="1226758" tracker="bnc">VUL-0: CVE-2024-38610: kernel: drivers/virt/acrn: fix PFNMAP PTE checks in acrn_vm_ram_map()</issue>
  <issue id="1226760" tracker="bnc">VUL-0: CVE-2024-38611: kernel: media: i2c: et8ek8: don't strip remove function when driver is builtin</issue>
  <issue id="1226761" tracker="bnc">VUL-0: CVE-2024-38551: kernel: ASoC: mediatek: assign dummy when codec not specified for a DAI link</issue>
  <issue id="1226764" tracker="bnc">VUL-0: CVE-2023-52884: kernel: Input: cyapa - add missing input core locking to suspend/resume functions</issue>
  <issue id="1226767" tracker="bnc">VUL-0: CVE-2024-38552: kernel: drm/amd/display: fix potential index out of bounds in color transformation function</issue>
  <issue id="1226768" tracker="bnc">VUL-0: CVE-2024-33619: kernel: efi: libstub: only free priv.runtime_map when allocated</issue>
  <issue id="1226769" tracker="bnc">VUL-0: CVE-2024-38567: kernel: wifi: carl9170: add a proper sanity check for endpoints</issue>
  <issue id="1226771" tracker="bnc">VUL-0: CVE-2024-38568: kernel: drivers/perf: hisi: hns3: Fix out-of-bound access when valid event group</issue>
  <issue id="1226772" tracker="bnc">VUL-0: CVE-2024-38569: kernel: drivers/perf: hisi_pcie: Fix out-of-bound access when valid event group</issue>
  <issue id="1226774" tracker="bnc">VUL-0: CVE-2024-38556: kernel: net/mlx5: add a timeout to acquire the command queue semaphore</issue>
  <issue id="1226775" tracker="bnc">VUL-0: CVE-2024-38570: kernel: gfs2: Fix potential glock use-after-free on unmount</issue>
  <issue id="1226776" tracker="bnc">VUL-0: CVE-2024-38572: kernel: wifi: ath12k: fix out-of-bound access of qmi_invoke_handler()</issue>
  <issue id="1226777" tracker="bnc">VUL-0: CVE-2024-38583: kernel: nilfs2: fix use-after-free of timer for log writer thread</issue>
  <issue id="1226780" tracker="bnc">VUL-0: CVE-2024-38587: kernel: speakup: Fix sizeof() vs ARRAY_SIZE() bug</issue>
  <issue id="1226781" tracker="bnc">VUL-0: CVE-2024-38557: kernel: net/mlx5: reload only IB representors upon lag disable/enable</issue>
  <issue id="1226786" tracker="bnc">VUL-0: CVE-2024-38560: kernel: scsi: bfa: ensure the copied buf is NUL terminated</issue>
  <issue id="1226788" tracker="bnc">VUL-0: CVE-2024-38562: kernel: wifi: nl80211: avoid address calculations via out of bounds array indexing</issue>
  <issue id="1226789" tracker="bnc">VUL-0: CVE-2024-38564: kernel: bpf: add BPF_PROG_TYPE_CGROUP_SKB attach type enforcement in BPF_LINK_CREATE</issue>
  <issue id="1226790" tracker="bnc">VUL-0: CVE-2024-38566: kernel: bpf: fix verifier assumptions about socket-&gt;sk</issue>
  <issue id="1226791" tracker="bnc">sched/core: Fix incorrect initialization of the 'burst' parameter in  cpu_max_write()</issue>
  <issue id="1226796" tracker="bnc">VUL-0: CVE-2024-34777: kernel: dma-mapping: benchmark: fix node id validation</issue>
  <issue id="1226799" tracker="bnc">VUL-0: CVE-2024-36281: kernel: net/mlx5: use mlx5_ipsec_rx_status_destroy to correctly delete status rules</issue>
  <issue id="1226837" tracker="bnc">VUL-0: CVE-2024-38588: kernel: ftrace: Fix possible use-after-free issue in ftrace_location()</issue>
  <issue id="1226839" tracker="bnc">VUL-0: CVE-2024-38590: kernel: RDMA/hns: Modify the print level of CQE error</issue>
  <issue id="1226840" tracker="bnc">VUL-0: CVE-2024-36477: kernel: tpm_tis_spi: Account for SPI header when allocating TPM SPI xfer buffer</issue>
  <issue id="1226841" tracker="bnc">VUL-0: CVE-2024-36478: kernel: null_blk: fix null-ptr-dereference while configuring 'power' and 'submit_queues'</issue>
  <issue id="1226842" tracker="bnc">VUL-0: CVE-2024-38603: kernel: drivers/perf: hisi: hns3: Actually use devm_add_action_or_reset()</issue>
  <issue id="1226844" tracker="bnc">VUL-0: CVE-2024-38592: kernel: drm/mediatek: init `ddp_comp` with devm_kcalloc()</issue>
  <issue id="1226848" tracker="bnc">VUL-0: CVE-2024-38599: kernel: jffs2: prevent xattr node from overflowing the eraseblock</issue>
  <issue id="1226852" tracker="bnc">VUL-0: CVE-2024-38616: kernel: wifi: carl9170: re-fix fortified-memset warning</issue>
  <issue id="1226856" tracker="bnc">VUL-0: CVE-2024-38622: kernel: drm/msm/dpu: Add callback function pointer check before its call</issue>
  <issue id="1226857" tracker="bnc">VUL-0: CVE-2024-38627: kernel: stm class: Fix a double free in stm_register_device()</issue>
  <issue id="1226859" tracker="bnc">VUL-0: CVE-2024-38617: kernel: kunit/fortify: Fix mismatched kvalloc()/vfree() usage</issue>
