{"affected":[{"ecosystem_specific":{"binaries":[{"kernel-default":"5.14.21-150500.55.88.1","kernel-default-base":"5.14.21-150500.55.88.1.150500.6.39.4"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Micro 5.5","name":"kernel-default","purl":"pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Micro%205.5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.14.21-150500.55.88.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default":"5.14.21-150500.55.88.1","kernel-default-base":"5.14.21-150500.55.88.1.150500.6.39.4"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Micro 5.5","name":"kernel-default-base","purl":"pkg:rpm/suse/kernel-default-base&distro=SUSE%20Linux%20Enterprise%20Micro%205.5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.14.21-150500.55.88.1.150500.6.39.4"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-64kb":"5.14.21-150500.55.88.1","kernel-64kb-devel":"5.14.21-150500.55.88.1","kernel-default":"5.14.21-150500.55.88.1","kernel-default-base":"5.14.21-150500.55.88.1.150500.6.39.4","kernel-default-devel":"5.14.21-150500.55.88.1","kernel-devel":"5.14.21-150500.55.88.1","kernel-macros":"5.14.21-150500.55.88.1","kernel-zfcpdump":"5.14.21-150500.55.88.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for Basesystem 15 SP5","name":"kernel-64kb","purl":"pkg:rpm/suse/kernel-64kb&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.14.21-150500.55.88.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-64kb":"5.14.21-150500.55.88.1","kernel-64kb-devel":"5.14.21-150500.55.88.1","kernel-default":"5.14.21-150500.55.88.1","kernel-default-base":"5.14.21-150500.55.88.1.150500.6.39.4","kernel-default-devel":"5.14.21-150500.55.88.1","kernel-devel":"5.14.21-150500.55.88.1","kernel-macros":"5.14.21-150500.55.88.1","kernel-zfcpdump":"5.14.21-150500.55.88.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for Basesystem 15 SP5","name":"kernel-default","purl":"pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.14.21-150500.55.88.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-64kb":"5.14.21-150500.55.88.1","kernel-64kb-devel":"5.14.21-150500.55.88.1","kernel-default":"5.14.21-150500.55.88.1","kernel-default-base":"5.14.21-150500.55.88.1.150500.6.39.4","kernel-default-devel":"5.14.21-150500.55.88.1","kernel-devel":"5.14.21-150500.55.88.1","kernel-macros":"5.14.21-150500.55.88.1","kernel-zfcpdump":"5.14.21-150500.55.88.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for Basesystem 15 SP5","name":"kernel-default-base","purl":"pkg:rpm/suse/kernel-default-base&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.14.21-150500.55.88.1.150500.6.39.4"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-64kb":"5.14.21-150500.55.88.1","kernel-64kb-devel":"5.14.21-150500.55.88.1","kernel-default":"5.14.21-150500.55.88.1","kernel-default-base":"5.14.21-150500.55.88.1.150500.6.39.4","kernel-default-devel":"5.14.21-150500.55.88.1","kernel-devel":"5.14.21-150500.55.88.1","kernel-macros":"5.14.21-150500.55.88.1","kernel-zfcpdump":"5.14.21-150500.55.88.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for Basesystem 15 SP5","name":"kernel-source","purl":"pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.14.21-150500.55.88.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-64kb":"5.14.21-150500.55.88.1","kernel-64kb-devel":"5.14.21-150500.55.88.1","kernel-default":"5.14.21-150500.55.88.1","kernel-default-base":"5.14.21-150500.55.88.1.150500.6.39.4","kernel-default-devel":"5.14.21-150500.55.88.1","kernel-devel":"5.14.21-150500.55.88.1","kernel-macros":"5.14.21-150500.55.88.1","kernel-zfcpdump":"5.14.21-150500.55.88.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for Basesystem 15 SP5","name":"kernel-zfcpdump","purl":"pkg:rpm/suse/kernel-zfcpdump&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.14.21-150500.55.88.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-docs":"5.14.21-150500.55.88.1","kernel-obs-build":"5.14.21-150500.55.88.1","kernel-source":"5.14.21-150500.55.88.1","kernel-syms":"5.14.21-150500.55.88.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for Development Tools 15 SP5","name":"kernel-docs","purl":"pkg:rpm/suse/kernel-docs&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Development%20Tools%2015%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.14.21-150500.55.88.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-docs":"5.14.21-150500.55.88.1","kernel-obs-build":"5.14.21-150500.55.88.1","kernel-source":"5.14.21-150500.55.88.1","kernel-syms":"5.14.21-150500.55.88.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for Development Tools 15 SP5","name":"kernel-obs-build","purl":"pkg:rpm/suse/kernel-obs-build&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Development%20Tools%2015%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.14.21-150500.55.88.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-docs":"5.14.21-150500.55.88.1","kernel-obs-build":"5.14.21-150500.55.88.1","kernel-source":"5.14.21-150500.55.88.1","kernel-syms":"5.14.21-150500.55.88.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for Development Tools 15 SP5","name":"kernel-source","purl":"pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Development%20Tools%2015%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.14.21-150500.55.88.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-docs":"5.14.21-150500.55.88.1","kernel-obs-build":"5.14.21-150500.55.88.1","kernel-source":"5.14.21-150500.55.88.1","kernel-syms":"5.14.21-150500.55.88.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for Development Tools 15 SP5","name":"kernel-syms","purl":"pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Development%20Tools%2015%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.14.21-150500.55.88.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"reiserfs-kmp-default":"5.14.21-150500.55.88.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for Legacy 15 SP5","name":"kernel-default","purl":"pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Legacy%2015%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.14.21-150500.55.88.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default-livepatch":"5.14.21-150500.55.88.1","kernel-default-livepatch-devel":"5.14.21-150500.55.88.1","kernel-livepatch-5_14_21-150500_55_88-default":"1-150500.11.5.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Live Patching 15 SP5","name":"kernel-default","purl":"pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.14.21-150500.55.88.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default-livepatch":"5.14.21-150500.55.88.1","kernel-default-livepatch-devel":"5.14.21-150500.55.88.1","kernel-livepatch-5_14_21-150500_55_88-default":"1-150500.11.5.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Live Patching 15 SP5","name":"kernel-livepatch-SLE15-SP5_Update_21","purl":"pkg:rpm/suse/kernel-livepatch-SLE15-SP5_Update_21&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1-150500.11.5.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-default":"5.14.21-150500.55.88.1","dlm-kmp-default":"5.14.21-150500.55.88.1","gfs2-kmp-default":"5.14.21-150500.55.88.1","ocfs2-kmp-default":"5.14.21-150500.55.88.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise High Availability Extension 15 SP5","name":"kernel-default","purl":"pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20High%20Availability%20Extension%2015%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.14.21-150500.55.88.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"\nThe SUSE Linux Enterprise 15 SP5 kernel was updated to receive various security bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2021-47594: mptcp: never allow the PM to close a listener subflow (bsc#1226560).\n- CVE-2022-48879: efi: fix NULL-deref in init error path (bsc#1229556).\n- CVE-2022-48956: ipv6: avoid use-after-free in ip6_fragment() (bsc#1231893).\n- CVE-2022-48957: dpaa2-switch: Fix memory leak in dpaa2_switch_acl_entry_add() and dpaa2_switch_acl_entry_remove() (bsc#1231973).\n- CVE-2022-48958: ethernet: aeroflex: fix potential skb leak in greth_init_rings() (bsc#1231889).\n- CVE-2022-48959: net: dsa: sja1105: fix memory leak in sja1105_setup_devlink_regions() (bsc#1231976).\n- CVE-2022-48960: net: hisilicon: Fix potential use-after-free in hix5hd2_rx() (bsc#1231979).\n- CVE-2022-48962: net: hisilicon: Fix potential use-after-free in hisi_femac_rx() (bsc#1232286).\n- CVE-2022-48966: net: mvneta: Fix an out of bounds check (bsc#1232191).\n- CVE-2022-48980: net: dsa: sja1105: avoid out of bounds access in sja1105_init_l2_policing() (bsc#1232233).\n- CVE-2022-48983: io_uring: Fix a null-ptr-deref in io_tctx_exit_cb() (bsc#1231959).\n- CVE-2022-48991: mm/khugepaged: fix collapse_pte_mapped_thp() to allow anon_vma (bsc#1232070).\n- CVE-2022-49015: net: hsr: Fix potential use-after-free (bsc#1231938).\n- CVE-2022-49017: tipc: re-fetch skb cb after tipc_msg_validate (bsc#1232004).\n- CVE-2022-49020: net/9p: Fix a potential socket leak in p9_socket_open (bsc#1232175).\n- CVE-2024-26782: mptcp: fix double-free on socket dismantle (bsc#1222590).\n- CVE-2024-26906: Fixed invalid vsyscall page read for copy_from_kernel_nofault() (bsc#1223202).\n- CVE-2024-26953: net: esp: fix bad handling of pages from page_pool (bsc#1223656).\n- CVE-2024-35888: erspan: make sure erspan_base_hdr is present in skb->head (bsc#1224518).\n- CVE-2024-35937: wifi: cfg80211: check A-MSDU format more carefully (bsc#1224526).\n- CVE-2024-36244: net/sched: taprio: extend minimum interval restriction to entire cycle too (bsc#1226797).\n- CVE-2024-36883: net: fix out-of-bounds access in ops_init (bsc#1225725).\n- CVE-2024-36886: tipc: fix UAF in error path (bsc#1225730).\n- CVE-2024-36905: tcp: defer shutdown(SEND_SHUTDOWN) for TCP_SYN_RECV sockets (bsc#1225742).\n- CVE-2024-36954: tipc: fix a possible memleak in tipc_buf_append (bsc#1225764).\n- CVE-2024-36957: octeontx2-af: avoid off-by-one read from userspace (bsc#1225762).\n- CVE-2024-38589: netrom: fix possible dead-lock in nr_rt_ioctl() (bsc#1226748).\n- CVE-2024-38615: cpufreq: exit() callback is optional (bsc#1226592).\n- CVE-2024-39476: md/raid5: fix deadlock that raid5d() wait for itself to clear MD_SB_CHANGE_PENDING (bsc#1227437).\n- CVE-2024-40965: i2c: lpi2c: Avoid calling clk_get_rate during transfer (bsc#1227885).\n- CVE-2024-40997: cpufreq: amd-pstate: fix memory leak on CPU EPP exit (bsc#1227853).\n- CVE-2024-41023: sched/deadline: Fix task_struct reference leak (bsc#1228430).\n- CVE-2024-42226: Prevent potential failure in handle_tx_event() for Transfer events without TRB (bsc#1228709).\n- CVE-2024-42253: gpio: pca953x: fix pca953x_irq_bus_sync_unlock race (bsc#1229005).\n- CVE-2024-44931: gpio: prevent potential speculation leaks in gpio_device_get_desc() (bsc#1229837).\n- CVE-2024-44932: idpf: fix UAFs when destroying the queues (bsc#1229808).\n- CVE-2024-44958: sched/smt: Fix unbalance sched_smt_present dec/inc (bsc#1230179).\n- CVE-2024-44964: idpf: fix memory leaks and crashes while performing a soft reset (bsc#1230220).\n- CVE-2024-44995: net: hns3: fix a deadlock problem when config TC during resetting (bsc#1230231).\n- CVE-2024-45016: netem: fix return value if duplicate enqueue fails (bsc#1230429).\n- CVE-2024-45025: fix bitmap corruption on close_range() with CLOSE_RANGE_UNSHARE (bsc#1230456).\n- CVE-2024-46678: bonding: change ipsec_lock from spin lock to mutex (bsc#1230550).\n- CVE-2024-46681: pktgen: use cpus_read_lock() in pg_net_init() (bsc#1230558).\n- CVE-2024-46716: dmaengine: altera-msgdma: properly free descriptor in msgdma_free_descriptor (bsc#1230715).\n- CVE-2024-46754: bpf: Remove tst_run from lwt_seg6local_prog_ops (bsc#1230801).\n- CVE-2024-46770: ice: Add netif_device_attach/detach into PF reset flow (bsc#1230763).\n- CVE-2024-46775: drm/amd/display: Validate function returns (bsc#1230774).\n- CVE-2024-46777: udf: Avoid excessive partition lengths (bsc#1230773).\n- CVE-2024-46800: sch/netem: fix use after free in netem_dequeue (bsc#1230827).\n- CVE-2024-46809: drm/amd/display: Check BIOS images before it is used (bsc#1231148).\n- CVE-2024-46811: drm/amd/display: Fix index may exceed array range within fpu_update_bw_bounding_box (bsc#1231179).\n- CVE-2024-46813: drm/amd/display: Check link_index before accessing dc->links (bsc#1231191).\n- CVE-2024-46814: drm/amd/display: Check msg_id before processing transcation (bsc#1231193).\n- CVE-2024-46815: drm/amd/display: Check num_valid_sets before accessing reader_wm_sets (bsc#1231195).\n- CVE-2024-46816: drm/amd/display: Stop amdgpu_dm initialize when link nums greater than max_links (bsc#1231197).\n- CVE-2024-46817: drm/amd/display: Stop amdgpu_dm initialize when stream nums greater than 6 (bsc#1231200).\n- CVE-2024-46818: drm/amd/display: Check gpio_id before used as array index (bsc#1231203).\n- CVE-2024-46826: ELF: fix kernel.randomize_va_space double read (bsc#1231115).\n- CVE-2024-46828: uprobes: fix kernel info leak via '[uprobes]' vma (bsc#1231114).\n- CVE-2024-46834: ethtool: fail closed if we can't get max channel used in indirection tables (bsc#1231096).\n- CVE-2024-46840: btrfs: clean up our handling of refs == 0 in snapshot delete (bsc#1231105).\n- CVE-2024-46841: btrfs: do not BUG_ON on ENOMEM from btrfs_lookup_extent_info() in walk_down_proc() (bsc#1231094).\n- CVE-2024-46848: perf/x86/intel: Limit the period on Haswell (bsc#1231072).\n- CVE-2024-46849: ASoC: meson: axg-card: fix 'use-after-free' (bsc#1231073).\n- CVE-2024-46854: net: dpaa: Pad packets to ETH_ZLEN (bsc#1231084).\n- CVE-2024-46855: netfilter: nft_socket: fix sk refcount leaks (bsc#1231085).\n- CVE-2024-46857: net/mlx5: Fix bridge mode operations when there are no VFs (bsc#1231087).\n- CVE-2024-47660: fsnotify: clear PARENT_WATCHED flags lazily (bsc#1231439).\n- CVE-2024-47661: drm/amd/display: Avoid overflow from uint32_t to uint8_t (bsc#1231496).\n- CVE-2024-47664: spi: hisi-kunpeng: Add verification for the max_frequency provided by the firmware (bsc#1231442).\n- CVE-2024-47668: lib/generic-radix-tree.c: Fix rare race in __genradix_ptr_alloc() (bsc#1231502).\n- CVE-2024-47672: wifi: iwlwifi: mvm: do not wait for tx queues if firmware is dead (bsc#1231540).\n- CVE-2024-47673: wifi: iwlwifi: mvm: pause TCM when the firmware is stopped (bsc#1231539).\n- CVE-2024-47674: mm: avoid leaving partial pfn mappings around in error case (bsc#1231673).\n- CVE-2024-47679: vfs: fix race between evice_inodes() and find_inode()&iput() (bsc#1231930).\n- CVE-2024-47684: tcp: check skb is non-NULL in tcp_rto_delta_us() (bsc#1231987).\n- CVE-2024-47685: netfilter: nf_reject_ipv6: fix nf_reject_ip6_tcphdr_put() (bsc#1231998).\n- CVE-2024-47692: nfsd: return -EINVAL when namelen is 0 (bsc#1231857).\n- CVE-2024-47701: ext4: explicitly exit when ext4_find_inline_entry returns an error (bsc#1231920).\n- CVE-2024-47704: drm/amd/display: Check link_res->hpo_dp_link_enc before using it (bsc#1231944).\n- CVE-2024-47705: block: fix potential invalid pointer dereference in blk_add_partition (bsc#1231872).\n- CVE-2024-47706: block, bfq: fix possible UAF for bfqq->bic with merge chain (bsc#1231942).\n- CVE-2024-47707: ipv6: avoid possible NULL deref in rt6_uncached_list_flush_dev() (bsc#1231935).\n- CVE-2024-47710: sock_map: Add a cond_resched() in sock_hash_free() (bsc#1232049).\n- CVE-2024-47720: drm/amd/display: Add null check for set_output_gamma in dcn30_set_output_transfer_func (bsc#1232043).\n- CVE-2024-47727: x86/tdx: Fix 'in-kernel MMIO' check (bsc#1232116).\n- CVE-2024-47730: crypto: hisilicon/qm - inject error before stopping queue (bsc#1232075).\n- CVE-2024-47738: wifi: mac80211: do not use rate mask for offchannel TX either (bsc#1232114).\n- CVE-2024-47739: padata: use integer wrap around to prevent deadlock on seq_nr overflow (bsc#1232124).\n- CVE-2024-47745: mm: split critical region in remap_file_pages() and invoke LSMs in between (bsc#1232135).\n- CVE-2024-47747: net: seeq: Fix use after free vulnerability in ether3 Driver Due to Race Condition (bsc#1232145).\n- CVE-2024-47748: vhost_vdpa: assign irq bypass producer token correctly (bsc#1232174).\n- CVE-2024-47757: nilfs2: fix potential oob read in nilfs_btree_check_delete() (bsc#1232187).\n- CVE-2024-49858: efistub/tpm: Use ACPI reclaim memory for event log to avoid corruption (bsc#1232251).\n- CVE-2024-49860: ACPI: sysfs: validate return type of _STR method (bsc#1231861).\n- CVE-2024-49866: tracing/timerlat: Fix a race during cpuhp processing (bsc#1232259).\n- CVE-2024-49868: btrfs: fix a NULL pointer dereference when failed to start a new trasacntion (bsc#1232272).\n- CVE-2024-49881: ext4: update orig_path in ext4_find_extent() (bsc#1232201).\n- CVE-2024-49882: ext4: fix double brelse() the buffer of the extents path (bsc#1232200).\n- CVE-2024-49883: ext4: aovid use-after-free in ext4_ext_insert_extent() (bsc#1232199).\n- CVE-2024-49886: platform/x86: ISST: Fix the KASAN report slab-out-of-bounds bug (bsc#1232196).\n- CVE-2024-49890: drm/amd/pm: ensure the fw_info is not null before using it (bsc#1232217).\n- CVE-2024-49892: drm/amd/display: Initialize get_bytes_per_element's default to 1 (bsc#1232220).\n- CVE-2024-49896: drm/amd/display: Check stream before comparing them (bsc#1232221).\n- CVE-2024-49897: drm/amd/display: Check phantom_stream before it is used (bsc#1232355).\n- CVE-2024-49899: drm/amd/display: Initialize denominators' default to 1 (bsc#1232358).\n- CVE-2024-49901: drm/msm/adreno: Assign msm_gpu->pdev earlier to avoid nullptrs (bsc#1232305).\n- CVE-2024-49906: drm/amd/display: Check null pointer before try to access it (bsc#1232332).\n- CVE-2024-49909: drm/amd/display: Add NULL check for function pointer in dcn32_set_output_transfer_func (bsc#1232337).\n- CVE-2024-49911: drm/amd/display: Add NULL check for function pointer in dcn20_set_output_transfer_func (bsc#1232366).\n- CVE-2024-49914: drm/amd/display: Add null check for pipe_ctx->plane_state in (bsc#1232369).\n- CVE-2024-49917: drm/amd/display: Add NULL check for clk_mgr and clk_mgr->funcs in dcn30_init_hw (bsc#1231965).\n- CVE-2024-49918: drm/amd/display: Add null check for head_pipe in dcn32_acquire_idle_pipe_for_head_pipe_in_layer (bsc#1231967).\n- CVE-2024-49919: drm/amd/display: Add null check for head_pipe in dcn201_acquire_free_pipe_for_layer (bsc#1231968).\n- CVE-2024-49920: drm/amd/display: Check null pointers before multiple uses (bsc#1232313).\n- CVE-2024-49921: drm/amd/display: Check null pointers before used (bsc#1232371).\n- CVE-2024-49922: drm/amd/display: Check null pointers before using them (bsc#1232374).\n- CVE-2024-49923: drm/amd/display: Pass non-null to dcn20_validate_apply_pipe_split_flags (bsc#1232361).\n- CVE-2024-49925: fbdev: efifb: Register sysfs groups through driver core (bsc#1232224)\n- CVE-2024-49929: wifi: iwlwifi: mvm: avoid NULL pointer dereference (bsc#1232253).\n- CVE-2024-49930: wifi: ath11k: fix array out-of-bound access in SoC stats (bsc#1232260).\n- CVE-2024-49933: blk_iocost: fix more out of bound shifts (bsc#1232368).\n- CVE-2024-49934: fs/inode: Prevent dump_mapping() accessing invalid dentry.d_name.name (bsc#1232387).\n- CVE-2024-49936: net/xen-netback: prevent UAF in xenvif_flush_hash() (bsc#1232424).\n- CVE-2024-49939: wifi: rtw89: avoid to add interface to list twice when SER (bsc#1232381).\n- CVE-2024-49945: net/ncsi: Disable the ncsi work before freeing the associated structure (bsc#1232165).\n- CVE-2024-49946: ppp: do not assume bh is held in ppp_channel_bridge_input() (bsc#1232164).\n- CVE-2024-49949: net: avoid potential underflow in qdisc_pkt_len_init() with UFO (bsc#1232160).\n- CVE-2024-49950: Bluetooth: L2CAP: Fix uaf in l2cap_connect (bsc#1232159).\n- CVE-2024-49954: static_call: Replace pointless WARN_ON() in static_call_module_notify() (bsc#1232155).\n- CVE-2024-49955: ACPI: battery: Fix possible crash when unregistering a battery hook (bsc#1232154).\n- CVE-2024-49958: ocfs2: reserve space for inline xattr before attaching reflink tree (bsc#1232151).\n- CVE-2024-49959: jbd2: stop waiting for space when jbd2_cleanup_journal_tail() returns error (bsc#1232149).\n- CVE-2024-49960: ext4: fix timer use-after-free on failed mount (bsc#1232395).\n- CVE-2024-49967: ext4: no need to continue when the number of entries is 1 (bsc#1232140).\n- CVE-2024-49968: ext4: fix error message when rejecting the default hash (bsc#1232264).\n- CVE-2024-49969: drm/amd/display: Fix index out of bounds in DCN30 color transformation (bsc#1232519).\n- CVE-2024-49973: r8169: add tally counter fields added with RTL8125 (bsc#1232105).\n- CVE-2024-49974: NFSD: Force all NFSv4.2 COPY requests to be synchronous (bsc#1232383).\n- CVE-2024-49975: uprobes: fix kernel info leak via '[uprobes]' vma (bsc#1232104).