{"affected":[{"ecosystem_specific":{"binaries":[{"kernel-64kb":"6.4.0-150600.23.30.1","kernel-64kb-devel":"6.4.0-150600.23.30.1","kernel-default":"6.4.0-150600.23.30.1","kernel-default-base":"6.4.0-150600.23.30.1.150600.12.12.6","kernel-default-devel":"6.4.0-150600.23.30.1","kernel-devel":"6.4.0-150600.23.30.1","kernel-macros":"6.4.0-150600.23.30.1","kernel-zfcpdump":"6.4.0-150600.23.30.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for Basesystem 15 SP6","name":"kernel-64kb","purl":"pkg:rpm/suse/kernel-64kb&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP6"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"6.4.0-150600.23.30.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-64kb":"6.4.0-150600.23.30.1","kernel-64kb-devel":"6.4.0-150600.23.30.1","kernel-default":"6.4.0-150600.23.30.1","kernel-default-base":"6.4.0-150600.23.30.1.150600.12.12.6","kernel-default-devel":"6.4.0-150600.23.30.1","kernel-devel":"6.4.0-150600.23.30.1","kernel-macros":"6.4.0-150600.23.30.1","kernel-zfcpdump":"6.4.0-150600.23.30.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for Basesystem 15 SP6","name":"kernel-default","purl":"pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP6"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"6.4.0-150600.23.30.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-64kb":"6.4.0-150600.23.30.1","kernel-64kb-devel":"6.4.0-150600.23.30.1","kernel-default":"6.4.0-150600.23.30.1","kernel-default-base":"6.4.0-150600.23.30.1.150600.12.12.6","kernel-default-devel":"6.4.0-150600.23.30.1","kernel-devel":"6.4.0-150600.23.30.1","kernel-macros":"6.4.0-150600.23.30.1","kernel-zfcpdump":"6.4.0-150600.23.30.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for Basesystem 15 SP6","name":"kernel-default-base","purl":"pkg:rpm/suse/kernel-default-base&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP6"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"6.4.0-150600.23.30.1.150600.12.12.6"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-64kb":"6.4.0-150600.23.30.1","kernel-64kb-devel":"6.4.0-150600.23.30.1","kernel-default":"6.4.0-150600.23.30.1","kernel-default-base":"6.4.0-150600.23.30.1.150600.12.12.6","kernel-default-devel":"6.4.0-150600.23.30.1","kernel-devel":"6.4.0-150600.23.30.1","kernel-macros":"6.4.0-150600.23.30.1","kernel-zfcpdump":"6.4.0-150600.23.30.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for Basesystem 15 SP6","name":"kernel-source","purl":"pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP6"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"6.4.0-150600.23.30.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-64kb":"6.4.0-150600.23.30.1","kernel-64kb-devel":"6.4.0-150600.23.30.1","kernel-default":"6.4.0-150600.23.30.1","kernel-default-base":"6.4.0-150600.23.30.1.150600.12.12.6","kernel-default-devel":"6.4.0-150600.23.30.1","kernel-devel":"6.4.0-150600.23.30.1","kernel-macros":"6.4.0-150600.23.30.1","kernel-zfcpdump":"6.4.0-150600.23.30.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for Basesystem 15 SP6","name":"kernel-zfcpdump","purl":"pkg:rpm/suse/kernel-zfcpdump&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP6"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"6.4.0-150600.23.30.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-docs":"6.4.0-150600.23.30.1","kernel-obs-build":"6.4.0-150600.23.30.1","kernel-source":"6.4.0-150600.23.30.1","kernel-syms":"6.4.0-150600.23.30.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for Development Tools 15 SP6","name":"kernel-docs","purl":"pkg:rpm/suse/kernel-docs&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Development%20Tools%2015%20SP6"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"6.4.0-150600.23.30.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-docs":"6.4.0-150600.23.30.1","kernel-obs-build":"6.4.0-150600.23.30.1","kernel-source":"6.4.0-150600.23.30.1","kernel-syms":"6.4.0-150600.23.30.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for Development Tools 15 SP6","name":"kernel-obs-build","purl":"pkg:rpm/suse/kernel-obs-build&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Development%20Tools%2015%20SP6"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"6.4.0-150600.23.30.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-docs":"6.4.0-150600.23.30.1","kernel-obs-build":"6.4.0-150600.23.30.1","kernel-source":"6.4.0-150600.23.30.1","kernel-syms":"6.4.0-150600.23.30.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for Development Tools 15 SP6","name":"kernel-source","purl":"pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Development%20Tools%2015%20SP6"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"6.4.0-150600.23.30.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-docs":"6.4.0-150600.23.30.1","kernel-obs-build":"6.4.0-150600.23.30.1","kernel-source":"6.4.0-150600.23.30.1","kernel-syms":"6.4.0-150600.23.30.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for Development Tools 15 SP6","name":"kernel-syms","purl":"pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Development%20Tools%2015%20SP6"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"6.4.0-150600.23.30.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"reiserfs-kmp-default":"6.4.0-150600.23.30.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for Legacy 15 SP6","name":"kernel-default","purl":"pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Legacy%2015%20SP6"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"6.4.0-150600.23.30.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default-livepatch":"6.4.0-150600.23.30.1","kernel-default-livepatch-devel":"6.4.0-150600.23.30.1","kernel-livepatch-6_4_0-150600_23_30-default":"1-150600.13.3.5"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Live Patching 15 SP6","name":"kernel-default","purl":"pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015%20SP6"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"6.4.0-150600.23.30.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default-livepatch":"6.4.0-150600.23.30.1","kernel-default-livepatch-devel":"6.4.0-150600.23.30.1","kernel-livepatch-6_4_0-150600_23_30-default":"1-150600.13.3.5"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Live Patching 15 SP6","name":"kernel-livepatch-SLE15-SP6_Update_6","purl":"pkg:rpm/suse/kernel-livepatch-SLE15-SP6_Update_6&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015%20SP6"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1-150600.13.3.5"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-default":"6.4.0-150600.23.30.1","dlm-kmp-default":"6.4.0-150600.23.30.1","gfs2-kmp-default":"6.4.0-150600.23.30.1","ocfs2-kmp-default":"6.4.0-150600.23.30.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise High Availability Extension 15 SP6","name":"kernel-default","purl":"pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20High%20Availability%20Extension%2015%20SP6"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"6.4.0-150600.23.30.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default-extra":"6.4.0-150600.23.30.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Workstation Extension 15 SP6","name":"kernel-default","purl":"pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Workstation%20Extension%2015%20SP6"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"6.4.0-150600.23.30.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-64kb":"6.4.0-150600.23.30.1","cluster-md-kmp-default":"6.4.0-150600.23.30.1","dlm-kmp-64kb":"6.4.0-150600.23.30.1","dlm-kmp-default":"6.4.0-150600.23.30.1","dtb-allwinner":"6.4.0-150600.23.30.1","dtb-altera":"6.4.0-150600.23.30.1","dtb-amazon":"6.4.0-150600.23.30.1","dtb-amd":"6.4.0-150600.23.30.1","dtb-amlogic":"6.4.0-150600.23.30.1","dtb-apm":"6.4.0-150600.23.30.1","dtb-apple":"6.4.0-150600.23.30.1","dtb-arm":"6.4.0-150600.23.30.1","dtb-broadcom":"6.4.0-150600.23.30.1","dtb-cavium":"6.4.0-150600.23.30.1","dtb-exynos":"6.4.0-150600.23.30.1","dtb-freescale":"6.4.0-150600.23.30.1","dtb-hisilicon":"6.4.0-150600.23.30.1","dtb-lg":"6.4.0-150600.23.30.1","dtb-marvell":"6.4.0-150600.23.30.1","dtb-mediatek":"6.4.0-150600.23.30.1","dtb-nvidia":"6.4.0-150600.23.30.1","dtb-qcom":"6.4.0-150600.23.30.1","dtb-renesas":"6.4.0-150600.23.30.1","dtb-rockchip":"6.4.0-150600.23.30.1","dtb-socionext":"6.4.0-150600.23.30.1","dtb-sprd":"6.4.0-150600.23.30.1","dtb-xilinx":"6.4.0-150600.23.30.1","gfs2-kmp-64kb":"6.4.0-150600.23.30.1","gfs2-kmp-default":"6.4.0-150600.23.30.1","kernel-64kb":"6.4.0-150600.23.30.1","kernel-64kb-devel":"6.4.0-150600.23.30.1","kernel-64kb-extra":"6.4.0-150600.23.30.1","kernel-64kb-optional":"6.4.0-150600.23.30.1","kernel-debug":"6.4.0-150600.23.30.1","kernel-debug-devel":"6.4.0-150600.23.30.1","kernel-debug-vdso":"6.4.0-150600.23.30.1","kernel-default":"6.4.0-150600.23.30.1","kernel-default-base":"6.4.0-150600.23.30.1.150600.12.12.6","kernel-default-base-rebuild":"6.4.0-150600.23.30.1.150600.12.12.6","kernel-default-devel":"6.4.0-150600.23.30.1","kernel-default-extra":"6.4.0-150600.23.30.1","kernel-default-livepatch":"6.4.0-150600.23.30.1","kernel-default-livepatch-devel":"6.4.0-150600.23.30.1","kernel-default-optional":"6.4.0-150600.23.30.1","kernel-default-vdso":"6.4.0-150600.23.30.1","kernel-devel":"6.4.0-150600.23.30.1","kernel-docs":"6.4.0-150600.23.30.1","kernel-docs-html":"6.4.0-150600.23.30.1","kernel-kvmsmall":"6.4.0-150600.23.30.1","kernel-kvmsmall-devel":"6.4.0-150600.23.30.1","kernel-kvmsmall-vdso":"6.4.0-150600.23.30.1","kernel-macros":"6.4.0-150600.23.30.1","kernel-obs-build":"6.4.0-150600.23.30.1","kernel-obs-qa":"6.4.0-150600.23.30.1","kernel-source":"6.4.0-150600.23.30.1","kernel-source-vanilla":"6.4.0-150600.23.30.1","kernel-syms":"6.4.0-150600.23.30.1","kernel-zfcpdump":"6.4.0-150600.23.30.1","kselftests-kmp-64kb":"6.4.0-150600.23.30.1","kselftests-kmp-default":"6.4.0-150600.23.30.1","ocfs2-kmp-64kb":"6.4.0-150600.23.30.1","ocfs2-kmp-default":"6.4.0-150600.23.30.1","reiserfs-kmp-64kb":"6.4.0-150600.23.30.1","reiserfs-kmp-default":"6.4.0-150600.23.30.1"}]},"package":{"ecosystem":"openSUSE:Leap 15.6","name":"dtb-aarch64","purl":"pkg:rpm/opensuse/dtb-aarch64&distro=openSUSE%20Leap%2015.6"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"6.4.0-150600.23.30.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-64kb":"6.4.0-150600.23.30.1","cluster-md-kmp-default":"6.4.0-150600.23.30.1","dlm-kmp-64kb":"6.4.0-150600.23.30.1","dlm-kmp-default":"6.4.0-150600.23.30.1","dtb-allwinner":"6.4.0-150600.23.30.1","dtb-altera":"6.4.0-150600.23.30.1","dtb-amazon":"6.4.0-150600.23.30.1","dtb-amd":"6.4.0-150600.23.30.1","dtb-amlogic":"6.4.0-150600.23.30.1","dtb-apm":"6.4.0-150600.23.30.1","dtb-apple":"6.4.0-150600.23.30.1","dtb-arm":"6.4.0-150600.23.30.1","dtb-broadcom":"6.4.0-150600.23.30.1","dtb-cavium":"6.4.0-150600.23.30.1","dtb-exynos":"6.4.0-150600.23.30.1","dtb-freescale":"6.4.0-150600.23.30.1","dtb-hisilicon":"6.4.0-150600.23.30.1","dtb-lg":"6.4.0-150600.23.30.1","dtb-marvell":"6.4.0-150600.23.30.1","dtb-mediatek":"6.4.0-150600.23.30.1","dtb-nvidia":"6.4.0-150600.23.30.1","dtb-qcom":"6.4.0-150600.23.30.1","dtb-renesas":"6.4.0-150600.23.30.1","dtb-rockchip":"6.4.0-150600.23.30.1","dtb-socionext":"6.4.0-150600.23.30.1","dtb-sprd":"6.4.0-150600.23.30.1","dtb-xilinx":"6.4.0-150600.23.30.1","gfs2-kmp-64kb":"6.4.0-150600.23.30.1","gfs2-kmp-default":"6.4.0-150600.23.30.1","kernel-64kb":"6.4.0-150600.23.30.1","kernel-64kb-devel":"6.4.0-150600.23.30.1","kernel-64kb-extra":"6.4.0-150600.23.30.1","kernel-64kb-optional":"6.4.0-150600.23.30.1","kernel-debug":"6.4.0-150600.23.30.1","kernel-debug-devel":"6.4.0-150600.23.30.1","kernel-debug-vdso":"6.4.0-150600.23.30.1","kernel-default":"6.4.0-150600.23.30.1","kernel-default-base":"6.4.0-150600.23.30.1.150600.12.12.6","kernel-default-base-rebuild":"6.4.0-150600.23.30.1.150600.12.12.6","kernel-default-devel":"6.4.0-150600.23.30.1","kernel-default-extra":"6.4.0-150600.23.30.1","kernel-default-livepatch":"6.4.0-150600.23.30.1","kernel-default-livepatch-devel":"6.4.0-150600.23.30.1","kernel-default-optional":"6.4.0-150600.23.30.1","kernel-default-vdso":"6.4.0-150600.23.30.1","kernel-devel":"6.4.0-150600.23.30.1","kernel-docs":"6.4.0-150600.23.30.1","kernel-docs-html":"6.4.0-150600.23.30.1","kernel-kvmsmall":"6.4.0-150600.23.30.1","kernel-kvmsmall-devel":"6.4.0-150600.23.30.1","kernel-kvmsmall-vdso":"6.4.0-150600.23.30.1","kernel-macros":"6.4.0-150600.23.30.1","kernel-obs-build":"6.4.0-150600.23.30.1","kernel-obs-qa":"6.4.0-150600.23.30.1","kernel-source":"6.4.0-150600.23.30.1","kernel-source-vanilla":"6.4.0-150600.23.30.1","kernel-syms":"6.4.0-150600.23.30.1","kernel-zfcpdump":"6.4.0-150600.23.30.1","kselftests-kmp-64kb":"6.4.0-150600.23.30.1","kselftests-kmp-default":"6.4.0-150600.23.30.1","ocfs2-kmp-64kb":"6.4.0-150600.23.30.1","ocfs2-kmp-default":"6.4.0-150600.23.30.1","reiserfs-kmp-64kb":"6.4.0-150600.23.30.1","reiserfs-kmp-default":"6.4.0-150600.23.30.1"}]},"package":{"ecosystem":"openSUSE:Leap 15.6","name":"kernel-64kb","purl":"pkg:rpm/opensuse/kernel-64kb&distro=openSUSE%20Leap%2015.6"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"6.4.0-150600.23.30.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-64kb":"6.4.0-150600.23.30.1","cluster-md-kmp-default":"6.4.0-150600.23.30.1","dlm-kmp-64kb":"6.4.0-150600.23.30.1","dlm-kmp-default":"6.4.0-150600.23.30.1","dtb-allwinner":"6.4.0-150600.23.30.1","dtb-altera":"6.4.0-150600.23.30.1","dtb-amazon":"6.4.0-150600.23.30.1","dtb-amd":"6.4.0-150600.23.30.1","dtb-amlogic":"6.4.0-150600.23.30.1","dtb-apm":"6.4.0-150600.23.30.1","dtb-apple":"6.4.0-150600.23.30.1","dtb-arm":"6.4.0-150600.23.30.1","dtb-broadcom":"6.4.0-150600.23.30.1","dtb-cavium":"6.4.0-150600.23.30.1","dtb-exynos":"6.4.0-150600.23.30.1","dtb-freescale":"6.4.0-150600.23.30.1","dtb-hisilicon":"6.4.0-150600.23.30.1","dtb-lg":"6.4.0-150600.23.30.1","dtb-marvell":"6.4.0-150600.23.30.1","dtb-mediatek":"6.4.0-150600.23.30.1","dtb-nvidia":"6.4.0-150600.23.30.1","dtb-qcom":"6.4.0-150600.23.30.1","dtb-renesas":"6.4.0-150600.23.30.1","dtb-rockchip":"6.4.0-150600.23.30.1","dtb-socionext":"6.4.0-150600.23.30.1","dtb-sprd":"6.4.0-150600.23.30.1","dtb-xilinx":"6.4.0-150600.23.30.1","gfs2-kmp-64kb":"6.4.0-150600.23.30.1","gfs2-kmp-default":"6.4.0-150600.23.30.1","kernel-64kb":"6.4.0-150600.23.30.1","kernel-64kb-devel":"6.4.0-150600.23.30.1","kernel-64kb-extra":"6.4.0-150600.23.30.1","kernel-64kb-optional":"6.4.0-150600.23.30.1","kernel-debug":"6.4.0-150600.23.30.1","kernel-debug-devel":"6.4.0-150600.23.30.1","kernel-debug-vdso":"6.4.0-150600.23.30.1","kernel-default":"6.4.0-150600.23.30.1","kernel-default-base":"6.4.0-150600.23.30.1.150600.12.12.6","kernel-default-base-rebuild":"6.4.0-150600.23.30.1.150600.12.12.6","kernel-default-devel":"6.4.0-150600.23.30.1","kernel-default-extra":"6.4.0-150600.23.30.1","kernel-default-livepatch":"6.4.0-150600.23.30.1","kernel-default-livepatch-devel":"6.4.0-150600.23.30.1","kernel-default-optional":"6.4.0-150600.23.30.1","kernel-default-vdso":"6.4.0-150600.23.30.1","kernel-devel":"6.4.0-150600.23.30.1","kernel-docs":"6.4.0-150600.23.30.1","kernel-docs-html":"6.4.0-150600.23.30.1","kernel-kvmsmall":"6.4.0-150600.23.30.1","kernel-kvmsmall-devel":"6.4.0-150600.23.30.1","kernel-kvmsmall-vdso":"6.4.0-150600.23.30.1","kernel-macros":"6.4.0-150600.23.30.1","kernel-obs-build":"6.4.0-150600.23.30.1","kernel-obs-qa":"6.4.0-150600.23.30.1","kernel-source":"6.4.0-150600.23.30.1","kernel-source-vanilla":"6.4.0-150600.23.30.1","kernel-syms":"6.4.0-150600.23.30.1","kernel-zfcpdump":"6.4.0-150600.23.30.1","kselftests-kmp-64kb":"6.4.0-150600.23.30.1","kselftests-kmp-default":"6.4.0-150600.23.30.1","ocfs2-kmp-64kb":"6.4.0-150600.23.30.1","ocfs2-kmp-default":"6.4.0-150600.23.30.1","reiserfs-kmp-64kb":"6.4.0-150600.23.30.1","reiserfs-kmp-default":"6.4.0-150600.23.30.1"}]},"package":{"ecosystem":"openSUSE:Leap 15.6","name":"kernel-debug","purl":"pkg:rpm/opensuse/kernel-debug&distro=openSUSE%20Leap%2015.6"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"6.4.0-150600.23.30.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-64kb":"6.4.0-150600.23.30.1","cluster-md-kmp-default":"6.4.0-150600.23.30.1","dlm-kmp-64kb":"6.4.0-150600.23.30.1","dlm-kmp-default":"6.4.0-150600.23.30.1","dtb-allwinner":"6.4.0-150600.23.30.1","dtb-altera":"6.4.0-150600.23.30.1","dtb-amazon":"6.4.0-150600.23.30.1","dtb-amd":"6.4.0-150600.23.30.1","dtb-amlogic":"6.4.0-150600.23.30.1","dtb-apm":"6.4.0-150600.23.30.1","dtb-apple":"6.4.0-150600.23.30.1","dtb-arm":"6.4.0-150600.23.30.1","dtb-broadcom":"6.4.0-150600.23.30.1","dtb-cavium":"6.4.0-150600.23.30.1","dtb-exynos":"6.4.0-150600.23.30.1","dtb-freescale":"6.4.0-150600.23.30.1","dtb-hisilicon":"6.4.0-150600.23.30.1","dtb-lg":"6.4.0-150600.23.30.1","dtb-marvell":"6.4.0-150600.23.30.1","dtb-mediatek":"6.4.0-150600.23.30.1","dtb-nvidia":"6.4.0-150600.23.30.1","dtb-qcom":"6.4.0-150600.23.30.1","dtb-renesas":"6.4.0-150600.23.30.1","dtb-rockchip":"6.4.0-150600.23.30.1","dtb-socionext":"6.4.0-150600.23.30.1","dtb-sprd":"6.4.0-150600.23.30.1","dtb-xilinx":"6.4.0-150600.23.30.1","gfs2-kmp-64kb":"6.4.0-150600.23.30.1","gfs2-kmp-default":"6.4.0-150600.23.30.1","kernel-64kb":"6.4.0-150600.23.30.1","kernel-64kb-devel":"6.4.0-150600.23.30.1","kernel-64kb-extra":"6.4.0-150600.23.30.1","kernel-64kb-optional":"6.4.0-150600.23.30.1","kernel-debug":"6.4.0-150600.23.30.1","kernel-debug-devel":"6.4.0-150600.23.30.1","kernel-debug-vdso":"6.4.0-150600.23.30.1","kernel-default":"6.4.0-150600.23.30.1","kernel-default-base":"6.4.0-150600.23.30.1.150600.12.12.6","kernel-default-base-rebuild":"6.4.0-150600.23.30.1.150600.12.12.6","kernel-default-devel":"6.4.0-150600.23.30.1","kernel-default-extra":"6.4.0-150600.23.30.1","kernel-default-livepatch":"6.4.0-150600.23.30.1","kernel-default-livepatch-devel":"6.4.0-150600.23.30.1","kernel-default-optional":"6.4.0-150600.23.30.1","kernel-default-vdso":"6.4.0-150600.23.30.1","kernel-devel":"6.4.0-150600.23.30.1","kernel-docs":"6.4.0-150600.23.30.1","kernel-docs-html":"6.4.0-150600.23.30.1","kernel-kvmsmall":"6.4.0-150600.23.30.1","kernel-kvmsmall-devel":"6.4.0-150600.23.30.1","kernel-kvmsmall-vdso":"6.4.0-150600.23.30.1","kernel-macros":"6.4.0-150600.23.30.1","kernel-obs-build":"6.4.0-150600.23.30.1","kernel-obs-qa":"6.4.0-150600.23.30.1","kernel-source":"6.4.0-150600.23.30.1","kernel-source-vanilla":"6.4.0-150600.23.30.1","kernel-syms":"6.4.0-150600.23.30.1","kernel-zfcpdump":"6.4.0-150600.23.30.1","kselftests-kmp-64kb":"6.4.0-150600.23.30.1","kselftests-kmp-default":"6.4.0-150600.23.30.1","ocfs2-kmp-64kb":"6.4.0-150600.23.30.1","ocfs2-kmp-default":"6.4.0-150600.23.30.1","reiserfs-kmp-64kb":"6.4.0-150600.23.30.1","reiserfs-kmp-default":"6.4.0-150600.23.30.1"}]},"package":{"ecosystem":"openSUSE:Leap 15.6","name":"kernel-default","purl":"pkg:rpm/opensuse/kernel-default&distro=openSUSE%20Leap%2015.6"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"6.4.0-150600.23.30.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-64kb":"6.4.0-150600.23.30.1","cluster-md-kmp-default":"6.4.0-150600.23.30.1","dlm-kmp-64kb":"6.4.0-150600.23.30.1","dlm-kmp-default":"6.4.0-150600.23.30.1","dtb-allwinner":"6.4.0-150600.23.30.1","dtb-altera":"6.4.0-150600.23.30.1","dtb-amazon":"6.4.0-150600.23.30.1","dtb-amd":"6.4.0-150600.23.30.1","dtb-amlogic":"6.4.0-150600.23.30.1","dtb-apm":"6.4.0-150600.23.30.1","dtb-apple":"6.4.0-150600.23.30.1","dtb-arm":"6.4.0-150600.23.30.1","dtb-broadcom":"6.4.0-150600.23.30.1","dtb-cavium":"6.4.0-150600.23.30.1","dtb-exynos":"6.4.0-150600.23.30.1","dtb-freescale":"6.4.0-150600.23.30.1","dtb-hisilicon":"6.4.0-150600.23.30.1","dtb-lg":"6.4.0-150600.23.30.1","dtb-marvell":"6.4.0-150600.23.30.1","dtb-mediatek":"6.4.0-150600.23.30.1","dtb-nvidia":"6.4.0-150600.23.30.1","dtb-qcom":"6.4.0-150600.23.30.1","dtb-renesas":"6.4.0-150600.23.30.1","dtb-rockchip":"6.4.0-150600.23.30.1","dtb-socionext":"6.4.0-150600.23.30.1","dtb-sprd":"6.4.0-150600.23.30.1","dtb-xilinx":"6.4.0-150600.23.30.1","gfs2-kmp-64kb":"6.4.0-150600.23.30.1","gfs2-kmp-default":"6.4.0-150600.23.30.1","kernel-64kb":"6.4.0-150600.23.30.1","kernel-64kb-devel":"6.4.0-150600.23.30.1","kernel-64kb-extra":"6.4.0-150600.23.30.1","kernel-64kb-optional":"6.4.0-150600.23.30.1","kernel-debug":"6.4.0-150600.23.30.1","kernel-debug-devel":"6.4.0-150600.23.30.1","kernel-debug-vdso":"6.4.0-150600.23.30.1","kernel-default":"6.4.0-150600.23.30.1","kernel-default-base":"6.4.0-150600.23.30.1.150600.12.12.6","kernel-default-base-rebuild":"6.4.0-150600.23.30.1.150600.12.12.6","kernel-default-devel":"6.4.0-150600.23.30.1","kernel-default-extra":"6.4.0-150600.23.30.1","kernel-default-livepatch":"6.4.0-150600.23.30.1","kernel-default-livepatch-devel":"6.4.0-150600.23.30.1","kernel-default-optional":"6.4.0-150600.23.30.1","kernel-default-vdso":"6.4.0-150600.23.30.1","kernel-devel":"6.4.0-150600.23.30.1","kernel-docs":"6.4.0-150600.23.30.1","kernel-docs-html":"6.4.0-150600.23.30.1","kernel-kvmsmall":"6.4.0-150600.23.30.1","kernel-kvmsmall-devel":"6.4.0-150600.23.30.1","kernel-kvmsmall-vdso":"6.4.0-150600.23.30.1","kernel-macros":"6.4.0-150600.23.30.1","kernel-obs-build":"6.4.0-150600.23.30.1","kernel-obs-qa":"6.4.0-150600.23.30.1","kernel-source":"6.4.0-150600.23.30.1","kernel-source-vanilla":"6.4.0-150600.23.30.1","kernel-syms":"6.4.0-150600.23.30.1","kernel-zfcpdump":"6.4.0-150600.23.30.1","kselftests-kmp-64kb":"6.4.0-150600.23.30.1","kselftests-kmp-default":"6.4.0-150600.23.30.1","ocfs2-kmp-64kb":"6.4.0-150600.23.30.1","ocfs2-kmp-default":"6.4.0-150600.23.30.1","reiserfs-kmp-64kb":"6.4.0-150600.23.30.1","reiserfs-kmp-default":"6.4.0-150600.23.30.1"}]},"package":{"ecosystem":"openSUSE:Leap 15.6","name":"kernel-default-base","purl":"pkg:rpm/opensuse/kernel-default-base&distro=openSUSE%20Leap%2015.6"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"6.4.0-150600.23.30.1.150600.12.12.6"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-64kb":"6.4.0-150600.23.30.1","cluster-md-kmp-default":"6.4.0-150600.23.30.1","dlm-kmp-64kb":"6.4.0-150600.23.30.1","dlm-kmp-default":"6.4.0-150600.23.30.1","dtb-allwinner":"6.4.0-150600.23.30.1","dtb-altera":"6.4.0-150600.23.30.1","dtb-amazon":"6.4.0-150600.23.30.1","dtb-amd":"6.4.0-150600.23.30.1","dtb-amlogic":"6.4.0-150600.23.30.1","dtb-apm":"6.4.0-150600.23.30.1","dtb-apple":"6.4.0-150600.23.30.1","dtb-arm":"6.4.0-150600.23.30.1","dtb-broadcom":"6.4.0-150600.23.30.1","dtb-cavium":"6.4.0-150600.23.30.1","dtb-exynos":"6.4.0-150600.23.30.1","dtb-freescale":"6.4.0-150600.23.30.1","dtb-hisilicon":"6.4.0-150600.23.30.1","dtb-lg":"6.4.0-150600.23.30.1","dtb-marvell":"6.4.0-150600.23.30.1","dtb-mediatek":"6.4.0-150600.23.30.1","dtb-nvidia":"6.4.0-150600.23.30.1","dtb-qcom":"6.4.0-150600.23.30.1","dtb-renesas":"6.4.0-150600.23.30.1","dtb-rockchip":"6.4.0-150600.23.30.1","dtb-socionext":"6.4.0-150600.23.30.1","dtb-sprd":"6.4.0-150600.23.30.1","dtb-xilinx":"6.4.0-150600.23.30.1","gfs2-kmp-64kb":"6.4.0-150600.23.30.1","gfs2-kmp-default":"6.4.0-150600.23.30.1","kernel-64kb":"6.4.0-150600.23.30.1","kernel-64kb-devel":"6.4.0-150600.23.30.1","kernel-64kb-extra":"6.4.0-150600.23.30.1","kernel-64kb-optional":"6.4.0-150600.23.30.1","kernel-debug":"6.4.0-150600.23.30.1","kernel-debug-devel":"6.4.0-150600.23.30.1","kernel-debug-vdso":"6.4.0-150600.23.30.1","kernel-default":"6.4.0-150600.23.30.1","kernel-default-base":"6.4.0-150600.23.30.1.150600.12.12.6","kernel-default-base-rebuild":"6.4.0-150600.23.30.1.150600.12.12.6","kernel-default-devel":"6.4.0-150600.23.30.1","kernel-default-extra":"6.4.0-150600.23.30.1","kernel-default-livepatch":"6.4.0-150600.23.30.1","kernel-default-livepatch-devel":"6.4.0-150600.23.30.1","kernel-default-optional":"6.4.0-150600.23.30.1","kernel-default-vdso":"6.4.0-150600.23.30.1","kernel-devel":"6.4.0-150600.23.30.1","kernel-docs":"6.4.0-150600.23.30.1","kernel-docs-html":"6.4.0-150600.23.30.1","kernel-kvmsmall":"6.4.0-150600.23.30.1","kernel-kvmsmall-devel":"6.4.0-150600.23.30.1","kernel-kvmsmall-vdso":"6.4.0-150600.23.30.1","kernel-macros":"6.4.0-150600.23.30.1","kernel-obs-build":"6.4.0-150600.23.30.1","kernel-obs-qa":"6.4.0-150600.23.30.1","kernel-source":"6.4.0-150600.23.30.1","kernel-source-vanilla":"6.4.0-150600.23.30.1","kernel-syms":"6.4.0-150600.23.30.1","kernel-zfcpdump":"6.4.0-150600.23.30.1","kselftests-kmp-64kb":"6.4.0-150600.23.30.1","kselftests-kmp-default":"6.4.0-150600.23.30.1","ocfs2-kmp-64kb":"6.4.0-150600.23.30.1","ocfs2-kmp-default":"6.4.0-150600.23.30.1","reiserfs-kmp-64kb":"6.4.0-150600.23.30.1","reiserfs-kmp-default":"6.4.0-150600.23.30.1"}]},"package":{"ecosystem":"openSUSE:Leap 15.6","name":"kernel-docs","purl":"pkg:rpm/opensuse/kernel-docs&distro=openSUSE%20Leap%2015.6"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"6.4.0-150600.23.30.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-64kb":"6.4.0-150600.23.30.1","cluster-md-kmp-default":"6.4.0-150600.23.30.1","dlm-kmp-64kb":"6.4.0-150600.23.30.1","dlm-kmp-default":"6.4.0-150600.23.30.1","dtb-allwinner":"6.4.0-150600.23.30.1","dtb-altera":"6.4.0-150600.23.30.1","dtb-amazon":"6.4.0-150600.23.30.1","dtb-amd":"6.4.0-150600.23.30.1","dtb-amlogic":"6.4.0-150600.23.30.1","dtb-apm":"6.4.0-150600.23.30.1","dtb-apple":"6.4.0-150600.23.30.1","dtb-arm":"6.4.0-150600.23.30.1","dtb-broadcom":"6.4.0-150600.23.30.1","dtb-cavium":"6.4.0-150600.23.30.1","dtb-exynos":"6.4.0-150600.23.30.1","dtb-freescale":"6.4.0-150600.23.30.1","dtb-hisilicon":"6.4.0-150600.23.30.1","dtb-lg":"6.4.0-150600.23.30.1","dtb-marvell":"6.4.0-150600.23.30.1","dtb-mediatek":"6.4.0-150600.23.30.1","dtb-nvidia":"6.4.0-150600.23.30.1","dtb-qcom":"6.4.0-150600.23.30.1","dtb-renesas":"6.4.0-150600.23.30.1","dtb-rockchip":"6.4.0-150600.23.30.1","dtb-socionext":"6.4.0-150600.23.30.1","dtb-sprd":"6.4.0-150600.23.30.1","dtb-xilinx":"6.4.0-150600.23.30.1","gfs2-kmp-64kb":"6.4.0-150600.23.30.1","gfs2-kmp-default":"6.4.0-150600.23.30.1","kernel-64kb":"6.4.0-150600.23.30.1","kernel-64kb-devel":"6.4.0-150600.23.30.1","kernel-64kb-extra":"6.4.0-150600.23.30.1","kernel-64kb-optional":"6.4.0-150600.23.30.1","kernel-debug":"6.4.0-150600.23.30.1","kernel-debug-devel":"6.4.0-150600.23.30.1","kernel-debug-vdso":"6.4.0-150600.23.30.1","kernel-default":"6.4.0-150600.23.30.1","kernel-default-base":"6.4.0-150600.23.30.1.150600.12.12.6","kernel-default-base-rebuild":"6.4.0-150600.23.30.1.150600.12.12.6","kernel-default-devel":"6.4.0-150600.23.30.1","kernel-default-extra":"6.4.0-150600.23.30.1","kernel-default-livepatch":"6.4.0-150600.23.30.1","kernel-default-livepatch-devel":"6.4.0-150600.23.30.1","kernel-default-optional":"6.4.0-150600.23.30.1","kernel-default-vdso":"6.4.0-150600.23.30.1","kernel-devel":"6.4.0-150600.23.30.1","kernel-docs":"6.4.0-150600.23.30.1","kernel-docs-html":"6.4.0-150600.23.30.1","kernel-kvmsmall":"6.4.0-150600.23.30.1","kernel-kvmsmall-devel":"6.4.0-150600.23.30.1","kernel-kvmsmall-vdso":"6.4.0-150600.23.30.1","kernel-macros":"6.4.0-150600.23.30.1","kernel-obs-build":"6.4.0-150600.23.30.1","kernel-obs-qa":"6.4.0-150600.23.30.1","kernel-source":"6.4.0-150600.23.30.1","kernel-source-vanilla":"6.4.0-150600.23.30.1","kernel-syms":"6.4.0-150600.23.30.1","kernel-zfcpdump":"6.4.0-150600.23.30.1","kselftests-kmp-64kb":"6.4.0-150600.23.30.1","kselftests-kmp-default":"6.4.0-150600.23.30.1","ocfs2-kmp-64kb":"6.4.0-150600.23.30.1","ocfs2-kmp-default":"6.4.0-150600.23.30.1","reiserfs-kmp-64kb":"6.4.0-150600.23.30.1","reiserfs-kmp-default":"6.4.0-150600.23.30.1"}]},"package":{"ecosystem":"openSUSE:Leap 15.6","name":"kernel-kvmsmall","purl":"pkg:rpm/opensuse/kernel-kvmsmall&distro=openSUSE%20Leap%2015.6"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"6.4.0-150600.23.30.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-64kb":"6.4.0-150600.23.30.1","cluster-md-kmp-default":"6.4.0-150600.23.30.1","dlm-kmp-64kb":"6.4.0-150600.23.30.1","dlm-kmp-default":"6.4.0-150600.23.30.1","dtb-allwinner":"6.4.0-150600.23.30.1","dtb-altera":"6.4.0-150600.23.30.1","dtb-amazon":"6.4.0-150600.23.30.1","dtb-amd":"6.4.0-150600.23.30.1","dtb-amlogic":"6.4.0-150600.23.30.1","dtb-apm":"6.4.0-150600.23.30.1","dtb-apple":"6.4.0-150600.23.30.1","dtb-arm":"6.4.0-150600.23.30.1","dtb-broadcom":"6.4.0-150600.23.30.1","dtb-cavium":"6.4.0-150600.23.30.1","dtb-exynos":"6.4.0-150600.23.30.1","dtb-freescale":"6.4.0-150600.23.30.1","dtb-hisilicon":"6.4.0-150600.23.30.1","dtb-lg":"6.4.0-150600.23.30.1","dtb-marvell":"6.4.0-150600.23.30.1","dtb-mediatek":"6.4.0-150600.23.30.1","dtb-nvidia":"6.4.0-150600.23.30.1","dtb-qcom":"6.4.0-150600.23.30.1","dtb-renesas":"6.4.0-150600.23.30.1","dtb-rockchip":"6.4.0-150600.23.30.1","dtb-socionext":"6.4.0-150600.23.30.1","dtb-sprd":"6.4.0-150600.23.30.1","dtb-xilinx":"6.4.0-150600.23.30.1","gfs2-kmp-64kb":"6.4.0-150600.23.30.1","gfs2-kmp-default":"6.4.0-150600.23.30.1","kernel-64kb":"6.4.0-150600.23.30.1","kernel-64kb-devel":"6.4.0-150600.23.30.1","kernel-64kb-extra":"6.4.0-150600.23.30.1","kernel-64kb-optional":"6.4.0-150600.23.30.1","kernel-debug":"6.4.0-150600.23.30.1","kernel-debug-devel":"6.4.0-150600.23.30.1","kernel-debug-vdso":"6.4.0-150600.23.30.1","kernel-default":"6.4.0-150600.23.30.1","kernel-default-base":"6.4.0-150600.23.30.1.150600.12.12.6","kernel-default-base-rebuild":"6.4.0-150600.23.30.1.150600.12.12.6","kernel-default-devel":"6.4.0-150600.23.30.1","kernel-default-extra":"6.4.0-150600.23.30.1","kernel-default-livepatch":"6.4.0-150600.23.30.1","kernel-default-livepatch-devel":"6.4.0-150600.23.30.1","kernel-default-optional":"6.4.0-150600.23.30.1","kernel-default-vdso":"6.4.0-150600.23.30.1","kernel-devel":"6.4.0-150600.23.30.1","kernel-docs":"6.4.0-150600.23.30.1","kernel-docs-html":"6.4.0-150600.23.30.1","kernel-kvmsmall":"6.4.0-150600.23.30.1","kernel-kvmsmall-devel":"6.4.0-150600.23.30.1","kernel-kvmsmall-vdso":"6.4.0-150600.23.30.1","kernel-macros":"6.4.0-150600.23.30.1","kernel-obs-build":"6.4.0-150600.23.30.1","kernel-obs-qa":"6.4.0-150600.23.30.1","kernel-source":"6.4.0-150600.23.30.1","kernel-source-vanilla":"6.4.0-150600.23.30.1","kernel-syms":"6.4.0-150600.23.30.1","kernel-zfcpdump":"6.4.0-150600.23.30.1","kselftests-kmp-64kb":"6.4.0-150600.23.30.1","kselftests-kmp-default":"6.4.0-150600.23.30.1","ocfs2-kmp-64kb":"6.4.0-150600.23.30.1","ocfs2-kmp-default":"6.4.0-150600.23.30.1","reiserfs-kmp-64kb":"6.4.0-150600.23.30.1","reiserfs-kmp-default":"6.4.0-150600.23.30.1"}]},"package":{"ecosystem":"openSUSE:Leap 15.6","name":"kernel-obs-build","purl":"pkg:rpm/opensuse/kernel-obs-build&distro=openSUSE%20Leap%2015.6"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"6.4.0-150600.23.30.