File _patchinfo of Package patchinfo.33802

<patchinfo incident="33802">
  <issue id="1141539" tracker="bnc">kernel backtrace while working with DASDs</issue>
  <issue id="1190576" tracker="bnc">Update Broadcom Emulex lpfc driver to 14.0.0.2 with bug fixes and Prism+ ASIC support</issue>
  <issue id="1192145" tracker="bnc">Update Broadcom Emulex lpfc driver to 14.0.0.3</issue>
  <issue id="1192837" tracker="bnc">Kernel bugs/lockups as consequence of cfs_rq leaf list corruption</issue>
  <issue id="1193629" tracker="bnc">[TRACKERBUG] SLE15-SP4 backports for cifs.ko</issue>
  <issue id="1196869" tracker="bnc">cgroup/cpuset: Fix a race between cpuset_attach() and cpu hotplug</issue>
  <issue id="1200313" tracker="bnc">[NetApp SLES15 SP4 Bug]: Host crash at nvme_tcp_init_iter() with header digest enabled</issue>
  <issue id="1201308" tracker="bnc">HP Z2 G8 Workstation:  supportconfig reboots on systool command</issue>
  <issue id="1201489" tracker="bnc">[NetApp SLES15 SP4 Bug]: Host crash at crypto_ahash_digest() during NVMe re-auth</issue>
  <issue id="1203906" tracker="bnc">cgroup: cgroup_get_from_id() must check the looked-up kn is a  directory</issue>
  <issue id="1203935" tracker="bnc">qla2xxx: update driver to 10.02.07.900-k</issue>
  <issue id="1204614" tracker="bnc">VUL-0: CVE-2022-42432: kernel-source-rt,kernel-source-azure,kernel-source: nftables: leak of stale stack data to userspace via nf_osf_find()</issue>
  <issue id="1207361" tracker="bnc">SLE15-SP5 networking backports and fixes</issue>
  <issue id="1211592" tracker="bnc">VUL-0: CVE-2023-2860: kernel-source-azure,kernel-source,kernel-source-rt: Linux Kernel IPv6 Segment Routing Out-Of-Bounds Read Information Disclosure Vulnerability</issue>
  <issue id="1213573" tracker="bnc">PVT:1050:NXGZIP: LPM of lpar got failed with error HSCLA2CF in 19th loops</issue>
  <issue id="1217339" tracker="bnc">VUL-0: CVE-2024-2201: CPU: InSpectre Gadget: Inspecting the Residual Attack Surface of Cross-privilege Spectre v2</issue>
  <issue id="1217408" tracker="bnc">VFS: file-max limit 2409228 reached - server becomes unresponsive - need core analyzed</issue>
  <issue id="1218562" tracker="bnc">VUL-0: CVE-2023-6270: kernel: use-after-free vulnerability in ATA over Ethernet (AoE) driver</issue>
  <issue id="1218917" tracker="bnc">VUL-0: CVE-2024-0639: kernel: potential deadlock on &amp;net-&gt;sctp.addr_wq_lock leading to DOS</issue>
  <issue id="1219104" tracker="bnc">VUL-0: CVE-2024-23848: kernel: use-after-free in cec_queue_msg_fh, related to drivers/media/cec/core/cec-adap.c and drivers/media/cec/core/cec-api.c.</issue>
  <issue id="1219126" tracker="bnc">VUL-0: CVE-2024-23850: kernel: in btrfs_get_root_ref in fs/btrfs/disk-io.c there can be an assertion failure leading to DoS</issue>
  <issue id="1219141" tracker="bnc">With kernel 5.14.21-150500.55.36.1 and higher FCoE shows offline state</issue>
  <issue id="1219169" tracker="bnc">VUL-0: CVE-2024-23307: kernel-source,kernel-source-azure,kernel-source-rt: Integer Overflow or Wraparound vulnerability in Linux Linux kernel kernel on Linux, x86, ARM (md, raid, raid5 modules) allows Forced Integer Overflow.</issue>
  <issue id="1219170" tracker="bnc">VUL-0: CVE-2024-22099: kernel: NULL pointer dereference vulnerability allows buffers overflow in /net/bluetooth/rfcomm/core.c</issue>
  <issue id="1219264" tracker="bnc">VUL-0: DISPUTED: CVE-2024-0841: kernel: hugetlbfs: Null pointer dereference in hugetlbfs_fill_super function</issue>
  <issue id="1220342" tracker="bnc">VUL-0: CVE-2024-26601: kernel-source,kernel-source-azure,kernel-source-rt: ext4: buddy bitmap corruption via fast commit replay</issue>
  <issue id="1220569" tracker="bnc">No mouse pointer in noVNC when installing latest Tumbleweed using BVCP</issue>
  <issue id="1220761" tracker="bnc">VUL-0: CVE-2021-47047: kernel: spi: spi-zynqmp-gqspi: return -ENOMEM if dma_map_single fails</issue>
  <issue id="1221042" tracker="bnc">VUL-0: CVE-2023-52593: kernel: wifi: wfx: potential NULL pointer dereference in wfx_set_mfp_ap()</issue>
  <issue id="1221044" tracker="bnc">VUL-0: CVE-2023-52591: kernel: reiserfs: potential filesystem corruption on directory rename</issue>
  <issue id="1221080" tracker="bnc">VUL-0: CVE-2023-52585: kernel: drm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper()</issue>
  <issue id="1221084" tracker="bnc">VUL-0: CVE-2023-52589: kernel: media: rkisp1: Fix IRQ disable race issue</issue>
  <issue id="1221088" tracker="bnc">VUL-0: CVE-2023-52590: kernel: ocfs2: Avoid touching renamed directory if parent does not change</issue>
  <issue id="1221299" tracker="bnc">VUL-0: CVE-2024-26610: kernel: wifi: iwlwifi: fix a memory corruption</issue>
  <issue id="1221612" tracker="bnc">VUL-0: CVE-2023-52616: kernel: crypto: lib/mpi - Fix unexpected pointer access in mpi_ec_init</issue>
  <issue id="1221617" tracker="bnc">VUL-0: CVE-2023-52614: kernel: PM / devfreq: Fix buffer overflow in trans_stat_show</issue>
  <issue id="1221645" tracker="bnc">SLES15 SP6 - [P10] - LPAR crashes and hangs on running ksefltest powerpc/mce/inject-ra-err with parameter "percpu_alloc=page" enabled</issue>
  <issue id="1221825" tracker="bnc">VUL-0: CVE-2023-52620: kernel: netfilter: nf_tables: disallow timeout for anonymous sets</issue>
  <issue id="1222294" tracker="bnc">VUL-0: CVE-2023-52635: kernel: PM / devfreq: Synchronize devfreq_monitor_[start/stop]</issue>
  <issue id="1222307" tracker="bnc">VUL-0: CVE-2024-26656: kernel: drm/amdgpu: fix use-after-free bug</issue>
  <issue id="1222357" tracker="bnc">VUL-0: CVE-2024-26671: kernel: blk-mq: fix IO hang from sbitmap wakeup race</issue>
  <issue id="1222368" tracker="bnc">VUL-0: CVE-2024-26673: kernel: netfilter: nft_ct: sanitize layer 3 and 4 protocol number in custom expectations</issue>
  <issue id="1222379" tracker="bnc">VUL-0: CVE-2024-26675: kernel: ppp_async: limit MRU to 64K</issue>
  <issue id="1222385" tracker="bnc">VUL-0: CVE-2024-26679: kernel: inet: read sk-&gt;sk_family once in inet_recv_error()</issue>
  <issue id="1222424" tracker="bnc">VUL-0: CVE-2024-26702: kernel: iio: magnetometer: rm3100: add boundary check for the value read from RM3100_REG_TMRC</issue>
  <issue id="1222430" tracker="bnc">VUL-0: CVE-2024-26792: kernel: btrfs: fix double free of anonymous device after snapshot creation failure</issue>
  <issue id="1222435" tracker="bnc">VUL-0: CVE-2024-26687: kernel: xen/events: close evtchn after mapping cleanup</issue>
  <issue id="1222482" tracker="bnc">VUL-0: CVE-2024-26688: kernel: fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super</issue>
  <issue id="1222559" tracker="bnc">VUL-0: CVE-2024-26739: kernel: net/sched: act_mirred: don't override retval if we already lost the skb</issue>
  <issue id="1222585" tracker="bnc">VUL-0: CVE-2024-26733: kernel: arp: Prevent overflow in arp_req_get().</issue>
  <issue id="1222613" tracker="bnc">VUL-0: CVE-2024-26772: kernel: ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal()</issue>
  <issue id="1222615" tracker="bnc">VUL-0: CVE-2024-26783: kernel: mm/vmscan: fix a bug calling wakeup_kswapd() with a wrong zone index</issue>
  <issue id="1222618" tracker="bnc">VUL-0: CVE-2024-26773: kernel: ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found()</issue>
  <issue id="1222624" tracker="bnc">VUL-0: CVE-2024-26816: kernel: startup_xen address leaked in user readable /sys/kernel/notes</issue>
  <issue id="1222666" tracker="bnc">VUL-0: CVE-2021-47184: kernel: i40e: Fix NULL ptr dereference on VSI filter sync</issue>
  <issue id="1222669" tracker="bnc">VUL-0: CVE-2021-47185: kernel: tty: tty_buffer: Fix the softlockup issue in flush_to_ldisc</issue>
  <issue id="1222671" tracker="bnc">VUL-0: CVE-2021-47188: kernel: scsi: ufs: core: Improve SCSI abort handling</issue>
  <issue id="1222703" tracker="bnc">VUL-0: CVE-2021-47187: kernel: arm64: dts: qcom: msm8998: Fix CPU/L2 idle state latency and residency</issue>
  <issue id="1222704" tracker="bnc">VUL-0: CVE-2021-47215: kernel: net/mlx5e: kTLS, Fix crash in RX resync flow</issue>
  <issue id="1222709" tracker="bnc">VUL-0: CVE-2021-47212: kernel: net/mlx5: Update error handler for UCTX and UMEM</issue>
