{"affected":[{"ecosystem_specific":{"binaries":[{"kernel-rt":"5.14.21-150500.13.52.1","kernel-source-rt":"5.14.21-150500.13.52.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Micro 5.5","name":"kernel-rt","purl":"pkg:rpm/suse/kernel-rt&distro=SUSE%20Linux%20Enterprise%20Micro%205.5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.14.21-150500.13.52.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-rt":"5.14.21-150500.13.52.1","kernel-source-rt":"5.14.21-150500.13.52.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Micro 5.5","name":"kernel-source-rt","purl":"pkg:rpm/suse/kernel-source-rt&distro=SUSE%20Linux%20Enterprise%20Micro%205.5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.14.21-150500.13.52.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-livepatch-5_14_21-150500_13_52-rt":"1-150500.11.5.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Live Patching 15 SP5","name":"kernel-livepatch-SLE15-SP5-RT_Update_14","purl":"pkg:rpm/suse/kernel-livepatch-SLE15-SP5-RT_Update_14&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1-150500.11.5.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-rt":"5.14.21-150500.13.52.1","dlm-kmp-rt":"5.14.21-150500.13.52.1","gfs2-kmp-rt":"5.14.21-150500.13.52.1","kernel-devel-rt":"5.14.21-150500.13.52.1","kernel-rt":"5.14.21-150500.13.52.1","kernel-rt-devel":"5.14.21-150500.13.52.1","kernel-rt-vdso":"5.14.21-150500.13.52.1","kernel-rt_debug":"5.14.21-150500.13.52.1","kernel-rt_debug-devel":"5.14.21-150500.13.52.1","kernel-rt_debug-vdso":"5.14.21-150500.13.52.1","kernel-source-rt":"5.14.21-150500.13.52.1","kernel-syms-rt":"5.14.21-150500.13.52.1","ocfs2-kmp-rt":"5.14.21-150500.13.52.1"}]},"package":{"ecosystem":"SUSE:Real Time Module 15 SP5","name":"kernel-rt","purl":"pkg:rpm/suse/kernel-rt&distro=SUSE%20Real%20Time%20Module%2015%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.14.21-150500.13.52.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-rt":"5.14.21-150500.13.52.1","dlm-kmp-rt":"5.14.21-150500.13.52.1","gfs2-kmp-rt":"5.14.21-150500.13.52.1","kernel-devel-rt":"5.14.21-150500.13.52.1","kernel-rt":"5.14.21-150500.13.52.1","kernel-rt-devel":"5.14.21-150500.13.52.1","kernel-rt-vdso":"5.14.21-150500.13.52.1","kernel-rt_debug":"5.14.21-150500.13.52.1","kernel-rt_debug-devel":"5.14.21-150500.13.52.1","kernel-rt_debug-vdso":"5.14.21-150500.13.52.1","kernel-source-rt":"5.14.21-150500.13.52.1","kernel-syms-rt":"5.14.21-150500.13.52.1","ocfs2-kmp-rt":"5.14.21-150500.13.52.1"}]},"package":{"ecosystem":"SUSE:Real Time Module 15 SP5","name":"kernel-rt_debug","purl":"pkg:rpm/suse/kernel-rt_debug&distro=SUSE%20Real%20Time%20Module%2015%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.14.21-150500.13.52.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-rt":"5.14.21-150500.13.52.1","dlm-kmp-rt":"5.14.21-150500.13.52.1","gfs2-kmp-rt":"5.14.21-150500.13.52.1","kernel-devel-rt":"5.14.21-150500.13.52.1","kernel-rt":"5.14.21-150500.13.52.1","kernel-rt-devel":"5.14.21-150500.13.52.1","kernel-rt-vdso":"5.14.21-150500.13.52.1","kernel-rt_debug":"5.14.21-150500.13.52.1","kernel-rt_debug-devel":"5.14.21-150500.13.52.1","kernel-rt_debug-vdso":"5.14.21-150500.13.52.1","kernel-source-rt":"5.14.21-150500.13.52.1","kernel-syms-rt":"5.14.21-150500.13.52.1","ocfs2-kmp-rt":"5.14.21-150500.13.52.1"}]},"package":{"ecosystem":"SUSE:Real Time Module 15 SP5","name":"kernel-source-rt","purl":"pkg:rpm/suse/kernel-source-rt&distro=SUSE%20Real%20Time%20Module%2015%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.14.21-150500.13.52.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-rt":"5.14.21-150500.13.52.1","dlm-kmp-rt":"5.14.21-150500.13.52.1","gfs2-kmp-rt":"5.14.21-150500.13.52.1","kernel-devel-rt":"5.14.21-150500.13.52.1","kernel-rt":"5.14.21-150500.13.52.1","kernel-rt-devel":"5.14.21-150500.13.52.1","kernel-rt-vdso":"5.14.21-150500.13.52.1","kernel-rt_debug":"5.14.21-150500.13.52.1","kernel-rt_debug-devel":"5.14.21-150500.13.52.1","kernel-rt_debug-vdso":"5.14.21-150500.13.52.1","kernel-source-rt":"5.14.21-150500.13.52.1","kernel-syms-rt":"5.14.21-150500.13.52.1","ocfs2-kmp-rt":"5.14.21-150500.13.52.1"}]},"package":{"ecosystem":"SUSE:Real Time Module 15 SP5","name":"kernel-syms-rt","purl":"pkg:rpm/suse/kernel-syms-rt&distro=SUSE%20Real%20Time%20Module%2015%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.14.21-150500.13.52.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-rt":"5.14.21-150500.13.52.1","dlm-kmp-rt":"5.14.21-150500.13.52.1","gfs2-kmp-rt":"5.14.21-150500.13.52.1","kernel-devel-rt":"5.14.21-150500.13.52.1","kernel-rt":"5.14.21-150500.13.52.1","kernel-rt-devel":"5.14.21-150500.13.52.1","kernel-rt-extra":"5.14.21-150500.13.52.1","kernel-rt-livepatch":"5.14.21-150500.13.52.1","kernel-rt-livepatch-devel":"5.14.21-150500.13.52.1","kernel-rt-optional":"5.14.21-150500.13.52.1","kernel-rt-vdso":"5.14.21-150500.13.52.1","kernel-rt_debug":"5.14.21-150500.13.52.1","kernel-rt_debug-devel":"5.14.21-150500.13.52.1","kernel-rt_debug-livepatch-devel":"5.14.21-150500.13.52.1","kernel-rt_debug-vdso":"5.14.21-150500.13.52.1","kernel-source-rt":"5.14.21-150500.13.52.1","kernel-syms-rt":"5.14.21-150500.13.52.1","kselftests-kmp-rt":"5.14.21-150500.13.52.1","ocfs2-kmp-rt":"5.14.21-150500.13.52.1","reiserfs-kmp-rt":"5.14.21-150500.13.52.1"}]},"package":{"ecosystem":"openSUSE:Leap 15.5","name":"kernel-rt","purl":"pkg:rpm/opensuse/kernel-rt&distro=openSUSE%20Leap%2015.5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.14.21-150500.13.52.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-rt":"5.14.21-150500.13.52.1","dlm-kmp-rt":"5.14.21-150500.13.52.1","gfs2-kmp-rt":"5.14.21-150500.13.52.1","kernel-devel-rt":"5.14.21-150500.13.52.1","kernel-rt":"5.14.21-150500.13.52.1","kernel-rt-devel":"5.14.21-150500.13.52.1","kernel-rt-extra":"5.14.21-150500.13.52.1","kernel-rt-livepatch":"5.14.21-150500.13.52.1","kernel-rt-livepatch-devel":"5.14.21-150500.13.52.1","kernel-rt-optional":"5.14.21-150500.13.52.1","kernel-rt-vdso":"5.14.21-150500.13.52.1","kernel-rt_debug":"5.14.21-150500.13.52.1","kernel-rt_debug-devel":"5.14.21-150500.13.52.1","kernel-rt_debug-livepatch-devel":"5.14.21-150500.13.52.1","kernel-rt_debug-vdso":"5.14.21-150500.13.52.1","kernel-source-rt":"5.14.21-150500.13.52.1","kernel-syms-rt":"5.14.21-150500.13.52.1","kselftests-kmp-rt":"5.14.21-150500.13.52.1","ocfs2-kmp-rt":"5.14.21-150500.13.52.1","reiserfs-kmp-rt":"5.14.21-150500.13.52.1"}]},"package":{"ecosystem":"openSUSE:Leap 15.5","name":"kernel-rt_debug","purl":"pkg:rpm/opensuse/kernel-rt_debug&distro=openSUSE%20Leap%2015.5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.14.21-150500.13.52.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-rt":"5.14.21-150500.13.52.1","dlm-kmp-rt":"5.14.21-150500.13.52.1","gfs2-kmp-rt":"5.14.21-150500.13.52.1","kernel-devel-rt":"5.14.21-150500.13.52.1","kernel-rt":"5.14.21-150500.13.52.1","kernel-rt-devel":"5.14.21-150500.13.52.1","kernel-rt-extra":"5.14.21-150500.13.52.1","kernel-rt-livepatch":"5.14.21-150500.13.52.1","kernel-rt-livepatch-devel":"5.14.21-150500.13.52.1","kernel-rt-optional":"5.14.21-150500.13.52.1","kernel-rt-vdso":"5.14.21-150500.13.52.1","kernel-rt_debug":"5.14.21-150500.13.52.1","kernel-rt_debug-devel":"5.14.21-150500.13.52.1","kernel-rt_debug-livepatch-devel":"5.14.21-150500.13.52.1","kernel-rt_debug-vdso":"5.14.21-150500.13.52.1","kernel-source-rt":"5.14.21-150500.13.52.1","kernel-syms-rt":"5.14.21-150500.13.52.1","kselftests-kmp-rt":"5.14.21-150500.13.52.1","ocfs2-kmp-rt":"5.14.21-150500.13.52.1","reiserfs-kmp-rt":"5.14.21-150500.13.52.1"}]},"package":{"ecosystem":"openSUSE:Leap 15.5","name":"kernel-source-rt","purl":"pkg:rpm/opensuse/kernel-source-rt&distro=openSUSE%20Leap%2015.5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.14.21-150500.13.52.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-rt":"5.14.21-150500.13.52.1","dlm-kmp-rt":"5.14.21-150500.13.52.1","gfs2-kmp-rt":"5.14.21-150500.13.52.1","kernel-devel-rt":"5.14.21-150500.13.52.1","kernel-rt":"5.14.21-150500.13.52.1","kernel-rt-devel":"5.14.21-150500.13.52.1","kernel-rt-extra":"5.14.21-150500.13.52.1","kernel-rt-livepatch":"5.14.21-150500.13.52.1","kernel-rt-livepatch-devel":"5.14.21-150500.13.52.1","kernel-rt-optional":"5.14.21-150500.13.52.1","kernel-rt-vdso":"5.14.21-150500.13.52.1","kernel-rt_debug":"5.14.21-150500.13.52.1","kernel-rt_debug-devel":"5.14.21-150500.13.52.1","kernel-rt_debug-livepatch-devel":"5.14.21-150500.13.52.1","kernel-rt_debug-vdso":"5.14.21-150500.13.52.1","kernel-source-rt":"5.14.21-150500.13.52.1","kernel-syms-rt":"5.14.21-150500.13.52.1","kselftests-kmp-rt":"5.14.21-150500.13.52.1","ocfs2-kmp-rt":"5.14.21-150500.13.52.1","reiserfs-kmp-rt":"5.14.21-150500.13.52.1"}]},"package":{"ecosystem":"openSUSE:Leap 15.5","name":"kernel-syms-rt","purl":"pkg:rpm/opensuse/kernel-syms-rt&distro=openSUSE%20Leap%2015.5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.14.21-150500.13.52.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"\nThe SUSE Linux Enterprise 15 SP5 Real Time kernel was updated to receive various security bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2024-27389: Fixed pstore inode handling with d_invalidate() (bsc#1223705).\n- CVE-2024-27062: Fixed nouveau lock inside client object tree (bsc#1223834).\n- CVE-2024-27056: Fixed wifi/iwlwifi/mvm to ensure offloading TID queue exists (bsc#1223822).\n- CVE-2024-27046: Fixed nfp/flower handling acti_netdevs allocation failure (bsc#1223827).\n- CVE-2024-27043: Fixed a use-after-free in edia/dvbdev in different places (bsc#1223824).\n- CVE-2024-27041: Fixed drm/amd/display NULL checks for adev->dm.dc in amdgpu_dm_fini() (bsc#1223714).\n- CVE-2024-27039: Fixed clk/hisilicon/hi3559a an erroneous devm_kfree() (bsc#1223821).\n- CVE-2024-27038: Fixed clk_core_get NULL pointer dereference (bsc#1223816).\n- CVE-2024-27030: Fixed octeontx2-af to use separate handlers for interrupts (bsc#1223790).\n- CVE-2024-27014: Fixed net/mlx5e to prevent deadlock while disabling aRFS (bsc#1223735).\n- CVE-2024-27013: Fixed tun limit printing rate when illegal packet received by tun device (bsc#1223745).\n- CVE-2024-26993: Fixed fs/sysfs reference leak in sysfs_break_active_protection() (bsc#1223693).\n- CVE-2024-26982: Fixed Squashfs inode number check not to be an invalid value of zero (bsc#1223634).\n- CVE-2024-26970: Fixed clk/qcom/gcc-ipq6018 termination of frequency table arrays (bsc#1223644).\n- CVE-2024-26969: Fixed clk/qcom/gcc-ipq8074 termination of frequency table arrays (bsc#1223645).\n- CVE-2024-26966: Fixed clk/qcom/mmcc-apq8084 termination of frequency table arrays (bsc#1223646).