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-64kb":"6.4.0-150600.23.30.1","cluster-md-kmp-default":"6.4.0-150600.23.30.1","dlm-kmp-64kb":"6.4.0-150600.23.30.1","dlm-kmp-default":"6.4.0-150600.23.30.1","dtb-allwinner":"6.4.0-150600.23.30.1","dtb-altera":"6.4.0-150600.23.30.1","dtb-amazon":"6.4.0-150600.23.30.1","dtb-amd":"6.4.0-150600.23.30.1","dtb-amlogic":"6.4.0-150600.23.30.1","dtb-apm":"6.4.0-150600.23.30.1","dtb-apple":"6.4.0-150600.23.30.1","dtb-arm":"6.4.0-150600.23.30.1","dtb-broadcom":"6.4.0-150600.23.30.1","dtb-cavium":"6.4.0-150600.23.30.1","dtb-exynos":"6.4.0-150600.23.30.1","dtb-freescale":"6.4.0-150600.23.30.1","dtb-hisilicon":"6.4.0-150600.23.30.1","dtb-lg":"6.4.0-150600.23.30.1","dtb-marvell":"6.4.0-150600.23.30.1","dtb-mediatek":"6.4.0-150600.23.30.1","dtb-nvidia":"6.4.0-150600.23.30.1","dtb-qcom":"6.4.0-150600.23.30.1","dtb-renesas":"6.4.0-150600.23.30.1","dtb-rockchip":"6.4.0-150600.23.30.1","dtb-socionext":"6.4.0-150600.23.30.1","dtb-sprd":"6.4.0-150600.23.30.1","dtb-xilinx":"6.4.0-150600.23.30.1","gfs2-kmp-64kb":"6.4.0-150600.23.30.1","gfs2-kmp-default":"6.4.0-150600.23.30.1","kernel-64kb":"6.4.0-150600.23.30.1","kernel-64kb-devel":"6.4.0-150600.23.30.1","kernel-64kb-extra":"6.4.0-150600.23.30.1","kernel-64kb-optional":"6.4.0-150600.23.30.1","kernel-debug":"6.4.0-150600.23.30.1","kernel-debug-devel":"6.4.0-150600.23.30.1","kernel-debug-vdso":"6.4.0-150600.23.30.1","kernel-default":"6.4.0-150600.23.30.1","kernel-default-base":"6.4.0-150600.23.30.1.150600.12.12.6","kernel-default-base-rebuild":"6.4.0-150600.23.30.1.150600.12.12.6","kernel-default-devel":"6.4.0-150600.23.30.1","kernel-default-extra":"6.4.0-150600.23.30.1","kernel-default-livepatch":"6.4.0-150600.23.30.1","kernel-default-livepatch-devel":"6.4.0-150600.23.30.1","kernel-default-optional":"6.4.0-150600.23.30.1","kernel-default-vdso":"6.4.0-150600.23.30.1","kernel-devel":"6.4.0-150600.23.30.1","kernel-docs":"6.4.0-150600.23.30.1","kernel-docs-html":"6.4.0-150600.23.30.1","kernel-kvmsmall":"6.4.0-150600.23.30.1","kernel-kvmsmall-devel":"6.4.0-150600.23.30.1","kernel-kvmsmall-vdso":"6.4.0-150600.23.30.1","kernel-macros":"6.4.0-150600.23.30.1","kernel-obs-build":"6.4.0-150600.23.30.1","kernel-obs-qa":"6.4.0-150600.23.30.1","kernel-source":"6.4.0-150600.23.30.1","kernel-source-vanilla":"6.4.0-150600.23.30.1","kernel-syms":"6.4.0-150600.23.30.1","kernel-zfcpdump":"6.4.0-150600.23.30.1","kselftests-kmp-64kb":"6.4.0-150600.23.30.1","kselftests-kmp-default":"6.4.0-150600.23.30.1","ocfs2-kmp-64kb":"6.4.0-150600.23.30.1","ocfs2-kmp-default":"6.4.0-150600.23.30.1","reiserfs-kmp-64kb":"6.4.0-150600.23.30.1","reiserfs-kmp-default":"6.4.0-150600.23.30.1"}]},"package":{"ecosystem":"openSUSE:Leap 15.6","name":"kernel-obs-qa","purl":"pkg:rpm/opensuse/kernel-obs-qa&distro=openSUSE%20Leap%2015.6"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"6.4.0-150600.23.30.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-64kb":"6.4.0-150600.23.30.1","cluster-md-kmp-default":"6.4.0-150600.23.30.1","dlm-kmp-64kb":"6.4.0-150600.23.30.1","dlm-kmp-default":"6.4.0-150600.23.30.1","dtb-allwinner":"6.4.0-150600.23.30.1","dtb-altera":"6.4.0-150600.23.30.1","dtb-amazon":"6.4.0-150600.23.30.1","dtb-amd":"6.4.0-150600.23.30.1","dtb-amlogic":"6.4.0-150600.23.30.1","dtb-apm":"6.4.0-150600.23.30.1","dtb-apple":"6.4.0-150600.23.30.1","dtb-arm":"6.4.0-150600.23.30.1","dtb-broadcom":"6.4.0-150600.23.30.1","dtb-cavium":"6.4.0-150600.23.30.1","dtb-exynos":"6.4.0-150600.23.30.1","dtb-freescale":"6.4.0-150600.23.30.1","dtb-hisilicon":"6.4.0-150600.23.30.1","dtb-lg":"6.4.0-150600.23.30.1","dtb-marvell":"6.4.0-150600.23.30.1","dtb-mediatek":"6.4.0-150600.23.30.1","dtb-nvidia":"6.4.0-150600.23.30.1","dtb-qcom":"6.4.0-150600.23.30.1","dtb-renesas":"6.4.0-150600.23.30.1","dtb-rockchip":"6.4.0-150600.23.30.1","dtb-socionext":"6.4.0-150600.23.30.1","dtb-sprd":"6.4.0-150600.23.30.1","dtb-xilinx":"6.4.0-150600.23.30.1","gfs2-kmp-64kb":"6.4.0-150600.23.30.1","gfs2-kmp-default":"6.4.0-150600.23.30.1","kernel-64kb":"6.4.0-150600.23.30.1","kernel-64kb-devel":"6.4.0-150600.23.30.1","kernel-64kb-extra":"6.4.0-150600.23.30.1","kernel-64kb-optional":"6.4.0-150600.23.30.1","kernel-debug":"6.4.0-150600.23.30.1","kernel-debug-devel":"6.4.0-150600.23.30.1","kernel-debug-vdso":"6.4.0-150600.23.30.1","kernel-default":"6.4.0-150600.23.30.1","kernel-default-base":"6.4.0-150600.23.30.1.150600.12.12.6","kernel-default-base-rebuild":"6.4.0-150600.23.30.1.150600.12.12.6","kernel-default-devel":"6.4.0-150600.23.30.1","kernel-default-extra":"6.4.0-150600.23.30.1","kernel-default-livepatch":"6.4.0-150600.23.30.1","kernel-default-livepatch-devel":"6.4.0-150600.23.30.1","kernel-default-optional":"6.4.0-150600.23.30.1","kernel-default-vdso":"6.4.0-150600.23.30.1","kernel-devel":"6.4.0-150600.23.30.1","kernel-docs":"6.4.0-150600.23.30.1","kernel-docs-html":"6.4.0-150600.23.30.1","kernel-kvmsmall":"6.4.0-150600.23.30.1","kernel-kvmsmall-devel":"6.4.0-150600.23.30.1","kernel-kvmsmall-vdso":"6.4.0-150600.23.30.1","kernel-macros":"6.4.0-150600.23.30.1","kernel-obs-build":"6.4.0-150600.23.30.1","kernel-obs-qa":"6.4.0-150600.23.30.1","kernel-source":"6.4.0-150600.23.30.1","kernel-source-vanilla":"6.4.0-150600.23.30.1","kernel-syms":"6.4.0-150600.23.30.1","kernel-zfcpdump":"6.4.0-150600.23.30.1","kselftests-kmp-64kb":"6.4.0-150600.23.30.1","kselftests-kmp-default":"6.4.0-150600.23.30.1","ocfs2-kmp-64kb":"6.4.0-150600.23.30.1","ocfs2-kmp-default":"6.4.0-150600.23.30.1","reiserfs-kmp-64kb":"6.4.0-150600.23.30.1","reiserfs-kmp-default":"6.4.0-150600.23.30.1"}]},"package":{"ecosystem":"openSUSE:Leap 15.6","name":"kernel-source","purl":"pkg:rpm/opensuse/kernel-source&distro=openSUSE%20Leap%2015.6"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"6.4.0-150600.23.30.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-64kb":"6.4.0-150600.23.30.1","cluster-md-kmp-default":"6.4.0-150600.23.30.1","dlm-kmp-64kb":"6.4.0-150600.23.30.1","dlm-kmp-default":"6.4.0-150600.23.30.1","dtb-allwinner":"6.4.0-150600.23.30.1","dtb-altera":"6.4.0-150600.23.30.1","dtb-amazon":"6.4.0-150600.23.30.1","dtb-amd":"6.4.0-150600.23.30.1","dtb-amlogic":"6.4.0-150600.23.30.1","dtb-apm":"6.4.0-150600.23.30.1","dtb-apple":"6.4.0-150600.23.30.1","dtb-arm":"6.4.0-150600.23.30.1","dtb-broadcom":"6.4.0-150600.23.30.1","dtb-cavium":"6.4.0-150600.23.30.1","dtb-exynos":"6.4.0-150600.23.30.1","dtb-freescale":"6.4.0-150600.23.30.1","dtb-hisilicon":"6.4.0-150600.23.30.1","dtb-lg":"6.4.0-150600.23.30.1","dtb-marvell":"6.4.0-150600.23.30.1","dtb-mediatek":"6.4.0-150600.23.30.1","dtb-nvidia":"6.4.0-150600.23.30.1","dtb-qcom":"6.4.0-150600.23.30.1","dtb-renesas":"6.4.0-150600.23.30.1","dtb-rockchip":"6.4.0-150600.23.30.1","dtb-socionext":"6.4.0-150600.23.30.1","dtb-sprd":"6.4.0-150600.23.30.1","dtb-xilinx":"6.4.0-150600.23.30.1","gfs2-kmp-64kb":"6.4.0-150600.23.30.1","gfs2-kmp-default":"6.4.0-150600.23.30.1","kernel-64kb":"6.4.0-150600.23.30.1","kernel-64kb-devel":"6.4.0-150600.23.30.1","kernel-64kb-extra":"6.4.0-150600.23.30.1","kernel-64kb-optional":"6.4.0-150600.23.30.1","kernel-debug":"6.4.0-150600.23.30.1","kernel-debug-devel":"6.4.0-150600.23.30.1","kernel-debug-vdso":"6.4.0-150600.23.30.1","kernel-default":"6.4.0-150600.23.30.1","kernel-default-base":"6.4.0-150600.23.30.1.150600.12.12.6","kernel-default-base-rebuild":"6.4.0-150600.23.30.1.150600.12.12.6","kernel-default-devel":"6.4.0-150600.23.30.1","kernel-default-extra":"6.4.0-150600.23.30.1","kernel-default-livepatch":"6.4.0-150600.23.30.1","kernel-default-livepatch-devel":"6.4.0-150600.23.30.1","kernel-default-optional":"6.4.0-150600.23.30.1","kernel-default-vdso":"6.4.0-150600.23.30.1","kernel-devel":"6.4.0-150600.23.30.1","kernel-docs":"6.4.0-150600.23.30.1","kernel-docs-html":"6.4.0-150600.23.30.1","kernel-kvmsmall":"6.4.0-150600.23.30.1","kernel-kvmsmall-devel":"6.4.0-150600.23.30.1","kernel-kvmsmall-vdso":"6.4.0-150600.23.30.1","kernel-macros":"6.4.0-150600.23.30.1","kernel-obs-build":"6.4.0-150600.23.30.1","kernel-obs-qa":"6.4.0-150600.23.30.1","kernel-source":"6.4.0-150600.23.30.1","kernel-source-vanilla":"6.4.0-150600.23.30.1","kernel-syms":"6.4.0-150600.23.30.1","kernel-zfcpdump":"6.4.0-150600.23.30.1","kselftests-kmp-64kb":"6.4.0-150600.23.30.1","kselftests-kmp-default":"6.4.0-150600.23.30.1","ocfs2-kmp-64kb":"6.4.0-150600.23.30.1","ocfs2-kmp-default":"6.4.0-150600.23.30.1","reiserfs-kmp-64kb":"6.4.0-150600.23.30.1","reiserfs-kmp-default":"6.4.0-150600.23.30.1"}]},"package":{"ecosystem":"openSUSE:Leap 15.6","name":"kernel-syms","purl":"pkg:rpm/opensuse/kernel-syms&distro=openSUSE%20Leap%2015.6"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"6.4.0-150600.23.30.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-64kb":"6.4.0-150600.23.30.1","cluster-md-kmp-default":"6.4.0-150600.23.30.1","dlm-kmp-64kb":"6.4.0-150600.23.30.1","dlm-kmp-default":"6.4.0-150600.23.30.1","dtb-allwinner":"6.4.0-150600.23.30.1","dtb-altera":"6.4.0-150600.23.30.1","dtb-amazon":"6.4.0-150600.23.30.1","dtb-amd":"6.4.0-150600.23.30.1","dtb-amlogic":"6.4.0-150600.23.30.1","dtb-apm":"6.4.0-150600.23.30.1","dtb-apple":"6.4.0-150600.23.30.1","dtb-arm":"6.4.0-150600.23.30.1","dtb-broadcom":"6.4.0-150600.23.30.1","dtb-cavium":"6.4.0-150600.23.30.1","dtb-exynos":"6.4.0-150600.23.30.1","dtb-freescale":"6.4.0-150600.23.30.1","dtb-hisilicon":"6.4.0-150600.23.30.1","dtb-lg":"6.4.0-150600.23.30.1","dtb-marvell":"6.4.0-150600.23.30.1","dtb-mediatek":"6.4.0-150600.23.30.1","dtb-nvidia":"6.4.0-150600.23.30.1","dtb-qcom":"6.4.0-150600.23.30.1","dtb-renesas":"6.4.0-150600.23.30.1","dtb-rockchip":"6.4.0-150600.23.30.1","dtb-socionext":"6.4.0-150600.23.30.1","dtb-sprd":"6.4.0-150600.23.30.1","dtb-xilinx":"6.4.0-150600.23.30.1","gfs2-kmp-64kb":"6.4.0-150600.23.30.1","gfs2-kmp-default":"6.4.0-150600.23.30.1","kernel-64kb":"6.4.0-150600.23.30.1","kernel-64kb-devel":"6.4.0-150600.23.30.1","kernel-64kb-extra":"6.4.0-150600.23.30.1","kernel-64kb-optional":"6.4.0-150600.23.30.1","kernel-debug":"6.4.0-150600.23.30.1","kernel-debug-devel":"6.4.0-150600.23.30.1","kernel-debug-vdso":"6.4.0-150600.23.30.1","kernel-default":"6.4.0-150600.23.30.1","kernel-default-base":"6.4.0-150600.23.30.1.150600.12.12.6","kernel-default-base-rebuild":"6.4.0-150600.23.30.1.150600.12.12.6","kernel-default-devel":"6.4.0-150600.23.30.1","kernel-default-extra":"6.4.0-150600.23.30.1","kernel-default-livepatch":"6.4.0-150600.23.30.1","kernel-default-livepatch-devel":"6.4.0-150600.23.30.1","kernel-default-optional":"6.4.0-150600.23.30.1","kernel-default-vdso":"6.4.0-150600.23.30.1","kernel-devel":"6.4.0-150600.23.30.1","kernel-docs":"6.4.0-150600.23.30.1","kernel-docs-html":"6.4.0-150600.23.30.1","kernel-kvmsmall":"6.4.0-150600.23.30.1","kernel-kvmsmall-devel":"6.4.0-150600.23.30.1","kernel-kvmsmall-vdso":"6.4.0-150600.23.30.1","kernel-macros":"6.4.0-150600.23.30.1","kernel-obs-build":"6.4.0-150600.23.30.1","kernel-obs-qa":"6.4.0-150600.23.30.1","kernel-source":"6.4.0-150600.23.30.1","kernel-source-vanilla":"6.4.0-150600.23.30.1","kernel-syms":"6.4.0-150600.23.30.1","kernel-zfcpdump":"6.4.0-150600.23.30.1","kselftests-kmp-64kb":"6.4.0-150600.23.30.1","kselftests-kmp-default":"6.4.0-150600.23.30.1","ocfs2-kmp-64kb":"6.4.0-150600.23.30.1","ocfs2-kmp-default":"6.4.0-150600.23.30.1","reiserfs-kmp-64kb":"6.4.0-150600.23.30.1","reiserfs-kmp-default":"6.4.0-150600.23.30.1"}]},"package":{"ecosystem":"openSUSE:Leap 15.6","name":"kernel-zfcpdump","purl":"pkg:rpm/opensuse/kernel-zfcpdump&distro=openSUSE%20Leap%2015.6"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"6.4.0-150600.23.30.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"The SUSE Linux Enterprise 15 SP6 kernel was updated to receive various security bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2024-53095: smb: client: Fix use-after-free of network namespace (bsc#1233642).\n- CVE-2023-52778: mptcp: deal with large GSO size (bsc#1224948).\n- CVE-2023-52920: bpf: support non-r10 register spill/fill to/from stack in precision tracking (bsc#1232823).\n- CVE-2023-6270: aoe: fix the potential use-after-free problem in more places (bsc#1218562).\n- CVE-2024-26596: net: dsa: fix netdev_priv() dereference before check on non-DSA netdevice events (bsc#1220355).\n- CVE-2024-26741: dccp/tcp: Unhash sk from ehash for tb2 alloc failure after check_estalblished() (bsc#1222587).\n- CVE-2024-26782: mptcp: fix double-free on socket dismantle (bsc#1222590).\n- CVE-2024-26953: net: esp: fix bad handling of pages from page_pool (bsc#1223656).\n- CVE-2024-27017: netfilter: nft_set_pipapo: walk over current view on netlink dump (bsc#1223733).\n- CVE-2024-35888: erspan: make sure erspan_base_hdr is present in skb->head (bsc#1224518).\n- CVE-2024-36000: mm/hugetlb: fix missing hugetlb_lock for resv uncharge (bsc#1224548).\n- CVE-2024-36244: net/sched: taprio: extend minimum interval restriction to entire cycle too (bsc#1226797).\n- CVE-2024-36883: net: fix out-of-bounds access in ops_init (bsc#1225725).\n- CVE-2024-36886: tipc: fix UAF in error path (bsc#1225730).\n- CVE-2024-36905: tcp: defer shutdown(SEND_SHUTDOWN) for TCP_SYN_RECV sockets (bsc#1225742).\n- CVE-2024-36927: ipv4: Fix uninit-value access in __ip_make_skb() (bsc#1225813).\n- CVE-2024-36954: tipc: fix a possible memleak in tipc_buf_append (bsc#1225764).\n- CVE-2024-36968: Bluetooth: L2CAP: Fix div-by-zero in l2cap_le_flowctl_init() (bsc#1226130).\n- CVE-2024-38589: netrom: fix possible dead-lock in nr_rt_ioctl() (bsc#1226748).\n- CVE-2024-40914: mm/huge_memory: do not unpoison huge_zero_folio (bsc#1227842).\n- CVE-2024-41023: sched/deadline: Fix task_struct reference leak (bsc#1228430).\n- CVE-2024-41031: mm/filemap: skip to create PMD-sized page cache if needed (bsc#1228454).\n- CVE-2024-41082: nvme-fabrics: use reserved tag for reg read/write command  (bsc#1228620).\n- CVE-2024-42102: Revert 'mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again' (bsc#1233132).\n- CVE-2024-44958: sched/smt: Fix unbalance sched_smt_present dec/inc (bsc#1230179).\n- CVE-2024-44995: net: hns3: fix a deadlock problem when config TC during resetting (bsc#1230231).\n- CVE-2024-45016: netem: fix return value if duplicate enqueue fails (bsc#1230429).\n- CVE-2024-45025: fix bitmap corruption on close_range() with CLOSE_RANGE_UNSHARE (bsc#1230456).\n- CVE-2024-46678: bonding: change ipsec_lock from spin lock to mutex (bsc#1230550).\n- CVE-2024-46680: Bluetooth: btnxpuart: Fix random crash seen while removing driver (bsc#1230557).\n- CVE-2024-46681: pktgen: use cpus_read_lock() in pg_net_init() (bsc#1230558).\n- CVE-2024-46721: pparmor: fix possible NULL pointer dereference (bsc#1230710)\n- CVE-2024-46754: bpf: Remove tst_run from lwt_seg6local_prog_ops (bsc#1230801).\n- CVE-2024-46765: ice: protect XDP configuration with a mutex (bsc#1230807).\n- CVE-2024-46766: ice: move netif_queue_set_napi to rtnl-protected sections (bsc#1230762).\n- CVE-2024-46770: ice: Add netif_device_attach/detach into PF reset flow (bsc#1230763).\n- CVE-2024-46775: drm/amd/display: Validate function returns (bsc#1230774).\n- CVE-2024-46777: udf: Avoid excessive partition lengths (bsc#1230773).\n- CVE-2024-46800: sch/netem: fix use after free in netem_dequeue (bsc#1230827).\n- CVE-2024-46813: drm/amd/display: Check link_index before accessing dc->links (bsc#1231191).\n- CVE-2024-46816: drm/amd/display: Stop amdgpu_dm initialize when link nums greater than max_links (bsc#1231197).\n- CVE-2024-46826: ELF: fix kernel.randomize_va_space double read (bsc#1231115).\n- CVE-2024-46828: sched: sch_cake: fix bulk flow accounting logic for host fairness (bsc#1231114).\n- CVE-2024-46831: net: microchip: vcap: Fix use-after-free error in kunit test (bsc#1231117).\n- CVE-2024-46834: ethtool: fail closed if we can't get max channel used in indirection tables (bsc#1231096).\n- CVE-2024-46840: btrfs: clean up our handling of refs == 0 in snapshot delete (bsc#1231105).\n- CVE-2024-46841: btrfs: do not BUG_ON on ENOMEM from btrfs_lookup_extent_info() in walk_down_proc() (bsc#1231094).\n- CVE-2024-46843: scsi: ufs: core: Remove SCSI host only if added (bsc#1231100).\n- CVE-2024-46854: net: dpaa: Pad packets to ETH_ZLEN (bsc#1231084).\n- CVE-2024-46855: netfilter: nft_socket: fix sk refcount leaks (bsc#1231085).\n- CVE-2024-46857: net/mlx5: Fix bridge mode operations when there are no VFs (bsc#1231087).\n- CVE-2024-46870: drm/amd/display: Disable DMCUB timeout for DCN35 (bsc#1231435).\n- CVE-2024-47658: crypto: stm32/cryp - call finalize with bh disabled (bsc#1231436).\n- CVE-2024-47660: fsnotify: clear PARENT_WATCHED flags lazily (bsc#1231439).\n- CVE-2024-47664: spi: hisi-kunpeng: Add verification for the max_frequency provided by the firmware (bsc#1231442).\n- CVE-2024-47674: mm: avoid leaving partial pfn mappings around in error case (bsc#1231673).\n- CVE-2024-47679: vfs: fix race between evice_inodes() and find_inode()&iput() (bsc#1231930).\n- CVE-2024-47684: tcp: check skb is non-NULL in tcp_rto_delta_us() (bsc#1231987).\n- CVE-2024-47685: netfilter: nf_reject_ipv6: fix nf_reject_ip6_tcphdr_put() (bsc#1231998).\n- CVE-2024-47687: vdpa/mlx5: Fix invalid mr resource destroy (bsc#1232003).\n- CVE-2024-47692: nfsd: return -EINVAL when namelen is 0 (bsc#1231857).\n- CVE-2024-47701: ext4: avoid OOB when system.data xattr changes underneath the filesystem (bsc#1231920).\n- CVE-2024-47703: bpf, lsm: add check for BPF LSM return value (bsc#1231946).\n- CVE-2024-47704: drm/amd/display: Check link_res->hpo_dp_link_enc before using it (bsc#1231944).\n- CVE-2024-47705: block: fix potential invalid pointer dereference in blk_add_partition (bsc#1231872).\n- CVE-2024-47706: block, bfq: fix possible UAF for bfqq->bic with merge chain (bsc#1231942).\n- CVE-2024-47707: ipv6: avoid possible NULL deref in rt6_uncached_list_flush_dev() (bsc#1231935).\n- CVE-2024-47710: sock_map: Add a cond_resched() in sock_hash_free() (bsc#1232049).\n- CVE-2024-47727: x86/tdx: Fix 'in-kernel MMIO' check (bsc#1232116).\n- CVE-2024-47730: crypto: hisilicon/qm - inject error before stopping queue (bsc#1232075).\n- CVE-2024-47731: drivers/perf: Fix ali_drw_pmu driver interrupt status clearing (bsc#1232117).\n- CVE-2024-47739: padata: use integer wrap around to prevent deadlock on seq_nr overflow (bsc#1232124).\n- CVE-2024-47741: btrfs: fix race setting file private on concurrent lseek using same fd (bsc#1231869).\n- CVE-2024-47745: mm: call the security_mmap_file() LSM hook in remap_file_pages() (bsc#1232135).\n- CVE-2024-47747: net: seeq: Fix use after free vulnerability in ether3 Driver Due to Race Condition (bsc#1232145).\n- CVE-2024-47752: media: mediatek: vcodec: Fix H264 stateless decoder smatch warning (bsc#1232130).\n- CVE-2024-47753: media: mediatek: vcodec: Fix VP8 stateless decoder smatch warning (bsc#1231868).\n- CVE-2024-47754: media: mediatek: vcodec: Fix H264 multi stateless decoder smatch warning (bsc#1232131).\n- CVE-2024-49852: scsi: elx: libefc: Fix potential use after free in efc_nport_vport_del() (bsc#1232819).\n- CVE-2024-49864: rxrpc: Fix a race between socket set up and I/O thread creation (bsc#1232256).\n- CVE-2024-49867: btrfs: wait for fixup workers before stopping cleaner kthread during umount (bsc#1232262).\n- CVE-2024-49868: btrfs: fix a NULL pointer dereference when failed to start a new trasacntion (bsc#1232272).\n- CVE-2024-49881: ext4: update orig_path in ext4_find_extent() (bsc#1232201).\n- CVE-2024-49882: ext4: fix double brelse() the buffer of the extents path (bsc#1232200).\n- CVE-2024-49883: ext4: aovid use-after-free in ext4_ext_insert_extent() (bsc#1232199).\n- CVE-2024-49888: bpf: Fix a sdiv overflow issue (bsc#1232208).\n- CVE-2024-49890: drm/amd/pm: ensure the fw_info is not null before using it (bsc#1232217).\n- CVE-2024-49892: drm/amd/display: Initialize get_bytes_per_element's default to 1 (bsc#1232220).\n- CVE-2024-49894: drm/amd/display: Fix index out of bounds in degamma hardware format translation (bsc#1232354).\n- CVE-2024-49895: drm/amd/display: Fix index out of bounds in DCN30 degamma hardware format translation (bsc#1232352).\n- CVE-2024-49896: drm/amd/display: Check stream before comparing them (bsc#1232221).\n- CVE-2024-49897: drm/amd/display: Check phantom_stream before it is used (bsc#1232355).\n- CVE-2024-49898: drm/amd/display: Check null-initialized variables (bsc#1232222).\n- CVE-2024-49899: drm/amd/display: Initialize denominators' default to 1 (bsc#1232358).\n- CVE-2024-49901: drm/msm/adreno: Assign msm_gpu->pdev earlier to avoid nullptrs (bsc#1232305).\n- CVE-2024-49906: drm/amd/display: Check null pointer before try to access it (bsc#1232332).\n- CVE-2024-49907: drm/amd/display: Check null pointers before using dc->clk_mgr (bsc#1232334).\n- CVE-2024-49908: drm/amd/display: Add null check for 'afb' in amdgpu_dm_update_cursor (bsc#1232335).\n- CVE-2024-49909: drm/amd/display: Add NULL check for function pointer in dcn32_set_output_transfer_func (bsc#1232337).\n- CVE-2024-49911: drm/amd/display: Add NULL check for function pointer in dcn20_set_output_transfer_func (bsc#1232366).\n- CVE-2024-49912: drm/amd/display: Handle null 'stream_status' in 'planes_changed_for_existing_stream' (bsc#1232367).\n- CVE-2024-49913: drm/amd/display: Add null check for top_pipe_to_program in commit_planes_for_stream (bsc#1232307).\n- CVE-2024-49914: drm/amd/display: Add null check for pipe_ctx->plane_state in (bsc#1232369).\n- CVE-2024-49917: drm/amd/display: Add NULL check for clk_mgr and clk_mgr->funcs in dcn30_init_hw (bsc#1231965).\n- CVE-2024-49918: drm/amd/display: Add null check for head_pipe in dcn32_acquire_idle_pipe_for_head_pipe_in_layer (bsc#1231967).\n- CVE-2024-49919: drm/amd/display: Add null check for head_pipe in dcn201_acquire_free_pipe_for_layer (bsc#1231968).\n- CVE-2024-49920: drm/amd/display: Check null pointers before multiple uses (bsc#1232313).\n- CVE-2024-49921: drm/amd/display: Check null pointers before used (bsc#1232371).\n- CVE-2024-49922: drm/amd/display: Check null pointers before using them (bsc#1232374).\n- CVE-2024-49923: drm/amd/display: Pass non-null to dcn20_validate_apply_pipe_split_flags (bsc#1232361).\n- CVE-2024-49925: fbdev: efifb: Register sysfs groups through driver core (bsc#1232224)\n- CVE-2024-49933: blk_iocost: fix more out of bound shifts (bsc#1232368).\n- CVE-2024-49934: fs/inode: Prevent dump_mapping() accessing invalid dentry.d_name.name (bsc#1232387).\n- CVE-2024-49936: net/xen-netback: prevent UAF in xenvif_flush_hash() (bsc#1232424).\n- CVE-2024-49944: sctp: set sk_state back to CLOSED if autobind fails in sctp_listen_start (bsc#1232166).\n- CVE-2024-49945: net/ncsi: Disable the ncsi work before freeing the associated structure (bsc#1232165).\n- CVE-2024-49946: ppp: do not assume bh is held in ppp_channel_bridge_input() (bsc#1232164).\n- CVE-2024-49949: net: avoid potential underflow in qdisc_pkt_len_init() with UFO (bsc#1232160).\n- CVE-2024-49950: Bluetooth: L2CAP: Fix uaf in l2cap_connect (bsc#1232159).\n- CVE-2024-49952: netfilter: nf_tables: prevent nf_skb_duplicated corruption (bsc#1232157).\n- CVE-2024-49953: net/mlx5e: Fix crash caused by calling __xfrm_state_delete() twice (bsc#1232156).\n- CVE-2024-49954: static_call: Replace pointless WARN_ON() in static_call_module_notify() (bsc#1232155).\n- CVE-2024-49958: ocfs2: reserve space for inline xattr before attaching reflink tree (bsc#1232151).\n- CVE-2024-49959: jbd2: stop waiting for space when jbd2_cleanup_journal_tail() returns error (bsc#1232149).\n- CVE-2024-49960: ext4: fix timer use-after-free on failed mount (bsc#1232395).\n- CVE-2024-49967: ext4: no need to continue when the number of entries is 1 (bsc#1232140).\n- CVE-2024-49968: ext4: filesystems without casefold feature cannot be mounted with siphash (bsc#1232264).\n- CVE-2024-49969: drm/amd/display: Fix index out of bounds in DCN30 color transformation (bsc#1232519).\n- CVE-2024-49972: drm/amd/display: Deallocate DML memory if allocation fails (bsc#1232315).\n- CVE-2024-49973: r8169: add tally counter fields added with RTL8125 (bsc#1232105).\n- CVE-2024-49974: NFSD: Force all NFSv4.2 COPY requests to be synchronous (bsc#1232383).\n- CVE-2024-49983: ext4: drop ppath from ext4_ext_replay_update_ex() to avoid double-free (bsc#1232096).\n- CVE-2024-49986: platform/x86: x86-android-tablets: Fix use after free on platform_device_register() errors (bsc#1232093).\n- CVE-2024-49987: bpftool: Fix undefined behavior in qsort(NULL, 0, ...) (bsc#1232258).\n- CVE-2024-49989: drm/amd/display: fix double free issue during amdgpu module unload (bsc#1232483).\n- CVE-2024-49991: drm/amdkfd: amdkfd_free_gtt_mem clear the correct pointer (bsc#1232282).\n- CVE-2024-49993: iommu/vt-d: Fix potential lockup if qi_submit_sync called with 0 count (bsc#1232316).\n- CVE-2024-49995: tipc: guard against string buffer overrun (bsc#1232432).\n- CVE-2024-49996: cifs: Fix buffer overflow when parsing NFS reparse points (bsc#1232089).\n- CVE-2024-50000: net/mlx5e: Fix NULL deref in mlx5e_tir_builder_alloc() (bsc#1232085).\n- CVE-2024-50001: net/mlx5: Fix error path in multi-packet WQE transmit (bsc#1232084).\n- CVE-2024-50002: static_call: Handle module init failure correctly in static_call_del_module() (bsc#1232083).\n- CVE-2024-50003: drm/amd/display: Fix system hang while resume with TBT monitor (bsc#1232385).\n- CVE-2024-50004: drm/amd/display: update DML2 policy EnhancedPrefetchScheduleAccelerationFinal DCN35 (bsc#1232396).\n- CVE-2024-50006: ext4: fix i_data_sem unlock order in ext4_ind_migrate() (bsc#1232442).\n- CVE-2024-50009: cpufreq: amd-pstate: add check for cpufreq_cpu_get's return value (bsc#1232318).\n- CVE-2024-50012: cpufreq: Avoid a bad reference count on CPU node (bsc#1232386).\n- CVE-2024-50014: ext4: fix access to uninitialised lock in fc replay path (bsc#1232446).\n- CVE-2024-50015: ext4: dax: fix overflowing extents beyond inode size when partially writing (bsc#1232079).\n- CVE-2024-50020: ice: Fix improper handling of refcount in ice_sriov_set_msix_vec_count() (bsc#1231989).\n- CVE-2024-50021: ice: Fix improper handling of refcount in ice_dpll_init_rclk_pins() (bsc#1231957).\n- CVE-2024-50022: device-dax: correct pgoff align in dax_set_mapping() (bsc#1231956).\n- CVE-2024-50024: net: Fix an unsafe loop on the list (bsc#1231954).\n- CVE-2024-50027: thermal: core: Free tzp copy along with the thermal zone (bsc#1231951).\n- CVE-2024-50028: thermal: core: Reference count the zone in thermal_zone_get_by_id() (bsc#1231950).\n- CVE-2024-50033: slip: make slhc_remember() more robust against malicious packets (bsc#1231914).\n- CVE-2024-50035: ppp: fix ppp_async_encode() illegal access (bsc#1232392).\n- CVE-2024-50040: igb: Do not bring the device up after non-fatal error (bsc#1231908).\n- CVE-2024-50041: i40e: Fix macvlan leak by synchronizing access to mac_filter_hash (bsc#1231907).\n- CVE-2024-50042: ice: Fix increasing MSI-X on VF (bsc#1231906).\n- CVE-2024-50045: netfilter: br_netfilter: fix panic with metadata_dst skb (bsc#1231903).\n- CVE-2024-50046: NFSv4: Prevent NULL-pointer dereference in nfs42_complete_copies() (bsc#1231902).\n- CVE-2024-50047: smb: client: fix UAF in async decryption (bsc#1232418).\n- CVE-2024-50059: ntb: ntb_hw_switchtec: Fix use after free vulnerability in switchtec_ntb_remove due to race condition (bsc#1232345).\n- CVE-2024-50060: io_uring: check if we need to reschedule during overflow flush (bsc#1232417).\n- CVE-2024-50063: bpf: Prevent tail call between progs attached to different hooks (bsc#1232435).\n- CVE-2024-50064: zram: free secondary algorithms names (bsc#1231901).\n- CVE-2024-50080: ublk: do not allow user copy for unprivileged device (bsc#1232502).\n- CVE-2024-50081: blk-mq: setup queue ->tag_set before initializing hctx (bsc#1232501).\n- CVE-2024-50082: blk-rq-qos: fix crash on rq_qos_wait vs. rq_qos_wake_function race (bsc#1232500).\n- CVE-2024-50084: net: microchip: vcap api: Fix memory leaks in vcap_api_encode_rule_test() (bsc#1232494).\n- CVE-2024-50087: btrfs: fix uninitialized pointer free on read_alloc_one_name() error (bsc#1232499).\n- CVE-2024-50088: btrfs: fix uninitialized pointer free in add_inode_ref() (bsc#1232498).\n- CVE-2024-50098: scsi: ufs: core: Set SDEV_OFFLINE when UFS is shut down (bsc#1232881).\n- CVE-2024-50110: xfrm: fix one more kernel-infoleak in algo dumping (bsc#1232885).\n- CVE-2024-50115: KVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from memory (bsc#1232919).\n- CVE-2024-50124: Bluetooth: ISO: Fix UAF on iso_sock_timeout (bsc#1232926).\n- CVE-2024-50125: Bluetooth: SCO: Fix UAF on sco_sock_timeout (bsc#1232928).\n- CVE-2024-50127: net: sched: fix use-after-free in taprio_change() (bsc#1232907).\n- CVE-2024-50128: net: wwan: fix global oob in wwan_rtnl_policy (bsc#1232905).\n- CVE-2024-50130: netfilter: bpf: must hold reference on net namespace (bsc#1232894).\n- CVE-2024-50138: bpf: Use raw_spinlock_t in ringbuf (bsc#1232935).\n- CVE-2024-50139: KVM: arm64: Fix shift-out-of-bounds bug (bsc#1233062).\n- CVE-2024-50145: octeon_ep: add SKB allocation failures handling in __octep_oq_process_rx() (bsc#1233044).\n- CVE-2024-50153: scsi: target: core: Fix null-ptr-deref in target_alloc_device() (bsc#1233061).\n- CVE-2024-50154: tcp/dccp: Do not use timer_pending() in reqsk_queue_unlink() (bsc#1233070).\n- CVE-2024-50166: fsl/fman: Fix refcount handling of fman-related devices (bsc#1233050).\n- CVE-2024-50167: be2net: fix potential memory leak in be_xmit() (bsc#1233049).\n- CVE-2024-50169: vsock: Update rx_bytes on read_skb() (bsc#1233320).\n- CVE-2024-50171: net: systemport: fix potential memory leak in bcm_sysport_xmit() (bsc#1233057).\n- CVE-2024-50177: drm/amd/display: fix a UBSAN warning in DML2.1 (bsc#1233115).\n- CVE-2024-50182: secretmem: disable memfd_secret() if arch cannot set direct map (bsc#1233129).\n- CVE-2024-50184: virtio_pmem: Check device status before requesting flush (bsc#1233135).\n- CVE-2024-50186: net: explicitly clear the sk pointer, when pf->create fails (bsc#1233110).\n- CVE-2024-50192: irqchip/gic-v4: Do not allow a VMOVP on a dying VPE (bsc#1233106).\n- CVE-2024-50195: posix-clock: Fix missing timespec64 check in pc_clock_settime() (bsc#1233103).\n- CVE-2024-50225: btrfs: fix error propagation of split bios (bsc#1233193).\n- CVE-2024-50230: nilfs2: fix kernel bug due to missing clearing of checked flag (bsc#1233206).\n- CVE-2024-50245: fs/ntfs3: Fix possible deadlock in mi_read (bsc#1233203).\n- CVE-2024-50246: fs/ntfs3: Add rough attr alloc_size check (bsc#1233207).\n- CVE-2024-50250: fsdax: dax_unshare_iter needs to copy entire blocks (bsc#1233226).\n- CVE-2024-50252: mlxsw: spectrum_ipip: Fix memory leak when changing remote IPv6 address (bsc#1233201).\n- CVE-2024-50257: netfilter: Fix use-after-free in get_info() (bsc#1233244).\n- CVE-2024-50261: macsec: Fix use-after-free while sending the offloading packet (bsc#1233253).\n- CVE-2024-50264: vsock/virtio: Initialization of the dangling pointer occurring in vsk->trans (bsc#1233453).\n- CVE-2024-50271: signal: restore the override_rlimit logic (bsc#1233460).\n- CVE-2024-50273: btrfs: reinitialize delayed ref list after deleting it from the list (bsc#1233462).\n- CVE-2024-50274: idpf: avoid vport access in idpf_get_link_ksettings (bsc#1233463).