File _patchinfo of Package patchinfo.34200

<patchinfo incident="34200">
  <issue id="1065729" tracker="bnc">[trackerbug] 4.12 powerpc base kernel fixes</issue>
  <issue id="1141539" tracker="bnc">kernel backtrace while working with DASDs</issue>
  <issue id="1174585" tracker="bnc">kernel lock up on IBS worker with 15-SP2</issue>
  <issue id="1181674" tracker="bnc">SLES 15 SP2 - HST:STC950:Fleetwood:LPAR is not accessible during LPM and migration hung</issue>
  <issue id="1187716" tracker="bnc">lparstat displays the wrong partition name</issue>
  <issue id="1190569" tracker="bnc">[trackerbug] 15 SP4 nvme subsystem update</issue>
  <issue id="1191949" tracker="bnc">VUL-1: CVE-2021-42327: kernel-source: dp_link_settings_write in drivers/gpu/drm/amd/display/amdgpu_dm/amdgpu_dm_debugfs.c</issue>
  <issue id="1192107" tracker="bnc">VUL-0: CVE-2021-43056: kernel-source: powerpc: KVM guest can trigger host crash on Power8</issue>
  <issue id="1193983" tracker="bnc">VUL-0: CVE-2021-4148: kernel-source-rt, kernel-source, kernel-source-azure: Improper implementation of block_invalidatepage() allows users to crash the kernel</issue>
  <issue id="1194288" tracker="bnc">[EAR - NOT FOR USA Citizens] PTF request for libfreebl3 to fix CVE-2021-43527 on sles12-sp2-ltss on x86_64 flavor ref:_00D1igLOd._5001io9v9G:ref</issue>
  <issue id="1194869" tracker="bnc">[TRACKERBUG] 5.14 powerpc base kernel fixes</issue>
  <issue id="1196956" tracker="bnc">VUL-0: CVE-2021-39698:  kernel-source-rt,kernel-source-azure,kernel-source: use-after-free due to missing POLLFREE handling in aio</issue>
  <issue id="1197915" tracker="bnc">btrfs: backport, from upstream, several fsync related performance patches and bug fixes</issue>
  <issue id="1200465" tracker="bnc">SLES15 SP4 [ Everest]: powersave mode is always set to "static" even if we change powersave mode from HMC on everest machine.</issue>
  <issue id="1205205" tracker="bnc">Catch up io_uring performance with mainline</issue>
  <issue id="1207284" tracker="bnc">[Build 66.1] openQA test fails to show yast2 screen</issue>
  <issue id="1207361" tracker="bnc">SLE15-SP5 networking backports and fixes</issue>
  <issue id="1207948" tracker="bnc">Lenovo T14s Gen3 AMD resume from hibernation ends in kernel panic</issue>
  <issue id="1208149" tracker="bnc">backport commit 462a8e08e0e6 ("Fix page corruption caused by racy check in __free_pages")</issue>
  <issue id="1209657" tracker="bnc">VUL-0: CVE-2023-0160: kernel-source,kernel-source-azure,kernel-source-rt: possibility of deadlock in libbpf function sock_hash_delete_elem()</issue>
  <issue id="1209799" tracker="bnc">sched/psi: Fix use-after-free in ep_remove_wait_queue()</issue>
  <issue id="1209834" tracker="bnc">Partner-L3: An upgrade from SLES 15 sp3 to SLES 15 sp4 on ppc64le machines provoked a sudden loss of paths to LUN-s.</issue>
  <issue id="1209980" tracker="bnc">Lenovo L14 Gen3 AMD, wifi card (Mediatek MT7922) not recognized.</issue>
  <issue id="1210335" tracker="bnc">VUL-0: CVE-2023-1829: kernel: Linux kernel: Vulnerabilities in the tcindex classifier</issue>
  <issue id="1213863" tracker="bnc">s390/decompressor: specify __decompress() buf len to avoid overflow</issue>
  <issue id="1214852" tracker="bnc">install to FCoE hangs instead of rebooting: BUG: kernel NULL pointer dereference, address: 0000000000000102</issue>
  <issue id="1215322" tracker="bnc">PVT:1050:XM:ITC: SLES SP5 LPAR is not responding when we do Fatal Injection on 4 Port ethernet Adapter (Shiner - 14E4 168A 1014 0493)</issue>
  <issue id="1215702" tracker="bnc">VUL-0: CVE-2023-42755: kernel: wild pointer access</issue>
  <issue id="1216358" tracker="bnc">kernel: Use-after-Free bug in hci_remove_adv_monitor</issue>
  <issue id="1216702" tracker="bnc">VUL-0: CVE-2023-47233: kernel: Use after Free bug in brcmf_cfg80211_detach</issue>
  <issue id="1217169" tracker="bnc">VUL-0: CVE-2023-52655: kernel: malicious USB device impersonating an aqc111 device can make the kernel overstep a buffer</issue>
  <issue id="1217339" tracker="bnc">VUL-0: CVE-2024-2201: CPU: InSpectre Gadget: Inspecting the Residual Attack Surface of Cross-privilege Spectre v2</issue>
  <issue id="1217515" tracker="bnc">s390/dasd: protect device queue against concurrent access</issue>
  <issue id="1218447" tracker="bnc">VUL-0: CVE-2023-6531: kernel: GC's deletion of an SKB races with unix_stream_read_generic()  leading to UAF</issue>
  <issue id="1220021" tracker="bnc">Update Broadcom Emulex lpfc driver for SLES15 SP6 to 14.2.0.17 and 14.4.0.0</issue>
  <issue id="1220267" tracker="bnc">cachefiles: fix memory leak in cachefiles_add_cache()</issue>
  <issue id="1220363" tracker="bnc">VUL-0: CVE-2024-26597: kernel-source,kernel-source-azure,kernel-source-rt: net: qualcomm: rmnet: fix global oob in rmnet_policy</issue>
  <issue id="1220783" tracker="bnc">synth uevent: /devices/vio: failed to send uevent - ref:_00D1igLOd._500Tr56lz5:ref</issue>
  <issue id="1221044" tracker="bnc">VUL-0: CVE-2023-52591: kernel: reiserfs: potential filesystem corruption on directory rename</issue>
  <issue id="1221081" tracker="bnc">VUL-0: CVE-2023-52586: kernel: drm/msm/dpu: Add mutex lock in control vblank irq</issue>
  <issue id="1221615" tracker="bnc">VUL-0: CVE-2023-52618: kernel: block/rnbd-srv: Check for unlikely string overflow</issue>
  <issue id="1221777" tracker="bnc">Update Broadcom Emulex lpfc driver for SLES15 SP6 to 14.4.0.1</issue>
  <issue id="1221816" tracker="bnc">qla2xxx: update driver to 10.02.09.200-k</issue>
  <issue id="1221829" tracker="bnc">VUL-0: CVE-2024-26643: kernel: netfilter: nf_tables: mark set as dead when unbinding anonymous set with timeout</issue>
  <issue id="1222011" tracker="bnc">[Regression] SLES15SP6:[6.4.0-150600.9] LPAR reboot crashes the kernel after PCI injection (everest/1060_023/shinner)</issue>
  <issue id="1222374" tracker="bnc">VUL-0: CVE-2024-26698: kernel: hv_netvsc: Fix race condition between netvsc_probe and netvsc_remove</issue>
  <issue id="1222385" tracker="bnc">VUL-0: CVE-2024-26679: kernel: inet: read sk-&gt;sk_family once in inet_recv_error()</issue>
  <issue id="1222413" tracker="bnc">VUL-0: CVE-2024-26801: kernel: Bluetooth: Avoid potential use-after-free in hci_error_reset</issue>
  <issue id="1222464" tracker="bnc">VUL-0: CVE-2024-26692: kernel: smb: Fix regression in writes when non-standard maximum write size negotiated</issue>
  <issue id="1222513" tracker="bnc">VUL-0: CVE-2024-26748: kernel: usb: cdns3: fix memory double free when handle zero packet</issue>
  <issue id="1222559" tracker="bnc">VUL-0: CVE-2024-26739: kernel: net/sched: act_mirred: don't override retval if we already lost the skb</issue>
  <issue id="1222561" tracker="bnc">VUL-0: CVE-2024-26715: kernel: usb: dwc3: gadget: Fix NULL pointer dereference in dwc3_gadget_suspend</issue>
  <issue id="1222608" tracker="bnc">VUL-0: CVE-2024-26742: kernel: scsi: smartpqi: Fix disable_managed_interrupts</issue>
  <issue id="1222619" tracker="bnc">VUL-0: CVE-2023-52880: kernel: tty/n_gsm: 0day with exploit dropped on Github</issue>
  <issue id="1222627" tracker="bnc">VUL-0: CVE-2024-26775: kernel: aoe: avoid potential deadlock at set_capacity</issue>
  <issue id="1222721" tracker="bnc">VUL-0: CVE-2024-26764: kernel: fs/aio: WARNING in kiocb_set_cancel_fn</issue>
  <issue id="1222765" tracker="bnc">VUL-0: CVE-2024-26777: kernel: fbdev: sis: Error out if pixclock equals zero</issue>
  <issue id="1222770" tracker="bnc">VUL-0: CVE-2024-26778: kernel: fbdev: savage: Error out if pixclock equals zero</issue>
  <issue id="1222783" tracker="bnc">VUL-0: CVE-2024-26788: kernel: dmaengine: fsl-qdma: init irq after reg initialization</issue>
  <issue id="1222793" tracker="bnc">VUL-0: CVE-2024-26791: kernel: btrfs: dev-replace: properly validate device names</issue>
  <issue id="1222870" tracker="bnc">VUL-0: CVE-2024-26700: kernel: drm/amd/display: MST Null Ptr for RV</issue>
  <issue id="1222893" tracker="bnc">L3: WARNING: at ../kernel/trace/ring_buffer.c:1544 rb_check_pages.isra [ref:_00D1igLOd._500Tr8mhUI:ref]</issue>
  <issue id="1222960" tracker="bnc">VUL-0: CVE-2023-52643: kernel: iio: core: memleak in iio_device_register_sysfs()</issue>
  <issue id="1222961" tracker="bnc">VUL-0: CVE-2023-52644: kernel: wifi: b43: Stop/wake correct queue in DMA Tx path when QoS is disabled</issue>
  <issue id="1222974" tracker="bnc">VUL-0: CVE-2024-26838: kernel: RDMA/irdma: invalid IRQ free</issue>
  <issue id="1222975" tracker="bnc">VUL-0: CVE-2024-26839: kernel: IB/hfi1: memleak in init_credit_return</issue>
  <issue id="1222976" tracker="bnc">VUL-0: CVE-2024-26840: kernel: cachefiles: memory leak in cachefiles_add_cache()</issue>
  <issue id="1223011" tracker="bnc">VUL-0: CVE-2024-26822: kernel: smb: client: set correct id, uid and cruid for multiuser automounts</issue>
  <issue id="1223023" tracker="bnc">VUL-0: CVE-2024-26846: kernel: nvme-fc: prevent double free in module exit path</issue>
  <issue id="1223027" tracker="bnc">VUL-0: CVE-2024-26829: kernel: media: ir_toy: fix a memleak in irtoy_tx</issue>
  <issue id="1223031" tracker="bnc">VUL-0: CVE-2023-52642: kernel: media: rc: bpf attach/detach requires write permission</issue>
  <issue id="1223043" tracker="bnc">VUL-0: CVE-2024-26894: kernel: ACPI: processor_idle: Fix memory leak in acpi_processor_power_exit()</issue>
  <issue id="1223046" tracker="bnc">VUL-0: CVE-2024-26900: kernel: md: fix kmemleak of rdev-&gt;serial</issue>
  <issue id="1223048" tracker="bnc">VUL-0: CVE-2024-26874: kernel: drm/mediatek: Fix a null pointer crash in mtk_drm_crtc_finish_page_flip</issue>
  <issue id="1223049" tracker="bnc">VUL-0: CVE-2024-26859: kernel: net/bnx2x: Prevent access to a freed page in page_pool</issue>
  <issue id="1223084" tracker="bnc">VUL-0: CVE-2024-26828: kernel: cifs: underflow in parse_server_interfaces()</issue>
  <issue id="1223113" tracker="bnc">VUL-0: CVE-2024-26870: kernel: NFSv4.2: fix nfs4_listxattr kernel BUG at mm/usercopy.c:102</issue>
  <issue id="1223119" tracker="bnc">VUL-0: CVE-2024-26876: kernel: drm/bridge: adv7511: crash on reading at  uninitialized data</issue>
  <issue id="1223137" tracker="bnc">VUL-0: CVE-2024-26916: kernel: Revert "drm/amd: flush any delayed gfxoff on suspend entry"</issue>
  <issue id="1223138" tracker="bnc">VUL-0: CVE-2024-26921: kernel: inet: inet_defrag: prevent sk release while still in use</issue>
  <issue id="1223140" tracker="bnc">VUL-0: CVE-2024-26877: kernel: crypto: WARNING in crypto_finalize_request</issue>
  <issue id="1223188" tracker="bnc">VUL-0: CVE-2024-26880: kernel: dm: crash when experimenting with the lvm2 testsuite</issue>
  <issue id="1223203" tracker="bnc">VUL-0: CVE-2024-26907: kernel: RDMA/mlx5: Fix fortify source warning while accessing Eth segment</issue>
  <issue id="1223207" tracker="bnc">VUL-0: CVE-2024-26915: kernel: drm/amdgpu: Reset IH OVERFLOW_CLEAR bit</issue>
  <issue id="1223315" tracker="bnc">VUL-0: CVE-2024-26922: kernel: drm/amdgpu: validate the parameters of bo mapping operations more clearly</issue>
  <issue id="1223360" tracker="bnc">L3: Invalid pointer dereference in vmxnet3_rq_rx_complete — ref:_00D1igLOd._500Tr9CNbZ:ref</issue>
  <issue id="1223384" tracker="bnc">VUL-0: CVE-2024-26923: kernel: af_unix: fix garbage collector racing against connect()</issue>
  <issue id="1223390" tracker="bnc">VUL-0: CVE-2024-26925: kernel: netfilter: nf_tables: release mutex after nft_gc_seq_end from abort path</issue>
  <issue id="1223432" tracker="bnc">VUL-0: CVE-2023-52646: kernel: aio: fix mremap after fork null-deref</issue>
  <issue id="1223489" tracker="bnc">VUL-0: CVE-2022-48633: kernel: drm/gma500: Fix WARN_ON(lock-&gt;magic != lock) error</issue>
  <issue id="1223505" tracker="bnc">VUL-0: CVE-2022-48662: kernel: drm/i915/gem: GPF in i915_perf_open_ioctl</issue>
  <issue id="1223532" tracker="bnc">VUL-0: CVE-2024-26928: kernel: smb: client: fix potential UAF in cifs_debug_files_proc_show()</issue>
  <issue id="1223575" tracker="bnc">[Marvell 15.6 Bug] SLE15-SP6 Public Beta: Server hit kernel panic after running IO on NVMe dm devices</issue>
  <issue id="1223595" tracker="bnc">s390/zcrypt: fix reference counting on zcrypt card objects</issue>
  <issue id="1223626" tracker="bnc">VUL-0: CVE-2024-26930: kernel: scsi: qla2xxx: double free of the ha-&gt;vp_map pointer</issue>
  <issue id="1223627" tracker="bnc">VUL-0: CVE-2024-26931: kernel: scsi: qla2xxx: NULL pointer dereference</issue>
  <issue id="1223628" tracker="bnc">VUL-0: CVE-2024-26979: kernel: drm/vmwgfx: Fix possible null pointer derefence with invalid contexts</issue>
  <issue id="1223631" tracker="bnc">VUL-0: CVE-2024-26977: kernel: pci_iounmap(): Fix MMIO mapping leak</issue>
  <issue id="1223633" tracker="bnc">VUL-0: CVE-2024-26984: kernel: nouveau: fix instmem race condition around ptr stores</issue>
  <issue id="1223638" tracker="bnc">VUL-0: CVE-2024-26974: kernel: crypto: qat - resolve race condition during AER recovery</issue>
  <issue id="1223650" tracker="bnc">VUL-0: CVE-2024-26964: kernel: usb: xhci: Add error handling in xhci_map_urb_for_dma</issue>
  <issue id="1223653" tracker="bnc">VUL-0: CVE-2024-26958: kernel: nfs: fix UAF in direct writes</issue>
  <issue id="1223666" tracker="bnc">VUL-0: CVE-2024-26957: kernel: s390/zcrypt: fix reference counting on zcrypt card objects</issue>
  <issue id="1223670" tracker="bnc">VUL-0: CVE-2024-26933: kernel: USB: core: deadlock in port "disable" sysfs attribute</issue>
  <issue id="1223671" tracker="bnc">VUL-0: CVE-2024-26934: kernel: USB: core: deadlock in usb_deauthorize_interface()</issue>
  <issue id="1223675" tracker="bnc">VUL-0: CVE-2024-26935: kernel: scsi: core: WARNING in proc_register</issue>
  <issue id="1223677" tracker="bnc">VUL-0: CVE-2024-26937: kernel: drm/i915/gt: BUG in intel_engine_pm.c</issue>
  <issue id="1223678" tracker="bnc">VUL-0: CVE-2024-26938: kernel: drm/i915/bios: oops in intel_bios_encoder_supports_dp_dual_mode</issue>
  <issue id="1223679" tracker="bnc">VUL-0: CVE-2024-26939: kernel: drm/i915/vma: UAF on destroy against retire race</issue>
  <issue id="1223698" tracker="bnc">VUL-0: CVE-2024-27001: kernel: comedi: vmk80xx: fix incomplete endpoint checking</issue>
  <issue id="1223712" tracker="bnc">VUL-0: CVE-2023-52653: kernel: SUNRPC: memleak in gss_import_v2_context</issue>
  <issue id="1223715" tracker="bnc">VUL-0: CVE-2024-26929: kernel: scsi: qla2xxx: double free of fcport</issue>
  <issue id="1223717" tracker="bnc">VUL-0: CVE-2024-27037: kernel: clk: zynq: Prevent null pointer dereference caused by kmalloc failure</issue>
  <issue id="1223718" tracker="bnc">VUL-0: CVE-2024-26940: kernel: drm/vmwgfx: crash when reading /sys/kernel/debug/dri/0/mob_ttm</issue>
  <issue id="1223737" tracker="bnc">VUL-0: CVE-2024-27053: kernel: wifi: wilc1000: fix RCU usage in connect path</issue>
  <issue id="1223738" tracker="bnc">VUL-0: CVE-2024-27059: kernel: USB: usb-storage: Prevent divide-by-0 error in isd200_ata_command</issue>
  <issue id="1223741" tracker="bnc">VUL-0: CVE-2024-26997: kernel: usb: dwc2: host: Fix dereference issue in DDMA completion flow.</issue>
  <issue id="1223744" tracker="bnc">VUL-0: CVE-2024-27388: kernel: SUNRPC: fix some memleaks in gssx_dec_option_array</issue>
  <issue id="1223747" tracker="bnc">VUL-0: CVE-2024-26988: kernel: init/main.c: potential static_command_line memory overflow</issue>
  <issue id="1223748" tracker="bnc">VUL-0: CVE-2024-26989: kernel: arm64: hibernate: level3 translation fault in swsusp_save()</issue>
  <issue id="1223750" tracker="bnc">VUL-0: CVE-2024-26994: kernel: speakup: crash on very long word</issue>
  <issue id="1223752" tracker="bnc">VUL-0: CVE-2024-26996: kernel: usb: gadget: f_ncm: UAF ncm object at re-bind after usb ep transport error</issue>
  <issue id="1223754" tracker="bnc">VUL-0: CVE-2024-26999: kernel: serial/pmac_zilog: flawed mitigation for rx irq flood</issue>
  <issue id="1223756" tracker="bnc">VUL-0: CVE-2022-48669: kernel: powerpc/pseries: Fix potential memleak in papr_get_attr()</issue>
  <issue id="1223757" tracker="bnc">VUL-0: CVE-2024-27000: kernel: serial: mxs-auart: WARNING in uart_handle_cts_change</issue>
  <issue id="1223762" tracker="bnc">VUL-0: CVE-2024-27004: kernel: clk: deadlock in clk PM</issue>
  <issue id="1223769" tracker="bnc">VUL-0: CVE-2024-27051: kernel: cpufreq: brcmstb-avs-cpufreq: add check for cpufreq_cpu_get's return value</issue>
  <issue id="1223770" tracker="bnc">VUL-0: CVE-2023-52650: kernel: drm/tegra: dsi: Add missing check for of_find_device_by_node</issue>
  <issue id="1223779" tracker="bnc">VUL-0: CVE-2024-27076: kernel: media: imx: csc/scaler: fix v4l2_ctrl_handler memory leak</issue>
  <issue id="1223780" tracker="bnc">VUL-0: CVE-2024-27077: kernel: media: v4l2-mem2mem: fix a memleak in v4l2_m2m_register_entity</issue>
  <issue id="1223781" tracker="bnc">VUL-0: CVE-2024-27078: kernel: media: v4l2-tpg: fix some memleaks in tpg_alloc</issue>
  <issue id="1223788" tracker="bnc">VUL-0: CVE-2024-27028: kernel: spi: spi-mt65xx: fix NULL pointer access in interrupt handler</issue>
