File _patchinfo of Package patchinfo.37891
<patchinfo incident="37891"> <issue id="1227656" tracker="bnc">VUL-0: CVE-2021-47496: kernel live patch: net/tls: fix flipped sign in tls_err_abort() calls</issue> <issue id="1227751" tracker="bnc">VUL-0: CVE-2021-47261: kernel live patch: IB/mlx5: Fix initializing CQ fragments buffer</issue> <issue id="1228017" tracker="bnc">VUL-0: CVE-2022-48792: kernel live patch: scsi: pm8001: Fix use-after-free for aborted SSP/STP sas_task</issue> <issue id="1229640" tracker="bnc">VUL-0: CVE-2022-48911: kernel live patch: netfilter: nf_queue: fix possible use-after-free</issue> <issue id="1231204" tracker="bnc">VUL-0: CVE-2024-46818: kernel live patch: drm/amd/display: check gpio_id before used as array index</issue> <issue id="1233679" tracker="bnc">VUL-0: CVE-2024-50302: kernel live patch: HID: core: zero-initialize the report buffer</issue> <issue id="2021-47261" tracker="cve" /> <issue id="2021-47496" tracker="cve" /> <issue id="2022-48792" tracker="cve" /> <issue id="2022-48911" tracker="cve" /> <issue id="2024-46818" tracker="cve" /> <issue id="2024-50302" tracker="cve" /> <category>security</category> <rating>important</rating> <packager>nstange</packager> <description>This update for the Linux Kernel 5.3.18-150300_59_158 fixes several issues. The following security issues were fixed: - CVE-2024-46818: drm/amd/display: Check gpio_id before used as array index (bsc#1231204). - CVE-2021-47261: Fix initializing CQ fragments buffer (bsc#1224954) - CVE-2024-50302: HID: core: zero-initialize the report buffer (bsc#1233679). - CVE-2022-48792: scsi: pm8001: Fix use-after-free for aborted SSP/STP sas_task (bsc#1228017). - CVE-2022-48911: kabi: add __nf_queue_get_refs() for kabi compliance. (bsc#1229640). - CVE-2021-47496: Fix flipped sign in tls_err_abort() calls (bsc#1225354) </description> <summary>Security update for the Linux Kernel (Live Patch 43 for SLE 15 SP3)</summary> </patchinfo>