Uploaded image for project: 'Lustre'
  1. Lustre
  2. LU-18603

kernel update [SLES15 SP5 5.14.21-150500.55.88.1]

Details

    • Task
    • Resolution: Unresolved
    • Minor
    • None
    • Lustre 2.17.0, Lustre 2.15.7
    • None
    • 3
    • 9223372036854775807

    Description

      The SUSE Linux Enterprise 15 SP5 kernel was updated to receive various security
      bugfixes.

      The following security bugs were fixed:

      • CVE-2021-47594: mptcp: never allow the PM to close a listener subflow
        (bsc#1226560).
      • CVE-2022-48879: efi: fix NULL-deref in init error path (bsc#1229556).
      • CVE-2022-48956: ipv6: avoid use-after-free in ip6_fragment() (bsc#1231893).
      • CVE-2022-48957: dpaa2-switch: Fix memory leak in
        dpaa2_switch_acl_entry_add() and dpaa2_switch_acl_entry_remove()
        (bsc#1231973).
      • CVE-2022-48958: ethernet: aeroflex: fix potential skb leak in
        greth_init_rings() (bsc#1231889).
      • CVE-2022-48959: net: dsa: sja1105: fix memory leak in
        sja1105_setup_devlink_regions() (bsc#1231976).
      • CVE-2022-48960: net: hisilicon: Fix potential use-after-free in hix5hd2_rx()
        (bsc#1231979).
      • CVE-2022-48962: net: hisilicon: Fix potential use-after-free in
        hisi_femac_rx() (bsc#1232286).
      • CVE-2022-48966: net: mvneta: Fix an out of bounds check (bsc#1232191).
      • CVE-2022-48980: net: dsa: sja1105: avoid out of bounds access in
        sja1105_init_l2_policing() (bsc#1232233).
      • CVE-2022-48983: io_uring: Fix a null-ptr-deref in io_tctx_exit_cb()
        (bsc#1231959).
      • CVE-2022-48991: mm/khugepaged: fix collapse_pte_mapped_thp() to allow
        anon_vma (bsc#1232070).
      • CVE-2022-49015: net: hsr: Fix potential use-after-free (bsc#1231938).
      • CVE-2022-49017: tipc: re-fetch skb cb after tipc_msg_validate (bsc#1232004).
      • CVE-2022-49020: net/9p: Fix a potential socket leak in p9_socket_open
        (bsc#1232175).
      • CVE-2024-26782: mptcp: fix double-free on socket dismantle (bsc#1222590).
      • CVE-2024-26906: Fixed invalid vsyscall page read for
        copy_from_kernel_nofault() (bsc#1223202).
      • CVE-2024-26953: net: esp: fix bad handling of pages from page_pool
        (bsc#1223656).
      • CVE-2024-35888: erspan: make sure erspan_base_hdr is present in skb->head
        (bsc#1224518).
      • CVE-2024-35937: wifi: cfg80211: check A-MSDU format more carefully
        (bsc#1224526).
      • CVE-2024-36244: net/sched: taprio: extend minimum interval restriction to
        entire cycle too (bsc#1226797).
      • CVE-2024-36883: net: fix out-of-bounds access in ops_init (bsc#1225725).
      • CVE-2024-36886: tipc: fix UAF in error path (bsc#1225730).
      • CVE-2024-36905: tcp: defer shutdown(SEND_SHUTDOWN) for TCP_SYN_RECV sockets
        (bsc#1225742).
      • CVE-2024-36954: tipc: fix a possible memleak in tipc_buf_append
        (bsc#1225764).
      • CVE-2024-36957: octeontx2-af: avoid off-by-one read from userspace
        (bsc#1225762).
      • CVE-2024-38589: netrom: fix possible dead-lock in nr_rt_ioctl()
        (bsc#1226748).
      • CVE-2024-38615: cpufreq: exit() callback is optional (bsc#1226592).
      • CVE-2024-39476: md/raid5: fix deadlock that raid5d() wait for itself to
        clear MD_SB_CHANGE_PENDING (bsc#1227437).
      • CVE-2024-40965: i2c: lpi2c: Avoid calling clk_get_rate during transfer
        (bsc#1227885).
