File _patchinfo of Package patchinfo.41035
<patchinfo incident="41035">
<issue id="1202700" tracker="bnc">VUL-0: CVE-2022-2978: kernel-source-azure,kernel-source-rt,kernel-source: kernel: use-after-free in nilfs_mdt_destroy</issue>
<issue id="1203063" tracker="bnc">Update Broadcom Emulex lpfc driver to 14.2.0.6</issue>
<issue id="1203332" tracker="bnc">VUL-0: CVE-2022-36280: kernel: out-of-bounds memory access vulnerability found in vmwgfx driver</issue>
<issue id="1204228" tracker="bnc">VUL-0: CVE-2022-2602: kernel: defer registered files gc to io_uring release</issue>
<issue id="1205128" tracker="bnc">VUL-0: CVE-2022-43945: kernel-source-azure,kernel-source,kernel-source-rt: nfsd: buffer overflow due to incorrect calculation of send buffer size</issue>
<issue id="1206883" tracker="bnc">[PATCH] ext4: avoid crash when inline data creation follows DIO write</issue>
<issue id="1206884" tracker="bnc">[PATCH] ext4: fix null-ptr-deref in ext4_write_info</issue>
<issue id="1209287" tracker="bnc">VUL-0: CVE-2023-1380: kernel: A USB-accessible slab-out-of-bounds read in Linux kernel driver</issue>
<issue id="1209291" tracker="bnc">VUL-0: CVE-2023-28328: kernel: A denial of service issue in az6027 driver in drivers/media/usb/dev-usb/az6027.c</issue>
<issue id="1210124" tracker="bnc">SLES 15 SP3 NFS Server rsize bug upon update to kernel 5.3.18-150300.59.106.1</issue>
<issue id="1210584" tracker="bnc">VUL-0: kernel: buffer overflow in mtd_ubi build.c:::io_init</issue>
<issue id="1213061" tracker="bnc">VUL-0: CVE-2023-31248: kernel: nf_tables UAF when using nft_chain_lookup_byid</issue>
<issue id="1213666" tracker="bnc">VUL-0: CVE-2023-3772: kernel: xfrm: NULL pointer dereference in xfrm_update_ae_params()</issue>
<issue id="1215150" tracker="bnc">VUL-0: CVE-2023-42753: kernel-source: slab-out-of-bound access in the Linux kernel</issue>
<issue id="1216976" tracker="bnc">VUL-0: CVE-2023-39197: kernel: DCCP: conntrack out-of-bounds read in nf_conntrack_dccp_packet()</issue>
<issue id="1220185" tracker="bnc">VUL-0: CVE-2024-26583: kernel: tls: fix race between async notify and socket close</issue>
<issue id="1220186" tracker="bnc">VUL-0: CVE-2024-26584: kernel: net: tls: handle backlogging of crypto requests</issue>
<issue id="1233640" tracker="bnc">VUL-0: CVE-2024-53093: kernel: nvme-multipath: defer partition scanning</issue>
<issue id="1240784" tracker="bnc">VUL-0: CVE-2025-21969: kernel: Bluetooth: L2CAP: Fix slab-use-after-free Read in l2cap_send_cmd</issue>
<issue id="1241353" tracker="bnc">[Build 20250416] openQA test fails in tdup: ordering of package in transaction</issue>
<issue id="1243278" tracker="bnc">NULL pointer dereference in iscsi_sw_tcp_conn_set_param() — ref:_00D1igLOd._500TrZljDf:ref</issue>
<issue id="1244337" tracker="bnc">kernel-syms should not require kernel-rt-devel</issue>
<issue id="1244729" tracker="bnc">VUL-0: CVE-2025-38011: kernel: drm/amdgpu: csa unmap use uninterruptible lock</issue>
<issue id="1245110" tracker="bnc">VUL-0: CVE-2022-49980: kernel: USB: gadget: fix use-after-free Read in usb_udc_uevent()</issue>
<issue id="1245956" tracker="bnc">VUL-0: CVE-2025-38184: kernel: tipc: fix null-ptr-deref when acquiring remote ip of ethernet bearer</issue>
