File _patchinfo of Package patchinfo.37973
<patchinfo incident="37973">
<issue id="1065729" tracker="bnc">[trackerbug] 4.12 powerpc base kernel fixes</issue>
<issue id="1180814" tracker="bnc">[15sp3 FEAT] PowerVM: Multiqueue support for ibmvfc scsi driver (NPIV)</issue>
<issue id="1183682" tracker="bnc">CVM image patch list</issue>
<issue id="1190336" tracker="bnc">[Huawei][aarch64] Update hns3 and infiniband/hns drivers</issue>
<issue id="1190768" tracker="bnc">PipeWire broken dependency for plasma5-pa</issue>
<issue id="1190786" tracker="bnc">[TRACKERBUG] Backported kernel graphics patches for SLE15-SP4</issue>
<issue id="1193629" tracker="bnc">[TRACKERBUG] SLE15-SP4 backports for cifs.ko</issue>
<issue id="1194869" tracker="bnc">[TRACKERBUG] 5.14 powerpc base kernel fixes</issue>
<issue id="1194904" tracker="bnc">Javier AGX: kernel panic on heavy network trafic</issue>
<issue id="1195823" tracker="bnc">Update qla2xxx driver to 10.02.07.300-k</issue>
<issue id="1196444" tracker="bnc">arm64: kexec uses only the built-in keys for kernel verification, not the secondary nor platform keyring</issue>
<issue id="1197158" tracker="bnc">resource RAID failed during cluster patch, Mdadm gets floating point error</issue>
<issue id="1197174" tracker="bnc">SLES 15 SP4 - ISST-LTE:LPM:Rainer/P9:HPT:SLES15SP4:After successful migration with hardlockups ,LPM failed with "partition restart error",but lpar didn't restart after Migration</issue>
<issue id="1197246" tracker="bnc">VUL-0: CVE-2022-0995: kernel: kernel bug in the watch_queue subsystem</issue>
<issue id="1197302" tracker="bnc">SLES15 SP4: Fix a race between ibmvnic_xmit() and do_reset/do_hard_reset()</issue>
<issue id="1197331" tracker="bnc">VUL-0: CVE-2022-1048: kernel-source: Race Condition in snd_pcm_hw_free leading to use-after-free</issue>
<issue id="1197472" tracker="bnc">VUL-1: CVE-2022-0168: kernel-source,kernel-source-rt,kernel-source-azure: smb2_ioctl_query_info NULL Pointer Dereference</issue>
<issue id="1197661" tracker="bnc">Update qla2xxx driver to 10.02.07.400-k</issue>
<issue id="1197926" tracker="bnc">L3-Question: RCA for fr21ldshswd11's crash - kdump analysis needed</issue>
<issue id="1198019" tracker="bnc">[PATCH] block: don't delete queue kobject before its children</issue>
<issue id="1198021" tracker="bnc">[PATCH] block: Fix the maximum minor value is blk_alloc_ext_minor()</issue>
<issue id="1198240" tracker="bnc">[Huawei][aarch64] kernel panic when booting on Kunpeng 920</issue>
<issue id="1198577" tracker="bnc">VUL-0: CVE-2022-1184: kernel: use-after-free and memory errors in ext4 when mounting and operating on a corrupted image</issue>
<issue id="1198660" tracker="bnc">Request SUSE to pick up this kernel upstream patch in SLES 15 3, SLES 15 SP 2 and SLES 12 SP 5 releases to fix a potential drmgr add/remove crash issue</issue>
<issue id="1199657" tracker="bnc">VUL-0: CVE-2022-29900 CVE-2022-29901: kernel: RETBLEED speculative issue</issue>
<issue id="1200045" tracker="bnc">Update Broadcom Emulex lpfc driver to 14.2.0.3</issue>
<issue id="1200571" tracker="bnc">execve() incorrectly handles empty argv array</issue>
<issue id="1200807" tracker="bnc">[PATCH] ext4: fix race condition between ext4_write and ext4_convert_inline_data</issue>
<issue id="1200809" tracker="bnc">[PATCH] ext4: fix bug_on in __es_tree_search</issue>
<issue id="1200810" tracker="bnc">[PATCH] ext4: fix bug_on ext4_mb_use_inode_pa</issue>
<issue id="1200824" tracker="bnc">[PATCH] blk-mq: don't touch ->tagset in blk_mq_get_sq_hctx</issue>
<issue id="1200825" tracker="bnc">[PATCH] blk-iolatency: Fix inflight count imbalances and IO hangs on offline</issue>
<issue id="1200871" tracker="bnc">[PATCH] ext4: fix use-after-free in ext4_rename_dir_prepare</issue>
<issue id="1200872" tracker="bnc">[PATCH] ext4: fix bug_on in ext4_writepages</issue>
<issue id="1201193" tracker="bnc">Update Broadcom Emulex lpfc driver to 14.2.0.4</issue>
<issue id="1201218" tracker="bnc">Drop a few exported symbols to fix new warnings</issue>
<issue id="1201323" tracker="bnc">SLES 15 SP4 (PowerLE) BUG: Kernel NULL pointer dereference on read at 0x00000054</issue>
<issue id="1201381" tracker="bnc">BUG: unable to handle kernel NULL pointer dereference at xenvif_rx_skb+0x23</issue>
<issue id="1201610" tracker="bnc">cgroup: Use separate src/dst nodes when preloading css_sets for migration</issue>
<issue id="1202672" tracker="bnc">VUL-0: CVE-2022-2977: kernel-source,kernel-source-rt,kernel-source-azure: use-after-free Read in put_device (/dev/vtpmx)</issue>
<issue id="1202711" tracker="bnc">[PATCH] ext4: fix warning in ext4_handle_inode_extension</issue>
<issue id="1202712" tracker="bnc">[PATCH] ext4: add reserved GDT blocks check</issue>
<issue id="1202771" tracker="bnc">[PATCH] ext4: filter out EXT4_FC_REPLAY from on-disk superblock field s_state</issue>
<issue id="1202774" tracker="bnc">[PATCH] filemap: Handle sibling entries in filemap_get_read_batch()</issue>
<issue id="1202778" tracker="bnc">[PATCH] ocfs2: dlmfs: fix error handling of user_dlm_destroy_lock</issue>
<issue id="1202781" tracker="bnc">[PATCH] block: fix rq-qos breakage from skipping rq_qos_done_bio()</issue>
<issue id="1203699" tracker="bnc">HP Inc.: Firefly 14 G9 - Speakers not working</issue>
<issue id="1203769" tracker="bnc">VUL-0: CVE-2022-3303: kernel: race condition in snd_pcm_oss_sync leads to NULL pointer dereference</issue>
<issue id="1204171" tracker="bnc">VUL-0: CVE-2022-3435: kernel: out-of-bounds read in fib_nh_match() of the file net/ipv4/fib_semantics.c</issue>
<issue id="1206048" tracker="bnc">ceph: fix inode reference leakage in ceph_get_snapdir()</issue>
<issue id="1206049" tracker="bnc">ceph: fix memory leak in ceph_readdir when note_last_dentry returns error</issue>
<issue id="1207593" tracker="bnc">[PATCH] ext4: fix ext4_mb_mark_bb() with flex_bg with fast_commit</issue>
<issue id="1207640" tracker="bnc">[PATCH] ocfs2: fix crash when mount with quota enabled</issue>
<issue id="1210050" tracker="bnc">Missing fixes / quirks for Thinkkpad</issue>
<issue id="1211263" tracker="bnc">VUL-0: CVE-2023-28410: kernel-source: A potential security vulnerability in some Intel i915 Graphics drivers for linux may allow escalation of privilege</issue>
<issue id="1217339" tracker="bnc">VUL-0: CVE-2024-2201: CPU: InSpectre Gadget: Inspecting the Residual Attack Surface of Cross-privilege Spectre v2</issue>
<issue id="1228483" tracker="bnc">VUL-0: CVE-2024-41092: kernel: drm/i915/gt: Fix potential UAF by revoke of fence registers</issue>
<issue id="1228708" tracker="bnc">VUL-0: CVE-2024-42229: kernel: crypto: aead,cipher - zeroize key buffer after use</issue>
<issue id="1228779" tracker="bnc">VUL-0: CVE-2024-42098: kernel: crypto: ecdh - explicitly zeroize private_key</issue>
<issue id="1228966" tracker="bnc">VUL-0: CVE-2024-42240: kernel: x86/bhi: avoid warning in #DB handler due to BHI mitigation</issue>
<issue id="1237521" tracker="bnc">[SLES16.0] lockdown not enabled along with Static Key Guest Secure Boot enablement</issue>
<issue id="1237718" tracker="bnc">VUL-0: CVE-2021-47631: kernel: ARM: davinci: da850-evm: Avoid NULL pointer dereference</issue>
<issue id="1237721" tracker="bnc">VUL-0: CVE-2021-47652: kernel: video: fbdev: smscufx: Fix null-ptr-deref in ufx_usb_probe()</issue>
<issue id="1237722" tracker="bnc">VUL-0: CVE-2022-49066: kernel: veth: Ensure eth header is in skb's linear part</issue>
<issue id="1237723" tracker="bnc">VUL-0: CVE-2022-49083: kernel: iommu/omap: Fix regression in probe for NULL pointer dereference</issue>
<issue id="1237724" tracker="bnc">VUL-0: CVE-2022-49088: kernel: dpaa2-ptp: Fix refcount leak in dpaa2_ptp_probe</issue>
<issue id="1237725" tracker="bnc">VUL-0: CVE-2021-47648: kernel: gpu: host1x: Fix a memory leak in 'host1x_remove()'</issue>
<issue id="1237726" tracker="bnc">VUL-0: CVE-2022-49091: kernel: drm/imx: Fix memory leak in imx_pd_connector_get_modes</issue>
<issue id="1237727" tracker="bnc">VUL-0: CVE-2022-49099: kernel: Drivers: hv: vmbus: Fix initialization of device object in vmbus_device_register()</issue>
<issue id="1237728" tracker="bnc">VUL-0: CVE-2022-49074: kernel: irqchip/gic-v3: Fix GICR_CTLR.RWP polling</issue>
<issue id="1237729" tracker="bnc">VUL-0: CVE-2022-49097: kernel: NFS: Avoid writeback threads getting stuck in mempool_alloc()</issue>
<issue id="1237734" tracker="bnc">VUL-0: CVE-2021-47641: kernel: video: fbdev: cirrusfb: check pixclock to avoid divide by zero</issue>
<issue id="1237735" tracker="bnc">VUL-0: CVE-2022-49100: kernel: virtio_console: eliminate anonymous module_init & module_exit</issue>
<issue id="1237736" tracker="bnc">VUL-0: CVE-2022-49078: kernel: lz4: fix LZ4_decompress_safe_partial read out of bound</issue>
<issue id="1237737" tracker="bnc">VUL-0: CVE-2022-49093: kernel: skbuff: fix coalescing for page_pool fragment recycling</issue>
<issue id="1237738" tracker="bnc">VUL-0: CVE-2022-49076: kernel: RDMA/hfi1: Fix use-after-free bug for mm struct</issue>
<issue id="1237739" tracker="bnc">VUL-0: CVE-2022-49065: kernel: SUNRPC: Fix the svc_deferred_event trace class</issue>
<issue id="1237740" tracker="bnc">VUL-0: CVE-2022-49082: kernel: scsi: mpt3sas: Fix use after free in _scsih_expander_node_remove()</issue>
<issue id="1237742" tracker="bnc">VUL-0: CVE-2021-47650: kernel: ASoC: soc-compress: prevent the potentially use of null pointer</issue>
<issue id="1237743" tracker="bnc">VUL-0: CVE-2021-47643: kernel: media: ir_toy: free before error exiting</issue>
<issue id="1237745" tracker="bnc">VUL-0: CVE-2021-47649: kernel: udmabuf: validate ubuf->pagecount</issue>
<issue id="1237746" tracker="bnc">VUL-0: CVE-2022-49073: kernel: ata: sata_dwc_460ex: Fix crash due to OOB write</issue>
<issue id="1237748" tracker="bnc">VUL-0: CVE-2021-47653: kernel: media: davinci: vpif: fix use-after-free on driver unbind</issue>
<issue id="1237751" tracker="bnc">VUL-0: CVE-2022-49084: kernel: qede: confirm skb is allocated before using</issue>
<issue id="1237752" tracker="bnc">VUL-0: CVE-2022-49095: kernel: scsi: zorro7xx: Fix a resource leak in zorro7xx_remove_one()</issue>
<issue id="1237753" tracker="bnc">VUL-0: CVE-2021-4453: kernel: drm/amd/pm: fix a potential gpu_metrics_table memory leak</issue>
<issue id="1237755" tracker="bnc">VUL-0: CVE-2021-47632: kernel: powerpc/set_memory: Avoid spinlock recursion in change_page_attr()</issue>
<issue id="1237759" tracker="bnc">VUL-0: CVE-2021-47635: kernel: ubifs: Fix to add refcount once page is set private</issue>
<issue id="1237761" tracker="bnc">VUL-0: CVE-2021-47637: kernel: ubifs: Fix deadlock in concurrent rename whiteout and inode writeback</issue>
<issue id="1237763" tracker="bnc">VUL-0: CVE-2021-47638: kernel: ubifs: rename_whiteout: Fix double free for whiteout_ui->data</issue>
<issue id="1237766" tracker="bnc">VUL-0: CVE-2021-47644: kernel: media: staging: media: zoran: move videodev alloc</issue>