\n- CVE-2024-50275: arm64/sve: Discard stale CPU state when handling SVE traps (bsc#1233464).\n- CVE-2024-50276: net: vertexcom: mse102x: Fix possible double free of TX skb (bsc#1233465).\n- CVE-2024-50279: dm cache: fix out-of-bounds access to the dirty bitset when resizing (bsc#1233468).\n- CVE-2024-50289: media: av7110: fix a spectre vulnerability (bsc#1233478).\n- CVE-2024-50295: net: arc: fix the device for dma_map_single/dma_unmap_single (bsc#1233484).\n- CVE-2024-50296: net: hns3: fix kernel crash when uninstalling driver (bsc#1233485).\n- CVE-2024-50298: net: enetc: allocate vf_state during PF probes (bsc#1233487).\n- CVE-2024-53042: ipv4: ip_tunnel: Fix suspicious RCU usage warning in ip_tunnel_init_flow() (bsc#1233540).\n- CVE-2024-53043: mctp i2c: handle NULL header address (bsc#1233523).\n- CVE-2024-53048: ice: fix crash on probe for DPLL enabled E810 LOM (bsc#1233721).\n- CVE-2024-53051: drm/i915/hdcp: Add encoder check in intel_hdcp_get_capability (bsc#1233547).\n- CVE-2024-53055: wifi: iwlwifi: mvm: fix 6 GHz scan construction (bsc#1233550).\n- CVE-2024-53056: drm/mediatek: Fix potential NULL dereference in mtk_crtc_destroy() (bsc#1233568).\n- CVE-2024-53058: net: stmmac: TSO: Fix unbalanced DMA map/unmap for non-paged SKB data (bsc#1233552).\n- CVE-2024-53079: mm/thp: fix deferred split unqueue naming and locking (bsc#1233570).\n- CVE-2024-53082: virtio_net: Add hash_key_length check (bsc#1233573).\n- CVE-2024-53110: vp_vdpa: fix id_table array not null terminated error (bsc#1234085).\n- CVE-2024-53121: net/mlx5: fs, lock FTE when checking if active (bsc#1234078).\n- CVE-2024-53138: net/mlx5e: kTLS, Fix incorrect page refcounting (bsc#1234223).\n\nThe following non-security bugs were fixed:\n\n- 9p: explicitly deny setlease attempts (git-fixes).\n- ACPI: CPPC: Add support for setting EPP register in FFH (stable-fixes).\n- ACPI: CPPC: Fix _CPC register setting issue (git-fixes).\n- ACPI: CPPC: Make rmw_lock a raw_spin_lock (git-fixes).\n- ACPI: EC: Do not release locks during operation region accesses (stable-fixes).\n- ACPI: PAD: fix crash in exit_round_robin() (stable-fixes).\n- ACPI: PRM: Clean up guid type in struct prm_handler_info (git-fixes).\n- ACPI: PRM: Find EFI_MEMORY_RUNTIME block for PRM handler and context (git-fixes).\n- ACPI: battery: Fix possible crash when unregistering a battery hook (git-fixes).\n- ACPI: battery: Simplify battery hook locking (stable-fixes).\n- ACPI: button: Add DMI quirk for Samsung Galaxy Book2 to fix initial lid detection issue (stable-fixes).\n- ACPI: resource: Add Asus ExpertBook B2502CVA to irq1_level_low_skip_override[] (stable-fixes).\n- ACPI: resource: Add Asus Vivobook X1704VAP to irq1_level_low_skip_override[] (stable-fixes).\n- ACPI: resource: Add LG 16T90SP to irq1_level_low_skip_override[] (stable-fixes).\n- ACPI: resource: Add another DMI match for the TongFang GMxXGxx (stable-fixes).\n- ACPI: video: Add force_vendor quirk for Panasonic Toughbook CF-18 (stable-fixes).\n- ACPICA: Fix memory leak if acpi_ps_get_next_field() fails (stable-fixes).\n- ACPICA: Fix memory leak if acpi_ps_get_next_namepath() fails (stable-fixes).\n- ACPICA: check null return of ACPI_ALLOCATE_ZEROED() in acpi_db_convert_to_package() (stable-fixes).\n- ACPICA: iasl: handle empty connection_node (stable-fixes).\n- ALSA/hda: intel-sdw-acpi: cleanup sdw_intel_scan_controller (stable-fixes).\n- ALSA/hda: intel-sdw-acpi: fetch fwnode once in sdw_intel_scan_controller() (stable-fixes).\n- ALSA/hda: intel-sdw-acpi: simplify sdw-master-count property read (stable-fixes).\n- ALSA: 6fire: Release resources at card release (git-fixes).\n- ALSA: Reorganize kerneldoc parameter names (stable-fixes).\n- ALSA: ac97: bus: Fix the mistake in the comment (git-fixes).\n- ALSA: asihpi: Fix potential OOB array access (stable-fixes).\n- ALSA: caiaq: Use snd_card_free_when_closed() at disconnection (git-fixes).\n- ALSA: core: add isascii() check to card ID generator (stable-fixes).\n- ALSA: firewire-lib: Avoid division by zero in apply_constraint_to_size() (git-fixes).\n- ALSA: firewire-lib: fix return value on fail in amdtp_tscm_init() (git-fixes).\n- ALSA: hda/conexant - Fix audio routing for HP EliteOne 1000 G2 (stable-fixes).\n- ALSA: hda/conexant - Use cached pin control for Node 0x1d on HP EliteOne 1000 G2 (git-fixes).\n- ALSA: hda/conexant: Fix conflicting quirk for System76 Pangolin (git-fixes).\n- ALSA: hda/conexant: fix Z60MR100 startup pop issue (stable-fixes).\n- ALSA: hda/conexant: fix some typos (stable-fixes).\n- ALSA: hda/cs8409: Fix possible NULL dereference (git-fixes).\n- ALSA: hda/generic: Unconditionally prefer preferred_dacs pairs (bsc#1219803).\n- ALSA: hda/realtek - Fixed Clevo platform headset Mic issue (stable-fixes).\n- ALSA: hda/realtek - update set GPIO3 to default for Thinkpad with ALC1318 (git-fixes).\n- ALSA: hda/realtek: Add a quirk for HP Pavilion 15z-ec200 (stable-fixes).\n- ALSA: hda/realtek: Add quirk for Huawei MateBook 13 KLV-WX9 (stable-fixes).\n- ALSA: hda/realtek: Add subwoofer quirk for Acer Predator G9-593 (stable-fixes).\n- ALSA: hda/realtek: Add subwoofer quirk for Infinix ZERO BOOK 13 (stable-fixes).\n- ALSA: hda/realtek: Add support for Samsung Galaxy Book3 360 (NP730QFG) (stable-fixes).\n- ALSA: hda/realtek: Apply quirk for Medion E15433 (bsc#1233298).\n- ALSA: hda/realtek: Enable mic on Vaio VJFH52 (stable-fixes).\n- ALSA: hda/realtek: Enable mute and micmute LED on HP ProBook 430 G8 (stable-fixes).\n- ALSA: hda/realtek: Enable speaker pins for Medion E15443 platform (bsc#1233298).\n- ALSA: hda/realtek: Fix Internal Speaker and Mic boost of Infinix Y4 Max (bsc#1233298).\n- ALSA: hda/realtek: Fix headset mic on TUXEDO Gemini 17 Gen3 (stable-fixes).\n- ALSA: hda/realtek: Fix headset mic on TUXEDO Stellaris 16 Gen6 mb1 (stable-fixes).\n- ALSA: hda/realtek: Fix the push button function for the ALC257 (git-fixes).\n- ALSA: hda/realtek: Limit internal Mic boost on Dell platform (stable-fixes).\n- ALSA: hda/realtek: Refactor and simplify Samsung Galaxy Book init (stable-fixes).\n- ALSA: hda/realtek: Set PCBeep to default value for ALC274 (stable-fixes).\n- ALSA: hda/realtek: Update ALC225 depop procedure (git-fixes).\n- ALSA: hda/realtek: Update ALC256 depop procedure (git-fixes).\n- ALSA: hda/realtek: Update default depop procedure (git-fixes).\n- ALSA: hda/realtek: fix mute/micmute LED for HP mt645 G8 (stable-fixes).\n- ALSA: hda/realtek: fix mute/micmute LEDs for a HP EliteBook 645 G10 (stable-fixes).\n- ALSA: hda/realtek: tas2781: Fix ROG ALLY X audio (stable-fixes).\n- ALSA: hda/tas2781: Add new quirk for Lenovo Y990 Laptop (stable-fixes).\n- ALSA: hda/tas2781: Add new quirk for Lenovo, ASUS, Dell projects (stable-fixes).\n- ALSA: hda/tas2781: select CRC32 instead of CRC32_SARWATE (git-fixes).\n- ALSA: hda: Poll jack events for LS7A HD-Audio (stable-fixes).\n- ALSA: hda: Show the codec quirk info at probing (stable-fixes).\n- ALSA: hda: Sound support for HP Spectre x360 16 inch model 2024 (stable-fixes).\n- ALSA: hda: tas2781: Fix missing setup at runtime PM (bsc#1230132).\n- ALSA: hdsp: Break infinite MIDI input flush loop (stable-fixes).\n- ALSA: ice1712: Remove redundant code in stac9460_dac_vol_put (stable-fixes).\n- ALSA: line6: add hw monitor volume control to POD HD500X (stable-fixes).\n- ALSA: line6: update contact information (stable-fixes).\n- ALSA: mixer_oss: Remove some incorrect kfree_const() usages (git-fixes).\n- ALSA: pcm: Add sanity NULL check for the default mmap fault handler (stable-fixes).\n- ALSA: silence integer wrapping warning (stable-fixes).\n- ALSA: ump: Fix evaluation of MIDI 1.0 FB info (git-fixes).\n- ALSA: us122l: Use snd_card_free_when_closed() at disconnection (git-fixes).\n- ALSA: usb-audio: Add Pioneer DJ/AlphaTheta DJM-A9 Mixer (stable-fixes).\n- ALSA: usb-audio: Add delay quirk for VIVO USB-C HEADSET (stable-fixes).\n- ALSA: usb-audio: Add input value sanity checks for standard types (stable-fixes).\n- ALSA: usb-audio: Add logitech Audio profile quirk (stable-fixes).\n- ALSA: usb-audio: Add native DSD support for Luxman D-08u (stable-fixes).\n- ALSA: usb-audio: Add quirk for HP 320 FHD Webcam (bsc#1232768).\n- ALSA: usb-audio: Add quirks for Dell WD19 dock (stable-fixes).\n- ALSA: usb-audio: Define macros for quirk table entries (stable-fixes).\n- ALSA: usb-audio: Fix Yamaha P-125 Quirk Entry (stable-fixes).\n- ALSA: usb-audio: Fix a DMA to stack memory bug (git-fixes).\n- ALSA: usb-audio: Fix out of bounds reads when finding clock sources (stable-fixes).\n- ALSA: usb-audio: Fix potential out-of-bound accesses for Extigy and Mbox devices (git-fixes).\n- ALSA: usb-audio: Make mic volume workarounds globally applicable (stable-fixes).\n- ALSA: usb-audio: Replace complex quirk lines with macros (stable-fixes).\n- ALSA: usb-audio: Use snprintf instead of sprintf in build_mixer_unit_ctl (stable-fixes).\n- ALSA: usb-audio: add mixer mapping for Corsair HS80 (stable-fixes).\n- ALSA: usx2y: Use snd_card_free_when_closed() at disconnection (git-fixes).\n- ASoC: Intel: avs: da7219: Remove suspend_pre() and resume_post() (stable-fixes).\n- ASoC: Intel: bytcr_rt5640: Add DMI quirk for Vexia Edu Atla 10 tablet (stable-fixes).\n- ASoC: Intel: bytcr_rt5640: Add support for non ACPI instantiated codec (stable-fixes).\n- ASoC: Intel: sst: Fix used of uninitialized ctx to log an error (git-fixes).\n- ASoC: Intel: sst: Support LPE0F28 ACPI HID (stable-fixes).\n- ASoC: SOF: Add i2s bt dai configuration support for AMD platforms (bsc#1233305).\n- ASoC: SOF: Add support for configuring PDM interface from topology (bsc#1233305).\n- ASoC: SOF: Deprecate invalid enums in IPC3 (bsc#1233305).\n- ASoC: SOF: IPC4: get pipeline priority from topology (bsc#1233305).\n- ASoC: SOF: IPC4: synchronize fw_config_params with fw definitions (bsc#1233305).\n- ASoC: SOF: Refactor sof_i2s_tokens reading to update acpbt dai (bsc#1233305).\n- ASoC: SOF: Rename amd_bt sof_dai_type (bsc#1233305).\n- ASoC: SOF: Wire up buffer flags (bsc#1233305).\n- ASoC: SOF: add alignment for topology header file struct definition (bsc#1233305).\n- ASoC: SOF: align topology header file with sof topology header (bsc#1233305).\n- ASoC: SOF: ipc3-topology: Convert the topology pin index to ALH dai index (git-fixes).\n- ASoC: SOF: ipc3-topology: fix resource leaks in sof_ipc3_widget_setup_comp_dai() (git-fixes).\n- ASoC: SOF: ipc4-control: Add support for ALSA enum control (bsc#1233305).\n- ASoC: SOF: ipc4-control: Add support for ALSA switch control (bsc#1233305).\n- ASoC: SOF: ipc4-mtrace: move debug slot related definitions to header.h (bsc#1233305).\n- ASoC: SOF: ipc4-topology: Add deep buffer size to debug prints (bsc#1233305).\n- ASoC: SOF: ipc4-topology: Add definition for generic switch/enum control (bsc#1233305).\n- ASoC: SOF: ipc4-topology: Add module ID print during module set up (bsc#1233305).\n- ASoC: SOF: ipc4-topology: Helper to find an swidget by module/instance id (bsc#1233305).\n- ASoC: SOF: ipc4-topology: Only handle dai_config with HW_PARAMS for ChainDMA (bsc#1233305).\n- ASoC: SOF: ipc4-topology: change chain_dma handling in dai_config (bsc#1233305).\n- ASoC: SOF: ipc4-topology: export sof_ipc4_copier_is_single_format (bsc#1233305).\n- ASoC: SOF: ipc4-topology: set config_length based on device_count (bsc#1233305).\n- ASoC: SOF: ipc4: Add data struct for module notification message from firmware (bsc#1233305).\n- ASoC: SOF: ipc4: Add new message type: SOF_IPC4_GLB_LOAD_LIBRARY_PREPARE (bsc#1233305).\n- ASoC: SOF: sof-client-probes-ipc4: Set param_size extension bits (git-fixes).\n- ASoC: SOF: topology: Parse DAI type token for dspless mode (bsc#1233305).\n- ASoC: SOF: topology: dynamically allocate and store DAI widget->private (bsc#1233305).\n- ASoC: amd: yc: Add quirk for ASUS Vivobook S15 M3502RA (stable-fixes).\n- ASoC: amd: yc: Add quirk for HP Dragonfly pro one (stable-fixes).\n- ASoC: amd: yc: Fix for enabling DMIC on acp6x via _DSD entry (git-fixes).\n- ASoC: amd: yc: Fix non-functional mic on ASUS E1404FA (stable-fixes).\n- ASoC: amd: yc: Support dmic on another model of Lenovo Thinkpad E14 Gen 6 (stable-fixes).\n- ASoC: amd: yc: fix internal mic on Xiaomi Book Pro 14 2022 (stable-fixes).\n- ASoC: atmel: mchp-pdmc: Skip ALSA restoration if substream runtime is uninitialized (git-fixes).\n- ASoC: audio-graph-card2: Purge absent supplies for device tree nodes (stable-fixes).\n- ASoC: codecs: Fix atomicity violation in snd_soc_component_get_drvdata() (git-fixes).\n- ASoC: codecs: lpass-rx-macro: add missing CDC_RX_BCL_VBAT_RF_PROC2 to default regs values (stable-fixes).\n- ASoC: codecs: rt5640: Always disable IRQs from rt5640_cancel_work() (stable-fixes).\n- ASoC: codecs: wsa883x: Handle reading version failure (stable-fixes).\n- ASoC: cs42l51: Fix some error handling paths in cs42l51_probe() (git-fixes).\n- ASoC: dapm: fix bounds checker error in dapm_widget_list_create (git-fixes).\n- ASoC: fsl_micfil: Add sample rate constraint (stable-fixes).\n- ASoC: fsl_micfil: fix regmap_write_bits usage (git-fixes).\n- ASoC: fsl_sai: Enable 'FIFO continue on error' FCONT bit (stable-fixes).\n- ASoC: imx-card: Set card.owner to avoid a warning calltrace if SND=m (git-fixes).\n- ASoC: max98388: Fix missing increment of variable slot_found (git-fixes).\n- ASoC: mediatek: mt8188-mt6359: Remove hardcoded dmic codec (git-fixes).\n- ASoC: qcom: Fix NULL Dereference in asoc_qcom_lpass_cpu_platform_probe() (git-fixes).\n- ASoC: qcom: sm8250: add qrb4210-rb2-sndcard compatible string (stable-fixes).\n- ASoC: rt722-sdca: Remove logically deadcode in rt722-sdca.c (git-fixes).\n- ASoC: rt722-sdca: increase clk_stop_timeout to fix clock stop issue (stable-fixes).\n- ASoC: stm32: spdifrx: fix dma channel release in stm32_spdifrx_remove (git-fixes).\n- ASoC: stm: Prevent potential division by zero in stm32_sai_get_clk_div() (stable-fixes).\n- ASoC: stm: Prevent potential division by zero in stm32_sai_mclk_round_rate() (stable-fixes).\n- ASoC: tas2781: Add new driver version for tas2563 & tas2781 qfn chip (stable-fixes).\n- ASoC: tas2781: Use of_property_read_reg() (stable-fixes).\n- Bluetooth: Call iso_exit() on module unload (git-fixes).\n- Bluetooth: ISO: Fix multiple init when debugfs is disabled (git-fixes).\n- Bluetooth: MGMT: Fix slab-use-after-free Read in set_powered_sync (git-fixes).\n- Bluetooth: RFCOMM: FIX possible deadlock in rfcomm_sk_state_change (git-fixes).\n- Bluetooth: Remove debugfs directory on module init failure (git-fixes).\n- Bluetooth: bnep: fix wild-memory-access in proto_unregister (git-fixes).\n- Bluetooth: btintel: Direct exception event to bluetooth stack (git-fixes).\n- Bluetooth: btmrvl: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).\n- Bluetooth: btnxpuart: Resolve TX timeout error in power save stress test (bsc#1230557)\n- Bluetooth: btusb: Add Realtek RTL8852C support ID 0x0489:0xe122 (stable-fixes).\n- Bluetooth: btusb: Fix regression with fake CSR controllers 0a12:0001 (git-fixes).\n- Bluetooth: fix use-after-free in device_for_each_child() (git-fixes).\n- Bluetooth: hci: fix null-ptr-deref in hci_read_supported_codecs (git-fixes).\n- Bluetooth: hci_core: Fix calling mgmt_device_connected (git-fixes).\n- Bluetooth: hci_event: Align BR/EDR JUST_WORKS paring with LE (git-fixes).\n- HID: Ignore battery for all ELAN I2C-HID devices (stable-fixes).\n- HID: amd_sfh: Switch to device-managed dmam_alloc_coherent() (git-fixes).\n- HID: core: zero-initialize the report buffer (git-fixes).\n- HID: i2c-hid: Remove I2C_HID_QUIRK_SET_PWR_WAKEUP_DEV quirk (stable-fixes).\n- HID: lenovo: Add support for Thinkpad X1 Tablet Gen 3 keyboard (stable-fixes).\n- HID: multitouch: Add quirk for HONOR MagicBook Art 14 touchpad (stable-fixes).\n- HID: multitouch: Add quirk for Logitech Bolt receiver w/ Casa touchpad (stable-fixes).\n- HID: multitouch: Add support for B2402FVA track point (stable-fixes).\n- HID: multitouch: Add support for Thinkpad X12 Gen 2 Kbd Portfolio (stable-fixes).\n- HID: multitouch: Add support for lenovo Y9000P Touchpad (stable-fixes).\n- HID: plantronics: Workaround for an unexcepted opposite volume key (stable-fixes).\n- HID: wacom: Interpret tilt data from Intuos Pro BT as signed values (git-fixes).\n- HID: wacom: fix when get product name maybe null pointer (git-fixes).\n- Input: adp5589-keys - fix NULL pointer dereference (git-fixes).\n- Input: adp5589-keys - fix adp5589_gpio_get_value() (git-fixes).\n- Input: edt-ft5x06 - fix regmap leak when probe fails (git-fixes).\n- Input: hideep - add missing dependency on REGMAP_I2C (git-fixes).\n- Input: hycon-hy46xx - add missing dependency on REGMAP_I2C (git-fixes).\n- Input: i8042 - add TUXEDO Stellaris 15 Slim Gen6 AMD to i8042 quirk table (stable-fixes).\n- Input: i8042 - add TUXEDO Stellaris 16 Gen5 AMD to i8042 quirk table (stable-fixes).\n- Input: i8042 - add another board name for TUXEDO Stellaris Gen5 AMD line (stable-fixes).\n- Input: xpad - add GameSir T4 Kaleid Controller support (git-fixes).\n- Input: xpad - add GameSir VID for Xbox One controllers (git-fixes).\n- Input: xpad - add support for 8BitDo Ultimate 2C Wireless Controller (git-fixes).\n- Input: xpad - add support for MSI Claw A1M (git-fixes).\n- Input: xpad - add support for Machenike G5 Pro Controller (git-fixes).\n- Input: xpad - fix support for some third-party controllers (git-fixes).\n- Input: xpad - sort xpad_device by vendor and product ID (git-fixes).\n- Input: xpad - spelling fixes for 'Xbox' (git-fixes).\n- KVM: Fix coalesced_mmio_has_room() to avoid premature userspace exit (git-fixes).\n- KVM: PPC: Book3S HV: Avoid returning to nested hypervisor on pending doorbells (bsc#1215199).\n- KVM: PPC: Book3S HV: Stop using vc->dpdes for nested KVM guests (bsc#1215199).\n- KVM: PPC: Book3S HV: remove unused varible (bsc#1194869).\n- KVM: SEV-ES: Fix svm_get_msr()/svm_set_msr() for KVM_SEV_ES_INIT guests (bsc#1232207).\n- KVM: SEV-ES: Prevent MSR access post VMSA encryption (bsc#1232207).\n- KVM: SVM: Disallow guest from changing userspace's MSR_AMD64_DE_CFG value (git-fixes).\n- KVM: Use dedicated mutex to protect kvm_usage_count to avoid deadlock (git-fixes).\n- KVM: VMX: Also clear SGX EDECCSSA in KVM CPU caps when SGX is disabled (git-fixes).\n- KVM: VMX: Set PFERR_GUEST_{FINAL,PAGE}_MASK if and only if the GVA is valid (git-fixes).\n- KVM: Write the per-page 'segment' when clearing (part of) a guest page (git-fixes).\n- KVM: s390: Change virtual to physical address access in diag 0x258 handler (git-fixes bsc#1232626).\n- KVM: s390: Fix SORTL and DFLTCC instruction format error in __insn32_query (git-fixes bsc#1231276).\n- KVM: s390: gaccess: Check if guest address is in memslot (git-fixes bsc#1232623).\n- KVM: x86/mmu: Skip emulation on page fault iff 1+ SPs were unprotected (git-fixes).\n- KVM: x86/mmu: Trigger unprotect logic only on write-protection page faults (git-fixes).\n- KVM: x86: Dedup fastpath MSR post-handling logic (git-fixes).\n- KVM: x86: Enforce x2APIC's must-be-zero reserved ICR bits (git-fixes).\n- KVM: x86: Exit to userspace if fastpath triggers one on instruction skip (git-fixes).\n- KVM: x86: Move x2APIC ICR helper above kvm_apic_write_nodecode() (git-fixes).\n- KVM: x86: Re-enter guest if WRMSR(X2APIC_ICR) fastpath is successful (git-fixes).\n- KVM: x86: Re-split x2APIC ICR into ICR+ICR2 for AMD (x2AVIC) (git-fixes).\n- NFS: Avoid unnecessary rescanning of the per-server delegation list (git-fixes).\n- NFS: remove revoked delegation from server's delegation list (git-fixes).\n- NFSD: Fix NFSv4's PUTPUBFH operation (git-fixes).\n- NFSD: Mark filecache 'down' if init fails (git-fixes).\n- NFSv3: only use NFS timeout for MOUNT when protocols are compatible (bsc#1231016).\n- NFSv4: Fix clearing of layout segments in layoutreturn (git-fixes).\n- PCI: Add ACS quirk for Qualcomm SA8775P (stable-fixes).\n- PCI: Add T_PVPERL macro (git-fixes).\n- PCI: Add function 0 DMA alias quirk for Glenfly Arise chip (stable-fixes).\n- PCI: Fix pci_enable_acs() support for the ACS quirks (bsc#1229019).\n- PCI: Fix reset_method_store() memory leak (git-fixes).\n- PCI: Mark Creative Labs EMU20k2 INTx masking as broken (stable-fixes).\n- PCI: endpoint: Clear secondary (not primary) EPC in pci_epc_remove_epf() (git-fixes).\n- PCI: j721e: Deassert PERST# after a delay of PCIE_T_PVPERL_MS milliseconds (git-fixes).\n- PCI: keystone: Add link up check to ks_pcie_other_map_bus() (git-fixes).\n- PCI: keystone: Set mode as Root Complex for 'ti,keystone-pcie' compatible (git-fixes).\n- PCI: rockchip-ep: Fix address translation unit programming (git-fixes).\n- RAS/AMD/ATL: Add amd_atl pr_fmt() prefix (jsc#PED-10559).\n- RAS/AMD/ATL: Expand helpers for adding and removing base and hole (jsc#PED-10559).\n- RAS/AMD/ATL: Implement DF 4.5 NP2 denormalization (jsc#PED-10559).\n- RAS/AMD/ATL: Read DRAM hole base early (jsc#PED-10559).\n- RAS/AMD/ATL: Validate address map when information is gathered (jsc#PED-10559).\n- RDMA/bnxt_re: Add a check for memory allocation (git-fixes)\n- RDMA/bnxt_re: Avoid CPU lockups due fifo occupancy check loop (git-fixes)\n- RDMA/bnxt_re: Change the sequence of updating the CQ toggle value (git-fixes)\n- RDMA/bnxt_re: Check cqe flags to know imm_data vs inv_irkey (git-fixes)\n- RDMA/bnxt_re: Fix a bug while setting up Level-2 PBL pages (git-fixes)\n- RDMA/bnxt_re: Fix a possible memory leak (git-fixes)\n- RDMA/bnxt_re: Fix incorrect AVID type in WQE structure (git-fixes)\n- RDMA/bnxt_re: Fix incorrect dereference of srq in async event (git-fixes)\n- RDMA/bnxt_re: Fix out of bound check (git-fixes)\n- RDMA/bnxt_re: Fix the GID table length (git-fixes)\n- RDMA/bnxt_re: Fix the max CQ WQEs for older adapters (git-fixes)\n- RDMA/bnxt_re: Fix the usage of control path spin locks (git-fixes)\n- RDMA/bnxt_re: Return more meaningful error (git-fixes)\n- RDMA/bnxt_re: synchronize the qp-handle table array (git-fixes)\n- RDMA/core: Fix ENODEV error for iWARP test over vlan (git-fixes)\n- RDMA/cxgb4: Dump vendor specific QP details (git-fixes)\n- RDMA/cxgb4: Fix RDMA_CM_EVENT_UNREACHABLE error for iWARP (git-fixes)\n- RDMA/hns: Add mutex_destroy() (git-fixes)\n- RDMA/hns: Disassociate mmap pages for all uctx when HW is being reset (git-fixes)\n- RDMA/hns: Fix NULL pointer derefernce in hns_roce_map_mr_sg() (git-fixes)\n- RDMA/hns: Fix an AEQE overflow error caused by untimely update of eq_db_ci (git-fixes)\n- RDMA/hns: Fix cpu stuck caused by printings during reset (git-fixes)\n- RDMA/hns: Fix different dgids mapping to the same dip_idx (git-fixes)\n- RDMA/hns: Fix flush cqe error when racing with destroy qp (git-fixes)\n- RDMA/hns: Fix out-of-order issue of requester when setting FENCE (git-fixes)\n- RDMA/hns: Use dev_* printings in hem code instead of ibdev_* (git-fixes)\n- RDMA/hns: Use macro instead of magic number (git-fixes)\n- RDMA/irdma: Fix misspelling of 'accept*' (git-fixes)\n- RDMA/mad: Improve handling of timed out WRs of mad agent (git-fixes)\n- RDMA/mana_ib: use the correct page size for mapping user-mode doorbell page (git-fixes).\n- RDMA/mana_ib: use the correct page table index based on hardware page size (git-fixes).\n- RDMA/mlx5: Enforce umem boundaries for explicit ODP page faults (git-fixes)\n- RDMA/mlx5: Move events notifier registration to be after device registration (git-fixes)\n- RDMA/mlx5: Round max_rd_atomic/max_dest_rd_atomic up instead of down (git-fixes)\n- RDMA/mlx5: Use sq timestamp as QP timestamp when RoCE is disabled (git-fixes).\n- RDMA/rtrs-srv: Avoid null pointer deref during path establishment (git-fixes)\n- RDMA/rxe: Fix the qp flush warnings in req (git-fixes)\n- RDMA/rxe: Set queue pair cur_qp_state when being queried (git-fixes)\n- RDMA/siw: Add sendpage_ok() check to disable MSG_SPLICE_PAGES (git-fixes)\n- RDMA/srpt: Make slab cache names unique (git-fixes)\n- Revert 'ALSA: hda/conexant: Mute speakers at suspend / shutdown' (bsc#1228269).\n- Revert 'ALSA: hda: Conditionally use snooping for AMD HDMI' (stable-fixes).\n- Revert 'KEYS: encrypted: Add check for strsep' (git-fixes).\n- Revert 'KVM: PPC: Book3S HV Nested: Stop forwarding all HFUs to L1' (bsc#1215199).\n- Revert 'RDMA/core: Fix ENODEV error for iWARP test over vlan' (git-fixes)\n- Revert 'cgroup: Fix memory leak caused by missing cgroup_bpf_offline' (bsc#1234108).\n- Revert 'cpufreq: brcmstb-avs-cpufreq: Fix initial command check' (stable-fixes).\n- Revert 'driver core: Fix uevent_show() vs driver detach race' (git-fixes).\n- Revert 'ixgbe: Manual AN-37 for troublesome link partners for X550 SFI' (git-fixes).\n- Revert 'mmc: dw_mmc: Fix IDMAC operation with pages bigger than 4K' (git-fixes).\n- Revert 'ubifs: ubifs_symlink: Fix memleak of inode->i_link in error path' (git-fixes).\n- Revert 'usb: gadget: composite: fix OS descriptors w_value logic' (git-fixes).\n- Revert 'wifi: iwlwifi: remove retry loops in start' (git-fixes).\n- SUNRPC: Fix integer overflow in decode_rc_list() (git-fixes).\n- SUNRPC: Fixup gss_status tracepoint error output (git-fixes).\n- SUNRPC: Remove BUG_ON call sites (git-fixes).\n- SUNRPC: clnt.c: Remove misleading comment (git-fixes).\n- USB: appledisplay: close race between probe and completion handler (git-fixes).\n- USB: chaoskey: Fix possible deadlock chaoskey_list_lock (git-fixes).\n- USB: chaoskey: fail open after removal (git-fixes).\n- USB: gadget: dummy-hcd: Fix 'task hung' problem (git-fixes).\n- USB: misc: cypress_cy7c63: check for short transfer (git-fixes).\n- USB: misc: yurex: fix race between read and write (git-fixes).\n- USB: serial: ftdi_sio: Fix atomicity violation in get_serial_info() (git-fixes).\n- USB: serial: io_edgeport: fix use after free in debug printk (git-fixes).\n- USB: serial: option: add Fibocom FG132 0x0112 composition (stable-fixes).\n- USB: serial: option: add Quectel RG650V (stable-fixes).\n- USB: serial: option: add Telit FN920C04 MBIM compositions (stable-fixes).\n- USB: serial: option: add support for Quectel EG916Q-GL (stable-fixes).\n- USB: serial: qcserial: add support for Sierra Wireless EM86xx (stable-fixes).\n- accel/qaic: Fix the for loop used to walk SG table (git-fixes).\n- accel: Use XArray instead of IDR for minors (jsc#PED-11580).\n- acpi/arm64: Adjust error handling procedure in gtdt_parse_timer_block() (git-fixes).\n- ad7780: fix division by zero in ad7780_write_raw() (git-fixes).\n- aes-gcm-p10: Use the correct bit to test for P10 (bsc#1232704).\n- amd-pstate: Set min_perf to nominal_perf for active mode performance gov (git-fixes).\n- apparmor: fix 'Do simple duplicate message elimination' (git-fixes).\n- apparmor: test: Fix memory leak for aa_unpack_strdup() (git-fixes).\n- apparmor: use kvfree_sensitive to free data->data (git-fixes).\n- arm64: Subscribe Microsoft Azure Cobalt 100 to erratum 3194386 (git-fixes)\n- arm64: cputype: Add Neoverse-N3 definitions (git-fixes)\n- arm64: dts: allwinner: pinephone: Add mount matrix to accelerometer (git-fixes)\n- arm64: dts: freescale: imx8mm-verdin: Fix SD regulator startup delay (git-fixes)\n- arm64: dts: freescale: imx8mp-verdin: Fix SD regulator startup delay (git-fixes)\n- arm64: dts: imx8-ss-vpu: Fix imx8qm VPU IRQs (git-fixes)\n- arm64: dts: imx8qxp: Add VPU subsystem file (git-fixes)\n- arm64: dts: imx93: add nvmem property for eqos (git-fixes)\n- arm64: dts: imx93: add nvmem property for fec1 (git-fixes)\n- arm64: dts: imx93: add ocotp node (git-fixes)\n- arm64: dts: rockchip: Add DTS for FriendlyARM NanoPi R2S Plus (git-fixes)\n- arm64: dts: rockchip: Correct GPIO polarity on brcm BT nodes (git-fixes)\n- arm64: dts: rockchip: Fix LED triggers on rk3308-roc-cc (git-fixes)\n- arm64: dts: rockchip: Fix bluetooth properties on Rock960 boards (git-fixes)\n- arm64: dts: rockchip: Fix bluetooth properties on rk3566 box demo (git-fixes)\n- arm64: dts: rockchip: Fix reset-gpios property on brcm BT nodes (git-fixes)\n- arm64: dts: rockchip: Fix rt5651 compatible value on (git-fixes)\n- arm64: dts: rockchip: Fix rt5651 compatible value on rk3399-eaidk-610 (git-fixes)\n- arm64: dts: rockchip: Fix wakeup prop names on PineNote BT node (git-fixes)\n- arm64: dts: rockchip: Remove #cooling-cells from fan on Theobroma (git-fixes)\n- arm64: dts: rockchip: Remove hdmi's 2nd interrupt on rk3328 (git-fixes)\n- arm64: dts: rockchip: Remove undocumented supports-emmc property (git-fixes)\n- arm64: dts: rockchip: fix i2c2 pinctrl-names property on (git-fixes)\n- arm64: dts: rockchip: remove num-slots property from (git-fixes)\n- arm64: dts: rockchip: remove orphaned pinctrl-names from pinephone (git-fixes)\n- arm64: errata: Enable the AC03_CPU_38 workaround for ampere1a (git-fixes).\n- arm64: errata: Expand speculative SSBS workaround once more (git-fixes)\n- arm64: esr: Define ESR_ELx_EC_* constants as UL (git-fixes)\n- arm64: fix .data.rel.ro size assertion when CONFIG_LTO_CLANG (git-fixes)\n- arm64: fix selection of HAVE_DYNAMIC_FTRACE_WITH_ARGS (git-fixes).\n- arm64: probes: Fix simulate_ldr*_literal() (git-fixes)\n- arm64: probes: Fix uprobes for big-endian kernels (git-fixes)\n- arm64: probes: Remove broken LDR (literal) uprobe support (git-fixes)\n- arm64: smccc: Remove broken support for SMCCCv1.3 SVE discard hint (git-fixes)\n- arm64: smccc: replace custom COUNT_ARGS() & CONCATENATE() (git-fixes)\n- arm64: tegra: Move AGX Orin nodes to correct location (git-fixes)\n- arm64: tls: Fix context-switching of tpidrro_el0 when kpti is enabled (git-fixes)\n- ata: libata: Set DID_TIME_OUT for commands that actually timed out (git-fixes).\n- ata: libata: avoid superfluous disk spin down + spin up during hibernation (git-fixes).\n- audit: do not WARN_ON_ONCE(!current->mm) in audit_exe_compare() (git-fixes).\n- audit: do not take task_lock() in audit_exe_compare() code path (git-fixes).\n- block: print symbolic error name instead of error code (bsc#1231872).\n- block: sed-opal: add ioctl IOC_OPAL_SET_SID_PW (bsc#1229677).\n- bnxt_en: Cap the size of HWRM_PORT_PHY_QCFG forwarded response (git-fixes).\n- bnxt_en: Fix error recovery for 5760X (P7) chips (git-fixes).\n- bnxt_en: Fix the PCI-AER routines (git-fixes).\n- bnxt_en: Restore PTP tx_avail count in case of skb_pad() error (git-fixes).\n- bnxt_en: refactor reset close code (git-fixes).\n- bpf, arm64: Fix address emission with tag-based KASAN enabled (git-fixes)\n- bpf, arm64: Remove garbage frame for struct_ops trampoline (git-fixes)\n- bpf, lsm: Add disabled BPF LSM hook list (git-fixes).\n- bpf, net: Fix a potential race in do_sock_getsockopt() (git-fixes).\n- bpf, sockmap: SK_DROP on attempted redirects of unsupported af_vsock (git-fixes).\n- bpf, verifier: Correct tail_call_reachable for bpf prog (git-fixes).\n- bpf, vsock: Drop static vsock_bpf_prot initialization (git-fixes).\n- bpf, x64: Remove tail call detection (git-fixes).\n- bpf,perf: Fix perf_event_detach_bpf_prog error handling (git-fixes).\n- bpf: Fail verification for sign-extension of packet data/data_end/data_meta (git-fixes).