\n- CVE-2024-49983: ext4: drop ppath from ext4_ext_replay_update_ex() to avoid double-free (bsc#1232096).\n- CVE-2024-49989: drm/amd/display: fix double free issue during amdgpu module unload (bsc#1232483).\n- CVE-2024-49991: drm/amdkfd: amdkfd_free_gtt_mem clear the correct pointer (bsc#1232282).\n- CVE-2024-49993: iommu/vt-d: Fix potential lockup if qi_submit_sync called with 0 count (bsc#1232316).\n- CVE-2024-49995: tipc: guard against string buffer overrun (bsc#1232432).\n- CVE-2024-49996: cifs: Fix buffer overflow when parsing NFS reparse points (bsc#1232089).\n- CVE-2024-50000: net/mlx5e: Fix NULL deref in mlx5e_tir_builder_alloc() (bsc#1232085).\n- CVE-2024-50001: net/mlx5: Fix error path in multi-packet WQE transmit (bsc#1232084).\n- CVE-2024-50002: static_call: Handle module init failure correctly in static_call_del_module() (bsc#1232083).\n- CVE-2024-50006: ext4: fix i_data_sem unlock order in ext4_ind_migrate() (bsc#1232442).\n- CVE-2024-50009: cpufreq: amd-pstate: add check for cpufreq_cpu_get's return value (bsc#1232318).\n- CVE-2024-50014: ext4: fix access to uninitialised lock in fc replay path (bsc#1232446).\n- CVE-2024-50019: kthread: unpark only parked kthread (bsc#1231990).\n- CVE-2024-50024: net: Fix an unsafe loop on the list (bsc#1231954).\n- CVE-2024-50028: thermal: core: Reference count the zone in thermal_zone_get_by_id() (bsc#1231950).\n- CVE-2024-50033: slip: make slhc_remember() more robust against malicious packets (bsc#1231914).\n- CVE-2024-50035: ppp: fix ppp_async_encode() illegal access (bsc#1232392).\n- CVE-2024-50041: i40e: Fix macvlan leak by synchronizing access to mac_filter_hash (bsc#1231907).\n- CVE-2024-50045: netfilter: br_netfilter: fix panic with metadata_dst skb (bsc#1231903).\n- CVE-2024-50046: kabi fix for NFSv4: Prevent NULL-pointer dereference in nfs42_complete_copies() (bsc#1231902).\n- CVE-2024-50047: smb: client: fix UAF in async decryption (bsc#1232418).\n- CVE-2024-50048: fbcon: Fix a NULL pointer dereference issue in fbcon_putcs (bsc#1232310).\n- CVE-2024-50055: driver core: bus: Fix double free in driver API bus_register() (bsc#1232329).\n- CVE-2024-50058: serial: protect uart_port_dtr_rts() in uart_shutdown() too (bsc#1232285).\n- CVE-2024-50059: ntb: ntb_hw_switchtec: Fix use after free vulnerability in switchtec_ntb_remove due to race condition (bsc#1232345).\n- CVE-2024-50061: i3c: master: cdns: Fix use after free vulnerability in cdns_i3c_master Driver Due to Race Condition (bsc#1232263).\n- CVE-2024-50063: kABI: bpf: struct bpf_map kABI workaround (bsc#1232435).\n- CVE-2024-50073: tty: n_gsm: Fix use-after-free in gsm_cleanup_mux (bsc#1232520).\n- CVE-2024-50081: blk-mq: setup queue ->tag_set before initializing hctx (bsc#1232501).\n- CVE-2024-50082: blk-rq-qos: fix crash on rq_qos_wait vs. rq_qos_wake_function race (bsc#1232500).\n- CVE-2024-50089: unicode: Do not special case ignorable code points (bsc#1232860).\n- CVE-2024-50093: thermal: intel: int340x: processor: Fix warning during module unload (bsc#1232877).\n- CVE-2024-50098: scsi: ufs: core: Set SDEV_OFFLINE when UFS is shut down (bsc#1232881).\n- CVE-2024-50108: drm/amd/display: Disable PSR-SU on Parade 08-01 TCON too (bsc#1232884).\n- CVE-2024-50110: xfrm: fix one more kernel-infoleak in algo dumping (bsc#1232885).\n- CVE-2024-50115: KVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from memory (bsc#1232919).\n- CVE-2024-50125: Bluetooth: SCO: Fix UAF on sco_sock_timeout (bsc#1232928).\n- CVE-2024-50127: net: sched: fix use-after-free in taprio_change() (bsc#1232907).\n- CVE-2024-50128: net: wwan: fix global oob in wwan_rtnl_policy (bsc#1232905).\n- CVE-2024-50134: drm/vboxvideo: Replace fake VLA at end of vbva_mouse_pointer_shape (bsc#1232890).\n- CVE-2024-50135: nvme-pci: fix race condition between reset and nvme_dev_disable() (bsc#1232888).\n- CVE-2024-50138: bpf: Use raw_spinlock_t in ringbuf (bsc#1232935).\n- CVE-2024-50146: net/mlx5e: Do not call cleanup on profile rollback failure (bsc#1233056).\n- CVE-2024-50147: net/mlx5: Fix command bitmask initialization (bsc#1233067).\n- CVE-2024-50153: scsi: target: core: Fix null-ptr-deref in target_alloc_device() (bsc#1233061).\n- CVE-2024-50154: tcp: Fix use-after-free of nreq in reqsk_timer_handler() (bsc#1233070).\n- CVE-2024-50167: be2net: fix potential memory leak in be_xmit() (bsc#1233049).\n- CVE-2024-50171: net: systemport: fix potential memory leak in bcm_sysport_xmit() (bsc#1233057).\n- CVE-2024-50182: secretmem: disable memfd_secret() if arch cannot set direct map (bsc#1233129).\n- CVE-2024-50184: virtio_pmem: Check device status before requesting flush (bsc#1233135).\n- CVE-2024-50186: net: explicitly clear the sk pointer, when pf->create fails (bsc#1233110).\n- CVE-2024-50188: net: phy: dp83869: fix memory corruption when enabling fiber (bsc#1233107).\n- CVE-2024-50192: irqchip/gic-v4: Correctly deal with set_affinity on lazily-mapped VPEs (bsc#1233106).\n- CVE-2024-50195: posix-clock: posix-clock: Fix unbalanced locking in pc_clock_settime() (bsc#1233103).\n- CVE-2024-50196: pinctrl: ocelot: fix system hang on level based interrupts (bsc#1233113).\n- CVE-2024-50205: ALSA: firewire-lib: Avoid division by zero in apply_constraint_to_size() (bsc#1233293).\n- CVE-2024-50208: RDMA/bnxt_re: Fix a bug while setting up Level-2 PBL pages (bsc#1233117).\n- CVE-2024-50229: nilfs2: fix potential deadlock with newly created symlinks (bsc#1233205).\n- CVE-2024-50230: nilfs2: fix kernel bug due to missing clearing of checked flag (bsc#1233206).\n- CVE-2024-50259: netdevsim: Add trailing zero to terminate the string in nsim_nexthop_bucket_activity_write() (bsc#1233214).\n- CVE-2024-50261: macsec: Fix use-after-free while sending the offloading packet (bsc#1233253).\n- CVE-2024-50264: vsock/virtio: Initialization of the dangling pointer occurring in vsk->trans (bsc#1233453).\n- CVE-2024-50267: usb: serial: io_edgeport: fix use after free in debug printk (bsc#1233456).\n- CVE-2024-50271: signal: restore the override_rlimit logic (bsc#1233460).\n- CVE-2024-50273: btrfs: reinitialize delayed ref list after deleting it from the list (bsc#1233462).\n- CVE-2024-50274: idpf: avoid vport access in idpf_get_link_ksettings (bsc#1233463).\n- CVE-2024-50279: dm cache: fix out-of-bounds access to the dirty bitset when resizing (bsc#1233468).\n- CVE-2024-50289: media: av7110: fix a spectre vulnerability (bsc#1233478).\n- CVE-2024-50295: net: arc: fix the device for dma_map_single/dma_unmap_single (bsc#1233484).\n- CVE-2024-50298: net: enetc: allocate vf_state during PF probes (bsc#1233487).\n- CVE-2024-53052: io_uring/rw: fix missing NOWAIT check for O_DIRECT start write (bsc#1233548).\n- CVE-2024-53058: net: stmmac: TSO: Fix unbalanced DMA map/unmap for non-paged SKB data (bsc#1233552).\n- CVE-2024-53061: media: s5p-jpeg: prevent buffer overflows (bsc#1233555).\n- CVE-2024-53063: media: dvbdev: prevent the risk of out of memory access (bsc#1233557).\n- CVE-2024-53068: firmware: arm_scmi: Fix slab-use-after-free in scmi_bus_notifier() (bsc#1233561).\n- CVE-2024-53079: mm/thp: fix deferred split unqueue naming and locking (bsc#1233570).\n- CVE-2024-53088: i40e: fix race condition by adding filter's intermediate sync state (bsc#1233580).\n- CVE-2024-53104: media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format (bsc#1234025).\n- CVE-2024-53110: vp_vdpa: fix id_table array not null terminated error (bsc#1234085).\n\nThe following non-security bugs were fixed:\n\n- acpi: battery: Call power_supply_changed() when adding hooks (bsc#1232154)\n- acpi: battery: Simplify battery hook locking (bsc#1232154)\n- acpi: button: Add DMI quirk for Samsung Galaxy Book2 to fix initial lid detection issue (stable-fixes).\n- acpi: CPPC: Fix _CPC register setting issue (git-fixes).\n- acpi: CPPC: Make rmw_lock a raw_spin_lock (git-fixes).\n- acpi: EC: Do not release locks during operation region accesses (stable-fixes).\n- acpi: PAD: fix crash in exit_round_robin() (stable-fixes).\n- acpi: PRM: Clean up guid type in struct prm_handler_info (git-fixes).\n- acpi: PRM: Find EFI_MEMORY_RUNTIME block for PRM handler and context (git-fixes).\n- acpi: resource: Add another DMI match for the TongFang GMxXGxx (stable-fixes).\n- acpi: resource: Add Asus ExpertBook B2502CVA to irq1_level_low_skip_override[] (stable-fixes).\n- acpi: resource: Add Asus Vivobook X1704VAP to irq1_level_low_skip_override[] (stable-fixes).\n- acpi: resource: Add LG 16T90SP to irq1_level_low_skip_override[] (stable-fixes).\n- acpica: check null return of ACPI_ALLOCATE_ZEROED() in acpi_db_convert_to_package() (stable-fixes).\n- acpica: Fix memory leak if acpi_ps_get_next_field() fails (stable-fixes).\n- acpica: Fix memory leak if acpi_ps_get_next_namepath() fails (stable-fixes).\n- acpica: iasl: handle empty connection_node (stable-fixes).\n- ad7780: fix division by zero in ad7780_write_raw() (git-fixes).\n- adapt same struct naming as similar kABI workaround in SLE15-SP6 (prefixed with 'suse_' to make it more obvious its a downstream thing.\n- add bug reference for a mana change (bsc#1229769).\n- add bug references to existing mana changes (bsc#1232033, bsc#1232034, bsc#1232036).\n- add bugreference to a hv_netvsc patch (bsc#1232413).\n- afs: Revert 'afs: Hide silly-rename files from userspace' (git-fixes).\n- alsa: 6fire: Release resources at card release (git-fixes).\n- alsa: ac97: bus: Fix the mistake in the comment (git-fixes).\n- alsa: asihpi: Fix potential OOB array access (stable-fixes).\n- alsa: caiaq: Use snd_card_free_when_closed() at disconnection (git-fixes).\n- alsa: core: add isascii() check to card ID generator (stable-fixes).\n- alsa: firewire-lib: Avoid division by zero in apply_constraint_to_size() (git-fixes).\n- alsa: firewire-lib: fix return value on fail in amdtp_tscm_init() (git-fixes).\n- alsa: hda: cs35l41: fix module autoloading (git-fixes).\n- alsa: hda: Fix kctl->id initialization (git-fixes).\n- alsa: hda/conexant - Fix audio routing for HP EliteOne 1000 G2 (stable-fixes).\n- alsa: hda/conexant - Use cached pin control for Node 0x1d on HP EliteOne 1000 G2 (git-fixes).\n- alsa: hda/conexant: Fix conflicting quirk for System76 Pangolin (git-fixes).\n- alsa: hda/cs8409: Fix possible NULL dereference (git-fixes).\n- alsa: hda/generic: Unconditionally prefer preferred_dacs pairs (git-fixes).\n- alsa: hda/realtek - Fixed ALC256 headphone no sound (stable-fixes).\n- alsa: hda/realtek - FIxed ALC285 headphone no sound (stable-fixes).\n- alsa: hda/realtek - Fixed Clevo platform headset Mic issue (stable-fixes).\n- alsa: hda/realtek: Add a quirk for HP Pavilion 15z-ec200 (stable-fixes).\n- alsa: hda/realtek: Add quirk for Huawei MateBook 13 KLV-WX9 (stable-fixes).\n- alsa: hda/realtek: Add subwoofer quirk for Acer Predator G9-593 (stable-fixes).\n- alsa: hda/realtek: Fix headset mic on TUXEDO Gemini 17 Gen3 (stable-fixes).\n- alsa: hda/realtek: Fix headset mic on TUXEDO Stellaris 16 Gen6 mb1 (stable-fixes).\n- alsa: hda/realtek: fix mute/micmute LEDs for a HP EliteBook 645 G10 (stable-fixes).\n- alsa: hda/realtek: Fix the push button function for the ALC257 (git-fixes).\n- alsa: hda/realtek: Limit internal Mic boost on Dell platform (stable-fixes).\n- alsa: hda/realtek: Update ALC225 depop procedure (git-fixes).\n- alsa: hda/realtek: Update ALC256 depop procedure (git-fixes).\n- alsa: hda/realtek: Update default depop procedure (git-fixes).\n- alsa: hdsp: Break infinite MIDI input flush loop (stable-fixes).\n- alsa: line6: add hw monitor volume control to POD HD500X (stable-fixes).\n- alsa: mixer_oss: Remove some incorrect kfree_const() usages (git-fixes).\n- alsa: us122l: Use snd_card_free_when_closed() at disconnection (git-fixes).\n- alsa: usb-audio: Add delay quirk for VIVO USB-C HEADSET (stable-fixes).\n- alsa: usb-audio: Add input value sanity checks for standard types (stable-fixes).\n- alsa: usb-audio: Add logitech Audio profile quirk (stable-fixes).\n- alsa: usb-audio: Add native DSD support for Luxman D-08u (stable-fixes).\n- alsa: usb-audio: Add quirk for HP 320 FHD Webcam (stable-fixes).\n- alsa: usb-audio: Add quirks for Dell WD19 dock (stable-fixes).\n- alsa: usb-audio: Define macros for quirk table entries (stable-fixes).\n- alsa: usb-audio: Replace complex quirk lines with macros (stable-fixes).\n- alsa: usx2y: Use snd_card_free_when_closed() at disconnection (git-fixes).\n- amd-pstate: Set min_perf to nominal_perf for active mode performance gov (git-fixes).\n- arm64: cputype: Add Neoverse-N3 definitions (git-fixes)\n- arm64: dts: imx8mp: correct sdhc ipg clk (git-fixes).\n- arm64: dts: rockchip: override BIOS_DISABLE signal via GPIO hog on RK3399 Puma (git-fixes).\n- arm64: errata: Expand speculative SSBS workaround once more (git-fixes)\n- arm64: esr: Define ESR_ELx_EC_* constants as UL (git-fixes)\n- arm64: fix .data.rel.ro size assertion when CONFIG_LTO_CLANG (git-fixes)\n- arm64: Force position-independent veneers (git-fixes).\n- arm64: probes: Fix simulate_ldr*_literal() (git-fixes)\n- arm64: probes: Fix uprobes for big-endian kernels (git-fixes)\n- arm64: probes: Remove broken LDR (literal) uprobe support (git-fixes)\n- arm64: smccc: Remove broken support for SMCCCv1.3 SVE discard hint (git-fixes)\n- arm64: smccc: replace custom COUNT_ARGS() & CONCATENATE() (git-fixes)\n- arm64: tls: Fix context-switching of tpidrro_el0 when kpti is enabled (git-fixes)\n- arm64:uprobe fix the uprobe SWBP_INSN in big-endian (git-fixes)\n- arm64/sve: Discard stale CPU state when handling SVE traps (git-fixes)\n- asoc: allow module autoloading for table db1200_pids (stable-fixes).\n- asoc: amd: yc: Fix for enabling DMIC on acp6x via _DSD entry (git-fixes).\n- asoc: codecs: Fix atomicity violation in snd_soc_component_get_drvdata() (git-fixes).\n- asoc: codecs: lpass-rx-macro: add missing CDC_RX_BCL_VBAT_RF_PROC2 to default regs values (stable-fixes).\n- asoc: cs42l51: Fix some error handling paths in cs42l51_probe() (git-fixes).\n- asoc: fsl_sai: Enable 'FIFO continue on error' FCONT bit (stable-fixes).\n- asoc: imx-card: Set card.owner to avoid a warning calltrace if SND=m (git-fixes).\n- asoc: intel: fix module autoloading (stable-fixes).\n- asoc: qcom: Fix NULL Dereference in asoc_qcom_lpass_cpu_platform_probe() (git-fixes).\n- asoc: qcom: sm8250: add qrb4210-rb2-sndcard compatible string (stable-fixes).\n- asoc: rt5682: Return devm_of_clk_add_hw_provider to transfer the error (git-fixes).\n- asoc: soc-pcm: Do not zero TDM masks in __soc_pcm_open() (git-fixes).\n- asoc: stm32: spdifrx: fix dma channel release in stm32_spdifrx_remove (git-fixes).\n- asoc: tda7419: fix module autoloading (stable-fixes).\n- blk-throttle: Fix io statistics for cgroup v1 (bsc#1233528).\n- block: Avoid leaking hctx->nr_active counter on batched completion (bsc#1231923).\n- block: print symbolic error name instead of error code (bsc#1231872).\n- bluetooth: bnep: fix wild-memory-access in proto_unregister (git-fixes).\n- bluetooth: btmrvl: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).\n- bluetooth: btusb: Fix regression with fake CSR controllers 0a12:0001 (git-fixes).\n- bluetooth: Call iso_exit() on module unload (git-fixes).\n- bluetooth: hci_event: Align BR/EDR JUST_WORKS paring with LE (git-fixes).\n- bluetooth: hci: fix null-ptr-deref in hci_read_supported_codecs (git-fixes).\n- bluetooth: ISO: Fix multiple init when debugfs is disabled (git-fixes).\n- bluetooth: MGMT: Fix slab-use-after-free Read in set_powered_sync (git-fixes).\n- bluetooth: Remove debugfs directory on module init failure (git-fixes).\n- bluetooth: RFCOMM: FIX possible deadlock in rfcomm_sk_state_change (git-fixes).\n- bnxt_en: Fix the PCI-AER routines (git-fixes).\n- bnxt_en: refactor reset close code (git-fixes).\n- bnxt_en: Remove mis-applied code from bnxt_cfg_ntp_filters() (git-fixes).\n- bnxt_en: Reserve rings after PCIe AER recovery if NIC interface is down (git-fixes).\n- bnxt_en: Reset PTP tx_avail after possible firmware reset (git-fixes).\n- bnxt_en: Restore PTP tx_avail count in case of skb_pad() error (git-fixes).\n- bnxt_en: Wait for FLR to complete during probe (git-fixes).\n- bpf, lsm: Add disabled BPF LSM hook list (git-fixes).\n- bpf, net: Fix a potential race in do_sock_getsockopt() (git-fixes).\n- bpf, verifier: Correct tail_call_reachable for bpf prog (git-fixes).\n- bpf, x64: Remove tail call detection (git-fixes).\n- bpf,perf: Fix perf_event_detach_bpf_prog error handling (git-fixes).\n- bpf: Add --skip_encoding_btf_inconsistent_proto, --btf_gen_optimized to pahole flags for v1.25 (bsc#1230414 bsc#1229450).\n- bpf: Allow helpers to accept pointers with a fixed size (git-fixes).\n- bpf: Check for helper calls in check_subprogs() (git-fixes).\n- bpf: correctly handle malformed BPF_CORE_TYPE_ID_LOCAL relos (git-fixes).\n- bpf: Fix bpf_strtol and bpf_strtoul helpers for 32bit (git-fixes).\n- bpf: Fix helper writes to read-only maps (git-fixes).\n- bpf: Fix pointer-leak due to insufficient speculative store bypass mitigation (bsc#1231375).\n- bpf: Fix tailcall cases in test_bpf (git-fixes).\n- bpf: Improve check_raw_mode_ok test for MEM_UNINIT-tagged types (git-fixes).\n- bpf: Remove truncation test in bpf_strtol and bpf_strtoul helpers (git-fixes).\n- bpf: Zero former ARG_PTR_TO_{LONG,INT} args in case of error (git-fixes).\n- btf, scripts: Exclude Rust CUs with pahole (bsc#1230414 bsc#1229450).\n- bus: integrator-lm: fix OF node leak in probe() (git-fixes).\n- can: c_can: c_can_handle_bus_err(): update statistics if skb allocation fails (git-fixes).\n- can: c_can: fix {rx,tx}_errors statistics (git-fixes).\n- can: ems_usb: ems_usb_rx_err(): fix {rx,tx}_errors statistics (git-fixes).\n- can: ifi_canfd: ifi_canfd_handle_lec_err(): fix {rx,tx}_errors statistics (git-fixes).\n- can: j1939: j1939_session_new(): fix skb reference counting (git-fixes).\n- can: m_can: m_can_handle_lec_err(): fix {rx,tx}_errors statistics (git-fixes).\n- can: sun4i_can: sun4i_can_err(): call can_change_state() even if cf is NULL (git-fixes).\n- can: sun4i_can: sun4i_can_err(): fix {rx,tx}_errors statistics (git-fixes).\n- ceph: fix cap ref leak via netfs init_request (bsc#1231383).\n- cgroup/bpf: only cgroup v2 can be attached by bpf programs (bsc#1234108).\n- char: tpm: Fix possible memory leak in tpm_bios_measurements_open() (git-fixes).\n- chtls: fix tp->rcv_tstamp initialization (git-fixes).\n- clk: Add a devm variant of clk_rate_exclusive_get() (bsc#1227885).\n- clk: Provide !COMMON_CLK dummy for devm_clk_rate_exclusive_get() (bsc#1227885).\n- comedi: Flush partial mappings in error case (git-fixes).\n- comedi: ni_routing: tools: Check when the file could not be opened (stable-fixes).\n- cpufreq/amd-pstate: Fix amd_pstate mode switch on shared memory systems (git-fixes).\n- crypto: bcm - add error check in the ahash_hmac_init function (git-fixes).\n- crypto: caam - add error check to caam_rsa_set_priv_key_form (git-fixes).\n- crypto: caam - Fix the pointer passed to caam_qi_shutdown() (git-fixes).\n- crypto: cavium - Fix an error handling path in cpt_ucode_load_fw() (git-fixes).\n- crypto: cavium - Fix the if condition to exit loop after timeout (git-fixes).\n- crypto: hisilicon - Remove pci_aer_clear_nonfatal_status() call (bsc#1232075)\n- crypto: hisilicon/qm - re-enable communicate interrupt before notifying PF (bsc#1232075)\n- crypto: inside-secure - Fix the return value of safexcel_xcbcmac_cra_init() (git-fixes).\n- crypto: x86/aegis128 - access 32-bit arguments as 32-bit (git-fixes).\n- cxgb4: add forgotten u64 ivlan cast before shift (git-fixes).\n- cxgb4: Properly lock TX queue for the selftest (git-fixes).\n- cxgb4: unnecessary check for 0 in the free_sge_txq_uld() function (git-fixes).\n- debugfs: fix automount d_fsdata usage (git-fixes).\n- dn_route: set rt neigh to blackhole_netdev instead of loopback_dev in ifdown (bsc#1216813).\n- drbd: Add NULL check for net_conf to prevent dereference in state validation (git-fixes).\n- drbd: Fix atomicity violation in drbd_uuid_set_bm() (git-fixes).\n- driver core: bus: Return -EIO instead of 0 when show/store invalid bus attribute (stable-fixes).\n- drivers: net: prevent tun_build_skb() to exceed the packet size limit (git-fixes).\n- drm: Consistently use struct drm_mode_rect for FB_DAMAGE_CLIPS (git-fixes).\n- drm: komeda: Fix an issue related to normalized zpos (stable-fixes).\n- drm/amd: Fix initialization mistake for NBIO 7.7.0 (stable-fixes).\n- drm/amd: Guard against bad data for ATIF ACPI method (git-fixes).\n- drm/amd/amdgpu: Fix double unlock in amdgpu_mes_add_ring (git-fixes).\n- drm/amd/display: Add null check for 'afb' in amdgpu_dm_plane_handle_cursor_update (v2) (stable-fixes).