File _patchinfo of Package patchinfo.41033

<patchinfo incident="41033">
  <issue id="1065729" tracker="bnc">[trackerbug] 4.12 powerpc base kernel fixes</issue>
  <issue id="1164051" tracker="bnc">WARNING: at ../lib/vsprintf.c:1916 when create a MD Raid0 array with 50 disks. ref:_00D1igLOd._5001iLhGpk:ref</issue>
  <issue id="1193629" tracker="bnc">[TRACKERBUG] SLE15-SP4 backports for cifs.ko</issue>
  <issue id="1194869" tracker="bnc">[TRACKERBUG] 5.14 powerpc base kernel fixes</issue>
  <issue id="1202700" tracker="bnc">VUL-0: CVE-2022-2978: kernel-source-azure,kernel-source-rt,kernel-source: kernel: use-after-free in nilfs_mdt_destroy</issue>
  <issue id="1203063" tracker="bnc">Update Broadcom Emulex lpfc driver to 14.2.0.6</issue>
  <issue id="1203332" tracker="bnc">VUL-0: CVE-2022-36280: kernel: out-of-bounds memory access vulnerability found in vmwgfx driver</issue>
  <issue id="1204228" tracker="bnc">VUL-0: CVE-2022-2602: kernel: defer registered files gc to io_uring release</issue>
  <issue id="1205128" tracker="bnc">VUL-0: CVE-2022-43945: kernel-source-azure,kernel-source,kernel-source-rt: nfsd: buffer overflow due to incorrect calculation of send buffer size</issue>
  <issue id="1205205" tracker="bnc">Catch up io_uring performance with mainline</issue>
  <issue id="1206451" tracker="bnc">wlan device QCNFA765 not detected</issue>
  <issue id="1206456" tracker="bnc">panic in btrfs_ioctl_logical_to_ino</issue>
  <issue id="1206468" tracker="bnc">memory leak in set_mempolicy_home_node</issue>
  <issue id="1206843" tracker="bnc">Lenovo T14s Gen3 AMD resume from sleep broken</issue>
  <issue id="1206883" tracker="bnc">[PATCH] ext4: avoid crash when inline data creation follows DIO write</issue>
  <issue id="1206884" tracker="bnc">[PATCH] ext4: fix null-ptr-deref in ext4_write_info</issue>
  <issue id="1207158" tracker="bnc">[FVTCR]SLES15 SP4 [5.14.21-150400.24.18-default] while running btrfs xfstest with 4k/64k gets stuck with open_ctree failed error and makes lpar unresponsive [P10] [rainier]</issue>
  <issue id="1207361" tracker="bnc">SLE15-SP5 networking backports and fixes</issue>
  <issue id="1207621" tracker="bnc">[PATCH] ext4: don't allow journal inode to have encrypt flag</issue>
  <issue id="1207624" tracker="bnc">[PATCH] ext4: don't set up encryption key during jbd2 transaction</issue>
  <issue id="1207625" tracker="bnc">[PATCH] ext4: fix leaking uninitialized memory in fast-commit journal</issue>
  <issue id="1207628" tracker="bnc">[PATCH] ext4: fix off-by-one errors in fast-commit block filling</issue>
  <issue id="1207629" tracker="bnc">[PATCH] ext4: init quota for 'old.inode' in 'ext4_rename'</issue>
  <issue id="1207631" tracker="bnc">[PATCH] ext4: fix delayed allocation bug in ext4_clu_mapped for  bigalloc + inline</issue>
  <issue id="1207645" tracker="bnc">[PATCH] jbd2: fix potential use-after-free in jbd2_fc_wait_bufs</issue>
  <issue id="1207651" tracker="bnc">[PATCH] ocfs2: fix memory leak in ocfs2_stack_glue_init()</issue>
  <issue id="1208607" tracker="bnc">Update Broadcom Emulex lpfc driver to 14.2.0.10</issue>
  <issue id="1209287" tracker="bnc">VUL-0: CVE-2023-1380: kernel: A USB-accessible slab-out-of-bounds read in Linux kernel driver</issue>
  <issue id="1209291" tracker="bnc">VUL-0: CVE-2023-28328: kernel: A denial of service issue in  az6027 driver in drivers/media/usb/dev-usb/az6027.c</issue>
  <issue id="1209980" tracker="bnc">Lenovo L14 Gen3 AMD, wifi card (Mediatek MT7922) not recognized.</issue>
  <issue id="1210584" tracker="bnc">VUL-0: kernel: buffer overflow in mtd_ubi build.c:::io_init</issue>
  <issue id="1211960" tracker="bnc">qla2xxx: update driver to 10.02.08.300-k</issue>
  <issue id="1212603" tracker="bnc">ISST: SLES15SP5: ritzlp57: LPM failed with HSCLA2CF and HSCL365C and LPAR crashed</issue>
  <issue id="1213015" tracker="bnc">[PATCH] ext4: fix i_disksize exceeding i_size problem in paritally  written case</issue>
  <issue id="1213016" tracker="bnc">[PATCH] ext4: avoid deadlock in fs reclaim with page writeback</issue>
  <issue id="1213040" tracker="bnc">[PATCH] udf: Do not bother merging very long extents</issue>
  <issue id="1213041" tracker="bnc">[PATCH] udf: Do not update file length for failed writes to inline  files</issue>
  <issue id="1213061" tracker="bnc">VUL-0: CVE-2023-31248: kernel: nf_tables UAF when using nft_chain_lookup_byid</issue>
  <issue id="1213099" tracker="bnc">[PATCH] ext4: fix WARNING in mb_find_extent</issue>
  <issue id="1213104" tracker="bnc">[PATCH] ext4: improve error handling from ext4_dirhash()</issue>
  <issue id="1213533" tracker="bnc">Backport irqchip/gicv3: Workaround for NVIDIA erratum T241-FABRIC-4</issue>
  <issue id="1213666" tracker="bnc">VUL-0: CVE-2023-3772: kernel: xfrm: NULL pointer dereference in xfrm_update_ae_params()</issue>
  <issue id="1213747" tracker="bnc">qla2xxx: update driver to 10.02.08.500-k</issue>
  <issue id="1214073" tracker="bnc">[Build 20230807] nouveau regression on 6.4.8 kernel</issue>
  <issue id="1214953" tracker="bnc">[PATCH] jbd2: check 'jh-&gt;b_transaction' before removing it from  checkpoint</issue>
  <issue id="1214967" tracker="bnc">[PATCH] udf: Fix uninitialized array access for some pathnames</issue>
  <issue id="1215150" tracker="bnc">VUL-0: CVE-2023-42753: kernel-source: slab-out-of-bound access in the Linux kernel</issue>
  <issue id="1215696" tracker="bnc">Bug in SNC when nr_cpus=&lt;fewer cpus than present&gt;</issue>
  <issue id="1215911" tracker="bnc">KVM: s390/diag: fix racy access of physical cpu number in diag 9c  handler</issue>
  <issue id="1216976" tracker="bnc">VUL-0: CVE-2023-39197: kernel: DCCP: conntrack out-of-bounds read in nf_conntrack_dccp_packet()</issue>
  <issue id="1217790" tracker="bnc">Bug in SNC when nr_cpus=&lt;fewer cpus than present&gt;</issue>
  <issue id="1220185" tracker="bnc">VUL-0: CVE-2024-26583: kernel: tls: fix race between async notify and socket close</issue>
  <issue id="1220186" tracker="bnc">VUL-0: CVE-2024-26584: kernel: net: tls: handle backlogging of crypto requests</issue>
  <issue id="1223959" tracker="bnc">VUL-0: CVE-2022-48689: kernel: tcp: TX zerocopy should not sense pfmemalloc status</issue>
  <issue id="1234639" tracker="bnc">kobject: Add sanity check for kset-&gt;kobj.ktype in kset_register()</issue>
  <issue id="1236104" tracker="bnc">VUL-0: CVE-2023-52923: kernel: netfilter: nf_tables: adapt set backend to use GC transaction API</issue>
  <issue id="1237449" tracker="bnc">L3-Question: customer suffers from significant performance degradation of db2 backups on local XFS filesystems compared to SLES 12 SP5</issue>
  <issue id="1238160" tracker="bnc">VUL-0: CVE-2022-49138: kernel: Bluetooth: hci_event: Ignore multiple conn complete events</issue>
  <issue id="1241353" tracker="bnc">[Build 20250416] openQA test fails in tdup: ordering of package in transaction</issue>
  <issue id="1242846" tracker="bnc">VUL-0: CVE-2025-37738: kernel: ext4: ignore xattrs past end</issue>
  <issue id="1243539" tracker="bnc">VUL-0: CVE-2025-37958: kernel: mm/huge_memory: fix dereferencing invalid pmd migration entry</issue>
  <issue id="1244337" tracker="bnc">kernel-syms should not require kernel-rt-devel</issue>
  <issue id="1244732" tracker="bnc">VUL-0: CVE-2025-38014: kernel: dmaengine: idxd: refactor remove call with idxd_cleanup() helper</issue>
  <issue id="1245666" tracker="bnc">VUL-0: CVE-2025-38111: kernel: net/mdiobus: Fix potential out-of-bounds read/write access</issue>
  <issue id="1246879" tracker="bnc">[ppc64le] kernel-default-base has truncated vmlinux, breaking fips</issue>
  <issue id="1246968" tracker="bnc">VUL-0: CVE-2022-50233: kernel: bluetooth: device name can cause reading kernel memory by not supplying terminal \0</issue>
  <issue id="1247028" tracker="bnc">VUL-0: CVE-2025-38380: kernel: i2c/designware: Fix an initialization issue</issue>
  <issue id="1247172" tracker="bnc">Kernel-syms.spec does not write release information in local build of RPM package</issue>
  <issue id="1247239" tracker="bnc">VUL-0: CVE-2025-38488: kernel: smb: client: fix use-after-free in crypt_message when using async crypto</issue>
  <issue id="1248108" tracker="bnc">kernel: livepatching: build dependencies for RT flavour: kernel-syms vs. kernel-syms-rt</issue>
  <issue id="1248111" tracker="bnc">[Suse][netvsc][Backport] hv_netvsc: Fix panic during namespace deletion with VF</issue>
  <issue id="1248255" tracker="bnc">VUL-0: CVE-2025-38553: kernel: net/sched: Restrict conditions for adding duplicating netems to qdisc tree</issue>
  <issue id="1248399" tracker="bnc">VUL-0: CVE-2025-38572: kernel: ipv6: reject malicious packets in ipv6_gso_segment()</issue>
  <issue id="1248628" tracker="bnc">VUL-0: CVE-2025-38664: kernel: ice: Fix a null pointer dereference in ice_copy_and_init_pkg()</issue>
  <issue id="1248639" tracker="bnc">VUL-0: CVE-2025-38659: kernel: gfs2: No more self recovery</issue>
  <issue id="1248847" tracker="bnc">VUL-0: CVE-2024-58240: kernel: tls: separate no-async decryption request handling from async</issue>
  <issue id="1249126" tracker="bnc">VUL-0: CVE-2025-38678: kernel: netfilter: nf_tables: reject duplicate device on updates</issue>
  <issue id="1249158" tracker="bnc">fstests btrfs/336 crashed in LTSS kernel-live-patching test</issue>
  <issue id="1249159" tracker="bnc">VUL-0: CVE-2025-38683: kernel: hv_netvsc: Fix panic during namespace deletion with VF</issue>
  <issue id="1249186" tracker="bnc">Relax KABI checks on archs/flavors without KABI</issue>
  <issue id="1249195" tracker="bnc">VUL-0: CVE-2025-38706: kernel: ASoC: core: Check for rtd == NULL in snd_soc_remove_pcm_runtime()</issue>
  <issue id="1249200" tracker="bnc">VUL-0: CVE-2025-38713: kernel: hfsplus: fix slab-out-of-bounds read in hfsplus_uni2asc()</issue>
