File _patchinfo of Package patchinfo.36342

<patchinfo incident="36342">
  <issue id="1204171" tracker="bnc">VUL-0: CVE-2022-3435: kernel: out-of-bounds read in fib_nh_match() of the file net/ipv4/fib_semantics.c</issue>
  <issue id="1205796" tracker="bnc">VUL-0: CVE-2022-45934: kernel: integer wraparound via L2CAP_CONF_REQ packets affects l2cap_config_req in net/bluetooth/l2cap_core.c</issue>
  <issue id="1206188" tracker="bnc">[MSFT][MANA][NET][Patch] Fix Race On Per-CQ Variable Napi_iperf Panic Fix</issue>
  <issue id="1206344" tracker="bnc">memcg: Fix possible use-after-free in memcg_write_event_control()</issue>
  <issue id="1209290" tracker="bnc">VUL-0: CVE-2023-28327: kernel: denial of service problem in net/unix/diag.c</issue>
  <issue id="1210449" tracker="bnc">SLES 15 SP4 - s390/qeth: NET2016 - fix use-after-free in HSCI</issue>
  <issue id="1210627" tracker="bnc">VUL-0: CVE-2023-2166: kernel: NULL pointer dereference in can_rcv_filter</issue>
  <issue id="1213034" tracker="bnc">[PATCH] udf: Fix preallocation discarding at indirect extent boundary</issue>
  <issue id="1216223" tracker="bnc">L3: ibmvfc max_xfer_size is missing ref:_00D1igLOd._5005qXBPNc:ref</issue>
  <issue id="1216813" tracker="bnc">L3: 'unregister_netdevice: waiting for lo to become free. Usage count = 2' on busy container hosts [ref:_00D1igLOd._5005qYD2yg:ref]</issue>
  <issue id="1218562" tracker="bnc">VUL-0: CVE-2023-6270: kernel: use-after-free vulnerability in ATA over Ethernet (AoE) driver</issue>
  <issue id="1223384" tracker="bnc">VUL-0: CVE-2024-26923: kernel: af_unix: fix garbage collector racing against connect()</issue>
  <issue id="1223524" tracker="bnc">VUL-0: CVE-2022-48664: kernel: btrfs: hang during unmount when stopping a space reclaim worker</issue>
  <issue id="1223824" tracker="bnc">VUL-0: CVE-2024-27043: kernel: media: media: dvbdev: use-after-free in different places</issue>
  <issue id="1225189" tracker="bnc">VUL-0: REJECTED: CVE-2021-47472: kernel: net: mdiobus: Fix memory leak in __mdiobus_register</issue>
  <issue id="1225336" tracker="bnc">VUL-0: CVE-2021-47416: kernel: phy: mdio: fix memory leak</issue>
  <issue id="1225611" tracker="bnc">VUL-0: CVE-2023-52881: kernel: tcp: do not accept ACK of bytes we never sent</issue>
  <issue id="1226666" tracker="bnc">ASR signed driver does not load on SUSE</issue>
  <issue id="1228743" tracker="bnc">VUL-0: CVE-2024-42145: kernel: IB/core: implement a limit on UMAD receive List</issue>
  <issue id="1229452" tracker="bnc">s390/dasd: fix error recovery leading to data corruption on ESE  devices</issue>
  <issue id="1229454" tracker="bnc">fuse: Initialize beyond-EOF page contents before setting uptodate</issue>
  <issue id="1229456" tracker="bnc">CVE-2024-44947: kernel: fuse: Initialize beyond-EOF page contents before setting uptodate</issue>
  <issue id="1229556" tracker="bnc">VUL-0: CVE-2022-48879: kernel: efi: fix NULL-deref in init error path</issue>
  <issue id="1230429" tracker="bnc">VUL-0: CVE-2024-45016: kernel: netem: fix return value if duplicate enqueue fails</issue>
  <issue id="1230442" tracker="bnc">VUL-0: CVE-2024-45013: kernel: nvme: move stopping keep-alive into nvme_uninit_ctrl()</issue>