<issue id="1237767" tracker="bnc">VUL-0: CVE-2021-47645: kernel: media: staging: media: zoran: calculate the right buffer number for zoran_reap_stat_com</issue>
<issue id="1237768" tracker="bnc">VUL-0: CVE-2021-47633: kernel: ath5k: fix OOB in ath5k_eeprom_read_pcal_info_5111</issue>
<issue id="1237774" tracker="bnc">VUL-0: CVE-2021-47646: kernel: Revert "Revert "block, bfq: honor already-setup queue merges""</issue>
<issue id="1237775" tracker="bnc">VUL-0: CVE-2021-47647: kernel: clk: qcom: ipq8074: fix PCI-E clock oops</issue>
<issue id="1237778" tracker="bnc">VUL-0: CVE-2022-49151: kernel: can: mcba_usb: properly check endpoint type</issue>
<issue id="1237779" tracker="bnc">VUL-0: CVE-2022-49092: kernel: net: ipv4: fix route with nexthop object delete warning</issue>
<issue id="1237780" tracker="bnc">VUL-0: CVE-2022-49704: kernel: 9p: fix fid refcount leak in v9fs_vfs_get_link</issue>
<issue id="1237782" tracker="bnc">VUL-0: CVE-2022-49640: kernel: sysctl: Fix data races in proc_douintvec_minmax().</issue>
<issue id="1237783" tracker="bnc">VUL-0: CVE-2022-49247: kernel: media: stk1160: If start stream fails, return buffers with VB2_BUF_STATE_QUEUED</issue>
<issue id="1237784" tracker="bnc">VUL-0: CVE-2022-49422: kernel: dmaengine: idxd: Fix the error handling path in idxd_cdev_register()</issue>
<issue id="1237785" tracker="bnc">VUL-0: CVE-2022-49218: kernel: drm/dp: Fix OOB read when handling Post Cursor2 register</issue>
<issue id="1237786" tracker="bnc">VUL-0: CVE-2022-49227: kernel: igc: avoid kernel warning when changing RX ring parameters</issue>
<issue id="1237787" tracker="bnc">VUL-0: CVE-2022-49252: kernel: ASoC: codecs: rx-macro: fix accessing array out of bounds for enum type</issue>
<issue id="1237788" tracker="bnc">VUL-0: CVE-2022-49661: kernel: can: gs_usb: gs_usb_open/close(): fix memory leak</issue>
<issue id="1237789" tracker="bnc">VUL-0: CVE-2022-49721: kernel: arm64: ftrace: consistently handle PLTs.</issue>
<issue id="1237795" tracker="bnc">VUL-0: CVE-2022-49551: kernel: usb: isp1760: Fix out-of-bounds array access</issue>
<issue id="1237797" tracker="bnc">VUL-0: CVE-2022-49148: kernel: watch_queue: Free the page array when watch_queue is dismantled</issue>
<issue id="1237798" tracker="bnc">VUL-0: CVE-2022-49627: kernel: ima: Fix potential memory leak in ima_init_crypto()</issue>
<issue id="1237807" tracker="bnc">VUL-0: CVE-2021-47654: kernel: samples/landlock: Fix path_list memory leak</issue>
<issue id="1237808" tracker="bnc">VUL-0: CVE-2022-49368: kernel: net: ethernet: mtk_eth_soc: out of bounds read in mtk_hwlro_get_fdir_entry()</issue>
<issue id="1237810" tracker="bnc">VUL-0: CVE-2022-49701: kernel: scsi: ibmvfc: Allocate/free queue resource only during probe/remove</issue>
<issue id="1237812" tracker="bnc">VUL-0: CVE-2022-49656: kernel: ARM: meson: Fix refcount leak in meson_smp_prepare_cpus</issue>
<issue id="1237813" tracker="bnc">VUL-0: CVE-2022-49331: kernel: nfc: st21nfca: fix memory leaks in EVT_TRANSACTION handling</issue>
<issue id="1237814" tracker="bnc">VUL-0: CVE-2022-49058: kernel: cifs: potential buffer overflow in handling symlinks</issue>
<issue id="1237815" tracker="bnc">VUL-0: CVE-2022-49264: kernel: exec: Force single empty string when argv is empty</issue>
<issue id="1237817" tracker="bnc">VUL-0: CVE-2022-49515: kernel: ASoC: cs35l41: Fix an out-of-bounds access in otp_packed_element_t</issue>
<issue id="1237818" tracker="bnc">VUL-0: CVE-2022-49583: kernel: iavf: Fix handling of dummy receive descriptors</issue>
<issue id="1237821" tracker="bnc">VUL-0: CVE-2022-49676: kernel: memory: samsung: exynos5422-dmc: Fix refcount leak in of_get_dram_timings</issue>
<issue id="1237823" tracker="bnc">VUL-0: CVE-2022-49397: kernel: phy: qcom-qmp: fix struct clk leak on probe errors</issue>
<issue id="1237824" tracker="bnc">VUL-0: CVE-2021-47639: kernel: KVM: x86/mmu: Zap _all_ roots when unmapping gfn range in TDP MMU</issue>
<issue id="1237826" tracker="bnc">VUL-0: CVE-2022-49386: kernel: net: ethernet: ti: am65-cpsw-nuss: Fix some refcount leaks</issue>
<issue id="1237827" tracker="bnc">VUL-0: CVE-2021-47656: kernel: jffs2: fix use-after-free in jffs2_clear_xattr_subsystem</issue>
<issue id="1237829" tracker="bnc">VUL-0: CVE-2022-49399: kernel: tty: goldfish: Use tty_port_destroy() to destroy port</issue>
<issue id="1237831" tracker="bnc">VUL-0: CVE-2022-49641: kernel: sysctl: Fix data races in proc_douintvec().</issue>
<issue id="1237835" tracker="bnc">VUL-0: CVE-2022-49251: kernel: ASoC: codecs: va-macro: fix accessing array out of bounds for enum type</issue>
<issue id="1237836" tracker="bnc">VUL-0: CVE-2022-49109: kernel: ceph: fix inode reference leakage in ceph_get_snapdir()</issue>
<issue id="1237837" tracker="bnc">VUL-0: CVE-2021-47657: kernel: drm/virtio: Ensure that objs is not NULL in virtio_gpu_array_put_free()</issue>
<issue id="1237839" tracker="bnc">VUL-0: CVE-2021-47659: kernel: drm/plane: Move range check for format_count earlier</issue>
<issue id="1237840" tracker="bnc">VUL-0: CVE-2022-49044: kernel: dm integrity: fix memory corruption when tag_size is less than digest size</issue>
<issue id="1237845" tracker="bnc">VUL-0: CVE-2022-49060: kernel: net/smc: Fix NULL pointer dereference in smc_pnet_find_ib()</issue>
<issue id="1237846" tracker="bnc">VUL-0: CVE-2022-49063: kernel: ice: arfs: fix use-after-free when freeing @rx_cpu_rmap</issue>
<issue id="1237868" tracker="bnc">VUL-0: CVE-2022-49055: kernel: drm/amdkfd: Check for potential null return of kmalloc_array()</issue>
<issue id="1237872" tracker="bnc">VUL-0: CVE-2021-47651: kernel: soc: qcom: rpmpd: Check for null return of devm_kcalloc</issue>
<issue id="1237892" tracker="bnc">VUL-0: CVE-2022-49050: kernel: memory: renesas-rpc-if: fix platform-device leak in error path</issue>
<issue id="1237903" tracker="bnc">VUL-0: CVE-2022-49051: kernel: net: usb: aqc111: Fix out-of-bounds accesses in RX fixup</issue>
<issue id="1237904" tracker="bnc">VUL-0: CVE-2021-47636: kernel: ubifs: Fix read out-of-bounds in ubifs_wbuf_write_nolock()</issue>
<issue id="1237916" tracker="bnc">VUL-0: CVE-2021-47642: kernel: video: fbdev: nvidiafb: Use strscpy() to prevent buffer overflow</issue>
<issue id="1237922" tracker="bnc">VUL-0: CVE-2022-49116: kernel: Bluetooth: use memset avoid memory leaks</issue>
<issue id="1237925" tracker="bnc">VUL-0: CVE-2022-49119: kernel: scsi: pm8001: Fix memory leak in pm8001_chip_fw_flash_update_req()</issue>
<issue id="1237926" tracker="bnc">VUL-0: CVE-2022-49121: kernel: scsi: pm8001: Fix tag leaks on error</issue>
<issue id="1237929" tracker="bnc">VUL-0: CVE-2022-49126: kernel: scsi: mpi3mr: Fix memory leaks</issue>
<issue id="1237931" tracker="bnc">VUL-0: CVE-2022-49054: kernel: Drivers: hv: vmbus: Deactivate sysctl_record_panic_msg by default in isolated guests</issue>
<issue id="1237932" tracker="bnc">VUL-0: CVE-2022-49495: kernel: drm/msm/hdmi: check return value after calling platform_get_resource_byname()</issue>
<issue id="1237933" tracker="bnc">VUL-0: CVE-2022-49584: kernel: ixgbe: Add locking to prevent panic when setting sriov_numvfs to zero</issue>
<issue id="1237937" tracker="bnc">VUL-0: CVE-2022-49634: kernel: sysctl: Fix data-races in proc_dou8vec_minmax().</issue>
<issue id="1237939" tracker="bnc">VUL-0: CVE-2022-49351: kernel: net: altera: Fix refcount leak in altera_tse_mdio_create</issue>
<issue id="1237940" tracker="bnc">VUL-0: CVE-2022-49508: kernel: HID: elan: Fix potential double free in elan_input_configured</issue>
<issue id="1237941" tracker="bnc">VUL-0: CVE-2022-49155: kernel: scsi: qla2xxx: Suppress a kernel complaint in qla_create_qpair()</issue>
<issue id="1237942" tracker="bnc">VUL-0: CVE-2022-49559: kernel: KVM: x86: Drop WARNs that assert a triple fault never "escapes" from L2</issue>
<issue id="1237946" tracker="bnc">VUL-0: CVE-2022-49486: kernel: ASoC: fsl: Fix refcount leak in imx_sgtl5000_probe</issue>
<issue id="1237951" tracker="bnc">VUL-0: CVE-2022-49385: kernel: driver: base: fix UAF when driver_attach failed</issue>
<issue id="1237952" tracker="bnc">VUL-0: CVE-2022-49258: kernel: crypto: ccree - Fix use after free in cc_cipher_exit()</issue>
<issue id="1237954" tracker="bnc">VUL-0: CVE-2022-49693: kernel: drm/msm/mdp4: Fix refcount leak in mdp4_modeset_init_intf</issue>
<issue id="1237955" tracker="bnc">VUL-0: CVE-2022-49494: kernel: mtd: rawnand: cadence: fix possible null-ptr-deref in cadence_nand_dt_probe()</issue>
<issue id="1237957" tracker="bnc">VUL-0: CVE-2022-49668: kernel: PM / devfreq: exynos-ppmu: Fix refcount leak in of_get_devfreq_events</issue>
<issue id="1237958" tracker="bnc">VUL-0: CVE-2022-49200: kernel: Bluetooth: btmtksdio: Fix kernel oops in btmtksdio_interrupt</issue>
<issue id="1237959" tracker="bnc">VUL-0: CVE-2022-49384: kernel: md: fix double free of io_acct_set bioset</issue>
<issue id="1237960" tracker="bnc">VUL-0: CVE-2022-49147: kernel: block: Fix the maximum minor value is blk_alloc_ext_minor()</issue>
<issue id="1237961" tracker="bnc">VUL-0: CVE-2022-49115: kernel: PCI: endpoint: Fix misused goto label</issue>
<issue id="1237963" tracker="bnc">VUL-0: CVE-2022-49685: kernel: iio: trigger: sysfs: fix use-after-free on remove</issue>
<issue id="1237965" tracker="bnc">VUL-0: CVE-2022-49106: kernel: staging: vchiq_arm: Avoid NULL ptr deref in vchiq_dump_platform_instances</issue>
<issue id="1237966" tracker="bnc">VUL-0: CVE-2022-49131: kernel: ath11k: fix kernel panic during unload/load ath11k modules</issue>
<issue id="1237967" tracker="bnc">VUL-0: CVE-2022-49113: kernel: powerpc/secvar: fix refcount leak in format_show()</issue>
<issue id="1237968" tracker="bnc">VUL-0: CVE-2022-49129: kernel: mt76: mt7921: fix crash when startup fails.</issue>
<issue id="1237969" tracker="bnc">VUL-0: CVE-2022-49120: kernel: scsi: pm8001: Fix task leak in pm8001_send_abort_all()</issue>
<issue id="1237970" tracker="bnc">VUL-0: CVE-2022-49128: kernel: drm/bridge: Add missing pm_runtime_put_sync</issue>
<issue id="1237971" tracker="bnc">VUL-0: CVE-2022-49112: kernel: mt76: fix monitor mode crash with sdio driver</issue>
<issue id="1237973" tracker="bnc">VUL-0: CVE-2022-49107: kernel: ceph: fix memory leak in ceph_readdir when note_last_dentry returns error</issue>
<issue id="1237975" tracker="bnc">VUL-0: CVE-2022-49105: kernel: staging: wfx: fix an error handling in wfx_init_common()</issue>
<issue id="1237976" tracker="bnc">VUL-0: CVE-2022-49132: kernel: ath11k: pci: fix crash on suspend if board file is not found</issue>
<issue id="1237978" tracker="bnc">VUL-0: CVE-2022-49130: kernel: ath11k: mhi: use mhi_sync_power_up()</issue>
<issue id="1237979" tracker="bnc">VUL-0: CVE-2022-49118: kernel: scsi: hisi_sas: Free irq vectors in order for v3 HW</issue>
<issue id="1237983" tracker="bnc">VUL-0: CVE-2022-49122: kernel: dm ioctl: prevent potential spectre v1 gadget</issue>