\n- CVE-2024-26965: Fixed clk/qcom/mmcc-msm8974 termination of frequency table arrays (bsc#1223648).\n- CVE-2024-26960: Fixed mm/swap race between free_swap_and_cache() and swapoff() (bsc#1223655).\n- CVE-2024-26951: Fixed wireguard/netlink check for dangling peer via is_dead instead of empty list (bsc#1223660).\n- CVE-2024-26950: Fixed wireguard/netlink to access device through ctx instead of peer (bsc#1223661).\n- CVE-2024-26948: Fixed drm/amd/display by adding dc_state NULL check in dc_state_release (bsc#1223664).\n- CVE-2024-26927: Fixed ASoC/SOF bounds checking to firmware data Smatch (bsc#1223525).\n- CVE-2024-26901: Fixed do_sys_name_to_handle() to use kzalloc() to prevent kernel-infoleak (bsc#1223198).\n- CVE-2024-26896: Fixed wifi/wfx memory leak when starting AP (bsc#1223042).\n- CVE-2024-26893: Fixed firmware/arm_scmi for possible double free in SMC transport cleanup path (bsc#1223196).\n- CVE-2024-26885: Fixed bpf DEVMAP_HASH overflow check on 32-bit arches (bsc#1223190).\n- CVE-2024-26884: Fixed bpf hashtab overflow check on 32-bit arches (bsc#1223189).\n- CVE-2024-26883: Fixed bpf stackmap overflow check on 32-bit arches (bsc#1223035).\n- CVE-2024-26882: Fixed net/ip_tunnel to make sure to pull inner header in ip_tunnel_rcv() (bsc#1223034).\n- CVE-2024-26881: Fixed net/hns3 kernel crash when 1588 is received on HIP08 devices (bsc#1223041).\n- CVE-2024-26879: Fixed clk/meson by adding missing clocks to axg_clk_regmaps (bsc#1223066).\n- CVE-2024-26878: Fixed quota for potential NULL pointer dereference (bsc#1223060).\n- CVE-2024-26866: Fixed spi/spi-fsl-lpspi by removing redundant spi_controller_put call (bsc#1223024).\n- CVE-2024-26862: Fixed packet annotate data-races around ignore_outgoing (bsc#1223111).\n- CVE-2024-26861: Fixed wireguard/receive annotate data-race around receiving_counter.counter (bsc#1223076).\n- CVE-2024-26857: Fixed geneve to make sure to pull inner header in geneve_rx() (bsc#1223058).\n- CVE-2024-26856: Fixed use-after-free inside sparx5_del_mact_entry (bsc#1223052).\n- CVE-2024-26855: Fixed net/ice potential NULL pointer dereference in ice_bridge_setlink() (bsc#1223051).\n- CVE-2024-26853: Fixed igc returning frame twice in XDP_REDIRECT (bsc#1223061).\n- CVE-2024-26852: Fixed net/ipv6 to avoid possible UAF in ip6_route_mpath_notify() (bsc#1223057).\n- CVE-2024-26848: Fixed afs endless loop in directory parsing (bsc#1223030).\n- CVE-2024-26836: Fixed platform/x86/think-lmi password opcode ordering for workstations (bsc#1222968).\n- CVE-2024-26830: Fixed i40e to not allow untrusted VF to remove administratively set MAC (bsc#1223012).\n- CVE-2024-26817: Fixed amdkfd to use calloc instead of kzalloc to avoid integer overflow (bsc#1222812).\n- CVE-2024-26816: Fixed relocations in .notes section when building with CONFIG_XEN_PV=y by ignoring them (bsc#1222624).\n- CVE-2024-26807: Fixed spi/cadence-qspi NULL pointer reference in runtime PM hooks (bsc#1222801).\n- CVE-2024-26805: Fixed a kernel-infoleak-after-free in __skb_datagram_iter in netlink  (bsc#1222630).\n- CVE-2024-26793: Fixed an use-after-free and null-ptr-deref in gtp_newlink() in gtp  (bsc#1222428).\n- CVE-2024-26783: Fixed mm/vmscan bug when calling wakeup_kswapd() with a wrong zone index (bsc#1222615).\n- CVE-2024-26779: Fixed a race condition on enabling fast-xmit in mac80211 (bsc#1222772).\n- CVE-2024-26773: Fixed ext4 block allocation from corrupted group in ext4_mb_try_best_found() (bsc#1222618).\n- CVE-2024-26772: Fixed ext4 to avoid allocating blocks from corrupted group in ext4_mb_find_by_goal() (bsc#1222613).\n- CVE-2024-26771: Fixed a null pointer dereference on edma_probe in dmaengine ti edma  (bsc#1222610)\n- CVE-2024-26766: Fixed SDMA off-by-one error in _pad_sdma_tx_descs() (bsc#1222726).\n- CVE-2024-26764: Fixed IOCB_AIO_RW check in fs/aio before the struct aio_kiocb conversion (bsc#1222721).\n- CVE-2024-26763: Fixed user corruption via by writing data with O_DIRECT on device in dm-crypt (bsc#1222720).\n- CVE-2024-26760: Fixed scsi/target/pscsi bio_put() for error case (bsc#1222596).\n- CVE-2024-267600: Fixed scsi/target/pscsi error case in bio_put() (bsc#1222596).\n- CVE-2024-26754: Fixed an use-after-free and null-ptr-deref in gtp_genl_dump_pdp() in gtp  (bsc#1222632).\n- CVE-2024-26751: Fixed ARM/ep93xx terminator to gpiod_lookup_table (bsc#1222724).\n- CVE-2024-26747: Fixed a NULL pointer issue with USB parent module's reference (bsc#1222609).\n- CVE-2024-26744: Fixed null pointer dereference in srpt_service_guid parameter in rdma/srpt (bsc#1222449).\n- CVE-2024-26743: Fixed memory leak in qedr_create_user_qp error flow in rdma/qedr (bsc#1222677).\n- CVE-2024-26737: Fixed selftests/bpf racing between bpf_timer_cancel_and_free and bpf_timer_cancel (bsc#1222557).\n- CVE-2024-26733: Fixed an overflow in arp_req_get() in arp (bsc#1222585).\n- CVE-2024-26727: Fixed assertion if a newly created btrfs subvolume already gets read (bsc#1222536).\n- CVE-2024-26718: Fixed dm-crypt/dm-verity disable tasklets (bsc#1222416).\n- CVE-2024-26704: Fixed a double-free of blocks due to wrong extents moved_len in ext4 (bsc#1222422).\n- CVE-2024-26696: Fixed nilfs2 hang in nilfs_lookup_dirty_data_buffers() (bsc#1222549).\n- CVE-2024-26689: Fixed a use-after-free in encode_cap_msg() (bsc#1222503).\n- CVE-2024-26687: Fixed xen/events close evtchn after mapping cleanup (bsc#1222435).\n- CVE-2024-26685: Fixed nilfs2 potential bug in end_buffer_async_write (bsc#1222437).\n- CVE-2024-26684: Fixed net/stmmac/xgmac handling of DPP safety error for DMA channels (bsc#1222445).\n- CVE-2024-26681: Fixed netdevsim to avoid potential loop in nsim_dev_trap_report_work() (bsc#1222431).\n- CVE-2024-26680: Fixed net/atlantic DMA mapping for PTP hwts ring (bsc#1222427).\n- CVE-2024-26675: Fixed ppp_async to limit MRU to 64K (bsc#1222379).\n- CVE-2024-26673: Fixed netfilter/nft_ct layer 3 and 4 protocol sanitization (bsc#1222368).\n- CVE-2024-26671: Fixed blk-mq IO hang from sbitmap wakeup race (bsc#1222357).\n- CVE-2024-26660: Fixed drm/amd/display bounds check for stream encoder creation (bsc#1222266).\n- CVE-2024-26656: Fixed drm/amdgpu use-after-free bug (bsc#1222307).\n- CVE-2024-26610: Fixed memory corruption in wifi/iwlwifi (bsc#1221299).\n- CVE-2024-26601: Fixed ext4 buddy bitmap corruption via fast commit replay (bsc#1220342).\n- CVE-2024-23850: Fixed double free of anonymous device after snapshot  creation failure (bsc#1219126).\n- CVE-2024-23848: Fixed media/cec for possible use-after-free in cec_queue_msg_fh (bsc#1219104).\n- CVE-2024-23307: Fixed Integer Overflow or Wraparound vulnerability in x86 and ARM md, raid, raid5 modules (bsc#1219169).\n- CVE-2024-22099: Fixed a null-pointer-dereference in rfcomm_check_security (bsc#1219170).\n- CVE-2024-0841: Fixed a null pointer dereference in the hugetlbfs_fill_super function in hugetlbfs (HugeTLB pages) functionality (bsc#1219264).\n- CVE-2024-0639: Fixed a denial-of-service vulnerability due to a deadlock found in sctp_auto_asconf_init in net/sctp/socket.c (bsc#1218917).\n- CVE-2023-6270: Fixed a use-after-free issue in aoecmd_cfg_pkts (bsc#1218562).\n- CVE-2023-52652: Fixed NTB for possible name leak in ntb_register_device() (bsc#1223686).\n- CVE-2023-52645: Fixed pmdomain/mediatek race conditions with genpd (bsc#1223033).\n- CVE-2023-52636: Fixed libceph cursor init when preparing sparse read in msgr2 (bsc#1222247).\n- CVE-2023-52635: Fixed PM/devfreq to synchronize devfreq_monitor_[start/stop] (bsc#1222294).\n- CVE-2023-52627: Fixed iio:adc:ad7091r exports into IIO_AD7091R namespace (bsc#1222051).\n- CVE-2023-52620: Fixed netfilter/nf_tables to disallow timeout for anonymous sets never used from userspace (bsc#1221825).\n- CVE-2023-52616: Fixed unexpected pointer access in crypto/lib/mpi in mpi_ec_init (bsc#1221612).\n- CVE-2023-52614: Fixed PM/devfreq buffer overflow in trans_stat_show (bsc#1221617).\n- CVE-2023-52593: Fixed wifi/wfx possible NULL pointer dereference in wfx_set_mfp_ap() (bsc#1221042).\n- CVE-2023-52591: Fixed a possible reiserfs filesystem corruption via directory renaming (bsc#1221044).\n- CVE-2023-52590: Fixed a possible ocfs2 filesystem corruption via directory renaming (bsc#1221088).\n- CVE-2023-52589: Fixed media/rkisp1 IRQ disable race issue (bsc#1221084).\n- CVE-2023-52585: Fixed drm/amdgpu for possible NULL pointer dereference in amdgpu_ras_query_error_status_helper() (bsc#1221080).\n- CVE-2023-52561: Fixed arm64/dts/qcom/sdm845-db845c to mark cont splash memory region (bsc#1220935).\n- CVE-2023-52503: Fixed tee/amdtee use-after-free vulnerability in amdtee_close_session (bsc#1220915).\n- CVE-2023-52488: Fixed serial/sc16is7xx convert from _raw_ to _noinc_ regmap functions for FIFO (bsc#1221162).\n- CVE-2022-48701: Fixed an out-of-bounds bug in __snd_usb_parse_audio_interface() (bsc#1223921).\n- CVE-2022-48662: Fixed a general protection fault (GPF) in i915_perf_open_ioctl (bsc#1223505).\n- CVE-2022-48659: Fixed mm/slub to return errno if kmalloc() fails (bsc#1223498).\n- CVE-2022-48658: Fixed mm/slub to avoid a problem in flush_cpu_slab()/__free_slab() task context (bsc#1223496).\n- CVE-2022-48651: Fixed an out-of-bound bug in ipvlan caused by unset skb->mac_header (bsc#1223513).\n- CVE-2022-48642: Fixed netfilter/nf_tables percpu memory leak at nf_tables_addchain() (bsc#1223478).\n- CVE-2022-48640: Fixed bonding for possible NULL pointer dereference in bond_rr_gen_slave_id (bsc#1223499).\n- CVE-2022-48631: Fixed a bug in ext4, when parsing extents where eh_entries == 0 and eh_depth > 0 (bsc#1223475).\n- CVE-2021-47214: Fixed hugetlb/userfaultfd during restore reservation in hugetlb_mcopy_atomic_pte() (bsc#1222710).\n- CVE-2021-47211: Fixed a null pointer dereference on pointer cs_desc in usb-audio (bsc#1222869).\n- CVE-2021-47207: Fixed a null pointer dereference on pointer block in gus (bsc#1222790).\n- CVE-2021-47205: Unregistered clocks/resets when unbinding in sunxi-ng (bsc#1222888).\n- CVE-2021-47202: Fixed NULL pointer dereferences in of_thermal_ functions (bsc#1222878)\n- CVE-2021-47200: Fixed drm/prime for possible use-after-free in mmap within drm_gem_ttm_mmap() and drm_gem_ttm_mmap() (bsc#1222838).\n- CVE-2021-47195: Fixed use-after-free inside SPI via add_lock mutex (bsc#1222832).\n- CVE-2021-47189: Fixed denial of service due to memory ordering issues between normal and ordered work functions in btrfs (bsc#1222706).\n- CVE-2021-47185: Fixed a softlockup issue in flush_to_ldisc in tty tty_buffer (bsc#1222669).\n- CVE-2021-47184: Fixed NULL pointer dereference on VSI filter sync (bsc#1222666).