File _patchinfo of Package patchinfo.39147

<patchinfo incident="39147">
  <issue id="1184350" tracker="bnc">SLES 15 SP3 - LPAR network did not come up after 10minutes during lpm test: (ibmvnic) (HANA)</issue>
  <issue id="1193629" tracker="bnc">[TRACKERBUG] SLE15-SP4 backports for cifs.ko</issue>
  <issue id="1204562" tracker="bnc">L3-Question: Improve visibility of created and bound - but not connected nor listening - TCP ports</issue>
  <issue id="1204569" tracker="bnc">VUL-0: CVE-2022-3619: kernel: memory leak in l2cap_recv_acldata() (net/bluetooth/l2cap_core.c)</issue>
  <issue id="1204619" tracker="bnc">VUL-0: CVE-2022-3640: kernel-source-azure,kernel-source-rt,kernel-source: use after free in l2cap_conn_del() due to improper reference counting</issue>
  <issue id="1204705" tracker="bnc">Kernel 6.0.3: NULL pointer dereference + Plasma 5.26.1 session not working; 6.0.2 works</issue>
  <issue id="1205282" tracker="bnc">objtool does not recognise AMX instructions</issue>
  <issue id="1206051" tracker="bnc">ceph: avoid putting the realm twice when decoding snaps fails</issue>
  <issue id="1206073" tracker="bnc">VUL-0: CVE-2022-3564: kernel: use-after-free caused by l2cap_reassemble_sdu() in net/bluetooth/l2cap_core.c</issue>
  <issue id="1206649" tracker="bnc">[PATCH] udf: Fix a slab-out-of-bounds write bug in udf_find_entry()</issue>
  <issue id="1206843" tracker="bnc">Lenovo T14s Gen3 AMD resume from sleep broken</issue>
  <issue id="1206886" tracker="bnc">[PATCH] ext4: fix BUG_ON() when directory entry has invalid rec_len</issue>
  <issue id="1206887" tracker="bnc">[PATCH] ext4: fix warning in 'ext4_da_release_space'</issue>
  <issue id="1207361" tracker="bnc">SLE15-SP5 networking backports and fixes</issue>
  <issue id="1208105" tracker="bnc">blk-cgroup: properly pin the parent in blkcg_css_online</issue>
  <issue id="1208542" tracker="bnc">ocfs2: part of the file is corrupted upon write</issue>
  <issue id="1209292" tracker="bnc">Failing paths to FC connected storage after kernel upgrade to 4.12.14-122.150-default</issue>
  <issue id="1209556" tracker="bnc">High kworker load on systems patched to 4.12.14-122.150.1.25822.1.PTF.1206805-default - Need core analyzed</issue>
  <issue id="1209684" tracker="bnc">kernel 4.12.14-122.150.1 qla2xxx with tape drive connected multipath path loss issues</issue>
  <issue id="1209780" tracker="bnc">VUL-0: CVE-2023-28866: kernel: bluetooth: out-of-bounds access because amp_init1[] and amp_init2[] are supposed to have an intentionally invalid element</issue>
  <issue id="1209980" tracker="bnc">Lenovo L14 Gen3 AMD, wifi card (Mediatek MT7922) not recognized.</issue>
  <issue id="1210337" tracker="bnc">VUL-0: CVE-2023-1990: kernel: Use after free bug in ndlc_remove due to race condition</issue>
  <issue id="1210763" tracker="bnc">[PATCH] ext4: Fix possible corruption when moving a directory</issue>
  <issue id="1210767" tracker="bnc">[PATCH] ext4: fix another off-by-one fsmap error on 1k block  filesystems</issue>
  <issue id="1211465" tracker="bnc">SLES 15 SP4 - net/iucv: Fix size of interrupt data</issue>
  <issue id="1213012" tracker="bnc">[PATCH] ext4: fix WARNING in ext4_update_inline_data</issue>
  <issue id="1213013" tracker="bnc">[PATCH] ext4: zero i_disksize when initializing the bootloader inode</issue>
  <issue id="1213094" tracker="bnc">[PATCH] ext4: update s_journal_inum if it changes after journal  replay</issue>
  <issue id="1213096" tracker="bnc">[PATCH] ext4: fix task hung in ext4_xattr_delete_inode</issue>
  <issue id="1213233" tracker="bnc">kernel backtrace WARNING: CPU: 357 PID: 12726 at ../arch/x86/events/amd/core.c:945 amd_pmu_v2_handle_irq+0x2cb/0x2e0</issue>
  <issue id="1213946" tracker="bnc">Likely ceph related kernel NULL pointer after uplifting to 15 SP4 [ref:_00D1igLOd._5005qUNIHK:ref]</issue>
  <issue id="1214991" tracker="bnc">[PATCH] loop: Fix use-after-free issues</issue>
  <issue id="1218470" tracker="bnc">server panicing on boot with iommu calls with a kernel higher than 5.14.21-150400.24.46.1</issue>
  <issue id="1222629" tracker="bnc">VUL-0: CVE-2024-26804: kernel: net: ip_tunnel: prevent perpetual headroom growth</issue>
  <issue id="1223096" tracker="bnc">kernel BUG at ../mm/slub.c:379! after NVMe timeout</issue>
  <issue id="1225903" tracker="bnc">bpf: backport of iterator and callback handling fixes</issue>
  <issue id="1232649" tracker="bnc">VUL-0: kernel: phram module allows circumvention of lockdown mode</issue>
  <issue id="1234395" tracker="bnc">I/O delays resulting in Hana performance degradation and temporary loss of sync between nodes</issue>
  <issue id="1234887" tracker="bnc">VUL-0: CVE-2024-53168: kernel: sunrpc: fix one UAF issue caused by sunrpc kernel tcp socket</issue>
  <issue id="1235100" tracker="bnc">VUL-0: CVE-2024-56558: kernel: nfsd: make sure exp active before svc_export_show</issue>
  <issue id="1235870" tracker="bnc">intermittent reboot failures using TPM to unlock encrypted drives during boot: "tpm tpm0: tpm_try_transmit: send(): error -62"</issue>
  <issue id="1240802" tracker="bnc">VUL-0: CVE-2025-21999: kernel: proc: fix UAF in proc_get_inode()</issue>
  <issue id="1241525" tracker="bnc">VUL-0: CVE-2025-22056: kernel: netfilter: nft_tunnel: fix geneve_opt type confusion addition</issue>
  <issue id="1242146" tracker="bnc">VUL-0: CVE-2022-49762: kernel: ntfs: check overflow when iterating ATTR_RECORDs</issue>
  <issue id="1242147" tracker="bnc">VUL-0: CVE-2022-49772: kernel: ALSA: usb-audio: drop snd_BUG_ON() from snd_usbmidi_output_open()</issue>
  <issue id="1242150" tracker="bnc">VUL-0: CVE-2022-49830: kernel: drm/drv: fix potential memory leak in drm_dev_init()</issue>
  <issue id="1242151" tracker="bnc">VUL-0: CVE-2022-49812: kernel: bridge: switchdev: fix memory leaks when changing VLAN protocol</issue>
  <issue id="1242154" tracker="bnc">VUL-0: CVE-2022-49832: kernel: pinctrl: devicetree: fix null pointer dereferencing in pinctrl_dt_to_map</issue>
  <issue id="1242157" tracker="bnc">VUL-0: CVE-2022-49908: kernel: Bluetooth: L2CAP: fix memory leak in vhci_write</issue>
  <issue id="1242158" tracker="bnc">VUL-0: CVE-2022-49869: kernel: bnxt_en: fix possible crash in bnxt_hwrm_set_coal()</issue>
  <issue id="1242160" tracker="bnc">VUL-0: CVE-2022-49837: kernel: bpf: fix memory leaks in __check_func_call</issue>
  <issue id="1242164" tracker="bnc">VUL-0: CVE-2022-49850: kernel: nilfs2: fix deadlock in nilfs_count_free_blocks()</issue>
  <issue id="1242165" tracker="bnc">VUL-0: CVE-2023-53124: kernel: scsi: mpt3sas: fix NULL pointer access in mpt3sas_transport_port_add()</issue>
  <issue id="1242169" tracker="bnc">VUL-0: CVE-2022-49863: kernel: can: af_can: fix NULL pointer dereference in can_rx_register()</issue>
  <issue id="1242215" tracker="bnc">VUL-0: CVE-2023-53106: kernel: nfc: st-nci: Fix use after free bug in ndlc_remove due to race condition</issue>
  <issue id="1242217" tracker="bnc">VUL-0: CVE-2023-53071: kernel: wifi: mt76: do not run mt76_unregister_device() on unregistered hw</issue>
  <issue id="1242218" tracker="bnc">VUL-0: CVE-2023-53075: kernel: ftrace: Fix invalid address access in lookup_rec() when index is 0</issue>
  <issue id="1242219" tracker="bnc">VUL-0: CVE-2023-53056: kernel: scsi: qla2xxx: Synchronize the IOCB count to be in order</issue>
  <issue id="1242222" tracker="bnc">VUL-0: CVE-2023-53064: kernel: iavf: fix hang on reboot with ice</issue>
  <issue id="1242224" tracker="bnc">VUL-0: CVE-2023-53073: kernel: perf/x86/amd/core: Always clear status for idx</issue>
  <issue id="1242226" tracker="bnc">VUL-0: CVE-2023-53054: kernel: usb: dwc2: fix a devres leak in hw_enable upon suspend resume</issue>
  <issue id="1242227" tracker="bnc">VUL-0: CVE-2023-53066: kernel: qed/qed_sriov: guard against NULL derefs from qed_iov_get_vf_info</issue>
  <issue id="1242228" tracker="bnc">VUL-0: CVE-2023-53062: kernel: net: usb: smsc95xx: Limit packet length to skb-&gt;len</issue>
  <issue id="1242229" tracker="bnc">VUL-0: CVE-2023-53065: kernel: perf/core: Fix perf_output_begin parameter is incorrectly invoked in perf_event_bpf_output</issue>
  <issue id="1242230" tracker="bnc">VUL-0: CVE-2023-53059: kernel: platform/chrome: cros_ec_chardev: fix kernel data leak from ioctl</issue>
  <issue id="1242231" tracker="bnc">VUL-0: CVE-2023-53078: kernel: scsi: scsi_dh_alua: Fix memleak for 'qdata' in alua_activate()</issue>
  <issue id="1242232" tracker="bnc">VUL-0: CVE-2022-49777: kernel: Input: i8042 - fix leaking of platform device on module removal</issue>
  <issue id="1242237" tracker="bnc">VUL-0: CVE-2023-53058: kernel: net/mlx5: E-Switch, Fix an Oops in error handling code</issue>
  <issue id="1242239" tracker="bnc">VUL-0: CVE-2023-53068: kernel: net: usb: lan78xx: Limit packet length to skb-&gt;len</issue>
  <issue id="1242240" tracker="bnc">VUL-0: CVE-2023-53057: kernel: Bluetooth: HCI: Fix global-out-of-bounds</issue>
  <issue id="1242241" tracker="bnc">VUL-0: CVE-2023-53060: kernel: igb: revert rtnl_lock() that causes deadlock</issue>
  <issue id="1242244" tracker="bnc">VUL-0: CVE-2023-53049: kernel: usb: ucsi: Fix NULL pointer deref in ucsi_connector_change()</issue>
  <issue id="1242245" tracker="bnc">VUL-0: CVE-2022-49775: kernel: tcp: cdg: allow tcp_cdg_release() to be called multiple times</issue>
  <issue id="1242248" tracker="bnc">VUL-0: CVE-2022-49776: kernel: macvlan: enforce a consistent minimal mtu</issue>
  <issue id="1242249" tracker="bnc">VUL-0: CVE-2022-49763: kernel: ntfs: fix use-after-free in ntfs_attr_find()</issue>
  <issue id="1242261" tracker="bnc">VUL-0: CVE-2022-49779: kernel: kprobes: Skip clearing aggrprobe's post_handler in kprobe-on-ftrace case</issue>
  <issue id="1242264" tracker="bnc">VUL-0: CVE-2022-49799: kernel: tracing: Fix wild-memory-access in register_synth_event()</issue>
  <issue id="1242265" tracker="bnc">VUL-0: CVE-2022-49800: kernel: tracing: Fix memory leak in test_gen_synth_cmd() and test_empty_synth_event()</issue>
  <issue id="1242270" tracker="bnc">VUL-0: CVE-2022-49802: kernel: ftrace: Fix null pointer dereference in ftrace_add_mod()</issue>
  <issue id="1242276" tracker="bnc">VUL-0: CVE-2023-53143: kernel: ext4: fix another off-by-one fsmap error on 1k block filesystems</issue>
  <issue id="1242278" tracker="bnc">VUL-0: CVE-2023-53095: kernel: drm/ttm: Fix a NULL pointer dereference</issue>
  <issue id="1242279" tracker="bnc">VUL-0: CVE-2023-53093: kernel: tracing: Do not let histogram values have some modifiers</issue>
  <issue id="1242280" tracker="bnc">VUL-0: CVE-2023-53087: kernel: drm/i915/active: Fix misuse of non-idle barriers as fence trackers</issue>
  <issue id="1242281" tracker="bnc">VUL-0: CVE-2023-53081: kernel: ocfs2: fix data corruption after failed write</issue>
  <issue id="1242282" tracker="bnc">VUL-0: CVE-2023-53142: kernel: ice: copy last block omitted in ice_get_module_eeprom()</issue>
  <issue id="1242285" tracker="bnc">VUL-0: CVE-2023-53125: kernel: net: usb: smsc75xx: Limit packet length to skb-&gt;len</issue>
  <issue id="1242286" tracker="bnc">VUL-0: CVE-2023-53070: kernel: ACPI: PPTT: Fix to avoid sleep in the atomic context when PPTT is absent</issue>
  <issue id="1242289" tracker="bnc">VUL-0: CVE-2023-53096: kernel: interconnect: fix mem leak when freeing nodes</issue>
  <issue id="1242294" tracker="bnc">VUL-0: CVE-2023-53084: kernel: drm/shmem-helper: Remove another errant put in error path</issue>
  <issue id="1242295" tracker="bnc">VUL-0: CVE-2023-53082: kernel: vp_vdpa: fix the crash in hot unplug with vp_vdpa</issue>
  <issue id="1242298" tracker="bnc">VUL-0: CVE-2022-49795: kernel: rethook: fix a potential memleak in rethook_alloc()</issue>
  <issue id="1242302" tracker="bnc">VUL-0: CVE-2022-49781: kernel: perf/x86/amd: Fix crash due to race between amd_pmu_enable_all, perf NMI and throttling</issue>
  <issue id="1242305" tracker="bnc">VUL-0: CVE-2022-49796: kernel: tracing: kprobe: Fix potential null-ptr-deref on trace_array in kprobe_event_gen_test_exit()</issue>
  <issue id="1242311" tracker="bnc">VUL-0: CVE-2022-49773: kernel: drm/amd/display: Fix optc2_configure warning on dcn314</issue>
  <issue id="1242312" tracker="bnc">VUL-0: CVE-2022-49783: kernel: x86/fpu: Drop fpregs lock before inheriting FPU permissions</issue>
  <issue id="1242320" tracker="bnc">VUL-0: CVE-2022-49797: kernel: tracing: kprobe: Fix potential null-ptr-deref on trace_event_file in kprobe_event_gen_test_exit()</issue>
  <issue id="1242338" tracker="bnc">VUL-0: CVE-2022-49801: kernel: tracing: Fix memory leak in tracing_read_pipe()</issue>
  <issue id="1242349" tracker="bnc">VUL-0: CVE-2022-49784: kernel: perf/x86/amd/uncore: Fix memory leak for events array</issue>
  <issue id="1242351" tracker="bnc">VUL-0: CVE-2022-49786: kernel: blk-cgroup: properly pin the parent in blkcg_css_online</issue>
  <issue id="1242352" tracker="bnc">VUL-0: CVE-2022-49787: kernel: mmc: sdhci-pci: Fix possible memory leak caused by missing pci_dev_put()</issue>
  <issue id="1242353" tracker="bnc">VUL-0: CVE-2022-49788: kernel: misc/vmw_vmci: fix an infoleak in vmci_host_do_receive_datagram()</issue>
  <issue id="1242355" tracker="bnc">VUL-0: CVE-2022-49836: kernel: siox: fix possible memory leak in siox_device_add()</issue>
  <issue id="1242357" tracker="bnc">VUL-0: CVE-2022-49807: kernel: nvmet: fix a memory leak in nvmet_auth_set_key</issue>
  <issue id="1242358" tracker="bnc">VUL-0: CVE-2023-53137: kernel: ext4: Fix possible corruption when moving a directory</issue>
  <issue id="1242359" tracker="bnc">VUL-0: CVE-2022-49921: kernel: net: sched: Fix use after free in red_enqueue()</issue>
  <issue id="1242360" tracker="bnc">VUL-0: CVE-2022-49929: kernel: RDMA/rxe: Fix mr leak in RESPST_ERR_RNR</issue>
  <issue id="1242361" tracker="bnc">VUL-0: CVE-2023-53139: kernel: nfc: fdp: add null check of devm_kmalloc_array in fdp_nci_i2c_read_device_properties</issue>
  <issue id="1242365" tracker="bnc">VUL-0: CVE-2023-53118: kernel: scsi: core: Fix a procfs host directory removal regression</issue>
  <issue id="1242366" tracker="bnc">VUL-0: CVE-2022-49789: kernel: scsi: zfcp: Fix double free of FSF request when qdio send fails</issue>
  <issue id="1242369" tracker="bnc">VUL-0: CVE-2022-49928: kernel: SUNRPC: Fix null-ptr-deref when xps sysfs alloc failed</issue>
  <issue id="1242370" tracker="bnc">VUL-0: CVE-2023-53119: kernel: nfc: pn533: initialize struct pn533_out_arg properly</issue>
  <issue id="1242371" tracker="bnc">VUL-0: CVE-2022-49925: kernel: RDMA/core: Fix null-ptr-deref in ib_core_cleanup()</issue>
  <issue id="1242372" tracker="bnc">VUL-0: CVE-2023-53140: kernel: scsi: core: Remove the /proc/scsi/${proc_name} directory earlier</issue>
  <issue id="1242377" tracker="bnc">VUL-0: CVE-2023-53131: kernel: SUNRPC: Fix a server shutdown leak</issue>
  <issue id="1242378" tracker="bnc">VUL-0: CVE-2022-49922: kernel: nfc: nfcmrvl: Fix potential memory leak in nfcmrvl_i2c_nci_send()</issue>
  <issue id="1242380" tracker="bnc">VUL-0: CVE-2023-53134: kernel: bnxt_en: Avoid order-5 memory allocation for TPA data</issue>
  <issue id="1242381" tracker="bnc">VUL-0: CVE-2023-53128: kernel: scsi: mpi3mr: Fix throttle_groups memory leak</issue>
  <issue id="1242382" tracker="bnc">VUL-0: CVE-2022-49931: kernel: IB/hfi1: Correctly move list in sc_disable()</issue>
  <issue id="1242385" tracker="bnc">VUL-0: CVE-2022-49835: kernel: ALSA: hda: fix potential memleak in 'add_widget_node'</issue>
  <issue id="1242387" tracker="bnc">VUL-0: CVE-2022-49790: kernel: Input: iforce - invert valid length check when fetching device IDs</issue>
  <issue id="1242389" tracker="bnc">VUL-0: CVE-2022-49792: kernel: iio: adc: mp2629: fix potential array out of bound access</issue>
  <issue id="1242391" tracker="bnc">VUL-0: CVE-2022-49793: kernel: iio: trigger: sysfs: fix possible memory leak in iio_sysfs_trig_init()</issue>
  <issue id="1242392" tracker="bnc">VUL-0: CVE-2022-49794: kernel: iio: adc: at91_adc: fix possible memory leak in at91_adc_allocate_trigger()</issue>
  <issue id="1242393" tracker="bnc">VUL-0: CVE-2023-53102: kernel: ice: xsk: disable txq irq before flushing hw</issue>
  <issue id="1242394" tracker="bnc">VUL-0: CVE-2022-49923: kernel: nfc: nxp-nci: Fix potential memory leak in nxp_nci_send()</issue>
  <issue id="1242398" tracker="bnc">VUL-0: CVE-2023-53114: kernel: i40e: Fix kernel crash during reboot when adapter is in recovery mode</issue>
  <issue id="1242399" tracker="bnc">VUL-0: CVE-2023-53099: kernel: firmware: xilinx: don't make a sleepable memory allocation from an atomic context</issue>
  <issue id="1242400" tracker="bnc">VUL-0: CVE-2023-53105: kernel: net/mlx5e: Fix cleanup null-ptr deref on encap lock</issue>
  <issue id="1242402" tracker="bnc">VUL-0: CVE-2022-49809: kernel: net/x25: Fix skb leak in x25_lapb_receive_frame()</issue>
  <issue id="1242403" tracker="bnc">VUL-0: CVE-2023-53123: kernel: PCI: s390: Fix use-after-free of PCI resources with per-function hotplug</issue>
  <issue id="1242405" tracker="bnc">VUL-0: CVE-2023-53109: kernel: net: tunnels: annotate lockless accesses to dev-&gt;needed_headroom</issue>
  <issue id="1242406" tracker="bnc">VUL-0: CVE-2022-49917: kernel: ipvs: fix WARNING in ip_vs_app_net_cleanup()</issue>
  <issue id="1242409" tracker="bnc">VUL-0: CVE-2022-49915: kernel: mISDN: fix possible memory leak in mISDN_register_device()</issue>
  <issue id="1242410" tracker="bnc">VUL-0: CVE-2023-53112: kernel: drm/i915/sseu: fix max_subslices array-index-out-of-bounds access</issue>
  <issue id="1242411" tracker="bnc">VUL-0: CVE-2023-53116: kernel: nvmet: avoid potential UAF in nvmet_req_complete()</issue>
  <issue id="1242415" tracker="bnc">VUL-0: CVE-2023-53092: kernel: interconnect: exynos: fix node leak in probe PM QoS error path</issue>
  <issue id="1242416" tracker="bnc">VUL-0: CVE-2022-49927: kernel: nfs4: Fix kmemleak when allocate slot failed</issue>
  <issue id="1242421" tracker="bnc">VUL-0: CVE-2022-49916: kernel: rose: Fix NULL pointer dereference in rose_send_frame()</issue>
  <issue id="1242422" tracker="bnc">VUL-0: CVE-2023-53108: kernel: net/iucv: Fix size of interrupt data</issue>
  <issue id="1242425" tracker="bnc">VUL-0: CVE-2022-49918: kernel: ipvs: fix WARNING in __ip_vs_cleanup_batch()</issue>
  <issue id="1242426" tracker="bnc">VUL-0: CVE-2022-49924: kernel: nfc: fdp: Fix potential memory leak in fdp_nci_send()</issue>
  <issue id="1242428" tracker="bnc">VUL-0: CVE-2023-53111: kernel: loop: Fix use-after-free issues</issue>
  <issue id="1242440" tracker="bnc">VUL-0: CVE-2022-49769: kernel: gfs2: Check sb_bsize_shift after reading superblock</issue>
  <issue id="1242443" tracker="bnc">VUL-0: CVE-2022-49839: kernel: scsi: scsi_transport_sas: Fix error handling in sas_phy_add()</issue>
  <issue id="1242448" tracker="bnc">VUL-0: CVE-2022-49901: kernel: blk-mq: Fix kmemleak in blk_mq_init_allocated_queue</issue>
  <issue id="1242449" tracker="bnc">VUL-0: CVE-2022-49892: kernel: ftrace: Fix use-after-free for dynamic ftrace_ops</issue>
  <issue id="1242452" tracker="bnc">VUL-0: CVE-2022-49910: kernel: Bluetooth: L2CAP: Fix use-after-free caused by l2cap_reassemble_sdu</issue>
  <issue id="1242453" tracker="bnc">VUL-0: CVE-2022-49909: kernel: Bluetooth: L2CAP: fix use-after-free in l2cap_conn_del()</issue>
  <issue id="1242454" tracker="bnc">VUL-0: CVE-2022-49900: kernel: i2c: piix4: Fix adapter not be removed in piix4_remove()</issue>
  <issue id="1242455" tracker="bnc">VUL-0: CVE-2022-49889: kernel: ring-buffer: Check for NULL cpu_buffer in ring_buffer_wake_waiters()</issue>
  <issue id="1242456" tracker="bnc">VUL-0: CVE-2022-49891: kernel: tracing: kprobe: Fix memory leak in test_gen_kprobe/kretprobe_cmd()</issue>
  <issue id="1242458" tracker="bnc">VUL-0: CVE-2022-49888: kernel: arm64: entry: avoid kprobe recursion</issue>
  <issue id="1242464" tracker="bnc">VUL-0: CVE-2022-49906: kernel: ibmvnic: Free rwi on reset success</issue>
  <issue id="1242465" tracker="bnc">VUL-0: CVE-2022-49902: kernel: block: Fix possible memory leak for rq_wb on add_disk failure</issue>
  <issue id="1242467" tracker="bnc">VUL-0: CVE-2022-49905: kernel: net/smc: Fix possible leaked pernet namespace in smc_init()</issue>
  <issue id="1242469" tracker="bnc">VUL-0: CVE-2022-49890: kernel: capabilities: fix potential memleak on error path from vfs_getxattr_alloc()</issue>
  <issue id="1242473" tracker="bnc">VUL-0: CVE-2022-49841: kernel: serial: imx: Add missing .thaw_noirq hook</issue>
  <issue id="1242474" tracker="bnc">VUL-0: CVE-2022-49886: kernel: x86/tdx: Panic on bad configs that #VE on "private" memory access</issue>
  <issue id="1242478" tracker="bnc">VUL-0: CVE-2022-49874: kernel: HID: hyperv: fix possible memory leak in mousevsc_probe()</issue>
  <issue id="1242481" tracker="bnc">VUL-0: CVE-2022-49881: kernel: wifi: cfg80211: fix memory leak in query_regdb_file()</issue>
  <issue id="1242484" tracker="bnc">VUL-0: CVE-2022-49842: kernel: ASoC: core: Fix use-after-free in snd_soc_exit()</issue>
  <issue id="1242489" tracker="bnc">VUL-0: CVE-2022-49810: kernel: netfs: Fix missing xas_retry() calls in xarray iteration</issue>
  <issue id="1242497" tracker="bnc">VUL-0: CVE-2022-49813: kernel: net: ena: Fix error handling in ena_init()</issue>
  <issue id="1242527" tracker="bnc">VUL-0: CVE-2022-49818: kernel: mISDN: fix misuse of put_device() in mISDN_register_device()</issue>
  <issue id="1242542" tracker="bnc">VUL-0: CVE-2022-49821: kernel: mISDN: fix possible memory leak in mISDN_dsp_element_register()</issue>
  <issue id="1242544" tracker="bnc">VUL-0: CVE-2022-49822: kernel: cifs: Fix connections leak when tlink setup failed</issue>
  <issue id="1242545" tracker="bnc">VUL-0: CVE-2022-49823: kernel: ata: libata-transport: fix error handling in ata_tdev_add()</issue>
  <issue id="1242547" tracker="bnc">VUL-0: CVE-2022-49824: kernel: ata: libata-transport: fix error handling in ata_tlink_add()</issue>
  <issue id="1242548" tracker="bnc">VUL-0: CVE-2022-49825: kernel: ata: libata-transport: fix error handling in ata_tport_add()</issue>
  <issue id="1242549" tracker="bnc">VUL-0: CVE-2022-49826: kernel: ata: libata-transport: fix double ata_host_put() in ata_tport_add()</issue>
  <issue id="1242550" tracker="bnc">VUL-0: CVE-2022-49868: kernel: phy: ralink: mt7621-pci: add sentinel to quirks table</issue>
  <issue id="1242551" tracker="bnc">VUL-0: CVE-2022-49870: kernel: capabilities: fix undefined behavior in bit shift for CAP_TO_MASK</issue>
  <issue id="1242558" tracker="bnc">VUL-0: CVE-2022-49871: kernel: net: tun: Fix memory leaks of napi_get_frags</issue>
  <issue id="1242570" tracker="bnc">VUL-0: CVE-2022-49865: kernel: ipv6: addrlabel: fix infoleak when sending struct ifaddrlblmsg to network</issue>
  <issue id="1242580" tracker="bnc">VUL-0: CVE-2022-49861: kernel: dmaengine: mv_xor_v2: Fix a resource leak in mv_xor_v2_remove()</issue>
  <issue id="1242586" tracker="bnc">VUL-0: CVE-2022-49860: kernel: dmaengine: ti: k3-udma-glue: fix memory leak when register device fail</issue>
  <issue id="1242589" tracker="bnc">VUL-0: CVE-2022-49858: kernel: octeontx2-pf: Fix SQE threshold checking</issue>
  <issue id="1242596" tracker="bnc">VUL-0: CVE-2025-23145: kernel: mptcp: fix NULL pointer in can_accept_new_subflow</issue>
  <issue id="1242597" tracker="bnc">VUL-0: CVE-2022-49770: kernel: ceph: avoid putting the realm twice when decoding snaps fails</issue>
  <issue id="1242685" tracker="bnc">VUL-0: CVE-2022-49864: kernel: drm/amdkfd: Fix NULL pointer dereference in svm_migrate_to_ram()</issue>
  <issue id="1242686" tracker="bnc">VUL-0: CVE-2022-49771: kernel: dm ioctl: fix misbehavior if list_versions races with module loading</issue>
  <issue id="1242688" tracker="bnc">VUL-0: CVE-2022-49853: kernel: net: macvlan: fix memory leaks of macvlan_common_newlink</issue>
  <issue id="1242689" tracker="bnc">VUL-0: CVE-2022-49827: kernel: drm: Fix potential null-ptr-deref in drm_vblank_destroy_worker()</issue>
  <issue id="1242695" tracker="bnc">VUL-0: CVE-2022-49834: kernel: nilfs2: fix use-after-free bug of ns_writer on remount</issue>
  <issue id="1242716" tracker="bnc">VUL-0: CVE-2022-49846: kernel: udf: Fix a slab-out-of-bounds write bug in udf_find_entry()</issue>
  <issue id="1242733" tracker="bnc">VUL-0: CVE-2022-49879: kernel: ext4: fix BUG_ON() when directory entry has invalid rec_len</issue>
  <issue id="1242734" tracker="bnc">VUL-0: CVE-2022-49880: kernel: ext4: fix warning in 'ext4_da_release_space'</issue>
  <issue id="1242735" tracker="bnc">VUL-0: CVE-2022-49885: kernel: ACPI: APEI: Fix integer overflow in ghes_estatus_pool_init()</issue>
  <issue id="1242736" tracker="bnc">VUL-0: CVE-2022-49887: kernel: media: meson: vdec: fix possible refcount leak in vdec_probe()</issue>
  <issue id="1242739" tracker="bnc">VUL-0: CVE-2023-53035: kernel: nilfs2: fix kernel-infoleak in nilfs_ioctl_wrap_copy()</issue>
  <issue id="1242740" tracker="bnc">VUL-0: CVE-2023-53036: kernel: drm/amdgpu: Fix call trace warning and hang when removing amdgpu device</issue>
  <issue id="1242743" tracker="bnc">VUL-0: CVE-2023-53038: kernel: scsi: lpfc: Check kzalloc() in lpfc_sli4_cgn_params_read()</issue>
  <issue id="1242744" tracker="bnc">VUL-0: CVE-2023-53089: kernel: ext4: fix task hung in ext4_xattr_delete_inode</issue>
  <issue id="1242745" tracker="bnc">VUL-0: CVE-2023-53039: kernel: HID: intel-ish-hid: ipc: Fix potential use-after-free in work function</issue>
  <issue id="1242746" tracker="bnc">VUL-0: CVE-2023-53040: kernel: ca8210: fix mac_len negative array access</issue>
  <issue id="1242747" tracker="bnc">VUL-0: CVE-2023-53041: kernel: scsi: qla2xxx: Perform lockless command completion in abort path</issue>
  <issue id="1242748" tracker="bnc">VUL-0: CVE-2023-53042: kernel: drm/amd/display: Do not set DRR on pipe Commit</issue>
  <issue id="1242749" tracker="bnc">VUL-0: CVE-2023-53052: kernel: cifs: fix use-after-free bug in refresh_cache_worker()</issue>
  <issue id="1242751" tracker="bnc">VUL-0: CVE-2023-53074: kernel: drm/amdgpu: fix ttm_bo calltrace warning in psp_hw_fini</issue>
  <issue id="1242752" tracker="bnc">VUL-0: CVE-2023-53077: kernel: drm/amd/display: fix shift-out-of-bounds in CalculateVMAndRowBytes</issue>
  <issue id="1242753" tracker="bnc">VUL-0: CVE-2023-53090: kernel: drm/amdkfd: Fix an illegal memory access</issue>
  <issue id="1242756" tracker="bnc">VUL-0: CVE-2023-53045: kernel: usb: gadget: u_audio: don't let userspace block driver unbind</issue>
  <issue id="1242759" tracker="bnc">VUL-0: CVE-2023-53044: kernel: dm stats: check for and propagate alloc_percpu failure</issue>
  <issue id="1242762" tracker="bnc">VUL-0: CVE-2025-37789: kernel: net: openvswitch: fix nested key length validation in the set() action</issue>
  <issue id="1242765" tracker="bnc">VUL-0: CVE-2023-53079: kernel: net/mlx5: Fix steering rules cleanup</issue>
  <issue id="1242767" tracker="bnc">VUL-0: CVE-2023-53091: kernel: ext4: update s_journal_inum if it changes after journal replay</issue>
  <issue id="1242778" tracker="bnc">VUL-0: kernel: cBPF issue</issue>
  <issue id="1242779" tracker="bnc">VUL-0: CVE-2023-53098: kernel: media: rc: gpio-ir-recv: add remove function</issue>
  <issue id="1242790" tracker="bnc">VUL-0: CVE-2023-53100: kernel: ext4: fix WARNING in ext4_update_inline_data</issue>
  <issue id="1242791" tracker="bnc">VUL-0: CVE-2023-53101: kernel: ext4: zero i_disksize when initializing the bootloader inode</issue>
  <issue id="1243047" tracker="bnc">VUL-0: CVE-2023-53145: kernel: Bluetooth: btsdio: fix use after free bug in btsdio_remove due to race condition</issue>
  <issue id="1243133" tracker="bnc">VUL-0: CVE-2022-49845: kernel: can: j1939: j1939_send_one(): fix missing CAN header initialization</issue>
  <issue id="1243737" tracker="bnc">Backport of [hv_netvsc]Fix error "nvsp_rndis_pkt_complete error status: 2"</issue>
  <issue id="1243919" tracker="bnc">kernel-debug exists</issue>
  <issue id="2022-3564" tracker="cve" />
  <issue id="2022-3619" tracker="cve" />
  <issue id="2022-3640" tracker="cve" />
  <issue id="2022-49762" tracker="cve" />
  <issue id="2022-49763" tracker="cve" />
  <issue id="2022-49769" tracker="cve" />
  <issue id="2022-49770" tracker="cve" />
  <issue id="2022-49771" tracker="cve" />
  <issue id="2022-49772" tracker="cve" />
  <issue id="2022-49773" tracker="cve" />
  <issue id="2022-49775" tracker="cve" />
  <issue id="2022-49776" tracker="cve" />
  <issue id="2022-49777" tracker="cve" />
  <issue id="2022-49779" tracker="cve" />
  <issue id="2022-49781" tracker="cve" />
  <issue id="2022-49783" tracker="cve" />
  <issue id="2022-49784" tracker="cve" />
  <issue id="2022-49786" tracker="cve" />
  <issue id="2022-49787" tracker="cve" />
  <issue id="2022-49788" tracker="cve" />
  <issue id="2022-49789" tracker="cve" />
  <issue id="2022-49790" tracker="cve" />
  <issue id="2022-49792" tracker="cve" />
  <issue id="2022-49793" tracker="cve" />
  <issue id="2022-49794" tracker="cve" />
  <issue id="2022-49795" tracker="cve" />
  <issue id="2022-49796" tracker="cve" />
  <issue id="2022-49797" tracker="cve" />
  <issue id="2022-49799" tracker="cve" />
  <issue id="2022-49800" tracker="cve" />
  <issue id="2022-49801" tracker="cve" />
  <issue id="2022-49802" tracker="cve" />
  <issue id="2022-49807" tracker="cve" />
  <issue id="2022-49809" tracker="cve" />
  <issue id="2022-49810" tracker="cve" />
  <issue id="2022-49812" tracker="cve" />
  <issue id="2022-49813" tracker="cve" />
  <issue id="2022-49818" tracker="cve" />
  <issue id="2022-49821" tracker="cve" />
  <issue id="2022-49822" tracker="cve" />
  <issue id="2022-49823" tracker="cve" />
  <issue id="2022-49824" tracker="cve" />
  <issue id="2022-49825" tracker="cve" />
  <issue id="2022-49826" tracker="cve" />
  <issue id="2022-49827" tracker="cve" />
  <issue id="2022-49830" tracker="cve" />
  <issue id="2022-49832" tracker="cve" />
  <issue id="2022-49834" tracker="cve" />
  <issue id="2022-49835" tracker="cve" />
  <issue id="2022-49836" tracker="cve" />
  <issue id="2022-49837" tracker="cve" />
  <issue id="2022-49839" tracker="cve" />
  <issue id="2022-49841" tracker="cve" />
  <issue id="2022-49842" tracker="cve" />
  <issue id="2022-49845" tracker="cve" />
  <issue id="2022-49846" tracker="cve" />
  <issue id="2022-49850" tracker="cve" />
  <issue id="2022-49853" tracker="cve" />
  <issue id="2022-49858" tracker="cve" />
  <issue id="2022-49860" tracker="cve" />
  <issue id="2022-49861" tracker="cve" />
  <issue id="2022-49863" tracker="cve" />
  <issue id="2022-49864" tracker="cve" />
  <issue id="2022-49865" tracker="cve" />
  <issue id="2022-49868" tracker="cve" />
  <issue id="2022-49869" tracker="cve" />
  <issue id="2022-49870" tracker="cve" />
  <issue id="2022-49871" tracker="cve" />
  <issue id="2022-49874" tracker="cve" />
  <issue id="2022-49879" tracker="cve" />
  <issue id="2022-49880" tracker="cve" />
  <issue id="2022-49881" tracker="cve" />
  <issue id="2022-49885" tracker="cve" />
  <issue id="2022-49886" tracker="cve" />
  <issue id="2022-49887" tracker="cve" />
  <issue id="2022-49888" tracker="cve" />
  <issue id="2022-49889" tracker="cve" />
  <issue id="2022-49890" tracker="cve" />
  <issue id="2022-49891" tracker="cve" />
  <issue id="2022-49892" tracker="cve" />
  <issue id="2022-49900" tracker="cve" />
  <issue id="2022-49901" tracker="cve" />
  <issue id="2022-49902" tracker="cve" />
  <issue id="2022-49905" tracker="cve" />
  <issue id="2022-49906" tracker="cve" />
  <issue id="2022-49908" tracker="cve" />
  <issue id="2022-49909" tracker="cve" />
  <issue id="2022-49910" tracker="cve" />
  <issue id="2022-49915" tracker="cve" />
  <issue id="2022-49916" tracker="cve" />
  <issue id="2022-49917" tracker="cve" />
  <issue id="2022-49918" tracker="cve" />
  <issue id="2022-49921" tracker="cve" />
  <issue id="2022-49922" tracker="cve" />
  <issue id="2022-49923" tracker="cve" />
  <issue id="2022-49924" tracker="cve" />
  <issue id="2022-49925" tracker="cve" />
  <issue id="2022-49927" tracker="cve" />
  <issue id="2022-49928" tracker="cve" />
  <issue id="2022-49929" tracker="cve" />
  <issue id="2022-49931" tracker="cve" />
  <issue id="2023-1990" tracker="cve" />
  <issue id="2023-28866" tracker="cve" />
  <issue id="2023-53035" tracker="cve" />
  <issue id="2023-53036" tracker="cve" />
  <issue id="2023-53038" tracker="cve" />
  <issue id="2023-53039" tracker="cve" />
  <issue id="2023-53040" tracker="cve" />
  <issue id="2023-53041" tracker="cve" />
  <issue id="2023-53042" tracker="cve" />
  <issue id="2023-53044" tracker="cve" />
  <issue id="2023-53045" tracker="cve" />
  <issue id="2023-53049" tracker="cve" />
  <issue id="2023-53052" tracker="cve" />
  <issue id="2023-53054" tracker="cve" />
  <issue id="2023-53056" tracker="cve" />
  <issue id="2023-53057" tracker="cve" />
  <issue id="2023-53058" tracker="cve" />
  <issue id="2023-53059" tracker="cve" />
  <issue id="2023-53060" tracker="cve" />
  <issue id="2023-53062" tracker="cve" />
  <issue id="2023-53064" tracker="cve" />
  <issue id="2023-53065" tracker="cve" />
  <issue id="2023-53066" tracker="cve" />
  <issue id="2023-53068" tracker="cve" />
  <issue id="2023-53070" tracker="cve" />
  <issue id="2023-53071" tracker="cve" />
  <issue id="2023-53073" tracker="cve" />
  <issue id="2023-53074" tracker="cve" />
  <issue id="2023-53075" tracker="cve" />
  <issue id="2023-53077" tracker="cve" />
  <issue id="2023-53078" tracker="cve" />