  <issue id="1226861" tracker="bnc">VUL-0: CVE-2024-38619: kernel: usb-storage: alauda: Check whether the media is initialized</issue>
  <issue id="1226863" tracker="bnc">VUL-0: CVE-2024-38635: kernel: soundwire: cadence: fix invalid PDI offset</issue>
  <issue id="1226864" tracker="bnc">VUL-0: CVE-2024-38600: kernel: ALSA: fix deadlocks with kctl removals at disconnection</issue>
  <issue id="1226867" tracker="bnc">VUL-0: CVE-2024-38633: kernel: serial: max3100: Update uart_driver_registered on driver removal</issue>
  <issue id="1226868" tracker="bnc">VUL-0: CVE-2024-38634: kernel: serial: max3100: Lock port-&gt;lock when calling uart_handle_cts_change()</issue>
  <issue id="1226875" tracker="bnc">VUL-0: CVE-2024-37353: kernel: virtio: delete vq in vp_find_vqs_msix() when request_irq() fails</issue>
  <issue id="1226876" tracker="bnc">VUL-0: CVE-2024-38601: kernel: ring-buffer: fix a race between readers and resize checks</issue>
  <issue id="1226878" tracker="bnc">VUL-0: CVE-2024-38381: kernel: nfc: nci: Fix uninit-value in nci_rx_work</issue>
  <issue id="1226879" tracker="bnc">VUL-0: CVE-2024-38636: kernel: f2fs: multidev: fix to recognize valid zero block address</issue>
  <issue id="1226886" tracker="bnc">VUL-0: CVE-2024-38780: kernel: dma-buf/sw-sync: don't enable IRQ from sync_print_obj()</issue>
  <issue id="1226890" tracker="bnc">VUL-0: CVE-2024-38388: kernel: ALSA: hda/cs_dsp_ctl: Use private_free for control cleanup</issue>
  <issue id="1226891" tracker="bnc">VUL-0: CVE-2024-38390: kernel: drm/msm/a6xx: Avoid a nullptr dereference when speedbin setting fails</issue>
  <issue id="1226894" tracker="bnc">VUL-0: CVE-2024-38391: kernel: cxl/region: Fix cxlr_pmem leaks</issue>
  <issue id="1226895" tracker="bnc">VUL-0: CVE-2024-38621: kernel: media: stk1160: fix bounds checking in stk1160_copy_video()</issue>
  <issue id="1226905" tracker="bnc">VUL-0: CVE-2024-38629: kernel: dmaengine: idxd: avoid unnecessary destruction of file_ida</issue>
  <issue id="1226908" tracker="bnc">VUL-0: CVE-2024-38630: kernel: watchdog: cpu5wdt.c: fix use-after-free bug caused by cpu5wdt_trigger</issue>
  <issue id="1226909" tracker="bnc">VUL-0: CVE-2024-39277: kernel: dma-mapping: benchmark: handle NUMA_NO_NODE correctly</issue>
  <issue id="1226911" tracker="bnc">VUL-0: CVE-2024-38628: kernel: usb: gadget: u_audio: Fix race condition use of controls after free during gadget unbind.</issue>
  <issue id="1226928" tracker="bnc">Backport arm64: pci: clear Secondary Status errors after enumeration</issue>
  <issue id="1226934" tracker="bnc">VUL-0: CVE-2024-39291: kernel: drm/amdgpu: Fix buffer size in gfx_v9_4_3_init_ cp_compute_microcode() and rlc_microcode()</issue>
  <issue id="1226938" tracker="bnc">VUL-0: CVE-2024-38384: kernel: blk-cgroup: fix list corruption from reorder of WRITE -&gt;lqueued</issue>
  <issue id="1226939" tracker="bnc">VUL-0: CVE-2024-38663: kernel: blk-cgroup: fix list corruption from resetting io stat</issue>
  <issue id="1226941" tracker="bnc">VUL-0: CVE-2024-38664: kernel: drm: zynqmp_dpsub: Always register bridge</issue>
  <issue id="1226948" tracker="bnc">VUL-0: CVE-2024-35247: kernel: fpga: region: add owner module and take its refcount</issue>
  <issue id="1226949" tracker="bnc">VUL-0: CVE-2024-36479: kernel: fpga: bridge: add owner module and take its refcount</issue>
  <issue id="1226950" tracker="bnc">VUL-0: CVE-2024-37021: kernel: fpga: manager: add owner module and take its refcount</issue>
  <issue id="1226962" tracker="bnc">TSC clocksource spuriously declared invalid in 12+ socket Sapphire Rapids systems</issue>
  <issue id="1226976" tracker="bnc">VUL-0: CVE-2022-48772: kernel: media: lgdt3306a: add a check against null-pointer-def</issue>
  <issue id="1226989" tracker="bnc">VUL-0: CVE-2024-39296: kernel: bonding: fix oops during rmmod</issue>
  <issue id="1226990" tracker="bnc">VUL-0: CVE-2024-39371: kernel: io_uring: check for non-NULL file pointer in io_file_can_poll()</issue>
  <issue id="1226992" tracker="bnc">VUL-0: CVE-2024-39469: kernel: nilfs2: fix nilfs_empty_dir() misjudgment and long loop on I/O errors</issue>
  <issue id="1226994" tracker="bnc">VUL-0: CVE-2024-39301: kernel: net/9p: fix uninit-value in p9_client_rpc()</issue>
  <issue id="1226995" tracker="bnc">VUL-0: CVE-2024-39362: kernel: i2c: acpi: Unbind mux adapters before delete</issue>