\n- bpf: Fix bpf_strtol and bpf_strtoul helpers for 32bit (git-fixes).\n- bpf: Fix error message on kfunc arg type mismatch (git-fixes).\n- bpf: Fix helper writes to read-only maps (git-fixes).\n- bpf: Fix tailcall cases in test_bpf (git-fixes).\n- bpf: Fix truncation bug in coerce_reg_to_size_sx() (git-fixes).\n- bpf: Improve check_raw_mode_ok test for MEM_UNINIT-tagged types (git-fixes).\n- bpf: Remove truncation test in bpf_strtol and bpf_strtoul helpers (git-fixes).\n- bpf: Zero former ARG_PTR_TO_{LONG,INT} args in case of error (git-fixes).\n- bpf: correctly handle malformed BPF_CORE_TYPE_ID_LOCAL relos (git-fixes).\n- btf, scripts: rust: drop is_rust_module.sh (bsc#1230414 bsc#1229450).\n- btrfs: merge btrfs_orig_bbio_end_io() into btrfs_bio_end_io() (bsc#1233193)\n- btrfs: send: fix invalid clone operation for file that got its size decreased (git-fixes).\n- can: c_can: c_can_handle_bus_err(): update statistics if skb allocation fails (git-fixes).\n- can: c_can: fix {rx,tx}_errors statistics (git-fixes).\n- can: dev: can_set_termination(): allow sleeping GPIOs (git-fixes).\n- can: ems_usb: ems_usb_rx_err(): fix {rx,tx}_errors statistics (git-fixes).\n- can: hi311x: hi3110_can_ist(): fix potential use-after-free (git-fixes).\n- can: hi311x: hi3110_can_ist(): fix {rx,tx}_errors statistics (git-fixes).\n- can: ifi_canfd: ifi_canfd_handle_lec_err(): fix {rx,tx}_errors statistics (git-fixes).\n- can: j1939: j1939_session_new(): fix skb reference counting (git-fixes).\n- can: m_can: m_can_handle_lec_err(): fix {rx,tx}_errors statistics (git-fixes).\n- can: mcp251xfd: mcp251xfd_get_tef_len(): fix length calculation (git-fixes).\n- can: mcp251xfd: mcp251xfd_get_tef_len(): work around erratum DS80000789E 6 (git-fixes).\n- can: mcp251xfd: mcp251xfd_ring_alloc(): fix coalescing configuration when switching CAN modes (git-fixes).\n- can: netlink: avoid call to do_set_data_bittiming callback with stale can_priv::ctrlmode (stable-fixes).\n- can: sja1000: sja1000_err(): fix {rx,tx}_errors statistics (git-fixes).\n- can: sun4i_can: sun4i_can_err(): call can_change_state() even if cf is NULL (git-fixes).\n- can: sun4i_can: sun4i_can_err(): fix {rx,tx}_errors statistics (git-fixes).\n- ceph: fix cap ref leak via netfs init_request (bsc#1231384).\n- cgroup/bpf: only cgroup v2 can be attached by bpf programs (bsc#1234108).\n- clk: bcm: bcm53573: fix OF node leak in init (stable-fixes).\n- clk: clk-apple-nco: Add NULL check in applnco_probe (git-fixes).\n- clk: clk-axi-clkgen: make sure to enable the AXI bus clock (git-fixes).\n- clk: imx: Remove CLK_SET_PARENT_GATE for DRAM mux for i.MX7D (stable-fixes).\n- clk: imx: clk-scu: fix clk enable state save and restore (git-fixes).\n- clk: imx: fracn-gppll: correct PLL initialization flow (git-fixes).\n- clk: imx: fracn-gppll: fix pll power up (git-fixes).\n- clk: imx: lpcg-scu: SW workaround for errata (e10858) (git-fixes).\n- clk: qcom: clk-alpha-pll: drop lucid-evo pll enabled warning (git-fixes).\n- clk: qcom: clk-alpha-pll: fix lucid 5lpe pll enabled check (git-fixes).\n- clk: qcom: gcc-qcs404: fix initial rate of GPLL3 (git-fixes).\n- clk: renesas: rzg2l: Fix FOUTPOSTDIV clk (git-fixes).\n- clk: sunxi-ng: d1: Fix PLL_AUDIO0 preset (git-fixes).\n- comedi: Flush partial mappings in error case (git-fixes).\n- comedi: ni_routing: tools: Check when the file could not be opened (stable-fixes).\n- config: Disable LAM on x86 (bsc#1217845).\n- cpufreq/amd-pstate: Fix amd_pstate mode switch on shared memory systems (git-fixes).\n- cpufreq: CPPC: Fix possible null-ptr-deref for cppc_get_cpu_cost() (git-fixes).\n- cpufreq: CPPC: Fix possible null-ptr-deref for cpufreq_cpu_get_raw() (git-fixes).\n- cpufreq: CPPC: Fix wrong return value in cppc_get_cpu_cost() (git-fixes).\n- cpufreq: CPPC: Fix wrong return value in cppc_get_cpu_power() (git-fixes).\n- cpufreq: loongson2: Unregister platform_driver on failure (git-fixes).\n- cpufreq: mediatek-hw: Fix wrong return value in mtk_cpufreq_get_cpu_power() (git-fixes).\n- crypto: aes-gcm-p10 - Use the correct bit to test for P10 (bsc#1232704).\n- crypto: api - Fix liveliness check in crypto_alg_tested (stable-fixes).\n- crypto: bcm - add error check in the ahash_hmac_init function (git-fixes).\n- crypto: caam - Fix the pointer passed to caam_qi_shutdown() (git-fixes).\n- crypto: caam - add error check to caam_rsa_set_priv_key_form (git-fixes).\n- crypto: cavium - Fix an error handling path in cpt_ucode_load_fw() (git-fixes).\n- crypto: cavium - Fix the if condition to exit loop after timeout (git-fixes).\n- crypto: hisilicon/qm - flush all work before driver removed (bsc#1232075)\n- crypto: inside-secure - Fix the return value of safexcel_xcbcmac_cra_init() (git-fixes).\n- crypto: octeontx - Fix authenc setkey (stable-fixes).\n- crypto: octeontx* - Select CRYPTO_AUTHENC (git-fixes).\n- crypto: octeontx2 - Fix authenc setkey (stable-fixes).\n- crypto: pcrypt - Call crypto layer directly when padata_do_parallel() return -EBUSY (git-fixes).\n- crypto: powerpc/p10-aes-gcm - Add dependency on CRYPTO_SIMD and re-enable CRYPTO_AES_GCM_P10 (bsc#1230501 ltc#208632).\n- crypto: powerpc/p10-aes-gcm - Disable CRYPTO_AES_GCM_P10 (bsc#1230501 ltc#208632).\n- crypto: powerpc/p10-aes-gcm - Re-write AES/GCM stitched implementation (bsc#1230501 ltc#208632).\n- crypto: powerpc/p10-aes-gcm - Register modules as SIMD (bsc#1230501 ltc#208632).\n- crypto: qat - remove check after debugfs_create_dir() (git-fixes).\n- crypto: qat - remove faulty arbiter config reset (git-fixes).\n- crypto: qat/qat_4xxx - fix off by one in uof_get_name() (git-fixes).\n- crypto: x86/aegis128 - access 32-bit arguments as 32-bit (git-fixes).\n- cxgb4: Properly lock TX queue for the selftest (git-fixes).\n- cxgb4: add forgotten u64 ivlan cast before shift (git-fixes).\n- cxgb4: unnecessary check for 0 in the free_sge_txq_uld() function (git-fixes).\n- cxl: downgrade a warning message to debug level in cxl_probe_component_regs() (bsc#1229165).\n- dcache: keep dentry_hashtable or d_hash_shift even when not used (git-fixes).\n- debugfs: fix automount d_fsdata usage (git-fixes).\n- devlink: Fix command annotation documentation (git-fixes).\n- dma-fence: Fix reference leak on fence merge failure path (git-fixes).\n- dma-fence: Use kernel's sort for merging fences (git-fixes).\n- dmaengine: sh: rz-dmac: handle configs where one address is zero (git-fixes).\n- dmaengine: ti: k3-udma: Set EOP for all TRs in cyclic BCDMA transfer (git-fixes).\n- doc: rcu: update printed dynticks counter bits (git-fixes).\n- driver core: bus: Fix double free in driver API bus_register() (stable-fixes).\n- driver core: bus: Return -EIO instead of 0 when show/store invalid bus attribute (stable-fixes).\n- drivers: soc: xilinx: add the missing kfree in xlnx_add_cb_for_suspend() (git-fixes).\n- drm/amd/amdgpu: Fix double unlock in amdgpu_mes_add_ring (git-fixes).\n- drm/amd/display: Add HDMI DSC native YCbCr422 support (stable-fixes).\n- drm/amd/display: Add disable timeout option (bsc#1231435)\n- drm/amd/display: Adjust VSDB parser for replay feature (stable-fixes).\n- drm/amd/display: Check link_res->hpo_dp_link_enc before using it (bsc#1231944)\n- drm/amd/display: Check null pointer before dereferencing se (stable-fixes).\n- drm/amd/display: Clean up dsc blocks in accelerated mode (stable-fixes).\n- drm/amd/display: Disable PSR-SU on Parade 08-01 TCON too (stable-fixes).\n- drm/amd/display: Fix brightness level not retained over reboot (git-fixes).\n- drm/amd/display: Fix null check for pipe_ctx->plane_state in dcn20_program_pipe (git-fixes).\n- drm/amd/display: Fix null check for pipe_ctx->plane_state in hwss_setup_dpp (git-fixes).\n- drm/amd/display: Remove a redundant check in authenticated_dp (stable-fixes).\n- drm/amd/display: Revert 'Check HDCP returned status' (stable-fixes).\n- drm/amd/display: Round calculated vtotal (stable-fixes).\n- drm/amd/display: Skip to enable dsc if it has been off (stable-fixes).\n- drm/amd/display: Validate backlight caps are sane (stable-fixes).\n- drm/amd/pm: Vangogh: Fix kernel memory out of bounds write (git-fixes).\n- drm/amd: Add some missing straps from NBIO 7.11.0 (git-fixes).\n- drm/amd: Fix initialization mistake for NBIO 7.7.0 (stable-fixes).\n- drm/amd: Guard against bad data for ATIF ACPI method (git-fixes).\n- drm/amdgpu/swsmu: Only force workload setup on init (git-fixes).\n- drm/amdgpu/vcn: enable AV1 on both instances (stable-fixes).\n- drm/amdgpu: Adjust debugfs eviction and IB access permissions (stable-fixes).\n- drm/amdgpu: Adjust debugfs register access permissions (stable-fixes).\n- drm/amdgpu: Fix DPX valid mode check on GC 9.4.3 (git-fixes).\n- drm/amdgpu: Fix JPEG v4.0.3 register write (git-fixes).\n- drm/amdgpu: add missing size check in amdgpu_debugfs_gprwave_read() (stable-fixes).\n- drm/amdgpu: fix check in gmc_v9_0_get_vm_pte() (git-fixes).\n- drm/amdgpu: prevent NULL pointer dereference if ATIF is not supported (git-fixes).\n- drm/amdkfd: Accounting pdd vram_usage for svm (stable-fixes).\n- drm/amdkfd: Fix wrong usage of INIT_WORK() (git-fixes).\n- drm/bridge: anx7625: Drop EDID cache on bridge power off (git-fixes).\n- drm/bridge: it6505: Drop EDID cache on bridge power off (git-fixes).\n- drm/bridge: tc358767: Fix link properties discovery (git-fixes).\n- drm/bridge: tc358768: Fix DSI command tx (git-fixes).\n- drm/etnaviv: Request pages from DMA32 zone on addressing_limited (git-fixes).\n- drm/etnaviv: hold GPU lock across perfmon sampling (git-fixes).\n- drm/i915/gem: fix bitwise and logical AND mixup (git-fixes).\n- drm/i915/hdcp: fix connector refcounting (git-fixes).\n- drm/imx/dcss: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).\n- drm/imx/ipuv3: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).\n- drm/mediatek: Fix child node refcount handling in early exit (git-fixes).\n- drm/mediatek: Fix get efuse issue for MT8188 DPTX (git-fixes).\n- drm/mm: Mark drm_mm_interval_tree*() functions with __maybe_unused (git-fixes).\n- drm/msm/adreno: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).\n- drm/msm/dpu: cast crtc_clk calculation to u64 in _dpu_core_perf_calc_clk() (git-fixes).\n- drm/msm/dpu: check for overflow in _dpu_crtc_setup_lm_bounds() (git-fixes).\n- drm/msm/dpu: do not always program merge_3d block (git-fixes).\n- drm/msm/dpu: drop LM_3 / LM_4 on MSM8998 (git-fixes).\n- drm/msm/dpu: drop LM_3 / LM_4 on SDM845 (git-fixes).\n- drm/msm/dpu: make sure phys resources are properly initialized (git-fixes).\n- drm/msm/dpu: move CRTC resource assignment to dpu_encoder_virt_atomic_check (git-fixes).\n- drm/msm/dpu: on SDM845 move DSPP_3 to LM_5 block (git-fixes).\n- drm/msm/dsi: fix 32-bit signed integer extension in pclk_rate calculation (git-fixes).\n- drm/msm/dsi: improve/fix dsc pclk calculation (git-fixes).\n- drm/msm/gpu: Check the status of registration to PM QoS (git-fixes).\n- drm/msm: Allocate memory for disp snapshot with kvzalloc() (git-fixes).\n- drm/msm: Avoid NULL dereference in msm_disp_state_print_regs() (git-fixes).\n- drm/msm: Fix some typos in comment (git-fixes).\n- drm/nouveau/gr/gf100: Fix missing unlock in gf100_gr_chan_new() (git-fixes).\n- drm/omap: Fix locking in omap_gem_new_dmabuf() (git-fixes).\n- drm/omap: Fix possible NULL dereference (git-fixes).\n- drm/panfrost: Add missing OPP table refcnt decremental (git-fixes).\n- drm/panfrost: Remove unused id_mask from struct panfrost_model (git-fixes).\n- drm/radeon: Fix encoder->possible_clones (git-fixes).\n- drm/rockchip: vop: Fix a dereferenced before check warning (git-fixes).\n- drm/sched: Add locking to drm_sched_entity_modify_sched (git-fixes).\n- drm/sched: Always wake up correct scheduler in drm_sched_entity_push_job (git-fixes).\n- drm/sti: Add __iomem for mixer_dbg_mxn's parameter (git-fixes).\n- drm/sti: avoid potential dereference of error pointers (git-fixes).\n- drm/sti: avoid potential dereference of error pointers in sti_gdp_atomic_check (git-fixes).\n- drm/sti: avoid potential dereference of error pointers in sti_hqvdp_atomic_check (git-fixes).\n- drm/v3d: Address race-condition in MMU flush (git-fixes).\n- drm/v3d: Enable Performance Counters before clearing them (git-fixes).\n- drm/v3d: Stop the active perfmon before being destroyed (git-fixes).\n- drm/vboxvideo: Replace fake VLA at end of vbva_mouse_pointer_shape with real VLA (stable-fixes).\n- drm/vc4: Match drm_dev_enter and exit calls in vc4_hvs_atomic_flush (git-fixes).\n- drm/vc4: Match drm_dev_enter and exit calls in vc4_hvs_lut_load (git-fixes).\n- drm/vc4: Stop the active perfmon before being destroyed (git-fixes).\n- drm/vc4: hdmi: Avoid hang with debug registers when suspended (git-fixes).\n- drm/vc4: hvs: Correct logic on stopping an HVS channel (git-fixes).\n- drm/vc4: hvs: Do not write gamma luts on 2711 (git-fixes).\n- drm/vc4: hvs: Fix dlist debug not resetting the next entry pointer (git-fixes).\n- drm/vc4: hvs: Remove incorrect limit from hvs_dlist debugfs function (git-fixes).\n- drm/vkms: Drop unnecessary call to drm_crtc_cleanup() (git-fixes).\n- drm/vmwgfx: Handle surface check failure correctly (git-fixes).\n- drm/vmwgfx: Limit display layout ioctl array size to VMWGFX_NUM_DISPLAY_UNITS (stable-fixes).\n- drm: Consistently use struct drm_mode_rect for FB_DAMAGE_CLIPS (git-fixes).\n- drm: Expand max DRM device number to full MINORBITS (jsc#PED-11580).\n- drm: Use XArray instead of IDR for minors (jsc#PED-11580).\n- drm: use ATOMIC64_INIT() for atomic64_t (git-fixes).\n- drm: xlnx: zynqmp_dpsub: fix hotplug detection (git-fixes).\n- drm: zynqmp_kms: Unplug DRM device before removal (git-fixes).\n- e1000e: Fix S0ix residency on corporate systems (git-fixes).\n- e1000e: Remove Meteor Lake SMBUS workarounds (git-fixes).\n- e1000e: change I219 (19) devices to ADP (git-fixes).\n- e1000e: fix force smbus during suspend flow (git-fixes).\n- e1000e: move force SMBUS near the end of enable_ulp function (git-fixes).\n- efi/libstub: Free correct pointer on failure (git-fixes).\n- efi/libstub: fix efi_parse_options() ignoring the default command line (git-fixes).\n- efi/libstub: zboot.lds: Discard .discard sections (stable-fixes).\n- efi/memattr: Ignore table if the size is clearly bogus (bsc#1231465).\n- efistub/tpm: Use ACPI reclaim memory for event log to avoid corruption (stable-fixes).\n- eth: bnxt: fix counting packets discarded due to OOM and netpoll (git-fixes).\n- ext4: do not track ranges in fast_commit if inode has inlined data (bsc#1231635).\n- ext4: fix fast commit inode enqueueing during a full journal commit (bsc#1231636).\n- ext4: fix incorrect tid assumption in ext4_fc_mark_ineligible() (bsc#1231637).\n- ext4: fix possible tid_t sequence overflows (bsc#1231634).\n- ext4: fix slab-use-after-free in ext4_split_extent_at() (bsc#1232201)\n- ext4: fix unttached inode after power cut with orphan file feature enabled (bsc#1234009).\n- ext4: mark fc as ineligible using an handle in ext4_xattr_set() (bsc#1231640).\n- ext4: use handle to mark fc as ineligible in __track_dentry_update() (bsc#1231639).\n- f2fs: get out of a repeat loop when getting a locked data page (bsc#1234011).\n- fat: fix uninitialized variable (git-fixes).\n- fbcon: Fix a NULL pointer dereference issue in fbcon_putcs (stable-fixes).\n- fbdev: sh7760fb: Fix a possible memory leak in sh7760fb_alloc_mem() (git-fixes).\n- fbdev: sisfb: Fix strbuf array overflow (stable-fixes).\n- fgraph: Change the name of cpuhp state to 'fgraph:online' (git-fixes).\n- fgraph: Fix missing unlock in register_ftrace_graph() (git-fixes).\n- fgraph: Use CPU hotplug mechanism to initialize idle shadow stacks (git-fixes).\n- filemap: remove use of wait bookmarks (bsc#1224088).\n- firmware: arm_scmi: Fix slab-use-after-free in scmi_bus_notifier() (git-fixes).\n- firmware: arm_scmi: Fix the double free in scmi_debugfs_common_setup() (git-fixes).\n- firmware: arm_scpi: Check the DVFS OPP count returned by the firmware (git-fixes).\n- firmware: arm_sdei: Fix the input parameter of cpuhp_remove_state() (git-fixes).\n- firmware: google: Unregister driver_info on failure (git-fixes).\n- firmware_loader: Fix possible resource leak in fw_log_firmware_info() (git-fixes).\n- fs/9p: drop inodes immediately on non-.L too (git-fixes).\n- fs/9p: fix the cache always being enabled on files with qid flags (git-fixes).\n- fs/ntfs3: Add more attributes checks in mi_enum_attr() (bsc#1233207)\n- fs/ntfs3: Fixed overflow check in mi_enum_attr() (bsc#1233207)\n- fs/ntfs3: Sequential field availability check in mi_enum_attr() (bsc#1233207)\n- fs: Fix uninitialized value issue in from_kuid and from_kgid (git-fixes).\n- genirq/msi: Fix off-by-one error in msi_domain_alloc() (git-fixes).\n- goldfish: Fix unused const variable 'goldfish_pipe_acpi_match' (git-fixes).\n- gpio: aspeed: Add the flush write to ensure the write complete (git-fixes).\n- gpio: aspeed: Use devm_clk api to manage clock source (git-fixes).\n- gpio: davinci: fix lazy disable (git-fixes).\n- gpio: exar: set value when external pull-up or pull-down is present (git-fixes).\n- gpio: zevio: Add missed label initialisation (git-fixes).\n- gve: Fix XDP TX completion handling when counters overflow (git-fixes).\n- gve: Fix an edge case for TSO skb validity check (git-fixes).\n- gve: ignore nonrelevant GSO type bits when processing TSO headers (git-fixes).\n- hid: intel-ish-hid: Fix uninitialized variable 'rv' in ish_fw_xfer_direct_dma (git-fixes).\n- hv_netvsc: Fix VF namespace also in synthetic NIC NETDEV_REGISTER event (git-fixes).\n- hv_sock: Initializing vsk->trans to NULL to prevent a dangling pointer (git-fixes).\n- hwmon: (adm9240) Add missing dependency on REGMAP_I2C (git-fixes).\n- hwmon: (adt7470) Add missing dependency on REGMAP_I2C (git-fixes).\n- hwmon: (max16065) Fix alarm attributes (git-fixes).\n- hwmon: (max16065) Remove use of i2c_match_id() (stable-fixes).\n- hwmon: (mc34vr500) Add missing dependency on REGMAP_I2C (git-fixes).\n- hwmon: (nct6775) add G15CF to ASUS WMI monitoring list (stable-fixes).\n- hwmon: (nct6775-core) Fix overflows seen when writing limit attributes (git-fixes).\n- hwmon: (tmp513) Add missing dependency on REGMAP_I2C (git-fixes).\n- hwmon: (tps23861) Fix reporting of negative temperatures (git-fixes).\n- hwmon: intel-m10-bmc-hwmon: relabel Columbiaville to CVL Die Temperature (git-fixes).\n- i2c: core: Setup i2c_adapter runtime-pm before calling device_add() (git-fixes).\n- i2c: core: fix lockdep warning for sparsely nested adapter chain (git-fixes).\n- i2c: cpm: Remove linux,i2c-index conversion from be32 (git-fixes).\n- i2c: designware: do not hold SCL low when I2C_DYNAMIC_TAR_UPDATE is not set (git-fixes).\n- i2c: exynos5: Calculate t_scl_l, t_scl_h according to i2c spec (git-fixes).\n- i2c: i801: Add lis3lv02d for Dell Precision 3540 (git-fixes).\n- i2c: i801: Add lis3lv02d for Dell XPS 15 7590 (git-fixes).\n- i2c: i801: Use a different adapter-name for IDF adapters (stable-fixes).\n- i2c: i801: add helper i801_restore_regs (git-fixes).\n- i2c: ismt: kill transaction in hardware on timeout (git-fixes).\n- i2c: ocores: Move system PM hooks to the NOIRQ phase (git-fixes).\n- i2c: ocores: Remove #ifdef guards for PM related functions (git-fixes).\n- i2c: omap: switch to NOIRQ_SYSTEM_SLEEP_PM_OPS() and RUNTIME_PM_OPS() (git-fixes).\n- i2c: omap: wakeup the controller during suspend() callback (git-fixes).\n- i2c: rcar: properly format a debug output (git-fixes).\n- i2c: stm32f7: Do not prepare/unprepare clock during runtime suspend/resume (git-fixes).\n- i2c: stm32f7: perform most of irq job in threaded handler (git-fixes).\n- i2c: synquacer: Deal with optional PCLK correctly (git-fixes).\n- i2c: synquacer: Remove a clk reference from struct synquacer_i2c (stable-fixes).\n- i2c: xiic: Try re-initialization on bus busy timeout (git-fixes).\n- i2c: xiic: improve error message when transfer fails to start (stable-fixes).\n- i3c: master: Fix miss free init_dyn_addr at i3c_master_put_i3c_addrs() (git-fixes).\n- i3c: master: cdns: Fix use after free vulnerability in cdns_i3c_master Driver Due to Race Condition (stable-fixes).\n- i3c: master: svc: Fix pm_runtime_set_suspended() with runtime pm enabled (git-fixes).\n- i40e: Fix XDP program unloading while removing the driver (git-fixes).\n- i40e: Report MFS in decimal base instead of hex (git-fixes).\n- i40e: fix race condition by adding filter's intermediate sync state (git-fixes).\n- iTCO_wdt: mask NMI_NOW bit for update_no_reboot_bit() call (git-fixes).\n- iavf: Fix TC config comparison with existing adapter TC config (git-fixes).\n- ice: Fix VSI list rule with ICE_SW_LKUP_LAST type (git-fixes).\n- ice: Fix checking for unsupported keys on non-tunnel device (git-fixes).\n- ice: Fix lldp packets dropping after changing the number of channels (git-fixes).\n- ice: Fix netif_is_ice() in Safe Mode (git-fixes).\n- ice: Fix package download algorithm (git-fixes).\n- ice: Fix recipe read procedure (git-fixes).\n- ice: Fix reset handler (git-fixes).\n- ice: Flush FDB entries before reset (git-fixes).\n- ice: Interpret .set_channels() input differently (git-fixes).\n- ice: Rebuild TC queues on VSI queue reconfiguration (git-fixes).\n- ice: Reject pin requests with unsupported flags (git-fixes).\n- ice: add flag to distinguish reset from .ndo_bpf in XDP rings config (git-fixes).\n- ice: add missing WRITE_ONCE when clearing ice_rx_ring::xdp_prog (git-fixes).\n- ice: avoid IRQ collision to fix init failure on ACPI S3 resume (git-fixes).\n- ice: clear port vlan config during reset (git-fixes).\n- ice: disallow DPLL_PIN_STATE_SELECTABLE for dpll output pins (git-fixes).\n- ice: do not bring the VSI up, if it was down before the XDP setup (git-fixes).\n- ice: do not busy wait for Rx queue disable in ice_qp_dis() (git-fixes).\n- ice: fix 200G PHY types to link speed mapping (git-fixes).\n- ice: fix 200G link speed message log (git-fixes).\n- ice: fix ICE_LAST_OFFSET formula (git-fixes).\n- ice: fix VLAN replay after reset (git-fixes).\n- ice: fix VSI lists confusion when adding VLANs (git-fixes).\n- ice: fix accounting for filters shared by multiple VSIs (git-fixes).\n- ice: fix accounting if a VLAN already exists (git-fixes).\n- ice: fix iteration of TLVs in Preserved Fields Area (git-fixes).\n- ice: fix page reuse when PAGE_SIZE is over 8k (git-fixes).\n- ice: fix reads from NVM Shadow RAM on E830 and E825-C devices (git-fixes).\n- ice: fix truesize operations for PAGE_SIZE >= 8192 (git-fixes).\n- ice: implement AQ download pkg retry (git-fixes).\n- ice: map XDP queues to vectors in ice_vsi_map_rings_to_vectors() (git-fixes).\n- ice: remove af_xdp_zc_qps bitmap (git-fixes).\n- ice: replace synchronize_rcu with synchronize_net (git-fixes).\n- ice: respect netif readiness in AF_XDP ZC related ndo's (git-fixes).\n- ice: set correct dst VSI in only LAN filters (git-fixes).\n- ice: tc: allow zero flags in parsing tc flower (git-fixes).\n- ice: tc: check src_vsi in case of traffic from VF (git-fixes).\n- ice: use proper macro for testing bit (git-fixes).\n- idpf: Interpret .set_channels() input differently (git-fixes).\n- idpf: avoid bloating &idpf_q_vector with big %NR_CPUS (git-fixes).\n- idpf: do not enable NAPI and interrupts prior to allocating Rx buffers (git-fixes).\n- idpf: do not skip over ethtool tcp-data-split setting (git-fixes).\n- idpf: fix UAFs when destroying the queues (git-fixes).\n- idpf: fix memleak in vport interrupt configuration (git-fixes).\n- idpf: fix memory leaks and crashes while performing a soft reset (git-fixes).\n- ieee802154: Fix build error (git-fixes).\n- igb: Always call igb_xdp_ring_update_tail() under Tx lock (git-fixes).\n- igb: Disable threaded IRQ for igb_msix_other (git-fixes).\n- igb: Fix not clearing TimeSync interrupts for 82580 (git-fixes).\n- igc: Fix double reset adapter triggered from a single taprio cmd (git-fixes).\n- igc: Fix packet still tx after gate close by reducing i226 MAC retry buffer (git-fixes).\n- igc: Fix qbv tx latency by setting gtxoffset (git-fixes).\n- igc: Fix qbv_config_change_errors logics (git-fixes).\n- igc: Fix reset adapter logics when tx mode change (git-fixes).\n- igc: Unlock on error in igc_io_resume() (git-fixes).\n- iio: Fix fwnode_handle in __fwnode_iio_channel_get_by_name() (git-fixes).\n- iio: accel: bma400: Fix uninitialized variable field_value in tap event handling (git-fixes).\n- iio: accel: kx022a: Fix raw read format (git-fixes).\n- iio: accel: kx022a: add missing select IIO_(TRIGGERED_)BUFFER in Kconfig (git-fixes).\n- iio: adc: ad7124: fix division by zero in ad7124_set_channel_odr() (git-fixes).\n- iio: adc: ad7606: Fix typo in the driver name (git-fixes).\n- iio: adc: ad7923: Fix buffer overflow for tx_buf and ring_xfer (git-fixes).\n- iio: adc: ti-ads124s08: add missing select IIO_(TRIGGERED_)BUFFER in Kconfig (git-fixes).\n- iio: adc: ti-ads8688: add missing select IIO_(TRIGGERED_)BUFFER in Kconfig (git-fixes).\n- iio: adc: ti-lmp92064: add missing select REGMAP_SPI in Kconfig (git-fixes).\n- iio: amplifiers: ada4250: add missing select REGMAP_SPI in Kconfig (git-fixes).\n- iio: dac: ad3552r: add missing select IIO_(TRIGGERED_)BUFFER in Kconfig (git-fixes).\n- iio: dac: ad5766: add missing select IIO_(TRIGGERED_)BUFFER in Kconfig (git-fixes).\n- iio: dac: ad5770r: add missing select REGMAP_SPI in Kconfig (git-fixes).\n- iio: dac: ltc1660: add missing select REGMAP_SPI in Kconfig (git-fixes).\n- iio: dac: stm32-dac-core: add missing select REGMAP_MMIO in Kconfig (git-fixes).\n- iio: frequency: adf4377: add missing select REMAP_SPI in Kconfig (git-fixes).\n- iio: frequency: admv4420: fix missing select REMAP_SPI in Kconfig (git-fixes).\n- iio: gts-helper: Fix memory leaks for the error path of iio_gts_build_avail_scale_table() (git-fixes).\n- iio: gts-helper: Fix memory leaks in iio_gts_build_avail_scale_table() (git-fixes).\n- iio: gts: Fix uninitialized symbol 'ret' (git-fixes).\n- iio: gts: fix infinite loop for gain_to_scaletables() (git-fixes).\n- iio: hid-sensors: Fix an error handling path in _hid_sensor_set_report_latency() (git-fixes).\n- iio: light: al3010: Fix an error handling path in al3010_probe() (git-fixes).\n- iio: light: opt3001: add missing full-scale range value (git-fixes).\n- iio: light: veml6030: fix ALS sensor resolution (git-fixes).\n- iio: light: veml6030: fix IIO device retrieval from embedded device (git-fixes).\n- iio: light: veml6030: fix microlux value calculation (git-fixes).\n- iio: magnetometer: ak8975: Convert enum->pointer for data in the match tables (stable-fixes).\n- iio: magnetometer: ak8975: Fix 'Unexpected device' error (git-fixes).\n- iio: magnetometer: ak8975: drop incorrect AK09116 compatible (git-fixes).\n- iio: proximity: mb1232: add missing select IIO_(TRIGGERED_)BUFFER in Kconfig (git-fixes).\n- ima: fix buffer overrun in ima_eventdigest_init_common (git-fixes).\n- initramfs: avoid filename buffer overrun (bsc#1232436).\n- intel_idle: add Granite Rapids Xeon support (bsc#1231630).\n- intel_idle: fix ACPI _CST matching for newer Xeon platforms (bsc#1231630).\n- io_uring/eventfd: move to more idiomatic RCU free usage (git-fixes).\n- io_uring/io-wq: do not allow pinning outside of cpuset (git-fixes).\n- io_uring/io-wq: inherit cpuset of cgroup in io worker (git-fixes).\n- io_uring/net: harden multishot termination case for recv (git-fixes).\n- io_uring/rw: fix cflags posting for single issue multishot read (git-fixes).\n- io_uring/rw: fix missing NOWAIT check for O_DIRECT start write (git-fixes).\n- io_uring/rw: treat -EOPNOTSUPP for IOCB_NOWAIT like -EAGAIN (git-fixes).\n- io_uring/sqpoll: close race on waiting for sqring entries (git-fixes).\n- io_uring/sqpoll: do not allow pinning outside of cpuset (git-fixes).\n- io_uring/sqpoll: do not put cpumask on stack (git-fixes).\n- io_uring/sqpoll: retain test for whether the CPU is valid (git-fixes).\n- io_uring: check for presence of task_work rather than TIF_NOTIFY_SIGNAL (git-fixes).\n- iommu/amd: Allocate the page table root using GFP_KERNEL (git-fixes).\n- iommu/amd: Do not set the D bit on AMD v2 table entries (git-fixes).\n- iommu/amd: Fix typo of , instead of ; (git-fixes).\n- iommu/vt-d: Always reserve a domain ID for identity setup (git-fixes).\n- iommu/vt-d: Fix incorrect pci_for_each_dma_alias() for non-PCI devices (git-fixes).\n- iommufd: Check the domain owner of the parent before creating a nesting domain (git-fixes).\n- iommufd: Protect against overflow of ALIGN() during iova allocation (git-fixes).\n- irqchip/gic-v3-its: Avoid explicit cpumask allocation on stack (git-fixes).\n- jbd2: Move j_transaction_overhead_buffers into a hole (bsc#1234042).\n- jbd2: avoid infinite transaction commit loop (bsc#1234039).\n- jbd2: avoid memleak in jbd2_journal_write_metadata_buffer (bsc#1234043).\n- jbd2: avoid mount failed when commit block is partial submitted (bsc#1234040).\n- jbd2: correct the printing of write_flags in jbd2_write_superblock() (bsc#1234045).\n- jbd2: correctly compare tids with tid_geq function in jbd2_fc_begin_commit (bsc#1231638).\n- jbd2: fix kernel-doc for j_transaction_overhead_buffers (bsc#1234042).\n- jbd2: fix potential data lost in recovering journal raced with synchronizing fs bdev (bsc#1234044).\n- jbd2: fix soft lockup in journal_finish_inode_data_buffers() (bsc#1234046).\n- jbd2: make jbd2_journal_get_max_txn_bufs() internal (bsc#1234041).\n- jbd2: precompute number of transaction descriptor blocks (bsc#1234042).\n- jfs: Fix sanity check in dbMount (git-fixes).\n- jfs: Fix uaf in dbFreeBits (git-fixes).\n- jfs: Fix uninit-value access of new_ea in ea_buffer (git-fixes).\n- jfs: UBSAN: shift-out-of-bounds in dbFindBits (git-fixes).\n- jfs: check if leafidx greater than num leaves per dmap tree (git-fixes).\n- jump_label: Fix static_key_slow_dec() yet again (git-fixes).\n- kABI fix of VM: x86: Re-split x2APIC ICR into ICR+ICR2 for AMD (x2AVIC) (git-fixes).\n- kABI: Restore exported __arm_smccc_sve_check (git-fixes)\n- kABI: bpf: enum bpf_{type_flag,arg_type} kABI workaround (git-fixes).\n- kABI: bpf: struct bpf_insn_acces_aux kABI workaround (git-fixes).\n- kabi, mm: refactor arch_calc_vm_flag_bits() and arm64 MTE handling (git-fixes kabi).\n- kasan: Fix Software Tag-Based KASAN with GCC (git-fixes).\n- kasan: move checks to do_strncpy_from_user (git-fixes).\n- kbuild, bpf: Use test-ge check for v1.25-only pahole (bsc#1230414 bsc#1229450).\n- kbuild,bpf: Add module-specific pahole flags for distilled base BTF (bsc#1230414 bsc#1229450).\n- kbuild,bpf: Switch to using --btf_features for pahole v1.26 and later (bsc#1230414 bsc#1229450).\n- kbuild: avoid too many execution of scripts/pahole-flags.sh (bsc#1230414 bsc#1229450).\n- kbuild: bpf: Tell pahole to DECL_TAG kfuncs (bsc#1230414 bsc#1229450).\n- kconfig: qconf: fix buffer overflow in debug links (git-fixes).