File _patchinfo of Package patchinfo.35140

<patchinfo incident="35140">
  <issue id="1156395" tracker="bnc">[TRACKERBUG] 5.3 powerpc base kernel fixes</issue>
  <issue id="1190336" tracker="bnc">[Huawei][aarch64] Update hns3 and infiniband/hns drivers</issue>
  <issue id="1191958" tracker="bnc">VUL-0: CVE-2021-43389: kernel-source,kernel-source-azure,kernel-source-rt: an array-index-out-bounds in detach_capi_ctr in drivers/isdn/capi/kcapi.c</issue>
  <issue id="1193454" tracker="bnc">Partner-L3: SLES15 SP4: Hardlockups observed while doing smt=off or offlining cores.[Denali][P10][2TB/240c]</issue>
  <issue id="1193554" tracker="bnc">NV60100M - NVMe/TCP  - ENET port disable/enable - paths do not return</issue>
  <issue id="1193787" tracker="bnc">[DELL EMC SLES15 SP3 BUG] System got Crashed and rebooted when tried to connect with more(4 to 6) NVME Over TCP initiators.</issue>
  <issue id="1193883" tracker="bnc">VUL-0: kernel-source-rt, kernel-source-azure, kernel-source: kernel memory leak in BPF</issue>
  <issue id="1194324" tracker="bnc">ISST-LTE: SLES15Sp4 Beta1 [ Rainier ] [ P10 ] [ 5.14.19-150400.1]: HPT: ramlp53 :  LPAR crashed @xs_sock_getport while running LTP tests using SLS.</issue>
  <issue id="1194826" tracker="bnc">VUL-1: CVE-2022-0264: kernel-source-rt, kernel-source, kernel-source-azure: address leakage in BPF atomic fetch</issue>
  <issue id="1194869" tracker="bnc">[TRACKERBUG] 5.14 powerpc base kernel fixes</issue>
  <issue id="1195065" tracker="bnc">VUL-0: CVE-2022-22942: kernel-source: Vulnerability in the vmwgfx driver</issue>
  <issue id="1195254" tracker="bnc">VUL-0: CVE-2022-0435: kernel-source: tipc: Remote Stack Overflow in Linux Kernel</issue>
  <issue id="1195341" tracker="bnc">ceph: properly put ceph_string reference after async create attempt</issue>
  <issue id="1195349" tracker="bnc">Oops at dynamic unbind of HD-audio device with LED cdevs</issue>
  <issue id="1195357" tracker="bnc">watchdog: BUG: soft lockup - CPU#33 stuck for 26s! [kcompactd0:479]</issue>
  <issue id="1195668" tracker="bnc">SLES15SP4 - [Regression] dlpar remove operation hangs with ibmvnic call traces. ( P10/ ibmvnic/Denali)</issue>
  <issue id="1195927" tracker="bnc">SLES 15 SP4 - s390/cio: verify the driver availability for path_event call</issue>
  <issue id="1195957" tracker="bnc">[Build 97.1] openQA test fails in RD5a - NFS server must convert incoming offsets</issue>
  <issue id="1196018" tracker="bnc">VUL-0: CVE-2022-28748: kernel-source: malicious hardware can cause a leak of kernel memory over the network by ax88179_178a devices</issue>
  <issue id="1196746" tracker="bnc">Call observed while deleting e3-fcoe interface.</issue>
  <issue id="1196823" tracker="bnc">VUL-0:  CVE-2022-0854: kernel-source: swiotlb: fix info leak with DMA_FROM_DEVICE</issue>
  <issue id="1197146" tracker="bnc">[SLES 15 SP4] - System crash observed when 'nvme connect-all' is issued on a NVMe TCP volume under stress</issue>
  <issue id="1197246" tracker="bnc">VUL-0: CVE-2022-0995: kernel: kernel bug in the watch_queue subsystem</issue>
  <issue id="1197762" tracker="bnc">Install fails on HP Z2 G9 Workstation (Alder Lake)</issue>
  <issue id="1197915" tracker="bnc">btrfs: backport, from upstream, several fsync related performance patches and bug fixes</issue>
  <issue id="1198014" tracker="bnc">[PATCH] iocost: Fix divide-by-zero on donation from low hweight  cgroup</issue>
  <issue id="1199295" tracker="bnc">kernel hang in Azure during file system test</issue>
  <issue id="1202346" tracker="bnc">VUL-0: CVE-2022-20368: kernel: slab-out-of-bounds access in packet_recvmsg()</issue>
  <issue id="1202686" tracker="bnc">VUL-0: CVE-2022-2964: kernel: memory corruption in AX88179_178A based USB ethernet device.</issue>
  <issue id="1202767" tracker="bnc">[PATCH] ext4: fix error handling in ext4_fc_record_modified_inode()</issue>
  <issue id="1202780" tracker="bnc">[PATCH] block: Fix wrong offset in bio_truncate()</issue>
  <issue id="1209636" tracker="bnc">VUL-0: CVE-2023-1582: kernel: Soft lockup occurred during __page_mapcount</issue>
  <issue id="1213123" tracker="bnc">VUL-0: CVE-2023-37453: kernel: out-of-bounds and crash in read_descriptors in drivers/usb/core/sysfs.c.</issue>
  <issue id="1215587" tracker="bnc">Partner-L3: SLES 15 SP4 QLogic Driver Causes NIC Failure</issue>
  <issue id="1216834" tracker="bnc">L3: System crashing intermittent with OCFS2</issue>
  <issue id="1218820" tracker="bnc">L3-Question: vmware esxi8 uefi secure boot blacklist: Problem with revocation key (-74)</issue>
  <issue id="1220185" tracker="bnc">VUL-0: CVE-2024-26583: kernel: tls: fix race between async notify and socket close</issue>
  <issue id="1220186" tracker="bnc">VUL-0: CVE-2024-26584: kernel: net: tls: handle backlogging of crypto requests</issue>
  <issue id="1220187" tracker="bnc">VUL-0: CVE-2024-26585: kernel-source,kernel-source-azure,kernel-source-rt: tls: race condition between tx work scheduling and socket close</issue>
  <issue id="1221044" tracker="bnc">VUL-0: CVE-2023-52591: kernel: reiserfs: potential filesystem corruption on directory rename</issue>