  <issue id="2023-53079" tracker="cve" />
  <issue id="2023-53081" tracker="cve" />
  <issue id="2023-53082" tracker="cve" />
  <issue id="2023-53084" tracker="cve" />
  <issue id="2023-53087" tracker="cve" />
  <issue id="2023-53089" tracker="cve" />
  <issue id="2023-53090" tracker="cve" />
  <issue id="2023-53091" tracker="cve" />
  <issue id="2023-53092" tracker="cve" />
  <issue id="2023-53093" tracker="cve" />
  <issue id="2023-53095" tracker="cve" />
  <issue id="2023-53096" tracker="cve" />
  <issue id="2023-53098" tracker="cve" />
  <issue id="2023-53099" tracker="cve" />
  <issue id="2023-53100" tracker="cve" />
  <issue id="2023-53101" tracker="cve" />
  <issue id="2023-53102" tracker="cve" />
  <issue id="2023-53105" tracker="cve" />
  <issue id="2023-53106" tracker="cve" />
  <issue id="2023-53108" tracker="cve" />
  <issue id="2023-53109" tracker="cve" />
  <issue id="2023-53111" tracker="cve" />
  <issue id="2023-53112" tracker="cve" />
  <issue id="2023-53114" tracker="cve" />
  <issue id="2023-53116" tracker="cve" />
  <issue id="2023-53118" tracker="cve" />
  <issue id="2023-53119" tracker="cve" />
  <issue id="2023-53123" tracker="cve" />
  <issue id="2023-53124" tracker="cve" />
  <issue id="2023-53125" tracker="cve" />
  <issue id="2023-53128" tracker="cve" />
  <issue id="2023-53131" tracker="cve" />
  <issue id="2023-53134" tracker="cve" />
  <issue id="2023-53137" tracker="cve" />
  <issue id="2023-53139" tracker="cve" />
  <issue id="2023-53140" tracker="cve" />
  <issue id="2023-53142" tracker="cve" />
  <issue id="2023-53143" tracker="cve" />
  <issue id="2023-53145" tracker="cve" />
  <issue id="2024-26804" tracker="cve" />
  <issue id="2024-53168" tracker="cve" />
  <issue id="2024-56558" tracker="cve" />
  <issue id="2025-21999" tracker="cve" />
  <issue id="2025-22056" tracker="cve" />
  <issue id="2025-23145" tracker="cve" />
  <issue id="2025-37789" tracker="cve" />
  <category>security</category>
  <rating>important</rating>
  <packager>Jeffreycheung</packager>
  <reboot_needed/>
  <description>
The SUSE Linux Enterprise 15 SP5 RT kernel was updated to receive various security bugfixes.


The following security bugs were fixed:

- CVE-2022-49775: tcp: cdg: allow tcp_cdg_release() to be called multiple times (bsc#1242245).
- CVE-2024-53168: net: make sock_inuse_add() available (bsc#1234887).
- CVE-2024-56558: nfsd: make sure exp active before svc_export_show (bsc#1235100).
- CVE-2025-21999: proc: fix UAF in proc_get_inode() (bsc#1240802).
- CVE-2025-22056: netfilter: nft_tunnel: fix geneve_opt type confusion addition (bsc#1241525).
- CVE-2025-23145: mptcp: fix NULL pointer in can_accept_new_subflow (bsc#1242596).
- CVE-2025-37789: net: openvswitch: fix nested key length validation in the set() action (bsc#1242762).

The following non-security bugs were fixed:

- Drivers: hv: Allow vmbus_sendpacket_mpb_desc() to create multiple ranges (bsc#1243737).
- Remove debug flavor (bsc#1243919).
- arm64: bpf: Add BHB mitigation to the epilogue for cBPF programs (bsc#1242778).
- arm64: bpf: Only mitigate cBPF programs loaded by unprivileged users (bsc#1242778).
- arm64: insn: Add support for encoding DSB (bsc#1242778).
- arm64: proton-pack: Add new CPUs 'k' values for branch mitigation (bsc#1242778).
- arm64: proton-pack: Expose whether the branchy loop k value (bsc#1242778).
- arm64: proton-pack: Expose whether the platform is mitigated by firmware (bsc#1242778).
- hv_netvsc: Preserve contiguous PFN grouping in the page buffer array (bsc#1243737).
- hv_netvsc: Remove rmsg_pgcnt (bsc#1243737).
- hv_netvsc: Use vmbus_sendpacket_mpb_desc() to send VMBus messages (bsc#1243737).
- mtd: phram: Add the kernel lock down check (bsc#1232649).
- net :mana :Add remaining GDMA stats for MANA to ethtool (bsc#1234395).
- net :mana :Request a V2 response version for MANA_QUERY_GF_STAT (bsc#1234395).
- net: mana: Add gdma stats to ethtool output for mana (bsc#1234395).
- nvme-pci: acquire cq_poll_lock in nvme_poll_irqdisable (bsc#1223096).
- ocfs2: fix the issue with discontiguous allocation in the global_bitmap (git-fixes).
- powerpc/pseries/iommu: IOMMU incorrectly marks MMIO range in DDW (bsc#1218470 ltc#204531).
- scsi: core: Fix unremoved procfs host directory regression (git-fixes).
- tcp: Dump bound-only sockets in inet_diag (bsc#1204562).
- tpm, tpm_tis: Workaround failed command reception on Infineon devices (bsc#1235870).
- tpm: tis: Double the timeout B to 4s (bsc#1235870).
- x86/bhi: Do not set BHI_DIS_S in 32-bit mode (bsc#1242778).
- x86/bpf: Add IBHF call at end of classic BPF (bsc#1242778).
- x86/bpf: Call branch history clearing sequence on exit (bsc#1242778).
</description>
	<summary>Security update for the Linux Kernel</summary>
</patchinfo>
openSUSE Build Service is sponsored by