File _patchinfo of Package patchinfo.42334
<patchinfo incident="42334">
<issue tracker="bnc" id="1065729">[trackerbug] 4.12 powerpc base kernel fixes</issue>
<issue tracker="bnc" id="1193629">[TRACKERBUG] SLE15-SP4 backports for cifs.ko</issue>
<issue tracker="bnc" id="1194869">[TRACKERBUG] 5.14 powerpc base kernel fixes</issue>
<issue tracker="bnc" id="1196823">VUL-0: CVE-2022-0854: kernel-source: swiotlb: fix info leak with DMA_FROM_DEVICE</issue>
<issue tracker="bnc" id="1204957">Update Broadcom Emulex lpfc driver to 14.2.0.8</issue>
<issue tracker="bnc" id="1205567">WARNING: CPU: 2 PID: 31106 at ../mm/vmalloc.c:2590 __vunmap+0x207/0x240 - ref:_00D1igLOd._5005qFh4oZ:ref</issue>
<issue tracker="bnc" id="1206451">wlan device QCNFA765 not detected</issue>
<issue tracker="bnc" id="1206843">Lenovo T14s Gen3 AMD resume from sleep broken</issue>
<issue tracker="bnc" id="1206889">[PATCH] ext4: silence the warning when evicting inode with dioread_nolock</issue>
<issue tracker="bnc" id="1207051">Vul-0: CVE-2023-23559: kernel-source,kernel-rt,kernel-azure: Integer overflow in rndis_wlan that leads to a buffer overflow</issue>
<issue tracker="bnc" id="1207088">Kernel BUG at ../lib/assoc_array.c:652 — ref:_00D1igLOd._5005qJQ2E6:ref</issue>
<issue tracker="bnc" id="1207315">smartpqi - Update to latest Linux kernel.org 6.2</issue>
<issue tracker="bnc" id="1207611">[PATCH] ext4: fix potential memory leak in ext4_fc_record_modified_inode()</issue>
<issue tracker="bnc" id="1207620">[PATCH] ext4: fix bug_on in __es_tree_search caused by bad boot loader inode</issue>
<issue tracker="bnc" id="1207622">[PATCH] ext4: fix use-after-free in ext4_orphan_cleanup</issue>
<issue tracker="bnc" id="1207636">[PATCH] ext4: fix inode leak in ext4_xattr_inode_create() on an error path</issue>
<issue tracker="bnc" id="1207644">[PATCH] jbd2: fix potential buffer head reference count leak</issue>
<issue tracker="bnc" id="1207646">[PATCH] jbd2: add miss release buffer head in fc_do_one_pass()</issue>
<issue tracker="bnc" id="1207652">[PATCH] ocfs2: fix memory leak in ocfs2_mount_volume()</issue>
<issue tracker="bnc" id="1207653">[PATCH] ext4: fix deadlock due to mbcache entry corruption</issue>
<issue tracker="bnc" id="1208570">qla2xxx: update driver to 10.02.08.200-k</issue>
<issue tracker="bnc" id="1208758">BUG: kernel NULL pointer dereference, address: 0000000000000028 - Need core analyzed</issue>
<issue tracker="bnc" id="1209799">sched/psi: Fix use-after-free in ep_remove_wait_queue()</issue>
<issue tracker="bnc" id="1209980">Lenovo L14 Gen3 AMD, wifi card (Mediatek MT7922) not recognized.</issue>
<issue tracker="bnc" id="1210644">amd_pmc AMDI0007:00: Last suspend didn't reach deepest state</issue>
<issue tracker="bnc" id="1210817">seccomp: Move copy_seccomp() to no failure path.</issue>
<issue tracker="bnc" id="1210943">Update Broadcom Emulex lpfc driver to 14.2.0.11</issue>
<issue tracker="bnc" id="1211690">s390/lcs: Fix return type of lcs_start_xmit()</issue>
<issue tracker="bnc" id="1213025">[PATCH] inotify: Avoid reporting event with invalid wd</issue>
<issue tracker="bnc" id="1213032">[PATCH] udf: Avoid double brelse() in udf_rename()</issue>
<issue tracker="bnc" id="1213093">[PATCH] ext4: refuse to create ea block when umounted</issue>
<issue tracker="bnc" id="1213105">[PATCH] ext4: fix deadlock when converting an inline directory in nojournal mode</issue>
<issue tracker="bnc" id="1213110">[PATCH] ext4: turn quotas off if mount failed after enabling quotas</issue>
<issue tracker="bnc" id="1213111">[PATCH] ext4: fix bug_on in __es_tree_search caused by bad quota inode</issue>
<issue tracker="bnc" id="1213653">bfq RIP: bfqq_request_over_limit+732</issue>
<issue tracker="bnc" id="1213747">qla2xxx: update driver to 10.02.08.500-k</issue>
<issue tracker="bnc" id="1213867">KVM: s390: pv: fix index value of replaced ASCE</issue>
<issue tracker="bnc" id="1214635">Backport SEV Live Migration fix into SLES-15 SP4 and greater</issue>
<issue tracker="bnc" id="1214940">[PATCH] ext4: set goal start correctly in ext4_mb_normalize_request</issue>
<issue tracker="bnc" id="1214962">[PATCH] quota: fix warning in dqgrab()</issue>
<issue tracker="bnc" id="1214986">[PATCH] blk-iocost: fix divide by 0 error in calc_lcoefs()</issue>
<issue tracker="bnc" id="1214990">[PATCH] loop: loop_set_status_from_info() check before assignment</issue>
<issue tracker="bnc" id="1216062">blk-cgroup: Fix NULL deref caused by blkg_policy_data being installed before init</issue>
<issue tracker="bnc" id="1224573">VUL-0: CVE-2024-35974: kernel: block: fix q->blkg_list corruption during disk rebind</issue>
<issue tracker="bnc" id="1225832">VUL-0: CVE-2024-36933: kernel: nsh: Restore skb->{protocol,data,mac_header} for outer header in nsh_gso_segment().</issue>
<issue tracker="bnc" id="1226797">VUL-0: CVE-2024-36244: kernel: net/sched: taprio: extend minimum interval restriction to entire cycle too</issue>
<issue tracker="bnc" id="1226846">VUL-0: CVE-2024-38596: kernel: af_unix: fix data races in unix_release_sock/unix_stream_sendmsg</issue>
<issue tracker="bnc" id="1228015">VUL-0: CVE-2022-48853: kernel: swiotlb: fix info leak with DMA_FROM_DEVICE</issue>
<issue tracker="bnc" id="1233640">VUL-0: CVE-2024-53093: kernel: nvme-multipath: defer partition scanning</issue>
<issue tracker="bnc" id="1235038">VUL-0: CVE-2024-56590: kernel: Bluetooth: hci_core: Fix not checking skb length on hci_acldata_packet</issue>
<issue tracker="bnc" id="1237563">padata: Honor the caller's alignment in case of chunk_size 0</issue>
<issue tracker="bnc" id="1249871">VUL-0: CVE-2023-53254: kernel: cacheinfo: Fix shared_cpu_map to handle shared caches at different levels</issue>
<issue tracker="bnc" id="1252046">VUL-0: CVE-2025-39977: kernel: futex: Prevent use-after-free during requeue-PI</issue>
<issue tracker="bnc" id="1252678">VUL-0: CVE-2025-40019: kernel: crypto: essiv - Check ssize for decryption and in-place encryption</issue>
<issue tracker="bnc" id="1253409">VUL-0: CVE-2025-40139: kernel: smc: Use __sk_dst_get() and dst_dev_rcu() in in smc_clc_prfx_set().</issue>
<issue tracker="bnc" id="1254392">L3: Free Inode BTree record corruption in AG 12 detected!</issue>
<issue tracker="bnc" id="1254520">VUL-0: CVE-2025-40220: kernel: fuse: fix livelock in synchronous file put from fuseblk workers</issue>
<issue tracker="bnc" id="1254559">VUL-0: CVE-2022-50625: serial: amba-pl011: avoid SBSA UART accessing DMACR register</issue>
<issue tracker="bnc" id="1254562">VUL-0: CVE-2022-50626: media: dvb-usb: fix memory leak in dvb_usb_adapter_init()</issue>
<issue tracker="bnc" id="1254572">VUL-0: CVE-2023-53747: vc_screen: reload load of struct vc_data pointer in vcs_write() to avoid UAF</issue>
<issue tracker="bnc" id="1254578">VUL-0: CVE-2022-50614: kernel: misc: pci_endpoint_test: Fix pci_endpoint_test_{copy,write,read}() panic</issue>
<issue tracker="bnc" id="1254580">VUL-0: CVE-2022-50615: kernel: perf/x86/intel/uncore: Fix reference count leak in snr_uncore_mmio_map()</issue>
<issue tracker="bnc" id="1254592">VUL-0: CVE-2022-50635: kernel: powerpc/kprobes: Fix null pointer reference in arch_prepare_kprobe()</issue>
<issue tracker="bnc" id="1254601">VUL-0: CVE-2023-53769: kernel: virt/coco/sev-guest: Double-buffer messages</issue>
<issue tracker="bnc" id="1254608">VUL-0: CVE-2023-53755: kernel: dmaengine: ptdma: check for null desc before calling pt_cmd_callback</issue>
<issue tracker="bnc" id="1254609">VUL-0: CVE-2023-53754: kernel: scsi: lpfc: Fix ioremap issues in lpfc_sli4_pci_mem_setup()</issue>
<issue tracker="bnc" id="1254614">VUL-0: CVE-2022-50641: kernel: HSI: omap_ssi: Fix refcount leak in ssi_probe</issue>
<issue tracker="bnc" id="1254615">VUL-0: CVE-2025-40331: kernel: sctp: Prevent TOCTOU out-of-bounds write</issue>
<issue tracker="bnc" id="1254617">VUL-0: CVE-2023-53746: kernel: s390/vfio-ap: fix memory leak in vfio_ap device driver</issue>
<issue tracker="bnc" id="1254623">VUL-0: CVE-2023-53828: kernel: Bluetooth: hci_sync: Avoid use-after-free in dbg for hci_add_adv_monitor()</issue>
<issue tracker="bnc" id="1254625">VUL-0: CVE-2022-50662: kernel: RDMA/hns: fix memory leak in hns_roce_alloc_mr()</issue>
<issue tracker="bnc" id="1254626">VUL-0: CVE-2023-53860: kernel: dm: don't attempt to queue IO under RCU protection</issue>
<issue tracker="bnc" id="1254631">VUL-0: CVE-2022-50643: kernel: cifs: Fix xid leak in cifs_copy_file_range()</issue>
<issue tracker="bnc" id="1254632">VUL-0: CVE-2022-50644: kernel: clk: ti: dra7-atl: Fix reference leak in of_dra7_atl_clk_probe</issue>
<issue tracker="bnc" id="1254634">VUL-0: CVE-2022-50646: kernel: scsi: hpsa: Fix possible memory leak in hpsa_init_one()</issue>
<issue tracker="bnc" id="1254644">VUL-0: CVE-2022-50633: kernel: usb: dwc3: qcom: Fix memory leak in dwc3_qcom_interconnect_init</issue>
<issue tracker="bnc" id="1254645">VUL-0: CVE-2022-50636: kernel: PCI: Fix pci_device_is_present() for VFs by checking PF</issue>
<issue tracker="bnc" id="1254649">VUL-0: CVE-2023-53844: kernel: drm/ttm: Don't leak a resource on swapout move error</issue>
<issue tracker="bnc" id="1254651">VUL-0: CVE-2023-53849: kernel: drm/msm: fix workqueue leak on bind errors</issue>
<issue tracker="bnc" id="1254653">VUL-0: CVE-2023-53852: kernel: nvme-core: fix memory leak in dhchap_secret_store</issue>
<issue tracker="bnc" id="1254656">VUL-0: CVE-2022-50679: kernel: i40e: Fix DMA mappings leak</issue>
<issue tracker="bnc" id="1254658">VUL-0: CVE-2023-53830: kernel: platform/x86: think-lmi: Fix memory leak when showing current settings</issue>
<issue tracker="bnc" id="1254660">VUL-0: CVE-2023-53834: kernel: iio: adc: ina2xx: avoid NULL pointer dereference on OF device match</issue>
