Sign Up
Log In
Log In
or
Sign Up
Places
All Projects
Status Monitor
Collapse sidebar
Please login to access the resource
openSUSE:Step:15-SP6
patchinfo.34676
_patchinfo
Overview
Repositories
Revisions
Requests
Users
Attributes
Meta
File _patchinfo of Package patchinfo.34676
<patchinfo incident="34676"> <issue id="1156395" tracker="bnc">[TRACKERBUG] 5.3 powerpc base kernel fixes</issue> <issue id="1190336" tracker="bnc">[Huawei][aarch64] Update hns3 and infiniband/hns drivers</issue> <issue id="1191958" tracker="bnc">VUL-0: CVE-2021-43389: kernel-source,kernel-source-azure,kernel-source-rt: an array-index-out-bounds in detach_capi_ctr in drivers/isdn/capi/kcapi.c</issue> <issue id="1193883" tracker="bnc">VUL-0: kernel-source-rt, kernel-source-azure, kernel-source: kernel memory leak in BPF</issue> <issue id="1194826" tracker="bnc">VUL-1: CVE-2022-0264: kernel-source-rt, kernel-source, kernel-source-azure: address leakage in BPF atomic fetch</issue> <issue id="1195065" tracker="bnc">VUL-0: CVE-2022-22942: kernel-source: Vulnerability in the vmwgfx driver</issue> <issue id="1195254" tracker="bnc">VUL-0: CVE-2022-0435: kernel-source: tipc: Remote Stack Overflow in Linux Kernel</issue> <issue id="1195341" tracker="bnc">ceph: properly put ceph_string reference after async create attempt</issue> <issue id="1195349" tracker="bnc">Oops at dynamic unbind of HD-audio device with LED cdevs</issue> <issue id="1195775" tracker="bnc">apparmor fails to build with 5.16.7</issue> <issue id="1196746" tracker="bnc">Call observed while deleting e3-fcoe interface.</issue> <issue id="1197915" tracker="bnc">btrfs: backport, from upstream, several fsync related performance patches and bug fixes</issue> <issue id="1198014" tracker="bnc">[PATCH] iocost: Fix divide-by-zero on donation from low hweight cgroup</issue> <issue id="1199295" tracker="bnc">kernel hang in Azure during file system test</issue> <issue id="1202767" tracker="bnc">[PATCH] ext4: fix error handling in ext4_fc_record_modified_inode()</issue> <issue id="1202780" tracker="bnc">[PATCH] block: Fix wrong offset in bio_truncate()</issue> <issue id="1205205" tracker="bnc">Catch up io_uring performance with mainline</issue> <issue id="1207361" tracker="bnc">SLE15-SP5 networking backports and fixes</issue> <issue id="1217912" tracker="bnc">L3: Soft lockups in nfsd while nfsserver.service is stopped</issue> <issue id="1218148" tracker="bnc">VUL-0: CVE-2023-24023: BLUFFS: kernel: Bluetooth Forward and Future Secrecy Attacks and Defenses</issue> <issue id="1218570" tracker="bnc">Partner-L3: SLES 15 SP5 : Host driver is not sending IOs with DIF enabled on the Qlogic adapter</issue> <issue id="1218820" tracker="bnc">L3-Question: vmware esxi8 uefi secure boot blacklist: Problem with revocation key (-74)</issue> <issue id="1219224" tracker="bnc">OCFS2 writes delay on large volumes - slow la window lookup from global_bitmap</issue> <issue id="1219633" tracker="bnc">L3-Question: kernel workqueue and soft lockups for extended periods with NFS involved in backtraces</issue> <issue id="1219847" tracker="bnc">Request to truncate file on NFS results in file not truncated</issue> <issue id="1220368" tracker="bnc">cifs.ko - CIFS client fails to mount share in a Windows clustered file server</issue> <issue id="1220812" tracker="bnc">Multiple SUSE VMs hung after nfs/cifs communication outage</issue> <issue id="1220958" tracker="bnc">VUL-0: CVE-2021-47089: kernel: kfence: fix memory leak when cat kfence objects</issue> <issue id="1221086" tracker="bnc">VUL-0: CVE-2024-26625: kernel: llc: call sock_orphan() at release time</issue> <issue id="1221282" tracker="bnc">fstests btrfs/309 fails on btrfs</issue> <issue id="1221958" tracker="bnc">Checksum errors on SCTP traffic through IPVS [ref:_00D1igLOd._500Tr7dsRC:ref]</issue> <issue id="1222015" tracker="bnc">L3: TSC clocksource spuriously declared invalid in 12+ socket Sapphire Rapids systems</issue> <issue id="1222072" tracker="bnc">VUL-0: CVE-2024-26644: kernel: btrfs: don't abort filesystem when attempting to snapshot deleted subvolume</issue> <issue id="1222080" tracker="bnc">VUL-0: CVE-2023-52622: kernel: ext4: avoid online resizing failures due to oversized flex bg</issue> <issue id="1222241" tracker="bnc">[Bug Fix/Enhancement] Extend size of the MCE Records pool</issue> <issue id="1222254" tracker="bnc">L3: Unresponsive /run/systemd/userdb/io.systemd.DynamicUser adding 45 second delay to su commands</issue> <issue id="1222364" tracker="bnc">VUL-0: CVE-2024-26720: kernel: mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again</issue> <issue id="1222893" tracker="bnc">WARNING: at ../kernel/trace/ring_buffer.c:1544 rb_check_pages.isra [ref:_00D1igLOd._500Tr8mhUI:ref]</issue> <issue id="1223013" tracker="bnc">VUL-0: CVE-2024-26842: kernel: scsi: ufs: shift issue in ufshcd_clear_cmd()</issue> <issue id="1223018" tracker="bnc">VUL-0: CVE-2024-26845: kernel: scsi: target: core: uncompleted abort leaving the kernel leaving a never-ending task</issue> <issue id="1223265" tracker="bnc">[TRACKER] CONFIG_SENSORS_XGENE is not enable for Ampere platforms</issue> <issue id="1223384" tracker="bnc">VUL-0: CVE-2024-26923: kernel: af_unix: fix garbage collector racing against connect()</issue> <issue id="1223641" tracker="bnc">VUL-0: CVE-2024-26973: kernel: fat: fix uninitialized field in nostale filehandles</issue> <issue id="1224020" tracker="bnc">[TRACKERBUG] SLE15-SP5 backports for cifs.ko</issue> <issue id="1224331" tracker="bnc">Nvidia Grace: Fix double allocation in swiotlb_alloc()</issue> <issue id="1224488" tracker="bnc">VUL-0: CVE-2024-35905: kernel: bpf: Protect against int overflow for stack access size</issue> <issue id="1224497" tracker="bnc">VUL-0: CVE-2024-35900: kernel: netfilter: nf_tables: reject new basechain after table flag update</issue> <issue id="1224498" tracker="bnc">VUL-0: CVE-2024-35898: kernel: netfilter: nf_tables: Fix potential data-race in __nft_flowtable_type_get()</issue> <issue id="1224504" tracker="bnc">VUL-0: CVE-2023-52675: kernel: powerpc/imc-pmu: Add a null pointer check in update_events_in_group()</issue> <issue id="1224520" tracker="bnc">VUL-0: CVE-2024-35884: kernel: udp: do not accept non-tunnel GSO skbs landing in a tunnel</issue> <issue id="1224539" tracker="bnc">VUL-0: CVE-2024-36005: kernel: netfilter: nf_tables: honor table dormant flag from netdev release event path</issue> <issue id="1224540" tracker="bnc">VUL-0: CVE-2024-36008: kernel: ipv4: check for NULL idev in ip_route_use_hint()</issue> <issue id="1224552" tracker="bnc">VUL-0: CVE-2024-35997: kernel: HID: i2c-hid: remove I2C_HID_READ_PENDING flag to prevent lock-up</issue> <issue id="1224583" tracker="bnc">VUL-0: CVE-2024-35962: kernel: netfilter: complete validation of user input</issue> <issue id="1224588" tracker="bnc">VUL-0: CVE-2024-35960: kernel: net/mlx5: Properly link new fs rules into the tree</issue> <issue id="1224602" tracker="bnc">VUL-0: CVE-2024-35814: kernel: swiotlb: Fix double-allocation of slots due to broken alignment handling</issue> <issue id="1224603" tracker="bnc">VUL-0: CVE-2023-52667: kernel: net/mlx5e: fix a potential double-free in fs_any_create_groups</issue> <issue id="1224605" tracker="bnc">VUL-0: CVE-2024-35835: kernel: net/mlx5e: fix a double-free in arfs_create_groups</issue> <issue id="1224612" tracker="bnc">VUL-0: CVE-2024-35848: kernel: eeprom: at24: fix memory corruption race condition</issue> <issue id="1224614" tracker="bnc">VUL-0: CVE-2023-52672: kernel: pipe: wakeup wr_wait after setting max_usage</issue> <issue id="1224619" tracker="bnc">VUL-0: CVE-2024-35857: kernel: icmp: prevent possible NULL dereferences from icmp_build_probe()</issue> <issue id="1224661" tracker="bnc">VUL-0: CVE-2024-35925: kernel: block: prevent division by zero in blk_rq_stat_sum()</issue> <issue id="1224662" tracker="bnc">VUL-0: CVE-2024-35896: kernel: netfilter: validate user input for expected length</issue> <issue id="1224670" tracker="bnc">VUL-0: CVE-2024-35886: kernel: ipv6: Fix infinite recursion in fib6_dump_done().</issue> <issue id="1224671" tracker="bnc">VUL-0: CVE-2024-35878: kernel: of: module: prevent NULL pointer dereference in vsnprintf()</issue> <issue id="1224674" tracker="bnc">VUL-0: CVE-2024-35956: kernel: btrfs: qgroup: fix qgroup prealloc rsv leak in subvolume operations</issue> <issue id="1224677" tracker="bnc">VUL-0: CVE-2024-35958: kernel: net: ena: Fix incorrect descriptor free behavior</issue> <issue id="1224679" tracker="bnc">VUL-0: CVE-2024-35869: kernel: smb: client: guarantee refcounted children from parent session</issue> <issue id="1224696" tracker="bnc">VUL-0: CVE-2023-52670: kernel: rpmsg: virtio: Free driver_override when rpmsg_remove()</issue> <issue id="1224703" tracker="bnc">VUL-0: CVE-2024-35950: kernel: drm/client: Fully protect modes[] with dev->mode_config.mutex</issue> <issue id="1224712" tracker="bnc">VUL-0: CVE-2024-35790: kernel: usb: typec: altmodes/displayport: create sysfs nodes as driver's default device attribute group</issue> <issue id="1224716" tracker="bnc">VUL-0: CVE-2024-27432: kernel: net: ethernet: mtk_eth_soc: fix PPE hanging issue</issue> <issue id="1224719" tracker="bnc">VUL-0: CVE-2023-52658: kernel: Revert "net/mlx5: Block entering switchdev mode with ns inconsistency"</issue> <issue id="1224735" tracker="bnc">VUL-0: CVE-2024-35807: kernel: ext4: fix corruption during on-line resize</issue> <issue id="1224749" tracker="bnc">VUL-0: CVE-2024-35789: kernel: wifi: mac80211: check/clear fast rx for non-4addr sta VLAN changes</issue> <issue id="1224764" tracker="bnc">VUL-0: CVE-2024-35862: kernel: smb: client: fix potential UAF in smb2_is_network_name_deleted()</issue> <issue id="1224765" tracker="bnc">VUL-0: CVE-2024-35864: kernel: smb: client: fix potential UAF in smb2_is_valid_lease_break()</issue> <issue id="1224766" tracker="bnc">VUL-0: CVE-2024-35861: kernel: smb: client: fix potential UAF in cifs_signal_cifsd_for_reconnect()</issue> <issue id="1224935" tracker="bnc">VUL-0: CVE-2023-52837: kernel: nbd: fix uaf in nbd_open</issue> <issue id="1224946" tracker="bnc">VUL-0: CVE-2023-52784: kernel: bonding: stop the device in bond_setup_by_slave()</issue> <issue id="1224951" tracker="bnc">VUL-0: CVE-2023-52843: kernel: llc: verify mac len before reading mac header</issue> <issue id="1225050" tracker="bnc">VUL-0: CVE-2023-52869: kernel: pstore/platform: Add check for kstrdup</issue> <issue id="1225098" tracker="bnc">VUL-0: CVE-2023-52846: kernel: hsr: Prevent use after free in prp_create_tagged_frame()</issue> <issue id="1225105" tracker="bnc">VUL-0: CVE-2023-52787: kernel: blk-mq: make sure active queue usage is held for bio_integrity_prep()</issue> <issue id="1225300" tracker="bnc">[MI300A] Bug Fix in AMD Address translation support for MI300A</issue> <issue id="1225389" tracker="bnc">VUL-0: CVE-2021-47572: kernel: net: nexthop: fix null pointer dereference when IPv6 is not enabled</issue> <issue id="1225391" tracker="bnc">VUL-0: CVE-2021-47432: kernel: lib/generic-radix-tree.c: Don't overflow in peek()</issue> <issue id="1225419" tracker="bnc">L3-Question: SLES 15 SP5 : XFS File System Metadata corruption detected at xfs_sb_write_verify - ref:_00D1igLOd._500TrANplh:ref</issue> <issue id="1225426" tracker="bnc">VUL-0: CVE-2021-47515: kernel: seg6: fix the iif in the IPv6 socket control block</issue> <issue id="1225448" tracker="bnc">VUL-0: CVE-2021-47538: kernel: rxrpc: Fix rxrpc_local leak in rxrpc_lookup_peer()</issue> <issue id="1225452" tracker="bnc">VUL-0: CVE-2021-47539: kernel: rxrpc: Fix rxrpc_peer leak in rxrpc_look_up_bundle()</issue> <issue id="1225467" tracker="bnc">VUL-0: CVE-2021-47555: kernel: net: vlan: fix underflow for the real_dev refcnt</issue> <issue id="1225475" tracker="bnc">VUL-0: CVE-2023-52735: kernel: bpf, sockmap: Don't let sock_map_{close,destroy,unhash} call itself</issue> <issue id="1225484" tracker="bnc">VUL-0: CVE-2023-52737: kernel: btrfs: lock the inode in shared mode before starting fiemap</issue> <issue id="1225487" tracker="bnc">VUL-0: CVE-2023-52752: kernel: smb: client: fix use-after-free bug in cifs_debug_data_proc_show()</issue> <issue id="1225514" tracker="bnc">VUL-0: CVE-2021-47566: kernel: proc/vmcore: fix clearing user buffer by properly using clear_user()</issue> <issue id="1225518" tracker="bnc">VUL-0: CVE-2021-47571: kernel: staging: rtl8192e: fix use after free in _rtl92e_pci_disconnect()</issue> <issue id="1225535" tracker="bnc">Nvidia Grace: TPM: Account for SPI header when allocating TPM SPI xfer buffer</issue> <issue id="1225585" tracker="bnc">VUL-0: CVE-2023-52845: kernel: tipc: Change nla_policy for bearer-related names to NLA_NUL_STRING</issue> <issue id="1225602" tracker="bnc">VUL-0: CVE-2023-52835: kernel: perf/core: bail out early if the request AUX area is out of bound</issue> <issue id="1225611" tracker="bnc">VUL-0: CVE-2023-52881: kernel: tcp: do not accept ACK of bytes we never sent</issue> <issue id="1225681" tracker="bnc">VUL-0: CVE-2024-36017: kernel: rtnetlink: Correct nested IFLA_VF_VLAN_LIST attribute validation</issue> <issue id="1225692" tracker="bnc">VUL-0: CVE-2023-52882: kernel: clk: sunxi-ng: h6: Reparent CPUX during PLL CPUX rate change</issue> <issue id="1225698" tracker="bnc">VUL-0: CVE-2024-36020: kernel: i40e: fix vf may be used uninitialized in this function warning</issue> <issue id="1225699" tracker="bnc">VUL-0: CVE-2024-36021: kernel: net: hns3: fix kernel crash when devlink reload during pf initialization</issue> <issue id="1225704" tracker="bnc">VUL-0: CVE-2024-36025: kernel: scsi: qla2xxx: Fix off by one in qla_edif_app_getstats()</issue> <issue id="1225714" tracker="bnc">VUL-0: CVE-2024-36890: kernel: mm/slab: make __free(kfree) accept error pointers</issue> <issue id="1225726" tracker="bnc">VUL-0: CVE-2024-36900: kernel: net: hns3: fix kernel crash when devlink reload during initialization</issue> <issue id="1225732" tracker="bnc">VUL-0: CVE-2024-36904: kernel: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique().</issue> <issue id="1225737" tracker="bnc">VUL-0: CVE-2024-36899: kernel: gpiolib: cdev: Fix use after free in lineinfo_changed_notify</issue> <issue id="1225749" tracker="bnc">VUL-0: CVE-2024-36894: kernel: usb: gadget: f_fs: fix race between aio_cancel() and AIO request complete</issue> <issue id="1225758" tracker="bnc">VUL-0: CVE-2024-36915: kernel: nfc: llcp: fix nfc_llcp_setsockopt() unsafe copies</issue> <issue id="1225759" tracker="bnc">VUL-0: CVE-2024-36916: kernel: blk-iocost: avoid out of bounds shift</issue> <issue id="1225760" tracker="bnc">VUL-0: CVE-2024-36934: kernel: bna: ensure the copied buf is NUL terminated</issue> <issue id="1225767" tracker="bnc">VUL-0: CVE-2024-36919: kernel: scsi: bnx2fc: remove spin_lock_bh while releasing resources after upload</issue> <issue id="1225770" tracker="bnc">VUL-0: CVE-2024-36917: kernel: block: fix overflow in blk_ioctl_discard()</issue> <issue id="1225823" tracker="bnc">VUL-0: CVE-2024-36945: kernel: net/smc: fix neighbour and rtable leak in smc_ib_find_route()</issue> <issue id="1225834" tracker="bnc">VUL-0: CVE-2024-36937: kernel: xdp: use flags field to disambiguate broadcast redirect</issue> <issue id="1225840" tracker="bnc">VUL-0: CVE-2024-36940: kernel: pinctrl: core: delete incorrect free in pinctrl_enable()</issue> <issue id="1225866" tracker="bnc">VUL-0: CVE-2024-36964: kernel: fs/9p: only translate RWX permissions for plain 9P2000</issue> <issue id="1225872" tracker="bnc">VUL-0: CVE-2024-36960: kernel: drm/vmwgfx: fix invalid reads in fence signaled events</issue> <issue id="1225894" tracker="bnc">VUL-0: CVE-2024-36949: kernel: amd/amdkfd: sync all devices to wait all processes being evicted</issue> <issue id="1225945" tracker="bnc">Missing patches for btrfs in 15 SP6 kernel</issue> <issue id="1226022" tracker="bnc">L3: Backport of cephfs client fix addressing hangs [ref:_00D1igLOd._500TrBZugw:ref]</issue> <issue id="1226131" tracker="bnc">VUL-0: CVE-2024-36967: kernel: KEYS: trusted: Fix memory leak in tpm2_key_encode()</issue> <issue id="1226145" tracker="bnc">VUL-0: CVE-2024-36971: kernel: fix __dst_negative_advice() race</issue> <issue id="1226149" tracker="bnc">VUL-0: CVE-2024-36965: kernel: remoteproc: mediatek: Make sure IPI buffer fits in L2TCM</issue> <issue id="1226155" tracker="bnc">VUL-0: CVE-2024-36969: kernel: drm/amd/display: Fix division by zero in setup_dsc_config</issue> <issue id="1226211" tracker="bnc">kernel-obs-build missing network modules for Docker build</issue> <issue id="1226212" tracker="bnc">kernel-obs-build doesn't find "iso9660" when building containers with podman</issue> <issue id="1226226" tracker="bnc">L3: Backport request for commit b6a1f9a, "avoid infinite loop in pnfs_update_layout"</issue> <issue id="1226514" tracker="bnc">VUL-0: CVE-2024-36978: kernel: net: sched: sch_multiq: fix possible OOB write in multiq_tune()</issue> <issue id="1226520" tracker="bnc">VUL-0: CVE-2024-36975: kernel: KEYS: trusted: Do not use WARN when encode fails</issue> <issue id="1226537" tracker="bnc">VUL-0: CVE-2021-47576: kernel: scsi: scsi_debug: sanity check block descriptor length in resp_mode_select()</issue> <issue id="1226538" tracker="bnc">VUL-0: CVE-2021-47577: kernel: io-wq: check for wq exit after adding new worker task_work</issue> <issue id="1226539" tracker="bnc">VUL-0: CVE-2021-47578: kernel: scsi: scsi_debug: don't call kcalloc() if size arg is zero</issue> <issue id="1226550" tracker="bnc">VUL-0: CVE-2021-47580: kernel: scsi: scsi_debug: Fix type in min_t to avoid stack OOB</issue> <issue id="1226552" tracker="bnc">VUL-0: CVE-2021-47595: kernel: net/sched: sch_ets: don't remove idle classes from the round-robin list</issue> <issue id="1226553" tracker="bnc">VUL-0: CVE-2021-47597: kernel: inet_diag: fix kernel-infoleak for UDP sockets</issue> <issue id="1226554" tracker="bnc">VUL-0: CVE-2021-47602: kernel: mac80211: track only QoS data frames for admission control</issue> <issue id="1226556" tracker="bnc">VUL-0: CVE-2021-47585: kernel: btrfs: fix memory leak in __add_inode_ref()</issue> <issue id="1226557" tracker="bnc">VUL-0: CVE-2021-47589: kernel: igbvf: fix double free in `igbvf_probe`</issue> <issue id="1226558" tracker="bnc">VUL-0: CVE-2021-47596: kernel: net: hns3: fix use-after-free bug in hclgevf_send_mbx_msg</issue> <issue id="1226559" tracker="bnc">VUL-0: CVE-2021-47582: kernel: USB: core: Make do_proc_control() and do_proc_bulk() killable</issue> <issue id="1226561" tracker="bnc">VUL-0: CVE-2021-47586: kernel: net: stmmac: dwmac-rk: fix oob read in rk_gmac_setup</issue> <issue id="1226562" tracker="bnc">VUL-0: CVE-2021-47609: kernel: firmware: arm_scpi: Fix string overflow in SCPI genpd driver</issue> <issue id="1226563" tracker="bnc">VUL-0: CVE-2021-47583: kernel: media: mxl111sf: change mutex_init() location</issue> <issue id="1226564" tracker="bnc">VUL-0: CVE-2021-47584: kernel: iocost: Fix divide-by-zero on donation from low hweight cgroup</issue> <issue id="1226566" tracker="bnc">VUL-0: CVE-2021-47604: kernel: vduse: check that offset is within bounds in get_config()</issue> <issue id="1226567" tracker="bnc">VUL-0: CVE-2021-47587: kernel: net: systemport: Add global locking for descriptor lifecycle</issue> <issue