\n- drm/amd/display: Add null check for top_pipe_to_program in commit_planes_for_stream (stable-fixes).\n- drm/amd/display: Allow backlight to go below `AMDGPU_DM_DEFAULT_MIN_BACKLIGHT` (stable-fixes).\n- drm/amd/display: Check link_res->hpo_dp_link_enc before using it (bsc#1231944)\n- drm/amd/display: Check null pointer before dereferencing se (stable-fixes).\n- drm/amd/display: Check null pointers before using dc->clk_mgr (stable-fixes).\n- drm/amd/display: Check stream before comparing them (stable-fixes).\n- drm/amd/display: Fix index out of bounds in DCN30 color transformation (stable-fixes).\n- drm/amd/display: Fix index out of bounds in DCN30 degamma hardware format translation (stable-fixes).\n- drm/amd/display: Fix index out of bounds in degamma hardware format translation (stable-fixes).\n- drm/amd/display: Fix Synaptics Cascaded Panamera DSC Determination (stable-fixes).\n- drm/amd/display: Fix system hang while resume with TBT monitor (stable-fixes).\n- drm/amd/display: Handle null 'stream_status' in 'planes_changed_for_existing_stream' (stable-fixes).\n- drm/amd/display: Initialize get_bytes_per_element's default to 1 (stable-fixes).\n- drm/amd/display: Round calculated vtotal (stable-fixes).\n- drm/amd/display: Validate backlight caps are sane (stable-fixes).\n- drm/amd/pm: ensure the fw_info is not null before using it (stable-fixes).\n- drm/amdgpu: add missing size check in amdgpu_debugfs_gprwave_read() (stable-fixes).\n- drm/amdgpu: add raven1 gfxoff quirk (stable-fixes).\n- drm/amdgpu: Adjust debugfs eviction and IB access permissions (stable-fixes).\n- drm/amdgpu: disallow multiple BO_HANDLES chunks in one submit (stable-fixes).\n- drm/amdgpu: enable gfxoff quirk on HP 705G4 (stable-fixes).\n- drm/amdgpu: fix unchecked return value warning for amdgpu_gfx (stable-fixes).\n- drm/amdgpu: prevent BO_HANDLES error from being overwritten (git-fixes).\n- drm/amdgpu: prevent NULL pointer dereference if ATIF is not supported (git-fixes).\n- drm/amdgpu: properly handle vbios fake edid sizing (git-fixes).\n- drm/amdgpu: Replace one-element array with flexible-array member (stable-fixes).\n- drm/amdkfd: Fix resource leak in criu restore queue (stable-fixes).\n- drm/bridge: anx7625: Drop EDID cache on bridge power off (git-fixes).\n- drm/bridge: tc358767: Fix link properties discovery (git-fixes).\n- drm/bridge: tc358768: Fix DSI command tx (git-fixes).\n- drm/etnaviv: Request pages from DMA32 zone on addressing_limited (git-fixes).\n- drm/imx/dcss: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).\n- drm/mm: Mark drm_mm_interval_tree*() functions with __maybe_unused (git-fixes).\n- drm/msm: Allocate memory for disp snapshot with kvzalloc() (git-fixes).\n- drm/msm: Avoid NULL dereference in msm_disp_state_print_regs() (git-fixes).\n- drm/msm/adreno: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).\n- drm/msm/dpu: cast crtc_clk calculation to u64 in _dpu_core_perf_calc_clk() (git-fixes).\n- drm/msm/dpu: do not always program merge_3d block (git-fixes).\n- drm/msm/dpu: make sure phys resources are properly initialized (git-fixes).\n- drm/msm/dsi: fix 32-bit signed integer extension in pclk_rate calculation (git-fixes).\n- drm/omap: Fix locking in omap_gem_new_dmabuf() (git-fixes).\n- drm/omap: Fix possible NULL dereference (git-fixes).\n- drm/panfrost: Remove unused id_mask from struct panfrost_model (git-fixes).\n- drm/printer: Allow NULL data in devcoredump printer (stable-fixes).\n- drm/radeon: Fix encoder->possible_clones (git-fixes).\n- drm/radeon: properly handle vbios fake edid sizing (git-fixes).\n- drm/radeon: Replace one-element array with flexible-array member (stable-fixes).\n- drm/radeon/r100: Handle unknown family in r100_cp_init_microcode() (stable-fixes).\n- drm/rockchip: define gamma registers for RK3399 (stable-fixes).\n- drm/rockchip: support gamma control on RK3399 (stable-fixes).\n- drm/rockchip: vop: Fix a dereferenced before check warning (git-fixes).\n- drm/sched: Add locking to drm_sched_entity_modify_sched (git-fixes).\n- drm/sti: avoid potential dereference of error pointers (git-fixes).\n- drm/sti: avoid potential dereference of error pointers in sti_gdp_atomic_check (git-fixes).\n- drm/sti: avoid potential dereference of error pointers in sti_hqvdp_atomic_check (git-fixes).\n- drm/v3d: Address race-condition in MMU flush (git-fixes).\n- drm/v3d: Stop the active perfmon before being destroyed (git-fixes).\n- drm/vboxvideo: Replace fake VLA at end of vbva_mouse_pointer_shape with real VLA (stable-fixes).\n- drm/vc4: hvs: Do not write gamma luts on 2711 (git-fixes).\n- drm/vc4: hvs: Fix dlist debug not resetting the next entry pointer (git-fixes).\n- drm/vc4: hvs: Remove incorrect limit from hvs_dlist debugfs function (git-fixes).\n- drm/vc4: Stop the active perfmon before being destroyed (git-fixes).\n- drm/vmwgfx: Handle surface check failure correctly (git-fixes).\n- drm/vmwgfx: Limit display layout ioctl array size to VMWGFX_NUM_DISPLAY_UNITS (stable-fixes).\n- drop HD-audio conexant patch that caused a regression on Thinkpad (bsc#1228269)\n- Drop OCFS2 patch causing a regression (bsc#1233255) \n- drop USB dwc2 patch that caused a regression on RPi3 (bsc#1232342)\n- e1000e: Fix S0ix residency on corporate systems (git-fixes).\n- efi/memattr: Ignore table if the size is clearly bogus (bsc#1231465).\n- efistub/tpm: Use ACPI reclaim memory for event log to avoid corruption (stable-fixes).\n- erofs: avoid consecutive detection for Highmem memory (git-fixes).\n- erofs: avoid infinite loop in z_erofs_do_read_page() when reading beyond EOF (git-fixes).\n- erofs: fix pcluster use-after-free on UP platforms (git-fixes).\n- erofs: fix potential overflow calculating xattr_isize (git-fixes).\n- erofs: stop parsing non-compact HEAD index if clusterofs is invalid (git-fixes).\n- eth: bnxt: fix counting packets discarded due to OOM and netpoll (git-fixes).\n- exportfs: use pr_debug for unreachable debug statements (git-fixes).\n- ext4: fix slab-use-after-free in ext4_split_extent_at() (bsc#1232201)\n- fat: fix uninitialized variable (git-fixes).\n- fbdev: pxafb: Fix possible use after free in pxafb_task() (stable-fixes).\n- fbdev: sisfb: Fix strbuf array overflow (stable-fixes).\n- fgraph: Change the name of cpuhp state to 'fgraph:online' (git-fixes).\n- fgraph: Fix missing unlock in register_ftrace_graph() (git-fixes).\n- fgraph: Use CPU hotplug mechanism to initialize idle shadow stacks (git-fixes).\n- filelock: fix potential use-after-free in posix_lock_inode (git-fixes).\n- firmware: google: Unregister driver_info on failure (git-fixes).\n- firmware: tegra: bpmp: Drop unused mbox_client_to_bpmp() (git-fixes).\n- Fix regression on AMDGPU driver (bsc#1233134) \n- fs: Fix file_set_fowner LSM hook inconsistencies (git-fixes).\n- fs/namespace: fnic: Switch to use %ptTd (git-fixes).\n- fs/pipe: Fix lockdep false-positive in watchqueue pipe_write() (git-fixes).\n- genirq/msi: Fix off-by-one error in msi_domain_alloc() (git-fixes).\n- goldfish: Fix unused const variable 'goldfish_pipe_acpi_match' (git-fixes).\n- gpio: aspeed: Add the flush write to ensure the write complete (git-fixes).\n- gpio: aspeed: Use devm_clk api to manage clock source (git-fixes).\n- gpio: davinci: fix lazy disable (git-fixes).\n- gve: Fix an edge case for TSO skb validity check (git-fixes).\n- gve: Fix skb truesize underestimation (git-fixes).\n- gve: Fix XDP TX completion handling when counters overflow (git-fixes).\n- gve: ignore nonrelevant GSO type bits when processing TSO headers (git-fixes).\n- hid: amd_sfh: Switch to device-managed dmam_alloc_coherent() (git-fixes).\n- hid: core: zero-initialize the report buffer (git-fixes).\n- hid: intel-ish-hid: Fix uninitialized variable 'rv' in ish_fw_xfer_direct_dma (git-fixes).\n- hid: lenovo: Add support for Thinkpad X1 Tablet Gen 3 keyboard (stable-fixes).\n- hid: multitouch: Add quirk for HONOR MagicBook Art 14 touchpad (stable-fixes).\n- hid: multitouch: Add quirk for Logitech Bolt receiver w/ Casa touchpad (stable-fixes).\n- hid: multitouch: Add support for B2402FVA track point (stable-fixes).\n- hid: multitouch: Add support for GT7868Q (stable-fixes).\n- hid: multitouch: Add support for Thinkpad X12 Gen 2 Kbd Portfolio (stable-fixes).\n- hid: plantronics: Workaround for an unexcepted opposite volume key (stable-fixes).\n- hid: wacom: Defer calculation of resolution until resolution_code is known (git-fixes).\n- hid: wacom: fix when get product name maybe null pointer (git-fixes).\n- hid: wacom: Interpret tilt data from Intuos Pro BT as signed values (git-fixes).\n- hv_netvsc: Fix VF namespace also in synthetic NIC NETDEV_REGISTER event (git-fixes).\n- hv_sock: Initializing vsk->trans to NULL to prevent a dangling pointer (git-fixes).\n- hwmon: (adm9240) Add missing dependency on REGMAP_I2C (git-fixes).\n- hwmon: (tmp513) Add missing dependency on REGMAP_I2C (git-fixes).\n- hwmon: (tps23861) Fix reporting of negative temperatures (git-fixes).\n- i2c: i801: Use a different adapter-name for IDF adapters (stable-fixes).\n- i2c: imx-lpi2c: return -EINVAL when i2c peripheral clk does not work (bsc#1227885).\n- i2c: imx-lpi2c: use bulk clk API (bsc#1227885).\n- i2c: stm32f7: Do not prepare/unprepare clock during runtime suspend/resume (git-fixes).\n- i2c: xiic: Fix broken locking on tx_msg (stable-fixes).\n- i2c: xiic: Fix pm_runtime_set_suspended() with runtime pm enabled (git-fixes).\n- i2c: xiic: Fix RX IRQ busy check (stable-fixes).\n- i2c: xiic: improve error message when transfer fails to start (stable-fixes).\n- i2c: xiic: Switch from waitqueue to completion (stable-fixes).\n- i2c: xiic: Try re-initialization on bus busy timeout (git-fixes).\n- i2c: xiic: Use devm_clk_get_enabled() (stable-fixes).\n- i2c: xiic: xiic_xfer(): Fix runtime PM leak on error path (git-fixes).\n- i3c: master: Fix miss free init_dyn_addr at i3c_master_put_i3c_addrs() (git-fixes).\n- i40e: avoid double calling i40e_pf_rxq_wait() (git-fixes).\n- i40e: disable NAPI right after disabling irqs when handling xsk_pool (git-fixes).\n- i40e: Fix filter input checks to prevent config with invalid values (git-fixes).\n- i40e: fix use-after-free in i40e_aqc_add_filters() (git-fixes).\n- i40e: Fix waiting for queues of all VSIs to be disabled (git-fixes).\n- i40e: Fix XDP program unloading while removing the driver (git-fixes).\n- i40e: Report MFS in decimal base instead of hex (git-fixes).\n- i40e: Restore VF MSI-X state during PCI reset (git-fixes).\n- i40e: take into account XDP Tx queues when stopping rings (git-fixes).\n- iavf: do not process adminq tasks when __IAVF_IN_REMOVE_TASK is set (git-fixes).\n- iavf: fix FDIR rule fields masks validation (git-fixes).\n- iavf: Fix promiscuous mode configuration flow messages (git-fixes).\n- iavf: Fix TC config comparison with existing adapter TC config (git-fixes).\n- iavf: in iavf_down, disable queues when removing the driver (git-fixes).\n- iavf: initialize waitqueues before starting watchdog_task (git-fixes).\n- iavf: Introduce new state machines for flow director (git-fixes).\n- iavf: send VLAN offloading caps once after VFR (git-fixes).\n- iavf: validate tx_coalesce_usecs even if rx_coalesce_usecs is zero (git-fixes).\n- ibmvnic: Do partial reset on login failure (bsc#1233150).\n- ibmvnic: Enforce stronger sanity checks on login response (bsc#1233150).\n- ibmvnic: Ensure login failure recovery is safe from other resets (bsc#1233150).\n- ibmvnic: Handle DMA unmapping of login buffs in release functions (bsc#1233150).\n- ibmvnic: Unmap DMA login rsp buffer on send login fail (bsc#1233150).\n- ice: avoid executing commands on other ports when driving sync (git-fixes).\n- ice: Block switchdev mode when ADQ is active and vice versa (git-fixes).\n- ice: change q_index variable type to s16 to store -1 value (git-fixes).\n- ice: fix accounting for filters shared by multiple VSIs (git-fixes).\n- ice: fix accounting if a VLAN already exists (git-fixes).\n- ice: fix ICE_LAST_OFFSET formula (git-fixes).\n- ice: Fix link_down_on_close message (git-fixes).\n- ice: Fix netif_is_ice() in Safe Mode (git-fixes).\n- ice: Fix NULL pointer deref during VF reset (git-fixes).\n- ice: fix over-shifted variable (git-fixes).\n- ice: fix receive buffer size miscalculation (git-fixes).\n- ice: fix VLAN replay after reset (git-fixes).\n- ice: Fix VSI list rule with ICE_SW_LKUP_LAST type (git-fixes).\n- ice: ice_aq_check_events: fix off-by-one check when filling buffer (git-fixes).\n- ice: Interpret .set_channels() input differently (git-fixes).\n- ice: reset first in crash dump kernels (git-fixes).\n- ice: respect netif readiness in AF_XDP ZC related ndo's (git-fixes).\n- ice: Shut down VSI with 'link-down-on-close' enabled (git-fixes).\n- ice: tc: allow zero flags in parsing tc flower (git-fixes).\n- ice: Unbind the workqueue (bsc#1231344).\n- ice: virtchnl: stop pretending to support RSS over AQ or registers (git-fixes).\n- idpf: avoid compiler introduced padding in virtchnl2_rss_key struct (git-fixes).\n- idpf: avoid compiler padding in virtchnl2_ptype struct (git-fixes).\n- idpf: disable local BH when scheduling napi for marker packets (git-fixes).\n- idpf: distinguish vports by the dev_port attribute (git-fixes).\n- idpf: do not enable NAPI and interrupts prior to allocating Rx buffers (git-fixes).\n- idpf: fix corrupted frames and skb leaks in singleq mode (git-fixes).\n- idpf: fix memleak in vport interrupt configuration (git-fixes).\n- idpf: fix memory leaks and crashes while performing a soft reset (git-fixes).\n- idpf: fix UAFs when destroying the queues (git-fixes).\n- idpf: Interpret .set_channels() input differently (git-fixes).\n- igb: Always call igb_xdp_ring_update_tail() under Tx lock (git-fixes).\n- igb: extend PTP timestamp adjustments to i211 (git-fixes).\n- igb: Fix missing time sync events (git-fixes).\n- igb: Fix not clearing TimeSync interrupts for 82580 (git-fixes).\n- igc: Check VLAN EtherType mask (git-fixes).\n- igc: Check VLAN TCI mask (git-fixes).\n- igc: Fix hicredit calculation (git-fixes).\n- igc: Fix missing time sync events (git-fixes).\n- igc: Remove temporary workaround (git-fixes).\n- igc: Report VLAN EtherType matching back to user (git-fixes).\n- igc: Unlock on error in igc_io_resume() (git-fixes).\n- iio: adc: ad7124: fix division by zero in ad7124_set_channel_odr() (git-fixes).\n- iio: adc: ad7606: Fix typo in the driver name (git-fixes).\n- iio: adc: ad7923: Fix buffer overflow for tx_buf and ring_xfer (git-fixes).\n- iio: dac: ad5770r: add missing select REGMAP_SPI in Kconfig (git-fixes).\n- iio: dac: ltc1660: add missing select REGMAP_SPI in Kconfig (git-fixes).\n- iio: dac: stm32-dac-core: add missing select REGMAP_MMIO in Kconfig (git-fixes).\n- iio: hid-sensors: Fix an error handling path in _hid_sensor_set_report_latency() (git-fixes).\n- iio: light: al3010: Fix an error handling path in al3010_probe() (git-fixes).\n- iio: light: opt3001: add missing full-scale range value (git-fixes).\n- iio: light: veml6030: fix ALS sensor resolution (git-fixes).\n- iio: light: veml6030: fix IIO device retrieval from embedded device (git-fixes).\n- iio: light: veml6030: fix microlux value calculation (git-fixes).\n- iio: proximity: mb1232: add missing select IIO_(TRIGGERED_)BUFFER in Kconfig (git-fixes).\n- initramfs: avoid filename buffer overrun (bsc#1232436).\n- input: adp5589-keys - fix adp5589_gpio_get_value() (git-fixes).\n- input: adp5589-keys - fix NULL pointer dereference (git-fixes).\n- input: ads7846 - ratelimit the spi_sync error message (stable-fixes).\n- input: goodix - use the new soc_intel_is_byt() helper (stable-fixes).\n- input: i8042 - add another board name for TUXEDO Stellaris Gen5 AMD line (git-fixes).\n- input: i8042 - add Ayaneo Kun to i8042 quirk table (git-fixes).\n- input: i8042 - add Fujitsu Lifebook E756 to i8042 quirk table (git-fixes).\n- input: i8042 - add TUXEDO Stellaris 15 Slim Gen6 AMD to i8042 quirk table (git-fixes).\n- input: i8042 - add TUXEDO Stellaris 16 Gen5 AMD to i8042 quirk table (git-fixes).\n- input: synaptics - enable SMBus for HP Elitebook 840 G2 (stable-fixes).\n- iommu/vt-d: Always reserve a domain ID for identity setup (git-fixes).\n- ipv6: blackhole_netdev needs snmp6 counters (bsc#1216813).\n- ipv6: give an IPv6 dev to blackhole_netdev (bsc#1216813).\n- irqchip/gic-v3-its: Avoid explicit cpumask allocation on stack (git-fixes).\n- irqchip/gic-v3-its: Fix VSYNC referencing an unmapped VPE on GIC v4.1 (git-fixes).\n- itco_wdt: mask NMI_NOW bit for update_no_reboot_bit() call (git-fixes).\n- ixgbe: {dis, en}able irqs in ixgbe_txrx_ring_{dis, en}able (git-fixes).\n- ixgbe: avoid sleeping allocation in ixgbe_ipsec_vf_add_sa() (git-fixes).\n- ixgbe: fix crash with empty VF macvlan list (git-fixes).\n- ixgbe: fix timestamp configuration code (git-fixes).\n- jfs: check if leafidx greater than num leaves per dmap tree (git-fixes).\n- jfs: Fix sanity check in dbMount (git-fixes).\n- jfs: Fix uaf in dbFreeBits (git-fixes).\n- jfs: Fix uninit-value access of new_ea in ea_buffer (git-fixes).\n- jfs: UBSAN: shift-out-of-bounds in dbFindBits (git-fixes).\n- kab: fix after net: add more sanity check in virtio_net_hdr_to_skb() (git-fixes).\n- kabi fix of KVM: arm64: Preserve PSTATE.SS for the guest while single-step is enabled (git-fixes).\n- kABI: bpf: enum bpf_{type_flag,arg_type} kABI workaround (git-fixes).\n- kABI: bpf: struct bpf_func_proto kABI workaround (git-fixes).\n- kabi: fix after kvm: add guest_state_{enter,exit}_irqoff() (git-fixes).\n- kabi: fix after KVM: arm64: mixed-width check should be skipped for uninitialized vCPUs (git-fixes).\n- kabi: Restore exported __arm_smccc_sve_check (git-fixes)\n- kbuild, bpf: Use test-ge check for v1.25-only pahole (bsc#1230414 bsc#1229450).\n- kbuild,bpf: Add module-specific pahole flags for distilled base BTF (bsc#1230414 bsc#1229450).\n- kbuild,bpf: Switch to using --btf_features for pahole v1.26 and later (bsc#1230414 bsc#1229450).\n- kbuild: add test-{ge,gt,le,lt} macros (bsc#1230414 bsc#1229450).\n- kbuild: avoid too many execution of scripts/pahole-flags.sh (bsc#1230414 bsc#1229450).\n- kbuild: bpf: Tell pahole to DECL_TAG kfuncs (bsc#1230414 bsc#1229450).\n- kernel-binary: Enable livepatch package only when livepatch is enabled Otherwise the filelist may be empty failing the build (bsc#1218644).\n- kernel.h: split out COUNT_ARGS() and CONCATENATE() to args.h (git-fixes)\n- kexec: fix a memory leak in crash_shrink_memory() (git-fixes).\n- kvm: add guest_state_{enter,exit}_irqoff() (git-fixes).\n- kvm: Add support for arch compat vm ioctls (git-fixes).\n- kvm: arm64: Add missing memory barriers when switching to pKVM's hyp pgd (git-fixes).\n- kvm: arm64: Allow AArch32 PSTATE.M to be restored as System mode (git-fixes).\n- kvm: arm64: Fix AArch32 register narrowing on userspace write (git-fixes).\n- kvm: arm64: GICv4: Do not perform a map to a mapped vLPI (git-fixes).\n- kvm: arm64: Invalidate EL1&0 TLB entries for all VMIDs in nvhe hyp init (git-fixes).\n- kvm: arm64: mixed-width check should be skipped for uninitialized vCPUs (git-fixes).\n- kvm: arm64: Preserve PSTATE.SS for the guest while single-step is enabled (git-fixes).\n- kvm: arm64: Release pfn, i.e. put page, if copying MTE tags hits ZONE_DEVICE (git-fixes).\n- kvm: arm64: vgic-its: Test for valid IRQ in its_sync_lpi_pending_table() (git-fixes).\n- kvm: arm64: vgic-its: Test for valid IRQ in MOVALL handler (git-fixes).\n- kvm: arm64: vgic-v2: Check for non-NULL vCPU in vgic_v2_parse_attr() (git-fixes).\n- kvm: arm64: vgic-v2: Use cpuid from userspace as vcpu_id (git-fixes).\n- kvm: arm64: vgic-v4: Restore pending state on host userspace write (git-fixes).\n- kvm: eventfd: Fix false positive RCU usage warning (git-fixes).\n- kvm: Fix coalesced_mmio_has_room() to avoid premature userspace exit (git-fixes).\n- kvm: Fix lockdep false negative during host resume (git-fixes).\n- kvm: fix memoryleak in kvm_init() (git-fixes).\n- kvm: Grab a reference to KVM for VM and vCPU stats file descriptors (git-fixes).\n- kvm: Optimize kvm_make_vcpus_request_mask() a bit (git-fixes).\n- kvm: PPC: Book3S HV: remove unused varible (bsc#1194869).\n- kvm: Pre-allocate cpumasks for kvm_make_all_cpus_request_except() (git-fixes).\n- kvm: Reject overly excessive IDs in KVM_CREATE_VCPU (git-fixes).\n- kvm: s390: Change virtual to physical address access in diag 0x258 handler (git-fixes bsc#1232631).\n- kvm: s390: Fix SORTL and DFLTCC instruction format error in __insn32_query (git-fixes bsc#1231277).\n- kvm: s390: gaccess: Check if guest address is in memslot (git-fixes bsc#1232630).\n- kvm: SVM: Disallow guest from changing userspace's MSR_AMD64_DE_CFG value (git-fixes).\n- kvm: SVM: Do not advertise Bus Lock Detect to guest if SVM support is missing (git-fixes).