<issue tracker="bnc" id="1254664">VUL-0: CVE-2022-50675: kernel: arm64: mte: Avoid setting PG_mte_tagged if no tags cleared or restored</issue>
<issue tracker="bnc" id="1254671">VUL-0: CVE-2023-53832: kernel: md/raid10: fix null-ptr-deref in raid10_sync_request</issue>
<issue tracker="bnc" id="1254674">VUL-0: CVE-2022-50666: kernel: RDMA/siw: Fix QP destroy to wait for all references dropped.</issue>
<issue tracker="bnc" id="1254676">VUL-0: CVE-2022-50660: kernel: wifi: ipw2200: fix memory leak in ipw_wdev_init()</issue>
<issue tracker="bnc" id="1254677">VUL-0: CVE-2023-53850: kernel: iavf: use internal state to free traffic IRQs</issue>
<issue tracker="bnc" id="1254681">VUL-0: CVE-2023-53833: kernel: drm/i915: Fix NULL ptr deref by checking new_crtc_state</issue>
<issue tracker="bnc" id="1254684">VUL-0: CVE-2022-50667: kernel: drm/vmwgfx: Fix memory leak in vmw_mksstat_add_ioctl()</issue>
<issue tracker="bnc" id="1254685">VUL-0: CVE-2022-50665: kernel: wifi: ath11k: fix failed to find the peer with peer_id 0 when disconnected</issue>
<issue tracker="bnc" id="1254686">VUL-0: CVE-2022-50640: kernel: mmc: core: Fix kernel panic when remove non-standard SDIO card</issue>
<issue tracker="bnc" id="1254690">VUL-0: CVE-2023-53842: kernel: ASoC: codecs: wcd-mbhc-v2: fix resource leaks on component remove</issue>
<issue tracker="bnc" id="1254692">VUL-0: CVE-2022-50677: kernel: ipmi: fix use after free in _ipmi_destroy_user()</issue>
<issue tracker="bnc" id="1254694">VUL-0: CVE-2023-53837: kernel: drm/msm: fix NULL-deref on snapshot tear down</issue>
<issue tracker="bnc" id="1254696">VUL-0: CVE-2022-50672: kernel: mailbox: zynq-ipi: fix error handling while device_register() fails</issue>
<issue tracker="bnc" id="1254698">VUL-0: CVE-2023-53847: kernel: usb-storage: alauda: Fix uninit-value in alauda_check_media()</issue>
<issue tracker="bnc" id="1254699">VUL-0: CVE-2022-50670: kernel: mmc: omap_hsmmc: fix return value check of mmc_add_host()</issue>
<issue tracker="bnc" id="1254704">VUL-0: CVE-2023-53858: kernel: tty: serial: samsung_tty: Fix a memory leak in s3c24xx_serial_getclk() in case of error</issue>
<issue tracker="bnc" id="1254706">VUL-0: CVE-2023-53820: kernel: loop: loop_set_status_from_info() check before assignment</issue>
<issue tracker="bnc" id="1254709">VUL-0: CVE-2023-53840: kernel: usb: early: xhci-dbc: Fix a potential out-of-bound memory access</issue>
<issue tracker="bnc" id="1254710">VUL-0: CVE-2022-50669: kernel: misc: ocxl: fix possible name leak in ocxl_file_register_afu()</issue>
<issue tracker="bnc" id="1254711">VUL-0: CVE-2022-50671: kernel: RDMA/rxe: Fix "kernel NULL pointer dereference" error</issue>
<issue tracker="bnc" id="1254712">VUL-0: CVE-2023-53819: kernel: amdgpu: validate offset_in_bo of drm_amdgpu_gem_va</issue>
<issue tracker="bnc" id="1254713">VUL-0: CVE-2023-53814: kernel: PCI: Fix dropping valid root bus resources with .end = zero</issue>
<issue tracker="bnc" id="1254714">VUL-0: CVE-2023-53818: kernel: ARM: zynq: Fix refcount leak in zynq_early_slcr_init</issue>
<issue tracker="bnc" id="1254716">VUL-0: CVE-2023-53811: kernel: RDMA/irdma: Cap MSIX used to online CPUs + 1</issue>
<issue tracker="bnc" id="1254723">VUL-0: CVE-2023-53808: kernel: wifi: mwifiex: fix memory leak in mwifiex_histogram_read()</issue>
<issue tracker="bnc" id="1254725">VUL-0: CVE-2023-53802: kernel: wifi: ath9k: htc_hst: free skb in ath9k_htc_rx_msg() if there is no callback function</issue>
<issue tracker="bnc" id="1254728">VUL-0: CVE-2022-50652: kernel: uio: uio_dmem_genirq: Fix missing unlock in irq configuration</issue>
<issue tracker="bnc" id="1254729">VUL-0: CVE-2022-50653: kernel: mmc: atmel-mci: fix return value check of mmc_add_host()</issue>
<issue tracker="bnc" id="1254743">VUL-0: CVE-2023-53792: kernel: nvme-core: fix memory leak in dhchap_ctrl_secret</issue>
<issue tracker="bnc" id="1254745">VUL-0: CVE-2022-50656: kernel: nfc: pn533: Clear nfc_target before being used</issue>
<issue tracker="bnc" id="1254751">VUL-0: CVE-2023-53781: kernel: smc: Fix use-after-free in tcp_write_timer_handler().</issue>
<issue tracker="bnc" id="1254753">VUL-0: CVE-2023-53848: kernel: md/raid5-cache: fix a deadlock in r5l_exit_log()</issue>
<issue tracker="bnc" id="1254754">VUL-0: CVE-2023-53864: kernel: drm/mxsfb: Disable overlay plane in mxsfb_plane_overlay_atomic_disable()</issue>
<issue tracker="bnc" id="1254756">VUL-0: CVE-2022-50658: kernel: cpufreq: qcom: fix memory leak in error path</issue>
<issue tracker="bnc" id="1254759">VUL-0: CVE-2022-50661: kernel: seccomp: Move copy_seccomp() to no failure path.</issue>
<issue tracker="bnc" id="1254763">VUL-0: CVE-2022-50668: kernel: ext4: fix deadlock due to mbcache entry corruption</issue>
<issue tracker="bnc" id="1254775">VUL-0: CVE-2022-50649: kernel: power: supply: adp5061: fix out-of-bounds read in adp5061_get_chg_type()</issue>
<issue tracker="bnc" id="1254780">VUL-0: CVE-2022-50617: drm/amdgpu/powerplay/psm: Fix memory leak in power state init</issue>
<issue tracker="bnc" id="1254781">VUL-0: CVE-2023-53744: kernel: soc: ti: pm33xx: Fix refcount leak in am33xx_pm_probe</issue>
<issue tracker="bnc" id="1254782">VUL-0: CVE-2023-53743: kernel: PCI: Free released resource after coalescing</issue>
<issue tracker="bnc" id="1254783">VUL-0: CVE-2022-50629: kernel: wifi: rsi: Fix memory leak in rsi_coex_attach()</issue>
<issue tracker="bnc" id="1254785">VUL-0: CVE-2022-50630: kernel: mm: hugetlb: fix UAF in hugetlb_handle_userfault</issue>
<issue tracker="bnc" id="1254786">VUL-0: CVE-2022-50621: kernel: dm: verity-loadpin: Only trust verity targets with enforcement</issue>
<issue tracker="bnc" id="1254788">VUL-0: CVE-2022-50618: kernel: mmc: meson-gx: fix return value check of mmc_add_host()</issue>
<issue tracker="bnc" id="1254789">VUL-0: CVE-2022-50619: kernel: drm/amdkfd: Fix memory leak in kfd_mem_dmamap_userptr()</issue>
<issue tracker="bnc" id="1254792">VUL-0: CVE-2022-50623: kernel: fpga: prevent integer overflow in dfl_feature_ioctl_set_irq()</issue>
<issue tracker="bnc" id="1254813">VUL-0: CVE-2025-40233: kernel: ocfs2: clear extent cache after moving/defragmenting extents</issue>
<issue tracker="bnc" id="1254843">VUL-0: CVE-2025-40258: kernel: mptcp: fix race condition in mptcp_schedule_work()</issue>
<issue tracker="bnc" id="1254847">VUL-0: CVE-2025-40280: kernel: tipc: Fix use-after-free in tipc_mon_reinit_self().</issue>
<issue tracker="bnc" id="1254851">VUL-0: CVE-2025-40256: kernel: xfrm: also call xfrm_state_delete_tunnel at destroy time for states that were never added</issue>
<issue tracker="bnc" id="1254894">VUL-0: CVE-2025-40277: kernel: drm/vmwgfx: Validate command header size against SVGA_CMD_MAX_DATASIZE</issue>
<issue tracker="bnc" id="1254902">VUL-0: CVE-2022-50678: kernel: wifi: brcmfmac: fix invalid address access when enabling SCAN log level</issue>
<issue tracker="bnc" id="1254910">VUL-0: CVE-2023-53753: kernel: drm/amd/display: fix mapping to non-allocated address</issue>
<issue tracker="bnc" id="1254911">VUL-0: CVE-2023-53780: drm/amd/display: fix FCLK pstate change underflow</issue>
<issue tracker="bnc" id="1254915">VUL-0: CVE-2023-53783: blk-iocost: fix divide by 0 error in calc_lcoefs()</issue>
<issue tracker="bnc" id="1254916">VUL-0: CVE-2023-53786: kernel: dm flakey: fix a crash with invalid table line</issue>
<issue tracker="bnc" id="1254917">VUL-0: CVE-2023-53788: kernel: ALSA: hda/ca0132: fixup buffer overrun at tuning_ctl_set()</issue>
<issue tracker="bnc" id="1254920">VUL-0: CVE-2023-53804: kernel: nilfs2: fix use-after-free bug of nilfs_root in nilfs_evict_inode()</issue>
<issue tracker="bnc" id="1254922">VUL-0: CVE-2023-53801: kernel: iommu/sprd: Release dma buffer to avoid memory leak</issue>
<issue tracker="bnc" id="1254958">VUL-0: CVE-2023-53816: drm/amdkfd: fix potential kgd_mem UAFs</issue>
<issue tracker="bnc" id="1254959">VUL-0: CVE-2025-40215: kernel: xfrm: delete x->tunnel as we delete x</issue>
<issue tracker="bnc" id="1254974">VUL-0: CVE-2022-50664: media: dvb-frontends: fix leak of memory fw</issue>
<issue tracker="bnc" id="1254979">VUL-0: CVE-2023-53806: kernel: drm/amd/display: populate subvp cmd info only for the top pipe</issue>
<issue tracker="bnc" id="1254986">VUL-0: CVE-2023-53751: kernel: cifs: fix potential use-after-free bugs in TCP_Server_Info:hostname</issue>
<issue tracker="bnc" id="1254994">VUL-0: CVE-2023-53862: kernel: hfs: fix missing hfs_bnode_get() in __hfs_bnode_create</issue>
<issue tracker="bnc" id="1255002">VUL-0: CVE-2023-53761: kernel: USB: usbtmc: Fix direction for 0-length ioctl control messages</issue>
<issue tracker="bnc" id="1255005">VUL-0: CVE-2023-53766: kernel: FS: JFS: Check for read-only mounted filesystem in txBegin</issue>
<issue tracker="bnc" id="1255007">VUL-0: CVE-2023-53845: kernel: nilfs2: fix infinite loop in nilfs_mdt_get_block()</issue>
<issue tracker="bnc" id="1255049">VUL-0: CVE-2023-53827: kernel: Bluetooth: L2CAP: Fix use-after-free in l2cap_disconnect_{req,rsp}</issue>
<issue tracker="bnc" id="1255060">VUL-0: CVE-2023-53866: kernel: ASoC: soc-compress: Reposition and add pcm_mutex</issue>
<issue tracker="bnc" id="1255107">L3: SLES15_SP5 net: mana: Assigning IRQ affinity on HT cores patch missing</issue>
<issue tracker="bnc" id="1255163">VUL-0: CVE-2023-53794: kernel: cifs: fix session state check in reconnect to avoid use-after-free issue</issue>
<issue tracker="bnc" id="1255165">VUL-0: CVE-2023-53803: kernel: scsi: ses: Fix slab-out-of-bounds in ses_enclosure_data_process()</issue>
<issue tracker="bnc" id="1255245">VUL-0: CVE-2025-68218: kernel: nvme-multipath: fix lockdep WARN due to partition scan work</issue>
