{"affected":[{"ecosystem_specific":{"binaries":[{"kernel-azure":"5.14.21-150500.33.75.1","kernel-azure-devel":"5.14.21-150500.33.75.1","kernel-devel-azure":"5.14.21-150500.33.75.1","kernel-source-azure":"5.14.21-150500.33.75.1","kernel-syms-azure":"5.14.21-150500.33.75.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for Public Cloud 15 SP5","name":"kernel-azure","purl":"pkg:rpm/suse/kernel-azure&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Public%20Cloud%2015%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.14.21-150500.33.75.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-azure":"5.14.21-150500.33.75.1","kernel-azure-devel":"5.14.21-150500.33.75.1","kernel-devel-azure":"5.14.21-150500.33.75.1","kernel-source-azure":"5.14.21-150500.33.75.1","kernel-syms-azure":"5.14.21-150500.33.75.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for Public Cloud 15 SP5","name":"kernel-source-azure","purl":"pkg:rpm/suse/kernel-source-azure&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Public%20Cloud%2015%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.14.21-150500.33.75.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-azure":"5.14.21-150500.33.75.1","kernel-azure-devel":"5.14.21-150500.33.75.1","kernel-devel-azure":"5.14.21-150500.33.75.1","kernel-source-azure":"5.14.21-150500.33.75.1","kernel-syms-azure":"5.14.21-150500.33.75.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for Public Cloud 15 SP5","name":"kernel-syms-azure","purl":"pkg:rpm/suse/kernel-syms-azure&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Public%20Cloud%2015%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.14.21-150500.33.75.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-azure":"5.14.21-150500.33.75.1","dlm-kmp-azure":"5.14.21-150500.33.75.1","gfs2-kmp-azure":"5.14.21-150500.33.75.1","kernel-azure":"5.14.21-150500.33.75.1","kernel-azure-devel":"5.14.21-150500.33.75.1","kernel-azure-extra":"5.14.21-150500.33.75.1","kernel-azure-optional":"5.14.21-150500.33.75.1","kernel-azure-vdso":"5.14.21-150500.33.75.1","kernel-devel-azure":"5.14.21-150500.33.75.1","kernel-source-azure":"5.14.21-150500.33.75.1","kernel-syms-azure":"5.14.21-150500.33.75.1","kselftests-kmp-azure":"5.14.21-150500.33.75.1","ocfs2-kmp-azure":"5.14.21-150500.33.75.1","reiserfs-kmp-azure":"5.14.21-150500.33.75.1"}]},"package":{"ecosystem":"openSUSE:Leap 15.5","name":"kernel-azure","purl":"pkg:rpm/opensuse/kernel-azure&distro=openSUSE%20Leap%2015.5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.14.21-150500.33.75.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-azure":"5.14.21-150500.33.75.1","dlm-kmp-azure":"5.14.21-150500.33.75.1","gfs2-kmp-azure":"5.14.21-150500.33.75.1","kernel-azure":"5.14.21-150500.33.75.1","kernel-azure-devel":"5.14.21-150500.33.75.1","kernel-azure-extra":"5.14.21-150500.33.75.1","kernel-azure-optional":"5.14.21-150500.33.75.1","kernel-azure-vdso":"5.14.21-150500.33.75.1","kernel-devel-azure":"5.14.21-150500.33.75.1","kernel-source-azure":"5.14.21-150500.33.75.1","kernel-syms-azure":"5.14.21-150500.33.75.1","kselftests-kmp-azure":"5.14.21-150500.33.75.1","ocfs2-kmp-azure":"5.14.21-150500.33.75.1","reiserfs-kmp-azure":"5.14.21-150500.33.75.1"}]},"package":{"ecosystem":"openSUSE:Leap 15.5","name":"kernel-source-azure","purl":"pkg:rpm/opensuse/kernel-source-azure&distro=openSUSE%20Leap%2015.5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.14.21-150500.33.75.