  <issue id="1222011" tracker="bnc">[Regression] SLES15SP6:[6.4.0-150600.9] LPAR reboot crashes the kernel after PCI injection (everest/1060_023/shinner)</issue>
  <issue id="1222728" tracker="bnc">VUL-0: CVE-2024-26800: kernel: tls: use-after-free on failed backlog decryption</issue>
  <issue id="1222809" tracker="bnc">VUL-0: CVE-2024-26813: kernel: vfio/platform: NULL pointer dereference</issue>
  <issue id="1222810" tracker="bnc">VUL-0: CVE-2024-26814: kernel: vfio/fsl-mc: Block calling interrupt handler without trigger</issue>
  <issue id="1223635" tracker="bnc">VUL-0: CVE-2024-26976: kernel: KVM: Always flush async #PF workqueue when vCPU is being destroyed</issue>
  <issue id="1223863" tracker="bnc">L3: Process accessing NFS enters Uninterruptible sleep state</issue>
  <issue id="1224488" tracker="bnc">VUL-0: CVE-2024-35905: kernel: bpf: Protect against int overflow for stack access size</issue>
  <issue id="1224495" tracker="bnc">VUL-0: CVE-2024-35901: kernel: net: mana: Fix Rx DMA datasize and skb_over_panic</issue>
  <issue id="1224671" tracker="bnc">VUL-0: CVE-2024-35878: kernel: of: module: prevent NULL pointer dereference in vsnprintf()</issue>
  <issue id="1225573" tracker="bnc">VUL-0: CVE-2023-52762: kernel: virtio-blk: fix implicit overflow on virtio_max_dma_size</issue>
  <issue id="1225829" tracker="bnc">VUL-0: CVE-2024-36926: kernel: powerpc/pseries/iommu: LPAR panics during boot up with a frozen PE</issue>
  <issue id="1226168" tracker="bnc">fstests btrfs/296 fails on btrfs</issue>
  <issue id="1226226" tracker="bnc">Backport request for commit b6a1f9a, "avoid infinite loop in pnfs_update_layout"</issue>
  <issue id="1226519" tracker="bnc">VUL-0: CVE-2024-36974: kernel: net/sched: taprio: always validate TCA_TAPRIO_ATTR_PRIOMAP</issue>
  <issue id="1226537" tracker="bnc">VUL-0: CVE-2021-47576: kernel: scsi: scsi_debug: sanity check block descriptor length in resp_mode_select()</issue>
  <issue id="1226539" tracker="bnc">VUL-0: CVE-2021-47578: kernel: scsi: scsi_debug: don't call kcalloc() if size arg is zero</issue>
  <issue id="1226550" tracker="bnc">VUL-0: CVE-2021-47580: kernel: scsi: scsi_debug: Fix type in min_t to avoid stack OOB</issue>
  <issue id="1226553" tracker="bnc">VUL-0: CVE-2021-47597: kernel: inet_diag: fix kernel-infoleak for UDP sockets</issue>
  <issue id="1226554" tracker="bnc">VUL-0: CVE-2021-47602: kernel: mac80211: track only QoS data frames for admission control</issue>
  <issue id="1226556" tracker="bnc">VUL-0: CVE-2021-47585: kernel: btrfs: fix memory leak in __add_inode_ref()</issue>
  <issue id="1226557" tracker="bnc">VUL-0: CVE-2021-47589: kernel: igbvf: fix double free in `igbvf_probe`</issue>
  <issue id="1226558" tracker="bnc">VUL-0: CVE-2021-47596: kernel: net: hns3: fix use-after-free bug in hclgevf_send_mbx_msg</issue>
  <issue id="1226559" tracker="bnc">VUL-0: CVE-2021-47582: kernel: USB: core: Make do_proc_control() and do_proc_bulk() killable</issue>
  <issue id="1226561" tracker="bnc">VUL-0: CVE-2021-47586: kernel: net: stmmac: dwmac-rk: fix oob read in rk_gmac_setup</issue>
  <issue id="1226562" tracker="bnc">VUL-0: CVE-2021-47609: kernel: firmware: arm_scpi: Fix string overflow in SCPI genpd driver</issue>
  <issue id="1226563" tracker="bnc">VUL-0: CVE-2021-47583: kernel: media: mxl111sf: change mutex_init() location</issue>
  <issue id="1226564" tracker="bnc">VUL-0: CVE-2021-47584: kernel: iocost: Fix divide-by-zero on donation from low hweight cgroup</issue>
  <issue id="1226567" tracker="bnc">VUL-0: CVE-2021-47587: kernel: net: systemport: Add global locking for descriptor lifecycle</issue>
  <issue id="1226569" tracker="bnc">VUL-0: CVE-2021-47608: kernel: bpf: Fix kernel address leakage in atomic fetch</issue>
  <issue id="1226572" tracker="bnc">VUL-0: CVE-2021-47592: kernel: net: stmmac: fix tc flower deletion for VLAN priority Rx steering</issue>
  <issue id="1226574" tracker="bnc">VUL-0: CVE-2021-47598: kernel: sch_cake: do not call cake_destroy() from cake_init()</issue>
  <issue id="1226575" tracker="bnc">VUL-0: CVE-2021-47600: kernel: dm btree remove: fix use after free in rebalance_children()</issue>
  <issue id="1226576" tracker="bnc">VUL-0: CVE-2021-47601: kernel: tee: amdtee: fix an IS_ERR() vs NULL bug</issue>
  <issue id="1226577" tracker="bnc">VUL-0: CVE-2021-47603: kernel: audit: improve robustness of the audit queue handling</issue>
  <issue id="1226580" tracker="bnc">VUL-0: CVE-2021-47607: kernel: bpf: Fix kernel address leakage in atomic cmpxchg's r0 aux reg</issue>
  <issue id="1226583" tracker="bnc">VUL-0: CVE-2021-47611: kernel: mac80211: validate extended element ID is present</issue>
  <issue id="1226585" tracker="bnc">VUL-0: CVE-2021-47612: kernel: nfc: fix segfault in nfc_genl_dump_devices_done</issue>
  <issue id="1226587" tracker="bnc">VUL-0: CVE-2024-38541: kernel: of: module: add buffer overflow check in of_modalias()</issue>
  <issue id="1226601" tracker="bnc">VUL-0: CVE-2021-47614: kernel: RDMA/irdma: Fix a user-after-free in add_pble_prm</issue>
  <issue id="1226602" tracker="bnc">VUL-0: CVE-2021-47615: kernel: RDMA/mlx5: Fix releasing unallocated memory in dereg MR flow</issue>