  <issue id="1230454" tracker="bnc">VUL-0: CVE-2024-45026: kernel: s390/dasd: fix error recovery leading to data corruption on ESE devices</issue>
  <issue id="1230600" tracker="bnc">VUL-0: CVE-2023-52800: kernel: wifi: ath11k: fix htt pktlog locking</issue>
  <issue id="1230620" tracker="bnc">VUL-0: CVE-2023-52766: kernel: i3c: mipi-i3c-hci: Fix out of bounds access in hci_dma_irq_handler</issue>
  <issue id="1230715" tracker="bnc">VUL-0: CVE-2024-46716: kernel: dmaengine: altera-msgdma: properly free descriptor in msgdma_free_descriptor</issue>
  <issue id="1230903" tracker="bnc">VUL-0: CVE-2021-47534: kernel: drm/vc4: kms: Add missing drm_crtc_commit_put</issue>
  <issue id="1231016" tracker="bnc">Intermittent nfs mount failures (may be due to SUNRPC over UDP)</issue>
  <issue id="1231073" tracker="bnc">VUL-0: CVE-2024-46849: kernel: ASoC: meson: axg-card: fix 'use-after-free'</issue>
  <issue id="1231191" tracker="bnc">VUL-0: CVE-2024-46813: kernel: drm/amd/display: check link_index before accessing dc-&gt;links[]</issue>
  <issue id="1231193" tracker="bnc">VUL-0: CVE-2024-46814: kernel: drm/amd/display: check msg_id before processing transcation</issue>
  <issue id="1231195" tracker="bnc">VUL-0: CVE-2024-46815: kernel: drm/amd/display: check num_valid_sets before accessing reader_wm_sets[]</issue>
  <issue id="1231197" tracker="bnc">VUL-0: CVE-2024-46816: kernel: drm/amd/display: stop amdgpu_dm initialize when link nums greater than max_links</issue>
  <issue id="1231200" tracker="bnc">VUL-0: CVE-2024-46817: kernel: drm/amd/display: stop amdgpu_dm initialize when stream nums greater than 6</issue>
  <issue id="1231203" tracker="bnc">VUL-0: CVE-2024-46818: kernel: drm/amd/display: check gpio_id before used as array index</issue>
  <issue id="1231293" tracker="bnc">kernel shown as unreleased</issue>
  <issue id="1231375" tracker="bnc">Fix pointer-leak due to insufficient speculative store bypass mitigation in BPF verifier</issue>
  <issue id="1231502" tracker="bnc">VUL-0: CVE-2024-47668: kernel: lib/generic-radix-tree.c: Fix rare race in __genradix_ptr_alloc()</issue>
  <issue id="1231673" tracker="bnc">VUL-0: CVE-2024-47674: kernel: mm: avoid leaving partial pfn mappings around in error case</issue>
  <issue id="1231861" tracker="bnc">VUL-0: CVE-2024-49860: kernel: ACPI: sysfs: validate return type of _STR method</issue>
  <issue id="1231883" tracker="bnc">VUL-0: CVE-2022-48977: kernel: can: af_can: fix NULL pointer dereference in can_rcv_filter</issue>
  <issue id="1231885" tracker="bnc">VUL-0: CVE-2022-48975: kernel: gpiolib: fix memory leak in gpiochip_setup_dev()</issue>
  <issue id="1231887" tracker="bnc">VUL-0: CVE-2022-48970: kernel: af_unix: Get user_ns from in_skb in unix_diag_get_exact().</issue>
  <issue id="1231888" tracker="bnc">VUL-0: CVE-2022-48946: kernel: udf: Fix preallocation discarding at indirect extent boundary</issue>
  <issue id="1231890" tracker="bnc">VUL-0: CVE-2022-49014: kernel: net: tun: Fix use-after-free in tun_detach()</issue>
  <issue id="1231892" tracker="bnc">VUL-0: CVE-2022-48955: kernel: net: thunderbolt: fix memory leak in tbnet_open()</issue>