  <issue id="1226996" tracker="bnc">VUL-0: CVE-2024-38661: kernel: s390/ap: Fix crash in AP internal function modify_bitmap()</issue>
  <issue id="1227066" tracker="bnc">VUL-0: CVE-2024-37078: kernel: nilfs2: fix potential kernel bug due to lack of writeback flag waiting</issue>
  <issue id="1227072" tracker="bnc">s390/cpacf: Make use of invalid opcode produce a link error</issue>
  <issue id="1227085" tracker="bnc">VUL-0: CVE-2024-38385: kernel: genirq/irqdesc: Prevent use-after-free in irq_find_at_or_after()</issue>
  <issue id="1227089" tracker="bnc">VUL-0: CVE-2024-39466: kernel: thermal/drivers/qcom/lmh: Check for SCM availability at probe</issue>
  <issue id="1227090" tracker="bnc">VUL-0: CVE-2024-39463: kernel: 9p: add missing locking around taking dentry fid list</issue>
  <issue id="1227096" tracker="bnc">VUL-0: CVE-2024-39471: kernel: drm/amdgpu: add error handle to avoid out-of-bounds</issue>
  <issue id="1227101" tracker="bnc">VUL-0: CVE-2024-37354: kernel: btrfs: fix crash on racing fsync and size-extending write into prealloc</issue>
  <issue id="1227190" tracker="bnc">Fix iaa_crypto on SLES 15 SP6</issue>
  <issue id="2023-52883" tracker="cve" />
  <issue id="2024-39463" tracker="cve" />
  <issue id="2024-38600" tracker="cve" />
  <issue id="2024-38605" tracker="cve" />
  <issue id="2023-52806" tracker="cve" />
  <issue id="2024-38388" tracker="cve" />
  <issue id="2024-38618" tracker="cve" />
  <issue id="2024-38550" tracker="cve" />
  <issue id="2024-38551" tracker="cve" />
  <issue id="2023-52833" tracker="cve" />
  <issue id="2024-26889" tracker="cve" />
  <issue id="2023-52866" tracker="cve" />
  <issue id="2023-52851" tracker="cve" />
  <issue id="2023-52884" tracker="cve" />
  <issue id="2024-36975" tracker="cve" />
  <issue id="2024-36967" tracker="cve" />
  <issue id="2024-38539" tracker="cve" />
  <issue id="2024-38591" tracker="cve" />
  <issue id="2024-38590" tracker="cve" />
  <issue id="2024-38544" tracker="cve" />
  <issue id="2023-52803" tracker="cve" />
  <issue id="2024-26676" tracker="cve" />
  <issue id="2024-35970" tracker="cve" />
  <issue id="2024-26750" tracker="cve" />
  <issue id="2024-26780" tracker="cve" />
  <issue id="2024-36972" tracker="cve" />
  <issue id="2023-52750" tracker="cve" />
  <issue id="2024-38554" tracker="cve" />
  <issue id="2024-38602" tracker="cve" />
  <issue id="2024-38384" tracker="cve" />
  <issue id="2024-38663" tracker="cve" />
  <issue id="2024-38540" tracker="cve" />
  <issue id="2023-52784" tracker="cve" />
  <issue id="2023-52878" tracker="cve" />
  <issue id="2023-52870" tracker="cve" />
  <issue id="2023-52873" tracker="cve" />
  <issue id="2023-52858" tracker="cve" />
  <issue id="2023-52876" tracker="cve" />
  <issue id="2024-38573" tracker="cve" />
  <issue id="2024-38615" tracker="cve" />
  <issue id="2024-38579" tracker="cve" />
  <issue id="2023-52813" tracker="cve" />
  <issue id="2023-52849" tracker="cve" />
  <issue id="2023-52792" tracker="cve" />
  <issue id="2024-38391" tracker="cve" />
  <issue id="2024-38780" tracker="cve" />
  <issue id="2024-34777" tracker="cve" />
  <issue id="2024-39277" tracker="cve" />
  <issue id="2024-38629" tracker="cve" />
  <issue id="2023-52819" tracker="cve" />
  <issue id="2023-52818" tracker="cve" />
  <issue id="2023-52812" tracker="cve" />
  <issue id="2023-52753" tracker="cve" />
  <issue id="2024-36969" tracker="cve" />
  <issue id="2023-52862" tracker="cve" />
  <issue id="2024-38552" tracker="cve" />
  <issue id="2023-52773" tracker="cve" />
  <issue id="2024-26767" tracker="cve" />
  <issue id="2023-52817" tracker="cve" />
  <issue id="2024-39291" tracker="cve" />
  <issue id="2023-52814" tracker="cve" />
  <issue id="2024-39471" tracker="cve" />
  <issue id="2024-38581" tracker="cve" />
  <issue id="2023-52815" tracker="cve" />
  <issue id="2023-52825" tracker="cve" />
  <issue id="2023-52816" tracker="cve" />
  <issue id="2024-38548" tracker="cve" />
  <issue id="2023-52861" tracker="cve" />
  <issue id="2023-52856" tracker="cve" />
  <issue id="2024-38549" tracker="cve" />
  <issue id="2023-52857" tracker="cve" />
  <issue id="2024-38592" tracker="cve" />
  <issue id="2024-38390" tracker="cve" />
  <issue id="2024-38622" tracker="cve" />
  <issue id="2023-52826" tracker="cve" />
  <issue id="2024-38546" tracker="cve" />
  <issue id="2024-36960" tracker="cve" />
  <issue id="2024-38664" tracker="cve" />
  <issue id="2024-39296" tracker="cve" />
  <issue id="2024-36887" tracker="cve" />
  <issue id="2024-33619" tracker="cve" />