\n- kvm: SVM: fix emulation of msr reads/writes of MSR_FS_BASE and MSR_GS_BASE (git-fixes).\n- kvm: Unconditionally get a ref to /dev/kvm module when creating a VM (git-fixes).\n- kvm: Write the per-page 'segment' when clearing (part of) a guest page (git-fixes).\n- kvm: x86: Use a stable condition around all VT-d PI paths (git-fixes).\n- kvm: x86/mmu: Fold rmap_recycle into rmap_add (git-fixes).\n- kvm: x86/mmu: Rename slot_handle_leaf to slot_handle_level_4k (git-fixes).\n- kvm/arm64: rework guest entry logic (git-fixes).\n- mac80211: MAC80211_MESSAGE_TRACING should depend on TRACING (git-fixes).\n- Makefile.compiler: replace cc-ifversion with compiler-specific macros (bsc#1230414 bsc#1229450).\n- media: adv7604: prevent underflow condition when reporting colorspace (git-fixes).\n- media: cx24116: prevent overflows on SNR calculus (git-fixes).\n- media: dvb_frontend: do not play tricks with underflow values (git-fixes).\n- media: dvb-usb-v2: af9035: fix missing unlock (git-fixes).\n- media: dvb-usb-v2: af9035: Fix null-ptr-deref in af9035_i2c_master_xfer (stable-fixes).\n- media: dvbdev: prevent the risk of out of memory access (git-fixes).\n- media: pci: cx23885: check cx23885_vdev_init() return (stable-fixes).\n- media: pulse8-cec: fix data timestamp at pulse8_setup() (git-fixes).\n- media: stb0899_algo: initialize cfr before using it (git-fixes).\n- media: v4l2-ctrls-api: fix error handling for v4l2_g_ctrl() (git-fixes).\n- media: v4l2-tpg: prevent the risk of a division by zero (git-fixes).\n- media: videobuf2-core: clear memory related fields in __vb2_plane_dmabuf_put() (stable-fixes).\n- mei: use kvmalloc for read buffer (git-fixes).\n- misc: apds990x: Fix missing pm_runtime_disable() (git-fixes).\n- mm/hugetlb: fix nodes huge page allocation when there are surplus pages (bsc#1234012).\n- mm/memory: add non-anonymous page check in the copy_present_page() (bsc#1231646).\n- modpost: remove incorrect code in do_eisa_entry() (git-fixes).\n- module: abort module loading when sysfs setup suffer errors (git-fixes).\n- nbd: fix race between timeout and normal completion (bsc#1230918).\n- net: add more sanity check in virtio_net_hdr_to_skb() (git-fixes).\n- net: ena: Fix potential sign extension issue (git-fixes).\n- net: ena: Remove ena_select_queue (git-fixes).\n- net: ena: Wrong missing IO completions check order (git-fixes).\n- net: mana: Implement get_ringparam/set_ringparam for mana (bsc#1229891).\n- net: mana: Improve mana_set_channels() in low mem conditions (bsc#1230289).\n- net: qede: use return from qede_parse_flow_attr() for flow_spec (git-fixes).\n- net: relax socket state check at accept time (git-fixes).\n- net: socket: suppress unused warning (git-fixes).\n- net: test for not too small csum_start in virtio_net_hdr_to_skb() (git-fixes).\n- net: usb: lan78xx: Fix memory leak on device unplug by freeing PHY device (git-fixes).\n- net: usb: lan78xx: Fix refcounting and autosuspend on invalid WoL configuration (git-fixes).\n- net: usb: qmi_wwan: add Fibocom FG132 0x0112 composition (stable-fixes).\n- net: usb: usbnet: fix name regression (git-fixes).\n- net: usb: usbnet: fix race in probe failure (git-fixes).\n- net/mlx5: Add missing masks and QoS bit masks for scheduling elements (git-fixes).\n- net/mlx5: Added cond_resched() to crdump collection (git-fixes).\n- net/mlx5: Allow 0 for total host VFs (git-fixes).\n- net/mlx5: Correctly compare pkt reformat ids (git-fixes).\n- net/mlx5: DR, Can't go to uplink vport on RX rule (git-fixes).\n- net/mlx5: DR, fix memory leak in mlx5dr_cmd_create_reformat_ctx (git-fixes).\n- net/mlx5: DR, Use the right GVMI number for drop action (git-fixes).\n- net/mlx5: Drain health before unregistering devlink (git-fixes).\n- net/mlx5: E-switch, register event handler before arming the event (git-fixes).\n- net/mlx5: Explicitly set scheduling element and TSAR type (git-fixes).\n- net/mlx5: Fix fw tracer first block check (git-fixes).\n- net/mlx5: fix potential memory leak in mlx5e_init_rep_rx (git-fixes).\n- net/mlx5: fs, lock FTE when checking if active (git-fixes).\n- net/mlx5: Handle fw tracer change ownership event based on MTRC (git-fixes).\n- net/mlx5: LAG, Check correct bucket when modifying LAG (git-fixes).\n- net/mlx5: Lag, do bond only if slaves agree on roce state (git-fixes).\n- net/mlx5: Lag, do not use the hardcoded value of the first port (git-fixes).\n- net/mlx5: Lag, restore buckets number to default after hash LAG deactivation (git-fixes).\n- net/mlx5: Skip clock update work when device is in error state (git-fixes).\n- net/mlx5: Unregister notifier on eswitch init failure (git-fixes).\n- net/mlx5: Update the list of the PCI supported devices (git-fixes).\n- net/mlx5: Use mlx5 device constant for selecting CQ period mode for ASO (git-fixes).\n- net/mlx5: Use recovery timeout on sync reset flow (git-fixes).\n- net/mlx5: Use RMW accessors for changing LNKCTL (git-fixes).\n- net/mlx5e: Add a check for the return value from mlx5_port_set_eth_ptys (git-fixes).\n- net/mlx5e: Add missing link modes to ptys2ethtool_map (git-fixes).\n- net/mlx5e: Add mqprio_rl cleanup and free in mlx5e_priv_cleanup() (git-fixes).\n- net/mlx5e: Again mutually exclude RX-FCS and RX-port-timestamp (git-fixes).\n- net/mlx5e: Allow software parsing when IPsec crypto is enabled (git-fixes).\n- net/mlx5e: Change the warning when ignore_flow_level is not supported (git-fixes).\n- net/mlx5e: Check return value of snprintf writing to fw_version buffer (git-fixes).\n- net/mlx5e: Check return value of snprintf writing to fw_version buffer for representors (git-fixes).\n- net/mlx5e: Correct snprintf truncation handling for fw_version buffer (git-fixes).\n- net/mlx5e: Correct snprintf truncation handling for fw_version buffer used by representors (git-fixes).\n- net/mlx5e: Correctly report errors for ethtool rx flows (git-fixes).\n- net/mlx5e: CT: Fix null-ptr-deref in add rule err flow (git-fixes).\n- net/mlx5e: Do not offload internal port if filter device is out device (git-fixes).\n- net/mlx5e: fix a potential double-free in fs_udp_create_groups (git-fixes).\n- net/mlx5e: Fix crash moving to switchdev mode when ntuple offload is set (git-fixes).\n- net/mlx5e: fix double free in macsec_fs_tx_create_crypto_table_groups (git-fixes).\n- net/mlx5e: fix double free of encap_header (git-fixes).\n- net/mlx5e: Fix features validation check for tunneled UDP (non-VXLAN) packets (git-fixes).\n- net/mlx5e: Fix IPsec tunnel mode offload feature check (git-fixes).\n- net/mlx5e: Fix pedit endianness (git-fixes).\n- net/mlx5e: Fix possible deadlock on mlx5e_tx_timeout_work (git-fixes).\n- net/mlx5e: fix return value check in mlx5e_ipsec_remove_trailer() (git-fixes).\n- net/mlx5e: Fix slab-out-of-bounds in mlx5_query_nic_vport_mac_list() (git-fixes).\n- net/mlx5e: Fix UDP GSO for encapsulated packets (git-fixes).\n- net/mlx5e: HTB, Fix inconsistencies with QoS SQs number (git-fixes).\n- net/mlx5e: kTLS, Fix incorrect page refcounting (git-fixes).\n- net/mlx5e: Move representor neigh cleanup to profile cleanup_tx (git-fixes).\n- net/mlx5e: Reduce the size of icosq_str (git-fixes).\n- net/mlx5e: Take state lock during tx timeout reporter (git-fixes).\n- net/mlx5e: Use rx_missed_errors instead of rx_dropped for reporting buffer exhaustion (git-fixes).\n- net/sched: taprio: Limit TCA_TAPRIO_ATTR_SCHED_CYCLE_TIME to INT_MAX (bsc#1226797)\n- netdevsim: use cond_resched() in nsim_dev_trap_report_work() (git-fixes).\n- nfs: Avoid unnecessary rescanning of the per-server delegation list (git-fixes).\n- nfs: Fix KMSAN warning in decode_getfattr_attrs() (git-fixes).\n- nfs: fix memory leak in error path of nfs4_do_reclaim (git-fixes).\n- nfsd: call cache_put if xdr_reserve_space returns NULL (git-fixes).\n- nfsd: fix delegation_blocked() to block correctly for at least 30 seconds (git-fixes).\n- nfsd: Fix NFSv4's PUTPUBFH operation (git-fixes).\n- nfsd: fix refcount leak when file is unhashed after being found (git-fixes).\n- nfsd: map the EBADMSG to nfserr_io to avoid warning (git-fixes).\n- nfsd: Mark filecache 'down' if init fails (git-fixes).\n- nfsd: remove unneeded EEXIST error check in nfsd_do_file_acquire (git-fixes).\n- nfsd: return -EINVAL when namelen is 0 (git-fixes).\n- nfsv3: only use NFS timeout for MOUNT when protocols are compatible (bsc#1231016).\n- nfsv4: Fix clearing of layout segments in layoutreturn (git-fixes).\n- nilfs2: fix kernel bug due to missing clearing of buffer delay flag (git-fixes).\n- nouveau/dmem: Fix vulnerability in migrate_to_ram upon copy error (git-fixes).\n- ntb: intel: Fix the NULL vs IS_ERR() bug for debugfs_create_dir() (git-fixes).\n- ntb: ntb_hw_switchtec: Fix use after free vulnerability in switchtec_ntb_remove due to race condition (stable-fixes).\n- nvme-fabrics: fix kernel crash while shutting down controller (git-fixes).\n- nvme-multipath: system fails to create generic nvme device (git-fixes).\n- nvme-pci: fix freeing of the HMB descriptor table (git-fixes).\n- nvme-pci: qdepth 1 quirk (git-fixes).\n- nvme-pci: reverse request order in nvme_queue_rqs (git-fixes).\n- nvmet-auth: assign dh_key to NULL after kfree_sensitive (git-fixes).\n- ocfs2: fix the la space leak when unmounting an ocfs2 volume (git-fixes).\n- ocfs2: fix uninit-value in ocfs2_get_block() (git-fixes).\n- ocfs2: pass u64 to ocfs2_truncate_inline maybe overflow (git-fixes).\n- ocfs2: remove entry once instead of null-ptr-dereference in ocfs2_xa_remove() (git-fixes).\n- parport: Proper fix for array out-of-bounds access (git-fixes).\n- pci: Add ACS quirk for Qualcomm SA8775P (stable-fixes).\n- pci: Add function 0 DMA alias quirk for Glenfly Arise chip (stable-fixes).\n- pci: Add T_PVPERL macro (git-fixes).\n- pci: endpoint: Clear secondary (not primary) EPC in pci_epc_remove_epf() (git-fixes).\n- pci: Fix pci_enable_acs() support for the ACS quirks (bsc#1229019).\n- pci: Fix reset_method_store() memory leak (git-fixes).\n- pci: j721e: Deassert PERST# after a delay of PCIE_T_PVPERL_MS milliseconds (git-fixes).\n- pci: keystone: Add link up check to ks_pcie_other_map_bus() (git-fixes).\n- pci: keystone: Set mode as Root Complex for 'ti,keystone-pcie' compatible (git-fixes).\n- pci: Mark Creative Labs EMU20k2 INTx masking as broken (stable-fixes).\n- pci: rockchip-ep: Fix address translation unit programming (git-fixes).\n- phy: tegra: xusb: Add error pointer check in xusb.c (git-fixes).\n- platform/chrome: cros_ec_typec: fix missing fwnode reference decrement (git-fixes).\n- platform/surface: aggregator_registry: Add support for Surface Laptop Go 3 (stable-fixes).\n- platform/surface: aggregator: Fix warning when controller is destroyed in probe (git-fixes).\n- platform/x86: dell-sysman: add support for alienware products (stable-fixes).\n- platform/x86: dell-wmi: Ignore suspend notifications (stable-fixes).\n- platform/x86: touchscreen_dmi: add nanote-next quirk (stable-fixes).\n- posix-cpu-timers: Clear TICK_DEP_BIT_POSIX_TIMER on clone (bsc#1234098).\n- power: reset: brcmstb: Do not go into infinite loop if reset fails (stable-fixes).\n- power: supply: bq27xxx: Fix registers of bq27426 (git-fixes).\n- power: supply: core: Remove might_sleep() from power_supply_put() (git-fixes).\n- powerpc: Allow clearing and restoring registers independent of saved breakpoint state (bsc#1194869).\n- powerpc: remove GCC version check for UPD_CONSTR (bsc#1194869).\n- powerpc/64: Convert patch_instruction() to patch_u32() (bsc#1194869).\n- powerpc/asm: Remove UPD_CONSTR after GCC 4.9 removal (bsc#1194869).\n- powerpc/atomic: Use YZ constraints for DS-form instructions (bsc#1194869).\n- powerpc/boot: Handle allocation failure in simple_realloc() (bsc#1194869).\n- powerpc/boot: Only free if realloc() succeeds (bsc#1194869).\n- powerpc/code-patching: Add generic memory patching (bsc#1194869).\n- powerpc/code-patching: Consolidate and cache per-cpu patching context (bsc#1194869).\n- powerpc/code-patching: Do not call is_vmalloc_or_module_addr() without CONFIG_MODULES (bsc#1194869).\n- powerpc/code-patching: Fix error handling in do_patch_instruction() (bsc#1194869).\n- powerpc/code-patching: Fix oops with DEBUG_VM enabled (bsc#1194869).\n- powerpc/code-patching: Fix unmap_patch_area() error handling (bsc#1194869).\n- powerpc/code-patching: introduce patch_instructions() (bsc#1194869).\n- powerpc/code-patching: Perform hwsync in __patch_instruction() in case of failure (bsc#1194869).\n- powerpc/code-patching: Pre-map patch area (bsc#1194869).\n- powerpc/code-patching: Remove #ifdef CONFIG_STRICT_KERNEL_RWX (bsc#1194869).\n- powerpc/code-patching: Remove pr_debug()/pr_devel() messages and fix check() (bsc#1194869).\n- powerpc/code-patching: Reorganise do_patch_instruction() to ease error handling (bsc#1194869).\n- powerpc/code-patching: Speed up page mapping/unmapping (bsc#1194869).\n- powerpc/code-patching: Use jump_label to check if poking_init() is done (bsc#1194869).\n- powerpc/code-patching: Use temporary mm for Radix MMU (bsc#1194869).\n- powerpc/code-patching: Use WARN_ON and fix check in poking_init (bsc#1194869).\n- powerpc/ftrace: Use patch_instruction() return directly (bsc#1194869).\n- powerpc/imc-pmu: Fix use of mutex in IRQs disabled section (bsc#1054914 git-fixes).\n- powerpc/imc-pmu: Use the correct spinlock initializer (bsc#1054914 git-fixes).\n- powerpc/inst: Refactor ___get_user_instr() (bsc#1194869).\n- powerpc/kexec: Fix return of uninitialized variable (bsc#1194869).\n- powerpc/lib: Add __init attribute to eligible functions (bsc#1194869).\n- powerpc/mm: Fix boot crash with FLATMEM (bsc#1194869).\n- powerpc/mm: Fix boot warning with hugepages and CONFIG_DEBUG_VIRTUAL (bsc#1194869).\n- powerpc/mm/fault: Fix kfence page fault reporting (bsc#1194869).\n- powerpc/powernv: Free name on error in opal_event_init() (bsc#1194869).\n- powerpc/pseries: Fix dtl_access_lock to be a rw_semaphore (bsc#1194869).\n- powerpc/pseries: Fix KVM guest detection for disabling hardlockup detector (bsc#1194869).\n- powerpc/tlb: Add local flush for page given mm_struct and psize (bsc#1194869).\n- powerpc/vdso: augment VDSO32 functions to support 64 bits build (bsc#1194869).\n- powerpc/vdso: Fix VDSO data access when running in a non-root time namespace (bsc#1194869).\n- powerpc/vdso: Merge vdso64 and vdso32 into a single directory (bsc#1194869).\n- powerpc/vdso: Rework VDSO32 makefile to add a prefix to object files (bsc#1194869).\n- powerpc/xics: Check return value of kasprintf in icp_native_map_one_cpu (bsc#1194869).\n- powerpc/xmon: Fix disassembly CPU feature checks (bsc#1065729).\n- qed: avoid truncating work queue length (git-fixes).\n- rcu-tasks: Fix show_rcu_tasks_trace_gp_kthread buffer overflow (bsc#1226631).\n- rcu: Add rcutree.nohz_full_patience_delay to reduce nohz_full (bsc#1231327)\n- rdma/bnxt_re: Add a check for memory allocation (git-fixes)\n- rdma/bnxt_re: Check cqe flags to know imm_data vs inv_irkey (git-fixes)\n- rdma/bnxt_re: Fix a bug while setting up Level-2 PBL pages (git-fixes)\n- rdma/bnxt_re: Fix incorrect AVID type in WQE structure (git-fixes)\n- rdma/bnxt_re: Fix the GID table length (git-fixes)\n- rdma/bnxt_re: Fix the max CQ WQEs for older adapters (git-fixes)\n- rdma/bnxt_re: Fix the usage of control path spin locks (git-fixes)\n- rdma/bnxt_re: Return more meaningful error (git-fixes)\n- rdma/bnxt_re: synchronize the qp-handle table array (git-fixes)\n- rdma/cxgb4: Dump vendor specific QP details (git-fixes)\n- rdma/cxgb4: Fix RDMA_CM_EVENT_UNREACHABLE error for iWARP (git-fixes)\n- rdma/hns: Add clear_hem return value to log (git-fixes)\n- rdma/hns: Add mutex_destroy() (git-fixes)\n- rdma/hns: Fix an AEQE overflow error caused by untimely update of eq_db_ci (git-fixes)\n- rdma/hns: Fix cpu stuck caused by printings during reset (git-fixes)\n- rdma/hns: Fix different dgids mapping to the same dip_idx (git-fixes)\n- rdma/hns: Fix flush cqe error when racing with destroy qp (git-fixes)\n- rdma/hns: Fix NULL pointer derefernce in hns_roce_map_mr_sg() (git-fixes)\n- rdma/hns: Fix out-of-order issue of requester when setting FENCE (git-fixes)\n- rdma/hns: Remove unnecessary QP type checks (git-fixes)\n- rdma/hns: Remove unused abnormal interrupt of type RAS (git-fixes)\n- rdma/hns: Use dev_* printings in hem code instead of ibdev_* (git-fixes)\n- rdma/hns: Use macro instead of magic number (git-fixes)\n- rdma/irdma: Fix misspelling of 'accept*' (git-fixes)\n- rdma/mad: Improve handling of timed out WRs of mad agent (git-fixes)\n- rdma/mana_ib: use the correct page size for mapping user-mode doorbell page (git-fixes).\n- rdma/mana_ib: use the correct page table index based on hardware page size (git-fixes).\n- rdma/mlx5: Move events notifier registration to be after device registration (git-fixes)\n- rdma/mlx5: Round max_rd_atomic/max_dest_rd_atomic up instead of down (git-fixes)\n- rdma/mlx5: Use sq timestamp as QP timestamp when RoCE is disabled (git-fixes).\n- rdma/rtrs-srv: Avoid null pointer deref during path establishment (git-fixes)\n- rdma/rxe: Fix the qp flush warnings in req (git-fixes)\n- rdma/rxe: Set queue pair cur_qp_state when being queried (git-fixes)\n- rdma/srpt: Make slab cache names unique (git-fixes)\n- Removed the duplicated check of static_assert(sizeof(struct work_struct) >= sizeof(struct rcu_head)).\n- Removed unnecessary white-space change in kernel/bpf/syscall.c\n- Revert 'cgroup: Fix memory leak caused by missing cgroup_bpf_offline' (bsc#1234108).\n- Revert 'ixgbe: Manual AN-37 for troublesome link partners for X550 SFI' (git-fixes).\n- Revert 'KVM: Prevent module exit until all VMs are freed' (git-fixes).\n- Revert 'mmc: dw_mmc: Fix IDMAC operation with pages bigger than 4K' (git-fixes).\n- Revert 'usb: gadget: composite: fix OS descriptors w_value logic' (git-fixes).\n- Revert 'usb: yurex: Replace snprintf() with the safer scnprintf() variant' (stable-fixes).\n- Revert PM changes that caused a regression on S4 resume (bsc#1231578).\n- rpm/check-for-config-changes: add HAVE_RUST and RUSTC_SUPPORTS_ to IGNORED_CONFIGS_RE They depend on SHADOW_CALL_STACK.\n- rpm/check-for-config-changes: Exclude ARCH_USING_PATCHABLE_FUNCTION_ENTRY gcc version dependent, at least on ppc\n- rpm/release-projects: Add SLFO projects (bsc#1231293).\n- rpm/scripts: Remove obsolete Symbols.list Symbols.list is not longer needed by the new klp-convert implementation. (bsc#1218644)\n- rtc: ab-eoz9: do not fail temperature reads on undervoltage notification (git-fixes).\n- rtc: abx80x: Fix WDT bit position of the status register (git-fixes).\n- rtc: check if __rtc_read_time was successful in rtc_timer_do_work() (git-fixes).\n- rtc: st-lpc: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).\n- s390/mm: Add cond_resched() to cmm_alloc/free_pages() (bsc#1228747).\n- s390/sclp_vt220: Convert newlines to CRLF instead of LFCR (git-fixes bsc#1232632).\n- sched/isolation: Prevent boot crash when the boot CPU is (bsc#1231327)\n- scsi: aacraid: Rearrange order of struct aac_srb_unit (git-fixes).\n- scsi: core: alua: I/O errors for ALUA state transitions (git-fixes).\n- scsi: core: Fix the return value of scsi_logical_block_count() (git-fixes).\n- scsi: core: Handle devices which return an unusually large VPD page count (git-fixes).\n- scsi: elx: libefc: Fix potential use after free in efc_nport_vport_del() (git-fixes).\n- scsi: fnic: Move flush_work initialization out of if block (bsc#1230055).\n- scsi: hpsa: Fix allocation size for Scsi_Host private data (git-fixes).\n- scsi: libsas: Fix exp-attached device scan after probe failure scanned in again after probe failed (git-fixes).\n- scsi: libsas: Fix the failure of adding phy with zero-address to port (git-fixes).\n- scsi: lpfc: Add cleanup of nvmels_wq after HBA reset (bsc#1233241).\n- scsi: lpfc: Add ELS_RSP cmd to the list of WQEs to flush in lpfc_els_flush_cmd() (bsc#1232757).\n- scsi: lpfc: Call lpfc_sli4_queue_unset() in restart and rmmod paths (bsc#1233241).\n- scsi: lpfc: Change lpfc_nodelist nlp_flag member into a bitmask (bsc#1233241).\n- scsi: lpfc: Check devloss callbk done flag for potential stale NDLP ptrs (bsc#1233241).\n- scsi: lpfc: Check SLI_ACTIVE flag in FDMI cmpl before submitting follow up FDMI (bsc#1233241).\n- scsi: lpfc: Copyright updates for 14.4.0.6 patches (bsc#1233241).\n- scsi: lpfc: Ensure DA_ID handling completion before deleting an NPIV instance (bsc#1232757).\n- scsi: lpfc: Fix kref imbalance on fabric ndlps from dev_loss_tmo handler (bsc#1232757).\n- scsi: lpfc: Modify CGN warning signal calculation based on EDC response (bsc#1233241).\n- scsi: lpfc: Prevent NDLP reference count underflow in dev_loss_tmo callback (bsc#1233241).\n- scsi: lpfc: Remove NLP_RELEASE_RPI flag from nodelist structure (bsc#1233241).