  <issue id="1231893" tracker="bnc">VUL-0: CVE-2022-48956: kernel: ipv6: avoid use-after-free in ip6_fragment()</issue>
  <issue id="1231895" tracker="bnc">VUL-0: CVE-2022-48947: kernel: Bluetooth: L2CAP: Fix u8 overflow</issue>
  <issue id="1231896" tracker="bnc">VUL-0: CVE-2022-48948: kernel: usb: gadget: uvc: Prevent buffer overflow in setup handler</issue>
  <issue id="1231897" tracker="bnc">VUL-0: CVE-2022-48949: kernel: igb: Initialize mailbox message for VF reset</issue>
  <issue id="1231929" tracker="bnc">VUL-0: CVE-2022-48951: kernel: ASoC: ops: Check bounds for second channel in snd_soc_put_volsw_sx()</issue>
  <issue id="1231936" tracker="bnc">VUL-0: CVE-2022-48999: kernel: ipv4: Handle attempt to delete multipath route when fib_info contains an nh reference</issue>
  <issue id="1231937" tracker="bnc">VUL-0: CVE-2022-49016: kernel: net: mdiobus: fix unbalanced node reference count</issue>
  <issue id="1231938" tracker="bnc">VUL-0: CVE-2022-49015: kernel: net: hsr: Fix potential use-after-free</issue>
  <issue id="1231939" tracker="bnc">VUL-0: CVE-2022-49021: kernel: net: phy: fix null-ptr-deref while probe() failed</issue>
  <issue id="1231940" tracker="bnc">VUL-0: CVE-2022-49019: kernel: net: ethernet: nixge: fix NULL dereference</issue>
  <issue id="1231941" tracker="bnc">VUL-0: CVE-2022-48953: kernel: rtc: cmos: Fix event handler registration ordering issue</issue>
  <issue id="1231942" tracker="bnc">VUL-0: CVE-2024-47706: kernel: block, bfq: fix possible UAF for bfqq-&gt;bic with merge chain</issue>
  <issue id="1231958" tracker="bnc">VUL-0: CVE-2022-48985: kernel: net: mana: Fix race on per-CQ variable napi work_done</issue>
  <issue id="1231960" tracker="bnc">VUL-0: CVE-2022-49025: kernel: net/mlx5e: Fix use-after-free when reverting termination table</issue>
  <issue id="1231961" tracker="bnc">VUL-0: CVE-2022-49023: kernel: wifi: cfg80211: fix buffer overflow in elem comparison</issue>
  <issue id="1231962" tracker="bnc">VUL-0: CVE-2022-49022: kernel: wifi: mac8021: fix possible oob access in ieee80211_get_rate_duration</issue>
  <issue id="1231972" tracker="bnc">VUL-0: CVE-2022-48954: kernel: s390/qeth: fix use-after-free in hsci</issue>
  <issue id="1231976" tracker="bnc">VUL-0: CVE-2022-48959: kernel: net: dsa: sja1105: fix memory leak in sja1105_setup_devlink_regions()</issue>
  <issue id="1231979" tracker="bnc">VUL-0: CVE-2022-48960: kernel: net: hisilicon: Fix potential use-after-free in hix5hd2_rx()</issue>
  <issue id="1231987" tracker="bnc">VUL-0: CVE-2024-47684: kernel: tcp: check skb is non-NULL in tcp_rto_delta_us()</issue>
  <issue id="1231988" tracker="bnc">VUL-0: CVE-2023-52919: kernel: nfc: nci: fix possible NULL pointer dereference in send_acknowledge()</issue>
  <issue id="1231991" tracker="bnc">VUL-0: CVE-2022-49032: kernel: iio: health: afe4404: Fix oob read in afe4404_[read|write]_raw</issue>
  <issue id="1231992" tracker="bnc">VUL-0: CVE-2022-49031: kernel: iio: health: afe4403: Fix oob read in afe4403_read_raw</issue>
  <issue id="1231995" tracker="bnc">VUL-0: CVE-2022-49029: kernel: hwmon: (ibmpex) Fix possible UAF when ibmpex_register_bmc() fails</issue>