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-azure":"5.14.21-150500.33.75.1","dlm-kmp-azure":"5.14.21-150500.33.75.1","gfs2-kmp-azure":"5.14.21-150500.33.75.1","kernel-azure":"5.14.21-150500.33.75.1","kernel-azure-devel":"5.14.21-150500.33.75.1","kernel-azure-extra":"5.14.21-150500.33.75.1","kernel-azure-optional":"5.14.21-150500.33.75.1","kernel-azure-vdso":"5.14.21-150500.33.75.1","kernel-devel-azure":"5.14.21-150500.33.75.1","kernel-source-azure":"5.14.21-150500.33.75.1","kernel-syms-azure":"5.14.21-150500.33.75.1","kselftests-kmp-azure":"5.14.21-150500.33.75.1","ocfs2-kmp-azure":"5.14.21-150500.33.75.1","reiserfs-kmp-azure":"5.14.21-150500.33.75.1"}]},"package":{"ecosystem":"openSUSE:Leap 15.5","name":"kernel-syms-azure","purl":"pkg:rpm/opensuse/kernel-syms-azure&distro=openSUSE%20Leap%2015.5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.14.21-150500.33.75.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"\n\nThe SUSE Linux Enterprise 15 SP5 Azure kernel was updated to receive various security bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2021-47594: mptcp: never allow the PM to close a listener subflow (bsc#1226560).\n- CVE-2022-48983: io_uring: Fix a null-ptr-deref in io_tctx_exit_cb() (bsc#1231959).\n- CVE-2024-26782: mptcp: fix double-free on socket dismantle (bsc#1222590).\n- CVE-2024-26906: Fixed invalid vsyscall page read for copy_from_kernel_nofault() (bsc#1223202).\n- CVE-2024-26953: net: esp: fix bad handling of pages from page_pool (bsc#1223656).\n- CVE-2024-35888: erspan: make sure erspan_base_hdr is present in skb->head (bsc#1224518).\n- CVE-2024-35937: wifi: cfg80211: check A-MSDU format more carefully (bsc#1224526).\n- CVE-2024-36883: net: fix out-of-bounds access in ops_init (bsc#1225725).\n- CVE-2024-36886: tipc: fix UAF in error path (bsc#1225730).\n- CVE-2024-36905: tcp: defer shutdown(SEND_SHUTDOWN) for TCP_SYN_RECV sockets (bsc#1225742).\n- CVE-2024-36954: tipc: fix a possible memleak in tipc_buf_append (bsc#1225764).\n- CVE-2024-38589: netrom: fix possible dead-lock in nr_rt_ioctl() (bsc#1226748).\n- CVE-2024-38615: cpufreq: exit() callback is optional (bsc#1226592).\n- CVE-2024-40997: cpufreq: amd-pstate: fix memory leak on CPU EPP exit (bsc#1227853).\n- CVE-2024-41023: sched/deadline: Fix task_struct reference leak (bsc#1228430).\n- CVE-2024-44932: idpf: fix UAFs when destroying the queues (bsc#1229808).\n- CVE-2024-44964: idpf: fix memory leaks and crashes while performing a soft reset (bsc#1230220).\n- CVE-2024-44995: net: hns3: fix a deadlock problem when config TC during resetting (bsc#1230231).\n- CVE-2024-46681: pktgen: use cpus_read_lock() in pg_net_init() (bsc#1230558).\n- CVE-2024-46800: sch/netem: fix use after free in netem_dequeue (bsc#1230827).\n- CVE-2024-47679: vfs: fix race between evice_inodes() and find_inode()&iput() (bsc#1231930).\n- CVE-2024-47701: ext4: explicitly exit when ext4_find_inline_entry returns an error (bsc#1231920).\n- CVE-2024-47745: mm: split critical region in remap_file_pages() and invoke LSMs in between (bsc#1232135).\n- CVE-2024-47757: nilfs2: fix potential oob read in nilfs_btree_check_delete() (bsc#1232187).\n- CVE-2024-49868: btrfs: fix a NULL pointer dereference when failed to start a new trasacntion (bsc#1232272).\n- CVE-2024-49921: drm/amd/display: Check null pointers before used (bsc#1232371).\n- CVE-2024-49925: fbdev: efifb: Register sysfs groups through driver core (bsc#1232224)\n- CVE-2024-49934: fs/inode: Prevent dump_mapping() accessing invalid dentry.d_name.name (bsc#1232387).