File _patchinfo of Package patchinfo.42248

<patchinfo incident="42248">
  <issue tracker="bnc" id="1012628">Continuous stable update tracker for Tumbleweed</issue>
  <issue tracker="bnc" id="1065729">[trackerbug] 4.12 powerpc base kernel fixes</issue>
  <issue tracker="bnc" id="1194869">[TRACKERBUG] 5.14 powerpc base kernel fixes</issue>
  <issue tracker="bnc" id="1214635">Backport SEV Live Migration fix into SLES-15 SP4 and greater</issue>
  <issue tracker="bnc" id="1214847">LIO target_cmd_counter memory leak</issue>
  <issue tracker="bnc" id="1215146">VUL-0: CVE-2023-42752: kernel: integer overflow in Linux kernel leading exploitable memory access</issue>
  <issue tracker="bnc" id="1215211">io_uring functional and performance backports (SLE 15 SP6)</issue>
  <issue tracker="bnc" id="1215344">s390/dcssblk: fix kernel crash with list_add corruption</issue>
  <issue tracker="bnc" id="1216062">blk-cgroup: Fix NULL deref caused by blkg_policy_data being installed  before init</issue>
  <issue tracker="bnc" id="1216436">Backport block layer patches from 6.6</issue>
  <issue tracker="bnc" id="1219165">fstests generic/735 crash in ext4</issue>
  <issue tracker="bnc" id="1220419">SLE15-SP6 networking performance backports and fixes</issue>
  <issue tracker="bnc" id="1223731">VUL-0: CVE-2024-26944: kernel: btrfs: zoned: use-after-free in do_zone_finish()</issue>
  <issue tracker="bnc" id="1234163">[PATCH] ext4: correct grp validation in ext4_mb_good_group</issue>
  <issue tracker="bnc" id="1245193">backport nvmet-loop fixes</issue>
  <issue tracker="bnc" id="1245449">Kernel stack trace for executable programs on cifs-shares</issue>
  <issue tracker="bnc" id="1246328">VUL-0: CVE-2025-38321: kernel: smb: Log an error when close_all_cached_dirs fails</issue>
  <issue tracker="bnc" id="1247500">nvme over FC: kernel soft lockup on module removal</issue>
  <issue tracker="bnc" id="1248886">refcount_t underflow in smb2_query_info_compound() &#8212; ref:_00D1igLOd._500Trh3Fg7:ref</issue>
  <issue tracker="bnc" id="1249256">VUL-0: CVE-2025-38728: kernel: smb3: fix for slab out of bounds on mount to ksmbd</issue>
  <issue tracker="bnc" id="1250334">VUL-0: CVE-2025-39890: kernel: wifi: ath12k: fix memory leak in ath12k_service_ready_ext_event - memory leak triggerable over the air</issue>
  <issue tracker="bnc" id="1252046">VUL-0: CVE-2025-39977: kernel: futex: Prevent use-after-free during requeue-PI</issue>
  <issue tracker="bnc" id="1252342">VUL-0: CVE-2025-40006: kernel: mm/hugetlb: fix folio is still mapped when deleted</issue>
  <issue tracker="bnc" id="1252686">VUL-0: CVE-2025-40024: kernel: vhost: Take a reference on the task in struct vhost_task.</issue>
  <issue tracker="bnc" id="1252776">VUL-0: CVE-2025-40081: kernel: perf: arm_spe: Prevent overflow in PERF_IDX2OFF()</issue>
  <issue tracker="bnc" id="1252808">VUL-0: CVE-2025-40053: kernel: net: dlink: handle copy_thresh allocation failure</issue>
  <issue tracker="bnc" id="1252824">VUL-0: CVE-2025-40033: kernel: remoteproc: pru: Fix potential NULL pointer dereference in pru_rproc_set_ctable()</issue>
  <issue tracker="bnc" id="1252861">VUL-0: CVE-2025-40042: kernel: tracing: Fix race condition in kprobe initialization causing NULL pointer dereference</issue>
  <issue tracker="bnc" id="1252919">VUL-0: CVE-2025-40102: kernel: KVM: arm64: Prevent access to vCPU events before init</issue>
  <issue tracker="bnc" id="1252973">kernel firmware load issue after update to 15.6</issue>
  <issue tracker="bnc" id="1253155">Nvidia Grace: Backport: spi: tegra210-quad: Improve timeout handling under high system load</issue>
  <issue tracker="bnc" id="1253262">FVT1110.10:RT:SRIOV: EEH functionality is broken with 6.4.0-150600.23.70.1 and later [REGRESSION]</issue>
  <issue tracker="bnc" id="1253342">VUL-0: CVE-2025-40135: kernel: ipv6: use RCU in ip6_xmit()</issue>
  <issue tracker="bnc" id="1253386">VUL-0: CVE-2025-40134: kernel: dm: fix NULL pointer dereference in __dm_suspend()</issue>
  <issue tracker="bnc" id="1253402">VUL-0: CVE-2025-40158: kernel: ipv6: use RCU in ip6_output()</issue>
  <issue tracker="bnc" id="1253408">VUL-0: CVE-2025-40153: kernel: mm: hugetlb: avoid soft lockup when mprotect to large memory area</issue>
  <issue tracker="bnc" id="1253413">VUL-0: CVE-2025-40170: kernel: net: use dst_dev_rcu() in sk_setup_caps()</issue>
  <issue tracker="bnc" id="1253442">VUL-0: CVE-2025-40179: kernel: ext4: verify orphan file size is not too big</issue>
  <issue tracker="bnc" id="1253458">VUL-0: CVE-2025-40167: kernel: ext4: detect invalid INLINE_DATA + EXTENTS flag combination</issue>
  <issue tracker="bnc" id="1253463">VUL-0: CVE-2025-40178: kernel: pid: Add a check for ns is null in pid_nr_ns</issue>
  <issue tracker="bnc" id="1253647">VUL-0: CVE-2025-40187: kernel: net/sctp: fix a null dereference in sctp_disposition sctp_sf_do_5_1D_ce()</issue>
  <issue tracker="bnc" id="1254119">Update Broadcom Emulex lpfc driver for SL-16.1  to 14.4.0.12</issue>
  <issue tracker="bnc" id="1254126">VUL-0: CVE-2025-40211: kernel: ACPI: video: Fix use-after-free in acpi_video_switch_brightness()</issue>
  <issue tracker="bnc" id="1254373">L3: NULL pointer dereference in tracing_open_file_tr() &#8212; thread::n_Aj3YOeKE230H3XSjeOPys:: / thread::yqkPMUgSL5qnbGNvOyS24Ss::</issue>
  <issue tracker="bnc" id="1254518">VUL-0: CVE-2025-40219: kernel: PCI/IOV: Add PCI rescan-remove locking when enabling/disabling SR-IOV</issue>
  <issue tracker="bnc" id="1254520">VUL-0: CVE-2025-40220: kernel: fuse: fix livelock in synchronous file put from fuseblk workers</issue>
  <issue tracker="bnc" id="1254599">VUL-0: CVE-2023-53768: kernel: regmap-irq: Fix out-of-bounds access when allocating config buffers</issue>
  <issue tracker="bnc" id="1254606">VUL-0: CVE-2023-53762: kernel: Bluetooth: hci_sync: Fix UAF in hci_disconnect_all_sync</issue>
  <issue tracker="bnc" id="1254611">VUL-0: CVE-2023-53750: kernel: pinctrl: freescale: Fix a memory out of bounds when num_configs is 1</issue>
  <issue tracker="bnc" id="1254613">VUL-0: CVE-2023-53752: kernel: net: deal with integer overflows in kmalloc_reserve()</issue>
  <issue tracker="bnc" id="1254615">VUL-0: CVE-2025-40331: kernel: sctp: Prevent TOCTOU out-of-bounds write</issue>
  <issue tracker="bnc" id="1254621">VUL-0: CVE-2025-40329: kernel: drm/sched: Fix deadlock in drm_sched_entity_kill_jobs_cb</issue>
  <issue tracker="bnc" id="1254623">VUL-0: CVE-2023-53828: kernel: Bluetooth: hci_sync: Avoid use-after-free in dbg for hci_add_adv_monitor()</issue>
  <issue tracker="bnc" id="1254624">VUL-0: CVE-2025-40328: kernel: smb: client: fix potential UAF in smb2_close_cached_fid()</issue>
  <issue tracker="bnc" id="1254626">VUL-0: CVE-2023-53860: kernel: dm: don't attempt to queue IO under RCU protection</issue>
  <issue tracker="bnc" id="1254648">VUL-0: CVE-2023-53857: kernel: bpf: bpf_sk_storage: Fix invalid wait context lockdep report</issue>
  <issue tracker="bnc" id="1254649">VUL-0: CVE-2023-53844: kernel: drm/ttm: Don't leak a resource on swapout move error</issue>
  <issue tracker="bnc" id="1254653">VUL-0: CVE-2023-53852: kernel: nvme-core: fix memory leak in dhchap_secret_store</issue>
  <issue tracker="bnc" id="1254655">VUL-0: CVE-2023-53839: kernel: dccp: fix data-race around dp-&gt;dccps_mss_cache</issue>
  <issue tracker="bnc" id="1254657">VUL-0: CVE-2023-53863: kernel: netlink: do not hard code device address lenth in fdb dumps</issue>
  <issue tracker="bnc" id="1254660">VUL-0: CVE-2023-53834: kernel: iio: adc: ina2xx: avoid NULL pointer dereference on OF device match</issue>
  <issue tracker="bnc" id="1254661">VUL-0: CVE-2023-53856: kernel: of: overlay: Call of_changeset_init() early</issue>
  <issue tracker="bnc" id="1254663">VUL-0: CVE-2023-53759: HID: hidraw: fix data race on device refcount</issue>
  <issue tracker="bnc" id="1254669">VUL-0: CVE-2023-53821: kernel: ip6_vti: fix slab-use-after-free in decode_session6</issue>
  <issue tracker="bnc" id="1254677">VUL-0: CVE-2023-53850: kernel: iavf: use internal state to free traffic IRQs</issue>
  <issue tracker="bnc" id="1254678">VUL-0: CVE-2023-53861: kernel: ext4: correct grp validation in ext4_mb_good_group</issue>
  <issue tracker="bnc" id="1254688">VUL-0: CVE-2023-53855: kernel: net: dsa: ocelot: call dsa_tag_8021q_unregister() under rtnl_lock() on driver remove</issue>
  <issue tracker="bnc" id="1254690">VUL-0: CVE-2023-53842: kernel: ASoC: codecs: wcd-mbhc-v2: fix resource leaks on component remove</issue>
  <issue tracker="bnc" id="1254691">VUL-0: CVE-2023-53823: kernel: block/rq_qos: protect rq_qos apis with a new lock</issue>
  <issue tracker="bnc" id="1254693">VUL-0: CVE-2023-53836: kernel: bpf, sockmap: Fix skb refcnt race after locking changes</issue>
  <issue tracker="bnc" id="1254695">VUL-0: CVE-2023-53851: kernel: drm/msm/dp: Drop aux devices together with DP controller</issue>
  <issue tracker="bnc" id="1254698">VUL-0: CVE-2023-53847: kernel: usb-storage: alauda: Fix uninit-value in alauda_check_media()</issue>
  <issue tracker="bnc" id="1254701">VUL-0: CVE-2023-53831: kernel: net: read sk-&gt;sk_family once in sk_mc_loop()</issue>
  <issue tracker="bnc" id="1254704">VUL-0: CVE-2023-53858: kernel: tty: serial: samsung_tty: Fix a memory leak in s3c24xx_serial_getclk() in case of error</issue>
  <issue tracker="bnc" id="1254705">VUL-0: CVE-2023-53843: kernel: net: openvswitch: reject negative ifindex</issue>
  <issue tracker="bnc" id="1254707">VUL-0: CVE-2023-53825: kernel: kcm: Fix error handling for SOCK_DGRAM in kcm_sendmsg().</issue>
  <issue tracker="bnc" id="1254712">VUL-0: CVE-2023-53819: kernel: amdgpu: validate offset_in_bo of drm_amdgpu_gem_va</issue>
  <issue tracker="bnc" id="1254715">VUL-0: CVE-2023-53815: kernel: posix-timers: Prevent RT livelock in itimer_delete()</issue>
  <issue tracker="bnc" id="1254717">VUL-0: CVE-2023-53813: kernel: ext4: fix rbtree traversal bug in ext4_mb_use_preallocated</issue>
  <issue tracker="bnc" id="1254723">VUL-0: CVE-2023-53808: kernel: wifi: mwifiex: fix memory leak in mwifiex_histogram_read()</issue>
  <issue tracker="bnc" id="1254724">VUL-0: CVE-2023-53807: kernel: clk: clocking-wizard: Fix Oops in clk_wzrd_register_divider()</issue>
  <issue tracker="bnc" id="1254732">VUL-0: CVE-2023-53799: kernel: crypto: api - Use work queue in crypto_destroy_instance</issue>
  <issue tracker="bnc" id="1254733">VUL-0: CVE-2023-53797: kernel: HID: wacom: Use ktime_t rather than int when dealing with timestamps</issue>
  <issue tracker="bnc" id="1254737">VUL-0: CVE-2023-53795: kernel: iommufd: IOMMUFD_DESTROY should not increase the refcount</issue>
  <issue tracker="bnc" id="1254739">VUL-0: CVE-2023-53793: kernel: perf tool x86: Fix perf_env memory leak</issue>