\n- scsi: lpfc: Remove trailing space after \\n newline (bsc#1232757).\n- scsi: lpfc: Restrict support for 32 byte CDBs to specific HBAs (git-fixes).\n- scsi: lpfc: Revise TRACE_EVENT log flag severities from KERN_ERR to KERN_WARNING (bsc#1232757).\n- scsi: lpfc: Support loopback tests with VMID enabled (bsc#1232757).\n- scsi: lpfc: Update lpfc version to 14.4.0.5 (bsc#1232757).\n- scsi: lpfc: Update lpfc version to 14.4.0.6 (bsc#1233241).\n- scsi: lpfc: Update lpfc_els_flush_cmd() to check for SLI_ACTIVE before BSG flag (bsc#1233241).\n- scsi: lpfc: Update phba link state conditional before sending CMF_SYNC_WQE (bsc#1232757).\n- scsi: mac_scsi: Disallow bus errors during PDMA send (git-fixes).\n- scsi: mac_scsi: Refactor polling loop (git-fixes).\n- scsi: mac_scsi: Revise printk(KERN_DEBUG ...) messages (git-fixes).\n- scsi: mpi3mr: Avoid IOMMU page faults on REPORT ZONES (git-fixes).\n- scsi: mpi3mr: Fix ATA NCQ priority support (git-fixes).\n- scsi: mpt3sas: Avoid IOMMU page faults on REPORT ZONES (git-fixes).\n- scsi: NCR5380: Check for phase match during PDMA fixup (git-fixes).\n- scsi: qedf: Set qed_slowpath_params to zero before use (git-fixes).\n- scsi: scsi_transport_fc: Allow setting rport state to current state (git-fixes).\n- scsi: sd_zbc: Use kvzalloc() to allocate REPORT ZONES buffer (git-fixes).\n- scsi: smartpqi: correct stream detection (git-fixes).\n- scsi: smartpqi: revert propagate-the-multipath-failure-to-SML-quickly (git-fixes).\n- scsi: spi: Fix sshdr use (git-fixes).\n- scsi: wd33c93: Do not use stale scsi_pointer value (git-fixes).\n- security/keys: fix slab-out-of-bounds in key_task_permission (git-fixes).\n- selftests/bpf: Add a test case to write mtu result into .rodata (git-fixes).\n- selftests/bpf: Add a test case to write strtol result into .rodata (git-fixes).\n- selftests/bpf: Fix ARG_PTR_TO_LONG {half-,}uninitialized test (git-fixes).\n- selftests/bpf: Rename ARG_PTR_TO_LONG test description (git-fixes).\n- selftests/bpf: test for malformed BPF_CORE_TYPE_ID_LOCAL relocation (git-fixes).\n- serial: 8250: omap: Move pm_runtime_get_sync (git-fixes).\n- sfc: Check firmware supports Ethernet PTP filter (git-fixes).\n- sfc: do not unregister flow_indr if it was never registered (git-fixes).\n- sfc: fix a double-free bug in efx_probe_filters (git-fixes).\n- signal: Replace BUG_ON()s (bsc#1234093).\n- spi: atmel-quadspi: Fix register name in verbose logging function (git-fixes).\n- spi: bcm63xx: Enable module autoloading (stable-fixes).\n- spi: bcm63xx: Fix module autoloading (git-fixes).\n- spi: Fix acpi deferred irq probe (git-fixes).\n- spi: lpspi: release requested DMA channels (stable-fixes).\n- spi: lpspi: Silence error message upon deferred probe (stable-fixes).\n- spi: lpspi: Simplify some error message (git-fixes).\n- spi: ppc4xx: Avoid returning 0 when failed to parse and map IRQ (git-fixes).\n- spi: ppc4xx: handle irq_of_parse_and_map() errors (git-fixes).\n- spi: s3c64xx: fix timeout counters in flush_fifo (git-fixes).\n- spi: spi-fsl-lpspi: Undo runtime PM changes at driver exit time (git-fixes).\n- spi: spi-imx: Fix pm_runtime_set_suspended() with runtime pm enabled (git-fixes).\n- spi: spidev: Add missing spi_device_id for jg10309-01 (git-fixes).\n- staging: iio: frequency: ad9832: fix division by zero in ad9832_calc_freqreg() (git-fixes).\n- static_call: Do not make __static_call_return0 static (git-fixes).\n- sunrpc: clnt.c: Remove misleading comment (git-fixes).\n- sunrpc: Fix integer overflow in decode_rc_list() (git-fixes).\n- sunrpc: Fixup gss_status tracepoint error output (git-fixes).\n- thermal: core: Initialize thermal zones before registering them (git-fixes).\n- thermal: intel: int340x: processor: Fix warning during module unload (git-fixes).\n- tpm: Lock TPM chip in tpm_pm_suspend() first (bsc#1082555 git-fixes).\n- tracing: Consider the NULL character when validating the event length (git-fixes).\n- tracing/hwlat: Fix a race during cpuhp processing (git-fixes).\n- tracing/uprobes: Use trace_event_buffer_reserve() helper (git-fixes).\n- tun: Fix xdp_rxq_info's queue_index when detaching (git-fixes).\n- tun: prevent negative ifindex (git-fixes).\n- ucounts: fix counter leak in inc_rlimit_get_ucounts() (bsc#1233460).\n- Update config files (bsc#1218644). LIVEPATCH_IPA_CLONES=n => LIVEPATCH=n\n- Update config files. Enabled IDPF for ARM64 (bsc#1221309)\n- uprobe: avoid out-of-bounds memory access of fetching args (git-fixes).\n- uprobes: encapsulate preparation of uprobe args buffer (git-fixes).\n- usb: appledisplay: close race between probe and completion handler (stable-fixes).\n- usb: chaoskey: fail open after removal (git-fixes).\n- usb: chaoskey: Fix possible deadlock chaoskey_list_lock (git-fixes).\n- usb: chipidea: udc: enable suspend interrupt after usb reset (stable-fixes).\n- usb: dwc2: Adjust the timing of USB Driver Interrupt Registration in the Crashkernel Scenario (stable-fixes).\n- usb: dwc3: core: Stop processing of pending events if controller is halted (git-fixes).\n- usb: dwc3: gadget: Add missing check for single port RAM in TxFIFO resizing logic (git-fixes).\n- usb: dwc3: gadget: Fix checking for number of TRBs left (git-fixes).\n- usb: dwc3: gadget: Fix looping of queued SG entries (git-fixes).\n- usb: ehci-spear: fix call balance of sehci clk handling routines (git-fixes).\n- usb: gadget: core: force synchronous registration (git-fixes).\n- usb: misc: cypress_cy7c63: check for short transfer (stable-fixes).\n- usb: misc: yurex: fix race between read and write (stable-fixes).\n- usb: musb: sunxi: Fix accessing an released usb phy (git-fixes).\n- usb: phy: Fix API devm_usb_put_phy() can not release the phy (git-fixes).\n- usb: serial: ftdi_sio: Fix atomicity violation in get_serial_info() (git-fixes).\n- usb: serial: io_edgeport: fix use after free in debug printk (git-fixes).\n- usb: serial: option: add Fibocom FG132 0x0112 composition (stable-fixes).\n- usb: serial: option: add Quectel RG650V (stable-fixes).\n- usb: serial: option: add support for Quectel EG916Q-GL (stable-fixes).\n- usb: serial: option: add Telit FN920C04 MBIM compositions (stable-fixes).\n- usb: serial: pl2303: add device id for Macrosilicon MS3020 (stable-fixes).\n- usb: serial: qcserial: add support for Sierra Wireless EM86xx (stable-fixes).\n- usb: storage: ignore bogus device raised by JieLi BR21 USB sound chip (stable-fixes).\n- usb: typec: altmode should keep reference to parent (git-fixes).\n- usb: typec: fix potential out of bounds in ucsi_ccg_update_set_new_cam_cmd() (git-fixes).\n- usb: typec: fix unreleased fwnode_handle in typec_port_register_altmodes() (git-fixes).\n- usb: using mutex lock and supporting O_NONBLOCK flag in iowarrior_read() (git-fixes).\n- usb: xhci: Fix problem with xhci resume from suspend (stable-fixes).\n- usb: xhci: Fix TD invalidation under pending Set TR Dequeue (git-fixes).\n- usb: yurex: Fix inconsistent locking bug in yurex_read() (git-fixes).\n- usb: yurex: make waiting on yurex_write interruptible (git-fixes).\n- usb: yurex: Replace snprintf() with the safer scnprintf() variant (stable-fixes).\n- usbip: tools: Fix detach_port() invalid port error path (git-fixes).\n- usbnet: ipheth: fix carrier detection in modes 1 and 4 (stable-fixes).\n- Use pahole -j1 option for reproducible builds (bsc#1230414 bsc#1229450).\n- vdpa/mlx5: preserve CVQ vringh index (git-fixes).\n- vhost_vdpa: assign irq bypass producer token correctly (git-fixes).\n- vhost/scsi: null-ptr-dereference in vhost_scsi_get_req() (git-fixes).\n- virtio_console: fix misc probe bugs (git-fixes).\n- virtio_net: fixing XDP for fully checksummed packets handling (git-fixes).\n- virtio-net: synchronize probe with ndo_set_features (git-fixes).\n- vmxnet3: add command to allow disabling of offloads (bsc#1226498).\n- vmxnet3: add latency measurement support in vmxnet3 (bsc#1226498).\n- vmxnet3: prepare for version 9 changes (bsc#1226498).\n- vmxnet3: update to version 9 (bsc#1226498).\n- vsock/virtio: fix packet delivery to tap device (git-fixes).\n- watchdog: mediatek: Make sure system reset gets asserted in mtk_wdt_restart() (git-fixes).\n- watchdog: rti: of: honor timeout-sec property (git-fixes).\n- wifi: ath10k: fix invalid VHT parameters in supported_vht_mcs_rate_nss1 (git-fixes).\n- wifi: ath10k: fix invalid VHT parameters in supported_vht_mcs_rate_nss2 (git-fixes).\n- wifi: ath10k: Fix memory leak in management tx (git-fixes).\n- wifi: ath11k: fix array out-of-bound access in SoC stats (stable-fixes).\n- wifi: ath11k: Fix invalid ring usage in full monitor mode (git-fixes).\n- wifi: ath9k_htc: Use __skb_set_length() for resetting urb before resubmit (stable-fixes).\n- wifi: ath9k: add range check for conn_rsp_epid in htc_connect_service() (git-fixes).\n- wifi: ath9k: fix parameter check in ath9k_init_debug() (stable-fixes).\n- wifi: ath9k: fix possible integer overflow in ath9k_get_et_stats() (stable-fixes).\n- wifi: ath9k: Remove error checks when creating debugfs entries (git-fixes).\n- wifi: brcm80211: BRCM_TRACING should depend on TRACING (git-fixes).\n- wifi: iwlegacy: Clear stale interrupts before resuming device (stable-fixes).\n- wifi: iwlwifi: clear trans->state earlier upon error (stable-fixes).\n- wifi: iwlwifi: lower message level for FW buffer destination (stable-fixes).\n- wifi: iwlwifi: mvm: disconnect station vifs if recovery failed (stable-fixes).\n- wifi: iwlwifi: mvm: fix iwl_mvm_scan_fits() calculation (stable-fixes).\n- wifi: iwlwifi: mvm: Fix response handling in iwl_mvm_send_recovery_cmd() (git-fixes).\n- wifi: mac80211: do not pass a stopped vif to the driver in .get_txpower (git-fixes).\n- wifi: mac80211: skip non-uploaded keys in ieee80211_iter_keys (git-fixes).\n- wifi: mwifiex: Fix memcpy() field-spanning write warning in mwifiex_cmd_802_11_scan_ext() (stable-fixes).\n- wifi: mwifiex: Fix memcpy() field-spanning write warning in mwifiex_config_scan() (git-fixes).\n- wifi: mwifiex: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).\n- wifi: p54: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).\n- wifi: rtw88: select WANT_DEV_COREDUMP (stable-fixes).\n- workqueue: Avoid using isolated cpus' timers on (bsc#1231327)\n- workqueue: mark power efficient workqueue as unbounded if (bsc#1231327)\n- x86/bugs: Do not use UNTRAIN_RET with IBPB on entry (git-fixes).\n- x86/bugs: Skip RSB fill at VMEXIT (git-fixes).\n- x86/cpufeatures: Add a IBPB_NO_RET BUG flag (git-fixes).\n- x86/cpufeatures: Define X86_FEATURE_AMD_IBPB_RET (git-fixes).\n- x86/entry: Have entry_ibpb() invalidate return predictions (git-fixes).\n- x86/hyperv: Set X86_FEATURE_TSC_KNOWN_FREQ when Hyper-V provides frequency (git-fixes).\n- x86/kaslr: Expose and use the end of the physical memory address space (bsc#1230405).\n- x86/kvm: fix is_stale_page_fault() (bsc#1221333).\n- xfrm: set dst dev to blackhole_netdev instead of loopback_dev in ifdown (bsc#1216813).\n- xhci: Fix incorrect stream context type macro (git-fixes).\n- xhci: Fix Link TRB DMA in command ring stopped completion event (git-fixes).\n- xhci: Mitigate failed set dequeue pointer commands (git-fixes).\n- xhci: Separate PORT and CAPs macros into dedicated file (stable-fixes).\n- xhci: Use pm_runtime_get to prevent RPM on unsupported systems (git-fixes).\n","id":"SUSE-SU-2024:4364-1","modified":"2024-12-17T15:57:44Z","published":"2024-12-17T15:57:44Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2024/suse-su-20244364-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1054914"},{"type":"REPORT","url":"https://bugzilla.suse.com/1065729"},{"type":"REPORT","url":"https://bugzilla.suse.com/1082555"},{"type":"REPORT","url":"https://bugzilla.suse.com/1194869"},{"type":"REPORT","url":"https://bugzilla.suse.com/1204171"},{"type":"REPORT","url":"https://bugzilla.suse.com/1205796"},{"type":"REPORT","url":"https://bugzilla.suse.com/1206188"},{"type":"REPORT","url":"https://bugzilla.suse.com/1206344"},{"type":"REPORT","url":"https://bugzilla.suse.com/1209290"},{"type":"REPORT","url":"https://bugzilla.suse.com/1210449"},{"type":"REPORT","url":"https://bugzilla.suse.com/1210627"},{"type":"REPORT","url":"https://bugzilla.suse.com/1213034"},{"type":"REPORT","url":"https://bugzilla.suse.com/1216813"},{"type":"REPORT","url":"https://bugzilla.suse.com/1218562"},{"type":"REPORT","url":"https://bugzilla.suse.com/1218644"},{"type":"REPORT","url":"https://bugzilla.suse.com/1220382"},{"type":"REPORT","url":"https://bugzilla.suse.com/1221309"},{"type":"REPORT","url":"https://bugzilla.suse.com/1221333"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222364"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222590"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223202"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223384"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223524"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223656"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223824"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223848"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223919"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223942"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224518"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224526"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224574"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225189"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225336"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225611"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225725"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225730"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225742"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225762"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225764"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225812"},{"type":"REPORT","url":"https://bugzilla.suse.com/1226498"},{"type":"REPORT","url":"https://bugzilla.suse.com/1226560"},{"type":"REPORT","url":"https://bugzilla.suse.com/1226592"},{"type":"REPORT","url":"https://bugzilla.suse.com/1226631"},{"type":"REPORT","url":"https://bugzilla.suse.com/1226748"},{"type":"REPORT","url":"https://bugzilla.suse.com/1226797"},{"type":"REPORT","url":"https://bugzilla.suse.com/1226872"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227437"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227853"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227885"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228119"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228269"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228410"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228430"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228486"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228650"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228709"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228743"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228747"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228857"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229005"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229019"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229312"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229429"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229450"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229454"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229456"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229556"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229585"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229752"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229769"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229808"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229837"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229891"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230055"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230179"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230220"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230231"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230270"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230289"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230405"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230414"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230429"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230456"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230550"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230558"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230600"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230620"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230715"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230722"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230763"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230773"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230774"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230801"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230827"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230903"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230918"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231016"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231072"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231073"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231083"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231084"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231085"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231087"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231089"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231094"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231096"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231098"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231101"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231105"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231108"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231111"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231114"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231115"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231132"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231135"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231138"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231148"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231169"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231178"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231179"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231180"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231181"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231187"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231191"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231193"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231195"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231197"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231200"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231202"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231203"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231277"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231293"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231327"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231344"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231375"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231383"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231434"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231439"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231441"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231442"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231452"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231465"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231474"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231481"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231496"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231502"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231537"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231539"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231540"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231541"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231578"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231646"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231673"