  <issue id="1222710" tracker="bnc">VUL-0: CVE-2021-47214: kernel: hugetlb, userfaultfd: fix reservation restore on userfaultfd error</issue>
  <issue id="1222721" tracker="bnc">VUL-0: CVE-2024-26764: kernel: fs/aio: WARNING in kiocb_set_cancel_fn</issue>
  <issue id="1222726" tracker="bnc">VUL-0: CVE-2024-26766: kernel: IB/hfi1: sdma.h tx-&gt;num_descs off-by-one error</issue>
  <issue id="1222773" tracker="bnc">VUL-0: CVE-2021-47196: kernel: RDMA/core: Set send and receive CQ before forwarding to the driver</issue>
  <issue id="1222776" tracker="bnc">VUL-0: CVE-2021-47197: kernel: net/mlx5e: nullify cq-&gt;dbg pointer in mlx5_debug_cq_remove()</issue>
  <issue id="1222785" tracker="bnc">VUL-0: CVE-2021-47199: kernel: net/mlx5e: CT, Fix multiple allocations and memleak of mod acts</issue>
  <issue id="1222787" tracker="bnc">VUL-0: CVE-2021-47204: kernel: net: dpaa2-eth: fix use-after-free in dpaa2_eth_remove</issue>
  <issue id="1222790" tracker="bnc">VUL-0: CVE-2021-47207: kernel: ALSA: gus: null pointer dereference on pointer block</issue>
  <issue id="1222791" tracker="bnc">VUL-0: CVE-2021-47218: kernel: selinux: fix NULL-pointer dereference when hashtab allocation fails</issue>
  <issue id="1222792" tracker="bnc">VUL-0: CVE-2021-47201: kernel: iavf: panic encountered when the interface is disabled</issue>
  <issue id="1222793" tracker="bnc">VUL-0: CVE-2024-26791: kernel: btrfs: dev-replace: properly validate device names</issue>
  <issue id="1222796" tracker="bnc">VUL-0: CVE-2021-47209: kernel: sched/fair: Prevent dead task groups from regaining cfs_rq's</issue>
  <issue id="1222812" tracker="bnc">VUL-0: CVE-2024-26817: kernel: amdkfd: use calloc instead of kzalloc to avoid integer overflow</issue>
  <issue id="1222824" tracker="bnc">VUL-0: CVE-2021-47219: kernel: scsi: scsi_debug: out-of-bound read in resp_report_tgtpgs()</issue>
  <issue id="1222829" tracker="bnc">VUL-0: CVE-2021-47194: kernel: cfg80211: call cfg80211_stop_ap when switch from P2P_GO type</issue>
  <issue id="1222832" tracker="bnc">VUL-0: CVE-2021-47195: kernel: spi: fix use-after-free of the add_lock mutex</issue>
  <issue id="1222836" tracker="bnc">VUL-0: CVE-2021-47217: kernel: x86/hyperv: Fix NULL deref in set_hv_tscchange_cb() if Hyper-V setup fails</issue>
  <issue id="1222838" tracker="bnc">VUL-0: CVE-2021-47200: kernel: drm/prime: Fix use after free in mmap with drm_gem_ttm_mmap</issue>
  <issue id="1222866" tracker="bnc">VUL-0: CVE-2021-47191: kernel: scsi: scsi_debug: Fix out-of-bound read in resp_readcap16()</issue>
  <issue id="1222867" tracker="bnc">VUL-0: CVE-2021-47192: kernel: scsi: core: sysfs: Fix hang when device state is set via sysfs</issue>
  <issue id="1222869" tracker="bnc">VUL-0: CVE-2021-47211: kernel: ALSA: usb-audio: null pointer dereference on pointer cs_desc</issue>
  <issue id="1222870" tracker="bnc">VUL-0: CVE-2024-26700: kernel: drm/amd/display: MST Null Ptr for RV</issue>
  <issue id="1222876" tracker="bnc">VUL-0: CVE-2021-47216: kernel: scsi: advansys: kernel pointer leak</issue>
  <issue id="1222878" tracker="bnc">VUL-0: CVE-2021-47202: kernel: thermal: NULL pointer dereferences in of_thermal_ functions</issue>
  <issue id="1222879" tracker="bnc">VUL-0: CVE-2021-47193: kernel: scsi: pm80xx: Fix memory leak during rmmod</issue>
  <issue id="1222881" tracker="bnc">VUL-0: CVE-2021-47203: kernel: scsi: lpfc: list_add() corruption in lpfc_drain_txq()</issue>
  <issue id="1222883" tracker="bnc">VUL-0: CVE-2021-47198: kernel: scsi: lpfc: Fix use-after-free in lpfc_unreg_rpi() routine</issue>
  <issue id="1222888" tracker="bnc">VUL-0: CVE-2021-47205: kernel: clk: sunxi-ng: Unregister clocks/resets when unbinding</issue>
  <issue id="1222894" tracker="bnc">VUL-0: CVE-2021-47206: kernel: usb: host: ohci-tmio: check return value after calling platform_get_resource()</issue>
  <issue id="1222901" tracker="bnc">VUL-0: CVE-2021-47210: kernel: usb: typec: tipd: Remove WARN_ON in tps6598x_block_read</issue>
  <issue id="1222968" tracker="bnc">VUL-0: CVE-2024-26836: kernel: platform/x86: think-lmi: wrong password opcode for workstations</issue>
  <issue id="1222976" tracker="bnc">VUL-0: CVE-2024-26840: kernel: cachefiles: memory leak in cachefiles_add_cache()</issue>
  <issue id="1223012" tracker="bnc">VUL-0: CVE-2024-26830: kernel: i40e: Do not allow untrusted VF to remove administratively set MAC</issue>
  <issue id="1223014" tracker="bnc">VUL-0: CVE-2024-26843: kernel: efi: runtime: potential overflow of soft-reserved region size</issue>
  <issue id="1223016" tracker="bnc">VUL-0: CVE-2024-26898: kernel: aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts</issue>
  <issue id="1223024" tracker="bnc">VUL-0: CVE-2024-26866: kernel: spi: lpspi: Avoid potential use-after-free in probe()</issue>
  <issue id="1223033" tracker="bnc">VUL-0: CVE-2023-52645: kernel: pmdomain: mediatek: fix race conditions with genpd</issue>
  <issue id="1223034" tracker="bnc">VUL-0: CVE-2024-26882: kernel: net: ip_tunnel: make sure to pull inner header in ip_tunnel_rcv()</issue>
  <issue id="1223035" tracker="bnc">VUL-0: CVE-2024-26883: kernel: bpf: Fix stackmap overflow check on 32-bit arches</issue>
  <issue id="1223036" tracker="bnc">VUL-0: CVE-2024-26833: kernel: drm/amd/display: Fix memory leak in dm_sw_fini()</issue>
  <issue id="1223037" tracker="bnc">VUL-0: CVE-2024-26891: kernel: iommu/vt-d: Don't issue ATS Invalidation request when device is disconnected</issue>
  <issue id="1223041" tracker="bnc">VUL-0: CVE-2024-26881: kernel: net: hns3: fix kernel crash when 1588 is received on HIP08 devices</issue>
  <issue id="1223042" tracker="bnc">VUL-0: CVE-2024-26896: kernel: wifi: wfx: fix memory leak when starting AP</issue>
  <issue id="1223051" tracker="bnc">VUL-0: CVE-2024-26855: kernel: net: ice: Fix potential NULL pointer dereference in ice_bridge_setlink()</issue>
  <issue id="1223052" tracker="bnc">VUL-0: CVE-2024-26856: kernel: net: sparx5: Fix use after free inside sparx5_del_mact_entry</issue>
  <issue id="1223056" tracker="bnc">VUL-0: CVE-2024-26917: kernel: scsi: Revert "scsi: fcoe: Fix potential deadlock on &amp;fip-&gt;ctlr_lock"</issue>
  <issue id="1223057" tracker="bnc">VUL-0: CVE-2024-26852: kernel: net/ipv6: UAF in ip6_route_mpath_notify()</issue>
  <issue id="1223058" tracker="bnc">VUL-0: CVE-2024-26857: kernel: geneve: make sure to pull inner header in geneve_rx()</issue>
  <issue id="1223060" tracker="bnc">VUL-0: CVE-2024-26878: kernel: quota: Fix potential NULL pointer dereference</issue>
  <issue id="1223061" tracker="bnc">VUL-0: CVE-2024-26853: kernel: igc: invalid free in</issue>
  <issue id="1223065" tracker="bnc">VUL-0: CVE-2024-26825: kernel: nfc: nci: free rx_data_reassembly skb on NCI device cleanup</issue>
  <issue id="1223066" tracker="bnc">VUL-0: CVE-2024-26879: kernel: clk: meson: Add missing clocks to axg_clk_regmaps</issue>
  <issue id="1223076" tracker="bnc">VUL-0: CVE-2024-26861: kernel: wireguard: receive: annotate data-race around receiving_counter.counter</issue>
  <issue id="1223078" tracker="bnc">VUL-0: CVE-2024-26820: kernel: hv_netvsc: ET_DEVICE_REGISTER handler cannot perform VF register successfully</issue>
  <issue id="1223111" tracker="bnc">VUL-0: CVE-2024-26862: kernel: packet: data-races in ignore_outgoing</issue>
  <issue id="1223115" tracker="bnc">VUL-0: CVE-2024-26872: kernel: RDMA/srpt: Do not register event handler until srpt device is fully setup</issue>
  <issue id="1223118" tracker="bnc">VUL-0: CVE-2024-26875: kernel: media: pvrusb2: uaf in pvr2_context_set_notify</issue>
  <issue id="1223119" tracker="bnc">VUL-0: CVE-2024-26876: kernel: drm/bridge: adv7511: crash on reading at  uninitialized data</issue>
  <issue id="1223140" tracker="bnc">VUL-0: CVE-2024-26877: kernel: crypto: WARNING in crypto_finalize_request</issue>
  <issue id="1223187" tracker="bnc">VUL-0: CVE-2024-26903: kernel: Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security</issue>
  <issue id="1223189" tracker="bnc">VUL-0: CVE-2024-26884: kernel: bpf: hashtab overflow check on 32-bit arches</issue>
  <issue id="1223190" tracker="bnc">VUL-0: CVE-2024-26885: kernel: bpf: DEVMAP_HASH overflow check on 32-bit arches</issue>