\n- CVE-2021-47183: Fixed a null pointer dereference during link down processing in scsi lpfc (bsc#1192145, bsc#1222664).\n- CVE-2021-47182: Fixed scsi_mode_sense() buffer length handling (bsc#1222662).\n- CVE-2021-47181: Fixed a null pointer dereference caused by calling platform_get_resource()  (bsc#1222660).\n\nThe following non-security bugs were fixed:\n\n- ALSA: firewire-lib: handle quirk to calculate payload quadlets as data block counter (stable-fixes).\n- ALSA: hda/realtek - Enable audio jacks of Haier Boyue G42 with ALC269VC (stable-fixes).\n- ALSA: hda/realtek - Fix inactive headset mic jack (stable-fixes).\n- ALSA: hda/realtek: Add quirk for HP SnowWhite laptops (stable-fixes).\n- ALSA: hda/realtek: Fix mute led of HP Laptop 15-da3001TU (stable-fixes).\n- ALSA: hda: intel-sdw-acpi: fix usage of device_get_named_child_node() (git-fixes).\n- ALSA: scarlett2: Add Focusrite Clarett 2Pre and 4Pre USB support (stable-fixes).\n- ALSA: scarlett2: Add Focusrite Clarett+ 2Pre and 4Pre support (stable-fixes).\n- ALSA: scarlett2: Add correct product series name to messages (stable-fixes).\n- ALSA: scarlett2: Add support for Clarett 8Pre USB (stable-fixes).\n- ALSA: scarlett2: Default mixer driver to enabled (stable-fixes).\n- ALSA: scarlett2: Move USB IDs out from device_info struct (stable-fixes).\n- ASoC: meson: axg-card: make links nonatomic (git-fixes).\n- ASoC: meson: axg-tdm-interface: manage formatters in trigger (git-fixes).\n- ASoC: meson: cards: select SND_DYNAMIC_MINORS (git-fixes).\n- ASoC: soc-core.c: Skip dummy codec when adding platforms (stable-fixes).\n- ASoC: tegra: Fix DSPK 16-bit playback (git-fixes).\n- ASoC: ti: davinci-mcasp: Fix race condition during probe (git-fixes).\n- Bluetooth: Add new quirk for broken read key length on ATS2851 (git-fixes).\n- Bluetooth: Fix TOCTOU in HCI debugfs implementation (git-fixes).\n- Bluetooth: Fix memory leak in hci_req_sync_complete() (git-fixes).\n- Bluetooth: Fix type of len in {l2cap,sco}_sock_getsockopt_old() (stable-fixes).\n- Bluetooth: L2CAP: Fix not validating setsockopt user input (git-fixes).\n- Bluetooth: RFCOMM: Fix not validating setsockopt user input (git-fixes).\n- Bluetooth: SCO: Fix not validating setsockopt user input (git-fixes).\n- Bluetooth: add quirk for broken address properties (git-fixes).\n- Bluetooth: btintel: Fix null ptr deref in btintel_read_version (stable-fixes).\n- Bluetooth: btintel: Fixe build regression (git-fixes).\n- Bluetooth: btusb: Add Realtek RTL8852BE support ID 0x0bda:0x4853 (stable-fixes).\n- Bluetooth: hci_event: Fix sending HCI_OP_READ_ENC_KEY_SIZE (git-fixes).\n- Bluetooth: hci_event: set the conn encrypted before conn establishes (stable-fixes).\n- Bluetooth: hci_sock: Fix not validating setsockopt user input (git-fixes).\n- Bluetooth: qca: fix NULL-deref on non-serdev suspend (git-fixes).\n- Documentation: Add missing documentation for EXPORT_OP flags (stable-fixes).\n- HID: intel-ish-hid: ipc: Fix dev_err usage with uninitialized dev->devc (git-fixes).\n- HID: logitech-dj: allow mice to use all types of reports (git-fixes).\n- HID: uhid: Use READ_ONCE()/WRITE_ONCE() for ->running (stable-fixes).\n- Input: allocate keycode for Display refresh rate toggle (stable-fixes).\n- Input: synaptics-rmi4 - fail probing if memory allocation for 'phys' fails (stable-fixes).\n- NFC: trf7970a: disable all regulators on removal (git-fixes).\n- NFS: avoid spurious warning of lost lock that is being unlocked (bsc#1221791).\n- PCI/AER: Block runtime suspend when handling errors (git-fixes).\n- PCI/DPC: Quirk PIO log size for Intel Ice Lake Root Ports (git-fixes).\n- PCI/DPC: Quirk PIO log size for Intel Raptor Lake Root Ports (git-fixes).\n- PCI/DPC: Quirk PIO log size for certain Intel Root Ports (git-fixes).\n- PCI/PM: Drain runtime-idle callbacks before driver removal (git-fixes).\n- PCI: Drop pci_device_remove() test of pci_dev->driver (git-fixes).\n- PCI: rpaphp: Error out on busy status from get-sensor-state (bsc#1223369 ltc#205888).\n- RAS: Avoid build errors when CONFIG_DEBUG_FS=n (jsc#PED-7619).\n- RDMA/cm: Print the old state when cm_destroy_id gets timeout (git-fixes).\n- RDMA/cm: add timeout to cm_destroy_id wait (git-fixes)\n- README.BRANCH: Correct email address for Petr Tesarik\n- README.BRANCH: Remove copy of branch name\n- Reapply 'drm/qxl: simplify qxl_fence_wait' (stable-fixes).\n- Revert 'ACPI: PM: Block ASUS B1400CEAE from suspend to idle by default' (stable-fixes).\n- Revert 'drm/qxl: simplify qxl_fence_wait' (git-fixes).\n- Revert 'ice: Fix ice VF reset during iavf initialization (jsc#PED-376).' (bsc#1223275)\n- Revert 'usb: cdc-wdm: close race between read and workqueue' (git-fixes).\n- Revert 'usb: phy: generic: Get the vbus supply' (git-fixes).\n- USB: UAS: return ENODEV when submit urbs fail with device not attached (stable-fixes).\n- USB: serial: add device ID for VeriFone adapter (stable-fixes).\n- USB: serial: cp210x: add ID for MGP Instruments PDS100 (stable-fixes).\n- USB: serial: cp210x: add pid/vid for TDK NC0110013M and MM0110113M (stable-fixes).\n- USB: serial: ftdi_sio: add support for GMC Z216C Adapter IR-USB (stable-fixes).\n- USB: serial: option: add Fibocom FM135-GL variants (stable-fixes).\n- USB: serial: option: add Lonsung U8300/U9300 product (stable-fixes).\n- USB: serial: option: add MeiG Smart SLM320 product (stable-fixes).\n- USB: serial: option: add Rolling RW101-GL and RW135-GL support (stable-fixes).\n- USB: serial: option: add Telit FN920C04 rmnet compositions (stable-fixes).\n- USB: serial: option: add support for Fibocom FM650/FG650 (stable-fixes).\n- USB: serial: option: support Quectel EM060K sub-models (stable-fixes).\n- ahci: asm1064: asm1166: do not limit reported ports (git-fixes).\n- ahci: asm1064: correct count of reported ports (stable-fixes).\n- arm64: dts: imx8-ss-conn: fix usdhc wrong lpcg clock order (git-fixes)\n- arm64: dts: rockchip: Remove unsupported node from the Pinebook Pro (git-fixes)\n- arm64: dts: rockchip: enable internal pull-up for Q7_THRM# on RK3399 (git-fixes)\n- arm64: dts: rockchip: enable internal pull-up on PCIE_WAKE# for (git-fixes)\n- arm64: dts: rockchip: enable internal pull-up on Q7_USB_ID for RK3399 (git-fixes)\n- arm64: dts: rockchip: fix rk3328 hdmi ports node (git-fixes)\n- arm64: dts: rockchip: fix rk3399 hdmi ports node (git-fixes)\n- arm64: hibernate: Fix level3 translation fault in swsusp_save() (git-fixes).\n- ax25: fix use-after-free bugs caused by ax25_ds_del_timer (git-fixes).\n- batman-adv: Avoid infinite loop trying to resize local TT (git-fixes).\n- bcache: Fix __bch_btree_node_alloc to make the failure behavior consistent (git-fixes).\n- bcache: Remove dead references to cache_readaheads (git-fixes).\n- bcache: Remove unnecessary NULL point check in node allocations (git-fixes).\n- bcache: add code comments for bch_btree_node_get() and __bch_btree_node_alloc() (git-fixes).\n- bcache: avoid NULL checking to c->root in run_cache_set() (git-fixes).\n- bcache: avoid oversize memory allocation by small stripe_size (git-fixes).\n- bcache: bset: Fix comment typos (git-fixes).\n- bcache: check return value from btree_node_alloc_replacement() (git-fixes).\n- bcache: fix NULL pointer reference in cached_dev_detach_finish (git-fixes).\n- bcache: fix error info in register_bcache() (git-fixes).\n- bcache: fixup bcache_dev_sectors_dirty_add() multithreaded CPU false sharing (git-fixes).\n- bcache: fixup btree_cache_wait list damage (git-fixes).\n- bcache: fixup init dirty data errors (git-fixes).\n- bcache: fixup lock c->root error (git-fixes).\n- bcache: fixup multi-threaded bch_sectors_dirty_init() wake-up race (git-fixes).\n- bcache: move calc_cached_dev_sectors to proper place on backing device detach (git-fixes).\n- bcache: move uapi header bcache.h to bcache code directory (git-fixes).\n- bcache: prevent potential division by zero error (git-fixes).\n- bcache: remove EXPERIMENTAL for Kconfig option 'Asynchronous device registration' (git-fixes).\n- bcache: remove redundant assignment to variable cur_idx (git-fixes).\n- bcache: remove the backing_dev_name field from struct cached_dev (git-fixes).\n- bcache: remove the cache_dev_name field from struct cache (git-fixes).\n- bcache: remove unnecessary flush_workqueue (git-fixes).\n- bcache: remove unused bch_mark_cache_readahead function def in stats.h (git-fixes).\n- bcache: replace a mistaken IS_ERR() by IS_ERR_OR_NULL() in btree_gc_coalesce() (git-fixes).\n- bcache: replace snprintf in show functions with sysfs_emit (git-fixes).\n- bcache: revert replacing IS_ERR_OR_NULL with IS_ERR (git-fixes).\n- bcache: use bvec_kmap_local in bch_data_verify (git-fixes).\n- bcache: use bvec_kmap_local in bio_csum (git-fixes).\n- bcache: use default_groups in kobj_type (git-fixes).\n- bcache:: fix repeated words in comments (git-fixes).\n- ceph: stop copying to iter at EOF on sync reads (bsc#1223068).\n- ceph: switch to corrected encoding of max_xattr_size in mdsmap (bsc#1223067).\n- clk: Get runtime PM before walking tree during disable_unused (git-fixes).\n- clk: Initialize struct clk_core kref earlier (stable-fixes).\n- clk: Mark 'all_lists' as const (stable-fixes).\n- clk: Print an info line before disabling unused clocks (stable-fixes).\n- clk: Remove prepare_lock hold assertion in __clk_release() (git-fixes).\n- clk: remove extra empty line (stable-fixes).\n- comedi: vmk80xx: fix incomplete endpoint checking (git-fixes).\n- dm cache policy smq: ensure IO does not prevent cleaner policy progress (git-fixes).\n- dm cache: add cond_resched() to various workqueue loops (git-fixes).\n- dm clone: call kmem_cache_destroy() in dm_clone_init() error path (git-fixes).\n- dm crypt: add cond_resched() to dmcrypt_write() (git-fixes).\n- dm crypt: avoid accessing uninitialized tasklet (git-fixes).\n- dm flakey: do not corrupt the zero page (git-fixes).\n- dm flakey: fix a bug with 32-bit highmem systems (git-fixes).\n- dm flakey: fix a crash with invalid table line (git-fixes).\n- dm flakey: fix logic when corrupting a bio (git-fixes).\n- dm init: add dm-mod.waitfor to wait for asynchronously probed block devices (git-fixes).\n- dm integrity: call kmem_cache_destroy() in dm_integrity_init() error path (git-fixes).\n- dm integrity: fix out-of-range warning (git-fixes).\n- dm integrity: reduce vmalloc space footprint on 32-bit architectures (git-fixes).\n- dm raid: clean up four equivalent goto tags in raid_ctr() (git-fixes).\n- dm raid: fix false positive for requeue needed during reshape (git-fixes).