      • CVE-2024-40997: cpufreq: amd-pstate: fix memory leak on CPU EPP exit
        (bsc#1227853).
      • CVE-2024-41023: sched/deadline: Fix task_struct reference leak
        (bsc#1228430).
      • CVE-2024-42226: Prevent potential failure in handle_tx_event() for Transfer
        events without TRB (bsc#1228709).
      • CVE-2024-42253: gpio: pca953x: fix pca953x_irq_bus_sync_unlock race
        (bsc#1229005).
      • CVE-2024-44931: gpio: prevent potential speculation leaks in
        gpio_device_get_desc() (bsc#1229837).
      • CVE-2024-44932: idpf: fix UAFs when destroying the queues (bsc#1229808).
      • CVE-2024-44958: sched/smt: Fix unbalance sched_smt_present dec/inc
        (bsc#1230179).
      • CVE-2024-44964: idpf: fix memory leaks and crashes while performing a soft
        reset (bsc#1230220).
      • CVE-2024-44995: net: hns3: fix a deadlock problem when config TC during
        resetting (bsc#1230231).
      • CVE-2024-45016: netem: fix return value if duplicate enqueue fails
        (bsc#1230429).
      • CVE-2024-45025: fix bitmap corruption on close_range() with
        CLOSE_RANGE_UNSHARE (bsc#1230456).
      • CVE-2024-46678: bonding: change ipsec_lock from spin lock to mutex
        (bsc#1230550).
      • CVE-2024-46681: pktgen: use cpus_read_lock() in pg_net_init() (bsc#1230558).
      • CVE-2024-46716: dmaengine: altera-msgdma: properly free descriptor in
        msgdma_free_descriptor (bsc#1230715).
      • CVE-2024-46754: bpf: Remove tst_run from lwt_seg6local_prog_ops
        (bsc#1230801).
      • CVE-2024-46770: ice: Add netif_device_attach/detach into PF reset flow
        (bsc#1230763).
      • CVE-2024-46775: drm/amd/display: Validate function returns (bsc#1230774).
      • CVE-2024-46777: udf: Avoid excessive partition lengths (bsc#1230773).
      • CVE-2024-46800: sch/netem: fix use after free in netem_dequeue
        (bsc#1230827).
      • CVE-2024-46809: drm/amd/display: Check BIOS images before it is used
        (bsc#1231148).
      • CVE-2024-46811: drm/amd/display: Fix index may exceed array range within
        fpu_update_bw_bounding_box (bsc#1231179).
      • CVE-2024-46813: drm/amd/display: Check link_index before accessing dc->links
        (bsc#1231191).
      • CVE-2024-46814: drm/amd/display: Check msg_id before processing transcation
        (bsc#1231193).
      • CVE-2024-46815: drm/amd/display: Check num_valid_sets before accessing
        reader_wm_sets (bsc#1231195).
      • CVE-2024-46816: drm/amd/display: Stop amdgpu_dm initialize when link nums
        greater than max_links (bsc#1231197).
      • CVE-2024-46817: drm/amd/display: Stop amdgpu_dm initialize when stream nums
        greater than 6 (bsc#1231200).
      • CVE-2024-46818: drm/amd/display: Check gpio_id before used as array index
        (bsc#1231203).
      • CVE-2024-46826: ELF: fix kernel.randomize_va_space double read
        (bsc#1231115).
      • CVE-2024-46828: uprobes: fix kernel info leak via "[uprobes]" vma
        (bsc#1231114).
      • CVE-2024-46834: ethtool: fail closed if we can't get max channel used in
        indirection tables (bsc#1231096).
      • CVE-2024-46840: btrfs: clean up our handling of refs == 0 in snapshot delete
        (bsc#1231105).
      • CVE-2024-46841: btrfs: do not BUG_ON on ENOMEM from
        btrfs_lookup_extent_info() in walk_down_proc() (bsc#1231094).
      • CVE-2024-46848: perf/x86/intel: Limit the period on Haswell (bsc#1231072).
