File _patchinfo of Package patchinfo.37916

<patchinfo incident="37916">
  <issue id="1229640" tracker="bnc">VUL-0: CVE-2022-48911: kernel live patch: netfilter: nf_queue: fix possible use-after-free</issue>
  <issue id="1231196" tracker="bnc">VUL-0: CVE-2024-46815: kernel live patch: drm/amd/display: check num_valid_sets before accessing reader_wm_sets[]</issue>
  <issue id="1231204" tracker="bnc">VUL-0: CVE-2024-46818: kernel live patch: drm/amd/display: check gpio_id before used as array index</issue>
  <issue id="1233679" tracker="bnc">VUL-0: CVE-2024-50302: kernel live patch: HID: core: zero-initialize the report buffer</issue>
  <issue id="1235452" tracker="bnc">VUL-0: CVE-2024-56648: kernel live patch: net: hsr: avoid potential out-of-bound access in fill_frame_info()</issue>
  <issue id="2022-48911" tracker="cve" />
  <issue id="2024-46815" tracker="cve" />
  <issue id="2024-46818" tracker="cve" />
  <issue id="2024-50302" tracker="cve" />
  <issue id="2024-56648" tracker="cve" />
  <category>security</category>
  <rating>important</rating>
  <packager>nstange</packager>
  <description>This update for the Linux Kernel 5.14.21-150500_55_68 fixes several issues.

The following security issues were fixed:

- CVE-2024-46818: drm/amd/display: Check gpio_id before used as array index (bsc#1231204).
- CVE-2024-46815: drm/amd/display: Check num_valid_sets before accessing reader_wm_sets (bsc#1231196).
- CVE-2024-56648: net: hsr: avoid potential out-of-bound access in fill_frame_info() (bsc#1235452).
- CVE-2024-50302: HID: core: zero-initialize the report buffer (bsc#1233679).
- CVE-2022-48911: kabi: add __nf_queue_get_refs() for kabi compliance.  (bsc#1229640).
</description>
<summary>Security update for the Linux Kernel (Live Patch 15 for SLE 15 SP5)</summary>
</patchinfo>
openSUSE Build Service is sponsored by