  <issue id="1223802" tracker="bnc">VUL-0: CVE-2024-27008: kernel: drm: nv04: Fix out of bounds access</issue>
  <issue id="1223819" tracker="bnc">VUL-0: CVE-2024-27054: kernel: s390/dasd: fix double module refcount decrement</issue>
  <issue id="1223823" tracker="bnc">VUL-0: CVE-2024-27042: kernel: drm/amdgpu: potential out-of-bounds access in 'amdgpu_discovery_reg_base_init()'</issue>
  <issue id="1223826" tracker="bnc">VUL-0: CVE-2024-27045: kernel: drm/amd/display: potential buffer overflow in 'dp_dsc_clock_en_read()'</issue>
  <issue id="1223828" tracker="bnc">VUL-0: CVE-2024-27047: kernel: net: phy: NULL pointer 0 in phy_get_internal_delay</issue>
  <issue id="1223829" tracker="bnc">VUL-0: CVE-2024-27052: kernel: wifi: rtl8xxxu: use-after-free when the driver is stopped</issue>
  <issue id="1223837" tracker="bnc">VUL-0: CVE-2024-27072: kernel: media: usbtv: Remove useless locks in usbtv_video_free()</issue>
  <issue id="1223842" tracker="bnc">VUL-0: CVE-2024-27075: kernel: media: dvb-frontends: avoid stack overflow warnings with clang</issue>
  <issue id="1223843" tracker="bnc">VUL-0: CVE-2024-27073: kernel: media: ttpci: fix two memleaks in budget_av_attach</issue>
  <issue id="1223844" tracker="bnc">VUL-0: CVE-2024-27074: kernel: media: go7007: fix a memleak in go7007_load_encoder</issue>
  <issue id="1223847" tracker="bnc">VUL-0: CVE-2024-26919: kernel: usb: ulpi: Fix debugfs directory leak</issue>
  <issue id="1223858" tracker="bnc">Cannot mount kerberized nfs4 share with kernel 5.14.21-150500.55.59-default</issue>
  <issue id="1223875" tracker="bnc">s390/cio: Ensure the copied buf is NUL terminated</issue>
  <issue id="1223879" tracker="bnc">s390/qeth: Fix kernel panic after setting hsuid</issue>
  <issue id="1223895" tracker="bnc">VUL-0: CVE-2022-48705: kernel: wifi: mt76: mt7921e: fix crash in chip reset fail</issue>
  <issue id="1223959" tracker="bnc">VUL-0: CVE-2022-48689: kernel: tcp: TX zerocopy should not sense pfmemalloc status</issue>
  <issue id="1223961" tracker="bnc">VUL-0: CVE-2022-48691: kernel: netfilter: nf_tables: clean up hook list when offload flags check fails</issue>
  <issue id="1223991" tracker="bnc">PVT:1060:XM:Splitter:SUSE:Traffic is not resuming over another path when Fatal errors been injected in one path till the threshold.</issue>
  <issue id="1223996" tracker="bnc">VUL-0: CVE-2022-48699: kernel: sched/debug: fix dentry leak in update_sched_domain_debugfs</issue>
  <issue id="1224020" tracker="bnc">[TRACKERBUG] SLE15-SP5 backports for cifs.ko</issue>
  <issue id="1224076" tracker="bnc">VUL-0: CVE-2024-27393: kernel: xen: Memory leak due to missing cleanup function (XSA-457)</issue>
  <issue id="1224096" tracker="bnc">VUL-0: CVE-2024-27396: kernel: net: gtp: Fix Use-After-Free in gtp_dellink</issue>
  <issue id="1224098" tracker="bnc">VUL-0: CVE-2024-27395: kernel: net: openvswitch: Fix Use-After-Free in ovs_ct_exit</issue>
  <issue id="1224099" tracker="bnc">VUL-0: CVE-2023-52654: kernel: io_uring/af_unix: disable sending io_uring over sockets</issue>
  <issue id="1224137" tracker="bnc">IDPF needs a longer watchdog timeout</issue>
  <issue id="1224166" tracker="bnc">autofs restart and stuck perl script</issue>
  <issue id="1224174" tracker="bnc">VUL-0: CVE-2024-27398: kernel: Bluetooth: fix use-after-free bugs caused by sco_sock_timeout</issue>
  <issue id="1224177" tracker="bnc">VUL-0: CVE-2024-27399: kernel: Bluetooth: l2cap: fix null-ptr-deref in l2cap_chan_timeout</issue>
  <issue id="1224180" tracker="bnc">VUL-0: CVE-2024-27400: kernel: drm/amdgpu: once more fix the call oder in amdgpu_ttm_move() v2</issue>
  <issue id="1224181" tracker="bnc">VUL-0: CVE-2024-27401: kernel: firewire: nosy: ensure user_length is taken into account when fetching packet contents</issue>
  <issue id="1224187" tracker="bnc">VUL-0: CVE-2023-52656: kernel: io_uring: drop any code related to SCM_RIGHTS</issue>
  <issue id="1224331" tracker="bnc">Nvidia Grace: Fix double allocation in swiotlb_alloc()</issue>
  <issue id="1224346" tracker="bnc">SLES 15 SP5 - kernel: s390/cpum_cf: make crypto counters upward compatible</issue>
  <issue id="1224423" tracker="bnc">VUL-0: CVE-2024-27405: kernel: usb: gadget: ncm: Avoid dropping datagrams of properly parsed NTBs</issue>
  <issue id="1224432" tracker="bnc">VUL-0: CVE-2024-27410: kernel: wifi: nl80211: reject iftype change with mesh ID change</issue>
  <issue id="1224437" tracker="bnc">VUL-0: CVE-2024-27412: kernel: power: supply: bq27xxx-i2c: Do not free non existing IRQ</issue>
  <issue id="1224438" tracker="bnc">VUL-0: CVE-2024-27413: kernel: efi/capsule-loader: fix incorrect allocation size</issue>
  <issue id="1224442" tracker="bnc">VUL-0: CVE-2023-52659: kernel: x86/mm: ensure input to pfn_to_kaddr() is treated as a 64-bit type</issue>
  <issue id="1224443" tracker="bnc">VUL-0: CVE-2023-52660: kernel: media: rkisp1: fix IRQ handling due to shared interrupts</issue>
  <issue id="1224445" tracker="bnc">VUL-0: CVE-2023-52661: kernel: drm/tegra: rgb: fix missing clk_put() in the error handling paths of tegra_dc_rgb_probe()</issue>
  <issue id="1224449" tracker="bnc">VUL-0: CVE-2023-52662: kernel: drm/vmwgfx: fix a memleak in vmw_gmrid_man_get_node</issue>
  <issue id="1224479" tracker="bnc">VUL-0: CVE-2024-35915: kernel: nfc: nci: Fix uninit-value in nci_dev_up and nci_ntf_packet</issue>
  <issue id="1224482" tracker="bnc">VUL-0: CVE-2024-35914: kernel: nfsd: Fix error cleanup path in nfsd_rename()</issue>
  <issue id="1224487" tracker="bnc">VUL-0: CVE-2024-35912: kernel: wifi: iwlwifi: mvm: rfi: fix potential response leaks</issue>
  <issue id="1224488" tracker="bnc">VUL-0: CVE-2024-35905: kernel: bpf: Protect against int overflow for stack access size</issue>
  <issue id="1224492" tracker="bnc">VUL-0: CVE-2024-35907: kernel: mlxbf_gige: call request_irq() after NAPI initialized</issue>
  <issue id="1224494" tracker="bnc">VUL-0: CVE-2024-35904: kernel: selinux: avoid dereference of garbage after mount failure</issue>
  <issue id="1224495" tracker="bnc">VUL-0: CVE-2024-35901: kernel: net: mana: Fix Rx DMA datasize and skb_over_panic</issue>
  <issue id="1224502" tracker="bnc">VUL-0: CVE-2024-35852: kernel: mlxsw: spectrum_acl_tcam: Fix memory leak when canceling rehash work</issue>
  <issue id="1224508" tracker="bnc">VUL-0: CVE-2023-52679: kernel: of: Fix double free in of_parse_phandle_with_args_map</issue>
  <issue id="1224509" tracker="bnc">VUL-0: CVE-2024-35851: kernel: Bluetooth: qca: fix NULL-deref on non-serdev suspend</issue>
  <issue id="1224511" tracker="bnc">VUL-0: CVE-2024-35895: kernel: bpf, sockmap: Prevent lock inversion deadlock in map delete elem</issue>
  <issue id="1224519" tracker="bnc">VUL-0: CVE-2024-35885: kernel: mlxbf_gige: stop interface during shutdown</issue>
  <issue id="1224524" tracker="bnc">VUL-0: CVE-2024-35879: kernel: of: dynamic: Synchronize of_changeset_destroy() with the devlink removals</issue>
  <issue id="1224525" tracker="bnc">VUL-0: CVE-2024-35877: kernel: x86/mm/pat: fix VM_PAT handling in COW mappings</issue>
  <issue id="1224530" tracker="bnc">VUL-0: CVE-2024-35872: kernel: mm/secretmem: fix GUP-fast succeeding on secretmem folios</issue>
  <issue id="1224531" tracker="bnc">VUL-0: CVE-2024-35860: kernel: bpf: support deferring bpf_link dealloc to after RCU grace period</issue>
  <issue id="1224534" tracker="bnc">PVT:1060:XM:Splitter:SUSE:Traffic is not resuming over another path after threshold reached upon switch injections on one path.</issue>
  <issue id="1224535" tracker="bnc">VUL-0: CVE-2024-35939: kernel: dma-direct: Leak pages on dma_set_decrypted() failure</issue>
  <issue id="1224537" tracker="bnc">VUL-0: CVE-2024-35940: kernel: pstore/zone: Add a null pointer check to the psz_kmsg_read</issue>
  <issue id="1224541" tracker="bnc">VUL-0: CVE-2024-36006: kernel: mlxsw: spectrum_acl_tcam: Fix incorrect list API usage</issue>
  <issue id="1224543" tracker="bnc">VUL-0: CVE-2024-36007: kernel: mlxsw: spectrum_acl_tcam: Fix warning during rehash</issue>
  <issue id="1224549" tracker="bnc">VUL-0: CVE-2024-35998: kernel: smb3: fix lock ordering potential deadlock in cifs_sync_mid_result</issue>
  <issue id="1224550" tracker="bnc">VUL-0: CVE-2024-35999: kernel: smb3: missing lock when picking channel</issue>
  <issue id="1224558" tracker="bnc">VUL-0: CVE-2024-35989: kernel: dmaengine: idxd: Fix oops during rmmod on single-CPU platforms</issue>
  <issue id="1224559" tracker="bnc">VUL-0: CVE-2024-35990: kernel: dma: xilinx_dpdma: Fix locking</issue>
  <issue id="1224566" tracker="bnc">VUL-0: CVE-2024-35982: kernel: batman-adv: Avoid infinite loop trying to resize local TT</issue>
  <issue id="1224567" tracker="bnc">VUL-0: CVE-2024-35984: kernel: i2c: smbus: fix NULL function pointer dereference</issue>
  <issue id="1224571" tracker="bnc">VUL-0: CVE-2024-35978: kernel: Bluetooth: Fix memory leak in hci_req_sync_complete()</issue>
  <issue id="1224575" tracker="bnc">VUL-0: CVE-2024-35976: kernel: xsk: validate user input for XDP_{UMEM|COMPLETION}_FILL_RING</issue>
  <issue id="1224576" tracker="bnc">VUL-0: CVE-2024-35966: kernel: Bluetooth: RFCOMM: Fix not validating setsockopt user input</issue>
  <issue id="1224579" tracker="bnc">VUL-0: CVE-2024-35965: kernel: Bluetooth: L2CAP: Fix not validating setsockopt user input</issue>
  <issue id="1224580" tracker="bnc">VUL-0: CVE-2024-35969: kernel: ipv6: fix race condition between ipv6_get_ifaddr and ipv6_del_addr</issue>
  <issue id="1224581" tracker="bnc">VUL-0: CVE-2024-35964: kernel: Bluetooth: ISO: Fix not validating setsockopt user input</issue>
  <issue id="1224582" tracker="bnc">VUL-0: CVE-2024-35963: kernel: Bluetooth: hci_sock: Fix not validating setsockopt user input</issue>
  <issue id="1224586" tracker="bnc">VUL-0: CVE-2024-35973: kernel: geneve: fix header validation in geneve[6]_xmit_skb</issue>
  <issue id="1224587" tracker="bnc">VUL-0: CVE-2024-35967: kernel: Bluetooth: SCO: Fix not validating setsockopt user input</issue>
  <issue id="1224592" tracker="bnc">VUL-0: CVE-2024-35811: kernel: wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach</issue>
  <issue id="1224598" tracker="bnc">VUL-0: CVE-2023-52694: kernel: drm/bridge: tpd12s015: Drop buggy __exit annotation for remove function</issue>
  <issue id="1224601" tracker="bnc">VUL-0: CVE-2023-52696: kernel: powerpc/powernv: Add a null pointer check in opal_powercap_init()</issue>
  <issue id="1224607" tracker="bnc">VUL-0: CVE-2023-52691: kernel: drm/amd/pm: fix a double-free in si_dpm_init</issue>
  <issue id="1224608" tracker="bnc">VUL-0: CVE-2023-52680: kernel: ALSA: scarlett2: Add missing error checks to *_ctl_get()</issue>
  <issue id="1224611" tracker="bnc">VUL-0: CVE-2023-52690: kernel: powerpc/powernv: Add a null pointer check to scom_debug_init_one()</issue>
  <issue id="1224615" tracker="bnc">VUL-0: CVE-2024-35796: kernel: net: ll_temac: platform_get_resource replaced by wrong function</issue>
  <issue id="1224617" tracker="bnc">VUL-0: CVE-2023-52678: kernel: drm/amdkfd: Confirm list is non-empty before utilizing list_first_entry in kfd_topology.c</issue>
  <issue id="1224618" tracker="bnc">VUL-0: CVE-2024-35813: kernel: mmc: core: Avoid negative index with array access</issue>
  <issue id="1224621" tracker="bnc">VUL-0: CVE-2023-52698: kernel: calipso: fix memory leak in netlbl_calipso_add_pass()</issue>
  <issue id="1224622" tracker="bnc">VUL-0: CVE-2024-35828: kernel: wifi: libertas: fix some memleaks in lbs_allocate_cmd_buffer()</issue>
  <issue id="1224624" tracker="bnc">VUL-0: REJECTED: CVE-2024-35812: kernel: usb: cdc-wdm: close race between read and workqueue</issue>
  <issue id="1224627" tracker="bnc">VUL-0: CVE-2023-52683: kernel: ACPI: LPIT: Avoid u32 multiplication overflow</issue>
  <issue id="1224628" tracker="bnc">VUL-0: CVE-2023-52692: kernel: ALSA: scarlett2: Add missing error check to scarlett2_usb_set_config()</issue>
  <issue id="1224629" tracker="bnc">VUL-0: CVE-2024-35821: kernel: ubifs: Set page uptodate in the correct place</issue>
  <issue id="1224632" tracker="bnc">VUL-0: CVE-2024-35833: kernel: dmaengine: fsl-qdma: Fix a memory leak related to the queue command DMA</issue>
  <issue id="1224636" tracker="bnc">VUL-0: CVE-2024-35854: kernel: mlxsw: spectrum_acl_tcam: Fix possible use-after-free during rehash</issue>
  <issue id="1224637" tracker="bnc">VUL-0: CVE-2023-52669: kernel: crypto: s390/aes - Fix buffer overread in CTR mode</issue>
  <issue id="1224638" tracker="bnc">VUL-0: CVE-2024-35804: kernel: KVM: x86: Mark target gfn of emulated atomic instruction as dirty</issue>
  <issue id="1224640" tracker="bnc">VUL-0: CVE-2024-35933: kernel: Bluetooth: btintel: Fix null ptr deref in btintel_read_version</issue>
  <issue id="1224643" tracker="bnc">VUL-0: CVE-2024-35938: kernel: wifi: ath11k: decrease MHI channel buffer length to 8KB</issue>
  <issue id="1224644" tracker="bnc">VUL-0: CVE-2024-35936: kernel: btrfs: handle chunk tree lookup error in btrfs_relocate_sys_chunks()</issue>
  <issue id="1224645" tracker="bnc">VUL-0: CVE-2024-35935: kernel: btrfs: send: handle path ref underflow in header iterate_inode_ref()</issue>
  <issue id="1224647" tracker="bnc">VUL-0: CVE-2024-35947: kernel: dyndbg: fix old BUG_ON in &gt;control parser</issue>
  <issue id="1224648" tracker="bnc">VUL-0: CVE-2024-35944: kernel: VMCI: Fix memcpy() run-time warning in dg_dispatch_as_host()</issue>
  <issue id="1224649" tracker="bnc">VUL-0: CVE-2024-35943: kernel: pmdomain: ti: Add a null pointer check to the omap_prm_domain_init</issue>
  <issue id="1224650" tracker="bnc">VUL-0: CVE-2024-35932: kernel: drm/vc4: don't check if plane-&gt;state-&gt;fb == state-&gt;fb</issue>
  <issue id="1224651" tracker="bnc">VUL-0: CVE-2024-35930: kernel: scsi: lpfc: Fix possible memory leak in lpfc_rcv_padisc()</issue>
  <issue id="1224657" tracker="bnc">VUL-0: CVE-2024-35924: kernel: usb: typec: ucsi: Limit read size on v1.2</issue>
  <issue id="1224659" tracker="bnc">VUL-0: CVE-2023-52699: kernel: sysv: don't call sb_bread() with pointers_lock held</issue>
  <issue id="1224660" tracker="bnc">VUL-0: CVE-2024-35922: kernel: fbmon: prevent division by zero in fb_videomode_from_videomode()</issue>
  <issue id="1224663" tracker="bnc">VUL-0: CVE-2024-35887: kernel: ax25: fix use-after-free bugs caused by ax25_ds_del_timer</issue>
  <issue id="1224664" tracker="bnc">VUL-0: CVE-2024-35867: kernel: smb: client: fix potential UAF in cifs_stats_proc_show()</issue>
  <issue id="1224665" tracker="bnc">VUL-0: CVE-2024-35875: kernel: x86/coco: Require seeding RNG with RDRAND on CoCo systems</issue>
  <issue id="1224666" tracker="bnc">VUL-0: CVE-2024-35959: kernel: net/mlx5e: Fix mlx5e_priv_init() cleanup flow</issue>
  <issue id="1224667" tracker="bnc">VUL-0: CVE-2024-35866: kernel: smb: client: fix potential UAF in cifs_dump_full_key()</issue>
  <issue id="1224668" tracker="bnc">VUL-0: CVE-2024-35865: kernel: smb: client: fix potential UAF in smb2_is_valid_oplock_break()</issue>
  <issue id="1224671" tracker="bnc">VUL-0: CVE-2024-35878: kernel: of: module: prevent NULL pointer dereference in vsnprintf()</issue>
  <issue id="1224672" tracker="bnc">VUL-0: CVE-2024-35870: kernel: smb: client: fix UAF in smb2_reconnect_server()</issue>
  <issue id="1224676" tracker="bnc">VUL-0: CVE-2024-35955: kernel: kprobes: Fix possible use-after-free issue on kprobe registration</issue>
  <issue id="1224678" tracker="bnc">VUL-0: CVE-2024-35868: kernel: smb: client: fix potential UAF in cifs_stats_proc_write()</issue>
  <issue id="1224679" tracker="bnc">VUL-0: CVE-2024-35869: kernel: smb: client: guarantee refcounted children from parent session</issue>
  <issue id="1224680" tracker="bnc">VUL-0: CVE-2024-35830: kernel: media: tc358743: register v4l2 async device only after successful setup</issue>
  <issue id="1224681" tracker="bnc">VUL-0: CVE-2024-35825: kernel: usb: gadget: ncm: Fix handling of zero block length packets</issue>
  <issue id="1224682" tracker="bnc">VUL-0: CVE-2023-52686: kernel: powerpc/powernv: Add a null pointer check in opal_event_init()</issue>
  <issue id="1224685" tracker="bnc">VUL-0: CVE-2024-35815: kernel: fs/aio: Check IOCB_AIO_RW before the struct aio_kiocb conversion</issue>
  <issue id="1224686" tracker="bnc">VUL-0: CVE-2023-52693: kernel: ACPI: video: check for error while searching for backlight device parent</issue>
  <issue id="1224692" tracker="bnc">VUL-0: CVE-2024-35823: kernel: vt: fix unicode buffer corruption when deleting characters</issue>
  <issue id="1224697" tracker="bnc">VUL-0: CVE-2024-35847: kernel: irqchip/gic-v3-its: Prevent double free on error</issue>
  <issue id="1224699" tracker="bnc">VUL-0: CVE-2024-35806: kernel: soc: fsl: qbman: Always disable interrupts when taking cgr_lock</issue>
  <issue id="1224701" tracker="bnc">VUL-0: CVE-2024-35951: kernel: drm/panfrost: Fix the error path in panfrost_mmu_map_fault_addr()</issue>
  <issue id="1224703" tracker="bnc">VUL-0: CVE-2024-35950: kernel: drm/client: Fully protect modes[] with dev-&gt;mode_config.mutex</issue>