      • CVE-2024-46849: ASoC: meson: axg-card: fix 'use-after-free' (bsc#1231073).
      • CVE-2024-46854: net: dpaa: Pad packets to ETH_ZLEN (bsc#1231084).
      • CVE-2024-46855: netfilter: nft_socket: fix sk refcount leaks (bsc#1231085).
      • CVE-2024-46857: net/mlx5: Fix bridge mode operations when there are no VFs
        (bsc#1231087).
      • CVE-2024-47660: fsnotify: clear PARENT_WATCHED flags lazily (bsc#1231439).
      • CVE-2024-47661: drm/amd/display: Avoid overflow from uint32_t to uint8_t
        (bsc#1231496).
      • CVE-2024-47664: spi: hisi-kunpeng: Add verification for the max_frequency
        provided by the firmware (bsc#1231442).
      • CVE-2024-47668: lib/generic-radix-tree.c: Fix rare race in
        __genradix_ptr_alloc() (bsc#1231502).
      • CVE-2024-47672: wifi: iwlwifi: mvm: do not wait for tx queues if firmware is
        dead (bsc#1231540).
      • CVE-2024-47673: wifi: iwlwifi: mvm: pause TCM when the firmware is stopped
        (bsc#1231539).
      • CVE-2024-47674: mm: avoid leaving partial pfn mappings around in error case
        (bsc#1231673).
      • CVE-2024-47679: vfs: fix race between evice_inodes() and find_inode()&iput()
        (bsc#1231930).
      • CVE-2024-47684: tcp: check skb is non-NULL in tcp_rto_delta_us()
        (bsc#1231987).
      • CVE-2024-47685: netfilter: nf_reject_ipv6: fix nf_reject_ip6_tcphdr_put()
        (bsc#1231998).
      • CVE-2024-47692: nfsd: return -EINVAL when namelen is 0 (bsc#1231857).
      • CVE-2024-47701: ext4: explicitly exit when ext4_find_inline_entry returns an
        error (bsc#1231920).
      • CVE-2024-47704: drm/amd/display: Check link_res->hpo_dp_link_enc before
        using it (bsc#1231944).
      • CVE-2024-47705: block: fix potential invalid pointer dereference in
        blk_add_partition (bsc#1231872).
      • CVE-2024-47706: block, bfq: fix possible UAF for bfqq->bic with merge chain
        (bsc#1231942).
      • CVE-2024-47707: ipv6: avoid possible NULL deref in
        rt6_uncached_list_flush_dev() (bsc#1231935).
      • CVE-2024-47710: sock_map: Add a cond_resched() in sock_hash_free()
        (bsc#1232049).
      • CVE-2024-47720: drm/amd/display: Add null check for set_output_gamma in
        dcn30_set_output_transfer_func (bsc#1232043).
      • CVE-2024-47727: x86/tdx: Fix "in-kernel MMIO" check (bsc#1232116).
      • CVE-2024-47730: crypto: hisilicon/qm - inject error before stopping queue
        (bsc#1232075).
      • CVE-2024-47738: wifi: mac80211: do not use rate mask for offchannel TX
        either (bsc#1232114).
      • CVE-2024-47739: padata: use integer wrap around to prevent deadlock on
        seq_nr overflow (bsc#1232124).
      • CVE-2024-47745: mm: split critical region in remap_file_pages() and invoke
        LSMs in between (bsc#1232135).
      • CVE-2024-47747: net: seeq: Fix use after free vulnerability in ether3 Driver
        Due to Race Condition (bsc#1232145).
      • CVE-2024-47748: vhost_vdpa: assign irq bypass producer token correctly
        (bsc#1232174).
      • CVE-2024-47757: nilfs2: fix potential oob read in nilfs_btree_check_delete()
        (bsc#1232187).
      • CVE-2024-49858: efistub/tpm: Use ACPI reclaim memory for event log to avoid
        corruption (bsc#1232251).
      • CVE-2024-49860: ACPI: sysfs: validate return type of _STR method
        (bsc#1231861).
      • CVE-2024-49866: tracing/timerlat: Fix a race during cpuhp processing