  <issue tracker="bnc" id="1254742">VUL-0: CVE-2023-53791: kernel: md: fix warning for holder mismatch from export_rdev()</issue>
  <issue tracker="bnc" id="1254743">VUL-0: CVE-2023-53792: kernel: nvme-core: fix memory leak in dhchap_ctrl_secret</issue>
  <issue tracker="bnc" id="1254749">VUL-0: CVE-2023-53777: kernel: erofs: kill hooked chains to avoid loops on deduplicated compressed images</issue>
  <issue tracker="bnc" id="1254750">VUL-0: CVE-2023-53787: kernel: regulator: da9063: fix null pointer deref with partial DT config</issue>
  <issue tracker="bnc" id="1254753">VUL-0: CVE-2023-53848: kernel: md/raid5-cache: fix a deadlock in r5l_exit_log()</issue>
  <issue tracker="bnc" id="1254754">VUL-0: CVE-2023-53864: kernel: drm/mxsfb: Disable overlay plane in mxsfb_plane_overlay_atomic_disable()</issue>
  <issue tracker="bnc" id="1254758">VUL-0: CVE-2023-53782: kernel: dccp: Fix out of bounds access in DCCP error handler</issue>
  <issue tracker="bnc" id="1254761">VUL-0: CVE-2023-53778: kernel: accel/qaic: Clean up integer overflow checking in map_user_pages()</issue>
  <issue tracker="bnc" id="1254762">VUL-0: CVE-2023-53865: kernel: btrfs: fix warning when putting transaction with qgroups enabled after abort</issue>
  <issue tracker="bnc" id="1254765">VUL-0: CVE-2023-53784: kernel: drm: bridge: dw_hdmi: fix connector access for scdc</issue>
  <issue tracker="bnc" id="1254782">VUL-0: CVE-2023-53743: kernel: PCI: Free released resource after coalescing</issue>
  <issue tracker="bnc" id="1254791">VUL-0: CVE-2025-40324: kernel: NFSD: Fix crash in nfsd4_read_release()</issue>
  <issue tracker="bnc" id="1254793">VUL-0: CVE-2025-40320: kernel: smb: client: fix potential cfid UAF in smb2_query_info_compound</issue>
  <issue tracker="bnc" id="1254795">VUL-0: CVE-2025-40321: kernel: wifi: brcmfmac: fix crash while sending Action Frames in standalone AP Mode</issue>
  <issue tracker="bnc" id="1254796">VUL-0: CVE-2025-40317: kernel: regmap: slimbus: fix bus_context pointer in regmap init calls</issue>
  <issue tracker="bnc" id="1254797">VUL-0: CVE-2025-40316: kernel: drm/mediatek: Fix device use-after-free on unbind</issue>
  <issue tracker="bnc" id="1254798">VUL-0: CVE-2025-40318: kernel: Bluetooth: hci_sync: fix race in hci_cmd_sync_dequeue_once</issue>
  <issue tracker="bnc" id="1254813">VUL-0: CVE-2025-40233: kernel: ocfs2: clear extent cache after moving/defragmenting extents</issue>
  <issue tracker="bnc" id="1254828">VUL-0: CVE-2025-40273: kernel: NFSD: free copynotify stateid in nfs4_free_ol_stateid()</issue>
  <issue tracker="bnc" id="1254829">VUL-0: CVE-2025-40275: kernel: ALSA: usb-audio: Fix NULL pointer dereference in snd_usb_mixer_controls_badd</issue>
  <issue tracker="bnc" id="1254832">VUL-0: CVE-2025-40272: kernel: mm/secretmem: fix use-after-free race in fault handler</issue>
  <issue tracker="bnc" id="1254840">VUL-0: CVE-2025-40262: kernel: Input: imx_sc_key - fix memory corruption on unload</issue>
  <issue tracker="bnc" id="1254843">VUL-0: CVE-2025-40258: kernel: mptcp: fix race condition in mptcp_schedule_work()</issue>
  <issue tracker="bnc" id="1254847">VUL-0: CVE-2025-40280: kernel: tipc: Fix use-after-free in tipc_mon_reinit_self().</issue>
  <issue tracker="bnc" id="1254850">VUL-0: CVE-2025-40282: kernel: Bluetooth: 6lowpan: reset link-local header on ipv6 recv path</issue>
  <issue tracker="bnc" id="1254851">VUL-0: CVE-2025-40256: kernel: xfrm: also call xfrm_state_delete_tunnel at destroy time for states that were never added</issue>
  <issue tracker="bnc" id="1254858">VUL-0: CVE-2025-40283: kernel: Bluetooth: btusb: reorder cleanup in btusb_disconnect to avoid UAF</issue>
  <issue tracker="bnc" id="1254860">VUL-0: CVE-2025-40284: kernel: Bluetooth: MGMT: cancel mesh send timer when hdev removed</issue>
  <issue tracker="bnc" id="1254894">VUL-0: CVE-2025-40277: kernel: drm/vmwgfx: Validate command header size against SVGA_CMD_MAX_DATASIZE</issue>
  <issue tracker="bnc" id="1254918">VUL-0: CVE-2023-53785: kernel: mt76: mt7921: don't assume adequate headroom for SDIO headers</issue>
  <issue tracker="bnc" id="1254957">VUL-0: CVE-2025-40223: kernel: most: usb: Fix use-after-free in hdm_disconnect</issue>
  <issue tracker="bnc" id="1254959">VUL-0: CVE-2025-40215: kernel: xfrm: delete x-&gt;tunnel as we delete x</issue>
  <issue tracker="bnc" id="1254983">VUL-0: CVE-2023-53846: kernel: f2fs: fix to do sanity check on direct node in truncate_dnode()</issue>
  <issue tracker="bnc" id="1255005">VUL-0: CVE-2023-53766: kernel: FS: JFS: Check for read-only mounted filesystem in txBegin</issue>
  <issue tracker="bnc" id="1255009">VUL-0: CVE-2023-53841: kernel: devlink: report devlink_port_type_warn source device</issue>
  <issue tracker="bnc" id="1255026">SLES15SP6[FW1110] [Kernel Version: 6.4.0-150600.23.78-default] CPU Governor Fails to Select the Correct Idle State(Snooze/CEDE)</issue>
  <issue tracker="bnc" id="1255033">VUL-0: CVE-2025-40244: kernel: hfsplus: fix KMSAN uninit-value issue in __hfsplus_ext_cache_extent()</issue>
  <issue tracker="bnc" id="1255034">VUL-0: CVE-2025-40304: kernel: fbdev: Add bounds checking in bit_putcs to fix vmalloc-out-of-bounds</issue>
  <issue tracker="bnc" id="1255035">VUL-0: CVE-2025-40269: kernel: ALSA: usb-audio: Fix potential overflow of PCM transfer buffer</issue>
  <issue tracker="bnc" id="1255041">VUL-0: CVE-2025-40310: kernel: amd/amdkfd: resolve a race in amdgpu_amdkfd_device_fini_sw</issue>
  <issue tracker="bnc" id="1255046">VUL-0: CVE-2025-40312: kernel: jfs: Verify inode mode when loading from disk</issue>
  <issue tracker="bnc" id="1255057">VUL-0: CVE-2025-40288: kernel: drm/amdgpu: Fix NULL pointer dereference in VRAM logic for APU devices</issue>
  <issue tracker="bnc" id="1255062">VUL-0: CVE-2025-40306: kernel: orangefs: fix xattr related buffer overflow...</issue>
  <issue tracker="bnc" id="1255064">VUL-0: CVE-2025-40308: kernel: Bluetooth: bcsp: receive data only if registered</issue>
  <issue tracker="bnc" id="1255065">VUL-0: CVE-2025-40309: kernel: Bluetooth: SCO: Fix UAF on sco_conn_free</issue>
  <issue tracker="bnc" id="1255068">VUL-0: CVE-2025-40311: kernel: accel/habanalabs: support mapping cb with vmalloc-backed coherent memory</issue>
  <issue tracker="bnc" id="1255072">VUL-0: CVE-2025-40314: kernel: usb: cdns3: gadget: Use-after-free during failed initialization and exit of cdnsp gadget</issue>
  <issue tracker="bnc" id="1255075">VUL-0: CVE-2025-40242: kernel: gfs2: Fix unlikely race in gdlm_put_lock</issue>
  <issue tracker="bnc" id="1255077">VUL-0: CVE-2025-40263: kernel: Input: cros_ec_keyb - fix an invalid memory access</issue>
  <issue tracker="bnc" id="1255083">VUL-0: CVE-2025-40315: kernel: usb: gadget: f_fs: Fix epfile null pointer access after ep enable.</issue>
  <issue tracker="bnc" id="1255092">VUL-0: CVE-2025-40322: kernel: fbdev: bitblit: bound-check glyph index in bit_putcs*</issue>
  <issue tracker="bnc" id="1255094">VUL-0: CVE-2025-40323: kernel: fbcon: Set fb_display[i]-&gt;mode to NULL when the mode is released</issue>
  <issue tracker="bnc" id="1255100">VUL-0: CVE-2025-68168: kernel: jfs: fix uninitialized waitqueue in transaction manager</issue>
  <issue tracker="bnc" id="1255122">VUL-0: CVE-2025-68303: kernel: platform/x86: intel: punit_ipc: fix memory corruption</issue>
  <issue tracker="bnc" id="1255135">VUL-0: CVE-2025-68185: kernel: nfs4_setup_readdir(): insufficient locking for -&gt;d_parent-&gt;d_inode dereferencing</issue>
  <issue tracker="bnc" id="1255146">VUL-0: CVE-2025-68307: kernel: can: gs_usb: gs_usb_xmit_callback(): fix handling of failed transmitted URBs</issue>
  <issue tracker="bnc" id="1255149">VUL-0: CVE-2025-68308: kernel: can: kvaser_usb: leaf: Fix potential infinite loop in command parsers</issue>
  <issue tracker="bnc" id="1255152">VUL-0: CVE-2025-68287: kernel: usb: dwc3: Fix race condition between concurrent dwc3_remove_requests() call paths</issue>
  <issue tracker="bnc" id="1255154">VUL-0: CVE-2025-68290: kernel: most: usb: fix double free on late probe failure</issue>
  <issue tracker="bnc" id="1255155">VUL-0: CVE-2025-68289: kernel: usb: gadget: f_eem: Fix memory leak in eem_unwrap</issue>
  <issue tracker="bnc" id="1255163">VUL-0: CVE-2023-53794: kernel: cifs: fix session state check in reconnect to avoid use-after-free issue</issue>
  <issue tracker="bnc" id="1255167">VUL-0: CVE-2025-68257: kernel: comedi: check device's attached status in compat ioctls</issue>
  <issue tracker="bnc" id="1255169">VUL-0: CVE-2025-68305: kernel: Bluetooth: hci_sock: Prevent race in socket write iter and sock bind</issue>
  <issue tracker="bnc" id="1255171">VUL-0: CVE-2025-68312: kernel: usbnet: Prevents free active kevent</issue>
  <issue tracker="bnc" id="1255182">VUL-0: CVE-2025-68258: kernel: comedi: multiq3: sanitize config options in multiq3_attach()</issue>
  <issue tracker="bnc" id="1255187">VUL-0: CVE-2025-40297: kernel: net: bridge: fix use-after-free due to MST port state bypass</issue>
  <issue tracker="bnc" id="1255190">VUL-0: CVE-2025-68244: kernel: drm/i915: Avoid lock inversion when pinning to GGTT on CHV/BXT+VTD</issue>
  <issue tracker="bnc" id="1255193">VUL-0: CVE-2025-40301: kernel: Bluetooth: hci_event: validate skb length for unknown CC opcode</issue>
  <issue tracker="bnc" id="1255197">VUL-0: CVE-2025-68252: kernel: misc: fastrpc: Fix dma_buf object leak in fastrpc_map_lookup</issue>
  <issue tracker="bnc" id="1255199">VUL-0: CVE-2025-68259: kernel: KVM: SVM: Don't skip unrelated instruction if INT3/INTO is replaced</issue>
  <issue tracker="bnc" id="1255202">VUL-0: CVE-2025-68238: kernel: mtd: rawnand: cadence: fix DMA device NULL pointer dereference</issue>
  <issue tracker="bnc" id="1255203">VUL-0: CVE-2025-68237: kernel: mtdchar: fix integer overflow in read/write ioctls</issue>
  <issue tracker="bnc" id="1255206">VUL-0: CVE-2025-68233: kernel: drm/tegra: Add call to put_pid()</issue>
  <issue tracker="bnc" id="1255209">VUL-0: CVE-2025-68235: kernel: nouveau/firmware: Add missing kfree() of nvkm_falcon_fw::boot</issue>
  <issue tracker="bnc" id="1255218">VUL-0: CVE-2025-68222: kernel: pinctrl: s32cc: fix uninitialized memory in s32_pinctrl_desc</issue>
  <issue tracker="bnc" id="1255221">VUL-0: CVE-2025-68217: kernel: Input: pegasus-notetaker - fix potential out-of-bounds access</issue>
  <issue tracker="bnc" id="1255233">VUL-0: CVE-2025-68249: kernel: most: usb: hdm_probe: Fix calling put_device() before device initialization</issue>
  <issue tracker="bnc" id="1255245">VUL-0: CVE-2025-68218: kernel: nvme-multipath: fix lockdep WARN due to partition scan work</issue>
  <issue tracker="bnc" id="1255246">VUL-0: CVE-2025-68192: kernel: net: usb: qmi_wwan: initialize MAC header offset in qmimux_rx_fixup</issue>