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231849"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231856"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231857"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231858"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231859"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231861"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231864"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231872"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231883"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231885"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231887"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231888"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231889"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231890"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231892"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231893"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231895"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231896"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231897"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231902"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231903"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231904"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231907"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231914"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231916"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231920"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231923"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231929"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231930"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231931"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231935"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231936"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231937"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231938"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231939"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231940"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231941"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231942"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231944"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231947"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231950"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231952"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231953"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231954"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231958"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231959"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231960"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231961"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231962"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231965"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231967"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231968"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231972"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231973"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231976"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231978"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231979"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231987"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231988"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231990"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231991"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231992"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231995"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231996"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231997"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231998"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232001"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232004"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232005"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232006"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232007"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232013"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232015"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232016"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232017"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232025"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232026"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232027"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232028"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232033"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232034"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232035"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232036"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232037"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232038"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232039"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232043"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232047"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232048"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232049"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232050"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232056"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232067"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232069"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232070"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232071"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232075"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232076"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232080"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232083"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232084"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232085"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232089"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232094"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232096"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232097"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232098"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232104"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232105"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232108"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232111"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232114"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232116"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232119"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232120"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232123"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232124"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232126"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232133"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232134"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232135"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232136"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232140"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232141"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232142"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232145"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232147"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232149"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232150"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232151"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232152"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232154"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232155"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232159"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232160"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232162"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232163"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232164"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232165"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232170"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232172"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232174"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232175"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232180"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232185"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232187"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232189"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232191"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232195"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232196"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232198"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232199"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232200"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232201"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232217"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232218"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232220"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232221"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232224"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232229"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232232"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232233"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232237"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232251"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232253"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232254"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232255"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232259"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232260"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232262"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232263"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232264"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232272"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232279"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232282"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232285"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232286"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232287"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232293"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232304"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232305"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232307"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232309"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232310"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232312"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232313"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232314"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232316"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232317"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232318"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232329"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232332"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232333"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232334"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232335"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232337"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232339"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232342"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232345"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232349"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232352"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232354"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232355"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232357"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232358"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232359"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232361"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232362"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232364"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232366"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232367"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232368"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232369"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232370"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232371"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232374"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232378"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232381"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232383"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232385"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232387"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232392"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232394"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232395"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232413"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232416"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232418"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232424"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232432"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232435"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232436"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232442"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232446"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232483"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232500"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232501"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232503"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232504"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232507"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232519"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232520"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232552"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232630"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232631"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232632"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232757"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232819"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232860"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232870"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232873"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232877"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232878"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232881"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232884"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232885"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232887"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232888"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232890"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232892"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232896"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232897"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232905"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232907"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232919"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232926"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232928"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232935"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233035"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233049"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233051"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233056"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233057"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233061"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233063"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233065"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233067"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233070"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233073"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233074"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233100"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233103"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233104"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233105"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233106"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233107"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233108"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233110"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233111"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233113"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233114"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233117"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233123"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233125"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233129"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233130"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233134"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233135"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233150"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233189"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233191"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233197"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233205"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233206"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233209"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233210"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233211"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233212"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233214"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233216"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233238"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233241"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233253"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233255"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233293"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233350"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233452"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233453"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233454"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233456"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233457"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233458"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233460"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233462"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233463"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233468"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233471"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233476"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233478"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233479"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233481"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233484"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233487"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233490"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233491"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233528"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233548"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233552"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233553"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233554"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233555"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233557"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233560"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233561"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233570"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233577"