File _patchinfo of Package patchinfo.42248
<patchinfo incident="42248"> <issue tracker="bnc" id="1012628">Continuous stable update tracker for Tumbleweed</issue> <issue tracker="bnc" id="1065729">[trackerbug] 4.12 powerpc base kernel fixes</issue> <issue tracker="bnc" id="1194869">[TRACKERBUG] 5.14 powerpc base kernel fixes</issue> <issue tracker="bnc" id="1214635">Backport SEV Live Migration fix into SLES-15 SP4 and greater</issue> <issue tracker="bnc" id="1214847">LIO target_cmd_counter memory leak</issue> <issue tracker="bnc" id="1215146">VUL-0: CVE-2023-42752: kernel: integer overflow in Linux kernel leading exploitable memory access</issue> <issue tracker="bnc" id="1215211">io_uring functional and performance backports (SLE 15 SP6)</issue> <issue tracker="bnc" id="1215344">s390/dcssblk: fix kernel crash with list_add corruption</issue> <issue tracker="bnc" id="1216062">blk-cgroup: Fix NULL deref caused by blkg_policy_data being installed before init</issue> <issue tracker="bnc" id="1216436">Backport block layer patches from 6.6</issue> <issue tracker="bnc" id="1219165">fstests generic/735 crash in ext4</issue> <issue tracker="bnc" id="1220419">SLE15-SP6 networking performance backports and fixes</issue> <issue tracker="bnc" id="1223731">VUL-0: CVE-2024-26944: kernel: btrfs: zoned: use-after-free in do_zone_finish()</issue> <issue tracker="bnc" id="1234163">[PATCH] ext4: correct grp validation in ext4_mb_good_group</issue> <issue tracker="bnc" id="1245193">backport nvmet-loop fixes</issue> <issue tracker="bnc" id="1245449">Kernel stack trace for executable programs on cifs-shares</issue> <issue tracker="bnc" id="1246328">VUL-0: CVE-2025-38321: kernel: smb: Log an error when close_all_cached_dirs fails</issue> <issue tracker="bnc" id="1247500">nvme over FC: kernel soft lockup on module removal</issue> <issue tracker="bnc" id="1248886">refcount_t underflow in smb2_query_info_compound() — ref:_00D1igLOd._500Trh3Fg7:ref</issue> <issue tracker="bnc" id="1249256">VUL-0: CVE-2025-38728: kernel: smb3: fix for slab out of bounds on mount to ksmbd</issue> <issue tracker="bnc" id="1250334">VUL-0: CVE-2025-39890: kernel: wifi: ath12k: fix memory leak in ath12k_service_ready_ext_event - memory leak triggerable over the air</issue> <issue tracker="bnc" id="1252046">VUL-0: CVE-2025-39977: kernel: futex: Prevent use-after-free during requeue-PI</issue> <issue tracker="bnc" id="1252342">VUL-0: CVE-2025-40006: kernel: mm/hugetlb: fix folio is still mapped when deleted</issue> <issue tracker="bnc" id="1252686">VUL-0: CVE-2025-40024: kernel: vhost: Take a reference on the task in struct vhost_task.</issue> <issue tracker="bnc" id="1252776">VUL-0: CVE-2025-40081: kernel: perf: arm_spe: Prevent overflow in PERF_IDX2OFF()</issue> <issue tracker="bnc" id="1252808">VUL-0: CVE-2025-40053: kernel: net: dlink: handle copy_thresh allocation failure</issue> <issue tracker="bnc" id="1252824">VUL-0: CVE-2025-40033: kernel: remoteproc: pru: Fix potential NULL pointer dereference in pru_rproc_set_ctable()</issue> <issue tracker="bnc" id="1252861">VUL-0: CVE-2025-40042: kernel: tracing: Fix race condition in kprobe initialization causing NULL pointer dereference</issue> <issue tracker="bnc" id="1252919">VUL-0: CVE-2025-40102: kernel: KVM: arm64: Prevent access to vCPU events before init</issue> <issue tracker="bnc" id="1252973">kernel firmware load issue after update to 15.6</issue> <issue tracker="bnc" id="1253155">Nvidia Grace: Backport: spi: tegra210-quad: Improve timeout handling under high system load</issue> <issue tracker="bnc" id="1253262">FVT1110.10:RT:SRIOV: EEH functionality is broken with 6.4.0-150600.23.70.1 and later [REGRESSION]</issue> <issue tracker="bnc" id="1253342">VUL-0: CVE-2025-40135: kernel: ipv6: use RCU in ip6_xmit()</issue> <issue tracker="bnc" id="1253386">VUL-0: CVE-2025-40134: kernel: dm: fix NULL pointer dereference in __dm_suspend()</issue> <issue tracker="bnc" id="1253402">VUL-0: CVE-2025-40158: kernel: ipv6: use RCU in ip6_output()</issue> <issue tracker="bnc" id="1253408">VUL-0: CVE-2025-40153: kernel: mm: hugetlb: avoid soft lockup when mprotect to large memory area</issue> <issue tracker="bnc" id="1253413">VUL-0: CVE-2025-40170: kernel: net: use dst_dev_rcu() in sk_setup_caps()</issue> <issue tracker="bnc" id="1253442">VUL-0: CVE-2025-40179: kernel: ext4: verify orphan file size is not too big</issue> <issue tracker="bnc" id="1253458">VUL-0: CVE-2025-40167: kernel: ext4: detect invalid INLINE_DATA + EXTENTS flag combination</issue> <issue tracker="bnc" id="1253463">VUL-0: CVE-2025-40178: kernel: pid: Add a check for ns is null in pid_nr_ns</issue> <issue tracker="bnc" id="1253647">VUL-0: CVE-2025-40187: kernel: net/sctp: fix a null dereference in sctp_disposition sctp_sf_do_5_1D_ce()</issue> <issue tracker="bnc" id="1254119">Update Broadcom Emulex lpfc driver for SL-16.1 to 14.4.0.12</issue> <issue tracker="bnc" id="1254126">VUL-0: CVE-2025-40211: kernel: ACPI: video: Fix use-after-free in acpi_video_switch_brightness()</issue> <issue tracker="bnc" id="1254373">L3: NULL pointer dereference in tracing_open_file_tr() — thread::n_Aj3YOeKE230H3XSjeOPys:: / thread::yqkPMUgSL5qnbGNvOyS24Ss::</issue> <issue tracker="bnc" id="1254518">VUL-0: CVE-2025-40219: kernel: PCI/IOV: Add PCI rescan-remove locking when enabling/disabling SR-IOV</issue> <issue tracker="bnc" id="1254520">VUL-0: CVE-2025-40220: kernel: fuse: fix livelock in synchronous file put from fuseblk workers</issue> <issue tracker="bnc" id="1254599">VUL-0: CVE-2023-53768: kernel: regmap-irq: Fix out-of-bounds access when allocating config buffers</issue> <issue tracker="bnc" id="1254606">VUL-0: CVE-2023-53762: kernel: Bluetooth: hci_sync: Fix UAF in hci_disconnect_all_sync</issue> <issue tracker="bnc" id="1254611">VUL-0: CVE-2023-53750: kernel: pinctrl: freescale: Fix a memory out of bounds when num_configs is 1</issue> <issue tracker="bnc" id="1254613">VUL-0: CVE-2023-53752: kernel: net: deal with integer overflows in kmalloc_reserve()</issue> <issue tracker="bnc" id="1254615">VUL-0: CVE-2025-40331: kernel: sctp: Prevent TOCTOU out-of-bounds write</issue> <issue tracker="bnc" id="1254621">VUL-0: CVE-2025-40329: kernel: drm/sched: Fix deadlock in drm_sched_entity_kill_jobs_cb</issue> <issue tracker="bnc" id="1254623">VUL-0: CVE-2023-53828: kernel: Bluetooth: hci_sync: Avoid use-after-free in dbg for hci_add_adv_monitor()</issue> <issue tracker="bnc" id="1254624">VUL-0: CVE-2025-40328: kernel: smb: client: fix potential UAF in smb2_close_cached_fid()</issue> <issue tracker="bnc" id="1254626">VUL-0: CVE-2023-53860: kernel: dm: don't attempt to queue IO under RCU protection</issue> <issue tracker="bnc" id="1254648">VUL-0: CVE-2023-53857: kernel: bpf: bpf_sk_storage: Fix invalid wait context lockdep report</issue> <issue tracker="bnc" id="1254649">VUL-0: CVE-2023-53844: kernel: drm/ttm: Don't leak a resource on swapout move error</issue> <issue tracker="bnc" id="1254653">VUL-0: CVE-2023-53852: kernel: nvme-core: fix memory leak in dhchap_secret_store</issue> <issue tracker="bnc" id="1254655">VUL-0: CVE-2023-53839: kernel: dccp: fix data-race around dp->dccps_mss_cache</issue> <issue tracker="bnc" id="1254657">VUL-0: CVE-2023-53863: kernel: netlink: do not hard code device address lenth in fdb dumps</issue> <issue tracker="bnc" id="1254660">VUL-0: CVE-2023-53834: kernel: iio: adc: ina2xx: avoid NULL pointer dereference on OF device match</issue> <issue tracker="bnc" id="1254661">VUL-0: CVE-2023-53856: kernel: of: overlay: Call of_changeset_init() early</issue> <issue tracker="bnc" id="1254663">VUL-0: CVE-2023-53759: HID: hidraw: fix data race on device refcount</issue> <issue tracker="bnc" id="1254669">VUL-0: CVE-2023-53821: kernel: ip6_vti: fix slab-use-after-free in decode_session6</issue> <issue tracker="bnc" id="1254677">VUL-0: CVE-2023-53850: kernel: iavf: use internal state to free traffic IRQs</issue> <issue tracker="bnc" id="1254678">VUL-0: CVE-2023-53861: kernel: ext4: correct grp validation in ext4_mb_good_group</issue> <issue tracker="bnc" id="1254688">VUL-0: CVE-2023-53855: kernel: net: dsa: ocelot: call dsa_tag_8021q_unregister() under rtnl_lock() on driver remove</issue> <issue tracker="bnc" id="1254690">VUL-0: CVE-2023-53842: kernel: ASoC: codecs: wcd-mbhc-v2: fix resource leaks on component remove</issue> <issue tracker="bnc" id="1254691">VUL-0: CVE-2023-53823: kernel: block/rq_qos: protect rq_qos apis with a new lock</issue> <issue tracker="bnc" id="1254693">VUL-0: CVE-2023-53836: kernel: bpf, sockmap: Fix skb refcnt race after locking changes</issue> <issue tracker="bnc" id="1254695">VUL-0: CVE-2023-53851: kernel: drm/msm/dp: Drop aux devices together with DP controller</issue> <issue tracker="bnc" id="1254698">VUL-0: CVE-2023-53847: kernel: usb-storage: alauda: Fix uninit-value in alauda_check_media()</issue> <issue tracker="bnc" id="1254701">VUL-0: CVE-2023-53831: kernel: net: read sk->sk_family once in sk_mc_loop()</issue> <issue tracker="bnc" id="1254704">VUL-0: CVE-2023-53858: kernel: tty: serial: samsung_tty: Fix a memory leak in s3c24xx_serial_getclk() in case of error</issue> <issue tracker="bnc" id="1254705">VUL-0: CVE-2023-53843: kernel: net: openvswitch: reject negative ifindex</issue> <issue tracker="bnc" id="1254707">VUL-0: CVE-2023-53825: kernel: kcm: Fix error handling for SOCK_DGRAM in kcm_sendmsg().