  <issue id="1224705" tracker="bnc">VUL-0: CVE-2024-35952: kernel: drm/ast: Fix soft lockup</issue>
  <issue id="1224707" tracker="bnc">VUL-0: CVE-2024-35829: kernel: drm/lima: fix a memleak in lima_heap_alloc</issue>
  <issue id="1224717" tracker="bnc">VUL-0: CVE-2024-27435: kernel: nvme: fix reconnection fail due to reserved tag allocation</issue>
  <issue id="1224718" tracker="bnc">VUL-0: CVE-2024-27431: kernel: cpumap: Zero-initialise xdp_rxq_info struct before running XDP program</issue>
  <issue id="1224721" tracker="bnc">VUL-0: CVE-2024-27417: kernel: ipv6: fix potential "struct net" leak in inet6_rtm_getaddr()</issue>
  <issue id="1224722" tracker="bnc">VUL-0: CVE-2023-52657: kernel: Revert "drm/amd/pm: resolve reboot exception for si oland"</issue>
  <issue id="1224723" tracker="bnc">VUL-0: CVE-2024-27416: kernel: Bluetooth: hci_event: Fix handling of HCI_EV_IO_CAPA_REQUEST</issue>
  <issue id="1224725" tracker="bnc">VUL-0: CVE-2024-35791: kernel: KVM: SVM: Flush pages under kvm-&gt;lock to fix UAF in svm_register_enc_region()</issue>
  <issue id="1224727" tracker="bnc">VUL-0: CVE-2023-52674: kernel: ALSA: scarlett2: Add clamp() in scarlett2_mixer_ctl_put()</issue>
  <issue id="1224728" tracker="bnc">VUL-0: CVE-2023-52685: kernel: pstore: ram_core: fix possible overflow in persistent_ram_init_ecc()</issue>
  <issue id="1224729" tracker="bnc">VUL-0: CVE-2023-52671: kernel: drm/amd/display: Fix hang/underflow when transitioning to ODM4:1</issue>
  <issue id="1224730" tracker="bnc">VUL-0: CVE-2023-52676: kernel: bpf: Guard stack limits against 32bit overflow</issue>
  <issue id="1224731" tracker="bnc">VUL-0: CVE-2024-35845: kernel: wifi: iwlwifi: dbg-tlv: ensure NUL termination</issue>
  <issue id="1224732" tracker="bnc">VUL-0: CVE-2024-35801: kernel: x86/fpu: Keep xfd_state in sync with MSR_IA32_XFD</issue>
  <issue id="1224733" tracker="bnc">VUL-0: CVE-2024-35849: kernel: btrfs: fix information leak in btrfs_ioctl_logical_to_ino()</issue>
  <issue id="1224736" tracker="bnc">VUL-0: CVE-2024-35817: kernel: drm/amdgpu: amdgpu_ttm_gart_bind set gtt bound flag</issue>
  <issue id="1224738" tracker="bnc">VUL-0: CVE-2024-35809: kernel: PCI/PM: Drain runtime-idle callbacks before driver removal</issue>
  <issue id="1224739" tracker="bnc">VUL-0: CVE-2024-35822: kernel: usb: udc: remove warning when queue disabled ep</issue>
  <issue id="1224740" tracker="bnc">VUL-0: CVE-2024-35799: kernel: drm/amd/display: Prevent crash when disable stream</issue>
  <issue id="1224747" tracker="bnc">VUL-0: CVE-2023-52664: kernel: net: atlantic: eliminate double free in error handling logic</issue>
  <issue id="1224749" tracker="bnc">VUL-0: CVE-2024-35789: kernel: wifi: mac80211: check/clear fast rx for non-4addr sta VLAN changes</issue>
  <issue id="1224759" tracker="bnc">VUL-0: CVE-2024-27419: kernel: netrom: Fix data-races around sysctl_net_busy_read</issue>
  <issue id="1224763" tracker="bnc">VUL-0: CVE-2024-35863: kernel: smb: client: fix potential UAF in is_valid_oplock_break()</issue>
  <issue id="1224764" tracker="bnc">VUL-0: CVE-2024-35862: kernel: smb: client: fix potential UAF in smb2_is_network_name_deleted()</issue>
  <issue id="1224765" tracker="bnc">VUL-0: CVE-2024-35864: kernel: smb: client: fix potential UAF in smb2_is_valid_lease_break()</issue>
  <issue id="1224766" tracker="bnc">VUL-0: CVE-2024-35861: kernel: smb: client: fix potential UAF in cifs_signal_cifsd_for_reconnect()</issue>
  <issue id="1224794" tracker="bnc">KVM: s390: Check kvm pointer when testing KVM_CAP_S390_HPAGE_1M</issue>
  <issue id="1224795" tracker="bnc">s390/bpf: Emit a barrier for BPF_FETCH instructions</issue>
  <issue id="1224796" tracker="bnc">s390/cio: fix tracepoint subchannel type field</issue>
  <issue id="1224803" tracker="bnc">VUL-0: CVE-2024-27436: kernel: ALSA: usb-audio: Stop parsing channels bits when all channels are found.</issue>
  <issue id="1224816" tracker="bnc">VUL-0: CVE-2020-36788: kernel: drm/nouveau: avoid a use-after-free when BO init fails</issue>
  <issue id="1224895" tracker="bnc">VUL-0: CVE-2021-47365: kernel: afs: Fix page leak</issue>
  <issue id="1224898" tracker="bnc">VUL-0: CVE-2021-47492: kernel: mm, thp: bail out early in collapse_file for writeback page</issue>
  <issue id="1224900" tracker="bnc">VUL-0: CVE-2021-47491: kernel: mm: khugepaged: skip huge page collapse for special files</issue>
  <issue id="1224901" tracker="bnc">VUL-0: CVE-2021-47489: kernel: drm/amdgpu: Fix even more out of bound writes from debugfs</issue>
  <issue id="1224902" tracker="bnc">VUL-0: CVE-2021-47488: kernel: cgroup: Fix memory leak caused by missing cgroup_bpf_offline</issue>
  <issue id="1224903" tracker="bnc">VUL-0: CVE-2021-47486: kernel: riscv, bpf: Fix potential NULL dereference</issue>
  <issue id="1224904" tracker="bnc">VUL-0: CVE-2021-47485: kernel: IB/qib: Protect from buffer overflow in struct qib_user_sdma_pkt fields</issue>
  <issue id="1224905" tracker="bnc">VUL-0: CVE-2021-47484: kernel: octeontx2-af: Fix possible null pointer dereference</issue>
  <issue id="1224907" tracker="bnc">VUL-0: CVE-2021-47483: kernel: regmap: Fix possible double-free in regcache_rbtree_exit()</issue>
  <issue id="1224909" tracker="bnc">VUL-0: CVE-2021-47482: kernel: net: batman-adv: fix error handling</issue>
  <issue id="1224910" tracker="bnc">VUL-0: CVE-2021-47481: kernel: RDMA/mlx5: Initialize the ODP xarray when creating an ODP MR</issue>
  <issue id="1224911" tracker="bnc">VUL-0: CVE-2021-47479: kernel: staging: rtl8712: fix use-after-free in rtl8712_dl_fw</issue>
  <issue id="1224912" tracker="bnc">VUL-0: CVE-2021-47477: kernel: comedi: dt9812: fix DMA buffers on stack</issue>
  <issue id="1224913" tracker="bnc">VUL-0: CVE-2021-47476: kernel: comedi: ni_usb6501: fix NULL-deref in command paths</issue>
  <issue id="1224914" tracker="bnc">VUL-0: CVE-2021-47475: kernel: comedi: vmk80xx: fix transfer-buffer overflows</issue>
  <issue id="1224915" tracker="bnc">VUL-0: CVE-2021-47474: kernel: comedi: vmk80xx: fix bulk-buffer overflow</issue>
  <issue id="1224920" tracker="bnc">VUL-0: CVE-2021-47358: kernel: staging: greybus: uart: fix tty use after free</issue>
  <issue id="1224928" tracker="bnc">VUL-0: CVE-2023-52840: kernel: Input: synaptics-rmi4 - fix use after free in rmi_unregister_function()</issue>
  <issue id="1224929" tracker="bnc">VUL-0: CVE-2023-52731: kernel: fbdev: Fix invalid page access after closing deferred I/O devices</issue>
  <issue id="1224930" tracker="bnc">VUL-0: CVE-2023-52796: kernel: ipvlan: add ipvlan_route_v6_outbound() helper</issue>
  <issue id="1224931" tracker="bnc">VUL-0: CVE-2023-52747: kernel: IB/hfi1: Restore allocated resources on failed copyout</issue>
  <issue id="1224932" tracker="bnc">VUL-0: CVE-2023-52856: kernel: drm/bridge: lt8912b: Fix crash on bridge detach</issue>
  <issue id="1224936" tracker="bnc">VUL-0: CVE-2023-52860: kernel: drivers/perf: hisi: use cpuhp_state_remove_instance_nocalls() for hisi_hns3_pmu uninit process</issue>
  <issue id="1224937" tracker="bnc">VUL-0: CVE-2023-52870: kernel: clk: mediatek: clk-mt6765: Add check for mtk_alloc_clk_data</issue>
  <issue id="1224941" tracker="bnc">VUL-0: CVE-2023-52861: kernel: drm: bridge: it66121: Fix invalid connector dereference</issue>
  <issue id="1224942" tracker="bnc">VUL-0: CVE-2022-48708: kernel: pinctrl: single: fix potential NULL dereference</issue>
  <issue id="1224944" tracker="bnc">VUL-0: CVE-2023-52877: kernel: usb: typec: tcpm: Fix NULL pointer dereference in tcpm_pd_svdm()</issue>
  <issue id="1224945" tracker="bnc">VUL-0: CVE-2023-52702: kernel: net: openvswitch: fix possible memory leak in ovs_meter_cmd_set()</issue>
  <issue id="1224947" tracker="bnc">VUL-0: CVE-2023-52798: kernel: wifi: ath11k: fix dfs radar event locking</issue>
  <issue id="1224956" tracker="bnc">VUL-0: CVE-2023-52730: kernel: mmc: sdio: fix possible resource leaks in some error paths</issue>
  <issue id="1224988" tracker="bnc">VUL-0: CVE-2023-52853: kernel: hid: cp2112: Fix duplicate workqueue initialization</issue>
  <issue id="1224992" tracker="bnc">VUL-0: CVE-2023-52777: kernel: wifi: ath11k: fix gtk offload status event locking</issue>
  <issue id="1225000" tracker="bnc">VUL-0: CVE-2023-52878: kernel: can: dev: can_put_echo_skb(): don't crash kernel if can_priv:echo_skb is accessed out of bounds</issue>
  <issue id="1225003" tracker="bnc">VUL-0: CVE-2023-52743: kernel: ice: Do not use WQ_MEM_RECLAIM flag for workqueue</issue>
  <issue id="1225005" tracker="bnc">VUL-0: CVE-2023-52738: kernel: drm/amdgpu/fence: Fix oops due to non-matching drm_sched init/fini</issue>
  <issue id="1225008" tracker="bnc">VUL-0: CVE-2023-52803: kernel: SUNRPC: Fix RPC client cleaned up the freed pipefs dentries</issue>
  <issue id="1225009" tracker="bnc">VUL-0: CVE-2023-52867: kernel: drm/radeon: possible buffer overflow</issue>
  <issue id="1225022" tracker="bnc">VUL-0: CVE-2023-52821: kernel: drm/panel: fix a possible null pointer dereference</issue>
  <issue id="1225031" tracker="bnc">VUL-0: CVE-2023-52838: kernel: fbdev: imsttfb: fix a resource leak in probe</issue>
  <issue id="1225032" tracker="bnc">VUL-0: CVE-2023-52745: kernel: IB/IPoIB: Fix legacy IPoIB due to wrong number of queues</issue>
  <issue id="1225036" tracker="bnc">VUL-0: CVE-2023-52876: kernel: clk: mediatek: clk-mt7629-eth: Add check for mtk_alloc_clk_data</issue>
  <issue id="1225041" tracker="bnc">VUL-0: CVE-2023-52773: kernel: drm/amd/display: fix a NULL pointer dereference in amdgpu_dm_i2c_xfer()</issue>
  <issue id="1225044" tracker="bnc">VUL-0: CVE-2023-52868: kernel: thermal: core: prevent potential string overflow</issue>
  <issue id="1225053" tracker="bnc">sched/topology: Optimize topology_span_sane()</issue>
  <issue id="1225076" tracker="bnc">VUL-0: CVE-2023-52825: kernel: drm/amdkfd: Fix a race condition of vram buffer unref in svm code</issue>
  <issue id="1225077" tracker="bnc">VUL-0: CVE-2023-52826: kernel: drm/panel/panel-tpo-tpg110: fix a possible null pointer dereference</issue>
  <issue id="1225082" tracker="bnc">VUL-0: CVE-2021-47397: kernel: sctp: break out if skb_header_pointer returns NULL in sctp_rcv_ootb</issue>
  <issue id="1225085" tracker="bnc">VUL-0: CVE-2023-52795: kernel: vhost-vdpa: fix use after free in vhost_vdpa_probe()</issue>
  <issue id="1225086" tracker="bnc">VUL-0: CVE-2023-52865: kernel: clk: mediatek: clk-mt6797: Add check for mtk_alloc_clk_data</issue>
  <issue id="1225092" tracker="bnc">VUL-0: CVE-2023-52781: kernel: usb: config: fix iteration issue in 'usb_get_bos_descriptor()'</issue>
  <issue id="1225095" tracker="bnc">VUL-0: CVE-2022-48709: kernel: ice: switch: fix potential memleak in ice_add_adv_recipe()</issue>
  <issue id="1225096" tracker="bnc">VUL-0: CVE-2023-52875: kernel: clk: mediatek: clk-mt2701: Add check for mtk_alloc_clk_data</issue>
  <issue id="1225097" tracker="bnc">VUL-0: CVE-2023-52807: kernel: net: hns3: fix out-of-bounds access may occur when coalesce info is read via debugfs</issue>
  <issue id="1225106" tracker="bnc">VUL-0: CVE-2023-52788: kernel: i915/perf: Fix NULL deref bugs with drm_dbg() calls</issue>
  <issue id="1225108" tracker="bnc">VUL-0: CVE-2023-52791: kernel: i2c: core: Run atomic i2c xfer when !preemptible</issue>
  <issue id="1225109" tracker="bnc">VUL-0: CVE-2023-52707: kernel: sched/psi: Fix use-after-free in ep_remove_wait_queue()</issue>
  <issue id="1225114" tracker="bnc">VUL-0: CVE-2023-52746: kernel: xfrm/compat: prevent potential spectre v1 gadget in xfrm_xlate32_attr()</issue>
  <issue id="1225118" tracker="bnc">VUL-0: CVE-2023-52739: kernel: Fix page corruption caused by racy check in __free_pages</issue>
  <issue id="1225121" tracker="bnc">VUL-0: CVE-2023-52744: kernel: RDMA/irdma: Fix potential NULL-ptr-dereference</issue>
  <issue id="1225122" tracker="bnc">VUL-0: CVE-2021-47360: kernel: binder: make sure fd closes complete</issue>
  <issue id="1225123" tracker="bnc">VUL-0: CVE-2021-47367: kernel: virtio-net: fix pages leaking when building skb in big mode</issue>
  <issue id="1225125" tracker="bnc">VUL-0: CVE-2021-47390: kernel: KVM: x86: Fix stack-out-of-bounds memory access from ioapic_write_indirect()</issue>
  <issue id="1225126" tracker="bnc">VUL-0: CVE-2021-47389: kernel: KVM: SVM: fix missing sev_decommission in sev_receive_start</issue>
  <issue id="1225127" tracker="bnc">VUL-0: CVE-2021-47463: kernel: mm/secretmem: fix NULL page-&gt;mapping dereference in page_is_secretmem()</issue>
  <issue id="1225129" tracker="bnc">VUL-0: CVE-2021-47448: kernel: mptcp: fix possible stall on recvmsg()</issue>
  <issue id="1225131" tracker="bnc">VUL-0: CVE-2021-47398: kernel: RDMA/hfi1: Fix kernel pointer leak</issue>
  <issue id="1225132" tracker="bnc">VUL-0: CVE-2023-52864: kernel: platform/x86: wmi: Fix opening of char device</issue>
  <issue id="1225138" tracker="bnc">s390/ipl: Fix incorrect initialization of nvme dump block</issue>
  <issue id="1225139" tracker="bnc">s390/ipl: Fix incorrect initialization of len fields in nvme reipl  block</issue>
  <issue id="1225145" tracker="bnc">VUL-0: CVE-2021-47359: kernel: cifs: fix soft lockup during fsstress</issue>
  <issue id="1225151" tracker="bnc">VUL-0: CVE-2021-47361: kernel: mcb: fix error handling in mcb_alloc_bus()</issue>
  <issue id="1225153" tracker="bnc">VUL-0: CVE-2021-47362: kernel: drm/amd/pm: update intermediate power state for SI</issue>
  <issue id="1225156" tracker="bnc">VUL-0: CVE-2021-47363: kernel: nexthop: fix division by zero while replacing a resilient group</issue>
  <issue id="1225158" tracker="bnc">VUL-0: CVE-2021-47364: kernel: comedi: fix memory leak in compat_insnlist()</issue>
  <issue id="1225160" tracker="bnc">VUL-0: CVE-2021-47366: kernel: afs: fix corruption in reads at fpos 2G-4G from an OpenAFS server</issue>
  <issue id="1225161" tracker="bnc">VUL-0: CVE-2021-47368: kernel: enetc: fix illegal access when reading affinity_hint</issue>
  <issue id="1225164" tracker="bnc">VUL-0: CVE-2021-47369: kernel: s390/qeth: fix NULL deref in qeth_clear_working_pool_list()</issue>
  <issue id="1225167" tracker="bnc">VUL-0: CVE-2021-47371: kernel: nexthop: fix memory leaks in nexthop notification chain listeners</issue>
  <issue id="1225180" tracker="bnc">VUL-0: CVE-2023-52789: kernel: tty: vcc: Add check for kstrdup() in vcc_probe()</issue>
  <issue id="1225183" tracker="bnc">VUL-0: CVE-2021-47370: kernel: mptcp: ensure tx skbs always have the MPTCP ext</issue>
  <issue id="1225184" tracker="bnc">VUL-0: CVE-2021-47372: kernel: net: macb: fix use after free on rmmod</issue>
  <issue id="1225186" tracker="bnc">VUL-0: CVE-2021-47470: kernel: mm, slub: fix potential use-after-free in slab_debugfs_fops</issue>
  <issue id="1225187" tracker="bnc">VUL-0: CVE-2021-47471: kernel: drm: mxsfb: Fix NULL pointer dereference crash on unload</issue>
  <issue id="1225189" tracker="bnc">VUL-0: CVE-2021-47472: kernel: net: mdiobus: Fix memory leak in __mdiobus_register</issue>
  <issue id="1225190" tracker="bnc">VUL-0: CVE-2021-47373: kernel: irqchip/gic-v3-its: Fix potential VPE leak on error</issue>
  <issue id="1225191" tracker="bnc">VUL-0: CVE-2021-47374: kernel: dma-debug: prevent an error message from causing runtime problems</issue>
  <issue id="1225192" tracker="bnc">VUL-0: CVE-2021-47473: kernel: scsi: qla2xxx: Fix a memory leak in an error path of qla2x00_process_els()</issue>
  <issue id="1225193" tracker="bnc">VUL-0: CVE-2021-47375: kernel: blktrace: Fix uaf in blk_trace access after removing by sysfs</issue>
  <issue id="1225195" tracker="bnc">VUL-0: CVE-2021-47376: kernel: bpf: Add oversize check before call kvcalloc()</issue>
  <issue id="1225198" tracker="bnc">VUL-0: CVE-2021-47478: kernel: isofs: Fix out of bound access for corrupted isofs image</issue>
  <issue id="1225201" tracker="bnc">VUL-0: CVE-2021-47378: kernel: nvme-rdma: destroy cm id before destroy qp to avoid use after free</issue>
  <issue id="1225203" tracker="bnc">VUL-0: CVE-2021-47379: kernel: blk-cgroup: fix UAF by grabbing blkcg lock before destroying blkg pd</issue>
  <issue id="1225205" tracker="bnc">VUL-0: CVE-2021-47380: kernel: HID: amd_sfh: Fix potential NULL pointer dereference</issue>
  <issue id="1225206" tracker="bnc">VUL-0: CVE-2021-47381: kernel: ASoC: SOF: Fix DSP oops stack dump output contents</issue>
  <issue id="1225207" tracker="bnc">VUL-0: CVE-2021-47382: kernel: s390/qeth: fix deadlock during failing recovery</issue>
  <issue id="1225208" tracker="bnc">VUL-0: CVE-2021-47383: kernel: tty: Fix out-of-bound vmalloc access in imageblit</issue>
  <issue id="1225209" tracker="bnc">VUL-0: CVE-2021-47384: kernel: hwmon: (w83793) Fix NULL pointer dereference by removing unnecessary structure field</issue>
  <issue id="1225210" tracker="bnc">VUL-0: CVE-2021-47385: kernel: hwmon: (w83792d) Fix NULL pointer dereference by removing unnecessary structure field</issue>
  <issue id="1225214" tracker="bnc">VUL-0: CVE-2021-47388: kernel: mac80211: fix use-after-free in CCMP/GCMP RX</issue>
