File _patchinfo of Package patchinfo.37892
<patchinfo incident="37892">
<issue id="1227656" tracker="bnc">VUL-0: CVE-2021-47496: kernel live patch: net/tls: fix flipped sign in tls_err_abort() calls</issue>
<issue id="1227751" tracker="bnc">VUL-0: CVE-2021-47261: kernel live patch: IB/mlx5: Fix initializing CQ fragments buffer</issue>
<issue id="1228017" tracker="bnc">VUL-0: CVE-2022-48792: kernel live patch: scsi: pm8001: Fix use-after-free for aborted SSP/STP sas_task</issue>
<issue id="1229640" tracker="bnc">VUL-0: CVE-2022-48911: kernel live patch: netfilter: nf_queue: fix possible use-after-free</issue>
<issue id="1231204" tracker="bnc">VUL-0: CVE-2024-46818: kernel live patch: drm/amd/display: check gpio_id before used as array index</issue>
<issue id="1233679" tracker="bnc">VUL-0: CVE-2024-50302: kernel live patch: HID: core: zero-initialize the report buffer</issue>
<issue id="2021-47261" tracker="cve" />
<issue id="2021-47496" tracker="cve" />
<issue id="2022-48792" tracker="cve" />
<issue id="2022-48911" tracker="cve" />
<issue id="2024-46818" tracker="cve" />
<issue id="2024-50302" tracker="cve" />
<category>security</category>
<rating>important</rating>
<packager>nstange</packager>
<description>This update for the Linux Kernel 5.3.18-150300_59_161 fixes several issues.
The following security issues were fixed:
- CVE-2024-46818: drm/amd/display: Check gpio_id before used as array index (bsc#1231204).
- CVE-2021-47261: Fix initializing CQ fragments buffer (bsc#1224954)
- CVE-2024-50302: HID: core: zero-initialize the report buffer (bsc#1233679).
- CVE-2022-48792: scsi: pm8001: Fix use-after-free for aborted SSP/STP sas_task (bsc#1228017).
- CVE-2022-48911: kabi: add __nf_queue_get_refs() for kabi compliance. (bsc#1229640).
- CVE-2021-47496: Fix flipped sign in tls_err_abort() calls (bsc#1225354)
</description>
<summary>Security update for the Linux Kernel (Live Patch 44 for SLE 15 SP3)</summary>
</patchinfo>