  <issue id="2023-52838" tracker="cve" />
  <issue id="2023-52810" tracker="cve" />
  <issue id="2023-52804" tracker="cve" />
  <issue id="2024-38588" tracker="cve" />
  <issue id="2024-38385" tracker="cve" />
  <issue id="2023-52853" tracker="cve" />
  <issue id="2023-52863" tracker="cve" />
  <issue id="2024-39362" tracker="cve" />
  <issue id="2023-52791" tracker="cve" />
  <issue id="2023-52763" tracker="cve" />
  <issue id="2023-52766" tracker="cve" />
  <issue id="2023-52788" tracker="cve" />
  <issue id="2024-36010" tracker="cve" />
  <issue id="2024-35957" tracker="cve" />
  <issue id="2023-52801" tracker="cve" />
  <issue id="2024-38599" tracker="cve" />
  <issue id="2023-52799" tracker="cve" />
  <issue id="2023-52805" tracker="cve" />
  <issue id="2024-38617" tracker="cve" />
  <issue id="2021-47432" tracker="cve" />
  <issue id="2024-38543" tracker="cve" />
  <issue id="2023-52836" tracker="cve" />
  <issue id="2024-26758" tracker="cve" />
  <issue id="2024-38547" tracker="cve" />
  <issue id="2023-52847" tracker="cve" />
  <issue id="2023-52764" tracker="cve" />
  <issue id="2023-52850" tracker="cve" />
  <issue id="2024-38611" tracker="cve" />
  <issue id="2023-52754" tracker="cve" />
  <issue id="2022-48772" tracker="cve" />
  <issue id="2024-38621" tracker="cve" />
  <issue id="2023-52841" tracker="cve" />
  <issue id="2023-52844" tracker="cve" />
  <issue id="2023-52765" tracker="cve" />
  <issue id="2024-36973" tracker="cve" />
  <issue id="2024-36962" tracker="cve" />
  <issue id="2024-38595" tracker="cve" />
  <issue id="2023-52782" tracker="cve" />
  <issue id="2023-52780" tracker="cve" />
  <issue id="2023-52783" tracker="cve" />
  <issue id="2024-35896" tracker="cve" />
  <issue id="2024-35962" tracker="cve" />
  <issue id="2024-38381" tracker="cve" />
  <issue id="2024-39469" tracker="cve" />
  <issue id="2024-38582" tracker="cve" />
  <issue id="2024-38583" tracker="cve" />
  <issue id="2024-38541" tracker="cve" />
  <issue id="2023-52854" tracker="cve" />
  <issue id="2023-52835" tracker="cve" />
  <issue id="2023-52869" tracker="cve" />
  <issue id="2024-36965" tracker="cve" />
  <issue id="2024-38601" tracker="cve" />
  <issue id="2023-52774" tracker="cve" />
  <issue id="2023-52808" tracker="cve" />
  <issue id="2023-52811" tracker="cve" />
  <issue id="2023-52809" tracker="cve" />
  <issue id="2024-36952" tracker="cve" />
  <issue id="2024-36924" tracker="cve" />
  <issue id="2024-38634" tracker="cve" />
  <issue id="2024-38633" tracker="cve" />
  <issue id="2024-38635" tracker="cve" />
  <issue id="2024-38587" tracker="cve" />
  <issue id="2023-52749" tracker="cve" />
  <issue id="2023-52868" tracker="cve" />
  <issue id="2024-39466" tracker="cve" />
  <issue id="2024-38571" tracker="cve" />
  <issue id="2023-52794" tracker="cve" />
  <issue id="2023-52767" tracker="cve" />
  <issue id="2024-36477" tracker="cve" />
  <issue id="2023-52879" tracker="cve" />
  <issue id="2024-26920" tracker="cve" />
  <issue id="2023-52872" tracker="cve" />
  <issue id="2023-52880" tracker="cve" />
  <issue id="2023-52789" tracker="cve" />
  <issue id="2023-52781" tracker="cve" />
  <issue id="2024-36977" tracker="cve" />
  <issue id="2024-38628" tracker="cve" />
  <issue id="2024-38619" tracker="cve" />
  <issue id="2023-52877" tracker="cve" />
  <issue id="2023-52762" tracker="cve" />
  <issue id="2023-52842" tracker="cve" />
  <issue id="2024-38630" tracker="cve" />
  <issue id="2024-38565" tracker="cve" />
  <issue id="2023-52798" tracker="cve" />
  <issue id="2023-52777" tracker="cve" />
  <issue id="2023-52800" tracker="cve" />
  <issue id="2023-52776" tracker="cve" />
  <issue id="2023-52769" tracker="cve" />
  <issue id="2024-38572" tracker="cve" />
  <issue id="2023-52827" tracker="cve" />
  <issue id="2023-52829" tracker="cve" />
  <issue id="2024-38575" tracker="cve" />
  <issue id="2024-38567" tracker="cve" />
  <issue id="2024-38616" tracker="cve" />
  <issue id="2023-52832" tracker="cve" />
  <issue id="2024-38562" tracker="cve" />
  <issue id="2023-52768" tracker="cve" />
  <issue id="2023-52874" tracker="cve" />
  <issue id="2023-52855" tracker="cve" />
  <issue id="2024-39371" tracker="cve" />
  <issue id="2023-52846" tracker="cve" />
  <issue id="2024-38610" tracker="cve" />
  <issue id="2024-37354" tracker="cve" />
  <issue id="2024-36919" tracker="cve" />
  <issue id="2024-38559" tracker="cve" />
  <issue id="2024-38570" tracker="cve" />