  <issue id="1226603" tracker="bnc">VUL-0: CVE-2021-47616: kernel: RDMA: Fix use-after-free in rxe_queue_cleanup</issue>
  <issue id="1226607" tracker="bnc">VUL-0: CVE-2024-38555: kernel: net/mlx5: Discard command completions in internal error</issue>
  <issue id="1226614" tracker="bnc">VUL-0: CVE-2021-47617: kernel: PCI: pciehp: Fix infinite loop in IRQ handler upon power fault</issue>
  <issue id="1226617" tracker="bnc">VUL-0: CVE-2022-48723: kernel: spi: uniphier: fix reference count leak in uniphier_spi_probe()</issue>
  <issue id="1226618" tracker="bnc">VUL-0: CVE-2022-48725: kernel: RDMA/siw: Fix refcounting leak in siw_create_qp()</issue>
  <issue id="1226619" tracker="bnc">VUL-0: CVE-2022-48722: kernel: net: ieee802154: ca8210: Stop leaking skb's</issue>
  <issue id="1226621" tracker="bnc">VUL-0: CVE-2022-48715: kernel: scsi: bnx2fc: Make bnx2fc_recv_frame() mp safe</issue>
  <issue id="1226624" tracker="bnc">VUL-0: CVE-2022-48724: kernel: iommu/vt-d: Fix potential memory leak in intel_setup_irq_remapping()</issue>
  <issue id="1226626" tracker="bnc">VUL-0: CVE-2022-48734: kernel: btrfs: fix deadlock between quota disable and qgroup rescan worker</issue>
  <issue id="1226628" tracker="bnc">VUL-0: CVE-2022-48763: kernel: KVM: x86: Forcibly leave nested virt when SMM state is toggled</issue>
  <issue id="1226629" tracker="bnc">VUL-0: CVE-2022-48769: kernel: efi: runtime: avoid EFIv2 runtime services on Apple x86 machines</issue>
  <issue id="1226643" tracker="bnc">VUL-0: CVE-2022-48747: kernel: block: fix wrong offset in bio_truncate()</issue>
  <issue id="1226644" tracker="bnc">VUL-0: CVE-2021-47618: kernel: ARM: 9170/1: fix panic when kasan and kprobe are enabled</issue>
  <issue id="1226645" tracker="bnc">VUL-0: CVE-2021-47619: kernel: i40e: Fix queues reservation for XDP</issue>
  <issue id="1226650" tracker="bnc">VUL-0: CVE-2022-48749: kernel: drm/msm/dpu: invalid parameter check in dpu_setup_dspp_pcc</issue>
  <issue id="1226653" tracker="bnc">VUL-0: CVE-2022-48751: kernel: net/smc: transitional solution for clcsock race issue</issue>
  <issue id="1226662" tracker="bnc">L3: NFS 4.1 client on SLES 15 SP3 uses inefficient READDIR practices</issue>
  <issue id="1226669" tracker="bnc">VUL-0: CVE-2021-47620: kernel: Bluetooth: refactor malicious adv data check</issue>
  <issue id="1226670" tracker="bnc">VUL-0: CVE-2021-4439: kernel: isdn: cpai: check ctr-&gt;cnr to avoid array index out of bound</issue>
  <issue id="1226672" tracker="bnc">VUL-0: CVE-2022-48711: kernel: tipc: improve size validations for received domain records</issue>
  <issue id="1226673" tracker="bnc">VUL-0: CVE-2022-48712: kernel: ext4: fix error handling in ext4_fc_record_modified_inode()</issue>
  <issue id="1226674" tracker="bnc">VUL-0: CVE-2022-48738: kernel: ASoC: ops: Reject out of bounds values in snd_soc_put_volsw()</issue>
  <issue id="1226675" tracker="bnc">VUL-0: CVE-2022-48739: kernel: ASoC: hdmi-codec: Fix OOB memory accesses</issue>
  <issue id="1226679" tracker="bnc">VUL-0: CVE-2022-48717: kernel: ASoC: max9759: fix underflow in speaker_gain_control_put()</issue>
  <issue id="1226683" tracker="bnc">VUL-0: CVE-2022-48720: kernel: net: macsec: Fix offload support for NETDEV_UNREGISTER event</issue>
  <issue id="1226685" tracker="bnc">VUL-0: CVE-2022-48721: kernel: net/smc: Forward wakeup to smc socket waitqueue after fallback</issue>
  <issue id="1226686" tracker="bnc">VUL-0: CVE-2022-48726: kernel: RDMA/ucma: Protect mc during concurrent multicast leaves</issue>
  <issue id="1226690" tracker="bnc">VUL-0: CVE-2022-48727: kernel: KVM: arm64: Avoid consuming a stale esr value when SError occur</issue>
  <issue id="1226691" tracker="bnc">VUL-0: CVE-2022-48728: kernel: IB/hfi1: Fix AIP early init panic</issue>
  <issue id="1226692" tracker="bnc">VUL-0: CVE-2022-48754: kernel: phylib: fix potential use-after-free</issue>
  <issue id="1226696" tracker="bnc">VUL-0: CVE-2022-48744: kernel: net/mlx5e: Avoid field-overflowing memcpy()</issue>
  <issue id="1226697" tracker="bnc">VUL-0: CVE-2022-48765: kernel: KVM: LAPIC: Also cancel preemption timer during SET_LAPIC</issue>
  <issue id="1226698" tracker="bnc">VUL-0: CVE-2022-48756: kernel: drm/msm/dsi: invalid parameter check in msm_dsi_phy_enable</issue>
  <issue id="1226699" tracker="bnc">VUL-0: CVE-2022-48740: kernel: selinux: fix double free of cond_list on error paths</issue>
  <issue id="1226701" tracker="bnc">VUL-0: CVE-2022-48761: kernel: usb: xhci-plat: fix crash when suspend if remote wake enable</issue>
  <issue id="1226702" tracker="bnc">VUL-0: CVE-2022-48745: kernel: net/mlx5: Use del_timer_sync in fw reset flow of halting poll</issue>
  <issue id="1226703" tracker="bnc">VUL-0: CVE-2022-48746: kernel: net/mlx5e: Fix handling of wrong devices during bond netevent</issue>
  <issue id="1226705" tracker="bnc">VUL-0: CVE-2022-48743: kernel: net: amd-xgbe: Fix skb data length underflow</issue>
  <issue id="1226708" tracker="bnc">VUL-0: CVE-2022-48758: kernel: scsi: bnx2fc: Flush destroy_work queue before calling bnx2fc_interface_put()</issue>
  <issue id="1226709" tracker="bnc">VUL-0: CVE-2022-48752: kernel: powerpc/perf: Fix power_pmu_disable to call clear_pmi_irq_pending only if PMI is pending</issue>