<issue id="1245963" tracker="bnc">VUL-0: CVE-2025-38216: kernel: iommu/vt-d: Restore context entry setup order for aliased devices</issue>
<issue id="1246879" tracker="bnc">[ppc64le] kernel-default-base has truncated vmlinux, breaking fips</issue>
<issue id="1246968" tracker="bnc">VUL-0: CVE-2022-50233: kernel: bluetooth: device name can cause reading kernel memory by not supplying terminal \0</issue>
<issue id="1247172" tracker="bnc">Kernel-syms.spec does not write release information in local build of RPM package</issue>
<issue id="1247239" tracker="bnc">VUL-0: CVE-2025-38488: kernel: smb: client: fix use-after-free in crypt_message when using async crypto</issue>
<issue id="1248108" tracker="bnc">kernel: livepatching: build dependencies for RT flavour: kernel-syms vs. kernel-syms-rt</issue>
<issue id="1248255" tracker="bnc">VUL-0: CVE-2025-38553: kernel: net/sched: Restrict conditions for adding duplicating netems to qdisc tree</issue>
<issue id="1248399" tracker="bnc">VUL-0: CVE-2025-38572: kernel: ipv6: reject malicious packets in ipv6_gso_segment()</issue>
<issue id="1248628" tracker="bnc">VUL-0: CVE-2025-38664: kernel: ice: Fix a null pointer dereference in ice_copy_and_init_pkg()</issue>
<issue id="1248847" tracker="bnc">VUL-0: CVE-2024-58240: kernel: tls: separate no-async decryption request handling from async</issue>
<issue id="1249186" tracker="bnc">Relax KABI checks on archs/flavors without KABI</issue>
<issue id="1249200" tracker="bnc">VUL-0: CVE-2025-38713: kernel: hfsplus: fix slab-out-of-bounds read in hfsplus_uni2asc()</issue>
<issue id="1249220" tracker="bnc">VUL-0: CVE-2025-38685: kernel: fbdev: Fix vmalloc out-of-bounds write in fast_imageblit</issue>
<issue id="1249346" tracker="bnc">[Build 20250908] openQA test fails in kdump_and_crash: not supported file format</issue>
<issue id="1249538" tracker="bnc">VUL-0: CVE-2025-39751: kernel: ALSA: hda/ca0132: Fix buffer overflow in add_tuning_control</issue>
<issue id="1249604" tracker="bnc">Use tar for creating kernel-source archives</issue>
<issue id="1249664" tracker="bnc">VUL-0: CVE-2022-50234: kernel: io_uring/af_unix: defer registered files gc to io_uring release</issue>
<issue id="1249667" tracker="bnc">VUL-0: CVE-2022-50235: kernel: NFSD: Protect against send buffer overflow in NFSv2 READDIR</issue>
<issue id="1249700" tracker="bnc">VUL-0: CVE-2022-50330: kernel: crypto: cavium - prevent integer overflow loading firmware</issue>
<issue id="1249713" tracker="bnc">VUL-0: CVE-2022-50317: kernel: drm/bridge: megachips: Fix a null pointer dereference bug</issue>
<issue id="1249716" tracker="bnc">VUL-0: CVE-2022-50312: kernel: drivers: serial: jsm: fix some leaks in probe</issue>
<issue id="1249718" tracker="bnc">VUL-0: CVE-2022-50309: kernel: media: xilinx: vipp: Fix refcount leak in xvip_graph_dma_init</issue>
<issue id="1249734" tracker="bnc">VUL-0: CVE-2022-50299: kernel: md: Replace snprintf with scnprintf</issue>
<issue id="1249740" tracker="bnc">VUL-0: CVE-2022-50271: kernel: vhost/vsock: Use kvmalloc/kvfree for larger packets.</issue>
<issue id="1249743" tracker="bnc">VUL-0: CVE-2022-50257: kernel: xen/gntdev: Prevent leaking grants</issue>
<issue id="1249747" tracker="bnc">VUL-0: CVE-2022-50249: kernel: memory: of: Fix refcount leak bug in of_get_ddr_timings()</issue>