  <issue tracker="bnc" id="1255251">VUL-0: CVE-2025-68183: kernel: ima: don't clear IMA_DIGSIG flag when setting or removing non-IMA xattr</issue>
  <issue tracker="bnc" id="1255252">VUL-0: CVE-2025-68180: kernel: drm/amd/display: Fix NULL deref in debugfs odm_combine_segments</issue>
  <issue tracker="bnc" id="1255253">VUL-0: CVE-2025-68172: kernel: crypto: aspeed - fix double free caused by devm</issue>
  <issue tracker="bnc" id="1255259">VUL-0: CVE-2025-68195: kernel: x86/CPU/AMD: Add missing terminator for zen5_rdseed_microcode</issue>
  <issue tracker="bnc" id="1255274">VUL-0: CVE-2025-40342: kernel: nvme-fc: use lock accessing port_state and rport state</issue>
  <issue tracker="bnc" id="1255276">VUL-0: CVE-2025-40343: kernel: nvmet-fc: avoid scheduling association deletion twice</issue>
  <issue tracker="bnc" id="1255279">VUL-0: CVE-2025-40345: kernel: usb: storage: sddr55: Reject out-of-bound new_pba</issue>
  <issue tracker="bnc" id="1255280">VUL-0: CVE-2025-40349: kernel: hfs: validate record offset in hfsplus_bmap_alloc</issue>
  <issue tracker="bnc" id="1255281">VUL-0: CVE-2025-40351: kernel: hfsplus: fix KMSAN uninit-value issue in hfsplus_delete_cat()</issue>
  <issue tracker="bnc" id="1255325">VUL-0: CVE-2025-68194: kernel: media: imon: make send_packet() more robust</issue>
  <issue tracker="bnc" id="1255329">VUL-0: CVE-2025-68176: kernel: PCI: cadence: Check for the existence of cdns_pcie::ops before using it</issue>
  <issue tracker="bnc" id="1255351">VUL-0: CVE-2025-68286: drm/amd/display: Check NULL before accessing</issue>
  <issue tracker="bnc" id="1255415">VUL-0: CVE-2025-68313: kernel: x86/CPU/AMD: Add RDSEED fix for Zen5</issue>
  <issue tracker="bnc" id="1255480">VUL-0: CVE-2025-68335: kernel: comedi: pcl818: fix null-ptr-deref in pcl818_ai_cancel()</issue>
  <issue tracker="bnc" id="1255483">VUL-0: CVE-2025-68332: kernel: comedi: c6xdigio: Fix invalid PNP driver unregistration</issue>
  <issue tracker="bnc" id="1255489">VUL-0: CVE-2025-68328: kernel: firmware: stratix10-svc: fix bug in saving controller data</issue>
  <issue tracker="bnc" id="1255493">VUL-0: CVE-2025-68330: kernel: iio: accel: bmc150: Fix irq assumption regression</issue>
  <issue tracker="bnc" id="1255495">VUL-0: CVE-2025-68331: kernel: usb: uas: fix urb unmapping issue when the uas device is remove during ongoing data transfer</issue>
  <issue tracker="bnc" id="1255505">VUL-0: CVE-2025-68339: kernel: atm/fore200e: Fix possible data race in fore200e_open()</issue>
  <issue tracker="bnc" id="1255538">VUL-0: CVE-2025-68734: kernel: isdn: mISDN: hfcsusb: fix memory leak in hfcsusb_probe()</issue>
  <issue tracker="bnc" id="1255540">VUL-0: CVE-2023-54038: kernel: Bluetooth: hci_conn: return ERR_PTR instead of NULL when there is no link</issue>
  <issue tracker="bnc" id="1255545">VUL-0: CVE-2023-54022: kernel: ALSA: usb-audio: Fix potential memory leaks at error path for UMP open</issue>
  <issue tracker="bnc" id="1255549">VUL-0: CVE-2023-54026: kernel: opp: Fix use-after-free in lazy_opp_tables after probe deferral</issue>
  <issue tracker="bnc" id="1255550">VUL-0: CVE-2025-68724: kernel: crypto: asymmetric_keys - prevent overflow in asymmetric_key_generate_id</issue>
  <issue tracker="bnc" id="1255553">VUL-0: CVE-2025-68354: kernel: regulator: core: Protect regulator_supply_alias_list with regulator_list_mutex</issue>
  <issue tracker="bnc" id="1255557">VUL-0: CVE-2023-54037: kernel: ice: prevent NULL pointer deref during reload</issue>
  <issue tracker="bnc" id="1255558">VUL-0: CVE-2023-54025: kernel: wifi: rsi: Do not configure WoWlan in shutdown hook if not enabled</issue>
  <issue tracker="bnc" id="1255563">VUL-0: CVE-2023-54035: kernel: netfilter: nf_tables: fix underflow in chain reference counter</issue>
  <issue tracker="bnc" id="1255564">VUL-0: CVE-2023-54000: kernel: net: hns3: fix deadlock issue when externel_lb and reset are executed together</issue>
  <issue tracker="bnc" id="1255570">VUL-0: CVE-2023-53994: kernel: ionic: remove WARN_ON to prevent panic_on_warn</issue>
  <issue tracker="bnc" id="1255578">VUL-0: CVE-2023-53998: kernel: hwrng: virtio - Fix race on data_avail and actual data</issue>
  <issue tracker="bnc" id="1255579">VUL-0: CVE-2023-54027: kernel: iio: core: Prevent invalid memory access when there is no parent</issue>
  <issue tracker="bnc" id="1255580">VUL-0: CVE-2025-68380: kernel: wifi: ath11k: fix peer HE MCS assignment</issue>
  <issue tracker="bnc" id="1255583">VUL-0: CVE-2023-54031: kernel: vdpa: Add queue index attr to vdpa_nl_policy for nlattr length check</issue>
  <issue tracker="bnc" id="1255591">VUL-0: CVE-2023-54006: kernel: af_unix: Fix data-race around unix_tot_inflight.</issue>
  <issue tracker="bnc" id="1255601">VUL-0: CVE-2025-68345: kernel: ALSA: hda: cs35l41: Fix NULL pointer dereference in cs35l41_hda_read_acpi()</issue>
  <issue tracker="bnc" id="1255603">VUL-0: CVE-2025-68346: kernel: ALSA: dice: fix buffer overflow in detect_stream_formats()</issue>
  <issue tracker="bnc" id="1255605">VUL-0: CVE-2023-54017: kernel: powerpc/pseries: fix possible memory leak in ibmebus_bus_init()</issue>
  <issue tracker="bnc" id="1255611">VUL-0: CVE-2025-68362: kernel: wifi: rtl818x: rtl8187: Fix potential buffer underflow in rtl8187_rx_cb()</issue>
  <issue tracker="bnc" id="1255616">VUL-0: CVE-2023-53995: kernel: net: ipv4: fix one memleak in __inet_del_ifa()</issue>
  <issue tracker="bnc" id="1255617">VUL-0: CVE-2023-54032: kernel: btrfs: fix race when deleting quota root from the dirty cow roots list</issue>
  <issue tracker="bnc" id="1255618">VUL-0: CVE-2023-53996: kernel: x86/sev: Make enc_dec_hypercall() accept a size instead of npages</issue>
  <issue tracker="bnc" id="1255621">VUL-0: CVE-2023-53999: kernel: net/mlx5e: TC, Fix internal port memory leak</issue>
  <issue tracker="bnc" id="1255628">VUL-0: CVE-2023-54001: kernel: staging: r8712: Fix memory leak in _r8712_init_xmit_priv()</issue>
  <issue tracker="bnc" id="1255629">VUL-0: CVE-2023-54005: kernel: binder: fix memory leak in binder_init()</issue>
  <issue tracker="bnc" id="1255630">VUL-0: CVE-2023-54008: kernel: virtio_vdpa: build affinity masks conditionally</issue>
  <issue tracker="bnc" id="1255632">VUL-0: CVE-2023-53997: kernel: thermal: of: fix double-free on unregistration</issue>
  <issue tracker="bnc" id="1255636">VUL-0: CVE-2023-54019: kernel: sched/psi: use kernfs polling functions for PSI trigger polling</issue>
  <issue tracker="bnc" id="1255688">VUL-0: CVE-2025-68732: kernel: gpu: host1x: Fix race in syncpt alloc/free</issue>
  <issue tracker="bnc" id="1255691">VUL-0: CVE-2023-54030: kernel: io_uring/net: don't overflow multishot recv</issue>
  <issue tracker="bnc" id="1255702">VUL-0: CVE-2023-54042: kernel: powerpc/64s: Fix VAS mm use after free</issue>
  <issue tracker="bnc" id="1255704">VUL-0: CVE-2023-54156: kernel: sfc: fix crash when reading stats while NIC is resetting</issue>
  <issue tracker="bnc" id="1255706">VUL-0: CVE-2025-68347: kernel: ALSA: firewire-motu: fix buffer overflow in hwdep read for DSP events</issue>
  <issue tracker="bnc" id="1255722">VUL-0: CVE-2025-68746: kernel: spi: tegra210-quad: Fix timeout handling</issue>
  <issue tracker="bnc" id="1255758">VUL-0: CVE-2023-54326: kernel: misc: pci_endpoint_test: Free IRQs before removing the device</issue>
  <issue tracker="bnc" id="1255759">VUL-0: CVE-2023-54324: kernel: dm: fix a race condition in retrieve_deps</issue>
  <issue tracker="bnc" id="1255760">VUL-0: CVE-2023-54319: kernel: pinctrl: at91-pio4: check return value of devm_kasprintf()</issue>
  <issue tracker="bnc" id="1255763">VUL-0: CVE-2023-54322: kernel: arm64: set __exception_irq_entry with __irq_entry as a default</issue>
  <issue tracker="bnc" id="1255769">VUL-0: CVE-2023-54315: kernel: powerpc/powernv/sriov: perform null check on iov before dereferencing iov</issue>
  <issue tracker="bnc" id="1255770">VUL-0: CVE-2023-54316: kernel: refscale: Fix uninitalized use of wait_queue_head_t</issue>
  <issue tracker="bnc" id="1255772">VUL-0: CVE-2023-54318: kernel: net/smc: use smc_lgr_list.lock to protect smc_lgr_list.list iterate in smcr_port_add</issue>
  <issue tracker="bnc" id="1255774">VUL-0: CVE-2023-54312: kernel: samples/bpf: Fix buffer overflow in tcp_basertt</issue>
  <issue tracker="bnc" id="1255775">VUL-0: CVE-2023-54313: kernel: ovl: fix null pointer dereference in ovl_get_acl_rcu()</issue>
  <issue tracker="bnc" id="1255776">VUL-0: CVE-2023-54314: kernel: media: af9005: Fix null-ptr-deref in af9005_i2c_xfer</issue>
  <issue tracker="bnc" id="1255780">VUL-0: CVE-2023-54309: kernel: tpm: tpm_vtpm_proxy: fix a race condition in /dev/vtpmx creation</issue>
  <issue tracker="bnc" id="1255785">VUL-0: CVE-2023-54303: kernel: bpf: Disable preemption in bpf_perf_event_output</issue>
  <issue tracker="bnc" id="1255786">VUL-0: CVE-2023-54304: kernel: firmware: meson_sm: fix to avoid potential NULL pointer dereference</issue>
  <issue tracker="bnc" id="1255789">VUL-0: CVE-2023-54299: kernel: usb: typec: bus: verify partner exists in typec_altmode_attention</issue>
  <issue tracker="bnc" id="1255790">VUL-0: CVE-2023-54300: kernel: wifi: ath9k: avoid referencing uninit memory in ath9k_wmi_ctrl_rx</issue>
  <issue tracker="bnc" id="1255792">VUL-0: CVE-2023-54302: kernel: RDMA/irdma: Fix data race on CQP completion stats</issue>
  <issue tracker="bnc" id="1255793">VUL-0: CVE-2023-54296: kernel: KVM: SVM: Get source vCPUs from source VM for SEV-ES intrahost migration</issue>
  <issue tracker="bnc" id="1255795">VUL-0: CVE-2023-54297: kernel: btrfs: zoned: fix memory leak after finding block group with super blocks</issue>
  <issue tracker="bnc" id="1255798">VUL-0: CVE-2023-54291: kernel: vduse: fix NULL pointer dereference</issue>
  <issue tracker="bnc" id="1255800">VUL-0: CVE-2023-54292: kernel: RDMA/irdma: Fix data race on CQP request done</issue>
  <issue tracker="bnc" id="1255801">VUL-0: CVE-2023-54293: kernel: bcache: fixup btree_cache_wait list damage</issue>
  <issue tracker="bnc" id="1255806">VUL-0: CVE-2023-54289: kernel: scsi: qedf: Fix NULL dereference in error handling</issue>
  <issue tracker="bnc" id="1255807">VUL-0: CVE-2023-54285: kernel: iomap: Fix possible overflow condition in iomap_write_delalloc_scan</issue>
  <issue tracker="bnc" id="1255809">VUL-0: CVE-2023-54283: kernel: bpf: Address KCSAN report on bpf_lru_list</issue>
  <issue tracker="bnc" id="1255810">VUL-0: CVE-2023-54282: kernel: media: tuners: qt1010: replace BUG_ON with a regular error</issue>
  <issue tracker="bnc" id="1255812">VUL-0: CVE-2025-68740: kernel: ima: Handle error code returned by ima_filter_rule_match()</issue>
  <issue tracker="bnc" id="1255814">VUL-0: CVE-2025-68750: kernel: usb: potential integer overflow in usbg_make_tpg()</issue>