  <issue id="1225222" tracker="bnc">VUL-0: CVE-2023-52732: kernel: ceph: blocklist the kclient when receiving corrupted snap trace</issue>
  <issue id="1225223" tracker="bnc">VUL-0: CVE-2021-47425: kernel: i2c: acpi: fix resource leak in reconfiguration device addition</issue>
  <issue id="1225224" tracker="bnc">VUL-0: CVE-2021-47441: kernel: mlxsw: thermal: Fix out-of-bounds memory accesses</issue>
  <issue id="1225225" tracker="bnc">VUL-0: CVE-2021-47427: kernel: scsi: iscsi: Fix iscsi_task use after free</issue>
  <issue id="1225227" tracker="bnc">VUL-0: CVE-2021-47417: kernel: libbpf: Fix memory leak in strset</issue>
  <issue id="1225228" tracker="bnc">VUL-0: CVE-2021-47430: kernel: x86/entry: Clear X86_FEATURE_SMAP when CONFIG_X86_SMAP=n</issue>
  <issue id="1225229" tracker="bnc">VUL-0: CVE-2021-47438: kernel: net/mlx5e: Fix memory leak in mlx5_core_destroy_cq() error path</issue>
  <issue id="1225230" tracker="bnc">VUL-0: CVE-2022-48710: kernel: drm/radeon: fix a possible null pointer dereference</issue>
  <issue id="1225232" tracker="bnc">VUL-0: CVE-2021-47434: kernel: xhci: Fix command ring pointer corruption while aborting a command</issue>
  <issue id="1225233" tracker="bnc">VUL-0: CVE-2021-47422: kernel: drm/nouveau/kms/nv50-: fix file release memory leak</issue>
  <issue id="1225235" tracker="bnc">VUL-0: CVE-2021-47457: kernel: can: isotp: isotp_sendmsg(): add result check for wait_event_interruptible()</issue>
  <issue id="1225236" tracker="bnc">VUL-0: CVE-2021-47408: kernel: netfilter: conntrack: serialize hash resizes and cleanups</issue>
  <issue id="1225237" tracker="bnc">VUL-0: CVE-2021-47451: kernel: netfilter: xt_IDLETIMER: fix panic that occurs when timer_type has garbage value</issue>
  <issue id="1225238" tracker="bnc">VUL-0: CVE-2021-47405: kernel: HID: usbhid: free raw_report buffers in usbhid_stop</issue>
  <issue id="1225239" tracker="bnc">VUL-0: CVE-2021-47453: kernel: ice: Avoid crash from unnecessary IDA free</issue>
  <issue id="1225240" tracker="bnc">VUL-0: CVE-2021-47446: kernel: drm/msm/a4xx: fix error handling in a4xx_gpu_init()</issue>
  <issue id="1225241" tracker="bnc">VUL-0: CVE-2021-47403: kernel: ipack: ipoctal: fix module reference leak</issue>
  <issue id="1225242" tracker="bnc">VUL-0: CVE-2021-47401: kernel: ipack: ipoctal: fix stack information leak</issue>
  <issue id="1225243" tracker="bnc">VUL-0: CVE-2021-47444: kernel: drm/edid: In connector_bad_edid() cap num_of_ext by num_blocks read</issue>
  <issue id="1225244" tracker="bnc">VUL-0: CVE-2021-47436: kernel: usb: musb: dsps: Fix the probe error path</issue>
  <issue id="1225245" tracker="bnc">VUL-0: CVE-2021-47437: kernel: iio: adis16475: fix deadlock on frequency set</issue>
  <issue id="1225246" tracker="bnc">VUL-0: CVE-2021-47439: kernel: net: dsa: microchip: Added the condition for scheduling ksz_mib_read_work</issue>
  <issue id="1225247" tracker="bnc">VUL-0: CVE-2021-47435: kernel: dm: fix mempool NULL pointer race when completing IO</issue>
  <issue id="1225248" tracker="bnc">VUL-0: CVE-2021-47440: kernel: net: encx24j600: check error in devm_regmap_init_encx24j600</issue>
  <issue id="1225249" tracker="bnc">VUL-0: CVE-2021-47461: kernel: userfaultfd: fix a race between writeprotect and exit_mmap()</issue>
  <issue id="1225250" tracker="bnc">VUL-0: CVE-2021-47462: kernel: mm/mempolicy: do not allow illegal MPOL_F_NUMA_BALANCING | MPOL_LOCAL in mbind()</issue>
  <issue id="1225251" tracker="bnc">VUL-0: CVE-2021-47460: kernel: ocfs2: fix data corruption after conversion from inline format</issue>
  <issue id="1225252" tracker="bnc">VUL-0: CVE-2021-47458: kernel: ocfs2: mount fails with buffer overflow in strlen</issue>
  <issue id="1225253" tracker="bnc">VUL-0: CVE-2021-47459: kernel: can: j1939: j1939_netdev_start(): fix UAF for rx_kref of j1939_priv</issue>
  <issue id="1225254" tracker="bnc">VUL-0: CVE-2021-47455: kernel: ptp: Fix possible memory leak in ptp_clock_register()</issue>
  <issue id="1225255" tracker="bnc">VUL-0: CVE-2021-47454: kernel: powerpc/smp: do not decrement idle task preempt count in CPU offline</issue>
  <issue id="1225256" tracker="bnc">VUL-0: CVE-2021-47456: kernel: can: peak_pci: peak_pci_remove(): fix UAF</issue>
  <issue id="1225257" tracker="bnc">VUL-0: CVE-2021-47452: kernel: netfilter: nf_tables: skip netdev events generated on netns removal</issue>
  <issue id="1225258" tracker="bnc">VUL-0: CVE-2021-47450: kernel: KVM: arm64: Fix host stage-2 PGD refcount</issue>
  <issue id="1225259" tracker="bnc">VUL-0: CVE-2021-47449: kernel: ice: fix locking for Tx timestamp tracking flush</issue>
  <issue id="1225260" tracker="bnc">VUL-0: CVE-2021-47447: kernel: drm/msm/a3xx: fix error handling in a3xx_gpu_init()</issue>
  <issue id="1225261" tracker="bnc">VUL-0: CVE-2021-47445: kernel: drm/msm: Fix null pointer dereference on pointer edp</issue>
  <issue id="1225262" tracker="bnc">VUL-0: CVE-2021-47443: kernel: NFC: digital: fix possible memory leak in digital_tg_listen_mdaa()</issue>
  <issue id="1225263" tracker="bnc">VUL-0: CVE-2021-47442: kernel: NFC: digital: fix possible memory leak in digital_in_send_sdd_req()</issue>
  <issue id="1225268" tracker="bnc">VUL-0: CVE-2021-47386: kernel: hwmon: (w83791d) Fix NULL pointer dereference by removing unnecessary structure field</issue>
  <issue id="1225301" tracker="bnc">VUL-0: CVE-2021-47402: kernel: net: sched: flower: protect fl_walk() with rcu</issue>
  <issue id="1225303" tracker="bnc">VUL-0: CVE-2021-47404: kernel: HID: betop: fix slab-out-of-bounds Write in betop_probe</issue>
  <issue id="1225304" tracker="bnc">VUL-0: CVE-2021-47406: kernel: ext4: add error checking to ext4_ext_replay_set_iblocks()</issue>
  <issue id="1225306" tracker="bnc">VUL-0: CVE-2021-47407: kernel: KVM: x86: Handle SRCU initialization failure during page track init</issue>
  <issue id="1225316" tracker="bnc">VUL-0: CVE-2021-47387: kernel: cpufreq: schedutil: Use kobject release() method to free sugov_tunables</issue>
  <issue id="1225318" tracker="bnc">VUL-0: CVE-2021-47391: kernel: RDMA/cma: Ensure rdma_addr_cancel() happens before issuing more requests</issue>
  <issue id="1225320" tracker="bnc">VUL-0: CVE-2021-47392: kernel: RDMA/cma: Fix listener leak in rdma_cma_listen_on_all() failure</issue>
  <issue id="1225321" tracker="bnc">VUL-0: CVE-2021-47393: kernel: hwmon: (mlxreg-fan) Return non-zero value when fan current state is enforced from sysfs</issue>
  <issue id="1225322" tracker="bnc">VUL-0: CVE-2021-47480: kernel: scsi: core: Put LLD module refcnt after SCSI device is released</issue>
  <issue id="1225323" tracker="bnc">VUL-0: CVE-2021-47394: kernel: netfilter: nf_tables: unlink table before deleting it</issue>
  <issue id="1225326" tracker="bnc">VUL-0: CVE-2021-47395: kernel: mac80211: limit injected vht mcs/nss in ieee80211_parse_tx_radiotap</issue>
  <issue id="1225327" tracker="bnc">VUL-0: CVE-2021-47396: kernel: mac80211-hwsim: fix late beacon hrtimer handling</issue>
  <issue id="1225328" tracker="bnc">VUL-0: CVE-2021-47399: kernel: ixgbe: Fix NULL pointer dereference in ixgbe_xdp_setup</issue>
  <issue id="1225329" tracker="bnc">VUL-0: CVE-2021-47400: kernel: net: hns3: do not allow call hns3_nic_net_open repeatedly</issue>
  <issue id="1225330" tracker="bnc">VUL-0: CVE-2021-47409: kernel: usb: dwc2: check return value after calling platform_get_resource()</issue>
  <issue id="1225331" tracker="bnc">VUL-0: CVE-2021-47410: kernel: drm/amdkfd: fix svm_migrate_fini warning</issue>
  <issue id="1225332" tracker="bnc">VUL-0: CVE-2021-47412: kernel: block: don't call rq_qos_ops-&gt;done_bio if the bio isn't tracked</issue>
  <issue id="1225333" tracker="bnc">VUL-0: CVE-2021-47413: kernel: usb: chipidea: ci_hdrc_imx: Also search for 'phys' phandle</issue>
  <issue id="1225334" tracker="bnc">VUL-0: CVE-2021-47414: kernel: riscv: Flush current cpu icache before other cpus</issue>
  <issue id="1225335" tracker="bnc">VUL-0: CVE-2021-47415: kernel: iwlwifi: mvm: Fix possible NULL dereference</issue>
  <issue id="1225336" tracker="bnc">VUL-0: CVE-2021-47416: kernel: phy: mdio: fix memory leak</issue>
  <issue id="1225337" tracker="bnc">VUL-0: CVE-2021-47418: kernel: net_sched: fix NULL deref in fifo_set_limit()</issue>
  <issue id="1225338" tracker="bnc">VUL-0: CVE-2021-47419: kernel: net/sched: sch_taprio: properly cancel timer from taprio_destroy()</issue>
  <issue id="1225339" tracker="bnc">VUL-0: CVE-2021-47420: kernel: drm/amdkfd: fix a potential ttm-&gt;sg memory leak</issue>
  <issue id="1225341" tracker="bnc">VUL-0: CVE-2021-47465: kernel: KVM: PPC: Book3S HV: fix stack handling in idle_kvm_start_guest()</issue>
  <issue id="1225342" tracker="bnc">VUL-0: CVE-2021-47466: kernel: mm, slub: fix potential memoryleak in kmem_cache_open()</issue>
  <issue id="1225344" tracker="bnc">VUL-0: CVE-2021-47467: kernel: kunit: fix reference count leak in kfree_at_end</issue>
  <issue id="1225346" tracker="bnc">VUL-0: CVE-2021-47468: kernel: isdn: mISDN: fix sleeping function called from invalid context</issue>
  <issue id="1225347" tracker="bnc">VUL-0: CVE-2021-47469: kernel: spi: fix deadlock when adding SPI controllers on SPI buses</issue>
  <issue id="1225351" tracker="bnc">VUL-0: CVE-2021-47495: kernel: usbnet: sanity check for maxpacket</issue>
  <issue id="1225353" tracker="bnc">VUL-0: CVE-2021-47421: kernel: drm/amdgpu: handle the case of pci_channel_io_frozen only in amdgpu_pci_resume</issue>
  <issue id="1225354" tracker="bnc">VUL-0: CVE-2021-47496: kernel: net/tls: fix flipped sign in tls_err_abort() calls</issue>
  <issue id="1225355" tracker="bnc">VUL-0: CVE-2021-47497: kernel: nvmem: fix shift-out-of-bound (UBSAN) with byte size cells</issue>
  <issue id="1225357" tracker="bnc">VUL-0: CVE-2021-47498: kernel: dm rq: don't queue request to blk-mq during DM suspend</issue>
  <issue id="1225358" tracker="bnc">VUL-0: CVE-2021-47499: kernel: iio: accel: kxcjk-1013: fix possible memory leak in probe and remove</issue>
  <issue id="1225360" tracker="bnc">VUL-0: CVE-2021-47500: kernel: iio: mma8452: fix trigger reference couting</issue>
  <issue id="1225361" tracker="bnc">VUL-0: CVE-2021-47501: kernel: i40e: fix NULL pointer dereference in i40e_dbg_dump_desc</issue>
  <issue id="1225366" tracker="bnc">VUL-0: CVE-2021-47423: kernel: drm/nouveau/debugfs: fix file release memory leak</issue>
  <issue id="1225367" tracker="bnc">VUL-0: CVE-2021-47424: kernel: i40e: Fix freeing of uninitialized misc IRQ vector</issue>
  <issue id="1225368" tracker="bnc">VUL-0: CVE-2021-47528: kernel: usb: cdnsp: Fix a NULL pointer dereference in cdnsp_endpoint_init()</issue>
  <issue id="1225369" tracker="bnc">VUL-0: CVE-2021-47502: kernel: ASoC: codecs: wcd934x: handle channel mappping list correctly</issue>
  <issue id="1225370" tracker="bnc">VUL-0: CVE-2021-47426: kernel: bpf, s390: Fix potential memory leak about jit_data</issue>
  <issue id="1225372" tracker="bnc">VUL-0: CVE-2021-47518: kernel: nfc: fix potential NULL pointer deref in nfc_genl_dump_ses_done</issue>
  <issue id="1225373" tracker="bnc">VUL-0: CVE-2021-47529: kernel: iwlwifi: Fix memory leaks in error handling path</issue>
  <issue id="1225374" tracker="bnc">VUL-0: CVE-2021-47503: kernel: scsi: pm80xx: do not call scsi_remove_host() in pm8001_alloc()</issue>
  <issue id="1225375" tracker="bnc">VUL-0: CVE-2021-47537: kernel: octeontx2-af: Fix a memleak bug in rvu_mbox_init()</issue>
  <issue id="1225376" tracker="bnc">VUL-0: CVE-2021-47526: kernel: serial: liteuart: Fix NULL pointer dereference in -&gt;remove()</issue>
  <issue id="1225377" tracker="bnc">VUL-0: CVE-2021-47524: kernel: serial: liteuart: fix minor-number leak on probe errors</issue>
  <issue id="1225379" tracker="bnc">VUL-0: CVE-2021-47550: kernel: drm/amd/amdgpu: fix potential memleak</issue>
  <issue id="1225380" tracker="bnc">VUL-0: CVE-2021-47513: kernel: net: dsa: felix: Fix memory leak in felix_setup_mmio_filtering</issue>
  <issue id="1225382" tracker="bnc">VUL-0: CVE-2021-47504: kernel: io_uring: ensure task_work gets run as part of cancelations</issue>
  <issue id="1225383" tracker="bnc">VUL-0: CVE-2021-47556: kernel: ethtool: ioctl: fix potential NULL deref in ethtool_set_coalesce()</issue>
  <issue id="1225384" tracker="bnc">VUL-0: CVE-2021-47565: kernel: scsi: mpt3sas: Fix kernel panic during drive powercycle test</issue>
  <issue id="1225386" tracker="bnc">VUL-0: CVE-2021-47540: kernel: mt76: mt7915: fix NULL pointer dereference in mt7915_get_phy_mode</issue>
  <issue id="1225387" tracker="bnc">VUL-0: CVE-2021-47428: kernel: powerpc/64s: fix program check interrupt emergency stack path</issue>
  <issue id="1225388" tracker="bnc">VUL-0: CVE-2021-47429: kernel: powerpc/64s: Fix unrecoverable MCE calling async handler from NMI</issue>
  <issue id="1225390" tracker="bnc">VUL-0: CVE-2021-47431: kernel: drm/amdgpu: fix gart.bo pin_count leak</issue>
  <issue id="1225392" tracker="bnc">VUL-0: CVE-2021-47433: kernel: btrfs: fix abort logic in btrfs_replace_file_extents</issue>
  <issue id="1225393" tracker="bnc">VUL-0: CVE-2021-47464: kernel: audit: fix possible null-pointer dereference in audit_filter_rules</issue>
  <issue id="1225396" tracker="bnc">VUL-0: CVE-2021-47559: kernel: net/smc: Fix NULL pointer dereferencing in smc_vlan_by_tcpsk()</issue>
  <issue id="1225400" tracker="bnc">VUL-0: CVE-2021-47505: kernel: aio: fix use-after-free due to missing POLLFREE handling</issue>
  <issue id="1225404" tracker="bnc">VUL-0: CVE-2021-47506: kernel: nfsd: fix use-after-free due to delegation race</issue>
  <issue id="1225405" tracker="bnc">VUL-0: CVE-2021-47507: kernel: nfsd: fix nsfd startup race (again)</issue>
  <issue id="1225408" tracker="bnc">VUL-0: CVE-2021-47508: kernel: btrfs: free exchange changeset on failures</issue>
  <issue id="1225409" tracker="bnc">VUL-0: CVE-2021-47509: kernel: ALSA: pcm: oss: limit the period size to 16MB</issue>
  <issue id="1225410" tracker="bnc">VUL-0: CVE-2021-47510: kernel: btrfs: fix re-dirty process of tree-log nodes</issue>
  <issue id="1225411" tracker="bnc">VUL-0: CVE-2021-47511: kernel: ALSA: pcm: oss: fix negative period/buffer sizes</issue>
  <issue id="1225424" tracker="bnc">VUL-0: CVE-2021-47512: kernel: net/sched: fq_pie: prevent dismantle issue</issue>
  <issue id="1225425" tracker="bnc">VUL-0: CVE-2021-47514: kernel: devlink: fix netns refcount leak in devlink_nl_cmd_reload()</issue>
  <issue id="1225427" tracker="bnc">VUL-0: CVE-2021-47516: kernel: nfp: Fix memory leak in nfp_cpp_area_cache_add()</issue>
  <issue id="1225431" tracker="bnc">VUL-0: CVE-2021-47520: kernel: can: pch_can: pch_can_rx_normal: fix use after free</issue>
  <issue id="1225435" tracker="bnc">VUL-0: CVE-2021-47521: kernel: can: sja1000: fix use after free in ems_pcmcia_add_card()</issue>
  <issue id="1225436" tracker="bnc">VUL-0: CVE-2021-47490: kernel: drm/ttm: fix memleak in ttm_transfered_destroy</issue>
  <issue id="1225437" tracker="bnc">VUL-0: CVE-2021-47522: kernel: HID: bigbenff: prevent null pointer dereference</issue>
  <issue id="1225438" tracker="bnc">VUL-0: CVE-2021-47523: kernel: IB/hfi1: Fix leak of rcvhdrtail_dummy_kvaddr</issue>
  <issue id="1225439" tracker="bnc">VUL-0: CVE-2021-47493: kernel: ocfs2: fix race between searching chunks and release journal_head from buffer_head</issue>
  <issue id="1225441" tracker="bnc">VUL-0: CVE-2021-47525: kernel: serial: liteuart: fix use-after-free and memleak on unbind</issue>
  <issue id="1225442" tracker="bnc">VUL-0: CVE-2021-47530: kernel: drm/msm: Fix wait_fence submitqueue leak</issue>
  <issue id="1225443" tracker="bnc">VUL-0: CVE-2021-47531: kernel: drm/msm: Fix mmap to include VM_IO and VM_DONTDUMP</issue>
  <issue id="1225444" tracker="bnc">VUL-0: CVE-2021-47532: kernel: drm/msm/devfreq: Fix OPP refcnt leak</issue>
  <issue id="1225445" tracker="bnc">VUL-0: CVE-2021-47533: kernel: drm/vc4: kms: Clear the HVS FIFO commit pointer once done</issue>
  <issue id="1225446" tracker="bnc">VUL-0: CVE-2021-47535: kernel: drm/msm/a6xx: Allocate enough space for GMU registers</issue>
  <issue id="1225447" tracker="bnc">VUL-0: CVE-2021-47536: kernel: net/smc: fix wrong list_del in smc_lgr_cleanup_early</issue>
  <issue id="1225450" tracker="bnc">VUL-0: CVE-2021-47494: kernel: cfg80211: fix management registrations locking</issue>
  <issue id="1225453" tracker="bnc">VUL-0: CVE-2021-47541: kernel: net/mlx4_en: Fix an use-after-free bug in mlx4_en_try_alloc_resources()</issue>
  <issue id="1225455" tracker="bnc">VUL-0: CVE-2021-47542: kernel: net: qlogic: qlcnic: Fix a NULL pointer dereference in qlcnic_83xx_add_rings()</issue>
  <issue id="1225461" tracker="bnc">VUL-0: CVE-2023-52756: kernel: pwm: Fix double shift bug</issue>
  <issue id="1225463" tracker="bnc">VUL-0: CVE-2021-47544: kernel: tcp: fix page frag corruption on page fault</issue>
  <issue id="1225464" tracker="bnc">VUL-0: CVE-2021-47553: kernel: sched/scs: reset task stack state in bringup_cpu()</issue>
  <issue id="1225466" tracker="bnc">VUL-0: CVE-2021-47554: kernel: vdpa_sim: avoid putting an uninitialized iova_domain</issue>