        (bsc#1232259).
      • CVE-2024-49868: btrfs: fix a NULL pointer dereference when failed to start a
        new trasacntion (bsc#1232272).
      • CVE-2024-49881: ext4: update orig_path in ext4_find_extent() (bsc#1232201).
      • CVE-2024-49882: ext4: fix double brelse() the buffer of the extents path
        (bsc#1232200).
      • CVE-2024-49883: ext4: aovid use-after-free in ext4_ext_insert_extent()
        (bsc#1232199).
      • CVE-2024-49886: platform/x86: ISST: Fix the KASAN report slab-out-of-bounds
        bug (bsc#1232196).
      • CVE-2024-49890: drm/amd/pm: ensure the fw_info is not null before using it
        (bsc#1232217).
      • CVE-2024-49892: drm/amd/display: Initialize get_bytes_per_element's default
        to 1 (bsc#1232220).
      • CVE-2024-49896: drm/amd/display: Check stream before comparing them
        (bsc#1232221).
      • CVE-2024-49897: drm/amd/display: Check phantom_stream before it is used
        (bsc#1232355).
      • CVE-2024-49899: drm/amd/display: Initialize denominators' default to 1
        (bsc#1232358).
      • CVE-2024-49901: drm/msm/adreno: Assign msm_gpu->pdev earlier to avoid
        nullptrs (bsc#1232305).
      • CVE-2024-49906: drm/amd/display: Check null pointer before try to access it
        (bsc#1232332).
      • CVE-2024-49909: drm/amd/display: Add NULL check for function pointer in
        dcn32_set_output_transfer_func (bsc#1232337).
      • CVE-2024-49911: drm/amd/display: Add NULL check for function pointer in
        dcn20_set_output_transfer_func (bsc#1232366).
      • CVE-2024-49914: drm/amd/display: Add null check for pipe_ctx->plane_state in
        (bsc#1232369).
      • CVE-2024-49917: drm/amd/display: Add NULL check for clk_mgr and
        clk_mgr->funcs in dcn30_init_hw (bsc#1231965).
      • CVE-2024-49918: drm/amd/display: Add null check for head_pipe in
        dcn32_acquire_idle_pipe_for_head_pipe_in_layer (bsc#1231967).
      • CVE-2024-49919: drm/amd/display: Add null check for head_pipe in
        dcn201_acquire_free_pipe_for_layer (bsc#1231968).
      • CVE-2024-49920: drm/amd/display: Check null pointers before multiple uses
        (bsc#1232313).
      • CVE-2024-49921: drm/amd/display: Check null pointers before used
        (bsc#1232371).
      • CVE-2024-49922: drm/amd/display: Check null pointers before using them
        (bsc#1232374).
      • CVE-2024-49923: drm/amd/display: Pass non-null to
        dcn20_validate_apply_pipe_split_flags (bsc#1232361).
      • CVE-2024-49925: fbdev: efifb: Register sysfs groups through driver core
        (bsc#1232224)
      • CVE-2024-49929: wifi: iwlwifi: mvm: avoid NULL pointer dereference
        (bsc#1232253).
      • CVE-2024-49930: wifi: ath11k: fix array out-of-bound access in SoC stats
        (bsc#1232260).
      • CVE-2024-49933: blk_iocost: fix more out of bound shifts (bsc#1232368).
      • CVE-2024-49934: fs/inode: Prevent dump_mapping() accessing invalid
        dentry.d_name.name (bsc#1232387).
      • CVE-2024-49936: net/xen-netback: prevent UAF in xenvif_flush_hash()
        (bsc#1232424).
      • CVE-2024-49939: wifi: rtw89: avoid to add interface to list twice when SER
        (bsc#1232381).
      • CVE-2024-49945: net/ncsi: Disable the ncsi work before freeing the
        associated structure (bsc#1232165).
      • CVE-2024-49946: ppp: do not assume bh is held in ppp_channel_bridge_input()
        (bsc#1232164).