  <issue id="1223191" tracker="bnc">powerpc: Avoid nmi_enter/nmi_exit in real mode interrupt</issue>
  <issue id="1223196" tracker="bnc">VUL-0: CVE-2024-26893: kernel: firmware: arm_scmi: double free in SMC transport cleanup path</issue>
  <issue id="1223197" tracker="bnc">VUL-0: CVE-2024-26895: kernel: wifi: wilc1000:  use-after-free on vif when cleaning up all interfaces</issue>
  <issue id="1223198" tracker="bnc">VUL-0: CVE-2024-26901: kernel: information leak vulnerability in do_sys_name_to_handle()</issue>
  <issue id="1223207" tracker="bnc">VUL-0: CVE-2024-26915: kernel: drm/amdgpu: Reset IH OVERFLOW_CLEAR bit</issue>
  <issue id="1223275" tracker="bnc">The Intel ICE driver requires the iavf driver to be loaded to enable VLAN Tagging on SR-IOV VFs</issue>
  <issue id="1223323" tracker="bnc">VUL-0: CVE-2024-26897: kernel: wifi: ath9k: delay all of ath9k_wmi_event_tasklet() until init is complete</issue>
  <issue id="1223360" tracker="bnc">L3: Invalid pointer dereference in vmxnet3_rq_rx_complete — ref:_00D1igLOd._500Tr9CNbZ:ref</issue>
  <issue id="1223369" tracker="bnc">ISST-LTE : P10:eralp52:Call traces and EEH errors are seen while dlpar add of Shasta adapter</issue>
  <issue id="1223380" tracker="bnc">L3: PANIC: "Kernel panic - not syncing: NMI: Not continuing"</issue>
  <issue id="1223432" tracker="bnc">VUL-0: CVE-2023-52646: kernel: aio: fix mremap after fork null-deref</issue>
  <issue id="1223473" tracker="bnc">mm/vmscan: make sure wakeup_kswapd with managed zone backport</issue>
  <issue id="1223474" tracker="bnc">VUL-0: CVE-2022-48653: kernel: ice: "scheduling while atomic" BUG</issue>
  <issue id="1223475" tracker="bnc">VUL-0: CVE-2022-48631: kernel: ext4: fix bug in extents parsing when eh_entries == 0 and eh_depth &gt; 0</issue>
  <issue id="1223477" tracker="bnc">VUL-0: CVE-2022-48655: kernel: firmware: arm_scmi: out-of-bound violations if the SCMI driver misbehave</issue>
  <issue id="1223478" tracker="bnc">VUL-0: CVE-2022-48642: kernel: netfilter: nf_tables: fix percpu memory leak at nf_tables_addchain()</issue>
  <issue id="1223479" tracker="bnc">VUL-0: CVE-2022-48656: kernel: dmaengine: ti: refcount leak bug in of_xudma_dev_get()</issue>
  <issue id="1223481" tracker="bnc">VUL-0: CVE-2022-48632: kernel: i2c: mlxbf: prevent stack overflow in mlxbf_i2c_smbus_start_transaction()</issue>
  <issue id="1223482" tracker="bnc">VUL-0: CVE-2022-48654: kernel: netfilter: nfnetlink_osf: fix possible bogus match in nf_osf_find()</issue>
  <issue id="1223484" tracker="bnc">VUL-0: CVE-2022-48657: kernel: arm64: topology: possible overflow in amu_fie_setup()</issue>
  <issue id="1223487" tracker="bnc">VUL-0: CVE-2022-48660: kernel: gpiolib: cdev: warning in lineevent_state</issue>
  <issue id="1223490" tracker="bnc">VUL-0: CVE-2022-48639: kernel: net: sched: fix possible refcount leak in tc_new_tfilter()</issue>
  <issue id="1223496" tracker="bnc">VUL-0: CVE-2022-48658: kernel: mm: slub: fix flush_cpu_slab()/__free_slab() invocations in task context.</issue>
  <issue id="1223498" tracker="bnc">VUL-0: CVE-2022-48659: kernel: mm/slub: fix to return errno if kmalloc() fails</issue>
  <issue id="1223499" tracker="bnc">VUL-0: CVE-2022-48640: kernel: bonding: fix NULL deref in bond_rr_gen_slave_id</issue>
  <issue id="1223501" tracker="bnc">VUL-0: CVE-2022-48634: kernel: drm/gma500: Fix BUG: sleeping function called from invalid context errors</issue>
  <issue id="1223502" tracker="bnc">VUL-0: CVE-2022-48646: kernel: sfc/siena: fix null pointer dereference in efx_hard_start_xmit</issue>
  <issue id="1223503" tracker="bnc">VUL-0: CVE-2022-48648: kernel: sfc: fix null pointer dereference in efx_hard_start_xmit</issue>
  <issue id="1223505" tracker="bnc">VUL-0: CVE-2022-48662: kernel: drm/i915/gem: GPF in i915_perf_open_ioctl</issue>
  <issue id="1223509" tracker="bnc">VUL-0: CVE-2022-48650: kernel: scsi: qla2xxx: Fix memory leak in __qlt_24xx_handle_abts()</issue>
  <issue id="1223511" tracker="bnc">VUL-0: CVE-2022-48644: kernel: net/sched: taprio: avoid disabling offload when it was never enabled</issue>
  <issue id="1223512" tracker="bnc">VUL-0: CVE-2022-48636: kernel: s390/dasd: fix Oops in dasd_alias_get_start_dev due to missing pavgroup</issue>
  <issue id="1223513" tracker="bnc">VUL-0: CVE-2022-48651: kernel: ipvlan: Fix out-of-bound bugs caused by unset skb-&gt;mac_header</issue>
  <issue id="1223516" tracker="bnc">VUL-0: CVE-2022-48668: kernel: smb3: fix temporary data corruption in collapse range</issue>
  <issue id="1223517" tracker="bnc">VUL-0: CVE-2022-48637: kernel: bnxt: prevent skb UAF after handing over to PTP worker</issue>
  <issue id="1223518" tracker="bnc">VUL-0: CVE-2022-48667: kernel: smb3: fix temporary data corruption in insert range</issue>
  <issue id="1223519" tracker="bnc">VUL-0: CVE-2022-48647: kernel: sfc: fix TX channel offset when using legacy interrupts</issue>
  <issue id="1223520" tracker="bnc">VUL-0: CVE-2022-48652: kernel: ice: Fix crash by keep old cfg when update TCs more than queues</issue>
  <issue id="1223522" tracker="bnc">VUL-0: CVE-2022-48638: kernel: cgroup: cgroup_get_from_id() must check the looked-up kn is a directory</issue>
  <issue id="1223523" tracker="bnc">VUL-0: CVE-2022-48663: kernel: gpio: mockup: NULL pointer dereference when removing debugfs</issue>
  <issue id="1223525" tracker="bnc">VUL-0: CVE-2024-26927: kernel: ASoC: SOF: Add some bounds checking to firmware data</issue>
  <issue id="1223536" tracker="bnc">[PATCH] workqueue: Provide one lock class key per work_on_cpu()  callsite</issue>
  <issue id="1223539" tracker="bnc">[PATCH] livepatch: Fix missing newline character in  klp_resolve_symbols()</issue>
  <issue id="1223574" tracker="bnc">[PATCH] printk: console flushing fixes</issue>
  <issue id="1223595" tracker="bnc">s390/zcrypt: fix reference counting on zcrypt card objects</issue>
  <issue id="1223598" tracker="bnc">s390/vdso: drop '-fPIC' from LDFLAGS</issue>
  <issue id="1223628" tracker="bnc">VUL-0: CVE-2024-26979: kernel: drm/vmwgfx: Fix possible null pointer derefence with invalid contexts</issue>
  <issue id="1223634" tracker="bnc">VUL-0: CVE-2024-26982: kernel: Squashfs: check the inode number is not the invalid value of zero</issue>
  <issue id="1223640" tracker="bnc">SLE-15SP5 KOTD: Kernel oops during NFS write</issue>
  <issue id="1223643" tracker="bnc">VUL-0: CVE-2024-26972: kernel: ubifs: ubifs_symlink: Fix memleak of inode-&gt;i_link in error path</issue>
  <issue id="1223644" tracker="bnc">VUL-0: CVE-2024-26970: kernel: clk: qcom: gcc-ipq6018: fix terminating of frequency table arrays</issue>
  <issue id="1223645" tracker="bnc">VUL-0: CVE-2024-26969: kernel: clk: qcom: gcc-ipq8074: fix terminating of frequency table arrays</issue>
  <issue id="1223646" tracker="bnc">VUL-0: CVE-2024-26966: kernel: clk: qcom: mmcc-apq8084: fix terminating of frequency table arrays</issue>
  <issue id="1223648" tracker="bnc">VUL-0: CVE-2024-26965: kernel: clk: qcom: mmcc-msm8974: fix terminating of frequency table arrays</issue>
  <issue id="1223655" tracker="bnc">VUL-0: CVE-2024-26960: kernel: mm: swap: fix race between free_swap_and_cache() and swapoff()</issue>
  <issue id="1223657" tracker="bnc">VUL-0: CVE-2024-26955: kernel: nilfs2: prevent kernel bug at submit_bh_wbc()</issue>
  <issue id="1223660" tracker="bnc">VUL-0: CVE-2024-26951: kernel: wireguard: netlink: check for dangling peer via is_dead instead of empty list</issue>
  <issue id="1223661" tracker="bnc">VUL-0: CVE-2024-26950: kernel: wireguard: netlink: access device through ctx instead of peer</issue>
  <issue id="1223663" tracker="bnc">VUL-0: CVE-2024-26956: kernel: nilfs2: fix failure to detect DAT corruption in btree and direct mappings</issue>
  <issue id="1223664" tracker="bnc">VUL-0: CVE-2024-26948: kernel: drm/amd/display: Add a dc_state NULL check in dc_state_release</issue>
  <issue id="1223668" tracker="bnc">VUL-0: CVE-2024-26981: kernel: nilfs2: fix OOB in nilfs_set_de_type</issue>
  <issue id="1223670" tracker="bnc">VUL-0: CVE-2024-26933: kernel: USB: core: deadlock in port "disable" sysfs attribute</issue>
  <issue id="1223679" tracker="bnc">VUL-0: CVE-2024-26939: kernel: drm/i915/vma: UAF on destroy against retire race</issue>