  <issue id="1225467" tracker="bnc">VUL-0: CVE-2021-47555: kernel: net: vlan: fix underflow for the real_dev refcnt</issue>
  <issue id="1225468" tracker="bnc">VUL-0: CVE-2021-47557: kernel: net/sched: sch_ets: don't peek at classes beyond 'nbands'</issue>
  <issue id="1225471" tracker="bnc">VUL-0: CVE-2023-52740: kernel: powerpc/64s/interrupt: Fix interrupt exit race with security mitigation switch</issue>
  <issue id="1225472" tracker="bnc">VUL-0: CVE-2023-52799: kernel: jfs: fix array-index-out-of-bounds in dbFindLeaf</issue>
  <issue id="1225478" tracker="bnc">VUL-0: CVE-2023-52753: kernel: drm/amd/display: Avoid NULL dereference of timing generator</issue>
  <issue id="1225479" tracker="bnc">VUL-0: CVE-2023-52741: kernel: cifs: Fix use-after-free in rdata-&gt;read_into_pages()</issue>
  <issue id="1225480" tracker="bnc">VUL-0: CVE-2023-52705: kernel: nilfs2: fix underflow in second superblock position calculations</issue>
  <issue id="1225482" tracker="bnc">VUL-0: CVE-2023-52742: kernel: net: USB: Fix wrong-direction WARNING in plusb.c</issue>
  <issue id="1225483" tracker="bnc">VUL-0: CVE-2023-52708: kernel: mmc: mmc_spi: fix error handling in mmc_spi_probe()</issue>
  <issue id="1225486" tracker="bnc">VUL-0: CVE-2023-52736: kernel: ALSA: hda: Do not unset preset when cleaning up codec</issue>
  <issue id="1225488" tracker="bnc">VUL-0: CVE-2023-52733: kernel: s390/decompressor: specify __decompress() buf len to avoid overflow</issue>
  <issue id="1225490" tracker="bnc">VUL-0: CVE-2023-52754: kernel: media: imon: fix access to invalid resource for the second interface</issue>
  <issue id="1225492" tracker="bnc">VUL-0: CVE-2021-47558: kernel: net: stmmac: Disable Tx queues when reconfiguring the interface</issue>
  <issue id="1225495" tracker="bnc">VUL-0: CVE-2021-47560: kernel: mlxsw: spectrum: protect driver from buggy firmware</issue>
  <issue id="1225499" tracker="bnc">VUL-0: CVE-2021-47562: kernel: ice: fix vsi-&gt;txq_map sizing</issue>
  <issue id="1225500" tracker="bnc">VUL-0: CVE-2021-47563: kernel: ice: avoid bpf_prog refcount underflow</issue>
  <issue id="1225501" tracker="bnc">VUL-0: CVE-2021-47564: kernel: net: marvell: prestera: fix double free issue on err path</issue>
  <issue id="1225502" tracker="bnc">VUL-0: CVE-2024-36012: kernel: Bluetooth: msft: fix slab-use-after-free in msft_do_close()</issue>
  <issue id="1225506" tracker="bnc">VUL-0: CVE-2021-47548: kernel: ethernet: hisilicon: hns: hns_dsaf_misc: fix a possible array overflow in hns_dsaf_ge_srst_by_port()</issue>
  <issue id="1225508" tracker="bnc">VUL-0: CVE-2021-47549: kernel: sata_fsl: fix UAF in sata_fsl_port_stop when rmmod sata_fsl</issue>
  <issue id="1225510" tracker="bnc">VUL-0: CVE-2021-47551: kernel: drm/amd/amdkfd: Fix kernel panic when reset failed and been triggered again</issue>
  <issue id="1225513" tracker="bnc">VUL-0: CVE-2021-47552: kernel: blk-mq: cancel blk-mq dispatch work in both blk_cleanup_queue and disk_release()</issue>
  <issue id="1225515" tracker="bnc">VUL-0: CVE-2021-47569: kernel: io_uring: fail cancellation for EXITING tasks</issue>
  <issue id="1225529" tracker="bnc">VUL-0: CVE-2023-52816: kernel: drm/amdkfd: fix shift out-of-bounds issue</issue>
  <issue id="1225530" tracker="bnc">VUL-0: CVE-2023-52818: kernel: drm/amd: fix UBSAN array-index-out-of-bounds for SMU7</issue>
  <issue id="1225532" tracker="bnc">VUL-0: CVE-2023-52819: kernel: drm/amd: fix UBSAN array-index-out-of-bounds for Polaris and Tonga</issue>
  <issue id="1225534" tracker="bnc">VUL-0: CVE-2023-52871: kernel: soc: qcom: llcc: handle a second device without data corruption</issue>
  <issue id="1225535" tracker="bnc">Nvidia Grace: TPM: Account for SPI header when allocating TPM SPI xfer buffer</issue>
  <issue id="1225548" tracker="bnc">VUL-0: CVE-2023-52757: kernel: smb: client: fix potential deadlock when releasing mids</issue>
  <issue id="1225549" tracker="bnc">VUL-0: CVE-2023-52703: kernel: net/usb: kalmia: Don't pass act_len in usb_bulk_msg error path</issue>
  <issue id="1225550" tracker="bnc">VUL-0: CVE-2023-52804: kernel: fs/jfs: Add validity check for db_maxag and db_agpref</issue>
  <issue id="1225553" tracker="bnc">VUL-0: CVE-2023-52805: kernel: jfs: fix array-index-out-of-bounds in diAlloc</issue>
  <issue id="1225554" tracker="bnc">VUL-0: CVE-2023-52806: kernel: ALSA: hda: Fix possible null-ptr-deref when assigning a stream</issue>
  <issue id="1225555" tracker="bnc">VUL-0: CVE-2023-52808: kernel: scsi: hisi_sas: Set debugfs_dir pointer to NULL after removing debugfs</issue>
  <issue id="1225556" tracker="bnc">VUL-0: CVE-2023-52809: kernel: scsi: libfc: Fix potential NULL pointer dereference in fc_lport_ptp_setup()</issue>
  <issue id="1225557" tracker="bnc">VUL-0: CVE-2023-52810: kernel: fs/jfs: Add check for negative db_l2nbperpage</issue>
  <issue id="1225559" tracker="bnc">VUL-0: CVE-2023-52811: kernel: scsi: ibmvfc: Remove BUG_ON in the case of an empty event pool</issue>
  <issue id="1225560" tracker="bnc">VUL-0: CVE-2023-52759: kernel: gfs2: ignore negated quota changes</issue>
  <issue id="1225565" tracker="bnc">VUL-0: CVE-2023-52814: kernel: drm/amdgpu: Fix potential null pointer derefernce</issue>
  <issue id="1225566" tracker="bnc">VUL-0: CVE-2023-52858: kernel: clk: mediatek: clk-mt7629: Add check for mtk_alloc_clk_data</issue>
  <issue id="1225568" tracker="bnc">VUL-0: CVE-2023-52815: kernel: drm/amdgpu/vkms: fix a possible null pointer dereference</issue>
  <issue id="1225569" tracker="bnc">VUL-0: CVE-2023-52817: kernel: drm/amdgpu: Fix a null pointer access when the smc_rreg pointer is NULL</issue>
  <issue id="1225570" tracker="bnc">VUL-0: CVE-2023-52763: kernel: i3c: master: mipi-i3c-hci: Fix a kernel panic for accessing DAT_data.</issue>
  <issue id="1225571" tracker="bnc">VUL-0: CVE-2023-52764: kernel: media: gspca: cpia1: shift-out-of-bounds in set_flicker</issue>
  <issue id="1225572" tracker="bnc">VUL-0: CVE-2023-52774: kernel: s390/dasd: protect device queue against concurrent access</issue>
  <issue id="1225577" tracker="bnc">VUL-0: CVE-2023-52832: kernel: wifi: mac80211: don't return unset power in ieee80211_get_tx_power()</issue>
  <issue id="1225583" tracker="bnc">VUL-0: CVE-2023-52855: kernel: usb: dwc2: fix possible NULL pointer dereference caused by driver concurrency</issue>
  <issue id="1225584" tracker="bnc">VUL-0: CVE-2023-52854: kernel: padata: Fix refcnt handling in padata_free_shell()</issue>
  <issue id="1225587" tracker="bnc">VUL-0: CVE-2023-52851: kernel: IB/mlx5: Fix init stage error handling to avoid double free of same QP and UAF</issue>
  <issue id="1225588" tracker="bnc">VUL-0: CVE-2023-52847: kernel: media: bttv: fix use after free error due to btv-&gt;timeout timer</issue>
  <issue id="1225589" tracker="bnc">VUL-0: CVE-2023-52873: kernel: clk: mediatek: clk-mt6779: Add check for mtk_alloc_clk_data</issue>
  <issue id="1225590" tracker="bnc">VUL-0: CVE-2023-52844: kernel: media: vidtv: psi: Add check for kstrdup</issue>
  <issue id="1225591" tracker="bnc">VUL-0: CVE-2023-52872: kernel: tty: n_gsm: fix race condition in status line change on dead connections</issue>
  <issue id="1225592" tracker="bnc">VUL-0: CVE-2023-52841: kernel: media: vidtv: mux: Add check and kfree for kstrdup</issue>
  <issue id="1225593" tracker="bnc">VUL-0: CVE-2024-36014: kernel: drm/arm/malidp: fix a possible null pointer dereference</issue>
  <issue id="1225595" tracker="bnc">VUL-0: CVE-2023-52833: kernel: Bluetooth: btusb: add date-&gt;evt_skb is NULL check</issue>
  <issue id="1225599" tracker="bnc">VUL-0: CVE-2023-52834: kernel: atl1c: work around the DMA RX overflow issue</issue>
  <issue id="1225616" tracker="bnc">printk: Update @console_may_schedule in console_trylock_spinning()</issue>
  <issue id="1225640" tracker="bnc">VUL-0: CVE-2024-36015: kernel: ppdev: Add an error check in register_device</issue>
  <issue id="1225642" tracker="bnc">VUL-0: CVE-2024-36016: kernel: tty: n_gsm: fix possible out-of-bounds in gsm0_receive()</issue>
  <issue id="1225705" tracker="bnc">VUL-0: CVE-2024-36026: kernel: drm/amd/pm: fixes a random hang in S4 for SMU v13.0.4/11</issue>
  <issue id="1225708" tracker="bnc">VUL-0: CVE-2024-36029: kernel: mmc: sdhci-msm: pervent access to suspended controller</issue>
  <issue id="1225715" tracker="bnc">VUL-0: CVE-2024-36906: kernel: ARM: 9381/1: kasan: clear stale stack poison</issue>
  <issue id="1225720" tracker="bnc">VUL-0: CVE-2024-36032: kernel: Bluetooth: qca: fix info leak when fetching fw build id</issue>
  <issue id="1225722" tracker="bnc">VUL-0: CVE-2024-36880: kernel: Bluetooth: qca: add missing firmware sanity checks</issue>
  <issue id="1225734" tracker="bnc">VUL-0: CVE-2024-36896: kernel: USB: core: Fix access violation during port device removal</issue>
  <issue id="1225735" tracker="bnc">VUL-0: CVE-2024-36897: kernel: drm/amd/display: Atom Integrated System Info v2_2 for DCN35</issue>
  <issue id="1225747" tracker="bnc">VUL-0: CVE-2024-36931: kernel: s390/cio: Ensure the copied buf is NUL terminated</issue>
  <issue id="1225748" tracker="bnc">VUL-0: CVE-2024-36893: kernel: usb: typec: tcpm: Check for port partner validity before consuming it</issue>
  <issue id="1225756" tracker="bnc">Backport BPF control flow graph and precision backtrack fixes</issue>
  <issue id="1225761" tracker="bnc">VUL-0: CVE-2024-36938: kernel: bpf, skmsg: Fix NULL pointer dereference in sk_psock_skb_ingress_enqueue</issue>
  <issue id="1225766" tracker="bnc">VUL-0: CVE-2024-36918: kernel: bpf: check bloom filter map value size</issue>
  <issue id="1225775" tracker="bnc">VUL-0: CVE-2024-36928: kernel: s390/qeth: fix kernel panic after setting hsuid</issue>
  <issue id="1225810" tracker="bnc">VUL-0: CVE-2024-36955: kernel: ALSA: hda: intel-sdw-acpi: fix usage of device_get_named_child_node()</issue>
  <issue id="1225820" tracker="bnc">VUL-0: CVE-2024-36924: kernel: scsi: lpfc: Release hbalock before calling lpfc_worker_wake_up()</issue>
  <issue id="1225829" tracker="bnc">VUL-0: CVE-2024-36926: kernel: powerpc/pseries/iommu: LPAR panics during boot up with a frozen PE</issue>
  <issue id="1225835" tracker="bnc">VUL-0: CVE-2024-36941: kernel: wifi: nl80211: don't free NULL coalescing rule</issue>
  <issue id="1225842" tracker="bnc">Update Broadcom Emulex lpfc driver to 14.4.0.2</issue>
  <issue id="2024-26935" tracker="cve" />
  <issue id="2024-26894" tracker="cve" />
  <issue id="2024-36955" tracker="cve" />
  <issue id="2024-27436" tracker="cve" />
  <issue id="2024-36906" tracker="cve" />
  <issue id="2024-26801" tracker="cve" />
  <issue id="2024-35978" tracker="cve" />
  <issue id="2024-35965" tracker="cve" />
  <issue id="2024-35966" tracker="cve" />
  <issue id="2024-35967" tracker="cve" />
  <issue id="2024-35933" tracker="cve" />
  <issue id="2024-27416" tracker="cve" />
  <issue id="2024-35963" tracker="cve" />
  <issue id="2024-27399" tracker="cve" />
  <issue id="2024-36012" tracker="cve" />
  <issue id="2024-36880" tracker="cve" />
  <issue id="2024-35851" tracker="cve" />
  <issue id="2024-36032" tracker="cve" />
  <issue id="2024-26870" tracker="cve" />
  <issue id="2024-35809" tracker="cve" />
  <issue id="2024-26838" tracker="cve" />
  <issue id="2024-26916" tracker="cve" />
  <issue id="2024-27388" tracker="cve" />
  <issue id="2024-36896" tracker="cve" />
  <issue id="2024-26934" tracker="cve" />
  <issue id="2024-26989" tracker="cve" />
  <issue id="2024-35887" tracker="cve" />
  <issue id="2024-35982" tracker="cve" />
  <issue id="2024-36918" tracker="cve" />
  <issue id="2024-35849" tracker="cve" />
  <issue id="2024-27004" tracker="cve" />
  <issue id="2024-27037" tracker="cve" />
  <issue id="2024-27001" tracker="cve" />
  <issue id="2024-27051" tracker="cve" />
  <issue id="2024-26974" tracker="cve" />
  <issue id="2024-26880" tracker="cve" />
  <issue id="2024-35990" tracker="cve" />
  <issue id="2024-35833" tracker="cve" />
  <issue id="2024-26788" tracker="cve" />
  <issue id="2024-35989" tracker="cve" />
  <issue id="2024-36897" tracker="cve" />
  <issue id="2024-27045" tracker="cve" />
  <issue id="2024-36026" tracker="cve" />
  <issue id="2024-27400" tracker="cve" />
  <issue id="2024-26922" tracker="cve" />
  <issue id="2024-36014" tracker="cve" />
  <issue id="2024-35952" tracker="cve" />
  <issue id="2024-35950" tracker="cve" />
  <issue id="2024-26938" tracker="cve" />
  <issue id="2024-26937" tracker="cve" />
  <issue id="2024-35829" tracker="cve" />
  <issue id="2024-26874" tracker="cve" />
  <issue id="2024-27008" tracker="cve" />
  <issue id="2024-35932" tracker="cve" />
  <issue id="2024-26940" tracker="cve" />
  <issue id="2024-35947" tracker="cve" />
  <issue id="2024-35922" tracker="cve" />
  <issue id="2024-35984" tracker="cve" />
  <issue id="2024-26988" tracker="cve" />
  <issue id="2024-35847" tracker="cve" />
  <issue id="2024-35955" tracker="cve" />
  <issue id="2024-27075" tracker="cve" />
  <issue id="2024-27074" tracker="cve" />
  <issue id="2024-27076" tracker="cve" />
  <issue id="2024-26829" tracker="cve" />
  <issue id="2024-27073" tracker="cve" />
  <issue id="2024-27072" tracker="cve" />
  <issue id="2024-27077" tracker="cve" />
  <issue id="2024-27078" tracker="cve" />
  <issue id="2024-35813" tracker="cve" />
  <issue id="2024-36029" tracker="cve" />
  <issue id="2024-26698" tracker="cve" />
  <issue id="2024-35901" tracker="cve" />
  <issue id="2024-26859" tracker="cve" />
  <issue id="2024-35796" tracker="cve" />
  <issue id="2024-27047" tracker="cve" />
  <issue id="2024-26597" tracker="cve" />
  <issue id="2024-35915" tracker="cve" />
  <issue id="2024-26984" tracker="cve" />
  <issue id="2024-26846" tracker="cve" />
  <issue id="2024-27435" tracker="cve" />
  <issue id="2024-26977" tracker="cve" />
  <issue id="2024-27412" tracker="cve" />
  <issue id="2024-36926" tracker="cve" />
  <issue id="2024-36015" tracker="cve" />
  <issue id="2024-35940" tracker="cve" />
  <issue id="2024-27054" tracker="cve" />
  <issue id="2024-36931" tracker="cve" />
  <issue id="2024-36928" tracker="cve" />
  <issue id="2024-26957" tracker="cve" />
  <issue id="2024-35930" tracker="cve" />
  <issue id="2024-36924" tracker="cve" />
  <issue id="2024-26931" tracker="cve" />
  <issue id="2024-26929" tracker="cve" />
  <issue id="2024-26930" tracker="cve" />
  <issue id="2024-27000" tracker="cve" />
  <issue id="2024-26999" tracker="cve" />
  <issue id="2024-35806" tracker="cve" />
  <issue id="2024-26994" tracker="cve" />
  <issue id="2024-27028" tracker="cve" />
  <issue id="2024-36016" tracker="cve" />
  <issue id="2024-35821" tracker="cve" />
  <issue id="2024-35812" tracker="cve" />
  <issue id="2024-26748" tracker="cve" />
  <issue id="2024-26997" tracker="cve" />
  <issue id="2024-26996" tracker="cve" />
  <issue id="2024-27405" tracker="cve" />
  <issue id="2024-35825" tracker="cve" />
  <issue id="2024-36893" tracker="cve" />
  <issue id="2024-35822" tracker="cve" />
  <issue id="2024-26964" tracker="cve" />
  <issue id="2024-35823" tracker="cve" />
  <issue id="2024-35938" tracker="cve" />
  <issue id="2024-35845" tracker="cve" />
  <issue id="2024-35912" tracker="cve" />
  <issue id="2024-35828" tracker="cve" />
  <issue id="2024-35789" tracker="cve" />
  <issue id="2024-36941" tracker="cve" />
  <issue id="2024-27410" tracker="cve" />
  <issue id="2024-27052" tracker="cve" />
  <issue id="2024-27053" tracker="cve" />
  <issue id="2024-35801" tracker="cve" />
  <issue id="2023-52683" tracker="cve" />
  <issue id="2023-52693" tracker="cve" />
  <issue id="2023-52851" tracker="cve" />
  <issue id="2023-52657" tracker="cve" />
  <issue id="2023-52803" tracker="cve" />
  <issue id="2023-52653" tracker="cve" />
  <issue id="2023-52732" tracker="cve" />
  <issue id="2023-52669" tracker="cve" />
  <issue id="2023-52773" tracker="cve" />
  <issue id="2023-52691" tracker="cve" />
  <issue id="2023-52815" tracker="cve" />
  <issue id="2023-52678" tracker="cve" />
  <issue id="2023-52861" tracker="cve" />
  <issue id="2023-52694" tracker="cve" />
  <issue id="2023-52650" tracker="cve" />
  <issue id="2023-52661" tracker="cve" />
  <issue id="2023-52662" tracker="cve" />
  <issue id="2023-52731" tracker="cve" />
  <issue id="2023-52643" tracker="cve" />
  <issue id="2023-52642" tracker="cve" />
  <issue id="2023-52705" tracker="cve" />
  <issue id="2023-52679" tracker="cve" />
  <issue id="2023-52696" tracker="cve" />
  <issue id="2023-52685" tracker="cve" />
  <issue id="2023-52808" tracker="cve" />
  <issue id="2023-52811" tracker="cve" />
  <issue id="2023-52809" tracker="cve" />
  <issue id="2023-52699" tracker="cve" />
  <issue id="2023-52777" tracker="cve" />
  <issue id="2023-52644" tracker="cve" />
  <issue id="2023-52659" tracker="cve" />
  <issue id="2022-48633" tracker="cve" />
  <issue id="2022-48669" tracker="cve" />
  <issue id="2022-48705" tracker="cve" />
  <issue id="2021-47532" tracker="cve" />
  <issue id="2021-47531" tracker="cve" />
  <issue id="2021-47530" tracker="cve" />