  <issue id="1231996" tracker="bnc">VUL-0: CVE-2022-49028: kernel: ixgbevf: Fix resource leak in ixgbevf_init_module()</issue>
  <issue id="1231997" tracker="bnc">VUL-0: CVE-2022-49026: kernel: e100: Fix possible use after free in e100_xmit_prepare</issue>
  <issue id="1232001" tracker="bnc">VUL-0: CVE-2022-49024: kernel: can: m_can: pci: add missing m_can_class_free_dev() in probe/remove methods</issue>
  <issue id="1232005" tracker="bnc">VUL-0: CVE-2022-49012: kernel: afs: Fix server-&gt;active leak in afs_put_server</issue>
  <issue id="1232006" tracker="bnc">VUL-0: CVE-2022-49011: kernel: hwmon: (coretemp) fix pci device refcount leak in nv1a_ram_new()</issue>
  <issue id="1232007" tracker="bnc">VUL-0: CVE-2022-49027: kernel: iavf: Fix error handling in iavf_init_module()</issue>
  <issue id="1232025" tracker="bnc">VUL-0: CVE-2022-48972: kernel: mac802154: fix missing INIT_LIST_HEAD in ieee802154_if_add()</issue>
  <issue id="1232026" tracker="bnc">VUL-0: CVE-2022-48969: kernel: xen-netfront: fix NULL sring after live migration</issue>
  <issue id="1232033" tracker="bnc">net: mana: Fix the extra HZ in mana_hwc_send_request</issue>
  <issue id="1232035" tracker="bnc">VUL-0: CVE-2022-48997: kernel: char: tpm: protect tpm_pm_suspend with locks</issue>
  <issue id="1232036" tracker="bnc">RDMA/mana_ib: use the correct page size for mapping user-mode doorbell page</issue>
  <issue id="1232037" tracker="bnc">VUL-0: CVE-2022-48971: kernel: Bluetooth: fix not cleanup led when bt_init fails</issue>
  <issue id="1232038" tracker="bnc">VUL-0: CVE-2022-48978: kernel: HID: core: fix shift-out-of-bounds in hid_report_raw_event</issue>
  <issue id="1232039" tracker="bnc">VUL-0: CVE-2022-48973: kernel: gpio: amd8111: fix PCI device reference count leak</issue>
  <issue id="1232067" tracker="bnc">VUL-0: CVE-2022-48987: kernel: media: v4l2-dv-timings.c: fix too strict blanking sanity checks</issue>
  <issue id="1232069" tracker="bnc">VUL-0: CVE-2022-48988: kernel: memcg: fix possible use-after-free in memcg_write_event_control()</issue>
  <issue id="1232070" tracker="bnc">VUL-0: CVE-2022-48991: kernel: mm/khugepaged: invoke MMU notifiers in shmem/file collapse paths</issue>
  <issue id="1232071" tracker="bnc">VUL-0: CVE-2022-48992: kernel: ASoC: soc-pcm: Add NULL check in BE reparenting</issue>
  <issue id="1232097" tracker="bnc">VUL-0: CVE-2024-49982: kernel: aoe: fix the potential use-after-free problem in more places</issue>
  <issue id="1232108" tracker="bnc">VUL-0: CVE-2022-48961: kernel: net: mdio: fix unbalanced fwnode reference count in mdio_device_release()</issue>
  <issue id="1232119" tracker="bnc">VUL-0: CVE-2022-48994: kernel: ALSA: seq: Fix function prototype mismatch in snd_seq_expand_var_event</issue>
  <issue id="1232120" tracker="bnc">VUL-0: CVE-2022-48995: kernel: Input: raydium_ts_i2c - fix memory leak in raydium_i2c_send()</issue>
  <issue id="1232123" tracker="bnc">VUL-0: CVE-2022-49000: kernel: iommu/vt-d: Fix PCI device refcount leak in has_external_pci()</issue>
  <issue id="1232133" tracker="bnc">VUL-0: CVE-2022-49002: kernel: iommu/vt-d: Fix PCI device refcount leak in dmar_dev_scope_init()</issue>