  <issue id="1223686" tracker="bnc">VUL-0: CVE-2023-52652: kernel: NTB: possible mempry leak in ntb_register_device()</issue>
  <issue id="1223693" tracker="bnc">VUL-0: CVE-2024-26993: kernel: fs: sysfs: fix reference leak in sysfs_break_active_protection()</issue>
  <issue id="1223705" tracker="bnc">VUL-0: CVE-2024-27389: kernel: pstore: inode: only d_invalidate() is needed</issue>
  <issue id="1223714" tracker="bnc">VUL-0: CVE-2024-27041: kernel: drm/amd/display: fix NULL checks for adev-&gt;dm.dc in amdgpu_dm_fini()</issue>
  <issue id="1223735" tracker="bnc">VUL-0: CVE-2024-27014: kernel: net/mlx5e: Prevent deadlock while disabling aRFS</issue>
  <issue id="1223738" tracker="bnc">VUL-0: CVE-2024-27059: kernel: USB: usb-storage: Prevent divide-by-0 error in isd200_ata_command</issue>
  <issue id="1223745" tracker="bnc">VUL-0: CVE-2024-27013: kernel: tun: limit printing rate when illegal packet received by tun dev</issue>
  <issue id="1223784" tracker="bnc">s390/scm: fix virtual vs physical address confusion</issue>
  <issue id="1223785" tracker="bnc">s390/decompressor: fix misaligned symbol build error</issue>
  <issue id="1223790" tracker="bnc">VUL-0: CVE-2024-27030: kernel: octeontx2-af: use separate handlers for interrupts</issue>
  <issue id="1223816" tracker="bnc">VUL-0: CVE-2024-27038: kernel: clk: clk_core_get NULL dereference</issue>
  <issue id="1223821" tracker="bnc">VUL-0: CVE-2024-27039: kernel: clk: hisilicon: hi3559a: erroneous devm_kfree()</issue>
  <issue id="1223822" tracker="bnc">VUL-0: CVE-2024-27056: kernel: wifi: iwlwifi: mvm: ensure offloading TID queue exists</issue>
  <issue id="1223823" tracker="bnc">VUL-0: CVE-2024-27042: kernel: drm/amdgpu: potential out-of-bounds access in 'amdgpu_discovery_reg_base_init()'</issue>
  <issue id="1223824" tracker="bnc">VUL-0: CVE-2024-27043: kernel: media: media: dvbdev: use-after-free in different places</issue>
  <issue id="1223827" tracker="bnc">VUL-0: CVE-2024-27046: kernel: nfp: flower: NULL pointer dereference with acti_netdevs allocation failure</issue>
  <issue id="1223834" tracker="bnc">VUL-0: CVE-2024-27062: kernel: nouveau: lock the client object tree.</issue>
  <issue id="1223858" tracker="bnc">Cannot mount kerberized nfs4 share with kernel 5.14.21-150500.55.59-default</issue>
  <issue id="1223875" tracker="bnc">s390/cio: Ensure the copied buf is NUL terminated</issue>
  <issue id="1223876" tracker="bnc">s390/vdso: Add CFI for RA register to asm macro vdso_func</issue>
  <issue id="1223877" tracker="bnc">s390/mm: Fix clearing storage keys for huge pages</issue>
  <issue id="1223878" tracker="bnc">s390/mm: Fix storage key clearing for guest huge pages</issue>
  <issue id="1223879" tracker="bnc">s390/qeth: Fix kernel panic after setting hsuid</issue>
  <issue id="1223894" tracker="bnc">VUL-0: CVE-2022-48675: kernel: IB/core: fix a nested dead lock as part of ODP flow</issue>
  <issue id="1223921" tracker="bnc">VUL-0: CVE-2022-48701: kernel: ALSA: usb-audio: out-of-bounds bug in __snd_usb_parse_audio_interface()</issue>
  <issue id="1223922" tracker="bnc">VUL-0: CVE-2022-48697: kernel: nvmet: fix a use-after-free</issue>
  <issue id="1223923" tracker="bnc">VUL-0: CVE-2022-48702: kernel: ALSA: emu10k1: out of bounds access in snd_emu10k1_pcm_channel_alloc()</issue>
  <issue id="1223924" tracker="bnc">VUL-0: CVE-2022-48703: kernel: thermal/int340x_thermal: NULL point dereference in  data_vault_read() when accessing the 0x10</issue>
  <issue id="1223929" tracker="bnc">VUL-0: CVE-2022-48671: kernel: cgroup: Add missing cpus_read_lock() to cgroup_attach_task_all()</issue>
  <issue id="1223931" tracker="bnc">VUL-0: CVE-2022-48672: kernel: of: fdt: fix off-by-one error in unflatten_dt_nodes()</issue>
  <issue id="1223932" tracker="bnc">VUL-0: CVE-2022-48704: kernel: drm/radeon: panic on invalid kernel paging request</issue>
  <issue id="1223934" tracker="bnc">VUL-0: CVE-2022-48673: kernel: net/smc: Fix possible access to freed memory in link clear</issue>
  <issue id="1223941" tracker="bnc">VUL-0: CVE-2022-48695: kernel: scsi: mpt3sas: Fix use-after-free warning</issue>
  <issue id="1223948" tracker="bnc">VUL-0: CVE-2022-48686: kernel: nvme-tcp: fix UAF when detecting digest errors</issue>
  <issue id="1223949" tracker="bnc">virtio: treat alloc_dax() -EOPNOTSUPP failure as non-fatal</issue>
  <issue id="1223950" tracker="bnc">fuse: fix root lookup with nonzero generation</issue>
  <issue id="1223951" tracker="bnc">fuse: don't unhash root</issue>
  <issue id="1223952" tracker="bnc">VUL-0: CVE-2022-48687: kernel: ipv6: sr: fix out-of-bounds read when setting HMAC data.</issue>
  <issue id="1223953" tracker="bnc">VUL-0: CVE-2022-48688: kernel: i40e: fix kernel crash during module removal</issue>
  <issue id="1223956" tracker="bnc">VUL-0: CVE-2022-48698: kernel: drm/amd/display: fix memory leak when using debugfs_lookup()</issue>
  <issue id="1223957" tracker="bnc">VUL-0: CVE-2022-48700: kernel: vfio/type1: unpin zero pages</issue>
  <issue id="1223960" tracker="bnc">VUL-0: CVE-2022-48690: kernel: ice: Fix DMA mappings leak</issue>
  <issue id="1223962" tracker="bnc">VUL-0: CVE-2022-48692: kernel: RDMA/srp: Set scmnd-&gt;result only when scmnd is not NULL</issue>
  <issue id="1223963" tracker="bnc">VUL-0: CVE-2022-48693: kernel: soc: brcmstb: pm-arm: Fix refcount leak and __iomem leak bugs</issue>
  <issue id="1223964" tracker="bnc">VUL-0: CVE-2022-48694: kernel: RDMA/irdma: Fix drain SQ hang with no completion</issue>
  <issue id="1223996" tracker="bnc">VUL-0: CVE-2022-48699: kernel: sched/debug: fix dentry leak in update_sched_domain_debugfs</issue>
  <issue id="2024-26933" tracker="cve" />
  <issue id="2024-27059" tracker="cve" />
  <issue id="2024-26915" tracker="cve" />
  <issue id="2024-26877" tracker="cve" />
  <issue id="2024-26700" tracker="cve" />
  <issue id="2024-26979" tracker="cve" />
  <issue id="2024-26939" tracker="cve" />
  <issue id="2022-48699" tracker="cve" />
  <issue id="2024-26791" tracker="cve" />
  <issue id="2024-26840" tracker="cve" />
  <issue id="2023-52646" tracker="cve" />
  <issue id="2024-26679" tracker="cve" />
  <issue id="2024-26739" tracker="cve" />
  <issue id="2022-48662" tracker="cve" />
  <issue id="2022-48698" tracker="cve" />
  <issue id="2022-48690" tracker="cve" />
  <issue id="2022-48702" tracker="cve" />
  <issue id="2022-48701" tracker="cve" />
  <issue id="2022-48694" tracker="cve" />
  <issue id="2022-48692" tracker="cve" />
  <issue id="2022-48671" tracker="cve" />
  <issue id="2022-48704" tracker="cve" />
  <issue id="2022-48688" tracker="cve" />
  <issue id="2023-2860" tracker="cve" />
  <issue id="2022-48687" tracker="cve" />
  <issue id="2022-48673" tracker="cve" />
  <issue id="2022-48686" tracker="cve" />
  <issue id="2022-48697" tracker="cve" />
  <issue id="2022-48672" tracker="cve" />
  <issue id="2022-48695" tracker="cve" />
  <issue id="2022-48693" tracker="cve" />
  <issue id="2022-48703" tracker="cve" />
  <issue id="2022-48700" tracker="cve" />
  <issue id="2024-26862" tracker="cve" />
  <issue id="2024-0639" tracker="cve" />
  <issue id="2024-26673" tracker="cve" />
  <issue id="2024-26853" tracker="cve" />
  <issue id="2024-26856" tracker="cve" />
  <issue id="2024-26993" tracker="cve" />
  <issue id="2022-48675" tracker="cve" />
  <issue id="2022-48634" tracker="cve" />
  <issue id="2022-48632" tracker="cve" />
  <issue id="2022-48652" tracker="cve" />
  <issue id="2022-48636" tracker="cve" />
  <issue id="2024-27062" tracker="cve" />
  <issue id="2024-27042" tracker="cve" />
  <issue id="2024-27041" tracker="cve" />
  <issue id="2024-27013" tracker="cve" />
  <issue id="2024-27014" tracker="cve" />
  <issue id="2024-27030" tracker="cve" />
  <issue id="2024-26950" tracker="cve" />
  <issue id="2024-26951" tracker="cve" />
  <issue id="2024-26861" tracker="cve" />
  <issue id="2024-27046" tracker="cve" />
  <issue id="2024-26948" tracker="cve" />
  <issue id="2024-27389" tracker="cve" />
  <issue id="2024-27056" tracker="cve" />
  <issue id="2024-27043" tracker="cve" />
  <issue id="2024-27039" tracker="cve" />
  <issue id="2024-27038" tracker="cve" />
  <issue id="2023-52652" tracker="cve" />