<issue tracker="bnc" id="1255467">VUL-0: CVE-2022-50622: kernel: ext4: fix potential memory leak in ext4_fc_record_modified_inode()</issue>
<issue tracker="bnc" id="1255469">VUL-0: CVE-2022-50638: kernel: ext4: fix bug_on in __es_tree_search caused by bad boot loader inode</issue>
<issue tracker="bnc" id="1255521">VUL-0: CVE-2022-50673: kernel: ext4: fix use-after-free in ext4_orphan_cleanup</issue>
<issue tracker="bnc" id="1255528">VUL-0: CVE-2023-54036: kernel: wifi: rtl8xxxu: Fix memory leaks with RTL8723BU, RTL8192EU</issue>
<issue tracker="bnc" id="1255532">VUL-0: CVE-2023-54041: kernel: io_uring: fix memory leak when removing provided buffers</issue>
<issue tracker="bnc" id="1255546">VUL-0: CVE-2023-54028: kernel: RDMA/rxe: Fix the error "trying to register non-static key in rxe_cleanup_task"</issue>
<issue tracker="bnc" id="1255549">VUL-0: CVE-2023-54026: kernel: opp: Fix use-after-free in lazy_opp_tables after probe deferral</issue>
<issue tracker="bnc" id="1255554">VUL-0: CVE-2023-54040: kernel: ice: fix wrong fallback logic for FDIR</issue>
<issue tracker="bnc" id="1255555">VUL-0: CVE-2023-54039: kernel: can: j1939: j1939_tp_tx_dat_new(): fix out-of-bounds memory access</issue>
<issue tracker="bnc" id="1255558">VUL-0: CVE-2023-54025: kernel: wifi: rsi: Do not configure WoWlan in shutdown hook if not enabled</issue>
<issue tracker="bnc" id="1255560">VUL-0: CVE-2023-53990: kernel: SMB3: Add missing locks to protect deferred close file list</issue>
<issue tracker="bnc" id="1255561">VUL-0: CVE-2022-50710: kernel: ice: set tx_tstamps when creating new Tx rings via ethtool</issue>
<issue tracker="bnc" id="1255562">VUL-0: CVE-2023-54015: kernel: net/mlx5: Devcom, fix error flow in mlx5_devcom_register_device</issue>
<issue tracker="bnc" id="1255565">VUL-0: CVE-2022-50709: kernel: wifi: ath9k: avoid uninit memory read in ath9k_htc_rx_msg()</issue>
<issue tracker="bnc" id="1255574">VUL-0: CVE-2023-54020: kernel: dmaengine: sf-pdma: pdma_desc memory leak fix</issue>
<issue tracker="bnc" id="1255576">VUL-0: CVE-2022-50700: kernel: wifi: ath10k: Delay the unmapping of the buffer</issue>
<issue tracker="bnc" id="1255578">VUL-0: CVE-2023-53998: kernel: hwrng: virtio - Fix race on data_avail and actual data</issue>
<issue tracker="bnc" id="1255582">VUL-0: CVE-2022-50699: kernel: selinux: enable use of both GFP_KERNEL and GFP_ATOMIC in convert_context()</issue>
<issue tracker="bnc" id="1255596">VUL-0: CVE-2022-50705: kernel: io_uring/rw: defer fsnotify calls to task context</issue>
<issue tracker="bnc" id="1255600">VUL-0: CVE-2023-54021: kernel: ext4: set goal start correctly in ext4_mb_normalize_request</issue>
<issue tracker="bnc" id="1255605">VUL-0: CVE-2023-54017: kernel: powerpc/pseries: fix possible memory leak in ibmebus_bus_init()</issue>
<issue tracker="bnc" id="1255607">VUL-0: CVE-2022-50703: kernel: soc: qcom: smsm: Fix refcount leak bugs in qcom_smsm_probe()</issue>
<issue tracker="bnc" id="1255608">VUL-0: CVE-2022-50698: kernel: ASoC: da7219: Fix an error handling path in da7219_register_dai_clks()</issue>
<issue tracker="bnc" id="1255609">VUL-0: CVE-2023-54024: kernel: KVM: Destroy target device if coalesced MMIO unregistration fails</issue>
<issue tracker="bnc" id="1255618">VUL-0: CVE-2023-53996: kernel: x86/sev: Make enc_dec_hypercall() accept a size instead of npages</issue>
<issue tracker="bnc" id="1255619">VUL-0: CVE-2023-54003: kernel: RDMA/core: Fix GID entry ref leak when create_ah fails</issue>
<issue tracker="bnc" id="1255620">VUL-0: CVE-2023-54009: kernel: i2c: cadence: cdns_i2c_master_xfer(): Fix runtime PM leak on error path</issue>
<issue tracker="bnc" id="1255623">VUL-0: CVE-2022-50704: kernel: USB: gadget: Fix use-after-free during usb config switch</issue>
<issue tracker="bnc" id="1255624">VUL-0: CVE-2022-50702: kernel: vdpa_sim: fix possible memory leak in vdpasim_net_init() and vdpasim_blk_init()</issue>
<issue tracker="bnc" id="1255626">VUL-0: CVE-2023-54007: kernel: vmci_host: fix a race condition in vmci_host_poll() causing GPF</issue>
<issue tracker="bnc" id="1255627">VUL-0: CVE-2023-53991: kernel: drm/msm/dpu: Disallow unallocated resources to be returned</issue>
<issue tracker="bnc" id="1255628">VUL-0: CVE-2023-54001: kernel: staging: r8712: Fix memory leak in _r8712_init_xmit_priv()</issue>
<issue tracker="bnc" id="1255635">VUL-0: CVE-2022-50701: kernel: wifi: mt76: mt7921s: fix slab-out-of-bounds access in sdio host</issue>
<issue tracker="bnc" id="1255636">VUL-0: CVE-2023-54019: kernel: sched/psi: use kernfs polling functions for PSI trigger polling</issue>
<issue tracker="bnc" id="1255688">VUL-0: CVE-2025-68732: kernel: gpu: host1x: Fix race in syncpt alloc/free</issue>
<issue tracker="bnc" id="1255690">VUL-0: CVE-2023-54018: kernel: drm/msm/hdmi: Add missing check for alloc_ordered_workqueue</issue>
<issue tracker="bnc" id="1255697">VUL-0: CVE-2023-54159: kernel: usb: mtu3: fix kernel panic at qmu transfer done irq handler</issue>
<issue tracker="bnc" id="1255702">VUL-0: CVE-2023-54042: kernel: powerpc/64s: Fix VAS mm use after free</issue>
<issue tracker="bnc" id="1255704">VUL-0: CVE-2023-54156: kernel: sfc: fix crash when reading stats while NIC is resetting</issue>
<issue tracker="bnc" id="1255745">VUL-0: CVE-2022-50712: kernel: devlink: hold region lock when flushing snapshots</issue>
<issue tracker="bnc" id="1255747">VUL-0: CVE-2022-50714: kernel: wifi: mt76: mt7921e: fix rmmod crash in driver reload test</issue>
<issue tracker="bnc" id="1255749">VUL-0: CVE-2022-50715: kernel: md/raid1: stop mdx_raid1 thread when raid1 array run failed</issue>
<issue tracker="bnc" id="1255750">VUL-0: CVE-2022-50718: kernel: drm/amdgpu: fix pci device refcount leak</issue>
<issue tracker="bnc" id="1255757">VUL-0: CVE-2023-54325: kernel: crypto: qat - fix out-of-bounds read</issue>
<issue tracker="bnc" id="1255758">VUL-0: CVE-2023-54326: kernel: misc: pci_endpoint_test: Free IRQs before removing the device</issue>
<issue tracker="bnc" id="1255760">VUL-0: CVE-2023-54319: kernel: pinctrl: at91-pio4: check return value of devm_kasprintf()</issue>
<issue tracker="bnc" id="1255761">VUL-0: CVE-2023-54320: kernel: platform/x86/amd: pmc: Fix memory leak in amd_pmc_stb_debugfs_open_v2()</issue>
<issue tracker="bnc" id="1255762">VUL-0: CVE-2023-54321: kernel: driver core: fix potential null-ptr-deref in device_add()</issue>
<issue tracker="bnc" id="1255763">VUL-0: CVE-2023-54322: kernel: arm64: set __exception_irq_entry with __irq_entry as a default</issue>
<issue tracker="bnc" id="1255769">VUL-0: CVE-2023-54315: kernel: powerpc/powernv/sriov: perform null check on iov before dereferencing iov</issue>
<issue tracker="bnc" id="1255771">VUL-0: CVE-2023-54317: kernel: dm flakey: don't corrupt the zero page</issue>
<issue tracker="bnc" id="1255773">VUL-0: CVE-2023-54311: kernel: ext4: fix deadlock when converting an inline directory in nojournal mode</issue>
<issue tracker="bnc" id="1255780">VUL-0: CVE-2023-54309: kernel: tpm: tpm_vtpm_proxy: fix a race condition in /dev/vtpmx creation</issue>
<issue tracker="bnc" id="1255786">VUL-0: CVE-2023-54304: kernel: firmware: meson_sm: fix to avoid potential NULL pointer dereference</issue>
<issue tracker="bnc" id="1255787">VUL-0: CVE-2023-54305: kernel: ext4: refuse to create ea block when umounted</issue>
<issue tracker="bnc" id="1255789">VUL-0: CVE-2023-54299: kernel: usb: typec: bus: verify partner exists in typec_altmode_attention</issue>
<issue tracker="bnc" id="1255790">VUL-0: CVE-2023-54300: kernel: wifi: ath9k: avoid referencing uninit memory in ath9k_wmi_ctrl_rx</issue>
<issue tracker="bnc" id="1255791">VUL-0: CVE-2023-54301: kernel: serial: 8250_bcm7271: fix leak in `brcmuart_probe`</issue>
<issue tracker="bnc" id="1255792">VUL-0: CVE-2023-54302: kernel: RDMA/irdma: Fix data race on CQP completion stats</issue>
<issue tracker="bnc" id="1255796">VUL-0: CVE-2023-54298: kernel: thermal: intel: quark_dts: fix error pointer dereference</issue>
<issue tracker="bnc" id="1255797">VUL-0: CVE-2023-54295: kernel: mtd: spi-nor: Fix shift-out-of-bounds in spi_nor_set_erase_type</issue>
<issue tracker="bnc" id="1255800">VUL-0: CVE-2023-54292: kernel: RDMA/irdma: Fix data race on CQP request done</issue>
<issue tracker="bnc" id="1255801">VUL-0: CVE-2023-54293: kernel: bcache: fixup btree_cache_wait list damage</issue>
<issue tracker="bnc" id="1255802">VUL-0: CVE-2023-54294: kernel: md/raid10: fix memleak of md thread</issue>
<issue tracker="bnc" id="1255803">VUL-0: CVE-2023-54286: kernel: wifi: iwlwifi: dvm: Fix memcpy: detected field-spanning write backtrace</issue>
<issue tracker="bnc" id="1255804">VUL-0: CVE-2023-54287: kernel: tty: serial: imx: disable Ageing Timer interrupt request irq</issue>
<issue tracker="bnc" id="1255806">VUL-0: CVE-2023-54289: kernel: scsi: qedf: Fix NULL dereference in error handling</issue>
<issue tracker="bnc" id="1255808">VUL-0: CVE-2023-54284: kernel: media: av7110: prevent underflow in write_ts_to_decoder()</issue>
<issue tracker="bnc" id="1255819">VUL-0: CVE-2023-54280: kernel: cifs: fix potential race when tree connecting ipc</issue>
<issue tracker="bnc" id="1255839">VUL-0: CVE-2022-50716: kernel: wifi: ar5523: Fix use-after-free on ar5523_cmd() timed out</issue>
<issue tracker="bnc" id="1255841">VUL-0: CVE-2023-54226: kernel: af_unix: Fix data races around sk->sk_shutdown.</issue>
<issue tracker="bnc" id="1255843">VUL-0: CVE-2023-54211: kernel: tracing: Fix warning in trace_buffered_event_disable()</issue>
<issue tracker="bnc" id="1255844">VUL-0: CVE-2022-50717: kernel: nvmet-tcp: add bounds check on Transfer Tag</issue>