id="1226569" tracker="bnc">VUL-0: CVE-2021-47608: kernel: bpf: Fix kernel address leakage in atomic fetch</issue> <issue id="1226572" tracker="bnc">VUL-0: CVE-2021-47592: kernel: net: stmmac: fix tc flower deletion for VLAN priority Rx steering</issue> <issue id="1226575" tracker="bnc">VUL-0: CVE-2021-47600: kernel: dm btree remove: fix use after free in rebalance_children()</issue> <issue id="1226576" tracker="bnc">VUL-0: CVE-2021-47601: kernel: tee: amdtee: fix an IS_ERR() vs NULL bug</issue> <issue id="1226577" tracker="bnc">VUL-0: CVE-2021-47603: kernel: audit: improve robustness of the audit queue handling</issue> <issue id="1226579" tracker="bnc">VUL-0: CVE-2021-47605: kernel: vduse: fix memory corruption in vduse_dev_ioctl()</issue> <issue id="1226580" tracker="bnc">VUL-0: CVE-2021-47607: kernel: bpf: Fix kernel address leakage in atomic cmpxchg's r0 aux reg</issue> <issue id="1226581" tracker="bnc">VUL-0: CVE-2021-47610: kernel: drm/msm: Fix null ptr access msm_ioctl_gem_submit()</issue> <issue id="1226582" tracker="bnc">VUL-0: CVE-2024-38540: kernel: bnxt_re: avoid shift undefined behavior in bnxt_qplib_alloc_init_hwq</issue> <issue id="1226583" tracker="bnc">VUL-0: CVE-2021-47611: kernel: mac80211: validate extended element ID is present</issue> <issue id="1226585" tracker="bnc">VUL-0: CVE-2021-47612: kernel: nfc: fix segfault in nfc_genl_dump_devices_done</issue> <issue id="1226587" tracker="bnc">VUL-0: CVE-2024-38541: kernel: of: module: add buffer overflow check in of_modalias()</issue> <issue id="1226588" tracker="bnc">cachefiles: remove requests from xarray during flushing requests</issue> <issue id="1226593" tracker="bnc">VUL-0: CVE-2024-38546: kernel: drm: vc4: Fix possible null pointer dereference</issue> <issue id="1226595" tracker="bnc">VUL-0: CVE-2024-38545: kernel: RDMA/hns: Fix UAF for cq async event</issue> <issue id="1226597" tracker="bnc">VUL-0: CVE-2024-38544: kernel: RDMA/rxe: fix seg fault in rxe_comp_queue_pkt</issue> <issue id="1226601" tracker="bnc">VUL-0: CVE-2021-47614: kernel: RDMA/irdma: Fix a user-after-free in add_pble_prm</issue> <issue id="1226602" tracker="bnc">VUL-0: CVE-2021-47615: kernel: RDMA/mlx5: Fix releasing unallocated memory in dereg MR flow</issue> <issue id="1226603" tracker="bnc">VUL-0: CVE-2021-47616: kernel: RDMA: Fix use-after-free in rxe_queue_cleanup</issue> <issue id="1226607" tracker="bnc">VUL-0: CVE-2024-38555: kernel: net/mlx5: Discard command completions in internal error</issue> <issue id="1226610" tracker="bnc">VUL-0: CVE-2024-38580: kernel: epoll: be better about file lifetimes</issue> <issue id="1226614" tracker="bnc">VUL-0: CVE-2021-47617: kernel: PCI: pciehp: Fix infinite loop in IRQ handler upon power fault</issue> <issue id="1226616" tracker="bnc">VUL-0: CVE-2022-48718: kernel: drm: mxsfb: Fix NULL pointer dereference</issue> <issue id="1226617" tracker="bnc">VUL-0: CVE-2022-48723: kernel: spi: uniphier: fix reference count leak in uniphier_spi_probe()</issue> <issue id="1226618" tracker="bnc">VUL-0: CVE-2022-48725: kernel: RDMA/siw: Fix refcounting leak in siw_create_qp()</issue> <issue id="1226619" tracker="bnc">VUL-0: CVE-2022-48722: kernel: net: ieee802154: ca8210: Stop leaking skb's</issue> <issue id="1226621" tracker="bnc">VUL-0: CVE-2022-48715: kernel: scsi: bnx2fc: Make bnx2fc_recv_frame() mp safe</issue> <issue id="1226622" tracker="bnc">VUL-0: CVE-2022-48714: kernel: bpf: Use VM_MAP instead of VM_ALLOC for ringbuf</issue> <issue id="1226624" tracker="bnc">VUL-0: CVE-2022-48724: kernel: iommu/vt-d: Fix potential memory leak in intel_setup_irq_remapping()</issue> <issue id="1226626" tracker="bnc">VUL-0: CVE-2022-48734: kernel: btrfs: fix deadlock between quota disable and qgroup rescan worker</issue> <issue id="1226628" tracker="bnc">VUL-0: CVE-2022-48763: kernel: KVM: x86: Forcibly leave nested virt when SMM state is toggled</issue> <issue id="1226629" tracker="bnc">VUL-0: CVE-2022-48769: kernel: efi: runtime: avoid EFIv2 runtime services on Apple x86 machines</issue> <issue id="1226632" tracker="bnc">VUL-0: CVE-2024-38547: kernel: media: atomisp: ssh_css: Fix a null-pointer dereference in load_video_binaries</issue> <issue id="1226633" tracker="bnc">VUL-0: CVE-2024-38550: kernel: ASoC: kirkwood: Fix potential NULL dereference</issue> <issue id="1226634" tracker="bnc">VUL-0: CVE-2024-38578: kernel: ecryptfs: fix buffer size for tag 66 packet</issue> <issue id="1226637" tracker="bnc">VUL-0: CVE-2024-38579: kernel: crypto: bcm - fix pointer arithmetic</issue> <issue id="1226643" tracker="bnc">VUL-0: CVE-2022-48747: kernel: block: fix wrong offset in bio_truncate()</issue> <issue id="1226644" tracker="bnc">VUL-0: CVE-2021-47618: kernel: ARM: 9170/1: fix panic when kasan and kprobe are enabled</issue> <issue id="1226645" tracker="bnc">VUL-0: CVE-2021-47619: kernel: i40e: Fix queues reservation for XDP</issue> <issue id="1226647" tracker="bnc">VUL-0: CVE-2022-48748: kernel: net: bridge: vlan: fix memory leak in __allowed_ingress</issue> <issue id="1226650" tracker="bnc">VUL-0: CVE-2022-48749: kernel: drm/msm/dpu: invalid parameter check in dpu_setup_dspp_pcc</issue> <issue id="1226653" tracker="bnc">VUL-0: CVE-2022-48751: kernel: net/smc: transitional solution for clcsock race issue</issue> <issue id="1226657" tracker="bnc">VUL-0: CVE-2024-38581: kernel: drm/amdgpu/mes: fix use-after-free issue</issue> <issue id="1226658" tracker="bnc">VUL-0: CVE-2024-38582: kernel: nilfs2: fix potential hang in nilfs_detach_log_writer()</issue> <issue id="1226669" tracker="bnc">VUL-0: CVE-2021-47620: kernel: Bluetooth: refactor malicious adv data check</issue> <issue id="1226670" tracker="bnc">VUL-0: CVE-2021-4439: kernel: isdn: cpai: check ctr->cnr to avoid array index out of bound</issue> <issue id="1226672" tracker="bnc">VUL-0: CVE-2022-48711: kernel: tipc: improve size validations for received domain records</issue> <issue id="1226673" tracker="bnc">VUL-0: CVE-2022-48712: kernel: ext4: fix error handling in ext4_fc_record_modified_inode()</issue> <issue id="1226674" tracker="bnc">VUL-0: CVE-2022-48738: kernel: ASoC: ops: Reject out of bounds values in snd_soc_put_volsw()</issue> <issue id="1226675" tracker="bnc">VUL-0: CVE-2022-48739: kernel: ASoC: hdmi-codec: Fix OOB memory accesses</issue> <issue id="1226678" tracker="bnc">VUL-0: CVE-2022-48716: kernel: ASoC: codecs: wcd938x: fix incorrect used of portid</issue> <issue id="1226679" tracker="bnc">VUL-0: CVE-2022-48717: kernel: ASoC: max9759: fix underflow in speaker_gain_control_put()</issue> <issue id="1226683" tracker="bnc">VUL-0: CVE-2022-48720: kernel: net: macsec: Fix offload support for NETDEV_UNREGISTER event</issue> <issue id="1226685" tracker="bnc">VUL-0: CVE-2022-48721: kernel: net/smc: Forward wakeup to smc socket waitqueue after fallback</issue> <issue id="1226686" tracker="bnc">VUL-0: CVE-2022-48726: kernel: RDMA/ucma: Protect mc during concurrent multicast leaves</issue> <issue id="1226690" tracker="bnc">VUL-0: CVE-2022-48727: kernel: KVM: arm64: Avoid consuming a stale esr value when SError occur</issue> <issue id="1226691" tracker="bnc">VUL-0: CVE-2022-48728: kernel: IB/hfi1: Fix AIP early init panic</issue> <issue id="1226692" tracker="bnc">VUL-0: CVE-2022-48754: kernel: phylib: fix potential use-after-free</issue> <issue id="1226693" tracker="bnc">VUL-0: CVE-2022-48753: kernel: block: fix memory leak in disk_register_independent_access_ranges</issue> <issue id="1226696" tracker="bnc">VUL-0: CVE-2022-48744: kernel: net/mlx5e: Avoid field-overflowing memcpy()</issue> <issue id="1226697" tracker="bnc">VUL-0: CVE-2022-48765: kernel: KVM: LAPIC: Also cancel preemption timer during SET_LAPIC</issue> <issue id="1226698" tracker="bnc">VUL-0: CVE-2022-48756: kernel: drm/msm/dsi: invalid parameter check in msm_dsi_phy_enable</issue> <issue id="1226699" tracker="bnc">VUL-0: CVE-2022-48740: kernel: selinux: fix double free of cond_list on error paths</issue> <issue id="1226701" tracker="bnc">VUL-0: CVE-2022-48761: kernel: usb: xhci-plat: fix crash when suspend if remote wake enable</issue> <issue id="1226702" tracker="bnc">VUL-0: CVE-2022-48745: kernel: net/mlx5: Use del_timer_sync in fw reset flow of halting poll</issue> <issue id="1226703" tracker="bnc">VUL-0: CVE-2022-48746: kernel: net/mlx5e: Fix handling of wrong devices during bond netevent</issue> <issue id="1226704" tracker="bnc">VUL-0: CVE-2022-48766: kernel: drm/amd/display: Wrap dcn301_calculate_wm_and_dlg for FPU.