CVE-2021-47388: mac80211: fix use-after-free in CCMP/GCMP RX (bsc#1225214).
CVE-2024-41014: xfs: add bounds checking to xlogrecoverprocess_data (bsc#1228408).
CVE-2024-41091: tun: add missing verification for short frame (bsc#1228327).
CVE-2024-41090: tap: add missing verification for short frame (bsc#1228328).
CVE-2024-40999: net: ena: Add validation for completion descriptors consistency (bsc#1227913).
CVE-2024-35837: net: mvpp2: clear BM pool before initialization (bsc#1224500).
CVE-2021-47588: sit: do not call ipip6devfree() from sitinitnet() (bsc#1226568).
CVE-2022-48804: vtioctl: fix arrayindexnospec in vtsetactivate (bsc#1227968).
CVE-2024-40967: serial: imx: Introduce timeout when waiting on transmitter empty (bsc#1227891).
CVE-2024-40966: kABI: tty: add the option to have a tty reject a new ldisc (bsc#1227886).
CVE-2022-48850: net-sysfs: add check for netdevice being present to speed_show (bsc#1228071).
CVE-2021-47582: usb: core: Do not hold the device lock while sleeping in doproccontrol() (bsc#1226559).
CVE-2024-40982: ssb: fix potential NULL pointer dereference in ssbdeviceuevent() (bsc#1227865).
CVE-2021-47468: isdn: mISDN: Fix sleeping function called from invalid context (bsc#1225346).
CVE-2021-47395: mac80211: limit injected vht mcs/nss in ieee80211parsetx_radiotap (bsc#1225326).
CVE-2022-48810: ipmr,ip6mr: acquire RTNL before calling ip[6]mrfreetable() on failure path (bsc#1227936).
CVE-2023-52594: Fixed potential array-index-out-of-bounds read in ath9khtctxstatus() (bsc#1221045).
CVE-2022-48855: sctp: fix kernel-infoleak for SCTP sockets (bsc#1228003).
CVE-2021-47580: scsi: scsidebug: Fix type in mint to avoid stack OOB (bsc#1226550).
CVE-2024-26735: ipv6: sr: fix possible use-after-free and null-ptr-deref (bsc#1222372).
CVE-2024-38560: scsi: bfa: Ensure the copied buf is NUL terminated (bsc#1226786).
CVE-2022-48811: ibmvnic: do not release napi in _ibmvnicopen() (bsc#1227928).
CVE-2021-0129: Improper access control in BlueZ may have allowed an authenticated user to potentially enable information disclosure via adjacent access (bsc#1186463).
CVE-2020-26558: Fixed a flaw in the Bluetooth LE and BR/EDR secure pairing that could permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (bsc#1179610).
CVE-2024-40937: gve: Clear napi->skb before devkfreeskb_any() (bsc#1227836).
CVE-2024-39507: net: hns3: fix kernel crash problem in concurrent scenario (bsc#1227730).
CVE-2024-40923: vmxnet3: disable rx data ring on dma allocation failure (bsc#1227786).
CVE-2024-40941: wifi: iwlwifi: mvm: do not read past the mfuart notifcation (bsc#1227771).
CVE-2022-48860: ethernet: Fix error handling in xemacliteofprobe (bsc#1228008).
CVE-2022-48863: mISDN: Fix memory leak in dsppipelinebuild() (bsc#1228063).
CVE-2024-40953: KVM: Fix a data race on lastboostedvcpu in kvmvcpuon_spin() (bsc#1227806).
CVE-2024-39499: vmci: prevent speculation leaks by sanitizing event in event_deliver() (bsc#1227725).
CVE-2024-39487: bonding: Fix out-of-bounds read in bondoptionarpiptargets_set() (bsc#1227573)
CVE-2024-35934: net/smc: reduce rtnl pressure in smcpnetcreatepnetidslist() (bsc#1224641)
CVE-2024-40959: xfrm6: check ip6dstidev() return value in xfrm6getsaddr() (bsc#1227884).