<issue tracker="bnc" id="1255872">VUL-0: CVE-2023-54264: kernel: fs/sysv: Null check to prevent null-ptr-deref bug</issue>
<issue tracker="bnc" id="1255875">VUL-0: CVE-2023-54266: kernel: media: dvb-usb: m920x: Fix a potential memory leak in m920x_i2c_xfer()</issue>
<issue tracker="bnc" id="1255876">VUL-0: CVE-2023-54269: kernel: SUNRPC: double free xprt_ctxt while still in use</issue>
<issue tracker="bnc" id="1255877">VUL-0: CVE-2022-50722: kernel: media: ipu3-imgu: Fix NULL pointer dereference in active selection access</issue>
<issue tracker="bnc" id="1255878">VUL-0: CVE-2023-54260: kernel: cifs: Fix lost destroy smbd connection when MR allocate failed</issue>
<issue tracker="bnc" id="1255880">VUL-0: CVE-2023-54202: drm/i915: fix race condition UAF in i915_perf_add_config_ioctl</issue>
<issue tracker="bnc" id="1255881">VUL-0: CVE-2023-54262: kernel: net/mlx5e: Don't clone flow post action attributes second time</issue>
<issue tracker="bnc" id="1255888">VUL-0: CVE-2023-54251: kernel: net/sched: taprio: Limit TCA_TAPRIO_ATTR_SCHED_CYCLE_TIME to INT_MAX.</issue>
<issue tracker="bnc" id="1255889">VUL-0: CVE-2023-54252: kernel: platform/x86: think-lmi: Fix memory leaks when parsing ThinkStation WMI strings</issue>
<issue tracker="bnc" id="1255890">VUL-0: CVE-2023-54254: kernel: drm/ttm: Don't leak a resource on eviction error</issue>
<issue tracker="bnc" id="1255899">VUL-0: CVE-2023-54267: kernel: powerpc/pseries: Rework lppaca_shared_proc() to avoid DEBUG_PREEMPT</issue>
<issue tracker="bnc" id="1255901">VUL-0: CVE-2023-54270: kernel: media: usb: siano: Fix use after free bugs caused by do_submit_urb</issue>
<issue tracker="bnc" id="1255902">VUL-0: CVE-2023-54271: kernel: blk-cgroup: Fix NULL deref caused by blkg_policy_data being installed before init</issue>
<issue tracker="bnc" id="1255905">VUL-0: CVE-2023-54274: kernel: RDMA/srpt: Add a check for valid 'mad_agent' pointer</issue>
<issue tracker="bnc" id="1255906">VUL-0: CVE-2023-54275: kernel: wifi: ath11k: Fix memory leak in ath11k_peer_rx_frag_setup</issue>
<issue tracker="bnc" id="1255909">VUL-0: CVE-2023-54244: kernel: ACPI: EC: Fix oops when removing custom query handlers</issue>
<issue tracker="bnc" id="1255910">VUL-0: CVE-2023-54277: kernel: fbdev: udlfb: Fix endpoint check</issue>
<issue tracker="bnc" id="1255912">VUL-0: CVE-2023-54245: kernel: ASoC: codecs: tx-macro: Fix for KASAN: slab-out-of-bounds</issue>
<issue tracker="bnc" id="1255916">VUL-0: CVE-2023-54238: kernel: mlx5: fix skb leak while fifo resync and push</issue>
<issue tracker="bnc" id="1255919">VUL-0: CVE-2023-54242: kernel: block, bfq: Fix division by zero error on zero wsum</issue>
<issue tracker="bnc" id="1255920">VUL-0: CVE-2023-54234: kernel: scsi: mpi3mr: Fix missing mrioc->evtack_cmds initialization</issue>
<issue tracker="bnc" id="1255922">VUL-0: CVE-2023-54236: kernel: net/net_failover: fix txq exceeding warning</issue>
<issue tracker="bnc" id="1255924">VUL-0: CVE-2023-54229: kernel: wifi: ath11k: fix registration of 6Ghz-only phy without the full channel range</issue>
<issue tracker="bnc" id="1255925">VUL-0: CVE-2023-54230: kernel: amba: bus: fix refcount leak</issue>
<issue tracker="bnc" id="1255939">VUL-0: CVE-2022-50719: ALSA: line6: fix stack overflow in line6_midi_transmit</issue>
<issue tracker="bnc" id="1255946">VUL-0: CVE-2022-50723: kernel: bnxt_en: fix memory leak in bnxt_nvm_test()</issue>
<issue tracker="bnc" id="1255950">VUL-0: CVE-2022-50724: kernel: regulator: core: fix resource leak in regulator_register()</issue>
<issue tracker="bnc" id="1255953">VUL-0: CVE-2023-54213: kernel: USB: sisusbvga: Add endpoint checks</issue>
<issue tracker="bnc" id="1255954">VUL-0: CVE-2023-54214: kernel: Bluetooth: L2CAP: Fix potential user-after-free</issue>
<issue tracker="bnc" id="1255955">VUL-0: CVE-2023-54210: kernel: Bluetooth: hci_sync: Avoid use-after-free in dbg for hci_remove_adv_monitor()</issue>
<issue tracker="bnc" id="1255962">VUL-0: CVE-2023-54208: kernel: media: ov5675: Fix memleak in ov5675_init_controls()</issue>
<issue tracker="bnc" id="1255964">VUL-0: CVE-2023-54201: kernel: RDMA/efa: Fix wrong resources deallocation order</issue>
<issue tracker="bnc" id="1255968">VUL-0: CVE-2023-54205: kernel: pinctrl: stm32: Fix refcount leak in stm32_pctrl_get_irq_domain</issue>
<issue tracker="bnc" id="1255969">VUL-0: CVE-2023-54197: kernel: Revert "Bluetooth: btsdio: fix use after free bug in btsdio_remove due to unfinished work"</issue>
<issue tracker="bnc" id="1255970">VUL-0: CVE-2023-54198: kernel: tty: fix out-of-bounds access in tty_driver_lookup_tty()</issue>
<issue tracker="bnc" id="1255971">VUL-0: CVE-2023-54199: kernel: drm/msm/adreno: Fix null ptr access in adreno_gpu_cleanup()</issue>
<issue tracker="bnc" id="1255974">VUL-0: CVE-2023-54194: kernel: exfat: use kvmalloc_array/kvfree instead of kmalloc_array/kfree</issue>
<issue tracker="bnc" id="1255978">VUL-0: CVE-2023-54189: kernel: pstore/ram: Add check for kstrdup</issue>
<issue tracker="bnc" id="1255979">VUL-0: CVE-2023-54190: kernel: leds: led-core: Fix refcount leak in of_led_get()</issue>
<issue tracker="bnc" id="1255983">VUL-0: CVE-2022-50760: drm/amdgpu: Fix PCI device refcount leak in amdgpu_atrm_get_bios()</issue>
<issue tracker="bnc" id="1255985">VUL-0: CVE-2023-54186: kernel: usb: typec: altmodes/displayport: fix pin_assignment_show</issue>
<issue tracker="bnc" id="1255990">VUL-0: CVE-2023-54183: kernel: media: v4l2-core: Fix a potential resource leak in v4l2_fwnode_parse_link()</issue>
<issue tracker="bnc" id="1255993">VUL-0: CVE-2023-54177: kernel: quota: fix warning in dqgrab()</issue>
<issue tracker="bnc" id="1255994">VUL-0: CVE-2023-54179: kernel: scsi: qla2xxx: Array index may go out of bound</issue>
<issue tracker="bnc" id="1255996">VUL-0: CVE-2023-54173: kernel: bpf: Disable preemption in bpf_event_output</issue>
<issue tracker="bnc" id="1255998">VUL-0: CVE-2023-54175: kernel: i2c: xiic: xiic_xfer(): Fix runtime PM leak on error path</issue>
<issue tracker="bnc" id="1256034">VUL-0: CVE-2023-54171: kernel: tracing: Fix memory leak of iter->temp when reading trace_pipe</issue>
<issue tracker="bnc" id="1256040">VUL-0: CVE-2022-50726: kernel: net/mlx5: Fix possible use-after-free in async command interface</issue>
<issue tracker="bnc" id="1256042">VUL-0: CVE-2022-50727: kernel: scsi: efct: Fix possible memleak in efct_device_init()</issue>
<issue tracker="bnc" id="1256045">VUL-0: CVE-2023-54170: kernel: keys: Fix linking a duplicate key to a keyring's assoc_array</issue>
<issue tracker="bnc" id="1256046">VUL-0: CVE-2022-50728: kernel: s390/lcs: Fix return type of lcs_start_xmit()</issue>
<issue tracker="bnc" id="1256048">VUL-0: CVE-2022-50730: kernel: ext4: silence the warning when evicting inode with dioread_nolock</issue>
<issue tracker="bnc" id="1256049">VUL-0: CVE-2022-50731: kernel: crypto: akcipher - default implementation for setting a private key</issue>
<issue tracker="bnc" id="1256050">VUL-0: CVE-2023-54169: kernel: net/mlx5e: fix memory leak in mlx5e_ptp_open</issue>
<issue tracker="bnc" id="1256053">VUL-0: CVE-2023-54168: kernel: RDMA/mlx4: Prevent shift wrapping in set_user_sq_size()</issue>
<issue tracker="bnc" id="1256056">VUL-0: CVE-2022-50889: kernel: dm integrity: Fix UAF in dm_integrity_dtr()</issue>
<issue tracker="bnc" id="1256057">VUL-0: CVE-2022-50888: kernel: remoteproc: qcom: q6v5: Fix potential null-ptr-deref in q6v5_wcss_init_mmio()</issue>
<issue tracker="bnc" id="1256062">VUL-0: CVE-2022-50761: x86/xen: Fix memory leak in xen_init_lock_cpu()</issue>
<issue tracker="bnc" id="1256063">VUL-0: CVE-2022-50732: kernel: staging: rtl8192u: Fix use after free in ieee80211_rx()</issue>
<issue tracker="bnc" id="1256064">VUL-0: CVE-2022-50733: kernel: usb: idmouse: fix an uninit-value in idmouse_open</issue>
<issue tracker="bnc" id="1256065">VUL-0: CVE-2022-50754: apparmor: fix a memleak in multi_transaction_new()</issue>
<issue tracker="bnc" id="1256071">VUL-0: CVE-2023-54164: kernel: Bluetooth: ISO: fix iso_conn related locking and validity issues</issue>
<issue tracker="bnc" id="1256074">VUL-0: CVE-2023-54166: kernel: igc: Fix Kernel Panic during ndo_tx_timeout callback</issue>
<issue tracker="bnc" id="1256081">VUL-0: CVE-2023-54153: kernel: ext4: turn quotas off if mount failed after enabling quotas</issue>
<issue tracker="bnc" id="1256084">VUL-0: CVE-2023-54148: kernel: net/mlx5e: Move representor neigh cleanup to profile cleanup_tx</issue>
<issue tracker="bnc" id="1256086">VUL-0: CVE-2023-54150: kernel: drm/amd: Fix an out of bounds error in BIOS parser</issue>
<issue tracker="bnc" id="1256088">VUL-0: CVE-2023-54144: kernel: drm/amdkfd: Fix kernel warning during topology setup</issue>
<issue tracker="bnc" id="1256091">VUL-0: CVE-2023-54146: kernel: x86/kexec: Fix double-free of elf header buffer</issue>
<issue tracker="bnc" id="1256093">VUL-0: CVE-2023-54140: kernel: nilfs2: fix WARNING in mark_buffer_dirty due to discarded buffer reuse</issue>
<issue tracker="bnc" id="1256099">VUL-0: CVE-2023-54136: kernel: serial: sprd: Fix DMA buffer leak issue</issue>
<issue tracker="bnc" id="1256101">VUL-0: CVE-2023-54138: kernel: drm/msm: fix NULL-deref on irq uninstall</issue>
<issue tracker="bnc" id="1256103">VUL-0: CVE-2023-54132: kernel: erofs: stop parsing non-compact HEAD index if clusterofs is invalid</issue>
<issue tracker="bnc" id="1256106">VUL-0: CVE-2023-54134: kernel: autofs: fix memory leak of waitqueues in autofs_catatonic_mode</issue>
<issue tracker="bnc" id="1256111">VUL-0: CVE-2022-50738: kernel: vhost-vdpa: fix an iotlb memory leak</issue>
<issue tracker="bnc" id="1256112">VUL-0: CVE-2023-54128: kernel: fs: drop peer group ids under namespace lock</issue>