\n- kernel-binary: Enable livepatch package only when livepatch is enabled (bsc#1218644).\n- kexec_file: fix elfcorehdr digest exclusion when CONFIG_CRASH_HOTPLUG=y (git-fixes).\n- keys, dns: Allow key types (eg. DNS) to be reclaimed immediately on expiry (git-fixes).\n- keys: Fix overwrite of key expiration on instantiation (git-fixes).\n- kthread: unpark only parked kthread (git-fixes).\n- leds: lp55xx: Remove redundant test for invalid channel number (git-fixes).\n- lib/xarray: introduce a new helper xas_get_order (bsc#1231617).\n- lib: string_helpers: silence snprintf() output truncation warning (git-fixes).\n- mac80211: MAC80211_MESSAGE_TRACING should depend on TRACING (git-fixes).\n- macsec: do not increment counters for an unrelated SA (git-fixes).\n- mailbox: arm_mhuv2: clean up loop in get_irq_chan_comb() (git-fixes).\n- maple_tree: correct tree corruption on spanning store (git-fixes).\n- maple_tree: fix alloc node fail issue (git-fixes).\n- maple_tree: refine mas_store_root() on storing NULL (git-fixes).\n- media: adv7604: prevent underflow condition when reporting colorspace (git-fixes).\n- media: amphion: Fix pm_runtime_set_suspended() with runtime pm enabled (git-fixes).\n- media: amphion: Set video drvdata before register video device (git-fixes).\n- media: ar0521: do not overflow when checking PLL values (git-fixes).\n- media: atomisp: Add check for rgby_data memory allocation failure (git-fixes).\n- media: bttv: use audio defaults for winfast2000 (git-fixes).\n- media: core: v4l2-ioctl: check if ioctl is known to avoid NULL name (git-fixes).\n- media: cx24116: prevent overflows on SNR calculus (git-fixes).\n- media: dvb_frontend: do not play tricks with underflow values (git-fixes).\n- media: dvbdev: fix the logic when DVB_DYNAMIC_MINORS is not set (stable-fixes).\n- media: dvbdev: prevent the risk of out of memory access (git-fixes).\n- media: gspca: ov534-ov772x: Fix off-by-one error in set_frame_rate() (git-fixes).\n- media: i2c: dw9768: Fix pm_runtime_set_suspended() with runtime pm enabled (git-fixes).\n- media: i2c: imx335: Enable regulator supplies (stable-fixes).\n- media: i2c: tc358743: Fix crash in the probe error path when using polling (git-fixes).\n- media: imx-jpeg: Ensure power suppliers be suspended before detach them (git-fixes).\n- media: imx-jpeg: Set video drvdata before register video device (git-fixes).\n- media: imx335: Fix reset-gpio handling (git-fixes).\n- media: mantis: remove orphan mantis_core.h (git-fixes).\n- media: mtk-jpeg: Fix null-ptr-deref during unload module (git-fixes).\n- media: pci: ipu3-cio2: Initialise timing struct to avoid a compiler warning (git-fixes).\n- media: platform: allegro-dvt: Fix possible memory leak in allocate_buffers_internal() (git-fixes).\n- media: platform: exynos4-is: Fix an OF node reference leak in fimc_md_is_isp_available (git-fixes).\n- media: pulse8-cec: fix data timestamp at pulse8_setup() (git-fixes).\n- media: s5p-jpeg: prevent buffer overflows (git-fixes).\n- media: stb0899_algo: initialize cfr before using it (git-fixes).\n- media: ts2020: fix null-ptr-deref in ts2020_probe() (git-fixes).\n- media: uvcvideo: Require entities to have a non-zero unique ID (git-fixes).\n- media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format (git-fixes).\n- media: uvcvideo: Stop stream during unregister (git-fixes).\n- media: v4l2-ctrls-api: fix error handling for v4l2_g_ctrl() (git-fixes).\n- media: v4l2-tpg: prevent the risk of a division by zero (git-fixes).\n- media: vb2: Fix comment (git-fixes).\n- media: venus: Fix pm_runtime_set_suspended() with runtime pm enabled (git-fixes).\n- media: videobuf2-core: clear memory related fields in __vb2_plane_dmabuf_put() (stable-fixes).\n- media: videobuf2: fix typo: vb2_dbuf -> vb2_qbuf (git-fixes).\n- media: wl128x: Fix atomicity violation in fmc_send_cmd() (git-fixes).\n- mei: use kvmalloc for read buffer (git-fixes).\n- mfd: intel_soc_pmic_chtwc: Make Lenovo Yoga Tab 3 X90F DMI match less strict (stable-fixes).\n- mfd: rt5033: Fix missing regmap_del_irq_chip() (git-fixes).\n- mfd: tps65010: Use IRQF_NO_AUTOEN flag in request_irq() to fix race (git-fixes).\n- minmax: avoid overly complex min()/max() macro arguments in xen (git-fixes).\n- minmax: scsi: fix mis-use of 'clamp()' in sr.c (git-fixes).\n- misc: apds990x: Fix missing pm_runtime_disable() (git-fixes).\n- mlx5: avoid truncating error message (git-fixes).\n- mlx5: stop warning for 64KB pages (git-fixes).\n- mlxbf_gige: disable RX filters until RX path initialized (git-fixes).\n- mm/filemap: optimize filemap folio adding (bsc#1231617).\n- mm/filemap: return early if failed to allocate memory for split (bsc#1231617).\n- mm/hugetlb: fix nodes huge page allocation when there are surplus pages (bsc#1234012).\n- mm: avoid unsafe VMA hook invocation when error arises on mmap hook (git-fixes).\n- mm: khugepaged: fix the arguments order in khugepaged_collapse_file trace point (git-fixes).\n- mm: mmap: no need to call khugepaged_enter_vma() for stack (jsc#PED-10978).\n- mm: move dummy_vm_ops out of a header (git-fixes prerequisity).\n- mm: refactor arch_calc_vm_flag_bits() and arm64 MTE handling (git-fixes).\n- mm: refactor map_deny_write_exec() (git-fixes).\n- mm: resolve faulty mmap_region() error path behaviour (git-fixes).\n- mm: unconditionally close VMAs on error (git-fixes).\n- mmc: core: Further prevent card detect during shutdown (git-fixes).\n- mmc: mmc_spi: drop buggy snprintf() (git-fixes).\n- mmc: sunxi-mmc: Fix A100 compatible description (git-fixes).\n- modpost: fix acpi MODULE_DEVICE_TABLE built with mismatched endianness (git-fixes).\n- modpost: fix input MODULE_DEVICE_TABLE() built for 64-bit on 32-bit host (git-fixes).\n- modpost: remove incorrect code in do_eisa_entry() (git-fixes).\n- module: abort module loading when sysfs setup suffer errors (git-fixes).\n- mtd: rawnand: atmel: Fix possible memory leak (git-fixes).\n- mtd: spi-nor: core: replace dummy buswidth from addr to data (git-fixes).\n- nbd: fix race between timeout and normal completion (bsc#1230918).\n- net/mlx5: Add missing masks and QoS bit masks for scheduling elements (git-fixes).\n- net/mlx5: Added cond_resched() to crdump collection (git-fixes).\n- net/mlx5: Check capability for fw_reset (git-fixes).\n- net/mlx5: Check for invalid vector index on EQ creation (git-fixes).\n- net/mlx5: Explicitly set scheduling element and TSAR type (git-fixes).\n- net/mlx5: Fix command bitmask initialization (git-fixes).\n- net/mlx5: Fix error handling in irq_pool_request_irq (git-fixes).\n- net/mlx5: Lag, do bond only if slaves agree on roce state (git-fixes).\n- net/mlx5: Lag, do not use the hardcoded value of the first port (git-fixes).\n- net/mlx5: Stop waiting for PCI if pci channel is offline (git-fixes).\n- net/mlx5: Unregister notifier on eswitch init failure (git-fixes).\n- net/mlx5: Update the list of the PCI supported devices (git-fixes).\n- net/mlx5e: Add a check for the return value from mlx5_port_set_eth_ptys (git-fixes).\n- net/mlx5e: Add missing link mode to ptys2ext_ethtool_map (git-fixes).\n- net/mlx5e: Add missing link modes to ptys2ethtool_map (git-fixes).\n- net/mlx5e: Add mqprio_rl cleanup and free in mlx5e_priv_cleanup() (git-fixes).\n- net/mlx5e: Correctly report errors for ethtool rx flows (git-fixes).\n- net/mlx5e: Do not call cleanup on profile rollback failure (git-fixes).\n- net/mlx5e: Fix IPsec tunnel mode offload feature check (git-fixes).\n- net/mlx5e: Fix UDP GSO for encapsulated packets (git-fixes).\n- net/mlx5e: Fix features validation check for tunneled UDP (non-VXLAN) packets (git-fixes).\n- net/mlx5e: Require mlx5 tc classifier action support for IPsec prio capability (git-fixes).\n- net/mlx5e: Use rx_missed_errors instead of rx_dropped for reporting buffer exhaustion (git-fixes).\n- net: mana: Implement get_ringparam/set_ringparam for mana (bsc#1229891).\n- net: mana: Improve mana_set_channels() in low mem conditions (bsc#1230289).\n- net: mdio-ipq4019: add missing error check (git-fixes).\n- net: phy: Remove LED entry from LEDs list on unregister (git-fixes).\n- net: phy: bcm84881: Fix some error handling paths (git-fixes).\n- net: phy: dp83822: Fix reset pin definitions (git-fixes).\n- net: phy: dp83869: fix memory corruption when enabling fiber (git-fixes).\n- net: phy: ti: add PHY_RST_AFTER_CLK_EN flag (git-fixes).\n- net: qede: sanitize 'rc' in qede_add_tc_flower_fltr() (git-fixes).\n- net: qede: use return from qede_parse_actions() (git-fixes).\n- net: qede: use return from qede_parse_flow_attr() for flow_spec (git-fixes).\n- net: qede: use return from qede_parse_flow_attr() for flower (git-fixes).\n- net: relax socket state check at accept time (git-fixes).\n- net: stmmac: dwmac-tegra: Fix link bring-up sequence (git-fixes)\n- net: sysfs: Fix /sys/class/net/&lt;iface> path for statistics (git-fixes).\n- net: test for not too small csum_start in virtio_net_hdr_to_skb() (git-fixes).\n- net: usb: lan78xx: Fix double free issue with interrupt buffer allocation (git-fixes).\n- net: usb: lan78xx: Fix memory leak on device unplug by freeing PHY device (git-fixes).\n- net: usb: lan78xx: Fix refcounting and autosuspend on invalid WoL configuration (git-fixes).\n- net: usb: qmi_wwan: add Fibocom FG132 0x0112 composition (stable-fixes).\n- net: usb: usbnet: fix name regression (get-fixes).\n- net: usb: usbnet: fix race in probe failure (git-fixes).\n- net: wwan: fix global oob in wwan_rtnl_policy (git-fixes).\n- net: wwan: t7xx: Fix off-by-one error in t7xx_dpmaif_rx_buf_alloc() (git-fixes).\n- net: xfrm: preserve kabi for xfrm_state (bsc#1233754).\n- netdevsim: copy addresses for both in and out paths (git-fixes).\n- netdevsim: use cond_resched() in nsim_dev_trap_report_work() (git-fixes).\n- netfilter: nf_tables: missing iterator type in lookup walk (git-fixes).\n- nfs: Fix KMSAN warning in decode_getfattr_attrs() (git-fixes).\n- nfs: avoid i_lock contention in nfs_clear_invalid_mapping (git-fixes).\n- nfs: fix memory leak in error path of nfs4_do_reclaim (git-fixes).\n- nfsd: call cache_put if xdr_reserve_space returns NULL (git-fixes).\n- nfsd: cancel nfsd_shrinker_work using sync mode in nfs4_state_shutdown_net (git-fixes).\n- nfsd: enable NFSv2 caused by upstream commit (bsc#1230914).\n- nfsd: fix delegation_blocked() to block correctly for at least 30 seconds (git-fixes).\n- nfsd: fix refcount leak when file is unhashed after being found (git-fixes).\n- nfsd: map the EBADMSG to nfserr_io to avoid warning (git-fixes).\n- nfsd: remove unneeded EEXIST error check in nfsd_do_file_acquire (git-fixes).\n- nfsd: remove unsafe BUG_ON from set_change_info (bsc#1234121).\n- nfsd: return -EINVAL when namelen is 0 (git-fixes).\n- nilfs2: fix kernel bug due to missing clearing of buffer delay flag (git-fixes).\n- nilfs2: fix potential deadlock with newly created symlinks (git-fixes).\n- nouveau/dmem: Fix privileged error in copy engine channel (git-fixes).\n- nouveau/dmem: Fix vulnerability in migrate_to_ram upon copy error (git-fixes).\n- nouveau/dp: handle retries for AUX CH transfers with GSP (git-fixes).\n- nouveau/gsp: Avoid addressing beyond end of rpc->entries (stable-fixes).\n- nouveau: fw: sync dma after setup is called (git-fixes).\n- nouveau: handle EBUSY and EAGAIN for GSP aux errors (git-fixes).\n- ntb: intel: Fix the NULL vs IS_ERR() bug for debugfs_create_dir() (git-fixes).\n- ntfs3: Add bounds checking to mi_enum_attr() (bsc#1233207)\n- nvme-fabrics: fix kernel crash while shutting down controller (git-fixes).\n- nvme-loop: flush off pending I/O while shutting down loop controller (git-fixes).\n- nvme-multipath: suppress partition scan until the disk is ready (bsc#1228244).\n- nvme-pci: fix freeing of the HMB descriptor table (git-fixes).\n- nvme-pci: fix race condition between reset and nvme_dev_disable() (git-fixes).\n- nvme-pci: qdepth 1 quirk (git-fixes).\n- nvme-pci: reverse request order in nvme_queue_rqs (git-fixes).\n- nvme-pci: set doorbell config before unquiescing (git-fixes).\n- nvme/host: Fix RCU list traversal to use SRCU primitive (git-fixes).\n- nvme: disable CC.CRIME (NVME_CC_CRIME) (jsc#PED-9901).\n- nvme: null terminate nvme_tls_attrs (git-fixes).\n- nvme: re-fix error-handling for io_uring nvme-passthrough (git-fixes).\n- nvme: tcp: avoid race between queue_lock lock and destroy (git-fixes).\n- nvmet-auth: assign dh_key to NULL after kfree_sensitive (git-fixes).\n- ocfs2: fix UBSAN warning in ocfs2_verify_volume() (git-fixes).\n- ocfs2: fix the la space leak when unmounting an ocfs2 volume (git-fixes).\n- ocfs2: fix uninit-value in ocfs2_get_block() (git-fixes).\n- ocfs2: pass u64 to ocfs2_truncate_inline maybe overflow (git-fixes).\n- ocfs2: remove entry once instead of null-ptr-dereference in ocfs2_xa_remove() (git-fixes).\n- ocfs2: uncache inode which has failed entering the group (git-fixes).\n- of: Add cleanup.h based auto release via __free(device_node) markings (bsc#1232386)\n- parport: Proper fix for array out-of-bounds access (git-fixes).\n- phy: freescale: imx8m-pcie: Do CMN_RST just before PHY PLL lock check (git-fixes).\n- phy: qcom: qmp-combo: move driver data initialisation earlier (git-fixes).\n- phy: qcom: qmp-usb: fix NULL-deref on runtime suspend (git-fixes).\n- phy: tegra: xusb: Add error pointer check in xusb.c (git-fixes).\n- phy: ti: phy-j721e-wiz: fix usxgmii configuration (git-fixes).\n- pinctrl: apple: check devm_kasprintf() returned value (git-fixes).\n- pinctrl: k210: Undef K210_PC_DEFAULT (git-fixes).\n- pinctrl: ocelot: fix system hang on level based interrupts (stable-fixes).\n- pinctrl: qcom: spmi: fix debugfs drive strength (git-fixes).\n- pinctrl: zynqmp: drop excess struct member description (git-fixes).\n- platform/chrome: cros_ec_typec: fix missing fwnode reference decrement (git-fixes).\n- platform/x86/amd/pmc: Detect when STB is not available (git-fixes).\n- platform/x86: ISST: Fix the KASAN report slab-out-of-bounds bug (git-fixes).\n- platform/x86: dell-sysman: add support for alienware products (stable-fixes).\n- platform/x86: dell-wmi: Ignore suspend notifications (stable-fixes).\n- platform/x86: lenovo-ymc: Ignore the 0x0 state (stable-fixes).\n- platform/x86: panasonic-laptop: Return errno correctly in show callback (git-fixes).\n- platform/x86: touchscreen_dmi: add nanote-next quirk (stable-fixes).\n- posix-cpu-timers: Clear TICK_DEP_BIT_POSIX_TIMER on clone (bsc#1234098).\n- power: reset: brcmstb: Do not go into infinite loop if reset fails (stable-fixes).\n- power: supply: bq27xxx: Fix registers of bq27426 (git-fixes).\n- power: supply: core: Remove might_sleep() from power_supply_put() (git-fixes).\n- power: supply: rt9471: Fix wrong WDT function regfield declaration (git-fixes).\n- power: supply: rt9471: Use IC status regfield to report real charger status (git-fixes).\n- powercap: intel_rapl: Fix off by one in get_rpi() (git-fixes).\n- powerpc/64: Convert patch_instruction() to patch_u32() (bsc#1194869).\n- powerpc/64s: Fix unnecessary copy to 0 when kernel is booted at address 0 (bsc#1215199).\n- powerpc/atomic: Use YZ constraints for DS-form instructions (bsc#1194869).\n- powerpc/boot: Handle allocation failure in simple_realloc() (bsc#1194869).\n- powerpc/boot: Only free if realloc() succeeds (bsc#1194869).\n- powerpc/code-patching: Add generic memory patching (bsc#1194869).\n- powerpc/code-patching: Perform hwsync in __patch_instruction() in case of failure (bsc#1194869).\n- powerpc/crypto: do not build aes-gcm-p10 by default (bsc#1230501 ltc#208632).\n- powerpc/crypto: fix missing skcipher dependency for aes-gcm-p10 (bsc#1230501 ltc#208632).\n- powerpc/fadump: Move fadump_cma_init to setup_arch() after initmem_init() (bsc#1215199).\n- powerpc/fadump: Refactor and prepare fadump_cma_init for late init (bsc#1215199).\n- powerpc/kexec: Fix return of uninitialized variable (bsc#1194869).\n- powerpc/mm/fault: Fix kfence page fault reporting (bsc#1194869).\n- powerpc/mm: Fix boot crash with FLATMEM (bsc#1194869).\n- powerpc/mm: Fix boot warning with hugepages and CONFIG_DEBUG_VIRTUAL (bsc#1194869).\n- powerpc/powernv: Free name on error in opal_event_init() (bsc#1194869).\n- powerpc/pseries: Fix KVM guest detection for disabling hardlockup detector (bsc#1194869).\n- powerpc/pseries: Fix dtl_access_lock to be a rw_semaphore (bsc#1194869).\n- powerpc/pseries: Use correct data types from pseries_hp_errorlog struct (bsc#1215199).\n- powerpc/vdso: Fix VDSO data access when running in a non-root time namespace (bsc#1194869).\n- powerpc/vdso: Inconditionally use CFUNC macro (bsc#1215199).\n- powerpc/xics: Check return value of kasprintf in icp_native_map_one_cpu (bsc#1194869).\n- powerpc/xmon: Fix disassembly CPU feature checks (bsc#1065729).\n- printk: Add notation to console_srcu locking (bsc#1232183).\n- pwm: imx-tpm: Use correct MODULO value for EPWM mode (git-fixes).\n- qed: avoid truncating work queue length (git-fixes).\n- rcu-tasks: Fix show_rcu_tasks_trace_gp_kthread buffer overflow (bsc#1226631).\n- rcu: Fix buffer overflow in print_cpu_stall_info() (bsc#1226623).\n- regmap: detach regmap from dev on regmap_exit (git-fixes).\n- regmap: irq: Set lockdep class for hierarchical IRQ domains (git-fixes).\n- rpm/check-for-config-changes: add HAVE_RUST and RUSTC_SUPPORTS_ to IGNORED_CONFIGS_RE They depend on SHADOW_CALL_STACK.\n- rpm/release-projects: Add SLFO projects (bsc#1231293).\n- rpm/scripts: Remove obsolete Symbols.list Symbols.list is not longer needed by the new klp-convert implementation (bsc#1218644).\n- rpmsg: glink: Handle rejected intent request better (git-fixes).\n- rtc: ab-eoz9: do not fail temperature reads on undervoltage notification (git-fixes).\n- rtc: abx80x: Fix WDT bit position of the status register (git-fixes).\n- rtc: bbnsm: add remove hook (git-fixes).\n- rtc: check if __rtc_read_time was successful in rtc_timer_do_work() (git-fixes).\n- rtc: rzn1: fix BCD to rtc_time conversion errors (git-fixes).\n- rtc: st-lpc: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).\n- runtime constants: add default dummy infrastructure (git-fixes).\n- runtime constants: add x86 architecture support (git-fixes).\n- s390/mm: Add cond_resched() to cmm_alloc/free_pages() (bsc#1228747).\n- s390/pci: Handle PCI error codes other than 0x3a (git-fixes bsc#1232629).\n- s390/sclp: Deactivate sclp after all its users (git-fixes bsc#1232628).\n- s390/sclp_vt220: Convert newlines to CRLF instead of LFCR (git-fixes bsc#1232627).\n- scsi: NCR5380: Check for phase match during PDMA fixup (git-fixes).\n- scsi: NCR5380: Initialize buffer for MSG IN and STATUS transfers (git-fixes).\n- scsi: Remove scsi device no_start_on_resume flag (git-fixes).\n- scsi: aacraid: Rearrange order of struct aac_srb_unit (git-fixes).\n- scsi: cdrom: kABI: fix cdrom_dev_ops change (git-fixes).\n- scsi: core: Disable CDL by default (git-fixes).\n- scsi: core: Fix handling of SCMD_FAIL_IF_RECOVERING (git-fixes).\n- scsi: core: Fix the return value of scsi_logical_block_count() (git-fixes).\n- scsi: core: Handle devices which return an unusually large VPD page count (git-fixes).\n- scsi: core: alua: I/O errors for ALUA state transitions (git-fixes).\n- scsi: fnic: Move flush_work initialization out of if block (bsc#1230055).\n- scsi: hisi_sas: Handle the NCQ error returned by D2H frame (git-fixes).\n- scsi: hpsa: Fix allocation size for Scsi_Host private data (git-fixes).\n- scsi: kABI: restore no_start_on_resume to scsi_device (git-fixes).\n- scsi: libsas: Fix exp-attached device scan after probe failure scanned in again after probe failed (git-fixes).\n- scsi: libsas: Fix the failure of adding phy with zero-address to port (git-fixes).\n- scsi: lpfc: Add ELS_RSP cmd to the list of WQEs to flush in lpfc_els_flush_cmd() (bsc#1232757).\n- scsi: lpfc: Add cleanup of nvmels_wq after HBA reset (bsc#1233241 jsc#PED-9943).\n- scsi: lpfc: Call lpfc_sli4_queue_unset() in restart and rmmod paths (bsc#1233241 jsc#PED-9943).\n- scsi: lpfc: Change lpfc_nodelist nlp_flag member into a bitmask (bsc#1233241 jsc#PED-9943).\n- scsi: lpfc: Check SLI_ACTIVE flag in FDMI cmpl before submitting follow up FDMI (bsc#1233241 jsc#PED-9943).\n- scsi: lpfc: Check devloss callbk done flag for potential stale NDLP ptrs (bsc#1233241 jsc#PED-9943).\n- scsi: lpfc: Copyright updates for 14.4.0.6 patches (bsc#1233241 jsc#PED-9943).\n- scsi: lpfc: Ensure DA_ID handling completion before deleting an NPIV instance (bsc#1232757).\n- scsi: lpfc: Fix kref imbalance on fabric ndlps from dev_loss_tmo handler (bsc#1232757).\n- scsi: lpfc: Modify CGN warning signal calculation based on EDC response (bsc#1233241 jsc#PED-9943).\n- scsi: lpfc: Prevent NDLP reference count underflow in dev_loss_tmo callback (bsc#1233241 jsc#PED-9943).\n- scsi: lpfc: Remove NLP_RELEASE_RPI flag from nodelist structure (bsc#1233241 jsc#PED-9943).\n- scsi: lpfc: Remove trailing space after \\n newline (bsc#1232757).\n- scsi: lpfc: Restrict support for 32 byte CDBs to specific HBAs (bsc#1232757 bsc#1228119).\n- scsi: lpfc: Revise TRACE_EVENT log flag severities from KERN_ERR to KERN_WARNING (bsc#1232757).\n- scsi: lpfc: Support loopback tests with VMID enabled (bsc#1232757).\n- scsi: lpfc: Update lpfc version to 14.4.0.5 (bsc#1232757).\n- scsi: lpfc: Update lpfc version to 14.4.0.6 (bsc#1233241 jsc#PED-9943).\n- scsi: lpfc: Update lpfc_els_flush_cmd() to check for SLI_ACTIVE before BSG flag (bsc#1233241 jsc#PED-9943).\n- scsi: lpfc: Update phba link state conditional before sending CMF_SYNC_WQE (bsc#1232757).\n- scsi: mac_scsi: Disallow bus errors during PDMA send (git-fixes).\n- scsi: mac_scsi: Refactor polling loop (git-fixes).\n- scsi: mac_scsi: Revise printk(KERN_DEBUG ...) messages (git-fixes).\n- scsi: mpi3mr: Avoid IOMMU page faults on REPORT ZONES (git-fixes).\n- scsi: mpi3mr: Avoid memcpy field-spanning write WARNING (git-fixes).\n- scsi: mpi3mr: Avoid possible run-time warning with long manufacturer strings (git-fixes).\n- scsi: mpi3mr: Fix ATA NCQ priority support (git-fixes).\n- scsi: mpi3mr: Validate SAS port assignments (git-fixes).\n- scsi: mpt3sas: Avoid IOMMU page faults on REPORT ZONES (git-fixes).\n- scsi: pm8001: Do not overwrite PCI queue mapping (git-fixes).\n- scsi: pm80xx: Set phy->enable_completion only when we wait for it (git-fixes).\n- scsi: qedf: Set qed_slowpath_params to zero before use (git-fixes).\n- scsi: scsi_transport_fc: Allow setting rport state to current state (git-fixes).\n- scsi: sd: Ignore command SYNCHRONIZE CACHE error if format in progress (git-fixes).\n- scsi: sd_zbc: Use kvzalloc() to allocate REPORT ZONES buffer (git-fixes).\n- scsi: smartpqi: correct stream detection (git-fixes).\n- scsi: smartpqi: revert propagate-the-multipath-failure-to-SML-quickly (git-fixes).\n- scsi: spi: Fix sshdr use (git-fixes).\n- scsi: sr: Fix unintentional arithmetic wraparound (git-fixes).\n- scsi: wd33c93: Do not use stale scsi_pointer value (git-fixes).\n- security/keys: fix slab-out-of-bounds in key_task_permission (git-fixes).\n- selftests/bpf: Add a test case to write mtu result into .rodata (git-fixes).\n- selftests/bpf: Add a test case to write strtol result into .rodata (git-fixes).\n- selftests/bpf: Add test for sign extension in coerce_subreg_to_size_sx() (git-fixes).\n- selftests/bpf: Add test for truncation after sign extension in coerce_reg_to_size_sx() (git-fixes).\n- selftests/bpf: Add tests for ldsx of pkt data/data_end/data_meta accesses (git-fixes).\n- selftests/bpf: Fix ARG_PTR_TO_LONG {half-,}uninitialized test (git-fixes).\n- selftests/bpf: Rename ARG_PTR_TO_LONG test description (git-fixes).\n- selftests/bpf: test for malformed BPF_CORE_TYPE_ID_LOCAL relocation (git-fixes).\n- serial: 8250: omap: Move pm_runtime_get_sync (git-fixes).\n- serial: imx: Update mctrl old_status on RTSD interrupt (git-fixes).\n- serial: protect uart_port_dtr_rts() in uart_shutdown() too (stable-fixes).\n- signal: Replace BUG_ON()s (bsc#1234093).\n- soc: fsl: rcpm: fix missing of_node_put() in copy_ippdexpcr1_setting() (git-fixes).\n- soc: qcom: geni-se: fix array underflow in geni_se_clk_tbl_get() (git-fixes).\n- soc: ti: smartreflex: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).\n- soundwire: intel_bus_common: enable interrupts before exiting reset (stable-fixes).\n- spi: Fix acpi deferred irq probe (git-fixes).\n- spi: atmel-quadspi: Fix register name in verbose logging function (git-fixes).\n- spi: atmel-quadspi: Fix wrong register value written to MR (git-fixes).\n- spi: mpc52xx: Add cancel_work_sync before module remove (git-fixes).\n- spi: mtk-snfi: fix kerneldoc for mtk_snand_is_page_ops() (git-fixes).\n- spi: s3c64xx: fix timeout counters in flush_fifo (git-fixes).\n- spi: spi-fsl-dspi: Fix crash when not using GPIO chip select (git-fixes).\n- spi: spi-imx: Fix pm_runtime_set_suspended() with runtime pm enabled (git-fixes).\n- spi: tegra210-quad: Avoid shift-out-of-bounds (git-fixes).\n- splice: always fsnotify_access(in), fsnotify_modify(out) on success (git-fixes).\n- splice: fsnotify_access(fd)/fsnotify_modify(fd) in vmsplice (git-fixes).\n- splice: fsnotify_access(in), fsnotify_modify(out) on success in tee (git-fixes).\n- srcu: Fix callbacks acceleration mishandling (git-fixes).\n- staging: iio: frequency: ad9832: fix division by zero in ad9832_calc_freqreg() (git-fixes).\n- sumversion: Fix a memory leak in get_src_version() (git-fixes).\n- supported.conf: mark nhpoly1305 module as supported (bsc#1231035).\n- supported.conf: mark ultravisor userspace access as supported (bsc#1232090).\n- task_work: add kerneldoc annotation for 'data' argument (git-fixes).\n- tcp: Fix refcnt handling in __inet_hash_connect() (git-fixes).\n- thermal: core: Initialize thermal zones before registering them (git-fixes).\n- thermal: int3400: Fix reading of current_uuid for active policy (git-fixes).\n- thermal: intel: int340x: processor: Fix warning during module unload (git-fixes).\n- thunderbolt: Honor TMU requirements in the domain when setting TMU mode (stable-fixes).\n- thunderbolt: Improve DisplayPort tunnel setup process to be more robust (stable-fixes).\n- tools/lib/thermal: Fix sampling handler context ptr (git-fixes).\n- tools/power turbostat: Fix trailing '\\n' parsing (git-fixes).\n- tools/power turbostat: Increase the limit for fd opened (bsc#1233119).\n- tools: hv: rm .*.cmd when make clean (git-fixes).\n- tpm: Lock TPM chip in tpm_pm_suspend() first (bsc#1082555 git-fixes).\n- tpm: fix signed/unsigned bug when checking event logs (git-fixes).\n- tracing/hwlat: Fix a race during cpuhp processing (git-fixes).\n- tracing/osnoise: Fix build when timerlat is not enabled (git-fixes).\n- tracing/osnoise: Skip running osnoise if all instances are off (git-fixes).\n- tracing/osnoise: Switch from PF_NO_SETAFFINITY to migrate_disable (git-fixes).\n- tracing/osnoise: Use a cpumask to know what threads are kthreads (git-fixes).\n- tracing/timerlat: Add interface_lock around clearing of kthread in stop_kthread() (git-fixes).\n- tracing/timerlat: Add user-space interface (git-fixes).\n- tracing/timerlat: Drop interface_lock in stop_kthread() (git-fixes).\n- tracing/timerlat: Fix a race during cpuhp processing (git-fixes).\n- tracing/timerlat: Fix duplicated kthread creation due to CPU online/offline (git-fixes).\n- tracing/timerlat: Move hrtimer_init to timerlat_fd open() (git-fixes).\n- tracing/timerlat: Only clear timer if a kthread exists (git-fixes).\n- tracing: Consider the NULL character when validating the event length (git-fixes).\n- tty: ldsic: fix tty_ldisc_autoload sysctl's proc_handler (git-fixes).\n- tty: n_gsm: Fix use-after-free in gsm_cleanup_mux (stable-fixes).\n- u64_stats: fix u64_stats_init() for lockdep when used repeatedly in one file (git-fixes).\n- ubifs: Fix adding orphan entry twice for the same inode (git-fixes).\n- ubifs: Fix unattached xattr inode if powercut happens after deleting (git-fixes).\n- ubifs: add check for crypto_shash_tfm_digest (git-fixes).\n- ubifs: dbg_orphan_check: Fix missed key type checking (git-fixes).\n- ucounts: fix counter leak in inc_rlimit_get_ucounts() (bsc#1233460).\n- unicode: Do not special case ignorable code points (stable-fixes).\n- unicode: Fix utf8_load() error path (git-fixes).\n- uprobe: avoid out-of-bounds memory access of fetching args (git-fixes).\n- uprobes: encapsulate preparation of uprobe args buffer (git-fixes).\n- uprobes: introduce the global struct vm_special_mapping xol_mapping (bsc#1231114).\n- uprobes: turn xol_area->pages into xol_area->page (bsc#1231114).\n- usb: chipidea: udc: enable suspend interrupt after usb reset (stable-fixes).\n- usb: dwc2: Adjust the timing of USB Driver Interrupt Registration in the Crashkernel Scenario (stable-fixes).\n- usb: dwc3: Wait for EndXfer completion before restoring GUSB2PHYCFG (git-fixes).\n- usb: dwc3: core: Stop processing of pending events if controller is halted (git-fixes).\n- usb: dwc3: gadget: Add missing check for single port RAM in TxFIFO resizing logic (git-fixes).\n- usb: dwc3: gadget: Fix checking for number of TRBs left (git-fixes).\n- usb: dwc3: gadget: Fix looping of queued SG entries (git-fixes).\n- usb: ehci-spear: fix call balance of sehci clk handling routines (git-fixes).\n- usb: gadget: core: force synchronous registration (git-fixes).\n- usb: gadget: dummy_hcd: Set transfer interval to 1 microframe (stable-fixes).\n- usb: gadget: dummy_hcd: Switch to hrtimer transfer scheduler (stable-fixes).\n- usb: gadget: dummy_hcd: execute hrtimer callback in softirq context (git-fixes).\n- usb: gadget: f_uac2: Replace snprintf() with the safer scnprintf() variant (stable-fixes).\n- usb: gadget: f_uac2: fix non-newline-terminated function name (stable-fixes).\n- usb: gadget: f_uac2: fix return value for UAC2_ATTRIBUTE_STRING store (git-fixes).\n- usb: musb: Fix hardware lockup on first Rx endpoint request (git-fixes).\n- usb: musb: sunxi: Fix accessing an released usb phy (git-fixes).\n- usb: phy: Fix API devm_usb_put_phy() can not release the phy (git-fixes).\n- usb: storage: ignore bogus device raised by JieLi BR21 USB sound chip (stable-fixes).\n- usb: typec: altmode should keep reference to parent (git-fixes).\n- usb: typec: fix potential out of bounds in ucsi_ccg_update_set_new_cam_cmd() (git-fixes).\n- usb: typec: fix unreleased fwnode_handle in typec_port_register_altmodes() (git-fixes).\n- usb: using mutex lock and supporting O_NONBLOCK flag in iowarrior_read() (git-fixes).\n- usb: xhci: Fix TD invalidation under pending Set TR Dequeue (git-fixes).\n- usb: xhci: Fix problem with xhci resume from suspend (stable-fixes).\n- usb: xhci: fix loss of data on Cadence xHC (git-fixes).\n- usb: yurex: make waiting on yurex_write interruptible (git-fixes).\n- usbip: tools: Fix detach_port() invalid port error path (git-fixes).\n- usbnet: fix cyclical race on disconnect with work queue (git-fixes).\n- vdpa: Fix an error handling path in eni_vdpa_probe() (git-fixes).