\n- CVE-2024-49945: net/ncsi: Disable the ncsi work before freeing the associated structure (bsc#1232165).\n- CVE-2024-49950: Bluetooth: L2CAP: Fix uaf in l2cap_connect (bsc#1232159).\n- CVE-2024-49968: ext4: fix error message when rejecting the default hash (bsc#1232264).\n- CVE-2024-49983: ext4: drop ppath from ext4_ext_replay_update_ex() to avoid double-free (bsc#1232096).\n- CVE-2024-49989: drm/amd/display: fix double free issue during amdgpu module unload (bsc#1232483).\n- CVE-2024-50009: cpufreq: amd-pstate: add check for cpufreq_cpu_get's return value (bsc#1232318).\n- CVE-2024-50073: tty: n_gsm: Fix use-after-free in gsm_cleanup_mux (bsc#1232520).\n- CVE-2024-50082: blk-rq-qos: fix crash on rq_qos_wait vs. rq_qos_wake_function race (bsc#1232500).\n- CVE-2024-50089: unicode: Do not special case ignorable code points (bsc#1232860).\n- CVE-2024-50093: thermal: intel: int340x: processor: Fix warning during module unload (bsc#1232877).\n- CVE-2024-50098: scsi: ufs: core: Set SDEV_OFFLINE when UFS is shut down (bsc#1232881).\n- CVE-2024-50108: drm/amd/display: Disable PSR-SU on Parade 08-01 TCON too (bsc#1232884).\n- CVE-2024-50110: xfrm: fix one more kernel-infoleak in algo dumping (bsc#1232885).\n- CVE-2024-50115: KVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from memory (bsc#1232919).\n- CVE-2024-50125: Bluetooth: SCO: Fix UAF on sco_sock_timeout (bsc#1232928).\n- CVE-2024-50127: net: sched: fix use-after-free in taprio_change() (bsc#1232907).\n- CVE-2024-50128: net: wwan: fix global oob in wwan_rtnl_policy (bsc#1232905).\n- CVE-2024-50134: drm/vboxvideo: Replace fake VLA at end of vbva_mouse_pointer_shape (bsc#1232890).\n- CVE-2024-50135: nvme-pci: fix race condition between reset and nvme_dev_disable() (bsc#1232888).\n- CVE-2024-50138: bpf: Use raw_spinlock_t in ringbuf (bsc#1232935).\n- CVE-2024-50146: net/mlx5e: Do not call cleanup on profile rollback failure (bsc#1233056).\n- CVE-2024-50147: net/mlx5: Fix command bitmask initialization (bsc#1233067).\n- CVE-2024-50153: scsi: target: core: Fix null-ptr-deref in target_alloc_device() (bsc#1233061).\n- CVE-2024-50154: tcp: Fix use-after-free of nreq in reqsk_timer_handler() (bsc#1233070).\n- CVE-2024-50167: be2net: fix potential memory leak in be_xmit() (bsc#1233049).\n- CVE-2024-50171: net: systemport: fix potential memory leak in bcm_sysport_xmit() (bsc#1233057).\n- CVE-2024-50182: secretmem: disable memfd_secret() if arch cannot set direct map (bsc#1233129).\n- CVE-2024-50184: virtio_pmem: Check device status before requesting flush (bsc#1233135).\n- CVE-2024-50186: net: explicitly clear the sk pointer, when pf->create fails (bsc#1233110).\n- CVE-2024-50188: net: phy: dp83869: fix memory corruption when enabling fiber (bsc#1233107).\n- CVE-2024-50192: irqchip/gic-v4: Correctly deal with set_affinity on lazily-mapped VPEs (bsc#1233106).\n- CVE-2024-50195: posix-clock: posix-clock: Fix unbalanced locking in pc_clock_settime() (bsc#1233103).\n- CVE-2024-50196: pinctrl: ocelot: fix system hang on level based interrupts (bsc#1233113).\n- CVE-2024-50205: ALSA: firewire-lib: Avoid division by zero in apply_constraint_to_size() (bsc#1233293).\n- CVE-2024-50208: RDMA/bnxt_re: Fix a bug while setting up Level-2 PBL pages (bsc#1233117).\n- CVE-2024-50229: nilfs2: fix potential deadlock with newly created symlinks (bsc#1233205).\n- CVE-2024-50230: nilfs2: fix kernel bug due to missing clearing of checked flag (bsc#1233206).