<issue id="1249808" tracker="bnc">VUL-0: CVE-2022-50272: kernel: media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer()</issue>
<issue id="1249825" tracker="bnc">VUL-0: CVE-2023-53179: kernel: netfilter: ipset: add the missing IP_SET_HASH_WITH_NET0 macro for ip_set_hash_netportnet.c</issue>
<issue id="1249827" tracker="bnc">VUL-0: CVE-2023-53178: kernel: mm: fix zswap writeback race condition</issue>
<issue id="1249840" tracker="bnc">VUL-0: CVE-2022-50248: kernel: wifi: iwlwifi: mvm: fix double free on tx path.</issue>
<issue id="1249846" tracker="bnc">VUL-0: CVE-2022-50252: kernel: igb: Do not free q_vector unless new one was allocated</issue>
<issue id="1249880" tracker="bnc">VUL-0: CVE-2023-53147: kernel: xfrm: add NULL check in xfrm_update_ae_params</issue>
<issue id="1249885" tracker="bnc">VUL-0: CVE-2022-50260: kernel: drm/msm: Make .remove and .shutdown HW shutdown consistent</issue>
<issue id="1249908" tracker="bnc">VUL-0: CVE-2023-53265: kernel: ubi: ensure that VID header offset + VID header size <= alloc, size</issue>
<issue id="1249918" tracker="bnc">VUL-0: CVE-2023-53213: kernel: wifi: brcmfmac: slab-out-of-bounds read in brcmf_get_assoc_ies()</issue>
<issue id="1249923" tracker="bnc">VUL-0: CVE-2023-53304: kernel: netfilter: nft_set_rbtree: fix overlap expiration walk</issue>
<issue id="1249930" tracker="bnc">VUL-0: CVE-2023-53273: kernel: Drivers: vmbus: Check for channel allocation before looking up relids</issue>
<issue id="1249947" tracker="bnc">VUL-0: CVE-2022-50258: kernel: wifi: brcmfmac: Fix potential stack-out-of-bounds in brcmf_c_preinit_dcmds()</issue>
<issue id="1249949" tracker="bnc">VUL-0: CVE-2023-53333: kernel: netfilter: conntrack: dccp: copy entire header to stack buffer, not just basic one</issue>
<issue id="1250002" tracker="bnc">VUL-0: CVE-2025-39823: kernel: KVM: x86: use array_index_nospec with indices that come from guest</issue>
<issue id="1250009" tracker="bnc">VUL-0: CVE-2022-50368: kernel: drm/msm/dsi: fix memory corruption with too many bridges</issue>
<issue id="1250014" tracker="bnc">VUL-0: CVE-2022-50344: kernel: ext4: fix null-ptr-deref in ext4_write_info</issue>
<issue id="1250041" tracker="bnc">VUL-0: CVE-2022-50355: kernel: staging: vt6655: fix some erroneous memory clean-up loops</issue>
<issue id="1250131" tracker="bnc">VUL-0: CVE-2022-50385: kernel: NFS: Fix an Oops in nfs_d_automount()</issue>
<issue id="1250132" tracker="bnc">VUL-0: CVE-2022-50375: kernel: tty: serial: fsl_lpuart: disable dma rx/tx use flags in lpuart_dma_shutdown</issue>
<issue id="1250140" tracker="bnc">VUL-0: CVE-2022-50401: kernel: nfsd: under NFSv4.1, fix double svc_xprt_put on rpc_create failure</issue>
<issue id="1250180" tracker="bnc">VUL-0: CVE-2023-53438: kernel: x86/MCE: Always save CS register on AMD Zen IF Poison errors</issue>
<issue id="1250183" tracker="bnc">VUL-0: CVE-2022-50414: kernel: scsi: fcoe: Fix transport not deattached when fcoe_if_init() fails</issue>
<issue id="1250187" tracker="bnc">VUL-0: CVE-2022-50410: kernel: NFSD: Protect against send buffer overflow in NFSv2 READ</issue>
<issue id="1250189" tracker="bnc">VUL-0: CVE-2022-50412: kernel: drm: bridge: adv7511: unregister cec i2c device after cec adapter</issue>
<issue id="1250257" tracker="bnc">VUL-0: CVE-2022-50381: kernel: md: fix a crash in mempool_free</issue>