<issue id="1237984" tracker="bnc">VUL-0: CVE-2022-49111: kernel: Bluetooth: Fix use after free in hci_send_acl</issue>
<issue id="1237986" tracker="bnc">VUL-0: CVE-2022-49512: kernel: mtd: rawnand: denali: Use managed device resources</issue>
<issue id="1237987" tracker="bnc">VUL-0: CVE-2022-49257: kernel: watch_queue: Fix NULL dereference in error cleanup</issue>
<issue id="1237990" tracker="bnc">VUL-0: CVE-2022-49705: kernel: 9p: fix fid refcount leak in v9fs_vfs_atomic_open_dotl</issue>
<issue id="1237996" tracker="bnc">VUL-0: CVE-2022-49517: kernel: ASoC: mediatek: Fix missing of_node_put in mt2701_wm8960_machine_probe</issue>
<issue id="1237997" tracker="bnc">VUL-0: CVE-2022-49723: kernel: drm/i915/reset: Fix error_state_read ptr + offset use</issue>
<issue id="1237998" tracker="bnc">VUL-0: CVE-2022-49224: kernel: power: supply: ab8500: Fix memory leak in ab8500_fg_sysfs_init</issue>
<issue id="1237999" tracker="bnc">VUL-0: CVE-2022-49104: kernel: staging: vchiq_core: handle NULL result of find_service_by_handle</issue>
<issue id="1238000" tracker="bnc">VUL-0: CVE-2022-49478: kernel: media: pvrusb2: fix array-index-out-of-bounds in pvr2_i2c_core_init</issue>
<issue id="1238003" tracker="bnc">VUL-0: CVE-2022-49214: kernel: powerpc/64s: Don't use DSISR for SLB faults</issue>
<issue id="1238006" tracker="bnc">VUL-0: CVE-2022-49135: kernel: drm/amd/display: Fix memory leak</issue>
<issue id="1238007" tracker="bnc">VUL-0: CVE-2022-49059: kernel: nfc: nci: add flush_workqueue to prevent uaf</issue>
<issue id="1238010" tracker="bnc">VUL-0: CVE-2022-49177: kernel: hwrng: cavium - fix NULL but dereferenced coccicheck error</issue>
<issue id="1238011" tracker="bnc">VUL-0: CVE-2022-49187: kernel: clk: Fix clk_hw_get_clk() when dev is NULL</issue>
<issue id="1238012" tracker="bnc">VUL-0: CVE-2022-49283: kernel: firmware: sysfb: fix platform-device leak in error path</issue>
<issue id="1238013" tracker="bnc">VUL-0: CVE-2022-49527: kernel: media: venus: hfi: avoid null dereference in deinit</issue>
<issue id="1238014" tracker="bnc">VUL-0: CVE-2022-49579: kernel: ipv4: Fix data-races around sysctl_fib_multipath_hash_policy.</issue>
<issue id="1238016" tracker="bnc">VUL-0: CVE-2022-49725: kernel: i40e: Fix call trace in setup_tx_descriptors</issue>
<issue id="1238017" tracker="bnc">VUL-0: CVE-2022-49665: kernel: platform/x86: thinkpad_acpi: Fix a memory leak of EFCH MMIO resource</issue>
<issue id="1238018" tracker="bnc">VUL-0: CVE-2022-49102: kernel: habanalabs: fix possible memory leak in MMU DR fini</issue>
<issue id="1238019" tracker="bnc">VUL-0: CVE-2022-49445: kernel: pinctrl: renesas: core: Fix possible null-ptr-deref in sh_pfc_map_resources()</issue>
<issue id="1238021" tracker="bnc">VUL-0: CVE-2022-49090: kernel: arch/arm64: Fix topology initialization for core scheduling</issue>
<issue id="1238022" tracker="bnc">VUL-0: CVE-2022-49525: kernel: media: cx25821: fix the warning when removing the module</issue>
<issue id="1238024" tracker="bnc">VUL-0: CVE-2022-49061: kernel: net: ethernet: stmmac: fix altr_tse_pcs function when using a fixed-link</issue>
<issue id="1238030" tracker="bnc">VUL-0: CVE-2022-49526: kernel: md/bitmap: don't set sb values if can't pass sanity check</issue>
<issue id="1238036" tracker="bnc">VUL-0: CVE-2022-49085: kernel: drbd: Fix five use after free bugs in get_initial_state</issue>
<issue id="1238037" tracker="bnc">VUL-0: CVE-2022-49086: kernel: net: openvswitch: fix leak of nested actions</issue>
<issue id="1238041" tracker="bnc">VUL-0: CVE-2022-49089: kernel: IB/rdmavt: add lock to call to rvt_error_qp to prevent a race condition</issue>
<issue id="1238046" tracker="bnc">VUL-0: CVE-2022-49459: kernel: thermal/drivers/broadcom: Fix potential NULL dereference in sr_thermal_probe</issue>
<issue id="1238047" tracker="bnc">VUL-0: CVE-2022-49468: kernel: thermal/core: fix memory leak in __thermal_cooling_device_register()</issue>
<issue id="1238071" tracker="bnc">VUL-0: CVE-2022-49474: kernel: Bluetooth: fix dangling sco_conn and use-after-free in sco_sock_timeout</issue>
<issue id="1238077" tracker="bnc">VUL-0: CVE-2022-49096: kernel: net: sfc: add missing xdp queue reinitialization</issue>
<issue id="1238079" tracker="bnc">VUL-0: CVE-2022-49098: kernel: Drivers: hv: vmbus: Fix potential crash on module unload</issue>
<issue id="1238080" tracker="bnc">VUL-0: CVE-2022-49103: kernel: NFSv4.2: fix reference count leaks in _nfs42_proc_copy_notify()</issue>
<issue id="1238089" tracker="bnc">VUL-0: CVE-2022-49254: kernel: media: ti-vpe: cal: Fix a NULL pointer dereference in cal_ctx_v4l2_init_formats()</issue>
<issue id="1238090" tracker="bnc">VUL-0: CVE-2022-49268: kernel: ASoC: SOF: Intel: Fix NULL ptr dereference when ENOMEM</issue>
<issue id="1238091" tracker="bnc">VUL-0: CVE-2022-49174: kernel: ext4: fix ext4_mb_mark_bb() with flex_bg with fast_commit</issue>
<issue id="1238092" tracker="bnc">VUL-0: CVE-2022-49179: kernel: block, bfq: don't move oom_bfqq</issue>
<issue id="1238096" tracker="bnc">VUL-0: CVE-2022-49162: kernel: video: fbdev: sm712fb: Fix crash in smtcfb_write()</issue>
<issue id="1238097" tracker="bnc">VUL-0: CVE-2022-49176: kernel: bfq: fix use-after-free in bfq_dispatch_request</issue>
<issue id="1238099" tracker="bnc">VUL-0: CVE-2022-49175: kernel: PM: core: keep irq flags in device_pm_check_callbacks()</issue>
<issue id="1238103" tracker="bnc">VUL-0: CVE-2022-49376: kernel: scsi: sd: Fix potential NULL pointer dereference</issue>
<issue id="1238105" tracker="bnc">VUL-0: CVE-2022-49163: kernel: media: imx-jpeg: fix a bug of accessing array out of bounds</issue>
<issue id="1238106" tracker="bnc">VUL-0: CVE-2022-49165: kernel: media: imx-jpeg: Prevent decoding NV12M jpegs into single-planar buffers</issue>
<issue id="1238108" tracker="bnc">VUL-0: CVE-2022-49164: kernel: powerpc/tm: Fix more userspace r13 corruption</issue>
<issue id="1238110" tracker="bnc">VUL-0: CVE-2022-49180: kernel: LSM: general protection fault in legacy_parse_param</issue>
<issue id="1238111" tracker="bnc">VUL-0: CVE-2022-49185: kernel: pinctrl: nomadik: Add missing of_node_put() in nmk_pinctrl_probe</issue>
<issue id="1238112" tracker="bnc">VUL-0: CVE-2022-49381: kernel: jffs2: fix memory leak in jffs2_do_fill_super</issue>
<issue id="1238113" tracker="bnc">VUL-0: CVE-2022-49392: kernel: serial: 8250_aspeed_vuart: Fix potential NULL dereference in aspeed_vuart_probe</issue>
<issue id="1238115" tracker="bnc">VUL-0: CVE-2022-49487: kernel: mtd: rawnand: intel: fix possible null-ptr-deref in ebu_nand_probe()</issue>
<issue id="1238116" tracker="bnc">VUL-0: CVE-2022-49241: kernel: ASoC: atmel: fix error handling in sam9x5_wm8731_driver_probe</issue>
<issue id="1238120" tracker="bnc">VUL-0: CVE-2022-49236: kernel: bpf: fix UAF due to race between btf_try_get_module and load_module</issue>
<issue id="1238123" tracker="bnc">VUL-0: CVE-2022-49462: kernel: drm/msm/a6xx: Fix refcount leak in a6xx_gpu_init</issue>
<issue id="1238125" tracker="bnc">VUL-0: CVE-2022-49400: kernel: md: Don't set mddev private to NULL in raid0 pers->free</issue>
<issue id="1238126" tracker="bnc">VUL-0: CVE-2022-49242: kernel: ASoC: mxs: Fix error handling in mxs_sgtl5000_probe</issue>
<issue id="1238127" tracker="bnc">VUL-0: CVE-2022-49444: kernel: module: fix [e_shstrndx].sh_size=0 OOB access</issue>
<issue id="1238131" tracker="bnc">VUL-0: CVE-2022-49703: kernel: scsi: ibmvfc: Store vhost pointer during subcrq allocation</issue>
<issue id="1238134" tracker="bnc">VUL-0: CVE-2022-49556: kernel: KVM: SVM: Use kzalloc for sev ioctl interfaces to prevent kernel data leak</issue>
<issue id="1238135" tracker="bnc">VUL-0: CVE-2022-49473: kernel: ASoC: ti: j721e-evm: Fix refcount leak in j721e_soc_probe_*</issue>
<issue id="1238138" tracker="bnc">VUL-0: CVE-2022-49188: kernel: remoteproc: qcom_q6v5_mss: Fix some leaks in q6v5_alloc_memory_region</issue>
<issue id="1238139" tracker="bnc">VUL-0: CVE-2022-49232: kernel: drm/amd/display: Fix a NULL pointer dereference in amdgpu_dm_connector_add_common_modes()</issue>
<issue id="1238140" tracker="bnc">VUL-0: CVE-2022-49273: kernel: rtc: pl031: fix rtc features null pointer dereference</issue>
<issue id="1238142" tracker="bnc">VUL-0: CVE-2022-49276: kernel: jffs2: fix memory leak in jffs2_scan_medium</issue>
<issue id="1238144" tracker="bnc">VUL-0: CVE-2022-49277: kernel: jffs2: fix memory leak in jffs2_do_mount_fs</issue>
<issue id="1238146" tracker="bnc">VUL-0: CVE-2022-49114: kernel: scsi: libfc: Fix use after free in fc_exch_abts_resp()</issue>
<issue id="1238147" tracker="bnc">VUL-0: CVE-2022-49294: kernel: drm/amd/display: Check if modulo is 0 before dividing.</issue>
<issue id="1238149" tracker="bnc">VUL-0: CVE-2022-49307: kernel: tty: synclink_gt: Fix null-pointer-dereference in slgt_clean()</issue>
<issue id="1238150" tracker="bnc">VUL-0: CVE-2022-49189: kernel: clk: qcom: clk-rcg2: Update logic to calculate D value for RCG</issue>
<issue id="1238155" tracker="bnc">VUL-0: CVE-2022-49137: kernel: drm/amd/amdgpu/amdgpu_cs: fix refcount leak of a dma_fence obj</issue>
<issue id="1238156" tracker="bnc">VUL-0: CVE-2022-49290: kernel: mac80211: fix potential double free on mesh join</issue>
<issue id="1238157" tracker="bnc">VUL-0: CVE-2022-49312: kernel: staging: rtl8712: fix a potential memory leak in r871xu_drv_init()</issue>
<issue id="1238158" tracker="bnc">VUL-0: CVE-2022-49314: kernel: tty: Fix a possible resource leak in icom_probe</issue>
<issue id="1238162" tracker="bnc">VUL-0: CVE-2022-49145: kernel: ACPI: CPPC: Avoid out of bounds access when parsing _CPC data</issue>
<issue id="1238166" tracker="bnc">VUL-0: CVE-2022-49153: kernel: wireguard: socket: free skb in send6 when ipv6 is disabled</issue>
<issue id="1238167" tracker="bnc">VUL-0: CVE-2022-49154: kernel: KVM: SVM: fix panic on out-of-bounds guest IRQ</issue>
<issue id="1238168" tracker="bnc">VUL-0: CVE-2022-49156: kernel: scsi: qla2xxx: Fix scheduling while atomic</issue>
<issue id="1238169" tracker="bnc">VUL-0: CVE-2022-49157: kernel: scsi: qla2xxx: Fix premature hw access after PCI error</issue>
<issue id="1238170" tracker="bnc">VUL-0: CVE-2022-49158: kernel: scsi: qla2xxx: Fix warning message due to adisc being flushed</issue>
<issue id="1238171" tracker="bnc">VUL-0: CVE-2022-49159: kernel: scsi: qla2xxx: Implement ref count for SRB</issue>
<issue id="1238172" tracker="bnc">VUL-0: CVE-2022-49160: kernel: scsi: qla2xxx: Fix crash during module load unload test</issue>
<issue id="1238175" tracker="bnc">VUL-0: CVE-2022-49373: kernel: watchdog: ts4800_wdt: Fix refcount leak in ts4800_wdt_probe</issue>
<issue id="1238176" tracker="bnc">VUL-0: CVE-2022-49244: kernel: ASoC: mediatek: mt8192-mt6359: Fix error handling in mt8192_mt6359_dev_probe</issue>