  <issue id="1249220" tracker="bnc">VUL-0: CVE-2025-38685: kernel: fbdev: Fix vmalloc out-of-bounds write in fast_imageblit</issue>
  <issue id="1249266" tracker="bnc">VUL-0: CVE-2025-39726: kernel: s390/ism: fix concurrency management in ism_cmd()</issue>
  <issue id="1249315" tracker="bnc">VUL-0: CVE-2025-39703: kernel: net, hsr: reject HSR frame if skb can't hold tag</issue>
  <issue id="1249324" tracker="bnc">VUL-0: CVE-2025-38734: kernel: net/smc: fix UAF on smcsk after smc_listen_out()</issue>
  <issue id="1249346" tracker="bnc">[Build 20250908] openQA test fails in kdump_and_crash: not supported file format</issue>
  <issue id="1249374" tracker="bnc">VUL-0: CVE-2025-39691: kernel: kernel: fs/buffer: fix use-after-free when call bh_read() helper</issue>
  <issue id="1249516" tracker="bnc">VUL-0: CVE-2025-39746: kernel: wifi: ath10k: shutdown driver when hardware is unreliable</issue>
  <issue id="1249538" tracker="bnc">VUL-0: CVE-2025-39751: kernel: ALSA: hda/ca0132: Fix buffer overflow in add_tuning_control</issue>
  <issue id="1249548" tracker="bnc">VUL-0: CVE-2025-39790: kernel: bus: mhi: host: Detect events pointing to unexpected TREs</issue>
  <issue id="1249604" tracker="bnc">Use tar for creating kernel-source archives</issue>
  <issue id="1249638" tracker="bnc">VUL-0: CVE-2023-53241: kernel: nfsd: call op_release, even when op_func returns an error</issue>
  <issue id="1249639" tracker="bnc">VUL-0: CVE-2023-53242: kernel: thermal/drivers/hisi: Drop second sensor hi3660</issue>
  <issue id="1249641" tracker="bnc">VUL-0: CVE-2023-53245: kernel: scsi: storvsc: Fix handling of virtual Fibre Channel timeouts</issue>
  <issue id="1249642" tracker="bnc">VUL-0: CVE-2023-53249: kernel: clk: imx: clk-imx8mn: fix memory leak in imx8mn_clocks_probe</issue>
  <issue id="1249648" tracker="bnc">VUL-0: CVE-2023-53232: kernel: mt76: mt7921: fix kernel panic by accessing unallocated eeprom.data</issue>
  <issue id="1249650" tracker="bnc">VUL-0: CVE-2023-53229: kernel: wifi: mac80211: fix invalid drv_sta_pre_rcu_remove calls for non-uploaded sta</issue>
  <issue id="1249651" tracker="bnc">VUL-0: CVE-2022-50276: kernel: power: supply: fix null pointer dereferencing in power_supply_get_battery_info</issue>
  <issue id="1249658" tracker="bnc">VUL-0: CVE-2023-53226: kernel: wifi: mwifiex: Fix OOB and integer underflow when rx packets</issue>
  <issue id="1249661" tracker="bnc">VUL-0: CVE-2023-53219: kernel: media: netup_unidvb: fix use-after-free at del_timer()</issue>
  <issue id="1249664" tracker="bnc">VUL-0: CVE-2022-50234: kernel: io_uring/af_unix: defer registered files gc to io_uring release</issue>
  <issue id="1249667" tracker="bnc">VUL-0: CVE-2022-50235: kernel: NFSD: Protect against send buffer overflow in NFSv2 READDIR</issue>
  <issue id="1249669" tracker="bnc">VUL-0: CVE-2023-53216: kernel: arm64: efi: Make efi_rt_lock a raw_spinlock</issue>
  <issue id="1249673" tracker="bnc">VUL-0: CVE-2023-53210: kernel: md/raid5-cache: fix null-ptr-deref for r5l_flush_stripe_to_raid()</issue>
  <issue id="1249677" tracker="bnc">VUL-0: CVE-2023-53205: kernel: KVM: s390/diag: fix racy access of physical cpu number in diag 9c handler</issue>
  <issue id="1249681" tracker="bnc">VUL-0: CVE-2022-50247: kernel: usb: xhci-mtk: fix leakage of shared hcd when fail to set wakeup irq</issue>
  <issue id="1249683" tracker="bnc">VUL-0: CVE-2023-53199: kernel: wifi: ath9k: hif_usb: clean up skbs if ath9k_hif_usb_rx_stream() fails</issue>
  <issue id="1249685" tracker="bnc">VUL-0: CVE-2022-50264: kernel: clk: socfpga: Fix memory leak in socfpga_gate_init()</issue>
  <issue id="1249687" tracker="bnc">VUL-0: CVE-2023-53201: kernel: RDMA/bnxt_re: wraparound mbox producer index</issue>
  <issue id="1249695" tracker="bnc">VUL-0: CVE-2022-50331: kernel: wwan_hwsim: fix possible memory leak in wwan_hwsim_dev_new()</issue>
  <issue id="1249696" tracker="bnc">VUL-0: CVE-2022-50242: kernel: drivers: net: qlcnic: Fix potential memory leak in qlcnic_sriov_init()</issue>
  <issue id="1249699" tracker="bnc">VUL-0: CVE-2022-50329: kernel: block, bfq: fix uaf for bfqq in bfq_exit_icq_bfqq</issue>
  <issue id="1249700" tracker="bnc">VUL-0: CVE-2022-50330: kernel: crypto: cavium - prevent integer overflow loading firmware</issue>
  <issue id="1249701" tracker="bnc">VUL-0: CVE-2022-50324: kernel: mtd: maps: pxa2xx-flash: fix memory leak in probe</issue>
  <issue id="1249704" tracker="bnc">VUL-0: CVE-2022-50325: kernel: ASoC: Intel: avs: Fix potential RX buffer overflow</issue>
  <issue id="1249705" tracker="bnc">VUL-0: CVE-2022-50275: kernel: drm/radeon: Add the missed acpi_put_table() to fix memory leak</issue>
  <issue id="1249706" tracker="bnc">VUL-0: CVE-2022-50321: kernel: wifi: brcmfmac: fix potential memory leak in brcmf_netdev_start_xmit()</issue>
  <issue id="1249707" tracker="bnc">VUL-0: CVE-2023-53238: kernel: phy: hisilicon: Fix an out of bounds check in hisi_inno_phy_probe()</issue>
  <issue id="1249708" tracker="bnc">VUL-0: CVE-2022-50323: kernel: net: do not sense pfmemalloc status in skb_append_pagefrags()</issue>
  <issue id="1249709" tracker="bnc">VUL-0: CVE-2022-50318: kernel: perf/x86/intel/uncore: Fix reference count leak in hswep_has_limit_sbox()</issue>
  <issue id="1249712" tracker="bnc">VUL-0: CVE-2023-53167: kernel: tracing: Fix null pointer dereference in tracing_err_log_open()</issue>
  <issue id="1249713" tracker="bnc">VUL-0: CVE-2022-50317: kernel: drm/bridge: megachips: Fix a null pointer dereference bug</issue>
  <issue id="1249715" tracker="bnc">VUL-0: CVE-2022-50278: kernel: PNP: fix name memory leak in pnp_alloc_dev()</issue>
  <issue id="1249716" tracker="bnc">VUL-0: CVE-2022-50312: kernel: drivers: serial: jsm: fix some leaks in probe</issue>
  <issue id="1249718" tracker="bnc">VUL-0: CVE-2022-50309: kernel: media: xilinx: vipp: Fix refcount leak in xvip_graph_dma_init</issue>
  <issue id="1249722" tracker="bnc">VUL-0: CVE-2022-50308: kernel: ASoC: qcom: Add checks for devm_kcalloc</issue>
  <issue id="1249727" tracker="bnc">VUL-0: CVE-2023-53250: kernel: firmware: dmi-sysfs: Fix null-ptr-deref in dmi_sysfs_register_handle</issue>
  <issue id="1249730" tracker="bnc">VUL-0: CVE-2023-53251: kernel: wifi: iwlwifi: pcie: fix NULL pointer dereference in iwl_pcie_irq_rx_msix_handler()</issue>
  <issue id="1249733" tracker="bnc">VUL-0: CVE-2022-50301: kernel: iommu/omap: Fix buffer overflow in debugfs</issue>
  <issue id="1249734" tracker="bnc">VUL-0: CVE-2022-50299: kernel: md: Replace snprintf with scnprintf</issue>
  <issue id="1249739" tracker="bnc">VUL-0: CVE-2022-50282: kernel: chardev: fix error handling in cdev_device_add()</issue>
  <issue id="1249740" tracker="bnc">VUL-0: CVE-2022-50271: kernel: vhost/vsock: Use kvmalloc/kvfree for larger packets.</issue>
  <issue id="1249741" tracker="bnc">VUL-0: CVE-2022-50268: kernel: mmc: moxart: fix return value check of mmc_add_host()</issue>
  <issue id="1249742" tracker="bnc">VUL-0: CVE-2022-50261: kernel: drm/sti: Fix return type of sti_{dvo,hda,hdmi}_connector_mode_valid()</issue>
  <issue id="1249743" tracker="bnc">VUL-0: CVE-2022-50257: kernel: xen/gntdev: Prevent leaking grants</issue>
  <issue id="1249745" tracker="bnc">VUL-0: CVE-2022-50251: kernel: mmc: vub300: fix return value check of mmc_add_host()</issue>
  <issue id="1249746" tracker="bnc">VUL-0: CVE-2022-50246: kernel: usb: typec: tcpci: fix of node refcount leak in tcpci_register_port()</issue>
  <issue id="1249747" tracker="bnc">VUL-0: CVE-2022-50249: kernel: memory: of: Fix refcount leak bug in of_get_ddr_timings()</issue>
  <issue id="1249749" tracker="bnc">VUL-0: CVE-2022-50267: kernel: mmc: rtsx_pci: fix return value check of mmc_add_host()</issue>
  <issue id="1249750" tracker="bnc">VUL-0: CVE-2022-50277: kernel: ext4: don't allow journal inode to have encrypt flag</issue>
  <issue id="1249751" tracker="bnc">VUL-0: CVE-2022-50279: kernel: wifi: rtlwifi: Fix global-out-of-bounds bug in _rtl8812ae_phy_set_txpower_limit()</issue>
  <issue id="1249753" tracker="bnc">VUL-0: CVE-2022-50286: kernel: ext4: fix delayed allocation bug in ext4_clu_mapped for bigalloc + inline</issue>
  <issue id="1249756" tracker="bnc">VUL-0: CVE-2023-53252: kernel: Bluetooth: use RCU for hci_conn_params and iterate safely in hci_sync</issue>
  <issue id="1249757" tracker="bnc">VUL-0: CVE-2022-50287: kernel: drm/i915/bios: fix a memory leak in generate_lfp_data_ptrs</issue>
  <issue id="1249758" tracker="bnc">VUL-0: CVE-2023-53196: kernel: usb: dwc3: qcom: Fix potential memory leak</issue>
  <issue id="1249762" tracker="bnc">VUL-0: CVE-2023-53255: kernel: firmware: stratix10-svc: Fix a potential resource leak in svc_create_memory_pool()</issue>
  <issue id="1249767" tracker="bnc">VUL-0: CVE-2023-53259: kernel: VMCI: check context-&gt;notify_page after call to get_user_pages_fast() to avoid GPF</issue>
  <issue id="1249777" tracker="bnc">VUL-0: CVE-2022-50269: kernel: kernel: drm/vkms: Fix memory leak in vkms_init()</issue>
  <issue id="1249780" tracker="bnc">VUL-0: CVE-2023-53258: kernel: drm/amd/display: Fix possible underflow for displays with large vblank</issue>
  <issue id="1249781" tracker="bnc">VUL-0: CVE-2023-53239: kernel: drm/msm/mdp5: Add check for kzalloc</issue>
  <issue id="1249782" tracker="bnc">VUL-0: CVE-2023-53237: kernel: drm/amdgpu: fix amdgpu_irq_put call trace in gmc_v11_0_hw_fini</issue>
  <issue id="1249784" tracker="bnc">VUL-0: CVE-2023-53234: kernel: watchdog: Fix kmemleak in watchdog_cdev_register</issue>
  <issue id="1249791" tracker="bnc">VUL-0: CVE-2023-53197: kernel: USB: uhci: fix memory leak with using debugfs_lookup()</issue>
  <issue id="1249799" tracker="bnc">VUL-0: CVE-2022-50294: kernel: wifi: libertas: fix memory leak in lbs_init_adapter()</issue>