  <issue id="2024-36904" tracker="cve" />
  <issue id="2023-52840" tracker="cve" />
  <issue id="2024-38545" tracker="cve" />
  <issue id="2023-52834" tracker="cve" />
  <issue id="2023-52875" tracker="cve" />
  <issue id="2023-52865" tracker="cve" />
  <issue id="2023-52821" tracker="cve" />
  <issue id="2023-52867" tracker="cve" />
  <issue id="2024-38578" tracker="cve" />
  <issue id="2024-36964" tracker="cve" />
  <issue id="2023-52759" tracker="cve" />
  <issue id="2023-52796" tracker="cve" />
  <issue id="2023-52807" tracker="cve" />
  <issue id="2023-52864" tracker="cve" />
  <issue id="2024-36926" tracker="cve" />
  <issue id="2023-52871" tracker="cve" />
  <issue id="2023-52795" tracker="cve" />
  <issue id="2023-52881" tracker="cve" />
  <issue id="2024-37353" tracker="cve" />
  <issue id="2024-39301" tracker="cve" />
  <issue id="2024-35843" tracker="cve" />
  <issue id="2024-37078" tracker="cve" />
  <issue id="2024-35247" tracker="cve" />
  <issue id="2024-36479" tracker="cve" />
  <issue id="2024-37021" tracker="cve" />
  <issue id="2024-36281" tracker="cve" />
  <issue id="2024-38580" tracker="cve" />
  <issue id="2024-36478" tracker="cve" />
  <issue id="2024-38636" tracker="cve" />
  <issue id="2024-38661" tracker="cve" />
  <issue id="2024-38564" tracker="cve" />
  <issue id="2024-38566" tracker="cve" />
  <issue id="2024-38560" tracker="cve" />
  <issue id="2024-36978" tracker="cve" />
  <issue id="2024-36917" tracker="cve" />
  <issue id="2024-38627" tracker="cve" />
  <issue id="2024-38603" tracker="cve" />
  <issue id="2024-38553" tracker="cve" />
  <issue id="2024-38555" tracker="cve" />
  <issue id="2024-38556" tracker="cve" />
  <issue id="2024-38557" tracker="cve" />
  <issue id="2024-38608" tracker="cve" />
  <issue id="2024-38597" tracker="cve" />
  <issue id="2024-38594" tracker="cve" />
  <issue id="2024-38569" tracker="cve" />
  <issue id="2024-38568" tracker="cve" />
  <issue id="2024-26814" tracker="cve" />
  <issue id="2024-26813" tracker="cve" />
  <issue id="2024-36945" tracker="cve" />
  <issue id="2024-36923" tracker="cve" />
  <issue id="2024-36971" tracker="cve" />
  <issue id="2024-27414" tracker="cve" />
  <issue id="2024-35900" tracker="cve" />
  <issue id="2024-35886" tracker="cve" />
  <issue id="2024-36024" tracker="cve" />
  <issue id="2024-36903" tracker="cve" />
  <issue id="2024-36899" tracker="cve" />
  <issue id="2024-35979" tracker="cve" />
  <issue id="2024-35807" tracker="cve" />
  <issue id="2023-52622" tracker="cve" />
  <issue id="2023-52843" tracker="cve" />
  <issue id="2024-35898" tracker="cve" />
  <issue id="2024-36915" tracker="cve" />
  <issue id="2024-36017" tracker="cve" />
  <issue id="2024-36882" tracker="cve" />
  <issue id="2024-36916" tracker="cve" />
  <issue id="2024-36900" tracker="cve" />
  <issue id="2023-52787" tracker="cve" />
  <issue id="2024-35925" tracker="cve" />
  <issue id="2023-52837" tracker="cve" />
  <issue id="2023-52786" tracker="cve" />
  <issue id="2024-36934" tracker="cve" />
  <issue id="2024-36935" tracker="cve" />
  <issue id="2024-36937" tracker="cve" />
  <issue id="2023-52672" tracker="cve" />
  <issue id="2023-52845" tracker="cve" />
  <issue id="2024-26482" tracker="cve" />
  <issue id="2024-36005" tracker="cve" />
  <issue id="2024-26845" tracker="cve" />
  <issue id="2024-35892" tracker="cve" />
  <issue id="2024-35848" tracker="cve" />
  <issue id="2024-35884" tracker="cve" />
  <issue id="2024-35857" tracker="cve" />
  <issue id="2023-52735" tracker="cve" />
  <issue id="2024-35926" tracker="cve" />
  <issue id="2024-35976" tracker="cve" />
  <issue id="2024-36938" tracker="cve" />
  <issue id="2024-36008" tracker="cve" />
  <issue id="2024-35998" tracker="cve" />
  <issue id="2023-52757" tracker="cve" />
  <issue id="2024-27419" tracker="cve" />
  <issue id="2024-36957" tracker="cve" />
  <issue id="2024-26625" tracker="cve" />
  <issue id="2024-35880" tracker="cve" />
  <issue id="2024-35831" tracker="cve" />
  <issue id="2024-35827" tracker="cve" />
  <issue id="2023-52656" tracker="cve" />
  <issue id="2023-52699" tracker="cve" />
  <issue id="PED-8491" tracker="jsc" />
  <issue id="PED-8570" tracker="jsc" />
  <issue id="PED-8688" tracker="jsc" />
  <category>security</category>
  <rating>important</rating>
  <packager>jones_tony</packager>
  <reboot_needed/>
  <description>The SUSE Linux Enterprise 15 SP6 kernel was updated to receive various security bugfixes.