\n- CVE-2024-50259: netdevsim: Add trailing zero to terminate the string in nsim_nexthop_bucket_activity_write() (bsc#1233214).\n- CVE-2024-50261: macsec: Fix use-after-free while sending the offloading packet (bsc#1233253).\n- CVE-2024-50264: vsock/virtio: Initialization of the dangling pointer occurring in vsk->trans (bsc#1233453).\n- CVE-2024-50267: USB: serial: io_edgeport: fix use after free in debug printk (bsc#1233456).\n- CVE-2024-50271: signal: restore the override_rlimit logic (bsc#1233460).\n- CVE-2024-50273: btrfs: reinitialize delayed ref list after deleting it from the list (bsc#1233462).\n- CVE-2024-50274: idpf: avoid vport access in idpf_get_link_ksettings (bsc#1233463).\n- CVE-2024-50279: dm cache: fix out-of-bounds access to the dirty bitset when resizing (bsc#1233468).\n- CVE-2024-50289: media: av7110: fix a spectre vulnerability (bsc#1233478).\n- CVE-2024-50295: net: arc: fix the device for dma_map_single/dma_unmap_single (bsc#1233484).\n- CVE-2024-50298: net: enetc: allocate vf_state during PF probes (bsc#1233487).\n- CVE-2024-53052: io_uring/rw: fix missing NOWAIT check for O_DIRECT start write (bsc#1233548).\n- CVE-2024-53058: net: stmmac: TSO: Fix unbalanced DMA map/unmap for non-paged SKB data (bsc#1233552).\n- CVE-2024-53061: media: s5p-jpeg: prevent buffer overflows (bsc#1233555).\n- CVE-2024-53063: media: dvbdev: prevent the risk of out of memory access (bsc#1233557).\n- CVE-2024-53068: firmware: arm_scmi: Fix slab-use-after-free in scmi_bus_notifier() (bsc#1233561).\n- CVE-2024-53079: mm/thp: fix deferred split unqueue naming and locking (bsc#1233570).\n- CVE-2024-53088: i40e: fix race condition by adding filter's intermediate sync state (bsc#1233580).\n- CVE-2024-53104: media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format (bsc#1234025).\n- CVE-2024-53110: vp_vdpa: fix id_table array not null terminated error (bsc#1234085).\n\nThe following non-security bugs were fixed:\n\n- Drop OCFS2 patch causing a regression (bsc#1233255).\n- Fix regression on AMDGPU driver (bsc#1233134).\n- Removed the duplicated check of static_assert(sizeof(struct work_struct) >= sizeof(struct rcu_head)).\n- Revert 'cgroup: Fix memory leak caused by missing cgroup_bpf_offline' (bsc#1234108).\n- Revert 'ixgbe: Manual AN-37 for troublesome link partners for X550 SFI' (git-fixes).\n- Revert 'mmc: dw_mmc: Fix IDMAC operation with pages bigger than 4K' (git-fixes).\n- Revert 'usb: gadget: composite: fix OS descriptors w_value logic' (git-fixes).\n- Update config files (bsc#1218644). \n- Update config files. Enabled IDPF for ARM64 (bsc#1221309)\n- acpi: CPPC: Fix _CPC register setting issue (git-fixes).\n- acpi: CPPC: Make rmw_lock a raw_spin_lock (git-fixes).\n- acpi: button: Add DMI quirk for Samsung Galaxy Book2 to fix initial lid detection issue (stable-fixes).\n- acpi: resource: Add LG 16T90SP to irq1_level_low_skip_override[] (stable-fixes).\n- ad7780: fix division by zero in ad7780_write_raw() (git-fixes).\n- add bugreference to a hv_netvsc patch (bsc#1232413).\n- alsa: 6fire: Release resources at card release (git-fixes).\n- alsa: ac97: bus: Fix the mistake in the comment (git-fixes).\n- alsa: caiaq: Use snd_card_free_when_closed() at disconnection (git-fixes).\n- alsa: firewire-lib: fix return value on fail in amdtp_tscm_init() (git-fixes).\n- alsa: hda/realtek - Fixed Clevo platform headset Mic issue (stable-fixes).\n- alsa: hda/realtek: Add subwoofer quirk for Acer Predator G9-593 (stable-fixes).