  <issue id="2021-47552" tracker="cve" />
  <issue id="2021-47508" tracker="cve" />
  <issue id="2021-47504" tracker="cve" />
  <issue id="2021-47569" tracker="cve" />
  <issue id="2021-47512" tracker="cve" />
  <issue id="2021-47557" tracker="cve" />
  <issue id="2021-47555" tracker="cve" />
  <issue id="2023-52736" tracker="cve" />
  <issue id="2023-52806" tracker="cve" />
  <issue id="2023-52833" tracker="cve" />
  <issue id="2023-52739" tracker="cve" />
  <issue id="2023-52745" tracker="cve" />
  <issue id="2023-52747" tracker="cve" />
  <issue id="2023-52840" tracker="cve" />
  <issue id="2023-52744" tracker="cve" />
  <issue id="2023-52834" tracker="cve" />
  <issue id="2023-52878" tracker="cve" />
  <issue id="2023-52741" tracker="cve" />
  <issue id="2023-52875" tracker="cve" />
  <issue id="2023-52870" tracker="cve" />
  <issue id="2023-52873" tracker="cve" />
  <issue id="2023-52865" tracker="cve" />
  <issue id="2023-52858" tracker="cve" />
  <issue id="2023-52876" tracker="cve" />
  <issue id="2023-52819" tracker="cve" />
  <issue id="2023-52818" tracker="cve" />
  <issue id="2023-52753" tracker="cve" />
  <issue id="2023-52817" tracker="cve" />
  <issue id="2023-52814" tracker="cve" />
  <issue id="2023-52738" tracker="cve" />
  <issue id="2023-52825" tracker="cve" />
  <issue id="2023-52816" tracker="cve" />
  <issue id="2023-52856" tracker="cve" />
  <issue id="2023-52821" tracker="cve" />
  <issue id="2023-52826" tracker="cve" />
  <issue id="2023-52867" tracker="cve" />
  <issue id="2023-52838" tracker="cve" />
  <issue id="2023-52810" tracker="cve" />
  <issue id="2023-52804" tracker="cve" />
  <issue id="2023-52759" tracker="cve" />
  <issue id="2023-52853" tracker="cve" />
  <issue id="2023-52791" tracker="cve" />
  <issue id="2023-52763" tracker="cve" />
  <issue id="2023-52788" tracker="cve" />
  <issue id="2023-52743" tracker="cve" />
  <issue id="2023-52799" tracker="cve" />
  <issue id="2023-52805" tracker="cve" />
  <issue id="2023-52847" tracker="cve" />
  <issue id="2023-52764" tracker="cve" />
  <issue id="2023-52754" tracker="cve" />
  <issue id="2023-52841" tracker="cve" />
  <issue id="2023-52844" tracker="cve" />
  <issue id="2023-52708" tracker="cve" />
  <issue id="2023-52730" tracker="cve" />
  <issue id="2023-52742" tracker="cve" />
  <issue id="2023-52702" tracker="cve" />
  <issue id="2023-52703" tracker="cve" />
  <issue id="2023-52854" tracker="cve" />
  <issue id="2023-52864" tracker="cve" />
  <issue id="2023-52740" tracker="cve" />
  <issue id="2023-52686" tracker="cve" />
  <issue id="2023-52690" tracker="cve" />
  <issue id="2023-52756" tracker="cve" />
  <issue id="2023-52774" tracker="cve" />
  <issue id="2023-52733" tracker="cve" />
  <issue id="2023-52707" tracker="cve" />
  <issue id="2023-52871" tracker="cve" />
  <issue id="2023-52868" tracker="cve" />
  <issue id="2023-52872" tracker="cve" />
  <issue id="2023-52880" tracker="cve" />
  <issue id="2023-52789" tracker="cve" />
  <issue id="2023-52781" tracker="cve" />
  <issue id="2023-52855" tracker="cve" />
  <issue id="2023-52877" tracker="cve" />
  <issue id="2023-52798" tracker="cve" />
  <issue id="2023-52832" tracker="cve" />
  <issue id="2022-48710" tracker="cve" />
  <issue id="2022-48709" tracker="cve" />
  <issue id="2022-48708" tracker="cve" />
  <issue id="2021-47511" tracker="cve" />
  <issue id="2021-47509" tracker="cve" />
  <issue id="2021-47381" tracker="cve" />
  <issue id="2021-47502" tracker="cve" />
  <issue id="2021-47380" tracker="cve" />
  <issue id="2021-47404" tracker="cve" />
  <issue id="2021-47522" tracker="cve" />
  <issue id="2021-47405" tracker="cve" />
  <issue id="2021-47523" tracker="cve" />
  <issue id="2021-47485" tracker="cve" />
  <issue id="2021-47465" tracker="cve" />
  <issue id="2021-47389" tracker="cve" />
  <issue id="2021-47450" tracker="cve" />
  <issue id="2021-47390" tracker="cve" />
  <issue id="2021-47407" tracker="cve" />
  <issue id="2021-47442" tracker="cve" />
  <issue id="2021-47443" tracker="cve" />
  <issue id="2021-47391" tracker="cve" />
  <issue id="2021-47392" tracker="cve" />
  <issue id="2021-47398" tracker="cve" />
  <issue id="2021-47481" tracker="cve" />
  <issue id="2021-47366" tracker="cve" />
  <issue id="2021-47505" tracker="cve" />
  <issue id="2021-47464" tracker="cve" />
  <issue id="2021-47360" tracker="cve" />
  <issue id="2021-47379" tracker="cve" />
  <issue id="2021-47375" tracker="cve" />
  <issue id="2021-47412" tracker="cve" />
  <issue id="2021-47376" tracker="cve" />
  <issue id="2021-47426" tracker="cve" />
  <issue id="2021-47433" tracker="cve" />
  <issue id="2021-47510" tracker="cve" />
  <issue id="2021-47457" tracker="cve" />
  <issue id="2021-47459" tracker="cve" />
  <issue id="2021-47520" tracker="cve" />
  <issue id="2021-47456" tracker="cve" />
  <issue id="2021-47521" tracker="cve" />
  <issue id="2021-47494" tracker="cve" />
  <issue id="2021-47488" tracker="cve" />
  <issue id="2021-47359" tracker="cve" />
  <issue id="2021-47364" tracker="cve" />
  <issue id="2021-47477" tracker="cve" />
  <issue id="2021-47476" tracker="cve" />
  <issue id="2021-47474" tracker="cve" />
  <issue id="2021-47475" tracker="cve" />
  <issue id="2021-47387" tracker="cve" />
  <issue id="2021-47514" tracker="cve" />
  <issue id="2021-47435" tracker="cve" />
  <issue id="2021-47498" tracker="cve" />
  <issue id="2021-47374" tracker="cve" />
  <issue id="2021-47550" tracker="cve" />
  <issue id="2021-47551" tracker="cve" />
  <issue id="2021-47362" tracker="cve" />
  <issue id="2021-47431" tracker="cve" />
  <issue id="2021-47421" tracker="cve" />
  <issue id="2021-47420" tracker="cve" />
  <issue id="2021-47410" tracker="cve" />
  <issue id="2021-47444" tracker="cve" />
  <issue id="2021-47445" tracker="cve" />
  <issue id="2021-47447" tracker="cve" />
  <issue id="2021-47446" tracker="cve" />
  <issue id="2021-47535" tracker="cve" />
  <issue id="2021-47471" tracker="cve" />
  <issue id="2021-47423" tracker="cve" />
  <issue id="2021-47422" tracker="cve" />
  <issue id="2021-47490" tracker="cve" />
  <issue id="2021-47533" tracker="cve" />
  <issue id="2021-47368" tracker="cve" />
  <issue id="2021-47556" tracker="cve" />
  <issue id="2021-47406" tracker="cve" />
  <issue id="2021-47393" tracker="cve" />
  <issue id="2021-47386" tracker="cve" />
  <issue id="2021-47385" tracker="cve" />
  <issue id="2021-47384" tracker="cve" />
  <issue id="2021-47425" tracker="cve" />
  <issue id="2021-47501" tracker="cve" />
  <issue id="2021-47424" tracker="cve" />
  <issue id="2021-47453" tracker="cve" />
  <issue id="2021-47563" tracker="cve" />
  <issue id="2021-47449" tracker="cve" />
  <issue id="2021-47562" tracker="cve" />
  <issue id="2021-47499" tracker="cve" />
  <issue id="2021-47437" tracker="cve" />
  <issue id="2021-47500" tracker="cve" />
  <issue id="2021-47403" tracker="cve" />
  <issue id="2021-47401" tracker="cve" />
  <issue id="2021-47373" tracker="cve" />
  <issue id="2021-47468" tracker="cve" />
  <issue id="2021-47478" tracker="cve" />
  <issue id="2021-47529" tracker="cve" />
  <issue id="2021-47415" tracker="cve" />
  <issue id="2021-47399" tracker="cve" />
  <issue id="2021-47467" tracker="cve" />
  <issue id="2021-47417" tracker="cve" />
  <issue id="2021-47388" tracker="cve" />
  <issue id="2021-47396" tracker="cve" />
  <issue id="2021-47395" tracker="cve" />
  <issue id="2021-47361" tracker="cve" />
  <issue id="2021-47560" tracker="cve" />
  <issue id="2021-47441" tracker="cve" />
  <issue id="2021-47462" tracker="cve" />
  <issue id="2021-47463" tracker="cve" />
  <issue id="2021-47466" tracker="cve" />
  <issue id="2021-47470" tracker="cve" />
  <issue id="2021-47370" tracker="cve" />
  <issue id="2021-47448" tracker="cve" />
  <issue id="2021-47540" tracker="cve" />
  <issue id="2021-47482" tracker="cve" />
  <issue id="2021-47513" tracker="cve" />
  <issue id="2021-47439" tracker="cve" />
  <issue id="2021-47440" tracker="cve" />
  <issue id="2021-47400" tracker="cve" />
  <issue id="2021-47372" tracker="cve" />
  <issue id="2021-47564" tracker="cve" />
  <issue id="2021-47472" tracker="cve" />
  <issue id="2021-47541" tracker="cve" />
  <issue id="2021-47438" tracker="cve" />
  <issue id="2021-47542" tracker="cve" />
  <issue id="2021-47402" tracker="cve" />
  <issue id="2021-47419" tracker="cve" />
  <issue id="2021-47559" tracker="cve" />
  <issue id="2021-47536" tracker="cve" />
  <issue id="2021-47558" tracker="cve" />
  <issue id="2021-47496" tracker="cve" />
  <issue id="2021-47418" tracker="cve" />
  <issue id="2021-47408" tracker="cve" />
  <issue id="2021-47452" tracker="cve" />
  <issue id="2021-47394" tracker="cve" />
  <issue id="2021-47451" tracker="cve" />
  <issue id="2021-47363" tracker="cve" />
  <issue id="2021-47371" tracker="cve" />
  <issue id="2021-47518" tracker="cve" />
  <issue id="2021-47516" tracker="cve" />
  <issue id="2021-47507" tracker="cve" />
  <issue id="2021-47506" tracker="cve" />
  <issue id="2021-47378" tracker="cve" />
  <issue id="2021-47497" tracker="cve" />
  <issue id="2021-47460" tracker="cve" />
  <issue id="2021-47493" tracker="cve" />
  <issue id="2021-47458" tracker="cve" />
  <issue id="2021-47537" tracker="cve" />
  <issue id="2021-47484" tracker="cve" />
  <issue id="2021-47416" tracker="cve" />
  <issue id="2021-47429" tracker="cve" />
  <issue id="2021-47428" tracker="cve" />
  <issue id="2021-47454" tracker="cve" />
  <issue id="2021-47455" tracker="cve" />
  <issue id="2021-47483" tracker="cve" />
  <issue id="2021-47414" tracker="cve" />
  <issue id="2021-47486" tracker="cve" />
  <issue id="2021-47369" tracker="cve" />
  <issue id="2021-47382" tracker="cve" />
  <issue id="2021-47549" tracker="cve" />
  <issue id="2021-47553" tracker="cve" />
  <issue id="2021-47480" tracker="cve" />
  <issue id="2021-47427" tracker="cve" />
  <issue id="2021-47565" tracker="cve" />
  <issue id="2021-47503" tracker="cve" />
  <issue id="2021-47473" tracker="cve" />
  <issue id="2021-47397" tracker="cve" />
  <issue id="2021-47527" tracker="cve" />
  <issue id="2021-47526" tracker="cve" />
  <issue id="2021-47524" tracker="cve" />
  <issue id="2021-47525" tracker="cve" />
  <issue id="2021-47469" tracker="cve" />
  <issue id="2021-47358" tracker="cve" />
  <issue id="2021-47479" tracker="cve" />
  <issue id="2021-47544" tracker="cve" />
  <issue id="2021-47383" tracker="cve" />
  <issue id="2021-47528" tracker="cve" />
  <issue id="2021-47413" tracker="cve" />
  <issue id="2021-47409" tracker="cve" />
  <issue id="2021-47436" tracker="cve" />
  <issue id="2021-47495" tracker="cve" />
  <issue id="2021-47461" tracker="cve" />
  <issue id="2021-47554" tracker="cve" />
  <issue id="2021-47367" tracker="cve" />
  <issue id="2021-47430" tracker="cve" />
  <issue id="2021-47434" tracker="cve" />
  <issue id="2024-26889" tracker="cve" />
  <issue id="2024-36942" tracker="cve" />
  <issue id="2024-36944" tracker="cve" />
  <issue id="2021-47534" tracker="cve" />
  <issue id="2024-36950" tracker="cve" />
  <issue id="2023-52766" tracker="cve" />
  <issue id="2024-26758" tracker="cve" />
  <issue id="2024-26943" tracker="cve" />
  <issue id="2024-36940" tracker="cve" />
  <issue id="2024-36959" tracker="cve" />
  <issue id="2024-36947" tracker="cve" />
  <issue id="2024-36952" tracker="cve" />
  <issue id="2024-26920" tracker="cve" />
  <issue id="2023-52800" tracker="cve" />
  <issue id="2024-35935" tracker="cve" />
  <issue id="2024-35936" tracker="cve" />
  <issue id="2024-35830" tracker="cve" />
  <issue id="2023-52654" tracker="cve" />
  <issue id="2021-47365" tracker="cve" />
  <issue id="2023-0160" tracker="cve" />
  <issue id="2024-35895" tracker="cve" />
  <issue id="2024-26764" tracker="cve" />
  <issue id="2024-35815" tracker="cve" />
  <issue id="2023-52591" tracker="cve" />
  <issue id="2024-35914" tracker="cve" />
  <issue id="2023-47233" tracker="cve" />
  <issue id="2024-35811" tracker="cve" />
  <issue id="2023-52676" tracker="cve" />
  <issue id="2021-47489" tracker="cve" />
  <issue id="2021-4148" tracker="cve" />
  <issue id="2021-47491" tracker="cve" />
  <issue id="2021-47492" tracker="cve" />
  <issue id="2020-36788" tracker="cve" />
  <issue id="2024-27393" tracker="cve" />
  <issue id="2024-26933" tracker="cve" />
  <issue id="2024-27059" tracker="cve" />
  <issue id="2024-26877" tracker="cve" />
  <issue id="2022-48699" tracker="cve" />
  <issue id="2024-26840" tracker="cve" />
  <issue id="2023-52646" tracker="cve" />
  <issue id="2024-26739" tracker="cve" />
  <issue id="2022-48662" tracker="cve" />
  <issue id="2024-35924" tracker="cve" />
  <issue id="2024-26921" tracker="cve" />
  <issue id="2024-35976" tracker="cve" />
  <issue id="2024-36938" tracker="cve" />
  <issue id="2024-35905" tracker="cve" />
  <issue id="2023-52795" tracker="cve" />
  <issue id="2024-35998" tracker="cve" />
  <issue id="2023-52757" tracker="cve" />
  <issue id="2021-47548" tracker="cve" />
  <issue id="2024-26828" tracker="cve" />
  <issue id="2024-27419" tracker="cve" />
  <issue id="2024-26822" tracker="cve" />
  <issue id="2024-35999" tracker="cve" />
  <issue id="2024-35861" tracker="cve" />
  <issue id="2024-35862" tracker="cve" />
  <issue id="2024-35863" tracker="cve" />
  <issue id="2024-35865" tracker="cve" />
  <issue id="2024-35864" tracker="cve" />
  <issue id="2024-35867" tracker="cve" />
  <issue id="2024-35868" tracker="cve" />
  <issue id="2024-35866" tracker="cve" />
  <issue id="2024-26928" tracker="cve" />
  <issue id="2024-35869" tracker="cve" />
  <issue id="2024-35870" tracker="cve" />
  <issue id="2024-26692" tracker="cve" />
  <issue id="2024-26839" tracker="cve" />
  <issue id="2024-26907" tracker="cve" />
  <issue id="2024-26778" tracker="cve" />
  <issue id="2024-26777" tracker="cve" />
  <issue id="2024-26925" tracker="cve" />
  <issue id="2023-42755" tracker="cve" />
  <issue id="2024-35964" tracker="cve" />
  <issue id="2023-52698" tracker="cve" />
  <issue id="2023-52664" tracker="cve" />
  <issue id="2023-52807" tracker="cve" />
  <issue id="2024-27431" tracker="cve" />
  <issue id="2024-35860" tracker="cve" />
  <issue id="2023-52671" tracker="cve" />
  <issue id="2024-35799" tracker="cve" />
  <issue id="2024-35951" tracker="cve" />
  <issue id="2024-27413" tracker="cve" />
  <issue id="2024-35817" tracker="cve" />
  <issue id="2024-35877" tracker="cve" />
  <issue id="2024-35969" tracker="cve" />
  <issue id="2023-52746" tracker="cve" />
  <issue id="2024-35872" tracker="cve" />
  <issue id="2024-35852" tracker="cve" />
  <issue id="2024-36006" tracker="cve" />
  <issue id="2024-36007" tracker="cve" />
  <issue id="2024-35885" tracker="cve" />
  <issue id="2024-35907" tracker="cve" />
  <issue id="2023-52796" tracker="cve" />
  <issue id="2024-35939" tracker="cve" />
  <issue id="2024-35875" tracker="cve" />
  <issue id="2024-35804" tracker="cve" />
  <issue id="2024-35791" tracker="cve" />
  <issue id="2024-35904" tracker="cve" />
  <issue id="2023-52660" tracker="cve" />
  <issue id="2024-35879" tracker="cve" />
  <issue id="2024-35943" tracker="cve" />
  <issue id="2024-35878" tracker="cve" />
  <issue id="2023-52860" tracker="cve" />
  <issue id="2024-35959" tracker="cve" />
  <issue id="2024-35854" tracker="cve" />
  <issue id="2024-35973" tracker="cve" />
  <issue id="2024-27417" tracker="cve" />
  <issue id="2023-52656" tracker="cve" />
  <issue id="2023-6531" tracker="cve" />
  <issue id="2023-52674" tracker="cve" />
  <issue id="2023-52680" tracker="cve" />
  <issue id="2023-52692" tracker="cve" />
  <issue id="2024-35944" tracker="cve" />
  <issue id="2024-26742" tracker="cve" />
  <issue id="2024-27398" tracker="cve" />
  <issue id="2023-52586" tracker="cve" />
  <issue id="2024-27395" tracker="cve" />
  <issue id="2024-27396" tracker="cve" />
  <issue id="2024-26715" tracker="cve" />
  <issue id="2024-26919" tracker="cve" />
  <issue id="2023-52655" tracker="cve" />
  <issue id="2024-27401" tracker="cve" />
  <issue id="2024-26900" tracker="cve" />
  <issue id="2024-26775" tracker="cve" />
  <issue id="2024-26958" tracker="cve" />
  <issue id="2024-26643" tracker="cve" />
  <issue id="2023-52618" tracker="cve" />
  <issue id="2022-48689" tracker="cve" />
  <issue id="2022-48691" tracker="cve" />
  <issue id="2024-26915" tracker="cve" />
  <issue id="2024-26700" tracker="cve" />
  <issue id="2024-26979" tracker="cve" />
  <issue id="2024-26939" tracker="cve" />
  <issue id="2024-26791" tracker="cve" />
  <issue id="2024-26679" tracker="cve" />
  <issue id="2024-27042" tracker="cve" />
  <issue id="2024-26876" tracker="cve" />
  <issue id="2024-2201" tracker="cve" />
  <issue id="2023-1829" tracker="cve" />
  <issue id="PED-3259" tracker="jsc" />
  <issue id="PED-7167" tracker="jsc" />
  <category>security</category>
  <rating>important</rating>
  <packager>ykaukab</packager>
  <reboot_needed/>
  <description>

The SUSE Linux Enterprise 15 SP5 kernel was updated to receive various security bugfixes.