<issue id="1238177" tracker="bnc">VUL-0: CVE-2022-49451: kernel: firmware: arm_scmi: Fix list protocols enumeration in the base protocol</issue>
<issue id="1238180" tracker="bnc">VUL-0: CVE-2022-49407: kernel: dlm: fix plock invalid read</issue>
<issue id="1238181" tracker="bnc">VUL-0: CVE-2022-49687: kernel: virtio_net: fix xdp_rxq_info bug after suspend/resume</issue>
<issue id="1238183" tracker="bnc">VUL-0: CVE-2022-49300: kernel: nbd: fix race between nbd_alloc_config() and module removal</issue>
<issue id="1238184" tracker="bnc">VUL-0: CVE-2022-49299: kernel: usb: dwc2: gadget: don't reset gadget's driver->bus</issue>
<issue id="1238228" tracker="bnc">VUL-0: CVE-2022-49375: kernel: rtc: mt6397: check return value after calling platform_get_resource()</issue>
<issue id="1238229" tracker="bnc">VUL-0: CVE-2022-49455: kernel: misc: ocxl: fix possible double free in ocxl_file_register_afu</issue>
<issue id="1238231" tracker="bnc">VUL-0: CVE-2022-49555: kernel: Bluetooth: hci_qca: Use del_timer_sync() before freeing</issue>
<issue id="1238234" tracker="bnc">VUL-0: CVE-2022-49199: kernel: RDMA/nldev: Prevent underflow in nldev_stat_set_counter_dynamic_doit()</issue>
<issue id="1238235" tracker="bnc">VUL-0: CVE-2022-49644: kernel: drm/i915: fix a possible refcount leak in intel_dp_add_mst_connector()</issue>
<issue id="1238236" tracker="bnc">VUL-0: CVE-2022-49332: kernel: scsi: lpfc: Address NULL pointer dereference after starget_to_rport()</issue>
<issue id="1238238" tracker="bnc">VUL-0: CVE-2022-49345: kernel: net: xfrm: unexport __init-annotated xfrm4_protocol_init()</issue>
<issue id="1238239" tracker="bnc">VUL-0: CVE-2022-49712: kernel: usb: gadget: lpc32xx_udc: Fix refcount leak in lpc32xx_udc_probe</issue>
<issue id="1238241" tracker="bnc">VUL-0: CVE-2022-49609: kernel: power/reset: arm-versatile: Fix refcount leak in versatile_reboot_probe</issue>
<issue id="1238242" tracker="bnc">VUL-0: CVE-2022-49438: kernel: Input: sparcspkr - fix refcount leak in bbc_beep_probe</issue>
<issue id="1238243" tracker="bnc">VUL-0: CVE-2022-49442: kernel: drivers/base/node.c: fix compaction sysfs file leak</issue>
<issue id="1238244" tracker="bnc">VUL-0: CVE-2022-49489: kernel: drm/msm/disp/dpu1: set vbif hw config to NULL to avoid use after memory free during pm runtime resume</issue>
<issue id="1238246" tracker="bnc">VUL-0: CVE-2022-49427: kernel: iommu/mediatek: Remove clk_disable in mtk_iommu_remove</issue>
<issue id="1238247" tracker="bnc">VUL-0: CVE-2022-49424: kernel: iommu/mediatek: Fix NULL pointer dereference when printing dev_name</issue>
<issue id="1238248" tracker="bnc">VUL-0: CVE-2022-49699: kernel: filemap: Handle sibling entries in filemap_get_read_batch()</issue>
<issue id="1238249" tracker="bnc">VUL-0: CVE-2022-49700: kernel: mm/slub: add missing TID updates on slab deactivation</issue>
<issue id="1238253" tracker="bnc">VUL-0: CVE-2022-49278: kernel: remoteproc: Fix count check in rproc_coredump_write()</issue>
<issue id="1238255" tracker="bnc">VUL-0: CVE-2022-49402: kernel: ftrace: Clean up hash direct_functions on register failures</issue>
<issue id="1238256" tracker="bnc">VUL-0: CVE-2022-49201: kernel: ibmvnic: fix race between xmit and reset</issue>
<issue id="1238257" tracker="bnc">VUL-0: CVE-2022-49389: kernel: usb: usbip: fix a refcount leak in stub_probe()</issue>
<issue id="1238260" tracker="bnc">VUL-0: CVE-2022-49182: kernel: net: hns3: add vlan list lock to protect vlan list</issue>
<issue id="1238262" tracker="bnc">VUL-0: CVE-2022-49719: kernel: irqchip/gic/realview: Fix refcount leak in realview_gic_of_init</issue>
<issue id="1238263" tracker="bnc">VUL-0: CVE-2022-49441: kernel: tty: fix deadlock caused by calling printk() under tty_port->lock</issue>
<issue id="1238264" tracker="bnc">VUL-0: CVE-2022-49481: kernel: regulator: pfuze100: Fix refcount leak in pfuze_parse_regulators_dt</issue>
<issue id="1238266" tracker="bnc">VUL-0: CVE-2022-49566: kernel: crypto: qat - fix memory leak in RSA</issue>
<issue id="1238267" tracker="bnc">VUL-0: CVE-2022-49263: kernel: brcmfmac: pcie: Release firmwares in the brcmf_pcie_setup error path</issue>
<issue id="1238268" tracker="bnc">VUL-0: CVE-2022-49433: kernel: RDMA/hfi1: Prevent use of lock before it is initialized</issue>
<issue id="1238269" tracker="bnc">VUL-0: CVE-2022-49657: kernel: usbnet: fix memory leak in error case</issue>
<issue id="1238270" tracker="bnc">VUL-0: CVE-2022-49626: kernel: sfc: fix use after free when disabling sriov</issue>
<issue id="1238271" tracker="bnc">VUL-0: CVE-2022-49288: kernel: ALSA: pcm: Fix races among concurrent prealloc proc writes</issue>
<issue id="1238272" tracker="bnc">VUL-0: CVE-2022-49272: kernel: ALSA: pcm: Fix potential AB/BA lock with buffer_mutex and mmap_lock</issue>
<issue id="1238274" tracker="bnc">VUL-0: CVE-2022-49196: kernel: powerpc/pseries: Fix use after free in remove_phb_dynamic()</issue>
<issue id="1238275" tracker="bnc">VUL-0: CVE-2022-49490: kernel: drm/msm/mdp5: Return error code in mdp5_pipe_release when deadlock is detected</issue>
<issue id="1238276" tracker="bnc">VUL-0: CVE-2022-49287: kernel: tpm: fix reference counting for struct tpm_chip</issue>
<issue id="1238277" tracker="bnc">VUL-0: CVE-2022-49256: kernel: watch_queue: Actually free the watch</issue>
<issue id="1238278" tracker="bnc">VUL-0: CVE-2022-49648: kernel: tracing/histograms: Fix memory leak problem</issue>
<issue id="1238279" tracker="bnc">VUL-0: CVE-2022-49409: kernel: ext4: fix bug_on in __es_tree_search</issue>
<issue id="1238281" tracker="bnc">VUL-0: CVE-2022-49720: kernel: block: Fix handling of offline queues in blk_mq_alloc_request_hctx()</issue>
<issue id="1238282" tracker="bnc">VUL-0: CVE-2022-49667: kernel: net: bonding: fix use-after-free after 802.3ad slave unbind</issue>
<issue id="1238283" tracker="bnc">VUL-0: CVE-2022-49193: kernel: ice: fix 'scheduling while atomic' on aux critical err interrupt</issue>
<issue id="1238284" tracker="bnc">VUL-0: CVE-2022-49248: kernel: ALSA: firewire-lib: fix uninitialized flag for AV/C deferred transaction</issue>
<issue id="1238286" tracker="bnc">VUL-0: CVE-2022-49378: kernel: sfc: fix considering that all channels have TX queues</issue>
<issue id="1238287" tracker="bnc">VUL-0: CVE-2022-49466: kernel: regulator: scmi: Fix refcount leak in scmi_regulator_probe</issue>
<issue id="1238288" tracker="bnc">VUL-0: CVE-2022-49716: kernel: irqchip/gic-v3: Fix error handling in gic_populate_ppi_partitions</issue>
<issue id="1238289" tracker="bnc">VUL-0: CVE-2022-49396: kernel: phy: qcom-qmp: fix reset-controller leak on probe errors</issue>
<issue id="1238292" tracker="bnc">VUL-0: CVE-2022-49435: kernel: mfd: davinci_voicecodec: Fix possible null-ptr-deref davinci_vc_probe()</issue>
<issue id="1238293" tracker="bnc">VUL-0: CVE-2022-49416: kernel: wifi: mac80211: fix use-after-free in chanctx code</issue>
<issue id="1238295" tracker="bnc">VUL-0: CVE-2022-49477: kernel: ASoC: samsung: Fix refcount leak in aries_audio_probe</issue>
<issue id="1238298" tracker="bnc">VUL-0: CVE-2022-49570: kernel: gpio: gpio-xilinx: Fix integer overflow</issue>
<issue id="1238301" tracker="bnc">VUL-0: CVE-2022-49722: kernel: ice: Fix memory corruption in VF driver</issue>
<issue id="1238302" tracker="bnc">VUL-0: CVE-2022-49246: kernel: ASoC: atmel: Fix error handling in snd_proto_probe</issue>
<issue id="1238306" tracker="bnc">VUL-0: CVE-2022-49382: kernel: soc: rockchip: Fix refcount leak in rockchip_grf_init</issue>
<issue id="1238307" tracker="bnc">VUL-0: CVE-2022-49411: kernel: bfq: Make sure bfqg for which we are queueing requests is online</issue>
<issue id="1238308" tracker="bnc">VUL-0: CVE-2022-49683: kernel: iio: adc: adi-axi-adc: Fix refcount leak in adi_axi_adc_attach_client</issue>
<issue id="1238309" tracker="bnc">VUL-0: CVE-2022-49562: kernel: KVM: x86: Use __try_cmpxchg_user() to update guest PTE A/D bits</issue>
<issue id="1238311" tracker="bnc">VUL-0: CVE-2022-49592: kernel: net: stmmac: fix dma queue left shift overflow issue</issue>
<issue id="1238313" tracker="bnc">VUL-0: CVE-2022-49217: kernel: scsi: pm8001: Fix abort all task initialization</issue>
<issue id="1238326" tracker="bnc">VUL-0: CVE-2022-49221: kernel: drm/msm/dp: populate connector of struct dp_panel</issue>
<issue id="1238327" tracker="bnc">VUL-0: CVE-2022-49213: kernel: ath10k: Fix error handling in ath10k_setup_msa_resources</issue>
<issue id="1238328" tracker="bnc">VUL-0: CVE-2022-49222: kernel: drm/bridge: anx7625: Fix overflow issue on reading EDID</issue>
<issue id="1238331" tracker="bnc">VUL-0: CVE-2022-49212: kernel: mtd: rawnand: atmel: fix refcount issue in atmel_nand_controller_init</issue>
<issue id="1238333" tracker="bnc">VUL-0: CVE-2022-49235: kernel: ath9k_htc: fix uninit value bugs</issue>
<issue id="1238334" tracker="bnc">VUL-0: CVE-2022-49239: kernel: ASoC: codecs: wcd934x: Add missing of_node_put() in wcd934x_codec_parse_data</issue>
<issue id="1238336" tracker="bnc">VUL-0: CVE-2022-49226: kernel: net: asix: add proper error handling of usb read errors</issue>
<issue id="1238337" tracker="bnc">VUL-0: CVE-2022-49243: kernel: ASoC: atmel: Add missing of_node_put() in at91sam9g20ek_audio_probe</issue>
<issue id="1238338" tracker="bnc">VUL-0: CVE-2022-49216: kernel: drm/tegra: Fix reference leak in tegra_dsi_ganged_probe</issue>
<issue id="1238339" tracker="bnc">VUL-0: CVE-2022-49249: kernel: ASoC: codecs: wc938x: fix accessing array out of bounds for enum type</issue>
<issue id="1238343" tracker="bnc">VUL-0: CVE-2022-49206: kernel: RDMA/mlx5: Fix memory leak in error flow for subscribe event routine</issue>
<issue id="1238345" tracker="bnc">VUL-0: CVE-2022-49208: kernel: RDMA/irdma: Prevent some integer underflows</issue>
<issue id="1238372" tracker="bnc">VUL-0: CVE-2022-49349: kernel: ext4: fix use-after-free in ext4_rename_dir_prepare</issue>
<issue id="1238373" tracker="bnc">VUL-0: CVE-2022-49321: kernel: xprtrdma: treat all calls not a bcall when bc_serv is NULL</issue>
<issue id="1238374" tracker="bnc">VUL-0: CVE-2022-49319: kernel: iommu/arm-smmu-v3: check return value after calling platform_get_resource()</issue>
<issue id="1238376" tracker="bnc">VUL-0: CVE-2022-49337: kernel: ocfs2: dlmfs: fix error handling of user_dlm_destroy_lock</issue>
<issue id="1238377" tracker="bnc">VUL-0: CVE-2022-49335: kernel: drm/amdgpu/cs: make commands with 0 chunks illegal behaviour.</issue>
<issue id="1238381" tracker="bnc">VUL-0: CVE-2022-49341: kernel: bpf, arm64: Clear prog->jited_len along prog->jited</issue>
<issue id="1238382" tracker="bnc">VUL-0: CVE-2022-49343: kernel: ext4: avoid cycles in directory h-tree</issue>
<issue id="1238383" tracker="bnc">VUL-0: CVE-2022-49348: kernel: ext4: filter out EXT4_FC_REPLAY from on-disk superblock field s_state</issue>
<issue id="1238386" tracker="bnc">VUL-0: CVE-2022-49316: kernel: NFSv4: Don't hold the layoutget locks across multiple RPC calls</issue>
<issue id="1238387" tracker="bnc">VUL-0: CVE-2022-49350: kernel: net: mdio: unexport __init-annotated mdio_bus_init()</issue>
<issue id="1238388" tracker="bnc">VUL-0: CVE-2022-49339: kernel: net: ipv6: unexport __init-annotated seg6_hmac_init()</issue>
<issue id="1238389" tracker="bnc">VUL-0: CVE-2022-49250: kernel: ASoC: codecs: rx-macro: fix accessing compander for aux</issue>
<issue id="1238390" tracker="bnc">VUL-0: CVE-2022-49342: kernel: net: ethernet: bgmac: Fix refcount leak in bcma_mdio_mii_register</issue>
<issue id="1238391" tracker="bnc">VUL-0: CVE-2022-49328: kernel: mt76: fix use-after-free by removing a non-RCU wcid pointer</issue>
<issue id="1238392" tracker="bnc">VUL-0: CVE-2022-49346: kernel: net: dsa: lantiq_gswip: Fix refcount leak in gswip_gphy_fw_list</issue>
<issue id="1238393" tracker="bnc">VUL-0: CVE-2022-49347: kernel: ext4: fix bug_on in ext4_writepages</issue>
<issue id="1238394" tracker="bnc">VUL-0: CVE-2022-49320: kernel: dmaengine: zynqmp_dma: In struct zynqmp_dma_chan fix desc_size data type</issue>
<issue id="1238395" tracker="bnc">VUL-0: CVE-2022-49352: kernel: ext4: fix warning in ext4_handle_inode_extension</issue>
<issue id="1238396" tracker="bnc">VUL-0: CVE-2022-49322: kernel: tracing: Fix sleeping function called from invalid context on RT kernel</issue>
<issue id="1238397" tracker="bnc">VUL-0: CVE-2022-49336: kernel: drm/etnaviv: check for reaped mapping in etnaviv_iommu_unmap_gem</issue>
<issue id="1238400" tracker="bnc">VUL-0: CVE-2022-49323: kernel: iommu/arm-smmu: fix possible null-ptr-deref in arm_smmu_device_probe()</issue>
<issue id="1238410" tracker="bnc">VUL-0: CVE-2022-49606: kernel: RDMA/irdma: Fix sleep from invalid context BUG</issue>
<issue id="1238411" tracker="bnc">VUL-0: CVE-2022-49625: kernel: sfc: fix kernel panic when creating VF</issue>
<issue id="1238413" tracker="bnc">VUL-0: CVE-2022-49259: kernel: block: don't delete queue kobject before its children</issue>
<issue id="1238415" tracker="bnc">VUL-0: CVE-2022-49680: kernel: ARM: exynos: Fix refcount leak in exynos_map_pmu</issue>
<issue id="1238416" tracker="bnc">VUL-0: CVE-2022-49711: kernel: bus: fsl-mc-bus: fix KASAN use-after-free in fsl_mc_bus_remove()</issue>
<issue id="1238417" tracker="bnc">VUL-0: CVE-2022-49710: kernel: dm mirror log: round up region bitmap size to BITS_PER_LONG</issue>
<issue id="1238418" tracker="bnc">VUL-0: CVE-2022-49679: kernel: ARM: Fix refcount leak in axxia_boot_secondary</issue>
<issue id="1238419" tracker="bnc">VUL-0: CVE-2022-49713: kernel: usb: dwc2: Fix memory leak in dwc2_hcd_init</issue>
<issue id="1238420" tracker="bnc">VUL-0: CVE-2022-49253: kernel: media: usb: go7007: s2250-board: fix leak in probe()</issue>
<issue id="1238423" tracker="bnc">VUL-0: CVE-2022-49688: kernel: afs: Fix dynamic root getattr</issue>
<issue id="1238428" tracker="bnc">VUL-0: CVE-2022-49463: kernel: thermal/drivers/imx_sc_thermal: Fix refcount leak in imx_sc_thermal_probe</issue>
<issue id="1238429" tracker="bnc">VUL-0: CVE-2022-49514: kernel: ASoC: mediatek: Fix error handling in mt8173_max98090_dev_probe</issue>
<issue id="1238430" tracker="bnc">VUL-0: CVE-2022-49404: kernel: RDMA/hfi1: Fix potential integer multiplication overflow errors</issue>
<issue id="1238431" tracker="bnc">VUL-0: CVE-2022-49675: kernel: tick/nohz: unexport __init-annotated tick_nohz_full_setup()</issue>
<issue id="1238432" tracker="bnc">VUL-0: CVE-2022-49265: kernel: PM: domains: Fix sleep-in-atomic bug caused by genpd_debug_remove()</issue>
<issue id="1238433" tracker="bnc">VUL-0: CVE-2022-49605: kernel: igc: Reinstate IGC_REMOVED logic and implement it properly</issue>
<issue id="1238434" tracker="bnc">VUL-0: CVE-2022-49443: kernel: list: fix a data-race around ep->rdllist</issue>
<issue id="1238435" tracker="bnc">VUL-0: CVE-2022-49645: kernel: drm/panfrost: Fix shrinker list corruption by madvise IOCTL</issue>
<issue id="1238436" tracker="bnc">VUL-0: CVE-2022-49412: kernel: bfq: Avoid merging queues with different parents</issue>
<issue id="1238437" tracker="bnc">VUL-0: CVE-2022-49642: kernel: net: stmmac: dwc-qos: Disable split header for Tegra194</issue>
<issue id="1238440" tracker="bnc">VUL-0: CVE-2022-49613: kernel: serial: 8250: Fix PM usage_count for console handover</issue>
<issue id="1238441" tracker="bnc">VUL-0: CVE-2022-49410: kernel: tracing: Fix potential double free in create_var_ref()</issue>
<issue id="1238442" tracker="bnc">VUL-0: CVE-2022-49663: kernel: tunnels: do not assume mac header is set in skb_tunnel_check_pmtu()</issue>
<issue id="1238443" tracker="bnc">VUL-0: CVE-2022-49437: kernel: powerpc/xive: Fix refcount leak in xive_spapr_init</issue>
<issue id="1238444" tracker="bnc">VUL-0: CVE-2022-49356: kernel: SUNRPC: Trap RDMA segment overflows</issue>
<issue id="1238445" tracker="bnc">VUL-0: CVE-2022-49426: kernel: iommu/arm-smmu-v3-sva: Fix mm use-after-free</issue>
<issue id="1238446" tracker="bnc">VUL-0: CVE-2022-49379: kernel: driver core: Fix wait_for_device_probe() & deferred_probe_timeout interaction</issue>
<issue id="1238447" tracker="bnc">VUL-0: CVE-2022-49367: kernel: net: dsa: mv88e6xxx: Fix refcount leak in mv88e6xxx_mdios_register</issue>
<issue id="1238453" tracker="bnc">VUL-0: CVE-2022-49194: kernel: net: bcmgenet: Use stronger register read/writes to assure ordering</issue>
<issue id="1238454" tracker="bnc">VUL-0: CVE-2022-49733: kernel: ALSA: pcm: oss: Fix race at SNDCTL_DSP_SYNC</issue>
<issue id="1238458" tracker="bnc">VUL-0: CVE-2022-49260: kernel: crypto: hisilicon/sec - fix the aead software fallback for engine</issue>
<issue id="1238459" tracker="bnc">VUL-0: CVE-2022-49270: kernel: dm: fix use-after-free in dm_cleanup_zoned_dev()</issue>
<issue id="1238462" tracker="bnc">VUL-0: CVE-2022-49261: kernel: drm/i915/gem: add missing boundary check in vm_access</issue>
<issue id="1238463" tracker="bnc">VUL-0: CVE-2022-49262: kernel: crypto: octeontx2 - remove CONFIG_DM_CRYPT check</issue>
<issue id="1238465" tracker="bnc">VUL-0: CVE-2022-49266: kernel: block: fix rq-qos breakage from skipping rq_qos_done_bio()</issue>
<issue id="1238467" tracker="bnc">VUL-0: CVE-2022-49370: kernel: firmware: dmi-sysfs: Fix memory leak in dmi_sysfs_register_handle</issue>
<issue id="1238469" tracker="bnc">VUL-0: CVE-2022-49297: kernel: nbd: fix io hung while disconnecting device</issue>
<issue id="1238533" tracker="bnc">VUL-0: CVE-2022-49269: kernel: can: isotp: sanitize CAN ID checks in isotp_bind()</issue>
<issue id="1238536" tracker="bnc">VUL-0: CVE-2022-49448: kernel: soc: bcm: Check for NULL return of devm_kzalloc()</issue>
<issue id="1238538" tracker="bnc">VUL-0: CVE-2022-49714: kernel: irqchip/realtek-rtl: Fix refcount leak in map_interrupts</issue>
<issue id="1238539" tracker="bnc">VUL-0: CVE-2022-49491: kernel: drm/rockchip: vop: fix possible null-ptr-deref in vop_bind()</issue>
<issue id="1238540" tracker="bnc">VUL-0: CVE-2022-49581: kernel: be2net: Fix buffer overflow in be_get_module_eeprom</issue>
<issue id="1238543" tracker="bnc">VUL-0: CVE-2022-49482: kernel: ASoC: mxs-saif: Fix refcount leak in mxs_saif_probe</issue>
<issue id="1238545" tracker="bnc">VUL-0: CVE-2022-49377: kernel: blk-mq: don't touch ->tagset in blk_mq_get_sq_hctx</issue>
<issue id="1238546" tracker="bnc">VUL-0: CVE-2022-49371: kernel: driver core: fix deadlock in __device_attach</issue>
<issue id="1238556" tracker="bnc">VUL-0: CVE-2022-49695: kernel: igb: fix a use-after-free issue in igb_clean_tx_ring</issue>
<issue id="1238557" tracker="bnc">VUL-0: CVE-2022-49523: kernel: ath11k: disable spectral scan during spectral deinit</issue>
<issue id="1238599" tracker="bnc">VUL-0: CVE-2022-49708: kernel: ext4: fix bug_on ext4_mb_use_inode_pa</issue>
<issue id="1238600" tracker="bnc">VUL-0: CVE-2022-49488: kernel: drm/msm/mdp5: Return error code in mdp5_mixer_release when deadlock is detected</issue>
<issue id="1238601" tracker="bnc">VUL-0: CVE-2022-49677: kernel: ARM: cns3xxx: Fix refcount leak in cns3xxx_init</issue>
<issue id="1238602" tracker="bnc">VUL-0: CVE-2022-49549: kernel: x86/MCE/AMD: Fix memory leak when threshold_create_bank() fails</issue>
<issue id="1238605" tracker="bnc">VUL-0: CVE-2022-49569: kernel: spi: bcm2835: bcm2835_spi_handle_err(): fix NULL pointer deref for non DMA transfers</issue>
<issue id="1238612" tracker="bnc">VUL-0: CVE-2022-49649: kernel: xen/netback: avoid entering xenvif_rx_next_skb() with an empty rx queue</issue>
<issue id="1238615" tracker="bnc">VUL-0: CVE-2022-49505: kernel: NFC: NULL out the dev->rfkill to prevent UAF</issue>
<issue id="1238617" tracker="bnc">VUL-0: CVE-2022-49475: kernel: spi: spi-fsl-qspi: check return value after calling platform_get_resource_byname()</issue>
<issue id="1238618" tracker="bnc">VUL-0: CVE-2022-49611: kernel: x86/speculation: Fill RSB on vmexit for IBRS</issue>
<issue id="1238619" tracker="bnc">VUL-0: CVE-2022-49628: kernel: net: stmmac: fix leaks in probe</issue>
<issue id="1238621" tracker="bnc">VUL-0: CVE-2022-49398: kernel: usb: dwc3: gadget: Replace list_for_each_entry_safe() if using giveback</issue>
<issue id="1238623" tracker="bnc">VUL-0: CVE-2022-49414: kernel: ext4: fix race condition between ext4_write and ext4_convert_inline_data</issue>
<issue id="1238625" tracker="bnc">VUL-0: CVE-2022-49292: kernel: ALSA: oss: Fix PCM OSS buffer allocation overflow</issue>
<issue id="1238626" tracker="bnc">VUL-0: CVE-2022-49271: kernel: cifs: prevent bad output lengths in smb2_ioctl_query_info()</issue>
<issue id="1238630" tracker="bnc">VUL-0: CVE-2022-49280: kernel: NFSD: prevent underflow in nfssvc_decode_writeargs()</issue>
<issue id="1238631" tracker="bnc">VUL-0: CVE-2022-49357: kernel: efi: Do not import certificates from UEFI Secure Boot for T2 Macs</issue>
<issue id="1238632" tracker="bnc">VUL-0: CVE-2022-49311: kernel: drivers: staging: rtl8192bs: Fix deadlock in rtw_joinbss_event_prehandle()</issue>
<issue id="1238633" tracker="bnc">VUL-0: CVE-2022-49313: kernel: drivers: usb: host: Fix deadlock in oxu_bus_suspend()</issue>
<issue id="1238635" tracker="bnc">VUL-0: CVE-2022-49281: kernel: cifs: fix handlecache and multiuser</issue>
<issue id="1238636" tracker="bnc">VUL-0: CVE-2022-49354: kernel: ata: pata_octeon_cf: Fix refcount leak in octeon_cf_probe</issue>
<issue id="1238638" tracker="bnc">VUL-0: CVE-2022-49315: kernel: drivers: staging: rtl8192e: Fix deadlock in rtllib_beacons_stop()</issue>
<issue id="1238639" tracker="bnc">VUL-0: CVE-2022-49304: kernel: drivers: tty: serial: Fix deadlock in sa1100_set_termios()</issue>
<issue id="1238640" tracker="bnc">VUL-0: CVE-2022-49309: kernel: drivers: staging: rtl8723bs: Fix deadlock in rtw_surveydone_event_callback()</issue>
<issue id="1238641" tracker="bnc">VUL-0: CVE-2022-49285: kernel: iio: accel: mma8452: use the correct logic to get mma8452_data</issue>
<issue id="1238642" tracker="bnc">VUL-0: CVE-2022-49310: kernel: char: xillybus: fix a refcount leak in cleanup_dev()</issue>
<issue id="1238643" tracker="bnc">VUL-0: CVE-2022-49301: kernel: staging: rtl8712: fix uninit-value in usb_read8() and friends</issue>
<issue id="1238645" tracker="bnc">VUL-0: CVE-2022-49305: kernel: drivers: staging: rtl8192u: Fix deadlock in ieee80211_beacons_stop()</issue>
<issue id="1238646" tracker="bnc">VUL-0: CVE-2022-49326: kernel: rtl818x: Prevent using not initialized queues</issue>
<issue id="1238647" tracker="bnc">VUL-0: CVE-2022-49286: kernel: tpm: use try_get_ops() in tpm-space.c</issue>
<issue id="1238650" tracker="bnc">VUL-0: CVE-2022-49509: kernel: media: i2c: max9286: fix kernel oops when removing module</issue>
<issue id="1238653" tracker="bnc">VUL-0: CVE-2022-49302: kernel: USB: host: isp116x: check return value after calling platform_get_resource()</issue>
<issue id="1238654" tracker="bnc">VUL-0: CVE-2022-49308: kernel: extcon: Modify extcon device to be created after driver data is set</issue>
<issue id="1238655" tracker="bnc">VUL-0: CVE-2022-49279: kernel: NFSD: prevent integer overflow on 32 bit systems</issue>
<issue id="1238662" tracker="bnc">VUL-0: CVE-2022-49327: kernel: bcache: avoid journal no-space deadlock by reserving 1 journal bucket</issue>
<issue id="1238663" tracker="bnc">VUL-0: CVE-2022-49643: kernel: ima: Fix a potential integer overflow in ima_appraise_measurement</issue>
<issue id="1238664" tracker="bnc">VUL-0: CVE-2022-49653: kernel: i2c: piix4: Fix a memory leak in the EFCH MMIO support</issue>
<issue id="1238666" tracker="bnc">VUL-0: CVE-2022-49591: kernel: net: dsa: microchip: ksz_common: Fix refcount leak bug</issue>
<issue id="1238668" tracker="bnc">VUL-0: CVE-2022-49274: kernel: ocfs2: fix crash when mount with quota enabled</issue>
<issue id="1238705" tracker="bnc">VUL-0: CVE-2022-49291: kernel: ALSA: pcm: fix races among concurrent hw_params and hw_free calls</issue>
<issue id="1238707" tracker="bnc">VUL-0: CVE-2022-49295: kernel: nbd: call genl_unregister_family() first in nbd_cleanup()</issue>
<issue id="1238710" tracker="bnc">VUL-0: CVE-2022-49413: kernel: bfq: update cgroup information before merging bio</issue>
<issue id="1238712" tracker="bnc">VUL-0: CVE-2022-49394: kernel: blk-iolatency: fix inflight count imbalances and IO hangs on offline</issue>
<issue id="1238718" tracker="bnc">VUL-0: CVE-2022-49298: kernel: staging: rtl8712: fix uninit-value in r871xu_drv_init()</issue>
<issue id="1238719" tracker="bnc">VUL-0: CVE-2022-49275: kernel: can: m_can: m_can_tx_handler(): fix use after free of skb</issue>
<issue id="1238721" tracker="bnc">VUL-0: CVE-2022-49544: kernel: ipw2x00: fix potential NULL dereference in libipw_xmit()</issue>
<issue id="1238722" tracker="bnc">VUL-0: CVE-2022-49542: kernel: scsi: lpfc: move cfg_log_verbose check before calling lpfc_dmp_dbg()</issue>
<issue id="1238727" tracker="bnc">VUL-0: CVE-2022-49541: kernel: cifs: fix potential double free during failed mount</issue>
<issue id="1238729" tracker="bnc">VUL-0: CVE-2022-49545: kernel: ALSA: usb-audio: cancel pending work at closing a MIDI substream</issue>
<issue id="1238750" tracker="bnc">VUL-0: CVE-2022-49546: kernel: x86/kexec: fix memory leak of elf header buffer</issue>
<issue id="1238787" tracker="bnc">VUL-0: CVE-2022-49563: kernel: crypto: qat - add param check for RSA</issue>
<issue id="1238789" tracker="bnc">VUL-0: CVE-2022-49564: kernel: crypto: qat - add param check for DH</issue>
<issue id="1238792" tracker="bnc">VUL-0: CVE-2022-49568: kernel: KVM: don't null dereference ops->destroy</issue>
<issue id="1238799" tracker="bnc">VUL-0: CVE-2022-49480: kernel: ASoC: imx-hdmi: Fix refcount leak in imx_hdmi_probe</issue>
<issue id="1238804" tracker="bnc">VUL-0: CVE-2022-49506: kernel: drm/mediatek: Add vblank register/unregister callback functions</issue>
<issue id="1238805" tracker="bnc">VUL-0: CVE-2022-49647: kernel: cgroup: Use separate src/dst nodes when preloading css_sets for migration</issue>
<issue id="1238808" tracker="bnc">VUL-0: CVE-2022-49726: kernel: clocksource: hyper-v: unexport __init-annotated hv_init_clocksource()</issue>
<issue id="1238809" tracker="bnc">VUL-0: CVE-2022-49670: kernel: linux/dim: Fix divide by 0 in RDMA DIM</issue>
<issue id="1238811" tracker="bnc">VUL-0: CVE-2022-49507: kernel: regulator: da9121: Fix uninit-value in da9121_assign_chip_model()</issue>
<issue id="1238814" tracker="bnc">VUL-0: CVE-2022-49631: kernel: raw: Fix a data-race around sysctl_raw_l3mdev_accept.</issue>
<issue id="1238815" tracker="bnc">VUL-0: CVE-2022-49467: kernel: drm: msm: fix possible memory leak in mdp5_crtc_cursor_set()</issue>
<issue id="1238816" tracker="bnc">VUL-0: CVE-2022-49672: kernel: net: tun: unlink NAPI from device on destruction</issue>
<issue id="1238817" tracker="bnc">VUL-0: CVE-2022-49607: kernel: perf/core: Fix data race between perf_event_set_output() and perf_mmap_close()</issue>
<issue id="1238818" tracker="bnc">VUL-0: CVE-2022-49715: kernel: irqchip/gic-v3: Fix refcount leak in gic_populate_ppi_partitions</issue>
<issue id="1238819" tracker="bnc">VUL-0: CVE-2022-49421: kernel: video: fbdev: clcdfb: Fix refcount leak in clcdfb_of_vram_setup</issue>
<issue id="1238821" tracker="bnc">VUL-0: CVE-2022-49678: kernel: soc: bcm: brcmstb: pm: pm-arm: Fix refcount leak in brcmstb_pm_probe</issue>
<issue id="1238823" tracker="bnc">VUL-0: CVE-2022-49671: kernel: RDMA/cm: Fix memory leak in ib_cm_insert_listen</issue>
<issue id="1238825" tracker="bnc">VUL-0: CVE-2022-49498: kernel: ALSA: pcm: check for null pointer of pointer substream before dereferencing it</issue>
<issue id="1238830" tracker="bnc">VUL-0: CVE-2022-49501: kernel: usbnet: run unregister_netdev() before unbind() again</issue>
<issue id="1238834" tracker="bnc">VUL-0: CVE-2022-49502: kernel: media: rga: fix possible memory leak in rga_probe</issue>
<issue id="1238835" tracker="bnc">VUL-0: CVE-2022-49504: kernel: scsi: lpfc: Inhibit aborts if external loopback plug is inserted</issue>
<issue id="1238836" tracker="bnc">VUL-0: CVE-2022-49520: kernel: arm64: compat: do not treat syscall number as ESR_ELx for a bad syscall</issue>
<issue id="1238838" tracker="bnc">VUL-0: CVE-2022-49536: kernel: scsi: lpfc: fix SCSI I/O completion and abort handler deadlock</issue>
<issue id="1238867" tracker="bnc">VUL-0: CVE-2022-49603: kernel: ip: Fix data-races around sysctl_ip_fwd_update_priority.</issue>
<issue id="1238868" tracker="bnc">VUL-0: CVE-2022-49503: kernel: ath9k_htc: fix potential out of bounds access with invalid rxstatus->rs_keyix</issue>
<issue id="1238869" tracker="bnc">VUL-0: CVE-2022-49724: kernel: tty: goldfish: Fix free_irq() on remove</issue>
<issue id="1238870" tracker="bnc">VUL-0: CVE-2022-49430: kernel: Input: gpio-keys - cancel delayed work only in case of GPIO</issue>
<issue id="1238871" tracker="bnc">VUL-0: CVE-2022-49652: kernel: dmaengine: ti: Fix refcount leak in ti_dra7_xbar_route_allocate</issue>
<issue id="1238878" tracker="bnc">VUL-0: CVE-2022-49418: kernel: NFSv4: Fix free of uninitialized nfs4_label on referral lookup.</issue>
<issue id="1238889" tracker="bnc">VUL-0: CVE-2022-49429: kernel: RDMA/hfi1: Prevent panic when SDMA is disabled</issue>
<issue id="1238892" tracker="bnc">VUL-0: CVE-2022-49460: kernel: PM / devfreq: rk3399_dmc: Disable edev on remove()</issue>
<issue id="1238893" tracker="bnc">VUL-0: CVE-2022-49534: kernel: scsi: lpfc: protect memory leak for NPIV ports sending PLOGI_RJT</issue>
<issue id="1238897" tracker="bnc">VUL-0: CVE-2022-49615: kernel: ASoC: rt711-sdca: fix kernel NULL pointer dereference when IO error</issue>
<issue id="1238898" tracker="bnc">VUL-0: CVE-2022-49616: kernel: ASoC: rt7*-sdw: harden jack_detect_handler</issue>
<issue id="1238899" tracker="bnc">VUL-0: CVE-2022-49431: kernel: powerpc/iommu: Add missing of_node_put in iommu_init_early_dart</issue>
<issue id="1238902" tracker="bnc">VUL-0: CVE-2022-49617: kernel: ASoC: Intel: sof_sdw: handle errors on card registration</issue>
<issue id="1238916" tracker="bnc">VUL-0: CVE-2022-49434: kernel: PCI: Avoid pci_dev_lock() AB/BA deadlock with sriov_numvfs_store()</issue>
<issue id="1238925" tracker="bnc">VUL-0: CVE-2022-49532: kernel: drm/virtio: fix NULL pointer dereference in virtio_gpu_conn_get_modes</issue>
<issue id="1238930" tracker="bnc">VUL-0: CVE-2022-49537: kernel: scsi: lpfc: fix call trace observed during I/O with CMF enabled</issue>
<issue id="1238933" tracker="bnc">VUL-0: CVE-2022-49673: kernel: dm raid: fix KASAN warning in raid5_add_disks</issue>
<issue id="1238936" tracker="bnc">VUL-0: CVE-2022-49449: kernel: pinctrl: renesas: rzn1: Fix possible null-ptr-deref in sh_pfc_map_resources()</issue>
<issue id="1238937" tracker="bnc">VUL-0: CVE-2022-49535: kernel: scsi: lpfc: Fix null pointer dereference after failing to issue FLOGI and PLOGI</issue>
<issue id="1238938" tracker="bnc">VUL-0: CVE-2022-49521: kernel: scsi: lpfc: Fix resource leak in lpfc_sli4_send_seq_to_ulp()</issue>
<issue id="1238939" tracker="bnc">VUL-0: CVE-2022-49493: kernel: ASoC: rt5645: Fix errorenous cleanup order</issue>
<issue id="1238943" tracker="bnc">VUL-0: CVE-2022-49519: kernel: ath10k: skip ath10k_halt during suspend for driver state RESTARTING</issue>
<issue id="1238945" tracker="bnc">VUL-0: CVE-2022-49440: kernel: powerpc/rtas: Keep MSR[RI] set when calling RTAS</issue>
<issue id="1238948" tracker="bnc">VUL-0: CVE-2022-49522: kernel: mmc: jz4740: Apply DMA engine limits to maximum segment size</issue>
<issue id="1238949" tracker="bnc">VUL-0: CVE-2022-49524: kernel: media: pci: cx23885: Fix the error handling in cx23885_initdev()</issue>
<issue id="1238950" tracker="bnc">VUL-0: CVE-2022-49432: kernel: powerpc/xics: fix refcount leak in icp_opal_init()</issue>
<issue id="1238951" tracker="bnc">VUL-0: CVE-2022-49472: kernel: net: phy: micrel: Allow probing without .driver_data</issue>
<issue id="1238952" tracker="bnc">VUL-0: CVE-2022-49610: kernel: KVM: VMX: prevent RSB underflow before vmenter</issue>
<issue id="1238954" tracker="bnc">VUL-0: CVE-2022-49492: kernel: nvme-pci: fix a NULL pointer dereference in nvme_alloc_admin_tags</issue>
<issue id="1238956" tracker="bnc">VUL-0: CVE-2022-49447: kernel: ARM: hisi: Add missing of_node_put after of_find_compatible_node</issue>
<issue id="1238957" tracker="bnc">VUL-0: CVE-2022-49618: kernel: pinctrl: aspeed: fix potential NULL dereference in aspeed_pinmux_set_mux()</issue>
<issue id="1239001" tracker="bnc">VUL-0: CVE-2022-49646: kernel: wifi: mac80211: fix queue selection for mesh/OCB interfaces</issue>
<issue id="1239004" tracker="bnc">VUL-0: CVE-2022-49453: kernel: soc: ti: ti_sci_pm_domains: check for null return of devm_kcalloc</issue>
<issue id="1239035" tracker="bnc">VUL-0: CVE-2022-49707: kernel: ext4: add reserved GDT blocks check</issue>
<issue id="1239040" tracker="bnc">VUL-0: CVE-2022-49623: kernel: powerpc/xive/spapr: correct bitmap allocation size</issue>
<issue id="1239041" tracker="bnc">VUL-0: CVE-2022-49674: kernel: dm raid: fix accesses beyond end of raid member array</issue>
<issue id="1239051" tracker="bnc">VUL-0: CVE-2022-49621: kernel: cpufreq: pmac32-cpufreq: fix refcount leak bug</issue>
<issue id="1239060" tracker="bnc">VUL-0: CVE-2022-49729: kernel: nfc: nfcmrvl: fix memory leak in nfcmrvl_play_deferred</issue>
<issue id="1239070" tracker="bnc">VUL-0: CVE-2022-49730: kernel: scsi: lpfc: resolve NULL ptr dereference after an ELS LOGO is aborted</issue>
<issue id="1239071" tracker="bnc">VUL-0: CVE-2022-49731: kernel: ata: libata-core: fix NULL pointer deref in ata_host_alloc_pinfo()</issue>
<issue id="1239073" tracker="bnc">VUL-0: CVE-2025-21718: kernel: net: rose: fix timer races against user threads</issue>
<issue id="1239076" tracker="bnc">VUL-0: CVE-2024-57996: kernel: net_sched: sch_sfq: don't allow 1 packet limit</issue>
<issue id="1239109" tracker="bnc">VUL-0: CVE-2024-58014: kernel: wifi: brcmsmac: add gain range check to wlc_phy_iqcal_gainparams_nphy()</issue>
<issue id="1239115" tracker="bnc">VUL-0: CVE-2025-21780: kernel: drm/amdgpu: avoid buffer overflow attach in smu_sys_set_pp_table()</issue>
<issue id="2021-4453" tracker="cve" />
<issue id="2021-47631" tracker="cve" />
<issue id="2021-47632" tracker="cve" />
<issue id="2021-47633" tracker="cve" />
<issue id="2021-47635" tracker="cve" />
<issue id="2021-47636" tracker="cve" />
<issue id="2021-47637" tracker="cve" />
<issue id="2021-47638" tracker="cve" />
<issue id="2021-47639" tracker="cve" />
<issue id="2021-47641" tracker="cve" />
<issue id="2021-47642" tracker="cve" />
<issue id="2021-47643" tracker="cve" />
<issue id="2021-47644" tracker="cve" />
<issue id="2021-47645" tracker="cve" />
<issue id="2021-47646" tracker="cve" />
<issue id="2021-47647" tracker="cve" />
<issue id="2021-47648" tracker="cve" />
<issue id="2021-47649" tracker="cve" />
<issue id="2021-47650" tracker="cve" />
<issue id="2021-47651" tracker="cve" />
<issue id="2021-47652" tracker="cve" />
<issue id="2021-47653" tracker="cve" />
<issue id="2021-47654" tracker="cve" />
<issue id="2021-47656" tracker="cve" />
<issue id="2021-47657" tracker="cve" />
<issue id="2021-47659" tracker="cve" />
<issue id="2022-0168" tracker="cve" />
<issue id="2022-0995" tracker="cve" />
<issue id="2022-1048" tracker="cve" />
<issue id="2022-1184" tracker="cve" />
<issue id="2022-2977" tracker="cve" />
<issue id="2022-29900" tracker="cve" />
<issue id="2022-29901" tracker="cve" />
<issue id="2022-3303" tracker="cve" />
<issue id="2022-3435" tracker="cve" />
<issue id="2022-49044" tracker="cve" />
<issue id="2022-49050" tracker="cve" />
<issue id="2022-49051" tracker="cve" />
<issue id="2022-49054" tracker="cve" />
<issue id="2022-49055" tracker="cve" />
<issue id="2022-49058" tracker="cve" />
<issue id="2022-49059" tracker="cve" />
<issue id="2022-49060" tracker="cve" />
<issue id="2022-49061" tracker="cve" />
<issue id="2022-49063" tracker="cve" />
<issue id="2022-49065" tracker="cve" />
<issue id="2022-49066" tracker="cve" />
<issue id="2022-49073" tracker="cve" />
<issue id="2022-49074" tracker="cve" />
<issue id="2022-49076" tracker="cve" />
<issue id="2022-49078" tracker="cve" />
<issue id="2022-49082" tracker="cve" />
<issue id="2022-49083" tracker="cve" />
<issue id="2022-49084" tracker="cve" />
<issue id="2022-49085" tracker="cve" />
<issue id="2022-49086" tracker="cve" />
<issue id="2022-49088" tracker="cve" />
<issue id="2022-49089" tracker="cve" />
<issue id="2022-49090" tracker="cve" />
<issue id="2022-49091" tracker="cve" />
<issue id="2022-49092" tracker="cve" />
<issue id="2022-49093" tracker="cve" />
<issue id="2022-49095" tracker="cve" />
<issue id="2022-49096" tracker="cve" />
<issue id="2022-49097" tracker="cve" />
<issue id="2022-49098" tracker="cve" />
<issue id="2022-49099" tracker="cve" />
<issue id="2022-49100" tracker="cve" />
<issue id="2022-49102" tracker="cve" />
<issue id="2022-49103" tracker="cve" />
<issue id="2022-49104" tracker="cve" />
<issue id="2022-49105" tracker="cve" />
<issue id="2022-49106" tracker="cve" />
<issue id="2022-49107" tracker="cve" />
<issue id="2022-49109" tracker="cve" />
<issue id="2022-49111" tracker="cve" />
<issue id="2022-49112" tracker="cve" />
<issue id="2022-49113" tracker="cve" />
<issue id="2022-49114" tracker="cve" />
<issue id="2022-49115" tracker="cve" />
<issue id="2022-49116" tracker="cve" />
<issue id="2022-49118" tracker="cve" />
<issue id="2022-49119" tracker="cve" />
<issue id="2022-49120" tracker="cve" />
<issue id="2022-49121" tracker="cve" />
<issue id="2022-49122" tracker="cve" />
<issue id="2022-49126" tracker="cve" />
<issue id="2022-49128" tracker="cve" />
<issue id="2022-49129" tracker="cve" />
<issue id="2022-49130" tracker="cve" />
<issue id="2022-49131" tracker="cve" />
<issue id="2022-49132" tracker="cve" />
<issue id="2022-49135" tracker="cve" />
<issue id="2022-49137" tracker="cve" />
<issue id="2022-49145" tracker="cve" />
<issue id="2022-49147" tracker="cve" />
<issue id="2022-49148" tracker="cve" />
<issue id="2022-49151" tracker="cve" />
<issue id="2022-49153" tracker="cve" />
<issue id="2022-49154" tracker="cve" />
<issue id="2022-49155" tracker="cve" />
<issue id="2022-49156" tracker="cve" />
<issue id="2022-49157" tracker="cve" />
<issue id="2022-49158" tracker="cve" />
<issue id="2022-49159" tracker="cve" />
<issue id="2022-49160" tracker="cve" />
<issue id="2022-49162" tracker="cve" />
<issue id="2022-49163" tracker="cve" />
<issue id="2022-49164" tracker="cve" />
<issue id="2022-49165" tracker="cve" />
<issue id="2022-49174" tracker="cve" />
<issue id="2022-49175" tracker="cve" />
<issue id="2022-49176" tracker="cve" />
<issue id="2022-49177" tracker="cve" />
<issue id="2022-49179" tracker="cve" />
<issue id="2022-49180" tracker="cve" />
<issue id="2022-49182" tracker="cve" />
<issue id="2022-49185" tracker="cve" />
<issue id="2022-49187" tracker="cve" />
<issue id="2022-49188" tracker="cve" />
<issue id="2022-49189" tracker="cve" />
<issue id="2022-49193" tracker="cve" />
<issue id="2022-49194" tracker="cve" />
<issue id="2022-49196" tracker="cve" />
<issue id="2022-49199" tracker="cve" />
<issue id="2022-49200" tracker="cve" />
<issue id="2022-49201" tracker="cve" />
<issue id="2022-49206" tracker="cve" />
<issue id="2022-49208" tracker="cve" />
<issue id="2022-49212" tracker="cve" />
<issue id="2022-49213" tracker="cve" />
<issue id="2022-49214" tracker="cve" />
<issue id="2022-49216" tracker="cve" />
<issue id="2022-49217" tracker="cve" />
<issue id="2022-49218" tracker="cve" />
<issue id="2022-49221" tracker="cve" />
<issue id="2022-49222" tracker="cve" />
<issue id="2022-49224" tracker="cve" />
<issue id="2022-49226" tracker="cve" />
<issue id="2022-49227" tracker="cve" />
<issue id="2022-49232" tracker="cve" />
<issue id="2022-49235" tracker="cve" />
<issue id="2022-49236" tracker="cve" />
<issue id="2022-49239" tracker="cve" />
<issue id="2022-49241" tracker="cve" />
<issue id="2022-49242" tracker="cve" />
<issue id="2022-49243" tracker="cve" />
<issue id="2022-49244" tracker="cve" />
<issue id="2022-49246" tracker="cve" />
<issue id="2022-49247" tracker="cve" />
<issue id="2022-49248" tracker="cve" />
<issue id="2022-49249" tracker="cve" />
<issue id="2022-49250" tracker="cve" />
<issue id="2022-49251" tracker="cve" />
<issue id="2022-49252" tracker="cve" />
<issue id="2022-49253" tracker="cve" />
<issue id="2022-49254" tracker="cve" />
<issue id="2022-49256" tracker="cve" />
<issue id="2022-49257" tracker="cve" />
<issue id="2022-49258" tracker="cve" />
<issue id="2022-49259" tracker="cve" />
<issue id="2022-49260" tracker="cve" />
<issue id="2022-49261" tracker="cve" />
<issue id="2022-49262" tracker="cve" />
<issue id="2022-49263" tracker="cve" />
<issue id="2022-49264" tracker="cve" />
<issue id="2022-49265" tracker="cve" />
<issue id="2022-49266" tracker="cve" />
<issue id="2022-49268" tracker="cve" />
<issue id="2022-49269" tracker="cve" />
<issue id="2022-49270" tracker="cve" />
<issue id="2022-49271" tracker="cve" />
<issue id="2022-49272" tracker="cve" />
<issue id="2022-49273" tracker="cve" />
<issue id="2022-49274" tracker="cve" />
<issue id="2022-49275" tracker="cve" />
<issue id="2022-49276" tracker="cve" />
<issue id="2022-49277" tracker="cve" />
<issue id="2022-49278" tracker="cve" />
<issue id="2022-49279" tracker="cve" />
<issue id="2022-49280" tracker="cve" />
<issue id="2022-49281" tracker="cve" />
<issue id="2022-49283" tracker="cve" />
<issue id="2022-49285" tracker="cve" />
<issue id="2022-49286" tracker="cve" />
<issue id="2022-49287" tracker="cve" />
<issue id="2022-49288" tracker="cve" />
<issue id="2022-49290" tracker="cve" />
<issue id="2022-49291" tracker="cve" />
<issue id="2022-49292" tracker="cve" />
<issue id="2022-49294" tracker="cve" />
<issue id="2022-49295" tracker="cve" />
<issue id="2022-49297" tracker="cve" />
<issue id="2022-49298" tracker="cve" />
<issue id="2022-49299" tracker="cve" />
<issue id="2022-49300" tracker="cve" />
<issue id="2022-49301" tracker="cve" />
<issue id="2022-49302" tracker="cve" />
<issue id="2022-49304" tracker="cve" />
<issue id="2022-49305" tracker="cve" />
<issue id="2022-49307" tracker="cve" />
<issue id="2022-49308" tracker="cve" />
<issue id="2022-49309" tracker="cve" />
<issue id="2022-49310" tracker="cve" />
<issue id="2022-49311" tracker="cve" />
<issue id="2022-49312" tracker="cve" />
<issue id="2022-49313" tracker="cve" />
<issue id="2022-49314" tracker="cve" />
<issue id="2022-49315" tracker="cve" />
<issue id="2022-49316" tracker="cve" />
<issue id="2022-49319" tracker="cve" />
<issue id="2022-49320" tracker="cve" />
<issue id="2022-49321" tracker="cve" />
<issue id="2022-49322" tracker="cve" />
<issue id="2022-49323" tracker="cve" />
<issue id="2022-49326" tracker="cve" />
<issue id="2022-49327" tracker="cve" />
<issue id="2022-49328" tracker="cve" />
<issue id="2022-49331" tracker="cve" />
<issue id="2022-49332" tracker="cve" />
<issue id="2022-49335" tracker="cve" />
<issue id="2022-49336" tracker="cve" />
<issue id="2022-49337" tracker="cve" />
<issue id="2022-49339" tracker="cve" />
<issue id="2022-49341" tracker="cve" />
<issue id="2022-49342" tracker="cve" />
<issue id="2022-49343" tracker="cve" />
<issue id="2022-49345" tracker="cve" />
<issue id="2022-49346" tracker="cve" />
<issue id="2022-49347" tracker="cve" />
<issue id="2022-49348" tracker="cve" />
<issue id="2022-49349" tracker="cve" />
<issue id="2022-49350" tracker="cve" />
<issue id="2022-49351" tracker="cve" />
<issue id="2022-49352" tracker="cve" />
<issue id="2022-49354" tracker="cve" />
<issue id="2022-49356" tracker="cve" />
<issue id="2022-49357" tracker="cve" />
<issue id="2022-49367" tracker="cve" />
<issue id="2022-49368" tracker="cve" />
<issue id="2022-49370" tracker="cve" />