\n- alsa: hda/realtek: Fix headset mic on TUXEDO Gemini 17 Gen3 (stable-fixes).\n- alsa: hda/realtek: Fix headset mic on TUXEDO Stellaris 16 Gen6 mb1 (stable-fixes).\n- alsa: hda/realtek: Limit internal Mic boost on Dell platform (stable-fixes).\n- alsa: hda/realtek: Update ALC225 depop procedure (git-fixes).\n- alsa: hda/realtek: Update ALC256 depop procedure (git-fixes).\n- alsa: hda/realtek: fix mute/micmute LEDs for a HP EliteBook 645 G10 (stable-fixes).\n- alsa: us122l: Use snd_card_free_when_closed() at disconnection (git-fixes).\n- alsa: usb-audio: Add quirk for HP 320 FHD Webcam (stable-fixes).\n- alsa: usb-audio: Add quirks for Dell WD19 dock (stable-fixes).\n- alsa: usx2y: Use snd_card_free_when_closed() at disconnection (git-fixes).\n- amd-pstate: Set min_perf to nominal_perf for active mode performance gov (git-fixes).\n- arm64/sve: Discard stale CPU state when handling SVE traps (git-fixes)\n- arm64: Force position-independent veneers (git-fixes).\n- arm64: dts: imx8mp: correct sdhc ipg clk (git-fixes).\n- arm64: fix .data.rel.ro size assertion when CONFIG_LTO_CLANG (git-fixes)\n- arm64: smccc: Remove broken support for SMCCCv1.3 SVE discard hint (git-fixes)\n- arm64: smccc: replace custom COUNT_ARGS() & CONCATENATE() (git-fixes)\n- arm64: tls: Fix context-switching of tpidrro_el0 when kpti is enabled (git-fixes)\n- arm64:uprobe fix the uprobe SWBP_INSN in big-endian (git-fixes)\n- asoc: amd: yc: Fix for enabling DMIC on acp6x via _DSD entry (git-fixes).\n- asoc: codecs: Fix atomicity violation in snd_soc_component_get_drvdata() (git-fixes).\n- asoc: codecs: lpass-rx-macro: add missing CDC_RX_BCL_VBAT_RF_PROC2 to default regs values (stable-fixes).\n- asoc: cs42l51: Fix some error handling paths in cs42l51_probe() (git-fixes).\n- asoc: fsl_sai: Enable 'FIFO continue on error' FCONT bit (stable-fixes).\n- asoc: qcom: sm8250: add qrb4210-rb2-sndcard compatible string (stable-fixes).\n- asoc: stm32: spdifrx: fix dma channel release in stm32_spdifrx_remove (git-fixes).\n- blk-throttle: Fix io statistics for cgroup v1 (bsc#1233528).\n- block: Avoid leaking hctx->nr_active counter on batched completion (bsc#1231923).\n- bluetooth: MGMT: Fix slab-use-after-free Read in set_powered_sync (git-fixes).\n- bluetooth: hci: fix null-ptr-deref in hci_read_supported_codecs (git-fixes).\n- bnxt_en: Fix the PCI-AER routines (git-fixes).\n- bnxt_en: Remove mis-applied code from bnxt_cfg_ntp_filters() (git-fixes).\n- bnxt_en: Reserve rings after PCIe AER recovery if NIC interface is down (git-fixes).\n- bnxt_en: Reset PTP tx_avail after possible firmware reset (git-fixes).\n- bnxt_en: Restore PTP tx_avail count in case of skb_pad() error (git-fixes).\n- bnxt_en: Wait for FLR to complete during probe (git-fixes).\n- bnxt_en: refactor reset close code (git-fixes).\n- can: c_can: c_can_handle_bus_err(): update statistics if skb allocation fails (git-fixes).\n- can: c_can: fix {rx,tx}_errors statistics (git-fixes).\n- can: ems_usb: ems_usb_rx_err(): fix {rx,tx}_errors statistics (git-fixes).\n- can: ifi_canfd: ifi_canfd_handle_lec_err(): fix {rx,tx}_errors statistics (git-fixes).\n- can: j1939: j1939_session_new(): fix skb reference counting (git-fixes).\n- can: m_can: m_can_handle_lec_err(): fix {rx,tx}_errors statistics (git-fixes).\n- can: sun4i_can: sun4i_can_err(): call can_change_state() even if cf is NULL (git-fixes).\n- can: sun4i_can: sun4i_can_err(): fix {rx,tx}_errors statistics (git-fixes).\n- cgroup/bpf: only cgroup v2 can be attached by bpf programs (bsc#1234108).