\n- dm raid: fix missing reconfig_mutex unlock in raid_ctr() error paths (git-fixes).\n- dm stats: check for and propagate alloc_percpu failure (git-fixes).\n- dm thin metadata: Fix ABBA deadlock by resetting dm_bufio_client (git-fixes).\n- dm thin metadata: check fail_io before using data_sm (git-fixes).\n- dm thin: add cond_resched() to various workqueue loops (git-fixes).\n- dm thin: fix deadlock when swapping to thin device (bsc#1177529).\n- dm verity: do not perform FEC for failed readahead IO (git-fixes).\n- dm verity: fix error handling for check_at_most_once on FEC (git-fixes).\n- dm zoned: free dmz->ddev array in dmz_put_zoned_devices (git-fixes).\n- dm-delay: fix a race between delay_presuspend and delay_bio (git-fixes).\n- dm-integrity: do not modify bio's immutable bio_vec in integrity_metadata() (git-fixes).\n- dm-raid: fix lockdep waring in 'pers->hot_add_disk' (git-fixes).\n- dm-verity, dm-crypt: align 'struct bvec_iter' correctly (git-fixes).\n- dm-verity: align struct dm_verity_fec_io properly (git-fixes).\n- dm: add cond_resched() to dm_wq_work() (git-fixes).\n- dm: call the resume method on internal suspend (git-fixes).\n- dm: do not lock fs when the map is NULL during suspend or resume (git-fixes).\n- dm: do not lock fs when the map is NULL in process of resume (git-fixes).\n- dm: remove flush_scheduled_work() during local_exit() (git-fixes).\n- dm: send just one event on resize, not two (git-fixes).\n- dma: xilinx_dpdma: Fix locking (git-fixes).\n- dmaengine: idxd: Fix oops during rmmod on single-CPU platforms (git-fixes).\n- dmaengine: owl: fix register access functions (git-fixes).\n- dmaengine: tegra186: Fix residual calculation (git-fixes).\n- docs: Document the FAN_FS_ERROR event (stable-fixes).\n- drm-print: add drm_dbg_driver to improve namespace symmetry (stable-fixes).\n- drm/amd/display: Do not recursively call manual trigger programming (stable-fixes).\n- drm/amd/display: Fix nanosec stat overflow (stable-fixes).\n- drm/amd/display: fix disable otg wa logic in DCN316 (stable-fixes).\n- drm/amd/pm: fixes a random hang in S4 for SMU v13.0.4/11 (stable-fixes).\n- drm/amdgpu/sdma5.2: use legacy HDP flush for SDMA2/3 (stable-fixes).\n- drm/amdgpu: Fix leak when GPU memory allocation fails (stable-fixes).\n- drm/amdgpu: Reset dGPU if suspend got aborted (stable-fixes).\n- drm/amdgpu: always force full reset for SOC21 (stable-fixes).\n- drm/amdgpu: fix incorrect active rb bitmap for gfx11 (stable-fixes).\n- drm/amdgpu: fix incorrect number of active RBs for gfx11 (stable-fixes).\n- drm/amdgpu: once more fix the call oder in amdgpu_ttm_move() v2 (git-fixes).\n- drm/amdgpu: validate the parameters of bo mapping operations more clearly (git-fixes).\n- drm/amdkfd: Reset GPU on queue preemption failure (stable-fixes).\n- drm/ast: Fix soft lockup (git-fixes).\n- drm/client: Fully protect modes[] with dev->mode_config.mutex (stable-fixes).\n- drm/i915/cdclk: Fix CDCLK programming order when pipes are active (git-fixes).\n- drm/i915/vrr: Disable VRR when using bigjoiner (stable-fixes).\n- drm/i915: Disable port sync when bigjoiner is used (stable-fixes).\n- drm/msm/dp: fix typo in dp_display_handle_port_status_changed() (git-fixes).\n- drm/nouveau/nvkm: add a replacement for nvkm_notify (bsc#1223834)\n- drm/panel: ili9341: Respect deferred probe (git-fixes).\n- drm/panel: ili9341: Use predefined error codes (git-fixes).\n- drm/panel: visionox-rm69299: do not unregister DSI device (git-fixes).\n- drm/vc4: do not check if plane->state->fb == state->fb (stable-fixes).\n- drm/vmwgfx: Enable DMA mappings with SEV (git-fixes).\n- drm/vmwgfx: Fix crtc's atomic check conditional (git-fixes).\n- drm/vmwgfx: Fix invalid reads in fence signaled events (git-fixes).\n- drm/vmwgfx: Sort primary plane formats by order of preference (git-fixes).\n- drm: nv04: Fix out of bounds access (git-fixes).\n- drm: panel-orientation-quirks: Add quirk for GPD Win Mini (stable-fixes).\n- drm: panel-orientation-quirks: Add quirk for Lenovo Legion Go (stable-fixes).\n- dump_stack: Do not get cpu_sync for panic CPU (bsc#1223574).\n- fbdev: fix incorrect address computation in deferred IO (git-fixes).\n- fbdev: viafb: fix typo in hw_bitblt_1 and hw_bitblt_2 (stable-fixes).\n- fbmon: prevent division by zero in fb_videomode_from_videomode() (stable-fixes).\n- fix build warning\n- fuse: do not unhash root (bsc#1223951).\n- fuse: fix root lookup with nonzero generation (bsc#1223950).\n- hwmon: (amc6821) add of_match table (stable-fixes).\n- i2c: pxa: hide unused icr_bits[] variable (git-fixes).\n- i2c: smbus: fix NULL function pointer dereference (git-fixes).\n- i40e: Fix VF MAC filter removal (git-fixes).\n- idma64: Do not try to serve interrupts when device is powered off (git-fixes).\n- iio: accel: mxc4005: Interrupt handling fixes (git-fixes).\n- iio:imu: adis16475: Fix sync mode setting (git-fixes).\n- init/main.c: Fix potential static_command_line memory overflow (git-fixes).\n- iommu/amd: Add a length limitation for the ivrs_acpihid command-line parameter (git-fixes).\n- iommu/amd: Do not block updates to GATag if guest mode is on (git-fixes).\n- iommu/amd: Fix 'Guest Virtual APIC Table Root Pointer' configuration in IRTE (git-fixes).\n- iommu/amd: Fix domain flush size when syncing iotlb (git-fixes).\n- iommu/amd: Fix error handling for pdev_pri_ats_enable() (git-fixes).\n- iommu/arm-smmu-qcom: Limit the SMR groups to 128 (git-fixes).\n- iommu/arm-smmu-v3: Acknowledge pri/event queue overflow if any (git-fixes).\n- iommu/arm-smmu-v3: Work around MMU-600 erratum 1076982 (git-fixes).\n- iommu/fsl: fix all kernel-doc warnings in fsl_pamu.c (git-fixes).\n- iommu/iova: Fix alloc iova overflows issue (git-fixes).\n- iommu/mediatek: Flush IOTLB completely only if domain has been attached (git-fixes).\n- iommu/rockchip: Fix unwind goto issue (git-fixes).\n- iommu/sprd: Release dma buffer to avoid memory leak (git-fixes).\n- iommu/vt-d: Allocate local memory for page request queue (git-fixes).\n- iommu/vt-d: Allow zero SAGAW if second-stage not supported (git-fixes).\n- iommu/vt-d: Fix error handling in sva enable/disable paths (git-fixes).\n- iommu: Fix error unwind in iommu_group_alloc() (git-fixes).\n- ipv6/addrconf: fix a potential refcount underflow for idev (git-fixes).\n- kABI: Adjust trace_iterator.wait_index (git-fixes).\n- kprobes: Fix double free of kretprobe_holder (bsc#1220901).\n- kprobes: Fix possible use-after-free issue on kprobe registration (git-fixes).\n- libnvdimm/of_pmem: Use devm_kstrdup instead of kstrdup and check its return value (git-fixes).\n- libnvdimm/region: Allow setting align attribute on regions without mappings (git-fixes).\n- livepatch: Fix missing newline character in klp_resolve_symbols() (bsc#1223539).\n- md/raid1: fix choose next idle in read_balance() (git-fixes).\n- md: Do not clear MD_CLOSING when the raid is about to stop (git-fixes).\n- md: do not clear MD_RECOVERY_FROZEN for new dm-raid until resume (git-fixes).\n- media: cec: core: remove length check of Timer Status (stable-fixes).\n- media: sta2x11: fix irq handler cast (stable-fixes).\n- mei: me: add arrow lake point H DID (stable-fixes).\n- mei: me: add arrow lake point S DID (stable-fixes).\n- mei: me: disable RPL-S on SPS and IGN firmwares (git-fixes).\n- mm/vmscan: make sure wakeup_kswapd with managed zone (bsc#1223473).\n- mmc: sdhci-msm: pervent access to suspended controller (git-fixes).\n- mtd: diskonchip: work around ubsan link failure (stable-fixes).\n- nd_btt: Make BTT lanes preemptible (git-fixes).\n- net: bridge: vlan: fix memory leak in __allowed_ingress (git-fixes).\n- net: fix a memleak when uncloning an skb dst and its metadata (git-fixes).\n- net: fix skb leak in __skb_tstamp_tx() (git-fixes).\n- net: ipv6: ensure we call ipv6_mc_down() at most once (git-fixes).\n- net: mld: fix reference count leak in mld_{query | report}_work() (git-fixes).\n- net: stream: purge sk_error_queue in sk_stream_kill_queues() (git-fixes).\n- net: usb: ax88179_178a: avoid the interface always configured as random address (git-fixes).\n- net: usb: ax88179_178a: avoid writing the mac address before first reading (git-fixes).\n- net: usb: ax88179_178a: stop lying about skb->truesize (git-fixes).\n- net: vlan: fix underflow for the real_dev refcnt (git-fixes).\n- netfilter: br_netfilter: Drop dst references before setting (git-fixes).\n- netfilter: ipt_CLUSTERIP: fix refcount leak in clusterip_tg_check() (git-fixes).\n- netfilter: nft_ct: fix l3num expectations with inet pseudo family (git-fixes).\n- nfsd: Fixed mount issue with KOTD (bsc#1223380 bsc#1217408 bsc#1223640).\n- nfsd: use __fput_sync() to avoid delayed closing of files (bsc#1223380 bsc#1217408).\n- nilfs2: fix OOB in nilfs_set_de_type (git-fixes).\n- nilfs2: fix OOB in nilfs_set_de_type (git-fixes).\n- nouveau: fix function cast warning (git-fixes).\n- nouveau: fix instmem race condition around ptr stores (git-fixes).\n- nvdimm/namespace: drop nested variable in create_namespace_pmem() (git-fixes).\n- nvdimm: Allow overwrite in the presence of disabled dimms (git-fixes).\n- nvdimm: Fix badblocks clear off-by-one error (git-fixes).\n- nvdimm: Fix dereference after free in register_nvdimm_pmu() (git-fixes).\n- nvdimm: Fix firmware activation deadlock scenarios (git-fixes).\n- nvdimm: Fix memleak of pmu attr_groups in unregister_nvdimm_pmu() (git-fixes).\n- pci_iounmap(): Fix MMIO mapping leak (git-fixes).\n- phy: tegra: xusb: Add API to retrieve the port number of phy (stable-fixes).\n- pinctrl: renesas: checker: Limit cfg reg enum checks to provided IDs (stable-fixes).\n- platform/x86: intel-vbtn: Update tablet mode switch at end of probe (git-fixes).\n- platform/x86: touchscreen_dmi: Add an extra entry for a variant of the Chuwi Vi8 tablet (stable-fixes).\n- powerpc/kasan: Do not instrument non-maskable or raw interrupts (bsc#1223191).\n- powerpc/pseries/iommu: LPAR panics when rebooted with a frozen PE (bsc#1222011 ltc#205900).\n- powerpc/rtas: define pr_fmt and convert printk call sites (bsc#1223369 ltc#205888).\n- powerpc/rtas: export rtas_error_rc() for reuse (bsc#1223369 ltc#205888).\n- powerpc: Avoid nmi_enter/nmi_exit in real mode interrupt (bsc#1221645 ltc#205739 bsc#1223191).\n- powerpc: Refactor verification of MSR_RI (bsc#1223191).\n- printk: Add this_cpu_in_panic() (bsc#1223574).\n- printk: Adjust mapping for 32bit seq macros (bsc#1223574).\n- printk: Avoid non-panic CPUs writing to ringbuffer (bsc#1223574).\n- printk: Disable passing console lock owner completely during panic() (bsc#1223574).\n- printk: Drop console_sem during panic (bsc#1223574).