      • CVE-2024-49949: net: avoid potential underflow in qdisc_pkt_len_init() with
        UFO (bsc#1232160).
      • CVE-2024-49950: Bluetooth: L2CAP: Fix uaf in l2cap_connect (bsc#1232159).
      • CVE-2024-49954: static_call: Replace pointless WARN_ON() in
        static_call_module_notify() (bsc#1232155).
      • CVE-2024-49955: ACPI: battery: Fix possible crash when unregistering a
        battery hook (bsc#1232154).
      • CVE-2024-49958: ocfs2: reserve space for inline xattr before attaching
        reflink tree (bsc#1232151).
      • CVE-2024-49959: jbd2: stop waiting for space when
        jbd2_cleanup_journal_tail() returns error (bsc#1232149).
      • CVE-2024-49960: ext4: fix timer use-after-free on failed mount
        (bsc#1232395).
      • CVE-2024-49967: ext4: no need to continue when the number of entries is 1
        (bsc#1232140).
      • CVE-2024-49968: ext4: fix error message when rejecting the default hash
        (bsc#1232264).
      • CVE-2024-49969: drm/amd/display: Fix index out of bounds in DCN30 color
        transformation (bsc#1232519).
      • CVE-2024-49973: r8169: add tally counter fields added with RTL8125
        (bsc#1232105).
      • CVE-2024-49974: NFSD: Force all NFSv4.2 COPY requests to be synchronous
        (bsc#1232383).
      • CVE-2024-49975: uprobes: fix kernel info leak via "[uprobes]" vma
        (bsc#1232104).
      • CVE-2024-49983: ext4: drop ppath from ext4_ext_replay_update_ex() to avoid
        double-free (bsc#1232096).
      • CVE-2024-49989: drm/amd/display: fix double free issue during amdgpu module
        unload (bsc#1232483).
      • CVE-2024-49991: drm/amdkfd: amdkfd_free_gtt_mem clear the correct pointer
        (bsc#1232282).
      • CVE-2024-49993: iommu/vt-d: Fix potential lockup if qi_submit_sync called
        with 0 count (bsc#1232316).
      • CVE-2024-49995: tipc: guard against string buffer overrun (bsc#1232432).
      • CVE-2024-49996: cifs: Fix buffer overflow when parsing NFS reparse points
        (bsc#1232089).
      • CVE-2024-50000: net/mlx5e: Fix NULL deref in mlx5e_tir_builder_alloc()
        (bsc#1232085).
      • CVE-2024-50001: net/mlx5: Fix error path in multi-packet WQE transmit
        (bsc#1232084).
      • CVE-2024-50002: static_call: Handle module init failure correctly in
        static_call_del_module() (bsc#1232083).
      • CVE-2024-50006: ext4: fix i_data_sem unlock order in ext4_ind_migrate()
        (bsc#1232442).
      • CVE-2024-50009: cpufreq: amd-pstate: add check for cpufreq_cpu_get's return
        value (bsc#1232318).
      • CVE-2024-50014: ext4: fix access to uninitialised lock in fc replay path
        (bsc#1232446).
      • CVE-2024-50019: kthread: unpark only parked kthread (bsc#1231990).
      • CVE-2024-50024: net: Fix an unsafe loop on the list (bsc#1231954).
      • CVE-2024-50028: thermal: core: Reference count the zone in
        thermal_zone_get_by_id() (bsc#1231950).
      • CVE-2024-50033: slip: make slhc_remember() more robust against malicious
        packets (bsc#1231914).
      • CVE-2024-50035: ppp: fix ppp_async_encode() illegal access (bsc#1232392).
      • CVE-2024-50041: i40e: Fix macvlan leak by synchronizing access to
        mac_filter_hash (bsc#1231907).
      • CVE-2024-50045: netfilter: br_netfilter: fix panic with metadata_dst skb
        (bsc#1231903).
      • CVE-2024-50046: kabi fix for NFSv4: Prevent NULL-pointer dereference in