The following security bugs were fixed:

- CVE-2024-39371: io_uring: check for non-NULL file pointer in io_file_can_poll() (bsc#1226990).
- CVE-2023-52846: hsr: Prevent use after free in prp_create_tagged_frame() (bsc#1225098).
- CVE-2024-38610: drivers/virt/acrn: fix PFNMAP PTE checks in acrn_vm_ram_map() (bsc#1226758).
- CVE-2024-37354: btrfs: fix crash on racing fsync and size-extending write into prealloc (bsc#1227101).
- CVE-2024-36919: scsi: bnx2fc: Remove spin_lock_bh while releasing resources after upload (bsc#1225767).
- CVE-2024-38559: scsi: qedf: Ensure the copied buf is NUL terminated (bsc#1226785).
- CVE-2024-38570: gfs2: Fix potential glock use-after-free on unmount (bsc#1226775).
- CVE-2024-36904: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique() (bsc#1225732).
- CVE-2023-52840: Fix use after free in rmi_unregister_function() (bsc#1224928).
- CVE-2024-38545: RDMA/hns: Fix UAF for cq async event (bsc#1226595).
- CVE-2023-52834: atl1c: Work around the DMA RX overflow issue (bsc#1225599).
- CVE-2023-52875: Add check for mtk_alloc_clk_data (bsc#1225096).
- CVE-2023-52865: Add check for mtk_alloc_clk_data (bsc#1225086).
- CVE-2023-52821: Fixed a possible null pointer dereference (bsc#1225022).
- CVE-2023-52867: Fixed possible buffer overflow (bsc#1225009).
- CVE-2024-38578: ecryptfs: Fix buffer size for tag 66 packet (bsc#1226634,).
- CVE-2024-36964: fs/9p: only translate RWX permissions for plain 9P2000 (bsc#1225866).
- CVE-2023-52759: Ignore negated quota changes (bsc#1225560).
- CVE-2023-52796: Add ipvlan_route_v6_outbound() helper (bsc#1224930).
- CVE-2023-52807: Fixed out-of-bounds access may occur when coalesce info is read via debugfs (bsc#1225097).
- CVE-2023-52864: Fixed opening of char device (bsc#1225132).
- CVE-2024-36926: Fixed LPAR panics during boot up with a frozen PE (bsc#1222011).
- CVE-2023-52871: Handle a second device without data corruption (bsc#1225534)
- CVE-2023-52795: Fixed use after free in vhost_vdpa_probe() (bsc#1225085).
- CVE-2023-52881: tcp: do not accept ACK of bytes we never sent (bsc#1225611).
- CVE-2024-37353: virtio: fixed a double free in vp_del_vqs() (bsc#1226875).
- CVE-2024-39301: net/9p: fix uninit-value in p9_client_rpc() (bsc#1226994).
- CVE-2024-35843: iommu/vt-d: Use device rbtree in iopf reporting path (bsc#1224751).
- CVE-2024-37078: nilfs2: fix potential kernel bug due to lack of writeback flag waiting (bsc#1227066).
- CVE-2024-35247: fpga: region: add owner module and take its refcount (bsc#1226948).
- CVE-2024-36479: fpga: bridge: add owner module and take its refcount (bsc#1226949).
- CVE-2024-37021: fpga: manager: add owner module and take its refcount (bsc#1226950).
- CVE-2024-36281: net/mlx5: Use mlx5_ipsec_rx_status_destroy to correctly delete status rules (bsc#1226799).
- CVE-2024-38580: epoll: be better about file lifetimes (bsc#1226610).
- CVE-2024-36478: null_blk: fix null-ptr-dereference while configuring 'power' and 'submit_queues' (bsc#1226841).
- CVE-2024-38636: f2fs: multidev: fix to recognize valid zero block address (bsc#1226879).
- CVE-2024-38661: s390/ap: Fix crash in AP internal function modify_bitmap() (bsc#1226996).
- CVE-2024-38564: bpf: Add BPF_PROG_TYPE_CGROUP_SKB attach type enforcement in BPF_LINK_CREATE (bsc#1226789).
- CVE-2024-38560: scsi: bfa: Ensure the copied buf is NUL terminated (bsc#1226786).
- CVE-2024-36978: net: sched: sch_multiq: fix possible OOB write in multiq_tune() (bsc#1226514).
- CVE-2024-36917: block: fix overflow in blk_ioctl_discard() (bsc#1225770).
- CVE-2024-38627: stm class: Fix a double free in stm_register_device() (bsc#1226857).
- CVE-2024-38603: drivers/perf: hisi: hns3: Actually use devm_add_action_or_reset() (bsc#1226842).
- CVE-2024-38553: net: fec: remove .ndo_poll_controller to avoid deadlock (bsc#1226744).
- CVE-2024-38555: net/mlx5: Discard command completions in internal error (bsc#1226607).
- CVE-2024-38556: net/mlx5: Add a timeout to acquire the command queue semaphore (bsc#1226774).
- CVE-2024-38557: net/mlx5: Reload only IB representors upon lag disable/enable (bsc#1226781).
- CVE-2024-38608: net/mlx5e: Fix netif state handling (bsc#1226746).
- CVE-2024-38597: eth: sungem: remove .ndo_poll_controller to avoid deadlocks (bsc#1226749).
- CVE-2024-38594: net: stmmac: move the EST lock to struct stmmac_priv (bsc#1226734).