\n- printk: Rename abandon_console_lock_in_panic() to other_cpu_in_panic() (bsc#1223574).\n- printk: Use prb_first_seq() as base for 32bit seq macros (bsc#1223574).\n- printk: Wait for all reserved records with pr_flush() (bsc#1223574).\n- printk: nbcon: Relocate 32bit seq macros (bsc#1223574).\n- printk: ringbuffer: Clarify special lpos values (bsc#1223574).\n- printk: ringbuffer: Cleanup reader terminology (bsc#1223574).\n- printk: ringbuffer: Do not skip non-finalized records with prb_next_seq() (bsc#1223574).\n- printk: ringbuffer: Improve prb_next_seq() performance (bsc#1223574).\n- printk: ringbuffer: Skip non-finalized records in panic (bsc#1223574).\n- pstore/zone: Add a null pointer check to the psz_kmsg_read (stable-fixes).\n- ring-buffer: Do not set shortest_full when full target is hit (git-fixes).\n- ring-buffer: Fix full_waiters_pending in poll (git-fixes).\n- ring-buffer: Fix resetting of shortest_full (git-fixes).\n- ring-buffer: Fix waking up ring buffer readers (git-fixes).\n- ring-buffer: Make wake once of ring_buffer_wait() more robust (git-fixes).\n- ring-buffer: Use wait_event_interruptible() in ring_buffer_wait() (git-fixes).\n- ring-buffer: use READ_ONCE() to read cpu_buffer->commit_page in concurrent environment (git-fixes).\n- s390/cio: Ensure the copied buf is NUL terminated (git-fixes bsc#1223875).\n- s390/decompressor: fix misaligned symbol build error (git-fixes bsc#1223785).\n- s390/mm: Fix clearing storage keys for huge pages (git-fixes bsc#1223877).\n- s390/mm: Fix storage key clearing for guest huge pages (git-fixes bsc#1223878).\n- s390/qeth: Fix kernel panic after setting hsuid (git-fixes bsc#1223879).\n- s390/scm: fix virtual vs physical address confusion (git-fixes bsc#1223784).\n- s390/vdso: Add CFI for RA register to asm macro vdso_func (git-fixes bsc#1223876).\n- s390/vdso: drop '-fPIC' from LDFLAGS (git-fixes bsc#1223598).\n- s390/zcrypt: fix reference counting on zcrypt card objects (git-fixes bsc#1223595).\n- s390: Fixed LPM of lpar failure with error HSCLA2CF in 19th loops (jsc#PED-542 git-fixes bsc#1213573 ltc#203238).\n- s390: Fixed kernel backtrack (bsc#1141539 git-fixes).\n- serial/pmac_zilog: Remove flawed mitigation for rx irq flood (git-fixes).\n- serial: core: Provide port lock wrappers (stable-fixes).\n- serial: core: fix kernel-doc for uart_port_unlock_irqrestore() (git-fixes).\n- serial: mxs-auart: add spinlock around changing cts state (git-fixes).\n- slimbus: qcom-ngd-ctrl: Add timeout for wait operation (git-fixes).\n- speakup: Avoid crash on very long word (git-fixes).\n- speakup: Fix 8bit characters from direct synth (git-fixes).\n- tcp/udp: Fix memleaks of sk and zerocopy skbs with TX timestamp (git-fixes).\n- thunderbolt: Avoid notify PM core about runtime PM resume (stable-fixes).\n- thunderbolt: Fix wake configurations after device unplug (stable-fixes).\n- tracing/net_sched: Fix tracepoints that save qdisc_dev() as a string (git-fixes).\n- tracing/ring-buffer: Fix wait_on_pipe() race (git-fixes).\n- tracing: Have saved_cmdlines arrays all in one allocation (git-fixes).\n- tracing: Remove precision vsnprintf() check from print event (git-fixes).\n- tracing: Show size of requested perf buffer (git-fixes).\n- tracing: Use .flush() call to wake up readers (git-fixes).\n- usb: Disable USB3 LPM at shutdown (stable-fixes).\n- usb: Fix regression caused by invalid ep0 maxpacket in virtual SuperSpeed device (git-fixes).\n- usb: dwc2: host: Fix dereference issue in DDMA completion flow (git-fixes).\n- usb: gadget: composite: fix OS descriptors w_value logic (git-fixes).\n- usb: gadget: f_fs: Fix a race condition when processing setup packets (git-fixes).\n- usb: gadget: f_ncm: Fix UAF ncm object at re-bind after usb ep transport error (stable-fixes).\n- usb: gadget: tegra-xudc: Fix USB3 PHY retrieval logic (git-fixes).\n- usb: ohci: Prevent missed ohci interrupts (git-fixes).\n- usb: sl811-hcd: only defined function checkdone if QUIRK2 is defined (stable-fixes).\n- usb: typec: tcpci: add generic tcpci fallback compatible (stable-fixes).\n- usb: typec: tcpm: Check for port partner validity before consuming it (git-fixes).\n- usb: typec: tcpm: unregister existing source caps before re-registration (bsc#1220569).\n- usb: typec: ucsi: Ack unsupported commands (stable-fixes).\n- usb: typec: ucsi: Clear UCSI_CCI_RESET_COMPLETE before reset (stable-fixes).\n- usb: typec: ucsi: Fix connector check on init (git-fixes).\n- usb: udc: remove warning when queue disabled ep (stable-fixes).\n- vdpa/mlx5: Allow CVQ size changes (git-fixes).\n- virtio: treat alloc_dax() -EOPNOTSUPP failure as non-fatal (bsc#1223949).\n- wifi: ath9k: fix LNA selection in ath_ant_try_scan() (stable-fixes).\n- wifi: iwlwifi: mvm: remove old PASN station when adding a new one (git-fixes).\n- wifi: iwlwifi: mvm: return uid from iwl_mvm_build_scan_cmd (git-fixes).\n- wifi: mac80211: check/clear fast rx for non-4addr sta VLAN changes (stable-fixes).\n- wifi: nl80211: do not free NULL coalescing rule (git-fixes).\n- x86/cpufeatures: Fix dependencies for GFNI, VAES, and VPCLMULQDQ (git-fixes).\n- x86/mm: Ensure input to pfn_to_kaddr() is treated as a 64-bit type (jsc#PED-7167 git-fixes).\n- x86/sev: Skip ROM range scans and validation for SEV-SNP guests (jsc#PED-7167 git-fixes).\n- x86/xen: Add some null pointer checking to smp.c (git-fixes).\n- x86/xen: add CPU dependencies for 32-bit build (git-fixes).\n- x86/xen: fix percpu vcpu_info allocation (git-fixes).\n- xen-netback: properly sync TX responses (git-fixes).\n- xen-netfront: Add missing skb_mark_for_recycle (git-fixes).\n- xen/gntdev: Fix the abuse of underlying struct page in DMA-buf import (git-fixes).\n- xen/xenbus: document will_handle argument for xenbus_watch_path() (git-fixes).\n- xfrm6: fix inet6_dev refcount underflow problem (git-fixes).\n","id":"SUSE-SU-2024:1663-1","modified":"2024-05-15T19:08:39Z","published":"2024-05-15T19:08:39Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2024/suse-su-20241663-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1141539"},{"type":"REPORT","url":"https://bugzilla.suse.com/1177529"},{"type":"REPORT","url":"https://bugzilla.suse.com/1190576"},{"type":"REPORT","url":"https://bugzilla.suse.com/1192145"},{"type":"REPORT","url":"https://bugzilla.suse.com/1192837"},{"type":"REPORT","url":"https://bugzilla.suse.com/1193629"},{"type":"REPORT","url":"https://bugzilla.suse.com/1196869"},{"type":"REPORT","url":"https://bugzilla.suse.com/1200313"},{"type":"REPORT","url":"https://bugzilla.suse.com/1201308"},{"type":"REPORT","url":"https://bugzilla.suse.com/1201489"},{"type":"REPORT","url":"https://bugzilla.suse.com/1203906"},{"type":"REPORT","url":"https://bugzilla.suse.com/1203935"},{"type":"REPORT","url":"https://bugzilla.suse.com/1204614"},{"type":"REPORT","url":"https://bugzilla.suse.com/1207361"},{"type":"REPORT","url":"https://bugzilla.suse.com/1211592"},{"type":"REPORT","url":"https://bugzilla.suse.com/1213573"},{"type":"REPORT","url":"https://bugzilla.suse.com/1217408"},{"type":"REPORT","url":"https://bugzilla.suse.com/1218562"},{"type":"REPORT","url":"https://bugzilla.suse.com/1218917"},{"type":"REPORT","url":"https://bugzilla.suse.com/1219104"},{"type":"REPORT","url":"https://bugzilla.suse.com/1219126"},{"type":"REPORT","url":"https://bugzilla.suse.com/1219141"},{"type":"REPORT","url":"https://bugzilla.suse.com/1219169"},{"type":"REPORT","url":"https://bugzilla.suse.com/1219170"},{"type":"REPORT","url":"https://bugzilla.suse.com/1219264"},{"type":"REPORT","url":"https://bugzilla.suse.com/1220342"},{"type":"REPORT","url":"https://bugzilla.suse.com/1220492"},{"type":"REPORT","url":"https://bugzilla.suse.com/1220569"},{"type":"REPORT","url":"https://bugzilla.suse.com/1220761"},{"type":"REPORT","url":"https://bugzilla.suse.com/1220901"},{"type":"REPORT","url":"https://bugzilla.suse.com/1220915"},{"type":"REPORT","url":"https://bugzilla.suse.com/1220935"},{"type":"REPORT","url":"https://bugzilla.suse.com/1221042"},{"type":"REPORT","url":"https://bugzilla.suse.com/1221044"},{"type":"REPORT","url":"https://bugzilla.suse.com/1221080"},{"type":"REPORT","url":"https://bugzilla.suse.com/1221084"},{"type":"REPORT","url":"https://bugzilla.suse.com/1221088"},{"type":"REPORT","url":"https://bugzilla.suse.com/1221162"},{"type":"REPORT","url":"https://bugzilla.suse.com/1221299"},{"type":"REPORT","url":"https://bugzilla.suse.com/1221612"},{"type":"REPORT","url":"https://bugzilla.suse.com/1221617"},{"type":"REPORT","url":"https://bugzilla.suse.com/1221645"},{"type":"REPORT","url":"https://bugzilla.suse.com/1221791"},{"type":"REPORT","url":"https://bugzilla.suse.com/1221825"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222011"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222051"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222247"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222266"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222294"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222307"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222357"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222368"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222379"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222416"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222422"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222424"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222427"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222428"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222430"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222431"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222435"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222437"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222445"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222449"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222482"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222503"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222520"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222536"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222549"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222550"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222557"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222559"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222585"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222586"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222596"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222609"