  <issue id="1226710" tracker="bnc">VUL-0: CVE-2022-48729: kernel: IB/hfi1: Fix panic with larger ipoib send_queue_size</issue>
  <issue id="1226711" tracker="bnc">VUL-0: CVE-2022-48759: kernel: rpmsg: char: Fix race between the release of rpmsg_ctrldev and cdev</issue>
  <issue id="1226712" tracker="bnc">VUL-0: CVE-2022-48760: kernel: USB: core: Fix hang in usb_kill_urb by adding memory barriers</issue>
  <issue id="1226713" tracker="bnc">VUL-0: CVE-2022-48730: kernel: dma-buf: heaps: Fix potential spectre v1 gadget</issue>
  <issue id="1226715" tracker="bnc">VUL-0: CVE-2022-48767: kernel: ceph: properly put ceph_string reference after async create attempt</issue>
  <issue id="1226716" tracker="bnc">VUL-0: CVE-2022-48732: kernel: drm/nouveau: fix off by one in BIOS boundary checking</issue>
  <issue id="1226719" tracker="bnc">VUL-0: CVE-2022-48735: kernel: ALSA: hda: Fix UAF of leds class devs at unbinding</issue>
  <issue id="1226720" tracker="bnc">VUL-0: CVE-2022-48768: kernel: tracing/histogram: Fix a potential memory leak for kstrdup()</issue>
  <issue id="1226721" tracker="bnc">VUL-0: REJECTED: CVE-2022-48736: kernel: ASoC: ops: Reject out of bounds values in snd_soc_put_xr_sx()</issue>
  <issue id="1226732" tracker="bnc">VUL-0: CVE-2022-48771: kernel: drm/vmwgfx: Fix stale file descriptors on failed usercopy</issue>
  <issue id="1226758" tracker="bnc">VUL-0: CVE-2024-38610: kernel: drivers/virt/acrn: fix PFNMAP PTE checks in acrn_vm_ram_map()</issue>
  <issue id="1226762" tracker="bnc">VUL-0: REJECTED: CVE-2022-48737: kernel: ASoC: ops: Reject out of bounds values in snd_soc_put_volsw_sx()</issue>
  <issue id="1226785" tracker="bnc">VUL-0: CVE-2024-38559: kernel: scsi: qedf: ensure the copied buf is NUL terminated</issue>
  <issue id="1227090" tracker="bnc">VUL-0: CVE-2024-39463: kernel: 9p: add missing locking around taking dentry fid list</issue>
  <issue id="1227383" tracker="bnc">VUL-0: kernel: slab-out-of-bounds in hex_dump_to_buffer</issue>
  <issue id="1227487" tracker="bnc">powerpc/rtas: Prevent Spectre v1 gadget construction in sys_rtas()</issue>
  <issue id="1227549" tracker="bnc">VUL-0: CVE-2022-48713: kernel: perf/x86/intel/pt: Fix crash with stop filters in single-range mode</issue>
  <issue id="1227716" tracker="bnc">VUL-0: CVE-2024-39494: kernel: ima: fix use-after-free on a dentry's dname.name</issue>
  <issue id="1227750" tracker="bnc">VUL-0: CVE-2023-52885: kernel: SUNRPC: Fix UAF in svc_tcp_listen_data_ready()</issue>
  <issue id="1227764" tracker="bnc">VUL-0: CVE-2024-40902: kernel: jfs: xattr: fix buffer overflow for invalid xattr</issue>
  <issue id="1227808" tracker="bnc">VUL-0: CVE-2024-40954: kernel: net: do not leave a dangling sk pointer, when socket creation fails</issue>
  <issue id="1227810" tracker="bnc">VUL-0: CVE-2024-40956: kernel: dmaengine: idxd: Fix possible Use-After-Free in irq_process_work_list</issue>
  <issue id="1227823" tracker="bnc">VUL-0: CVE-2024-40989: kernel: KVM: arm64: Disassociate vcpus from redistributor region on teardown</issue>
  <issue id="1227829" tracker="bnc">VUL-0: CVE-2024-40994: kernel: ptp: fix integer overflow in max_vclocks_store</issue>
  <issue id="1227836" tracker="bnc">VUL-0: CVE-2024-40937: kernel: gve: clear napi-&gt;skb before dev_kfree_skb_any()</issue>
  <issue id="1227917" tracker="bnc">VUL-0: CVE-2021-47622: kernel: scsi: ufs: Fix a deadlock in the error handler</issue>
  <issue id="1227920" tracker="bnc">VUL-0: CVE-2021-47624: kernel: net/sunrpc: fix reference count leaks in rpc_sysfs_xprt_state_change</issue>
  <issue id="1227921" tracker="bnc">VUL-0: CVE-2022-48773: kernel: xprtrdma: fix pointer derefs in error cases of rpcrdma_ep_create</issue>
  <issue id="1227922" tracker="bnc">VUL-0: CVE-2022-48777: kernel: mtd: parsers: qcom: fix kernel panic on skipped partition</issue>
  <issue id="1227923" tracker="bnc">VUL-0: CVE-2022-48774: kernel: dmaengine: ptdma: Fix the error handling path in pt_core_init()</issue>
  <issue id="1227924" tracker="bnc">VUL-0: CVE-2022-48775: kernel: Drivers: hv: vmbus: Fix memory leak in vmbus_add_channel_kobj</issue>
  <issue id="1227925" tracker="bnc">VUL-0: CVE-2022-48776: kernel: mtd: parsers: qcom: Fix missing free for pparts in cleanup</issue>
  <issue id="1227928" tracker="bnc">VUL-0: CVE-2022-48811: kernel: ibmvnic: don't release napi in __ibmvnic_open()</issue>
  <issue id="1227931" tracker="bnc">VUL-0: CVE-2022-48817: kernel: net: dsa: ar9331: register the mdiobus under devres</issue>
  <issue id="1227932" tracker="bnc">VUL-0: CVE-2022-48787: kernel: iwlwifi: fix use-after-free</issue>
  <issue id="1227933" tracker="bnc">VUL-0: CVE-2022-48815: kernel: net: dsa: bcm_sf2: don't use devres for mdiobus</issue>
  <issue id="1227935" tracker="bnc">VUL-0: CVE-2022-48778: kernel: mtd: rawnand: gpmi: don't leak PM reference in error path</issue>
  <issue id="1227938" tracker="bnc">VUL-0: CVE-2022-48784: kernel: cfg80211: fix race in netlink owner interface destruction</issue>
  <issue id="1227941" tracker="bnc">VUL-0: CVE-2022-48790: kernel: nvme: fix a possible use-after-free in controller reset during load</issue>