\n- vdpa_sim_blk: Fix the potential leak of mgmt_dev (git-fixes).\n- vdpa_sim_blk: allocate the buffer zeroed (git-fixes).\n- vduse: avoid using __GFP_NOFAIL (git-fixes).\n- vfs: dcache: move hashlen_hash() from callers into d_hash() (git-fixes).\n- vhost/scsi: null-ptr-dereference in vhost_scsi_get_req() (git-fixes).\n- vhost_vdpa: assign irq bypass producer token correctly (git-fixes).\n- virtio_console: fix misc probe bugs (git-fixes).\n- vmalloc: modify the alloc_vmap_area() error message for better diagnostics (jsc#PED-10978).\n- vmxnet3: Add XDP support (bsc#1226498).\n- vmxnet3: Fix missing reserved tailroom (bsc#1226498).\n- vmxnet3: Fix packet corruption in vmxnet3_xdp_xmit_frame (bsc#1226498).\n- vmxnet3: add command to allow disabling of offloads (bsc#1226498).\n- vmxnet3: add latency measurement support in vmxnet3 (bsc#1226498).\n- vmxnet3: prepare for version 9 changes (bsc#1226498).\n- vmxnet3: update to version 9 (bsc#1226498).\n- vsock: Update msg_count on read_skb() (git-fixes).\n- vt: prevent kernel-infoleak in con_font_get() (git-fixes).\n- watchdog: apple: Actually flush writes after requesting watchdog restart (git-fixes).\n- watchdog: mediatek: Make sure system reset gets asserted in mtk_wdt_restart() (git-fixes).\n- watchdog: rti: of: honor timeout-sec property (git-fixes).\n- wifi: ath10k: Fix memory leak in management tx (git-fixes).\n- wifi: ath10k: fix invalid VHT parameters in supported_vht_mcs_rate_nss1 (git-fixes).\n- wifi: ath10k: fix invalid VHT parameters in supported_vht_mcs_rate_nss2 (git-fixes).\n- wifi: ath11k: Fix CE offset address calculation for WCN6750 in SSR (git-fixes).\n- wifi: ath11k: Fix invalid ring usage in full monitor mode (git-fixes).\n- wifi: ath11k: fix array out-of-bound access in SoC stats (stable-fixes).\n- wifi: ath12k: Skip Rx TID cleanup for self peer (git-fixes).\n- wifi: ath12k: fix array out-of-bound access in SoC stats (stable-fixes).\n- wifi: ath12k: fix crash when unbinding (git-fixes).\n- wifi: ath12k: fix warning when unbinding (git-fixes).\n- wifi: ath12k: remove msdu_end structure for WCN7850 (git-fixes).\n- wifi: ath9k: add range check for conn_rsp_epid in htc_connect_service() (git-fixes).\n- wifi: ath9k: fix possible integer overflow in ath9k_get_et_stats() (stable-fixes).\n- wifi: ath9k_htc: Use __skb_set_length() for resetting urb before resubmit (stable-fixes).\n- wifi: brcm80211: BRCM_TRACING should depend on TRACING (git-fixes).\n- wifi: brcmfmac: release 'root' node in all execution paths (git-fixes).\n- wifi: cfg80211: Set correct chandef when starting CAC (stable-fixes).\n- wifi: cfg80211: clear wdev->cqm_config pointer on free (git-fixes).\n- wifi: cw1200: Fix potential NULL dereference (git-fixes).\n- wifi: iwlegacy: Clear stale interrupts before resuming device (stable-fixes).\n- wifi: iwlegacy: Fix 'field-spanning write' warning in il_enqueue_hcmd() (git-fixes).\n- wifi: iwlwifi: allow only CN mcc from WRDD (stable-fixes).\n- wifi: iwlwifi: config: label 'gl' devices as discrete (git-fixes).\n- wifi: iwlwifi: mvm: Fix a race in scan abort flow (stable-fixes).\n- wifi: iwlwifi: mvm: Fix response handling in iwl_mvm_send_recovery_cmd() (git-fixes).\n- wifi: iwlwifi: mvm: avoid NULL pointer dereference (stable-fixes).\n- wifi: iwlwifi: mvm: do not add default link in fw restart flow (git-fixes).\n- wifi: iwlwifi: mvm: do not leak a link on AP removal (git-fixes).\n- wifi: iwlwifi: mvm: drop wrong STA selection in TX (stable-fixes).\n- wifi: iwlwifi: mvm: use correct key iteration (stable-fixes).\n- wifi: iwlwifi: remove AX101, AX201 and AX203 support from LNL (stable-fixes).\n- wifi: mac80211: do not pass a stopped vif to the driver in .get_txpower (git-fixes).\n- wifi: mac80211: fix RCU list iterations (stable-fixes).\n- wifi: mac80211: skip non-uploaded keys in ieee80211_iter_keys (git-fixes).\n- wifi: mt76: mt7915: add dummy HW offload of IEEE 802.11 fragmentation (stable-fixes).\n- wifi: mt76: mt7915: disable tx worker during tx BA session enable/disable (stable-fixes).\n- wifi: mt76: mt7915: hold dev->mt76.mutex while disabling tx worker (stable-fixes).\n- wifi: mwifiex: Fix memcpy() field-spanning write warning in mwifiex_cmd_802_11_scan_ext() (stable-fixes).\n- wifi: mwifiex: Fix memcpy() field-spanning write warning in mwifiex_config_scan() (git-fixes).\n- wifi: mwifiex: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).\n- wifi: p54: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).\n- wifi: rtw88: 8821cu: Remove VID/PID 0bda:c82c (stable-fixes).\n- wifi: rtw88: Fix USB/SDIO devices not transmitting beacons (git-fixes).\n- wifi: rtw88: select WANT_DEV_COREDUMP (stable-fixes).\n- wifi: rtw89: avoid reading out of bounds when loading TX power FW elements (stable-fixes).\n- wifi: rtw89: avoid to add interface to list twice when SER (stable-fixes).\n- wifi: rtw89: correct base HT rate mask for firmware (stable-fixes).\n- wifi: wfx: Fix error handling in wfx_core_init() (git-fixes).\n- x86/CPU/AMD: Clear virtualized VMLOAD/VMSAVE on Zen4 client (bsc#1233443).\n- x86/CPU/AMD: Only apply Zenbleed fix for Zen2 during late microcode load (git-fixes).\n- x86/Documentation: Indent 'note::' directive for protocol version number note (git-fixes).\n- x86/PCI: Check pcie_find_root_port() return for NULL (git-fixes).\n- x86/amd_nb: Add new PCI IDs for AMD family 1Ah model 60h (git-fixes).\n- x86/apic: Always explicitly disarm TSC-deadline timer (git-fixes).\n- x86/apic: Make x2apic_disable() work correctly (git-fixes).\n- x86/bugs: Do not use UNTRAIN_RET with IBPB on entry (git-fixes).\n- x86/bugs: Skip RSB fill at VMEXIT (git-fixes).\n- x86/cpufeatures: Add a IBPB_NO_RET BUG flag (git-fixes).\n- x86/cpufeatures: Define X86_FEATURE_AMD_IBPB_RET (git-fixes).\n- x86/entry: Have entry_ibpb() invalidate return predictions (git-fixes).\n- x86/entry: Remove unwanted instrumentation in common_interrupt() (git-fixes).\n- x86/hyperv: Set X86_FEATURE_TSC_KNOWN_FREQ when Hyper-V provides frequency (git-fixes).\n- x86/microcode/intel: Remove unnecessary cache writeback and invalidation (git-fixes).\n- x86/mm: Use IPIs to synchronize LAM enablement (git-fixes).\n- x86/resctrl: Annotate get_mem_config() functions as __init (git-fixes).\n- x86/resctrl: Avoid overflow in MB settings in bw_validate() (git-fixes).\n- x86/resctrl: Remove hard-coded memory bandwidth limit (git-fixes).\n- x86/sev: Check for MWAITX and MONITORX opcodes in the #VC handler (git-fixes).\n- x86/syscall: Avoid memcpy() for ia32 syscall_get_arguments() (git-fixes).\n- x86/tdx: Dynamically disable SEPT violations from causing #VEs (git-fixes).\n- x86/tdx: Enable CPU topology enumeration (git-fixes).\n- x86/tdx: Introduce wrappers to read and write TD metadata (git-fixes).\n- x86/tdx: Rename tdx_parse_tdinfo() to tdx_setup() (git-fixes).\n- x86/traps: move kmsan check after instrumentation_begin (git-fixes).\n- x86: Increase brk randomness entropy for 64-bit systems (git-fixes).\n- x86: do the user address masking outside the user access area (git-fixes).\n- x86: fix off-by-one in access_ok() (git-fixes).\n- x86: fix user address masking non-canonical speculation issue (git-fixes).\n- x86: make the masked_user_access_begin() macro use its argument only once (git-fixes).\n- x86: support user address masking instead of non-speculative conditional (git-fixes).\n- xfrm: Export symbol xfrm_dev_state_delete (bsc#1233754).\n- xfrm: Fix unregister netdevice hang on hardware offload (bsc#1233754).\n- xfs: check opcode and iovec count match in xlog_recover_attri_commit_pass2 (git-fixes).\n- xfs: check shortform attr entry flags specifically (git-fixes).\n- xfs: convert delayed extents to unwritten when zeroing post eof blocks (git-fixes).\n- xfs: fix finding a last resort AG in xfs_filestream_pick_ag (git-fixes).\n- xfs: fix freeing speculative preallocations for preallocated files (git-fixes).\n- xfs: make sure sb_fdblocks is non-negative (git-fixes).\n- xfs: make the seq argument to xfs_bmapi_convert_delalloc() optional (git-fixes).\n- xfs: make xfs_bmapi_convert_delalloc() to allocate the target offset (git-fixes).\n- xfs: remove a racy if_bytes check in xfs_reflink_end_cow_extent (git-fixes).\n- xfs: validate recovered name buffers when recovering xattr items (git-fixes).\n- xhci: Add a quirk for writing ERST in high-low order (git-fixes).\n- xhci: Fix Link TRB DMA in command ring stopped completion event (git-fixes).\n- xhci: Fix incorrect stream context type macro (git-fixes).\n- xhci: Mitigate failed set dequeue pointer commands (git-fixes).\n- xhci: Use pm_runtime_get to prevent RPM on unsupported systems (git-fixes).\n- xhci: tegra: fix checked USB2 port number (git-fixes).\n- zonefs: Improve error handling (git-fixes).\n","id":"SUSE-SU-2024:4318-1","modified":"2024-12-13T15:33:38Z","published":"2024-12-13T15:33:38Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2024/suse-su-20244318-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1012628"},{"type":"REPORT","url":"https://bugzilla.suse.com/1065729"},{"type":"REPORT","url":"https://bugzilla.suse.com/1082555"},{"type":"REPORT","url":"https://bugzilla.suse.com/1194869"},{"type":"REPORT","url":"https://bugzilla.suse.com/1215199"},{"type":"REPORT","url":"https://bugzilla.suse.com/1217845"},{"type":"REPORT","url":"https://bugzilla.suse.com/1218562"},{"type":"REPORT","url":"https://bugzilla.suse.com/1218644"},{"type":"REPORT","url":"https://bugzilla.suse.com/1219596"},{"type":"REPORT","url":"https://bugzilla.suse.com/1219803"},{"type":"REPORT","url":"https://bugzilla.suse.com/1220355"},{"type":"REPORT","url":"https://bugzilla.suse.com/1220382"},{"type":"REPORT","url":"https://bugzilla.suse.com/1221309"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222423"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222587"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222590"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223112"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223384"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223656"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223700"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223733"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223824"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223848"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224088"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224429"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224518"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224548"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224574"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224948"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225611"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225713"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225725"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225730"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225742"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225764"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225768"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225813"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225903"},{"type":"REPORT","url":"https://bugzilla.suse.com/1226003"},{"type":"REPORT","url":"https://bugzilla.suse.com/1226130"},{"type":"REPORT","url":"https://bugzilla.suse.com/1226498"},{"type":"REPORT","url":"https://bugzilla.suse.com/1226623"},{"type":"REPORT","url":"https://bugzilla.suse.com/1226631"},{"type":"REPORT","url":"https://bugzilla.suse.com/1226748"},{"type":"REPORT","url":"https://bugzilla.suse.com/1226797"},{"type":"REPORT","url":"https://bugzilla.suse.com/1226848"},{"type":"REPORT","url":"https://bugzilla.suse.com/1226872"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227726"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227842"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228119"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228244"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228269"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228410"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228430"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228454"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228537"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228620"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228743"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228747"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228850"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228857"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229019"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229165"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229429"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229450"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229585"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229677"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229769"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229808"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229891"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230055"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230132"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230179"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230220"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230231"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230289"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230295"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230339"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230341"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230375"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230414"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230429"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230456"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230501"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230527"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230550"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230557"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230558"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230600"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230620"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230710"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230733"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230762"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230763"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230773"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230774"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230801"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230807"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230817"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230827"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230831"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230914"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230918"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230971"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231016"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231035"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231072"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231073"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231075"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231076"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231081"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231082"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231083"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231084"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231085"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231087"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231089"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231092"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231093"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231094"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231096"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231098"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231100"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231101"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231102"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231105"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231108"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231111"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231114"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231115"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231116"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231117"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231131"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231132"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231135"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231136"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231138"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231148"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231169"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231170"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231171"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231178"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231179"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231182"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231183"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231187"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231191"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231193"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231195"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231197"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231200"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231202"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231203"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231276"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231293"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231384"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231434"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231435"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231436"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231439"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231440"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231441"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231442"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231452"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231453"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231465"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231474"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231481"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231496"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231502"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231537"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231539"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231540"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231541"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231617"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231630"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231634"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231635"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231636"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231637"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231638"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231639"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231640"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231673"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231828"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231849"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231855"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231856"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231857"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231858"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231859"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231860"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231861"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231864"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231865"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231868"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231869"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231871"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231872"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231901"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231902"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231903"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231904"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231906"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231907"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231908"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231914"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231916"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231920"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231924"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231926"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231930"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231931"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231935"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231942"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231944"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231946"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231947"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231950"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231951"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231952"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231953"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231954"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231955"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231956"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231957"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231965"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231967"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231968"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231987"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231988"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231989"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231990"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231998"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232000"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232003"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232009"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232013"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232015"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232016"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232017"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232018"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232033"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232034"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232036"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232043"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232047"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232048"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232049"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232050"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232056"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232075"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232076"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232079"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232080"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232083"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232084"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232085"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232089"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232090"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232093"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232094"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232096"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232097"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232098"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232103"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232104"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232105"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232109"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232111"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232114"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232116"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232117"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232124"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232126"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232127"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232129"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232130"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232131"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232132"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232134"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232135"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232140"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232141"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232142"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232145"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232147"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232148"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232149"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232151"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232152"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232154"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232155"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232156"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232157"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232159"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232160"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232162"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232164"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232165"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232166"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232174"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232180"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232182"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232183"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232185"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232187"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232189"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232192"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232195"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232196"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232198"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232199"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232200"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232201"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232207"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232208"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232217"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232218"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232220"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232221"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232222"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232224"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232232"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232250"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232251"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232253"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232254"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232255"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232256"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232258"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232259"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232260"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232262"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232263"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232264"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232272"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232275"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232279"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232282"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232285"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232287"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232295"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232305"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232307"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232309"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232310"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232312"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232313"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232314"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232315"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232316"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232317"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232318"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232329"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232332"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232333"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232334"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232335"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232337"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232339"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232340"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232342"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232345"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232349"