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233580"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233977"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234012"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234025"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234085"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234093"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234098"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234108"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47416"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47534"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47594"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-3435"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-45934"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48664"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48674"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48879"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48946"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48947"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48948"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48949"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48951"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48953"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48954"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48955"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48956"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48957"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48958"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48959"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48960"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48961"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48962"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48966"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48967"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48968"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48969"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48970"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48971"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48972"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48973"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48975"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48977"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48978"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48979"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48980"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48981"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48982"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48983"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48985"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48987"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48988"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48989"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48990"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48991"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48992"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48994"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48995"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48997"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48999"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49000"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49002"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49003"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49005"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49006"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49007"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49010"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49011"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49012"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49014"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49015"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49016"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49017"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49019"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49020"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49021"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49022"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49023"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49024"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49025"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49026"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49027"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49028"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49029"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49031"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49032"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-2166"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-28327"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52766"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52800"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52881"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52915"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52917"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52918"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52919"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52921"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52922"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-6270"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26782"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26906"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26953"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-27043"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-35888"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-35937"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-35980"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-36244"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-36484"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-36883"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-36886"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-36905"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-36953"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-36954"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-36957"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-38577"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-38589"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-38615"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-39476"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-40965"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-40997"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41016"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41023"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41049"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42131"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42145"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42226"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42253"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43817"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43897"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-44931"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-44932"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-44947"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-44958"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-44964"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-44995"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-45016"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-45025"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46678"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46681"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46716"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46719"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46754"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46770"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46775"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46777"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46800"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46802"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46804"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46805"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46807"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46809"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46810"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46811"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46812"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46813"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46814"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46815"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46816"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46817"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46818"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46819"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46821"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46826"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46828"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46834"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46835"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46840"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46841"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46842"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46848"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46849"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46853"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46854"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46855"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46857"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46859"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46864"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46871"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47660"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47661"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47663"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47664"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47665"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47667"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47668"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47669"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47670"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47671"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47672"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47673"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47674"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47679"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47682"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47684"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47685"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47692"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47693"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47695"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47696"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47697"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47698"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47699"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47701"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47704"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47705"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47706"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47707"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47709"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47710"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47712"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47713"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47718"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47720"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47723"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47727"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47728"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47730"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47735"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47737"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47738"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47739"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47742"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47745"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47747"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47748"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47749"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47756"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47757"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49850"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49851"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49852"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49855"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49858"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49860"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49861"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49863"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49866"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49867"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49868"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49870"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49871"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49875"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49877"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49879"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49881"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49882"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49883"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49884"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49886"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49890"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49891"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49892"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49894"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49895"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49896"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49897"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49899"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49900"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49901"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49902"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49903"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49905"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49906"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49907"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49908"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49909"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49911"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49912"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49913"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49914"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49917"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49918"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49919"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49920"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49921"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49922"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49923"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49924"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49925"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49929"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49930"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49933"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49934"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49935"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49936"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49938"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49939"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49945"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49946"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49947"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49949"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49950"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49954"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49955"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49957"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49958"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49959"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49960"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49962"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49963"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49965"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49966"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49967"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49968"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49969"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49973"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49974"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49975"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49981"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49982"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49983"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49985"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49989"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49991"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49993"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49995"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49996"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50000"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50001"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50002"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50003"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50006"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50007"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50008"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50009"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50013"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50014"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50017"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50019"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50024"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50025"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50026"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50028"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50031"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50033"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50035"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50041"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50044"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50045"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50046"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50047"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50048"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50049"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50055"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50058"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50059"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50061"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50062"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50063"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50067"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50073"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50074"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50077"