  <issue id="1249800" tracker="bnc">VUL-0: CVE-2022-50292: kernel: drm/msm/dp: fix bridge lifetime</issue>
  <issue id="1249802" tracker="bnc">VUL-0: CVE-2022-50288: kernel: qlcnic: prevent -&gt;dcb use-after-free on qlcnic_dcb_enable() failure</issue>
  <issue id="1249808" tracker="bnc">VUL-0: CVE-2022-50272: kernel: media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer()</issue>
  <issue id="1249810" tracker="bnc">VUL-0: CVE-2022-50266: kernel: kprobes: Fix check for probe enabled in kill_kprobe()</issue>
  <issue id="1249816" tracker="bnc">VUL-0: CVE-2023-53193: kernel: drm/amdgpu: fix amdgpu_irq_put call trace in gmc_v10_0_hw_fini</issue>
  <issue id="1249820" tracker="bnc">VUL-0: CVE-2023-53185: kernel: wifi: ath9k: don't allow to overwrite ENDPOINT0 attributes</issue>
  <issue id="1249824" tracker="bnc">VUL-0: CVE-2023-53181: kernel: dma-buf/dma-resv: Stop leaking on krealloc() failure</issue>
  <issue id="1249825" tracker="bnc">VUL-0: CVE-2023-53179: kernel: netfilter: ipset: add the missing IP_SET_HASH_WITH_NET0 macro for ip_set_hash_netportnet.c</issue>
  <issue id="1249827" tracker="bnc">VUL-0: CVE-2023-53178: kernel: mm: fix zswap writeback race condition</issue>
  <issue id="1249836" tracker="bnc">VUL-0: CVE-2022-50239: kernel: cpufreq: qcom: fix writes in read-only memory region</issue>
  <issue id="1249840" tracker="bnc">VUL-0: CVE-2022-50248: kernel: wifi: iwlwifi: mvm: fix double free on tx path.</issue>
  <issue id="1249844" tracker="bnc">VUL-0: CVE-2022-50250: kernel: regulator: core: fix use_count leakage when handling boot-on</issue>
  <issue id="1249846" tracker="bnc">VUL-0: CVE-2022-50252: kernel: igb: Do not free q_vector unless new one was allocated</issue>
  <issue id="1249853" tracker="bnc">VUL-0: CVE-2023-53150: kernel: scsi: qla2xxx: Pointer may be dereferenced</issue>
  <issue id="1249858" tracker="bnc">VUL-0: CVE-2022-50320: kernel: ACPI: tables: FPDT: Don't call acpi_os_map_memory() on invalid phys address</issue>
  <issue id="1249860" tracker="bnc">VUL-0: CVE-2022-50333: kernel: fs: jfs: fix shift-out-of-bounds in dbDiscardAG</issue>
  <issue id="1249861" tracker="bnc">VUL-0: CVE-2023-53263: kernel: drm/nouveau/disp: fix use-after-free in error handling of nouveau_connector_create</issue>
  <issue id="1249864" tracker="bnc">VUL-0: CVE-2023-53222: kernel: jfs: jfs_dmap: Validate db_l2nbperpage while mounting</issue>
  <issue id="1249865" tracker="bnc">VUL-0: CVE-2023-53151: kernel: md/raid10: prevent soft lockup while flush writes</issue>
  <issue id="1249866" tracker="bnc">VUL-0: CVE-2023-53230: kernel: smb: client: fix warning in cifs_smb3_do_mount()</issue>
  <issue id="1249867" tracker="bnc">VUL-0: CVE-2023-53246: kernel: cifs: fix DFS traversal oops without CONFIG_CIFS_DFS_UPCALL</issue>
  <issue id="1249868" tracker="bnc">VUL-0: CVE-2023-53244: kernel: media: pci: tw68: Fix null-ptr-deref bug in buf prepare and finish</issue>
  <issue id="1249869" tracker="bnc">VUL-0: CVE-2023-53257: kernel: wifi: mac80211: check S1G action frame size</issue>
  <issue id="1249872" tracker="bnc">VUL-0: CVE-2023-53270: kernel: ext4: fix i_disksize exceeding i_size problem in paritally written case</issue>
  <issue id="1249874" tracker="bnc">VUL-0: CVE-2023-53168: kernel: usb: ucsi_acpi: Increase the command completion timeout</issue>
  <issue id="1249877" tracker="bnc">VUL-0: CVE-2023-53153: kernel: wifi: cfg80211: Fix use after free for wext</issue>
  <issue id="1249880" tracker="bnc">VUL-0: CVE-2023-53147: kernel: xfrm: add NULL check in xfrm_update_ae_params</issue>
  <issue id="1249882" tracker="bnc">VUL-0: CVE-2023-53149: kernel: ext4: avoid deadlock in fs reclaim with page writeback</issue>
  <issue id="1249883" tracker="bnc">VUL-0: CVE-2023-53152: kernel: drm/amdgpu: fix calltrace warning in amddrm_buddy_fini</issue>
  <issue id="1249884" tracker="bnc">VUL-0: CVE-2022-50303: kernel: drm/amdkfd: Fix double release compute pasid</issue>
  <issue id="1249885" tracker="bnc">VUL-0: CVE-2022-50260: kernel: drm/msm: Make .remove and .shutdown HW shutdown consistent</issue>
  <issue id="1249890" tracker="bnc">VUL-0: CVE-2022-50342: kernel: floppy: Fix memory leak in do_floppy_init()</issue>
  <issue id="1249892" tracker="bnc">VUL-0: CVE-2022-50340: kernel: media: vimc: Fix wrong function called when vimc_init() fails</issue>
  <issue id="1249894" tracker="bnc">VUL-0: CVE-2023-53189: kernel: ipv6/addrconf: fix a potential refcount underflow for idev</issue>
  <issue id="1249908" tracker="bnc">VUL-0: CVE-2023-53265: kernel: ubi: ensure that VID header offset + VID header size &lt;= alloc, size</issue>
  <issue id="1249910" tracker="bnc">VUL-0: CVE-2022-50255: kernel: tracing: Fix reading strings from synthetic events</issue>
  <issue id="1249911" tracker="bnc">VUL-0: CVE-2023-53313: kernel: md/raid10: fix wrong setting of max_corr_read_errors</issue>
  <issue id="1249913" tracker="bnc">VUL-0: CVE-2022-50339: kernel: Bluetooth: avoid hci_dev_test_and_set_flag() in mgmt_init_hdev()</issue>
  <issue id="1249914" tracker="bnc">VUL-0: CVE-2023-53268: kernel: ASoC: fsl_mqs: move of_node_put() to the correct location</issue>
  <issue id="1249917" tracker="bnc">VUL-0: CVE-2023-53272: kernel: net: ena: fix shift-out-of-bounds in exponential backoff</issue>
  <issue id="1249918" tracker="bnc">VUL-0: CVE-2023-53213: kernel: wifi: brcmfmac: slab-out-of-bounds read in brcmf_get_assoc_ies()</issue>
  <issue id="1249920" tracker="bnc">VUL-0: CVE-2022-50349: kernel: misc: tifm: fix possible memory leak in tifm_7xx1_switch_media()</issue>
  <issue id="1249923" tracker="bnc">VUL-0: CVE-2023-53304: kernel: netfilter: nft_set_rbtree: fix overlap expiration walk</issue>
  <issue id="1249924" tracker="bnc">VUL-0: CVE-2022-50348: kernel: nfsd: Fix a memory leak in an error handling path</issue>
  <issue id="1249925" tracker="bnc">VUL-0: CVE-2022-50351: kernel: cifs: Fix xid leak in cifs_create()</issue>
  <issue id="1249927" tracker="bnc">VUL-0: CVE-2023-53299: kernel: md/raid10: fix leak of 'r10bio-&gt;remaining' for recovery</issue>
  <issue id="1249928" tracker="bnc">VUL-0: CVE-2022-50347: kernel: mmc: rtsx_usb_sdmmc: fix return value check of mmc_add_host()</issue>
  <issue id="1249930" tracker="bnc">VUL-0: CVE-2023-53273: kernel: Drivers: vmbus: Check for channel allocation before looking up relids</issue>
  <issue id="1249933" tracker="bnc">VUL-0: CVE-2023-53171: kernel: vfio/type1: prevent underflow of locked_vm via exec()</issue>
  <issue id="1249934" tracker="bnc">VUL-0: CVE-2022-50298: kernel: slimbus: qcom-ngd: cleanup in probe error path</issue>
  <issue id="1249936" tracker="bnc">VUL-0: CVE-2023-53277: kernel: wifi: iwl3945: Add missing check for create_singlethread_workqueue</issue>
  <issue id="1249938" tracker="bnc">VUL-0: CVE-2023-53280: kernel: scsi: qla2xxx: Remove unused nvme_ls_waitq wait queue</issue>
  <issue id="1249939" tracker="bnc">VUL-0: CVE-2023-53281: kernel: drivers: staging: rtl8723bs: Fix locking in _rtw_join_timeout_handler()</issue>
  <issue id="1249940" tracker="bnc">VUL-0: CVE-2023-53284: kernel: drm/msm/dpu: check for null return of devm_kzalloc() in dpu_writeback_init()</issue>
  <issue id="1249944" tracker="bnc">VUL-0: CVE-2023-53298: kernel: nfc: fix memory leak of se_io context in nfc_genl_se_io</issue>
  <issue id="1249947" tracker="bnc">VUL-0: CVE-2022-50258: kernel: wifi: brcmfmac: Fix potential stack-out-of-bounds in brcmf_c_preinit_dcmds()</issue>
  <issue id="1249949" tracker="bnc">VUL-0: CVE-2023-53333: kernel: netfilter: conntrack: dccp: copy entire header to stack buffer, not just basic one</issue>
  <issue id="1249950" tracker="bnc">VUL-0: CVE-2023-53331: kernel: pstore/ram: Check start of empty przs during init</issue>
  <issue id="1249951" tracker="bnc">VUL-0: CVE-2023-53332: kernel: genirq/ipi: Fix NULL pointer deref in irq_data_get_affinity_mask()</issue>
  <issue id="1249954" tracker="bnc">VUL-0: CVE-2023-53330: kernel: caif: fix memory leak in cfctrl_linkup_request()</issue>
  <issue id="1249958" tracker="bnc">VUL-0: CVE-2023-53302: kernel: wifi: iwl4965: Add missing check for create_singlethread_workqueue()</issue>
  <issue id="1249979" tracker="bnc">VUL-0: CVE-2023-53368: kernel: tracing: Fix race issue between cpu buffer write and swap</issue>
  <issue id="1249981" tracker="bnc">VUL-0: CVE-2022-50289: kernel: ocfs2: fix memory leak in ocfs2_stack_glue_init()</issue>
  <issue id="1249991" tracker="bnc">VUL-0: CVE-2023-53176: kernel: serial: 8250: Reinit port-&gt;pm on port specific driver unbind</issue>
  <issue id="1249994" tracker="bnc">VUL-0: CVE-2023-53357: kernel: md/raid10: check slab-out-of-bounds in md_bitmap_get_counter</issue>
  <issue id="1249997" tracker="bnc">VUL-0: CVE-2023-53356: kernel: usb: gadget: u_serial: Add null pointer check in gserial_suspend</issue>
  <issue id="1250002" tracker="bnc">VUL-0: CVE-2025-39823: kernel: KVM: x86: use array_index_nospec with indices that come from guest</issue>
  <issue id="1250006" tracker="bnc">VUL-0: CVE-2023-53352: kernel: drm/ttm: check null pointer before accessing when swapping</issue>
  <issue id="1250007" tracker="bnc">VUL-0: CVE-2025-39824: kernel: HID: asus: fix UAF via HID_CLAIMED_INPUT validation</issue>
  <issue id="1250009" tracker="bnc">VUL-0: CVE-2022-50368: kernel: drm/msm/dsi: fix memory corruption with too many bridges</issue>
  <issue id="1250010" tracker="bnc">VUL-0: CVE-2023-53182: kernel: ACPICA: Avoid undefined behavior: applying zero offset to null pointer</issue>
  <issue id="1250011" tracker="bnc">VUL-0: CVE-2022-50370: kernel: i2c: designware: Fix handling of real but unexpected device interrupts</issue>
  <issue id="1250014" tracker="bnc">VUL-0: CVE-2022-50344: kernel: ext4: fix null-ptr-deref in ext4_write_info</issue>
  <issue id="1250015" tracker="bnc">VUL-0: CVE-2023-53349: kernel: media: ov2740: Fix memleak in ov2740_init_controls()</issue>