  <issue tracker="bnc" id="1255820">VUL-0: CVE-2023-54281: kernel: btrfs: release path before inode lookup during the ino lookup ioctl</issue>
  <issue tracker="bnc" id="1255838">VUL-0: CVE-2023-54241: kernel: MIPS: KVM: Fix NULL pointer dereference</issue>
  <issue tracker="bnc" id="1255842">VUL-0: CVE-2023-54221: kernel: clk: imx93: fix memory leak and missing unwind goto in imx93_clocks_probe</issue>
  <issue tracker="bnc" id="1255843">VUL-0: CVE-2023-54211: kernel: tracing: Fix warning in trace_buffered_event_disable()</issue>
  <issue tracker="bnc" id="1255872">VUL-0: CVE-2023-54264: kernel: fs/sysv: Null check to prevent null-ptr-deref bug</issue>
  <issue tracker="bnc" id="1255875">VUL-0: CVE-2023-54266: kernel: media: dvb-usb: m920x: Fix a potential memory leak in m920x_i2c_xfer()</issue>
  <issue tracker="bnc" id="1255879">VUL-0: CVE-2023-54261: kernel: drm/amdkfd: Add missing gfx11 MQD manager callbacks</issue>
  <issue tracker="bnc" id="1255883">VUL-0: CVE-2023-54263: kernel: drm/nouveau/kms/nv50-: init hpd_irq_lock for PIOR DP</issue>
  <issue tracker="bnc" id="1255884">VUL-0: CVE-2023-54255: kernel: sh: dma: Fix DMA channel offset calculation</issue>
  <issue tracker="bnc" id="1255886">VUL-0: CVE-2023-54258: kernel: cifs: fix potential oops in cifs_oplock_break</issue>
  <issue tracker="bnc" id="1255888">VUL-0: CVE-2023-54251: kernel: net/sched: taprio: Limit TCA_TAPRIO_ATTR_SCHED_CYCLE_TIME to INT_MAX.</issue>
  <issue tracker="bnc" id="1255890">VUL-0: CVE-2023-54254: kernel: drm/ttm: Don't leak a resource on eviction error</issue>
  <issue tracker="bnc" id="1255891">VUL-0: CVE-2023-54253: kernel: btrfs: set page extent mapped after read_folio in relocate_one_page</issue>
  <issue tracker="bnc" id="1255892">VUL-0: CVE-2023-54247: kernel: bpf: Silence a warning in btf_type_id_size()</issue>
  <issue tracker="bnc" id="1255899">VUL-0: CVE-2023-54267: kernel: powerpc/pseries: Rework lppaca_shared_proc() to avoid DEBUG_PREEMPT</issue>
  <issue tracker="bnc" id="1255902">VUL-0: CVE-2023-54271: kernel: blk-cgroup: Fix NULL deref caused by blkg_policy_data being installed before init</issue>
  <issue tracker="bnc" id="1255907">VUL-0: CVE-2023-54276: kernel: nfsd: move init of percpu reply_cache_stats counters back to nfsd_init_net</issue>
  <issue tracker="bnc" id="1255911">VUL-0: CVE-2023-54278: kernel: s390/vmem: split pages when debug pagealloc is enabled</issue>
  <issue tracker="bnc" id="1255915">VUL-0: CVE-2023-54246: kernel: rcuscale: Move rcu_scale_writer() schedule_timeout_uninterruptible() to _idle()</issue>
  <issue tracker="bnc" id="1255918">VUL-0: CVE-2023-54240: kernel: net: ethernet: mtk_eth_soc: fix possible NULL pointer dereference in mtk_hwlro_get_fdir_all()</issue>
  <issue tracker="bnc" id="1255921">VUL-0: CVE-2023-54235: kernel: PCI/DOE: Fix destroy_work_on_stack() race</issue>
  <issue tracker="bnc" id="1255924">VUL-0: CVE-2023-54229: kernel: wifi: ath11k: fix registration of 6Ghz-only phy without the full channel range</issue>
  <issue tracker="bnc" id="1255925">VUL-0: CVE-2023-54230: kernel: amba: bus: fix refcount leak</issue>
  <issue tracker="bnc" id="1255931">VUL-0: CVE-2025-68765: kernel: mt76: mt7615: Fix memory leak in mt7615_mcu_wtbl_sta_add()</issue>
  <issue tracker="bnc" id="1255932">VUL-0: CVE-2025-68766: kernel: irqchip/mchp-eic: Fix error code in mchp_eic_domain_alloc()</issue>
  <issue tracker="bnc" id="1255934">VUL-0: CVE-2025-68759: kernel: wifi: rtl818x: Fix potential memory leaks in rtl8180_init_rx_ring()</issue>
  <issue tracker="bnc" id="1255943">VUL-0: CVE-2025-68757: kernel: drm/vgem-fence: Fix potential deadlock on release</issue>
  <issue tracker="bnc" id="1255944">VUL-0: CVE-2025-68758: kernel: backlight: led-bl: Add devlink to supplier LEDs</issue>
  <issue tracker="bnc" id="1255949">VUL-0: CVE-2023-54220: kernel: serial: 8250: Fix oops for port-&gt;pm on uart_change_pm()</issue>
  <issue tracker="bnc" id="1255951">VUL-0: CVE-2023-54224: kernel: btrfs: fix lockdep splat and potential deadlock after failure running delayed items</issue>
  <issue tracker="bnc" id="1255952">VUL-0: CVE-2023-54227: kernel: blk-mq: fix tags leak when shrink nr_hw_queues</issue>
  <issue tracker="bnc" id="1255955">VUL-0: CVE-2023-54210: kernel: Bluetooth: hci_sync: Avoid use-after-free in dbg for hci_remove_adv_monitor()</issue>
  <issue tracker="bnc" id="1255957">VUL-0: CVE-2023-54215: kernel: virtio-vdpa: Fix cpumask memory leak in virtio_vdpa_find_vqs()</issue>
  <issue tracker="bnc" id="1255961">VUL-0: CVE-2023-54207: kernel: HID: uclogic: Correct devm device reference for hidinput input_dev name</issue>
  <issue tracker="bnc" id="1255963">VUL-0: CVE-2023-54209: kernel: block: fix blktrace debugfs entries leakage</issue>
  <issue tracker="bnc" id="1255964">VUL-0: CVE-2023-54201: kernel: RDMA/efa: Fix wrong resources deallocation order</issue>
  <issue tracker="bnc" id="1255967">VUL-0: CVE-2023-54204: kernel: mmc: sunplus: fix return value check of mmc_add_host()</issue>
  <issue tracker="bnc" id="1255974">VUL-0: CVE-2023-54194: kernel: exfat: use kvmalloc_array/kvfree instead of kmalloc_array/kfree</issue>
  <issue tracker="bnc" id="1255978">VUL-0: CVE-2023-54189: kernel: pstore/ram: Add check for kstrdup</issue>
  <issue tracker="bnc" id="1255984">VUL-0: CVE-2023-54185: kernel: btrfs: remove BUG_ON()'s in add_new_free_space()</issue>
  <issue tracker="bnc" id="1255988">VUL-0: CVE-2023-54181: kernel: bpf: Fix issue in verifying allow_ptr_leaks</issue>
  <issue tracker="bnc" id="1255990">VUL-0: CVE-2023-54183: kernel: media: v4l2-core: Fix a potential resource leak in v4l2_fwnode_parse_link()</issue>
  <issue tracker="bnc" id="1255992">VUL-0: CVE-2023-54178: kernel: of: unittest: fix null pointer dereferencing in of_unittest_find_node_by_name()</issue>
  <issue tracker="bnc" id="1255993">VUL-0: CVE-2023-54177: kernel: quota: fix warning in dqgrab()</issue>
  <issue tracker="bnc" id="1255994">VUL-0: CVE-2023-54179: kernel: scsi: qla2xxx: Array index may go out of bound</issue>
  <issue tracker="bnc" id="1255996">VUL-0: CVE-2023-54173: kernel: bpf: Disable preemption in bpf_event_output</issue>
  <issue tracker="bnc" id="1256033">VUL-0: CVE-2023-54172: kernel: x86/hyperv: Disable IBT when hypercall page lacks ENDBR instruction</issue>
  <issue tracker="bnc" id="1256034">VUL-0: CVE-2023-54171: kernel: tracing: Fix memory leak of iter-&gt;temp when reading trace_pipe</issue>
  <issue tracker="bnc" id="1256045">VUL-0: CVE-2023-54170: kernel: keys: Fix linking a duplicate key to a keyring's assoc_array</issue>
  <issue tracker="bnc" id="1256050">VUL-0: CVE-2023-54169: kernel: net/mlx5e: fix memory leak in mlx5e_ptp_open</issue>
  <issue tracker="bnc" id="1256058">VUL-0: CVE-2023-53992: kernel: wifi: cfg80211: ocb: don't leave if not joined</issue>
  <issue tracker="bnc" id="1256071">VUL-0: CVE-2023-54164: kernel: Bluetooth: ISO: fix iso_conn related locking and validity issues</issue>
  <issue tracker="bnc" id="1256074">VUL-0: CVE-2023-54166: kernel: igc: Fix Kernel Panic during ndo_tx_timeout callback</issue>
  <issue tracker="bnc" id="1256081">VUL-0: CVE-2023-54153: kernel: ext4: turn quotas off if mount failed after enabling quotas</issue>
  <issue tracker="bnc" id="1256082">VUL-0: CVE-2023-54154: kernel: scsi: target: core: Fix target_cmd_counter leak</issue>
  <issue tracker="bnc" id="1256083">VUL-0: CVE-2023-54155: kernel: net: core: remove unnecessary frame_sz check in bpf_xdp_adjust_tail()</issue>
  <issue tracker="bnc" id="1256084">VUL-0: CVE-2023-54148: kernel: net/mlx5e: Move representor neigh cleanup to profile cleanup_tx</issue>
  <issue tracker="bnc" id="1256085">VUL-0: CVE-2023-54149: kernel: net: dsa: avoid suspicious RCU usage for synced VLAN-aware MAC addresses</issue>
  <issue tracker="bnc" id="1256090">VUL-0: CVE-2023-54145: kernel: bpf: drop unnecessary user-triggerable WARN_ONCE in verifierl log</issue>
  <issue tracker="bnc" id="1256093">VUL-0: CVE-2023-54140: kernel: nilfs2: fix WARNING in mark_buffer_dirty due to discarded buffer reuse</issue>
  <issue tracker="bnc" id="1256094">VUL-0: CVE-2023-54141: kernel: wifi: ath11k: Add missing hw_ops-&gt;get_ring_selector() for IPQ5018</issue>
  <issue tracker="bnc" id="1256095">VUL-0: CVE-2023-54142: kernel: gtp: Fix use-after-free in __gtp_encap_destroy().</issue>
  <issue tracker="bnc" id="1256096">VUL-0: CVE-2023-54143: kernel: media: mediatek: vcodec: fix resource leaks in vdec_msg_queue_init()</issue>
  <issue tracker="bnc" id="1256099">VUL-0: CVE-2023-54136: kernel: serial: sprd: Fix DMA buffer leak issue</issue>
  <issue tracker="bnc" id="1256100">VUL-0: CVE-2023-54137: kernel: vfio/type1: fix cap_migration information leak</issue>
  <issue tracker="bnc" id="1256104">VUL-0: CVE-2023-54133: kernel: nfp: clean mc addresses in application firmware when closing port</issue>
  <issue tracker="bnc" id="1256106">VUL-0: CVE-2023-54134: kernel: autofs: fix memory leak of waitqueues in autofs_catatonic_mode</issue>
  <issue tracker="bnc" id="1256107">VUL-0: CVE-2023-54135: kernel: maple_tree: fix potential out-of-bounds access in mas_wr_end_piv()</issue>
  <issue tracker="bnc" id="1256117">VUL-0: CVE-2023-54125: kernel: fs/ntfs3: Return error for inconsistent extended attributes</issue>
  <issue tracker="bnc" id="1256119">VUL-0: CVE-2023-54127: kernel: fs/jfs: prevent double-free in dbUnmount() after failed jfs_remount()</issue>
  <issue tracker="bnc" id="1256121">VUL-0: CVE-2023-54115: kernel: pcmcia: rsrc_nonstatic: Fix memory leak in nonstatic_release_resource_db()</issue>
  <issue tracker="bnc" id="1256145">VUL-0: CVE-2023-54104: kernel: mtd: rawnand: fsl_upm: Fix an off-by one test in fun_exec_op()</issue>
  <issue tracker="bnc" id="1256153">VUL-0: CVE-2023-54101: kernel: driver: soc: xilinx: use _safe loop iterator to avoid a use after free</issue>
  <issue tracker="bnc" id="1256178">VUL-0: CVE-2023-54096: kernel: soundwire: fix enumeration completion</issue>
  <issue tracker="bnc" id="1256197">VUL-0: CVE-2023-54099: kernel: fs: Protect reconfiguration of sb read-write from racing writes</issue>
  <issue tracker="bnc" id="1256231">VUL-0: CVE-2023-54219: kernel: Revert "IB/isert: Fix incorrect release of isert connection"</issue>
  <issue tracker="bnc" id="1256233">VUL-0: CVE-2023-54223: kernel: net/mlx5e: xsk: Fix invalid buffer access for legacy rq</issue>
  <issue tracker="bnc" id="1256234">VUL-0: CVE-2023-54225: kernel: net: ipa: only reset hashed tables when supported</issue>
  <issue tracker="bnc" id="1256238">VUL-0: CVE-2025-68753: kernel: ALSA: firewire-motu: add bounds check in put_user loop for DSP events</issue>
  <issue tracker="bnc" id="1256263">VUL-0: CVE-2023-54088: kernel: blk-cgroup: hold queue_lock when removing blkg-&gt;q_node</issue>
  <issue tracker="bnc" id="1256267">VUL-0: CVE-2023-54121: kernel: btrfs: fix incorrect splitting in btrfs_drop_extent_map_range</issue>
  <issue tracker="bnc" id="1256268">VUL-0: CVE-2023-54089: kernel: virtio_pmem: add the missing REQ_OP_WRITE for flush bio</issue>
  <issue tracker="bnc" id="1256271">VUL-0: CVE-2023-54095: kernel: powerpc/iommu: Fix notifiers being shared by PCI and VIO buses</issue>
  <issue tracker="bnc" id="1256273">VUL-0: CVE-2023-54093: kernel: media: anysee: fix null-ptr-deref in anysee_master_xfer</issue>
  <issue tracker="bnc" id="1256274">VUL-0: CVE-2023-54091: kernel: drm/client: Fix memory leak in drm_client_target_cloned</issue>
  <issue tracker="bnc" id="1256279">VUL-0: CVE-2023-54016: kernel: wifi: ath12k: Fix memory leak in rx_desc and tx_desc</issue>
  <issue tracker="bnc" id="1256285">VUL-0: CVE-2023-54045: kernel: audit: fix possible soft lockup in __audit_inode_child()</issue>
  <issue tracker="bnc" id="1256291">VUL-0: CVE-2023-54072: kernel: ALSA: pcm: Fix potential data race at PCM memory allocation helpers</issue>
  <issue tracker="bnc" id="1256292">VUL-0: CVE-2023-54094: kernel: net: prevent skb corruption on frag list segmentation</issue>
  <issue tracker="bnc" id="1256300">VUL-0: CVE-2023-54014: kernel: scsi: qla2xxx: Check valid rport returned by fc_bsg_to_rport()</issue>
  <issue tracker="bnc" id="1256301">VUL-0: CVE-2023-54023: kernel: btrfs: fix race between balance and cancel/pause</issue>
  <issue tracker="bnc" id="1256302">VUL-0: CVE-2023-53989: kernel: arm64: mm: fix VA-range sanity check</issue>
  <issue tracker="bnc" id="1256335">VUL-0: CVE-2023-54076: kernel: smb: client: fix missed ses refcounting</issue>
  <issue tracker="bnc" id="1256348">VUL-0: CVE-2023-54117: kernel: s390/dcssblk: fix kernel crash with list_add corruption</issue>
  <issue tracker="bnc" id="1256351">VUL-0: CVE-2023-54113: kernel: rcu: dump vmalloc memory info safely</issue>
  <issue tracker="bnc" id="1256354">VUL-0: CVE-2023-54112: kernel: kcm: Fix memory leak in error path of kcm_sendmsg()</issue>
  <issue tracker="bnc" id="1256358">VUL-0: CVE-2023-54106: kernel: net/mlx5: fix potential memory leak in mlx5e_init_rep_rx</issue>
  <issue tracker="bnc" id="1256361">VUL-0: CVE-2023-54081: kernel: xen: speed up grant-table reclaim</issue>
  <issue tracker="bnc" id="1256364">VUL-0: CVE-2023-54070: kernel: igb: clean up in all error paths when enabling SR-IOV</issue>
  <issue tracker="bnc" id="1256367">VUL-0: CVE-2023-54080: kernel: btrfs: zoned: skip splitting and logical rewriting on pre-alloc write</issue>
  <issue tracker="bnc" id="1256368">VUL-0: CVE-2023-54083: kernel: phy: tegra: xusb: Clear the driver reference in usb-phy dev</issue>
  <issue tracker="bnc" id="1256369">VUL-0: CVE-2023-54067: kernel: btrfs: fix race when deleting free space root from the dirty cow roots list</issue>
  <issue tracker="bnc" id="1256370">VUL-0: CVE-2023-54092: kernel: KVM: s390: pv: fix index value of replaced ASCE</issue>
  <issue tracker="bnc" id="1256371">VUL-0: CVE-2023-54069: kernel: ext4: fix BUG in ext4_mb_new_inode_pa() due to overflow</issue>
  <issue tracker="bnc" id="1256373">VUL-0: CVE-2023-54066: kernel: media: dvb-usb-v2: gl861: Fix null-ptr-deref in gl861_i2c_master_xfer</issue>
  <issue tracker="bnc" id="1256375">VUL-0: CVE-2023-54064: kernel: ipmi:ssif: Fix a memory leak when scanning for an adapter</issue>
  <issue tracker="bnc" id="1256379">VUL-0: CVE-2023-54060: kernel: iommufd: Set end correctly when doing batch carry</issue>
  <issue tracker="bnc" id="1256387">VUL-0: CVE-2023-54052: kernel: wifi: mt76: mt7921: fix skb leak by txs missing in AMSDU</issue>
  <issue tracker="bnc" id="1256394">VUL-0: CVE-2023-54051: kernel: net: do not allow gso_size to be set to GSO_BY_FRAGS</issue>
  <issue tracker="bnc" id="1256395">VUL-0: CVE-2023-54048: kernel: RDMA/bnxt_re: Prevent handling any completions after qp destroy</issue>
  <issue tracker="bnc" id="1256396">VUL-0: CVE-2023-54049: kernel: rpmsg: glink: Add check for kstrdup</issue>
  <issue tracker="bnc" id="1256528">SLE15-SP7 kernel doesn't boot with the latest upstream ucode-amd</issue>
  <issue tracker="cve" id="2023-42752"/>
  <issue tracker="cve" id="2023-53743"/>
  <issue tracker="cve" id="2023-53750"/>
  <issue tracker="cve" id="2023-53752"/>
  <issue tracker="cve" id="2023-53759"/>
  <issue tracker="cve" id="2023-53762"/>
  <issue tracker="cve" id="2023-53766"/>
  <issue tracker="cve" id="2023-53768"/>
  <issue tracker="cve" id="2023-53777"/>
  <issue tracker="cve" id="2023-53778"/>
  <issue tracker="cve" id="2023-53782"/>
  <issue tracker="cve" id="2023-53784"/>
  <issue tracker="cve" id="2023-53785"/>
  <issue tracker="cve" id="2023-53787"/>
  <issue tracker="cve" id="2023-53791"/>
  <issue tracker="cve" id="2023-53792"/>
  <issue tracker="cve" id="2023-53793"/>
  <issue tracker="cve" id="2023-53794"/>
  <issue tracker="cve" id="2023-53795"/>
  <issue tracker="cve" id="2023-53797"/>
  <issue tracker="cve" id="2023-53799"/>
  <issue tracker="cve" id="2023-53807"/>
  <issue tracker="cve" id="2023-53808"/>
  <issue tracker="cve" id="2023-53813"/>
  <issue tracker="cve" id="2023-53815"/>
  <issue tracker="cve" id="2023-53819"/>
  <issue tracker="cve" id="2023-53821"/>
  <issue tracker="cve" id="2023-53823"/>
  <issue tracker="cve" id="2023-53825"/>
  <issue tracker="cve" id="2023-53828"/>
  <issue tracker="cve" id="2023-53831"/>
  <issue tracker="cve" id="2023-53834"/>
  <issue tracker="cve" id="2023-53836"/>
  <issue tracker="cve" id="2023-53839"/>
  <issue tracker="cve" id="2023-53841"/>
  <issue tracker="cve" id="2023-53842"/>
  <issue tracker="cve" id="2023-53843"/>
  <issue tracker="cve" id="2023-53844"/>
  <issue tracker="cve" id="2023-53846"/>
  <issue tracker="cve" id="2023-53847"/>
  <issue tracker="cve" id="2023-53848"/>
  <issue tracker="cve" id="2023-53850"/>
  <issue tracker="cve" id="2023-53851"/>
  <issue tracker="cve" id="2023-53852"/>
  <issue tracker="cve" id="2023-53855"/>
  <issue tracker="cve" id="2023-53856"/>
  <issue tracker="cve" id="2023-53857"/>
  <issue tracker="cve" id="2023-53858"/>
  <issue tracker="cve" id="2023-53860"/>
  <issue tracker="cve" id="2023-53861"/>
  <issue tracker="cve" id="2023-53863"/>
  <issue tracker="cve" id="2023-53864"/>
  <issue tracker="cve" id="2023-53865"/>
  <issue tracker="cve" id="2023-53989"/>
  <issue tracker="cve" id="2023-53992"/>
  <issue tracker="cve" id="2023-53994"/>
  <issue tracker="cve" id="2023-53995"/>
  <issue tracker="cve" id="2023-53996"/>
  <issue tracker="cve" id="2023-53997"/>
  <issue tracker="cve" id="2023-53998"/>
  <issue tracker="cve" id="2023-53999"/>
  <issue tracker="cve" id="2023-54000"/>
  <issue tracker="cve" id="2023-54001"/>
  <issue tracker="cve" id="2023-54005"/>
  <issue tracker="cve" id="2023-54006"/>
  <issue tracker="cve" id="2023-54008"/>
  <issue tracker="cve" id="2023-54014"/>
  <issue tracker="cve" id="2023-54016"/>
  <issue tracker="cve" id="2023-54017"/>
  <issue tracker="cve" id="2023-54019"/>
  <issue tracker="cve" id="2023-54022"/>
  <issue tracker="cve" id="2023-54023"/>
  <issue tracker="cve" id="2023-54025"/>
  <issue tracker="cve" id="2023-54026"/>
  <issue tracker="cve" id="2023-54027"/>
  <issue tracker="cve" id="2023-54030"/>
  <issue tracker="cve" id="2023-54031"/>
  <issue tracker="cve" id="2023-54032"/>
  <issue tracker="cve" id="2023-54035"/>
  <issue tracker="cve" id="2023-54037"/>
  <issue tracker="cve" id="2023-54038"/>
  <issue tracker="cve" id="2023-54042"/>
  <issue tracker="cve" id="2023-54045"/>
  <issue tracker="cve" id="2023-54048"/>
  <issue tracker="cve" id="2023-54049"/>
  <issue tracker="cve" id="2023-54051"/>
  <issue tracker="cve" id="2023-54052"/>
  <issue tracker="cve" id="2023-54060"/>
  <issue tracker="cve" id="2023-54064"/>
  <issue tracker="cve" id="2023-54066"/>
  <issue tracker="cve" id="2023-54067"/>
  <issue tracker="cve" id="2023-54069"/>
  <issue tracker="cve" id="2023-54070"/>
  <issue tracker="cve" id="2023-54072"/>
  <issue tracker="cve" id="2023-54076"/>
  <issue tracker="cve" id="2023-54080"/>
  <issue tracker="cve" id="2023-54081"/>
  <issue tracker="cve" id="2023-54083"/>
  <issue tracker="cve" id="2023-54088"/>
  <issue tracker="cve" id="2023-54089"/>
  <issue tracker="cve" id="2023-54091"/>
  <issue tracker="cve" id="2023-54092"/>
  <issue tracker="cve" id="2023-54093"/>
  <issue tracker="cve" id="2023-54094"/>
  <issue tracker="cve" id="2023-54095"/>
  <issue tracker="cve" id="2023-54096"/>
  <issue tracker="cve" id="2023-54099"/>
  <issue tracker="cve" id="2023-54101"/>
  <issue tracker="cve" id="2023-54104"/>
  <issue tracker="cve" id="2023-54106"/>
  <issue tracker="cve" id="2023-54112"/>
  <issue tracker="cve" id="2023-54113"/>
  <issue tracker="cve" id="2023-54115"/>
  <issue tracker="cve" id="2023-54117"/>
  <issue tracker="cve" id="2023-54121"/>
  <issue tracker="cve" id="2023-54125"/>
  <issue tracker="cve" id="2023-54127"/>
  <issue tracker="cve" id="2023-54133"/>
  <issue tracker="cve" id="2023-54134"/>
  <issue tracker="cve" id="2023-54135"/>
  <issue tracker="cve" id="2023-54136"/>
  <issue tracker="cve" id="2023-54137"/>
  <issue tracker="cve" id="2023-54140"/>
  <issue tracker="cve" id="2023-54141"/>
  <issue tracker="cve" id="2023-54142"/>
  <issue tracker="cve" id="2023-54143"/>
  <issue tracker="cve" id="2023-54145"/>
  <issue tracker="cve" id="2023-54148"/>
  <issue tracker="cve" id="2023-54149"/>
  <issue tracker="cve" id="2023-54153"/>
  <issue tracker="cve" id="2023-54154"/>
  <issue tracker="cve" id="2023-54155"/>
  <issue tracker="cve" id="2023-54156"/>
  <issue tracker="cve" id="2023-54164"/>
  <issue tracker="cve" id="2023-54166"/>
  <issue tracker="cve" id="2023-54169"/>
  <issue tracker="cve" id="2023-54170"/>
  <issue tracker="cve" id="2023-54171"/>
  <issue tracker="cve" id="2023-54172"/>
  <issue tracker="cve" id="2023-54173"/>
  <issue tracker="cve" id="2023-54177"/>
  <issue tracker="cve" id="2023-54178"/>
  <issue tracker="cve" id="2023-54179"/>
  <issue tracker="cve" id="2023-54181"/>
  <issue tracker="cve" id="2023-54183"/>
  <issue tracker="cve" id="2023-54185"/>
  <issue tracker="cve" id="2023-54189"/>
  <issue tracker="cve" id="2023-54194"/>
  <issue tracker="cve" id="2023-54201"/>
  <issue tracker="cve" id="2023-54204"/>
  <issue tracker="cve" id="2023-54207"/>
  <issue tracker="cve" id="2023-54209"/>
  <issue tracker="cve" id="2023-54210"/>
  <issue tracker="cve" id="2023-54211"/>
  <issue tracker="cve" id="2023-54215"/>
  <issue tracker="cve" id="2023-54219"/>
  <issue tracker="cve" id="2023-54220"/>
  <issue tracker="cve" id="2023-54221"/>
  <issue tracker="cve" id="2023-54223"/>
  <issue tracker="cve" id="2023-54224"/>
  <issue tracker="cve" id="2023-54225"/>
  <issue tracker="cve" id="2023-54227"/>
  <issue tracker="cve" id="2023-54229"/>
  <issue tracker="cve" id="2023-54230"/>
  <issue tracker="cve" id="2023-54235"/>
  <issue tracker="cve" id="2023-54240"/>
  <issue tracker="cve" id="2023-54241"/>
  <issue tracker="cve" id="2023-54246"/>
  <issue tracker="cve" id="2023-54247"/>
  <issue tracker="cve" id="2023-54251"/>
  <issue tracker="cve" id="2023-54253"/>
  <issue tracker="cve" id="2023-54254"/>
  <issue tracker="cve" id="2023-54255"/>
  <issue tracker="cve" id="2023-54258"/>
  <issue tracker="cve" id="2023-54261"/>
  <issue tracker="cve" id="2023-54263"/>
  <issue tracker="cve" id="2023-54264"/>
  <issue tracker="cve" id="2023-54266"/>
  <issue tracker="cve" id="2023-54267"/>
  <issue tracker="cve" id="2023-54271"/>
  <issue tracker="cve" id="2023-54276"/>
  <issue tracker="cve" id="2023-54278"/>
  <issue tracker="cve" id="2023-54281"/>
  <issue tracker="cve" id="2023-54282"/>
  <issue tracker="cve" id="2023-54283"/>
  <issue tracker="cve" id="2023-54285"/>
  <issue tracker="cve" id="2023-54289"/>
  <issue tracker="cve" id="2023-54291"/>
  <issue tracker="cve" id="2023-54292"/>
  <issue tracker="cve" id="2023-54293"/>
  <issue tracker="cve" id="2023-54296"/>
  <issue tracker="cve" id="2023-54297"/>
  <issue tracker="cve" id="2023-54299"/>
  <issue tracker="cve" id="2023-54300"/>
  <issue tracker="cve" id="2023-54302"/>
  <issue tracker="cve" id="2023-54303"/>
  <issue tracker="cve" id="2023-54304"/>
  <issue tracker="cve" id="2023-54309"/>
  <issue tracker="cve" id="2023-54312"/>
  <issue tracker="cve" id="2023-54313"/>
  <issue tracker="cve" id="2023-54314"/>
  <issue tracker="cve" id="2023-54315"/>
  <issue tracker="cve" id="2023-54316"/>
  <issue tracker="cve" id="2023-54318"/>
  <issue tracker="cve" id="2023-54319"/>
  <issue tracker="cve" id="2023-54322"/>
  <issue tracker="cve" id="2023-54324"/>
  <issue tracker="cve" id="2023-54326"/>
  <issue tracker="cve" id="2024-26944"/>
  <issue tracker="cve" id="2025-38321"/>
  <issue tracker="cve" id="2025-38728"/>
  <issue tracker="cve" id="2025-39890"/>
  <issue tracker="cve" id="2025-39977"/>
  <issue tracker="cve" id="2025-40006"/>
  <issue tracker="cve" id="2025-40024"/>
  <issue tracker="cve" id="2025-40033"/>
  <issue tracker="cve" id="2025-40042"/>
  <issue tracker="cve" id="2025-40053"/>
  <issue tracker="cve" id="2025-40081"/>
  <issue tracker="cve" id="2025-40102"/>
  <issue tracker="cve" id="2025-40134"/>
  <issue tracker="cve" id="2025-40135"/>
  <issue tracker="cve" id="2025-40153"/>
  <issue tracker="cve" id="2025-40158"/>
  <issue tracker="cve" id="2025-40167"/>
  <issue tracker="cve" id="2025-40170"/>
  <issue tracker="cve" id="2025-40178"/>
  <issue tracker="cve" id="2025-40179"/>
  <issue tracker="cve" id="2025-40187"/>
  <issue tracker="cve" id="2025-40211"/>
  <issue tracker="cve" id="2025-40215"/>
  <issue tracker="cve" id="2025-40219"/>
  <issue tracker="cve" id="2025-40220"/>
  <issue tracker="cve" id="2025-40223"/>
  <issue tracker="cve" id="2025-40233"/>
  <issue tracker="cve" id="2025-40242"/>
  <issue tracker="cve" id="2025-40244"/>
  <issue tracker="cve" id="2025-40256"/>
  <issue tracker="cve" id="2025-40258"/>
  <issue tracker="cve" id="2025-40262"/>
  <issue tracker="cve" id="2025-40263"/>
  <issue tracker="cve" id="2025-40269"/>
  <issue tracker="cve" id="2025-40272"/>
  <issue tracker="cve" id="2025-40273"/>
  <issue tracker="cve" id="2025-40275"/>
  <issue tracker="cve" id="2025-40277"/>
  <issue tracker="cve" id="2025-40280"/>
  <issue tracker="cve" id="2025-40282"/>
  <issue tracker="cve" id="2025-40283"/>
  <issue tracker="cve" id="2025-40284"/>
  <issue tracker="cve" id="2025-40288"/>
  <issue tracker="cve" id="2025-40297"/>
  <issue tracker="cve" id="2025-40301"/>
  <issue tracker="cve" id="2025-40304"/>
  <issue tracker="cve" id="2025-40306"/>
  <issue tracker="cve" id="2025-40308"/>
  <issue tracker="cve" id="2025-40309"/>
  <issue tracker="cve" id="2025-40310"/>
  <issue tracker="cve" id="2025-40311"/>
  <issue tracker="cve" id="2025-40312"/>
  <issue tracker="cve" id="2025-40314"/>
  <issue tracker="cve" id="2025-40315"/>
  <issue tracker="cve" id="2025-40316"/>
  <issue tracker="cve" id="2025-40317"/>
  <issue tracker="cve" id="2025-40318"/>
  <issue tracker="cve" id="2025-40320"/>
  <issue tracker="cve" id="2025-40321"/>
  <issue tracker="cve" id="2025-40322"/>
  <issue tracker="cve" id="2025-40323"/>
  <issue tracker="cve" id="2025-40324"/>
  <issue tracker="cve" id="2025-40328"/>
  <issue tracker="cve" id="2025-40329"/>
  <issue tracker="cve" id="2025-40331"/>
  <issue tracker="cve" id="2025-40342"/>
  <issue tracker="cve" id="2025-40343"/>
  <issue tracker="cve" id="2025-40345"/>
  <issue tracker="cve" id="2025-40349"/>
  <issue tracker="cve" id="2025-40351"/>
  <issue tracker="cve" id="2025-68168"/>
  <issue tracker="cve" id="2025-68172"/>
  <issue tracker="cve" id="2025-68176"/>
  <issue tracker="cve" id="2025-68180"/>
  <issue tracker="cve" id="2025-68183"/>
  <issue tracker="cve" id="2025-68185"/>
  <issue tracker="cve" id="2025-68192"/>
  <issue tracker="cve" id="2025-68194"/>
  <issue tracker="cve" id="2025-68195"/>
  <issue tracker="cve" id="2025-68217"/>
  <issue tracker="cve" id="2025-68218"/>
  <issue tracker="cve" id="2025-68222"/>
  <issue tracker="cve" id="2025-68233"/>
  <issue tracker="cve" id="2025-68235"/>
  <issue tracker="cve" id="2025-68237"/>
  <issue tracker="cve" id="2025-68238"/>
  <issue tracker="cve" id="2025-68244"/>
  <issue tracker="cve" id="2025-68249"/>
  <issue tracker="cve" id="2025-68252"/>
  <issue tracker="cve" id="2025-68257"/>
  <issue tracker="cve" id="2025-68258"/>
  <issue tracker="cve" id="2025-68259"/>
  <issue tracker="cve" id="2025-68286"/>
  <issue tracker="cve" id="2025-68287"/>
  <issue tracker="cve" id="2025-68289"/>
  <issue tracker="cve" id="2025-68290"/>
  <issue tracker="cve" id="2025-68303"/>
  <issue tracker="cve" id="2025-68305"/>
  <issue tracker="cve" id="2025-68307"/>
  <issue tracker="cve" id="2025-68308"/>
  <issue tracker="cve" id="2025-68312"/>
  <issue tracker="cve" id="2025-68313"/>
  <issue tracker="cve" id="2025-68328"/>
  <issue tracker="cve" id="2025-68330"/>
  <issue tracker="cve" id="2025-68331"/>
  <issue tracker="cve" id="2025-68332"/>
  <issue tracker="cve" id="2025-68335"/>
  <issue tracker="cve" id="2025-68339"/>
  <issue tracker="cve" id="2025-68345"/>
  <issue tracker="cve" id="2025-68346"/>
  <issue tracker="cve" id="2025-68347"/>
  <issue tracker="cve" id="2025-68354"/>
  <issue tracker="cve" id="2025-68362"/>
  <issue tracker="cve" id="2025-68380"/>
  <issue tracker="cve" id="2025-68724"/>
  <issue tracker="cve" id="2025-68732"/>
  <issue tracker="cve" id="2025-68734"/>
  <issue tracker="cve" id="2025-68740"/>
  <issue tracker="cve" id="2025-68746"/>
  <issue tracker="cve" id="2025-68750"/>
  <issue tracker="cve" id="2025-68753"/>
  <issue tracker="cve" id="2025-68757"/>
  <issue tracker="cve" id="2025-68758"/>
  <issue tracker="cve" id="2025-68759"/>
  <issue tracker="cve" id="2025-68765"/>
  <issue tracker="cve" id="2025-68766"/>
  <issue tracker="jsc" id="PED-14062"/>
  <issue tracker="jsc" id="PED-3527"/>
  <issue tracker="jsc" id="PED-4866"/>
  <issue tracker="jsc" id="PED-5065"/>
  <issue tracker="jsc" id="PED-5453"/>
  <issue tracker="jsc" id="PED-5475"/>
  <issue tracker="jsc" id="PED-5477"/>
  <issue tracker="jsc" id="PED-5511"/>
  <issue tracker="jsc" id="PED-6036"/>
  <issue tracker="jsc" id="PED-6041"/>
  <issue tracker="jsc" id="PED-6045"/>
  <issue tracker="jsc" id="PED-6067"/>
  <issue tracker="jsc" id="PED-6068"/>
  <issue tracker="jsc" id="PED-6069"/>
  <issue tracker="jsc" id="PED-6070"/>
  <issue tracker="jsc" id="PED-6071"/>
  <issue tracker="jsc" id="PED-6104"/>
  <issue tracker="jsc" id="PED-6114"/>
  <issue tracker="jsc" id="PED-6116"/>
  <issue tracker="jsc" id="PED-6120"/>
  <issue tracker="jsc" id="PED-6123"/>
  <issue tracker="jsc" id="PED-6811"/>
  <issue tracker="jsc" id="PED-7514"/>
  <issue tracker="jsc" id="PED-7542"/>
  <issue tracker="jsc" id="PED-7779"/>
  <issue tracker="jsc" id="PED-7780"/>
  <category>security</category>
  <rating>important</rating>
  <packager>tabraham1</packager>
  <reboot_needed/>
<!-- inserted by gitlab@gitlab.suse.de:security/tools.git//home/securitybot/src/sectools/auto_maintenance.pl -->
<releasetarget project="SUSE:Updates:openSUSE-SLE:15.6"/>
<releasetarget project="SUSE:Updates:SLE-Product-SLES_SAP:15-SP6:x86_64"/>
<releasetarget project="SUSE:Updates:SLE-Product-SLES_SAP:15-SP6:ppc64le"/>
<releasetarget project="SUSE:Updates:SLE-Product-SLES:15-SP6-LTSS:x86_64"/>
<releasetarget project="SUSE:Updates:SLE-Product-SLES:15-SP6-LTSS:s390x"/>
<releasetarget project="SUSE:Updates:SLE-Product-SLES:15-SP6-LTSS:ppc64le"/>
<releasetarget project="SUSE:Updates:SLE-Product-SLES:15-SP6-LTSS:aarch64"/>
<releasetarget project="SUSE:Updates:SLE-Product-HA:15-SP6:x86_64"/>
<releasetarget project="SUSE:Updates:SLE-Product-HA:15-SP6:s390x"/>
<releasetarget project="SUSE:Updates:SLE-Product-HA:15-SP6:ppc64le"/>
<releasetarget project="SUSE:Updates:SLE-Product-HA:15-SP6:aarch64"/>
<releasetarget project="SUSE:SLE-15-SP6:Update"/>
  <summary>Security update for the Linux Kernel</summary>
  <description>
The SUSE Linux Enterprise 15 SP6 kernel was updated to fix various security issues

The following security issues were fixed:

- CVE-2025-38321: smb: Log an error when close_all_cached_dirs fails (bsc#1246328).
- CVE-2025-38728: smb3: fix for slab out of bounds on mount to ksmbd (bsc#1249256).
- CVE-2025-39890: wifi: ath12k: fix memory leak in ath12k_service_ready_ext_event (bsc#1250334).
- CVE-2025-39977: futex: Prevent use-after-free during requeue-PI (bsc#1252046).
- CVE-2025-40006: mm/hugetlb: fix folio is still mapped when deleted (bsc#1252342).
- CVE-2025-40024: vhost: Take a reference on the task in struct vhost_task (bsc#1252686).
- CVE-2025-40033: remoteproc: pru: Fix potential NULL pointer dereference in pru_rproc_set_ctable() (bsc#1252824).
- CVE-2025-40042: tracing: Fix race condition in kprobe initialization causing NULL pointer dereference (bsc#1252861).
- CVE-2025-40053: net: dlink: handle copy_thresh allocation failure (bsc#1252808).
- CVE-2025-40081: perf: arm_spe: Prevent overflow in PERF_IDX2OFF() (bsc#1252776).
- CVE-2025-40102: KVM: arm64: Prevent access to vCPU events before init (bsc#1252919).
- CVE-2025-40134: dm: fix NULL pointer dereference in __dm_suspend() (bsc#1253386).
- CVE-2025-40135: ipv6: use RCU in ip6_xmit() (bsc#1253342).
- CVE-2025-40153: mm: hugetlb: avoid soft lockup when mprotect to large memory area (bsc#1253408).
- CVE-2025-40158: ipv6: use RCU in ip6_output() (bsc#1253402).
- CVE-2025-40167: ext4: detect invalid INLINE_DATA + EXTENTS flag combination (bsc#1253458).
- CVE-2025-40170: net: use dst_dev_rcu() in sk_setup_caps() (bsc#1253413).
- CVE-2025-40178: pid: Add a judgment for ns null in pid_nr_ns (bsc#1253463).
- CVE-2025-40179: ext4: verify orphan file size is not too big (bsc#1253442).
- CVE-2025-40187: net/sctp: fix a null dereference in sctp_disposition sctp_sf_do_5_1D_ce() (bsc#1253647).
- CVE-2025-40215: kABI: xfrm: delete x-&gt;tunnel as we delete x (bsc#1254959).
- CVE-2025-40220: fuse: fix livelock in synchronous file put from fuseblk workers (bsc#1254520).
- CVE-2025-40233: ocfs2: clear extent cache after moving/defragmenting extents (bsc#1254813).
- CVE-2025-40242: gfs2: Fix unlikely race in gdlm_put_lock (bsc#1255075).
- CVE-2025-40258: mptcp: fix race condition in mptcp_schedule_work() (bsc#1254843).
- CVE-2025-40280: tipc: Fix use-after-free in tipc_mon_reinit_self() (bsc#1254847).
- CVE-2025-40297: net: bridge: fix use-after-free due to MST port state bypass (bsc#1255187).
- CVE-2025-40328: smb: client: fix potential UAF in smb2_close_cached_fid() (bsc#1254624).
- CVE-2025-40331: sctp: Prevent TOCTOU out-of-bounds write (bsc#1254615).
- CVE-2025-68259: KVM: SVM: Don't skip unrelated instruction if INT3/INTO is replaced (bsc#1255199).

The following non security issues were fixed:

- ACPI: processor_core: fix map_x2apic_id for amd-pstate on am4 (git-fixes).
- ACPI: property: Fix fwnode refcount leak in acpi_fwnode_graph_parse_endpoint() (git-fixes).
- ALSA: dice: fix buffer overflow in detect_stream_formats() (git-fixes).
- ALSA: firewire-motu: add bounds check in put_user loop for DSP events (git-fixes).
- ALSA: firewire-motu: fix buffer overflow in hwdep read for DSP events (git-fixes).
- ALSA: hda: cs35l41: Fix NULL pointer dereference in cs35l41_hda_read_acpi() (git-fixes).
- ALSA: uapi: Fix typo in asound.h comment (git-fixes).
- ALSA: usb-audio: Add DSD quirk for LEAK Stereo 230 (stable-fixes).
- ASoC: Intel: catpt: Fix error path in hw_params() (git-fixes).
- ASoC: ak4458: Disable regulator when error happens (git-fixes).
- ASoC: ak5558: Disable regulator when error happens (git-fixes).
- ASoC: codecs: wcd938x: fix OF node leaks on probe failure (git-fixes).
- ASoC: fsl_xcvr: clear the channel status control memory (git-fixes).
- ASoC: qcom: q6adm: the the copp device only during last instance (git-fixes).
- ASoC: qcom: q6asm-dai: perform correct state check before closing (git-fixes).
- ASoC: qcom: qdsp6: q6asm-dai: set 10 ms period and buffer alignment (git-fixes).
- ASoC: stm32: sai: fix OF node leak on probe (git-fixes).
- ASoC: stm32: sai: fix clk prepare imbalance on probe failure (git-fixes).
- ASoC: stm32: sai: fix device leak on probe (git-fixes).
- Bluetooth: HCI: Fix tracking of advertisement set/instance 0x00 (git-fixes).
- Bluetooth: SMP: Fix not generating mackey and ltk when repairing (git-fixes).
- Bluetooth: hci_sock: Prevent race in socket write iter and sock bind (git-fixes).
- Documentation/kernel-parameters: fix typo in retbleed= kernel parameter description (git-fixes).
- Documentation: hid-alps: Fix packet format section headings (git-fixes).
- Documentation: parport-lowlevel: Separate function listing code blocks (git-fixes).
- HID: logitech-dj: Remove duplicate error logging (git-fixes).
- HID: logitech-hidpp: Do not assume FAP in hidpp_send_message_sync() (git-fixes).
- Input: cros_ec_keyb - fix an invalid memory access (stable-fixes).
- Input: goodix - add support for ACPI ID GDIX1003 (stable-fixes).
- Input: goodix - add support for ACPI ID GDX9110 (stable-fixes).
- KEYS: trusted: Fix a memory leak in tpm2_load_cmd (git-fixes).
- KEYS: trusted_tpm1: Compare HMAC values in constant time (git-fixes).
- PCI/PM: Reinstate clearing state_saved in legacy and !PM codepaths (git-fixes).
- PCI: dwc: Fix wrong PORT_LOGIC_LTSSM_STATE_MASK definition (git-fixes).
- PCI: keystone: Exit ks_pcie_probe() for invalid mode (git-fixes).
- PCI: rcar-gen2: Drop ARM dependency from PCI_RCAR_GEN2 (git-fixes).
- Revert "mtd: rawnand: marvell: fix layouts" (git-fixes).
- USB: Fix descriptor count when handling invalid MBIM extended descriptor (git-fixes).
- USB: serial: belkin_sa: fix TIOCMBIS and TIOCMBIC (git-fixes).
- USB: serial: ftdi_sio: add support for u-blox EVK-M101 (stable-fixes).
- USB: serial: kobil_sct: fix TIOCMBIS and TIOCMBIC (git-fixes).
- USB: serial: option: add Quectel RG255C (stable-fixes).
- USB: serial: option: add Telit FN920C04 ECM compositions (stable-fixes).
- USB: serial: option: add UNISOC UIS7720 (stable-fixes).
- USB: serial: option: add support for Rolling RW101R-GL (stable-fixes).
- USB: storage: Remove subclass and protocol overrides from Novatek quirk (git-fixes).
- arm64: zynqmp: Fix usb node drive strength and slew rate (git-fixes).
- arm64: zynqmp: Revert usb node drive strength and slew rate for (git-fixes).
- atm/fore200e: Fix possible data race in fore200e_open() (git-fixes).
- atm: idt77252: Add missing `dma_map_error()` (stable-fixes).
- backlight: led-bl: Add devlink to supplier LEDs (git-fixes).
- backlight: lp855x: Fix lp855x.h kernel-doc warnings (git-fixes).
- bs-upload-kernel: Fix cve branch uploads.
- btrfs: make sure extent and csum paths are always released in scrub_raid56_parity_stripe() (git-fixes).
- can: gs_usb: gs_usb_xmit_callback(): fix handling of failed transmitted URBs (git-fixes).
- can: kvaser_usb: leaf: Fix potential infinite loop in command parsers (git-fixes).
- can: sja1000: fix max irq loop handling (git-fixes).
- can: sun4i_can: sun4i_can_interrupt(): fix max irq loop handling (git-fixes).
- cifs: Fix uncached read into ITER_KVEC iterator (bsc#1245449).
- cifs: after disabling multichannel, mark tcon for reconnect (git-fixes).
- cifs: avoid redundant calls to disable multichannel (git-fixes).
- cifs: cifs_pick_channel should try selecting active channels (git-fixes).
- cifs: deal with the channel loading lag while picking channels (git-fixes).
- cifs: dns resolution is needed only for primary channel (git-fixes).
- cifs: do not disable interface polling on failure (git-fixes).
- cifs: do not search for channel if server is terminating (git-fixes).
- cifs: fix a pending undercount of srv_count (git-fixes).
- cifs: fix lock ordering while disabling multichannel (git-fixes).
- cifs: fix stray unlock in cifs_chan_skip_or_disable (git-fixes).
- cifs: fix use after free for iface while disabling secondary channels (git-fixes).
- cifs: handle servers that still advertise multichannel after disabling (git-fixes).
- cifs: handle when server starts supporting multichannel (git-fixes).
- cifs: handle when server stops supporting multichannel (git-fixes).
- cifs: make cifs_chan_update_iface() a void function (git-fixes).
- cifs: make sure server interfaces are requested only for SMB3+ (git-fixes).
- cifs: make sure that channel scaling is done only once (git-fixes).
- cifs: reconnect worker should take reference on server struct unconditionally (git-fixes).
- cifs: reset connections for all channels when reconnect requested (git-fixes).
- cifs: reset iface weights when we cannot find a candidate (git-fixes).
- cifs: serialize other channels when query server interfaces is pending (git-fixes).
- cifs: update dstaddr whenever channel iface is updated (git-fixes).
- clk: qcom: camcc-sm6350: Fix PLL config of PLL2 (git-fixes).
- clk: qcom: camcc-sm6350: Specify Titan GDSC power domain as a parent to other (git-fixes).
- clk: renesas: cpg-mssr: Add missing 1ms delay into reset toggle callback (git-fixes).
- clk: renesas: r9a06g032: Fix memory leak in error path (git-fixes).
- comedi: c6xdigio: Fix invalid PNP driver unregistration (git-fixes).
- comedi: check device's attached status in compat ioctls (git-fixes).
- comedi: multiq3: sanitize config options in multiq3_attach() (git-fixes).
- comedi: pcl818: fix null-ptr-deref in pcl818_ai_cancel() (git-fixes).
- cpufreq: intel_pstate: Check IDA only before MSR_IA32_PERF_CTL writes (git-fixes).
- cpuidle: menu: Use residency threshold in polling state override decisions (bsc#1255026).
- crypto: asymmetric_keys - prevent overflow in asymmetric_key_generate_id (git-fixes).
- crypto: authenc - Correctly pass EINPROGRESS back up to the caller (git-fixes).
- crypto: ccree - Correctly handle return of sg_nents_for_len (git-fixes).
- crypto: hisilicon/qm - restore original qos values (git-fixes).
- crypto: iaa - Fix incorrect return value in save_iaa_wq() (git-fixes).
- crypto: rockchip - drop redundant crypto_skcipher_ivsize() calls (git-fixes).
- dm-integrity: limit MAX_TAG_SIZE to 255 (git-fixes).
- dm-verity: fix unreliable memory allocation (git-fixes).
- dm: fix queue start/stop imbalance under suspend/load/resume races (bsc#1253386).
- drivers/usb/dwc3: fix PCI parent check (git-fixes).
- drm/amd/display: Check NULL before accessing (stable-fixes).
- drm/amd/display: Fix logical vs bitwise bug in get_embedded_panel_info_v2_1() (git-fixes).
- drm/amd/display: Increase DPCD read retries (stable-fixes).
- drm/amd/display: Move sleep into each retry for retrieve_link_cap() (stable-fixes).
- drm/amdgpu: Skip emit de meta data on gfx11 with rs64 enabled (stable-fixes).
- drm/amdgpu: add missing lock to amdgpu_ttm_access_memory_sdma (git-fixes).
- drm/amdgpu: fix cyan_skillfish2 gpu info fw handling (git-fixes).
- drm/gma500: Remove unused helper psb_fbdev_fb_setcolreg() (git-fixes).
- drm/mediatek: Fix CCORR mtk_ctm_s31_32_to_s1_n function issue (git-fixes).
- drm/mediatek: Fix device node reference leak in mtk_dp_dt_parse() (git-fixes).
- drm/mgag200: Fix big-endian support (git-fixes).
- drm/msm/a2xx: stop over-complaining about the legacy firmware (git-fixes).
- drm/msm/a6xx: Fix out of bound IO access in a6xx_get_gmu_registers (git-fixes).
- drm/msm/a6xx: Flush LRZ cache before PT switch (git-fixes).
- drm/msm/dpu: Remove dead-code in dpu_encoder_helper_reset_mixers() (git-fixes).
- drm/nouveau: restrict the flush page to a 32-bit address (git-fixes).
- drm/ttm: Avoid NULL pointer deref for evicted BOs (git-fixes).
- drm/vgem-fence: Fix potential deadlock on release (git-fixes).
- drm: nouveau: Replace sprintf() with sysfs_emit() (git-fixes).
- drm: sti: fix device leaks at component probe (git-fixes).
- efi/libstub: Describe missing 'out' parameter in efi_load_initrd (git-fixes).
- efi/libstub: Fix page table access in 5-level to 4-level paging transition (git-fixes).
- fbdev: pxafb: Fix multiple clamped values in pxafb_adjust_timing (git-fixes).
- fbdev: ssd1307fb: fix potential page leak in ssd1307fb_probe() (git-fixes).
- fbdev: tcx.c fix mem_map to correct smem_start offset (git-fixes).
- firmware: imx: scu-irq: fix OF node leak in (git-fixes).
- firmware: stratix10-svc: Add mutex in stratix10 memory management (git-fixes).
- firmware: stratix10-svc: fix bug in saving controller data (git-fixes).
- firmware: stratix10-svc: fix make htmldocs warning for stratix10_svc (git-fixes).
- gpu: host1x: Fix race in syncpt alloc/free (git-fixes).
- hwmon: (max16065) Use local variable to avoid TOCTOU (git-fixes).
- hwmon: (w83791d) Convert macros to functions to avoid TOCTOU (git-fixes).
- hwmon: (w83l786ng) Convert macros to functions to avoid TOCTOU (git-fixes).
- hwmon: sy7636a: Fix regulator_enable resource leak on error path (git-fixes).
- i2c: amd-mp2: fix reference leak in MP2 PCI device (git-fixes).
- i2c: i2c.h: fix a bad kernel-doc line (git-fixes).
- i3c: master: svc: Prevent incomplete IBI transaction (git-fixes).
- iio: accel: bmc150: Fix irq assumption regression (stable-fixes).
- iio: accel: fix ADXL355 startup race condition (git-fixes).
- iio: adc: ad7280a: fix ad7280_store_balance_timer() (git-fixes).
- iio: core: Clean up device correctly on iio_device_alloc() failure (git-fixes).
- iio: core: add missing mutex_destroy in iio_dev_release() (git-fixes).
- iio: imu: st_lsm6dsx: Fix measurement unit for odr struct member (git-fixes).
- iio: imu: st_lsm6dsx: fix array size for st_lsm6dsx_settings fields (git-fixes).
- iio: st_lsm6dsx: Fixed calibrated timestamp calculation (git-fixes).
- ima: Handle error code returned by ima_filter_rule_match() (git-fixes).
- intel_th: Fix error handling in intel_th_output_open (git-fixes).
- ipmi: Fix handling of messages with provided receive message pointer (git-fixes).
- ipmi: Rework user message limit handling (git-fixes).
- irqchip/mchp-eic: Fix error code in mchp_eic_domain_alloc() (git-fixes).
- kconfig/mconf: Initialize the default locale at startup (stable-fixes).
- kconfig/nconf: Initialize the default locale at startup (stable-fixes).
- leds: leds-lp50xx: Allow LED 0 to be added to module bank (git-fixes).
- leds: leds-lp50xx: Enable chip before any communication (git-fixes).
- leds: leds-lp50xx: LP5009 supports 3 modules for a total of 9 LEDs (git-fixes).
- leds: netxbig: Fix GPIO descriptor leak in error paths (git-fixes).
- lib/vsprintf: Check pointer before dereferencing in time_and_date() (git-fixes).
- mailbox: mailbox-test: Fix debugfs_create_dir error checking (git-fixes).
- media: TDA1997x: Remove redundant cancel_delayed_work in probe (git-fixes).
- media: adv7842: Avoid possible out-of-bounds array accesses in adv7842_cp_log_status() (git-fixes).
- media: amphion: Cancel message work before releasing the VPU core (git-fixes).
- media: atomisp: Prefix firmware paths with "intel/ipu/" (bsc#1252973).
- media: atomisp: Remove firmware_name module parameter (bsc#1252973).
- media: cec: Fix debugfs leak on bus_register() failure (git-fixes).
- media: dvb-usb: dtv5100: fix out-of-bounds in dtv5100_i2c_msg() (git-fixes).
- media: i2c: ADV7604: Remove redundant cancel_delayed_work in probe (git-fixes).
- media: i2c: adv7842: Remove redundant cancel_delayed_work in probe (git-fixes).
- media: msp3400: Avoid possible out-of-bounds array accesses in msp3400c_thread() (git-fixes).
- media: pvrusb2: Fix incorrect variable used in trace message (git-fixes).
- media: rc: st_rc: Fix reset control resource leak (git-fixes).
- media: renesas: rcar_drif: fix device node reference leak in rcar_drif_bond_enabled (git-fixes).
- media: samsung: exynos4-is: fix potential ABBA deadlock on init (git-fixes).
- media: v4l2-mem2mem: Fix outdated documentation (git-fixes).
- media: verisilicon: Protect G2 HEVC decoder against invalid DPB index (git-fixes).
- media: videobuf2: Fix device reference leak in vb2_dc_alloc error path (git-fixes).
- media: vidtv: initialize local pointers upon transfer of memory ownership (git-fixes).
- media: vpif_capture: fix section mismatch (git-fixes).
- media: vpif_display: fix section mismatch (git-fixes).
- mfd: altera-sysmgr: Fix device leak on sysmgr regmap lookup (git-fixes).
- mfd: da9055: Fix missing regmap_del_irq_chip() in error path (git-fixes).
- mfd: max77620: Fix potential IRQ chip conflict when probing two devices (git-fixes).
- mfd: mt6358-irq: Fix missing irq_domain_remove() in error path (git-fixes).
- mfd: mt6397-irq: Fix missing irq_domain_remove() in error path (git-fixes).
- most: usb: fix double free on late probe failure (git-fixes).
- mt76: mt7615: Fix memory leak in mt7615_mcu_wtbl_sta_add() (git-fixes).
- mtd: lpddr_cmds: fix signed shifts in lpddr_cmds (git-fixes).
- mtd: maps: pcmciamtd: fix potential memory leak in pcmciamtd_detach() (git-fixes).
- mtd: nand: relax ECC parameter validation check (git-fixes).
- mtd: rawnand: lpc32xx_slc: fix GPIO descriptor leak on probe error and remove (git-fixes).
- mtd: rawnand: renesas: Handle devm_pm_runtime_enable() errors (git-fixes).
- net: phy: adin1100: Fix software power-down ready condition (git-fixes).
- net: phy: mxl-gpy: fix bogus error on USXGMII and integrated PHY (git-fixes).
- net: phy: mxl-gpy: fix link properties on USXGMII and internal PHYs (git-fixes).
- nvme: Use non zero KATO for persistent discovery connections (git-fixes).
- orangefs: fix xattr related buffer overflow.. (git-fixes).
- phy: broadcom: bcm63xx-usbh: fix section mismatches (git-fixes).
- phy: renesas: rcar-gen3-usb2: Fix an error handling path in rcar_gen3_phy_usb2_probe() (git-fixes).
- pinctrl: stm32: fix hwspinlock resource leak in probe function (git-fixes).
- platform/chrome: cros_ec_ishtp: Fix UAF after unbinding driver (git-fixes).
- platform/x86: asus-wmi: use brightness_set_blocking() for kbd led (git-fixes).
- platform/x86: intel: chtwc_int33fe: don't dereference swnode args (git-fixes).
- platform/x86: intel: punit_ipc: fix memory corruption (git-fixes).
- power: supply: apm_power: only unset own apm_get_power_status (git-fixes).
- power: supply: cw2015: Check devm_delayed_work_autocancel() return code (git-fixes).
- power: supply: rt9467: Prevent using uninitialized local variable in rt9467_set_value_from_ranges() (git-fixes).
- power: supply: rt9467: Return error on failure in rt9467_set_value_from_ranges() (git-fixes).
- power: supply: wm831x: Check wm831x_set_bits() return value (git-fixes).
- powerpc/64s/slb: Fix SLB multihit issue during SLB preload (bac#1236022 ltc#211187).
- powerpc/eeh: fix recursive pci_lock_rescan_remove locking in EEH event handling (bsc#1253262 ltc#216029).
- pwm: bcm2835: Make sure the channel is enabled after pwm_request() (git-fixes).
- regulator: core: Protect regulator_supply_alias_list with regulator_list_mutex (git-fixes).
- regulator: core: disable supply if enabling main regulator fails (git-fixes).
- rpmsg: glink: fix rpmsg device leak (git-fixes).
- rtc: gamecube: Check the return value of ioremap() (git-fixes).
- scripts: teaapi: Add paging.
- scrits: teaapi: Add list_repos.
- scsi: lpfc: Add capability to register Platform Name ID to fabric (bsc#1254119).
- scsi: lpfc: Allow support for BB credit recovery in point-to-point topology (bsc#1254119).
- scsi: lpfc: Ensure unregistration of rpis for received PLOGIs (bsc#1254119).
- scsi: lpfc: Fix leaked ndlp krefs when in point-to-point topology (bsc#1254119).
- scsi: lpfc: Fix reusing an ndlp that is marked NLP_DROPPED during FLOGI (bsc#1254119).
- scsi: lpfc: Modify kref handling for Fabric Controller ndlps (bsc#1254119).
- scsi: lpfc: Remove redundant NULL ptr assignment in lpfc_els_free_iocb() (bsc#1254119).
- scsi: lpfc: Revise discovery related function headers and comments (bsc#1254119).
- scsi: lpfc: Update lpfc version to 14.4.0.12 (bsc#1254119).
- scsi: lpfc: Update various NPIV diagnostic log messaging (bsc#1254119).
- serial: amba-pl011: prefer dma_mapping_error() over explicit address checking (git-fixes).
- slimbus: ngd: Fix reference count leak in qcom_slim_ngd_notify_slaves (git-fixes).
- smb3: add missing null server pointer check (git-fixes).
- smb: client: fix cifs_pick_channel when channel needs reconnect (git-fixes).
- smb: client: fix warning when reconnecting channel (git-fixes).
- smb: client: introduce close_cached_dir_locked() (git-fixes).
- soc/tegra: fuse: speedo-tegra210: Update speedo IDs (git-fixes).
- soc: amlogic: canvas: fix device leak on lookup (git-fixes).
- soc: qcom: ocmem: fix device leak on lookup (git-fixes).
- soc: qcom: smem: fix hwspinlock resource leak in probe error paths (git-fixes).
- spi: amlogic-spifc-a1: Handle devm_pm_runtime_enable() errors (git-fixes).
- spi: bcm63xx: drop wrong casts in probe() (git-fixes).
- spi: bcm63xx: fix premature CS deassertion on RX-only transactions (git-fixes).
- spi: tegra210-qspi: Remove cache operations (git-fixes).
- spi: tegra210-quad: Add support for internal DMA (git-fixes).
- spi: tegra210-quad: Check hardware status on timeout (bsc#1253155).
- spi: tegra210-quad: Fix timeout handling (bsc#1253155).
- spi: tegra210-quad: Fix timeout handling (git-fixes).
- spi: tegra210-quad: Refactor error handling into helper functions (bsc#1253155).
- spi: tegra210-quad: Update dummy sequence configuration (git-fixes).
- staging: fbtft: core: fix potential memory leak in fbtft_probe_common() (git-fixes).
- thunderbolt: Add support for Intel Wildcat Lake (stable-fixes).
- tracing: Fix access to trace_event_file (bsc#1254373).
- uio: uio_fsl_elbc_gpcm:: Add null pointer check to uio_fsl_elbc_gpcm_probe (git-fixes).
- usb: cdns3: Fix double resource release in cdns3_pci_probe (git-fixes).
- usb: chaoskey: fix locking for O_NONBLOCK (git-fixes).
- usb: chipidea: udc: limit usb request length to max 16KB (stable-fixes).
- usb: dwc2: fix hang during suspend if set as peripheral (git-fixes).
- usb: dwc3: Abort suspend on soft disconnect failure (git-fixes).
- usb: dwc3: Fix race condition between concurrent dwc3_remove_requests() call paths (git-fixes).
- usb: dwc3: pci: Sort out the Intel device IDs (stable-fixes).
- usb: dwc3: pci: add support for the Intel Nova Lake -S (stable-fixes).
- usb: gadget: configfs: Correctly set use_os_string at bind (git-fixes).
- usb: gadget: f_eem: Fix memory leak in eem_unwrap (git-fixes).
- usb: gadget: renesas_usbf: Handle devm_pm_runtime_enable() errors (git-fixes).
- usb: gadget: tegra-xudc: Always reinitialize data toggle when clear halt (git-fixes).
- usb: phy: Initialize struct usb_phy list_head (git-fixes).
- usb: raw-gadget: cap raw_io transfer length to KMALLOC_MAX_SIZE (git-fixes).
- usb: raw-gadget: do not limit transfer length (git-fixes).
- usb: storage: Fix memory leak in USB bulk transport (git-fixes).
- usb: storage: sddr55: Reject out-of-bound new_pba (stable-fixes).
- usb: typec: tipd: Clear interrupts first (git-fixes).
- usb: typec: ucsi: psy: Set max current to zero when disconnected (git-fixes).
- usb: uas: fix urb unmapping issue when the uas device is remove during ongoing data transfer (git-fixes).
- usb: udc: Add trace event for usb_gadget_set_state (stable-fixes).
- usb: vhci-hcd: Prevent suspending virtually attached devices (git-fixes).
- watchdog: wdat_wdt: Fix ACPI table leak in probe function (git-fixes).
- wifi: ath11k: fix peer HE MCS assignment (git-fixes).
- wifi: ath11k: restore register window after global reset (git-fixes).
- wifi: cw1200: Fix potential memory leak in cw1200_bh_rx_helper() (git-fixes).
- wifi: ieee80211: correct FILS status codes (git-fixes).
- wifi: mac80211: fix CMAC functions not handling errors (git-fixes).
- wifi: mt76: Fix DTS power-limits on little endian systems (git-fixes).
- wifi: nl80211: vendor-cmd: intel: fix a blank kernel-doc line warning (git-fixes).
- wifi: rtl818x: Fix potential memory leaks in rtl8180_init_rx_ring() (git-fixes).
- wifi: rtl818x: rtl8187: Fix potential buffer underflow in rtl8187_rx_cb() (git-fixes).
- x86/hyperv: Fix APIC ID and VP index confusion in hv_snp_boot_ap() (git-fixes).
- x86/microcode/AMD: Add TSA microcode SHAs (bsc#1256528).
- x86/microcode/AMD: Add Zen5 model 0x44, stepping 0x1 minrev (bsc#1256528).
- x86/microcode/AMD: Add more known models to entry sign checking (bsc#1256528).
- x86/microcode/AMD: Add some forgotten models to the SHA check (bsc#1256528).
- x86/microcode/AMD: Clean the cache if update did not load microcode (bsc#1256528).
- x86/microcode/AMD: Extend the SHA check to Zen5, block loading of any unreleased standalone Zen5 microcode patches (bsc#1256528).
- x86/microcode/AMD: Fix Entrysign revision check for Zen5/Strix Halo (bsc#1256528).
- x86/microcode/AMD: Fix __apply_microcode_amd()'s return value (bsc#1256528).
- x86/microcode/AMD: Limit Entrysign signature checking to known generations (bsc#1256528).
- x86/microcode/AMD: Load only SHA256-checksummed patches (bsc#1256528).
- x86/microcode/AMD: Select which microcode patch to load (bsc#1256528).
- x86/microcode/AMD: Use sha256() instead of init/update/final (bsc#1256528).
- x86/microcode: Fix Entrysign revision check for Zen1/Naples (bsc#1256528).
- xhci: dbgtty: fix device unregister (git-fixes).
</description>
</patchinfo>
openSUSE Build Service is sponsored by