</issue> <issue id="1226705" tracker="bnc">VUL-0: CVE-2022-48743: kernel: net: amd-xgbe: Fix skb data length underflow</issue> <issue id="1226706" tracker="bnc">VUL-0: CVE-2022-48755: kernel: powerpc64/bpf: Limit 'ldbrx' to processors compliant with ISA v2.06</issue> <issue id="1226708" tracker="bnc">VUL-0: CVE-2022-48758: kernel: scsi: bnx2fc: Flush destroy_work queue before calling bnx2fc_interface_put()</issue> <issue id="1226709" tracker="bnc">VUL-0: CVE-2022-48752: kernel: powerpc/perf: Fix power_pmu_disable to call clear_pmi_irq_pending only if PMI is pending</issue> <issue id="1226710" tracker="bnc">VUL-0: CVE-2022-48729: kernel: IB/hfi1: Fix panic with larger ipoib send_queue_size</issue> <issue id="1226711" tracker="bnc">VUL-0: CVE-2022-48759: kernel: rpmsg: char: Fix race between the release of rpmsg_ctrldev and cdev</issue> <issue id="1226712" tracker="bnc">VUL-0: CVE-2022-48760: kernel: USB: core: Fix hang in usb_kill_urb by adding memory barriers</issue> <issue id="1226713" tracker="bnc">VUL-0: CVE-2022-48730: kernel: dma-buf: heaps: Fix potential spectre v1 gadget</issue> <issue id="1226715" tracker="bnc">VUL-0: CVE-2022-48767: kernel: ceph: properly put ceph_string reference after async create attempt</issue> <issue id="1226716" tracker="bnc">VUL-0: CVE-2022-48732: kernel: drm/nouveau: fix off by one in BIOS boundary checking</issue> <issue id="1226718" tracker="bnc">VUL-0: CVE-2022-48733: kernel: btrfs: fix use-after-free after failure to create a snapshot</issue> <issue id="1226719" tracker="bnc">VUL-0: CVE-2022-48735: kernel: ALSA: hda: Fix UAF of leds class devs at unbinding</issue> <issue id="1226720" tracker="bnc">VUL-0: CVE-2022-48768: kernel: tracing/histogram: Fix a potential memory leak for kstrdup()</issue> <issue id="1226721" tracker="bnc">VUL-0: REJECTED: CVE-2022-48736: kernel: ASoC: ops: Reject out of bounds values in snd_soc_put_xr_sx()</issue> <issue id="1226730" tracker="bnc">VUL-0: CVE-2022-48770: kernel: bpf: Guard against accessing NULL pt_regs in bpf_get_task_stack()</issue> <issue id="1226732" tracker="bnc">VUL-0: CVE-2022-48771: kernel: drm/vmwgfx: Fix stale file descriptors on failed usercopy</issue> <issue id="1226734" tracker="bnc">VUL-0: CVE-2024-38594: kernel: net: stmmac: move the EST lock to struct stmmac_priv</issue> <issue id="1226735" tracker="bnc">VUL-0: CVE-2024-38549: kernel: drm/mediatek: Add 0 size check to mtk_drm_gem_obj</issue> <issue id="1226737" tracker="bnc">VUL-0: CVE-2024-38571: kernel: thermal/drivers/tsens: Fix null pointer dereference</issue> <issue id="1226738" tracker="bnc">VUL-0: CVE-2024-38591: kernel: RDMA/hns: Fix deadlock on SRQ async events.</issue> <issue id="1226739" tracker="bnc">VUL-0: CVE-2024-38573: kernel: cppc_cpufreq: Fix possible null pointer dereference</issue> <issue id="1226740" tracker="bnc">VUL-0: CVE-2024-38605: kernel: ALSA: core: Fix NULL module pointer assignment at card init</issue> <issue id="1226744" tracker="bnc">VUL-0: CVE-2024-38553: kernel: net: fec: remove .ndo_poll_controller to avoid deadlocks</issue> <issue id="1226746" tracker="bnc">VUL-0: CVE-2024-38608: kernel: net/mlx5e: fix netif state handling</issue> <issue id="1226747" tracker="bnc">VUL-0: CVE-2024-38565: kernel: wifi: ar5523: enable proper endpoint verification</issue> <issue id="1226749" tracker="bnc">VUL-0: CVE-2024-38597: kernel: eth: sungem: remove .ndo_poll_controller to avoid deadlocks</issue> <issue id="1226754" tracker="bnc">VUL-0: CVE-2024-38618: kernel: ALSA: timer: Set lower bound of start tick time</issue> <issue id="1226762" tracker="bnc">VUL-0: REJECTED: CVE-2022-48737: kernel: ASoC: ops: Reject out of bounds values in snd_soc_put_volsw_sx()</issue> <issue id="1226764" tracker="bnc">VUL-0: CVE-2023-52884: kernel: Input: cyapa - add missing input core locking to suspend/resume functions</issue> <issue id="1226767" tracker="bnc">VUL-0: CVE-2024-38552: kernel: drm/amd/display: fix potential index out of bounds in color transformation function</issue> <issue id="1226768" tracker="bnc">VUL-0: CVE-2024-33619: kernel: efi: libstub: only free priv.runtime_map when allocated</issue> <issue id="1226769" tracker="bnc">VUL-0: CVE-2024-38567: kernel: wifi: carl9170: add a proper sanity check for endpoints</issue> <issue id="1226771" tracker="bnc">VUL-0: CVE-2024-38568: kernel: drivers/perf: hisi: hns3: Fix out-of-bound access when valid event group</issue> <issue id="1226774" tracker="bnc">VUL-0: CVE-2024-38556: kernel: net/mlx5: add a timeout to acquire the command queue semaphore</issue> <issue id="1226777" tracker="bnc">VUL-0: CVE-2024-38583: kernel: nilfs2: fix use-after-free of timer for log writer thread</issue> <issue id="1226780" tracker="bnc">VUL-0: CVE-2024-38587: kernel: speakup: Fix sizeof() vs ARRAY_SIZE() bug</issue> <issue id="1226781" tracker="bnc">VUL-0: CVE-2024-38557: kernel: net/mlx5: reload only IB representors upon lag disable/enable</issue> <issue id="1226785" tracker="bnc">VUL-0: CVE-2024-38559: kernel: scsi: qedf: ensure the copied buf is NUL terminated</issue> <issue id="1226786" tracker="bnc">VUL-0: CVE-2024-38560: kernel: scsi: bfa: ensure the copied buf is NUL terminated</issue> <issue id="1226789" tracker="bnc">VUL-0: CVE-2024-38564: kernel: bpf: add BPF_PROG_TYPE_CGROUP_SKB attach type enforcement in BPF_LINK_CREATE</issue> <issue id="1226791" tracker="bnc">sched/core: Fix incorrect initialization of the 'burst' parameter in cpu_max_write()</issue> <issue id="1226839" tracker="bnc">VUL-0: CVE-2024-38590: kernel: RDMA/hns: Modify the print level of CQE error</issue> <issue id="1226840" tracker="bnc">VUL-0: CVE-2024-36477: kernel: tpm_tis_spi: Account for SPI header when allocating TPM SPI xfer buffer</issue> <issue id="1226841" tracker="bnc">VUL-0: CVE-2024-36478: kernel: null_blk: fix null-ptr-dereference while configuring 'power' and 'submit_queues'</issue> <issue id="1226842" tracker="bnc">VUL-0: CVE-2024-38603: kernel: drivers/perf: hisi: hns3: Actually use devm_add_action_or_reset()</issue> <issue id="1226848" tracker="bnc">VUL-0: CVE-2024-38599: kernel: jffs2: prevent xattr node from overflowing the eraseblock</issue> <issue id="1226852" tracker="bnc">VUL-0: CVE-2024-38616: kernel: wifi: carl9170: re-fix fortified-memset warning</issue> <issue id="1226857" tracker="bnc">VUL-0: CVE-2024-38627: kernel: stm class: Fix a double free in stm_register_device()</issue> <issue id="1226861" tracker="bnc">VUL-0: CVE-2024-38619: kernel: usb-storage: alauda: Check whether the media is initialized</issue> <issue id="1226863" tracker="bnc">VUL-0: CVE-2024-38635: kernel: soundwire: cadence: fix invalid PDI offset</issue> <issue id="1226864" tracker="bnc">VUL-0: CVE-2024-38600: kernel: ALSA: fix deadlocks with kctl removals at disconnection</issue> <issue id="1226867" tracker="bnc">VUL-0: CVE-2024-38633: kernel: serial: max3100: Update uart_driver_registered on driver removal</issue> <issue id="1226868" tracker="bnc">VUL-0: CVE-2024-38634: kernel: serial: max3100: Lock port->lock when calling uart_handle_cts_change()</issue> <issue id="1226876" tracker="bnc">VUL-0: CVE-2024-38601: kernel: ring-buffer: fix a race between readers and resize checks</issue> <issue id="1226878" tracker="bnc">VUL-0: CVE-2024-38381: kernel: nfc: nci: Fix uninit-value in nci_rx_work</issue> <issue id="1226883" tracker="bnc">VUL-0: CVE-2024-38659: kernel: enic: validate length of nl attributes in enic_set_vf_port</issue> <issue id="1226886" tracker="bnc">VUL-0: CVE-2024-38780: kernel: dma-buf/sw-sync: don't enable IRQ from sync_print_obj()</issue> <issue id="1226890" tracker="bnc">VUL-0: CVE-2024-38388: kernel: ALSA: hda/cs_dsp_ctl: Use private_free for control cleanup</issue> <issue id="1226891" tracker="bnc">VUL-0: CVE-2024-38390: kernel: drm/msm/a6xx: Avoid a nullptr dereference when speedbin setting fails</issue> <issue id="1226895" tracker="bnc">VUL-0: CVE-2024-38621: kernel: media: stk1160: fix bounds checking in stk1160_copy_video()</issue> <issue id="1226908" tracker="bnc">VUL-0: CVE-2024-38630: kernel: watchdog: cpu5wdt.c: fix use-after-free bug caused by cpu5wdt_trigger</issue> <issue id="1226915" tracker="bnc">Backport arm64: Update saved buffers with latest ASPM</issue> <issue id="1226928" tracker="bnc">Backport arm64: pci: clear Secondary Status errors after enumeration</issue> <issue id="1226948" tracker="bnc">VUL-0: CVE-2024-35247: kernel: fpga: region: add owner module and take its refcount</issue> <issue id="1226949" tracker="bnc">VUL-0: CVE-2024-36479: kernel: fpga: bridge: add owner module and take its refcount</issue> <issue id="1226950" tracker="bnc">VUL-0: CVE-2024-37021: kernel: fpga: manager: add owner module and take its refcount</issue> <issue id="1226953" tracker="bnc">[CC][GPOS][SLEM] kernel: disable CONFIG_RANDOM_TRUST_BOOTLOADER</issue> <issue id="1226962" tracker="bnc">TSC clocksource spuriously declared invalid in 12+ socket Sapphire Rapids systems</issue> <issue id="1226976" tracker="bnc">VUL-0: CVE-2022-48772: kernel: media: lgdt3306a: add a check against null-pointer-def</issue> <issue id="1226992" tracker="bnc">VUL-0: CVE-2024-39469: kernel: nilfs2: fix nilfs_empty_dir() misjudgment and long loop on I/O errors</issue> <issue id="1226994" tracker="bnc">VUL-0: CVE-2024-39301: kernel: net/9p: fix uninit-value in p9_client_rpc()</issue> <issue id="1226996" tracker="bnc">VUL-0: CVE-2024-38661: kernel: s390/ap: Fix crash in AP internal function modify_bitmap()</issue> <issue id="1227066" tracker="bnc">VUL-0: CVE-2024-37078: kernel: nilfs2: fix potential kernel bug due to lack of writeback flag waiting</issue> <issue id="1227096" tracker="bnc">VUL-0: CVE-2024-39471: kernel: drm/amdgpu: add error handle to avoid out-of-bounds</issue> <issue id="1227101" tracker="bnc">VUL-0: CVE-2024-37354: kernel: btrfs: fix crash on racing fsync and size-extending write into prealloc</issue> <issue id="1227103" tracker="bnc">VUL-0: CVE-2024-39468: kernel: smb: client: fix deadlock in smb2_find_smb_tcon()</issue> <issue id="1227274" tracker="bnc">[SLE15-SP5] link-vmlinux.sh does not have is_enabled() defined</issue> <issue id="2021-4439" tracker="cve" /> <issue id="2021-47089" tracker="cve" /> <issue id="2021-47432" tracker="cve" /> <issue id="2021-47515" tracker="cve" /> <issue id="2021-47534" tracker="cve" /> <issue id="2021-47538" tracker="cve" /> <issue id="2021-47539" tracker="cve" /> <issue id="2021-47555" tracker="cve" /> <issue id="2021-47566" tracker="cve" /> <issue id="2021-47571" tracker="cve" /> <issue id="2021-47572" tracker="cve" /> <issue id="2021-47576" tracker="cve" /> <issue id="2021-47577" tracker="cve" /> <issue id="2021-47578" tracker="cve" /> <issue id="2021-47580" tracker="cve" /> <issue id="2021-47582" tracker="cve" /> <issue id="2021-47583" tracker="cve" /> <issue id="2021-47584" tracker="cve" /> <issue