  <issue id="1250017" tracker="bnc">VUL-0: CVE-2023-53347: kernel: net/mlx5: Handle pairing of E-switch via uplink un/load APIs</issue>
  <issue id="1250023" tracker="bnc">VUL-0: CVE-2023-53344: kernel: can: bcm: bcm_tx_setup(): fix KMSAN uninit-value in vfs_write</issue>
  <issue id="1250024" tracker="bnc">VUL-0: CVE-2023-53174: kernel: scsi: core: Fix possible memory leak if device_add() fails</issue>
  <issue id="1250026" tracker="bnc">VUL-0: CVE-2022-50369: kernel: kernel: drm/vkms: Fix null-ptr-deref in vkms_release()</issue>
  <issue id="1250037" tracker="bnc">VUL-0: CVE-2022-50360: kernel: drm/msm/dp: fix aux-bus EP lifetime</issue>
  <issue id="1250039" tracker="bnc">VUL-0: CVE-2022-50362: kernel: dmaengine: hisilicon: Add multi-thread support for a DMA channel</issue>
  <issue id="1250040" tracker="bnc">VUL-0: CVE-2022-50356: kernel: net: sched: sfb: fix null pointer access issue when sfb_init() fails</issue>
  <issue id="1250041" tracker="bnc">VUL-0: CVE-2022-50355: kernel: staging: vt6655: fix some erroneous memory clean-up loops</issue>
  <issue id="1250042" tracker="bnc">VUL-0: CVE-2022-50357: kernel: usb: dwc3: core: fix some leaks in probe</issue>
  <issue id="1250044" tracker="bnc">VUL-0: CVE-2022-50346: kernel: ext4: init quota for 'old.inode' in 'ext4_rename'</issue>
  <issue id="1250047" tracker="bnc">VUL-0: CVE-2022-50353: kernel: mmc: wmt-sdmmc: fix return value check of mmc_add_host()</issue>
  <issue id="1250049" tracker="bnc">VUL-0: CVE-2023-53305: kernel: Bluetooth: L2CAP: Fix use-after-free</issue>
  <issue id="1250052" tracker="bnc">VUL-0: CVE-2022-50372: kernel: cifs: Fix memory leak when build ntlmssp negotiate blob failed</issue>
  <issue id="1250055" tracker="bnc">VUL-0: CVE-2023-53309: kernel: drm/radeon: Fix integer overflow in radeon_cs_parser_init</issue>
  <issue id="1250058" tracker="bnc">VUL-0: CVE-2023-53288: kernel: drm/client: Fix memory leak in drm_client_modeset_probe</issue>
  <issue id="1250060" tracker="bnc">VUL-0: CVE-2022-50374: kernel: Bluetooth: hci_{ldisc,serdev}: check percpu_init_rwsem() failure</issue>
  <issue id="1250062" tracker="bnc">VUL-0: CVE-2023-53311: kernel: nilfs2: fix use-after-free of nilfs_root in dirtying inodes via iput</issue>
  <issue id="1250065" tracker="bnc">VUL-0: CVE-2023-53314: kernel: fbdev/ep93xx-fb: Do not assign to struct fb_info.dev</issue>
  <issue id="1250066" tracker="bnc">VUL-0: CVE-2023-53316: kernel: drm/msm/dp: Free resources after unregistering them</issue>
  <issue id="1250068" tracker="bnc">VUL-0: CVE-2023-53320: kernel: scsi: mpi3mr: Fix issues in mpi3mr_get_all_tgt_info()</issue>
  <issue id="1250070" tracker="bnc">VUL-0: CVE-2023-53324: kernel: drm/msm/mdp5: Don't leak some plane state</issue>
  <issue id="1250071" tracker="bnc">VUL-0: CVE-2023-53326: kernel: powerpc: Don't try to copy PPR for task with NULL pt_regs</issue>
  <issue id="1250072" tracker="bnc">VUL-0: CVE-2023-53335: kernel: RDMA/cxgb4: Fix potential null-ptr-deref in pass_establish()</issue>
  <issue id="1250075" tracker="bnc">VUL-0: CVE-2023-53340: kernel: net/mlx5: Collect command failures data only for known commands</issue>
  <issue id="1250077" tracker="bnc">VUL-0: CVE-2023-53334: kernel: USB: chipidea: fix memory leak with using debugfs_lookup()</issue>
  <issue id="1250080" tracker="bnc">VUL-0: CVE-2023-53223: kernel: drm/msm/dsi: Add missing check for alloc_ordered_workqueue</issue>
  <issue id="1250081" tracker="bnc">VUL-0: CVE-2023-53317: kernel: ext4: fix WARNING in mb_find_extent</issue>
  <issue id="1250083" tracker="bnc">VUL-0: CVE-2022-50364: kernel: i2c: mux: reg: check return value after calling platform_get_resource()</issue>
  <issue id="1250089" tracker="bnc">VUL-0: CVE-2023-53287: kernel: usb: cdns3: Put the cdns set active part outside the spin lock</issue>
  <issue id="1250103" tracker="bnc">VUL-0: CVE-2022-50398: kernel: drm/msm/dp: add atomic_check to bridge ops</issue>
  <issue id="1250104" tracker="bnc">VUL-0: CVE-2022-50396: kernel: net: sched: fix memory leak in tcindex_set_parms</issue>
  <issue id="1250105" tracker="bnc">VUL-0: CVE-2022-50392: kernel: ASoC: mediatek: mt8183: fix refcount leak in mt8183_mt6358_ts3a227_max98357_dev_probe()</issue>
  <issue id="1250106" tracker="bnc">VUL-0: CVE-2023-53386: kernel: Bluetooth: Fix potential use-after-free when clear keys</issue>
  <issue id="1250107" tracker="bnc">VUL-0: CVE-2022-50394: kernel: i2c: ismt: Fix an out-of-bounds bug in ismt_access()</issue>
  <issue id="1250108" tracker="bnc">VUL-0: CVE-2022-50399: kernel: media: atomisp: prevent integer overflow in sh_css_set_black_frame()</issue>
  <issue id="1250112" tracker="bnc">VUL-0: CVE-2023-53371: kernel: net/mlx5e: fix memory leak in mlx5e_fs_tt_redirect_any_create</issue>
  <issue id="1250114" tracker="bnc">VUL-0: CVE-2023-53393: kernel: RDMA/mlx5: Fix mlx5_ib_get_hw_stats when used for device</issue>
  <issue id="1250117" tracker="bnc">VUL-0: CVE-2023-53391: kernel: shmem: use ramfs_kill_sb() for kill_sb method of ramfs-based tmpfs</issue>
  <issue id="1250118" tracker="bnc">VUL-0: CVE-2023-53381: kernel: NFSD: fix leaked reference count of nfsd4_ssc_umount_item</issue>
  <issue id="1250121" tracker="bnc">VUL-0: CVE-2022-50389: kernel: tpm: tpm_crb: Add the missed acpi_put_table() to fix memory leak</issue>
  <issue id="1250127" tracker="bnc">VUL-0: CVE-2023-53384: kernel: wifi: mwifiex: avoid possible NULL skb pointer dereference</issue>
  <issue id="1250128" tracker="bnc">VUL-0: CVE-2023-53379: kernel: usb: phy: phy-tahvo: fix memory leak in tahvo_usb_probe()</issue>
  <issue id="1250130" tracker="bnc">VUL-0: CVE-2022-50390: kernel: drm/ttm: fix undefined behavior in bit shift for TTM_TT_FLAG_PRIV_POPULATED</issue>
  <issue id="1250131" tracker="bnc">VUL-0: CVE-2022-50385: kernel: NFS: Fix an Oops in nfs_d_automount()</issue>
  <issue id="1250132" tracker="bnc">VUL-0: CVE-2022-50375: kernel: tty: serial: fsl_lpuart: disable dma rx/tx use flags in lpuart_dma_shutdown</issue>
  <issue id="1250134" tracker="bnc">VUL-0: CVE-2023-53378: kernel: drm/i915/dpt: Treat the DPT BO as a framebuffer</issue>
  <issue id="1250137" tracker="bnc">VUL-0: CVE-2023-53373: kernel: crypto: seqiv - Handle EBUSY correctly</issue>
  <issue id="1250138" tracker="bnc">VUL-0: CVE-2022-50391: kernel: mm/mempolicy: fix memory leak in set_mempolicy_home_node system call</issue>
  <issue id="1250140" tracker="bnc">VUL-0: CVE-2022-50401: kernel: nfsd: under NFSv4.1, fix double svc_xprt_put on rpc_create failure</issue>
  <issue id="1250144" tracker="bnc">VUL-0: CVE-2023-53398: kernel: mlx5: fix possible ptp queue fifo use-after-free</issue>
  <issue id="1250145" tracker="bnc">VUL-0: CVE-2023-53446: kernel: PCI/ASPM: Disable ASPM on MFD function removal to avoid use-after-free</issue>
  <issue id="1250151" tracker="bnc">VUL-0: CVE-2023-53440: kernel: nilfs2: fix sysfs interface lifetime</issue>
  <issue id="1250153" tracker="bnc">VUL-0: CVE-2022-50404: kernel: fbdev: fbcon: release buffer when fbcon_do_set_font() failed</issue>
  <issue id="1250156" tracker="bnc">VUL-0: CVE-2023-53436: kernel: scsi: snic: Fix possible memory leak if device_add() fails</issue>
  <issue id="1250157" tracker="bnc">VUL-0: CVE-2023-53444: kernel: drm/ttm: fix bulk_move corruption when adding a entry</issue>
  <issue id="1250159" tracker="bnc">VUL-0: CVE-2023-53435: kernel: cassini: Fix a memory leak in the error handling path of cas_init_one()</issue>
  <issue id="1250161" tracker="bnc">VUL-0: CVE-2023-53377: kernel: cifs: prevent use-after-free by freeing the cfile later</issue>
  <issue id="1250165" tracker="bnc">VUL-0: CVE-2022-50406: kernel: iomap: iomap: fix memory corruption when recording errors during writeback</issue>
  <issue id="1250168" tracker="bnc">VUL-0: CVE-2023-53427: kernel: cifs: Fix warning and UAF when destroy the MR list</issue>
  <issue id="1250178" tracker="bnc">VUL-0: CVE-2023-53437: kernel: media: uvcvideo: Handle cameras with invalid descriptors</issue>
  <issue id="1250180" tracker="bnc">VUL-0: CVE-2023-53438: kernel: x86/MCE: Always save CS register on AMD Zen IF Poison errors</issue>
  <issue id="1250181" tracker="bnc">VUL-0: CVE-2022-50328: kernel: jbd2: fix potential use-after-free in jbd2_fc_wait_bufs</issue>
  <issue id="1250182" tracker="bnc">VUL-0: CVE-2023-53422: kernel: wifi: iwlwifi: fw: fix memory leak in debugfs</issue>
  <issue id="1250183" tracker="bnc">VUL-0: CVE-2022-50414: kernel: scsi: fcoe: Fix transport not deattached when fcoe_if_init() fails</issue>
  <issue id="1250184" tracker="bnc">VUL-0: CVE-2022-50417: kernel: drm/panfrost: Fix GEM handle creation ref-counting</issue>
  <issue id="1250187" tracker="bnc">VUL-0: CVE-2022-50410: kernel: NFSD: Protect against send buffer overflow in NFSv2 READ</issue>
  <issue id="1250189" tracker="bnc">VUL-0: CVE-2022-50412: kernel: drm: bridge: adv7511: unregister cec i2c device after cec adapter</issue>
  <issue id="1250191" tracker="bnc">VUL-0: CVE-2023-53388: kernel: drm/mediatek: Clean dangling pointer on bind error path</issue>
  <issue id="1250197" tracker="bnc">VUL-0: CVE-2023-53375: kernel: tracing: Free error logs of tracing instances</issue>
  <issue id="1250198" tracker="bnc">VUL-0: CVE-2023-53380: kernel: md/raid10: fix null-ptr-deref of mreplace in raid10_sync_request</issue>
  <issue id="1250200" tracker="bnc">VUL-0: CVE-2023-53396: kernel: ubifs: Fix memory leak in do_rename</issue>
  <issue id="1250201" tracker="bnc">VUL-0: CVE-2023-53442: kernel: ice: Block switchdev mode when ADQ is active and vice versa</issue>
  <issue id="1250208" tracker="bnc">VUL-0: CVE-2023-53370: kernel: drm/amdgpu: fix memory leak in mes self test</issue>