  <issue id="2024-26960" tracker="cve" />
  <issue id="2024-26965" tracker="cve" />
  <issue id="2024-26966" tracker="cve" />
  <issue id="2024-26969" tracker="cve" />
  <issue id="2024-26876" tracker="cve" />
  <issue id="2022-48631" tracker="cve" />
  <issue id="2024-26970" tracker="cve" />
  <issue id="2024-26852" tracker="cve" />
  <issue id="2024-23307" tracker="cve" />
  <issue id="2024-23848" tracker="cve" />
  <issue id="2022-48659" tracker="cve" />
  <issue id="2023-52585" tracker="cve" />
  <issue id="2022-48640" tracker="cve" />
  <issue id="2024-26982" tracker="cve" />
  <issue id="2024-26972" tracker="cve" />
  <issue id="2024-26955" tracker="cve" />
  <issue id="2024-26956" tracker="cve" />
  <issue id="2024-26981" tracker="cve" />
  <issue id="2024-26927" tracker="cve" />
  <issue id="2022-48663" tracker="cve" />
  <issue id="2022-48638" tracker="cve" />
  <issue id="2022-48647" tracker="cve" />
  <issue id="2022-48667" tracker="cve" />
  <issue id="2022-48637" tracker="cve" />
  <issue id="2022-48668" tracker="cve" />
  <issue id="2022-48644" tracker="cve" />
  <issue id="2023-52620" tracker="cve" />
  <issue id="2022-48650" tracker="cve" />
  <issue id="2022-48648" tracker="cve" />
  <issue id="2022-48646" tracker="cve" />
  <issue id="2022-48639" tracker="cve" />
  <issue id="2022-48660" tracker="cve" />
  <issue id="2022-48657" tracker="cve" />
  <issue id="2022-48654" tracker="cve" />
  <issue id="2022-48656" tracker="cve" />
  <issue id="2022-48642" tracker="cve" />
  <issue id="2022-48653" tracker="cve" />
  <issue id="2024-26875" tracker="cve" />
  <issue id="2024-26872" tracker="cve" />
  <issue id="2024-26878" tracker="cve" />
  <issue id="2024-26901" tracker="cve" />
  <issue id="2024-26671" tracker="cve" />
  <issue id="2024-26772" tracker="cve" />
  <issue id="2024-26879" tracker="cve" />
  <issue id="2024-26820" tracker="cve" />
  <issue id="2024-26825" tracker="cve" />
  <issue id="2024-26896" tracker="cve" />
  <issue id="2024-26917" tracker="cve" />
  <issue id="2023-52614" tracker="cve" />
  <issue id="2024-26891" tracker="cve" />
  <issue id="2024-26833" tracker="cve" />
  <issue id="2022-48651" tracker="cve" />
  <issue id="2024-26881" tracker="cve" />
  <issue id="2024-26855" tracker="cve" />
  <issue id="2024-26857" tracker="cve" />
  <issue id="2024-26675" tracker="cve" />
  <issue id="2024-26843" tracker="cve" />
  <issue id="2024-26897" tracker="cve" />
  <issue id="2021-47200" tracker="cve" />
  <issue id="2024-26895" tracker="cve" />
  <issue id="2024-26817" tracker="cve" />
  <issue id="2022-48655" tracker="cve" />
  <issue id="2022-48658" tracker="cve" />
  <issue id="2024-26893" tracker="cve" />
  <issue id="2024-2201" tracker="cve" />
  <issue id="2021-47047" tracker="cve" />
  <issue id="2023-52616" tracker="cve" />
  <issue id="2024-26783" tracker="cve" />
  <issue id="2024-26816" tracker="cve" />
  <issue id="2021-47214" tracker="cve" />
  <issue id="2024-26656" tracker="cve" />
  <issue id="2023-6270" tracker="cve" />
  <issue id="2024-26898" tracker="cve" />
  <issue id="2024-26830" tracker="cve" />
  <issue id="2024-26882" tracker="cve" />
  <issue id="2023-52635" tracker="cve" />
  <issue id="2024-22099" tracker="cve" />
  <issue id="2024-26903" tracker="cve" />
  <issue id="2024-26883" tracker="cve" />
  <issue id="2024-26884" tracker="cve" />
  <issue id="2024-26885" tracker="cve" />
  <issue id="2023-52645" tracker="cve" />
  <issue id="2024-26866" tracker="cve" />
  <issue id="2024-26836" tracker="cve" />
  <issue id="2024-0841" tracker="cve" />
  <issue id="2024-26688" tracker="cve" />
  <issue id="2024-23850" tracker="cve" />
  <issue id="2024-26792" tracker="cve" />
  <issue id="2024-26733" tracker="cve" />
  <issue id="2021-47207" tracker="cve" />
  <issue id="2021-47211" tracker="cve" />
  <issue id="2021-47196" tracker="cve" />
  <issue id="2021-47187" tracker="cve" />
  <issue id="2021-47194" tracker="cve" />
  <issue id="2021-47205" tracker="cve" />
  <issue id="2021-47184" tracker="cve" />
  <issue id="2021-47201" tracker="cve" />
  <issue id="2021-47217" tracker="cve" />
  <issue id="2021-47204" tracker="cve" />
  <issue id="2021-47212" tracker="cve" />
  <issue id="2021-47199" tracker="cve" />
  <issue id="2021-47215" tracker="cve" />
  <issue id="2021-47197" tracker="cve" />
  <issue id="2021-47209" tracker="cve" />
  <issue id="2021-47216" tracker="cve" />
  <issue id="2021-47192" tracker="cve" />
  <issue id="2021-47203" tracker="cve" />
  <issue id="2021-47198" tracker="cve" />
  <issue id="2021-47193" tracker="cve" />
  <issue id="2021-47191" tracker="cve" />
  <issue id="2021-47219" tracker="cve" />
  <issue id="2021-47188" tracker="cve" />
  <issue id="2021-47218" tracker="cve" />
  <issue id="2021-47202" tracker="cve" />
  <issue id="2021-47185" tracker="cve" />
  <issue id="2021-47206" tracker="cve" />
  <issue id="2021-47210" tracker="cve" />
  <issue id="2023-52593" tracker="cve" />
  <issue id="2023-52589" tracker="cve" />
  <issue id="2024-26702" tracker="cve" />
  <issue id="2024-26610" tracker="cve" />
  <issue id="2024-26687" tracker="cve" />
  <issue id="2024-26601" tracker="cve" />
  <issue id="2024-26764" tracker="cve" />
  <issue id="2024-26773" tracker="cve" />
  <issue id="2023-52591" tracker="cve" />
  <issue id="2023-52590" tracker="cve" />
  <issue id="2021-47195" tracker="cve" />
  <issue id="2024-26766" tracker="cve" />
  <issue id="PED-7167" tracker="jsc" />
  <category>security</category>
  <rating>important</rating>
  <packager>olh</packager>
  <reboot_needed/>
  <description>
The SUSE Linux Enterprise 15 SP5 Azure kernel was updated to receive various security bugfixes.


The following security bugs were fixed:

- CVE-2024-27389: Fixed pstore inode handling with d_invalidate() (bsc#1223705).
- CVE-2024-27062: Fixed nouveau lock inside client object tree (bsc#1223834).
- CVE-2024-27056: Fixed wifi/iwlwifi/mvm to ensure offloading TID queue exists (bsc#1223822).
- CVE-2024-27046: Fixed nfp/flower handling acti_netdevs allocation failure (bsc#1223827).
- CVE-2024-27043: Fixed a use-after-free in edia/dvbdev in different places (bsc#1223824).
- CVE-2024-27042: Fixed drm/amdgpu for potential out-of-bounds access in amdgpu_discovery_reg_base_init() (bsc#1223823).
- CVE-2024-27041: Fixed drm/amd/display NULL checks for adev->dm.dc in amdgpu_dm_fini() (bsc#1223714).
- CVE-2024-27039: Fixed clk/hisilicon/hi3559a an erroneous devm_kfree() (bsc#1223821).
- CVE-2024-27038: Fixed clk_core_get NULL pointer dereference (bsc#1223816).
- CVE-2024-27030: Fixed octeontx2-af to use separate handlers for interrupts (bsc#1223790).
- CVE-2024-27014: Fixed net/mlx5e to prevent deadlock while disabling aRFS (bsc#1223735).
- CVE-2024-27013: Fixed tun limit printing rate when illegal packet received by tun device (bsc#1223745).
- CVE-2024-26993: Fixed fs/sysfs reference leak in sysfs_break_active_protection() (bsc#1223693).
- CVE-2024-26982: Fixed Squashfs inode number check not to be an invalid value of zero (bsc#1223634).
- CVE-2024-26970: Fixed clk/qcom/gcc-ipq6018 termination of frequency table arrays (bsc#1223644).
- CVE-2024-26969: Fixed clk/qcom/gcc-ipq8074 termination of frequency table arrays (bsc#1223645).
- CVE-2024-26966: Fixed clk/qcom/mmcc-apq8084 termination of frequency table arrays (bsc#1223646).
- CVE-2024-26965: Fixed clk/qcom/mmcc-msm8974 termination of frequency table arrays (bsc#1223648).
- CVE-2024-26960: Fixed mm/swap race between free_swap_and_cache() and swapoff() (bsc#1223655).
- CVE-2024-26951: Fixed wireguard/netlink check for dangling peer via is_dead instead of empty list (bsc#1223660).
- CVE-2024-26950: Fixed wireguard/netlink to access device through ctx instead of peer (bsc#1223661).
- CVE-2024-26948: Fixed drm/amd/display by adding dc_state NULL check in dc_state_release (bsc#1223664).
- CVE-2024-26939: Fixed drm/i915/vma UAF on destroy against retire race (bsc#1223679).
- CVE-2024-26927: Fixed ASoC/SOF bounds checking to firmware data Smatch (bsc#1223525).
- CVE-2024-26915: Fixed drm/amdgpu reset IH OVERFLOW_CLEAR bit (bsc#1223207).
- CVE-2024-26901: Fixed do_sys_name_to_handle() to use kzalloc() to prevent kernel-infoleak (bsc#1223198).