<issue tracker="bnc" id="1256114">VUL-0: CVE-2023-54130: kernel: hfs/hfsplus: avoid WARN_ON() for sanity check, use proper error handling</issue>
<issue tracker="bnc" id="1256115">VUL-0: CVE-2023-54131: kernel: wifi: rt2x00: Fix memory leak when handling surveys</issue>
<issue tracker="bnc" id="1256118">VUL-0: CVE-2023-54126: kernel: crypto: safexcel - Cleanup ring IRQ workqueues on load failure</issue>
<issue tracker="bnc" id="1256119">VUL-0: CVE-2023-54127: kernel: fs/jfs: prevent double-free in dbUnmount() after failed jfs_remount()</issue>
<issue tracker="bnc" id="1256121">VUL-0: CVE-2023-54115: kernel: pcmcia: rsrc_nonstatic: Fix memory leak in nonstatic_release_resource_db()</issue>
<issue tracker="bnc" id="1256122">VUL-0: CVE-2022-50885: kernel: RDMA/rxe: Fix NULL-ptr-deref in rxe_qp_do_cleanup() when socket create failed</issue>
<issue tracker="bnc" id="1256124">VUL-0: CVE-2022-50886: kernel: mmc: toshsd: fix return value check of mmc_add_host()</issue>
<issue tracker="bnc" id="1256125">VUL-0: CVE-2022-50887: kernel: regulator: core: fix unbalanced of node refcount in regulator_dev_lookup()</issue>
<issue tracker="bnc" id="1256126">VUL-0: CVE-2022-50882: kernel: media: uvcvideo: Fix memory leak in uvc_gpio_parse</issue>
<issue tracker="bnc" id="1256127">VUL-0: CVE-2022-50884: kernel: drm: Prevent drm_copy_field() to attempt copying a NULL pointer</issue>
<issue tracker="bnc" id="1256128">VUL-0: CVE-2022-50883: kernel: bpf: Prevent decl_tag from being referenced in func_proto arg</issue>
<issue tracker="bnc" id="1256130">VUL-0: CVE-2022-50881: kernel: wifi: ath9k: Fix use-after-free in ath9k_hif_usb_disconnect()</issue>
<issue tracker="bnc" id="1256131">VUL-0: CVE-2023-54118: kernel: serial: sc16is7xx: setup GPIO controller later in probe</issue>
<issue tracker="bnc" id="1256132">VUL-0: CVE-2022-50880: kernel: wifi: ath10k: add peer map clean up for peer delete in ath10k_sta_state()</issue>
<issue tracker="bnc" id="1256133">VUL-0: CVE-2023-54120: kernel: Bluetooth: Fix race condition in hidp_session_thread</issue>
<issue tracker="bnc" id="1256136">VUL-0: CVE-2022-50876: kernel: usb: musb: Fix musb_gadget.c rxstate overflow bug</issue>
<issue tracker="bnc" id="1256137">VUL-0: CVE-2022-50736: kernel: RDMA/siw: Fix immediate work request flush to completion queue</issue>
<issue tracker="bnc" id="1256140">VUL-0: CVE-2022-50878: kernel: gpu: lontium-lt9611: Fix NULL pointer dereference in lt9611_connector_init()</issue>
<issue tracker="bnc" id="1256141">VUL-0: CVE-2022-50735: kernel: wifi: mt76: do not run mt76u_status_worker if the device is not running</issue>
<issue tracker="bnc" id="1256142">VUL-0: CVE-2023-54123: kernel: md/raid10: fix memleak for 'conf->bio_split'</issue>
<issue tracker="bnc" id="1256143">VUL-0: CVE-2022-50742: kernel: misc: ocxl: fix possible refcount leak in afu_ioctl()</issue>
<issue tracker="bnc" id="1256144">VUL-0: CVE-2022-50873: kernel: vdpa/vp_vdpa: fix kfree a wrong pointer in vp_vdpa_remove</issue>
<issue tracker="bnc" id="1256145">VUL-0: CVE-2023-54104: kernel: mtd: rawnand: fsl_upm: Fix an off-by one test in fun_exec_op()</issue>
<issue tracker="bnc" id="1256149">VUL-0: CVE-2023-54111: kernel: pinctrl: rockchip: Fix refcount leak in rockchip_pinctrl_parse_groups</issue>
<issue tracker="bnc" id="1256150">VUL-0: CVE-2023-54114: kernel: net: nsh: Use correct mac_offset to unwind gso skb in nsh_gso_segment()</issue>
<issue tracker="bnc" id="1256152">VUL-0: CVE-2023-54100: kernel: scsi: qedi: Fix use after free bug in qedi_remove()</issue>
<issue tracker="bnc" id="1256154">VUL-0: CVE-2022-50870: kernel: powerpc/rtas: avoid device tree lookups in rtas_os_term()</issue>
<issue tracker="bnc" id="1256155">VUL-0: CVE-2022-50740: kernel: wifi: ath9k: hif_usb: fix memory leak of urbs in ath9k_hif_usb_dealloc_tx_urbs()</issue>
<issue tracker="bnc" id="1256157">VUL-0: CVE-2022-50872: kernel: ARM: OMAP2+: Fix memory leak in realtime_counter_init()</issue>
<issue tracker="bnc" id="1256158">VUL-0: CVE-2022-50745: kernel: staging: media: tegra-video: fix device_node use after free</issue>
<issue tracker="bnc" id="1256162">VUL-0: CVE-2022-50866: kernel: ASoC: pxa: fix null-pointer dereference in filter()</issue>
<issue tracker="bnc" id="1256164">VUL-0: CVE-2022-50867: kernel: drm/msm/a6xx: Fix kvzalloc vs state_kcalloc usage</issue>
<issue tracker="bnc" id="1256165">VUL-0: CVE-2022-50744: kernel: scsi: lpfc: Fix hard lockup when reading the rx_monitor from debugfs</issue>
<issue tracker="bnc" id="1256166">VUL-0: CVE-2022-50862: kernel: bpf: prevent decl_tag from being referenced in func_proto</issue>
<issue tracker="bnc" id="1256167">VUL-0: CVE-2022-50864: kernel: nilfs2: fix shift-out-of-bounds due to too large exponent of block size</issue>
<issue tracker="bnc" id="1256172">VUL-0: CVE-2022-50859: kernel: cifs: Fix the error length of VALIDATE_NEGOTIATE_INFO message</issue>
<issue tracker="bnc" id="1256173">VUL-0: CVE-2023-54102: kernel: scsi: lpfc: Prevent lpfc_debugfs_lockstat_write() buffer overflow</issue>
<issue tracker="bnc" id="1256174">VUL-0: CVE-2022-50860: kernel: apparmor: Fix memleak in alloc_ns()</issue>
<issue tracker="bnc" id="1256177">VUL-0: CVE-2022-50861: kernel: NFSD: Finish converting the NFSv2 GETACL result encoder</issue>
<issue tracker="bnc" id="1256178">VUL-0: CVE-2023-54096: kernel: soundwire: fix enumeration completion</issue>
<issue tracker="bnc" id="1256179">VUL-0: CVE-2023-54097: kernel: regulator: stm32-pwr: fix of_iomap leak</issue>
<issue tracker="bnc" id="1256182">VUL-0: CVE-2022-50856: kernel: cifs: Fix xid leak in cifs_ses_add_channel()</issue>
<issue tracker="bnc" id="1256184">VUL-0: CVE-2022-50751: kernel: configfs: fix possible memory leak in configfs_create_dir()</issue>
<issue tracker="bnc" id="1256185">VUL-0: CVE-2023-54098: kernel: drm/i915/gvt: fix gvt debugfs destroy</issue>
<issue tracker="bnc" id="1256186">VUL-0: CVE-2022-50851: kernel: vhost_vdpa: fix the crash in unmap a large memory</issue>
<issue tracker="bnc" id="1256188">VUL-0: CVE-2022-50750: kernel: drm/panel/panel-sitronix-st7701: Remove panel on DSI attach failure</issue>
<issue tracker="bnc" id="1256189">VUL-0: CVE-2022-50853: kernel: NFSv4: Fix a credential leak in _nfs4_discover_trunking()</issue>
<issue tracker="bnc" id="1256191">VUL-0: CVE-2022-50749: kernel: acct: fix potential integer overflow in encode_comp_t()</issue>
<issue tracker="bnc" id="1256192">VUL-0: CVE-2022-50848: kernel: drivers: dio: fix possible memory leak in dio_init()</issue>
<issue tracker="bnc" id="1256193">VUL-0: CVE-2022-50849: kernel: pstore: Avoid kcore oops by vmap()ing with VM_IOREMAP</issue>
<issue tracker="bnc" id="1256194">VUL-0: CVE-2022-50850: kernel: scsi: ipr: Fix WARNING in ipr_init()</issue>
<issue tracker="bnc" id="1256196">VUL-0: CVE-2022-50845: kernel: ext4: fix inode leak in ext4_xattr_inode_create() on an error path</issue>
<issue tracker="bnc" id="1256198">VUL-0: CVE-2022-50847: kernel: drm/bridge: it6505: Initialize AUX channel in it6505_i2c_probe</issue>
<issue tracker="bnc" id="1256199">VUL-0: CVE-2022-50755: kernel: udf: Avoid double brelse() in udf_rename()</issue>
<issue tracker="bnc" id="1256200">VUL-0: CVE-2022-50846: kernel: mmc: via-sdmmc: fix return value check of mmc_add_host()</issue>
<issue tracker="bnc" id="1256202">VUL-0: CVE-2022-50842: kernel: drm/virtio: Check whether transferred 2D BO is shmem</issue>
<issue tracker="bnc" id="1256203">VUL-0: CVE-2022-50843: kernel: dm clone: Fix UAF in clone_dtr()</issue>
<issue tracker="bnc" id="1256204">VUL-0: CVE-2022-50752: kernel: md/raid5: Remove unnecessary bio_put() in raid5_read_one_chunk()</issue>
<issue tracker="bnc" id="1256205">VUL-0: CVE-2022-50844: kernel: drm/amdgpu: Fix type of second parameter in odn_edit_dpm_table() callback</issue>
<issue tracker="bnc" id="1256206">VUL-0: CVE-2022-50839: kernel: jbd2: fix potential buffer head reference count leak</issue>
<issue tracker="bnc" id="1256207">VUL-0: CVE-2022-50758: kernel: staging: vt6655: fix potential memory leak</issue>
<issue tracker="bnc" id="1256208">VUL-0: CVE-2022-50840: kernel: scsi: snic: Fix possible UAF in snic_tgt_create()</issue>
<issue tracker="bnc" id="1256211">VUL-0: CVE-2022-50836: kernel: remoteproc: sysmon: fix memory leak in qcom_add_sysmon_subdev()</issue>
<issue tracker="bnc" id="1256214">VUL-0: CVE-2022-50838: kernel: net: stream: purge sk_error_queue in sk_stream_kill_queues()</issue>
<issue tracker="bnc" id="1256215">VUL-0: CVE-2022-50757: kernel: media: camss: Clean up received buffers on failed start of streaming</issue>
<issue tracker="bnc" id="1256216">VUL-0: CVE-2022-50756: kernel: nvme-pci: fix mempool alloc size</issue>
<issue tracker="bnc" id="1256218">VUL-0: CVE-2022-50833: kernel: Bluetooth: use hdev->workqueue when queuing hdev->{cmd,ncmd}_timer works</issue>
<issue tracker="bnc" id="1256219">VUL-0: CVE-2022-50834: kernel: nfc: Fix potential resource leaks</issue>
<issue tracker="bnc" id="1256220">VUL-0: CVE-2022-50835: kernel: jbd2: add miss release buffer head in fc_do_one_pass()</issue>
<issue tracker="bnc" id="1256221">VUL-0: CVE-2022-50770: kernel: ocfs2: fix memory leak in ocfs2_mount_volume()</issue>
<issue tracker="bnc" id="1256223">VUL-0: CVE-2023-54084: kernel: ALSA: firewire-digi00x: prevent potential use after free</issue>
<issue tracker="bnc" id="1256228">VUL-0: CVE-2022-50832: kernel: wifi: wilc1000: fix potential memory leak in wilc_mac_xmit()</issue>
<issue tracker="bnc" id="1256230">VUL-0: CVE-2022-50828: kernel: clk: zynqmp: Fix stack-out-of-bounds in strncpy`</issue>
<issue tracker="bnc" id="1256231">VUL-0: CVE-2023-54219: kernel: Revert "IB/isert: Fix incorrect release of isert connection"</issue>