  <issue id="1232136" tracker="bnc">VUL-0: CVE-2022-49003: kernel: nvme: fix SRCU protection of nvme_ns_head list</issue>
  <issue id="1232145" tracker="bnc">VUL-0: CVE-2024-47747: kernel: net: seeq: fix use after free vulnerability in ether3 Driver Due to Race Condition</issue>
  <issue id="1232150" tracker="bnc">VUL-0: CVE-2022-49005: kernel: ASoC: ops: Fix bounds check for _sx controls</issue>
  <issue id="1232163" tracker="bnc">VUL-0: CVE-2022-49006: kernel: tracing: Free buffers when a used dynamic event is removed</issue>
  <issue id="1232170" tracker="bnc">VUL-0: CVE-2022-49007: kernel: nilfs2: fix NULL pointer dereference in nilfs_palloc_commit_free_entry()</issue>
  <issue id="1232172" tracker="bnc">VUL-0: CVE-2022-49010: kernel: hwmon: (coretemp) Check for null before removing sysfs attrs</issue>
  <issue id="1232174" tracker="bnc">VUL-0: CVE-2024-47748: kernel: vhost_vdpa: assign irq bypass producer token correctly</issue>
  <issue id="1232229" tracker="bnc">VUL-0: CVE-2022-48981: kernel: drm/shmem-helper: Remove errant put in error path</issue>
  <issue id="1232237" tracker="bnc">VUL-0: CVE-2022-48968: kernel: octeontx2-pf: Fix potential memory leak in otx2_init_tc()</issue>
  <issue id="1232260" tracker="bnc">VUL-0: CVE-2024-49930: kernel: wifi: ath11k: fix array out-of-bound access in SoC stats</issue>
  <issue id="1232262" tracker="bnc">VUL-0: CVE-2024-49867: kernel: btrfs: wait for fixup workers before stopping cleaner kthread during umount</issue>
  <issue id="1232281" tracker="bnc">SLES 15 SP4 LTSS - s390/dasd: fix error recovery leading to data corruption on ESE</issue>
  <issue id="1232282" tracker="bnc">VUL-0: CVE-2024-49991: kernel: drm/amdkfd: amdkfd_free_gtt_mem clear the correct pointer</issue>
  <issue id="1232286" tracker="bnc">VUL-0: CVE-2022-48962: kernel: net: hisilicon: Fix potential use-after-free in hisi_femac_rx()</issue>
  <issue id="1232304" tracker="bnc">VUL-0: CVE-2022-48967: kernel: NFC: nci: Bounds check struct nfc_target arrays</issue>
  <issue id="1232383" tracker="bnc">VUL-0: CVE-2024-49974: kernel: NFSD: limit the number of concurrent async COPY operations</issue>
  <issue id="1232395" tracker="bnc">VUL-0: CVE-2024-49960: kernel: ext4: fix timer use-after-free on failed mount</issue>
  <issue id="1232418" tracker="bnc">VUL-0: CVE-2024-50047: kernel: smb: client: fix UAF in async decryption</issue>
  <issue id="1232424" tracker="bnc">VUL-0: CVE-2024-49936: kernel: net/xen-netback: prevent UAF in xenvif_flush_hash()</issue>
  <issue id="1232432" tracker="bnc">VUL-0: CVE-2024-49995: kernel: tipc: guard against string buffer overrun</issue>
  <issue id="1232519" tracker="bnc">VUL-0: CVE-2024-49969: kernel: drm/amd/display: Fix index out of bounds in DCN30 color transformation</issue>
  <issue id="2021-47416" tracker="cve" />
  <issue id="2021-47534" tracker="cve" />
  <issue id="2022-3435" tracker="cve" />
  <issue id="2022-45934" tracker="cve" />
  <issue id="2022-48664" tracker="cve" />
  <issue id="2022-48879" tracker="cve" />
  <issue id="2022-48946" tracker="cve" />
  <issue id="2022-48947" tracker="cve" />
  <issue id="2022-48948" tracker="cve" />
  <issue id="2022-48949" tracker="cve" />