- CVE-2024-38569: drivers/perf: hisi_pcie: Fix out-of-bound access when valid event group (bsc#1226772).
- CVE-2024-38568: drivers/perf: hisi: hns3: Fix out-of-bound access when valid event group (bsc#1226771).
- CVE-2024-26814: vfio/fsl-mc: Block calling interrupt handler without trigger (bsc#1222810).
- CVE-2024-26813: vfio/platform: Create persistent IRQ handlers (bsc#1222809).
- CVE-2024-36945: net/smc: fix neighbour and rtable leak in smc_ib_find_route() (bsc#1225823).
- CVE-2024-36923: fs/9p: fix uninitialized values during inode evict (bsc#1225815).
- CVE-2024-36971: net: fix __dst_negative_advice() race (bsc#1226145).
- CVE-2024-27414: rtnetlink: fix error logic of IFLA_BRIDGE_FLAGS writing back (bsc#1224439).
- CVE-2024-35886: ipv6: Fix infinite recursion in fib6_dump_done() (bsc#1224670).
- CVE-2024-36024: drm/amd/display: Disable idle reallow as part of command/gpint execution (bsc#1225702).
- CVE-2024-36903: ipv6: Fix potential uninit-value access in __ip6_make_skb() (bsc#1225741).
- CVE-2024-36899: gpiolib: cdev: Fix use after free in lineinfo_changed_notify (bsc#1225737).
- CVE-2024-35979: raid1: fix use-after-free for original bio in raid1_write_request() (bsc#1224572).
- CVE-2024-35807: ext4: fix corruption during on-line resize (bsc#1224735).
- CVE-2023-52622: ext4: avoid online resizing failures due to oversized flex bg (bsc#1222080).
- CVE-2023-52843: llc: verify mac len before reading mac header (bsc#1224951).
- CVE-2024-35898: netfilter: nf_tables: Fix potential data-race in __nft_flowtable_type_get() (bsc#1224498).
- CVE-2024-36915: nfc: llcp: fix nfc_llcp_setsockopt() unsafe copies (bsc#1225758).
- CVE-2024-36882: mm: use memalloc_nofs_save() in page_cache_ra_order() (bsc#1225723).
- CVE-2024-36916: blk-iocost: avoid out of bounds shift (bsc#1225759).
- CVE-2024-36900: net: hns3: fix kernel crash when devlink reload during initialization (bsc#1225726).
- CVE-2023-52787: blk-mq: make sure active queue usage is held for bio_integrity_prep() (bsc#1225105).
- CVE-2024-35925: block: prevent division by zero in blk_rq_stat_sum() (bsc#1224661).
- CVE-2023-52837: nbd: fix uaf in nbd_open (bsc#1224935).
- CVE-2023-52786: ext4: fix racy may inline data check in dio write (bsc#1224939).
- CVE-2024-36934: bna: ensure the copied buf is NUL terminated (bsc#1225760).
- CVE-2024-36935: ice: ensure the copied buf is NUL terminated (bsc#1225763).
- CVE-2024-36937: xdp: use flags field to disambiguate broadcast redirect (bsc#1225834).
- CVE-2023-52672: pipe: wakeup wr_wait after setting max_usage (bsc#1224614).
- CVE-2023-52845: tipc: Change nla_policy for bearer-related names to NLA_NUL_STRING (bsc#1225585).
- CVE-2024-36005: netfilter: nf_tables: honor table dormant flag from netdev release event path (bsc#1224539).
- CVE-2024-26845: scsi: target: core: Add TMF to tmr_list handling (bsc#1223018).
- CVE-2024-35892: net/sched: fix lockdep splat in qdisc_tree_reduce_backlog() (bsc#1224515).
- CVE-2024-35848: eeprom: at24: fix memory corruption race condition (bsc#1224612).
- CVE-2024-35884: udp: do not accept non-tunnel GSO skbs landing in a tunnel (bsc#1224520).
- CVE-2024-35857: icmp: prevent possible NULL dereferences from icmp_build_probe() (bsc#1224619).
- CVE-2023-52735: bpf, sockmap: Don't let sock_map_{close,destroy,unhash} call itself (bsc#1225475).
- CVE-2024-35926: crypto: iaa - Fix async_disable descriptor leak (bsc#1224655).
- CVE-2024-35976: Validate user input for XDP_{UMEM|COMPLETION}_FILL_RING (bsc#1224575).
- CVE-2024-36938: Fixed NULL pointer dereference in sk_psock_skb_ingress_enqueue (bsc#1225761).
- CVE-2024-36008: ipv4: check for NULL idev in ip_route_use_hint() (bsc#1224540).
- CVE-2024-35998: Fixed lock ordering potential deadlock in  cifs_sync_mid_result (bsc#1224549).
- CVE-2023-52757: Fixed potential deadlock when releasing mids (bsc#1225548).
- CVE-2024-27419: Fixed data-races around sysctl_net_busy_read (bsc#1224759)
- CVE-2024-36957: octeontx2-af: avoid off-by-one read from userspace (bsc#1225762).
- CVE-2024-26625: Call sock_orphan() at release time (bsc#1221086)
- CVE-2024-35880: io_uring/kbuf: hold io_buffer_list reference over mmap (bsc#1224523).
- CVE-2024-35831: io_uring: Fix release of pinned pages when __io_uaddr_map fails (bsc#1224698).
- CVE-2024-35827: io_uring/net: fix overflow check in io_recvmsg_mshot_prep() (bsc#1224606).
- CVE-2023-52656: Dropped any code related to SCM_RIGHTS (bsc#1224187).
- CVE-2023-52699: sysv: don't call sb_bread() with pointers_lock held (bsc#1224659).