  <issue id="1250209" tracker="bnc">VUL-0: CVE-2022-50376: kernel: orangefs: Fix kmemleak in orangefs_{kernel,client}_debug_init()</issue>
  <issue id="1250211" tracker="bnc">VUL-0: CVE-2022-50395: kernel: integrity: Fix memory leakage in keyring allocation error path</issue>
  <issue id="1250215" tracker="bnc">VUL-0: CVE-2022-50354: kernel: drm/amdkfd: Fix kfd_process_device_init_vm error handling</issue>
  <issue id="1250245" tracker="bnc">VUL-0: CVE-2022-50379: kernel: btrfs: fix race between quota enable and quota rescan ioctl</issue>
  <issue id="1250247" tracker="bnc">VUL-0: CVE-2025-39860: kernel: Bluetooth: Fix use-after-free in l2cap_sock_cleanup_listen()</issue>
  <issue id="1250250" tracker="bnc">VUL-0: CVE-2022-50297: kernel: wifi: ath9k: verify the expected usb_endpoints are present</issue>
  <issue id="1250257" tracker="bnc">VUL-0: CVE-2022-50381: kernel: md: fix a crash in mempool_free</issue>
  <issue id="1250264" tracker="bnc">VUL-0: CVE-2022-50358: kernel: brcmfmac: return error when getting invalid max_flowrings from dongle</issue>
  <issue id="1250269" tracker="bnc">VUL-0: CVE-2022-50359: kernel: media: cx88: Fix a null-ptr-deref bug in buffer_prepare()</issue>
  <issue id="1250277" tracker="bnc">VUL-0: CVE-2022-50367: kernel: fs: fix UAF/GPF bug in nilfs_mdt_destroy</issue>
  <issue id="1250278" tracker="bnc">VUL-0: CVE-2022-50393: kernel: drm/amdgpu: SDMA update use unlocked iterator</issue>
  <issue id="1250285" tracker="bnc">VUL-0: CVE-2022-50418: kernel: wifi: ath11k: mhi: fix potential memory leak in ath11k_mhi_register()</issue>
  <issue id="1250287" tracker="bnc">VUL-0: CVE-2022-50373: kernel: fs: dlm: fix race in lowcomms</issue>
  <issue id="1250293" tracker="bnc">VUL-0: CVE-2022-50388: kernel: nvme: fix multipath crash caused by flush request when blktrace is enabled</issue>
  <issue id="1250301" tracker="bnc">VUL-0: CVE-2022-50386: kernel: Bluetooth: L2CAP: Fix user-after-free</issue>
  <issue id="1250303" tracker="bnc">VUL-0: CVE-2023-53315: kernel: wifi: ath11k: Fix SKB corruption in REO destination ring</issue>
  <issue id="1250306" tracker="bnc">VUL-0: CVE-2022-50378: kernel: drm/meson: reorder driver deinit sequence to fix use-after-free bug</issue>
  <issue id="1250309" tracker="bnc">VUL-0: CVE-2023-53276: kernel: ubifs: Free memory for tmpfile name</issue>
  <issue id="1250311" tracker="bnc">VUL-0: CVE-2023-53282: kernel: scsi: lpfc: Fix use-after-free KFENCE violation during sysfs firmware write</issue>
  <issue id="1250313" tracker="bnc">VUL-0: CVE-2023-53321: kernel: wifi: mac80211_hwsim: drop short frames</issue>
  <issue id="1250315" tracker="bnc">VUL-0: CVE-2023-53337: kernel: nilfs2: do not write dirty data after degenerating to read-only</issue>
  <issue id="1250316" tracker="bnc">VUL-0: CVE-2023-53359: kernel: USB: fix memory leak with using debugfs_lookup()</issue>
  <issue id="1250322" tracker="bnc">VUL-0: CVE-2023-53297: kernel: Bluetooth: L2CAP: fix "bad unlock balance" in l2cap_disconnect_rsp</issue>
  <issue id="1250323" tracker="bnc">VUL-0: CVE-2023-53322: kernel: scsi: qla2xxx: Wait for io return on terminate rport</issue>
  <issue id="1250324" tracker="bnc">VUL-0: CVE-2023-53295: kernel: udf: Do not update file length for failed writes to inline files</issue>
  <issue id="1250325" tracker="bnc">VUL-0: CVE-2023-53286: kernel: RDMA/mlx5: Return the firmware result upon destroying QP/RQ</issue>
  <issue id="1250327" tracker="bnc">VUL-0: CVE-2023-53383: kernel: irqchip/gicv3: Workaround for NVIDIA erratum T241-FABRIC-4</issue>
  <issue id="1250328" tracker="bnc">VUL-0: CVE-2023-53400: kernel: ALSA: hda: Fix Oops by 9.1 surround channel names</issue>
  <issue id="1250331" tracker="bnc">VUL-0: CVE-2023-53404: kernel: USB: fotg210: fix memory leak with using debugfs_lookup()</issue>
  <issue id="1250358" tracker="bnc">VUL-0: CVE-2023-53395: kernel: ACPICA: Add AML_NO_OPERAND_RESOLVE flag to Timer</issue>
  <issue id="1250362" tracker="bnc">VUL-0: CVE-2023-53406: kernel: USB: gadget: pxa25x_udc: fix memory leak with using debugfs_lookup()</issue>
  <issue id="1250363" tracker="bnc">VUL-0: CVE-2022-50402: kernel: drivers/md/md-bitmap: check the return value of md_bitmap_get_counter()</issue>
  <issue id="1250370" tracker="bnc">VUL-0: CVE-2023-53413: kernel: USB: isp116x: fix memory leak with using debugfs_lookup()</issue>
  <issue id="1250374" tracker="bnc">VUL-0: CVE-2023-53431: kernel: scsi: ses: Don't attach if enclosure has no components</issue>
  <issue id="1250391" tracker="bnc">VUL-0: CVE-2022-50408: kernel: wifi: brcmfmac: fix use-after-free bug in brcmf_netdev_start_xmit()</issue>
  <issue id="1250392" tracker="bnc">VUL-0: CVE-2022-50409: kernel: net: If sock is dead don't access sock's sk_wq in sk_stream_wait_memory</issue>
  <issue id="1250393" tracker="bnc">VUL-0: CVE-2022-50411: kernel: ACPICA: Fix error code path in acpi_ds_call_control_method()</issue>
  <issue id="1250394" tracker="bnc">VUL-0: CVE-2022-50419: kernel: Bluetooth: hci_sysfs: Fix attempting to call device_add multiple times</issue>
  <issue id="1250395" tracker="bnc">VUL-0: CVE-2023-53165: kernel: udf: Fix uninitialized array access for some pathnames</issue>
  <issue id="1250397" tracker="bnc">VUL-0: CVE-2023-53215: kernel: sched/fair: Don't balance task to its current running CPU</issue>
  <issue id="1250406" tracker="bnc">VUL-0: CVE-2025-39869: kernel: dmaengine: ti: edma: Fix memory allocation size for queue_priority_map</issue>
  <issue id="1250412" tracker="bnc">VUL-0: CVE-2023-53415: kernel: USB: dwc3: fix memory leak with using debugfs_lookup()</issue>
  <issue id="1250418" tracker="bnc">VUL-0: CVE-2023-53409: kernel: drivers: base: component: fix memory leak with using debugfs_lookup()</issue>
  <issue id="1250425" tracker="bnc">VUL-0: CVE-2023-53414: kernel: scsi: snic: Fix memory leak with using debugfs_lookup()</issue>
  <issue id="1250428" tracker="bnc">VUL-0: CVE-2023-53416: kernel: USB: isp1362: fix memory leak with using debugfs_lookup()</issue>
  <issue id="1250453" tracker="bnc">VUL-0: CVE-2023-53390: kernel: drivers: base: dd: fix memory leak with using debugfs_lookup()</issue>
  <issue id="1250454" tracker="bnc">VUL-0: CVE-2023-53405: kernel: USB: gadget: gr_udc: fix memory leak with using debugfs_lookup()</issue>
  <issue id="1250457" tracker="bnc">VUL-0: CVE-2023-53443: kernel: mfd: arizona: Use pm_runtime_resume_and_get() to prevent refcnt leak</issue>
  <issue id="1250459" tracker="bnc">VUL-0: CVE-2023-53275: kernel: kernel: ALSA: hda: fix a possible null-pointer dereference due to data race in snd_hdac_regmap_sync()</issue>
  <issue id="1250522" tracker="bnc">mkspec script shipped as part of rpm package</issue>
  <issue id="1250759" tracker="bnc">VUL-0: CVE-2023-53454: kernel: HID: multitouch: Correct devm device reference for hidinput input_dev name</issue>
  <issue id="1250761" tracker="bnc">VUL-0: CVE-2023-53453: kernel: drm/radeon: free iio for atombios when driver shutdown</issue>
  <issue id="1250762" tracker="bnc">VUL-0: CVE-2023-53452: kernel: wifi: rtw89: fix potential race condition between napi_init and napi_enable</issue>
  <issue id="1250763" tracker="bnc">VUL-0: CVE-2023-53457: kernel: FS: JFS: Fix null-ptr-deref Read in txBegin</issue>
  <issue id="1250765" tracker="bnc">VUL-0: CVE-2023-53456: kernel: scsi: qla4xxx: Add length check when parsing nlattrs</issue>
  <issue id="1250767" tracker="bnc">VUL-0: CVE-2022-50444: kernel: clk: tegra20: Fix refcount leak in tegra20_clock_init</issue>
  <issue id="1250768" tracker="bnc">VUL-0: CVE-2022-50443: kernel: drm/rockchip: lvds: fix PM usage counter unbalance in poweron</issue>
  <issue id="1250771" tracker="bnc">VUL-0: CVE-2022-50447: kernel: Bluetooth: hci_conn: Fix crash on hci_create_cis_sync</issue>
  <issue id="1250774" tracker="bnc">VUL-0: CVE-2022-50422: kernel: scsi: libsas: Fix use-after-free bug in smp_execute_task_sg()</issue>
  <issue id="1250781" tracker="bnc">VUL-0: CVE-2022-50425: kernel: x86/fpu: Fix copy_xstate_to_uabi() to copy init states correctly</issue>
  <issue id="1250784" tracker="bnc">VUL-0: CVE-2022-50423: kernel: ACPICA: Fix use-after-free in acpi_ut_copy_ipackage_to_ipackage()</issue>
  <issue id="1250786" tracker="bnc">VUL-0: CVE-2022-50428: kernel: ext4: fix off-by-one errors in fast-commit block filling</issue>
  <issue id="1250787" tracker="bnc">VUL-0: CVE-2022-50427: kernel: ALSA: ac97: fix possible memory leak in snd_ac97_dev_register()</issue>
  <issue id="1250790" tracker="bnc">VUL-0: CVE-2022-50431: kernel: ALSA: aoa: i2sbus: fix possible memory leak in i2sbus_add_dev()</issue>
  <issue id="1250791" tracker="bnc">VUL-0: CVE-2022-50430: kernel: mmc: vub300: fix warning - do not call blocking ops when !TASK_RUNNING</issue>
  <issue id="1250792" tracker="bnc">VUL-0: CVE-2022-50434: kernel: blk-mq: fix possible memleak when register 'hctx' failed</issue>
  <issue id="1250793" tracker="bnc">VUL-0: CVE-2022-50452: kernel: net: sched: cake: fix null pointer access issue when cake_init() fails</issue>
  <issue id="1250797" tracker="bnc">VUL-0: CVE-2022-50437: kernel: drm/msm/hdmi: fix memory corruption with too many bridges</issue>
  <issue id="1250799" tracker="bnc">VUL-0: CVE-2022-50435: kernel: ext4: avoid crash when inline data creation follows DIO write</issue>
  <issue id="1250807" tracker="bnc">VUL-0: CVE-2023-53505: kernel: clk: tegra: tegra124-emc: Fix potential memory leak</issue>
  <issue id="1250810" tracker="bnc">VUL-0: CVE-2023-53509: kernel: qed: allow sleep in qed_mcp_trace_dump()</issue>
  <issue id="1250811" tracker="bnc">VUL-0: CVE-2022-50429: kernel: memory: of: Fix refcount leak bug in of_lpddr3_get_ddr_timings()</issue>
  <issue id="1250814" tracker="bnc">VUL-0: CVE-2022-50433: kernel: efi: ssdt: Don't free memory if ACPI table was loaded successfully</issue>
