File _patchinfo of Package patchinfo.37930
<patchinfo incident="37930"> <issue id="1228755" tracker="bnc">VUL-0: CVE-2024-42159: kernel live patch: scsi: mpi3mr: sanitise num_phys</issue> <issue id="1231196" tracker="bnc">VUL-0: CVE-2024-46815: kernel live patch: drm/amd/display: check num_valid_sets before accessing reader_wm_sets[]</issue> <issue id="1231204" tracker="bnc">VUL-0: CVE-2024-46818: kernel live patch: drm/amd/display: check gpio_id before used as array index</issue> <issue id="1233679" tracker="bnc">VUL-0: CVE-2024-50302: kernel live patch: HID: core: zero-initialize the report buffer</issue> <issue id="1235452" tracker="bnc">VUL-0: CVE-2024-56648: kernel live patch: net: hsr: avoid potential out-of-bound access in fill_frame_info()</issue> <issue id="2024-42159" tracker="cve" /> <issue id="2024-46815" tracker="cve" /> <issue id="2024-46818" tracker="cve" /> <issue id="2024-50302" tracker="cve" /> <issue id="2024-56648" tracker="cve" /> <category>security</category> <rating>important</rating> <packager>nstange</packager> <description>This update for the Linux Kernel 6.4.0-150600_21 fixes several issues. The following security issues were fixed: - CVE-2024-46818: drm/amd/display: Check gpio_id before used as array index (bsc#1231204). - CVE-2024-46815: drm/amd/display: Check num_valid_sets before accessing reader_wm_sets (bsc#1231196). - CVE-2024-56648: net: hsr: avoid potential out-of-bound access in fill_frame_info() (bsc#1235452). - CVE-2024-50302: HID: core: zero-initialize the report buffer (bsc#1233679). - CVE-2024-42159: scsi: mpi3mr: fix sanitise num_phys (bsc#1228755). </description> <summary>Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP6)</summary> </patchinfo>