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222610"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222613"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222615"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222618"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222624"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222630"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222632"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222660"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222662"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222664"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222666"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222669"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222671"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222677"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222678"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222680"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222703"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222704"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222706"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222709"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222710"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222720"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222721"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222724"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222726"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222727"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222764"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222772"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222773"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222776"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222781"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222784"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222785"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222787"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222790"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222791"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222792"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222796"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222798"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222801"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222812"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222824"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222829"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222832"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222836"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222838"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222866"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222867"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222869"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222876"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222878"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222879"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222881"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222883"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222888"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222894"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222901"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222968"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223012"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223014"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223016"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223024"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223030"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223033"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223034"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223035"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223036"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223037"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223041"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223042"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223051"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223052"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223056"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223057"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223058"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223060"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223061"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223065"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223066"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223067"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223068"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223076"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223078"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223111"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223115"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223118"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223187"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223189"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223190"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223191"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223196"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223197"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223198"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223275"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223323"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223369"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223380"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223473"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223474"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223475"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223477"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223478"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223479"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223481"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223482"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223484"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223487"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223490"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223496"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223498"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223499"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223501"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223502"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223503"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223505"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223509"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223511"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223512"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223513"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223516"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223517"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223518"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223519"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223520"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223522"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223523"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223525"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223536"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223539"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223574"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223595"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223598"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223634"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223640"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223643"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223644"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223645"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223646"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223648"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223655"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223657"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223660"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223661"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223663"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223664"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223668"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223686"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223693"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223705"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223714"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223735"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223745"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223784"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223785"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223790"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223816"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223821"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223822"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223824"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223827"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223834"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223875"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223876"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223877"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223878"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223879"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223894"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223921"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223922"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223923"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223924"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223929"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223931"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223932"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223934"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223941"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223948"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223949"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223950"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223951"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223952"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223953"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223956"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223957"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223960"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223962"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223963"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223964"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47047"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47181"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47182"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47183"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47184"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47185"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47187"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47188"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47189"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47191"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47192"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47193"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47194"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47195"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47196"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47197"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47198"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47199"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47200"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47201"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47202"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47203"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47204"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47205"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47206"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47207"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47209"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47210"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47211"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47212"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47214"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47215"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47216"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47217"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47218"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47219"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48631"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48632"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48634"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48636"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48637"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48638"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48639"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48640"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48642"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48644"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48646"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48647"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48648"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48650"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48651"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48652"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48653"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48654"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48655"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48656"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48657"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48658"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48659"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48660"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48662"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48663"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48667"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48668"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48671"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48672"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48673"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48675"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48686"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48687"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48688"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48690"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48692"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48693"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48694"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48695"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48697"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48698"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48700"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48701"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48702"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48703"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48704"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-2860"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52488"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52503"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52561"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52585"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52589"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52590"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52591"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52593"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52614"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52616"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52620"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52627"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52635"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52636"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52645"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52652"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-6270"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-0639"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-0841"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-22099"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-23307"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-23848"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-23850"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26601"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26610"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26656"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26660"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26671"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26673"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26675"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26680"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26681"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26684"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26685"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26687"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26688"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26689"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26696"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26697"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26702"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26704"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26718"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26722"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26727"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26733"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26736"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26737"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26739"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26743"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26744"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26745"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26747"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26749"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26751"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26754"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26760"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-267600"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26763"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26764"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26766"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26769"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26771"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26772"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26773"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26776"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26779"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26783"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26787"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26790"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26792"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26793"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26798"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26805"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26807"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26816"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26817"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26820"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26825"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26830"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26833"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26836"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26843"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26848"