\n- chtls: fix tp->rcv_tstamp initialization (git-fixes).\n- comedi: Flush partial mappings in error case (git-fixes).\n- crypto: bcm - add error check in the ahash_hmac_init function (git-fixes).\n- crypto: caam - Fix the pointer passed to caam_qi_shutdown() (git-fixes).\n- crypto: caam - add error check to caam_rsa_set_priv_key_form (git-fixes).\n- crypto: cavium - Fix an error handling path in cpt_ucode_load_fw() (git-fixes).\n- crypto: cavium - Fix the if condition to exit loop after timeout (git-fixes).\n- crypto: inside-secure - Fix the return value of safexcel_xcbcmac_cra_init() (git-fixes).\n- crypto: x86/aegis128 - access 32-bit arguments as 32-bit (git-fixes).\n- cxgb4: Properly lock TX queue for the selftest (git-fixes).\n- cxgb4: add forgotten u64 ivlan cast before shift (git-fixes).\n- cxgb4: unnecessary check for 0 in the free_sge_txq_uld() function (git-fixes).\n- drivers: net: prevent tun_build_skb() to exceed the packet size limit (git-fixes).\n- drm/amd: Fix initialization mistake for NBIO 7.7.0 (stable-fixes).\n- drm/amdgpu: Adjust debugfs eviction and IB access permissions (stable-fixes).\n- drm/amdgpu: add missing size check in amdgpu_debugfs_gprwave_read() (stable-fixes).\n- drm/amdgpu: prevent NULL pointer dereference if ATIF is not supported (git-fixes).\n- drm/bridge: anx7625: Drop EDID cache on bridge power off (git-fixes).\n- drm/bridge: tc358767: Fix link properties discovery (git-fixes).\n- drm/bridge: tc358768: Fix DSI command tx (git-fixes).\n- drm/etnaviv: Request pages from DMA32 zone on addressing_limited (git-fixes).\n- drm/imx/dcss: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).\n- drm/mm: Mark drm_mm_interval_tree*() functions with __maybe_unused (git-fixes).\n- drm/msm/adreno: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).\n- drm/msm/dpu: cast crtc_clk calculation to u64 in _dpu_core_perf_calc_clk() (git-fixes).\n- drm/omap: Fix locking in omap_gem_new_dmabuf() (git-fixes).\n- drm/omap: Fix possible NULL dereference (git-fixes).\n- drm/panfrost: Remove unused id_mask from struct panfrost_model (git-fixes).\n- drm/rockchip: vop: Fix a dereferenced before check warning (git-fixes).\n- drm/sti: avoid potential dereference of error pointers (git-fixes).\n- drm/sti: avoid potential dereference of error pointers in sti_gdp_atomic_check (git-fixes).\n- drm/sti: avoid potential dereference of error pointers in sti_hqvdp_atomic_check (git-fixes).\n- drm/v3d: Address race-condition in MMU flush (git-fixes).\n- drm/vboxvideo: Replace fake VLA at end of vbva_mouse_pointer_shape with real VLA (stable-fixes).\n- drm/vc4: hvs: Do not write gamma luts on 2711 (git-fixes).\n- drm/vc4: hvs: Fix dlist debug not resetting the next entry pointer (git-fixes).\n- drm/vc4: hvs: Remove incorrect limit from hvs_dlist debugfs function (git-fixes).\n- drm/vmwgfx: Limit display layout ioctl array size to VMWGFX_NUM_DISPLAY_UNITS (stable-fixes).\n- e1000e: Fix S0ix residency on corporate systems (git-fixes).\n- efi/memattr: Ignore table if the size is clearly bogus (bsc#1231465).\n- eth: bnxt: fix counting packets discarded due to OOM and netpoll (git-fixes).\n- firmware: google: Unregister driver_info on failure (git-fixes).\n- genirq/msi: Fix off-by-one error in msi_domain_alloc() (git-fixes).\n- goldfish: Fix unused const variable 'goldfish_pipe_acpi_match' (git-fixes).\n- gve: Fix XDP TX completion handling when counters overflow (git-fixes).\n- gve: Fix an edge case for TSO skb validity check (git-fixes).