- CVE-2024-26898: Fixed aoe potential use-after-free problem in aoecmd_cfg_pkts (bsc#1223016).
- CVE-2024-26896: Fixed wifi/wfx memory leak when starting AP (bsc#1223042).
- CVE-2024-26893: Fixed firmware/arm_scmi for possible double free in SMC transport cleanup path (bsc#1223196).
- CVE-2024-26885: Fixed bpf DEVMAP_HASH overflow check on 32-bit arches (bsc#1223190).
- CVE-2024-26884: Fixed bpf hashtab overflow check on 32-bit arches (bsc#1223189).
- CVE-2024-26883: Fixed bpf stackmap overflow check on 32-bit arches (bsc#1223035).
- CVE-2024-26882: Fixed net/ip_tunnel to make sure to pull inner header in ip_tunnel_rcv() (bsc#1223034).
- CVE-2024-26881: Fixed net/hns3 kernel crash when 1588 is received on HIP08 devices (bsc#1223041).
- CVE-2024-26879: Fixed clk/meson by adding missing clocks to axg_clk_regmaps (bsc#1223066).
- CVE-2024-26878: Fixed quota for potential NULL pointer dereference (bsc#1223060).
- CVE-2024-26876: Fixed drm/bridge/adv7511 crash on irq during probe (bsc#1223119).
- CVE-2024-26866: Fixed spi/spi-fsl-lpspi by removing redundant spi_controller_put call (bsc#1223024).
- CVE-2024-26862: Fixed packet annotate data-races around ignore_outgoing (bsc#1223111).
- CVE-2024-26861: Fixed wireguard/receive annotate data-race around receiving_counter.counter (bsc#1223076).
- CVE-2024-26857: Fixed geneve to make sure to pull inner header in geneve_rx() (bsc#1223058).
- CVE-2024-26856: Fixed use-after-free inside sparx5_del_mact_entry (bsc#1223052).
- CVE-2024-26855: Fixed net/ice potential NULL pointer dereference in ice_bridge_setlink() (bsc#1223051).
- CVE-2024-26853: Fixed igc returning frame twice in XDP_REDIRECT (bsc#1223061).
- CVE-2024-26852: Fixed net/ipv6 to avoid possible UAF in ip6_route_mpath_notify() (bsc#1223057).
- CVE-2024-26840: Fixed a memory leak in cachefiles_add_cache() (bsc#1222976).
- CVE-2024-26836: Fixed platform/x86/think-lmi password opcode ordering for workstations (bsc#1222968).
- CVE-2024-26830: Fixed i40e to not allow untrusted VF to remove administratively set MAC (bsc#1223012).
- CVE-2024-26817: Fixed amdkfd to use calloc instead of kzalloc to avoid integer overflow (bsc#1222812).
- CVE-2024-26816: Fixed relocations in .notes section when building with CONFIG_XEN_PV=y by ignoring them (bsc#1222624).
- CVE-2024-26791: Fixed btrfs/dev-replace properly validate device names (bsc#1222793).
- CVE-2024-26783: Fixed mm/vmscan bug when calling wakeup_kswapd() with a wrong zone index (bsc#1222615).
- CVE-2024-26773: Fixed ext4 block allocation from corrupted group in ext4_mb_try_best_found() (bsc#1222618).
- CVE-2024-26772: Fixed ext4 to avoid allocating blocks from corrupted group in ext4_mb_find_by_goal() (bsc#1222613).
- CVE-2024-26766: Fixed SDMA off-by-one error in _pad_sdma_tx_descs() (bsc#1222726).
- CVE-2024-26764: Fixed IOCB_AIO_RW check in fs/aio before the struct aio_kiocb conversion (bsc#1222721).
- CVE-2024-26733: Fixed an overflow in arp_req_get() in arp (bsc#1222585).
- CVE-2024-26700: Fixed drm/amd/display MST Null pointer dereference  for RV (bsc#1222870).
- CVE-2024-26687: Fixed xen/events close evtchn after mapping cleanup (bsc#1222435).
- CVE-2024-26679: Fixed inet read sk->sk_family once in inet_recv_error() (bsc#1222385).
- CVE-2024-26675: Fixed ppp_async to limit MRU to 64K (bsc#1222379).
- CVE-2024-26673: Fixed netfilter/nft_ct layer 3 and 4 protocol sanitization (bsc#1222368).
- CVE-2024-26671: Fixed blk-mq IO hang from sbitmap wakeup race (bsc#1222357).
- CVE-2024-26656: Fixed drm/amdgpu use-after-free bug (bsc#1222307).
- CVE-2024-26610: Fixed memory corruption in wifi/iwlwifi (bsc#1221299).
- CVE-2024-26601: Fixed ext4 buddy bitmap corruption via fast commit replay (bsc#1220342).
- CVE-2024-23850: Fixed double free of anonymous device after snapshot  creation failure (bsc#1219126).
- CVE-2024-23848: Fixed media/cec for possible use-after-free in cec_queue_msg_fh (bsc#1219104).
- CVE-2024-23307: Fixed Integer Overflow or Wraparound vulnerability in x86 and ARM md, raid, raid5 modules (bsc#1219169).
- CVE-2024-22099: Fixed a null-pointer-dereference in rfcomm_check_security (bsc#1219170).
- CVE-2024-2201: Fixed information leak in x86/BHI (bsc#1217339).
- CVE-2024-0841: Fixed a null pointer dereference in the hugetlbfs_fill_super function in hugetlbfs (HugeTLB pages) functionality (bsc#1219264).
- CVE-2024-0639: Fixed a denial-of-service vulnerability due to a deadlock found in sctp_auto_asconf_init in net/sctp/socket.c (bsc#1218917).
- CVE-2023-6270: Fixed a use-after-free issue in aoecmd_cfg_pkts (bsc#1218562).
- CVE-2023-52652: Fixed NTB for possible name leak in ntb_register_device() (bsc#1223686).
- CVE-2023-52645: Fixed pmdomain/mediatek race conditions with genpd (bsc#1223033).
- CVE-2023-52635: Fixed PM/devfreq to synchronize devfreq_monitor_[start/stop] (bsc#1222294).
- CVE-2023-52620: Fixed netfilter/nf_tables to disallow timeout for anonymous sets never used from userspace (bsc#1221825).
- CVE-2023-52616: Fixed unexpected pointer access in crypto/lib/mpi in mpi_ec_init (bsc#1221612).
- CVE-2023-52614: Fixed PM/devfreq buffer overflow in trans_stat_show (bsc#1221617).
- CVE-2023-52593: Fixed wifi/wfx possible NULL pointer dereference in wfx_set_mfp_ap() (bsc#1221042).
- CVE-2023-52591: Fixed a possible reiserfs filesystem corruption via directory renaming (bsc#1221044).
- CVE-2023-52590: Fixed a possible ocfs2 filesystem corruption via directory renaming (bsc#1221088).
- CVE-2023-52589: Fixed media/rkisp1 IRQ disable race issue (bsc#1221084).
- CVE-2023-52585: Fixed drm/amdgpu for possible NULL pointer dereference in amdgpu_ras_query_error_status_helper() (bsc#1221080).
- CVE-2022-48662: Fixed a general protection fault (GPF) in i915_perf_open_ioctl (bsc#1223505).
- CVE-2022-48659: Fixed mm/slub to return errno if kmalloc() fails (bsc#1223498).
- CVE-2022-48658: Fixed mm/slub to avoid a problem in flush_cpu_slab()/__free_slab() task context (bsc#1223496).
- CVE-2022-48651: Fixed an out-of-bound bug in ipvlan caused by unset skb->mac_header (bsc#1223513).
- CVE-2022-48642: Fixed netfilter/nf_tables percpu memory leak at nf_tables_addchain() (bsc#1223478).
- CVE-2022-48640: Fixed bonding for possible NULL pointer dereference in bond_rr_gen_slave_id (bsc#1223499).
- CVE-2022-48631: Fixed a bug in ext4, when parsing extents where eh_entries == 0 and eh_depth > 0 (bsc#1223475).
- CVE-2021-47214: Fixed hugetlb/userfaultfd during restore reservation in hugetlb_mcopy_atomic_pte() (bsc#1222710).
- CVE-2021-47211: Fixed a null pointer dereference on pointer cs_desc in usb-audio (bsc#1222869).
- CVE-2021-47207: Fixed a null pointer dereference on pointer block in gus (bsc#1222790).
- CVE-2021-47205: Unregistered clocks/resets when unbinding in sunxi-ng (bsc#1222888).
- CVE-2021-47202: Fixed NULL pointer dereferences in of_thermal_ functions (bsc#1222878)
- CVE-2021-47200: Fixed drm/prime for possible use-after-free in mmap within drm_gem_ttm_mmap() and drm_gem_ttm_mmap() (bsc#1222838).
- CVE-2021-47195: Fixed use-after-free inside SPI via add_lock mutex (bsc#1222832).
- CVE-2021-47185: Fixed a softlockup issue in flush_to_ldisc in tty tty_buffer (bsc#1222669).
- CVE-2021-47184: Fixed NULL pointer dereference on VSI filter sync (bsc#1222666).

The following non-security bugs were fixed:

- ALSA: firewire-lib: handle quirk to calculate payload quadlets as data block counter (stable-fixes).
- ALSA: hda/realtek - Enable audio jacks of Haier Boyue G42 with ALC269VC (stable-fixes).
- ALSA: hda/realtek - Fix inactive headset mic jack (stable-fixes).
- ALSA: hda/realtek: Add quirk for HP SnowWhite laptops (stable-fixes).
- ALSA: hda/realtek: Fix mute led of HP Laptop 15-da3001TU (stable-fixes).
- ALSA: hda: intel-sdw-acpi: fix usage of device_get_named_child_node() (git-fixes).
- ALSA: scarlett2: Add Focusrite Clarett 2Pre and 4Pre USB support (stable-fixes).
- ALSA: scarlett2: Add Focusrite Clarett+ 2Pre and 4Pre support (stable-fixes).
- ALSA: scarlett2: Add correct product series name to messages (stable-fixes).
- ALSA: scarlett2: Add support for Clarett 8Pre USB (stable-fixes).
- ALSA: scarlett2: Default mixer driver to enabled (stable-fixes).
- ALSA: scarlett2: Move USB IDs out from device_info struct (stable-fixes).
- ASoC: meson: axg-card: make links nonatomic (git-fixes).
- ASoC: meson: axg-tdm-interface: manage formatters in trigger (git-fixes).
- ASoC: meson: cards: select SND_DYNAMIC_MINORS (git-fixes).
- ASoC: soc-core.c: Skip dummy codec when adding platforms (stable-fixes).
- ASoC: tegra: Fix DSPK 16-bit playback (git-fixes).
- ASoC: ti: davinci-mcasp: Fix race condition during probe (git-fixes).
- Bluetooth: Add new quirk for broken read key length on ATS2851 (git-fixes).
- Bluetooth: Fix TOCTOU in HCI debugfs implementation (git-fixes).
- Bluetooth: Fix memory leak in hci_req_sync_complete() (git-fixes).
- Bluetooth: Fix type of len in {l2cap,sco}_sock_getsockopt_old() (stable-fixes).
- Bluetooth: L2CAP: Fix not validating setsockopt user input (git-fixes).
- Bluetooth: RFCOMM: Fix not validating setsockopt user input (git-fixes).
- Bluetooth: SCO: Fix not validating setsockopt user input (git-fixes).
- Bluetooth: add quirk for broken address properties (git-fixes).
- Bluetooth: btintel: Fix null ptr deref in btintel_read_version (stable-fixes).
- Bluetooth: btintel: Fixe build regression (git-fixes).
- Bluetooth: btusb: Add Realtek RTL8852BE support ID 0x0bda:0x4853 (stable-fixes).
- Bluetooth: hci_event: Fix sending HCI_OP_READ_ENC_KEY_SIZE (git-fixes).
- Bluetooth: hci_event: set the conn encrypted before conn establishes (stable-fixes).
- Bluetooth: hci_sock: Fix not validating setsockopt user input (git-fixes).
- Bluetooth: qca: fix NULL-deref on non-serdev suspend (git-fixes).
- Documentation: Add missing documentation for EXPORT_OP flags (stable-fixes).
- HID: intel-ish-hid: ipc: Fix dev_err usage with uninitialized dev->devc (git-fixes).
- HID: logitech-dj: allow mice to use all types of reports (git-fixes).
- HID: uhid: Use READ_ONCE()/WRITE_ONCE() for ->running (stable-fixes).
- Input: allocate keycode for Display refresh rate toggle (stable-fixes).
- Input: synaptics-rmi4 - fail probing if memory allocation for "phys" fails (stable-fixes).
- NFC: trf7970a: disable all regulators on removal (git-fixes).
- PCI: rpaphp: Error out on busy status from get-sensor-state (bsc#1223369 ltc#205888).
- RDMA/cm: Print the old state when cm_destroy_id gets timeout (git-fixes).
- Reapply "drm/qxl: simplify qxl_fence_wait" (stable-fixes).
- Revert "ACPI: PM: Block ASUS B1400CEAE from suspend to idle by default" (stable-fixes).
- Revert "drm/qxl: simplify qxl_fence_wait" (git-fixes).
- Revert "ice: Fix ice VF reset during iavf initialization (jsc#PED-376)." (bsc#1223275)
- Revert "usb: cdc-wdm: close race between read and workqueue" (git-fixes).
- Revert "usb: phy: generic: Get the vbus supply" (git-fixes).
- USB: UAS: return ENODEV when submit urbs fail with device not attached (stable-fixes).
- USB: core: Add hub_get() and hub_put() routines (git-fixes).
- USB: core: Fix access violation during port device removal (git-fixes).
- USB: core: Fix deadlock in port "disable" sysfs attribute (git-fixes).
- USB: serial: add device ID for VeriFone adapter (stable-fixes).
- USB: serial: cp210x: add ID for MGP Instruments PDS100 (stable-fixes).
- USB: serial: cp210x: add pid/vid for TDK NC0110013M and MM0110113M (stable-fixes).
- USB: serial: ftdi_sio: add support for GMC Z216C Adapter IR-USB (stable-fixes).
- USB: serial: option: add Fibocom FM135-GL variants (stable-fixes).
- USB: serial: option: add Lonsung U8300/U9300 product (stable-fixes).
- USB: serial: option: add MeiG Smart SLM320 product (stable-fixes).
- USB: serial: option: add Rolling RW101-GL and RW135-GL support (stable-fixes).
- USB: serial: option: add Telit FN920C04 rmnet compositions (stable-fixes).
- USB: serial: option: add support for Fibocom FM650/FG650 (stable-fixes).
- USB: serial: option: support Quectel EM060K sub-models (stable-fixes).
- nfsd: Fixed mount kerberized nfs4 share issue (git-fixes bsc#1223858).
- s390: Fixed kernel backtrack (bsc#1141539 git-fixes).
- nfsd: Fixed mount issue with KOTD (bsc#1223380 bsc#1217408 bsc#1223640).
- s390: Fixed LPM of lpar failure with error HSCLA2CF in 19th loops (jsc#PED-542 git-fixes bsc#1213573 ltc#203238).
- ahci: asm1064: asm1166: do not limit reported ports (git-fixes).
- ahci: asm1064: correct count of reported ports (stable-fixes).
- arm64: dts: imx8-ss-conn: fix usdhc wrong lpcg clock order (git-fixes)
- arm64: dts: rockchip: Remove unsupported node from the Pinebook Pro (git-fixes)
- arm64: dts: rockchip: enable internal pull-up for Q7_THRM# on RK3399 (git-fixes)
- arm64: dts: rockchip: enable internal pull-up on PCIE_WAKE# for (git-fixes)
- arm64: dts: rockchip: enable internal pull-up on Q7_USB_ID for RK3399 (git-fixes)
- arm64: dts: rockchip: fix rk3328 hdmi ports node (git-fixes)
- arm64: dts: rockchip: fix rk3399 hdmi ports node (git-fixes)
- arm64: hibernate: Fix level3 translation fault in swsusp_save() (git-fixes).
- ax25: fix use-after-free bugs caused by ax25_ds_del_timer (git-fixes).
- batman-adv: Avoid infinite loop trying to resize local TT (git-fixes).
- clk: Get runtime PM before walking tree during disable_unused (git-fixes).
- clk: Initialize struct clk_core kref earlier (stable-fixes).
- clk: Mark 'all_lists' as const (stable-fixes).
- clk: Print an info line before disabling unused clocks (stable-fixes).
- clk: Remove prepare_lock hold assertion in __clk_release() (git-fixes).
- clk: remove extra empty line (stable-fixes).
- comedi: vmk80xx: fix incomplete endpoint checking (git-fixes).
- dma: xilinx_dpdma: Fix locking (git-fixes).
- dmaengine: idxd: Fix oops during rmmod on single-CPU platforms (git-fixes).
- dmaengine: owl: fix register access functions (git-fixes).
- dmaengine: tegra186: Fix residual calculation (git-fixes).
- docs: Document the FAN_FS_ERROR event (stable-fixes).
- drm-print: add drm_dbg_driver to improve namespace symmetry (stable-fixes).
- drm/amd/display: Do not recursively call manual trigger programming (stable-fixes).
- drm/amd/display: Fix nanosec stat overflow (stable-fixes).
- drm/amd/display: fix disable otg wa logic in DCN316 (stable-fixes).
- drm/amd/pm: fixes a random hang in S4 for SMU v13.0.4/11 (stable-fixes).
- drm/amdgpu/sdma5.2: use legacy HDP flush for SDMA2/3 (stable-fixes).
- drm/amdgpu: Fix leak when GPU memory allocation fails (stable-fixes).
- drm/amdgpu: Reset dGPU if suspend got aborted (stable-fixes).
- drm/amdgpu: always force full reset for SOC21 (stable-fixes).
- drm/amdgpu: fix incorrect active rb bitmap for gfx11 (stable-fixes).
- drm/amdgpu: fix incorrect number of active RBs for gfx11 (stable-fixes).
- drm/amdgpu: once more fix the call oder in amdgpu_ttm_move() v2 (git-fixes).
- drm/amdgpu: validate the parameters of bo mapping operations more clearly (git-fixes).
- drm/amdkfd: Reset GPU on queue preemption failure (stable-fixes).
- drm/ast: Fix soft lockup (git-fixes).
- drm/client: Fully protect modes[] with dev->mode_config.mutex (stable-fixes).
- drm/i915/cdclk: Fix CDCLK programming order when pipes are active (git-fixes).
- drm/i915/vrr: Disable VRR when using bigjoiner (stable-fixes).
- drm/i915: Disable port sync when bigjoiner is used (stable-fixes).
- drm/msm/dp: fix typo in dp_display_handle_port_status_changed() (git-fixes).
- drm/nouveau/nvkm: add a replacement for nvkm_notify (bsc#1223834)
- drm/panel: ili9341: Respect deferred probe (git-fixes).
- drm/panel: ili9341: Use predefined error codes (git-fixes).
- drm/panel: visionox-rm69299: do not unregister DSI device (git-fixes).
- drm/vc4: do not check if plane->state->fb == state->fb (stable-fixes).
- drm/vmwgfx: Enable DMA mappings with SEV (git-fixes).
- drm/vmwgfx: Fix crtc's atomic check conditional (git-fixes).
- drm/vmwgfx: Fix invalid reads in fence signaled events (git-fixes).
- drm/vmwgfx: Sort primary plane formats by order of preference (git-fixes).
- drm: nv04: Fix out of bounds access (git-fixes).
- drm: panel-orientation-quirks: Add quirk for GPD Win Mini (stable-fixes).
- drm: panel-orientation-quirks: Add quirk for Lenovo Legion Go (stable-fixes).
- dump_stack: Do not get cpu_sync for panic CPU (bsc#1223574).
- fbdev: fix incorrect address computation in deferred IO (git-fixes).
- fbdev: viafb: fix typo in hw_bitblt_1 and hw_bitblt_2 (stable-fixes).
- fbmon: prevent division by zero in fb_videomode_from_videomode() (stable-fixes).
- fuse: do not unhash root (bsc#1223951).
- fuse: fix root lookup with nonzero generation (bsc#1223950).
- hwmon: (amc6821) add of_match table (stable-fixes).