The following non-security bugs were fixed:

- KVM: arm64: Use local TLBI on permission relaxation (bsc#1219478).
- KVM: x86/pmu: Prioritize VMX interception over #GP on RDPMC due to bad index (bsc#1226158).
- NFS: abort nfs_atomic_open_v23 if name is too long (bsc#1219847).
- NFS: add atomic_open for NFSv3 to handle O_TRUNC correctly (bsc#1219847).
- NFS: avoid infinite loop in pnfs_update_layout (bsc#1219633 bsc#1226226).
- PCI: Clear Secondary Status errors after enumeration (bsc#1226928)
- RAS/AMD/ATL: Fix MI300 bank hash (bsc#1225300).
- RAS/AMD/ATL: Use system settings for MI300 DRAM to normalized address translation (bsc#1225300).
- Revert "build initrd without systemd" (bsc#1195775)"
- arm64: mm: Batch dsb and isb when populating pgtables (jsc#PED-8688).
- arm64: mm: Do not remap pgtables for allocate vs populate (jsc#PED-8688).
- arm64: mm: Do not remap pgtables per-cont(pte|pmd) block (jsc#PED-8688).
- bpf: check bpf_func_state->callback_depth when pruning states (bsc#1225903).
- bpf: correct loop detection for iterators convergence (bsc#1225903).
- bpf: exact states comparison for iterator convergence checks (bsc#1225903).
- bpf: extract __check_reg_arg() utility function (bsc#1225903).
- bpf: extract same_callsites() as utility function (bsc#1225903).
- bpf: extract setup_func_entry() utility function (bsc#1225903).
- bpf: keep track of max number of bpf_loop callback iterations (bsc#1225903).
- bpf: move explored_state() closer to the beginning of verifier.c (bsc#1225903).
- bpf: print full verifier states on infinite loop detection (bsc#1225903).
- bpf: verify callbacks as if they are called unknown number of times (bsc#1225903).
- bpf: widening for callback iterators (bsc#1225903).
- cachefiles: remove requests from xarray during flushing requests (bsc#1226588).
- ceph: add ceph_cap_unlink_work to fire check_caps() immediately (bsc#1226022).
- ceph: always check dir caps asynchronously (bsc#1226022).
- ceph: always queue a writeback when revoking the Fb caps (bsc#1226022).
- ceph: break the check delayed cap loop every 5s (bsc#1226022).
- ceph: switch to use cap_delay_lock for the unlink delay list (bsc#1226022).
- crypto: deflate - Add aliases to deflate (bsc#1227190).
- crypto: iaa - Account for cpu-less numa nodes (bsc#1227190).
- ipvs: Fix checksumming on GSO of SCTP packets (bsc#1221958)
- kABI: bpf: verifier kABI workaround (bsc#1225903).
- net: ena: Fix redundant device NUMA node override (jsc#PED-8688).
- net: mana: Enable MANA driver on ARM64 with 4K page size (jsc#PED-8491).
- nfs: Avoid flushing many pages with NFS_FILE_SYNC (bsc#1218442).
- nfs: Bump default write congestion size (bsc#1218442).
- nfsd: optimise recalculate_deny_mode() for a common case (bsc#1217912).
- nvme-fabrics: short-circuit reconnect retries (bsc#1186716).
- nvme-tcp: Export the nvme_tcp_wq to sysfs (bsc#1224049).
- nvme/tcp: Add wq_unbound modparam for nvme_tcp_wq (bsc#1224049).
- nvme: do not retry authentication failures (bsc#1186716).
- nvme: return kernel error codes for admin queue connect (bsc#1186716).
- nvmet: lock config semaphore when accessing DH-HMAC-CHAP key (bsc#1186716).
- nvmet: return DHCHAP status codes from nvmet_setup_auth() (bsc#1186716).
- ocfs2: adjust enabling place for la window (bsc#1219224).
- ocfs2: fix sparse warnings (bsc#1219224).
- ocfs2: improve write IO performance when fragmentation is high (bsc#1219224).
- ocfs2: speed up chain-list searching (bsc#1219224).
- rpm/kernel-obs-build.spec.in: Add iso9660 (bsc#1226212).
- rpm/kernel-obs-build.spec.in: Add networking modules for docker (bsc#1226211).
- s390/cpacf: Make use of invalid opcode produce a link error (bsc#1227072).
- sched/core: Fix incorrect initialization of the 'burst' parameter in cpu_max_write() (bsc#1226791).
- selftests/bpf: test case for callback_depth states pruning logic (bsc#1225903).
- selftests/bpf: test if state loops are detected in a tricky case (bsc#1225903).
- selftests/bpf: test widening for iterating callbacks (bsc#1225903).
- selftests/bpf: tests for iterating callbacks (bsc#1225903).
- selftests/bpf: tests with delayed read/precision makrs in loop body (bsc#1225903).
- selftests/bpf: track string payload offset as scalar in strobemeta (bsc#1225903).
- selftests/bpf: track tcp payload offset as scalar in xdp_synproxy (bsc#1225903).
- supported.conf: Add APM X-Gene SoC hardware monitoring driver (bsc#1223265 jsc#PED-8570)
- tcp: Dump bound-only sockets in inet_diag (bsc#1204562).
- x86/mce: Dynamically size space for machine check records (bsc#1222241).
- x86/tsc: Trust initial offset in architectural TSC-adjust MSRs (bsc#1222015 bsc#1226962).
</description>
<summary>Security update for the Linux Kernel</summary>
</patchinfo>

openSUSE Build Service is sponsored by