<issue id="1250269" tracker="bnc">VUL-0: CVE-2022-50359: kernel: media: cx88: Fix a null-ptr-deref bug in buffer_prepare()</issue>
<issue id="1250277" tracker="bnc">VUL-0: CVE-2022-50367: kernel: fs: fix UAF/GPF bug in nilfs_mdt_destroy</issue>
<issue id="1250301" tracker="bnc">VUL-0: CVE-2022-50386: kernel: Bluetooth: L2CAP: Fix user-after-free</issue>
<issue id="1250313" tracker="bnc">VUL-0: CVE-2023-53321: kernel: wifi: mac80211_hwsim: drop short frames</issue>
<issue id="1250337" tracker="bnc">VUL-0: CVE-2023-53220: kernel: media: az6007: Fix null-ptr-deref in az6007_i2c_xfer()</issue>
<issue id="1250391" tracker="bnc">VUL-0: CVE-2022-50408: kernel: wifi: brcmfmac: fix use-after-free bug in brcmf_netdev_start_xmit()</issue>
<issue id="1250392" tracker="bnc">VUL-0: CVE-2022-50409: kernel: net: If sock is dead don't access sock's sk_wq in sk_stream_wait_memory</issue>
<issue id="1250394" tracker="bnc">VUL-0: CVE-2022-50419: kernel: Bluetooth: hci_sysfs: Fix attempting to call device_add multiple times</issue>
<issue id="1250522" tracker="bnc">mkspec script shipped as part of rpm package</issue>
<issue id="1250764" tracker="bnc">VUL-0: CVE-2021-4460: kernel: drm/amdkfd: Fix UBSAN shift-out-of-bounds warning</issue>
<issue id="1250767" tracker="bnc">VUL-0: CVE-2022-50444: kernel: clk: tegra20: Fix refcount leak in tegra20_clock_init</issue>
<issue id="1250774" tracker="bnc">VUL-0: CVE-2022-50422: kernel: scsi: libsas: Fix use-after-free bug in smp_execute_task_sg()</issue>
<issue id="1250787" tracker="bnc">VUL-0: CVE-2022-50427: kernel: ALSA: ac97: fix possible memory leak in snd_ac97_dev_register()</issue>
<issue id="1250790" tracker="bnc">VUL-0: CVE-2022-50431: kernel: ALSA: aoa: i2sbus: fix possible memory leak in i2sbus_add_dev()</issue>
<issue id="1250797" tracker="bnc">VUL-0: CVE-2022-50437: kernel: drm/msm/hdmi: fix memory corruption with too many bridges</issue>
<issue id="1250799" tracker="bnc">VUL-0: CVE-2022-50435: kernel: ext4: avoid crash when inline data creation follows DIO write</issue>
<issue id="1250823" tracker="bnc">VUL-0: CVE-2023-53492: kernel: netfilter: nf_tables: do not ignore genmask when looking up chain by id</issue>
<issue id="1250847" tracker="bnc">VUL-0: CVE-2022-50467: kernel: scsi: lpfc: Fix null ndlp ptr dereference in abnormal exit path for GFT_ID</issue>
<issue id="1250850" tracker="bnc">VUL-0: CVE-2022-50459: kernel: scsi: iscsi: iscsi_tcp: Fix null-ptr-deref while calling getpeername()</issue>
<issue id="1250853" tracker="bnc">VUL-0: CVE-2022-50440: kernel: drm/vmwgfx: Validate the box size for the snooped cursor</issue>
<issue id="1250868" tracker="bnc">VUL-0: CVE-2023-53464: kernel: scsi: iscsi_tcp: Check that sock is valid before iscsi_set_param()</issue>
<issue id="1250890" tracker="bnc">VUL-0: CVE-2022-50454: kernel: drm/nouveau: fix a use-after-free in nouveau_gem_prime_import_sg_table()</issue>
<issue id="1250891" tracker="bnc">VUL-0: CVE-2022-50458: kernel: clk: tegra: Fix refcount leak in tegra210_clock_init</issue>
<issue id="2021-4460" tracker="cve" />
<issue id="2022-2602" tracker="cve" />
<issue id="2022-2978" tracker="cve" />
<issue id="2022-36280" tracker="cve" />
<issue id="2022-43945" tracker="cve" />
<issue id="2022-49980" tracker="cve" />
<issue id="2022-50233" tracker="cve" />