The following security bugs were fixed:

- CVE-2021-47548: Fixed a possible array out-of=bounds (bsc#1225506)
- CVE-2022-48689: Fixed data-race in lru_add_fn (bsc#1223959)
- CVE-2022-48691: Fixed memory leak in netfilter (bsc#1223961)
- CVE-2023-1829: Fixed a use-after-free vulnerability in the control index filter (tcindex) (bsc#1210335).
- CVE-2023-42755: Check user supplied offsets (bsc#1215702).
- CVE-2023-52586: Fixed  mutex lock in control vblank irq (bsc#1221081).
- CVE-2023-52618: Fixed string overflow in block/rnbd-srv (bsc#1221615).
- CVE-2023-52655: Check packet for fixup for true limit (bsc#1217169).
- CVE-2023-52656: Dropped any code related to SCM_RIGHTS (bsc#1224187).
- CVE-2023-52660: Fiedx IRQ handling due to shared interrupts  (bsc#1224443).
- CVE-2023-52664: Eliminate double free in error handling logic  (bsc#1224747).
- CVE-2023-52671: Fixed hang/underflow when transitioning to ODM4:1 (bsc#1224729).
- CVE-2023-52674: Add clamp() in scarlett2_mixer_ctl_put()  (bsc#1224727).
- CVE-2023-52680: Fixed missing error checks to *_ctl_get()  (bsc#1224608).
- CVE-2023-52692: Fixed missing error check to  scarlett2_usb_set_config() (bsc#1224628).
- CVE-2023-52698: Fixed memory leak in netlbl_calipso_add_pass()  (bsc#1224621)
- CVE-2023-52746: Prevent potential spectre v1 gadget in xfrm_xlate32_attr()  (bsc#1225114)
- CVE-2023-52757: Fixed potential deadlock when releasing mids  (bsc#1225548).
- CVE-2023-52795: Fixed use after free in vhost_vdpa_probe()  (bsc#1225085).
- CVE-2023-52796: Add ipvlan_route_v6_outbound() helper (bsc#1224930).
- CVE-2023-52807: Fixed out-of-bounds access may occur when coalesce  info is read via debugfs (bsc#1225097).
- CVE-2023-52860: Fixed null pointer dereference in hisi_hns3 (bsc#1224936).
- CVE-2023-6531: Fixed a use-after-free flaw due to a race problem in the unix garbage collector's deletion of SKB races with unix_stream_read_generic()on the socket that the SKB is queued on (bsc#1218447).
- CVE-2024-2201: Fixed information leak in x86/BHI (bsc#1217339).
- CVE-2024-26643: Fixed mark set as dead when unbinding anonymous  set with timeout (bsc#1221829).
- CVE-2024-26679: Fixed read sk->sk_family once in inet_recv_error() (bsc#1222385).
- CVE-2024-26692: Fixed regression in writes when non-standard maximum write  size negotiated (bsc#1222464).
- CVE-2024-26700: Fixed drm/amd/display: Fix MST Null Ptr for RV (bsc#1222870) 
- CVE-2024-26715: Fixed NULL pointer dereference in  dwc3_gadget_suspend (bsc#1222561).
- CVE-2024-26742: Fixed disable_managed_interrupts (git-fixes  bsc#1222608).
- CVE-2024-26775: Fixed potential deadlock at set_capacity (bsc#1222627).
- CVE-2024-26777: Error out if pixclock equals zero in fbdev/sis (bsc#1222765)
- CVE-2024-26778: Error out if pixclock equals zero in fbdev/savage (bsc#1222770)
- CVE-2024-26791: Fixed properly validate device names in btrfs (bsc#1222793)
- CVE-2024-26822: Set correct id, uid and cruid for multiuser  automounts (bsc#1223011).
- CVE-2024-26828: Fixed underflow in parse_server_interfaces() (bsc#1223084).
- CVE-2024-26839: Fixed a memleak in init_credit_return() (bsc#1222975)
- CVE-2024-26876: Fixed crash on irq during probe (bsc#1223119).
- CVE-2024-26900: Fixed kmemleak of rdev->serial (bsc#1223046).
- CVE-2024-26907: Fixed a fortify source warning while accessing Eth segment in mlx5 (bsc#1223203).
- CVE-2024-26915: Reset IH OVERFLOW_CLEAR bit (bsc#1223207)
- CVE-2024-26919: Fixed debugfs directory leak (bsc#1223847).
- CVE-2024-26921: Preserve kabi for sk_buff (bsc#1223138).
- CVE-2024-26925: Release mutex after nft_gc_seq_end from abort path (bsc#1223390).
- CVE-2024-26928: Fixed potential UAF in cifs_debug_files_proc_show() (bsc#1223532).
- CVE-2024-26939: Fixed UAF on destroy against retire race (bsc#1223679).
- CVE-2024-26958: Fixed UAF in direct writes (bsc#1223653).
- CVE-2024-27042: Fixed potential out-of-bounds access in 'amdgpu_discovery_reg_base_init()' (bsc#1223823).
- CVE-2024-27395: Fixed Use-After-Free in ovs_ct_exit (bsc#1224098).
- CVE-2024-27396: Fixed Use-After-Free in gtp_dellink (bsc#1224096).
- CVE-2024-27398: Fixed use-after-free bugs caused by sco_sock_timeout (bsc#1224174).
- CVE-2024-27401: Fixed user_length taken into account when  fetching packet contents (bsc#1224181).
- CVE-2024-27413: Fixed incorrect allocation size (bsc#1224438).
- CVE-2024-27417: Fixed potential "struct net" leak in inet6_rtm_getaddr()  (bsc#1224721)
- CVE-2024-27419: Fixed data-races around sysctl_net_busy_read  (bsc#1224759)
- CVE-2024-27431: Zero-initialise xdp_rxq_info struct before running  XDP program (bsc#1224718).
- CVE-2024-35791: Flush pages under kvm->lock to fix UAF in  svm_register_enc_region() (bsc#1224725).
- CVE-2024-35799: Prevent crash when disable stream (bsc#1224740).
- CVE-2024-35804: Mark target gfn of emulated atomic instruction as  dirty (bsc#1224638).
- CVE-2024-35817: Set gtt bound flag in amdgpu_ttm_gart_bind (bsc#1224736).
- CVE-2024-35852: Fixed memory leak when canceling rehash  work (bsc#1224502).
- CVE-2024-35854: Fixed possible use-after-free during  rehash (bsc#1224636).
- CVE-2024-35860: Struct bpf_link and bpf_link_ops kABI workaround  (bsc#1224531).
- CVE-2024-35861: Fixed potential UAF in  cifs_signal_cifsd_for_reconnect() (bsc#1224766).
- CVE-2024-35862: Fixed potential UAF in smb2_is_network_name_deleted()  (bsc#1224764).
- CVE-2024-35863: Fixed potential UAF in is_valid_oplock_break() (bsc#1224763).
- CVE-2024-35864: Fixed potential UAF in smb2_is_valid_lease_break()  (bsc#1224765,).
- CVE-2024-35865: Fixed potential UAF in smb2_is_valid_oplock_break()  (bsc#1224668).
- CVE-2024-35866: Fixed potential UAF in cifs_dump_full_key()  (bsc#1224667).
- CVE-2024-35867: Fixed potential UAF in cifs_stats_proc_show() (bsc#1224664).
- CVE-2024-35868: Fixed potential UAF in cifs_stats_proc_write() (bsc#1224678).
- CVE-2024-35869: Guarantee refcounted children from parent session  (bsc#1224679).
- CVE-2024-35870: Fixed UAF in smb2_reconnect_server() (bsc#1224020,  bsc#1224672).
- CVE-2024-35872: Fixed GUP-fast succeeding on secretmem folios  (bsc#1224530).
- CVE-2024-35875: Require seeding RNG with RDRAND on CoCo systems (bsc#1224665).
- CVE-2024-35877: Fixed VM_PAT handling in COW mappings (bsc#1224525).
- CVE-2024-35878: Prevent NULL pointer dereference in vsnprintf()  (bsc#1224671).
- CVE-2024-35879: kABI workaround for drivers/of/dynamic.c (bsc#1224524).
- CVE-2024-35885: Stop interface during shutdown (bsc#1224519).
- CVE-2024-35904: Fixed dereference of garbage after mount failure (bsc#1224494).
- CVE-2024-35905: Fixed int overflow for stack access size  (bsc#1224488).
- CVE-2024-35907: Call request_irq() after NAPI initialized  (bsc#1224492).
- CVE-2024-35924: Limit read size on v1.2 (bsc#1224657).
- CVE-2024-35939: Fixed leak pages on dma_set_decrypted() failure (bsc#1224535).
- CVE-2024-35943: Fixed a null pointer dereference in omap_prm_domain_init (bsc#1224649).
- CVE-2024-35944: Fixed memcpy() run-time warning in dg_dispatch_as_host()  (bsc#1224648).
- CVE-2024-35951: Fixed the error path in panfrost_mmu_map_fault_addr() (bsc#1224701).
- CVE-2024-35959: Fixed mlx5e_priv_init() cleanup flow (bsc#1224666).
- CVE-2024-35964: Fixed not validating setsockopt user input  (bsc#1224581).
- CVE-2024-35969: Fixed race condition between ipv6_get_ifaddr and ipv6_del_addr  (bsc#1224580).
- CVE-2024-35973: Fixed header validation in geneve[6]_xmit_skb  (bsc#1224586).
- CVE-2024-35976: Validate user input for XDP_{UMEM|COMPLETION}_FILL_RING  (bsc#1224575).
- CVE-2024-35998: Fixed lock ordering potential deadlock in  cifs_sync_mid_result (bsc#1224549).
- CVE-2024-35999: Fixed missing lock when picking channel (bsc#1224550).
- CVE-2024-36006: Fixed incorrect list API usage  (bsc#1224541).
- CVE-2024-36007: Fixed warning during rehash  (bsc#1224543).
- CVE-2024-36938: Fixed NULL pointer dereference in  sk_psock_skb_ingress_enqueue (bsc#1225761).

The following non-security bugs were fixed:

- 9p: explicitly deny setlease attempts (git-fixes).
- ACPI: bus: Indicate support for _TFP thru _OSC (git-fixes).
- ACPI: disable -Wstringop-truncation (git-fixes).
- ACPI: Fix Generic Initiator Affinity _OSC bit (git-fixes).
- ACPI: LPSS: Advertise number of chip selects via property (git-fixes).
- admin-guide/hw-vuln/core-scheduling: fix return type of PR_SCHED_CORE_GET (git-fixes).
- af_unix: annote lockless accesses to unix_tot_inflight &amp; gc_in_progress (bsc#1223384).
- af_unix: Do not use atomic ops for unix_sk(sk)->inflight (bsc#1223384).
- af_unix: Replace BUG_ON() with WARN_ON_ONCE() (bsc#1223384).
- ALSA: core: Fix NULL module pointer assignment at card init (git-fixes).
- ALSA: hda/cs_dsp_ctl: Use private_free for control cleanup (git-fixes).
- ALSA: line6: Zero-initialize message buffers (stable-fixes).
- ARM: 9381/1: kasan: clear stale stack poison (git-fixes).
- ASoC: Intel: avs: Fix ASRC module initialization (git-fixes).
- ASoC: Intel: avs: Fix potential integer overflow (git-fixes).
- ASoC: Intel: avs: ssm4567: Do not ignore route checks (git-fixes).
- ASoC: Intel: Disable route checks for Skylake boards (git-fixes).
- ASoC: kirkwood: Fix potential NULL dereference (git-fixes).
- ASoC: mediatek: mt8192: fix register configuration for tdm (git-fixes).
- ASoC: meson: axg-fifo: use FIELD helpers (stable-fixes).
- ASoC: meson: axg-fifo: use threaded irq to check periods (git-fixes).
- ASoC: tas2552: Add TX path for capturing AUDIO-OUT data (git-fixes).
- ASoC: tracing: Export SND_SOC_DAPM_DIR_OUT to its value (git-fixes).
- ata: pata_legacy: make legacy_exit() work again (git-fixes).
- ata: sata_gemini: Check clk_enable() result (stable-fixes).
- autofs: use wake_up() instead of wake_up_interruptible(() (bsc#1224166).
- Bluetooth: Fix use-after-free bugs caused by sco_sock_timeout (git-fixes).
- Bluetooth: hci_sync: Avoid use-after-free in dbg for hci_add_adv_monitor() (git-fixes).
- Bluetooth: hci_sync: Do not double print name in add/remove adv_monitor (bsc#1216358).
- Bluetooth: l2cap: fix null-ptr-deref in l2cap_chan_timeout (git-fixes).
- Bluetooth: msft: fix slab-use-after-free in msft_do_close() (git-fixes).
- Bluetooth: qca: add missing firmware sanity checks (git-fixes).
- Bluetooth: qca: Fix error code in qca_read_fw_build_info() (git-fixes).
- Bluetooth: qca: fix firmware check error path (git-fixes).
- Bluetooth: qca: fix info leak when fetching fw build id (git-fixes).
- Bluetooth: qca: fix NVM configuration parsing (git-fixes).
- bnxt_re: avoid shift undefined behavior in bnxt_qplib_alloc_init_hwq (git-fixes)
- bpf: decouple prune and jump points (bsc#1225756).
- bpf: fix precision backtracking instruction iteration (bsc#1225756).
- bpf: Fix precision tracking for BPF_ALU | BPF_TO_BE | BPF_END (git-fixes).
- bpf: handle ldimm64 properly in check_cfg() (bsc#1225756).
- bpf: mostly decouple jump history management from is_state_visited() (bsc#1225756).
- bpf: remove unnecessary prune and jump points (bsc#1225756).
- btrfs: add error messages to all unrecognized mount options (git-fixes)
- btrfs: add missing mutex_unlock in btrfs_relocate_sys_chunks() (git-fixes)
- btrfs: export: handle invalid inode or root reference in btrfs_get_parent() (git-fixes)
- btrfs: extend locking to all space_info members accesses (git-fixes)
- btrfs: fix btrfs_submit_compressed_write cgroup attribution (git-fixes)
- btrfs: fix information leak in btrfs_ioctl_logical_to_ino() (git-fixes)
- btrfs: fix missing blkdev_put() call in btrfs_scan_one_device() (git-fixes)
- btrfs: fix off-by-one chunk length calculation at contains_pending_extent() (git-fixes)
- btrfs: fix qgroup reserve overflow the qgroup limit (git-fixes)
- btrfs: fix silent failure when deleting root reference (git-fixes)
- btrfs: fix use-after-free after failure to create a snapshot (git-fixes)
- btrfs: free exchange changeset on failures (git-fixes)
- btrfs: handle chunk tree lookup error in btrfs_relocate_sys_chunks() (git-fixes)
- btrfs: make search_csum_tree return 0 if we get -EFBIG (git-fixes)
- btrfs: prevent copying too big compressed lzo segment (git-fixes)
- btrfs: remove BUG_ON(!eie) in find_parent_nodes (git-fixes)
- btrfs: remove BUG_ON() in find_parent_nodes() (git-fixes)
- btrfs: repair super block num_devices automatically (git-fixes)
- btrfs: replace the BUG_ON in btrfs_del_root_ref with proper error handling (git-fixes)
- btrfs: send: ensure send_fd is writable (git-fixes)
- btrfs: send: handle path ref underflow in header iterate_inode_ref() (git-fixes)
- btrfs: send: in case of IO error log it (git-fixes)
- btrfs: send: return EOPNOTSUPP on unknown flags (git-fixes)
- btrfs: tree-checker: check item_size for dev_item (git-fixes)
- btrfs: tree-checker: check item_size for inode_item (git-fixes)
- cifs: account for primary channel in the interface list (bsc#1224020).
- cifs: cifs_chan_is_iface_active should be called with chan_lock held (bsc#1224020).
- cifs: distribute channels across interfaces based on speed (bsc#1224020).
- cifs: do not pass cifs_sb when trying to add channels (bsc#1224020).
- cifs: failure to add channel on iface should bump up weight (git-fixes, bsc#1224020).
- cifs: fix charset issue in reconnection (bsc#1224020).
- cifs: fix leak of iface for primary channel (git-fixes, bsc#1224020).
- cifs: handle cases where a channel is closed (bsc#1224020).
- cifs: handle cases where multiple sessions share connection (bsc#1224020).
- cifs: reconnect work should have reference on server struct (bsc#1224020).
- clk: Do not hold prepare_lock when calling kref_put() (stable-fixes).
- clk: qcom: mmcc-msm8998: fix venus clock issue (git-fixes).
- counter: stm32-lptimer-cnt: Provide defines for clock polarities (git-fixes).
- counter: stm32-timer-cnt: Provide defines for slave mode selection (git-fixes).
- cppc_cpufreq: Fix possible null pointer dereference (git-fixes).
- cpu/hotplug: Remove the 'cpu' member of cpuhp_cpu_state (git-fixes).
- cpumask: Add for_each_cpu_from() (bsc#1225053).
- crypto: bcm - Fix pointer arithmetic (git-fixes).
- crypto: ccp - drop platform ifdef checks (git-fixes).
- crypto: ecdsa - Fix module auto-load on add-key (git-fixes).
- crypto: x86/nh-avx2 - add missing vzeroupper (git-fixes).
- crypto: x86/sha256-avx2 - add missing vzeroupper (git-fixes).
- crypto: x86/sha512-avx2 - add missing vzeroupper (git-fixes).
- dmaengine: axi-dmac: fix possible race in remove() (git-fixes).
- dmaengine: idma64: Add check for dma_set_max_seg_size (git-fixes).
- dm/amd/pm: Fix problems with reboot/shutdown for some SMU 13.0.4/13.0.11 users (git-fixes).
- dm-multipath: dont't attempt SG_IO on non-SCSI-disks (bsc#1223575).
- docs: kernel_include.py: Cope with docutils 0.21 (stable-fixes).
- drivers/nvme: Add quirks for device 126f:2262 (git-fixes).
- drm/amd/display: Atom Integrated System Info v2_2 for DCN35 (stable-fixes).
- drm/amd/display: Fix division by zero in setup_dsc_config (stable-fixes).
- drm/amd/display: Fix potential index out of bounds in color transformation function (git-fixes).
- drm/amd/display: Handle Y carry-over in VCP X.Y calculation (stable-fixes).
- drm/amd: Flush GFXOFF requests in prepare stage (git-fixes).
- drm/amdgpu: Refine IB schedule error logging (stable-fixes).
- drm/amdkfd: do not allow mapping the MMIO HDP page with large pages (git-fixes).
- drm/arm/malidp: fix a possible null pointer dereference (git-fixes).
- drm/bridge: anx7625: Do not log an error when DSI host can't be found (git-fixes).
- drm: bridge: cdns-mhdp8546: Fix possible null pointer dereference (git-fixes).
- drm/bridge: dpc3433: Do not log an error when DSI host can't be found (git-fixes).
- drm/bridge: icn6211: Do not log an error when DSI host can't be found (git-fixes).
- drm/bridge: lt8912b: Do not log an error when DSI host can't be found (git-fixes).
- drm/bridge: lt9611: Do not log an error when DSI host can't be found (git-fixes).
- drm/bridge: tc358775: Do not log an error when DSI host can't be found (git-fixes).
- drm/bridge: tc358775: fix support for jeida-18 and jeida-24 (git-fixes).
- drm/connector: Add \n to message about demoting connector force-probes (git-fixes).
- drm/i915/bios: Fix parsing backlight BDB data (git-fixes).
- drm/lcdif: Do not disable clocks on already suspended hardware (git-fixes).
- drm/mediatek: Add 0 size check to mtk_drm_gem_obj (git-fixes).
- drm/meson: dw-hdmi: add bandgap setting for g12 (git-fixes).
- drm/meson: dw-hdmi: power up phy on device init (git-fixes).
- drm/meson: vclk: fix calculation of 59.94 fractional rates (git-fixes).
- drm/msm/dp: allow voltage swing / pre emphasis of 3 (git-fixes).
- drm/msm/dpu: Always flush the slave INTF on the CTL (git-fixes).
- drm/msm/dsi: Print dual-DSI-adjusted pclk instead of original mode pclk (git-fixes).
- drm/nouveau/dp: Do not probe eDP ports twice harder (stable-fixes).
- drm/panel: atna33xc20: Fix unbalanced regulator in the case HPD does not assert (git-fixes).