</issue> <issue tracker="bnc" id="1254712">VUL-0: CVE-2023-53819: kernel: amdgpu: validate offset_in_bo of drm_amdgpu_gem_va</issue> <issue tracker="bnc" id="1254715">VUL-0: CVE-2023-53815: kernel: posix-timers: Prevent RT livelock in itimer_delete()</issue> <issue tracker="bnc" id="1254717">VUL-0: CVE-2023-53813: kernel: ext4: fix rbtree traversal bug in ext4_mb_use_preallocated</issue> <issue tracker="bnc" id="1254723">VUL-0: CVE-2023-53808: kernel: wifi: mwifiex: fix memory leak in mwifiex_histogram_read()</issue> <issue tracker="bnc" id="1254724">VUL-0: CVE-2023-53807: kernel: clk: clocking-wizard: Fix Oops in clk_wzrd_register_divider()</issue> <issue tracker="bnc" id="1254732">VUL-0: CVE-2023-53799: kernel: crypto: api - Use work queue in crypto_destroy_instance</issue> <issue tracker="bnc" id="1254733">VUL-0: CVE-2023-53797: kernel: HID: wacom: Use ktime_t rather than int when dealing with timestamps</issue> <issue tracker="bnc" id="1254737">VUL-0: CVE-2023-53795: kernel: iommufd: IOMMUFD_DESTROY should not increase the refcount</issue> <issue tracker="bnc" id="1254739">VUL-0: CVE-2023-53793: kernel: perf tool x86: Fix perf_env memory leak</issue> <issue tracker="bnc" id="1254742">VUL-0: CVE-2023-53791: kernel: md: fix warning for holder mismatch from export_rdev()</issue> <issue tracker="bnc" id="1254743">VUL-0: CVE-2023-53792: kernel: nvme-core: fix memory leak in dhchap_ctrl_secret</issue> <issue tracker="bnc" id="1254749">VUL-0: CVE-2023-53777: kernel: erofs: kill hooked chains to avoid loops on deduplicated compressed images</issue> <issue tracker="bnc" id="1254750">VUL-0: CVE-2023-53787: kernel: regulator: da9063: fix null pointer deref with partial DT config</issue> <issue tracker="bnc" id="1254753">VUL-0: CVE-2023-53848: kernel: md/raid5-cache: fix a deadlock in r5l_exit_log()</issue> <issue tracker="bnc" id="1254754">VUL-0: CVE-2023-53864: kernel: drm/mxsfb: Disable overlay plane in mxsfb_plane_overlay_atomic_disable()</issue> <issue tracker="bnc" id="1254758">VUL-0: CVE-2023-53782: kernel: dccp: Fix out of bounds access in DCCP error handler</issue> <issue tracker="bnc" id="1254761">VUL-0: CVE-2023-53778: kernel: accel/qaic: Clean up integer overflow checking in map_user_pages()</issue> <issue tracker="bnc" id="1254762">VUL-0: CVE-2023-53865: kernel: btrfs: fix warning when putting transaction with qgroups enabled after abort</issue> <issue tracker="bnc" id="1254765">VUL-0: CVE-2023-53784: kernel: drm: bridge: dw_hdmi: fix connector access for scdc</issue> <issue tracker="bnc" id="1254782">VUL-0: CVE-2023-53743: kernel: PCI: Free released resource after coalescing</issue> <issue tracker="bnc" id="1254791">VUL-0: CVE-2025-40324: kernel: NFSD: Fix crash in nfsd4_read_release()</issue> <issue tracker="bnc" id="1254793">VUL-0: CVE-2025-40320: kernel: smb: client: fix potential cfid UAF in smb2_query_info_compound</issue> <issue tracker="bnc" id="1254795">VUL-0: CVE-2025-40321: kernel: wifi: brcmfmac: fix crash while sending Action Frames in standalone AP Mode</issue> <issue tracker="bnc" id="1254796">VUL-0: CVE-2025-40317: kernel: regmap: slimbus: fix bus_context pointer in regmap init calls</issue> <issue tracker="bnc" id="1254797">VUL-0: CVE-2025-40316: kernel: drm/mediatek: Fix device use-after-free on unbind</issue> <issue tracker="bnc" id="1254798">VUL-0: CVE-2025-40318: kernel: Bluetooth: hci_sync: fix race in hci_cmd_sync_dequeue_once</issue> <issue tracker="bnc" id="1254813">VUL-0: CVE-2025-40233: kernel: ocfs2: clear extent cache after moving/defragmenting extents</issue> <issue tracker="bnc" id="1254828">VUL-0: CVE-2025-40273: kernel: NFSD: free copynotify stateid in nfs4_free_ol_stateid()</issue> <issue tracker="bnc" id="1254829">VUL-0: CVE-2025-40275: kernel: ALSA: usb-audio: Fix NULL pointer dereference in snd_usb_mixer_controls_badd</issue> <issue tracker="bnc" id="1254832">VUL-0: CVE-2025-40272: kernel: mm/secretmem: fix use-after-free race in fault handler</issue> <issue tracker="bnc" id="1254840">VUL-0: CVE-2025-40262: kernel: Input: imx_sc_key - fix memory corruption on unload</issue> <issue tracker="bnc" id="1254843">VUL-0: CVE-2025-40258: kernel: mptcp: fix race condition in mptcp_schedule_work()</issue> <issue tracker="bnc" id="1254847">VUL-0: CVE-2025-40280: kernel: tipc: Fix use-after-free in tipc_mon_reinit_self().</issue> <issue tracker="bnc" id="1254850">VUL-0: CVE-2025-40282: kernel: Bluetooth: 6lowpan: reset link-local header on ipv6 recv path</issue> <issue tracker="bnc" id="1254851">VUL-0: CVE-2025-40256: kernel: xfrm: also call xfrm_state_delete_tunnel at destroy time for states that were never added</issue> <issue tracker="bnc" id="1254858">VUL-0: CVE-2025-40283: kernel: Bluetooth: btusb: reorder cleanup in btusb_disconnect to avoid UAF</issue> <issue tracker="bnc" id="1254860">VUL-0: CVE-2025-40284: kernel: Bluetooth: MGMT: cancel mesh send timer when hdev removed</issue> <issue tracker="bnc" id="1254894">VUL-0: CVE-2025-40277: kernel: drm/vmwgfx: Validate command header size against SVGA_CMD_MAX_DATASIZE</issue> <issue tracker="bnc" id="1254918">VUL-0: CVE-2023-53785: kernel: mt76: mt7921: don't assume adequate headroom for SDIO headers</issue> <issue tracker="bnc" id="1254957">VUL-0: CVE-2025-40223: kernel: most: usb: Fix use-after-free in hdm_disconnect</issue> <issue tracker="bnc" id="1254959">VUL-0: CVE-2025-40215: kernel: xfrm: delete x->tunnel as we delete x</issue> <issue tracker="bnc" id="1254983">VUL-0: CVE-2023-53846: kernel: f2fs: fix to do sanity check on direct node in truncate_dnode()</issue> <issue tracker="bnc" id="1255005">VUL-0: CVE-2023-53766: kernel: FS: JFS: Check for read-only mounted filesystem in txBegin</issue> <issue tracker="bnc" id="1255009">VUL-0: CVE-2023-53841: kernel: devlink: report devlink_port_type_warn source device</issue> <issue tracker="bnc" id="1255026">SLES15SP6[FW1110] [Kernel Version: 6.4.0-150600.23.78-default] CPU Governor Fails to Select the Correct Idle State(Snooze/CEDE)</issue> <issue tracker="bnc" id="1255033">VUL-0: CVE-2025-40244: kernel: hfsplus: fix KMSAN uninit-value issue in __hfsplus_ext_cache_extent()</issue> <issue tracker="bnc" id="1255034">VUL-0: CVE-2025-40304: kernel: fbdev: Add bounds checking in bit_putcs to fix vmalloc-out-of-bounds</issue> <issue tracker="bnc" id="1255035">VUL-0: CVE-2025-40269: kernel: ALSA: usb-audio: Fix potential overflow of PCM transfer buffer</issue> <issue tracker="bnc" id="1255041">VUL-0: CVE-2025-40310: kernel: amd/amdkfd: resolve a race in amdgpu_amdkfd_device_fini_sw</issue> <issue tracker="bnc" id="1255046">VUL-0: CVE-2025-40312: kernel: jfs: Verify inode mode when loading from disk</issue> <issue tracker="bnc" id="1255057">VUL-0: CVE-2025-40288: kernel: drm/amdgpu: Fix NULL pointer dereference in VRAM logic for APU devices</issue> <issue tracker="bnc" id="1255062">VUL-0: CVE-2025-40306: kernel: orangefs: fix xattr related buffer overflow...</issue> <issue tracker="bnc" id="1255064">VUL-0: CVE-2025-40308: kernel: Bluetooth: bcsp: receive data only if registered</issue> <issue tracker="bnc" id="1255065">VUL-0: CVE-2025-40309: kernel: Bluetooth: SCO: Fix UAF on sco_conn_free</issue> <issue tracker="bnc" id="1255068">VUL-0: CVE-2025-40311: kernel: accel/habanalabs: support mapping cb with vmalloc-backed coherent memory</issue> <issue tracker="bnc" id="1255072">VUL-0: CVE-2025-40314: kernel: usb: cdns3: gadget: Use-after-free during failed initialization and exit of cdnsp gadget</issue> <issue tracker="bnc" id="1255075">VUL-0: CVE-2025-40242: kernel: gfs2: Fix unlikely race in gdlm_put_lock</issue> <issue tracker="bnc" id="1255077">VUL-0: CVE-2025-40263: kernel: Input: cros_ec_keyb - fix an invalid memory access</issue> <issue tracker="bnc" id="1255083">VUL-0: CVE-2025-40315: kernel: usb: gadget: f_fs: Fix epfile null pointer access after ep enable.</issue> <issue tracker="bnc" id="1255092">VUL-0: CVE-2025-40322: kernel: fbdev: bitblit: bound-check glyph index in bit_putcs*</issue> <issue tracker="bnc" id="1255094">VUL-0: CVE-2025-40323: kernel: fbcon: Set fb_display[i]->mode to NULL when the mode is released</issue> <issue tracker="bnc" id="1255100">VUL-0: CVE-2025-68168: kernel: jfs: fix uninitialized waitqueue in transaction manager</issue> <issue tracker="bnc" id="1255122">VUL-0: CVE-2025-68303: kernel: platform/x86: intel: punit_ipc: fix memory corruption</issue> <issue tracker="bnc" id="1255135">VUL-0: CVE-2025-68185: kernel: nfs4_setup_readdir(): insufficient locking for ->d_parent->d_inode dereferencing</issue> <issue tracker="bnc" id="1255146">VUL-0: CVE-2025-68307: kernel: can: gs_usb: gs_usb_xmit_callback(): fix handling of failed transmitted URBs</issue> <issue tracker="bnc" id="1255149">VUL-0: CVE-2025-68308: kernel: can: kvaser_usb: leaf: Fix potential infinite loop in command parsers</issue> <issue tracker="bnc" id="1255152">VUL-0: CVE-2025-68287: kernel: usb: dwc3: Fix race condition between concurrent dwc3_remove_requests() call paths</issue> <issue tracker="bnc" id="1255154">VUL-0: CVE-2025-68290: kernel: most: usb: fix double free on late probe failure</issue> <issue tracker="bnc" id="1255155">VUL-0: CVE-2025-68289: kernel: usb: gadget: f_eem: Fix memory leak in eem_unwrap</issue> <issue tracker="bnc" id="1255163">VUL-0: CVE-2023-53794: kernel: cifs: fix session state check in reconnect to avoid use-after-free issue</issue> <issue tracker="bnc" id="1255167">VUL-0: CVE-2025-68257: kernel: comedi: check device's attached status in compat ioctls</issue> <issue tracker="bnc" id="1255169">VUL-0: CVE-2025-68305: kernel: Bluetooth: hci_sock: Prevent race in socket write iter and sock bind</issue> <issue tracker="bnc" id="1255171">VUL-0: CVE-2025-68312: kernel: usbnet: Prevents free active kevent</issue> <issue tracker="bnc" id="1255182">VUL-0: CVE-2025-68258: kernel: comedi: multiq3: sanitize config options in multiq3_attach()</issue> <issue tracker="bnc" id="1255187">VUL-0: CVE-2025-40297: kernel: net: bridge: fix use-after-free due to MST port state bypass</issue> <issue tracker="bnc" id="1255190">VUL-0: CVE-2025-68244: kernel: drm/i915: Avoid lock inversion when pinning to GGTT on CHV/BXT+VTD</issue> <issue tracker="bnc" id="1255193">VUL-0: CVE-2025-40301: kernel: Bluetooth: hci_event: validate skb length for unknown CC opcode</issue> <issue tracker="bnc" id="1255197">VUL-0: CVE-2025-68252: kernel: misc: fastrpc: Fix dma_buf object leak in fastrpc_map_lookup</issue> <issue tracker="bnc" id="1255199">VUL-0: CVE-2025-68259: kernel: KVM: SVM: Don't skip unrelated instruction if INT3/INTO is replaced</issue> <issue tracker="bnc" id="1255202">VUL-0: CVE-2025-68238: kernel: mtd: rawnand: cadence: fix DMA device NULL pointer dereference</issue> <issue tracker="bnc" id="1255203">VUL-0: CVE-2025-68237: kernel: mtdchar: fix integer overflow in read/write ioctls</issue> <issue tracker="bnc" id="1255206">VUL-0: CVE-2025-68233: kernel: drm/tegra: Add call to put_pid()</issue> <issue tracker="bnc" id="1255209">VUL-0: CVE-2025-68235: kernel: nouveau/firmware: Add missing kfree() of nvkm_falcon_fw::boot</issue> <issue tracker="bnc" id="1255218">VUL-0: CVE-2025-68222: kernel: pinctrl: s32cc: fix uninitialized memory in s32_pinctrl_desc</issue> <issue tracker="bnc" id="1255221">VUL-0: CVE-2025-68217: kernel: Input: pegasus-notetaker - fix potential out-of-bounds access</issue> <issue tracker="bnc" id="1255233">VUL-0: CVE-2025-68249: kernel: most: usb: hdm_probe: Fix calling put_device() before device initialization</issue> <issue tracker="bnc" id="1255245">VUL-0: CVE-2025-68218: kernel: nvme-multipath: fix lockdep WARN due to partition scan work</issue> <issue tracker="bnc" id="1255246">VUL-0: CVE-2025-68192: kernel: net: usb: qmi_wwan: initialize MAC header offset in qmimux_rx_fixup</issue> <issue tracker="bnc" id="1255251">VUL-0: CVE-2025-68183: kernel: ima: don't clear IMA_DIGSIG flag when setting or removing non-IMA xattr</issue> <issue tracker="bnc" id="1255252">VUL-0: CVE-2025-68180: kernel: drm/amd/display: Fix NULL deref in debugfs odm_combine_segments</issue> <issue tracker="bnc" id="1255253">VUL-0: CVE-2025-68172: kernel: crypto: aspeed - fix double free caused by devm</issue> <issue tracker="bnc" id="1255259">VUL-0: CVE-2025-68195: kernel: x86/CPU/AMD: Add missing terminator for