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232352"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232354"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232355"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232357"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232358"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232359"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232361"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232362"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232366"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232367"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232368"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232369"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232370"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232371"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232374"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232378"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232381"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232383"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232385"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232386"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232387"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232392"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232394"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232395"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232396"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232413"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232416"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232417"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232418"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232424"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232427"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232432"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232435"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232436"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232442"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232446"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232483"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232494"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232498"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232499"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232500"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232501"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232502"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232503"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232504"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232505"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232506"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232507"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232511"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232519"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232520"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232529"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232552"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232623"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232626"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232627"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232628"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232629"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232704"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232757"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232768"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232819"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232823"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232860"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232869"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232870"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232873"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232876"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232877"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232878"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232880"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232881"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232884"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232885"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232887"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232888"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232890"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232892"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232894"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232896"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232897"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232905"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232907"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232914"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232919"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232925"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232926"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232928"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232935"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233029"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233032"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233035"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233036"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233041"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233044"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233049"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233050"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233051"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233056"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233057"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233061"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233062"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233063"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233065"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233067"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233070"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233073"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233074"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233088"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233091"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233092"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233097"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233100"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233103"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233104"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233105"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233106"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233107"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233108"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233110"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233111"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233113"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233114"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233115"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233117"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233119"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233123"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233125"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233127"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233129"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233130"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233132"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233135"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233176"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233179"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233185"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233188"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233189"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233191"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233193"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233197"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233201"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233203"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233205"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233206"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233207"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233208"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233209"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233210"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233211"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233212"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233216"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233217"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233219"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233226"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233238"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233241"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233244"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233253"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233255"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233293"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233298"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233305"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233320"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233350"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233443"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233452"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233453"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233454"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233456"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233457"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233458"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233460"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233462"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233463"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233464"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233465"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233468"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233471"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233476"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233478"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233479"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233481"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233484"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233485"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233487"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233490"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233491"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233523"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233524"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233540"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233547"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233548"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233550"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233552"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233553"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233554"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233555"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233557"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233560"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233561"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233564"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233566"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233567"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233568"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233570"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233572"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233573"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233577"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233580"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233640"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233641"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233642"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233721"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233754"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233756"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233769"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233771"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233977"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234009"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234011"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234012"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234025"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234039"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234040"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234041"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234042"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234043"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234044"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234045"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234046"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234072"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234078"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234081"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234083"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234085"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234087"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234093"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234098"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234108"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234121"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234223"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52766"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52778"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52800"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52881"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52917"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52918"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52919"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52920"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52921"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52922"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-6270"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26596"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26703"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26741"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26758"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26761"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26767"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26782"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26864"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26943"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26953"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-27017"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-27026"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-27043"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-27407"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-35888"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-35980"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-36000"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-36031"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-36244"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-36484"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-36883"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-36886"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-36905"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-36920"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-36927"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-36954"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-36968"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-38576"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-38577"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-38589"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-38599"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-40914"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41016"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41023"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41031"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41047"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41082"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42102"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42145"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-44932"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-44958"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-44964"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-44995"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-45016"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-45025"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46678"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46680"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46681"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46721"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46754"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46765"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46766"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46770"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46775"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46777"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46788"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46797"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46800"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46802"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46803"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46804"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46805"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46806"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46807"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46809"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46810"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46811"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46812"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46813"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46814"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46815"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46816"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46817"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46818"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46819"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46821"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46825"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46826"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46827"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46828"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46830"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46831"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46834"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46835"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46836"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46840"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46841"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46842"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46843"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46845"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46846"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46848"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46849"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46851"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46852"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46853"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46854"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46855"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46857"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46859"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46860"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46861"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46864"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46870"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46871"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47658"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47660"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47661"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47662"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47663"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47664"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47665"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47666"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47667"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47668"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47669"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47670"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47671"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47672"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47673"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47674"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47675"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47679"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47681"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47682"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47684"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47685"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47686"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47687"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47688"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47692"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47693"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47695"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47696"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47697"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47698"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47699"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47701"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47702"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47703"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47704"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47705"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47706"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47707"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47709"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47710"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47712"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47713"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47714"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47715"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47718"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47719"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47720"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47723"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47727"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47728"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47730"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47731"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47732"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47735"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47737"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47738"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47739"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47741"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47742"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47743"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47744"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47745"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47747"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47748"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47749"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47750"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47751"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47752"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47753"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47754"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47756"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47757"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49850"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49851"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49852"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49853"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49855"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49858"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49860"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49861"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49862"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49863"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49864"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49866"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49867"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49868"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49870"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49871"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49874"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49875"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49877"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49878"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49879"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49881"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49882"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49883"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49884"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49886"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49888"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49890"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49891"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49892"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49894"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49895"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49896"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49897"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49898"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49899"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49900"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49901"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49902"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49903"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49905"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49906"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49907"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49908"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49909"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49911"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49912"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49913"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49914"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49917"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49918"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49919"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49920"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49921"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49922"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49923"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49925"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49928"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49929"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49930"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49931"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49933"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49934"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49935"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49936"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49937"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49938"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49939"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49944"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49945"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49946"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49947"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49949"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49950"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49952"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49953"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49954"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49955"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49957"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49958"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49959"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49960"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49961"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49962"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49963"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49965"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49966"