        nfs42_complete_copies() (bsc#1231902).
      • CVE-2024-50047: smb: client: fix UAF in async decryption (bsc#1232418).
      • CVE-2024-50048: fbcon: Fix a NULL pointer dereference issue in fbcon_putcs
        (bsc#1232310).
      • CVE-2024-50055: driver core: bus: Fix double free in driver API
        bus_register() (bsc#1232329).
      • CVE-2024-50058: serial: protect uart_port_dtr_rts() in uart_shutdown() too
        (bsc#1232285).
      • CVE-2024-50059: ntb: ntb_hw_switchtec: Fix use after free vulnerability in
        switchtec_ntb_remove due to race condition (bsc#1232345).
      • CVE-2024-50061: i3c: master: cdns: Fix use after free vulnerability in
        cdns_i3c_master Driver Due to Race Condition (bsc#1232263).
      • CVE-2024-50063: kABI: bpf: struct bpf_map kABI workaround (bsc#1232435).
      • CVE-2024-50073: tty: n_gsm: Fix use-after-free in gsm_cleanup_mux
        (bsc#1232520).
      • CVE-2024-50081: blk-mq: setup queue ->tag_set before initializing hctx
        (bsc#1232501).
      • CVE-2024-50082: blk-rq-qos: fix crash on rq_qos_wait vs.
        rq_qos_wake_function race (bsc#1232500).
      • CVE-2024-50089: unicode: Do not special case ignorable code points
        (bsc#1232860).
      • CVE-2024-50093: thermal: intel: int340x: processor: Fix warning during
        module unload (bsc#1232877).
      • CVE-2024-50098: scsi: ufs: core: Set SDEV_OFFLINE when UFS is shut down
        (bsc#1232881).
      • CVE-2024-50108: drm/amd/display: Disable PSR-SU on Parade 08-01 TCON too
        (bsc#1232884).
      • CVE-2024-50110: xfrm: fix one more kernel-infoleak in algo dumping
        (bsc#1232885).
      • CVE-2024-50115: KVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from memory
        (bsc#1232919).
      • CVE-2024-50125: Bluetooth: SCO: Fix UAF on sco_sock_timeout (bsc#1232928).
      • CVE-2024-50127: net: sched: fix use-after-free in taprio_change()
        (bsc#1232907).
      • CVE-2024-50128: net: wwan: fix global oob in wwan_rtnl_policy (bsc#1232905).
      • CVE-2024-50134: drm/vboxvideo: Replace fake VLA at end of
        vbva_mouse_pointer_shape (bsc#1232890).
      • CVE-2024-50135: nvme-pci: fix race condition between reset and
        nvme_dev_disable() (bsc#1232888).
      • CVE-2024-50138: bpf: Use raw_spinlock_t in ringbuf (bsc#1232935).
      • CVE-2024-50146: net/mlx5e: Do not call cleanup on profile rollback failure
        (bsc#1233056).
      • CVE-2024-50147: net/mlx5: Fix command bitmask initialization (bsc#1233067).
      • CVE-2024-50153: scsi: target: core: Fix null-ptr-deref in
        target_alloc_device() (bsc#1233061).
      • CVE-2024-50154: tcp: Fix use-after-free of nreq in reqsk_timer_handler()
        (bsc#1233070).
      • CVE-2024-50167: be2net: fix potential memory leak in be_xmit()
        (bsc#1233049).
      • CVE-2024-50171: net: systemport: fix potential memory leak in
        bcm_sysport_xmit() (bsc#1233057).
      • CVE-2024-50182: secretmem: disable memfd_secret() if arch cannot set direct
        map (bsc#1233129).
      • CVE-2024-50184: virtio_pmem: Check device status before requesting flush
        (bsc#1233135).
      • CVE-2024-50186: net: explicitly clear the sk pointer, when pf->create fails
        (bsc#1233110).
      • CVE-2024-50188: net: phy: dp83869: fix memory corruption when enabling fiber
        (bsc#1233107).
      • CVE-2024-50192: irqchip/gic-v4: Correctly deal with set_affinity on lazily-