  <issue id="2022-48951" tracker="cve" />
  <issue id="2022-48953" tracker="cve" />
  <issue id="2022-48954" tracker="cve" />
  <issue id="2022-48955" tracker="cve" />
  <issue id="2022-48956" tracker="cve" />
  <issue id="2022-48959" tracker="cve" />
  <issue id="2022-48960" tracker="cve" />
  <issue id="2022-48961" tracker="cve" />
  <issue id="2022-48962" tracker="cve" />
  <issue id="2022-48967" tracker="cve" />
  <issue id="2022-48968" tracker="cve" />
  <issue id="2022-48969" tracker="cve" />
  <issue id="2022-48970" tracker="cve" />
  <issue id="2022-48971" tracker="cve" />
  <issue id="2022-48972" tracker="cve" />
  <issue id="2022-48973" tracker="cve" />
  <issue id="2022-48975" tracker="cve" />
  <issue id="2022-48977" tracker="cve" />
  <issue id="2022-48978" tracker="cve" />
  <issue id="2022-48981" tracker="cve" />
  <issue id="2022-48985" tracker="cve" />
  <issue id="2022-48987" tracker="cve" />
  <issue id="2022-48988" tracker="cve" />
  <issue id="2022-48991" tracker="cve" />
  <issue id="2022-48992" tracker="cve" />
  <issue id="2022-48994" tracker="cve" />
  <issue id="2022-48995" tracker="cve" />
  <issue id="2022-48997" tracker="cve" />
  <issue id="2022-48999" tracker="cve" />
  <issue id="2022-49000" tracker="cve" />
  <issue id="2022-49002" tracker="cve" />
  <issue id="2022-49003" tracker="cve" />
  <issue id="2022-49005" tracker="cve" />
  <issue id="2022-49006" tracker="cve" />
  <issue id="2022-49007" tracker="cve" />
  <issue id="2022-49010" tracker="cve" />
  <issue id="2022-49011" tracker="cve" />
  <issue id="2022-49012" tracker="cve" />
  <issue id="2022-49014" tracker="cve" />
  <issue id="2022-49015" tracker="cve" />
  <issue id="2022-49016" tracker="cve" />
  <issue id="2022-49019" tracker="cve" />
  <issue id="2022-49021" tracker="cve" />
  <issue id="2022-49022" tracker="cve" />
  <issue id="2022-49023" tracker="cve" />
  <issue id="2022-49024" tracker="cve" />
  <issue id="2022-49025" tracker="cve" />
  <issue id="2022-49026" tracker="cve" />
  <issue id="2022-49027" tracker="cve" />
  <issue id="2022-49028" tracker="cve" />
  <issue id="2022-49029" tracker="cve" />
  <issue id="2022-49031" tracker="cve" />
  <issue id="2022-49032" tracker="cve" />
  <issue id="2023-2166" tracker="cve" />
  <issue id="2023-28327" tracker="cve" />
  <issue id="2023-52766" tracker="cve" />
  <issue id="2023-52800" tracker="cve" />
  <issue id="2023-52881" tracker="cve" />
  <issue id="2023-52919" tracker="cve" />
  <issue id="2023-6270" tracker="cve" />
  <issue id="2024-27043" tracker="cve" />
  <issue id="2024-42145" tracker="cve" />
  <issue id="2024-44947" tracker="cve" />
  <issue id="2024-45013" tracker="cve" />
  <issue id="2024-45016" tracker="cve" />
  <issue id="2024-45026" tracker="cve" />
  <issue id="2024-46716" tracker="cve" />
  <issue id="2024-46813" tracker="cve" />
  <issue id="2024-46814" tracker="cve" />
  <issue id="2024-46815" tracker="cve" />
  <issue id="2024-46816" tracker="cve" />
  <issue id="2024-46817" tracker="cve" />
  <issue id="2024-46818" tracker="cve" />
  <issue id="2024-46849" tracker="cve" />
  <issue id="2024-47668" tracker="cve" />
  <issue id="2024-47674" tracker="cve" />