<issue tracker="bnc" id="1256235">VUL-0: CVE-2022-50829: wifi: ath9k: hif_usb: Fix use-after-free in ath9k_hif_usb_reg_in_cb()</issue>
<issue tracker="bnc" id="1256239">VUL-0: CVE-2022-50818: kernel: scsi: pm8001: Fix running_req for internal abort commands</issue>
<issue tracker="bnc" id="1256241">VUL-0: CVE-2022-50819: kernel: udmabuf: Set ubuf->sg = NULL if the creation of sg table fails</issue>
<issue tracker="bnc" id="1256242">VUL-0: CVE-2022-50821: kernel: SUNRPC: Don't leak netobj memory when gss_read_proxy_verf() fails</issue>
<issue tracker="bnc" id="1256245">VUL-0: CVE-2022-50773: kernel: ALSA: mts64: fix possible null-ptr-defer in snd_mts64_interrupt</issue>
<issue tracker="bnc" id="1256248">VUL-0: CVE-2022-50814: kernel: crypto: hisilicon/zip - fix mismatch in get/set sgl_sge_nr</issue>
<issue tracker="bnc" id="1256250">VUL-0: CVE-2022-50809: kernel: xhci: dbc: Fix memory leak in xhci_alloc_dbc()</issue>
<issue tracker="bnc" id="1256254">VUL-0: CVE-2022-50776: kernel: clk: st: Fix memory leak in st_of_quadfs_setup()</issue>
<issue tracker="bnc" id="1256260">VUL-0: CVE-2022-50822: kernel: RDMA/restrack: Release MR restrack when delete</issue>
<issue tracker="bnc" id="1256265">VUL-0: CVE-2022-50826: kernel: ipu3-imgu: Fix NULL pointer dereference in imgu_subdev_set_selection()</issue>
<issue tracker="bnc" id="1256269">VUL-0: CVE-2023-54090: kernel: ixgbe: Fix panic during XDP_TX with > 64 CPUs</issue>
<issue tracker="bnc" id="1256271">VUL-0: CVE-2023-54095: kernel: powerpc/iommu: Fix notifiers being shared by PCI and VIO buses</issue>
<issue tracker="bnc" id="1256274">VUL-0: CVE-2023-54091: kernel: drm/client: Fix memory leak in drm_client_target_cloned</issue>
<issue tracker="bnc" id="1256282">VUL-0: CVE-2022-50782: kernel: ext4: fix bug_on in __es_tree_search caused by bad quota inode</issue>
<issue tracker="bnc" id="1256285">VUL-0: CVE-2023-54045: kernel: audit: fix possible soft lockup in __audit_inode_child()</issue>
<issue tracker="bnc" id="1256291">VUL-0: CVE-2023-54072: kernel: ALSA: pcm: Fix potential data race at PCM memory allocation helpers</issue>
<issue tracker="bnc" id="1256294">VUL-0: CVE-2023-54044: kernel: spmi: Add a check for remove callback when removing a SPMI driver</issue>
<issue tracker="bnc" id="1256295">VUL-0: CVE-2023-54046: kernel: crypto: essiv - Handle EBUSY correctly</issue>
<issue tracker="bnc" id="1256300">VUL-0: CVE-2023-54014: kernel: scsi: qla2xxx: Check valid rport returned by fc_bsg_to_rport()</issue>
<issue tracker="bnc" id="1256302">VUL-0: CVE-2023-53989: kernel: arm64: mm: fix VA-range sanity check</issue>
<issue tracker="bnc" id="1256306">VUL-0: CVE-2022-50781: kernel: amdgpu/pm: prevent array underflow in vega20_odn_edit_dpm_table()</issue>
<issue tracker="bnc" id="1256309">VUL-0: CVE-2022-50768: kernel: scsi: smartpqi: Correct device removal for multi-actuator devices</issue>
<issue tracker="bnc" id="1256317">VUL-0: CVE-2022-50763: kernel: crypto: marvell/octeontx - prevent integer overflows</issue>
<issue tracker="bnc" id="1256320">VUL-0: CVE-2022-50777: kernel: net: phy: xgmiitorgmii: Fix refcount leak in xgmiitorgmii_probe</issue>
<issue tracker="bnc" id="1256323">VUL-0: CVE-2022-50774: kernel: crypto: qat - fix DMA transfer direction</issue>
<issue tracker="bnc" id="1256326">VUL-0: CVE-2023-54010: kernel: ACPICA: ACPICA: check null return of ACPI_ALLOCATE_ZEROED in acpi_db_display_objects</issue>
<issue tracker="bnc" id="1256328">VUL-0: CVE-2022-50830: kernel: auxdisplay: hd44780: Fix potential memory leak in hd44780_remove()</issue>
<issue tracker="bnc" id="1256333">VUL-0: CVE-2022-50823: kernel: clk: tegra: Fix refcount leak in tegra114_clock_init</issue>
<issue tracker="bnc" id="1256334">VUL-0: CVE-2022-50824: kernel: tpm: tpm_tis: Add the missed acpi_put_table() to fix memory leak</issue>
<issue tracker="bnc" id="1256335">VUL-0: CVE-2023-54076: kernel: smb: client: fix missed ses refcounting</issue>
<issue tracker="bnc" id="1256337">VUL-0: CVE-2023-54078: kernel: media: max9286: Free control handler</issue>
<issue tracker="bnc" id="1256338">VUL-0: CVE-2023-54079: kernel: power: supply: bq27xxx: Fix poll_interval handling and races on remove</issue>
<issue tracker="bnc" id="1256344">VUL-0: CVE-2022-50827: kernel: scsi: lpfc: Fix memory leak in lpfc_create_port()</issue>
<issue tracker="bnc" id="1256346">VUL-0: CVE-2023-54122: kernel: drm/msm/dpu: Add check for cstate</issue>
<issue tracker="bnc" id="1256349">VUL-0: CVE-2023-54119: kernel: inotify: Avoid reporting event with invalid wd</issue>
<issue tracker="bnc" id="1256352">VUL-0: CVE-2023-54116: kernel: drm/fbdev-generic: prohibit potential out-of-bounds access</issue>
<issue tracker="bnc" id="1256353">VUL-0: CVE-2023-54110: kernel: usb: rndis_host: Secure rndis_query check against int overflow</issue>
<issue tracker="bnc" id="1256355">VUL-0: CVE-2023-54108: kernel: scsi: qla2xxx: Fix DMA-API call trace on NVMe LS requests</issue>
<issue tracker="bnc" id="1256358">VUL-0: CVE-2023-54106: kernel: net/mlx5: fix potential memory leak in mlx5e_init_rep_rx</issue>
<issue tracker="bnc" id="1256359">VUL-0: CVE-2023-54107: kernel: blk-cgroup: dropping parent refcount after pd_free_fn() is done</issue>
<issue tracker="bnc" id="1256363">VUL-0: CVE-2023-54074: kernel: net/mlx5e: Use correct encap attribute during invalidation</issue>
<issue tracker="bnc" id="1256364">VUL-0: CVE-2023-54070: kernel: igb: clean up in all error paths when enabling SR-IOV</issue>
<issue tracker="bnc" id="1256368">VUL-0: CVE-2023-54083: kernel: phy: tegra: xusb: Clear the driver reference in usb-phy dev</issue>
<issue tracker="bnc" id="1256370">VUL-0: CVE-2023-54092: kernel: KVM: s390: pv: fix index value of replaced ASCE</issue>
<issue tracker="bnc" id="1256375">VUL-0: CVE-2023-54064: kernel: ipmi:ssif: Fix a memory leak when scanning for an adapter</issue>
<issue tracker="bnc" id="1256381">VUL-0: CVE-2023-54057: kernel: iommu/amd: Add a length limitation for the ivrs_acpihid command-line parameter</issue>
<issue tracker="bnc" id="1256382">VUL-0: CVE-2023-54058: kernel: firmware: arm_ffa: Check if ffa_driver remove is present before executing</issue>
<issue tracker="bnc" id="1256383">VUL-0: CVE-2022-50769: kernel: mmc: mxcmmc: fix return value check of mmc_add_host()</issue>
<issue tracker="bnc" id="1256384">VUL-0: CVE-2023-54055: kernel: RDMA/irdma: Fix memory leak of PBLE objects</issue>
<issue tracker="bnc" id="1256386">VUL-0: CVE-2022-50868: hwrng: amd - Fix PCI device refcount leak</issue>
<issue tracker="bnc" id="1256388">VUL-0: CVE-2023-54053: kernel: wifi: iwlwifi: pcie: fix possible NULL pointer dereference</issue>
<issue tracker="bnc" id="1256391">VUL-0: CVE-2022-50858: mmc: alcor: fix return value check of mmc_add_host()</issue>
<issue tracker="bnc" id="1256394">VUL-0: CVE-2023-54051: kernel: net: do not allow gso_size to be set to GSO_BY_FRAGS</issue>
<issue tracker="bnc" id="1256395">VUL-0: CVE-2023-54048: kernel: RDMA/bnxt_re: Prevent handling any completions after qp destroy</issue>
<issue tracker="bnc" id="1256396">VUL-0: CVE-2023-54049: kernel: rpmsg: glink: Add check for kstrdup</issue>
<issue tracker="bnc" id="1256397">VUL-0: CVE-2023-54050: kernel: ubifs: Fix memleak when insert_old_idx() failed</issue>
<issue tracker="bnc" id="1256398">VUL-0: CVE-2023-54047: kernel: drm/rockchip: dw_hdmi: cleanup drm encoder during unbind</issue>
<issue tracker="bnc" id="1256423">VUL-0: CVE-2022-50779: kernel: orangefs: Fix kmemleak in orangefs_prepare_debugfs_help_string()</issue>
<issue tracker="bnc" id="1256426">VUL-0: CVE-2022-50767: kernel: fbdev: smscufx: Fix several use-after-free bugs</issue>
<issue tracker="bnc" id="1256432">VUL-0: CVE-2022-50747: kernel: hfs: Fix OOB Write in hfs_asc2mac</issue>
<issue tracker="cve" id="2022-0854"/>
<issue tracker="cve" id="2022-48853"/>
<issue tracker="cve" id="2022-50614"/>
<issue tracker="cve" id="2022-50615"/>
<issue tracker="cve" id="2022-50617"/>
<issue tracker="cve" id="2022-50618"/>
<issue tracker="cve" id="2022-50619"/>
<issue tracker="cve" id="2022-50621"/>
<issue tracker="cve" id="2022-50622"/>
<issue tracker="cve" id="2022-50623"/>
<issue tracker="cve" id="2022-50625"/>
<issue tracker="cve" id="2022-50626"/>
<issue tracker="cve" id="2022-50629"/>
<issue tracker="cve" id="2022-50630"/>
<issue tracker="cve" id="2022-50633"/>
<issue tracker="cve" id="2022-50635"/>
<issue tracker="cve" id="2022-50636"/>
<issue tracker="cve" id="2022-50638"/>
<issue tracker="cve" id="2022-50640"/>
<issue tracker="cve" id="2022-50641"/>
<issue tracker="cve" id="2022-50643"/>
<issue tracker="cve" id="2022-50644"/>
<issue tracker="cve" id="2022-50646"/>
<issue tracker="cve" id="2022-50649"/>
<issue tracker="cve" id="2022-50652"/>
<issue tracker="cve" id="2022-50653"/>
<issue tracker="cve" id="2022-50656"/>
<issue tracker="cve" id="2022-50658"/>
<issue tracker="cve" id="2022-50660"/>
<issue tracker="cve" id="2022-50661"/>
<issue tracker="cve" id="2022-50662"/>
<issue tracker="cve" id="2022-50664"/>
<issue tracker="cve" id="2022-50665"/>
<issue tracker="cve" id="2022-50666"/>
<issue tracker="cve" id="2022-50667"/>
<issue tracker="cve" id="2022-50668"/>
<issue tracker="cve" id="2022-50669"/>
<issue tracker="cve" id="2022-50670"/>
<issue tracker="cve" id="2022-50671"/>
<issue tracker="cve" id="2022-50672"/>
<issue tracker="cve" id="2022-50673"/>
<issue tracker="cve" id="2022-50675"/>
<issue tracker="cve" id="2022-50677"/>
<issue tracker="cve" id="2022-50678"/>
<issue tracker="cve" id="2022-50679"/>
<issue tracker="cve" id="2022-50698"/>
<issue tracker="cve" id="2022-50699"/>
<issue tracker="cve" id="2022-50700"/>
<issue tracker="cve" id="2022-50701"/>