  <issue id="1227942" tracker="bnc">VUL-0: CVE-2022-48802: kernel: fs/proc: task_mmu.c: don't read mapcount for migration entry</issue>
  <issue id="1227944" tracker="bnc">VUL-0: CVE-2022-48814: kernel: net: dsa: seville: register the mdiobus under devres</issue>
  <issue id="1227945" tracker="bnc">VUL-0: CVE-2022-48798: kernel: s390/cio: verify the driver availability for path_event call</issue>
  <issue id="1227948" tracker="bnc">VUL-0: CVE-2022-48806: kernel: eeprom: ee1004: limit i2c reads to I2C_SMBUS_BLOCK_MAX</issue>
  <issue id="1227949" tracker="bnc">VUL-0: CVE-2022-48783: kernel: net: dsa: lantiq_gswip: fix use after free in gswip_remove()</issue>
  <issue id="1227952" tracker="bnc">VUL-0: CVE-2022-48788: kernel: nvme-rdma: fix possible use-after-free in transport error_recovery work</issue>
  <issue id="1227953" tracker="bnc">VUL-0: CVE-2022-48799: kernel: perf: fix list corruption in perf_cgroup_switch()</issue>
  <issue id="1227954" tracker="bnc">VUL-0: CVE-2022-48800: kernel: mm: vmscan: remove deadlock due to throttling failing to make progress</issue>
  <issue id="1227956" tracker="bnc">VUL-0: CVE-2022-48801: kernel: iio: buffer: fix file related error handling in IIO_BUFFER_GET_FD_IOCTL</issue>
  <issue id="1227963" tracker="bnc">VUL-0: CVE-2022-48813: kernel: net: dsa: felix: don't use devres for mdiobus</issue>
  <issue id="1227964" tracker="bnc">VUL-0: CVE-2022-48824: kernel: scsi: myrs: fix crash in error case</issue>
  <issue id="1227965" tracker="bnc">VUL-0: CVE-2022-48803: kernel: phy: ti: fix missing sentinel for clk_div_table</issue>
  <issue id="1227968" tracker="bnc">VUL-0: CVE-2022-48804: kernel: vt_ioctl: fix array_index_nospec in vt_setactivate</issue>
  <issue id="1227969" tracker="bnc">VUL-0: CVE-2022-48805: kernel: net: usb: ax88179_178a: fix out-of-bounds accesses in RX fixup</issue>
  <issue id="1227970" tracker="bnc">VUL-0: CVE-2022-48807: kernel: ice: fix KASAN error in LAG NETDEV_UNREGISTER handler</issue>
  <issue id="1227971" tracker="bnc">VUL-0: CVE-2022-48812: kernel: net: dsa: lantiq_gswip: don't use devres for mdiobus</issue>
  <issue id="1227972" tracker="bnc">VUL-0: CVE-2022-48820: kernel: phy: stm32: fix a refcount leak in stm32_usbphyc_pll_enable()</issue>
  <issue id="1227975" tracker="bnc">VUL-0: CVE-2022-48826: kernel: drm/vc4: fix deadlock on DSI device attach error</issue>
  <issue id="1227976" tracker="bnc">VUL-0: CVE-2022-48821: kernel: misc: fastrpc: avoid double fput() on failed usercopy</issue>
  <issue id="1227981" tracker="bnc">VUL-0: CVE-2023-52886: kernel: USB: core: Fix race by not overwriting udev-&gt;descriptor in hub_port_init()</issue>
  <issue id="1227982" tracker="bnc">VUL-0: CVE-2022-48830: kernel: can: isotp: fix potential CAN frame reception race in isotp_rcv()</issue>
  <issue id="1227985" tracker="bnc">VUL-0: CVE-2022-48839: kernel: net/packet: fix slab-out-of-bounds access in packet_recvmsg()</issue>
  <issue id="1227986" tracker="bnc">VUL-0: CVE-2022-48831: kernel: ima: fix reference leak in asymmetric_verify()</issue>
  <issue id="1227987" tracker="bnc">VUL-0: CVE-2022-48837: kernel: usb: gadget: rndis: prevent integer overflow in rndis_set_response()</issue>
  <issue id="1227988" tracker="bnc">VUL-0: CVE-2022-48838: kernel: usb: gadget: Fix use-after-free bug by not setting udc-&gt;dev.driver</issue>
  <issue id="1227989" tracker="bnc">VUL-0: CVE-2022-48836: kernel: Input: aiptek - properly check endpoint type</issue>
  <issue id="1227990" tracker="bnc">VUL-0: CVE-2022-48840: kernel: iavf: Fix hang during reboot/shutdown</issue>
  <issue id="1227991" tracker="bnc">VUL-0: CVE-2022-48841: kernel: ice: fix NULL pointer dereference in ice_update_vsi_tx_ring_stats()</issue>
  <issue id="1227993" tracker="bnc">VUL-0: CVE-2022-48847: kernel: watch_queue: Fix filter limit check</issue>
  <issue id="1227995" tracker="bnc">VUL-0: CVE-2022-48780: kernel: net/smc: Avoid overwriting the copies of clcsock callback functions</issue>
  <issue id="1227996" tracker="bnc">VUL-0: CVE-2022-48786: kernel: vsock: remove vsock from connected table when connect is interrupted by a signal</issue>
  <issue id="1227997" tracker="bnc">VUL-0: CVE-2022-48851: kernel: staging: gdm724x: fix use after free in gdm_lte_rx()</issue>
  <issue id="1228000" tracker="bnc">VUL-0: CVE-2022-48789: kernel: nvme-tcp: fix possible use-after-free in transport error_recovery work</issue>
  <issue id="1228002" tracker="bnc">VUL-0: CVE-2022-48791: kernel: scsi: pm8001: Fix use-after-free for aborted TMF sas_task</issue>
  <issue id="1228004" tracker="bnc">VUL-0: CVE-2022-48856: kernel: gianfar: ethtool: Fix refcount leak in gfar_get_ts_info</issue>
  <issue id="1228005" tracker="bnc">VUL-0: CVE-2022-48857: kernel: NFC: port100: fix use-after-free in port100_send_complete</issue>
  <issue id="1228006" tracker="bnc">VUL-0: CVE-2022-48858: kernel: net/mlx5: Fix a race on command flush flow</issue>
  <issue id="1228007" tracker="bnc">VUL-0: CVE-2022-48859: kernel: net: marvell: prestera: Add missing of_node_put() in prestera_switch_set_base_mac_addr</issue>
  <issue id="1228008" tracker="bnc">VUL-0: CVE-2022-48860: kernel: ethernet: Fix error handling in xemaclite_of_probe</issue>