  <issue id="2024-47684" tracker="cve" />
  <issue id="2024-47706" tracker="cve" />
  <issue id="2024-47747" tracker="cve" />
  <issue id="2024-47748" tracker="cve" />
  <issue id="2024-49860" tracker="cve" />
  <issue id="2024-49867" tracker="cve" />
  <issue id="2024-49930" tracker="cve" />
  <issue id="2024-49936" tracker="cve" />
  <issue id="2024-49960" tracker="cve" />
  <issue id="2024-49969" tracker="cve" />
  <issue id="2024-49974" tracker="cve" />
  <issue id="2024-49982" tracker="cve" />
  <issue id="2024-49991" tracker="cve" />
  <issue id="2024-49995" tracker="cve" />
  <issue id="2024-50047" tracker="cve" />
  <issue id="SLE-24682" tracker="jsc" />
  <issue id="1220382" tracker="bnc">L3-Question: x86/mm/ident_map: Use gbpages only where full GB page should be mapped.</issue>
  <issue id="1229345" tracker="bnc">VUL-0: CVE-2024-43854: kernel: block: initialize integrity buffer to zero before writing it to media</issue>
  <issue id="1232165" tracker="bnc">VUL-0: CVE-2024-49945: kernel: net/ncsi: Disable the ncsi work before freeing the associated structure</issue>
  <issue id="1232224" tracker="bnc">VUL-0: CVE-2024-49925: kernel: fbdev: efifb: register sysfs groups through driver core</issue>
  <issue id="1232436" tracker="bnc">VUL-0: kernel: malformed cpio entry may leak early-boot memory contents</issue>
  <issue id="1233117" tracker="bnc">VUL-0: CVE-2024-50208: kernel: RDMA/bnxt_re: Fix a bug while setting up Level-2 PBL pages</issue>
  <issue id="2024-43854" tracker="cve" />
  <issue id="2024-49925" tracker="cve" />
  <issue id="2024-49945" tracker="cve" />
  <issue id="2024-50208" tracker="cve" />
  <category>security</category>
  <rating>important</rating>
  <packager>alix82</packager>
  <reboot_needed/>
  <description>The SUSE Linux Enterprise 15 SP4 kernel was updated to receive various security bugfixes.


The following security bugs were fixed:

- CVE-2024-43854: Initialize integrity buffer to zero before writing it to media (bsc#1229345)
- CVE-2024-49925: fbdev: efifb: Register sysfs groups through driver core (bsc#1232224)
- CVE-2024-49945: net/ncsi: Disable the ncsi work before freeing the associated structure (bsc#1232165).
- CVE-2024-50208: RDMA/bnxt_re: Fix a bug while setting up Level-2 PBL pages (bsc#1233117).
- CVE-2022-48879: efi: fix NULL-deref in init error path (bsc#1229556).
- CVE-2022-48956: ipv6: avoid use-after-free in ip6_fragment() (bsc#1231893).
- CVE-2022-48959: net: dsa: sja1105: fix memory leak in sja1105_setup_devlink_regions() (bsc#1231976).
- CVE-2022-48960: net: hisilicon: Fix potential use-after-free in hix5hd2_rx() (bsc#1231979).
- CVE-2022-48962: net: hisilicon: Fix potential use-after-free in hisi_femac_rx() (bsc#1232286).
- CVE-2022-48991: mm/khugepaged: fix collapse_pte_mapped_thp() to allow anon_vma (bsc#1232070).
- CVE-2022-49015: net: hsr: Fix potential use-after-free (bsc#1231938).
- CVE-2024-45013: nvme: move stopping keep-alive into nvme_uninit_ctrl() (bsc#1230442).
- CVE-2024-45016: netem: fix return value if duplicate enqueue fails (bsc#1230429).
- CVE-2024-45026: s390/dasd: fix error recovery leading to data corruption on ESE devices (bsc#1230454).