zen5_rdseed_microcode</issue> <issue tracker="bnc" id="1255274">VUL-0: CVE-2025-40342: kernel: nvme-fc: use lock accessing port_state and rport state</issue> <issue tracker="bnc" id="1255276">VUL-0: CVE-2025-40343: kernel: nvmet-fc: avoid scheduling association deletion twice</issue> <issue tracker="bnc" id="1255279">VUL-0: CVE-2025-40345: kernel: usb: storage: sddr55: Reject out-of-bound new_pba</issue> <issue tracker="bnc" id="1255280">VUL-0: CVE-2025-40349: kernel: hfs: validate record offset in hfsplus_bmap_alloc</issue> <issue tracker="bnc" id="1255281">VUL-0: CVE-2025-40351: kernel: hfsplus: fix KMSAN uninit-value issue in hfsplus_delete_cat()</issue> <issue tracker="bnc" id="1255325">VUL-0: CVE-2025-68194: kernel: media: imon: make send_packet() more robust</issue> <issue tracker="bnc" id="1255329">VUL-0: CVE-2025-68176: kernel: PCI: cadence: Check for the existence of cdns_pcie::ops before using it</issue> <issue tracker="bnc" id="1255351">VUL-0: CVE-2025-68286: drm/amd/display: Check NULL before accessing</issue> <issue tracker="bnc" id="1255415">VUL-0: CVE-2025-68313: kernel: x86/CPU/AMD: Add RDSEED fix for Zen5</issue> <issue tracker="bnc" id="1255480">VUL-0: CVE-2025-68335: kernel: comedi: pcl818: fix null-ptr-deref in pcl818_ai_cancel()</issue> <issue tracker="bnc" id="1255483">VUL-0: CVE-2025-68332: kernel: comedi: c6xdigio: Fix invalid PNP driver unregistration</issue> <issue tracker="bnc" id="1255489">VUL-0: CVE-2025-68328: kernel: firmware: stratix10-svc: fix bug in saving controller data</issue> <issue tracker="bnc" id="1255493">VUL-0: CVE-2025-68330: kernel: iio: accel: bmc150: Fix irq assumption regression</issue> <issue tracker="bnc" id="1255495">VUL-0: CVE-2025-68331: kernel: usb: uas: fix urb unmapping issue when the uas device is remove during ongoing data transfer</issue> <issue tracker="bnc" id="1255505">VUL-0: CVE-2025-68339: kernel: atm/fore200e: Fix possible data race in fore200e_open()</issue> <issue tracker="bnc" id="1255538">VUL-0: CVE-2025-68734: kernel: isdn: mISDN: hfcsusb: fix memory leak in hfcsusb_probe()</issue> <issue tracker="bnc" id="1255540">VUL-0: CVE-2023-54038: kernel: Bluetooth: hci_conn: return ERR_PTR instead of NULL when there is no link</issue> <issue tracker="bnc" id="1255545">VUL-0: CVE-2023-54022: kernel: ALSA: usb-audio: Fix potential memory leaks at error path for UMP open</issue> <issue tracker="bnc" id="1255549">VUL-0: CVE-2023-54026: kernel: opp: Fix use-after-free in lazy_opp_tables after probe deferral</issue> <issue tracker="bnc" id="1255550">VUL-0: CVE-2025-68724: kernel: crypto: asymmetric_keys - prevent overflow in asymmetric_key_generate_id</issue> <issue tracker="bnc" id="1255553">VUL-0: CVE-2025-68354: kernel: regulator: core: Protect regulator_supply_alias_list with regulator_list_mutex</issue> <issue tracker="bnc" id="1255557">VUL-0: CVE-2023-54037: kernel: ice: prevent NULL pointer deref during reload</issue> <issue tracker="bnc" id="1255558">VUL-0: CVE-2023-54025: kernel: wifi: rsi: Do not configure WoWlan in shutdown hook if not enabled</issue> <issue tracker="bnc" id="1255563">VUL-0: CVE-2023-54035: kernel: netfilter: nf_tables: fix underflow in chain reference counter</issue> <issue tracker="bnc" id="1255564">VUL-0: CVE-2023-54000: kernel: net: hns3: fix deadlock issue when externel_lb and reset are executed together</issue> <issue tracker="bnc" id="1255570">VUL-0: CVE-2023-53994: kernel: ionic: remove WARN_ON to prevent panic_on_warn</issue> <issue tracker="bnc" id="1255578">VUL-0: CVE-2023-53998: kernel: hwrng: virtio - Fix race on data_avail and actual data</issue> <issue tracker="bnc" id="1255579">VUL-0: CVE-2023-54027: kernel: iio: core: Prevent invalid memory access when there is no parent</issue> <issue tracker="bnc" id="1255580">VUL-0: CVE-2025-68380: kernel: wifi: ath11k: fix peer HE MCS assignment</issue> <issue tracker="bnc" id="1255583">VUL-0: CVE-2023-54031: kernel: vdpa: Add queue index attr to vdpa_nl_policy for nlattr length check</issue> <issue tracker="bnc" id="1255591">VUL-0: CVE-2023-54006: kernel: af_unix: Fix data-race around unix_tot_inflight.</issue> <issue tracker="bnc" id="1255601">VUL-0: CVE-2025-68345: kernel: ALSA: hda: cs35l41: Fix NULL pointer dereference in cs35l41_hda_read_acpi()</issue> <issue tracker="bnc" id="1255603">VUL-0: CVE-2025-68346: kernel: ALSA: dice: fix buffer overflow in detect_stream_formats()</issue> <issue tracker="bnc" id="1255605">VUL-0: CVE-2023-54017: kernel: powerpc/pseries: fix possible memory leak in ibmebus_bus_init()</issue> <issue tracker="bnc" id="1255611">VUL-0: CVE-2025-68362: kernel: wifi: rtl818x: rtl8187: Fix potential buffer underflow in rtl8187_rx_cb()</issue> <issue tracker="bnc" id="1255616">VUL-0: CVE-2023-53995: kernel: net: ipv4: fix one memleak in __inet_del_ifa()</issue> <issue tracker="bnc" id="1255617">VUL-0: CVE-2023-54032: kernel: btrfs: fix race when deleting quota root from the dirty cow roots list</issue> <issue tracker="bnc" id="1255618">VUL-0: CVE-2023-53996: kernel: x86/sev: Make enc_dec_hypercall() accept a size instead of npages</issue> <issue tracker="bnc" id="1255621">VUL-0: CVE-2023-53999: kernel: net/mlx5e: TC, Fix internal port memory leak</issue> <issue tracker="bnc" id="1255628">VUL-0: CVE-2023-54001: kernel: staging: r8712: Fix memory leak in _r8712_init_xmit_priv()</issue> <issue tracker="bnc" id="1255629">VUL-0: CVE-2023-54005: kernel: binder: fix memory leak in binder_init()</issue> <issue tracker="bnc" id="1255630">VUL-0: CVE-2023-54008: kernel: virtio_vdpa: build affinity masks conditionally</issue> <issue tracker="bnc" id="1255632">VUL-0: CVE-2023-53997: kernel: thermal: of: fix double-free on unregistration</issue> <issue tracker="bnc" id="1255636">VUL-0: CVE-2023-54019: kernel: sched/psi: use kernfs polling functions for PSI trigger polling</issue> <issue tracker="bnc" id="1255688">VUL-0: CVE-2025-68732: kernel: gpu: host1x: Fix race in syncpt alloc/free</issue> <issue tracker="bnc" id="1255691">VUL-0: CVE-2023-54030: kernel: io_uring/net: don't overflow multishot recv</issue> <issue tracker="bnc" id="1255702">VUL-0: CVE-2023-54042: kernel: powerpc/64s: Fix VAS mm use after free</issue> <issue tracker="bnc" id="1255704">VUL-0: CVE-2023-54156: kernel: sfc: fix crash when reading stats while NIC is resetting</issue> <issue tracker="bnc" id="1255706">VUL-0: CVE-2025-68347: kernel: ALSA: firewire-motu: fix buffer overflow in hwdep read for DSP events</issue> <issue tracker="bnc" id="1255722">VUL-0: CVE-2025-68746: kernel: spi: tegra210-quad: Fix timeout handling</issue> <issue tracker="bnc" id="1255758">VUL-0: CVE-2023-54326: kernel: misc: pci_endpoint_test: Free IRQs before removing the device</issue> <issue tracker="bnc" id="1255759">VUL-0: CVE-2023-54324: kernel: dm: fix a race condition in retrieve_deps</issue> <issue tracker="bnc" id="1255760">VUL-0: CVE-2023-54319: kernel: pinctrl: at91-pio4: check return value of devm_kasprintf()</issue> <issue tracker="bnc" id="1255763">VUL-0: CVE-2023-54322: kernel: arm64: set __exception_irq_entry with __irq_entry as a default</issue> <issue tracker="bnc" id="1255769">VUL-0: CVE-2023-54315: kernel: powerpc/powernv/sriov: perform null check on iov before dereferencing iov</issue> <issue tracker="bnc" id="1255770">VUL-0: CVE-2023-54316: kernel: refscale: Fix uninitalized use of wait_queue_head_t</issue> <issue tracker="bnc" id="1255772">VUL-0: CVE-2023-54318: kernel: net/smc: use smc_lgr_list.lock to protect smc_lgr_list.list iterate in smcr_port_add</issue> <issue tracker="bnc" id="1255774">VUL-0: CVE-2023-54312: kernel: samples/bpf: Fix buffer overflow in tcp_basertt</issue> <issue tracker="bnc" id="1255775">VUL-0: CVE-2023-54313: kernel: ovl: fix null pointer dereference in ovl_get_acl_rcu()</issue> <issue tracker="bnc" id="1255776">VUL-0: CVE-2023-54314: kernel: media: af9005: Fix null-ptr-deref in af9005_i2c_xfer</issue> <issue tracker="bnc" id="1255780">VUL-0: CVE-2023-54309: kernel: tpm: tpm_vtpm_proxy: fix a race condition in /dev/vtpmx creation</issue> <issue tracker="bnc" id="1255785">VUL-0: CVE-2023-54303: kernel: bpf: Disable preemption in bpf_perf_event_output</issue> <issue tracker="bnc" id="1255786">VUL-0: CVE-2023-54304: kernel: firmware: meson_sm: fix to avoid potential NULL pointer dereference</issue> <issue tracker="bnc" id="1255789">VUL-0: CVE-2023-54299: kernel: usb: typec: bus: verify partner exists in typec_altmode_attention</issue> <issue tracker="bnc" id="1255790">VUL-0: CVE-2023-54300: kernel: wifi: ath9k: avoid referencing uninit memory in ath9k_wmi_ctrl_rx</issue> <issue tracker="bnc" id="1255792">VUL-0: CVE-2023-54302: kernel: RDMA/irdma: Fix data race on CQP completion stats</issue> <issue tracker="bnc" id="1255793">VUL-0: CVE-2023-54296: kernel: KVM: SVM: Get source vCPUs from source VM for SEV-ES intrahost migration</issue> <issue tracker="bnc" id="1255795">VUL-0: CVE-2023-54297: kernel: btrfs: zoned: fix memory leak after finding block group with super blocks</issue> <issue tracker="bnc" id="1255798">VUL-0: CVE-2023-54291: kernel: vduse: fix NULL pointer dereference</issue> <issue tracker="bnc" id="1255800">VUL-0: CVE-2023-54292: kernel: RDMA/irdma: Fix data race on CQP request done</issue> <issue tracker="bnc" id="1255801">VUL-0: CVE-2023-54293: kernel: bcache: fixup btree_cache_wait list damage</issue> <issue tracker="bnc" id="1255806">VUL-0: CVE-2023-54289: kernel: scsi: qedf: Fix NULL dereference in error handling</issue> <issue tracker="bnc" id="1255807">VUL-0: CVE-2023-54285: kernel: iomap: Fix possible overflow condition in iomap_write_delalloc_scan</issue> <issue tracker="bnc" id="1255809">VUL-0: CVE-2023-54283: kernel: bpf: Address KCSAN report on bpf_lru_list</issue> <issue tracker="bnc" id="1255810">VUL-0: CVE-2023-54282: kernel: media: tuners: qt1010: replace BUG_ON with a regular error</issue> <issue tracker="bnc" id="1255812">VUL-0: CVE-2025-68740: kernel: ima: Handle error code returned by ima_filter_rule_match()</issue> <issue tracker="bnc" id="1255814">VUL-0: CVE-2025-68750: kernel: usb: potential integer overflow in usbg_make_tpg()</issue> <issue tracker="bnc" id="1255820">VUL-0: CVE-2023-54281: kernel: btrfs: release path before inode lookup during the ino lookup ioctl</issue> <issue tracker="bnc" id="1255838">VUL-0: CVE-2023-54241: kernel: MIPS: KVM: Fix NULL pointer dereference</issue> <issue tracker="bnc" id="1255842">VUL-0: CVE-2023-54221: kernel: clk: imx93: fix memory leak and missing unwind goto in imx93_clocks_probe</issue> <issue tracker="bnc" id="1255843">VUL-0: CVE-2023-54211: kernel: tracing: Fix warning in trace_buffered_event_disable()</issue> <issue tracker="bnc" id="1255872">VUL-0: CVE-2023-54264: kernel: fs/sysv: Null check to prevent null-ptr-deref bug</issue> <issue tracker="bnc" id="1255875">VUL-0: CVE-2023-54266: kernel: media: dvb-usb: m920x: Fix a potential memory leak in m920x_i2c_xfer()</issue> <issue tracker="bnc" id="1255879">VUL-0: CVE-2023-54261: kernel: drm/amdkfd: Add missing gfx11 MQD manager callbacks</issue> <issue tracker="bnc" id="1255883">VUL-0: CVE-2023-54263: kernel: drm/nouveau/kms/nv50-: init hpd_irq_lock for PIOR DP</issue> <issue tracker="bnc" id="1255884">VUL-0: CVE-2023-54255: kernel: sh: dma: Fix DMA channel offset calculation</issue> <issue tracker="bnc" id="1255886">VUL-0: CVE-2023-54258: kernel: cifs: fix potential oops in cifs_oplock_break</issue> <issue tracker="bnc" id="1255888">VUL-0: CVE-2023-54251: kernel: net/sched: taprio: Limit TCA_TAPRIO_ATTR_SCHED_CYCLE_TIME to INT_MAX.