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50078"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50081"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50082"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50089"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50093"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50095"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50096"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50098"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50099"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50103"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50108"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50110"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50115"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50116"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50117"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50124"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50125"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50127"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50128"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50131"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50134"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50135"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50138"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50141"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50146"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50147"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50148"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50150"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50153"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50154"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50155"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50156"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50160"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50167"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50171"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50179"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50180"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50182"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50183"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50184"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50186"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50187"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50188"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50189"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50192"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50194"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50195"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50196"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50198"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50201"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50205"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50208"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50209"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50215"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50218"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50229"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50230"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50232"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50233"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50234"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50236"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50237"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50249"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50255"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50259"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50261"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50264"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50265"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50267"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50268"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50269"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50271"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50273"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50274"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50279"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50282"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50287"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50289"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50290"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50292"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50295"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50298"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50301"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50302"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53052"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53058"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53059"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53060"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53061"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53063"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53066"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53068"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53079"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53085"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53088"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53104"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53110"}],"related":["CVE-2021-47416","CVE-2021-47534","CVE-2021-47594","CVE-2022-3435","CVE-2022-45934","CVE-2022-48664","CVE-2022-48674","CVE-2022-48879","CVE-2022-48946","CVE-2022-48947","CVE-2022-48948","CVE-2022-48949","CVE-2022-48951","CVE-2022-48953","CVE-2022-48954","CVE-2022-48955","CVE-2022-48956","CVE-2022-48957","CVE-2022-48958","CVE-2022-48959","CVE-2022-48960","CVE-2022-48961","CVE-2022-48962","CVE-2022-48966","CVE-2022-48967","CVE-2022-48968","CVE-2022-48969","CVE-2022-48970","CVE-2022-48971","CVE-2022-48972","CVE-2022-48973","CVE-2022-48975","CVE-2022-48977","CVE-2022-48978","CVE-2022-48979","CVE-2022-48980","CVE-2022-48981","CVE-2022-48982","CVE-2022-48983","CVE-2022-48985","CVE-2022-48987","CVE-2022-48988","CVE-2022-48989","CVE-2022-48990","CVE-2022-48991","CVE-2022-48992","CVE-2022-48994","CVE-2022-48995","CVE-2022-48997","CVE-2022-48999","CVE-2022-49000","CVE-2022-49002","CVE-2022-49003","CVE-2022-49005","CVE-2022-49006","CVE-2022-49007","CVE-2022-49010","CVE-2022-49011","CVE-2022-49012","CVE-2022-49014","CVE-2022-49015","CVE-2022-49016","CVE-2022-49017","CVE-2022-49019","CVE-2022-49020","CVE-2022-49021","CVE-2022-49022","CVE-2022-49023","CVE-2022-49024","CVE-2022-49025","CVE-2022-49026","CVE-2022-49027","CVE-2022-49028","CVE-2022-49029","CVE-2022-49031","CVE-2022-49032","CVE-2023-2166","CVE-2023-28327","CVE-2023-52766","CVE-2023-52800","CVE-2023-52881","CVE-2023-52915","CVE-2023-52917","CVE-2023-52918","CVE-2023-52919","CVE-2023-52921","CVE-2023-52922","CVE-2023-6270","CVE-2024-26782","CVE-2024-26906","CVE-2024-26953","CVE-2024-27043","CVE-2024-35888","CVE-2024-35937","CVE-2024-35980","CVE-2024-36244","CVE-2024-36484","CVE-2024-36883","CVE-2024-36886","CVE-2024-36905","CVE-2024-36953","CVE-2024-36954","CVE-2024-36957","CVE-2024-38577","CVE-2024-38589","CVE-2024-38615","CVE-2024-39476","CVE-2024-40965","CVE-2024-40997","CVE-2024-41016","CVE-2024-41023","CVE-2024-41049","CVE-2024-42131","CVE-2024-42145","CVE-2024-42226","CVE-2024-42253","CVE-2024-43817","CVE-2024-43897","CVE-2024-44931","CVE-2024-44932","CVE-2024-44947","CVE-2024-44958","CVE-2024-44964","CVE-2024-44995","CVE-2024-45016","CVE-2024-45025","CVE-2024-46678","CVE-2024-46681","CVE-2024-46716","CVE-2024-46719","CVE-2024-46754","CVE-2024-46770","CVE-2024-46775","CVE-2024-46777","CVE-2024-46800","CVE-2024-46802","CVE-2024-46804","CVE-2024-46805","CVE-2024-46807","CVE-2024-46809","CVE-2024-46810","CVE-2024-46811","CVE-2024-46812","CVE-2024-46813","CVE-2024-46814","CVE-2024-46815","CVE-2024-46816","CVE-2024-46817","CVE-2024-46818","CVE-2024-46819","CVE-2024-46821","CVE-2024-46826","CVE-2024-46828","CVE-2024-46834","CVE-2024-46835","CVE-2024-46840","CVE-2024-46841","CVE-2024-46842","CVE-2024-46848","CVE-2024-46849","CVE-2024-46853","CVE-2024-46854","CVE-2024-46855","CVE-2024-46857","CVE-2024-46859","CVE-2024-46864","CVE-2024-46871","CVE-2024-47660","CVE-2024-47661","CVE-2024-47663","CVE-2024-47664","CVE-2024-47665","CVE-2024-47667","CVE-2024-47668","CVE-2024-47669","CVE-2024-47670","CVE-2024-47671","CVE-2024-47672","CVE-2024-47673","CVE-2024-47674","CVE-2024-47679","CVE-2024-47682","CVE-2024-47684","CVE-2024-47685","CVE-2024-47692","CVE-2024-47693","CVE-2024-47695","CVE-2024-47696","CVE-2024-47697","CVE-2024-47698","CVE-2024-47699","CVE-2024-47701","CVE-2024-47704","CVE-2024-47705","CVE-2024-47706","CVE-2024-47707","CVE-2024-47709","CVE-2024-47710","CVE-2024-47712","CVE-2024-47713","CVE-2024-47718","CVE-2024-47720","CVE-2024-47723","CVE-2024-47727","CVE-2024-47728","CVE-2024-47730","CVE-2024-47735","CVE-2024-47737","CVE-2024-47738","CVE-2024-47739","CVE-2024-47742","CVE-2024-47745","CVE-2024-47747","CVE-2024-47748","CVE-2024-47749","CVE-2024-47756","CVE-2024-47757","CVE-2024-49850","CVE-2024-49851","CVE-2024-49852","CVE-2024-49855","CVE-2024-49858","CVE-2024-49860","CVE-2024-49861","CVE-2024-49863","CVE-2024-49866","CVE-2024-49867","CVE-2024-49868","CVE-2024-49870","CVE-2024-49871","CVE-2024-49875","CVE-2024-49877","CVE-2024-49879","CVE-2024-49881","CVE-2024-49882","CVE-2024-49883","CVE-2024-49884","CVE-2024-49886","CVE-2024-49890","CVE-2024-49891","CVE-2024-49892","CVE-2024-49894","CVE-2024-49895","CVE-2024-49896","CVE-2024-49897","CVE-2024-49899","CVE-2024-49900","CVE-2024-49901","CVE-2024-49902","CVE-2024-49903","CVE-2024-49905","CVE-2024-49906","CVE-2024-49907","CVE-2024-49908","CVE-2024-49909","CVE-2024-49911","CVE-2024-49912","CVE-2024-49913","CVE-2024-49914","CVE-2024-49917","CVE-2024-49918","CVE-2024-49919","CVE-2024-49920","CVE-2024-49921","CVE-2024-49922","CVE-2024-49923","CVE-2024-49924","CVE-2024-49925","CVE-2024-49929","CVE-2024-49930","CVE-2024-49933","CVE-2024-49934","CVE-2024-49935","CVE-2024-49936","CVE-2024-49938","CVE-2024-49939","CVE-2024-49945","CVE-2024-49946","CVE-2024-49947","CVE-2024-49949","CVE-2024-49950","CVE-2024-49954","CVE-2024-49955","CVE-2024-49957","CVE-2024-49958","CVE-2024-49959","CVE-2024-49960","CVE-2024-49962","CVE-2024-49963","CVE-2024-49965","CVE-2024-49966","CVE-2024-49967","CVE-2024-49968","CVE-2024-49969","CVE-2024-49973","CVE-2024-49974","CVE-2024-49975","CVE-2024-49981","CVE-2024-49982","CVE-2024-49983","CVE-2024-49985","CVE-2024-49989","CVE-2024-49991","CVE-2024-49993","CVE-2024-49995","CVE-2024-49996","CVE-2024-50000","CVE-2024-50001","CVE-2024-50002","CVE-2024-50003","CVE-2024-50006","CVE-2024-50007","CVE-2024-50008","CVE-2024-50009","CVE-2024-50013","CVE-2024-50014","CVE-2024-50017","CVE-2024-50019","CVE-2024-50024","CVE-2024-50025","CVE-2024-50026","CVE-2024-50028","CVE-2024-50031","CVE-2024-50033","CVE-2024-50035","CVE-2024-50041","CVE-2024-50044","CVE-2024-50045","CVE-2024-50046","CVE-2024-50047","CVE-2024-50048","CVE-2024-50049","CVE-2024-50055","CVE-2024-50058","CVE-2024-50059","CVE-2024-50061","CVE-2024-50062","CVE-2024-50063","CVE-2024-50067","CVE-2024-50073","CVE-2024-50074","CVE-2024-50077","CVE-2024-50078","CVE-2024-50081","CVE-2024-50082","CVE-2024-50089","CVE-2024-50093","CVE-2024-50095","CVE-2024-50096","CVE-2024-50098","CVE-2024-50099","CVE-2024-50103","CVE-2024-50108","CVE-2024-50110","CVE-2024-50115","CVE-2024-50116","CVE-2024-50117","CVE-2024-50124","CVE-2024-50125","CVE-2024-50127","CVE-2024-50128","CVE-2024-50131","CVE-2024-50134","CVE-2024-50135","CVE-2024-50138","CVE-2024-50141","CVE-2024-50146","CVE-2024-50147","CVE-2024-50148","CVE-2024-50150","CVE-2024-50153","CVE-2024-50154","CVE-2024-50155","CVE-2024-50156","CVE-2024-50160","CVE-2024-50167","CVE-2024-50171","CVE-2024-50179","CVE-2024-50180","CVE-2024-50182","CVE-2024-50183","CVE-2024-50184","CVE-2024-50186","CVE-2024-50187","CVE-2024-50188","CVE-2024-50189","CVE-2024-50192","CVE-2024-50194","CVE-2024-50195","CVE-2024-50196","CVE-2024-50198","CVE-2024-50201","CVE-2024-50205","CVE-2024-50208","CVE-2024-50209","CVE-2024-50215","CVE-2024-50218","CVE-2024-50229","CVE-2024-50230","CVE-2024-50232","CVE-2024-50233","CVE-2024-50234","CVE-2024-50236","CVE-2024-50237","CVE-2024-50249","CVE-2024-50255","CVE-2024-50259","CVE-2024-50261","CVE-2024-50264","CVE-2024-50265","CVE-2024-50267","CVE-2024-50268","CVE-2024-50269","CVE-2024-50271","CVE-2024-50273","CVE-2024-50274","CVE-2024-50279","CVE-2024-50282","CVE-2024-50287","CVE-2024-50289","CVE-2024-50290","CVE-2024-50292","CVE-2024-50295","CVE-2024-50298","CVE-2024-50301","CVE-2024-50302","CVE-2024-53052","CVE-2024-53058","CVE-2024-53059","CVE-2024-53060","CVE-2024-53061","CVE-2024-53063","CVE-2024-53066","CVE-2024-53068","CVE-2024-53079","CVE-2024-53085","CVE-2024-53088","CVE-2024-53104","CVE-2024-53110"],"summary":"Security update for the Linux Kernel","upstream":["CVE-2021-47416","CVE-2021-47534","CVE-2021-47594","CVE-2022-3435","CVE-2022-45934","CVE-2022-48664","CVE-2022-48674","CVE-2022-48879","CVE-2022-48946","CVE-2022-48947","CVE-2022-48948","CVE-2022-48949","CVE-2022-48951","CVE-2022-48953","CVE-2022-48954","CVE-2022-48955","CVE-2022-48956","CVE-2022-48957","CVE-2022-48958","CVE-2022-48959","CVE-2022-48960","CVE-2022-48961","CVE-2022-48962","CVE-2022-48966","CVE-2022-48967","CVE-2022-48968","CVE-2022-48969","CVE-2022-48970","CVE-2022-48971","CVE-2022-48972","CVE-2022-48973","CVE-2022-48975","CVE-2022-48977","CVE-2022-48978","CVE-2022-48979","CVE-2022-48980","CVE-2022-48981","CVE-2022-48982","CVE-2022-48983","CVE-2022-48985","CVE-2022-48987","CVE-2022-48988","CVE-2022-48989","CVE-2022-48990","CVE-2022-48991","CVE-2022-48992","CVE-2022-48994","CVE-2022-48995","CVE-2022-48997","CVE-2022-48999","CVE-2022-49000","CVE-2022-49002","CVE-2022-49003","CVE-2022-49005","CVE-2022-49006","CVE-2022-49007","CVE-2022-49010","CVE-2022-49011","CVE-2022-49012","CVE-2022-49014","CVE-2022-49015","CVE-2022-49016","CVE-2022-49017","CVE-2022-49019","CVE-2022-49020","CVE-2022-49021","CVE-2022-49022","CVE-2022-49023","CVE-2022-49024","CVE-2022-49025","CVE-2022-49026","CVE-2022-49027","CVE-2022-49028","CVE-2022-49029","CVE-2022-49031","CVE-2022-49032","CVE-2023-2166","CVE-2023-28327","CVE-2023-52766","CVE-2023-52800","CVE-2023-52881","CVE-2023-52915","CVE-2023-52917","CVE-2023-52918","CVE-2023-52919","CVE-2023-52921","CVE-2023-52922","CVE-2023-6270","CVE-2024-26782","CVE-2024-26906","CVE-2024-26953","CVE-2024-27043","CVE-2024-35888","CVE-2024-35937","CVE-2024-35980","CVE-2024-36244","CVE-2024-36484","CVE-2024-36883","CVE-2024-36886","CVE-2024-36905","CVE-2024-36953","CVE-2024-36954","CVE-2024-36957","CVE-2024-38577","CVE-2024-38589","CVE-2024-38615","CVE-2024-39476","CVE-2024-40965","CVE-2024-40997","CVE-2024-41016","CVE-2024-41023","CVE-2024-41049","CVE-2024-42131","CVE-2024-42145","CVE-2024-42226","CVE-2024-42253","CVE-2024-43817","CVE-2024-43897","CVE-2024-44931","CVE-2024-44932","CVE-2024-44947","CVE-2024-44958","CVE-2024-44964","CVE-2024-44995","CVE-2024-45016","CVE-2024-45025","CVE-2024-46678","CVE-2024-46681","CVE-2024-46716","CVE-2024-46719","CVE-2024-46754","CVE-2024-46770","CVE-2024-46775","CVE-2024-46777","CVE-2024-46800","CVE-2024-46802","CVE-2024-46804","CVE-2024-46805","CVE-2024-46807","CVE-2024-46809","CVE-2024-46810","CVE-2024-46811","CVE-2024-46812","CVE-2024-46813","CVE-2024-46814","CVE-2024-46815","CVE-2024-46816","CVE-2024-46817","CVE-2024-46818","CVE-2024-46819","CVE-2024-46821","CVE-2024-46826","CVE-2024-46828","CVE-2024-46834","CVE-2024-46835","CVE-2024-46840","CVE-2024-46841","CVE-2024-46842","CVE-2024-46848","CVE-2024-46849","CVE-2024-46853","CVE-2024-46854","CVE-2024-46855","CVE-2024-46857","CVE-2024-46859","CVE-2024-46864","CVE-2024-46871","CVE-2024-47660","CVE-2024-47661","CVE-2024-47663","CVE-2024-47664","CVE-2024-47665","CVE-2024-47667","CVE-2024-47668","CVE-2024-47669","CVE-2024-47670","CVE-2024-47671","CVE-2024-47672","CVE-2024-47673","CVE-2024-47674","CVE-2024-47679","CVE-2024-47682","CVE-2024-47684","CVE-2024-47685","CVE-2024-47692","CVE-2024-47693","CVE-2024-47695","CVE-2024-47696","CVE-2024-47697","CVE-2024-47698","CVE-2024-47699","CVE-2024-47701","CVE-2024-47704","CVE-2024-47705","CVE-2024-47706","CVE-2024-47707","CVE-2024-47709","CVE-2024-47710","CVE-2024-47712","CVE-2024-47713","CVE-2024-47718","CVE-2024-47720","CVE-2024-47723","CVE-2024-47727","CVE-2024-47728","CVE-2024-47730","CVE-2024-47735","CVE-2024-47737","CVE-2024-47738","CVE-2024-47739","CVE-2024-47742","CVE-2024-47745","CVE-2024-47747","CVE-2024-47748","CVE-2024-47749","CVE-2024-47756","CVE-2024-47757","CVE-2024-49850","CVE-2024-49851","CVE-2024-49852","CVE-2024-49855","CVE-2024-49858","CVE-2024-49860","CVE-2024-49861","CVE-2024-49863","CVE-2024-49866","CVE-2024-49867","CVE-2024-49868","CVE-2024-49870","CVE-2024-49871","CVE-2024-49875","CVE-2024-49877","CVE-2024-49879","CVE-2024-49881","CVE-2024-49882","CVE-2024-49883","CVE-2024-49884","CVE-2024-49886","CVE-2024-49890","CVE-2024-49891","CVE-2024-49892","CVE-2024-49894","CVE-2024-49895","CVE-2024-49896","CVE-2024-49897","CVE-2024-49899","CVE-2024-49900","CVE-2024-49901","CVE-2024-49902","CVE-2024-49903","CVE-2024-49905","CVE-2024-49906","CVE-2024-49907","CVE-2024-49908","CVE-2024-49909","CVE-2024-49911","CVE-2024-49912","CVE-2024-49913","CVE-2024-49914","CVE-2024-49917","CVE-2024-49918","CVE-2024-49919","CVE-2024-49920","CVE-2024-49921","CVE-2024-49922","CVE-2024-49923","CVE-2024-49924","CVE-2024-49925","CVE-2024-49929","CVE-2024-49930","CVE-2024-49933","CVE-2024-49934","CVE-2024-49935","CVE-2024-49936","CVE-2024-49938","CVE-2024-49939","CVE-2024-49945","CVE-2024-49946","CVE-2024-49947","CVE-2024-49949","CVE-2024-49950","CVE-2024-49954","CVE-2024-49955","CVE-2024-49957","CVE-2024-49958","CVE-2024-49959","CVE-2024-49960","CVE-2024-49962","CVE-2024-49963","CVE-2024-49965","CVE-2024-49966","CVE-2024-49967","CVE-2024-49968","CVE-2024-49969","CVE-2024-49973","CVE-2024-49974","CVE-2024-49975","CVE-2024-49981","CVE-2024-49982","CVE-2024-49983","CVE-2024-49985","CVE-2024-49989","CVE-2024-49991","CVE-2024-49993","CVE-2024-49995","CVE-2024-49996","CVE-2024-50000","CVE-2024-50001","CVE-2024-50002","CVE-2024-50003","CVE-2024-50006","CVE-2024-50007","CVE-2024-50008","CVE-2024-50009","CVE-2024-50013","CVE-2024-50014","CVE-2024-50017","CVE-2024-50019","CVE-2024-50024","CVE-2024-50025","CVE-2024-50026","CVE-2024-50028","CVE-2024-50031","CVE-2024-50033","CVE-2024-50035","CVE-2024-50041","CVE-2024-50044","CVE-2024-50045","CVE-2024-50046","CVE-2024-50047","CVE-2024-50048","CVE-2024-50049","CVE-2024-50055","CVE-2024-50058","CVE-2024-50059","CVE-2024-50061","CVE-2024-50062","CVE-2024-50063","CVE-2024-50067","CVE-2024-50073","CVE-2024-50074","CVE-2024-50077","CVE-2024-50078","CVE-2024-50081","CVE-2024-50082","CVE-2024-50089","CVE-2024-50093","CVE-2024-50095","CVE-2024-50096","CVE-2024-50098","CVE-2024-50099","CVE-2024-50103","CVE-2024-50108","CVE-2024-50110","CVE-2024-50115","CVE-2024-50116","CVE-2024-50117","CVE-2024-50124","CVE-2024-50125","CVE-2024-50127","CVE-2024-50128","CVE-2024-50131","CVE-2024-50134","CVE-2024-50135","CVE-2024-50138","CVE-2024-50141","CVE-2024-50146","CVE-2024-50147","CVE-2024-50148","CVE-2024-50150","CVE-2024-50153","CVE-2024-50154","CVE-2024-50155","CVE-2024-50156","CVE-2024-50160","CVE-2024-50167","CVE-2024-50171","CVE-2024-50179","CVE-2024-50180","CVE-2024-50182","CVE-2024-50183","CVE-2024-50184","CVE-2024-50186","CVE-2024-50187","CVE-2024-50188","CVE-2024-50189","CVE-2024-50192","CVE-2024-50194","CVE-2024-50195","CVE-2024-50196","CVE-2024-50198","CVE-2024-50201","CVE-2024-50205","CVE-2024-50208","CVE-2024-50209","CVE-2024-50215","CVE-2024-50218","CVE-2024-50229","CVE-2024-50230","CVE-2024-50232","CVE-2024-50233","CVE-2024-50234","CVE-2024-50236","CVE-2024-50237","CVE-2024-50249","CVE-2024-50255","CVE-2024-50259","CVE-2024-50261","CVE-2024-50264","CVE-2024-50265","CVE-2024-50267","CVE-2024-50268","CVE-2024-50269","CVE-2024-50271","CVE-2024-50273","CVE-2024-50274","CVE-2024-50279","CVE-2024-50282","CVE-2024-50287","CVE-2024-50289","CVE-2024-50290","CVE-2024-50292","CVE-2024-50295","CVE-2024-50298","CVE-2024-50301","CVE-2024-50302","CVE-2024-53052","CVE-2024-53058","CVE-2024-53059","CVE-2024-53060","CVE-2024-53061","CVE-2024-53063","CVE-2024-53066","CVE-2024-53068","CVE-2024-53079","CVE-2024-53085","CVE-2024-53088","CVE-2024-53104","CVE-2024-53110"]}