<issue tracker="cve" id="2022-50702"/>
<issue tracker="cve" id="2022-50703"/>
<issue tracker="cve" id="2022-50704"/>
<issue tracker="cve" id="2022-50705"/>
<issue tracker="cve" id="2022-50709"/>
<issue tracker="cve" id="2022-50710"/>
<issue tracker="cve" id="2022-50712"/>
<issue tracker="cve" id="2022-50714"/>
<issue tracker="cve" id="2022-50715"/>
<issue tracker="cve" id="2022-50716"/>
<issue tracker="cve" id="2022-50717"/>
<issue tracker="cve" id="2022-50718"/>
<issue tracker="cve" id="2022-50719"/>
<issue tracker="cve" id="2022-50722"/>
<issue tracker="cve" id="2022-50723"/>
<issue tracker="cve" id="2022-50724"/>
<issue tracker="cve" id="2022-50726"/>
<issue tracker="cve" id="2022-50727"/>
<issue tracker="cve" id="2022-50728"/>
<issue tracker="cve" id="2022-50730"/>
<issue tracker="cve" id="2022-50731"/>
<issue tracker="cve" id="2022-50732"/>
<issue tracker="cve" id="2022-50733"/>
<issue tracker="cve" id="2022-50735"/>
<issue tracker="cve" id="2022-50736"/>
<issue tracker="cve" id="2022-50738"/>
<issue tracker="cve" id="2022-50740"/>
<issue tracker="cve" id="2022-50742"/>
<issue tracker="cve" id="2022-50744"/>
<issue tracker="cve" id="2022-50745"/>
<issue tracker="cve" id="2022-50747"/>
<issue tracker="cve" id="2022-50749"/>
<issue tracker="cve" id="2022-50750"/>
<issue tracker="cve" id="2022-50751"/>
<issue tracker="cve" id="2022-50752"/>
<issue tracker="cve" id="2022-50754"/>
<issue tracker="cve" id="2022-50755"/>
<issue tracker="cve" id="2022-50756"/>
<issue tracker="cve" id="2022-50757"/>
<issue tracker="cve" id="2022-50758"/>
<issue tracker="cve" id="2022-50760"/>
<issue tracker="cve" id="2022-50761"/>
<issue tracker="cve" id="2022-50763"/>
<issue tracker="cve" id="2022-50767"/>
<issue tracker="cve" id="2022-50768"/>
<issue tracker="cve" id="2022-50769"/>
<issue tracker="cve" id="2022-50770"/>
<issue tracker="cve" id="2022-50773"/>
<issue tracker="cve" id="2022-50774"/>
<issue tracker="cve" id="2022-50776"/>
<issue tracker="cve" id="2022-50777"/>
<issue tracker="cve" id="2022-50779"/>
<issue tracker="cve" id="2022-50781"/>
<issue tracker="cve" id="2022-50782"/>
<issue tracker="cve" id="2022-50809"/>
<issue tracker="cve" id="2022-50814"/>
<issue tracker="cve" id="2022-50818"/>
<issue tracker="cve" id="2022-50819"/>
<issue tracker="cve" id="2022-50821"/>
<issue tracker="cve" id="2022-50822"/>
<issue tracker="cve" id="2022-50823"/>
<issue tracker="cve" id="2022-50824"/>
<issue tracker="cve" id="2022-50826"/>
<issue tracker="cve" id="2022-50827"/>
<issue tracker="cve" id="2022-50828"/>
<issue tracker="cve" id="2022-50829"/>
<issue tracker="cve" id="2022-50830"/>
<issue tracker="cve" id="2022-50832"/>
<issue tracker="cve" id="2022-50833"/>
<issue tracker="cve" id="2022-50834"/>
<issue tracker="cve" id="2022-50835"/>
<issue tracker="cve" id="2022-50836"/>
<issue tracker="cve" id="2022-50838"/>
<issue tracker="cve" id="2022-50839"/>
<issue tracker="cve" id="2022-50840"/>
<issue tracker="cve" id="2022-50842"/>
<issue tracker="cve" id="2022-50843"/>
<issue tracker="cve" id="2022-50844"/>
<issue tracker="cve" id="2022-50845"/>
<issue tracker="cve" id="2022-50846"/>
<issue tracker="cve" id="2022-50847"/>
<issue tracker="cve" id="2022-50848"/>
<issue tracker="cve" id="2022-50849"/>
<issue tracker="cve" id="2022-50850"/>
<issue tracker="cve" id="2022-50851"/>
<issue tracker="cve" id="2022-50853"/>
<issue tracker="cve" id="2022-50856"/>
<issue tracker="cve" id="2022-50858"/>
<issue tracker="cve" id="2022-50859"/>
<issue tracker="cve" id="2022-50860"/>
<issue tracker="cve" id="2022-50861"/>
<issue tracker="cve" id="2022-50862"/>
<issue tracker="cve" id="2022-50864"/>
<issue tracker="cve" id="2022-50866"/>
<issue tracker="cve" id="2022-50867"/>
<issue tracker="cve" id="2022-50868"/>
<issue tracker="cve" id="2022-50870"/>
<issue tracker="cve" id="2022-50872"/>
<issue tracker="cve" id="2022-50873"/>
<issue tracker="cve" id="2022-50876"/>
<issue tracker="cve" id="2022-50878"/>
<issue tracker="cve" id="2022-50880"/>
<issue tracker="cve" id="2022-50881"/>
<issue tracker="cve" id="2022-50882"/>
<issue tracker="cve" id="2022-50883"/>
<issue tracker="cve" id="2022-50884"/>
<issue tracker="cve" id="2022-50885"/>
<issue tracker="cve" id="2022-50886"/>
<issue tracker="cve" id="2022-50887"/>
<issue tracker="cve" id="2022-50888"/>
<issue tracker="cve" id="2022-50889"/>
<issue tracker="cve" id="2023-23559"/>
<issue tracker="cve" id="2023-53254"/>
<issue tracker="cve" id="2023-53743"/>
<issue tracker="cve" id="2023-53744"/>
<issue tracker="cve" id="2023-53746"/>
<issue tracker="cve" id="2023-53747"/>
<issue tracker="cve" id="2023-53751"/>
<issue tracker="cve" id="2023-53753"/>
<issue tracker="cve" id="2023-53754"/>
<issue tracker="cve" id="2023-53755"/>
<issue tracker="cve" id="2023-53761"/>
<issue tracker="cve" id="2023-53766"/>
<issue tracker="cve" id="2023-53769"/>
<issue tracker="cve" id="2023-53780"/>
<issue tracker="cve" id="2023-53781"/>
<issue tracker="cve" id="2023-53783"/>
<issue tracker="cve" id="2023-53786"/>
<issue tracker="cve" id="2023-53788"/>
<issue tracker="cve" id="2023-53792"/>
<issue tracker="cve" id="2023-53794"/>
<issue tracker="cve" id="2023-53801"/>
<issue tracker="cve" id="2023-53802"/>
<issue tracker="cve" id="2023-53803"/>
<issue tracker="cve" id="2023-53804"/>
<issue tracker="cve" id="2023-53806"/>
<issue tracker="cve" id="2023-53808"/>
<issue tracker="cve" id="2023-53811"/>
<issue tracker="cve" id="2023-53814"/>
<issue tracker="cve" id="2023-53816"/>
<issue tracker="cve" id="2023-53818"/>
<issue tracker="cve" id="2023-53819"/>
<issue tracker="cve" id="2023-53820"/>
<issue tracker="cve" id="2023-53827"/>
<issue tracker="cve" id="2023-53828"/>
<issue tracker="cve" id="2023-53830"/>
<issue tracker="cve" id="2023-53832"/>
<issue tracker="cve" id="2023-53833"/>
<issue tracker="cve" id="2023-53834"/>
<issue tracker="cve" id="2023-53837"/>
<issue tracker="cve" id="2023-53840"/>
<issue tracker="cve" id="2023-53842"/>
<issue tracker="cve" id="2023-53844"/>
<issue tracker="cve" id="2023-53845"/>
<issue tracker="cve" id="2023-53847"/>
<issue tracker="cve" id="2023-53848"/>
<issue tracker="cve" id="2023-53849"/>
<issue tracker="cve" id="2023-53850"/>
<issue tracker="cve" id="2023-53852"/>
<issue tracker="cve" id="2023-53858"/>
<issue tracker="cve" id="2023-53860"/>
<issue tracker="cve" id="2023-53862"/>
<issue tracker="cve" id="2023-53864"/>
<issue tracker="cve" id="2023-53866"/>
<issue tracker="cve" id="2023-53989"/>
<issue tracker="cve" id="2023-53990"/>
<issue tracker="cve" id="2023-53991"/>
<issue tracker="cve" id="2023-53996"/>
<issue tracker="cve" id="2023-53998"/>
<issue tracker="cve" id="2023-54001"/>
<issue tracker="cve" id="2023-54003"/>
<issue tracker="cve" id="2023-54007"/>
<issue tracker="cve" id="2023-54009"/>
<issue tracker="cve" id="2023-54010"/>
<issue tracker="cve" id="2023-54014"/>
<issue tracker="cve" id="2023-54015"/>
<issue tracker="cve" id="2023-54017"/>
<issue tracker="cve" id="2023-54018"/>
<issue tracker="cve" id="2023-54019"/>
<issue tracker="cve" id="2023-54020"/>
<issue tracker="cve" id="2023-54021"/>
<issue tracker="cve" id="2023-54024"/>
<issue tracker="cve" id="2023-54025"/>
<issue tracker="cve" id="2023-54026"/>
<issue tracker="cve" id="2023-54028"/>
<issue tracker="cve" id="2023-54036"/>
<issue tracker="cve" id="2023-54039"/>
<issue tracker="cve" id="2023-54040"/>
<issue tracker="cve" id="2023-54041"/>
<issue tracker="cve" id="2023-54042"/>
<issue tracker="cve" id="2023-54044"/>
<issue tracker="cve" id="2023-54045"/>
<issue tracker="cve" id="2023-54046"/>
<issue tracker="cve" id="2023-54047"/>
<issue tracker="cve" id="2023-54048"/>
<issue tracker="cve" id="2023-54049"/>
<issue tracker="cve" id="2023-54050"/>
<issue tracker="cve" id="2023-54051"/>
<issue tracker="cve" id="2023-54053"/>
<issue tracker="cve" id="2023-54055"/>
<issue tracker="cve" id="2023-54057"/>
<issue tracker="cve" id="2023-54058"/>
<issue tracker="cve" id="2023-54064"/>
<issue tracker="cve" id="2023-54070"/>
<issue tracker="cve" id="2023-54072"/>
<issue tracker="cve" id="2023-54074"/>
<issue tracker="cve" id="2023-54076"/>
<issue tracker="cve" id="2023-54078"/>
<issue tracker="cve" id="2023-54079"/>
<issue tracker="cve" id="2023-54083"/>
<issue tracker="cve" id="2023-54084"/>
<issue tracker="cve" id="2023-54090"/>
<issue tracker="cve" id="2023-54091"/>
<issue tracker="cve" id="2023-54092"/>
<issue tracker="cve" id="2023-54095"/>
<issue tracker="cve" id="2023-54096"/>
<issue tracker="cve" id="2023-54097"/>
<issue tracker="cve" id="2023-54098"/>
<issue tracker="cve" id="2023-54100"/>
<issue tracker="cve" id="2023-54102"/>
<issue tracker="cve" id="2023-54104"/>
<issue tracker="cve" id="2023-54106"/>
<issue tracker="cve" id="2023-54107"/>
<issue tracker="cve" id="2023-54108"/>
<issue tracker="cve" id="2023-54110"/>
<issue tracker="cve" id="2023-54111"/>
<issue tracker="cve" id="2023-54114"/>
<issue tracker="cve" id="2023-54115"/>
<issue tracker="cve" id="2023-54116"/>
<issue tracker="cve" id="2023-54118"/>
<issue tracker="cve" id="2023-54119"/>
<issue tracker="cve" id="2023-54120"/>
<issue tracker="cve" id="2023-54122"/>
<issue tracker="cve" id="2023-54123"/>
<issue tracker="cve" id="2023-54126"/>
<issue tracker="cve" id="2023-54127"/>
<issue tracker="cve" id="2023-54128"/>
<issue tracker="cve" id="2023-54130"/>
<issue tracker="cve" id="2023-54131"/>
<issue tracker="cve" id="2023-54132"/>
<issue tracker="cve" id="2023-54134"/>
<issue tracker="cve" id="2023-54136"/>
<issue tracker="cve" id="2023-54138"/>
<issue tracker="cve" id="2023-54140"/>
<issue tracker="cve" id="2023-54144"/>
<issue tracker="cve" id="2023-54146"/>
<issue tracker="cve" id="2023-54148"/>