- i2c: pxa: hide unused icr_bits[] variable (git-fixes).
- i2c: smbus: fix NULL function pointer dereference (git-fixes).
- i40e: Fix VF MAC filter removal (git-fixes).
- idma64: Do not try to serve interrupts when device is powered off (git-fixes).
- iio: accel: mxc4005: Interrupt handling fixes (git-fixes).
- iio:imu: adis16475: Fix sync mode setting (git-fixes).
- init/main.c: Fix potential static_command_line memory overflow (git-fixes).
- ipv6/addrconf: fix a potential refcount underflow for idev (git-fixes).
- irqchip/gic-v3-its: Prevent double free on error (git-fixes).
- kprobes: Fix possible use-after-free issue on kprobe registration (git-fixes).
- livepatch: Fix missing newline character in klp_resolve_symbols() (bsc#1223539).
- media: cec: core: remove length check of Timer Status (stable-fixes).
- media: sta2x11: fix irq handler cast (stable-fixes).
- mei: me: add arrow lake point H DID (stable-fixes).
- mei: me: add arrow lake point S DID (stable-fixes).
- mei: me: disable RPL-S on SPS and IGN firmwares (git-fixes).
- mm/vmscan: make sure wakeup_kswapd with managed zone (bsc#1223473).
- mmc: sdhci-msm: pervent access to suspended controller (git-fixes).
- mtd: diskonchip: work around ubsan link failure (stable-fixes).
- net: bridge: vlan: fix memory leak in __allowed_ingress (git-fixes).
- net: fix a memleak when uncloning an skb dst and its metadata (git-fixes).
- net: fix skb leak in __skb_tstamp_tx() (git-fixes).
- net: ipv6: ensure we call ipv6_mc_down() at most once (git-fixes).
- net: mld: fix reference count leak in mld_{query | report}_work() (git-fixes).
- net: stream: purge sk_error_queue in sk_stream_kill_queues() (git-fixes).
- net: usb: ax88179_178a: avoid writing the mac address before first reading (git-fixes).
- net: usb: ax88179_178a: stop lying about skb->truesize (git-fixes).
- net: vlan: fix underflow for the real_dev refcnt (git-fixes).
- net: vmxnet3: Fix NULL pointer dereference in vmxnet3_rq_rx_complete() (bsc#1223360).
- netfilter: br_netfilter: Drop dst references before setting (git-fixes).
- netfilter: ipt_CLUSTERIP: fix refcount leak in clusterip_tg_check() (git-fixes).
- netfilter: nft_ct: fix l3num expectations with inet pseudo family (git-fixes).
- nfsd: use __fput_sync() to avoid delayed closing of files (bsc#1223380 bsc#1217408).
- nilfs2: fix OOB in nilfs_set_de_type (git-fixes).
- nilfs2: fix OOB in nilfs_set_de_type (git-fixes).
- nouveau: fix function cast warning (git-fixes).
- nouveau: fix instmem race condition around ptr stores (git-fixes).
- phy: tegra: xusb: Add API to retrieve the port number of phy (stable-fixes).
- pinctrl: renesas: checker: Limit cfg reg enum checks to provided IDs (stable-fixes).
- platform/x86: intel-vbtn: Update tablet mode switch at end of probe (git-fixes).
- platform/x86: touchscreen_dmi: Add an extra entry for a variant of the Chuwi Vi8 tablet (stable-fixes).
- powerpc/kasan: Do not instrument non-maskable or raw interrupts (bsc#1223191).
- powerpc/rtas: define pr_fmt and convert printk call sites (bsc#1223369 ltc#205888).
- powerpc/rtas: export rtas_error_rc() for reuse (bsc#1223369 ltc#205888).
- powerpc: Avoid nmi_enter/nmi_exit in real mode interrupt (bsc#1221645 ltc#205739 bsc#1223191).
- powerpc: Refactor verification of MSR_RI (bsc#1223191).
- printk: Add this_cpu_in_panic() (bsc#1223574).
- printk: Adjust mapping for 32bit seq macros (bsc#1223574).
- printk: Avoid non-panic CPUs writing to ringbuffer (bsc#1223574).
- printk: Disable passing console lock owner completely during panic() (bsc#1223574).
- printk: Drop console_sem during panic (bsc#1223574).
- printk: Rename abandon_console_lock_in_panic() to other_cpu_in_panic() (bsc#1223574).
- printk: Use prb_first_seq() as base for 32bit seq macros (bsc#1223574).
- printk: Wait for all reserved records with pr_flush() (bsc#1223574).
- printk: nbcon: Relocate 32bit seq macros (bsc#1223574).
- printk: ringbuffer: Clarify special lpos values (bsc#1223574).
- printk: ringbuffer: Cleanup reader terminology (bsc#1223574).
- printk: ringbuffer: Do not skip non-finalized records with prb_next_seq() (bsc#1223574).
- printk: ringbuffer: Improve prb_next_seq() performance (bsc#1223574).
- printk: ringbuffer: Skip non-finalized records in panic (bsc#1223574).
- pstore/zone: Add a null pointer check to the psz_kmsg_read (stable-fixes).
- ring-buffer: Only update pages_touched when a new page is touched (git-fixes).
- ring-buffer: use READ_ONCE() to read cpu_buffer->commit_page in concurrent environment (git-fixes).
- s390/cio: Ensure the copied buf is NUL terminated (git-fixes bsc#1223875).
- s390/decompressor: fix misaligned symbol build error (git-fixes bsc#1223785).
- s390/mm: Fix clearing storage keys for huge pages (git-fixes bsc#1223877).
- s390/mm: Fix storage key clearing for guest huge pages (git-fixes bsc#1223878).
- s390/qeth: Fix kernel panic after setting hsuid (git-fixes bsc#1223879).
- s390/scm: fix virtual vs physical address confusion (git-fixes bsc#1223784).
- s390/vdso: Add CFI for RA register to asm macro vdso_func (git-fixes bsc#1223876).
- s390/vdso: drop '-fPIC' from LDFLAGS (git-fixes bsc#1223598).
- s390/zcrypt: fix reference counting on zcrypt card objects (git-fixes bsc#1223595).
- serial/pmac_zilog: Remove flawed mitigation for rx irq flood (git-fixes).
- serial: core: Provide port lock wrappers (stable-fixes).
- serial: core: fix kernel-doc for uart_port_unlock_irqrestore() (git-fixes).
- serial: mxs-auart: add spinlock around changing cts state (git-fixes).
- slimbus: qcom-ngd-ctrl: Add timeout for wait operation (git-fixes).
- speakup: Avoid crash on very long word (git-fixes).
- speakup: Fix 8bit characters from direct synth (git-fixes).
- spi: hisi-kunpeng: Delete the dump interface of data registers in debugfs (git-fixes).
- tcp/udp: Fix memleaks of sk and zerocopy skbs with TX timestamp (git-fixes).
- thunderbolt: Avoid notify PM core about runtime PM resume (stable-fixes).
- thunderbolt: Fix wake configurations after device unplug (stable-fixes).
- tracing/net_sched: Fix tracepoints that save qdisc_dev() as a string (git-fixes).
- tracing: Show size of requested perf buffer (git-fixes).
- usb: Disable USB3 LPM at shutdown (stable-fixes).
- usb: Fix regression caused by invalid ep0 maxpacket in virtual SuperSpeed device (git-fixes).
- usb: dwc2: host: Fix dereference issue in DDMA completion flow (git-fixes).
- usb: dwc3: core: Prevent phy suspend during init (Git-fixes).
- usb: gadget: composite: fix OS descriptors w_value logic (git-fixes).
- usb: gadget: f_fs: Fix a race condition when processing setup packets (git-fixes).
- usb: gadget: f_ncm: Fix UAF ncm object at re-bind after usb ep transport error (stable-fixes).
- usb: gadget: tegra-xudc: Fix USB3 PHY retrieval logic (git-fixes).
- usb: ohci: Prevent missed ohci interrupts (git-fixes).
- usb: sl811-hcd: only defined function checkdone if QUIRK2 is defined (stable-fixes).
- usb: typec: tcpci: add generic tcpci fallback compatible (stable-fixes).
- usb: typec: tcpm: Check for port partner validity before consuming it (git-fixes).
- usb: typec: tcpm: unregister existing source caps before re-registration (bsc#1220569).
- usb: typec: ucsi: Ack unsupported commands (stable-fixes).
- usb: typec: ucsi: Clear UCSI_CCI_RESET_COMPLETE before reset (stable-fixes).
- usb: typec: ucsi: Fix connector check on init (git-fixes).
- usb: udc: remove warning when queue disabled ep (stable-fixes).
- virtio: treat alloc_dax() -EOPNOTSUPP failure as non-fatal (bsc#1223949).
- wifi: ath9k: fix LNA selection in ath_ant_try_scan() (stable-fixes).
- wifi: iwlwifi: mvm: remove old PASN station when adding a new one (git-fixes).
- wifi: iwlwifi: mvm: return uid from iwl_mvm_build_scan_cmd (git-fixes).
- wifi: mac80211: check/clear fast rx for non-4addr sta VLAN changes (stable-fixes).
- wifi: nl80211: do not free NULL coalescing rule (git-fixes).
- x86/bugs: Cache the value of MSR_IA32_ARCH_CAPABILITIES (git-fixes).
- x86/bugs: Fix BHI documentation (git-fixes).
- x86/bugs: Fix BHI handling of RRSBA (git-fixes).
- x86/bugs: Fix BHI retpoline check (git-fixes).
- x86/bugs: Fix return type of spectre_bhi_state() (git-fixes).
- x86/bugs: Rename various 'ia32_cap' variables to 'x86_arch_cap_msr' (git-fixes).
- x86/cpufeatures: Fix dependencies for GFNI, VAES, and VPCLMULQDQ (git-fixes).
- x86/mm: Ensure input to pfn_to_kaddr() is treated as a 64-bit type (jsc#PED-7167 git-fixes).
- x86/sev: Skip ROM range scans and validation for SEV-SNP guests (jsc#PED-7167 git-fixes).
- xfrm6: fix inet6_dev refcount underflow problem (git-fixes).
</description>
<summary>Security update for the Linux Kernel</summary>
</patchinfo>
openSUSE Build Service is sponsored by