        mapped VPEs (bsc#1233106).
      • CVE-2024-50195: posix-clock: posix-clock: Fix unbalanced locking in
        pc_clock_settime() (bsc#1233103).
      • CVE-2024-50196: pinctrl: ocelot: fix system hang on level based interrupts
        (bsc#1233113).
      • CVE-2024-50205: ALSA: firewire-lib: Avoid division by zero in
        apply_constraint_to_size() (bsc#1233293).
      • CVE-2024-50208: RDMA/bnxt_re: Fix a bug while setting up Level-2 PBL pages
        (bsc#1233117).
      • CVE-2024-50229: nilfs2: fix potential deadlock with newly created symlinks
        (bsc#1233205).
      • CVE-2024-50230: nilfs2: fix kernel bug due to missing clearing of checked
        flag (bsc#1233206).
      • CVE-2024-50259: netdevsim: Add trailing zero to terminate the string in
        nsim_nexthop_bucket_activity_write() (bsc#1233214).
      • CVE-2024-50261: macsec: Fix use-after-free while sending the offloading
        packet (bsc#1233253).
      • CVE-2024-50264: vsock/virtio: Initialization of the dangling pointer
        occurring in vsk->trans (bsc#1233453).
      • CVE-2024-50267: usb: serial: io_edgeport: fix use after free in debug printk
        (bsc#1233456).
      • CVE-2024-50271: signal: restore the override_rlimit logic (bsc#1233460).
      • CVE-2024-50273: btrfs: reinitialize delayed ref list after deleting it from
        the list (bsc#1233462).
      • CVE-2024-50274: idpf: avoid vport access in idpf_get_link_ksettings
        (bsc#1233463).
      • CVE-2024-50279: dm cache: fix out-of-bounds access to the dirty bitset when
        resizing (bsc#1233468).
      • CVE-2024-50289: media: av7110: fix a spectre vulnerability (bsc#1233478).
      • CVE-2024-50295: net: arc: fix the device for dma_map_single/dma_unmap_single
        (bsc#1233484).
      • CVE-2024-50298: net: enetc: allocate vf_state during PF probes
        (bsc#1233487).
      • CVE-2024-53052: io_uring/rw: fix missing NOWAIT check for O_DIRECT start
        write (bsc#1233548).
      • CVE-2024-53058: net: stmmac: TSO: Fix unbalanced DMA map/unmap for non-paged
        SKB data (bsc#1233552).
      • CVE-2024-53061: media: s5p-jpeg: prevent buffer overflows (bsc#1233555).
      • CVE-2024-53063: media: dvbdev: prevent the risk of out of memory access
        (bsc#1233557).
      • CVE-2024-53068: firmware: arm_scmi: Fix slab-use-after-free in
        scmi_bus_notifier() (bsc#1233561).
      • CVE-2024-53079: mm/thp: fix deferred split unqueue naming and locking
        (bsc#1233570).
      • CVE-2024-53088: i40e: fix race condition by adding filter's intermediate
        sync state (bsc#1233580).
      • CVE-2024-53104: media: uvcvideo: Skip parsing frames of type
        UVC_VS_UNDEFINED in uvc_parse_format (bsc#1234025).
      • CVE-2024-53110: vp_vdpa: fix id_table array not null terminated error
        (bsc#1234085).

      The following non-security bugs were fixed:
      https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html

      Attachments

        Issue Links

          Activity

            [LU-18603] kernel update [SLES15 SP5 5.14.21-150500.55.88.1]
            There are no comments yet on this issue.

            People

              yujian Jian Yu
              yujian Jian Yu
              Votes:
              0 Vote for this issue
              Watchers:
              1 Start watching this issue

              Dates

                Created:
                Updated: