{"affected":[{"ecosystem_specific":{"binaries":[{"kernel-64kb":"6.4.0-150600.23.22.1","kernel-64kb-devel":"6.4.0-150600.23.22.1","kernel-default":"6.4.0-150600.23.22.1","kernel-default-base":"6.4.0-150600.23.22.1.150600.12.8.3","kernel-default-devel":"6.4.0-150600.23.22.1","kernel-devel":"6.4.0-150600.23.22.1","kernel-macros":"6.4.0-150600.23.22.1","kernel-zfcpdump":"6.4.0-150600.23.22.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for Basesystem 15 SP6","name":"kernel-64kb","purl":"pkg:rpm/suse/kernel-64kb&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP6"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"6.4.0-150600.23.22.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-64kb":"6.4.0-150600.23.22.1","kernel-64kb-devel":"6.4.0-150600.23.22.1","kernel-default":"6.4.0-150600.23.22.1","kernel-default-base":"6.4.0-150600.23.22.1.150600.12.8.3","kernel-default-devel":"6.4.0-150600.23.22.1","kernel-devel":"6.4.0-150600.23.22.1","kernel-macros":"6.4.0-150600.23.22.1","kernel-zfcpdump":"6.4.0-150600.23.22.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for Basesystem 15 SP6","name":"kernel-default","purl":"pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP6"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"6.4.0-150600.23.22.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-64kb":"6.4.0-150600.23.22.1","kernel-64kb-devel":"6.4.0-150600.23.22.1","kernel-default":"6.4.0-150600.23.22.1","kernel-default-base":"6.4.0-150600.23.22.1.150600.12.8.3","kernel-default-devel":"6.4.0-150600.23.22.1","kernel-devel":"6.4.0-150600.23.22.1","kernel-macros":"6.4.0-150600.23.22.1","kernel-zfcpdump":"6.4.0-150600.23.22.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for Basesystem 15 SP6","name":"kernel-default-base","purl":"pkg:rpm/suse/kernel-default-base&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP6"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"6.4.0-150600.23.22.1.150600.12.8.3"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-64kb":"6.4.0-150600.23.22.1","kernel-64kb-devel":"6.4.0-150600.23.22.1","kernel-default":"6.4.0-150600.23.22.1","kernel-default-base":"6.4.0-150600.23.22.1.150600.12.8.3","kernel-default-devel":"6.4.0-150600.23.22.1","kernel-devel":"6.4.0-150600.23.22.1","kernel-macros":"6.4.0-150600.23.22.1","kernel-zfcpdump":"6.4.0-150600.23.22.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for Basesystem 15 SP6","name":"kernel-source","purl":"pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP6"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"6.4.0-150600.23.22.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-64kb":"6.4.0-150600.23.22.1","kernel-64kb-devel":"6.4.0-150600.23.22.1","kernel-default":"6.4.0-150600.23.22.1","kernel-default-base":"6.4.0-150600.23.22.1.150600.12.8.3","kernel-default-devel":"6.4.0-150600.23.22.1","kernel-devel":"6.4.0-150600.23.22.1","kernel-macros":"6.4.0-150600.23.22.1","kernel-zfcpdump":"6.4.0-150600.23.22.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for Basesystem 15 SP6","name":"kernel-zfcpdump","purl":"pkg:rpm/suse/kernel-zfcpdump&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP6"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"6.4.0-150600.23.22.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-docs":"6.4.0-150600.23.22.1","kernel-obs-build":"6.4.0-150600.23.22.1","kernel-source":"6.4.0-150600.23.22.1","kernel-syms":"6.4.0-150600.23.22.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for Development Tools 15 SP6","name":"kernel-docs","purl":"pkg:rpm/suse/kernel-docs&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Development%20Tools%2015%20SP6"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"6.4.0-150600.23.22.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-docs":"6.4.0-150600.23.22.1","kernel-obs-build":"6.4.0-150600.23.22.1","kernel-source":"6.4.0-150600.23.22.1","kernel-syms":"6.4.0-150600.23.22.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for Development Tools 15 SP6","name":"kernel-obs-build","purl":"pkg:rpm/suse/kernel-obs-build&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Development%20Tools%2015%20SP6"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"6.4.0-150600.23.22.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-docs":"6.4.0-150600.23.22.1","kernel-obs-build":"6.4.0-150600.23.22.1","kernel-source":"6.4.0-150600.23.22.1","kernel-syms":"6.4.0-150600.23.22.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for Development Tools 15 SP6","name":"kernel-source","purl":"pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Development%20Tools%2015%20SP6"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"6.4.0-150600.23.22.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-docs":"6.4.0-150600.23.22.1","kernel-obs-build":"6.4.0-150600.23.22.1","kernel-source":"6.4.0-150600.23.22.1","kernel-syms":"6.4.0-150600.23.22.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for Development Tools 15 SP6","name":"kernel-syms","purl":"pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Development%20Tools%2015%20SP6"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"6.4.0-150600.23.22.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"reiserfs-kmp-default":"6.4.0-150600.23.22.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for Legacy 15 SP6","name":"kernel-default","purl":"pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Legacy%2015%20SP6"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"6.4.0-150600.23.22.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default-livepatch":"6.4.0-150600.23.22.1","kernel-default-livepatch-devel":"6.4.0-150600.23.22.1","kernel-livepatch-6_4_0-150600_23_22-default":"1-150600.13.3.3"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Live Patching 15 SP6","name":"kernel-default","purl":"pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015%20SP6"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"6.4.0-150600.23.22.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default-livepatch":"6.4.0-150600.23.22.1","kernel-default-livepatch-devel":"6.4.0-150600.23.22.1","kernel-livepatch-6_4_0-150600_23_22-default":"1-150600.13.3.3"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Live Patching 15 SP6","name":"kernel-livepatch-SLE15-SP6_Update_4","purl":"pkg:rpm/suse/kernel-livepatch-SLE15-SP6_Update_4&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015%20SP6"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1-150600.13.3.3"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-default":"6.4.0-150600.23.22.1","dlm-kmp-default":"6.4.0-150600.23.22.1","gfs2-kmp-default":"6.4.0-150600.23.22.1","ocfs2-kmp-default":"6.4.0-150600.23.22.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise High Availability Extension 15 SP6","name":"kernel-default","purl":"pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20High%20Availability%20Extension%2015%20SP6"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"6.4.0-150600.23.22.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default-extra":"6.4.0-150600.23.22.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Workstation Extension 15 SP6","name":"kernel-default","purl":"pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Workstation%20Extension%2015%20SP6"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"6.4.0-150600.23.22.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-64kb":"6.4.0-150600.23.22.1","cluster-md-kmp-default":"6.4.0-150600.23.22.1","dlm-kmp-64kb":"6.4.0-150600.23.22.1","dlm-kmp-default":"6.4.0-150600.23.22.1","dtb-allwinner":"6.4.0-150600.23.22.1","dtb-altera":"6.4.0-150600.23.22.1","dtb-amazon":"6.4.0-150600.23.22.1","dtb-amd":"6.4.0-150600.23.22.1","dtb-amlogic":"6.4.0-150600.23.22.1","dtb-apm":"6.4.0-150600.23.22.1","dtb-apple":"6.4.0-150600.23.22.1","dtb-arm":"6.4.0-150600.23.22.1","dtb-broadcom":"6.4.0-150600.23.22.1","dtb-cavium":"6.4.0-150600.23.22.1","dtb-exynos":"6.4.0-150600.23.22.1","dtb-freescale":"6.4.0-150600.23.22.1","dtb-hisilicon":"6.4.0-150600.23.22.1","dtb-lg":"6.4.0-150600.23.22.1","dtb-marvell":"6.4.0-150600.23.22.1","dtb-mediatek":"6.4.0-150600.23.22.1","dtb-nvidia":"6.4.0-150600.23.22.1","dtb-qcom":"6.4.0-150600.23.22.1","dtb-renesas":"6.4.0-150600.23.22.1","dtb-rockchip":"6.4.0-150600.23.22.1","dtb-socionext":"6.4.0-150600.23.22.1","dtb-sprd":"6.4.0-150600.23.22.1","dtb-xilinx":"6.4.0-150600.23.22.1","gfs2-kmp-64kb":"6.4.0-150600.23.22.1","gfs2-kmp-default":"6.4.0-150600.23.22.1","kernel-64kb":"6.4.0-150600.23.22.1","kernel-64kb-devel":"6.4.0-150600.23.22.1","kernel-64kb-extra":"6.4.0-150600.23.22.1","kernel-64kb-livepatch-devel":"6.4.0-150600.23.22.1","kernel-64kb-optional":"6.4.0-150600.23.22.1","kernel-debug":"6.4.0-150600.23.22.1","kernel-debug-devel":"6.4.0-150600.23.22.1","kernel-debug-livepatch-devel":"6.4.0-150600.23.22.1","kernel-debug-vdso":"6.4.0-150600.23.22.1","kernel-default":"6.4.0-150600.23.22.1","kernel-default-base":"6.4.0-150600.23.22.1.150600.12.8.3","kernel-default-base-rebuild":"6.4.0-150600.23.22.1.150600.12.8.3","kernel-default-devel":"6.4.0-150600.23.22.1","kernel-default-extra":"6.4.0-150600.23.22.1","kernel-default-livepatch":"6.4.0-150600.23.22.1","kernel-default-livepatch-devel":"6.4.0-150600.23.22.1","kernel-default-optional":"6.4.0-150600.23.22.1","kernel-default-vdso":"6.4.0-150600.23.22.1","kernel-devel":"6.4.0-150600.23.22.1","kernel-docs":"6.4.0-150600.23.22.1","kernel-docs-html":"6.4.0-150600.23.22.1","kernel-kvmsmall":"6.4.0-150600.23.22.1","kernel-kvmsmall-devel":"6.4.0-150600.23.22.1","kernel-kvmsmall-livepatch-devel":"6.4.0-150600.23.22.1","kernel-kvmsmall-vdso":"6.4.0-150600.23.22.1","kernel-macros":"6.4.0-150600.23.22.1","kernel-obs-build":"6.4.0-150600.23.22.1","kernel-obs-qa":"6.4.0-150600.23.22.1","kernel-source":"6.4.0-150600.23.22.1","kernel-source-vanilla":"6.4.0-150600.23.22.1","kernel-syms":"6.4.0-150600.23.22.1","kernel-zfcpdump":"6.4.0-150600.23.22.1","kselftests-kmp-64kb":"6.4.0-150600.23.22.1","kselftests-kmp-default":"6.4.0-150600.23.22.1","ocfs2-kmp-64kb":"6.4.0-150600.23.22.1","ocfs2-kmp-default":"6.4.0-150600.23.22.1","reiserfs-kmp-64kb":"6.4.0-150600.23.22.1","reiserfs-kmp-default":"6.4.0-150600.23.22.1"}]},"package":{"ecosystem":"openSUSE:Leap 15.6","name":"dtb-aarch64","purl":"pkg:rpm/opensuse/dtb-aarch64&distro=openSUSE%20Leap%2015.6"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"6.4.0-150600.23.22.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-64kb":"6.4.0-150600.23.22.1","cluster-md-kmp-default":"6.4.0-150600.23.22.1","dlm-kmp-64kb":"6.4.0-150600.23.22.1","dlm-kmp-default":"6.4.0-150600.23.22.1","dtb-allwinner":"6.4.0-150600.23.22.1","dtb-altera":"6.4.0-150600.23.22.1","dtb-amazon":"6.4.0-150600.23.22.1","dtb-amd":"6.4.0-150600.23.22.1","dtb-amlogic":"6.4.0-150600.23.22.1","dtb-apm":"6.4.0-150600.23.22.1","dtb-apple":"6.4.0-150600.23.22.1","dtb-arm":"6.4.0-150600.23.22.1","dtb-broadcom":"6.4.0-150600.23.22.1","dtb-cavium":"6.4.0-150600.23.22.1","dtb-exynos":"6.4.0-150600.23.22.1","dtb-freescale":"6.4.0-150600.23.22.1","dtb-hisilicon":"6.4.0-150600.23.22.1","dtb-lg":"6.4.0-150600.23.22.1","dtb-marvell":"6.4.0-150600.23.22.1","dtb-mediatek":"6.4.0-150600.23.22.1","dtb-nvidia":"6.4.0-150600.23.22.1","dtb-qcom":"6.4.0-150600.23.22.1","dtb-renesas":"6.4.0-150600.23.22.1","dtb-rockchip":"6.4.0-150600.23.22.1","dtb-socionext":"6.4.0-150600.23.22.1","dtb-sprd":"6.4.0-150600.23.22.1","dtb-xilinx":"6.4.0-150600.23.22.1","gfs2-kmp-64kb":"6.4.0-150600.23.22.1","gfs2-kmp-default":"6.4.0-150600.23.22.1","kernel-64kb":"6.4.0-150600.23.22.1","kernel-64kb-devel":"6.4.0-150600.23.22.1","kernel-64kb-extra":"6.4.0-150600.23.22.1","kernel-64kb-livepatch-devel":"6.4.0-150600.23.22.1","kernel-64kb-optional":"6.4.0-150600.23.22.1","kernel-debug":"6.4.0-150600.23.22.1","kernel-debug-devel":"6.4.0-150600.23.22.1","kernel-debug-livepatch-devel":"6.4.0-150600.23.22.1","kernel-debug-vdso":"6.4.0-150600.23.22.1","kernel-default":"6.4.0-150600.23.22.1","kernel-default-base":"6.4.0-150600.23.22.1.150600.12.8.3","kernel-default-base-rebuild":"6.4.0-150600.23.22.1.150600.12.8.3","kernel-default-devel":"6.4.0-150600.23.22.1","kernel-default-extra":"6.4.0-150600.23.22.1","kernel-default-livepatch":"6.4.0-150600.23.22.1","kernel-default-livepatch-devel":"6.4.0-150600.23.22.1","kernel-default-optional":"6.4.0-150600.23.22.1","kernel-default-vdso":"6.4.0-150600.23.22.1","kernel-devel":"6.4.0-150600.23.22.1","kernel-docs":"6.4.0-150600.23.22.1","kernel-docs-html":"6.4.0-150600.23.22.1","kernel-kvmsmall":"6.4.0-150600.23.22.1","kernel-kvmsmall-devel":"6.4.0-150600.23.22.1","kernel-kvmsmall-livepatch-devel":"6.4.0-150600.23.22.1","kernel-kvmsmall-vdso":"6.4.0-150600.23.22.1","kernel-macros":"6.4.0-150600.23.22.1","kernel-obs-build":"6.4.0-150600.23.22.1","kernel-obs-qa":"6.4.0-150600.23.22.1","kernel-source":"6.4.0-150600.23.22.1","kernel-source-vanilla":"6.4.0-150600.23.22.1","kernel-syms":"6.4.0-150600.23.22.1","kernel-zfcpdump":"6.4.0-150600.23.22.1","kselftests-kmp-64kb":"6.4.0-150600.23.22.1","kselftests-kmp-default":"6.4.0-150600.23.22.1","ocfs2-kmp-64kb":"6.4.0-150600.23.22.1","ocfs2-kmp-default":"6.4.0-150600.23.22.1","reiserfs-kmp-64kb":"6.4.0-150600.23.22.1","reiserfs-kmp-default":"6.4.0-150600.23.22.1"}]},"package":{"ecosystem":"openSUSE:Leap 15.6","name":"kernel-64kb","purl":"pkg:rpm/opensuse/kernel-64kb&distro=openSUSE%20Leap%2015.6"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"6.4.0-150600.23.22.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-64kb":"6.4.0-150600.23.22.1","cluster-md-kmp-default":"6.4.0-150600.23.22.1","dlm-kmp-64kb":"6.4.0-150600.23.22.1","dlm-kmp-default":"6.4.0-150600.23.22.1","dtb-allwinner":"6.4.0-150600.23.22.1","dtb-altera":"6.4.0-150600.23.22.1","dtb-amazon":"6.4.0-150600.23.22.1","dtb-amd":"6.4.0-150600.23.22.1","dtb-amlogic":"6.4.0-150600.23.22.1","dtb-apm":"6.4.0-150600.23.22.1","dtb-apple":"6.4.0-150600.23.22.1","dtb-arm":"6.4.0-150600.23.22.1","dtb-broadcom":"6.4.0-150600.23.22.1","dtb-cavium":"6.4.0-150600.23.22.1","dtb-exynos":"6.4.0-150600.23.22.1","dtb-freescale":"6.4.0-150600.23.22.1","dtb-hisilicon":"6.4.0-150600.23.22.1","dtb-lg":"6.4.0-150600.23.22.1","dtb-marvell":"6.4.0-150600.23.22.1","dtb-mediatek":"6.4.0-150600.23.22.1","dtb-nvidia":"6.4.0-150600.23.22.1","dtb-qcom":"6.4.0-150600.23.22.1","dtb-renesas":"6.4.0-150600.23.22.1","dtb-rockchip":"6.4.0-150600.23.22.1","dtb-socionext":"6.4.0-150600.23.22.1","dtb-sprd":"6.4.0-150600.23.22.1","dtb-xilinx":"6.4.0-150600.23.22.1","gfs2-kmp-64kb":"6.4.0-150600.23.22.1","gfs2-kmp-default":"6.4.0-150600.23.22.1","kernel-64kb":"6.4.0-150600.23.22.1","kernel-64kb-devel":"6.4.0-150600.23.22.1","kernel-64kb-extra":"6.4.0-150600.23.22.1","kernel-64kb-livepatch-devel":"6.4.0-150600.23.22.1","kernel-64kb-optional":"6.4.0-150600.23.22.1","kernel-debug":"6.4.0-150600.23.22.1","kernel-debug-devel":"6.4.0-150600.23.22.1","kernel-debug-livepatch-devel":"6.4.0-150600.23.22.1","kernel-debug-vdso":"6.4.0-150600.23.22.1","kernel-default":"6.4.0-150600.23.22.1","kernel-default-base":"6.4.0-150600.23.22.1.150600.12.8.3","kernel-default-base-rebuild":"6.4.0-150600.23.22.1.150600.12.8.3","kernel-default-devel":"6.4.0-150600.23.22.1","kernel-default-extra":"6.4.0-150600.23.22.1","kernel-default-livepatch":"6.4.0-150600.23.22.1","kernel-default-livepatch-devel":"6.4.0-150600.23.22.1","kernel-default-optional":"6.4.0-150600.23.22.1","kernel-default-vdso":"6.4.0-150600.23.22.1","kernel-devel":"6.4.0-150600.23.22.1","kernel-docs":"6.4.0-150600.23.22.1","kernel-docs-html":"6.4.0-150600.23.22.1","kernel-kvmsmall":"6.4.0-150600.23.22.1","kernel-kvmsmall-devel":"6.4.0-150600.23.22.1","kernel-kvmsmall-livepatch-devel":"6.4.0-150600.23.22.1","kernel-kvmsmall-vdso":"6.4.0-150600.23.22.1","kernel-macros":"6.4.0-150600.23.22.1","kernel-obs-build":"6.4.0-150600.23.22.1","kernel-obs-qa":"6.4.0-150600.23.22.1","kernel-source":"6.4.0-150600.23.22.1","kernel-source-vanilla":"6.4.0-150600.23.22.1","kernel-syms":"6.4.0-150600.23.22.1","kernel-zfcpdump":"6.4.0-150600.23.22.1","kselftests-kmp-64kb":"6.4.0-150600.23.22.1","kselftests-kmp-default":"6.4.0-150600.23.22.1","ocfs2-kmp-64kb":"6.4.0-150600.23.22.1","ocfs2-kmp-default":"6.4.0-150600.23.22.1","reiserfs-kmp-64kb":"6.4.0-150600.23.22.1","reiserfs-kmp-default":"6.4.0-150600.23.22.1"}]},"package":{"ecosystem":"openSUSE:Leap 15.6","name":"kernel-debug","purl":"pkg:rpm/opensuse/kernel-debug&distro=openSUSE%20Leap%2015.6"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"6.4.0-150600.23.22.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-64kb":"6.4.0-150600.23.22.1","cluster-md-kmp-default":"6.4.0-150600.23.22.1","dlm-kmp-64kb":"6.4.0-150600.23.22.1","dlm-kmp-default":"6.4.0-150600.23.22.1","dtb-allwinner":"6.4.0-150600.23.22.1","dtb-altera":"6.4.0-150600.23.22.1","dtb-amazon":"6.4.0-150600.23.22.1","dtb-amd":"6.4.0-150600.23.22.1","dtb-amlogic":"6.4.0-150600.23.22.1","dtb-apm":"6.4.0-150600.23.22.1","dtb-apple":"6.4.0-150600.23.22.1","dtb-arm":"6.4.0-150600.23.22.1","dtb-broadcom":"6.4.0-150600.23.22.1","dtb-cavium":"6.4.0-150600.23.22.1","dtb-exynos":"6.4.0-150600.23.22.1","dtb-freescale":"6.4.0-150600.23.22.1","dtb-hisilicon":"6.4.0-150600.23.22.1","dtb-lg":"6.4.0-150600.23.22.1","dtb-marvell":"6.4.0-150600.23.22.1","dtb-mediatek":"6.4.0-150600.23.22.1","dtb-nvidia":"6.4.0-150600.23.22.1","dtb-qcom":"6.4.0-150600.23.22.1","dtb-renesas":"6.4.0-150600.23.22.1","dtb-rockchip":"6.4.0-150600.23.22.1","dtb-socionext":"6.4.0-150600.23.22.1","dtb-sprd":"6.4.0-150600.23.22.1","dtb-xilinx":"6.4.0-150600.23.22.1","gfs2-kmp-64kb":"6.4.0-150600.23.22.1","gfs2-kmp-default":"6.4.0-150600.23.22.1","kernel-64kb":"6.4.0-150600.23.22.1","kernel-64kb-devel":"6.4.0-150600.23.22.1","kernel-64kb-extra":"6.4.0-150600.23.22.1","kernel-64kb-livepatch-devel":"6.4.0-150600.23.22.1","kernel-64kb-optional":"6.4.0-150600.23.22.1","kernel-debug":"6.4.0-150600.23.22.1","kernel-debug-devel":"6.4.0-150600.23.22.1","kernel-debug-livepatch-devel":"6.4.0-150600.23.22.1","kernel-debug-vdso":"6.4.0-150600.23.22.1","kernel-default":"6.4.0-150600.23.22.1","kernel-default-base":"6.4.0-150600.23.22.1.150600.12.8.3","kernel-default-base-rebuild":"6.4.0-150600.23.22.1.150600.12.8.3","kernel-default-devel":"6.4.0-150600.23.22.1","kernel-default-extra":"6.4.0-150600.23.22.1","kernel-default-livepatch":"6.4.0-150600.23.22.1","kernel-default-livepatch-devel":"6.4.0-150600.23.22.1","kernel-default-optional":"6.4.0-150600.23.22.1","kernel-default-vdso":"6.4.0-150600.23.22.1","kernel-devel":"6.4.0-150600.23.22.1","kernel-docs":"6.4.0-150600.23.22.1","kernel-docs-html":"6.4.0-150600.23.22.1","kernel-kvmsmall":"6.4.0-150600.23.22.1","kernel-kvmsmall-devel":"6.4.0-150600.23.22.1","kernel-kvmsmall-livepatch-devel":"6.4.0-150600.23.22.1","kernel-kvmsmall-vdso":"6.4.0-150600.23.22.1","kernel-macros":"6.4.0-150600.23.22.1","kernel-obs-build":"6.4.0-150600.23.22.1","kernel-obs-qa":"6.4.0-150600.23.22.1","kernel-source":"6.4.0-150600.23.22.1","kernel-source-vanilla":"6.4.0-150600.23.22.1","kernel-syms":"6.4.0-150600.23.22.1","kernel-zfcpdump":"6.4.0-150600.23.22.1","kselftests-kmp-64kb":"6.4.0-150600.23.22.1","kselftests-kmp-default":"6.4.0-150600.23.22.1","ocfs2-kmp-64kb":"6.4.0-150600.23.22.1","ocfs2-kmp-default":"6.4.0-150600.23.22.1","reiserfs-kmp-64kb":"6.4.0-150600.23.22.1","reiserfs-kmp-default":"6.4.0-150600.23.22.1"}]},"package":{"ecosystem":"openSUSE:Leap 15.6","name":"kernel-default","purl":"pkg:rpm/opensuse/kernel-default&distro=openSUSE%20Leap%2015.6"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"6.4.0-150600.23.22.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-64kb":"6.4.0-150600.23.22.1","cluster-md-kmp-default":"6.4.0-150600.23.22.1","dlm-kmp-64kb":"6.4.0-150600.23.22.1","dlm-kmp-default":"6.4.0-150600.23.22.1","dtb-allwinner":"6.4.0-150600.23.22.1","dtb-altera":"6.4.0-150600.23.22.1","dtb-amazon":"6.4.0-150600.23.22.1","dtb-amd":"6.4.0-150600.23.22.1","dtb-amlogic":"6.4.0-150600.23.22.1","dtb-apm":"6.4.0-150600.23.22.1","dtb-apple":"6.4.0-150600.23.22.1","dtb-arm":"6.4.0-150600.23.22.1","dtb-broadcom":"6.4.0-150600.23.22.1","dtb-cavium":"6.4.0-150600.23.22.1","dtb-exynos":"6.4.0-150600.23.22.1","dtb-freescale":"6.4.0-150600.23.22.1","dtb-hisilicon":"6.4.0-150600.23.22.1","dtb-lg":"6.4.0-150600.23.22.1","dtb-marvell":"6.4.0-150600.23.22.1","dtb-mediatek":"6.4.0-150600.23.22.1","dtb-nvidia":"6.4.0-150600.23.22.1","dtb-qcom":"6.4.0-150600.23.22.1","dtb-renesas":"6.4.0-150600.23.22.1","dtb-rockchip":"6.4.0-150600.23.22.1","dtb-socionext":"6.4.0-150600.23.22.1","dtb-sprd":"6.4.0-150600.23.22.1","dtb-xilinx":"6.4.0-150600.23.22.1","gfs2-kmp-64kb":"6.4.0-150600.23.22.1","gfs2-kmp-default":"6.4.0-150600.23.22.1","kernel-64kb":"6.4.0-150600.23.22.1","kernel-64kb-devel":"6.4.0-150600.23.22.1","kernel-64kb-extra":"6.4.0-150600.23.22.1","kernel-64kb-livepatch-devel":"6.4.0-150600.23.22.1","kernel-64kb-optional":"6.4.0-150600.23.22.1","kernel-debug":"6.4.0-150600.23.22.1","kernel-debug-devel":"6.4.0-150600.23.22.1","kernel-debug-livepatch-devel":"6.4.0-150600.23.22.1","kernel-debug-vdso":"6.4.0-150600.23.22.1","kernel-default":"6.4.0-150600.23.22.1","kernel-default-base":"6.4.0-150600.23.22.1.150600.12.8.3","kernel-default-base-rebuild":"6.4.0-150600.23.22.1.150600.12.8.3","kernel-default-devel":"6.4.0-150600.23.22.1","kernel-default-extra":"6.4.0-150600.23.22.1","kernel-default-livepatch":"6.4.0-150600.23.22.1","kernel-default-livepatch-devel":"6.4.0-150600.23.22.1","kernel-default-optional":"6.4.0-150600.23.22.1","kernel-default-vdso":"6.4.0-150600.23.22.1","kernel-devel":"6.4.0-150600.23.22.1","kernel-docs":"6.4.0-150600.23.22.1","kernel-docs-html":"6.4.0-150600.23.22.1","kernel-kvmsmall":"6.4.0-150600.23.22.1","kernel-kvmsmall-devel":"6.4.0-150600.23.22.1","kernel-kvmsmall-livepatch-devel":"6.4.0-150600.23.22.1","kernel-kvmsmall-vdso":"6.4.0-150600.23.22.1","kernel-macros":"6.4.0-150600.23.22.1","kernel-obs-build":"6.4.0-150600.23.22.1","kernel-obs-qa":"6.4.0-150600.23.22.1","kernel-source":"6.4.0-150600.23.22.1","kernel-source-vanilla":"6.4.0-150600.23.22.1","kernel-syms":"6.4.0-150600.23.22.1","kernel-zfcpdump":"6.4.0-150600.23.22.1","kselftests-kmp-64kb":"6.4.0-150600.23.22.1","kselftests-kmp-default":"6.4.0-150600.23.22.1","ocfs2-kmp-64kb":"6.4.0-150600.23.22.1","ocfs2-kmp-default":"6.4.0-150600.23.22.1","reiserfs-kmp-64kb":"6.4.0-150600.23.22.1","reiserfs-kmp-default":"6.4.0-150600.23.22.1"}]},"package":{"ecosystem":"openSUSE:Leap 15.6","name":"kernel-default-base","purl":"pkg:rpm/opensuse/kernel-default-base&distro=openSUSE%20Leap%2015.6"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"6.4.0-150600.23.22.1.150600.12.8.3"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-64kb":"6.4.0-150600.23.22.1","cluster-md-kmp-default":"6.4.0-150600.23.22.1","dlm-kmp-64kb":"6.4.0-150600.23.22.1","dlm-kmp-default":"6.4.0-150600.23.22.1","dtb-allwinner":"6.4.0-150600.23.22.1","dtb-altera":"6.4.0-150600.23.22.1","dtb-amazon":"6.4.0-150600.23.22.1","dtb-amd":"6.4.0-150600.23.22.1","dtb-amlogic":"6.4.0-150600.23.22.1","dtb-apm":"6.4.0-150600.23.22.1","dtb-apple":"6.4.0-150600.23.22.1","dtb-arm":"6.4.0-150600.23.22.1","dtb-broadcom":"6.4.0-150600.23.22.1","dtb-cavium":"6.4.0-150600.23.22.1","dtb-exynos":"6.4.0-150600.23.22.1","dtb-freescale":"6.4.0-150600.23.22.1","dtb-hisilicon":"6.4.0-150600.23.22.1","dtb-lg":"6.4.0-150600.23.22.1","dtb-marvell":"6.4.0-150600.23.22.1","dtb-mediatek":"6.4.0-150600.23.22.1","dtb-nvidia":"6.4.0-150600.23.22.1","dtb-qcom":"6.4.0-150600.23.22.1","dtb-renesas":"6.4.0-150600.23.22.1","dtb-rockchip":"6.4.0-150600.23.22.1","dtb-socionext":"6.4.0-150600.23.22.1","dtb-sprd":"6.4.0-150600.23.22.1","dtb-xilinx":"6.4.0-150600.23.22.1","gfs2-kmp-64kb":"6.4.0-150600.23.22.1","gfs2-kmp-default":"6.4.0-150600.23.22.1","kernel-64kb":"6.4.0-150600.23.22.1","kernel-64kb-devel":"6.4.0-150600.23.22.1","kernel-64kb-extra":"6.4.0-150600.23.22.1","kernel-64kb-livepatch-devel":"6.4.0-150600.23.22.1","kernel-64kb-optional":"6.4.0-150600.23.22.1","kernel-debug":"6.4.0-150600.23.22.1","kernel-debug-devel":"6.4.0-150600.23.22.1","kernel-debug-livepatch-devel":"6.4.0-150600.23.22.1","kernel-debug-vdso":"6.4.0-150600.23.22.1","kernel-default":"6.4.0-150600.23.22.1","kernel-default-base":"6.4.0-150600.23.22.1.150600.12.8.3","kernel-default-base-rebuild":"6.4.0-150600.23.22.1.150600.12.8.3","kernel-default-devel":"6.4.0-150600.23.22.1","kernel-default-extra":"6.4.0-150600.23.22.1","kernel-default-livepatch":"6.4.0-150600.23.22.1","kernel-default-livepatch-devel":"6.4.0-150600.23.22.1","kernel-default-optional":"6.4.0-150600.23.22.1","kernel-default-vdso":"6.4.0-150600.23.22.1","kernel-devel":"6.4.0-150600.23.22.1","kernel-docs":"6.4.0-150600.23.22.1","kernel-docs-html":"6.4.0-150600.23.22.1","kernel-kvmsmall":"6.4.0-150600.23.22.1","kernel-kvmsmall-devel":"6.4.0-150600.23.22.1","kernel-kvmsmall-livepatch-devel":"6.4.0-150600.23.22.1","kernel-kvmsmall-vdso":"6.4.0-150600.23.22.1","kernel-macros":"6.4.0-150600.23.22.1","kernel-obs-build":"6.4.0-150600.23.22.1","kernel-obs-qa":"6.4.0-150600.23.22.1","kernel-source":"6.4.0-150600.23.22.1","kernel-source-vanilla":"6.4.0-150600.23.22.1","kernel-syms":"6.4.0-150600.23.22.1","kernel-zfcpdump":"6.4.0-150600.23.22.1","kselftests-kmp-64kb":"6.4.0-150600.23.22.1","kselftests-kmp-default":"6.4.0-150600.23.22.1","ocfs2-kmp-64kb":"6.4.0-150600.23.22.1","ocfs2-kmp-default":"6.4.0-150600.23.22.1","reiserfs-kmp-64kb":"6.4.0-150600.23.22.1","reiserfs-kmp-default":"6.4.0-150600.23.22.1"}]},"package":{"ecosystem":"openSUSE:Leap 15.6","name":"kernel-docs","purl":"pkg:rpm/opensuse/kernel-docs&distro=openSUSE%20Leap%2015.6"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"6.4.0-150600.23.22.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-64kb":"6.4.0-150600.23.22.1","cluster-md-kmp-default":"6.4.0-150600.23.22.1","dlm-kmp-64kb":"6.4.0-150600.23.22.1","dlm-kmp-default":"6.4.0-150600.23.22.1","dtb-allwinner":"6.4.0-150600.23.22.1","dtb-altera":"6.4.0-150600.23.22.1","dtb-amazon":"6.4.0-150600.23.22.1","dtb-amd":"6.4.0-150600.23.22.1","dtb-amlogic":"6.4.0-150600.23.22.1","dtb-apm":"6.4.0-150600.23.22.1","dtb-apple":"6.4.0-150600.23.22.1","dtb-arm":"6.4.0-150600.23.22.1","dtb-broadcom":"6.4.0-150600.23.22.1","dtb-cavium":"6.4.0-150600.23.22.1","dtb-exynos":"6.4.0-150600.23.22.1","dtb-freescale":"6.4.0-150600.23.22.1","dtb-hisilicon":"6.4.0-150600.23.22.1","dtb-lg":"6.4.0-150600.23.22.1","dtb-marvell":"6.4.0-150600.23.22.1","dtb-mediatek":"6.4.0-150600.23.22.1","dtb-nvidia":"6.4.0-150600.23.22.1","dtb-qcom":"6.4.0-150600.23.22.1","dtb-renesas":"6.4.0-150600.23.22.1","dtb-rockchip":"6.4.0-150600.23.22.1","dtb-socionext":"6.4.0-150600.23.22.1","dtb-sprd":"6.4.0-150600.23.22.1","dtb-xilinx":"6.4.0-150600.23.22.1","gfs2-kmp-64kb":"6.4.0-150600.23.22.1","gfs2-kmp-default":"6.4.0-150600.23.22.1","kernel-64kb":"6.4.0-150600.23.22.1","kernel-64kb-devel":"6.4.0-150600.23.22.1","kernel-64kb-extra":"6.4.0-150600.23.22.1","kernel-64kb-livepatch-devel":"6.4.0-150600.23.22.1","kernel-64kb-optional":"6.4.0-150600.23.22.1","kernel-debug":"6.4.0-150600.23.22.1","kernel-debug-devel":"6.4.0-150600.23.22.1","kernel-debug-livepatch-devel":"6.4.0-150600.23.22.1","kernel-debug-vdso":"6.4.0-150600.23.22.1","kernel-default":"6.4.0-150600.23.22.1","kernel-default-base":"6.4.0-150600.23.22.1.150600.12.8.3","kernel-default-base-rebuild":"6.4.0-150600.23.22.1.150600.12.8.3","kernel-default-devel":"6.4.0-150600.23.22.1","kernel-default-extra":"6.4.0-150600.23.22.1","kernel-default-livepatch":"6.4.0-150600.23.22.1","kernel-default-livepatch-devel":"6.4.0-150600.23.22.1","kernel-default-optional":"6.4.0-150600.23.22.1","kernel-default-vdso":"6.4.0-150600.23.22.1","kernel-devel":"6.4.0-150600.23.22.1","kernel-docs":"6.4.0-150600.23.22.1","kernel-docs-html":"6.4.0-150600.23.22.1","kernel-kvmsmall":"6.4.0-150600.23.22.1","kernel-kvmsmall-devel":"6.4.0-150600.23.22.1","kernel-kvmsmall-livepatch-devel":"6.4.0-150600.23.22.1","kernel-kvmsmall-vdso":"6.4.0-150600.23.22.1","kernel-macros":"6.4.0-150600.23.22.1","kernel-obs-build":"6.4.0-150600.23.22.1","kernel-obs-qa":"6.4.0-150600.23.22.1","kernel-source":"6.4.0-150600.23.22.1","kernel-source-vanilla":"6.4.0-150600.23.22.1","kernel-syms":"6.4.0-150600.23.22.1","kernel-zfcpdump":"6.4.0-150600.23.22.1","kselftests-kmp-64kb":"6.4.0-150600.23.22.1","kselftests-kmp-default":"6.4.0-150600.23.22.1","ocfs2-kmp-64kb":"6.4.0-150600.23.22.1","ocfs2-kmp-default":"6.4.0-150600.23.22.1","reiserfs-kmp-64kb":"6.4.0-150600.23.22.1","reiserfs-kmp-default":"6.4.0-150600.23.22.1"}]},"package":{"ecosystem":"openSUSE:Leap 15.6","name":"kernel-kvmsmall","purl":"pkg:rpm/opensuse/kernel-kvmsmall&distro=openSUSE%20Leap%2015.6"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"6.4.0-150600.23.22.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-64kb":"6.4.0-150600.23.22.1","cluster-md-kmp-default":"6.4.0-150600.23.22.1","dlm-kmp-64kb":"6.4.0-150600.23.22.1","dlm-kmp-default":"6.4.0-150600.23.22.1","dtb-allwinner":"6.4.0-150600.23.22.1","dtb-altera":"6.4.0-150600.23.22.1","dtb-amazon":"6.4.0-150600.23.22.1","dtb-amd":"6.4.0-150600.23.22.1","dtb-amlogic":"6.4.0-150600.23.22.1","dtb-apm":"6.4.0-150600.23.22.1","dtb-apple":"6.4.0-150600.23.22.1","dtb-arm":"6.4.0-150600.23.22.1","dtb-broadcom":"6.4.0-150600.23.22.1","dtb-cavium":"6.4.0-150600.23.22.1","dtb-exynos":"6.4.0-150600.23.22.1","dtb-freescale":"6.4.0-150600.23.22.1","dtb-hisilicon":"6.4.0-150600.23.22.1","dtb-lg":"6.4.0-150600.23.22.1","dtb-marvell":"6.4.0-150600.23.22.1","dtb-mediatek":"6.4.0-150600.23.22.1","dtb-nvidia":"6.4.0-150600.23.22.1","dtb-qcom":"6.4.0-150600.23.22.1","dtb-renesas":"6.4.0-150600.23.22.1","dtb-rockchip":"6.4.0-150600.23.22.1","dtb-socionext":"6.4.0-150600.23.22.1","dtb-sprd":"6.4.0-150600.23.22.1","dtb-xilinx":"6.4.0-150600.23.22.1","gfs2-kmp-64kb":"6.4.0-150600.23.22.1","gfs2-kmp-default":"6.4.0-150600.23.22.1","kernel-64kb":"6.4.0-150600.23.22.1","kernel-64kb-devel":"6.4.0-150600.23.22.1","kernel-64kb-extra":"6.4.0-150600.23.22.1","kernel-64kb-livepatch-devel":"6.4.0-150600.23.22.1","kernel-64kb-optional":"6.4.0-150600.23.22.1","kernel-debug":"6.4.0-150600.23.22.1","kernel-debug-devel":"6.4.0-150600.23.22.1","kernel-debug-livepatch-devel":"6.4.0-150600.23.22.1","kernel-debug-vdso":"6.4.0-150600.23.22.1","kernel-default":"6.4.0-150600.23.22.1","kernel-default-base":"6.4.0-150600.23.22.1.150600.12.8.3","kernel-default-base-rebuild":"6.4.0-150600.23.22.1.150600.12.8.3","kernel-default-devel":"6.4.0-150600.23.22.1","kernel-default-extra":"6.4.0-150600.23.22.1","kernel-default-livepatch":"6.4.0-150600.23.22.1","kernel-default-livepatch-devel":"6.4.0-150600.23.22.1","kernel-default-optional":"6.4.0-150600.23.22.1","kernel-default-vdso":"6.4.0-150600.23.22.1","kernel-devel":"6.4.0-150600.23.22.1","kernel-docs":"6.4.0-150600.23.22.1","kernel-docs-html":"6.4.0-150600.23.22.1","kernel-kvmsmall":"6.4.0-150600.23.22.1","kernel-kvmsmall-devel":"6.4.0-150600.23.22.1","kernel-kvmsmall-livepatch-devel":"6.4.0-150600.23.22.1","kernel-kvmsmall-vdso":"6.4.0-150600.23.22.1","kernel-macros":"6.4.0-150600.23.22.1","kernel-obs-build":"6.4.0-150600.23.22.1","kernel-obs-qa":"6.4.0-150600.23.22.1","kernel-source":"6.4.0-150600.23.22.1","kernel-source-vanilla":"6.4.0-150600.23.22.1","kernel-syms":"6.4.0-150600.23.22.1","kernel-zfcpdump":"6.4.0-150600.23.22.1","kselftests-kmp-64kb":"6.4.0-150600.23.22.1","kselftests-kmp-default":"6.4.0-150600.23.22.1","ocfs2-kmp-64kb":"6.4.0-150600.23.22.1","ocfs2-kmp-default":"6.4.0-150600.23.22.1","reiserfs-kmp-64kb":"6.4.0-150600.23.22.1","reiserfs-kmp-default":"6.4.0-150600.23.22.1"}]},"package":{"ecosystem":"openSUSE:Leap 15.6","name":"kernel-obs-build","purl":"pkg:rpm/opensuse/kernel-obs-build&distro=openSUSE%20Leap%2015.6"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"6.4.0-150600.23.22.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-64kb":"6.4.0-150600.23.22.1","cluster-md-kmp-default":"6.4.0-150600.23.22.1","dlm-kmp-64kb":"6.4.0-150600.23.22.1","dlm-kmp-default":"6.4.0-150600.23.22.1","dtb-allwinner":"6.4.0-150600.23.22.1","dtb-altera":"6.4.0-150600.23.22.1","dtb-amazon":"6.4.0-150600.23.22.1","dtb-amd":"6.4.0-150600.23.22.1","dtb-amlogic":"6.4.0-150600.23.22.1","dtb-apm":"6.4.0-150600.23.22.1","dtb-apple":"6.4.0-150600.23.22.1","dtb-arm":"6.4.0-150600.23.22.1","dtb-broadcom":"6.4.0-150600.23.22.1","dtb-cavium":"6.4.0-150600.23.22.1","dtb-exynos":"6.4.0-150600.23.22.1","dtb-freescale":"6.4.0-150600.23.22.1","dtb-hisilicon":"6.4.0-150600.23.22.1","dtb-lg":"6.4.0-150600.23.22.1","dtb-marvell":"6.4.0-150600.23.22.1","dtb-mediatek":"6.4.0-150600.23.22.1","dtb-nvidia":"6.4.0-150600.23.22.1","dtb-qcom":"6.4.0-150600.23.22.1","dtb-renesas":"6.4.0-150600.23.22.1","dtb-rockchip":"6.4.0-150600.23.22.1","dtb-socionext":"6.4.0-150600.23.22.1","dtb-sprd":"6.4.0-150600.23.22.1","dtb-xilinx":"6.4.0-150600.23.22.1","gfs2-kmp-64kb":"6.4.0-150600.23.22.1","gfs2-kmp-default":"6.4.0-150600.23.22.1","kernel-64kb":"6.4.0-150600.23.22.1","kernel-64kb-devel":"6.4.0-150600.23.22.1","kernel-64kb-extra":"6.4.0-150600.23.22.1","kernel-64kb-livepatch-devel":"6.4.0-150600.23.22.1","kernel-64kb-optional":"6.4.0-150600.23.22.1","kernel-debug":"6.4.0-150600.23.22.1","kernel-debug-devel":"6.4.0-150600.23.22.1","kernel-debug-livepatch-devel":"6.4.0-150600.23.22.1","kernel-debug-vdso":"6.4.0-150600.23.22.1","kernel-default":"6.4.0-150600.23.22.1","kernel-default-base":"6.4.0-150600.23.22.1.150600.12.8.3","kernel-default-base-rebuild":"6.4.0-150600.23.22.1.150600.12.8.3","kernel-default-devel":"6.4.0-150600.23.22.1","kernel-default-extra":"6.4.0-150600.23.22.1","kernel-default-livepatch":"6.4.0-150600.23.22.1","kernel-default-livepatch-devel":"6.4.0-150600.23.22.1","kernel-default-optional":"6.4.0-150600.23.22.1","kernel-default-vdso":"6.4.0-150600.23.22.1","kernel-devel":"6.4.0-150600.23.22.1","kernel-docs":"6.4.0-150600.23.22.1","kernel-docs-html":"6.4.0-150600.23.22.1","kernel-kvmsmall":"6.4.0-150600.23.22.1","kernel-kvmsmall-devel":"6.4.0-150600.23.22.1","kernel-kvmsmall-livepatch-devel":"6.4.0-150600.23.22.1","kernel-kvmsmall-vdso":"6.4.0-150600.23.22.1","kernel-macros":"6.4.0-150600.23.22.1","kernel-obs-build":"6.4.0-150600.23.22.1","kernel-obs-qa":"6.4.0-150600.23.22.1","kernel-source":"6.4.0-150600.23.22.1","kernel-source-vanilla":"6.4.0-150600.23.22.1","kernel-syms":"6.4.0-150600.23.22.1","kernel-zfcpdump":"6.4.0-150600.23.22.1","kselftests-kmp-64kb":"6.4.0-150600.23.22.1","kselftests-kmp-default":"6.4.0-150600.23.22.1","ocfs2-kmp-64kb":"6.4.0-150600.23.22.1","ocfs2-kmp-default":"6.4.0-150600.23.22.1","reiserfs-kmp-64kb":"6.4.0-150600.23.22.1","reiserfs-kmp-default":"6.4.0-150600.23.22.1"}]},"package":{"ecosystem":"openSUSE:Leap 15.6","name":"kernel-obs-qa","purl":"pkg:rpm/opensuse/kernel-obs-qa&distro=openSUSE%20Leap%2015.6"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"6.4.0-150600.23.22.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-64kb":"6.4.0-150600.23.22.1","cluster-md-kmp-default":"6.4.0-150600.23.22.1","dlm-kmp-64kb":"6.4.0-150600.23.22.1","dlm-kmp-default":"6.4.0-150600.23.22.1","dtb-allwinner":"6.4.0-150600.23.22.1","dtb-altera":"6.4.0-150600.23.22.1","dtb-amazon":"6.4.0-150600.23.22.1","dtb-amd":"6.4.0-150600.23.22.1","dtb-amlogic":"6.4.0-150600.23.22.1","dtb-apm":"6.4.0-150600.23.22.1","dtb-apple":"6.4.0-150600.23.22.1","dtb-arm":"6.4.0-150600.23.22.1","dtb-broadcom":"6.4.0-150600.23.22.1","dtb-cavium":"6.4.0-150600.23.22.1","dtb-exynos":"6.4.0-150600.23.22.1","dtb-freescale":"6.4.0-150600.23.22.1","dtb-hisilicon":"6.4.0-150600.23.22.1","dtb-lg":"6.4.0-150600.23.22.1","dtb-marvell":"6.4.0-150600.23.22.1","dtb-mediatek":"6.4.0-150600.23.22.1","dtb-nvidia":"6.4.0-150600.23.22.1","dtb-qcom":"6.4.0-150600.23.22.1","dtb-renesas":"6.4.0-150600.23.22.1","dtb-rockchip":"6.4.0-150600.23.22.1","dtb-socionext":"6.4.0-150600.23.22.1","dtb-sprd":"6.4.0-150600.23.22.1","dtb-xilinx":"6.4.0-150600.23.22.1","gfs2-kmp-64kb":"6.4.0-150600.23.22.1","gfs2-kmp-default":"6.4.0-150600.23.22.1","kernel-64kb":"6.4.0-150600.23.22.1","kernel-64kb-devel":"6.4.0-150600.23.22.1","kernel-64kb-extra":"6.4.0-150600.23.22.1","kernel-64kb-livepatch-devel":"6.4.0-150600.23.22.1","kernel-64kb-optional":"6.4.0-150600.23.22.1","kernel-debug":"6.4.0-150600.23.22.1","kernel-debug-devel":"6.4.0-150600.23.22.1","kernel-debug-livepatch-devel":"6.4.0-150600.23.22.1","kernel-debug-vdso":"6.4.0-150600.23.22.1","kernel-default":"6.4.0-150600.23.22.1","kernel-default-base":"6.4.0-150600.23.22.1.150600.12.8.3","kernel-default-base-rebuild":"6.4.0-150600.23.22.1.150600.12.8.3","kernel-default-devel":"6.4.0-150600.23.22.1","kernel-default-extra":"6.4.0-150600.23.22.1","kernel-default-livepatch":"6.4.0-150600.23.22.1","kernel-default-livepatch-devel":"6.4.0-150600.23.22.1","kernel-default-optional":"6.4.0-150600.23.22.1","kernel-default-vdso":"6.4.0-150600.23.22.1","kernel-devel":"6.4.0-150600.23.22.1","kernel-docs":"6.4.0-150600.23.22.1","kernel-docs-html":"6.4.0-150600.23.22.1","kernel-kvmsmall":"6.4.0-150600.23.22.1","kernel-kvmsmall-devel":"6.4.0-150600.23.22.1","kernel-kvmsmall-livepatch-devel":"6.4.0-150600.23.22.1","kernel-kvmsmall-vdso":"6.4.0-150600.23.22.1","kernel-macros":"6.4.0-150600.23.22.1","kernel-obs-build":"6.4.0-150600.23.22.1","kernel-obs-qa":"6.4.0-150600.23.22.1","kernel-source":"6.4.0-150600.23.22.1","kernel-source-vanilla":"6.4.0-150600.23.22.1","kernel-syms":"6.4.0-150600.23.22.1","kernel-zfcpdump":"6.4.0-150600.23.22.1","kselftests-kmp-64kb":"6.4.0-150600.23.22.1","kselftests-kmp-default":"6.4.0-150600.23.22.1","ocfs2-kmp-64kb":"6.4.0-150600.23.22.1","ocfs2-kmp-default":"6.4.0-150600.23.22.1","reiserfs-kmp-64kb":"6.4.0-150600.23.22.1","reiserfs-kmp-default":"6.4.0-150600.23.22.1"}]},"package":{"ecosystem":"openSUSE:Leap 15.6","name":"kernel-source","purl":"pkg:rpm/opensuse/kernel-source&distro=openSUSE%20Leap%2015.6"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"6.4.0-150600.23.22.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-64kb":"6.4.0-150600.23.22.1","cluster-md-kmp-default":"6.4.0-150600.23.22.1","dlm-kmp-64kb":"6.4.0-150600.23.22.1","dlm-kmp-default":"6.4.0-150600.23.22.1","dtb-allwinner":"6.4.0-150600.23.22.1","dtb-altera":"6.4.0-150600.23.22.1","dtb-amazon":"6.4.0-150600.23.22.1","dtb-amd":"6.4.0-150600.23.22.1","dtb-amlogic":"6.4.0-150600.23.22.1","dtb-apm":"6.4.0-150600.23.22.1","dtb-apple":"6.4.0-150600.23.22.1","dtb-arm":"6.4.0-150600.23.22.1","dtb-broadcom":"6.4.0-150600.23.22.1","dtb-cavium":"6.4.0-150600.23.22.1","dtb-exynos":"6.4.0-150600.23.22.1","dtb-freescale":"6.4.0-150600.23.22.1","dtb-hisilicon":"6.4.0-150600.23.22.1","dtb-lg":"6.4.0-150600.23.22.1","dtb-marvell":"6.4.0-150600.23.22.1","dtb-mediatek":"6.4.0-150600.23.22.1","dtb-nvidia":"6.4.0-150600.23.22.1","dtb-qcom":"6.4.0-150600.23.22.1","dtb-renesas":"6.4.0-150600.23.22.1","dtb-rockchip":"6.4.0-150600.23.22.1","dtb-socionext":"6.4.0-150600.23.22.1","dtb-sprd":"6.4.0-150600.23.22.1","dtb-xilinx":"6.4.0-150600.23.22.1","gfs2-kmp-64kb":"6.4.0-150600.23.22.1","gfs2-kmp-default":"6.4.0-150600.23.22.1","kernel-64kb":"6.4.0-150600.23.22.1","kernel-64kb-devel":"6.4.0-150600.23.22.1","kernel-64kb-extra":"6.4.0-150600.23.22.1","kernel-64kb-livepatch-devel":"6.4.0-150600.23.22.1","kernel-64kb-optional":"6.4.0-150600.23.22.1","kernel-debug":"6.4.0-150600.23.22.1","kernel-debug-devel":"6.4.0-150600.23.22.1","kernel-debug-livepatch-devel":"6.4.0-150600.23.22.1","kernel-debug-vdso":"6.4.0-150600.23.22.1","kernel-default":"6.4.0-150600.23.22.1","kernel-default-base":"6.4.0-150600.23.22.1.150600.12.8.3","kernel-default-base-rebuild":"6.4.0-150600.23.22.1.150600.12.8.3","kernel-default-devel":"6.4.0-150600.23.22.1","kernel-default-extra":"6.4.0-150600.23.22.1","kernel-default-livepatch":"6.4.0-150600.23.22.1","kernel-default-livepatch-devel":"6.4.0-150600.23.22.1","kernel-default-optional":"6.4.0-150600.23.22.1","kernel-default-vdso":"6.4.0-150600.23.22.1","kernel-devel":"6.4.0-150600.23.22.1","kernel-docs":"6.4.0-150600.23.22.1","kernel-docs-html":"6.4.0-150600.23.22.1","kernel-kvmsmall":"6.4.0-150600.23.22.1","kernel-kvmsmall-devel":"6.4.0-150600.23.22.1","kernel-kvmsmall-livepatch-devel":"6.4.0-150600.23.22.1","kernel-kvmsmall-vdso":"6.4.0-150600.23.22.1","kernel-macros":"6.4.0-150600.23.22.1","kernel-obs-build":"6.4.0-150600.23.22.1","kernel-obs-qa":"6.4.0-150600.23.22.1","kernel-source":"6.4.0-150600.23.22.1","kernel-source-vanilla":"6.4.0-150600.23.22.1","kernel-syms":"6.4.0-150600.23.22.1","kernel-zfcpdump":"6.4.0-150600.23.22.1","kselftests-kmp-64kb":"6.4.0-150600.23.22.1","kselftests-kmp-default":"6.4.0-150600.23.22.1","ocfs2-kmp-64kb":"6.4.0-150600.23.22.1","ocfs2-kmp-default":"6.4.0-150600.23.22.1","reiserfs-kmp-64kb":"6.4.0-150600.23.22.1","reiserfs-kmp-default":"6.4.0-150600.23.22.1"}]},"package":{"ecosystem":"openSUSE:Leap 15.6","name":"kernel-syms","purl":"pkg:rpm/opensuse/kernel-syms&distro=openSUSE%20Leap%2015.6"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"6.4.0-150600.23.22.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-64kb":"6.4.0-150600.23.22.1","cluster-md-kmp-default":"6.4.0-150600.23.22.1","dlm-kmp-64kb":"6.4.0-150600.23.22.1","dlm-kmp-default":"6.4.0-150600.23.22.1","dtb-allwinner":"6.4.0-150600.23.22.1","dtb-altera":"6.4.0-150600.23.22.1","dtb-amazon":"6.4.0-150600.23.22.1","dtb-amd":"6.4.0-150600.23.22.1","dtb-amlogic":"6.4.0-150600.23.22.1","dtb-apm":"6.4.0-150600.23.22.1","dtb-apple":"6.4.0-150600.23.22.1","dtb-arm":"6.4.0-150600.23.22.1","dtb-broadcom":"6.4.0-150600.23.22.1","dtb-cavium":"6.4.0-150600.23.22.1","dtb-exynos":"6.4.0-150600.23.22.1","dtb-freescale":"6.4.0-150600.23.22.1","dtb-hisilicon":"6.4.0-150600.23.22.1","dtb-lg":"6.4.0-150600.23.22.1","dtb-marvell":"6.4.0-150600.23.22.1","dtb-mediatek":"6.4.0-150600.23.22.1","dtb-nvidia":"6.4.0-150600.23.22.1","dtb-qcom":"6.4.0-150600.23.22.1","dtb-renesas":"6.4.0-150600.23.22.1","dtb-rockchip":"6.4.0-150600.23.22.1","dtb-socionext":"6.4.0-150600.23.22.1","dtb-sprd":"6.4.0-150600.23.22.1","dtb-xilinx":"6.4.0-150600.23.22.1","gfs2-kmp-64kb":"6.4.0-150600.23.22.1","gfs2-kmp-default":"6.4.0-150600.23.22.1","kernel-64kb":"6.4.0-150600.23.22.1","kernel-64kb-devel":"6.4.0-150600.23.22.1","kernel-64kb-extra":"6.4.0-150600.23.22.1","kernel-64kb-livepatch-devel":"6.4.0-150600.23.22.1","kernel-64kb-optional":"6.4.0-150600.23.22.1","kernel-debug":"6.4.0-150600.23.22.1","kernel-debug-devel":"6.4.0-150600.23.22.1","kernel-debug-livepatch-devel":"6.4.0-150600.23.22.1","kernel-debug-vdso":"6.4.0-150600.23.22.1","kernel-default":"6.4.0-150600.23.22.1","kernel-default-base":"6.4.0-150600.23.22.1.150600.12.8.3","kernel-default-base-rebuild":"6.4.0-150600.23.22.1.150600.12.8.3","kernel-default-devel":"6.4.0-150600.23.22.1","kernel-default-extra":"6.4.0-150600.23.22.1","kernel-default-livepatch":"6.4.0-150600.23.22.1","kernel-default-livepatch-devel":"6.4.0-150600.23.22.1","kernel-default-optional":"6.4.0-150600.23.22.1","kernel-default-vdso":"6.4.0-150600.23.22.1","kernel-devel":"6.4.0-150600.23.22.1","kernel-docs":"6.4.0-150600.23.22.1","kernel-docs-html":"6.4.0-150600.23.22.1","kernel-kvmsmall":"6.4.0-150600.23.22.1","kernel-kvmsmall-devel":"6.4.0-150600.23.22.1","kernel-kvmsmall-livepatch-devel":"6.4.0-150600.23.22.1","kernel-kvmsmall-vdso":"6.4.0-150600.23.22.1","kernel-macros":"6.4.0-150600.23.22.1","kernel-obs-build":"6.4.0-150600.23.22.1","kernel-obs-qa":"6.4.0-150600.23.22.1","kernel-source":"6.4.0-150600.23.22.1","kernel-source-vanilla":"6.4.0-150600.23.22.1","kernel-syms":"6.4.0-150600.23.22.1","kernel-zfcpdump":"6.4.0-150600.23.22.1","kselftests-kmp-64kb":"6.4.0-150600.23.22.1","kselftests-kmp-default":"6.4.0-150600.23.22.1","ocfs2-kmp-64kb":"6.4.0-150600.23.22.1","ocfs2-kmp-default":"6.4.0-150600.23.22.1","reiserfs-kmp-64kb":"6.4.0-150600.23.22.1","reiserfs-kmp-default":"6.4.0-150600.23.22.1"}]},"package":{"ecosystem":"openSUSE:Leap 15.6","name":"kernel-zfcpdump","purl":"pkg:rpm/opensuse/kernel-zfcpdump&distro=openSUSE%20Leap%2015.6"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"6.4.0-150600.23.22.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"\nThe SUSE Linux Enterprise 15 SP6 kernel was updated to receive various security bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2024-43911: wifi: mac80211: fix NULL dereference at band check in starting tx ba session (bsc#1229827).\n- CVE-2024-43899: drm/amd/display: Fix null pointer deref in dcn20_resource.c (bsc#1229754).\n- CVE-2024-43882: Fixed ToCToU between perm check and set-uid/gid usage. (bsc#1229503)\n- CVE-2024-43880: kabi: lib: objagg: Put back removed metod in struct objagg_ops (bsc#1229481).\n- CVE-2024-43866: net/mlx5: Always drain health in shutdown callback (bsc#1229495).\n- CVE-2024-43864: net/mlx5e: Fix CT entry update leaks of modify header context (bsc#1229496).\n- CVE-2024-43855: md: fix deadlock between mddev_suspend and flush bio (bsc#1229342).\n- CVE-2024-43854: block: initialize integrity buffer to zero before writing it to media (bsc#1229345)\n- CVE-2024-43850: soc: qcom: icc-bwmon: Fix refcount imbalance seen during bwmon_remove (bsc#1229316).\n- CVE-2024-43839: bna: adjust 'name' buf size of bna_tcb and bna_ccb structures (bsc#1229301).\n- CVE-2024-43837: bpf: Fix updating attached freplace prog in prog_array map (bsc#1229297).\n- CVE-2024-43834: xdp: fix invalid wait context of page_pool_destroy() (bsc#1229314)\n- CVE-2024-43831: media: mediatek: vcodec: Handle invalid decoder vsi (bsc#1229309).\n- CVE-2024-43821: scsi: lpfc: Fix a possible null pointer dereference (bsc#1229315).\n- CVE-2024-42322: ipvs: properly dereference pe in ip_vs_add_service (bsc#1229347)\n- CVE-2024-42318: landlock: Do not lose track of restrictions on cred_transfer (bsc#1229351).\n- CVE-2024-42316: mm/mglru: fix div-by-zero in vmpressure_calc_level() (bsc#1229353).\n- CVE-2024-42312: sysctl: always initialize i_uid/i_gid (bsc#1229357)\n- CVE-2024-42308: Update DRM patch reference (bsc#1229411)\n- CVE-2024-42301: dev/parport: fix the array out-of-bounds risk (bsc#1229407).\n- CVE-2024-42295: nilfs2: handle inconsistent state in nilfs_btnode_create_block() (bsc#1229370).\n- CVE-2024-42291: ice: Add a per-VF limit on number of FDIR filters (bsc#1229374).\n- CVE-2024-42290: irqchip/imx-irqsteer: Handle runtime power management correctly (bsc#1229379).\n- CVE-2024-42284: tipc: Return non-zero value from tipc_udp_addr2str() on error (bsc#1229382)\n- CVE-2024-42283: net: nexthop: Initialize all fields in dumped nexthops (bsc#1229383)\n- CVE-2024-42281: bpf: Fix a segment issue when downgrading gso_size (bsc#1229386).\n- CVE-2024-42277: iommu: sprd: Avoid NULL deref in sprd_iommu_hw_en (bsc#1229409).\n- CVE-2024-42270: netfilter: iptables: Fix null-ptr-deref in iptable_nat_table_init() (bsc#1229404).\n- CVE-2024-42269: netfilter: iptables: Fix potential null-ptr-deref in ip6table_nat_table_init() (bsc#1229402).\n- CVE-2024-42268: net/mlx5: Fix missing lock on sync reset reload (bsc#1229391).\n- CVE-2024-42247: wireguard: allowedips: avoid unaligned 64-bit memory accesses (bsc#1228988).\n- CVE-2024-42246: net, sunrpc: Remap EPERM in case of connection failure in xs_tcp_setup_socket (bsc#1228989).\n- CVE-2024-42245: Revert 'sched/fair: Make sure to try to detach at least one movable task' (bsc#1228978).\n- CVE-2024-42241: mm/shmem: disable PMD-sized page cache if needed (bsc#1228986).\n- CVE-2024-42224: net: dsa: mv88e6xxx: Correct check for empty list (bsc#1228723).\n- CVE-2024-42162: gve: Account for stopped queues when reading NIC stats (bsc#1228706).\n- CVE-2024-42161: bpf: avoid uninitialized value in BPF_CORE_READ_BITFIELD (bsc#1228756).\n- CVE-2024-42159: scsi: mpi3mr: fix sanitise num_phys (bsc#1228754).\n- CVE-2024-42158: s390/pkey: Use kfree_sensitive() to fix Coccinelle warnings (bsc#1228720).\n- CVE-2024-42157: s390/pkey: Wipe sensitive data on failure (bsc#1228727).\n- CVE-2024-42156: s390/pkey: Wipe copies of clear-key structures on failure (bsc#1228722).\n- CVE-2024-42155: s390/pkey: Wipe copies of protected- and secure-keys (bsc#1228733).\n- CVE-2024-42148: bnx2x: Fix multiple UBSAN array-index-out-of-bounds (bsc#1228487).\n- CVE-2024-42145: IB/core: Implement a limit on UMAD receive List (bsc#1228743).\n- CVE-2024-42142: net/mlx5: E-switch, Create ingress ACL when needed (bsc#1228491).\n- CVE-2024-42139: ice: Fix improper extts handling (bsc#1228503).\n- CVE-2024-42138: mlxsw: core_linecards: Fix double memory deallocation in case of invalid INI file (bsc#1228500).\n- CVE-2024-42124: scsi: qedf: Make qedf_execute_tmf() non-preemptible (bsc#1228705).\n- CVE-2024-42122: drm/amd/display: Add NULL pointer check for kzalloc (bsc#1228591).\n- CVE-2024-42113: net: txgbe: initialize num_q_vectors for MSI/INTx interrupts (bsc#1228568).\n- CVE-2024-42110: net: ntb_netdev: Move ntb_netdev_rx_handler() to call netif_rx() from __netif_rx() (bsc#1228501).\n- CVE-2024-42109: netfilter: nf_tables: unconditionally flush pending work before notifier (bsc#1228505).\n- CVE-2024-42107: ice: Do not process extts if PTP is disabled (bsc#1228494).\n- CVE-2024-42106: inet_diag: Initialize pad field in struct inet_diag_req_v2 (bsc#1228493).\n- CVE-2024-42096: x86: stop playing stack games in profile_pc() (bsc#1228633).\n- CVE-2024-42095: serial: 8250_omap: Fix Errata i2310 with RX FIFO level check (bsc#1228446).\n- CVE-2024-42093: net/dpaa2: Avoid explicit cpumask var allocation on stack (bsc#1228680).\n- CVE-2024-42082: xdp: Remove WARN() from __xdp_reg_mem_model() (bsc#1228482).\n- CVE-2024-42079: gfs2: Fix NULL pointer dereference in gfs2_log_flush (bsc#1228672).\n- CVE-2024-42073: mlxsw: spectrum_buffers: Fix memory corruptions on Spectrum-4 systems (bsc#1228457).\n- CVE-2024-42070: netfilter: nf_tables: fully validate NFT_DATA_VALUE on store to data registers (bsc#1228470).\n- CVE-2024-41084: cxl/region: Avoid null pointer dereference in region lookup (bsc#1228472).\n- CVE-2024-41081: ila: block BH in ila_output() (bsc#1228617).\n- CVE-2024-41080: io_uring: fix possible deadlock in io_register_iowq_max_workers() (bsc#1228616).\n- CVE-2024-41078: btrfs: qgroup: fix quota root leak after quota disable failure (bsc#1228655).\n- CVE-2024-41076: NFSv4: Fix memory leak in nfs4_set_security_label (bsc#1228649).\n- CVE-2024-41075: cachefiles: add consistency check for copen/cread (bsc#1228646).\n- CVE-2024-41074: cachefiles: Set object to close if ondemand_id < 0 in copen (bsc#1228643).\n- CVE-2024-41070: KVM: PPC: Book3S HV: Prevent UAF in kvm_spapr_tce_attach_iommu_group() (bsc#1228581).\n- CVE-2024-41069: ASoC: topology: Fix route memory corruption (bsc#1228644).\n- CVE-2024-41068: s390/sclp: Fix sclp_init() cleanup on failure (bsc#1228579).\n- CVE-2024-41066: ibmvnic: add tx check to prevent skb leak (bsc#1228640).\n- CVE-2024-41064: powerpc/eeh: avoid possible crash when edev->pdev changes (bsc#1228599).\n- CVE-2024-41062: bluetooth/l2cap: sync sock recv cb and release (bsc#1228576).\n- CVE-2024-41058: cachefiles: fix slab-use-after-free in fscache_withdraw_volume() (bsc#1228459).\n- CVE-2024-41057: cachefiles: fix slab-use-after-free in cachefiles_withdraw_cookie() (bsc#1228462).\n- CVE-2024-41051: cachefiles: wait for ondemand_object_worker to finish when dropping object (bsc#1228468).\n- CVE-2024-41050: cachefiles: cyclic allocation of msg_id to avoid reuse (bsc#1228499).\n- CVE-2024-41048: skmsg: Skip zero length skb in sk_msg_recvmsg (bsc#1228565).\n- CVE-2024-41044: ppp: reject claimed-as-LCP but actually malformed packets (bsc#1228530).\n- CVE-2024-41041: udp: Set SOCK_RCU_FREE earlier in udp_lib_get_port() (bsc#1228520).\n- CVE-2024-41040: net/sched: Fix UAF when resolving a clash (bsc#1228518).\n- CVE-2024-41036: net: ks8851: Fix deadlock with the SPI chip variant (bsc#1228496).\n- CVE-2024-41032: mm: vmalloc: check if a hash-index is in cpu_possible_mask (bsc#1228460).\n- CVE-2024-41020: filelock: Fix fcntl/close race recovery compat path (bsc#1228427).\n- CVE-2024-41015: ocfs2: add bounds checking to ocfs2_check_dir_entry() (bsc#1228409).\n- CVE-2024-41012: filelock: Remove locks reliably when fcntl/close race is detected (bsc#1228247).\n- CVE-2024-41010: bpf: Fix too early release of tcx_entry (bsc#1228021).\n- CVE-2024-41009: bpf: Fix overrunning reservations in ringbuf (bsc#1228020).\n- CVE-2024-41007: tcp: use signed arithmetic in tcp_rtx_probe0_timed_out() (bsc#1227863).\n- CVE-2024-41000: block/ioctl: prefer different overflow check (bsc#1227867).\n- CVE-2024-40995: net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc() (bsc#1227830).\n- CVE-2024-40994: ptp: fix integer overflow in max_vclocks_store (bsc#1227829).\n- CVE-2024-40989: KVM: arm64: Disassociate vcpus from redistributor region on teardown (bsc#1227823).\n- CVE-2024-40978: scsi: qedi: Fix crash while reading debugfs attribute (bsc#1227929).\n- CVE-2024-40959: xfrm6: check ip6_dst_idev() return value in xfrm6_get_saddr() (bsc#1227884).\n- CVE-2024-40958: netns: Make get_net_ns() handle zero refcount net (bsc#1227812).\n- CVE-2024-40957: seg6: fix parameter passing when calling NF_HOOK() in End.DX4 and End.DX6 behaviors (bsc#1227811).\n- CVE-2024-40956: dmaengine: idxd: Fix possible Use-After-Free in irq_process_work_list (bsc#1227810).\n- CVE-2024-40954: net: do not leave a dangling sk pointer, when socket creation fails (bsc#1227808)\n- CVE-2024-40939: net: wwan: iosm: Fix tainted pointer delete is case of region creation fail (bsc#1227799).\n- CVE-2024-40938: landlock: fix d_parent walk (bsc#1227840).\n- CVE-2024-40921: net: bridge: mst: pass vlan group directly to br_mst_vlan_set_state (bsc#1227784).\n- CVE-2024-40920: net: bridge: mst: fix suspicious rcu usage in br_mst_set_state (bsc#1227781).\n- CVE-2024-40909: bpf: Fix a potential use-after-free in bpf_link_free() (bsc#1227798).\n- CVE-2024-40905: ipv6: fix possible race in __fib6_drop_pcpu_from() (bsc#1227761)\n- CVE-2024-39506: liquidio: adjust a NULL pointer handling path in lio_vf_rep_copy_packet (bsc#1227729).\n- CVE-2024-39489: ipv6: sr: fix memleak in seg6_hmac_init_algo (bsc#1227623)\n- CVE-2024-38662: selftests/bpf: Cover verifier checks for mutating sockmap/sockhash (bsc#1226885).\n- CVE-2024-36979: net: bridge: mst: fix vlan use-after-free (bsc#1226604).\n- CVE-2024-36933: net: nsh: Use correct mac_offset to unwind gso skb in nsh_gso_segment() (bsc#1225832).\n- CVE-2024-36929: net: core: reject skb_copy(_expand) for fraglist GSO skbs (bsc#1225814).\n- CVE-2024-36911: hv_netvsc: Do not free decrypted memory (bsc#1225745).\n- CVE-2024-36910: uio_hv_generic: Do not free decrypted memory (bsc#1225717).\n- CVE-2024-36909: Drivers: hv: vmbus: Do not free ring buffers that couldn't be re-encrypted (bsc#1225744).\n- CVE-2024-36881: mm/userfaultfd: Fix reset ptes when close() for wr-protected (bsc#1225718).\n- CVE-2024-36489: tls: fix missing memory barrier in tls_init (bsc#1226874)\n- CVE-2024-36286: netfilter: nfnetlink_queue: acquire rcu_read_lock() in instance_destroy_rcu() (bsc#1226801)\n- CVE-2024-36270: Fix reference in patches.suse/netfilter-tproxy-bail-out-if-IP-has-been-disabled-on.patch (bsc#1226798)\n- CVE-2024-35949: btrfs: make sure that WRITTEN is set on all metadata blocks (bsc#1224700).\n- CVE-2024-35939: Fixed leak pages on dma_set_decrypted() failure (bsc#1224535).\n- CVE-2024-35897: netfilter: nf_tables: discard table flag update with pending basechain deletion (bsc#1224510).\n- CVE-2024-27437: vfio/pci: Disable auto-enable of exclusive INTx IRQ (bsc#1222625).\n- CVE-2024-27433: clk: mediatek: mt7622-apmixedsys: Fix an error handling path in clk_mt8135_apmixed_probe() (bsc#1224711).\n- CVE-2024-27403: kabi: restore const specifier in flow_offload_route_init() (bsc#1224415).\n- CVE-2024-27079: iommu/vt-d: Fix NULL domain on device release (bsc#1223742).\n- CVE-2024-27024: net/rds: fix WARNING in rds_conn_connect_if_down (bsc#1223777).\n- CVE-2024-27011: netfilter: nf_tables: fix memleak in map from abort path (bsc#1223803).\n- CVE-2024-27010: net/sched: Fix mirred deadlock on device recursion (bsc#1223720).\n- CVE-2024-26851: netfilter: nf_conntrack_h323: Add protection for bmp length out of range (bsc#1223074)\n- CVE-2024-26837: net: bridge: switchdev: race between creation of new group memberships and generation of the list of MDB events to replay (bsc#1222973).\n- CVE-2024-26835: netfilter: nf_tables: set dormant flag on hook register failure (bsc#1222967).\n- CVE-2024-26812: kABI: vfio: struct virqfd kABI workaround (bsc#1222808).\n- CVE-2024-26809: netfilter: nft_set_pipapo: release elements in clone only from destroy path (bsc#1222633).\n- CVE-2024-26808: netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain (bsc#1222634).\n- CVE-2024-26735: ipv6: sr: fix possible use-after-free and null-ptr-deref (bsc#1222372).\n- CVE-2024-26677: blacklist.conf: Add e7870cf13d20 ('rxrpc: Fix delayed ACKs to not set the reference serial number') (bsc#1222387)\n- CVE-2024-26669: kABI fix for net/sched: flower: Fix chain template offload (bsc#1222350).\n- CVE-2024-26668: netfilter: nft_limit: reject configurations that cause integer overflow (bsc#1222335).\n- CVE-2024-26631: ipv6: mcast: fix data-race in ipv6_mc_down / mld_ifc_work (bsc#1221630).\n- CVE-2024-26590: erofs: fix inconsistent per-file compression format (bsc#1220252).\n- CVE-2023-52889: apparmor: Fix null pointer deref when receiving skb during sock creation (bsc#1229287).\n- CVE-2023-52859: perf: hisi: Fix use-after-free when register pmu fails (bsc#1225582).\n- CVE-2023-52581: netfilter: nf_tables: fix memleak when more than 255 elements expired (bsc#1220877).\n- CVE-2023-52489: mm/sparsemem: fix race in accessing memory_section->usage (bsc#1221326).\n\n\nThe following non-security bugs were fixed:\n\n- ACPI/NUMA: Apply SRAT proximity domain to entire CFMWS window (git-fixes).\n- ACPI: SBS: manage alarm sysfs attribute through psy core (stable-fixes).\n- ACPI: battery: create alarm sysfs attribute atomically (stable-fixes).\n- ACPI: processor_idle: use raw_safe_halt() in acpi_idle_play_dead() (git-fixes).\n- ALSA: hda/hdmi: Yet more pin fix for HP EliteDesk 800 G4 (stable-fixes).\n- ALSA: hda/hdmi: Yet more pin fix for HP EliteDesk 800 G4 (stable-fixes).\n- ALSA: hda/realtek - Fixed ALC256 headphone no sound (stable-fixes).\n- ALSA: hda/realtek - Fixed ALC285 headphone no sound (stable-fixes).\n- ALSA: hda/realtek: Add Framework Laptop 13 (Intel Core Ultra) to quirks (stable-fixes).\n- ALSA: hda/realtek: Add Framework Laptop 13 (Intel Core Ultra) to quirks (stable-fixes).\n- ALSA: hda/realtek: Add quirk for Acer Aspire E5-574G (stable-fixes).\n- ALSA: hda/realtek: Add support for new HP G12 laptops (stable-fixes).\n- ALSA: hda/realtek: Enable mute/micmute LEDs on HP Laptop 14-ey0xxx (stable-fixes).\n- ALSA: hda/realtek: Fix noise from speakers on Lenovo IdeaPad 3 15IAU7 (git-fixes).\n- ALSA: hda/realtek: Fix the speaker output on Samsung Galaxy Book3 Ultra (stable-fixes).\n- ALSA: hda/realtek: Implement sound init sequence for Samsung Galaxy Book3 Pro 360 (stable-fixes).\n- ALSA: hda/realtek: support HP Pavilion Aero 13-bg0xxx Mute LED (stable-fixes).\n- ALSA: hda/tas2781: Use correct endian conversion (git-fixes).\n- ALSA: hda/tas2781: fix wrong calibrated data order (git-fixes).\n- ALSA: hda: Add HP MP9 G4 Retail System AMS to force connect list (stable-fixes).\n- ALSA: hda: Add HP MP9 G4 Retail System AMS to force connect list (stable-fixes).\n- ALSA: hda: Conditionally use snooping for AMD HDMI (git-fixes).\n- ALSA: hda: conexant: Fix headset auto detect fail in the polling mode (git-fixes).\n- ALSA: line6: Fix racy access to midibuf (stable-fixes).\n- ALSA: line6: Fix racy access to midibuf (stable-fixes).\n- ALSA: seq: Skip event type filtering for UMP events (git-fixes).\n- ALSA: seq: ump: Explicitly reset RPN with Null RPN (stable-fixes).\n- ALSA: seq: ump: Optimize conversions from SysEx to UMP (git-fixes).\n- ALSA: seq: ump: Transmit RPN/NRPN message at each MSB/LSB data reception (stable-fixes).\n- ALSA: seq: ump: Use the common RPN/bank conversion context (stable-fixes).\n- ALSA: timer: Relax start tick time check for slave timer elements (git-fixes).\n- ALSA: ump: Explicitly reset RPN with Null RPN (stable-fixes).\n- ALSA: ump: Transmit RPN/NRPN message at each MSB/LSB data reception (stable-fixes).\n- ALSA: usb-audio: Add delay quirk for VIVO USB-C-XE710 HEADSET (stable-fixes).\n- ALSA: usb-audio: Correct surround channels in UAC1 channel map (git-fixes).\n- ALSA: usb-audio: Re-add ScratchAmp quirk entries (git-fixes).\n- ALSA: usb-audio: Re-add ScratchAmp quirk entries (git-fixes).\n- ALSA: usb-audio: Support Yamaha P-125 quirk entry (stable-fixes).\n- ALSA: usb: Fix UBSAN warning in parse_audio_unit() (stable-fixes).\n- ASoC: SOF: Intel: hda-dsp: Make sure that no irq handler is pending before suspend (stable-fixes).\n- ASoC: SOF: Remove libraries from topology lookups (git-fixes).\n- ASoC: SOF: Remove libraries from topology lookups (git-fixes).\n- ASoC: SOF: amd: Fix for acp init sequence (git-fixes).\n- ASoC: SOF: ipc4: check return value of snd_sof_ipc_msg_data (stable-fixes).\n- ASoC: SOF: mediatek: Add missing board compatible (stable-fixes).\n- ASoC: allow module autoloading for table board_ids (stable-fixes).\n- ASoC: allow module autoloading for table db1200_pids (stable-fixes).\n- ASoC: amd: acp: fix module autoloading (git-fixes).\n- ASoC: amd: yc: Add quirk entry for OMEN by HP Gaming Laptop 16-n0xxx (bsc#1227182).\n- ASoC: amd: yc: Support mic on HP 14-em0002la (stable-fixes).\n- ASoC: amd: yc: Support mic on HP 14-em0002la (stable-fixes).\n- ASoC: amd: yc: Support mic on Lenovo Thinkpad E14 Gen 6 (stable-fixes).\n- ASoC: amd: yc: Support mic on Lenovo Thinkpad E14 Gen 6 (stable-fixes).\n- ASoC: codecs: wcd938x-sdw: Correct Soundwire ports mask (git-fixes).\n- ASoC: codecs: wcd938x-sdw: Correct Soundwire ports mask (git-fixes).\n- ASoC: codecs: wsa881x: Correct Soundwire ports mask (git-fixes).\n- ASoC: codecs: wsa881x: Correct Soundwire ports mask (git-fixes).\n- ASoC: codecs: wsa883x: Correct Soundwire ports mask (git-fixes).\n- ASoC: codecs: wsa883x: Correct Soundwire ports mask (git-fixes).\n- ASoC: codecs: wsa884x: Correct Soundwire ports mask (git-fixes).\n- ASoC: codecs: wsa884x: Correct Soundwire ports mask (git-fixes).\n- ASoC: cs35l45: Checks index of cs35l45_irqs[] (stable-fixes).\n- ASoC: cs35l56: Handle OTP read latency over SoundWire (stable-fixes).\n- ASoC: cs35l56: Handle OTP read latency over SoundWire (stable-fixes).\n- ASoC: cs35l56: Patch CS35L56_IRQ1_MASK_18 to the default value (stable-fixes).\n- ASoC: cs35l56: Patch CS35L56_IRQ1_MASK_18 to the default value (stable-fixes).\n- ASoC: fsl_micfil: Expand the range of FIFO watermark mask (stable-fixes).\n- ASoC: fsl_micfil: Expand the range of FIFO watermark mask (stable-fixes).\n- ASoC: mediatek: mt8188: Mark AFE_DAC_CON0 register as volatile (stable-fixes).\n- ASoC: meson: axg-fifo: fix irq scheduling issue with PREEMPT_RT (git-fixes).\n- ASoC: meson: axg-fifo: fix irq scheduling issue with PREEMPT_RT (git-fixes).\n- ASoC: nau8822: Lower debug print priority (stable-fixes).\n- ASoC: nau8822: Lower debug print priority (stable-fixes).\n- Bluetooth: Add device 13d3:3572 IMC Networks Bluetooth Radio (stable-fixes).\n- Bluetooth: Fix usage of __hci_cmd_sync_status (git-fixes).\n- Bluetooth: L2CAP: Fix deadlock (git-fixes).\n- Bluetooth: MGMT: Add error handling to pair_device() (git-fixes).\n- Bluetooth: SMP: Fix assumption of Central always being Initiator (git-fixes).\n- Bluetooth: bnep: Fix out-of-bound access (stable-fixes).\n- Bluetooth: btintel: Fail setup on error (git-fixes).\n- Bluetooth: btnxpuart: Shutdown timer and prevent rearming when driver unloading (stable-fixes).\n- Bluetooth: btusb: Add RTL8852BE device 0489:e125 to device tables (stable-fixes).\n- Bluetooth: btusb: Add Realtek RTL8852BE support ID 0x13d3:0x3591 (stable-fixes).\n- Bluetooth: hci_conn: Check non NULL function before calling for HFP offload (stable-fixes).\n- Bluetooth: hci_core: Fix LE quote calculation (git-fixes).\n- Bluetooth: hci_core: Fix not handling hibernation actions (git-fixes).\n- Bluetooth: hci_sync: Fix suspending with wrong filter policy (git-fixes).\n- Bluetooth: hci_sync: avoid dup filtering when passive scanning with adv monitor (git-fixes).\n- Bluetooth: l2cap: always unlock channel in l2cap_conless_channel() (git-fixes).\n- Drop libata patch that caused a regression (bsc#1229054)\n- HID: wacom: Defer calculation of resolution until resolution_code is known (git-fixes).\n- Input: i8042 - add Fujitsu Lifebook E756 to i8042 quirk table (bsc#1229056).\n- Input: i8042 - add forcenorestore quirk to leave controller untouched even on s3 (stable-fixes).\n- Input: i8042 - use new forcenorestore quirk to replace old buggy quirk combination (stable-fixes).\n- KVM: Always flush async #PF workqueue when vCPU is being destroyed (git-fixes).\n- KVM: Make KVM_MEM_GUEST_MEMFD mutually exclusive with KVM_MEM_READONLY (git-fixes).\n- KVM: PPC: Book3S HV: Fix the set_one_reg for MMCR3 (bsc#1194869).\n- KVM: PPC: Book3S HV: Handle pending exceptions on guest entry with MSR_EE (bsc#1215199).\n- KVM: Protect vcpu->pid dereference via debugfs with RCU (git-fixes).\n- KVM: Reject overly excessive IDs in KVM_CREATE_VCPU (git-fixes).\n- KVM: Stop processing *all* memslots when 'null' mmu_notifier handler is found (git-fixes).\n- KVM: VMX: Move posted interrupt descriptor out of VMX code (git-fixes).\n- KVM: VMX: Split out the non-virtualization part of vmx_interrupt_blocked() (git-fixes).\n- KVM: VMX: Switch __vmx_exit() and kvm_x86_vendor_exit() in vmx_exit() (git-fixes).\n- KVM: arm64: AArch32: Fix spurious trapping of conditional instructions (git-fixes).\n- KVM: arm64: Add missing memory barriers when switching to pKVM's hyp pgd (git-fixes).\n- KVM: arm64: Allow AArch32 PSTATE.M to be restored as System mode (git-fixes).\n- KVM: arm64: Fix AArch32 register narrowing on userspace write (git-fixes).\n- KVM: arm64: Fix __pkvm_init_switch_pgd call ABI (git-fixes).\n- KVM: arm64: Fix clobbered ELR in sync abort/SError (git-fixes)\n- KVM: arm64: GICv4: Do not perform a map to a mapped vLPI (git-fixes).\n- KVM: arm64: timers: Correctly handle TGE flip with CNTPOFF_EL2 (git-fixes).\n- KVM: arm64: timers: Fix resource leaks in kvm_timer_hyp_init() (git-fixes).\n- KVM: arm64: vgic-its: Test for valid IRQ in MOVALL handler (git-fixes).\n- KVM: arm64: vgic-its: Test for valid IRQ in its_sync_lpi_pending_table() (git-fixes).\n- KVM: arm64: vgic-v2: Use cpuid from userspace as vcpu_id (git-fixes).\n- KVM: arm64: vgic-v4: Restore pending state on host userspace write (git-fixes).\n- KVM: arm64: vgic: Add a non-locking primitive for kvm_vgic_vcpu_destroy() (git-fixes).\n- KVM: arm64: vgic: Force vcpu vgic teardown on vcpu destroy (git-fixes).\n- KVM: arm64: vgic: Simplify kvm_vgic_destroy() (git-fixes).\n- KVM: fix kvm_mmu_memory_cache allocation warning (git-fixes).\n- KVM: nVMX: Add a helper to get highest pending from Posted Interrupt vector (git-fixes).\n- KVM: nVMX: Check for pending posted interrupts when looking for nested events (git-fixes).\n- KVM: nVMX: Request immediate exit iff pending nested event needs injection (git-fixes).\n- KVM: s390: fix LPSWEY handling (bsc#1227634 git-fixes).\n- KVM: s390: fix validity interception issue when gisa is switched off (git-fixes bsc#1229167).\n- KVM: x86/mmu: Bug the VM if KVM tries to split a !hugepage SPTE (git-fixes).\n- KVM: x86: Limit check IDs for KVM_SET_BOOT_CPU_ID (git-fixes).\n- Move upstreamed powerpc patches into sorted section\n- Move upstreamed sound patches into sorted section\n- Moved upstreamed ASoC patch into sorted section\n- NFSD: Support write delegations in LAYOUTGET (git-fixes).\n- NFSv4.1 another fix for EXCHGID4_FLAG_USE_PNFS_DS for DS server (git-fixes).\n- PCI: Add Edimax Vendor ID to pci_ids.h (stable-fixes).\n- PCI: hv: Return zero, not garbage, when reading PCI_INTERRUPT_PIN (git-fixes).\n- PCI: loongson: Enable MSI in LS7A Root Complex (stable-fixes).\n- RDMA/cache: Release GID table even if leak is detected (git-fixes)\n- RDMA/device: Return error earlier if port in not valid (git-fixes)\n- RDMA/hns: Check atomic wr length (git-fixes)\n- RDMA/hns: Fix insufficient extend DB for VFs. (git-fixes)\n- RDMA/hns: Fix mbx timing out before CMD execution is completed (git-fixes)\n- RDMA/hns: Fix missing pagesize and alignment check in FRMR (git-fixes)\n- RDMA/hns: Fix shift-out-bounds when max_inline_data is 0 (git-fixes)\n- RDMA/hns: Fix soft lockup under heavy CEQE load (git-fixes)\n- RDMA/hns: Fix undifined behavior caused by invalid max_sge (git-fixes)\n- RDMA/hns: Fix unmatch exception handling when init eq table fails (git-fixes)\n- RDMA/iwcm: Fix a use-after-free related to destroying CM IDs (git-fixes)\n- RDMA/mana_ib: Use virtual address in dma regions for MRs (git-fixes).\n- RDMA/mlx4: Fix truncated output warning in alias_GUID.c (git-fixes)\n- RDMA/mlx4: Fix truncated output warning in mad.c (git-fixes)\n- RDMA/mlx5: Set mkeys for dmabuf at PAGE_SIZE (git-fixes)\n- RDMA/rxe: Do not set BTH_ACK_MASK for UC or UD QPs (git-fixes)\n- RDMA: Fix netdev tracker in ib_device_set_netdev (git-fixes)\n- Revert 'ALSA: firewire-lib: obsolete workqueue for period update' (bsc#1208783).\n- Revert 'ALSA: firewire-lib: operate for period elapse event in process context' (bsc#1208783).\n- Revert 'KVM: Prevent module exit until all VMs are freed' (git-fixes).\n- Revert 'Revert 'md/raid5: Wait for MD_SB_CHANGE_PENDING in raid5d'' (git-fixes).\n- Revert 'md/raid5: Wait for MD_SB_CHANGE_PENDING in raid5d' (git-fixes).\n- Revert 'misc: fastrpc: Restrict untrusted app to attach to privileged PD' (git-fixes).\n- Revert 'mm: prevent derefencing NULL ptr in pfn_section_valid()' (bsc#1230413).\n- Revert 'mm, kmsan: fix infinite recursion due to RCU critical section' (bsc#1230413).\n- Revert 'mm/sparsemem: fix race in accessing memory_section->usage' (bsc#1230413).\n- Revert 'usb: gadget: uvc: cleanup request when not in correct state' (stable-fixes).\n- Revert 'usb: typec: tcpm: clear pd_event queue in PORT_RESET' (git-fixes).\n- SUNRPC: Fix a race to wake a sync task (git-fixes).\n- SUNRPC: add a missing rpc_stat for TCP TLS (git-fixes).\n- Squashfs: fix variable overflow triggered by sysbot (git-fixes).\n- USB: serial: debug: do not echo input by default (stable-fixes).\n- Update config files. Disable CONFIG_KFENCE on ppc64le (bsc#1226920)\n- Update config files. Disable vdpa drivers for Alibaba ENI and SolidNET (jsc#PED-8954, bsc#1227834)\n- Update patch references for ASoC regression fixes (bsc#1229045, bsc#1229046)\n- afs: fix __afs_break_callback() / afs_drop_open_mmap() race (git-fixes).\n- apparmor: unpack transition table if dfa is not present (bsc#1226031).\n- arm64: ACPI: NUMA: initialize all values of acpi_early_node_map to (git-fixes)\n- arm64: Add Neoverse-V2 part (git-fixes)\n- arm64: Fix KASAN random tag seed initialization (git-fixes)\n- arm64: armv8_deprecated: Fix warning in isndep cpuhp starting process (git-fixes)\n- arm64: barrier: Restore spec_bar() macro (git-fixes)\n- arm64: cputype: Add Cortex-A720 definitions (git-fixes)\n- arm64: cputype: Add Cortex-A725 definitions (git-fixes)\n- arm64: cputype: Add Cortex-X1C definitions (git-fixes)\n- arm64: cputype: Add Cortex-X3 definitions (git-fixes)\n- arm64: cputype: Add Cortex-X4 definitions (git-fixes)\n- arm64: cputype: Add Cortex-X925 definitions (git-fixes)\n- arm64: cputype: Add Neoverse-V3 definitions (git-fixes)\n- arm64: dts: imx8mp: Add NPU Node (git-fixes)\n- arm64: dts: imx8mp: Fix pgc vpu locations (git-fixes)\n- arm64: dts: imx8mp: Fix pgc_mlmix location (git-fixes)\n- arm64: dts: imx8mp: add HDMI power-domains (git-fixes)\n- arm64: errata: Expand speculative SSBS workaround (again) (git-fixes)\n- arm64: errata: Expand speculative SSBS workaround (git-fixes)\n- arm64: errata: Unify speculative SSBS errata logic (git-fixes). Update config files.\n- arm64: jump_label: Ensure patched jump_labels are visible to all CPUs (git-fixes)\n- ata: libata-scsi: Do not overwrite valid sense data when CK_COND=1 (stable-fixes).\n- ata: libata-scsi: Honor the D_SENSE bit for CK_COND=1 and no error (stable-fixes).\n- blacklist.conf: Add libata upstream revert entry (bsc#1229054)\n- bnxt_re: Fix imm_data endianness (git-fixes)\n- bpf, arm64: Fix trampoline for BPF_TRAMP_F_CALL_ORIG (git-fixes)\n- bpf, lpm: Fix check prefixlen before walking trie (git-fixes).\n- bpf/tests: Remove duplicate JSGT tests (git-fixes).\n- bpf: Add crosstask check to __bpf_get_stack (git-fixes).\n- bpf: Detect IP == ksym.end as part of BPF program (git-fixes).\n- bpf: Ensure proper register state printing for cond jumps (git-fixes).\n- bpf: Fix a few selftest failures due to llvm18 change (git-fixes).\n- bpf: Fix a kernel verifier crash in stacksafe() (bsc#1225903).\n- bpf: Fix check_stack_write_fixed_off() to correctly spill imm (git-fixes).\n- bpf: Fix kfunc callback register type handling (git-fixes).\n- bpf: Fix prog_array_map_poke_run map poke update (git-fixes).\n- bpf: Fix unnecessary -EBUSY from htab_lock_bucket (git-fixes).\n- bpf: Mark bpf_spin_{lock,unlock}() helpers with notrace correctly (git-fixes).\n- bpf: Remove unnecessary wait from bpf_map_copy_value() (git-fixes).\n- bpf: Set uattr->batch.count as zero before batched update or deletion (git-fixes).\n- bpf: do not infer PTR_TO_CTX for programs with unnamed context type (git-fixes).\n- bpf: enforce precision of R0 on callback return (git-fixes).\n- bpf: extract bpf_ctx_convert_map logic and make it more reusable (git-fixes).\n- bpf: fix control-flow graph checking in privileged mode (git-fixes).\n- bpf: handle bpf_user_pt_regs_t typedef explicitly for PTR_TO_CTX global arg (git-fixes).\n- bpf: hardcode BPF_PROG_PACK_SIZE to 2MB * num_possible_nodes() (git-fixes).\n- bpf: kprobe: remove unused declaring of bpf_kprobe_override (git-fixes).\n- bpf: simplify btf_get_prog_ctx_type() into btf_is_prog_ctx_type() (git-fixes).\n- bpftool: Align output skeleton ELF code (git-fixes).\n- bpftool: Fix -Wcast-qual warning (git-fixes).\n- bpftool: Silence build warning about calloc() (git-fixes).\n- bpftool: mark orphaned programs during prog show (git-fixes).\n- btrfs: add a btrfs_finish_ordered_extent helper (git-fixes).\n- btrfs: add a is_data_bbio helper (git-fixes).\n- btrfs: add an ordered_extent pointer to struct btrfs_bio (git-fixes).\n- btrfs: copy dir permission and time when creating a stub subvolume (bsc#1228321).\n- btrfs: ensure fast fsync waits for ordered extents after a write failure (git-fixes).\n- btrfs: factor out a btrfs_queue_ordered_fn helper (git-fixes).\n- btrfs: factor out a can_finish_ordered_extent helper (git-fixes).\n- btrfs: fix corruption after buffer fault in during direct IO append write (git-fixes).\n- btrfs: fix double inode unlock for direct IO sync writes (git-fixes).\n- btrfs: fix extent map use-after-free when adding pages to compressed bio (git-fixes).\n- btrfs: fix leak of qgroup extent records after transaction abort (git-fixes).\n- btrfs: fix ordered extent split error handling in btrfs_dio_submit_io (git-fixes).\n- btrfs: limit write bios to a single ordered extent (git-fixes).\n- btrfs: make btrfs_finish_ordered_extent() return void (git-fixes).\n- btrfs: merge the two calls to btrfs_add_ordered_extent in run_delalloc_nocow (git-fixes).\n- btrfs: open code btrfs_bio_end_io in btrfs_dio_submit_io (git-fixes).\n- btrfs: open code end_extent_writepage in end_bio_extent_writepage (git-fixes).\n- btrfs: pass a btrfs_inode to btrfs_fdatawrite_range() (git-fixes).\n- btrfs: pass a btrfs_inode to btrfs_wait_ordered_range() (git-fixes).\n- btrfs: pass an ordered_extent to btrfs_reloc_clone_csums (git-fixes).\n- btrfs: pass an ordered_extent to btrfs_submit_compressed_write (git-fixes).\n- btrfs: remove btrfs_add_ordered_extent (git-fixes).\n- btrfs: rename err to ret in btrfs_direct_write() (git-fixes).\n- btrfs: uninline some static inline helpers from tree-log.h (git-fixes).\n- btrfs: use a btrfs_inode in the log context (struct btrfs_log_ctx) (git-fixes).\n- btrfs: use a btrfs_inode local variable at btrfs_sync_file() (git-fixes).\n- btrfs: use bbio->ordered in btrfs_csum_one_bio (git-fixes).\n- btrfs: use btrfs_finish_ordered_extent to complete buffered writes (git-fixes).\n- btrfs: use btrfs_finish_ordered_extent to complete compressed writes (git-fixes).\n- btrfs: use btrfs_finish_ordered_extent to complete direct writes (git-fixes).\n- btrfs: use irq safe locking when running and adding delayed iputs (git-fixes).\n- cachefiles, erofs: Fix NULL deref in when cachefiles is not doing ondemand-mode (bsc#1229245).\n- cachefiles: add missing lock protection when polling (bsc#1229256).\n- cachefiles: add restore command to recover inflight ondemand read requests (bsc#1229244).\n- cachefiles: add spin_lock for cachefiles_ondemand_info (bsc#1229249).\n- cachefiles: cancel all requests for the object that is being dropped (bsc#1229255).\n- cachefiles: defer exposing anon_fd until after copy_to_user() succeeds (bsc#1229251).\n- cachefiles: extract ondemand info field from cachefiles_object (bsc#1229240).\n- cachefiles: fix slab-use-after-free in cachefiles_ondemand_daemon_read() (bsc#1229247).\n- cachefiles: fix slab-use-after-free in cachefiles_ondemand_get_fd() (bsc#1229246).\n- cachefiles: introduce object ondemand state (bsc#1229239).\n- cachefiles: make on-demand read killable (bsc#1229252).\n- cachefiles: narrow the scope of triggering EPOLLIN events in ondemand mode (bsc#1229243).\n- cachefiles: never get a new anonymous fd if ondemand_id is valid (bsc#1229250).\n- cachefiles: propagate errors from vfs_getxattr() to avoid infinite loop (bsc#1229253).\n- cachefiles: remove err_put_fd label in cachefiles_ondemand_daemon_read() (bsc#1229248).\n- cachefiles: resend an open request if the read request's object is closed (bsc#1229241).\n- cachefiles: stop sending new request when dropping object (bsc#1229254).\n- can: mcp251xfd: tef: prepare to workaround broken TEF FIFO tail index erratum (stable-fixes).\n- can: mcp251xfd: tef: update workaround for erratum DS80000789E 6 of mcp2518fd (stable-fixes).\n- ceph: periodically flush the cap releases (bsc#1230056).\n- cgroup/cpuset: Prevent UAF in proc_cpuset_show() (bsc#1228801).\n- cgroup: Add annotation for holding namespace_sem in current_cgns_cgroup_from_root() (bsc#1222254).\n- cgroup: Eliminate the need for cgroup_mutex in proc_cgroup_show() (bsc#1222254).\n- cgroup: Make operations on the cgroup root_list RCU safe (bsc#1222254).\n- cgroup: Remove unnecessary list_empty() (bsc#1222254).\n- cgroup: preserve KABI of cgroup_root (bsc#1222254).\n- char: xillybus: Check USB endpoints when probing device (git-fixes).\n- char: xillybus: Do not destroy workqueue from work item running on it (stable-fixes).\n- char: xillybus: Refine workqueue handling (git-fixes).\n- clk: en7523: fix rate divider for slic and spi clocks (git-fixes).\n- clk: qcom: Park shared RCGs upon registration (git-fixes).\n- clk: qcom: camcc-sc7280: Add parent dependency to all camera GDSCs (git-fixes).\n- clk: qcom: gcc-sa8775p: Update the GDSC wait_val fields and flags (git-fixes).\n- clk: qcom: gcc-sc7280: Update force mem core bit for UFS ICE clock (git-fixes).\n- clk: qcom: gpucc-sa8775p: Park RCG's clk source at XO during disable (git-fixes).\n- clk: qcom: gpucc-sa8775p: Remove the CLK_IS_CRITICAL and ALWAYS_ON flags (git-fixes).\n- clk: qcom: gpucc-sa8775p: Update wait_val fields for GPU GDSC's (git-fixes).\n- clk: qcom: gpucc-sm8350: Park RCG's clk source at XO during disable (git-fixes).\n- clk: qcom: kpss-xcc: Return of_clk_add_hw_provider to transfer the error (git-fixes).\n- clk: visconti: Add bounds-checking coverage for struct visconti_pll_provider (stable-fixes).\n- clocksource/drivers/sh_cmt: Address race condition for clock events (stable-fixes).\n- cpu/SMT: Enable SMT only if a core is online (bsc#1214285 bsc#1205462 ltc#200161 ltc#200588 git-fixes).\n- dev/parport: fix the array out-of-bounds risk (stable-fixes).\n- device property: Add cleanup.h based fwnode_handle_put() scope based cleanup (stable-fixes).\n- dmaengine: dw: Add memory bus width verification (git-fixes).\n- dmaengine: dw: Add peripheral bus width verification (git-fixes).\n- docs: KVM: Fix register ID of SPSR_FIQ (git-fixes).\n- driver core: Fix uevent_show() vs driver detach race (git-fixes).\n- drm/admgpu: fix dereferencing null pointer context (stable-fixes).\n- drm/amd/display: Add delay to improve LTTPR UHBR interop (stable-fixes).\n- drm/amd/display: Add null checker before passing variables (stable-fixes).\n- drm/amd/display: Adjust cursor position (git-fixes).\n- drm/amd/display: Check for NULL pointer (stable-fixes).\n- drm/amd/display: Skip Recompute DSC Params if no Stream on Link (stable-fixes).\n- drm/amd/display: avoid using null object of framebuffer (git-fixes).\n- drm/amd/display: fix cursor offset on rotation 180 (git-fixes).\n- drm/amd/display: fix s2idle entry for DCN3.5+ (stable-fixes).\n- drm/amd/pm: Fix the null pointer dereference for vega10_hwmgr (stable-fixes).\n- drm/amdgpu/jpeg2: properly set atomics vmid field (stable-fixes).\n- drm/amdgpu/jpeg4: properly set atomics vmid field (stable-fixes).\n- drm/amdgpu/pm: Fix the null pointer dereference for smu7 (stable-fixes).\n- drm/amdgpu/pm: Fix the null pointer dereference in apply_state_adjust_rules (stable-fixes).\n- drm/amdgpu/pm: Fix the param type of set_power_profile_mode (stable-fixes).\n- drm/amdgpu/sdma5.2: Update wptr registers as well as doorbell (stable-fixes).\n- drm/amdgpu/sdma5.2: limit wptr workaround to sdma 5.2.1 (git-fixes).\n- drm/amdgpu: Actually check flags for all context ops (stable-fixes).\n- drm/amdgpu: Add lock around VF RLCG interface (stable-fixes).\n- drm/amdgpu: Fix the null pointer dereference to ras_manager (stable-fixes).\n- drm/amdgpu: Forward soft recovery errors to userspace (stable-fixes).\n- drm/amdgpu: Validate TA binary size (stable-fixes).\n- drm/amdgpu: fix dereference null return value for the function amdgpu_vm_pt_parent (stable-fixes).\n- drm/amdgpu: fix potential resource leak warning (stable-fixes).\n- drm/amdgpu: reset vm state machine after gpu reset(vram lost) (stable-fixes).\n- drm/bridge: analogix_dp: properly handle zero sized AUX transactions (stable-fixes).\n- drm/client: fix null pointer dereference in drm_client_modeset_probe (git-fixes).\n- drm/dp_mst: Skip CSN if topology probing is not done yet (stable-fixes).\n- drm/etnaviv: do not block scheduler when GPU is still active (stable-fixes).\n- drm/i915/dsi: Make Lenovo Yoga Tab 3 X90F DMI match less strict (git-fixes).\n- drm/i915/gem: Adjust vma offset for framebuffer mmap offset (stable-fixes).\n- drm/i915/gem: Fix Virtual Memory mapping boundaries calculation (git-fixes).\n- drm/i915/hdcp: Fix HDCP2_STREAM_STATUS macro (git-fixes).\n- drm/i915: Fix possible int overflow in skl_ddi_calculate_wrpll() (git-fixes).\n- drm/lima: set gp bus_stop bit before hard reset (stable-fixes).\n- drm/mediatek/dp: Fix spurious kfree() (git-fixes).\n- drm/msm/dp: fix the max supported bpp logic (git-fixes).\n- drm/msm/dp: reset the link phy params before link training (git-fixes).\n- drm/msm/dpu: capture snapshot on the first commit_done timeout (stable-fixes).\n- drm/msm/dpu: cleanup FB if dpu_format_populate_layout fails (git-fixes).\n- drm/msm/dpu: do not play tricks with debug macros (git-fixes).\n- drm/msm/dpu: drop MSM_ENC_VBLANK support (stable-fixes).\n- drm/msm/dpu: move dpu_encoder's connector assignment to atomic_enable() (git-fixes).\n- drm/msm/dpu: split dpu_encoder_wait_for_event into two functions (stable-fixes).\n- drm/msm/dpu: take plane rotation into account for wide planes (git-fixes).\n- drm/msm/dpu: try multirect based on mdp clock limits (stable-fixes).\n- drm/msm/dpu: use drmm-managed allocation for dpu_encoder_phys (stable-fixes).\n- drm/msm/mdss: Rename path references to mdp_path (stable-fixes).\n- drm/msm/mdss: switch mdss to use devm_of_icc_get() (stable-fixes).\n- drm/msm: Reduce fallout of fence signaling vs reclaim hangs (stable-fixes).\n- drm/nouveau: prime: fix refcount underflow (git-fixes).\n- drm/panel: nt36523: Set 120Hz fps for xiaomi,elish panels (stable-fixes).\n- drm/radeon/evergreen_cs: Clean up errors in evergreen_cs.c (bsc#1229024).\n- drm/radeon: Remove __counted_by from StateArray.states[] (git-fixes).\n- drm/rockchip: vop2: clear afbc en and transform bit for cluster window at linear mode (stable-fixes).\n- drm/virtio: Fix type of dma-fence context variable (git-fixes).\n- drm/vmwgfx: Fix a deadlock in dma buf fence polling (git-fixes).\n- drm/vmwgfx: Fix overlay when using Screen Targets (git-fixes).\n- drm/vmwgfx: Fix prime with external buffers (git-fixes).\n- efi/libstub: Zero initialize heap allocated struct screen_info (git-fixes).\n- evm: do not copy up 'security.evm' xattr (git-fixes).\n- firmware: cirrus: cs_dsp: Initialize debugfs_root to invalid (stable-fixes).\n- fs/netfs/fscache_cookie: add missing 'n_accesses' check (bsc#1229455).\n- fuse: Initialize beyond-EOF page contents before setting uptodate (bsc#1229456).\n- genirq/cpuhotplug, x86/vector: Prevent vector leak during CPU offline (git-fixes).\n- genirq/generic_chip: Make irq_remove_generic_chip() irqdomain aware (git-fixes).\n- genirq/matrix: Exclude managed interrupts in irq_matrix_allocated() (git-fixes).\n- gfs2: setattr_chown: Add missing initialization (git-fixes).\n- gpio: mlxbf3: Support shutdown() function (git-fixes).\n- gpio: prevent potential speculation leaks in gpio_device_get_desc() (stable-fixes).\n- gpio: sysfs: extend the critical section for unregistering sysfs devices (stable-fixes).\n- gss_krb5: Fix the error handling path for crypto_sync_skcipher_setkey (git-fixes).\n- hfs: fix to initialize fields of hfs_inode_info after hfs_alloc_inode() (git-fixes).\n- hwmon: (ltc2992) Avoid division by zero (stable-fixes).\n- hwmon: (ltc2992) Fix memory leak in ltc2992_parse_dt() (git-fixes).\n- hwmon: (pc87360) Bounds check data->innr usage (stable-fixes).\n- i2c: Fix conditional for substituting empty ACPI functions (stable-fixes).\n- i2c: Use IS_REACHABLE() for substituting empty ACPI functions (git-fixes).\n- i2c: qcom-geni: Add missing clk_disable_unprepare in geni_i2c_runtime_resume (git-fixes).\n- i2c: qcom-geni: Add missing geni_icc_disable in geni_i2c_runtime_resume (git-fixes).\n- i2c: qcom-geni: Add missing geni_icc_disable in geni_i2c_runtime_resume (git-fixes).\n- i2c: riic: avoid potential division by zero (stable-fixes).\n- i2c: smbus: Improve handling of stuck alerts (git-fixes).\n- i2c: smbus: Send alert notifications to all devices if source not found (git-fixes).\n- i2c: stm32f7: Add atomic_xfer method to driver (stable-fixes).\n- i3c: mipi-i3c-hci: Do not unmap region not mapped for transfer (stable-fixes).\n- i3c: mipi-i3c-hci: Remove BUG() when Ring Abort request times out (stable-fixes).\n- i915/perf: Remove code to update PWR_CLK_STATE for gen12 (git-fixes).\n- ice: Fix NULL pointer access, if PF does not support SRIOV_LAG (bsc#1228737).\n- io_uring/advise: support 64-bit lengths (git-fixes).\n- io_uring: Drop per-ctx dummy_ubuf (git-fixes).\n- io_uring: Fix probe of disabled operations (git-fixes).\n- io_uring: fix io_match_task must_hold (git-fixes).\n- io_uring: tighten task exit cancellations (git-fixes).\n- iommu/amd: Convert comma to semicolon (git-fixes).\n- iommu/vt-d: Fix identity map bounds in si_domain_init() (git-fixes).\n- iommufd/device: Fix hwpt at err_unresv in iommufd_device_do_replace() (git-fixes).\n- ip6_tunnel: Fix broken GRO (bsc#1229444).\n- ipv6: sr: fix incorrect unregister order (git-fixes).\n- irqdomain: Fixed unbalanced fwnode get and put (git-fixes).\n- jfs: Fix shift-out-of-bounds in dbDiscardAG (git-fixes).\n- jfs: define xtree root and page independently (git-fixes).\n- jfs: fix null ptr deref in dtInsertEntry (git-fixes).\n- jump_label: Clarify condition in static_key_fast_inc_not_disabled() (git-fixes).\n- jump_label: Fix concurrency issues in static_key_slow_dec() (git-fixes).\n- jump_label: Fix the fix, brown paper bags galore (git-fixes).\n- jump_label: Simplify and clarify static_key_fast_inc_cpus_locked() (git-fixes).\n- kABI fix of: virtio-crypto: handle config changed by work queue (git-fixes).\n- kABI workaround for sound core UMP conversion (stable-fixes).\n- kabi fix for KVM: s390: fix LPSWEY handling (bsc#1227634 git-fixes).\n- kabi fix for SUNRPC: add a missing rpc_stat for TCP TLS (git-fixes).\n- kabi/severities: ignore kABI for FireWire sound local symbols (bsc#1208783)\n- kabi: more build fix without patches.kabi (bsc#1226502)\n- kcov: properly check for softirq context (git-fixes).\n- kernel-binary.spec.in: Enable klp_symbols on openSUSE Tumbleweed (boo#1229042). \n- kernel-binary: generate and install compile_commands.json (bsc#1228971). \n- kernfs: Convert kernfs_path_from_node_locked() from strlcpy() to strscpy() (bsc#1229134).\n- kernfs: fix false-positive WARN(nr_mmapped) in kernfs_drain_open_files (git-fixes).\n- kprobes: Fix to check symbol prefixes correctly (git-fixes).\n- kprobes: Prohibit probing on CFI preamble symbol (git-fixes).\n- kvm: s390: Reject memory region operations for ucontrol VMs (git-fixes bsc#1229168).\n- libbpf: Add missing LIBBPF_API annotation to libbpf_set_memlock_rlim API (git-fixes).\n- libbpf: Apply map_set_def_max_entries() for inner_maps on creation (git-fixes).\n- libbpf: Fix faccessat() usage on Android (git-fixes).\n- libbpf: Use OPTS_SET() macro in bpf_xdp_query() (git-fixes).\n- md-cluster: fix hanging issue while a new disk adding (bsc#1223395).\n- md-cluster: fix hanging issue while a new disk adding (bsc#1223395).\n- md-cluster: fix no recovery job when adding/re-adding a disk (bsc#1223395).\n- md-cluster: fix no recovery job when adding/re-adding a disk (bsc#1223395).\n- md-cluster: keeping kabi compatibility for upstream commit 35a0a409fa26 (bsc#1223395).\n- md/md-bitmap: fix writing non bitmap pages (git-fixes).\n- md/raid1: set max_sectors during early return from choose_slow_rdev() (git-fixes).\n- md/raid1: support read error check (git-fixes).\n- md/raid5: fix deadlock that raid5d() wait for itself to clear MD_SB_CHANGE_PENDING (git-fixes).\n- md/raid5: fix spares errors about rcu usage (git-fixes).\n- md/raid5: recheck if reshape has finished with device_lock held (git-fixes).\n- md: Do not wait for MD_RECOVERY_NEEDED for HOT_REMOVE_DISK ioctl (git-fixes).\n- md: add a mddev_add_trace_msg helper (git-fixes).\n- md: add check for sleepers in md_wakeup_thread() (git-fixes).\n- md: change the return value type of md_write_start to void (git-fixes).\n- md: do not account sync_io if iostats of the disk is disabled (git-fixes).\n- md: do not delete safemode_timer in mddev_suspend (git-fixes).\n- md: factor out a helper exceed_read_errors() to check read_errors (git-fixes).\n- md: fix a suspicious RCU usage warning (git-fixes).\n- media: Revert 'media: dvb-usb: Fix unexpected infinite loop in dvb_usb_read_remote_control()' (git-fixes).\n- media: amphion: Remove lock in s_ctrl callback (stable-fixes).\n- media: drivers/media/dvb-core: copy user arrays safely (stable-fixes).\n- media: pci: cx23885: check cx23885_vdev_init() return (stable-fixes).\n- media: uvcvideo: Add quirk for invalid dev_sof in Logitech C920 (git-fixes).\n- media: uvcvideo: Disable autosuspend for Insta360 Link (stable-fixes).\n- media: uvcvideo: Fix the bandwdith quirk on USB 3.x (stable-fixes).\n- media: uvcvideo: Ignore empty TS packets (stable-fixes).\n- media: uvcvideo: Quirk for invalid dev_sof in Logitech C922 (stable-fixes).\n- media: xc2028: avoid use-after-free in load_firmware_cb() (stable-fixes).\n- memcg: protect concurrent access to mem_cgroup_idr (git-fixes).\n- memory: stm32-fmc2-ebi: check regmap_read return value (stable-fixes).\n- memory: tegra: Skip SID programming if SID registers are not set (stable-fixes).\n- minmax: add a few more MIN_T/MAX_T users (bsc#1229024).\n- minmax: avoid overly complicated constant expressions in VM code (bsc#1229024).\n- minmax: do not use max() in situations that want a C constant expression (bsc#1229024).\n- minmax: fix up min3() and max3() too (bsc#1229024).\n- minmax: improve macro expansion and type checking (bsc#1229024).\n- minmax: make generic MIN() and MAX() macros available everywhere (bsc#1229024).\n- minmax: simplify and clarify min_t()/max_t() implementation (bsc#1229024).\n- minmax: simplify min()/max()/clamp() implementation (bsc#1229024).\n- mm, kmsan: fix infinite recursion due to RCU critical section (git-fixes).\n- mm: prevent derefencing NULL ptr in pfn_section_valid() (git-fixes).\n- mmc: dw_mmc: allow biu and ciu clocks to defer (git-fixes).\n- mmc: mmc_test: Fix NULL dereference on allocation failure (git-fixes).\n- mmc: mtk-sd: receive cmd8 data when hs400 tuning fail (git-fixes).\n- net/iucv: fix the allocation size of iucv_path_table array (git-fixes bsc#1229451).\n- net/iucv: fix use after free in iucv_sock_close() (bsc#1228973).\n- net/rds: fix possible cp null dereference (git-fixes).\n- net/sched: initialize noop_qdisc owner (git-fixes).\n- net: drop bad gso csum_start and offset in virtio_net_hdr (git-fixes).\n- net: ethernet: mtk_wed: fix use-after-free panic in mtk_wed_setup_tc_block_cb() (git-fixes).\n- net: fix sk_memory_allocated_{add|sub} vs softirqs (bsc#1228757).\n- net: mana: Add support for page sizes other than 4KB on ARM64 (jsc#PED-8491 bsc#1226530).\n- net: mana: Fix RX buf alloc_size alignment and atomic op panic (bsc#1229086).\n- net: mana: Fix doorbell out of order violation and avoid unnecessary doorbell rings (bsc#1229154).\n- net: mana: Fix race of mana_hwc_post_rx_wqe and new hwc response (git-fixes).\n- net: missing check virtio (git-fixes).\n- net: phy: micrel: Fix the KSZ9131 MDI-X status issue (git-fixes).\n- net: phy: realtek: add support for RTL8366S Gigabit PHY (git-fixes).\n- net: usb: qmi_wwan: fix memory leak for not ip packets (git-fixes).\n- net: usb: sr9700: fix uninitialized variable use in sr_mdio_read (git-fixes).\n- netfs, fscache: export fscache_put_volume() and add fscache_try_get_volume() (bsc#1228459 bsc#1228462).\n- nfc: pn533: Add poll mod list filling check (git-fixes).\n- nfs: do not invalidate dentries on transient errors (git-fixes).\n- nfs: expose /proc/net/sunrpc/nfs in net namespaces (git-fixes).\n- nfs: make the rpc_stat per net namespace (git-fixes).\n- nfs: pass explicit offset/count to trace events (git-fixes).\n- nfs: propagate readlink errors in nfs_symlink_filler (git-fixes).\n- nouveau/firmware: use dma non-coherent allocator (git-fixes).\n- nvme-multipath: find NUMA path only for online numa-node (git-fixes).\n- nvme-multipath: implement 'queue-depth' iopolicy (bsc#1227706).\n- nvme-multipath: prepare for 'queue-depth' iopolicy (bsc#1227706).\n- nvme-pci: Fix the instructions for disabling power management (git-fixes).\n- nvme-pci: add missing condition check for existence of mapped data (git-fixes).\n- nvme-pci: do not directly handle subsys reset fallout (bsc#1220066).\n- nvme-sysfs: add 'tls_configured_key' sysfs attribute (bsc#1221857).\n- nvme-sysfs: add 'tls_keyring' attribute (bsc#1221857).\n- nvme-tcp: check for invalidated or revoked key (bsc#1221857).\n- nvme-tcp: sanitize TLS key handling (bsc#1221857).\n- nvme: add a newline to the 'tls_key' sysfs attribute (bsc#1221857).\n- nvme: adjust multiples of NVME_CTRL_PAGE_SIZE in offset (git-fixes).\n- nvme: avoid double free special payload (git-fixes).\n- nvme: fix NVME_NS_DEAC may incorrectly identifying the disk as EXT_LBA (git-fixes).\n- nvme: fixup comment for nvme RDMA Provider Type (git-fixes).\n- nvme: split off TLS sysfs attributes into a separate group (bsc#1221857).\n- nvme: tcp: remove unnecessary goto statement (bsc#1221857).\n- nvme_core: scan namespaces asynchronously (bsc#1224105).\n- nvmet-auth: fix nvmet_auth hash error handling (git-fixes).\n- nvmet: always initialize cqe.result (git-fixes).\n- nvmet: do not return 'reserved' for empty TSAS values (git-fixes).\n- nvmet: fix a possible leak when destroy a ctrl during qp establishment (git-fixes).\n- nvmet: make 'tsas' attribute idempotent for RDMA (git-fixes).\n- ocfs2: strict bound check before memcmp in ocfs2_xattr_find_entry() (bsc#1228410).\n- padata: Fix possible divide-by-0 panic in padata_mt_helper() (git-fixes).\n- perf/smmuv3: Enable HiSilicon Erratum 162001900 quirk for HIP08/09 (git-fixes).\n- pinctrl: mediatek: common-v2: Fix broken bias-disable for PULL_PU_PD_RSEL_TYPE (git-fixes).\n- pinctrl: rockchip: correct RK3328 iomux width flag for GPIO2-B pins (git-fixes).\n- pinctrl: single: fix potential NULL dereference in pcs_get_function() (git-fixes).\n- pinctrl: starfive: jh7110: Correct the level trigger configuration of iev register (git-fixes).\n- platform/chrome: cros_ec_proto: Lock device when updating MKBP version (git-fixes).\n- platform/chrome: cros_ec_proto: Lock device when updating MKBP version (git-fixes).\n- platform/surface: aggregator: Fix warning when controller is destroyed in probe (git-fixes).\n- platform/x86/amd/hsmp: Add support for ACPI based probing (jsc#PED-8779).\n- platform/x86/amd/hsmp: Cache pci_dev in struct hsmp_socket (jsc#PED-8779).\n- platform/x86/amd/hsmp: Change devm_kzalloc() to devm_kcalloc() (jsc#PED-8779).\n- platform/x86/amd/hsmp: Check HSMP support on AMD family of processors (jsc#PED-8779).\n- platform/x86/amd/hsmp: Check num_sockets against MAX_AMD_SOCKETS (jsc#PED-8779).\n- platform/x86/amd/hsmp: Create static func to handle platdev (jsc#PED-8779).\n- platform/x86/amd/hsmp: Define a struct to hold mailbox regs (jsc#PED-8779).\n- platform/x86/amd/hsmp: Move dev from platdev to hsmp_socket (jsc#PED-8779).\n- platform/x86/amd/hsmp: Move hsmp_test to probe (jsc#PED-8779).\n- platform/x86/amd/hsmp: Non-ACPI support for AMD F1A_M00~0Fh (jsc#PED-8779).\n- platform/x86/amd/hsmp: Remove extra parenthesis and add a space (jsc#PED-8779).\n- platform/x86/amd/hsmp: Restructure sysfs group creation (jsc#PED-8779).\n- platform/x86/amd/hsmp: switch to use device_add_groups() (jsc#PED-8779).\n- platform/x86/intel/ifs: Initialize union ifs_status to zero (git-fixes).\n- platform/x86: lg-laptop: fix %s null argument warning (stable-fixes).\n- power: supply: axp288_charger: Fix constant_charge_voltage writes (git-fixes).\n- power: supply: axp288_charger: Round constant_charge_voltage writes down (git-fixes).\n- power: supply: qcom_battmgr: return EAGAIN when firmware service is not up (git-fixes).\n- powerpc/64: Set _IO_BASE to POISON_POINTER_DELTA not 0 for CONFIG_PCI=n (bsc#1194869).\n- powerpc/io: Avoid clang null pointer arithmetic warnings (bsc#1194869).\n- powerpc/kexec: make the update_cpus_node() function public (bsc#1194869).\n- powerpc/kexec: split CONFIG_KEXEC_FILE and CONFIG_CRASH_DUMP (bsc#1194869).\n- powerpc/kexec_file: fix cpus node update to FDT (bsc#1194869).\n- powerpc/pseries: Add failure related checks for h_get_mpp and h_get_ppp (bsc#1194869).\n- powerpc/pseries: Whitelist dtl slub object for copying to userspace (bsc#1194869).\n- powerpc/radix: Move some functions into #ifdef CONFIG_KVM_BOOK3S_HV_POSSIBLE (bsc#1194869).\n- powerpc/topology: Check if a core is online (bsc#1214285 bsc#1205462 ltc#200161 ltc#200588 git-fixes).\n- powerpc/xmon: Check cpu id in commands 'c#', 'dp#' and 'dx#' (bsc#1194869).\n- powerpc: fix a file leak in kvm_vcpu_ioctl_enable_cap() (bsc#1194869).\n- powerpc: xor_vmx: Add '-mhard-float' to CFLAGS (bsc#1194869).\n- printk/panic: Allow cpu backtraces to be written into ringbuffer during panic (bsc#1225607).\n- reiserfs: fix uninit-value in comp_keys (git-fixes).\n- rtc: nct3018y: fix possible NULL dereference (stable-fixes).\n- s390/cpum_cf: Fix endless loop in CF_DIAG event stop (git-fixes bsc#1229171).\n- s390/dasd: fix error checks in dasd_copy_pair_store() (git-fixes bsc#1229173).\n- s390/dasd: fix error recovery leading to data corruption on ESE devices (git-fixes bsc#1229452).\n- s390/pci: Add missing virt_to_phys() for directed DIBV (git-fixes bsc#1229174).\n- s390/pci: Allow allocation of more than 1 MSI interrupt (git-fixes bsc#1229172).\n- s390/pci: Refactor arch_setup_msi_irqs() (git-fixes bsc#1229172).\n- s390/pkey: harmonize pkey s390 debug feature calls (bsc#1228720).\n- s390/pkey: introduce dynamic debugging for pkey (bsc#1228720).\n- s390/sclp: Prevent release of buffer in I/O (git-fixes bsc#1229169).\n- s390/uv: Panic for set and remove shared access UVC errors (git-fixes bsc#1229170).\n- samples/bpf: syscall_tp_user: Fix array out-of-bound access (git-fixes).\n- samples/bpf: syscall_tp_user: Rename num_progs into nr_tests (git-fixes).\n- sbitmap: use READ_ONCE to access map->word (stable-fixes).\n- scsi: lpfc: Allow DEVICE_RECOVERY mode after RSCN receipt if in PRLI_ISSUE state (bsc#1228857).\n- scsi: lpfc: Cancel ELS WQE instead of issuing abort when SLI port is inactive (bsc#1228857).\n- scsi: lpfc: Fix handling of fully recovered fabric node in dev_loss callbk (bsc#1228857).\n- scsi: lpfc: Fix incorrect request len mbox field when setting trunking via sysfs (bsc#1228857).\n- scsi: lpfc: Handle mailbox timeouts in lpfc_get_sfp_info (bsc#1228857).\n- scsi: lpfc: Relax PRLI issue conditions after GID_FT response (bsc#1228857).\n- scsi: lpfc: Revise lpfc_prep_embed_io routine with proper endian macro usages (bsc#1228857).\n- scsi: lpfc: Update lpfc version to 14.4.0.3 (bsc#1228857).\n- scsi: qla2xxx: Avoid possible run-time warning with long model_num (bsc#1228850).\n- scsi: qla2xxx: Complete command early within lock (bsc#1228850).\n- scsi: qla2xxx: Convert comma to semicolon (bsc#1228850).\n- scsi: qla2xxx: Drop driver owner assignment (bsc#1228850).\n- scsi: qla2xxx: During vport delete send async logout explicitly (bsc#1228850).\n- scsi: qla2xxx: Fix debugfs output for fw_resource_count (bsc#1228850).\n- scsi: qla2xxx: Fix flash read failure (bsc#1228850).\n- scsi: qla2xxx: Fix for possible memory corruption (bsc#1228850).\n- scsi: qla2xxx: Fix optrom version displayed in FDMI (bsc#1228850).\n- scsi: qla2xxx: Indent help text (bsc#1228850).\n- scsi: qla2xxx: Reduce fabric scan duplicate code (bsc#1228850).\n- scsi: qla2xxx: Remove unused struct 'scsi_dif_tuple' (bsc#1228850).\n- scsi: qla2xxx: Return ENOBUFS if sg_cnt is more than one for ELS cmds (bsc#1228850).\n- scsi: qla2xxx: Unable to act on RSCN for port online (bsc#1228850).\n- scsi: qla2xxx: Update version to 10.02.09.300-k (bsc#1228850).\n- scsi: qla2xxx: Use QP lock to search for bsg (bsc#1228850).\n- scsi: qla2xxx: validate nvme_local_port correctly (bsc#1228850).\n- selftest/bpf: Add map_in_maps with BPF_MAP_TYPE_PERF_EVENT_ARRAY values (git-fixes).\n- selftests/bpf: Add a test to verify previous stacksafe() fix (bsc#1225903).\n- selftests/bpf: Add assert for user stacks in test_task_stack (git-fixes).\n- selftests/bpf: Add netkit to tc_redirect selftest (git-fixes).\n- selftests/bpf: De-veth-ize the tc_redirect test case (git-fixes).\n- selftests/bpf: Disable IPv6 for lwt_redirect test (git-fixes).\n- selftests/bpf: Fix erroneous bitmask operation (git-fixes).\n- selftests/bpf: Fix issues in setup_classid_environment() (git-fixes).\n- selftests/bpf: Fix potential premature unload in bpf_testmod (git-fixes).\n- selftests/bpf: Fix pyperf180 compilation failure with clang18 (git-fixes).\n- selftests/bpf: Fix the flaky tc_redirect_dtime test (git-fixes).\n- selftests/bpf: Fix up xdp bonding test wrt feature flags (git-fixes).\n- selftests/bpf: Make linked_list failure test more robust (git-fixes).\n- selftests/bpf: Relax time_tai test for equal timestamps in tai_forward (git-fixes).\n- selftests/bpf: Skip module_fentry_shadow test when bpf_testmod is not available (git-fixes).\n- selftests/bpf: Wait for the netstamp_needed_key static key to be turned on (git-fixes).\n- selftests/bpf: fix RELEASE=1 build for tc_opts (git-fixes).\n- selftests/bpf: fix bpf_loop_bench for new callback verification scheme (git-fixes).\n- selftests/bpf: fix compiler warnings in RELEASE=1 mode (git-fixes).\n- selftests/bpf: satisfy compiler by having explicit return in btf test (git-fixes).\n- serial: core: check uartclk for zero to avoid divide by zero (stable-fixes).\n- soc: qcom: cmd-db: Map shared memory as WC, not WB (git-fixes).\n- soc: qcom: pmic_glink: Actually communicate when remote goes down (git-fixes).\n- soundwire: stream: fix programming slave ports for non-continous port maps (git-fixes).\n- spi: Add empty versions of ACPI functions (stable-fixes).\n- spi: microchip-core: fix init function not setting the master and motorola modes (git-fixes).\n- spi: microchip-core: switch to use modern name (stable-fixes).\n- spi: spi-fsl-lpspi: Fix scldiv calculation (git-fixes).\n- spi: spidev: Add missing spi_device_id for bh2228fv (git-fixes).\n- squashfs: squashfs_read_data need to check if the length is 0 (git-fixes).\n- ssb: Fix division by zero issue in ssb_calc_clock_rate (stable-fixes).\n- staging: iio: resolver: ad2s1210: fix use before initialization (stable-fixes).\n- staging: ks7010: disable bh on tx_dev_lock (stable-fixes).\n- string.h: Introduce memtostr() and memtostr_pad() (bsc#1228849).\n- sunrpc: add a struct rpc_stats arg to rpc_create_args (git-fixes).\n- swiotlb: do not set total_used to 0 in swiotlb_create_debugfs_files() (git-fixes).\n- swiotlb: fix swiotlb_bounce() to do partial sync's correctly (git-fixes).\n- syscalls: fix compat_sys_io_pgetevents_time64 usage (git-fixes).\n- thermal/drivers/broadcom: Fix race between removal and clock disable (git-fixes).\n- thermal: bcm2835: Convert to platform remove callback returning void (stable-fixes).\n- thunderbolt: Mark XDomain as unplugged when router is removed (stable-fixes).\n- tools/perf: Fix perf bench epoll to enable the run when some CPU's are offline (bsc#1227747).\n- tools/perf: Fix perf bench futex to enable the run when some CPU's are offline (bsc#1227747).\n- tools/perf: Fix timing issue with parallel threads in perf bench wake-up-parallel (bsc#1227747).\n- tools/resolve_btfids: Fix comparison of distinct pointer types warning in resolve_btfids (git-fixes).\n- tools/resolve_btfids: Fix cross-compilation to non-host endianness (git-fixes).\n- tools/resolve_btfids: Refactor set sorting with types from btf_ids.h (git-fixes).\n- tools/resolve_btfids: fix build with musl libc (git-fixes).\n- trace/pid_list: Change gfp flags in pid_list_fill_irq() (git-fixes).\n- tracing: Return from tracing_buffers_read() if the file has been closed (bsc#1229136 git-fixes).\n- tty: atmel_serial: use the correct RTS flag (git-fixes).\n- tty: serial: fsl_lpuart: mark last busy before uart_add_one_port (git-fixes).\n- usb: cdnsp: fix for Link TRB with TC (git-fixes).\n- usb: cdnsp: fix incorrect index in cdnsp_get_hw_deq function (git-fixes).\n- usb: core: sysfs: Unmerge @usb3_hardware_lpm_attr_group in remove_power_attributes() (git-fixes).\n- usb: dwc3: core: Skip setting event buffers for host only controllers (stable-fixes).\n- usb: dwc3: omap: add missing depopulate in probe error path (git-fixes).\n- usb: dwc3: st: add missing depopulate in probe error path (git-fixes).\n- usb: dwc3: st: fix probed platform device ref count on probe error path (git-fixes).\n- usb: gadget: core: Check for unset descriptor (git-fixes).\n- usb: gadget: fsl: Increase size of name buffer for endpoints (stable-fixes).\n- usb: gadget: u_audio: Check return codes from usb_ep_enable and config_ep_by_speed (git-fixes).\n- usb: gadget: u_serial: Set start_delayed during suspend (git-fixes).\n- usb: gadget: uvc: cleanup request when not in correct state (stable-fixes).\n- usb: typec: fsa4480: Add support to swap SBU orientation (git-fixes).\n- usb: typec: fsa4480: Check if the chip is really there (git-fixes).\n- usb: typec: fsa4480: Relax CHIP_ID check (git-fixes).\n- usb: typec: fsa4480: add support for Audio Accessory Mode (git-fixes).\n- usb: typec: fsa4480: rework mux & switch setup to handle more states (git-fixes).\n- usb: vhci-hcd: Do not drop references before new references are gained (stable-fixes).\n- vfio/pci: fix potential memory leak in vfio_intx_enable() (git-fixes).\n- vhost-scsi: Handle vhost_vq_work_queue failures for events (git-fixes).\n- vhost-vdpa: switch to use vmf_insert_pfn() in the fault handler (git-fixes).\n- vhost/vsock: always initialize seqpacket_allow (git-fixes).\n- vhost: Release worker mutex during flushes (git-fixes).\n- vhost: Use virtqueue mutex for swapping worker (git-fixes).\n- virt: guest_memfd: fix reference leak on hwpoisoned page (git-fixes).\n- virtio-crypto: handle config changed by work queue (git-fixes).\n- virtio: reenable config if freezing device failed (git-fixes).\n- virtio_net: use u64_stats_t infra to avoid data-races (git-fixes).\n- virtiofs: forbid newlines in tags (bsc#1229940).\n- wifi: ath12k: fix memory leak in ath12k_dp_rx_peer_frag_setup() (stable-fixes).\n- wifi: ath12k: fix soft lockup on suspend (git-fixes).\n- wifi: brcmfmac: cfg80211: Handle SSID based pmksa deletion (git-fixes).\n- wifi: cfg80211: fix reporting failed MLO links status with cfg80211_connect_done (git-fixes).\n- wifi: iwlwifi: fw: fix wgds rev 3 exact size (git-fixes).\n- wifi: mac80211: use monitor sdata with driver only if desired (git-fixes).\n- wifi: mwifiex: duplicate static structs used in driver instances (git-fixes).\n- wifi: nl80211: disallow setting special AP channel widths (stable-fixes).\n- wifi: nl80211: do not give key data to userspace (stable-fixes).\n- wifi: rtw88: usb: Fix disconnection after beacon loss (stable-fixes).\n- wifi: wfx: repair open network AP mode (git-fixes).\n- workqueue: Improve scalability of workqueue watchdog touch (bsc#1193454).\n- workqueue: wq_watchdog_touch is always called with valid CPU (bsc#1193454).\n- x86/asm: Use %c/%n instead of %P operand modifier in asm templates (git-fixes).\n- x86/entry/64: Remove obsolete comment on tracing vs. SYSRET (git-fixes).\n- x86/mm: Fix pti_clone_entry_text() for i386 (git-fixes).\n- x86/mm: Fix pti_clone_pgtable() alignment assumption (git-fixes).\n- x86/mtrr: Check if fixed MTRRs exist before saving them (git-fixes).\n- x86/numa: Fix SRAT lookup of CFMWS ranges with numa_fill_memblks() (git-fixes).\n- x86/numa: Fix the address overlap check in numa_fill_memblks() (git-fixes).\n- x86/numa: Fix the sort compare func used in numa_fill_memblks() (git-fixes).\n- x86/numa: Introduce numa_fill_memblks() (git-fixes).\n- x86/pci: Skip early E820 check for ECAM region (git-fixes).\n- x86/xen: Convert comma to semicolon (git-fixes).\n- xfs: Fix missing interval for missing_owner in xfs fsmap (git-fixes).\n- xfs: Fix the owner setting issue for rmap query in xfs fsmap (git-fixes).\n- xfs: allow cross-linking special files without project quota (git-fixes).\n- xfs: allow symlinks with short remote targets (bsc#1229160).\n- xfs: allow unlinked symlinks and dirs with zero size (git-fixes).\n- xfs: attr forks require attr, not attr2 (git-fixes).\n- xfs: convert comma to semicolon (git-fixes).\n- xfs: do not use current->journal_info (git-fixes).\n- xfs: fix unlink vs cluster buffer instantiation race (git-fixes).\n- xfs: honor init_xattrs in xfs_init_new_inode for !ATTR fs (git-fixes).\n- xfs: journal geometry is not properly bounds checked (git-fixes).\n- xfs: match lock mode in xfs_buffered_write_iomap_begin() (git-fixes).\n- xfs: require XFS_SB_FEAT_INCOMPAT_LOG_XATTRS for attr log intent item recovery (git-fixes).\n- xfs: upgrade the extent counters in xfs_reflink_end_cow_extent later (git-fixes).\n- xfs: use XFS_BUF_DADDR_NULL for daddrs in getfsmap code (git-fixes).\n- xfs: use consistent uid/gid when grabbing dquots for inodes (git-fixes).\n- xhci: Fix Panther point NULL pointer deref at full-speed re-enumeration (git-fixes).\n- xprtrdma: Fix rpcrdma_reqs_reset() (git-fixes).\n","id":"SUSE-SU-2024:3383-1","modified":"2024-09-23T08:29:55Z","published":"2024-09-23T08:29:55Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2024/suse-su-20243383-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1012628"},{"type":"REPORT","url":"https://bugzilla.suse.com/1193454"},{"type":"REPORT","url":"https://bugzilla.suse.com/1194869"},{"type":"REPORT","url":"https://bugzilla.suse.com/1205462"},{"type":"REPORT","url":"https://bugzilla.suse.com/1208783"},{"type":"REPORT","url":"https://bugzilla.suse.com/1213123"},{"type":"REPORT","url":"https://bugzilla.suse.com/1214285"},{"type":"REPORT","url":"https://bugzilla.suse.com/1215199"},{"type":"REPORT","url":"https://bugzilla.suse.com/1220066"},{"type":"REPORT","url":"https://bugzilla.suse.com/1220252"},{"type":"REPORT","url":"https://bugzilla.suse.com/1220877"},{"type":"REPORT","url":"https://bugzilla.suse.com/1221326"},{"type":"REPORT","url":"https://bugzilla.suse.com/1221630"},{"type":"REPORT","url":"https://bugzilla.suse.com/1221645"},{"type":"REPORT","url":"https://bugzilla.suse.com/1221652"},{"type":"REPORT","url":"https://bugzilla.suse.com/1221857"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222254"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222335"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222350"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222364"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222372"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222387"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222433"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222434"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222463"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222625"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222633"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222634"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222808"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222967"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222973"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223053"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223074"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223191"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223395"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223635"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223720"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223731"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223742"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223763"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223767"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223777"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223803"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224105"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224415"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224485"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224496"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224510"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224535"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224631"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224636"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224690"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224694"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224700"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224711"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225475"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225582"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225607"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225717"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225718"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225744"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225745"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225751"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225814"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225832"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225838"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225903"},{"type":"REPORT","url":"https://bugzilla.suse.com/1226031"},{"type":"REPORT","url":"https://bugzilla.suse.com/1226127"},{"type":"REPORT","url":"https://bugzilla.suse.com/1226502"},{"type":"REPORT","url":"https://bugzilla.suse.com/1226530"},{"type":"REPORT","url":"https://bugzilla.suse.com/1226588"},{"type":"REPORT","url":"https://bugzilla.suse.com/1226604"},{"type":"REPORT","url":"https://bugzilla.suse.com/1226743"},{"type":"REPORT","url":"https://bugzilla.suse.com/1226751"},{"type":"REPORT","url":"https://bugzilla.suse.com/1226765"},{"type":"REPORT","url":"https://bugzilla.suse.com/1226798"},{"type":"REPORT","url":"https://bugzilla.suse.com/1226801"},{"type":"REPORT","url":"https://bugzilla.suse.com/1226834"},{"type":"REPORT","url":"https://bugzilla.suse.com/1226874"},{"type":"REPORT","url":"https://bugzilla.suse.com/1226885"},{"type":"REPORT","url":"https://bugzilla.suse.com/1226920"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227149"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227182"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227383"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227437"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227492"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227493"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227494"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227618"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227620"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227623"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227627"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227634"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227706"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227722"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227724"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227725"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227728"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227729"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227732"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227733"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227734"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227747"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227750"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227754"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227758"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227760"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227761"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227764"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227766"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227770"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227771"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227772"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227774"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227781"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227784"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227785"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227787"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227790"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227791"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227792"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227796"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227798"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227799"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227802"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227808"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227810"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227811"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227812"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227815"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227816"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227818"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227820"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227823"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227824"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227826"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227828"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227829"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227830"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227832"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227833"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227834"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227839"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227840"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227846"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227849"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227851"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227853"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227863"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227864"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227865"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227867"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227869"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227870"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227883"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227884"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227891"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227893"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227929"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227950"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227957"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227981"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228020"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228021"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228114"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228192"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228195"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228202"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228235"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228236"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228237"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228247"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228321"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228409"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228410"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228426"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228427"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228429"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228446"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228447"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228449"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228450"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228452"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228456"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228457"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228458"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228459"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228460"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228462"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228463"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228466"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228467"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228468"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228469"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228470"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228472"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228479"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228480"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228481"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228482"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228483"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228484"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228485"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228486"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228487"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228489"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228491"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228492"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228493"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228494"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228495"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228496"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228499"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228500"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228501"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228502"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228503"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228505"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228508"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228509"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228510"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228511"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228513"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228515"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228516"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228518"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228520"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228525"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228527"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228530"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228531"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228539"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228561"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228563"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228564"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228565"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228567"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228568"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228572"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228576"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228579"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228580"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228581"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228582"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228584"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228586"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228588"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228590"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228591"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228599"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228615"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228616"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228617"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228625"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228626"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228633"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228635"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228636"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228640"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228643"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228644"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228646"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228649"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228650"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228654"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228655"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228656"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228658"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228660"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228662"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228665"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228666"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228667"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228672"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228673"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228674"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228677"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228680"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228687"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228705"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228706"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228707"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228708"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228709"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228710"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228718"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228720"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228721"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228722"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228723"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228724"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228726"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228727"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228733"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228737"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228743"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228748"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228754"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228756"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228757"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228758"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228764"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228766"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228779"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228801"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228849"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228850"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228857"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228959"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228964"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228966"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228967"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228973"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228977"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228978"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228979"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228986"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228988"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228989"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228991"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228992"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229005"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229024"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229042"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229045"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229046"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229054"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229056"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229086"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229134"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229136"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229154"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229156"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229160"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229167"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229168"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229169"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229170"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229171"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229172"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229173"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229174"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229239"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229240"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229241"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229243"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229244"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229245"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229246"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229247"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229248"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229249"