\n- gve: Fix skb truesize underestimation (git-fixes).\n- gve: ignore nonrelevant GSO type bits when processing TSO headers (git-fixes).\n- hid: core: zero-initialize the report buffer (git-fixes).\n- hid: lenovo: Add support for Thinkpad X1 Tablet Gen 3 keyboard (stable-fixes).\n- hid: multitouch: Add quirk for HONOR MagicBook Art 14 touchpad (stable-fixes).\n- hid: multitouch: Add quirk for Logitech Bolt receiver w/ Casa touchpad (stable-fixes).\n- hid: multitouch: Add support for B2402FVA track point (stable-fixes).\n- hid: wacom: Defer calculation of resolution until resolution_code is known (git-fixes).\n- hid: wacom: Interpret tilt data from Intuos Pro BT as signed values (git-fixes).\n- hid: wacom: fix when get product name maybe null pointer (git-fixes).\n- hv_sock: Initializing vsk->trans to NULL to prevent a dangling pointer (git-fixes).\n- hwmon: (tps23861) Fix reporting of negative temperatures (git-fixes).\n- i3c: master: Fix miss free init_dyn_addr at i3c_master_put_i3c_addrs() (git-fixes).\n- i40e: Fix XDP program unloading while removing the driver (git-fixes).\n- i40e: Fix filter input checks to prevent config with invalid values (git-fixes).\n- i40e: Fix waiting for queues of all VSIs to be disabled (git-fixes).\n- i40e: Report MFS in decimal base instead of hex (git-fixes).\n- i40e: Restore VF MSI-X state during PCI reset (git-fixes).\n- i40e: avoid double calling i40e_pf_rxq_wait() (git-fixes).\n- i40e: disable NAPI right after disabling irqs when handling xsk_pool (git-fixes).\n- i40e: fix use-after-free in i40e_aqc_add_filters() (git-fixes).\n- i40e: take into account XDP Tx queues when stopping rings (git-fixes).\n- iTCO_wdt: mask NMI_NOW bit for update_no_reboot_bit() call (git-fixes).\n- iavf: Fix TC config comparison with existing adapter TC config (git-fixes).\n- iavf: Fix promiscuous mode configuration flow messages (git-fixes).\n- iavf: Introduce new state machines for flow director (git-fixes).\n- iavf: do not process adminq tasks when __IAVF_IN_REMOVE_TASK is set (git-fixes).\n- iavf: fix FDIR rule fields masks validation (git-fixes).\n- iavf: in iavf_down, disable queues when removing the driver (git-fixes).\n- iavf: initialize waitqueues before starting watchdog_task (git-fixes).\n- iavf: send VLAN offloading caps once after VFR (git-fixes).\n- iavf: validate tx_coalesce_usecs even if rx_coalesce_usecs is zero (git-fixes).\n- ibmvnic: Do partial reset on login failure (bsc#1233150).\n- ibmvnic: Enforce stronger sanity checks on login response (bsc#1233150).\n- ibmvnic: Ensure login failure recovery is safe from other resets (bsc#1233150).\n- ibmvnic: Handle DMA unmapping of login buffs in release functions (bsc#1233150).\n- ibmvnic: Unmap DMA login rsp buffer on send login fail (bsc#1233150).\n- ice: Block switchdev mode when ADQ is active and vice versa (git-fixes).\n- ice: Fix NULL pointer deref during VF reset (git-fixes).\n- ice: Fix VSI list rule with ICE_SW_LKUP_LAST type (git-fixes).\n- ice: Fix link_down_on_close message (git-fixes).\n- ice: Fix netif_is_ice() in Safe Mode (git-fixes).\n- ice: Interpret .set_channels() input differently (git-fixes).\n- ice: Shut down VSI with 'link-down-on-close' enabled (git-fixes).\n- ice: avoid executing commands on other ports when driving sync (git-fixes).\n- ice: change q_index variable type to s16 to store -1 value (git-fixes).\n- ice: fix ICE_LAST_OFFSET formula (git-fixes).\n- ice: fix VLAN replay after reset (git-fixes).