id="2021-47585" tracker="cve" /> <issue id="2021-47586" tracker="cve" /> <issue id="2021-47587" tracker="cve" /> <issue id="2021-47589" tracker="cve" /> <issue id="2021-47592" tracker="cve" /> <issue id="2021-47595" tracker="cve" /> <issue id="2021-47596" tracker="cve" /> <issue id="2021-47597" tracker="cve" /> <issue id="2021-47600" tracker="cve" /> <issue id="2021-47601" tracker="cve" /> <issue id="2021-47602" tracker="cve" /> <issue id="2021-47603" tracker="cve" /> <issue id="2021-47604" tracker="cve" /> <issue id="2021-47605" tracker="cve" /> <issue id="2021-47607" tracker="cve" /> <issue id="2021-47608" tracker="cve" /> <issue id="2021-47609" tracker="cve" /> <issue id="2021-47610" tracker="cve" /> <issue id="2021-47611" tracker="cve" /> <issue id="2021-47612" tracker="cve" /> <issue id="2021-47614" tracker="cve" /> <issue id="2021-47615" tracker="cve" /> <issue id="2021-47616" tracker="cve" /> <issue id="2021-47617" tracker="cve" /> <issue id="2021-47618" tracker="cve" /> <issue id="2021-47619" tracker="cve" /> <issue id="2021-47620" tracker="cve" /> <issue id="2022-48711" tracker="cve" /> <issue id="2022-48712" tracker="cve" /> <issue id="2022-48713" tracker="cve" /> <issue id="2022-48714" tracker="cve" /> <issue id="2022-48715" tracker="cve" /> <issue id="2022-48716" tracker="cve" /> <issue id="2022-48717" tracker="cve" /> <issue id="2022-48718" tracker="cve" /> <issue id="2022-48720" tracker="cve" /> <issue id="2022-48721" tracker="cve" /> <issue id="2022-48722" tracker="cve" /> <issue id="2022-48723" tracker="cve" /> <issue id="2022-48724" tracker="cve" /> <issue id="2022-48725" tracker="cve" /> <issue id="2022-48726" tracker="cve" /> <issue id="2022-48727" tracker="cve" /> <issue id="2022-48728" tracker="cve" /> <issue id="2022-48729" tracker="cve" /> <issue id="2022-48730" tracker="cve" /> <issue id="2022-48732" tracker="cve" /> <issue id="2022-48733" tracker="cve" /> <issue id="2022-48734" tracker="cve" /> <issue id="2022-48735" tracker="cve" /> <issue id="2022-48736" tracker="cve" /> <issue id="2022-48737" tracker="cve" /> <issue id="2022-48738" tracker="cve" /> <issue id="2022-48739" tracker="cve" /> <issue id="2022-48740" tracker="cve" /> <issue id="2022-48743" tracker="cve" /> <issue id="2022-48744" tracker="cve" /> <issue id="2022-48745" tracker="cve" /> <issue id="2022-48746" tracker="cve" /> <issue id="2022-48747" tracker="cve" /> <issue id="2022-48748" tracker="cve" /> <issue id="2022-48749" tracker="cve" /> <issue id="2022-48751" tracker="cve" /> <issue id="2022-48752" tracker="cve" /> <issue id="2022-48753" tracker="cve" /> <issue id="2022-48754" tracker="cve" /> <issue id="2022-48755" tracker="cve" /> <issue id="2022-48756" tracker="cve" /> <issue id="2022-48758" tracker="cve" /> <issue id="2022-48759" tracker="cve" /> <issue id="2022-48760" tracker="cve" /> <issue id="2022-48761" tracker="cve" /> <issue id="2022-48763" tracker="cve" /> <issue id="2022-48765" tracker="cve" /> <issue id="2022-48766" tracker="cve" /> <issue id="2022-48767" tracker="cve" /> <issue id="2022-48768" tracker="cve" /> <issue id="2022-48769" tracker="cve" /> <issue id="2022-48770" tracker="cve" /> <issue id="2022-48771" tracker="cve" /> <issue id="2022-48772" tracker="cve" /> <issue id="2023-24023" tracker="cve" /> <issue id="2023-52622" tracker="cve" /> <issue id="2023-52658" tracker="cve" /> <issue id="2023-52667" tracker="cve" /> <issue id="2023-52670" tracker="cve" /> <issue id="2023-52672" tracker="cve" /> <issue id="2023-52675" tracker="cve" /> <issue id="2023-52735" tracker="cve" /> <issue id="2023-52737" tracker="cve" /> <issue id="2023-52752" tracker="cve" /> <issue id="2023-52766" tracker="cve" /> <issue id="2023-52784" tracker="cve" /> <issue id="2023-52787" tracker="cve" /> <issue id="2023-52800" tracker="cve" /> <issue id="2023-52835" tracker="cve" /> <issue id="2023-52837" tracker="cve" /> <issue id="2023-52843" tracker="cve" /> <issue id="2023-52845" tracker="cve" /> <issue id="2023-52846" tracker="cve" /> <issue id="2023-52869" tracker="cve" /> <issue id="2023-52881" tracker="cve" /> <issue id="2023-52882" tracker="cve" /> <issue id="2023-52884" tracker="cve" /> <issue id="2024-26625" tracker="cve" /> <issue id="2024-26644" tracker="cve" /> <issue id="2024-26720" tracker="cve" /> <issue id="2024-26842" tracker="cve" /> <issue id="2024-26845" tracker="cve" /> <issue id="2024-26923" tracker="cve" /> <issue id="2024-26973" tracker="cve" /> <issue id="2024-27432" tracker="cve" /> <issue id="2024-33619" tracker="cve" /> <issue id="2024-35247" tracker="cve" /> <issue id="2024-35789" tracker="cve" /> <issue id="2024-35790" tracker="cve" /> <issue id="2024-35807" tracker="cve" /> <issue id="2024-35814" tracker="cve" /> <issue id="2024-35835" tracker="cve" /> <issue id="2024-35848" tracker="cve" /> <issue id="2024-35857" tracker="cve" /> <issue id="2024-35861" tracker="cve" /> <issue id="2024-35862" tracker="cve" /> <issue id="2024-35864" tracker="cve" /> <issue id="2024-35869" tracker="cve" /> <issue id="2024-35878" tracker="cve" /> <issue id="2024-35884" tracker="cve" /> <issue id="2024-35886" tracker="cve" /> <issue id="2024-35896" tracker="cve" /> <issue id="2024-35898" tracker="cve" /> <issue id="2024-35900" tracker="cve" /> <issue id="2024-35905" tracker="cve" /> <issue id="2024-35925" tracker="cve" /> <issue id="2024-35950" tracker="cve" /> <issue id="2024-35956" tracker="cve" /> <issue id="2024-35958" tracker="cve" /> <issue id="2024-35960" tracker="cve" /> <issue id="2024-35962" tracker="cve" /> <issue id="2024-35997" tracker="cve" /> <issue id="2024-36005" tracker="cve" /> <issue id="2024-36008" tracker="cve" /> <issue id="2024-36017" tracker="cve" /> <issue id="2024-36020" tracker="cve" /> <issue id="2024-36021" tracker="cve" /> <issue id="2024-36025" tracker="cve" /> <issue id="2024-36477" tracker="cve" /> <issue id="2024-36478" tracker="cve" /> <issue id="2024-36479" tracker="cve" /> <issue id="2024-36890" tracker="cve" /> <issue id="2024-36894" tracker="cve" /> <issue id="2024-36899" tracker="cve" /> <issue id="2024-36900" tracker="cve" /> <issue id="2024-36904" tracker="cve" /> <issue id="2024-36915" tracker="cve" /> <issue id="2024-36916" tracker="cve" /> <issue id="2024-36917" tracker="cve" /> <issue id="2024-36919" tracker="cve" /> <issue id="2024-36934" tracker="cve" /> <issue id="2024-36937" tracker="cve" /> <issue id="2024-36940" tracker="cve" /> <issue id="2024-36945" tracker="cve" /> <issue id="2024-36949" tracker="cve" /> <issue id="2024-36960" tracker="cve" /> <issue id="2024-36964" tracker="cve" /> <issue id="2024-36965" tracker="cve" /> <issue id="2024-36967" tracker="cve" /> <issue id="2024-36969" tracker="cve" /> <issue id="2024-36971" tracker="cve" /> <issue id="2024-36975" tracker="cve" /> <issue id="2024-36978" tracker="cve" /> <issue id="2024-37021" tracker="cve" /> <issue id="2024-37078" tracker="cve" /> <issue id="2024-37354" tracker="cve" /> <issue id="2024-38381" tracker="cve" /> <issue id="2024-38388" tracker="cve" /> <issue id="2024-38390" tracker="cve" /> <issue id="2024-38540" tracker="cve" /> <issue id="2024-38541" tracker="cve" /> <issue id="2024-38544" tracker="cve" /> <issue id="2024-38545" tracker="cve" /> <issue id="2024-38546" tracker="cve" /> <issue id="2024-38547" tracker="cve" /> <issue id="2024-38548" tracker="cve" /> <issue id="2024-38549" tracker="cve" /> <issue id="2024-38550" tracker="cve" /> <issue id="2024-38552" tracker="cve" /> <issue id="2024-38553" tracker="cve" /> <issue id="2024-38555" tracker="cve" /> <issue id="2024-38556" tracker="cve" /> <issue id="2024-38557" tracker="cve" /> <issue id="2024-38559" tracker="cve" /> <issue id="2024-38560" tracker="cve" /> <issue id="2024-38564" tracker="cve" /> <issue id="2024-38565" tracker="cve" /> <issue id="2024-38567" tracker="cve" /> <issue id="2024-38568" tracker="cve" /> <issue id="2024-38571" tracker="cve" /> <issue id="2024-38573" tracker="cve" /> <issue id="2024-38578" tracker="cve" /> <issue id="2024-38579" tracker="cve" /> <issue id="2024-38580" tracker="cve" /> <issue id="2024-38581" tracker="cve" /> <issue id="2024-38582" tracker="cve" /> <issue id="2024-38583" tracker="cve" /> <issue id="2024-38587" tracker="cve" /> <issue id="2024-38590" tracker="cve" /> <issue id="2024-38591" tracker="cve" /> <issue id="2024-38594" tracker="cve" /> <issue id="2024-38597" tracker="cve" /> <issue id="2024-38599" tracker="cve" /> <issue id="2024-38600" tracker="cve" /> <issue id="2024-38601" tracker="cve" /> <issue id="2024-38603" tracker="cve" /> <issue id="2024-38605" tracker="cve" /> <issue id="2024-38608" tracker="cve" /> <issue id="2024-38616" tracker="cve" /> <issue id="2024-38618" tracker="cve" /> <issue id="2024-38619" tracker="cve" /> <issue id="2024-38621" tracker="cve" /> <issue id="2024-38627" tracker="cve" /> <issue id="2024-38630" tracker="cve" /> <issue id="2024-38633" tracker="cve" /> <issue id="2024-38634" tracker="cve" /> <issue id="2024-38635" tracker="cve" /> <issue id="2024-38659" tracker="cve" /> <issue id="2024-38661" tracker="cve" /> <issue id="2024-38780" tracker="cve" /> <issue id="2024-39301" tracker="cve" /> <issue id="2024-39468" tracker="cve" /> <issue id="2024-39469" tracker="cve" /> <issue id="2024-39471" tracker="cve" /> <issue id="PED-8491" tracker="jsc" /> <issue id="PED-8570" tracker="jsc" /> <issue id="PED-8690" tracker="jsc" /> <category>security</category> <rating>important</rating> <packager>olh</packager> <reboot_needed/> <description> The SUSE Linux Enterprise 15 SP5 Azure kernel was updated to receive various security bugfixes. The following security bugs were fixed: - CVE-2021-47089: kfence: fix memory leak when cat kfence objects (bsc#1220958. - CVE-2021-47432: lib/generic-radix-tree.c: Do not overflow in peek() (bsc#1225391). - CVE-2021-47515: seg6: fix the iif in the IPv6 socket control block (bsc#1225426). - CVE-2021-47538: rxrpc: Fix rxrpc_local leak in rxrpc_lookup_peer() (bsc#1225448). - CVE-2021-47539: rxrpc: Fix rxrpc_peer leak in rxrpc_look_up_bundle() (bsc#1225452). - CVE-2021-47555: net: vlan: fix underflow for the real_dev refcnt (bsc#1225467). - CVE-2021-47566: Fix clearing user buffer by properly using clear_user() (bsc#1225514). - CVE-2021-47571: staging: rtl8192e: Fix use after free in _rtl92e_pci_disconnect() (bsc#1225518). - CVE-2021-47572: net: nexthop: fix null pointer dereference when IPv6 is not enabled (bsc#1225389). - CVE-2022-48716: ASoC: codecs: wcd938x: fix incorrect used of portid (bsc#1226678). - CVE-2023-24023: Bluetooth: Add more enc key size check (bsc#1218148). - CVE-2023-52622: ext4: avoid online resizing failures due to oversized flex bg (bsc#1222080). - CVE-2023-52658: Revert "net/mlx5: Block entering switchdev mode with ns inconsistency" (bsc#1224719). - CVE-2023-52667: net/mlx5e: fix a potential double-free in fs_any_create_groups (bsc#1224603). - CVE-2023-52670: rpmsg: virtio: Free driver_override when rpmsg_remove() (bsc#1224696). - CVE-2023-52672: pipe: wakeup wr_wait after setting max_usage (bsc#1224614). - CVE-2023-52675: powerpc/imc-pmu: Add a null pointer check in update_events_in_group() (bsc#1224504). - CVE-2023-52735: bpf, sockmap: Don't let sock_map_{close,destroy,unhash} call itself (bsc#1225475). - CVE-2023-52737: btrfs: lock the inode in shared mode before starting fiemap (bsc#1225484). - CVE-2023-52752: smb: client: fix use-after-free bug in cifs_debug_data_proc_show() (bsc#1225487). - CVE-2023-52784: bonding: stop the device in bond_setup_by_slave() (bsc#1224946). - CVE-2023-52787: blk-mq: make sure active queue usage is held for bio_integrity_prep() (bsc#1225105). - CVE-2023-52835: perf/core: Bail out early if the request AUX area is out of bound (bsc#1225602). - CVE-2023-52837: nbd: fix uaf in nbd_open (bsc#1224935). - CVE-2023-52843: llc: verify mac len before reading mac header (bsc#1224951). - CVE-2023-52845: tipc: Change nla_policy for bearer-related names to NLA_NUL_STRING (bsc#1225585). - CVE-2023-52846: hsr: Prevent use after free in prp_create_tagged_frame() (bsc#1225098). - CVE-2023-52869: pstore/platform: Add check for kstrdup (bsc#1225050). - CVE-2023-52881: tcp: do not accept ACK of bytes we never sent (bsc#1225611). - CVE-2023-52882: clk: sunxi-ng: h6: Reparent CPUX during PLL CPUX rate change (bsc#1225692). - CVE-2024-26625: Call sock_orphan() at release time (bsc#1221086) - CVE-2024-26644: btrfs: do not abort filesystem when attempting to snapshot deleted subvolume (bsc#1221282bsc#1222072). - CVE-2024-26720: mm: Avoid overflows in dirty throttling logic (bsc#1222364). - CVE-2024-26923: Fixed false-positive lockdep splat for spin_lock() in __unix_gc() (bsc#1223384). - CVE-2024-26973: fat: fix uninitialized field in nostale filehandles (git-fixesbsc#1223641). - CVE-2024-27432: net: ethernet: mtk_eth_soc: fix PPE hanging issue (bsc#1224716). - CVE-2024-35247: fpga: region: add owner module and take its refcount (bsc#1226948). - CVE-2024-35789: Check fast rx for non-4addr sta VLAN changes (bsc#1224749). - CVE-2024-35790: usb: typec: altmodes/displayport: create sysfs nodes as driver's default device attribute group (bsc#1224712). - CVE-2024-35807: ext4: fix corruption during on-line resize (bsc#1224735). - CVE-2024-35835: net/mlx5e: fix a double-free in arfs_create_groups (bsc#1224605). - CVE-2024-35848: eeprom: at24: fix memory corruption race condition (bsc#1224612). - CVE-2024-35857: icmp: prevent possible NULL dereferences from icmp_build_probe() (bsc#1224619). - CVE-2024-35861: Fixed potential UAF in cifs_signal_cifsd_for_reconnect() (bsc#1224766). - CVE-2024-35862: Fixed potential UAF in smb2_is_network_name_deleted() (bsc#1224764). - CVE-2024-35864: Fixed potential UAF in smb2_is_valid_lease_break() (bsc#1224765). - CVE-2024-35869: smb: client: guarantee refcounted children from parent session (bsc#1224679). - CVE-2024-35884: udp: do not accept non-tunnel GSO skbs landing in a tunnel (bsc#1224520). - CVE-2024-35886: ipv6: Fix infinite recursion in fib6_dump_done() (bsc#1224670). - CVE-2024-35898: netfilter: nf_tables: Fix potential data-race in __nft_flowtable_type_get() (bsc#1224498). - CVE-2024-35900: netfilter: nf_tables: reject new basechain after table flag update (bsc#1224497). - CVE-2024-35925: block: prevent division by zero in blk_rq_stat_sum() (bsc#1224661). - CVE-2024-35950: drm/client: Fully protect modes with dev->mode_config.mutex (bsc#1224703). - CVE-2024-35958: net: ena: Fix incorrect descriptor free behavior (bsc#1224677). - CVE-2024-35960: net/mlx5: Properly link new fs rules into the tree (bsc#1224588). - CVE-2024-35997: Remove I2C_HID_READ_PENDING flag to prevent lock-up (bsc#1224552). - CVE-2024-36005: netfilter: nf_tables: honor table dormant flag from netdev release event path (bsc#1224539). - CVE-2024-36008: ipv4: check for NULL idev in ip_route_use_hint() (bsc#1224540). - CVE-2024-36017: rtnetlink: Correct nested IFLA_VF_VLAN_LIST attribute validation (bsc#1225681). - CVE-2024-36020: i40e: fix vf may be used uninitialized in this function warning (bsc#1225698). - CVE-2024-36021: net: hns3: fix kernel crash when devlink reload during pf initialization (bsc#1225699). - CVE-2024-36478: null_blk: fix null-ptr-dereference while configuring 'power' and 'submit_queues' (bsc#1226841). - CVE-2024-36479: fpga: bridge: add owner module and take its refcount (bsc#1226949). - CVE-2024-36890: mm/slab: make __free(kfree) accept error pointers (bsc#1225714). - CVE-2024-36894: usb: gadget: f_fs: Fix race between aio_cancel() and AIO request complete (bsc#1225749). - CVE-2024-36899: gpiolib: cdev: Fix use after free in lineinfo_changed_notify (bsc#1225737). - CVE-2024-36900: net: hns3: fix kernel crash when devlink reload during initialization (bsc#1225726). - CVE-2024-36904: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique() (bsc#1225732). - CVE-2024-36915: nfc: llcp: fix nfc_llcp_setsockopt() unsafe copies (bsc#1225758). - CVE-2024-36916: blk-iocost: avoid out of bounds shift (bsc#1225759). - CVE-2024-36917: block: fix overflow in blk_ioctl_discard() (bsc#1225770). - CVE-2024-36919: scsi: bnx2fc: Remove spin_lock_bh while releasing resources after upload (bsc#1225767). - CVE-2024-36934: bna: ensure the copied buf is NUL terminated (bsc#1225760). - CVE-2024-36937: xdp: use flags field to disambiguate broadcast redirect (bsc#1225834). - CVE-2024-36940: pinctrl: core: delete incorrect free in pinctrl_enable() (bsc#1225840). - CVE-2024-36945: net/smc: fix neighbour and rtable leak in smc_ib_find_route() (bsc#1225823). - CVE-2024-36949: amd/amdkfd: sync all devices to wait all processes being evicted (bsc#1225872) - CVE-2024-36964: fs/9p: only translate RWX permissions for plain 9P2000 (bsc#1225866). - CVE-2024-36971: net: fix __dst_negative_advice() race (bsc#1226145). - CVE-2024-36978: net: sched: sch_multiq: fix possible OOB write in multiq_tune() (bsc#1226514). - CVE-2024-37021: fpga: manager: add owner module and take its refcount (bsc#1226950). - CVE-2024-37078: nilfs2: fix potential kernel bug due to lack of writeback flag waiting (bsc#1227066). - CVE-2024-37354: btrfs: fix crash on racing fsync and size-extending write into prealloc (bsc#1227101). - CVE-2024-38545: RDMA/hns: Fix UAF for cq async event (bsc#1226595). - CVE-2024-38553: net: fec: remove .ndo_poll_controller to avoid deadlock (bsc#1226744). - CVE-2024-38555: net/mlx5: Discard command completions in internal error (bsc#1226607). - CVE-2024-38556: net/mlx5: Add a timeout to acquire the command queue semaphore (bsc#1226774). - CVE-2024-38557: net/mlx5: Reload only IB representors upon lag disable/enable (bsc#1226781). - CVE-2024-38559: scsi: qedf: Ensure the copied buf is NUL terminated (bsc#1226785). - CVE-2024-38560: scsi: bfa: Ensure the copied buf is NUL terminated (bsc#1226786). - CVE-2024-38564: bpf: Add BPF_PROG_TYPE_CGROUP_SKB attach type enforcement in BPF_LINK_CREATE (bsc#1226789). - CVE-2024-38568: drivers/perf: hisi: hns3: Fix out-of-bound access when valid event group (bsc#1226771). - CVE-2024-38578: ecryptfs: Fix buffer size for tag 66 packet (bsc#1226634,). - CVE-2024-38580: epoll: be better about file lifetimes (bsc#1226610). - CVE-2024-38594: net: stmmac: move the EST lock to struct stmmac_priv (bsc#1226734). - CVE-2024-38597: eth: sungem: remove .ndo_poll_controller to avoid deadlocks (bsc#1226749). - CVE-2024-38603: drivers/perf: hisi: hns3: Actually use devm_add_action_or_reset() (bsc#1226842). - CVE-2024-38608: net/mlx5e: Fix netif state handling (bsc#1226746). - CVE-2024-38627: stm class: Fix a double free in stm_register_device() (bsc#1226857). - CVE-2024-38659: enic: Validate length of nl attributes in enic_set_vf_port (bsc#1226883). - CVE-2024-38661: s390/ap: Fix crash in AP internal function modify_bitmap() (bsc#1226996). - CVE-2024-38780: dma-buf/sw-sync: do not enable IRQ from sync_print_obj() (bsc#1226886). - CVE-2024-39301: net/9p: fix uninit-value in p9_client_rpc() (bsc#1226994). - CVE-2024-39468: smb: client: fix deadlock in smb2_find_smb_tcon() (bsc#1227103. - CVE-2024-39469: nilfs2: fix nilfs_empty_dir() misjudgment and long loop on I/O errors (bsc#1226992). The following non-security bugs were fixed: - ACPI: resource: Do IRQ override on TongFang GXxHRXx and GMxHGxx (stable-fixes). - ACPICA: Revert "ACPICA: avoid Info: mapping