<issue id="2022-49371" tracker="cve" />
<issue id="2022-49373" tracker="cve" />
<issue id="2022-49375" tracker="cve" />
<issue id="2022-49376" tracker="cve" />
<issue id="2022-49377" tracker="cve" />
<issue id="2022-49378" tracker="cve" />
<issue id="2022-49379" tracker="cve" />
<issue id="2022-49381" tracker="cve" />
<issue id="2022-49382" tracker="cve" />
<issue id="2022-49384" tracker="cve" />
<issue id="2022-49385" tracker="cve" />
<issue id="2022-49386" tracker="cve" />
<issue id="2022-49389" tracker="cve" />
<issue id="2022-49392" tracker="cve" />
<issue id="2022-49394" tracker="cve" />
<issue id="2022-49396" tracker="cve" />
<issue id="2022-49397" tracker="cve" />
<issue id="2022-49398" tracker="cve" />
<issue id="2022-49399" tracker="cve" />
<issue id="2022-49400" tracker="cve" />
<issue id="2022-49402" tracker="cve" />
<issue id="2022-49404" tracker="cve" />
<issue id="2022-49407" tracker="cve" />
<issue id="2022-49409" tracker="cve" />
<issue id="2022-49410" tracker="cve" />
<issue id="2022-49411" tracker="cve" />
<issue id="2022-49412" tracker="cve" />
<issue id="2022-49413" tracker="cve" />
<issue id="2022-49414" tracker="cve" />
<issue id="2022-49416" tracker="cve" />
<issue id="2022-49418" tracker="cve" />
<issue id="2022-49421" tracker="cve" />
<issue id="2022-49422" tracker="cve" />
<issue id="2022-49424" tracker="cve" />
<issue id="2022-49426" tracker="cve" />
<issue id="2022-49427" tracker="cve" />
<issue id="2022-49429" tracker="cve" />
<issue id="2022-49430" tracker="cve" />
<issue id="2022-49431" tracker="cve" />
<issue id="2022-49432" tracker="cve" />
<issue id="2022-49433" tracker="cve" />
<issue id="2022-49434" tracker="cve" />
<issue id="2022-49435" tracker="cve" />
<issue id="2022-49437" tracker="cve" />
<issue id="2022-49438" tracker="cve" />
<issue id="2022-49440" tracker="cve" />
<issue id="2022-49441" tracker="cve" />
<issue id="2022-49442" tracker="cve" />
<issue id="2022-49443" tracker="cve" />
<issue id="2022-49444" tracker="cve" />
<issue id="2022-49445" tracker="cve" />
<issue id="2022-49447" tracker="cve" />
<issue id="2022-49448" tracker="cve" />
<issue id="2022-49449" tracker="cve" />
<issue id="2022-49451" tracker="cve" />
<issue id="2022-49453" tracker="cve" />
<issue id="2022-49455" tracker="cve" />
<issue id="2022-49459" tracker="cve" />
<issue id="2022-49460" tracker="cve" />
<issue id="2022-49462" tracker="cve" />
<issue id="2022-49463" tracker="cve" />
<issue id="2022-49466" tracker="cve" />
<issue id="2022-49467" tracker="cve" />
<issue id="2022-49468" tracker="cve" />
<issue id="2022-49472" tracker="cve" />
<issue id="2022-49473" tracker="cve" />
<issue id="2022-49474" tracker="cve" />
<issue id="2022-49475" tracker="cve" />
<issue id="2022-49477" tracker="cve" />
<issue id="2022-49478" tracker="cve" />
<issue id="2022-49480" tracker="cve" />
<issue id="2022-49481" tracker="cve" />
<issue id="2022-49482" tracker="cve" />
<issue id="2022-49486" tracker="cve" />
<issue id="2022-49487" tracker="cve" />
<issue id="2022-49488" tracker="cve" />
<issue id="2022-49489" tracker="cve" />
<issue id="2022-49490" tracker="cve" />
<issue id="2022-49491" tracker="cve" />
<issue id="2022-49492" tracker="cve" />
<issue id="2022-49493" tracker="cve" />
<issue id="2022-49494" tracker="cve" />
<issue id="2022-49495" tracker="cve" />
<issue id="2022-49498" tracker="cve" />
<issue id="2022-49501" tracker="cve" />
<issue id="2022-49502" tracker="cve" />
<issue id="2022-49503" tracker="cve" />
<issue id="2022-49504" tracker="cve" />
<issue id="2022-49505" tracker="cve" />
<issue id="2022-49506" tracker="cve" />
<issue id="2022-49507" tracker="cve" />
<issue id="2022-49508" tracker="cve" />
<issue id="2022-49509" tracker="cve" />
<issue id="2022-49512" tracker="cve" />
<issue id="2022-49514" tracker="cve" />
<issue id="2022-49515" tracker="cve" />
<issue id="2022-49517" tracker="cve" />
<issue id="2022-49519" tracker="cve" />
<issue id="2022-49520" tracker="cve" />
<issue id="2022-49521" tracker="cve" />
<issue id="2022-49522" tracker="cve" />
<issue id="2022-49523" tracker="cve" />
<issue id="2022-49524" tracker="cve" />
<issue id="2022-49525" tracker="cve" />
<issue id="2022-49526" tracker="cve" />
<issue id="2022-49527" tracker="cve" />
<issue id="2022-49532" tracker="cve" />
<issue id="2022-49534" tracker="cve" />
<issue id="2022-49535" tracker="cve" />
<issue id="2022-49536" tracker="cve" />
<issue id="2022-49537" tracker="cve" />
<issue id="2022-49541" tracker="cve" />
<issue id="2022-49542" tracker="cve" />
<issue id="2022-49544" tracker="cve" />
<issue id="2022-49545" tracker="cve" />
<issue id="2022-49546" tracker="cve" />
<issue id="2022-49549" tracker="cve" />
<issue id="2022-49551" tracker="cve" />
<issue id="2022-49555" tracker="cve" />
<issue id="2022-49556" tracker="cve" />
<issue id="2022-49559" tracker="cve" />
<issue id="2022-49562" tracker="cve" />
<issue id="2022-49563" tracker="cve" />
<issue id="2022-49564" tracker="cve" />
<issue id="2022-49566" tracker="cve" />
<issue id="2022-49568" tracker="cve" />
<issue id="2022-49569" tracker="cve" />
<issue id="2022-49570" tracker="cve" />
<issue id="2022-49579" tracker="cve" />
<issue id="2022-49581" tracker="cve" />
<issue id="2022-49583" tracker="cve" />
<issue id="2022-49584" tracker="cve" />
<issue id="2022-49591" tracker="cve" />
<issue id="2022-49592" tracker="cve" />
<issue id="2022-49603" tracker="cve" />
<issue id="2022-49605" tracker="cve" />
<issue id="2022-49606" tracker="cve" />
<issue id="2022-49607" tracker="cve" />
<issue id="2022-49609" tracker="cve" />
<issue id="2022-49610" tracker="cve" />
<issue id="2022-49611" tracker="cve" />
<issue id="2022-49613" tracker="cve" />
<issue id="2022-49615" tracker="cve" />
<issue id="2022-49616" tracker="cve" />
<issue id="2022-49617" tracker="cve" />
<issue id="2022-49618" tracker="cve" />
<issue id="2022-49621" tracker="cve" />
<issue id="2022-49623" tracker="cve" />
<issue id="2022-49625" tracker="cve" />
<issue id="2022-49626" tracker="cve" />
<issue id="2022-49627" tracker="cve" />
<issue id="2022-49628" tracker="cve" />
<issue id="2022-49631" tracker="cve" />
<issue id="2022-49634" tracker="cve" />
<issue id="2022-49640" tracker="cve" />
<issue id="2022-49641" tracker="cve" />
<issue id="2022-49642" tracker="cve" />
<issue id="2022-49643" tracker="cve" />
<issue id="2022-49644" tracker="cve" />
<issue id="2022-49645" tracker="cve" />
<issue id="2022-49646" tracker="cve" />
<issue id="2022-49647" tracker="cve" />
<issue id="2022-49648" tracker="cve" />
<issue id="2022-49649" tracker="cve" />
<issue id="2022-49652" tracker="cve" />
<issue id="2022-49653" tracker="cve" />
<issue id="2022-49656" tracker="cve" />
<issue id="2022-49657" tracker="cve" />
<issue id="2022-49661" tracker="cve" />
<issue id="2022-49663" tracker="cve" />
<issue id="2022-49665" tracker="cve" />
<issue id="2022-49667" tracker="cve" />
<issue id="2022-49668" tracker="cve" />
<issue id="2022-49670" tracker="cve" />
<issue id="2022-49671" tracker="cve" />
<issue id="2022-49672" tracker="cve" />
<issue id="2022-49673" tracker="cve" />
<issue id="2022-49674" tracker="cve" />
<issue id="2022-49675" tracker="cve" />
<issue id="2022-49676" tracker="cve" />
<issue id="2022-49677" tracker="cve" />
<issue id="2022-49678" tracker="cve" />
<issue id="2022-49679" tracker="cve" />
<issue id="2022-49680" tracker="cve" />
<issue id="2022-49683" tracker="cve" />
<issue id="2022-49685" tracker="cve" />
<issue id="2022-49687" tracker="cve" />
<issue id="2022-49688" tracker="cve" />
<issue id="2022-49693" tracker="cve" />
<issue id="2022-49695" tracker="cve" />
<issue id="2022-49699" tracker="cve" />
<issue id="2022-49700" tracker="cve" />
<issue id="2022-49701" tracker="cve" />
<issue id="2022-49703" tracker="cve" />
<issue id="2022-49704" tracker="cve" />
<issue id="2022-49705" tracker="cve" />
<issue id="2022-49707" tracker="cve" />
<issue id="2022-49708" tracker="cve" />
<issue id="2022-49710" tracker="cve" />
<issue id="2022-49711" tracker="cve" />
<issue id="2022-49712" tracker="cve" />
<issue id="2022-49713" tracker="cve" />
<issue id="2022-49714" tracker="cve" />
<issue id="2022-49715" tracker="cve" />
<issue id="2022-49716" tracker="cve" />
<issue id="2022-49719" tracker="cve" />
<issue id="2022-49720" tracker="cve" />
<issue id="2022-49721" tracker="cve" />
<issue id="2022-49722" tracker="cve" />
<issue id="2022-49723" tracker="cve" />
<issue id="2022-49724" tracker="cve" />
<issue id="2022-49725" tracker="cve" />
<issue id="2022-49726" tracker="cve" />
<issue id="2022-49729" tracker="cve" />
<issue id="2022-49730" tracker="cve" />
<issue id="2022-49731" tracker="cve" />
<issue id="2022-49733" tracker="cve" />
<issue id="2023-28410" tracker="cve" />
<issue id="2024-2201" tracker="cve" />
<issue id="2024-41092" tracker="cve" />
<issue id="2024-42098" tracker="cve" />
<issue id="2024-42229" tracker="cve" />
<issue id="2024-42240" tracker="cve" />
<issue id="2024-57996" tracker="cve" />
<issue id="2024-58014" tracker="cve" />
<issue id="2025-21718" tracker="cve" />
<issue id="2025-21780" tracker="cve" />
<issue id="PED-1073" tracker="jsc" />
<issue id="SLE-15442" tracker="jsc" />
<issue id="SLE-18377" tracker="jsc" />
<issue id="SLE-19249" tracker="jsc" />
<issue id="SLE-24682" tracker="jsc" />
<category>security</category>
<rating>important</rating>
<packager>alix82</packager>
<reboot_needed/>
<description>
The SUSE Linux Enterprise 15 SP4 kernel was updated to receive various security bugfixes.
The following security bugs were fixed:
- CVE-2024-2201: Fixed information leak in x86/BHI (bsc#1217339).
- CVE-2024-41092: drm/i915/gt: Fix potential UAF by revoke of fence registers (bsc#1228483).
- CVE-2024-42098: crypto: ecdh - explicitly zeroize private_key (bsc#1228779).
- CVE-2024-42229: crypto: aead,cipher - zeroize key buffer after use (bsc#1228708).
- CVE-2024-57996: net_sched: sch_sfq: do not allow 1 packet limit (bsc#1239076).
- CVE-2024-58014: wifi: brcmsmac: add gain range check to wlc_phy_iqcal_gainparams_nphy() (bsc#1239109).
- CVE-2025-21718: net: rose: fix timer races against user threads (bsc#1239073).
- CVE-2025-21780: drm/amdgpu: avoid buffer overflow attach in smu_sys_set_pp_table() (bsc#1239115).
The following non-security bugs were fixed:
- initcall_blacklist: Does not allow kernel_lockdown be blacklisted (bsc#1237521).
- x86/bhi: Avoid warning in #DB handler due to BHI mitigation (git-fixes).
- x86/bugs: Cache the value of MSR_IA32_ARCH_CAPABILITIES (git-fixes).
- x86/bugs: Fix BHI documentation (git-fixes).
- x86/bugs: Fix BHI handling of RRSBA (git-fixes).
- x86/bugs: Fix BHI retpoline check (git-fixes).
- x86/bugs: Fix return type of spectre_bhi_state() (git-fixes).
- x86/bugs: Remove CONFIG_BHI_MITIGATION_AUTO and spectre_bhi=auto (git-fixes).
</description>
<summary>Security update for the Linux Kernel</summary>
</patchinfo>