</issue> <issue tracker="bnc" id="1255890">VUL-0: CVE-2023-54254: kernel: drm/ttm: Don't leak a resource on eviction error</issue> <issue tracker="bnc" id="1255891">VUL-0: CVE-2023-54253: kernel: btrfs: set page extent mapped after read_folio in relocate_one_page</issue> <issue tracker="bnc" id="1255892">VUL-0: CVE-2023-54247: kernel: bpf: Silence a warning in btf_type_id_size()</issue> <issue tracker="bnc" id="1255899">VUL-0: CVE-2023-54267: kernel: powerpc/pseries: Rework lppaca_shared_proc() to avoid DEBUG_PREEMPT</issue> <issue tracker="bnc" id="1255902">VUL-0: CVE-2023-54271: kernel: blk-cgroup: Fix NULL deref caused by blkg_policy_data being installed before init</issue> <issue tracker="bnc" id="1255907">VUL-0: CVE-2023-54276: kernel: nfsd: move init of percpu reply_cache_stats counters back to nfsd_init_net</issue> <issue tracker="bnc" id="1255911">VUL-0: CVE-2023-54278: kernel: s390/vmem: split pages when debug pagealloc is enabled</issue> <issue tracker="bnc" id="1255915">VUL-0: CVE-2023-54246: kernel: rcuscale: Move rcu_scale_writer() schedule_timeout_uninterruptible() to _idle()</issue> <issue tracker="bnc" id="1255918">VUL-0: CVE-2023-54240: kernel: net: ethernet: mtk_eth_soc: fix possible NULL pointer dereference in mtk_hwlro_get_fdir_all()</issue> <issue tracker="bnc" id="1255921">VUL-0: CVE-2023-54235: kernel: PCI/DOE: Fix destroy_work_on_stack() race</issue> <issue tracker="bnc" id="1255924">VUL-0: CVE-2023-54229: kernel: wifi: ath11k: fix registration of 6Ghz-only phy without the full channel range</issue> <issue tracker="bnc" id="1255925">VUL-0: CVE-2023-54230: kernel: amba: bus: fix refcount leak</issue> <issue tracker="bnc" id="1255931">VUL-0: CVE-2025-68765: kernel: mt76: mt7615: Fix memory leak in mt7615_mcu_wtbl_sta_add()</issue> <issue tracker="bnc" id="1255932">VUL-0: CVE-2025-68766: kernel: irqchip/mchp-eic: Fix error code in mchp_eic_domain_alloc()</issue> <issue tracker="bnc" id="1255934">VUL-0: CVE-2025-68759: kernel: wifi: rtl818x: Fix potential memory leaks in rtl8180_init_rx_ring()</issue> <issue tracker="bnc" id="1255943">VUL-0: CVE-2025-68757: kernel: drm/vgem-fence: Fix potential deadlock on release</issue> <issue tracker="bnc" id="1255944">VUL-0: CVE-2025-68758: kernel: backlight: led-bl: Add devlink to supplier LEDs</issue> <issue tracker="bnc" id="1255949">VUL-0: CVE-2023-54220: kernel: serial: 8250: Fix oops for port->pm on uart_change_pm()</issue> <issue tracker="bnc" id="1255951">VUL-0: CVE-2023-54224: kernel: btrfs: fix lockdep splat and potential deadlock after failure running delayed items</issue> <issue tracker="bnc" id="1255952">VUL-0: CVE-2023-54227: kernel: blk-mq: fix tags leak when shrink nr_hw_queues</issue> <issue tracker="bnc" id="1255955">VUL-0: CVE-2023-54210: kernel: Bluetooth: hci_sync: Avoid use-after-free in dbg for hci_remove_adv_monitor()</issue> <issue tracker="bnc" id="1255957">VUL-0: CVE-2023-54215: kernel: virtio-vdpa: Fix cpumask memory leak in virtio_vdpa_find_vqs()</issue> <issue tracker="bnc" id="1255961">VUL-0: CVE-2023-54207: kernel: HID: uclogic: Correct devm device reference for hidinput input_dev name</issue> <issue tracker="bnc" id="1255963">VUL-0: CVE-2023-54209: kernel: block: fix blktrace debugfs entries leakage</issue> <issue tracker="bnc" id="1255964">VUL-0: CVE-2023-54201: kernel: RDMA/efa: Fix wrong resources deallocation order</issue> <issue tracker="bnc" id="1255967">VUL-0: CVE-2023-54204: kernel: mmc: sunplus: fix return value check of mmc_add_host()</issue> <issue tracker="bnc" id="1255974">VUL-0: CVE-2023-54194: kernel: exfat: use kvmalloc_array/kvfree instead of kmalloc_array/kfree</issue> <issue tracker="bnc" id="1255978">VUL-0: CVE-2023-54189: kernel: pstore/ram: Add check for kstrdup</issue> <issue tracker="bnc" id="1255984">VUL-0: CVE-2023-54185: kernel: btrfs: remove BUG_ON()'s in add_new_free_space()</issue> <issue tracker="bnc" id="1255988">VUL-0: CVE-2023-54181: kernel: bpf: Fix issue in verifying allow_ptr_leaks</issue> <issue tracker="bnc" id="1255990">VUL-0: CVE-2023-54183: kernel: media: v4l2-core: Fix a potential resource leak in v4l2_fwnode_parse_link()</issue> <issue tracker="bnc" id="1255992">VUL-0: CVE-2023-54178: kernel: of: unittest: fix null pointer dereferencing in of_unittest_find_node_by_name()</issue> <issue tracker="bnc" id="1255993">VUL-0: CVE-2023-54177: kernel: quota: fix warning in dqgrab()</issue> <issue tracker="bnc" id="1255994">VUL-0: CVE-2023-54179: kernel: scsi: qla2xxx: Array index may go out of bound</issue> <issue tracker="bnc" id="1255996">VUL-0: CVE-2023-54173: kernel: bpf: Disable preemption in bpf_event_output</issue> <issue tracker="bnc" id="1256033">VUL-0: CVE-2023-54172: kernel: x86/hyperv: Disable IBT when hypercall page lacks ENDBR instruction</issue> <issue tracker="bnc" id="1256034">VUL-0: CVE-2023-54171: kernel: tracing: Fix memory leak of iter->temp when reading trace_pipe</issue> <issue tracker="bnc" id="1256045">VUL-0: CVE-2023-54170: kernel: keys: Fix linking a duplicate key to a keyring's assoc_array</issue> <issue tracker="bnc" id="1256050">VUL-0: CVE-2023-54169: kernel: net/mlx5e: fix memory leak in mlx5e_ptp_open</issue> <issue tracker="bnc" id="1256058">VUL-0: CVE-2023-53992: kernel: wifi: cfg80211: ocb: don't leave if not joined</issue> <issue tracker="bnc" id="1256071">VUL-0: CVE-2023-54164: kernel: Bluetooth: ISO: fix iso_conn related locking and validity issues</issue> <issue tracker="bnc" id="1256074">VUL-0: CVE-2023-54166: kernel: igc: Fix Kernel Panic during ndo_tx_timeout callback</issue> <issue tracker="bnc" id="1256081">VUL-0: CVE-2023-54153: kernel: ext4: turn quotas off if mount failed after enabling quotas</issue> <issue tracker="bnc" id="1256082">VUL-0: CVE-2023-54154: kernel: scsi: target: core: Fix target_cmd_counter leak</issue> <issue tracker="bnc" id="1256083">VUL-0: CVE-2023-54155: kernel: net: core: remove unnecessary frame_sz check in bpf_xdp_adjust_tail()</issue> <issue tracker="bnc" id="1256084">VUL-0: CVE-2023-54148: kernel: net/mlx5e: Move representor neigh cleanup to profile cleanup_tx</issue> <issue tracker="bnc" id="1256085">VUL-0: CVE-2023-54149: kernel: net: dsa: avoid suspicious RCU usage for synced VLAN-aware MAC addresses</issue> <issue tracker="bnc" id="1256090">VUL-0: CVE-2023-54145: kernel: bpf: drop unnecessary user-triggerable WARN_ONCE in verifierl log</issue> <issue tracker="bnc" id="1256093">VUL-0: CVE-2023-54140: kernel: nilfs2: fix WARNING in mark_buffer_dirty due to discarded buffer reuse</issue> <issue tracker="bnc" id="1256094">VUL-0: CVE-2023-54141: kernel: wifi: ath11k: Add missing hw_ops->get_ring_selector() for IPQ5018</issue> <issue tracker="bnc" id="1256095">VUL-0: CVE-2023-54142: kernel: gtp: Fix use-after-free in __gtp_encap_destroy().</issue> <issue tracker="bnc" id="1256096">VUL-0: CVE-2023-54143: kernel: media: mediatek: vcodec: fix resource leaks in vdec_msg_queue_init()</issue> <issue tracker="bnc" id="1256099">VUL-0: CVE-2023-54136: kernel: serial: sprd: Fix DMA buffer leak issue</issue> <issue tracker="bnc" id="1256100">VUL-0: CVE-2023-54137: kernel: vfio/type1: fix cap_migration information leak</issue> <issue tracker="bnc" id="1256104">VUL-0: CVE-2023-54133: kernel: nfp: clean mc addresses in application firmware when closing port</issue> <issue tracker="bnc" id="1256106">VUL-0: CVE-2023-54134: kernel: autofs: fix memory leak of waitqueues in autofs_catatonic_mode</issue> <issue tracker="bnc" id="1256107">VUL-0: CVE-2023-54135: kernel: maple_tree: fix potential out-of-bounds access in mas_wr_end_piv()</issue> <issue tracker="bnc" id="1256117">VUL-0: CVE-2023-54125: kernel: fs/ntfs3: Return error for inconsistent extended attributes</issue> <issue tracker="bnc" id="1256119">VUL-0: CVE-2023-54127: kernel: fs/jfs: prevent double-free in dbUnmount() after failed jfs_remount()</issue> <issue tracker="bnc" id="1256121">VUL-0: CVE-2023-54115: kernel: pcmcia: rsrc_nonstatic: Fix memory leak in nonstatic_release_resource_db()</issue> <issue tracker="bnc" id="1256145">VUL-0: CVE-2023-54104: kernel: mtd: rawnand: fsl_upm: Fix an off-by one test in fun_exec_op()</issue> <issue tracker="bnc" id="1256153">VUL-0: CVE-2023-54101: kernel: driver: soc: xilinx: use _safe loop iterator to avoid a use after free</issue> <issue tracker="bnc" id="1256178">VUL-0: CVE-2023-54096: kernel: soundwire: fix enumeration completion</issue> <issue tracker="bnc" id="1256197">VUL-0: CVE-2023-54099: kernel: fs: Protect reconfiguration of sb read-write from racing writes</issue> <issue tracker="bnc" id="1256231">VUL-0: CVE-2023-54219: kernel: Revert "IB/isert: Fix incorrect release of isert connection"</issue> <issue tracker="bnc" id="1256233">VUL-0: CVE-2023-54223: kernel: net/mlx5e: xsk: Fix invalid buffer access for legacy rq</issue> <issue tracker="bnc" id="1256234">VUL-0: CVE-2023-54225: kernel: net: ipa: only reset hashed tables when supported</issue> <issue tracker="bnc" id="1256238">VUL-0: CVE-2025-68753: kernel: ALSA: firewire-motu: add bounds check in put_user loop for DSP events</issue> <issue tracker="bnc" id="1256263">VUL-0: CVE-2023-54088: kernel: blk-cgroup: hold queue_lock when removing blkg->q_node</issue> <issue tracker="bnc" id="1256267">VUL-0: CVE-2023-54121: kernel: btrfs: fix incorrect splitting in btrfs_drop_extent_map_range</issue> <issue tracker="bnc" id="1256268">VUL-0: CVE-2023-54089: kernel: virtio_pmem: add the missing REQ_OP_WRITE for flush bio</issue> <issue tracker="bnc" id="1256271">VUL-0: CVE-2023-54095: kernel: powerpc/iommu: Fix notifiers being shared by PCI and VIO buses</issue> <issue tracker="bnc" id="1256273">VUL-0: CVE-2023-54093: kernel: media: anysee: fix null-ptr-deref in anysee_master_xfer</issue> <issue tracker="bnc" id="1256274">VUL-0: CVE-2023-54091: kernel: drm/client: Fix memory leak in drm_client_target_cloned</issue> <issue tracker="bnc" id="1256279">VUL-0: CVE-2023-54016: kernel: wifi: ath12k: Fix memory leak in rx_desc and tx_desc</issue> <issue tracker="bnc" id="1256285">VUL-0: CVE-2023-54045: kernel: audit: fix possible soft lockup in __audit_inode_child()</issue> <issue tracker="bnc" id="1256291">VUL-0: CVE-2023-54072: kernel: ALSA: pcm: Fix potential data race at PCM memory allocation helpers</issue> <issue tracker="bnc" id="1256292">VUL-0: CVE-2023-54094: kernel: net: prevent skb corruption on frag list segmentation</issue> <issue tracker="bnc" id="1256300">VUL-0: CVE-2023-54014: kernel: scsi: qla2xxx: Check valid rport returned by fc_bsg_to_rport()</issue> <issue tracker="bnc" id="1256301">VUL-0: CVE-2023-54023: kernel: btrfs: fix race between balance and cancel/pause</issue> <issue tracker="bnc" id="1256302">VUL-0: CVE-2023-53989: kernel: arm64: mm: fix VA-range sanity check</issue> <issue tracker="bnc" id="1256335">VUL-0: CVE-2023-54076: kernel: smb: client: fix missed ses refcounting</issue> <issue tracker="bnc" id="1256348">VUL-0: CVE-2023-54117: kernel: s390/dcssblk: fix kernel crash with list_add corruption</issue> <issue tracker="bnc" id="1256351">VUL-0: CVE-2023-54113: kernel: rcu: dump vmalloc memory info safely</issue> <issue tracker="bnc" id="1256354">VUL-0: CVE-2023-54112: kernel: kcm: Fix memory leak in error path of kcm_sendmsg()</issue> <issue tracker="bnc" id="1256358">VUL-0: CVE-2023-54106: kernel: net/mlx5: fix potential memory leak in mlx5e_init_rep_rx</issue> <issue tracker="bnc" id="1256361">VUL-0: CVE-2023-54081: kernel: xen: speed up grant-table reclaim</issue> <issue tracker="bnc" id="1256364">VUL-0: CVE-2023-54070: kernel: igb: clean up in all error paths when enabling SR-IOV</issue> <issue tracker="bnc" id="1256367">VUL-0: CVE-2023-54080: kernel: btrfs: zoned: skip splitting and logical rewriting on pre-alloc write</issue> <issue tracker="bnc" id="1256368">VUL-0: CVE-2023-54083: kernel: phy: tegra: xusb: Clear the driver reference in usb-phy dev</issue> <issue tracker="bnc" id="1256369">VUL-0: CVE-2023-54067: kernel: btrfs: fix race when deleting free space root from the dirty cow roots list</issue> <issue tracker="bnc" id="1256370">VUL-0: CVE-2023-54092: kernel: KVM: s390: pv: fix index value of replaced ASCE</issue> <issue tracker="bnc" id="1256371">VUL-0: CVE-2023-54069: kernel: ext4: fix BUG in ext4_mb_new_inode_pa() due to overflow</issue> <issue tracker="bnc" id="1256373">VUL-0: CVE-2023-54066: kernel: media: dvb-usb-v2: gl861: Fix null-ptr-deref in gl861_i2c_master_xfer</issue> <issue tracker="bnc" id="1256375">VUL-0: CVE-2023-54064: kernel: ipmi:ssif: Fix a memory leak when scanning for an adapter</issue> <issue tracker="bnc" id="1256379">VUL-0: CVE-2023-54060: kernel: iommufd: Set end correctly when doing batch carry</issue> <issue tracker="bnc" id="1256387">VUL-0: CVE-2023-54052: kernel: wifi: mt76: mt7921: fix skb leak by txs missing in AMSDU</issue> <issue tracker="bnc" id="1256394">VUL-0: CVE-2023-54051: kernel: net: do not allow gso_size to be set to GSO_BY_FRAGS</issue> <issue tracker="bnc" id="1256395">VUL-0: CVE-2023-54048: kernel: RDMA/bnxt_re: Prevent handling any completions after qp destroy</issue> <issue tracker="bnc" id="1256396">VUL-0: CVE-2023-54049: kernel: rpmsg: glink: Add check for kstrdup</issue> <issue tracker="bnc" id="1256528">SLE15-SP7 kernel doesn't boot with the latest upstream ucode-amd</issue> <issue tracker="cve" id="2023-42752"/> <issue tracker="cve" id="2023-53743"/> <issue tracker="cve" id="2023-53750"/> <issue tracker="cve" id="2023-53752"/> <issue tracker="cve" id="2023-53759"/> <issue tracker="cve" id="2023-53762"/> <issue tracker="cve" id="2023-53766"/> <issue tracker="cve" id="2023-53768"/> <issue tracker="cve" id="2023-53777"/> <issue tracker="cve" id="2023-53778"/> <issue tracker="cve" id="2023-53782"/> <issue tracker="cve" id="2023-53784"/> <issue tracker="cve" id="2023-53785"/> <issue tracker="cve" id="2023-53787"/> <issue tracker="cve" id="2023-53791"/> <issue tracker="cve" id="2023-53792"/> <issue tracker="cve" id="2023-53793"/> <issue tracker="cve" id="2023-53794"/> <issue tracker="cve" id="2023-53795"/> <issue tracker="cve" id="2023-53797"/> <issue tracker="cve" id="2023-53799"/> <issue tracker="cve" id="2023-53807"/> <issue tracker="cve" id="2023-53808"/> <issue tracker="cve" id="2023-53813"/> <issue tracker="cve" id="2023-53815"/> <issue tracker="cve" id="2023-53819"/> <issue tracker="cve" id="2023-53821"/> <issue tracker="cve" id="2023-53823"/> <issue tracker="cve" id="2023-53825"/> <issue tracker="cve" id="2023-53828"/> <issue tracker="cve" id="2023-53831"/> <issue tracker="cve" id="2023-53834"/> <issue tracker="cve" id="2023-53836"/> <issue tracker="cve" id="2023-53839"/> <issue tracker="cve" id="2023-53841"/> <issue tracker="cve" id="2023-53842"/> <issue tracker="cve" id="2023-53843"/> <issue tracker="cve" id="2023-53844"/> <issue tracker="cve" id="2023-53846"/> <issue tracker="cve" id="2023-53847"/> <issue tracker="cve" id="2023-53848"/> <issue tracker="cve" id="2023-53850"/> <issue tracker="cve" id="2023-53851"/> <issue tracker="cve" id="2023-53852"/> <issue tracker="cve" id="2023-53855"/> <issue tracker="cve" id="2023-53856"/> <issue tracker="cve" id="2023-53857"/> <issue tracker="cve" id="2023-53858"/> <issue tracker="cve" id="2023-53860"/> <issue tracker="cve" id="2023-53861"/> <issue tracker="cve" id="2023-53863"/> <issue tracker="cve" id="2023-53864"/> <issue tracker="cve" id="2023-53865"/> <issue tracker="cve" id="2023-53989"/> <issue tracker="cve" id="2023-53992"/> <issue tracker="cve" id="2023-53994"/> <issue tracker="cve" id="2023-53995"/> <issue tracker="cve" id="2023-53996"/> <issue tracker="cve" id="2023-53997"/> <issue tracker="cve" id="2023-53998"/> <issue tracker="cve" id="2023-53999"/> <issue tracker="cve" id="2023-54000"/> <issue tracker="cve" id="2023-54001"/> <issue tracker="cve" id="2023-54005"/> <issue tracker="cve" id="2023-54006"/> <issue tracker="cve" id="2023-54008"/> <issue tracker="cve" id="2023-54014"/> <issue tracker="cve" id="2023-54016"/> <issue tracker="cve" id="2023-54017"/> <issue tracker="cve" id="2023-54019"/> <issue tracker="cve" id="2023-54022"/> <issue tracker="cve" id="2023-54023"/> <issue tracker="cve" id="2023-54025"/> <issue tracker="cve" id="2023-54026"/> <issue tracker="cve" id="2023-54027"/> <issue tracker="cve" id="2023-54030"/> <issue tracker="cve" id="2023-54031"/> <issue tracker="cve" id="2023-54032"/> <issue tracker="cve" id="2023-54035"/> <issue tracker="cve" id="2023-54037"/> <issue tracker="cve" id="2023-54038"/> <issue tracker="cve" id="2023-54042"/> <issue tracker="cve" id="2023-54045"/> <issue tracker="cve" id="2023-54048"/> <issue tracker="cve" id="2023-54049"/> <issue tracker="cve" id="2023-54051"/> <issue tracker="cve" id="2023-54052"/> <issue tracker="cve" id="2023-54060"/> <issue tracker="cve" id="2023-54064"/> <issue tracker="cve" id="2023-54066"/> <issue tracker="cve" id="2023-54067"/> <issue tracker="cve" id="2023-54069"/> <issue tracker="cve" id="2023-54070"/> <issue tracker="cve" id="2023-54072"/> <issue tracker="cve" id="2023-54076"/> <issue tracker="cve" id="2023-54080"/> <issue tracker="cve" id="2023-54081"/> <issue tracker="cve" id="2023-54083"/> <issue tracker="cve" id="2023-54088"/> <issue tracker="cve" id="2023-54089"/> <issue tracker="cve" id="2023-54091"/> <issue tracker="cve" id="2023-54092"/> <issue tracker="cve" id="2023-54093"/> <issue tracker="cve" id="2023-54094"/> <issue tracker="cve" id="2023-54095"/> <issue tracker="cve" id="2023-54096"/> <issue tracker="cve" id="2023-54099"/> <issue tracker="cve" id="2023-54101"/> <issue tracker="cve" id="2023-54104"/> <issue tracker="cve" id="2023-54106"/> <issue tracker="cve" id="2023-54112"/> <issue tracker="cve" id="2023-54113"/> <issue tracker="cve" id="2023-54115"/> <issue tracker="cve" id="2023-54117"/> <issue tracker="cve" id="2023-54121"/> <issue tracker="cve" id="2023-54125"/> <issue tracker="cve" id="2023-54127"/> <issue tracker="cve" id="2023-54133"/> <issue tracker="cve" id="2023-54134"/> <issue tracker="cve" id="2023-54135"/> <issue tracker="cve" id="2023-54136"/> <issue tracker="cve" id="2023-54137"/> <issue tracker="cve" id="2023-54140"/> <issue tracker="cve" id="2023-54141"/> <issue tracker="cve" id="2023-54142"/> <issue tracker="cve" id="2023-54143"/> <issue tracker="cve" id="2023-54145"/> <issue tracker="cve" id="2023-54148"/> <issue tracker="cve" id="2023-54149"/> <issue tracker="cve" id="2023-54153"/> <issue tracker="cve" id="2023-54154"/> <issue tracker="cve" id="2023-54155"/> <issue tracker="cve" id="2023-54156"/> <issue tracker="cve" id="2023-54164"/> <issue tracker="cve" id="2023-54166"/> <issue tracker="cve" id="2023-54169"/> <issue tracker="cve" id="2023-54170"/> <issue tracker="cve" id="2023-54171"/> <issue tracker="cve" id="2023-54172"/> <issue tracker="cve" id="2023-54173"/> <issue tracker="cve" id="2023-54177"/> <issue tracker="cve" id="2023-54178"/> <issue tracker="cve" id="2023-54179"/> <issue tracker="cve" id="2023-54181"/> <issue tracker="cve" id="2023-54183"/> <issue tracker="cve" id="2023-54185"/> <issue tracker="cve" id="2023-54189"/> <issue tracker="cve" id="2023-54194"/> <issue tracker="cve" id="2023-54201"/> <issue tracker="cve" id="2023-54204"/> <issue tracker="cve" id="2023-54207"/> <issue tracker="cve" id="2023-54209"/> <issue tracker="cve" id="2023-54210"/> <issue tracker="cve" id="2023-54211"/> <issue tracker="cve" id="2023-54215"/> <issue tracker="cve" id="2023-54219"/> <issue tracker="cve" id="2023-54220"/> <issue tracker="cve" id="2023-54221"/> <issue tracker="cve" id="2023-54223"/> <issue tracker="cve" id="2023-54224"/> <issue tracker="cve" id="2023-54225"/> <issue tracker="cve" id="2023-54227"/> <issue tracker="cve" id="2023-54229"/> <issue tracker="cve" id="2023-54230"/> <issue tracker="cve" id="2023-54235"/> <issue tracker="cve" id="2023-54240"/> <issue tracker="cve" id="2023-54241"/> <issue tracker="cve" id="2023-54246"/> <issue tracker="cve" id="2023-54247"/> <issue tracker="cve" id="2023-54251"/> <issue tracker="cve" id="2023-54253"/> <issue tracker="cve" id="2023-54254"/> <issue tracker="cve" id="2023-54255"/> <issue tracker="cve" id="2023-54258"/> <issue tracker="cve" id="2023-54261"/> <issue tracker="cve" id="2023-54263"/> <issue tracker="cve" id="2023-54264"/> <issue tracker="cve" id="2023-54266"/> <issue tracker="cve" id="2023-54267"/> <issue tracker="cve" id="2023-54271"/> <issue tracker="cve" id="2023-54276"/> <issue tracker="cve" id="2023-54278"/> <issue tracker="cve" id="2023-54281"/> <issue tracker="cve" id="2023-54282"/> <issue tracker="cve" id="2023-54283"/> <issue tracker="cve" id="2023-54285"/> <issue tracker="cve" id="2023-54289"/> <issue tracker="cve" id="2023-54291"/> <issue tracker="cve" id="2023-54292"/> <issue tracker="cve" id="2023-54293"/> <issue tracker="cve" id="2023-54296"/> <issue tracker="cve" id="2023-54297"/> <issue tracker="cve" id="2023-54299"/> <issue tracker="cve" id="2023-54300"/> <issue tracker="cve" id="2023-54302"/> <issue tracker="cve" id="2023-54303"/> <issue tracker="cve" id="2023-54304"/> <issue tracker="cve" id="2023-54309"/> <issue tracker="cve" id="2023-54312"/> <issue tracker="cve" id="2023-54313"/> <issue tracker="cve" id="2023-54314"/> <issue tracker="cve" id="2023-54315"/> <issue tracker="cve" id="2023-54316"/> <issue tracker="cve" id="2023-54318"/> <issue tracker="cve" id="2023-54319"/> <issue tracker="cve" id="2023-54322"/> <issue tracker="cve" id="2023-54324"/> <issue tracker="cve" id="2023-54326"/> <issue tracker="cve" id="2024-26944"/> <issue tracker="cve" id="2025-38321"/> <issue tracker="cve" id="2025-38728"/> <issue tracker="cve" id="2025-39890"/> <issue tracker="cve" id="2025-39977"/> <issue tracker="cve" id="2025-40006"/> <issue tracker="cve" id="2025-40024"/> <issue tracker="cve" id="2025-40033"/> <issue tracker="cve" id="2025-40042"/> <issue tracker="cve" id="2025-40053"/> <issue tracker="cve" id="2025-40081"/> <issue tracker="cve" id="2025-40102"/> <issue tracker="cve" id="2025-40134"/> <issue tracker="cve" id="2025-40135"/> <issue tracker="cve" id="2025-40153"/> <issue tracker="cve" id="2025-40158"/> <issue tracker="cve" id="2025-40167"/> <issue tracker="cve" id="2025-40170"/> <issue tracker="cve" id="2025-40178"/> <issue tracker="cve" id="2025-40179"/> <issue tracker="cve" id="2025-40187"/> <issue tracker="cve" id="2025-40211"/> <issue tracker="cve" id="2025-40215"/> <issue tracker="cve" id="2025-40219"/> <issue tracker="cve" id="2025-40220"/> <issue tracker="cve" id="2025-40223"/> <issue tracker="cve" id="2025-40233"/> <issue tracker="cve" id="2025-40242"/> <issue tracker="cve" id="2025-40244"/> <issue tracker="cve" id="2025-40256"/> <issue tracker="cve" id="2025-40258"/> <issue tracker="cve" id="2025-40262"/> <issue tracker="cve" id="2025-40263"/> <issue tracker="cve" id="2025-40269"/> <issue tracker="cve" id="2025-40272"/> <issue tracker="cve" id="2025-40273"/> <issue tracker="cve" id="2025-40275"/> <issue tracker="cve" id="2025-40277"/> <issue tracker="cve" id="2025-40280"/> <issue tracker="cve" id="2025-40282"/> <issue tracker="cve" id="2025-40283"/> <issue tracker="cve" id="2025-40284"/> <issue tracker="cve" id="2025-40288"/> <issue tracker="cve" id="2025-40297"/> <issue tracker="cve" id="2025-40301"/> <issue tracker="cve" id="2025-40304"/> <issue tracker="cve" id="2025-40306"/> <issue tracker="cve" id="2025-40308"/> <issue tracker="cve" id="2025-40309"/> <issue tracker="cve" id="2025-40310"/> <issue tracker="cve" id="2025-40311"/> <issue tracker="cve" id="2025-40312"/> <issue tracker="cve" id="2025-40314"/> <issue tracker="cve" id="2025-40315"/> <issue tracker="cve" id="2025-40316"/> <issue tracker="cve" id="2025-40317"/> <issue tracker="cve" id="2025-40318"/> <issue tracker="cve" id="2025-40320"/> <issue tracker="cve" id="2025-40321"/> <issue tracker="cve" id="2025-40322"/> <issue tracker="cve" id="2025-40323"/> <issue tracker="cve" id="2025-40324"/> <issue tracker="cve" id="2025-40328"/> <issue tracker="cve" id="2025-40329"/> <issue tracker="cve" id="2025-40331"/> <issue tracker="cve" id="2025-40342"/> <issue tracker="cve" id="2025-40343"/> <issue tracker="cve" id="2025-40345"/> <issue tracker="cve" id="2025-40349"/> <issue tracker="cve" id="2025-40351"/> <issue tracker="cve" id="2025-68168"/> <issue tracker="cve" id="2025-68172"/> <issue tracker="cve" id="2025-68176"/> <issue tracker="cve" id="2025-68180"/> <issue tracker="cve" id="2025-68183"/> <issue tracker="cve" id="2025-68185"/> <issue tracker="cve" id="2025-68192"/> <issue tracker="cve" id="2025-68194"/> <issue tracker="cve" id="2025-68195"/> <issue tracker="cve" id="2025-68217"/> <issue tracker="cve" id="2025-68218"/> <issue tracker="cve" id="2025-68222"/> <issue tracker="cve" id="2025-68233"/> <issue tracker="cve" id="2025-68235"/> <issue tracker="cve" id="2025-68237"/> <issue tracker="cve" id="2025-68238"/> <issue tracker="cve" id="2025-68244"/> <issue tracker="cve" id="2025-68249"/> <issue tracker="cve" id="2025-68252"/> <issue tracker="cve" id="2025-68257"/> <issue tracker="cve" id="2025-68258"/> <issue tracker="cve" id="2025-68259"/> <issue tracker="cve" id="2025-68286"/> <issue tracker="cve" id="2025-68287"/> <issue tracker="cve" id="2025-68289"/> <issue tracker="cve" id="2025-68290"/> <issue tracker="cve" id="2025-68303"/> <issue tracker="cve" id="2025-68305"/> <issue tracker="cve" id="2025-68307"/> <issue tracker="cve" id="2025-68308"/> <issue tracker="cve" id="2025-68312"/> <issue tracker="cve" id="2025-68313"/> <issue tracker="cve" id="2025-68328"/> <issue tracker="cve" id="2025-68330"/> <issue tracker="cve" id="2025-68331"/> <issue tracker="cve" id="2025-68332"/> <issue tracker="cve" id="2025-68335"/> <issue tracker="cve" id="2025-68339"/> <issue tracker="cve" id="2025-68345"/> <issue tracker="cve" id="2025-68346"/> <issue tracker="cve" id="2025-68347"/> <issue tracker="cve" id="2025-68354"/> <issue tracker="cve" id="2025-68362"/> <issue tracker="cve" id="2025-68380"/> <issue tracker="cve" id="2025-68724"/> <issue tracker="cve" id="2025-68732"/> <issue tracker="cve" id="2025-68734"/> <issue tracker="cve" id="2025-68740"/> <issue tracker="cve" id="2025-68746"/> <issue tracker="cve" id="2025-68750"/> <issue tracker="cve" id="2025-68753"/> <issue tracker="cve" id="2025-68757"/> <issue tracker="cve" id="2025-68758"/> <issue tracker="cve" id="2025-68759"/> <issue tracker="cve" id="2025-68765"/> <issue tracker="cve" id="2025-68766"/> <issue tracker="jsc" id="PED-14062"/> <issue tracker="jsc" id="PED-3527"/> <issue tracker="jsc" id="PED-4866"/> <issue tracker="jsc" id="PED-5065"/> <issue tracker="jsc" id="PED-5453"/> <issue tracker="jsc" id="PED-5475"/> <issue tracker="jsc" id="PED-5477"/> <issue tracker="jsc" id="PED-5511"/> <issue tracker="jsc" id="PED-6036"/> <issue tracker="jsc" id="PED-6041"/> <issue tracker="jsc" id="PED-6045"/> <issue tracker="jsc" id="PED-6067"/> <issue tracker="jsc" id="PED-6068"/> <issue tracker="jsc" id="PED-6069"/> <issue tracker="jsc" id="PED-6070"/> <issue tracker="jsc" id="PED-6071"/> <issue tracker="jsc" id="PED-6104"/> <issue tracker="jsc" id="PED-6114"/> <issue tracker="jsc" id="PED-6116"/> <issue tracker="jsc" id="PED-6120"/> <issue tracker="jsc" id="PED-6123"/> <issue tracker="jsc" id="PED-6811"/> <issue tracker="jsc" id="PED-7514"/> <issue tracker="jsc" id="PED-7542"/> <issue tracker="jsc" id="PED-7779"/> <issue tracker="jsc" id="PED-7780"/> <category>security</category> <rating>important</rating> <packager>tabraham1</packager> <reboot_needed/> <!-- inserted by gitlab@gitlab.suse.de:security/tools.git//home/securitybot/src/sectools/auto_maintenance.pl --> <releasetarget project="SUSE:Updates:openSUSE-SLE:15.6"/> <releasetarget project="SUSE:Updates:SLE-Product-SLES_SAP:15-SP6:x86_64"/> <releasetarget project="SUSE:Updates:SLE-Product-SLES_SAP:15-SP6:ppc64le"/> <releasetarget project="SUSE:Updates:SLE-Product-SLES:15-SP6-LTSS:x86_64"/> <releasetarget project="SUSE:Updates:SLE-Product-SLES:15-SP6-LTSS:s390x"/> <releasetarget project="SUSE:Updates:SLE-Product-SLES:15-SP6-LTSS:ppc64le"/> <releasetarget project="SUSE:Updates:SLE-Product-SLES:15-SP6-LTSS:aarch64"/> <releasetarget project="SUSE:Updates:SLE-Product-HA:15-SP6:x86_64"/> <releasetarget project="SUSE:Updates:SLE-Product-HA:15-SP6:s390x"/> <releasetarget project="SUSE:Updates:SLE-Product-HA:15-SP6:ppc64le"/> <releasetarget project="SUSE:Updates:SLE-Product-HA:15-SP6:aarch64"/> <releasetarget project="SUSE:SLE-15-SP6:Update"/> <summary>Security update for the Linux Kernel</summary> <description> The SUSE Linux Enterprise 15 SP6 kernel was updated to fix various security issues The following security issues were fixed: - CVE-2025-38321: smb: Log an error when close_all_cached_dirs fails (bsc#1246328). - CVE-2025-38728: smb3: fix for slab out of bounds on mount to ksmbd (bsc#1249256). - CVE-2025-39890: wifi: ath12k: fix memory leak in ath12k_service_ready_ext_event (bsc#1250334). - CVE-2025-39977: futex: Prevent use-after-free during requeue-PI (bsc#1252046). - CVE-2025-40006: mm/hugetlb: fix folio is still mapped when deleted (bsc#1252342). - CVE-2025-40024: vhost: Take a reference on the task in struct vhost_task (bsc#1252686). - CVE-2025-40033: remoteproc: pru: Fix potential NULL pointer dereference in pru_rproc_set_ctable() (bsc#1252824). - CVE-2025-40042: tracing: Fix race condition in kprobe initialization causing NULL pointer dereference (bsc#1252861). - CVE-2025-40053: net: dlink: handle copy_thresh allocation failure (bsc#1252808). - CVE-2025-40081: perf: arm_spe: Prevent overflow in PERF_IDX2OFF() (bsc#1252776). - CVE-2025-40102: KVM: arm64: Prevent access to vCPU events before init (bsc#1252919). - CVE-2025-40134: dm: fix NULL pointer dereference in __dm_suspend() (bsc#1253386). - CVE-2025-40135: ipv6: use RCU in ip6_xmit() (bsc#1253342). - CVE-2025-40153: mm: hugetlb: avoid soft lockup when mprotect to large memory area (bsc#1253408). - CVE-2025-40158: ipv6: use RCU in ip6_output() (bsc#1253402). - CVE-2025-40167: ext4: detect invalid INLINE_DATA + EXTENTS flag combination (bsc#1253458). - CVE-2025-40170: net: use dst_dev_rcu() in sk_setup_caps() (bsc#1253413). - CVE-2025-40178: pid: Add a judgment for ns null in pid_nr_ns (bsc#1253463). - CVE-2025-40179: ext4: verify orphan file size is not too big (bsc#1253442). - CVE-2025-40187: net/sctp: fix a null dereference in sctp_disposition sctp_sf_do_5_1D_ce() (bsc#1253647). - CVE-2025-40215: kABI: xfrm: delete x->tunnel as we delete x (bsc#1254959). - CVE-2025-40220: fuse: fix livelock in synchronous file put from fuseblk workers (bsc#1254520). - CVE-2025-40233: ocfs2: clear extent cache after moving/defragmenting extents (bsc#1254813). - CVE-2025-40242: gfs2: Fix unlikely race in gdlm_put_lock (bsc#1255075). - CVE-2025-40258: mptcp: fix race condition in mptcp_schedule_work() (bsc#1254843). - CVE-2025-40280: tipc: Fix use-after-free in tipc_mon_reinit_self() (bsc#1254847). - CVE-2025-40297: net: bridge: fix use-after-free due to MST port state bypass (bsc#1255187). - CVE-2025-40328: smb: client: fix potential UAF in smb2_close_cached_fid() (bsc#1254624). - CVE-2025-40331: sctp: Prevent TOCTOU out-of-bounds write (bsc#1254615). - CVE-2025-68259: KVM: SVM: Don't skip unrelated instruction if INT3/INTO is replaced (bsc#1255199). The following non security issues were fixed: - ACPI: processor_core: fix map_x2apic_id for amd-pstate on am4 (git-fixes). - ACPI: property: Fix fwnode refcount leak in acpi_fwnode_graph_parse_endpoint() (git-fixes). - ALSA: dice: fix buffer overflow in detect_stream_formats() (git-fixes). - ALSA: firewire-motu: add bounds check in put_user loop for DSP events (git-fixes). - ALSA: firewire-motu: fix buffer overflow in hwdep read for DSP events (git-fixes). - ALSA: hda: cs35l41: Fix NULL pointer dereference in cs35l41_hda_read_acpi() (git-fixes). - ALSA: uapi: Fix typo in asound.h comment (git-fixes). - ALSA: usb-audio: Add DSD quirk for LEAK Stereo 230 (stable-fixes). - ASoC: Intel: catpt: Fix error path in hw_params() (git-fixes). - ASoC: ak4458: Disable regulator when error happens (git-fixes). - ASoC: ak5558: Disable regulator when error happens (git-fixes). - ASoC: codecs: wcd938x: fix OF node leaks on probe failure (git-fixes). - ASoC: fsl_xcvr: clear the channel status control memory (git-fixes). - ASoC: qcom: q6adm: the the copp device only during last instance (git-fixes). - ASoC: qcom: q6asm-dai: perform correct state check before closing (git-fixes). - ASoC: qcom: qdsp6: q6asm-dai: set 10 ms period and buffer alignment (git-fixes). - ASoC: stm32: sai: fix OF node leak on probe (git-fixes). - ASoC: stm32: sai: fix clk prepare imbalance on probe failure (git-fixes). - ASoC: stm32: sai: fix device leak on probe (git-fixes). - Bluetooth: HCI: Fix tracking of advertisement set/instance 0x00 (git-fixes). - Bluetooth: SMP: Fix not generating mackey and ltk when repairing (git-fixes). - Bluetooth: hci_sock: Prevent race in socket write iter and sock bind (git-fixes). - Documentation/kernel-parameters: fix typo in retbleed= kernel parameter description (git-fixes). - Documentation: hid-alps: Fix packet format section headings (git-fixes). - Documentation: parport-lowlevel: Separate function listing code blocks (git-fixes). - HID: logitech-dj: Remove duplicate error logging (git-fixes). - HID: logitech-hidpp: Do not assume FAP in hidpp_send_message_sync() (git-fixes). - Input: cros_ec_keyb - fix an invalid memory access (stable-fixes). - Input: goodix - add support for ACPI ID GDIX1003 (stable-fixes). - Input: goodix - add support for ACPI ID GDX9110 (stable-fixes). - KEYS: trusted: Fix a memory leak in tpm2_load_cmd (git-fixes). - KEYS: trusted_tpm1: Compare HMAC values in constant time (git-fixes). - PCI/PM: Reinstate clearing state_saved in legacy and !PM codepaths (git-fixes). - PCI: dwc: Fix wrong PORT_LOGIC_LTSSM_STATE_MASK definition (git-fixes). - PCI: keystone: Exit ks_pcie_probe() for invalid mode (git-fixes). - PCI: rcar-gen2: Drop ARM dependency from PCI_RCAR_GEN2 (git-fixes). - Revert "mtd: rawnand: marvell: fix layouts" (git-fixes). - USB: Fix descriptor count when handling invalid MBIM extended descriptor (git-fixes). - USB: serial: belkin_sa: fix TIOCMBIS and TIOCMBIC (git-fixes). - USB: serial: ftdi_sio: add support for u-blox EVK-M101 (stable-fixes). - USB: serial: kobil_sct: fix TIOCMBIS and TIOCMBIC (git-fixes). - USB: serial: option: add Quectel RG255C (stable-fixes). - USB: serial: option: add Telit FN920C04 ECM compositions (stable-fixes). - USB: serial: option: add UNISOC UIS7720 (stable-fixes). - USB: serial: option: add support for Rolling RW101R-GL (stable-fixes). - USB: storage: Remove subclass and protocol overrides from Novatek quirk (git-fixes). - arm64: zynqmp: Fix usb node drive strength and slew rate (git-fixes). - arm64: zynqmp: Revert usb node drive strength and slew rate for (git-fixes). - atm/fore200e: Fix possible data race in fore200e_open() (git-fixes). - atm: idt77252: Add missing `dma_map_error()` (stable-fixes). - backlight: led-bl: Add devlink to supplier LEDs (git-fixes). - backlight: lp855x: Fix lp855x.h kernel-doc warnings (git-fixes). - bs-upload-kernel: Fix cve branch uploads. - btrfs: make sure extent and csum paths are always released in scrub_raid56_parity_stripe() (git-fixes). - can: gs_usb: gs_usb_xmit_callback(): fix handling of failed transmitted URBs (git-fixes). - can: kvaser_usb: leaf: Fix potential infinite loop in command parsers (git-fixes). - can: sja1000: fix max irq loop handling (git-fixes). - can: sun4i_can: sun4i_can_interrupt(): fix max irq loop handling (git-fixes). - cifs: Fix uncached read into ITER_KVEC iterator (bsc#1245449). - cifs: after disabling multichannel, mark tcon for reconnect (git-fixes). - cifs: avoid redundant calls to disable multichannel (git-fixes). - cifs: cifs_pick_channel should try selecting active channels (git-fixes). - cifs: deal with the channel loading lag while picking channels (git-fixes). - cifs: dns resolution is needed only for primary channel (git-fixes). - cifs: do not disable interface polling on failure (git-fixes). - cifs: do not search for channel if server is terminating (git-fixes). - cifs: fix a pending undercount of srv_count (git-fixes). - cifs: fix lock ordering while disabling multichannel (git-fixes). - cifs: fix stray unlock in cifs_chan_skip_or_disable (git-fixes). - cifs: fix use after free for iface while disabling secondary channels (git-fixes). - cifs: handle servers that still advertise multichannel after disabling (git-fixes). - cifs: handle when server starts supporting multichannel (git-fixes). - cifs: handle when server stops supporting multichannel (git-fixes). - cifs: make cifs_chan_update_iface() a void function (git-fixes). - cifs: make sure server interfaces are requested only for SMB3+ (git-fixes). - cifs: make sure that channel scaling is done only once (git-fixes). - cifs: reconnect worker should take reference on server struct unconditionally (git-fixes). - cifs: reset connections for all channels when reconnect requested (git-fixes). - cifs: reset iface weights when we cannot find a candidate (git-fixes). - cifs: serialize other channels when query server interfaces is pending (git-fixes). - cifs: update dstaddr whenever channel iface is updated (git-fixes). - clk: qcom: camcc-sm6350: Fix PLL config of PLL2 (git-fixes). - clk: qcom: camcc-sm6350: Specify Titan GDSC power domain as a parent to other (git-fixes). - clk: renesas: cpg-mssr: Add missing 1ms delay into reset toggle callback (git-fixes). - clk: renesas: r9a06g032: Fix memory leak in error path (git-fixes). - comedi: c6xdigio: Fix invalid PNP driver unregistration (git-fixes). - comedi: check device's attached status in compat ioctls (git-fixes). - comedi: multiq3: sanitize config options in multiq3_attach() (git-fixes). - comedi: pcl818: fix null-ptr-deref in pcl818_ai_cancel() (git-fixes). - cpufreq: intel_pstate: Check IDA only before MSR_IA32_PERF_CTL writes (git-fixes). - cpuidle: menu: Use residency threshold in polling state override decisions (bsc#1255026). - crypto: asymmetric_keys - prevent overflow in asymmetric_key_generate_id (git-fixes). - crypto: authenc - Correctly pass EINPROGRESS back up to the caller (git-fixes). - crypto: ccree - Correctly handle return of sg_nents_for_len (git-fixes). - crypto: hisilicon/qm - restore original qos values (git-fixes). - crypto: iaa - Fix incorrect return value in save_iaa_wq() (git-fixes). - crypto: rockchip - drop redundant crypto_skcipher_ivsize() calls (git-fixes). - dm-integrity: limit MAX_TAG_SIZE to 255 (git-fixes). - dm-verity: fix unreliable memory allocation (git-fixes). - dm: fix queue start/stop imbalance under suspend/load/resume races (bsc#1253386). - drivers/usb/dwc3: fix PCI parent check (git-fixes). - drm/amd/display: Check NULL before accessing (stable-fixes). - drm/amd/display: Fix logical vs bitwise bug in get_embedded_panel_info_v2_1() (git-fixes). - drm/amd/display: Increase DPCD read retries (stable-fixes). - drm/amd/display: Move sleep into each retry for retrieve_link_cap() (stable-fixes). - drm/amdgpu: Skip emit de meta data on gfx11 with rs64 enabled (stable-fixes). - drm/amdgpu: add missing lock to amdgpu_ttm_access_memory_sdma (git-fixes). - drm/amdgpu: fix cyan_skillfish2 gpu info fw handling (git-fixes). - drm/gma500: Remove unused helper psb_fbdev_fb_setcolreg() (git-fixes). - drm/mediatek: Fix CCORR mtk_ctm_s31_32_to_s1_n function issue (git-fixes). - drm/mediatek: Fix device node reference leak in mtk_dp_dt_parse() (git-fixes). - drm/mgag200: Fix big-endian support (git-fixes). - drm/msm/a2xx: stop over-complaining about the legacy firmware (git-fixes). - drm/msm/a6xx: Fix out of bound IO access in a6xx_get_gmu_registers (git-fixes). - drm/msm/a6xx: Flush LRZ cache before PT switch (git-fixes). - drm/msm/dpu: Remove dead-code in dpu_encoder_helper_reset_mixers() (git-fixes). - drm/nouveau: restrict the flush page to a 32-bit address (git-fixes). - drm/ttm: Avoid NULL pointer deref for evicted BOs (git-fixes). - drm/vgem-fence: Fix potential deadlock on release (git-fixes). - drm: nouveau: Replace sprintf() with sysfs_emit() (git-fixes). - drm: sti: fix device leaks at component probe (git-fixes). - efi/libstub: Describe missing 'out' parameter in efi_load_initrd (git-fixes). - efi/libstub: Fix page table access in 5-level to 4-level paging transition (git-fixes). - fbdev: pxafb: Fix multiple clamped values in pxafb_adjust_timing (git-fixes). - fbdev: ssd1307fb: fix potential page leak in ssd1307fb_probe() (git-fixes). - fbdev: tcx.c fix mem_map to correct smem_start offset (git-fixes). - firmware: imx: scu-irq: fix OF node leak in (git-fixes). - firmware: stratix10-svc: Add mutex in stratix10 memory management (git-fixes). - firmware: stratix10-svc: fix bug in saving controller data (git-fixes). - firmware: stratix10-svc: fix make htmldocs warning for stratix10_svc (git-fixes). - gpu: host1x: Fix race in syncpt alloc/free (git-fixes). - hwmon: (max16065) Use local variable to avoid TOCTOU (git-fixes). - hwmon: (w83791d) Convert macros to functions to avoid TOCTOU (git-fixes). - hwmon: (w83l786ng) Convert macros to functions to avoid TOCTOU (git-fixes). - hwmon: sy7636a: Fix regulator_enable resource leak on error path (git-fixes). - i2c: amd-mp2: fix reference leak in MP2 PCI device (git-fixes). - i2c: i2c.h: fix a bad kernel-doc line (git-fixes). - i3c: master: svc: Prevent incomplete IBI transaction (git-fixes). - iio: accel: bmc150: Fix irq assumption regression (stable-fixes). - iio: accel: fix ADXL355 startup race condition (git-fixes). - iio: adc: ad7280a: fix ad7280_store_balance_timer() (git-fixes). - iio: core: Clean up device correctly on iio_device_alloc() failure (git-fixes). - iio: core: add missing mutex_destroy in iio_dev_release() (git-fixes). - iio: imu: st_lsm6dsx: Fix measurement unit for odr struct member (git-fixes). - iio: imu: st_lsm6dsx: fix array size for st_lsm6dsx_settings fields (git-fixes). - iio: st_lsm6dsx: Fixed calibrated timestamp calculation (git-fixes). - ima: Handle error code returned by ima_filter_rule_match() (git-fixes). - intel_th: Fix error handling in intel_th_output_open (git-fixes). - ipmi: Fix handling of messages with provided receive message pointer (git-fixes). - ipmi: Rework user message limit handling (git-fixes). - irqchip/mchp-eic: Fix error code in mchp_eic_domain_alloc() (git-fixes). - kconfig/mconf: Initialize the default locale at startup (stable-fixes). - kconfig/nconf: Initialize the default locale at startup (stable-fixes). - leds: leds-lp50xx: Allow LED 0 to be added to module bank (git-fixes). - leds: leds-lp50xx: Enable chip before any communication (git-fixes). - leds: leds-lp50xx: LP5009 supports 3 modules for a total of 9 LEDs (git-fixes). - leds: netxbig: Fix GPIO descriptor leak in error paths (git-fixes). - lib/vsprintf: Check pointer before dereferencing in time_and_date() (git-fixes). - mailbox: mailbox-test: Fix debugfs_create_dir error checking (git-fixes). - media: TDA1997x: Remove redundant cancel_delayed_work in probe (git-fixes). - media: adv7842: Avoid possible out-of-bounds array accesses in adv7842_cp_log_status() (git-fixes). - media: amphion: Cancel message work before releasing the VPU core (git-fixes). - media: atomisp: Prefix firmware paths with "intel/ipu/" (bsc#1252973). - media: atomisp: Remove firmware_name module parameter (bsc#1252973). - media: cec: Fix debugfs leak on bus_register() failure (git-fixes). - media: dvb-usb: dtv5100: fix out-of-bounds in dtv5100_i2c_msg() (git-fixes). - media: i2c: ADV7604: Remove redundant cancel_delayed_work in probe (git-fixes). - media: i2c: adv7842: Remove redundant cancel_delayed_work in probe (git-fixes). - media: msp3400: Avoid possible out-of-bounds array accesses in msp3400c_thread() (git-fixes). - media: pvrusb2: Fix incorrect variable used in trace message (git-fixes). - media: rc: st_rc: Fix reset control resource leak (git-fixes). - media: renesas: rcar_drif: fix device node reference leak in rcar_drif_bond_enabled (git-fixes). - media: samsung: exynos4-is: fix potential ABBA deadlock on init (git-fixes). - media: v4l2-mem2mem: Fix outdated documentation (git-fixes). - media: verisilicon: Protect G2 HEVC decoder against invalid DPB index (git-fixes). - media: videobuf2: Fix device reference leak in vb2_dc_alloc error path (git-fixes). - media: vidtv: initialize local pointers upon transfer of memory ownership (git-fixes). - media: vpif_capture: fix section mismatch (git-fixes). - media: vpif_display: fix section mismatch (git-fixes). - mfd: altera-sysmgr: Fix device leak on sysmgr regmap lookup (git-fixes). - mfd: da9055: Fix missing regmap_del_irq_chip() in error path (git-fixes). - mfd: max77620: Fix potential IRQ chip conflict when probing two devices (git-fixes). - mfd: mt6358-irq: Fix missing irq_domain_remove() in error path (git-fixes). - mfd: mt6397-irq: Fix missing irq_domain_remove() in error path (git-fixes). - most: usb: fix double free on late probe failure (git-fixes). - mt76: mt7615: Fix memory leak in mt7615_mcu_wtbl_sta_add() (git-fixes). - mtd: lpddr_cmds: fix signed shifts in lpddr_cmds (git-fixes). - mtd: maps: pcmciamtd: fix potential memory leak in pcmciamtd_detach() (git-fixes). - mtd: nand: relax ECC parameter validation check (git-fixes). - mtd: rawnand: lpc32xx_slc: fix GPIO descriptor leak on probe error and remove (git-fixes). - mtd: rawnand: renesas: Handle devm_pm_runtime_enable() errors (git-fixes). - net: phy: adin1100: Fix software power-down ready condition (git-fixes). - net: phy: mxl-gpy: fix bogus error on USXGMII and integrated PHY (git-fixes). - net: phy: mxl-gpy: fix link properties on USXGMII and internal PHYs (git-fixes). - nvme: Use non zero KATO for persistent discovery connections (git-fixes). - orangefs: fix xattr related buffer overflow.. (git-fixes). - phy: broadcom: bcm63xx-usbh: fix section mismatches (git-fixes). - phy: renesas: rcar-gen3-usb2: Fix an error handling path in rcar_gen3_phy_usb2_probe() (git-fixes). - pinctrl: stm32: fix hwspinlock resource leak in probe function (git-fixes). - platform/chrome: cros_ec_ishtp: Fix UAF after unbinding driver (git-fixes). - platform/x86: asus-wmi: use brightness_set_blocking() for kbd led (git-fixes). - platform/x86: intel: chtwc_int33fe: don't dereference swnode args (git-fixes). - platform/x86: intel: punit_ipc: fix memory corruption (git-fixes). - power: supply: apm_power: only unset own apm_get_power_status (git-fixes). - power: supply: cw2015: Check devm_delayed_work_autocancel() return code (git-fixes). - power: supply: rt9467: Prevent using uninitialized local variable in rt9467_set_value_from_ranges() (git-fixes). - power: supply: rt9467: Return error on failure in rt9467_set_value_from_ranges() (git-fixes). - power: supply: wm831x: Check wm831x_set_bits() return value (git-fixes). - powerpc/64s/slb: Fix SLB multihit issue during SLB preload (bac#1236022 ltc#211187). - powerpc/eeh: fix recursive pci_lock_rescan_remove locking in EEH event handling (bsc#1253262 ltc#216029). - pwm: bcm2835: Make sure the channel is enabled after pwm_request() (git-fixes). - regulator: core: Protect regulator_supply_alias_list with regulator_list_mutex (git-fixes). - regulator: core: disable supply if enabling main regulator fails (git-fixes). - rpmsg: glink: fix rpmsg device leak (git-fixes). - rtc: gamecube: Check the return value of ioremap() (git-fixes). - scripts: teaapi: Add paging. - scrits: teaapi: Add list_repos. - scsi: lpfc: Add capability to register Platform Name ID to fabric (bsc#1254119). - scsi: lpfc: Allow support for BB credit recovery in point-to-point topology (bsc#1254119). - scsi: lpfc: Ensure unregistration of rpis for received PLOGIs (bsc#1254119). - scsi: lpfc: Fix leaked ndlp krefs when in point-to-point topology (bsc#1254119). - scsi: lpfc: Fix reusing an ndlp that is marked NLP_DROPPED during FLOGI (bsc#1254119). - scsi: lpfc: Modify kref handling for Fabric Controller ndlps (bsc#1254119). - scsi: lpfc: Remove redundant NULL ptr assignment in lpfc_els_free_iocb() (bsc#1254119). - scsi: lpfc: Revise discovery related function headers and comments (bsc#1254119). - scsi: lpfc: Update lpfc version to 14.4.0.12 (bsc#1254119). - scsi: lpfc: Update various NPIV diagnostic log messaging (bsc#1254119). - serial: amba-pl011: prefer dma_mapping_error() over explicit address checking (git-fixes). - slimbus: ngd: Fix reference count leak in qcom_slim_ngd_notify_slaves (git-fixes). - smb3: add missing null server pointer check (git-fixes). - smb: client: fix cifs_pick_channel when channel needs reconnect (git-fixes). - smb: client: fix warning when reconnecting channel (git-fixes). - smb: client: introduce close_cached_dir_locked() (git-fixes). - soc/tegra: fuse: speedo-tegra210: Update speedo IDs (git-fixes). - soc: amlogic: canvas: fix device leak on lookup (git-fixes). - soc: qcom: ocmem: fix device leak on lookup (git-fixes). - soc: qcom: smem: fix hwspinlock resource leak in probe error paths (git-fixes). - spi: amlogic-spifc-a1: Handle devm_pm_runtime_enable() errors (git-fixes). - spi: bcm63xx: drop wrong casts in probe() (git-fixes). - spi: bcm63xx: fix premature CS deassertion on RX-only transactions (git-fixes). - spi: tegra210-qspi: Remove cache operations (git-fixes). - spi: tegra210-quad: Add support for internal DMA (git-fixes). - spi: tegra210-quad: Check hardware status on timeout (bsc#1253155). - spi: tegra210-quad: Fix timeout handling (bsc#1253155). - spi: tegra210-quad: Fix timeout handling (git-fixes). - spi: tegra210-quad: Refactor error handling into helper functions (bsc#1253155). - spi: tegra210-quad: Update dummy sequence configuration (git-fixes). - staging: fbtft: core: fix potential memory leak in fbtft_probe_common() (git-fixes). - thunderbolt: Add support for Intel Wildcat Lake (stable-fixes). - tracing: Fix access to trace_event_file (bsc#1254373). - uio: uio_fsl_elbc_gpcm:: Add null pointer check to uio_fsl_elbc_gpcm_probe (git-fixes). - usb: cdns3: Fix double resource release in cdns3_pci_probe (git-fixes). - usb: chaoskey: fix locking for O_NONBLOCK (git-fixes). - usb: chipidea: udc: limit usb request length to max 16KB (stable-fixes). - usb: dwc2: fix hang during suspend if set as peripheral (git-fixes). - usb: dwc3: Abort suspend on soft disconnect failure (git-fixes). - usb: dwc3: Fix race condition between concurrent dwc3_remove_requests() call paths (git-fixes). - usb: dwc3: pci: Sort out the Intel device IDs (stable-fixes). - usb: dwc3: pci: add support for the Intel Nova Lake -S (stable-fixes). - usb: gadget: configfs: Correctly set use_os_string at bind (git-fixes). - usb: gadget: f_eem: Fix memory leak in eem_unwrap (git-fixes). - usb: gadget: renesas_usbf: Handle devm_pm_runtime_enable() errors (git-fixes). - usb: gadget: tegra-xudc: Always reinitialize data toggle when clear halt (git-fixes). - usb: phy: Initialize struct usb_phy list_head (git-fixes). - usb: raw-gadget: cap raw_io transfer length to KMALLOC_MAX_SIZE (git-fixes). - usb: raw-gadget: do not limit transfer length (git-fixes). - usb: storage: Fix memory leak in USB bulk transport (git-fixes). - usb: storage: sddr55: Reject out-of-bound new_pba (stable-fixes). - usb: typec: tipd: Clear interrupts first (git-fixes). - usb: typec: ucsi: psy: Set max current to zero when disconnected (git-fixes). - usb: uas: fix urb unmapping issue when the uas device is remove during ongoing data transfer (git-fixes). - usb: udc: Add trace event for usb_gadget_set_state (stable-fixes). - usb: vhci-hcd: Prevent suspending virtually attached devices (git-fixes). - watchdog: wdat_wdt: Fix ACPI table leak in probe function (git-fixes). - wifi: ath11k: fix peer HE MCS assignment (git-fixes). - wifi: ath11k: restore register window after global reset (git-fixes). - wifi: cw1200: Fix potential memory leak in cw1200_bh_rx_helper() (git-fixes). - wifi: ieee80211: correct FILS status codes (git-fixes). - wifi: mac80211: fix CMAC functions not handling errors (git-fixes). - wifi: mt76: Fix DTS power-limits on little endian systems (git-fixes). - wifi: nl80211: vendor-cmd: intel: fix a blank kernel-doc line warning (git-fixes). - wifi: rtl818x: Fix potential memory leaks in rtl8180_init_rx_ring() (git-fixes). - wifi: rtl818x: rtl8187: Fix potential buffer underflow in rtl8187_rx_cb() (git-fixes). - x86/hyperv: Fix APIC ID and VP index confusion in hv_snp_boot_ap() (git-fixes). - x86/microcode/AMD: Add TSA microcode SHAs (bsc#1256528). - x86/microcode/AMD: Add Zen5 model 0x44, stepping 0x1 minrev (bsc#1256528). - x86/microcode/AMD: Add more known models to entry sign checking (bsc#1256528). - x86/microcode/AMD: Add some forgotten models to the SHA check (bsc#1256528). - x86/microcode/AMD: Clean the cache if update did not load microcode (bsc#1256528). - x86/microcode/AMD: Extend the SHA check to Zen5, block loading of any unreleased standalone Zen5 microcode patches (bsc#1256528). - x86/microcode/AMD: Fix Entrysign revision check for Zen5/Strix Halo (bsc#1256528). - x86/microcode/AMD: Fix __apply_microcode_amd()'s return value (bsc#1256528). - x86/microcode/AMD: Limit Entrysign signature checking to known generations (bsc#1256528). - x86/microcode/AMD: Load only SHA256-checksummed patches (bsc#1256528). - x86/microcode/AMD: Select which microcode patch to load (bsc#1256528). - x86/microcode/AMD: Use sha256() instead of init/update/final (bsc#1256528). - x86/microcode: Fix Entrysign revision check for Zen1/Naples (bsc#1256528). - xhci: dbgtty: fix device unregister (git-fixes). </description> </patchinfo>