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26852"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26853"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26855"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26856"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26857"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26861"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26862"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26866"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26872"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26875"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26878"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26879"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26881"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26882"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26883"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26884"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26885"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26891"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26893"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26895"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26896"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26897"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26898"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26901"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26903"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26917"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26927"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26948"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26950"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26951"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26955"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26956"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26960"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26965"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26966"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26969"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26970"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26972"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26981"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26982"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26993"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-27013"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-27014"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-27030"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-27038"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-27039"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-27041"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-27043"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-27046"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-27056"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-27062"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-27389"}],"related":["CVE-2021-47047","CVE-2021-47181","CVE-2021-47182","CVE-2021-47183","CVE-2021-47184","CVE-2021-47185","CVE-2021-47187","CVE-2021-47188","CVE-2021-47189","CVE-2021-47191","CVE-2021-47192","CVE-2021-47193","CVE-2021-47194","CVE-2021-47195","CVE-2021-47196","CVE-2021-47197","CVE-2021-47198","CVE-2021-47199","CVE-2021-47200","CVE-2021-47201","CVE-2021-47202","CVE-2021-47203","CVE-2021-47204","CVE-2021-47205","CVE-2021-47206","CVE-2021-47207","CVE-2021-47209","CVE-2021-47210","CVE-2021-47211","CVE-2021-47212","CVE-2021-47214","CVE-2021-47215","CVE-2021-47216","CVE-2021-47217","CVE-2021-47218","CVE-2021-47219","CVE-2022-48631","CVE-2022-48632","CVE-2022-48634","CVE-2022-48636","CVE-2022-48637","CVE-2022-48638","CVE-2022-48639","CVE-2022-48640","CVE-2022-48642","CVE-2022-48644","CVE-2022-48646","CVE-2022-48647","CVE-2022-48648","CVE-2022-48650","CVE-2022-48651","CVE-2022-48652","CVE-2022-48653","CVE-2022-48654","CVE-2022-48655","CVE-2022-48656","CVE-2022-48657","CVE-2022-48658","CVE-2022-48659","CVE-2022-48660","CVE-2022-48662","CVE-2022-48663","CVE-2022-48667","CVE-2022-48668","CVE-2022-48671","CVE-2022-48672","CVE-2022-48673","CVE-2022-48675","CVE-2022-48686","CVE-2022-48687","CVE-2022-48688","CVE-2022-48690","CVE-2022-48692","CVE-2022-48693","CVE-2022-48694","CVE-2022-48695","CVE-2022-48697","CVE-2022-48698","CVE-2022-48700","CVE-2022-48701","CVE-2022-48702","CVE-2022-48703","CVE-2022-48704","CVE-2023-2860","CVE-2023-52488","CVE-2023-52503","CVE-2023-52561","CVE-2023-52585","CVE-2023-52589","CVE-2023-52590","CVE-2023-52591","CVE-2023-52593","CVE-2023-52614","CVE-2023-52616","CVE-2023-52620","CVE-2023-52627","CVE-2023-52635","CVE-2023-52636","CVE-2023-52645","CVE-2023-52652","CVE-2023-6270","CVE-2024-0639","CVE-2024-0841","CVE-2024-22099","CVE-2024-23307","CVE-2024-23848","CVE-2024-23850","CVE-2024-26601","CVE-2024-26610","CVE-2024-26656","CVE-2024-26660","CVE-2024-26671","CVE-2024-26673","CVE-2024-26675","CVE-2024-26680","CVE-2024-26681","CVE-2024-26684","CVE-2024-26685","CVE-2024-26687","CVE-2024-26688","CVE-2024-26689","CVE-2024-26696","CVE-2024-26697","CVE-2024-26702","CVE-2024-26704","CVE-2024-26718","CVE-2024-26722","CVE-2024-26727","CVE-2024-26733","CVE-2024-26736","CVE-2024-26737","CVE-2024-26739","CVE-2024-26743","CVE-2024-26744","CVE-2024-26745","CVE-2024-26747","CVE-2024-26749","CVE-2024-26751","CVE-2024-26754","CVE-2024-26760","CVE-2024-267600","CVE-2024-26763","CVE-2024-26764","CVE-2024-26766","CVE-2024-26769","CVE-2024-26771","CVE-2024-26772","CVE-2024-26773","CVE-2024-26776","CVE-2024-26779","CVE-2024-26783","CVE-2024-26787","CVE-2024-26790","CVE-2024-26792","CVE-2024-26793","CVE-2024-26798","CVE-2024-26805","CVE-2024-26807","CVE-2024-26816","CVE-2024-26817","CVE-2024-26820","CVE-2024-26825","CVE-2024-26830","CVE-2024-26833","CVE-2024-26836","CVE-2024-26843","CVE-2024-26848","CVE-2024-26852","CVE-2024-26853","CVE-2024-26855","CVE-2024-26856","CVE-2024-26857","CVE-2024-26861","CVE-2024-26862","CVE-2024-26866","CVE-2024-26872","CVE-2024-26875","CVE-2024-26878","CVE-2024-26879","CVE-2024-26881","CVE-2024-26882","CVE-2024-26883","CVE-2024-26884","CVE-2024-26885","CVE-2024-26891","CVE-2024-26893","CVE-2024-26895","CVE-2024-26896","CVE-2024-26897","CVE-2024-26898","CVE-2024-26901","CVE-2024-26903","CVE-2024-26917","CVE-2024-26927","CVE-2024-26948","CVE-2024-26950","CVE-2024-26951","CVE-2024-26955","CVE-2024-26956","CVE-2024-26960","CVE-2024-26965","CVE-2024-26966","CVE-2024-26969","CVE-2024-26970","CVE-2024-26972","CVE-2024-26981","CVE-2024-26982","CVE-2024-26993","CVE-2024-27013","CVE-2024-27014","CVE-2024-27030","CVE-2024-27038","CVE-2024-27039","CVE-2024-27041","CVE-2024-27043","CVE-2024-27046","CVE-2024-27056","CVE-2024-27062","CVE-2024-27389"],"summary":"Security update for the Linux Kernel","upstream":["CVE-2021-47047","CVE-2021-47181","CVE-2021-47182","CVE-2021-47183","CVE-2021-47184","CVE-2021-47185","CVE-2021-47187","CVE-2021-47188","CVE-2021-47189","CVE-2021-47191","CVE-2021-47192","CVE-2021-47193","CVE-2021-47194","CVE-2021-47195","CVE-2021-47196","CVE-2021-47197","CVE-2021-47198","CVE-2021-47199","CVE-2021-47200","CVE-2021-47201","CVE-2021-47202","CVE-2021-47203","CVE-2021-47204","CVE-2021-47205","CVE-2021-47206","CVE-2021-47207","CVE-2021-47209","CVE-2021-47210","CVE-2021-47211","CVE-2021-47212","CVE-2021-47214","CVE-2021-47215","CVE-2021-47216","CVE-2021-47217","CVE-2021-47218","CVE-2021-47219","CVE-2022-48631","CVE-2022-48632","CVE-2022-48634","CVE-2022-48636","CVE-2022-48637","CVE-2022-48638","CVE-2022-48639","CVE-2022-48640","CVE-2022-48642","CVE-2022-48644","CVE-2022-48646","CVE-2022-48647","CVE-2022-48648","CVE-2022-48650","CVE-2022-48651","CVE-2022-48652","CVE-2022-48653","CVE-2022-48654","CVE-2022-48655","CVE-2022-48656","CVE-2022-48657","CVE-2022-48658","CVE-2022-48659","CVE-2022-48660","CVE-2022-48662","CVE-2022-48663","CVE-2022-48667","CVE-2022-48668","CVE-2022-48671","CVE-2022-48672","CVE-2022-48673","CVE-2022-48675","CVE-2022-48686","CVE-2022-48687","CVE-2022-48688","CVE-2022-48690","CVE-2022-48692","CVE-2022-48693","CVE-2022-48694","CVE-2022-48695","CVE-2022-48697","CVE-2022-48698","CVE-2022-48700","CVE-2022-48701","CVE-2022-48702","CVE-2022-48703","CVE-2022-48704","CVE-2023-2860","CVE-2023-52488","CVE-2023-52503","CVE-2023-52561","CVE-2023-52585","CVE-2023-52589","CVE-2023-52590","CVE-2023-52591","CVE-2023-52593","CVE-2023-52614","CVE-2023-52616","CVE-2023-52620","CVE-2023-52627","CVE-2023-52635","CVE-2023-52636","CVE-2023-52645","CVE-2023-52652","CVE-2023-6270","CVE-2024-0639","CVE-2024-0841","CVE-2024-22099","CVE-2024-23307","CVE-2024-23848","CVE-2024-23850","CVE-2024-26601","CVE-2024-26610","CVE-2024-26656","CVE-2024-26660","CVE-2024-26671","CVE-2024-26673","CVE-2024-26675","CVE-2024-26680","CVE-2024-26681","CVE-2024-26684","CVE-2024-26685","CVE-2024-26687","CVE-2024-26688","CVE-2024-26689","CVE-2024-26696","CVE-2024-26697","CVE-2024-26702","CVE-2024-26704","CVE-2024-26718","CVE-2024-26722","CVE-2024-26727","CVE-2024-26733","CVE-2024-26736","CVE-2024-26737","CVE-2024-26739","CVE-2024-26743","CVE-2024-26744","CVE-2024-26745","CVE-2024-26747","CVE-2024-26749","CVE-2024-26751","CVE-2024-26754","CVE-2024-26760","CVE-2024-267600","CVE-2024-26763","CVE-2024-26764","CVE-2024-26766","CVE-2024-26769","CVE-2024-26771","CVE-2024-26772","CVE-2024-26773","CVE-2024-26776","CVE-2024-26779","CVE-2024-26783","CVE-2024-26787","CVE-2024-26790","CVE-2024-26792","CVE-2024-26793","CVE-2024-26798","CVE-2024-26805","CVE-2024-26807","CVE-2024-26816","CVE-2024-26817","CVE-2024-26820","CVE-2024-26825","CVE-2024-26830","CVE-2024-26833","CVE-2024-26836","CVE-2024-26843","CVE-2024-26848","CVE-2024-26852","CVE-2024-26853","CVE-2024-26855","CVE-2024-26856","CVE-2024-26857","CVE-2024-26861","CVE-2024-26862","CVE-2024-26866","CVE-2024-26872","CVE-2024-26875","CVE-2024-26878","CVE-2024-26879","CVE-2024-26881","CVE-2024-26882","CVE-2024-26883","CVE-2024-26884","CVE-2024-26885","CVE-2024-26891","CVE-2024-26893","CVE-2024-26895","CVE-2024-26896","CVE-2024-26897","CVE-2024-26898","CVE-2024-26901","CVE-2024-26903","CVE-2024-26917","CVE-2024-26927","CVE-2024-26948","CVE-2024-26950","CVE-2024-26951","CVE-2024-26955","CVE-2024-26956","CVE-2024-26960","CVE-2024-26965","CVE-2024-26966","CVE-2024-26969","CVE-2024-26970","CVE-2024-26972","CVE-2024-26981","CVE-2024-26982","CVE-2024-26993","CVE-2024-27013","CVE-2024-27014","CVE-2024-27030","CVE-2024-27038","CVE-2024-27039","CVE-2024-27041","CVE-2024-27043","CVE-2024-27046","CVE-2024-27056","CVE-2024-27062","CVE-2024-27389"]}