<issue id="2022-50234" tracker="cve" />
<issue id="2022-50235" tracker="cve" />
<issue id="2022-50248" tracker="cve" />
<issue id="2022-50249" tracker="cve" />
<issue id="2022-50252" tracker="cve" />
<issue id="2022-50257" tracker="cve" />
<issue id="2022-50258" tracker="cve" />
<issue id="2022-50260" tracker="cve" />
<issue id="2022-50271" tracker="cve" />
<issue id="2022-50272" tracker="cve" />
<issue id="2022-50299" tracker="cve" />
<issue id="2022-50309" tracker="cve" />
<issue id="2022-50312" tracker="cve" />
<issue id="2022-50317" tracker="cve" />
<issue id="2022-50330" tracker="cve" />
<issue id="2022-50344" tracker="cve" />
<issue id="2022-50355" tracker="cve" />
<issue id="2022-50359" tracker="cve" />
<issue id="2022-50367" tracker="cve" />
<issue id="2022-50368" tracker="cve" />
<issue id="2022-50375" tracker="cve" />
<issue id="2022-50381" tracker="cve" />
<issue id="2022-50385" tracker="cve" />
<issue id="2022-50386" tracker="cve" />
<issue id="2022-50401" tracker="cve" />
<issue id="2022-50408" tracker="cve" />
<issue id="2022-50409" tracker="cve" />
<issue id="2022-50410" tracker="cve" />
<issue id="2022-50412" tracker="cve" />
<issue id="2022-50414" tracker="cve" />
<issue id="2022-50419" tracker="cve" />
<issue id="2022-50422" tracker="cve" />
<issue id="2022-50427" tracker="cve" />
<issue id="2022-50431" tracker="cve" />
<issue id="2022-50435" tracker="cve" />
<issue id="2022-50437" tracker="cve" />
<issue id="2022-50440" tracker="cve" />
<issue id="2022-50444" tracker="cve" />
<issue id="2022-50454" tracker="cve" />
<issue id="2022-50458" tracker="cve" />
<issue id="2022-50459" tracker="cve" />
<issue id="2022-50467" tracker="cve" />
<issue id="2023-1380" tracker="cve" />
<issue id="2023-28328" tracker="cve" />
<issue id="2023-31248" tracker="cve" />
<issue id="2023-3772" tracker="cve" />
<issue id="2023-39197" tracker="cve" />
<issue id="2023-42753" tracker="cve" />
<issue id="2023-53147" tracker="cve" />
<issue id="2023-53178" tracker="cve" />
<issue id="2023-53179" tracker="cve" />
<issue id="2023-53213" tracker="cve" />
<issue id="2023-53220" tracker="cve" />
<issue id="2023-53265" tracker="cve" />
<issue id="2023-53273" tracker="cve" />
<issue id="2023-53304" tracker="cve" />
<issue id="2023-53321" tracker="cve" />
<issue id="2023-53333" tracker="cve" />
<issue id="2023-53438" tracker="cve" />
<issue id="2023-53464" tracker="cve" />
<issue id="2023-53492" tracker="cve" />
<issue id="2024-26583" tracker="cve" />
<issue id="2024-26584" tracker="cve" />
<issue id="2024-53093" tracker="cve" />
<issue id="2024-58240" tracker="cve" />
<issue id="2025-21969" tracker="cve" />
<issue id="2025-38011" tracker="cve" />
<issue id="2025-38184" tracker="cve" />
<issue id="2025-38216" tracker="cve" />
<issue id="2025-38488" tracker="cve" />
<issue id="2025-38553" tracker="cve" />
<issue id="2025-38572" tracker="cve" />
<issue id="2025-38664" tracker="cve" />
<issue id="2025-38685" tracker="cve" />
<issue id="2025-38713" tracker="cve" />
<issue id="2025-39751" tracker="cve" />
<issue id="2025-39823" tracker="cve" />
<category>security</category>
<rating>important</rating>
<packager>vliaskovitis</packager>
<reboot_needed/>
<description>
The SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security bugfixes.
The following security bugs were fixed:
- CVE-2022-49980: USB: gadget: fix use-after-free read in usb_udc_uevent() (bsc#1245110).
- CVE-2022-50233: Bluetooth: eir: Fix using strlen with hdev->{dev_name,short_name} (bsc#1246968).
- CVE-2022-50248: wifi: iwlwifi: mvm: fix double free on tx path (bsc#1249840).
- CVE-2022-50252: igb: Do not free q_vector unless new one was allocated (bsc#1249846).
- CVE-2022-50258: wifi: brcmfmac: Fix potential stack-out-of-bounds in brcmf_c_preinit_dcmds() (bsc#1249947).
- CVE-2022-50381: md: fix a crash in mempool_free (bsc#1250257).
- CVE-2022-50386: Bluetooth: L2CAP: Fix user-after-free (bsc#1250301).
- CVE-2022-50401: nfsd: under NFSv4.1, fix double svc_xprt_put on rpc_create failure (bsc#1250140).
- CVE-2022-50408: wifi: brcmfmac: fix use-after-free bug in brcmf_netdev_start_xmit() (bsc#1250391).
- CVE-2022-50409: net: If sock is dead do not access sock's sk_wq in sk_stream_wait_memory (bsc#1250392).
- CVE-2022-50412: drm: bridge: adv7511: unregister cec i2c device after cec adapter (bsc#1250189).
- CVE-2023-53178: mm: fix zswap writeback race condition (bsc#1249827).
- CVE-2023-53220: media: az6007: Fix null-ptr-deref in az6007_i2c_xfer() (bsc#1250337).
- CVE-2023-53321: wifi: mac80211_hwsim: drop short frames (bsc#1250313).
- CVE-2023-53438: x86/MCE: Always save CS register on AMD Zen IF Poison errors (bsc#1250180).
- CVE-2024-53093: nvme-multipath: defer partition scanning (bsc#1233640).
- CVE-2025-21969: kABI workaround for l2cap_conn changes (bsc#1240784).
- CVE-2025-38011: drm/amdgpu: csa unmap use uninterruptible lock (bsc#1244729).
- CVE-2025-38184: tipc: fix null-ptr-deref when acquiring remote ip of ethernet bearer (bsc#1245956).
- CVE-2025-38216: iommu/vt-d: Restore context entry setup order for aliased devices (bsc#1245963).
- CVE-2025-38488: smb: client: fix use-after-free in crypt_message when using async crypto (bsc#1247239).
- CVE-2025-38553: net/sched: Restrict conditions for adding duplicating netems to qdisc tree (bsc#1248255).
- CVE-2025-38572: ipv6: reject malicious packets in ipv6_gso_segment() (bsc#1248399).
- CVE-2025-38664: ice: Fix a null pointer dereference in ice_copy_and_init_pkg() (bsc#1248628).
- CVE-2025-38685: fbdev: Fix vmalloc out-of-bounds write in fast_imageblit (bsc#1249220).
- CVE-2025-38713: hfsplus: fix slab-out-of-bounds read in hfsplus_uni2asc() (bsc#1249200).
- CVE-2025-39751: ALSA: hda/ca0132: Fix buffer overflow in add_tuning_control (bsc#1249538).
- CVE-2025-39823: KVM: x86: use array_index_nospec with indices that come from guest (bsc#1250002).
The following non-security bugs were fixed:
- Limit patch filenames to 100 characters (bsc#1249604).
- Move pesign-obs-integration requirement from kernel-syms to kernel devel subpackage (bsc#1248108).
- git_sort: Make tests independent of environment.
- hfsplus: fix slab-out-of-bounds read in hfsplus_uni2asc() (git-fixes).
- kernel-binary: Another installation ordering fix (bsc#1241353).
- kernel-source: Do not list mkspec and its inputs as sources (bsc#1250522).
- kernel-subpackage-build: Decompress ghost file when compressed version exists (bsc#1249346).
- kernel-syms.spec: Drop old rpm release number hack (bsc#1247172).
- rpm/kernel-subpackage-spec: Skip brp-strip-debug to avoid file truncation (bsc#1246879).