  <issue id="1250818" tracker="bnc">VUL-0: CVE-2023-53499: kernel: virtio_net: Fix error unwinding of XDP initialization</issue>
  <issue id="1250819" tracker="bnc">VUL-0: CVE-2023-53498: kernel: drm/amd/display: Fix potential null dereference</issue>
  <issue id="1250822" tracker="bnc">VUL-0: CVE-2023-53494: kernel: crypto: xts - Handle EBUSY correctly</issue>
  <issue id="1250823" tracker="bnc">VUL-0: CVE-2023-53492: kernel: netfilter: nf_tables: do not ignore genmask when looking up chain by id</issue>
  <issue id="1250824" tracker="bnc">VUL-0: CVE-2022-50469: kernel: staging: rtl8723bs: fix potential memory leak in rtw_init_drv_sw()</issue>
  <issue id="1250825" tracker="bnc">VUL-0: CVE-2023-53488: kernel: IB/hfi1: Fix possible panic during hotplug remove</issue>
  <issue id="1250829" tracker="bnc">VUL-0: CVE-2023-53489: kernel: tcp/udp: Fix memleaks of sk and zerocopy skbs with TX timestamp.</issue>
  <issue id="1250830" tracker="bnc">VUL-0: CVE-2023-53487: kernel: powerpc/rtas_flash: allow user copy to flash block cache objects</issue>
  <issue id="1250831" tracker="bnc">VUL-0: CVE-2023-53451: kernel: scsi: qla2xxx: Fix potential NULL pointer dereference</issue>
  <issue id="1250832" tracker="bnc">VUL-0: CVE-2023-53482: kernel: iommu: Fix error unwind in iommu_group_alloc()</issue>
  <issue id="1250839" tracker="bnc">VUL-0: CVE-2023-53476: kernel: iw_cxgb4: Fix potential NULL dereference in c4iw_fill_res_cm_id_entry()</issue>
  <issue id="1250841" tracker="bnc">VUL-0: CVE-2023-53472: kernel: pwm: lpc32xx: Remove handling of PWM channels</issue>
  <issue id="1250842" tracker="bnc">VUL-0: CVE-2023-53474: kernel: x86/MCE/AMD: Use an u64 for bank_map</issue>
  <issue id="1250843" tracker="bnc">VUL-0: CVE-2023-53475: kernel: usb: xhci: tegra: fix sleep in atomic call</issue>
  <issue id="1250846" tracker="bnc">VUL-0: CVE-2022-50436: kernel: ext4: don't set up encryption key during jbd2 transaction</issue>
  <issue id="1250847" tracker="bnc">VUL-0: CVE-2022-50467: kernel: scsi: lpfc: Fix null ndlp ptr dereference in abnormal exit path for GFT_ID</issue>
  <issue id="1250848" tracker="bnc">VUL-0: CVE-2023-53473: kernel: ext4: improve error handling from ext4_dirhash()</issue>
  <issue id="1250849" tracker="bnc">VUL-0: CVE-2022-50441: kernel: net/mlx5: Lag, fix failure to cancel delayed bond work</issue>
  <issue id="1250850" tracker="bnc">VUL-0: CVE-2022-50459: kernel: scsi: iscsi: iscsi_tcp: Fix null-ptr-deref while calling getpeername()</issue>
  <issue id="1250851" tracker="bnc">VUL-0: CVE-2022-50432: kernel: kernfs: fix use-after-free in __kernfs_remove</issue>
  <issue id="1250853" tracker="bnc">VUL-0: CVE-2022-50440: kernel: drm/vmwgfx: Validate the box size for the snooped cursor</issue>
  <issue id="1250856" tracker="bnc">VUL-0: CVE-2022-50456: kernel: btrfs: fix resolving backrefs for inline extent followed by prealloc</issue>
  <issue id="1250861" tracker="bnc">VUL-0: CVE-2023-53480: kernel: kobject: Add sanity check for kset-&gt;kobj.ktype in kset_register()</issue>
  <issue id="1250862" tracker="bnc">VUL-0: CVE-2023-53466: kernel: wifi: mt76: mt7915: fix memory leak in mt7915_mcu_exit</issue>
  <issue id="1250863" tracker="bnc">VUL-0: CVE-2023-53465: kernel: soundwire: qcom: fix storing port config out-of-bounds</issue>
  <issue id="1250864" tracker="bnc">VUL-0: CVE-2023-53458: kernel: media: cx23885: Fix a null-ptr-deref bug in buffer_prepare() and buffer_finish()</issue>
  <issue id="1250866" tracker="bnc">VUL-0: CVE-2023-53471: kernel: drm/amdgpu/gfx: disable gfx9 cp_ecc_error_irq only when enabling legacy gfx ras</issue>
  <issue id="1250867" tracker="bnc">VUL-0: CVE-2023-53463: kernel: ibmvnic: Do not reset dql stats on NON_FATAL err</issue>
  <issue id="1250868" tracker="bnc">VUL-0: CVE-2023-53464: kernel: scsi: iscsi_tcp: Check that sock is valid before iscsi_set_param()</issue>
  <issue id="1250872" tracker="bnc">VUL-0: CVE-2023-53485: kernel: fs: jfs: Fix UBSAN: array-index-out-of-bounds in dbAllocDmapLev</issue>
  <issue id="1250873" tracker="bnc">VUL-0: CVE-2023-53448: kernel: fbdev: imxfb: Removed unneeded release_mem_region</issue>
  <issue id="1250874" tracker="bnc">VUL-0: CVE-2023-53449: kernel: s390/dasd: Fix potential memleak in dasd_eckd_init()</issue>
  <issue id="1250875" tracker="bnc">VUL-0: CVE-2022-50466: kernel: fs/binfmt_elf: Fix memory leak in load_elf_binary()</issue>
  <issue id="1250877" tracker="bnc">VUL-0: CVE-2022-50468: kernel: platform/chrome: cros_usbpd_notify: Fix error handling in cros_usbpd_notify_init()</issue>
  <issue id="1250879" tracker="bnc">VUL-0: CVE-2022-50460: kernel: cifs: Fix xid leak in cifs_flock()</issue>
  <issue id="1250881" tracker="bnc">VUL-0: CVE-2022-50464: kernel: mt76: mt7915: Fix PCI device refcount leak in mt7915_pci_init_hif2()</issue>
  <issue id="1250883" tracker="bnc">VUL-0: CVE-2022-50465: kernel: ext4: fix leaking uninitialized memory in fast-commit journal</issue>
  <issue id="1250887" tracker="bnc">VUL-0: CVE-2022-50453: kernel: gpiolib: cdev: fix NULL-pointer dereferences</issue>
  <issue id="1250888" tracker="bnc">VUL-0: CVE-2023-53468: kernel: ubifs: Fix memory leak in alloc_wbufs()</issue>
  <issue id="1250889" tracker="bnc">VUL-0: CVE-2022-50449: kernel: clk: samsung: Fix memory leak in _samsung_clk_register_pll()</issue>
  <issue id="1250890" tracker="bnc">VUL-0: CVE-2022-50454: kernel: drm/nouveau: fix a use-after-free in nouveau_gem_prime_import_sg_table()</issue>
  <issue id="1250891" tracker="bnc">VUL-0: CVE-2022-50458: kernel: clk: tegra: Fix refcount leak in tegra210_clock_init</issue>
  <issue id="1250905" tracker="bnc">VUL-0: CVE-2023-53496: kernel: x86/platform/uv: Use alternate source for socket to node data</issue>
  <issue id="1250913" tracker="bnc">VUL-0: CVE-2023-53511: kernel: io_uring: fix fget leak when fs don't support nowait buffered read</issue>
  <issue id="1250915" tracker="bnc">VUL-0: CVE-2023-53512: kernel: scsi: mpt3sas: Fix a memory leak</issue>
  <issue id="1250917" tracker="bnc">VUL-0: CVE-2023-53515: kernel: virtio-mmio: don't break lifecycle of vm_dev</issue>
  <issue id="1250923" tracker="bnc">VUL-0: CVE-2023-53518: kernel: PM / devfreq: Fix leak in devfreq_dev_release()</issue>
  <issue id="1250927" tracker="bnc">VUL-0: CVE-2023-53525: kernel: RDMA/cma: Allow UD qp_type to join multicast only</issue>
  <issue id="1250928" tracker="bnc">VUL-0: CVE-2023-53526: kernel: jbd2: check 'jh-&gt;b_transaction' before removing it from checkpoint</issue>
  <issue id="1250931" tracker="bnc">VUL-0: CVE-2023-53531: kernel: null_blk: fix poll request timeout handling</issue>
  <issue id="1250932" tracker="bnc">VUL-0: CVE-2023-53532: kernel: wifi: ath11k: fix deinitialization of firmware resources</issue>
  <issue id="1250948" tracker="bnc">VUL-0: CVE-2022-50439: kernel: ASoC: mediatek: mt8173: Enable IRQ when pdata is ready</issue>
  <issue id="1250949" tracker="bnc">VUL-0: CVE-2023-53530: kernel: scsi: qla2xxx: Use raw_smp_processor_id() instead of smp_processor_id()</issue>
  <issue id="1250953" tracker="bnc">VUL-0: CVE-2023-53524: kernel: wifi: iwlwifi: pcie: Fix integer overflow in iwl_write_to_user_buf</issue>
  <issue id="1250963" tracker="bnc">VUL-0: CVE-2023-53506: kernel: udf: Do not bother merging very long extents</issue>
  <issue id="1250964" tracker="bnc">VUL-0: CVE-2023-53519: kernel: media: v4l2-mem2mem: add lock to protect parameter num_rdy</issue>
  <issue id="1250965" tracker="bnc">VUL-0: CVE-2023-53521: kernel: scsi: ses: Fix slab-out-of-bounds in ses_intf_remove()</issue>
  <issue id="2022-2602" tracker="cve" />
  <issue id="2022-2978" tracker="cve" />
  <issue id="2022-36280" tracker="cve" />
  <issue id="2022-43945" tracker="cve" />
  <issue id="2022-49138" tracker="cve" />
  <issue id="2022-50233" tracker="cve" />
  <issue id="2022-50234" tracker="cve" />
  <issue id="2022-50235" tracker="cve" />
  <issue id="2022-50239" tracker="cve" />
  <issue id="2022-50241" tracker="cve" />
  <issue id="2022-50242" tracker="cve" />
  <issue id="2022-50246" tracker="cve" />
  <issue id="2022-50247" tracker="cve" />
  <issue id="2022-50248" tracker="cve" />
  <issue id="2022-50249" tracker="cve" />
  <issue id="2022-50250" tracker="cve" />
  <issue id="2022-50251" tracker="cve" />
  <issue id="2022-50252" tracker="cve" />
  <issue id="2022-50255" tracker="cve" />
  <issue id="2022-50257" tracker="cve" />
  <issue id="2022-50258" tracker="cve" />
  <issue id="2022-50260" tracker="cve" />
  <issue id="2022-50261" tracker="cve" />
  <issue id="2022-50264" tracker="cve" />
  <issue id="2022-50266" tracker="cve" />
  <issue id="2022-50267" tracker="cve" />
  <issue id="2022-50268" tracker="cve" />
  <issue id="2022-50269" tracker="cve" />
  <issue id="2022-50271" tracker="cve" />
  <issue id="2022-50272" tracker="cve" />
  <issue id="2022-50275" tracker="cve" />
  <issue id="2022-50276" tracker="cve" />
  <issue id="2022-50277" tracker="cve" />
  <issue id="2022-50278" tracker="cve" />
  <issue id="2022-50279" tracker="cve" />
  <issue id="2022-50282" tracker="cve" />
  <issue id="2022-50286" tracker="cve" />
  <issue id="2022-50287" tracker="cve" />
  <issue id="2022-50288" tracker="cve" />
  <issue id="2022-50289" tracker="cve" />
  <issue id="2022-50292" tracker="cve" />
  <issue id="2022-50294" tracker="cve" />
  <issue id="2022-50297" tracker="cve" />
  <issue id="2022-50298" tracker="cve" />
  <issue id="2022-50299" tracker="cve" />
  <issue id="2022-50301" tracker="cve" />
  <issue id="2022-50303" tracker="cve" />
  <issue id="2022-50308" tracker="cve" />
  <issue id="2022-50309" tracker="cve" />
  <issue id="2022-50312" tracker="cve" />
  <issue id="2022-50317" tracker="cve" />
  <issue id="2022-50318" tracker="cve" />
  <issue id="2022-50320" tracker="cve" />
  <issue id="2022-50321" tracker="cve" />
  <issue id="2022-50323" tracker="cve" />