multiple BARs. Your kernel is fine." (git-fixes). - ALSA/hda: intel-dsp-config: Document AVS as dsp_driver option (git-fixes). - ALSA: Fix deadlocks with kctl removals at disconnection (stable-fixes). - ALSA: hda/realtek: Add quirks for Lenovo 13X (stable-fixes). - ALSA: hda/realtek: Adjust G814JZR to use SPI init for amp (git-fixes). - ALSA: hda/realtek: Enable headset mic on IdeaPad 330-17IKB 81DM (git-fixes). - ALSA: hda/realtek: Fix conflicting quirk for PCI SSID 17aa:3820 (git-fixes). - ALSA: hda/realtek: Limit mic boost on N14AP7 (stable-fixes). - ALSA: hda/realtek: Remove Framework Laptop 16 from quirks (git-fixes). - ALSA: hda/realtek: fix mute/micmute LEDs do not work for ProBook 440/460 G11 (stable-fixes). - ALSA: hda/realtek: fix mute/micmute LEDs do not work for ProBook 445/465 G11 (stable-fixes). - ALSA: hda: intel-dsp-config: harden I2C/I2S codec detection (stable-fixes). - ALSA: timer: Set lower bound of start tick time (stable-fixes). - ASoC: amd: acp: add a null check for chip_pdev structure (git-fixes). - ASoC: amd: acp: remove i2s configuration check in acp_i2s_probe() (git-fixes). - ASoC: da7219-aad: fix usage of device_get_named_child_node() (stable-fixes). - ASoC: fsl-asoc-card: set priv->pdev before using it (git-fixes). - ASoC: rt5645: Fix the electric noise due to the CBJ contacts floating (stable-fixes). - ASoC: rt715-sdca: volume step modification (stable-fixes). - ASoC: rt715: add vendor clear control register (stable-fixes). - Add remote for nfs maintainer - Bluetooth: L2CAP: Fix rejecting L2CAP_CONN_PARAM_UPDATE_REQ (git-fixes). - Fix new build warnings regarding unused variables: Changed build warnings: ***** 2 warnings ***** * unused-variable (cl) in ../fs/ceph/mds_client.c in ceph_queue_cap_unlink_work ../fs/ceph/mds_client.c: In function 'ceph_queue_cap_unlink_work': ../fs/ceph/mds_client.c:2421:22: warning: unused variable 'cl' [-Wunused-variable] * unused-variable (cl) in ../fs/ceph/mds_client.c in ceph_cap_unlink_work ../fs/ceph/mds_client.c: In function 'ceph_cap_unlink_work': ../fs/ceph/mds_client.c:2436:22: warning: unused variable 'cl' [-Wunused-variable] - HID: core: remove unnecessary WARN_ON() in implement() (git-fixes). - HID: logitech-dj: Fix memory leak in logi_dj_recv_switch_to_dj_mode() (git-fixes). - Input: ili210x - fix ili251x_read_touch_data() return value (git-fixes). - NFS: abort nfs_atomic_open_v23 if name is too long (bsc#1219847). - NFS: add atomic_open for NFSv3 to handle O_TRUNC correctly (bsc#1219847). - NFS: avoid infinite loop in pnfs_update_layout (bsc#1219633 bsc#1226226). - PCI/ASPM: Update save_state when configuration changes (bsc#1226915) - PCI: Clear Secondary Status errors after enumeration (bsc#1226928) - RAS/AMD/ATL: Fix MI300 bank hash (bsc#1225300). - RAS/AMD/ATL: Use system settings for MI300 DRAM to normalized address translation (bsc#1225300). - RDMA/hns: Fix incorrect sge nums calculation (git-fixes) - RDMA/irdma: Drop unused kernel push code (git-fixes) - RDMA/mlx5: Add check for srq max_sge attribute (git-fixes) - USB: class: cdc-wdm: Fix CPU lockup caused by excessive log messages (git-fixes). - USB: xen-hcd: Traverse host/ when CONFIG_USB_XEN_HCD is selected (git-fixes). - X.509: Fix the parser of extended key usage for length (bsc#1218820). - arm64: asm-bug: Add .align 2 to the end of __BUG_ENTRY (git-fixes). - arm64: mm: Batch dsb and isb when populating pgtables (jsc#PED-8690). - arm64: mm: Do not remap pgtables for allocate vs populate (jsc#PED-8690). - arm64: mm: Do not remap pgtables per-cont(pte|pmd) block (jsc#PED-8690). - arm64: mm: do not acquire mutex when rewriting swapper (jsc#PED-8690). - ata: ahci: Clean up sysfs file on error (git-fixes). - ata: libata-core: Fix double free on error (git-fixes). - ata: libata-core: Fix null pointer dereference on error (git-fixes). - batman-adv: Do not accept TT entries for out-of-spec VIDs (git-fixes). - bpf, sockmap: Check for any of tcp_bpf_prots when cloning a listener (git-fixes). - btrfs: avoid copying BTRFS_ROOT_SUBVOL_DEAD flag to snapshot of subvolume being deleted (bsc#1221282). - cachefiles: remove requests from xarray during flushing requests (bsc#1226588). - ceph: add ceph_cap_unlink_work to fire check_caps() immediately (bsc#1226022). - ceph: always check dir caps asynchronously (bsc#1226022). - ceph: always queue a writeback when revoking the Fb caps (bsc#1226022). - ceph: break the check delayed cap loop every 5s (bsc#1226022). - ceph: switch to use cap_delay_lock for the unlink delay list (bsc#1226022). - cgroup: Add annotation for holding namespace_sem in current_cgns_cgroup_from_root() (bsc#1222254). - cgroup: Eliminate the need for cgroup_mutex in proc_cgroup_show() (bsc#1222254). - cgroup: Make operations on the cgroup root_list RCU safe (bsc#1222254). - cgroup: Remove unnecessary list_empty() (bsc#1222254). - cgroup: preserve KABI of cgroup_root (bsc#1222254). - cifs: fix hang in wait_for_response() (bsc#1220812, bsc#1220368). - cpufreq: amd-pstate: Fix the inconsistency in max frequency units (git-fixes). - crypto: ecrdsa - Fix module auto-load on add_key (stable-fixes). - dmaengine: idxd: Fix possible Use-After-Free in irq_process_work_list (git-fixes). - dmaengine: ioatdma: Fix missing kmem_cache_destroy() (git-fixes). - drivers: core: synchronize really_probe() and dev_uevent() (git-fixes). - drm/amd/display: Add VCO speed parameter for DCN31 FPU (stable-fixes). - drm/amd/display: Add dtbclk access to dcn315 (stable-fixes). - drm/amd/display: Exit idle optimizations before HDCP execution (stable-fixes). - drm/amd/display: Set color_mgmt_changed to true on unsuspend (stable-fixes). - drm/amd/display: drop unnecessary NULL checks in debugfs (stable-fixes). - drm/amd/display: revert Exit idle optimizations before HDCP execution (stable-fixes). - drm/amd: Fix shutdown (again) on some SMU v13.0.4/11 platforms (git-fixes). - drm/amdgpu/atomfirmware: add intergrated info v2.3 table (stable-fixes). - drm/amdgpu/mes: fix use-after-free issue (stable-fixes). - drm/amdgpu: Fix the ring buffer size for queue VM flush (stable-fixes). - drm/amdgpu: Update BO eviction priorities (stable-fixes). - drm/amdgpu: add error handle to avoid out-of-bounds (stable-fixes). - drm/amdgpu: fix UBSAN warning in kv_dpm.c (stable-fixes). - drm/amdkfd: Flush the process wq before creating a kfd_process (stable-fixes). - drm/amdkfd: Rework kfd_locked handling (bsc#1225872) - drm/bridge/panel: Fix runtime warning on panel bridge release (git-fixes). - drm/exynos/vidi: fix memory leak in .get_modes() (stable-fixes). - drm/exynos: hdmi: report safe 640x480 mode as a fallback when no EDID found (git-fixes). - drm/i915/dpt: Make DPT object unshrinkable (git-fixes). - drm/i915/gt: Disarm breadcrumbs if engines are already idle (git-fixes). - drm/i915/gt: Fix potential UAF by revoke of fence registers (git-fixes). - drm/i915/guc: avoid FIELD_PREP warning (git-fixes). - drm/i915/mso: using joiner is not possible with eDP MSO (git-fixes). - drm/komeda: check for error-valued pointer (git-fixes). - drm/lima: add mask irq callback to gp and pp (stable-fixes). - drm/lima: mask irqs in timeout path before hard reset (stable-fixes). - drm/msm/a6xx: Avoid a nullptr dereference when speedbin setting fails (git-fixes). - drm/msm/dp: Avoid a long timeout for AUX transfer if nothing connected (git-fixes). - drm/msm/dp: Return IRQ_NONE for unhandled interrupts (stable-fixes). - drm/msm: Enable clamp_to_idle for 7c3 (stable-fixes). - drm/panel-samsung-atna33xc20: Use ktime_get_boottime for delays (stable-fixes). - drm/panel: simple: Add missing display timing flags for KOE TX26D202VM0BWA (git-fixes). - drm/radeon: fix UBSAN warning in kv_dpm.c (stable-fixes). - drm/vmwgfx: 3D disabled should not effect STDU memory limits (git-fixes). - drm/vmwgfx: Filter modes which exceed graphics memory (git-fixes). - gpio: davinci: Validate the obtained number of IRQs (git-fixes). - gpio: tqmx86: fix typo in Kconfig label (git-fixes). - gpio: tqmx86: introduce shadow register for GPIO output value (git-fixes). - gpiolib: cdev: Disallow reconfiguration without direction (uAPI v1) (git-fixes). - hwmon: (shtc1) Fix property misspelling (git-fixes). - i2c: at91: Fix the functionality flags of the slave-only interface (git-fixes). - i2c: designware: Fix the functionality flags of the slave-only interface (git-fixes). - i2c: ocores: set IACK bit after core is enabled (git-fixes). - i2c: testunit: discard write requests while old command is running (git-fixes). - i2c: testunit: do not erase registers after STOP (git-fixes). - iio: accel: fxls8962af: select IIO_BUFFER & IIO_KFIFO_BUF (git-fixes). - iio: adc: ad7266: Fix variable checking bug (git-fixes). - iio: adc: ad9467: fix scan type sign (git-fixes). - iio: chemical: bme680: Fix calibration data variable (git-fixes). - iio: chemical: bme680: Fix overflows in compensate() functions (git-fixes). - iio: chemical: bme680: Fix pressure value output (git-fixes). - iio: chemical: bme680: Fix sensor data read operation (git-fixes). - iio: dac: ad5592r: fix temperature channel scaling value (git-fixes). - iio: imu: inv_icm42600: delete unneeded update watermark call (git-fixes). - intel_th: pci: Add Meteor Lake-S CPU support (stable-fixes). - iommu/amd: Fix sysfs leak in iommu init (git-fixes). - iommu: Return right value in iommu_sva_bind_device() (git-fixes). - iommu: mtk: fix module autoloading (git-fixes). - ipvs: Fix checksumming on GSO of SCTP packets (bsc#1221958) - kbuild: Install dtb files as 0644 in Makefile.dtbinst (git-fixes). - kbuild: do not include include/config/auto.conf from shell scripts (bsc#1227274). - kconfig: doc: fix a typo in the note about 'imply' (git-fixes). - kconfig: fix comparison to constant symbols, 'm', 'n' (git-fixes). - kernel-doc: fix struct_group_tagged() parsing (git-fixes). - lib: memcpy_kunit: Fix an invalid format specifier in an assertion msg (git-fixes). - media: flexcop-usb: clean up endpoint sanity checks (stable-fixes). - media: flexcop-usb: fix sanity check of bNumEndpoints (git-fixes). - media: ipu3-cio2: Use temporary storage for struct device pointer (stable-fixes). - media: lgdt3306a: Add a check against null-pointer-def (stable-fixes). - media: mxl5xx: Move xpt structures off stack (stable-fixes). - media: radio-shark2: Avoid led_names truncations (git-fixes). - media: v4l2-core: hold videodev_lock until dev reg, finishes (stable-fixes). - mei: me: release irq in mei_me_pci_resume error path (git-fixes). - mkspec-dtb: add toplevel symlinks also on arm - mmc: core: Add mmc_gpiod_set_cd_config() function (stable-fixes). - mmc: core: Do not force a retune before RPMB switch (stable-fixes). - mmc: sdhci-acpi: Disable write protect detection on Toshiba WT10-A (stable-fixes). - mmc: sdhci-acpi: Fix Lenovo Yoga Tablet 2 Pro 1380 sdcard slot not working (stable-fixes). - mmc: sdhci-acpi: Sort DMI quirks alphabetically (stable-fixes). - mmc: sdhci-pci: Convert PCIBIOS_* return codes to errnos (git-fixes). - mmc: sdhci: Do not invert write-protect twice (git-fixes). - mmc: sdhci: Do not lock spinlock around mmc_gpio_get_ro() (git-fixes). - mmc: sdhci_am654: Add ITAPDLYSEL in sdhci_j721e_4bit_set_clock (git-fixes). - mmc: sdhci_am654: Add OTAP/ITAP delay enable (git-fixes). - mmc: sdhci_am654: Drop lookup for deprecated ti,otap-del-sel (stable-fixes). - mmc: sdhci_am654: Fix ITAPDLY for HS400 timing (git-fixes). - mtd: rawnand: Bypass a couple of sanity checks during NAND identification (git-fixes). - mtd: rawnand: Ensure ECC configuration is propagated to upper layers (git-fixes). - mtd: rawnand: rockchip: ensure NVDDR timings are rejected (git-fixes). - net/mlx5e: Fix a race in command alloc flow (git-fixes). - net: can: j1939: Initialize unused data in j1939_send_one() (git-fixes). - net: can: j1939: enhanced error handling for tightly received RTS messages in xtp_rx_rts_session_new (git-fixes). - net: can: j1939: recover socket queue on CAN bus error during BAM transmission (git-fixes). - net: ena: Fix redundant device NUMA node override (jsc#PED-8690). - net: mana: Enable MANA driver on ARM64 with 4K page size (jsc#PED-8491). - net: phy: Micrel KSZ8061: fix errata solution not taking effect problem (git-fixes). - net: phy: micrel: add Microchip KSZ 9477 to the device table (git-fixes). - net: usb: ax88179_178a: improve link status logs (git-fixes). - net: usb: ax88179_178a: improve reset check (git-fixes). - net: usb: qmi_wwan: add Telit FN920C04 compositions (stable-fixes). - net: usb: rtl8150 fix unintiatilzed variables in rtl8150_get_link_ksettings (git-fixes). - net: usb: smsc95xx: fix changing LED_SEL bit value updated from EEPROM (git-fixes). - nfsd: optimise recalculate_deny_mode() for a common case (bsc#1217912). - nilfs2: fix potential hang in nilfs_detach_log_writer() (stable-fixes). - nvme: find numa distance only if controller has valid numa id (git-fixes). - nvmet-passthru: propagate status from id override functions (git-fixes). - ocfs2: adjust enabling place for la window (bsc#1219224). - ocfs2: fix sparse warnings (bsc#1219224). - ocfs2: improve write IO performance when fragmentation is high (bsc#1219224). - ocfs2: speed up chain-list searching (bsc#1219224). - pinctrl: fix deadlock in create_pinctrl() when handling -EPROBE_DEFER (git-fixes). - pinctrl: qcom: spmi-gpio: drop broken pm8008 support (git-fixes). - pinctrl: rockchip: fix pinmux bits for RK3328 GPIO2-B pins (git-fixes). - pinctrl: rockchip: fix pinmux bits for RK3328 GPIO3-B pins (git-fixes). - pinctrl: rockchip: fix pinmux reset in rockchip_pmx_set (git-fixes). - pinctrl: rockchip: use dedicated pinctrl type for RK3328 (git-fixes). - random: treat bootloader trust toggle the same way as cpu trust toggle (bsc#1226953). - regulator: bd71815: fix ramp values (git-fixes). - regulator: core: Fix modpost error "regulator_get_regmap" undefined (git-fixes). - regulator: irq_helpers: duplicate IRQ name (stable-fixes). - regulator: vqmmc-ipq4019: fix module autoloading (stable-fixes). - rpm/kernel-obs-build.spec.in: Add iso9660 (bsc#1226212) Some builds do not just create an iso9660 image, but also mount it during build. - rpm/kernel-obs-build.spec.in: Add networking modules for docker (bsc#1226211) docker needs more networking modules, even legacy iptable_nat and _filter. - rpm/kernel-obs-build.spec.in: Include algif_hash, aegis128 and xts modules afgif_hash is needed by some packages (e.g. iwd) for tests, xts is used for LUKS2 volumes by default and aegis128 is useful as AEAD cipher for LUKS2. Wrap the long line to make it readable. - rpm/mkspec-dtb: dtbs have moved to vendor sub-directories in 6.5 By commit 724ba6751532 ("ARM: dts: Move .dts files to vendor sub-directories"). So switch to them. - sched/core: Fix incorrect initialization of the 'burst' parameter in cpu_max_write() (bsc#1226791). - scsi: sd: Update DIX config every time sd_revalidate_disk() is called (bsc#1218570). - smb: client: ensure to try all targets when finding nested links (bsc#1224020). - smb: client: guarantee refcounted children from parent session (bsc#1224679, CVE-35869). - soundwire: cadence: fix invalid PDI offset (stable-fixes). - spi: stm32: Do not warn about spurious interrupts (git-fixes). - supported.conf: Add APM X-Gene SoC hardware monitoring driver (bsc#1223265 jsc#PED-8570) - supported.conf: mark orangefs as optional We do not support orangefs at all (and it is already marked as such), but since there are no SLE consumers of it, mark it as optional. - supported.conf: mark ufs as unsupported UFS is an unsupported filesystem, mark it as such. We still keep it around (not marking as optional), to accommodate any potential migrations from BSD systems. - tty: mcf: MCF54418 has 10 UARTS (git-fixes). - usb-storage: alauda: Check whether the media is initialized (git-fixes). - usb: atm: cxacru: fix endpoint checking in cxacru_bind() (git-fixes). - usb: dwc3: core: remove lock of otg mode during gadget suspend/resume to avoid deadlock (git-fixes). - usb: fotg210-hcd: delete an incorrect bounds test (git-fixes). - usb: gadget: printer: fix races against disable (git-fixes). - usb: musb: da8xx: fix a resource leak in probe() (git-fixes). - usb: typec: tcpm: Ignore received Hard Reset in TOGGLING state (git-fixes). - usb: typec: tcpm: fix use-after-free case in tcpm_register_source_caps (git-fixes). - usb: typec: ucsi: Ack also failed Get Error commands (git-fixes). - usb: typec: ucsi: Never send a lone connector change ack (git-fixes). - usb: xhci: Implement xhci_handshake_check_state() helper (git-fixes). - usb: xhci: address off-by-one in xhci_num_trbs_free() (git-fixes). - usb: xhci: improve debug message in xhci_ring_expansion_needed() (git-fixes). - watchdog: bd9576: Drop "always-running" property (git-fixes). - watchdog: bd9576_wdt: switch to using devm_fwnode_gpiod_get() (stable-fixes). - wifi: cfg80211: Lock wiphy in cfg80211_get_station (git-fixes). - wifi: cfg80211: fix the order of arguments for trace events of the tx_rx_evt class (stable-fixes). - wifi: cfg80211: pmsr: use correct nla_get_uX functions (git-fixes). - wifi: iwlwifi: dbg_ini: move iwl_dbg_tlv_free outside of debugfs ifdef (git-fixes). - wifi: iwlwifi: mvm: check n_ssids before accessing the ssids (git-fixes). - wifi: iwlwifi: mvm: do not read past the mfuart notifcation (git-fixes). - wifi: iwlwifi: mvm: revert gen2 TX A-MPDU size to 64 (git-fixes). - wifi: mac80211: Fix deadlock in ieee80211_sta_ps_deliver_wakeup() (git-fixes). - wifi: mac80211: correctly parse Spatial Reuse Parameter Set element (git-fixes). - wifi: mac80211: mesh: Fix leak of mesh_preq_queue objects (git-fixes). - wifi: rtl8xxxu: Fix the TX power of RTL8192CU, RTL8723AU (stable-fixes). - wifi: rtlwifi: rtl8192de: Fix endianness issue in RX path (stable-fixes). - wifi: rtlwifi: rtl8192de: Fix low speed with WPA3-SAE (stable-fixes). - x86/mce: Dynamically size space for machine check records (bsc#1222241). - x86/tsc: Trust initial offset in architectural TSC-adjust MSRs (bsc#1222015 bsc#1226962). - xfs: make sure sb_fdblocks is non-negative (bsc#1225419). - xhci: Fix failure to detect ring expansion need (git-fixes). - xhci: Fix transfer ring expansion size calculation (git-fixes). - xhci: Handle TD clearing for multiple streams case (git-fixes). - xhci: Simplify event ring dequeue pointer update for port change events (git-fixes). - xhci: Stop unnecessary tracking of free trbs in a ring (git-fixes). - xhci: fix matching completion events with TDs (git-fixes). - xhci: remove unused stream_id parameter from xhci_handle_halted_endpoint() (git-fixes). - xhci: restre deleted trb fields for tracing (git-fixes). - xhci: retry Stop Endpoint on buggy NEC controllers (git-fixes). - xhci: simplify event ring dequeue tracking for transfer events (git-fixes). - xhci: update event ring dequeue pointer position to controller correctly (git-fixes). </description> <summary>Security update for the Linux Kernel</summary> </patchinfo>
Locations
Projects
Search
Status Monitor
Help
OpenBuildService.org
Documentation
API Documentation
Code of Conduct
Contact
Support
@OBShq
Terms
openSUSE Build Service is sponsored by
The Open Build Service is an
openSUSE project
.
Sign Up
Log In
Places
Places
All Projects
Status Monitor