- rpm/mkspec: Fix missing kernel-syms-rt creation (bsc#1244337).
- rpm: Configure KABI checkingness macro (bsc#1249186).
- rpm: Drop support for kabi/arch/ignore-flavor (bsc#1249186).
- scripts/python/kss-dashboard: attempt getting smash data
- scripts/python/kss-dashboard: fetch into repos if stale
- scripts/python/kss-dashboard: implement CVSSv3.1 score consistency check
- scripts/python/kss-dashboard: prepare for the alternative CVE branch
- scripts/python/kss-dashboard: simplify control flow
- scripts/python/kss-dashboard: speed up patch checking a bit
- scripts/python/kss-dashboard: use decorator to handle exceptions
- scripts/tar-up: Remove mkspec only affter running it.
- scripts: Import arch-symbols script from packaging
- scripts: Import guards script from packaging
- scripts: test_linux_git.py: Do not complain about missing cwd
- sequence-patch: Use arch-symbols
- suse_git/header: Complain about patch filenames over 100 characters.
- tar-up: Also sort generated tar archives
- tar-up: Handle multiple levels of symlinks
- tar-up: Normalize file modes to ones supported by git
- tar-up: Remove mkspec and its inputs as from target directory (bsc#1250522).
- tar-up: Remove the $build_dir prefix when in $build_dir
- tar-up: Set owner of files in generated tar archives to root rather than nobody
- tar_up: Handle symlinks in rpm directory
- use uniform permission checks for all mount propagation changes (git-fixes).
</description>
<summary>Security update for the Linux Kernel</summary>
<!-- inserted by gitlab@gitlab.suse.de:security/tools.git//home/securitybot/src/sectools/auto_maintenance.pl -->
<releasetarget project="SUSE:Updates:Storage:7.1:x86_64"/>
<releasetarget project="SUSE:Updates:Storage:7.1:aarch64"/>
<releasetarget project="SUSE:Updates:SUSE-MicroOS:5.2:x86_64"/>
<releasetarget project="SUSE:Updates:SUSE-MicroOS:5.2:s390x"/>
<releasetarget project="SUSE:Updates:SUSE-MicroOS:5.2:aarch64"/>
<releasetarget project="SUSE:Updates:SUSE-MicroOS:5.1:x86_64"/>
<releasetarget project="SUSE:Updates:SUSE-MicroOS:5.1:s390x"/>
<releasetarget project="SUSE:Updates:SUSE-MicroOS:5.1:aarch64"/>
<releasetarget project="SUSE:Updates:SLE-Product-SLES_SAP:15-SP3:x86_64"/>
<releasetarget project="SUSE:Updates:SLE-Product-SLES_SAP:15-SP3:ppc64le"/>
<releasetarget project="SUSE:Updates:SLE-Product-SLES:15-SP3-LTSS:x86_64"/>
<releasetarget project="SUSE:Updates:SLE-Product-SLES:15-SP3-LTSS:s390x"/>
<releasetarget project="SUSE:Updates:SLE-Product-SLES:15-SP3-LTSS:ppc64le"/>
<releasetarget project="SUSE:Updates:SLE-Product-SLES:15-SP3-LTSS:aarch64"/>
<releasetarget project="SUSE:Updates:SLE-Product-HPC:15-SP3-LTSS:x86_64"/>
<releasetarget project="SUSE:Updates:SLE-Product-HPC:15-SP3-LTSS:aarch64"/>
<releasetarget project="SUSE:Updates:SLE-Product-HA:15-SP3:x86_64"/>
<releasetarget project="SUSE:Updates:SLE-Product-HA:15-SP3:s390x"/>
<releasetarget project="SUSE:Updates:SLE-Product-HA:15-SP3:ppc64le"/>
<releasetarget project="SUSE:Updates:SLE-Product-HA:15-SP3:aarch64"/>
<releasetarget project="SUSE:Updates:SLE-Module-Development-Tools-OBS:15-SP6:x86_64"/>
<releasetarget project="SUSE:Updates:SLE-Module-Development-Tools-OBS:15-SP6:aarch64"/>
<releasetarget project="SUSE:SLE-15-SP3:Update"/>
</patchinfo>