  <issue id="1228009" tracker="bnc">VUL-0: CVE-2022-48861: kernel: vdpa: fix use-after-free on vp_vdpa_remove</issue>
  <issue id="1228010" tracker="bnc">VUL-0: CVE-2022-48862: kernel: vhost: fix hung thread due to erroneous iotlb entries</issue>
  <issue id="1228013" tracker="bnc">VUL-0: CVE-2022-48792: kernel: scsi: pm8001: Fix use-after-free for aborted SSP/STP sas_task</issue>
  <issue id="1228014" tracker="bnc">VUL-0: CVE-2022-48866: kernel: HID: hid-thrustmaster: fix OOB read in thrustmaster_interrupts</issue>
  <issue id="1228015" tracker="bnc">VUL-0: CVE-2022-48853: kernel: swiotlb: fix info leak with DMA_FROM_DEVICE</issue>
  <issue id="1228019" tracker="bnc">VUL-0: CVE-2022-48793: kernel: KVM: x86: nSVM: fix potential NULL derefernce on nested migration</issue>
  <issue id="1228025" tracker="bnc">VUL-0: CVE-2022-48794: kernel: net: ieee802154: at86rf230: Stop leaking skb's</issue>
  <issue id="1228028" tracker="bnc">VUL-0: CVE-2022-48796: kernel: iommu: Fix potential use-after-free during probe</issue>
  <issue id="1228035" tracker="bnc">VUL-0: CVE-2022-48797: kernel: mm: don't try to NUMA-migrate COW pages that have other uses</issue>
  <issue id="1228037" tracker="bnc">VUL-0: CVE-2022-48827: kernel: NFSD: Fix the behavior of READ near OFFSET_MAX</issue>
  <issue id="1228038" tracker="bnc">VUL-0: CVE-2022-48816: kernel: SUNRPC: lock against -&gt;sock changing during sysfs read</issue>
  <issue id="1228039" tracker="bnc">VUL-0: CVE-2022-48818: kernel: net: dsa: mv88e6xxx: don't use devres for mdiobus</issue>
  <issue id="1228040" tracker="bnc">VUL-0: CVE-2022-48822: kernel: usb: f_fs: fix use-after-free for epfile</issue>
  <issue id="1228045" tracker="bnc">VUL-0: CVE-2022-48823: kernel: scsi: qedf: fix refcount issue when LOGO is received during TMF</issue>
  <issue id="1228054" tracker="bnc">VUL-0: CVE-2022-48828: kernel: NFSD: Fix ia_size underflow</issue>
  <issue id="1228055" tracker="bnc">VUL-0: CVE-2022-48829: kernel: NFSD: Fix NFSv3 SETATTR/CREATE's handling of large file sizes</issue>
  <issue id="1228056" tracker="bnc">VUL-0: CVE-2022-48825: kernel: scsi: qedf: add stag_work to all the vports</issue>
  <issue id="1228060" tracker="bnc">VUL-0: CVE-2022-48835: kernel: scsi: mpt3sas: page fault in reply q processing</issue>
  <issue id="1228061" tracker="bnc">VUL-0: CVE-2022-48849: kernel: drm/amdgpu: bypass tiling flag check in virtual display case (v2)</issue>
  <issue id="1228062" tracker="bnc">VUL-0: CVE-2022-48834: kernel: usb: usbtmc: Fix bug in pipe direction for control transfers</issue>
  <issue id="1228063" tracker="bnc">VUL-0: CVE-2022-48863: kernel: mISDN: fix memory leak in dsp_pipeline_build()</issue>
  <issue id="1228064" tracker="bnc">VUL-0: CVE-2022-48842: kernel: ice: Fix race condition during interface enslave</issue>
  <issue id="1228066" tracker="bnc">VUL-0: CVE-2022-48843: kernel: drm/vrr: Set VRR capable prop only if it is attached to connector</issue>
  <issue id="1228247" tracker="bnc">VUL-0: CVE-2024-41012: kernel: filelock: Remove locks reliably when fcntl/close race is detected</issue>
  <issue id="1228328" tracker="bnc">VUL-0: CVE-2024-41090: kernel: virtio-net: tap: mlx5_core short frame denial of service</issue>
  <issue id="1228440" tracker="bnc">Partner-L3: SLES15SP4: kernel 5.14.21-150400.24.125.1 would panic if to run "mv &lt;old-dir&gt; &lt;new-dir&gt;" on ext2 file system.</issue>
  <issue id="1228561" tracker="bnc">VUL-0: CVE-2024-41059: kernel: hfsplus: fix uninit-value in copy_name</issue>
  <issue id="1228644" tracker="bnc">VUL-0: CVE-2024-41069: kernel: ASoC: topology: fix references to freed memory</issue>
  <issue id="1228680" tracker="bnc">VUL-0: CVE-2024-42093: kernel: net/dpaa2: Avoid explicit cpumask var allocation on stack</issue>
  <issue id="1228743" tracker="bnc">VUL-0: CVE-2024-42145: kernel: IB/core: implement a limit on UMAD receive List</issue>
  <issue id="1228801" tracker="bnc">cgroup/cpuset: Prevent UAF in proc_cpuset_show()</issue>
  <issue id="2024-26976" tracker="cve" />
  <issue id="2024-40902" tracker="cve" />
  <issue id="2024-26814" tracker="cve" />
  <issue id="2024-26813" tracker="cve" />
  <issue id="2023-52885" tracker="cve" />
  <issue id="2023-37453" tracker="cve" />
  <issue id="2023-52886" tracker="cve" />
  <issue id="2023-52762" tracker="cve" />
  <issue id="2022-48866" tracker="cve" />
  <issue id="2022-48836" tracker="cve" />
  <issue id="2022-48793" tracker="cve" />
  <issue id="2022-48857" tracker="cve" />
  <issue id="2022-48829" tracker="cve" />
  <issue id="2022-48828" tracker="cve" />
  <issue id="2022-48827" tracker="cve" />
  <issue id="2022-48816" tracker="cve" />
  <issue id="2022-48830" tracker="cve" />
  <issue id="2022-48784" tracker="cve" />
  <issue id="2022-48774" tracker="cve" />
  <issue id="2022-48849" tracker="cve" />
  <issue id="2022-48826" tracker="cve" />
  <issue id="2022-48843" tracker="cve" />
  <issue id="2022-48806" tracker="cve" />
  <issue id="2022-48860" tracker="cve" />
  <issue id="2023-1582" tracker="cve" />
  <issue id="2022-48802" tracker="cve" />
  <issue id="2022-48856" tracker="cve" />
  <issue id="2022-48840" tracker="cve" />