- drm/panel: novatek-nt35950: Do not log an error when DSI host can't be found (git-fixes).
- drm/panel: simple: Add missing Innolux G121X1-L03 format, flags, connector (git-fixes).
- drm: vc4: Fix possible null pointer dereference (git-fixes).
- dt-bindings: clock: qcom: Add missing UFS QREF clocks (git-fixes)
- dyndbg: fix old BUG_ON in >control parser (stable-fixes).
- efi: libstub: only free priv.runtime_map when allocated (git-fixes).
- extcon: max8997: select IRQ_DOMAIN instead of depending on it (git-fixes).
- fail_function: fix wrong use of fei_attr_remove().
- fbdev: savage: Handle err return when savagefb_check_var failed (git-fixes).
- fbdev: shmobile: fix snprintf truncation (git-fixes).
- fbdev: sisfb: hide unused variables (git-fixes).
- firewire: ohci: mask bus reset interrupts between ISR and bottom half (stable-fixes).
- firmware: dmi-id: add a release callback function (git-fixes).
- firmware: raspberrypi: Use correct device for DMA mappings (git-fixes).
- fs/9p: drop inodes immediately on non-.L too (git-fixes).
- fs/9p: only translate RWX permissions for plain 9P2000 (git-fixes).
- fs/9p: translate O_TRUNC into OTRUNC (git-fixes).
- gpio: crystalcove: Use -ENOTSUPP consistently (stable-fixes).
- gpio: wcove: Use -ENOTSUPP consistently (stable-fixes).
- gpu: host1x: Do not setup DMA for virtual devices (stable-fixes).
- HID: intel-ish-hid: ipc: Add check for pci_alloc_irq_vectors (git-fixes).
- hwmon: (corsair-cpro) Protect ccp->wait_input_report with a spinlock (git-fixes).
- hwmon: (corsair-cpro) Use a separate buffer for sending commands (git-fixes).
- hwmon: (corsair-cpro) Use complete_all() instead of complete() in ccp_raw_event() (git-fixes).
- hwmon: (lm70) fix links in doc and comments (git-fixes).
- hwmon: (pmbus/ucd9000) Increase delay from 250 to 500us (git-fixes).
- i3c: master: svc: change ENXIO to EAGAIN when IBI occurs during start frame (git-fixes).
- i3c: master: svc: fix invalidate IBI type and miss call client IBI handler (git-fixes).
- IB/mlx5: Use __iowrite64_copy() for write combining stores (git-fixes)
- idpf: extend tx watchdog timeout (bsc#1224137).
- iio: core: Leave private pointer NULL when no private data supplied (git-fixes).
- iio: pressure: dps310: support negative temperature values (git-fixes).
- Input: cyapa - add missing input core locking to suspend/resume functions (git-fixes).
- Input: ims-pcu - fix printf string overflow (git-fixes).
- Input: pm8xxx-vibrator - correct VIB_MAX_LEVELS calculation (git-fixes).
- iomap: Fix inline extent handling in iomap_readpage (git-fixes)
- iomap: iomap: fix memory corruption when recording errors during writeback (git-fixes)
- iomap: Support partial direct I/O on user copy failures (git-fixes)
- iommu/dma: Force swiotlb_max_mapping_size on an untrusted device (bsc#1224331)
- io_uring/unix: drop usage of io_uring socket (git-fixes).
- irqchip/gic-v3-its: Prevent double free on error (git-fixes).
- jffs2: prevent xattr node from overflowing the eraseblock (git-fixes).
- kABI: bpf: struct bpf_insn_aux_data kABI workaround (bsc#1225756).
- kcm: do not sense pfmemalloc status in kcm_sendpage() (git-fixes bsc#1223959)
- KEYS: trusted: Do not use WARN when encode fails (git-fixes).
- KEYS: trusted: Fix memory leak in tpm2_key_encode() (git-fixes).
- KVM: s390: Check kvm pointer when testing KVM_CAP_S390_HPAGE_1M (git-fixes bsc#1224794).
- leds: pwm: Disable PWM when going to suspend (git-fixes).
- libsubcmd: Fix parse-options memory leak (git-fixes).
- locking/atomic: Make test_and_*_bit() ordered on failure (git-fixes).
- media: atomisp: ssh_css: Fix a null-pointer dereference in load_video_binaries (git-fixes).
- media: dt-bindings: ovti,ov2680: Fix the power supply names (git-fixes).
- media: mc: mark the media devnode as registered from the, start (git-fixes).
- media: ngene: Add dvb_ca_en50221_init return value check (git-fixes).
- media: stk1160: fix bounds checking in stk1160_copy_video() (git-fixes).
- mei: me: add lunar lake point M DID (stable-fixes).
- mfd: intel-lpss: Revert "Add missing check for platform_get_resource" (git-fixes).
- mfd: ti_am335x_tscadc: Support the correctly spelled DT property (git-fixes).
- mfd: tqmx86: Specify IO port register range more precisely (git-fixes).
- mlxbf_gige: Enable the GigE port in mlxbf_gige_open (git-fixes).
- mlxbf_gige: Fix intermittent no ip issue (git-fixes).
- mlxbf_gige: stop PHY during open() error paths (git-fixes).
- mmc: sdhci_am654: Add tuning algorithm for delay chain (git-fixes).
- mmc: sdhci_am654: Write ITAPDLY for DDR52 timing (git-fixes).
- Move upstreamed patches into sorted section
- mtd: core: Report error if first mtd_otp_size() call fails in mtd_otp_nvmem_add() (git-fixes).
- mtd: rawnand: hynix: fixed typo (git-fixes).
- net: do not sense pfmemalloc status in skb_append_pagefrags() (git-fixes bsc#1223959)
- netfilter: nf_tables: bail out early if hardware offload is not supported (git-fixes bsc#1223961)
- net: introduce __skb_fill_page_desc_noacc (git-fixes bsc#1223959)
- net: nfc: remove inappropriate attrs check (stable-fixes).
- net: qualcomm: rmnet: fix global oob in rmnet_policy (git-fixes).
- net: usb: ax88179_178a: fix link status when link is set to down/up (git-fixes).
- net:usb:qmi_wwan: support Rolling modules (stable-fixes).
- net: usb: smsc95xx: stop lying about skb->truesize (git-fixes).
- net: usb: sr9700: stop lying about skb->truesize (git-fixes).
- net: vmxnet3: Fix NULL pointer dereference in vmxnet3_rq_rx_complete() (bsc#1223360).
- nfc: nci: Fix handling of zero-length payload packets in nci_rx_work() (git-fixes).
- nfc: nci: Fix uninit-value in nci_rx_work (git-fixes).
- nilfs2: fix out-of-range warning (git-fixes).
- nilfs2: fix unexpected freezing of nilfs_segctor_sync() (git-fixes).
- nilfs2: fix use-after-free of timer for log writer thread (git-fixes).
- nilfs2: make superblock data array index computation sparse friendly (git-fixes).
- nvme: ensure disabling pairs with unquiesce (bsc#1224534).
- nvme: fix miss command type check (git-fixes).
- nvme: fix multipath batched completion accounting (git-fixes).
- nvme-multipath: fix io accounting on failover (git-fixes).
- nvmet: fix ns enable/disable possible hang (git-fixes).
- PCI: dwc: Detect iATU settings after getting "addr_space" resource (git-fixes).
- PCI: dwc: ep: Fix DBI access failure for drivers requiring refclk from host (git-fixes).
- PCI: dwc: Use the bitmap API to allocate bitmaps (git-fixes).
- PCI/EDR: Align EDR_PORT_DPC_ENABLE_DSM with PCI Firmware r3.3 (git-fixes).
- PCI/EDR: Align EDR_PORT_LOCATE_DSM with PCI Firmware r3.3 (git-fixes).
- PCI: rockchip-ep: Remove wrong mask on subsys_vendor_id (git-fixes).
- PCI: tegra194: Fix probe path for Endpoint mode (git-fixes).
- pinctrl: armada-37xx: remove an unused variable (git-fixes).
- pinctrl: core: delete incorrect free in pinctrl_enable() (git-fixes).
- pinctrl: core: handle radix_tree_insert() errors in pinctrl_register_one_pin() (stable-fixes).
- pinctrl: devicetree: fix refcount leak in pinctrl_dt_to_map() (git-fixes).
- pinctrl/meson: fix typo in PDM's pin name (git-fixes).
- pinctrl: pinctrl-aspeed-g6: Fix register offset for pinconf of GPIOR-T (git-fixes).
- platform/x86/intel-uncore-freq: Do not present root domain on error (git-fixes).
- platform/x86: xiaomi-wmi: Fix race condition when reporting key events (git-fixes).
- powerpc/eeh: Permanently disable the removed device (bsc#1223991 ltc#205740).
- powerpc/eeh: Small refactor of eeh_handle_normal_event() (bsc#1223991 ltc#205740).
- powerpc/eeh: Use a goto for recovery failures (bsc#1223991 ltc#205740).
- powerpc/powernv: Add a null pointer check in opal_event_init() (bsc#1065729).
- powerpc/pseries/lparcfg: drop error message from guest name lookup (bsc#1187716 ltc#193451 git-fixes).
- powerpc/pseries/vio: Do not return ENODEV if node or compatible missing (bsc#1220783).
- powerpc/uaccess: Fix build errors seen with GCC 13/14 (bsc#1194869).
- powerpc/uaccess: Use YZ asm constraint for ld (bsc#1194869).
- power: rt9455: hide unused rt9455_boost_voltage_values (git-fixes).
- ppdev: Add an error check in register_device (git-fixes).
- printk: Update @console_may_schedule in console_trylock_spinning() (bsc#1225616).
- qibfs: fix dentry leak (git-fixes)
- RDMA/hns: Add max_ah and cq moderation capacities in query_device() (git-fixes)
- RDMA/hns: Fix deadlock on SRQ async events. (git-fixes)
- RDMA/hns: Fix GMV table pagesize (git-fixes)
- RDMA/hns: Fix return value in hns_roce_map_mr_sg (git-fixes)
- RDMA/hns: Fix UAF for cq async event (git-fixes)
- RDMA/hns: Modify the print level of CQE error (git-fixes)
- RDMA/hns: Use complete parentheses in macros (git-fixes)
- RDMA/IPoIB: Fix format truncation compilation errors (git-fixes)
- RDMA/mlx5: Adding remote atomic access flag to updatable flags (git-fixes)
- RDMA/mlx5: Fix port number for counter query in multi-port configuration (git-fixes)
- RDMA/rxe: Add ibdev_dbg macros for rxe (git-fixes)
- RDMA/rxe: Fix incorrect rxe_put in error path (git-fixes)
- RDMA/rxe: Fix seg fault in rxe_comp_queue_pkt (git-fixes)
- RDMA/rxe: Fix the problem "mutex_destroy missing" (git-fixes)
- RDMA/rxe: Replace pr_xxx by rxe_dbg_xxx in rxe_net.c (git-fixes)
- RDMA/rxe: Split rxe_run_task() into two subroutines (git-fixes)
- regulator: bd71828: Do not overwrite runtime voltages (git-fixes).
- regulator: core: fix debugfs creation regression (git-fixes).
- regulator: mt6360: De-capitalize devicetree regulator subnodes (git-fixes).
- remoteproc: mediatek: Make sure IPI buffer fits in L2TCM (git-fixes).
- Revert "cifs: reconnect work should have reference on server struct" (git-fixes, bsc#1224020).
- Revert "drm/bridge: ti-sn65dsi83: Fix enable error path" (git-fixes).
- ring-buffer: Fix a race between readers and resize checks (git-fixes).
- s390/bpf: Emit a barrier for BPF_FETCH instructions (git-fixes bsc#1224795).
- s390/cio: fix tracepoint subchannel type field (git-fixes bsc#1224796).
- s390/cpum_cf: make crypto counters upward compatible across machine types (bsc#1224346).
- s390/ipl: Fix incorrect initialization of len fields in nvme reipl block (git-fixes bsc#1225139).
- s390/ipl: Fix incorrect initialization of nvme dump block (git-fixes bsc#1225138).
- sched/topology: Optimize topology_span_sane() (bsc#1225053).
- scsi: arcmsr: Support new PCI device IDs 1883 and 1886 (git-fixes).
- scsi: bfa: Fix function pointer type mismatch for hcb_qe->cbfn (git-fixes).
- scsi: core: Consult supported VPD page list prior to fetching page (git-fixes).
- scsi: core: Fix unremoved procfs host directory regression (git-fixes).
- scsi: csiostor: Avoid function pointer casts (git-fixes).
- scsi: libfc: Do not schedule abort twice (git-fixes).
- scsi: libfc: Fix up timeout error in fc_fcp_rec_error() (git-fixes).
- scsi: lpfc: Add support for 32 byte CDBs (bsc#1225842).
- scsi: lpfc: Change default logging level for unsolicited CT MIB commands (bsc#1225842).
- scsi: lpfc: Change lpfc_hba hba_flag member into a bitmask (bsc#1225842).
- scsi: lpfc: Clear deferred RSCN processing flag when driver is unloading (bsc#1225842).
- scsi: lpfc: Copyright updates for 14.4.0.2 patches (bsc#1225842).
- scsi: lpfc: Introduce rrq_list_lock to protect active_rrq_list (bsc#1225842).
- scsi: lpfc: Update logging of protection type for T10 DIF I/O (bsc#1225842).
- scsi: lpfc: Update lpfc version to 14.4.0.2 (bsc#1225842).
- scsi: mpt3sas: Prevent sending diag_reset when the controller is ready (git-fixes).
- scsi: mylex: Fix sysfs buffer lengths (git-fixes).
- scsi: qla2xxx: Fix off by one in qla_edif_app_getstats() (git-fixes).
- scsi: sd: Unregister device if device_add_disk() failed in sd_probe() (git-fixes).
- selftests/pidfd: Fix config for pidfd_setns_test (git-fixes).
- serial: 8250_bcm7271: use default_mux_rate if possible (git-fixes).
- serial: kgdboc: Fix NMI-safety problems from keyboard reset code (stable-fixes).
- serial: max3100: Fix bitwise types (git-fixes).
- serial: max3100: Lock port->lock when calling uart_handle_cts_change() (git-fixes).
- serial: sc16is7xx: add proper sched.h include for sched_set_fifo() (git-fixes).
- serial: sc16is7xx: fix bug in sc16is7xx_set_baud() when using prescaler (git-fixes).
- serial: sh-sci: protect invalidating RXDMA on shutdown (git-fixes).
- smb3: show beginning time for per share stats (bsc#1224020).
- smb: client: ensure to try all targets when finding nested links (bsc#1224020).
- smb: client: fix mount when dns_resolver key is not available (git-fixes, bsc#1224020).
- smb: client: get rid of dfs code dep in namespace.c (bsc#1224020).
- smb: client: get rid of dfs naming in automount code (bsc#1224020).
- smb: client: introduce DFS_CACHE_TGT_LIST() (bsc#1224020).
- smb: client: reduce stack usage in cifs_try_adding_channels() (bsc#1224020).
- smb: client: remove extra @chan_count check in __cifs_put_smb_ses() (bsc#1224020).
- smb: client: rename cifs_dfs_ref.c to namespace.c (bsc#1224020).
- soc: mediatek: cmdq: Fix typo of CMDQ_JUMP_RELATIVE (git-fixes).
- soc: qcom: rpmh-rsc: Enhance check for VRM in-flight request (git-fixes).
- Sort recent BHI patches
- speakup: Fix sizeof() vs ARRAY_SIZE() bug (git-fixes).
- spmi: Add a check for remove callback when removing a SPMI driver (git-fixes).
- spmi: hisi-spmi-controller: Do not override device identifier (git-fixes).
- swiotlb: extend buffer pre-padding to alloc_align_mask if necessary (bsc#1224331). 
- swiotlb: Fix alignment checks when both allocation and DMA masks are (bsc#1224331)
- swiotlb: Fix double-allocation of slots due to broken alignment (bsc#1224331)
- swiotlb: Honour dma_alloc_coherent() alignment in swiotlb_alloc() (bsc#1224331)
- sysv: do not call sb_bread() with pointers_lock held (git-fixes).
- thermal/drivers/tsens: Fix null pointer dereference (git-fixes).
- tools/latency-collector: Fix -Wformat-security compile warns (git-fixes).
- tpm_tis_spi: Account for SPI header when allocating TPM SPI xfer (bsc#1225535)
- tpm_tis_spi: Account for SPI header when allocating TPM SPI xfer buffer (git-fixes).
- tracing: Add MODULE_DESCRIPTION() to preemptirq_delay_test (git-fixes).
- tracing: hide unused ftrace_event_id_fops (git-fixes).
- tty: n_gsm: fix missing receive state reset after mode switch (git-fixes).
- tty: n_gsm: fix possible out-of-bounds in gsm0_receive() (git-fixes).
- usb: aqc111: stop lying about skb->truesize (git-fixes).
- USB: core: Add hub_get() and hub_put() routines (git-fixes).
- USB: core: Fix access violation during port device removal (git-fixes).
- USB: core: Fix deadlock in port "disable" sysfs attribute (git-fixes).
- usb: dwc3: core: Prevent phy suspend during init (Git-fixes).
- usb: gadget: u_audio: Clear uac pointer when freed (git-fixes).
- usb: typec: tipd: fix event checking for tps6598x (git-fixes).
- usb: typec: ucsi: displayport: Fix potential deadlock (git-fixes).
- VMCI: Fix an error handling path in vmci_guest_probe_device() (git-fixes).
- VMCI: Fix possible memcpy() run-time warning in vmci_datagram_invoke_guest_handler() (stable-fixes).
- vmci: prevent speculation leaks by sanitizing event in event_deliver() (git-fixes).
- watchdog: cpu5wdt.c: Fix use-after-free bug caused by cpu5wdt_trigger (git-fixes).
- watchdog: ixp4xx: Make sure restart always works (git-fixes).
- watchdog: rti_wdt: Set min_hw_heartbeat_ms to accommodate a safety margin (git-fixes).
- wifi: ar5523: enable proper endpoint verification (git-fixes).
- wifi: ath10k: Fix an error code problem in ath10k_dbg_sta_write_peer_debug_trigger() (git-fixes).
- wifi: ath10k: poll service ready message before failing (git-fixes).
- wifi: ath10k: populate board data for WCN3990 (git-fixes).
- wifi: ath11k: do not force enable power save on non-running vdevs (git-fixes).
- wifi: carl9170: add a proper sanity check for endpoints (git-fixes).
- wifi: carl9170: re-fix fortified-memset warning (git-fixes).
- wifi: cfg80211: fix rdev_dump_mpp() arguments order (stable-fixes).
- wifi: mac80211: fix ieee80211_bss_*_flags kernel-doc (stable-fixes).
- wifi: mwl8k: initialize cmd->addr[] properly (git-fixes).
- x86/boot: Ignore NMIs during very early boot (git-fixes).
- x86/bugs: Cache the value of MSR_IA32_ARCH_CAPABILITIES (git-fixes).
- x86/bugs: Change commas to semicolons in 'spectre_v2' sysfs file (git-fixes).
- x86/bugs: Fix BHI documentation (git-fixes).
- x86/bugs: Fix BHI handling of RRSBA (git-fixes).
- x86/bugs: Fix BHI retpoline check (git-fixes).
- x86/bugs: Fix return type of spectre_bhi_state() (git-fixes).
- x86/bugs: Remove CONFIG_BHI_MITIGATION_AUTO and spectre_bhi=auto (git-fixes).
- x86/bugs: Rename various 'ia32_cap' variables to 'x86_arch_cap_msr' (git-fixes).
- x86/bugs: Replace CONFIG_SPECTRE_BHI_{ON,OFF} with CONFIG_MITIGATION_SPECTRE_BHI (git-fixes).
- x86: Fix CPUIDLE_FLAG_IRQ_ENABLE leaking timer reprogram (git-fixes).
- x86/kvm: Do not try to disable kvmclock if it was not enabled (git-fixes).
- x86/lib: Fix overflow when counting digits (git-fixes).
- x86/mce: Make sure to grab mce_sysfs_mutex in set_bank() (git-fixes).
- x86/nmi: Drop unused declaration of proc_nmi_enabled() (git-fixes).
- x86/retpoline: Do the necessary fixup to the Zen3/4 srso return thunk for !SRSO (git-fixes).
- x86/sev: Check for MWAITX and MONITORX opcodes in the #VC handler (git-fixes).
- x86/sme: Fix memory encryption setting if enabled by default and not overridden (git-fixes).
- x86/tdx: Preserve shared bit on mprotect() (git-fixes).
- xfs: fix exception caused by unexpected illegal bestcount in leaf dir (git-fixes).
- xfs: Fix false ENOSPC when performing direct write on a delalloc extent in cow fork (git-fixes).
- xfs: fix imprecise logic in xchk_btree_check_block_owner (git-fixes).
- xfs: fix inode reservation space for removing transaction (git-fixes).
- xfs: shrink failure needs to hold AGI buffer (git-fixes).
</description>
<summary>Security update for the Linux Kernel</summary>
</patchinfo>
openSUSE Build Service is sponsored by