  <issue id="2022-50324" tracker="cve" />
  <issue id="2022-50325" tracker="cve" />
  <issue id="2022-50328" tracker="cve" />
  <issue id="2022-50329" tracker="cve" />
  <issue id="2022-50330" tracker="cve" />
  <issue id="2022-50331" tracker="cve" />
  <issue id="2022-50333" tracker="cve" />
  <issue id="2022-50339" tracker="cve" />
  <issue id="2022-50340" tracker="cve" />
  <issue id="2022-50342" tracker="cve" />
  <issue id="2022-50344" tracker="cve" />
  <issue id="2022-50346" tracker="cve" />
  <issue id="2022-50347" tracker="cve" />
  <issue id="2022-50348" tracker="cve" />
  <issue id="2022-50349" tracker="cve" />
  <issue id="2022-50351" tracker="cve" />
  <issue id="2022-50353" tracker="cve" />
  <issue id="2022-50354" tracker="cve" />
  <issue id="2022-50355" tracker="cve" />
  <issue id="2022-50356" tracker="cve" />
  <issue id="2022-50357" tracker="cve" />
  <issue id="2022-50358" tracker="cve" />
  <issue id="2022-50359" tracker="cve" />
  <issue id="2022-50360" tracker="cve" />
  <issue id="2022-50362" tracker="cve" />
  <issue id="2022-50364" tracker="cve" />
  <issue id="2022-50367" tracker="cve" />
  <issue id="2022-50368" tracker="cve" />
  <issue id="2022-50369" tracker="cve" />
  <issue id="2022-50370" tracker="cve" />
  <issue id="2022-50372" tracker="cve" />
  <issue id="2022-50373" tracker="cve" />
  <issue id="2022-50374" tracker="cve" />
  <issue id="2022-50375" tracker="cve" />
  <issue id="2022-50376" tracker="cve" />
  <issue id="2022-50378" tracker="cve" />
  <issue id="2022-50379" tracker="cve" />
  <issue id="2022-50381" tracker="cve" />
  <issue id="2022-50385" tracker="cve" />
  <issue id="2022-50386" tracker="cve" />
  <issue id="2022-50388" tracker="cve" />
  <issue id="2022-50389" tracker="cve" />
  <issue id="2022-50390" tracker="cve" />
  <issue id="2022-50391" tracker="cve" />
  <issue id="2022-50392" tracker="cve" />
  <issue id="2022-50393" tracker="cve" />
  <issue id="2022-50394" tracker="cve" />
  <issue id="2022-50395" tracker="cve" />
  <issue id="2022-50396" tracker="cve" />
  <issue id="2022-50398" tracker="cve" />
  <issue id="2022-50399" tracker="cve" />
  <issue id="2022-50401" tracker="cve" />
  <issue id="2022-50402" tracker="cve" />
  <issue id="2022-50404" tracker="cve" />
  <issue id="2022-50406" tracker="cve" />
  <issue id="2022-50408" tracker="cve" />
  <issue id="2022-50409" tracker="cve" />
  <issue id="2022-50410" tracker="cve" />
  <issue id="2022-50411" tracker="cve" />
  <issue id="2022-50412" tracker="cve" />
  <issue id="2022-50414" tracker="cve" />
  <issue id="2022-50417" tracker="cve" />
  <issue id="2022-50418" tracker="cve" />
  <issue id="2022-50419" tracker="cve" />
  <issue id="2022-50422" tracker="cve" />
  <issue id="2022-50423" tracker="cve" />
  <issue id="2022-50425" tracker="cve" />
  <issue id="2022-50427" tracker="cve" />
  <issue id="2022-50428" tracker="cve" />
  <issue id="2022-50429" tracker="cve" />
  <issue id="2022-50430" tracker="cve" />
  <issue id="2022-50431" tracker="cve" />
  <issue id="2022-50432" tracker="cve" />
  <issue id="2022-50433" tracker="cve" />
  <issue id="2022-50434" tracker="cve" />
  <issue id="2022-50435" tracker="cve" />
  <issue id="2022-50436" tracker="cve" />
  <issue id="2022-50437" tracker="cve" />
  <issue id="2022-50439" tracker="cve" />
  <issue id="2022-50440" tracker="cve" />
  <issue id="2022-50441" tracker="cve" />
  <issue id="2022-50443" tracker="cve" />
  <issue id="2022-50444" tracker="cve" />
  <issue id="2022-50447" tracker="cve" />
  <issue id="2022-50449" tracker="cve" />
  <issue id="2022-50452" tracker="cve" />
  <issue id="2022-50453" tracker="cve" />
  <issue id="2022-50454" tracker="cve" />
  <issue id="2022-50456" tracker="cve" />
  <issue id="2022-50458" tracker="cve" />
  <issue id="2022-50459" tracker="cve" />
  <issue id="2022-50460" tracker="cve" />
  <issue id="2022-50464" tracker="cve" />
  <issue id="2022-50465" tracker="cve" />
  <issue id="2022-50466" tracker="cve" />
  <issue id="2022-50467" tracker="cve" />
  <issue id="2022-50468" tracker="cve" />
  <issue id="2022-50469" tracker="cve" />
  <issue id="2023-1380" tracker="cve" />
  <issue id="2023-28328" tracker="cve" />
  <issue id="2023-31248" tracker="cve" />
  <issue id="2023-3772" tracker="cve" />
  <issue id="2023-39197" tracker="cve" />
  <issue id="2023-42753" tracker="cve" />
  <issue id="2023-52923" tracker="cve" />
  <issue id="2023-53147" tracker="cve" />
  <issue id="2023-53149" tracker="cve" />
  <issue id="2023-53150" tracker="cve" />
  <issue id="2023-53151" tracker="cve" />
  <issue id="2023-53152" tracker="cve" />
  <issue id="2023-53153" tracker="cve" />
  <issue id="2023-53165" tracker="cve" />
  <issue id="2023-53167" tracker="cve" />
  <issue id="2023-53168" tracker="cve" />
  <issue id="2023-53171" tracker="cve" />
  <issue id="2023-53174" tracker="cve" />
  <issue id="2023-53176" tracker="cve" />
  <issue id="2023-53178" tracker="cve" />
  <issue id="2023-53179" tracker="cve" />
  <issue id="2023-53181" tracker="cve" />
  <issue id="2023-53182" tracker="cve" />
  <issue id="2023-53185" tracker="cve" />
  <issue id="2023-53189" tracker="cve" />
  <issue id="2023-53193" tracker="cve" />
  <issue id="2023-53196" tracker="cve" />
  <issue id="2023-53197" tracker="cve" />
  <issue id="2023-53199" tracker="cve" />
  <issue id="2023-53201" tracker="cve" />
  <issue id="2023-53205" tracker="cve" />
  <issue id="2023-53210" tracker="cve" />
  <issue id="2023-53213" tracker="cve" />
  <issue id="2023-53215" tracker="cve" />
  <issue id="2023-53216" tracker="cve" />
  <issue id="2023-53219" tracker="cve" />
  <issue id="2023-53222" tracker="cve" />
  <issue id="2023-53223" tracker="cve" />
  <issue id="2023-53226" tracker="cve" />
  <issue id="2023-53229" tracker="cve" />
  <issue id="2023-53230" tracker="cve" />
  <issue id="2023-53232" tracker="cve" />
  <issue id="2023-53234" tracker="cve" />
  <issue id="2023-53237" tracker="cve" />
  <issue id="2023-53238" tracker="cve" />
  <issue id="2023-53239" tracker="cve" />
  <issue id="2023-53241" tracker="cve" />
  <issue id="2023-53242" tracker="cve" />
  <issue id="2023-53244" tracker="cve" />
  <issue id="2023-53245" tracker="cve" />
  <issue id="2023-53246" tracker="cve" />
  <issue id="2023-53249" tracker="cve" />
  <issue id="2023-53250" tracker="cve" />
  <issue id="2023-53251" tracker="cve" />
  <issue id="2023-53252" tracker="cve" />
  <issue id="2023-53255" tracker="cve" />
  <issue id="2023-53257" tracker="cve" />
  <issue id="2023-53258" tracker="cve" />
  <issue id="2023-53259" tracker="cve" />
  <issue id="2023-53263" tracker="cve" />
  <issue id="2023-53265" tracker="cve" />
  <issue id="2023-53268" tracker="cve" />
  <issue id="2023-53270" tracker="cve" />
  <issue id="2023-53272" tracker="cve" />
  <issue id="2023-53273" tracker="cve" />
  <issue id="2023-53275" tracker="cve" />
  <issue id="2023-53276" tracker="cve" />
  <issue id="2023-53277" tracker="cve" />
  <issue id="2023-53280" tracker="cve" />
  <issue id="2023-53281" tracker="cve" />
  <issue id="2023-53282" tracker="cve" />
  <issue id="2023-53284" tracker="cve" />
  <issue id="2023-53286" tracker="cve" />
  <issue id="2023-53287" tracker="cve" />
  <issue id="2023-53288" tracker="cve" />
  <issue id="2023-53295" tracker="cve" />
  <issue id="2023-53297" tracker="cve" />
  <issue id="2023-53298" tracker="cve" />
  <issue id="2023-53299" tracker="cve" />
  <issue id="2023-53302" tracker="cve" />
  <issue id="2023-53304" tracker="cve" />
  <issue id="2023-53305" tracker="cve" />
  <issue id="2023-53309" tracker="cve" />
  <issue id="2023-53311" tracker="cve" />
  <issue id="2023-53313" tracker="cve" />
  <issue id="2023-53314" tracker="cve" />
  <issue id="2023-53315" tracker="cve" />
  <issue id="2023-53316" tracker="cve" />
  <issue id="2023-53317" tracker="cve" />
  <issue id="2023-53320" tracker="cve" />
  <issue id="2023-53321" tracker="cve" />
  <issue id="2023-53322" tracker="cve" />
  <issue id="2023-53324" tracker="cve" />
  <issue id="2023-53326" tracker="cve" />
  <issue id="2023-53330" tracker="cve" />
  <issue id="2023-53331" tracker="cve" />
  <issue id="2023-53332" tracker="cve" />
  <issue id="2023-53333" tracker="cve" />
  <issue id="2023-53334" tracker="cve" />
  <issue id="2023-53335" tracker="cve" />
  <issue id="2023-53337" tracker="cve" />
  <issue id="2023-53340" tracker="cve" />
  <issue id="2023-53344" tracker="cve" />
  <issue id="2023-53347" tracker="cve" />
  <issue id="2023-53349" tracker="cve" />
  <issue id="2023-53352" tracker="cve" />
  <issue id="2023-53356" tracker="cve" />
  <issue id="2023-53357" tracker="cve" />
  <issue id="2023-53359" tracker="cve" />
  <issue id="2023-53368" tracker="cve" />
  <issue id="2023-53370" tracker="cve" />
  <issue id="2023-53371" tracker="cve" />
  <issue id="2023-53373" tracker="cve" />
  <issue id="2023-53375" tracker="cve" />
  <issue id="2023-53377" tracker="cve" />
  <issue id="2023-53378" tracker="cve" />
  <issue id="2023-53379" tracker="cve" />
  <issue id="2023-53380" tracker="cve" />
  <issue id="2023-53381" tracker="cve" />
  <issue id="2023-53383" tracker="cve" />
  <issue id="2023-53384" tracker="cve" />
  <issue id="2023-53386" tracker="cve" />
  <issue id="2023-53388" tracker="cve" />
  <issue id="2023-53390" tracker="cve" />
  <issue id="2023-53391" tracker="cve" />
  <issue id="2023-53393" tracker="cve" />
  <issue id="2023-53395" tracker="cve" />
  <issue id="2023-53396" tracker="cve" />
  <issue id="2023-53398" tracker="cve" />
  <issue id="2023-53400" tracker="cve" />
  <issue id="2023-53404" tracker="cve" />
  <issue id="2023-53405" tracker="cve" />
  <issue id="2023-53406" tracker="cve" />
  <issue id="2023-53409" tracker="cve" />
  <issue id="2023-53413" tracker="cve" />