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229250"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229251"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229252"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229253"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229254"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229255"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229256"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229287"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229290"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229291"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229292"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229294"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229296"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229297"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229298"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229299"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229301"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229303"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229304"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229305"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229307"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229309"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229312"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229313"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229314"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229315"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229316"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229317"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229318"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229319"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229320"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229327"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229341"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229342"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229344"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229345"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229346"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229347"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229349"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229350"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229351"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229353"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229354"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229355"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229356"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229357"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229358"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229359"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229360"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229365"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229366"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229369"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229370"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229373"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229374"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229379"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229381"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229382"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229383"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229386"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229388"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229390"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229391"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229392"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229395"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229398"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229399"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229400"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229402"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229403"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229404"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229407"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229409"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229410"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229411"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229413"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229414"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229417"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229444"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229451"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229452"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229455"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229456"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229480"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229481"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229482"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229484"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229485"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229486"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229487"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229488"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229489"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229490"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229493"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229495"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229496"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229497"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229500"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229503"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229707"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229739"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229743"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229746"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229747"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229752"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229754"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229755"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229756"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229759"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229761"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229767"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229781"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229784"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229785"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229787"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229788"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229789"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229792"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229820"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229827"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229830"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229837"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229940"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230056"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230350"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230413"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52489"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52581"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52668"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52688"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52735"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52859"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52885"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52886"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52887"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52889"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26590"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26631"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26637"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26668"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26669"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26677"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26682"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26683"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26691"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26735"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26808"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26809"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26812"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26835"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26837"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26849"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26851"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26889"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26920"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26944"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26976"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-27010"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-27011"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-27024"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-27049"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-27050"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-27079"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-27403"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-27433"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-27437"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-31076"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-35854"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-35855"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-35897"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-35902"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-35913"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-35939"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-35949"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-36270"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-36286"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-36288"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-36489"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-36881"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-36907"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-36909"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-36910"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-36911"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-36929"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-36933"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-36939"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-36970"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-36979"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-38548"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-38563"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-38609"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-38662"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-39476"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-39483"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-39484"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-39486"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-39488"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-39489"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-39491"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-39493"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-39497"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-39499"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-39500"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-39501"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-39505"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-39506"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-39508"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-39509"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-39510"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-40899"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-40900"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-40902"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-40903"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-40904"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-40905"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-40909"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-40910"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-40911"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-40912"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-40913"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-40916"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-40920"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-40921"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-40922"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-40924"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-40926"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-40927"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-40929"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-40930"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-40932"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-40934"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-40936"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-40938"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-40939"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-40941"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-40942"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-40943"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-40944"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-40945"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-40954"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-40956"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-40957"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-40958"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-40959"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-40962"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-40964"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-40967"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-40976"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-40977"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-40978"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-40981"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-40982"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-40984"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-40987"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-40988"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-40989"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-40990"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-40992"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-40994"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-40995"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-40997"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41000"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41001"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41002"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41004"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41007"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41009"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41010"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41011"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41012"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41015"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41016"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41020"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41022"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41024"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41025"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41028"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41032"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41035"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41036"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41037"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41038"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41039"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41040"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41041"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41044"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41045"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41048"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41049"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41050"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41051"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41056"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41057"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41058"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41059"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41060"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41061"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41062"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41063"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41064"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41065"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41066"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41068"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41069"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41070"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41071"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41072"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41073"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41074"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41075"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41076"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41078"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41079"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41080"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41081"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41084"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41087"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41088"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41089"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41092"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41093"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41094"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41095"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41096"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41097"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41098"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42064"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42069"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42070"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42073"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42074"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42076"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42077"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42079"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42080"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42082"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42085"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42086"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42087"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42089"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42090"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42092"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42093"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42095"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42096"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42097"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42098"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42101"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42104"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42105"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42106"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42107"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42109"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42110"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42113"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42114"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42115"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42117"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42119"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42120"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42121"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42122"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42124"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42125"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42126"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42127"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42130"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42131"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42132"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42133"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42136"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42137"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42138"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42139"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42141"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42142"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42143"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42144"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42145"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42147"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42148"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42152"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42153"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42155"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42156"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42157"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42158"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42159"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42161"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42162"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42223"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42224"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42225"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42226"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42227"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42228"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42229"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42230"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42232"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42236"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42237"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42238"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42239"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42240"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42241"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42244"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42245"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42246"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42247"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42250"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42253"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42259"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42268"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42269"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42270"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42271"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42274"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42276"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42277"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42278"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42279"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42280"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42281"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42283"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42284"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42285"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42286"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42287"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42288"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42289"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42290"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42291"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42292"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42295"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42298"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42301"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42302"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42303"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42308"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42309"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42310"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42311"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42312"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42313"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42314"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42315"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42316"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42318"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42319"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42320"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42322"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43816"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43817"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43818"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43819"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43821"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43823"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43824"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43825"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43826"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43829"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43830"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43831"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43833"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43834"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43837"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43839"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43840"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43841"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43842"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43846"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43847"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43849"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43850"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43851"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43853"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43854"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43855"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43856"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43858"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43860"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43861"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43863"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43864"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43866"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43867"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43871"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43872"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43873"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43874"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43875"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43876"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43877"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43879"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43880"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43881"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43882"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43883"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43884"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43885"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43889"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43892"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43893"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43894"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43895"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43897"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43899"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43900"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43902"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43903"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43905"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43906"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43907"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43908"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43909"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43911"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43912"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-44931"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-44938"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-44939"}],"related":["CVE-2023-52489","CVE-2023-52581","CVE-2023-52668","CVE-2023-52688","CVE-2023-52735","CVE-2023-52859","CVE-2023-52885","CVE-2023-52886","CVE-2023-52887","CVE-2023-52889","CVE-2024-26590","CVE-2024-26631","CVE-2024-26637","CVE-2024-26668","CVE-2024-26669","CVE-2024-26677","CVE-2024-26682","CVE-2024-26683","CVE-2024-26691","CVE-2024-26735","CVE-2024-26808","CVE-2024-26809","CVE-2024-26812","CVE-2024-26835","CVE-2024-26837","CVE-2024-26849","CVE-2024-26851","CVE-2024-26889","CVE-2024-26920","CVE-2024-26944","CVE-2024-26976","CVE-2024-27010","CVE-2024-27011","CVE-2024-27024","CVE-2024-27049","CVE-2024-27050","CVE-2024-27079","CVE-2024-27403","CVE-2024-27433","CVE-2024-27437","CVE-2024-31076","CVE-2024-35854","CVE-2024-35855","CVE-2024-35897","CVE-2024-35902","CVE-2024-35913","CVE-2024-35939","CVE-2024-35949","CVE-2024-36270","CVE-2024-36286","CVE-2024-36288","CVE-2024-36489","CVE-2024-36881","CVE-2024-36907","CVE-2024-36909","CVE-2024-36910","CVE-2024-36911","CVE-2024-36929","CVE-2024-36933","CVE-2024-36939","CVE-2024-36970","CVE-2024-36979","CVE-2024-38548","CVE-2024-38563","CVE-2024-38609","CVE-2024-38662","CVE-2024-39476","CVE-2024-39483","CVE-2024-39484","CVE-2024-39486","CVE-2024-39488","CVE-2024-39489","CVE-2024-39491","CVE-2024-39493","CVE-2024-39497","CVE-2024-39499","CVE-2024-39500","CVE-2024-39501","CVE-2024-39505","CVE-2024-39506","CVE-2024-39508","CVE-2024-39509","CVE-2024-39510","CVE-2024-40899","CVE-2024-40900","CVE-2024-40902","CVE-2024-40903","CVE-2024-40904","CVE-2024-40905","CVE-2024-40909","CVE-2024-40910","CVE-2024-40911","CVE-2024-40912","CVE-2024-40913","CVE-2024-40916","CVE-2024-40920","CVE-2024-40921","CVE-2024-40922","CVE-2024-40924","CVE-2024-40926","CVE-2024-40927","CVE-2024-40929","CVE-2024-40930","CVE-2024-40932","CVE-2024-40934","CVE-2024-40936","CVE-2024-40938","CVE-2024-40939","CVE-2024-40941","CVE-2024-40942","CVE-2024-40943","CVE-2024-40944","CVE-2024-40945","CVE-2024-40954","CVE-2024-40956","CVE-2024-40957","CVE-2024-40958","CVE-2024-40959","CVE-2024-40962","CVE-2024-40964","CVE-2024-40967","CVE-2024-40976","CVE-2024-40977","CVE-2024-40978","CVE-2024-40981","CVE-2024-40982","CVE-2024-40984","CVE-2024-40987","CVE-2024-40988","CVE-2024-40989","CVE-2024-40990","CVE-2024-40992","CVE-2024-40994","CVE-2024-40995","CVE-2024-40997","CVE-2024-41000","CVE-2024-41001","CVE-2024-41002","CVE-2024-41004","CVE-2024-41007","CVE-2024-41009","CVE-2024-41010","CVE-2024-41011","CVE-2024-41012","CVE-2024-41015","CVE-2024-41016","CVE-2024-41020","CVE-2024-41022","CVE-2024-41024","CVE-2024-41025","CVE-2024-41028","CVE-2024-41032","CVE-2024-41035","CVE-2024-41036","CVE-2024-41037","CVE-2024-41038","CVE-2024-41039","CVE-2024-41040","CVE-2024-41041","CVE-2024-41044","CVE-2024-41045","CVE-2024-41048","CVE-2024-41049","CVE-2024-41050","CVE-2024-41051","CVE-2024-41056","CVE-2024-41057","CVE-2024-41058","CVE-2024-41059","CVE-2024-41060","CVE-2024-41061","CVE-2024-41062","CVE-2024-41063","CVE-2024-41064","CVE-2024-41065","CVE-2024-41066","CVE-2024-41068","CVE-2024-41069","CVE-2024-41070","CVE-2024-41071","CVE-2024-41072","CVE-2024-41073","CVE-2024-41074","CVE-2024-41075","CVE-2024-41076","CVE-2024-41078","CVE-2024-41079","CVE-2024-41080","CVE-2024-41081","CVE-2024-41084","CVE-2024-41087","CVE-2024-41088","CVE-2024-41089","CVE-2024-41092","CVE-2024-41093","CVE-2024-41094","CVE-2024-41095","CVE-2024-41096","CVE-2024-41097","CVE-2024-41098","CVE-2024-42064","CVE-2024-42069","CVE-2024-42070","CVE-2024-42073","CVE-2024-42074","CVE-2024-42076","CVE-2024-42077","CVE-2024-42079","CVE-2024-42080","CVE-2024-42082","CVE-2024-42085","CVE-2024-42086","CVE-2024-42087","CVE-2024-42089","CVE-2024-42090","CVE-2024-42092","CVE-2024-42093","CVE-2024-42095","CVE-2024-42096","CVE-2024-42097","CVE-2024-42098","CVE-2024-42101","CVE-2024-42104","CVE-2024-42105","CVE-2024-42106","CVE-2024-42107","CVE-2024-42109","CVE-2024-42110","CVE-2024-42113","CVE-2024-42114","CVE-2024-42115","CVE-2024-42117","CVE-2024-42119","CVE-2024-42120","CVE-2024-42121","CVE-2024-42122","CVE-2024-42124","CVE-2024-42125","CVE-2024-42126","CVE-2024-42127","CVE-2024-42130","CVE-2024-42131","CVE-2024-42132","CVE-2024-42133","CVE-2024-42136","CVE-2024-42137","CVE-2024-42138","CVE-2024-42139","CVE-2024-42141","CVE-2024-42142","CVE-2024-42143","CVE-2024-42144","CVE-2024-42145","CVE-2024-42147","CVE-2024-42148","CVE-2024-42152","CVE-2024-42153","CVE-2024-42155","CVE-2024-42156","CVE-2024-42157","CVE-2024-42158","CVE-2024-42159","CVE-2024-42161","CVE-2024-42162","CVE-2024-42223","CVE-2024-42224","CVE-2024-42225","CVE-2024-42226","CVE-2024-42227","CVE-2024-42228","CVE-2024-42229","CVE-2024-42230","CVE-2024-42232","CVE-2024-42236","CVE-2024-42237","CVE-2024-42238","CVE-2024-42239","CVE-2024-42240","CVE-2024-42241","CVE-2024-42244","CVE-2024-42245","CVE-2024-42246","CVE-2024-42247","CVE-2024-42250","CVE-2024-42253","CVE-2024-42259","CVE-2024-42268","CVE-2024-42269","CVE-2024-42270","CVE-2024-42271","CVE-2024-42274","CVE-2024-42276","CVE-2024-42277","CVE-2024-42278","CVE-2024-42279","CVE-2024-42280","CVE-2024-42281","CVE-2024-42283","CVE-2024-42284","CVE-2024-42285","CVE-2024-42286","CVE-2024-42287","CVE-2024-42288","CVE-2024-42289","CVE-2024-42290","CVE-2024-42291","CVE-2024-42292","CVE-2024-42295","CVE-2024-42298","CVE-2024-42301","CVE-2024-42302","CVE-2024-42303","CVE-2024-42308","CVE-2024-42309","CVE-2024-42310","CVE-2024-42311","CVE-2024-42312","CVE-2024-42313","CVE-2024-42314","CVE-2024-42315","CVE-2024-42316","CVE-2024-42318","CVE-2024-42319","CVE-2024-42320","CVE-2024-42322","CVE-2024-43816","CVE-2024-43817","CVE-2024-43818","CVE-2024-43819","CVE-2024-43821","CVE-2024-43823","CVE-2024-43824","CVE-2024-43825","CVE-2024-43826","CVE-2024-43829","CVE-2024-43830","CVE-2024-43831","CVE-2024-43833","CVE-2024-43834","CVE-2024-43837","CVE-2024-43839","CVE-2024-43840","CVE-2024-43841","CVE-2024-43842","CVE-2024-43846","CVE-2024-43847","CVE-2024-43849","CVE-2024-43850","CVE-2024-43851","CVE-2024-43853","CVE-2024-43854","CVE-2024-43855","CVE-2024-43856","CVE-2024-43858","CVE-2024-43860","CVE-2024-43861","CVE-2024-43863","CVE-2024-43864","CVE-2024-43866","CVE-2024-43867","CVE-2024-43871","CVE-2024-43872","CVE-2024-43873","CVE-2024-43874","CVE-2024-43875","CVE-2024-43876","CVE-2024-43877","CVE-2024-43879","CVE-2024-43880","CVE-2024-43881","CVE-2024-43882","CVE-2024-43883","CVE-2024-43884","CVE-2024-43885","CVE-2024-43889","CVE-2024-43892","CVE-2024-43893","CVE-2024-43894","CVE-2024-43895","CVE-2024-43897","CVE-2024-43899","CVE-2024-43900","CVE-2024-43902","CVE-2024-43903","CVE-2024-43905","CVE-2024-43906","CVE-2024-43907","CVE-2024-43908","CVE-2024-43909","CVE-2024-43911","CVE-2024-43912","CVE-2024-44931","CVE-2024-44938","CVE-2024-44939"],"summary":"Security update for the Linux Kernel","upstream":["CVE-2023-52489","CVE-2023-52581","CVE-2023-52668","CVE-2023-52688","CVE-2023-52735","CVE-2023-52859","CVE-2023-52885","CVE-2023-52886","CVE-2023-52887","CVE-2023-52889","CVE-2024-26590","CVE-2024-26631","CVE-2024-26637","CVE-2024-26668","CVE-2024-26669","CVE-2024-26677","CVE-2024-26682","CVE-2024-26683","CVE-2024-26691","CVE-2024-26735","CVE-2024-26808","CVE-2024-26809","CVE-2024-26812","CVE-2024-26835","CVE-2024-26837","CVE-2024-26849","CVE-2024-26851","CVE-2024-26889","CVE-2024-26920","CVE-2024-26944","CVE-2024-26976","CVE-2024-27010","CVE-2024-27011","CVE-2024-27024","CVE-2024-27049","CVE-2024-27050","CVE-2024-27079","CVE-2024-27403","CVE-2024-27433","CVE-2024-27437","CVE-2024-31076","CVE-2024-35854","CVE-2024-35855","CVE-2024-35897","CVE-2024-35902","CVE-2024-35913","CVE-2024-35939","CVE-2024-35949","CVE-2024-36270","CVE-2024-36286","CVE-2024-36288","CVE-2024-36489","CVE-2024-36881","CVE-2024-36907","CVE-2024-36909","CVE-2024-36910","CVE-2024-36911","CVE-2024-36929","CVE-2024-36933","CVE-2024-36939","CVE-2024-36970","CVE-2024-36979","CVE-2024-38548","CVE-2024-38563","CVE-2024-38609","CVE-2024-38662","CVE-2024-39476","CVE-2024-39483","CVE-2024-39484","CVE-2024-39486","CVE-2024-39488","CVE-2024-39489","CVE-2024-39491","CVE-2024-39493","CVE-2024-39497","CVE-2024-39499","CVE-2024-39500","CVE-2024-39501","CVE-2024-39505","CVE-2024-39506","CVE-2024-39508","CVE-2024-39509","CVE-2024-39510","CVE-2024-40899","CVE-2024-40900","CVE-2024-40902","CVE-2024-40903","CVE-2024-40904","CVE-2024-40905","CVE-2024-40909","CVE-2024-40910","CVE-2024-40911","CVE-2024-40912","CVE-2024-40913","CVE-2024-40916","CVE-2024-40920","CVE-2024-40921","CVE-2024-40922","CVE-2024-40924","CVE-2024-40926","CVE-2024-40927","CVE-2024-40929","CVE-2024-40930","CVE-2024-40932","CVE-2024-40934","CVE-2024-40936","CVE-2024-40938","CVE-2024-40939","CVE-2024-40941","CVE-2024-40942","CVE-2024-40943","CVE-2024-40944","CVE-2024-40945","CVE-2024-40954","CVE-2024-40956","CVE-2024-40957","CVE-2024-40958","CVE-2024-40959","CVE-2024-40962","CVE-2024-40964","CVE-2024-40967","CVE-2024-40976","CVE-2024-40977","CVE-2024-40978","CVE-2024-40981","CVE-2024-40982","CVE-2024-40984","CVE-2024-40987","CVE-2024-40988","CVE-2024-40989","CVE-2024-40990","CVE-2024-40992","CVE-2024-40994","CVE-2024-40995","CVE-2024-40997","CVE-2024-41000","CVE-2024-41001","CVE-2024-41002","CVE-2024-41004","CVE-2024-41007","CVE-2024-41009","CVE-2024-41010","CVE-2024-41011","CVE-2024-41012","CVE-2024-41015","CVE-2024-41016","CVE-2024-41020","CVE-2024-41022","CVE-2024-41024","CVE-2024-41025","CVE-2024-41028","CVE-2024-41032","CVE-2024-41035","CVE-2024-41036","CVE-2024-41037","CVE-2024-41038","CVE-2024-41039","CVE-2024-41040","CVE-2024-41041","CVE-2024-41044","CVE-2024-41045","CVE-2024-41048","CVE-2024-41049","CVE-2024-41050","CVE-2024-41051","CVE-2024-41056","CVE-2024-41057","CVE-2024-41058","CVE-2024-41059","CVE-2024-41060","CVE-2024-41061","CVE-2024-41062","CVE-2024-41063","CVE-2024-41064","CVE-2024-41065","CVE-2024-41066","CVE-2024-41068","CVE-2024-41069","CVE-2024-41070","CVE-2024-41071","CVE-2024-41072","CVE-2024-41073","CVE-2024-41074","CVE-2024-41075","CVE-2024-41076","CVE-2024-41078","CVE-2024-41079","CVE-2024-41080","CVE-2024-41081","CVE-2024-41084","CVE-2024-41087","CVE-2024-41088","CVE-2024-41089","CVE-2024-41092","CVE-2024-41093","CVE-2024-41094","CVE-2024-41095","CVE-2024-41096","CVE-2024-41097","CVE-2024-41098","CVE-2024-42064","CVE-2024-42069","CVE-2024-42070","CVE-2024-42073","CVE-2024-42074","CVE-2024-42076","CVE-2024-42077","CVE-2024-42079","CVE-2024-42080","CVE-2024-42082","CVE-2024-42085","CVE-2024-42086","CVE-2024-42087","CVE-2024-42089","CVE-2024-42090","CVE-2024-42092","CVE-2024-42093","CVE-2024-42095","CVE-2024-42096","CVE-2024-42097","CVE-2024-42098","CVE-2024-42101","CVE-2024-42104","CVE-2024-42105","CVE-2024-42106","CVE-2024-42107","CVE-2024-42109","CVE-2024-42110","CVE-2024-42113","CVE-2024-42114","CVE-2024-42115","CVE-2024-42117","CVE-2024-42119","CVE-2024-42120","CVE-2024-42121","CVE-2024-42122","CVE-2024-42124","CVE-2024-42125","CVE-2024-42126","CVE-2024-42127","CVE-2024-42130","CVE-2024-42131","CVE-2024-42132","CVE-2024-42133","CVE-2024-42136","CVE-2024-42137","CVE-2024-42138","CVE-2024-42139","CVE-2024-42141","CVE-2024-42142","CVE-2024-42143","CVE-2024-42144","CVE-2024-42145","CVE-2024-42147","CVE-2024-42148","CVE-2024-42152","CVE-2024-42153","CVE-2024-42155","CVE-2024-42156","CVE-2024-42157","CVE-2024-42158","CVE-2024-42159","CVE-2024-42161","CVE-2024-42162","CVE-2024-42223","CVE-2024-42224","CVE-2024-42225","CVE-2024-42226","CVE-2024-42227","CVE-2024-42228","CVE-2024-42229","CVE-2024-42230","CVE-2024-42232","CVE-2024-42236","CVE-2024-42237","CVE-2024-42238","CVE-2024-42239","CVE-2024-42240","CVE-2024-42241","CVE-2024-42244","CVE-2024-42245","CVE-2024-42246","CVE-2024-42247","CVE-2024-42250","CVE-2024-42253","CVE-2024-42259","CVE-2024-42268","CVE-2024-42269","CVE-2024-42270","CVE-2024-42271","CVE-2024-42274","CVE-2024-42276","CVE-2024-42277","CVE-2024-42278","CVE-2024-42279","CVE-2024-42280","CVE-2024-42281","CVE-2024-42283","CVE-2024-42284","CVE-2024-42285","CVE-2024-42286","CVE-2024-42287","CVE-2024-42288","CVE-2024-42289","CVE-2024-42290","CVE-2024-42291","CVE-2024-42292","CVE-2024-42295","CVE-2024-42298","CVE-2024-42301","CVE-2024-42302","CVE-2024-42303","CVE-2024-42308","CVE-2024-42309","CVE-2024-42310","CVE-2024-42311","CVE-2024-42312","CVE-2024-42313","CVE-2024-42314","CVE-2024-42315","CVE-2024-42316","CVE-2024-42318","CVE-2024-42319","CVE-2024-42320","CVE-2024-42322","CVE-2024-43816","CVE-2024-43817","CVE-2024-43818","CVE-2024-43819","CVE-2024-43821","CVE-2024-43823","CVE-2024-43824","CVE-2024-43825","CVE-2024-43826","CVE-2024-43829","CVE-2024-43830","CVE-2024-43831","CVE-2024-43833","CVE-2024-43834","CVE-2024-43837","CVE-2024-43839","CVE-2024-43840","CVE-2024-43841","CVE-2024-43842","CVE-2024-43846","CVE-2024-43847","CVE-2024-43849","CVE-2024-43850","CVE-2024-43851","CVE-2024-43853","CVE-2024-43854","CVE-2024-43855","CVE-2024-43856","CVE-2024-43858","CVE-2024-43860","CVE-2024-43861","CVE-2024-43863","CVE-2024-43864","CVE-2024-43866","CVE-2024-43867","CVE-2024-43871","CVE-2024-43872","CVE-2024-43873","CVE-2024-43874","CVE-2024-43875","CVE-2024-43876","CVE-2024-43877","CVE-2024-43879","CVE-2024-43880","CVE-2024-43881","CVE-2024-43882","CVE-2024-43883","CVE-2024-43884","CVE-2024-43885","CVE-2024-43889","CVE-2024-43892","CVE-2024-43893","CVE-2024-43894","CVE-2024-43895","CVE-2024-43897","CVE-2024-43899","CVE-2024-43900","CVE-2024-43902","CVE-2024-43903","CVE-2024-43905","CVE-2024-43906","CVE-2024-43907","CVE-2024-43908","CVE-2024-43909","CVE-2024-43911","CVE-2024-43912","CVE-2024-44931","CVE-2024-44938","CVE-2024-44939"]}