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49967"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49968"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49969"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49972"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49973"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49974"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49975"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49976"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49981"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49982"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49983"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49985"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49986"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49987"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49989"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49991"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49993"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49995"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49996"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50000"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50001"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50002"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50003"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50004"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50006"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50007"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50008"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50009"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50012"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50013"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50014"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50015"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50017"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50019"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50020"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50021"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50022"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50023"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50024"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50025"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50026"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50027"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50028"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50031"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50033"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50035"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50040"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50041"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50042"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50044"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50045"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50046"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50047"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50048"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50049"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50055"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50058"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50059"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50060"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50061"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50062"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50063"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50064"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50067"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50069"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50073"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50074"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50075"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50076"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50077"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50078"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50080"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50081"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50082"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50084"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50087"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50088"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50089"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50093"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50095"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50096"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50098"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50099"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50100"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50101"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50102"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50103"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50108"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50110"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50115"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50116"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50117"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50121"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50124"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50125"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50127"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50128"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50130"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50131"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50134"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50135"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50136"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50138"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50139"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50141"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50145"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50146"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50147"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50148"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50150"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50153"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50154"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50155"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50156"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50157"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50158"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50159"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50160"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50166"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50167"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50169"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50171"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50172"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50175"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50176"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50177"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50179"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50180"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50181"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50182"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50183"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50184"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50186"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50187"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50188"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50189"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50192"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50194"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50195"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50196"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50198"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50200"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50201"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50205"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50208"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50209"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50210"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50215"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50216"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50218"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50221"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50224"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50225"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50229"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50230"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50231"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50232"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50233"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50234"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50235"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50236"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50237"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50240"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50245"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50246"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50248"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50249"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50250"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50252"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50255"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50257"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50261"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50264"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50265"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50267"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50268"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50269"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50271"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50273"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50274"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50275"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50276"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50279"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50282"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50287"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50289"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50290"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50292"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50295"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50296"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50298"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50301"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50302"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53042"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53043"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53045"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53048"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53051"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53052"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53055"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53056"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53058"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53059"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53060"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53061"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53063"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53066"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53068"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53072"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53074"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53076"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53079"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53081"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53082"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53085"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53088"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53093"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53094"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53095"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53096"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53100"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53101"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53104"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53106"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53108"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53110"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53112"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53114"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53121"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53138"}],"related":["CVE-2023-52766","CVE-2023-52778","CVE-2023-52800","CVE-2023-52881","CVE-2023-52917","CVE-2023-52918","CVE-2023-52919","CVE-2023-52920","CVE-2023-52921","CVE-2023-52922","CVE-2023-6270","CVE-2024-26596","CVE-2024-26703","CVE-2024-26741","CVE-2024-26758","CVE-2024-26761","CVE-2024-26767","CVE-2024-26782","CVE-2024-26864","CVE-2024-26943","CVE-2024-26953","CVE-2024-27017","CVE-2024-27026","CVE-2024-27043","CVE-2024-27407","CVE-2024-35888","CVE-2024-35980","CVE-2024-36000","CVE-2024-36031","CVE-2024-36244","CVE-2024-36484","CVE-2024-36883","CVE-2024-36886","CVE-2024-36905","CVE-2024-36920","CVE-2024-36927","CVE-2024-36954","CVE-2024-36968","CVE-2024-38576","CVE-2024-38577","CVE-2024-38589","CVE-2024-38599","CVE-2024-40914","CVE-2024-41016","CVE-2024-41023","CVE-2024-41031","CVE-2024-41047","CVE-2024-41082","CVE-2024-42102","CVE-2024-42145","CVE-2024-44932","CVE-2024-44958","CVE-2024-44964","CVE-2024-44995","CVE-2024-45016","CVE-2024-45025","CVE-2024-46678","CVE-2024-46680","CVE-2024-46681","CVE-2024-46721","CVE-2024-46754","CVE-2024-46765","CVE-2024-46766","CVE-2024-46770","CVE-2024-46775","CVE-2024-46777","CVE-2024-46788","CVE-2024-46797","CVE-2024-46800","CVE-2024-46802","CVE-2024-46803","CVE-2024-46804","CVE-2024-46805","CVE-2024-46806","CVE-2024-46807","CVE-2024-46809","CVE-2024-46810","CVE-2024-46811","CVE-2024-46812","CVE-2024-46813","CVE-2024-46814","CVE-2024-46815","CVE-2024-46816","CVE-2024-46817","CVE-2024-46818","CVE-2024-46819","CVE-2024-46821","CVE-2024-46825","CVE-2024-46826","CVE-2024-46827","CVE-2024-46828","CVE-2024-46830","CVE-2024-46831","CVE-2024-46834","CVE-2024-46835","CVE-2024-46836","CVE-2024-46840","CVE-2024-46841","CVE-2024-46842","CVE-2024-46843","CVE-2024-46845","CVE-2024-46846","CVE-2024-46848","CVE-2024-46849","CVE-2024-46851","CVE-2024-46852","CVE-2024-46853","CVE-2024-46854","CVE-2024-46855","CVE-2024-46857","CVE-2024-46859","CVE-2024-46860","CVE-2024-46861","CVE-2024-46864","CVE-2024-46870","CVE-2024-46871","CVE-2024-47658","CVE-2024-47660","CVE-2024-47661","CVE-2024-47662","CVE-2024-47663","CVE-2024-47664","CVE-2024-47665","CVE-2024-47666","CVE-2024-47667","CVE-2024-47668","CVE-2024-47669","CVE-2024-47670","CVE-2024-47671","CVE-2024-47672","CVE-2024-47673","CVE-2024-47674","CVE-2024-47675","CVE-2024-47679","CVE-2024-47681","CVE-2024-47682","CVE-2024-47684","CVE-2024-47685","CVE-2024-47686","CVE-2024-47687","CVE-2024-47688","CVE-2024-47692","CVE-2024-47693","CVE-2024-47695","CVE-2024-47696","CVE-2024-47697","CVE-2024-47698","CVE-2024-47699","CVE-2024-47701","CVE-2024-47702","CVE-2024-47703","CVE-2024-47704","CVE-2024-47705","CVE-2024-47706","CVE-2024-47707","CVE-2024-47709","CVE-2024-47710","CVE-2024-47712","CVE-2024-47713","CVE-2024-47714","CVE-2024-47715","CVE-2024-47718","CVE-2024-47719","CVE-2024-47720","CVE-2024-47723","CVE-2024-47727","CVE-2024-47728","CVE-2024-47730","CVE-2024-47731","CVE-2024-47732","CVE-2024-47735","CVE-2024-47737","CVE-2024-47738","CVE-2024-47739","CVE-2024-47741","CVE-2024-47742","CVE-2024-47743","CVE-2024-47744","CVE-2024-47745","CVE-2024-47747","CVE-2024-47748","CVE-2024-47749","CVE-2024-47750","CVE-2024-47751","CVE-2024-47752","CVE-2024-47753","CVE-2024-47754","CVE-2024-47756","CVE-2024-47757","CVE-2024-49850","CVE-2024-49851","CVE-2024-49852","CVE-2024-49853","CVE-2024-49855","CVE-2024-49858","CVE-2024-49860","CVE-2024-49861","CVE-2024-49862","CVE-2024-49863","CVE-2024-49864","CVE-2024-49866","CVE-2024-49867","CVE-2024-49868","CVE-2024-49870","CVE-2024-49871","CVE-2024-49874","CVE-2024-49875","CVE-2024-49877","CVE-2024-49878","CVE-2024-49879","CVE-2024-49881","CVE-2024-49882","CVE-2024-49883","CVE-2024-49884","CVE-2024-49886","CVE-2024-49888","CVE-2024-49890","CVE-2024-49891","CVE-2024-49892","CVE-2024-49894","CVE-2024-49895","CVE-2024-49896","CVE-2024-49897","CVE-2024-49898","CVE-2024-49899","CVE-2024-49900","CVE-2024-49901","CVE-2024-49902","CVE-2024-49903","CVE-2024-49905","CVE-2024-49906","CVE-2024-49907","CVE-2024-49908","CVE-2024-49909","CVE-2024-49911","CVE-2024-49912","CVE-2024-49913","CVE-2024-49914","CVE-2024-49917","CVE-2024-49918","CVE-2024-49919","CVE-2024-49920","CVE-2024-49921","CVE-2024-49922","CVE-2024-49923","CVE-2024-49925","CVE-2024-49928","CVE-2024-49929","CVE-2024-49930","CVE-2024-49931","CVE-2024-49933","CVE-2024-49934","CVE-2024-49935","CVE-2024-49936","CVE-2024-49937","CVE-2024-49938","CVE-2024-49939","CVE-2024-49944","CVE-2024-49945","CVE-2024-49946","CVE-2024-49947","CVE-2024-49949","CVE-2024-49950","CVE-2024-49952","CVE-2024-49953","CVE-2024-49954","CVE-2024-49955","CVE-2024-49957","CVE-2024-49958","CVE-2024-49959","CVE-2024-49960","CVE-2024-49961","CVE-2024-49962","CVE-2024-49963","CVE-2024-49965","CVE-2024-49966","CVE-2024-49967","CVE-2024-49968","CVE-2024-49969","CVE-2024-49972","CVE-2024-49973","CVE-2024-49974","CVE-2024-49975","CVE-2024-49976","CVE-2024-49981","CVE-2024-49982","CVE-2024-49983","CVE-2024-49985","CVE-2024-49986","CVE-2024-49987","CVE-2024-49989","CVE-2024-49991","CVE-2024-49993","CVE-2024-49995","CVE-2024-49996","CVE-2024-50000","CVE-2024-50001","CVE-2024-50002","CVE-2024-50003","CVE-2024-50004","CVE-2024-50006","CVE-2024-50007","CVE-2024-50008","CVE-2024-50009","CVE-2024-50012","CVE-2024-50013","CVE-2024-50014","CVE-2024-50015","CVE-2024-50017","CVE-2024-50019","CVE-2024-50020","CVE-2024-50021","CVE-2024-50022","CVE-2024-50023","CVE-2024-50024","CVE-2024-50025","CVE-2024-50026","CVE-2024-50027","CVE-2024-50028","CVE-2024-50031","CVE-2024-50033","CVE-2024-50035","CVE-2024-50040","CVE-2024-50041","CVE-2024-50042","CVE-2024-50044","CVE-2024-50045","CVE-2024-50046","CVE-2024-50047","CVE-2024-50048","CVE-2024-50049","CVE-2024-50055","CVE-2024-50058","CVE-2024-50059","CVE-2024-50060","CVE-2024-50061","CVE-2024-50062","CVE-2024-50063","CVE-2024-50064","CVE-2024-50067","CVE-2024-50069","CVE-2024-50073","CVE-2024-50074","CVE-2024-50075","CVE-2024-50076","CVE-2024-50077","CVE-2024-50078","CVE-2024-50080","CVE-2024-50081","CVE-2024-50082","CVE-2024-50084","CVE-2024-50087","CVE-2024-50088","CVE-2024-50089","CVE-2024-50093","CVE-2024-50095","CVE-2024-50096","CVE-2024-50098","CVE-2024-50099","CVE-2024-50100","CVE-2024-50101","CVE-2024-50102","CVE-2024-50103","CVE-2024-50108","CVE-2024-50110","CVE-2024-50115","CVE-2024-50116","CVE-2024-50117","CVE-2024-50121","CVE-2024-50124","CVE-2024-50125","CVE-2024-50127","CVE-2024-50128","CVE-2024-50130","CVE-2024-50131","CVE-2024-50134","CVE-2024-50135","CVE-2024-50136","CVE-2024-50138","CVE-2024-50139","CVE-2024-50141","CVE-2024-50145","CVE-2024-50146","CVE-2024-50147","CVE-2024-50148","CVE-2024-50150","CVE-2024-50153","CVE-2024-50154","CVE-2024-50155","CVE-2024-50156","CVE-2024-50157","CVE-2024-50158","CVE-2024-50159","CVE-2024-50160","CVE-2024-50166","CVE-2024-50167","CVE-2024-50169","CVE-2024-50171","CVE-2024-50172","CVE-2024-50175","CVE-2024-50176","CVE-2024-50177","CVE-2024-50179","CVE-2024-50180","CVE-2024-50181","CVE-2024-50182","CVE-2024-50183","CVE-2024-50184","CVE-2024-50186","CVE-2024-50187","CVE-2024-50188","CVE-2024-50189","CVE-2024-50192","CVE-2024-50194","CVE-2024-50195","CVE-2024-50196","CVE-2024-50198","CVE-2024-50200","CVE-2024-50201","CVE-2024-50205","CVE-2024-50208","CVE-2024-50209","CVE-2024-50210","CVE-2024-50215","CVE-2024-50216","CVE-2024-50218","CVE-2024-50221","CVE-2024-50224","CVE-2024-50225","CVE-2024-50229","CVE-2024-50230","CVE-2024-50231","CVE-2024-50232","CVE-2024-50233","CVE-2024-50234","CVE-2024-50235","CVE-2024-50236","CVE-2024-50237","CVE-2024-50240","CVE-2024-50245","CVE-2024-50246","CVE-2024-50248","CVE-2024-50249","CVE-2024-50250","CVE-2024-50252","CVE-2024-50255","CVE-2024-50257","CVE-2024-50261","CVE-2024-50264","CVE-2024-50265","CVE-2024-50267","CVE-2024-50268","CVE-2024-50269","CVE-2024-50271","CVE-2024-50273","CVE-2024-50274","CVE-2024-50275","CVE-2024-50276","CVE-2024-50279","CVE-2024-50282","CVE-2024-50287","CVE-2024-50289","CVE-2024-50290","CVE-2024-50292","CVE-2024-50295","CVE-2024-50296","CVE-2024-50298","CVE-2024-50301","CVE-2024-50302","CVE-2024-53042","CVE-2024-53043","CVE-2024-53045","CVE-2024-53048","CVE-2024-53051","CVE-2024-53052","CVE-2024-53055","CVE-2024-53056","CVE-2024-53058","CVE-2024-53059","CVE-2024-53060","CVE-2024-53061","CVE-2024-53063","CVE-2024-53066","CVE-2024-53068","CVE-2024-53072","CVE-2024-53074","CVE-2024-53076","CVE-2024-53079","CVE-2024-53081","CVE-2024-53082","CVE-2024-53085","CVE-2024-53088","CVE-2024-53093","CVE-2024-53094","CVE-2024-53095","CVE-2024-53096","CVE-2024-53100","CVE-2024-53101","CVE-2024-53104","CVE-2024-53106","CVE-2024-53108","CVE-2024-53110","CVE-2024-53112","CVE-2024-53114","CVE-2024-53121","CVE-2024-53138"],"summary":"Security update for the Linux Kernel","upstream":["CVE-2023-52766","CVE-2023-52778","CVE-2023-52800","CVE-2023-52881","CVE-2023-52917","CVE-2023-52918","CVE-2023-52919","CVE-2023-52920","CVE-2023-52921","CVE-2023-52922","CVE-2023-6270","CVE-2024-26596","CVE-2024-26703","CVE-2024-26741","CVE-2024-26758","CVE-2024-26761","CVE-2024-26767","CVE-2024-26782","CVE-2024-26864","CVE-2024-26943","CVE-2024-26953","CVE-2024-27017","CVE-2024-27026","CVE-2024-27043","CVE-2024-27407","CVE-2024-35888","CVE-2024-35980","CVE-2024-36000","CVE-2024-36031","CVE-2024-36244","CVE-2024-36484","CVE-2024-36883","CVE-2024-36886","CVE-2024-36905","CVE-2024-36920","CVE-2024-36927","CVE-2024-36954","CVE-2024-36968","CVE-2024-38576","CVE-2024-38577","CVE-2024-38589","CVE-2024-38599","CVE-2024-40914","CVE-2024-41016","CVE-2024-41023","CVE-2024-41031","CVE-2024-41047","CVE-2024-41082","CVE-2024-42102","CVE-2024-42145","CVE-2024-44932","CVE-2024-44958","CVE-2024-44964","CVE-2024-44995","CVE-2024-45016","CVE-2024-45025","CVE-2024-46678","CVE-2024-46680","CVE-2024-46681","CVE-2024-46721","CVE-2024-46754","CVE-2024-46765","CVE-2024-46766","CVE-2024-46770","CVE-2024-46775","CVE-2024-46777","CVE-2024-46788","CVE-2024-46797","CVE-2024-46800","CVE-2024-46802","CVE-2024-46803","CVE-2024-46804","CVE-2024-46805","CVE-2024-46806","CVE-2024-46807","CVE-2024-46809","CVE-2024-46810","CVE-2024-46811","CVE-2024-46812","CVE-2024-46813","CVE-2024-46814","CVE-2024-46815","CVE-2024-46816","CVE-2024-46817","CVE-2024-46818","CVE-2024-46819","CVE-2024-46821","CVE-2024-46825","CVE-2024-46826","CVE-2024-46827","CVE-2024-46828","CVE-2024-46830","CVE-2024-46831","CVE-2024-46834","CVE-2024-46835","CVE-2024-46836","CVE-2024-46840","CVE-2024-46841","CVE-2024-46842","CVE-2024-46843","CVE-2024-46845","CVE-2024-46846","CVE-2024-46848","CVE-2024-46849","CVE-2024-46851","CVE-2024-46852","CVE-2024-46853","CVE-2024-46854","CVE-2024-46855","CVE-2024-46857","CVE-2024-46859","CVE-2024-46860","CVE-2024-46861","CVE-2024-46864","CVE-2024-46870","CVE-2024-46871","CVE-2024-47658","CVE-2024-47660","CVE-2024-47661","CVE-2024-47662","CVE-2024-47663","CVE-2024-47664","CVE-2024-47665","CVE-2024-47666","CVE-2024-47667","CVE-2024-47668","CVE-2024-47669","CVE-2024-47670","CVE-2024-47671","CVE-2024-47672","CVE-2024-47673","CVE-2024-47674","CVE-2024-47675","CVE-2024-47679","CVE-2024-47681","CVE-2024-47682","CVE-2024-47684","CVE-2024-47685","CVE-2024-47686","CVE-2024-47687","CVE-2024-47688","CVE-2024-47692","CVE-2024-47693","CVE-2024-47695","CVE-2024-47696","CVE-2024-47697","CVE-2024-47698","CVE-2024-47699","CVE-2024-47701","CVE-2024-47702","CVE-2024-47703","CVE-2024-47704","CVE-2024-47705","CVE-2024-47706","CVE-2024-47707","CVE-2024-47709","CVE-2024-47710","CVE-2024-47712","CVE-2024-47713","CVE-2024-47714","CVE-2024-47715","CVE-2024-47718","CVE-2024-47719","CVE-2024-47720","CVE-2024-47723","CVE-2024-47727","CVE-2024-47728","CVE-2024-47730","CVE-2024-47731","CVE-2024-47732","CVE-2024-47735","CVE-2024-47737","CVE-2024-47738","CVE-2024-47739","CVE-2024-47741","CVE-2024-47742","CVE-2024-47743","CVE-2024-47744","CVE-2024-47745","CVE-2024-47747","CVE-2024-47748","CVE-2024-47749","CVE-2024-47750","CVE-2024-47751","CVE-2024-47752","CVE-2024-47753","CVE-2024-47754","CVE-2024-47756","CVE-2024-47757","CVE-2024-49850","CVE-2024-49851","CVE-2024-49852","CVE-2024-49853","CVE-2024-49855","CVE-2024-49858","CVE-2024-49860","CVE-2024-49861","CVE-2024-49862","CVE-2024-49863","CVE-2024-49864","CVE-2024-49866","CVE-2024-49867","CVE-2024-49868","CVE-2024-49870","CVE-2024-49871","CVE-2024-49874","CVE-2024-49875","CVE-2024-49877","CVE-2024-49878","CVE-2024-49879","CVE-2024-49881","CVE-2024-49882","CVE-2024-49883","CVE-2024-49884","CVE-2024-49886","CVE-2024-49888","CVE-2024-49890","CVE-2024-49891","CVE-2024-49892","CVE-2024-49894","CVE-2024-49895","CVE-2024-49896","CVE-2024-49897","CVE-2024-49898","CVE-2024-49899","CVE-2024-49900","CVE-2024-49901","CVE-2024-49902","CVE-2024-49903","CVE-2024-49905","CVE-2024-49906","CVE-2024-49907","CVE-2024-49908","CVE-2024-49909","CVE-2024-49911","CVE-2024-49912","CVE-2024-49913","CVE-2024-49914","CVE-2024-49917","CVE-2024-49918","CVE-2024-49919","CVE-2024-49920","CVE-2024-49921","CVE-2024-49922","CVE-2024-49923","CVE-2024-49925","CVE-2024-49928","CVE-2024-49929","CVE-2024-49930","CVE-2024-49931","CVE-2024-49933","CVE-2024-49934","CVE-2024-49935","CVE-2024-49936","CVE-2024-49937","CVE-2024-49938","CVE-2024-49939","CVE-2024-49944","CVE-2024-49945","CVE-2024-49946","CVE-2024-49947","CVE-2024-49949","CVE-2024-49950","CVE-2024-49952","CVE-2024-49953","CVE-2024-49954","CVE-2024-49955","CVE-2024-49957","CVE-2024-49958","CVE-2024-49959","CVE-2024-49960","CVE-2024-49961","CVE-2024-49962","CVE-2024-49963","CVE-2024-49965","CVE-2024-49966","CVE-2024-49967","CVE-2024-49968","CVE-2024-49969","CVE-2024-49972","CVE-2024-49973","CVE-2024-49974","CVE-2024-49975","CVE-2024-49976","CVE-2024-49981","CVE-2024-49982","CVE-2024-49983","CVE-2024-49985","CVE-2024-49986","CVE-2024-49987","CVE-2024-49989","CVE-2024-49991","CVE-2024-49993","CVE-2024-49995","CVE-2024-49996","CVE-2024-50000","CVE-2024-50001","CVE-2024-50002","CVE-2024-50003","CVE-2024-50004","CVE-2024-50006","CVE-2024-50007","CVE-2024-50008","CVE-2024-50009","CVE-2024-50012","CVE-2024-50013","CVE-2024-50014","CVE-2024-50015","CVE-2024-50017","CVE-2024-50019","CVE-2024-50020","CVE-2024-50021","CVE-2024-50022","CVE-2024-50023","CVE-2024-50024","CVE-2024-50025","CVE-2024-50026","CVE-2024-50027","CVE-2024-50028","CVE-2024-50031","CVE-2024-50033","CVE-2024-50035","CVE-2024-50040","CVE-2024-50041","CVE-2024-50042","CVE-2024-50044","CVE-2024-50045","CVE-2024-50046","CVE-2024-50047","CVE-2024-50048","CVE-2024-50049","CVE-2024-50055","CVE-2024-50058","CVE-2024-50059","CVE-2024-50060","CVE-2024-50061","CVE-2024-50062","CVE-2024-50063","CVE-2024-50064","CVE-2024-50067","CVE-2024-50069","CVE-2024-50073","CVE-2024-50074","CVE-2024-50075","CVE-2024-50076","CVE-2024-50077","CVE-2024-50078","CVE-2024-50080","CVE-2024-50081","CVE-2024-50082","CVE-2024-50084","CVE-2024-50087","CVE-2024-50088","CVE-2024-50089","CVE-2024-50093","CVE-2024-50095","CVE-2024-50096","CVE-2024-50098","CVE-2024-50099","CVE-2024-50100","CVE-2024-50101","CVE-2024-50102","CVE-2024-50103","CVE-2024-50108","CVE-2024-50110","CVE-2024-50115","CVE-2024-50116","CVE-2024-50117","CVE-2024-50121","CVE-2024-50124","CVE-2024-50125","CVE-2024-50127","CVE-2024-50128","CVE-2024-50130","CVE-2024-50131","CVE-2024-50134","CVE-2024-50135","CVE-2024-50136","CVE-2024-50138","CVE-2024-50139","CVE-2024-50141","CVE-2024-50145","CVE-2024-50146","CVE-2024-50147","CVE-2024-50148","CVE-2024-50150","CVE-2024-50153","CVE-2024-50154","CVE-2024-50155","CVE-2024-50156","CVE-2024-50157","CVE-2024-50158","CVE-2024-50159","CVE-2024-50160","CVE-2024-50166","CVE-2024-50167","CVE-2024-50169","CVE-2024-50171","CVE-2024-50172","CVE-2024-50175","CVE-2024-50176","CVE-2024-50177","CVE-2024-50179","CVE-2024-50180","CVE-2024-50181","CVE-2024-50182","CVE-2024-50183","CVE-2024-50184","CVE-2024-50186","CVE-2024-50187","CVE-2024-50188","CVE-2024-50189","CVE-2024-50192","CVE-2024-50194","CVE-2024-50195","CVE-2024-50196","CVE-2024-50198","CVE-2024-50200","CVE-2024-50201","CVE-2024-50205","CVE-2024-50208","CVE-2024-50209","CVE-2024-50210","CVE-2024-50215","CVE-2024-50216","CVE-2024-50218","CVE-2024-50221","CVE-2024-50224","CVE-2024-50225","CVE-2024-50229","CVE-2024-50230","CVE-2024-50231","CVE-2024-50232","CVE-2024-50233","CVE-2024-50234","CVE-2024-50235","CVE-2024-50236","CVE-2024-50237","CVE-2024-50240","CVE-2024-50245","CVE-2024-50246","CVE-2024-50248","CVE-2024-50249","CVE-2024-50250","CVE-2024-50252","CVE-2024-50255","CVE-2024-50257","CVE-2024-50261","CVE-2024-50264","CVE-2024-50265","CVE-2024-50267","CVE-2024-50268","CVE-2024-50269","CVE-2024-50271","CVE-2024-50273","CVE-2024-50274","CVE-2024-50275","CVE-2024-50276","CVE-2024-50279","CVE-2024-50282","CVE-2024-50287","CVE-2024-50289","CVE-2024-50290","CVE-2024-50292","CVE-2024-50295","CVE-2024-50296","CVE-2024-50298","CVE-2024-50301","CVE-2024-50302","CVE-2024-53042","CVE-2024-53043","CVE-2024-53045","CVE-2024-53048","CVE-2024-53051","CVE-2024-53052","CVE-2024-53055","CVE-2024-53056","CVE-2024-53058","CVE-2024-53059","CVE-2024-53060","CVE-2024-53061","CVE-2024-53063","CVE-2024-53066","CVE-2024-53068","CVE-2024-53072","CVE-2024-53074","CVE-2024-53076","CVE-2024-53079","CVE-2024-53081","CVE-2024-53082","CVE-2024-53085","CVE-2024-53088","CVE-2024-53093","CVE-2024-53094","CVE-2024-53095","CVE-2024-53096","CVE-2024-53100","CVE-2024-53101","CVE-2024-53104","CVE-2024-53106","CVE-2024-53108","CVE-2024-53110","CVE-2024-53112","CVE-2024-53114","CVE-2024-53121","CVE-2024-53138"]}