  <issue id="2022-48811" tracker="cve" />
  <issue id="2022-48807" tracker="cve" />
  <issue id="2022-48842" tracker="cve" />
  <issue id="2022-48841" tracker="cve" />
  <issue id="2022-48801" tracker="cve" />
  <issue id="2022-48831" tracker="cve" />
  <issue id="2022-48796" tracker="cve" />
  <issue id="2022-48787" tracker="cve" />
  <issue id="2022-48863" tracker="cve" />
  <issue id="2022-48821" tracker="cve" />
  <issue id="2022-48797" tracker="cve" />
  <issue id="2022-48800" tracker="cve" />
  <issue id="2022-48775" tracker="cve" />
  <issue id="2022-48777" tracker="cve" />
  <issue id="2022-48776" tracker="cve" />
  <issue id="2022-48778" tracker="cve" />
  <issue id="2022-48817" tracker="cve" />
  <issue id="2022-48815" tracker="cve" />
  <issue id="2022-48813" tracker="cve" />
  <issue id="2022-48812" tracker="cve" />
  <issue id="2022-48783" tracker="cve" />
  <issue id="2022-48818" tracker="cve" />
  <issue id="2022-48814" tracker="cve" />
  <issue id="2022-48794" tracker="cve" />
  <issue id="2022-48859" tracker="cve" />
  <issue id="2022-48858" tracker="cve" />
  <issue id="2022-20368" tracker="cve" />
  <issue id="2022-48839" tracker="cve" />
  <issue id="2022-48780" tracker="cve" />
  <issue id="2022-28748" tracker="cve" />
  <issue id="2022-2964" tracker="cve" />
  <issue id="2022-48805" tracker="cve" />
  <issue id="2022-48790" tracker="cve" />
  <issue id="2022-48788" tracker="cve" />
  <issue id="2022-48789" tracker="cve" />
  <issue id="2022-48799" tracker="cve" />
  <issue id="2022-48820" tracker="cve" />
  <issue id="2022-48803" tracker="cve" />
  <issue id="2022-48798" tracker="cve" />
  <issue id="2022-48835" tracker="cve" />
  <issue id="2022-48824" tracker="cve" />
  <issue id="2022-48792" tracker="cve" />
  <issue id="2022-48791" tracker="cve" />
  <issue id="2022-48825" tracker="cve" />
  <issue id="2022-48823" tracker="cve" />
  <issue id="2022-48851" tracker="cve" />
  <issue id="2022-0854" tracker="cve" />
  <issue id="2022-48853" tracker="cve" />
  <issue id="2022-48822" tracker="cve" />
  <issue id="2022-48838" tracker="cve" />
  <issue id="2022-48837" tracker="cve" />
  <issue id="2022-48834" tracker="cve" />
  <issue id="2022-48861" tracker="cve" />
  <issue id="2022-48862" tracker="cve" />
  <issue id="2022-48786" tracker="cve" />
  <issue id="2022-48804" tracker="cve" />
  <issue id="2022-48847" tracker="cve" />
  <issue id="2022-48773" tracker="cve" />
  <issue id="2021-47624" tracker="cve" />
  <issue id="2021-47622" tracker="cve" />
  <issue id="2023-52591" tracker="cve" />
  <issue id="2024-36926" tracker="cve" />
  <issue id="2022-48713" tracker="cve" />
  <issue id="2024-38559" tracker="cve" />
  <issue id="2024-26583" tracker="cve" />
  <issue id="2024-26584" tracker="cve" />
  <issue id="2024-26800" tracker="cve" />
  <issue id="2021-47600" tracker="cve" />
  <issue id="2022-48735" tracker="cve" />
  <issue id="2021-47618" tracker="cve" />
  <issue id="2022-48739" tracker="cve" />
  <issue id="2022-48717" tracker="cve" />
  <issue id="2022-48736" tracker="cve" />
  <issue id="2022-48737" tracker="cve" />
  <issue id="2022-48738" tracker="cve" />
  <issue id="2021-47620" tracker="cve" />
  <issue id="2022-48728" tracker="cve" />
  <issue id="2022-48729" tracker="cve" />
  <issue id="2022-48765" tracker="cve" />
  <issue id="2022-48727" tracker="cve" />
  <issue id="2022-48763" tracker="cve" />
  <issue id="2021-47617" tracker="cve" />
  <issue id="2021-47616" tracker="cve" />
  <issue id="2021-47614" tracker="cve" />
  <issue id="2021-47615" tracker="cve" />
  <issue id="2022-48725" tracker="cve" />
  <issue id="2022-48726" tracker="cve" />
  <issue id="2022-48760" tracker="cve" />
  <issue id="2021-47582" tracker="cve" />
  <issue id="2021-47603" tracker="cve" />
  <issue id="2022-48747" tracker="cve" />
  <issue id="2021-47607" tracker="cve" />
  <issue id="2021-47608" tracker="cve" />
  <issue id="2024-35905" tracker="cve" />
  <issue id="2022-48734" tracker="cve" />
  <issue id="2021-47585" tracker="cve" />
  <issue id="2022-48767" tracker="cve" />
  <issue id="2022-48730" tracker="cve" />
  <issue id="2022-48749" tracker="cve" />
  <issue id="2022-48756" tracker="cve" />
  <issue id="2022-48732" tracker="cve" />
  <issue id="2021-47534" tracker="cve" />
  <issue id="2022-48771" tracker="cve" />
  <issue id="2022-48769" tracker="cve" />
  <issue id="2022-48712" tracker="cve" />
  <issue id="2021-47609" tracker="cve" />
  <issue id="2023-52766" tracker="cve" />
  <issue id="2021-47619" tracker="cve" />
  <issue id="2021-47589" tracker="cve" />
  <issue id="2021-47597" tracker="cve" />
  <issue id="2021-47584" tracker="cve" />
  <issue id="2022-48724" tracker="cve" />
  <issue id="2021-4439" tracker="cve" />
  <issue id="2021-47602" tracker="cve" />
  <issue id="2021-47611" tracker="cve" />
  <issue id="2021-47583" tracker="cve" />
  <issue id="2022-48743" tracker="cve" />
  <issue id="2021-47596" tracker="cve" />
  <issue id="2022-48722" tracker="cve" />
  <issue id="2022-48720" tracker="cve" />
  <issue id="2022-48745" tracker="cve" />
  <issue id="2022-48744" tracker="cve" />
  <issue id="2022-48746" tracker="cve" />