  <issue id="2023-53414" tracker="cve" />
  <issue id="2023-53415" tracker="cve" />
  <issue id="2023-53416" tracker="cve" />
  <issue id="2023-53422" tracker="cve" />
  <issue id="2023-53427" tracker="cve" />
  <issue id="2023-53431" tracker="cve" />
  <issue id="2023-53435" tracker="cve" />
  <issue id="2023-53436" tracker="cve" />
  <issue id="2023-53437" tracker="cve" />
  <issue id="2023-53438" tracker="cve" />
  <issue id="2023-53440" tracker="cve" />
  <issue id="2023-53442" tracker="cve" />
  <issue id="2023-53443" tracker="cve" />
  <issue id="2023-53444" tracker="cve" />
  <issue id="2023-53446" tracker="cve" />
  <issue id="2023-53448" tracker="cve" />
  <issue id="2023-53449" tracker="cve" />
  <issue id="2023-53451" tracker="cve" />
  <issue id="2023-53452" tracker="cve" />
  <issue id="2023-53453" tracker="cve" />
  <issue id="2023-53454" tracker="cve" />
  <issue id="2023-53456" tracker="cve" />
  <issue id="2023-53457" tracker="cve" />
  <issue id="2023-53458" tracker="cve" />
  <issue id="2023-53463" tracker="cve" />
  <issue id="2023-53464" tracker="cve" />
  <issue id="2023-53465" tracker="cve" />
  <issue id="2023-53466" tracker="cve" />
  <issue id="2023-53468" tracker="cve" />
  <issue id="2023-53471" tracker="cve" />
  <issue id="2023-53472" tracker="cve" />
  <issue id="2023-53473" tracker="cve" />
  <issue id="2023-53474" tracker="cve" />
  <issue id="2023-53475" tracker="cve" />
  <issue id="2023-53476" tracker="cve" />
  <issue id="2023-53480" tracker="cve" />
  <issue id="2023-53482" tracker="cve" />
  <issue id="2023-53485" tracker="cve" />
  <issue id="2023-53487" tracker="cve" />
  <issue id="2023-53488" tracker="cve" />
  <issue id="2023-53489" tracker="cve" />
  <issue id="2023-53492" tracker="cve" />
  <issue id="2023-53494" tracker="cve" />
  <issue id="2023-53496" tracker="cve" />
  <issue id="2023-53498" tracker="cve" />
  <issue id="2023-53499" tracker="cve" />
  <issue id="2023-53505" tracker="cve" />
  <issue id="2023-53506" tracker="cve" />
  <issue id="2023-53509" tracker="cve" />
  <issue id="2023-53511" tracker="cve" />
  <issue id="2023-53512" tracker="cve" />
  <issue id="2023-53515" tracker="cve" />
  <issue id="2023-53518" tracker="cve" />
  <issue id="2023-53519" tracker="cve" />
  <issue id="2023-53521" tracker="cve" />
  <issue id="2023-53524" tracker="cve" />
  <issue id="2023-53525" tracker="cve" />
  <issue id="2023-53526" tracker="cve" />
  <issue id="2023-53530" tracker="cve" />
  <issue id="2023-53531" tracker="cve" />
  <issue id="2023-53532" tracker="cve" />
  <issue id="2024-26583" tracker="cve" />
  <issue id="2024-26584" tracker="cve" />
  <issue id="2024-58240" tracker="cve" />
  <issue id="2025-37738" tracker="cve" />
  <issue id="2025-37958" tracker="cve" />
  <issue id="2025-38014" tracker="cve" />
  <issue id="2025-38111" tracker="cve" />
  <issue id="2025-38380" tracker="cve" />
  <issue id="2025-38488" tracker="cve" />
  <issue id="2025-38553" tracker="cve" />
  <issue id="2025-38572" tracker="cve" />
  <issue id="2025-38659" tracker="cve" />
  <issue id="2025-38664" tracker="cve" />
  <issue id="2025-38678" tracker="cve" />
  <issue id="2025-38683" tracker="cve" />
  <issue id="2025-38685" tracker="cve" />
  <issue id="2025-38706" tracker="cve" />
  <issue id="2025-38713" tracker="cve" />
  <issue id="2025-38734" tracker="cve" />
  <issue id="2025-39691" tracker="cve" />
  <issue id="2025-39703" tracker="cve" />
  <issue id="2025-39726" tracker="cve" />
  <issue id="2025-39746" tracker="cve" />
  <issue id="2025-39751" tracker="cve" />
  <issue id="2025-39790" tracker="cve" />
  <issue id="2025-39823" tracker="cve" />
  <issue id="2025-39824" tracker="cve" />
  <issue id="2025-39860" tracker="cve" />
  <issue id="2025-39869" tracker="cve" />
  <category>security</category>
  <rating>important</rating>
  <packager>tabraham1</packager>
  <reboot_needed/>
  <description>
The SUSE Linux Enterprise 15 SP5 kernel was updated to receive various security bugfixes.


The following security bugs were fixed:

- CVE-2022-49138: Bluetooth: hci_event: Fix checking conn for le_conn_complete_evt (bsc#1238160).
- CVE-2022-50233: Bluetooth: eir: Fix using strlen with hdev->{dev_name,short_name} (bsc#1246968).
- CVE-2022-50252: igb: Do not free q_vector unless new one was allocated (bsc#1249846).
- CVE-2022-50409: net: If sock is dead do not access sock's sk_wq in sk_stream_wait_memory (bsc#1250392).
- CVE-2023-53178: mm: fix zswap writeback race condition (bsc#1249827).
- CVE-2023-53257: wifi: mac80211: check S1G action frame size (bsc#1249869).
- CVE-2023-53321: wifi: mac80211_hwsim: drop short frames (bsc#1250313).
- CVE-2023-53438: x86/MCE: Always save CS register on AMD Zen IF Poison errors (bsc#1250180).
- CVE-2025-37738: ext4: ignore xattrs past end (bsc#1242846).
- CVE-2025-37958: mm/huge_memory: fix dereferencing invalid pmd migration entry (bsc#1243539).
- CVE-2025-38014: dmaengine: idxd: Refactor remove call with idxd_cleanup() helper (bsc#1244732).
- CVE-2025-38111: net/mdiobus: Fix potential out-of-bounds read/write access (bsc#1245666).
- CVE-2025-38380: i2c/designware: Fix an initialization issue (bsc#1247028).
- CVE-2025-38488: smb: client: fix use-after-free in crypt_message when using async crypto (bsc#1247239).
- CVE-2025-38553: net/sched: Restrict conditions for adding duplicating netems to qdisc tree (bsc#1248255).
- CVE-2025-38572: ipv6: reject malicious packets in ipv6_gso_segment() (bsc#1248399).
- CVE-2025-38659: gfs2: No more self recovery (bsc#1248639).
- CVE-2025-38664: ice: Fix a null pointer dereference in ice_copy_and_init_pkg() (bsc#1248628).
- CVE-2025-38678: netfilter: nf_tables: reject duplicate device on updates (bsc#1249126).
- CVE-2025-38685: fbdev: Fix vmalloc out-of-bounds write in fast_imageblit (bsc#1249220).
- CVE-2025-38706: ASoC: core: Check for rtd == NULL in snd_soc_remove_pcm_runtime() (bsc#1249195).
- CVE-2025-38713: hfsplus: fix slab-out-of-bounds read in hfsplus_uni2asc() (bsc#1249200).
- CVE-2025-38734: net/smc: fix UAF on smcsk after smc_listen_out() (bsc#1249324).
- CVE-2025-39691: fs/buffer: fix use-after-free when call bh_read() helper (bsc#1249374).
- CVE-2025-39703: net, hsr: reject HSR frame if skb can't hold tag (bsc#1249315).
- CVE-2025-39726: s390/ism: fix concurrency management in ism_cmd() (bsc#1249266).
- CVE-2025-39746: wifi: ath10k: shutdown driver when hardware is unreliable (bsc#1249516).
- CVE-2025-39751: ALSA: hda/ca0132: Fix buffer overflow in add_tuning_control (bsc#1249538).
- CVE-2025-39790: bus: mhi: host: Detect events pointing to unexpected TREs (bsc#1249548).
- CVE-2025-39823: KVM: x86: use array_index_nospec with indices that come from guest (bsc#1250002).
- CVE-2025-39824: HID: asus: fix UAF via HID_CLAIMED_INPUT validation (bsc#1250007).
- CVE-2025-39860: Bluetooth: Fix use-after-free in l2cap_sock_cleanup_listen() (bsc#1250247).
- CVE-2025-39869: dmaengine: ti: edma: Fix memory allocation size for queue_priority_map (bsc#1250406).

The following non-security bugs were fixed:

- !CONFIG &amp; reference -> this is bug, immediate fail
- CONFIG &amp; no reference -> OK temporarily, must be resolved eventually
- Do not self obsolete older kernel variants
- Kconfig.suse: Add KABI checkiness macro (config) (bsc#1249186).
- Limit patch filenames to 100 characters (bsc#1249604).
- Move pesign-obs-integration requirement from kernel-syms to kernel devel subpackage (bsc#1248108).
- Update config files. (bsc#1249186) Enable where we define KABI refs + rely on Kconfig deps.
- build_bug.h: Add KABI assert (bsc#1249186).
- hv_netvsc: Fix panic during namespace deletion with VF (bsc#1248111).
- kernel-binary: Another installation ordering fix (bsc#1241353).
- kernel-source: Do not list mkspec and its inputs as sources (bsc#1250522).
- kernel-subpackage-build: Decompress ghost file when compressed version exists (bsc#1249346)
- kernel-syms.spec: Drop old rpm release number hack (bsc#1247172).
- net/sched: ets: use old 'nbands' while purging unused classes (git-fixes).
- rpm/kernel-subpackage-spec: Skip brp-strip-debug to avoid file truncation (bsc#1246879).
- rpm/mkspec: Fix missing kernel-syms-rt creation (bsc#1244337)
- rpm: Configure KABI checkingness macro (bsc#1249186).
- rpm: Drop support for kabi/arch/ignore-flavor (bsc#1249186).
- rpm: Link arch-symbols script from scripts directory.
- rpm: Link guards script from scripts directory.
- supported.conf: mark hyperv_drm as external
- use uniform permission checks for all mount propagation changes (git-fixes).
- xfs: rework datasync tracking and execution (bsc#1237449).
</description>
	<summary>Security update for the Linux Kernel</summary>
<releasetarget project="SUSE:Updates:SLE-Product-SLES_SAP:15-SP5:x86_64"/>
<releasetarget project="SUSE:Updates:SLE-Product-SLES_SAP:15-SP5:ppc64le"/>
<releasetarget project="SUSE:Updates:SLE-Product-SLES:15-SP5-LTSS:x86_64"/>
<releasetarget project="SUSE:Updates:SLE-Product-SLES:15-SP5-LTSS:s390x"/>
<releasetarget project="SUSE:Updates:SLE-Product-SLES:15-SP5-LTSS:ppc64le"/>
<releasetarget project="SUSE:Updates:SLE-Product-SLES:15-SP5-LTSS:aarch64"/>
<releasetarget project="SUSE:Updates:SLE-Product-HPC:15-SP5-LTSS:x86_64"/>
<releasetarget project="SUSE:Updates:SLE-Product-HPC:15-SP5-LTSS:aarch64"/>
<releasetarget project="SUSE:Updates:SLE-Product-HPC:15-SP5-ESPOS:x86_64"/>
<releasetarget project="SUSE:Updates:SLE-Product-HPC:15-SP5-ESPOS:aarch64"/>
<releasetarget project="SUSE:Updates:SLE-Micro:5.5:x86_64"/>
<releasetarget project="SUSE:Updates:SLE-Micro:5.5:s390x"/>
<releasetarget project="SUSE:Updates:SLE-Micro:5.5:ppc64le"/>
<releasetarget project="SUSE:Updates:SLE-Micro:5.5:aarch64"/>
<releasetarget project="SUSE:SLE-15-SP5:Update"/>
</patchinfo>
openSUSE Build Service is sponsored by