<issue tracker="cve" id="2023-54150"/>
<issue tracker="cve" id="2023-54153"/>
<issue tracker="cve" id="2023-54156"/>
<issue tracker="cve" id="2023-54159"/>
<issue tracker="cve" id="2023-54164"/>
<issue tracker="cve" id="2023-54166"/>
<issue tracker="cve" id="2023-54168"/>
<issue tracker="cve" id="2023-54169"/>
<issue tracker="cve" id="2023-54170"/>
<issue tracker="cve" id="2023-54171"/>
<issue tracker="cve" id="2023-54173"/>
<issue tracker="cve" id="2023-54175"/>
<issue tracker="cve" id="2023-54177"/>
<issue tracker="cve" id="2023-54179"/>
<issue tracker="cve" id="2023-54183"/>
<issue tracker="cve" id="2023-54186"/>
<issue tracker="cve" id="2023-54189"/>
<issue tracker="cve" id="2023-54190"/>
<issue tracker="cve" id="2023-54194"/>
<issue tracker="cve" id="2023-54197"/>
<issue tracker="cve" id="2023-54198"/>
<issue tracker="cve" id="2023-54199"/>
<issue tracker="cve" id="2023-54201"/>
<issue tracker="cve" id="2023-54202"/>
<issue tracker="cve" id="2023-54205"/>
<issue tracker="cve" id="2023-54208"/>
<issue tracker="cve" id="2023-54210"/>
<issue tracker="cve" id="2023-54211"/>
<issue tracker="cve" id="2023-54213"/>
<issue tracker="cve" id="2023-54214"/>
<issue tracker="cve" id="2023-54219"/>
<issue tracker="cve" id="2023-54226"/>
<issue tracker="cve" id="2023-54229"/>
<issue tracker="cve" id="2023-54230"/>
<issue tracker="cve" id="2023-54234"/>
<issue tracker="cve" id="2023-54236"/>
<issue tracker="cve" id="2023-54238"/>
<issue tracker="cve" id="2023-54242"/>
<issue tracker="cve" id="2023-54244"/>
<issue tracker="cve" id="2023-54245"/>
<issue tracker="cve" id="2023-54251"/>
<issue tracker="cve" id="2023-54252"/>
<issue tracker="cve" id="2023-54254"/>
<issue tracker="cve" id="2023-54260"/>
<issue tracker="cve" id="2023-54262"/>
<issue tracker="cve" id="2023-54264"/>
<issue tracker="cve" id="2023-54266"/>
<issue tracker="cve" id="2023-54267"/>
<issue tracker="cve" id="2023-54269"/>
<issue tracker="cve" id="2023-54270"/>
<issue tracker="cve" id="2023-54271"/>
<issue tracker="cve" id="2023-54274"/>
<issue tracker="cve" id="2023-54275"/>
<issue tracker="cve" id="2023-54277"/>
<issue tracker="cve" id="2023-54280"/>
<issue tracker="cve" id="2023-54284"/>
<issue tracker="cve" id="2023-54286"/>
<issue tracker="cve" id="2023-54287"/>
<issue tracker="cve" id="2023-54289"/>
<issue tracker="cve" id="2023-54292"/>
<issue tracker="cve" id="2023-54293"/>
<issue tracker="cve" id="2023-54294"/>
<issue tracker="cve" id="2023-54295"/>
<issue tracker="cve" id="2023-54298"/>
<issue tracker="cve" id="2023-54299"/>
<issue tracker="cve" id="2023-54300"/>
<issue tracker="cve" id="2023-54301"/>
<issue tracker="cve" id="2023-54302"/>
<issue tracker="cve" id="2023-54304"/>
<issue tracker="cve" id="2023-54305"/>
<issue tracker="cve" id="2023-54309"/>
<issue tracker="cve" id="2023-54311"/>
<issue tracker="cve" id="2023-54315"/>
<issue tracker="cve" id="2023-54317"/>
<issue tracker="cve" id="2023-54319"/>
<issue tracker="cve" id="2023-54320"/>
<issue tracker="cve" id="2023-54321"/>
<issue tracker="cve" id="2023-54322"/>
<issue tracker="cve" id="2023-54325"/>
<issue tracker="cve" id="2023-54326"/>
<issue tracker="cve" id="2024-36933"/>
<issue tracker="cve" id="2024-53093"/>
<issue tracker="cve" id="2024-56590"/>
<issue tracker="cve" id="2025-39977"/>
<issue tracker="cve" id="2025-40019"/>
<issue tracker="cve" id="2025-40139"/>
<issue tracker="cve" id="2025-40215"/>
<issue tracker="cve" id="2025-40220"/>
<issue tracker="cve" id="2025-40233"/>
<issue tracker="cve" id="2025-40256"/>
<issue tracker="cve" id="2025-40258"/>
<issue tracker="cve" id="2025-40277"/>
<issue tracker="cve" id="2025-40280"/>
<issue tracker="cve" id="2025-40331"/>
<issue tracker="cve" id="2025-68218"/>
<issue tracker="cve" id="2025-68732"/>
<issue tracker="jsc" id="PED-1073"/>
<issue tracker="jsc" id="PED-14062"/>
<issue tracker="jsc" id="PED-1407"/>
<issue tracker="jsc" id="PED-1495"/>
<issue tracker="jsc" id="PED-1549"/>
<issue tracker="jsc" id="PED-1559"/>
<issue tracker="jsc" id="PED-2765"/>
<issue tracker="jsc" id="PED-370"/>
<issue tracker="jsc" id="PED-376"/>
<issue tracker="jsc" id="PED-7167"/>
<issue tracker="jsc" id="PED-8111"/>
<issue tracker="jsc" id="SLE-13847"/>
<issue tracker="jsc" id="SLE-18378"/>
<issue tracker="jsc" id="SLE-18384"/>
<issue tracker="jsc" id="SLE-19253"/>
<issue tracker="jsc" id="SLE-19255"/>
<category>security</category>
<rating>important</rating>
<packager>Jeffreycheung</packager>
<reboot_needed/>
<summary>Security update for the Linux Kernel</summary>
<description>
The SUSE Linux Enterprise 15 SP5 RT kernel was updated to fix various security issues
The following security issues were fixed:
- CVE-2022-50630: mm: hugetlb: fix UAF in hugetlb_handle_userfault (bsc#1254785).
- CVE-2022-50700: wifi: ath10k: Delay the unmapping of the buffer (bsc#1255576).
- CVE-2023-53254: cacheinfo: Fix shared_cpu_map to handle shared caches at different levels (bsc#1249871).
- CVE-2023-53781: smc: Fix use-after-free in tcp_write_timer_handler() (bsc#1254751).
- CVE-2024-56590: Bluetooth: hci_core: Fix not checking skb length on hci_acldata_packet (bsc#1235038).
- CVE-2025-39977: futex: Prevent use-after-free during requeue-PI (bsc#1252046).
- CVE-2025-40019: crypto: essiv - Check ssize for decryption and in-place encryption (bsc#1252678).
- CVE-2025-40139: net: ipv4: Consolidate ipv4_mtu and ip_dst_mtu_maybe_forward (bsc#1253409).
- CVE-2025-40215: kABI: xfrm: delete x->tunnel as we delete x (bsc#1254959).
- CVE-2025-40220: fuse: fix livelock in synchronous file put from fuseblk workers (bsc#1254520).
- CVE-2025-40233: ocfs2: clear extent cache after moving/defragmenting extents (bsc#1254813).
- CVE-2025-40258: mptcp: fix race condition in mptcp_schedule_work() (bsc#1254843).
- CVE-2025-40277: drm/vmwgfx: Validate command header size against (bsc#1254894).
- CVE-2025-40280: tipc: Fix use-after-free in tipc_mon_reinit_self() (bsc#1254847).
- CVE-2025-40331: sctp: Prevent TOCTOU out-of-bounds write (bsc#1254615).
- CVE-2025-68732: gpu: host1x: Fix race in syncpt alloc/free (bsc#1255688).
The following non security issues were fixed:
- ACPI/IORT: Fix memory leak in iort_rmr_alloc_sids() (git-fixes).
- ACPI: PRM: Remove unnecessary strict handler address checks (git-fixes).
- ACPI: property: Do not pass NULL handles to acpi_attach_data() (git-fixes).
- ACPI: property: Fix buffer properties extraction for subnodes (git-fixes).
- KVM: SVM: Fix TSC_AUX virtualization setup (git-fixes).
- RDMA/cm: Rate limit destroy CM ID timeout error message (git-fixes).
- RDMA/counter: Check CAP_NET_RAW check in user namespace for RDMA counters (git-fixes).
- RDMA/hns: Fix the modification of max_send_sge (git-fixes).
- RDMA/mlx5: Check CAP_NET_RAW in user namespace for anchor create (git-fixes).
- RDMA/mlx5: Check CAP_NET_RAW in user namespace for devx create (git-fixes).
- RDMA/mlx5: Check CAP_NET_RAW in user namespace for flow create (git-fixes).
- RDMA/mlx5: Fix compilation warning when USER_ACCESS isn't set (git-fixes).
- RDMA/nldev: Check CAP_NET_RAW in user namespace for QP modify (git-fixes).
- RDMA/uverbs: Add empty rdma_uattrs_has_raw_cap() declaration (git-fixes).
- RDMA/uverbs: Check CAP_NET_RAW in user namespace for QP create (git-fixes).
- RDMA/uverbs: Check CAP_NET_RAW in user namespace for RAW QP create (git-fixes).
- RDMA/uverbs: Check CAP_NET_RAW in user namespace for flow create (git-fixes).
- arch/idle: Change arch_cpu_idle() behavior: always exit with IRQs disabled (git-fixes).
- cpuidle/poll: Ensure IRQs stay disabled after cpuidle_state::enter() calls (git-fixes).
- cpuidle: Move IRQ state validation (git-fixes).
- cpuidle: haltpoll: Do not enable interrupts when entering idle (git-fixes).
- dm: free table mempools if not used in __bind (git-fixes).
- padata: Honor the caller's alignment in case of chunk_size 0 (bsc#1237563).
- platform/x86/intel-uncore-freq: Fail module load when plat_info is NULL (git-fixes).
- x86/bugs: Fix RSB clearing in indirect_branch_prediction_barrier() (git-fixes).
- x86/bugs: Use SBPB in write_ibpb() if applicable (git-fixes).
- x86/paravirt: Move halt paravirt calls under CONFIG_PARAVIRT (git-fixes).
- x86/tdx: Drop flags from __tdx_hypercall() (git-fixes).
- x86/tdx: Dynamically disable SEPT violations from causing #VEs (git-fixes).
- x86/tdx: Emit warning if IRQs are enabled during HLT #VE handling (git-fixes).
- x86/tdx: Extend TDX_MODULE_CALL to support more TDCALL/SEAMCALL leafs (git-fixes).
- x86/tdx: Fix __noreturn build warning around __tdx_hypercall_failed() (git-fixes).
- x86/tdx: Fix arch_safe_halt() execution for TDX VMs (git-fixes).
- x86/tdx: Introduce wrappers to read and write TD metadata (git-fixes).
- x86/tdx: Make TDX_HYPERCALL asm similar to TDX_MODULE_CALL (git-fixes).
- x86/tdx: Make macros of TDCALLs consistent with the spec (git-fixes).
- x86/tdx: Pass TDCALL/SEAMCALL input/output registers via a structure (git-fixes).
- x86/tdx: Reimplement __tdx_hypercall() using TDX_MODULE_CALL asm (git-fixes).
- x86/tdx: Remove 'struct tdx_hypercall_args' (git-fixes).
- x86/tdx: Remove TDX_HCALL_ISSUE_STI (git-fixes).
- x86/tdx: Rename __tdx_module_call() to __tdcall() (git-fixes).
- x86/tdx: Rename tdx_parse_tdinfo() to tdx_setup() (git-fixes).
- x86/tdx: Retry partially-completed page conversion hypercalls (git-fixes).
- x86/tdx: Skip saving output regs when SEAMCALL fails with VMFailInvalid (git-fixes).
- x86/tdx: Zero out the missing RSI in TDX_HYPERCALL macro (git-fixes).
- x86/virt/tdx: Make TDX_MODULE_CALL handle SEAMCALL #UD and #GP (git-fixes).
- x86/virt/tdx: Wire up basic SEAMCALL functions (git-fixes).
- xfs: fix sparse inode limits on runt AG (bsc#1254392).
</description>
</patchinfo>