  <issue id="2022-48721" tracker="cve" />
  <issue id="2022-48751" tracker="cve" />
  <issue id="2021-47586" tracker="cve" />
  <issue id="2021-47592" tracker="cve" />
  <issue id="2021-47587" tracker="cve" />
  <issue id="2021-47612" tracker="cve" />
  <issue id="2024-38541" tracker="cve" />
  <issue id="2024-35878" tracker="cve" />
  <issue id="2022-48754" tracker="cve" />
  <issue id="2022-48752" tracker="cve" />
  <issue id="2022-48759" tracker="cve" />
  <issue id="2022-48758" tracker="cve" />
  <issue id="2022-48715" tracker="cve" />
  <issue id="2021-47578" tracker="cve" />
  <issue id="2021-47580" tracker="cve" />
  <issue id="2021-47576" tracker="cve" />
  <issue id="2022-48740" tracker="cve" />
  <issue id="2022-48723" tracker="cve" />
  <issue id="2021-47601" tracker="cve" />
  <issue id="2022-48711" tracker="cve" />
  <issue id="2022-48768" tracker="cve" />
  <issue id="2022-48761" tracker="cve" />
  <issue id="2023-52800" tracker="cve" />
  <issue id="2024-39494" tracker="cve" />
  <issue id="2024-41069" tracker="cve" />
  <issue id="2024-40954" tracker="cve" />
  <issue id="2024-42145" tracker="cve" />
  <issue id="2024-40994" tracker="cve" />
  <issue id="2024-41012" tracker="cve" />
  <issue id="2024-42093" tracker="cve" />
  <issue id="2024-40989" tracker="cve" />
  <issue id="2024-41059" tracker="cve" />
  <issue id="2024-40956" tracker="cve" />
  <issue id="2024-41090" tracker="cve" />
  <issue id="2024-41011" tracker="cve" />
  <issue id="2024-39463" tracker="cve" />
  <issue id="2021-47598" tracker="cve" />
  <issue id="2024-40937" tracker="cve" />
  <issue id="2024-35901" tracker="cve" />
  <issue id="2024-42230" tracker="cve" />
  <issue id="2024-26585" tracker="cve" />
  <issue id="2024-36974" tracker="cve" />
  <issue id="2024-38555" tracker="cve" />
  <issue id="1228114" tracker="bnc">VUL-0: CVE-2024-41011: kernel: drm/amdkfd: don't allow mapping the MMIO HDP page with large pages</issue>
  <category>security</category>
  <rating>important</rating>
  <packager>alnovak</packager>
  <reboot_needed/>
  <description>The SUSE Linux Enterprise 15 SP4 kernel was updated to receive various security bugfixes.


The following security bugs were fixed:

- CVE-2024-39494: ima: Fix use-after-free on a dentry's dname.name (bsc#1227716).
- CVE-2024-41069: ASoC: topology: Fix route memory corruption (bsc#1228644).
- CVE-2024-40954: net: do not leave a dangling sk pointer, when socket creation fails (bsc#1227808)
- CVE-2024-42145: IB/core: Implement a limit on UMAD receive List (bsc#1228743)
- CVE-2024-40994: ptp: fix integer overflow in max_vclocks_store (bsc#1227829).
- CVE-2024-41012: filelock: Remove locks reliably when fcntl/close race is detected (bsc#1228247).
- CVE-2024-42093: net/dpaa2: Avoid explicit cpumask var allocation on stack (bsc#1228680).
- CVE-2024-40989: KVM: arm64: Disassociate vcpus from redistributor region on teardown (bsc#1227823).
- CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228561).
- CVE-2024-40956: dmaengine: idxd: Fix possible Use-After-Free in irq_process_work_list (bsc#1227810).
- CVE-2024-41090: tap: add missing verification for short frame (bsc#1228328).
- CVE-2024-41011: drm/amdkfd: do not allow mapping the MMIO HDP page with large pages (bsc#1228114).
- CVE-2024-39463: 9p: add missing locking around taking dentry fid list (bsc#1227090).
- CVE-2021-47598: sch_cake: do not call cake_destroy() from cake_init() (bsc#1226574).
- CVE-2024-40937: gve: Clear napi->skb before dev_kfree_skb_any() (bsc#1227836).
- CVE-2024-35901: net: mana: Fix Rx DMA datasize and skb_over_panic (bsc#1224495).
- CVE-2024-42230: powerpc/pseries: Fix scv instruction crash with kexec (bsc#1194869).
- CVE-2024-26585: Fixed race between tx work scheduling and socket close (bsc#1220187).
- CVE-2024-36974: net/sched: taprio: always validate TCA_TAPRIO_ATTR_PRIOMAP (bsc#1226519).
- CVE-2024-38555: net/mlx5: Discard command completions in internal error (bsc#1226607).

The following non-security bugs were fixed:

- NFS: Do not re-read the entire page cache to find the next cookie (bsc#1226662).
- NFS: Reduce use of uncached readdir (bsc#1226662).
- NFSv4.x: by default serialize open/close operations (bsc#1226226 bsc#1223863).
- X.509: Fix the parser of extended key usage for length (bsc#1218820).
- btrfs: sysfs: update fs features directory asynchronously (bsc#1226168).
- cgroup/cpuset: Prevent UAF in proc_cpuset_show() (bsc#1228801).
- jfs: xattr: fix buffer overflow for invalid xattr (bsc#1227383).
- kABI: rtas: Workaround false positive due to lost definition (bsc#1227487).
- kernel-binary: vdso: Own module_dir
- net/dcb: check for detached device before executing callbacks (bsc#1215587).
- ocfs2: fix DIO failure due to insufficient transaction credits (bsc#1216834).
- powerpc/rtas: Prevent Spectre v1 gadget construction in sys_rtas() (bsc#1227487).
- powerpc/rtas: clean up includes (bsc#1227487).
- workqueue: Improve scalability of workqueue watchdog touch (bsc#1193454).
- workqueue: wq_watchdog_touch is always called with valid CPU (bsc#1193454).
</description>
	<summary>Security update for the Linux Kernel</summary>
</patchinfo>
openSUSE Build Service is sponsored by