- CVE-2024-46716: dmaengine: altera-msgdma: properly free descriptor in msgdma_free_descriptor (bsc#1230715).
- CVE-2024-46813: drm/amd/display: Check link_index before accessing dc->links (bsc#1231191).
- CVE-2024-46814: drm/amd/display: Check msg_id before processing transcation (bsc#1231193).
- CVE-2024-46815: drm/amd/display: Check num_valid_sets before accessing reader_wm_sets (bsc#1231195).
- CVE-2024-46816: drm/amd/display: Stop amdgpu_dm initialize when link nums greater than max_links (bsc#1231197).
- CVE-2024-46817: drm/amd/display: Stop amdgpu_dm initialize when stream nums greater than 6 (bsc#1231200).
- CVE-2024-46818: drm/amd/display: Check gpio_id before used as array index (bsc#1231203).
- CVE-2024-46849: ASoC: meson: axg-card: fix 'use-after-free' (bsc#1231073).
- CVE-2024-47668: lib/generic-radix-tree.c: Fix rare race in __genradix_ptr_alloc() (bsc#1231502).
- CVE-2024-47674: mm: avoid leaving partial pfn mappings around in error case (bsc#1231673).
- CVE-2024-47684: tcp: check skb is non-NULL in tcp_rto_delta_us() (bsc#1231987).
- CVE-2024-47706: block, bfq: fix possible UAF for bfqq->bic with merge chain (bsc#1231942).
- CVE-2024-47747: net: seeq: Fix use after free vulnerability in ether3 Driver Due to Race Condition (bsc#1232145).
- CVE-2024-47748: vhost_vdpa: assign irq bypass producer token correctly (bsc#1232174).
- CVE-2024-49860: ACPI: sysfs: validate return type of _STR method (bsc#1231861).
- CVE-2024-49930: wifi: ath11k: fix array out-of-bound access in SoC stats (bsc#1232260).
- CVE-2024-49936: net/xen-netback: prevent UAF in xenvif_flush_hash() (bsc#1232424).
- CVE-2024-49960: ext4: fix timer use-after-free on failed mount (bsc#1232395).
- CVE-2024-49969: drm/amd/display: Fix index out of bounds in DCN30 color transformation (bsc#1232519).
- CVE-2024-49974: NFSD: Force all NFSv4.2 COPY requests to be synchronous (bsc#1232383).
- CVE-2024-49991: drm/amdkfd: amdkfd_free_gtt_mem clear the correct pointer (bsc#1232282).
- CVE-2024-49995: tipc: guard against string buffer overrun (bsc#1232432).
- CVE-2024-50047: smb: client: fix UAF in async decryption (bsc#1232418).

The following non-security bugs were fixed:

- NFSv3: only use NFS timeout for MOUNT when protocols are compatible (bsc#1231016).
- PKCS#7: Check codeSigning EKU of certificates in PKCS#7 (bsc#1226666).
- RDMA/mana_ib: use the correct page size for mapping user-mode doorbell page (bsc#1232036).
- bpf: Fix pointer-leak due to insufficient speculative store bypass mitigation (bsc#1231375).
- dn_route: set rt neigh to blackhole_netdev instead of loopback_dev in ifdown (bsc#1216813).
- initramfs: avoid filename buffer overrun (bsc#1232436).
- ipv6: blackhole_netdev needs snmp6 counters (bsc#1216813).
- ipv6: give an IPv6 dev to blackhole_netdev (bsc#1216813).
- net: mana: Fix the extra HZ in mana_hwc_send_request (bsc#1232033).
- x86/kexec: Add EFI config table identity mapping for kexec kernel (bsc#1220382).
- x86/mm/ident_map: Use gbpages only where full GB page should be mapped (bsc#1220382).
- xfrm: set dst dev to blackhole_netdev instead of loopback_dev in ifdown (bsc#1216813).
</description>
	<summary>Security update for the Linux Kernel</summary>
</patchinfo>
openSUSE Build Service is sponsored by