\n- ice: fix accounting for filters shared by multiple VSIs (git-fixes).\n- ice: fix accounting if a VLAN already exists (git-fixes).\n- ice: fix over-shifted variable (git-fixes).\n- ice: fix receive buffer size miscalculation (git-fixes).\n- ice: ice_aq_check_events: fix off-by-one check when filling buffer (git-fixes).\n- ice: reset first in crash dump kernels (git-fixes).\n- ice: respect netif readiness in AF_XDP ZC related ndo's (git-fixes).\n- ice: tc: allow zero flags in parsing tc flower (git-fixes).\n- ice: virtchnl: stop pretending to support RSS over AQ or registers (git-fixes).\n- idpf: Interpret .set_channels() input differently (git-fixes).\n- idpf: avoid compiler introduced padding in virtchnl2_rss_key struct (git-fixes).\n- idpf: avoid compiler padding in virtchnl2_ptype struct (git-fixes).\n- idpf: disable local BH when scheduling napi for marker packets (git-fixes).\n- idpf: distinguish vports by the dev_port attribute (git-fixes).\n- idpf: do not enable NAPI and interrupts prior to allocating Rx buffers (git-fixes).\n- idpf: fix UAFs when destroying the queues (git-fixes).\n- idpf: fix corrupted frames and skb leaks in singleq mode (git-fixes).\n- idpf: fix memleak in vport interrupt configuration (git-fixes).\n- idpf: fix memory leaks and crashes while performing a soft reset (git-fixes).\n- igb: Always call igb_xdp_ring_update_tail() under Tx lock (git-fixes).\n- igb: Fix missing time sync events (git-fixes).\n- igb: Fix not clearing TimeSync interrupts for 82580 (git-fixes).\n- igb: extend PTP timestamp adjustments to i211 (git-fixes).\n- igc: Check VLAN EtherType mask (git-fixes).\n- igc: Check VLAN TCI mask (git-fixes).\n- igc: Fix hicredit calculation (git-fixes).\n- igc: Fix missing time sync events (git-fixes).\n- igc: Remove temporary workaround (git-fixes).\n- igc: Report VLAN EtherType matching back to user (git-fixes).\n- igc: Unlock on error in igc_io_resume() (git-fixes).\n- iio: adc: ad7124: fix division by zero in ad7124_set_channel_odr() (git-fixes).\n- iio: adc: ad7606: Fix typo in the driver name (git-fixes).\n- iio: adc: ad7923: Fix buffer overflow for tx_buf and ring_xfer (git-fixes).\n- iio: light: al3010: Fix an error handling path in al3010_probe() (git-fixes).\n- iio: light: veml6030: fix microlux value calculation (git-fixes).\n- initramfs: avoid filename buffer overrun (bsc#1232436).\n- input: i8042 - add Ayaneo Kun to i8042 quirk table (git-fixes).\n- input: i8042 - add Fujitsu Lifebook E756 to i8042 quirk table (git-fixes).\n- input: i8042 - add TUXEDO Stellaris 15 Slim Gen6 AMD to i8042 quirk table (git-fixes).\n- input: i8042 - add TUXEDO Stellaris 16 Gen5 AMD to i8042 quirk table (git-fixes).\n- input: i8042 - add another board name for TUXEDO Stellaris Gen5 AMD line (git-fixes).\n- irqchip/gic-v3-its: Avoid explicit cpumask allocation on stack (git-fixes).\n- irqchip/gic-v3-its: Fix VSYNC referencing an unmapped VPE on GIC v4.1 (git-fixes).\n- ixgbe: avoid sleeping allocation in ixgbe_ipsec_vf_add_sa() (git-fixes).\n- ixgbe: fix crash with empty VF macvlan list (git-fixes).\n- ixgbe: fix timestamp configuration code (git-fixes).\n- ixgbe: {dis, en}able irqs in ixgbe_txrx_ring_{dis, en}able (git-fixes).\n- kABI: Restore exported __arm_smccc_sve_check (git-fixes)\n- kernel-binary: Enable livepatch package only when livepatch is enabled Otherwise the filelist may be empty failing the build (bsc#1218644).\n- kernel.h: split out COUNT_ARGS() and CONCATENATE() to args.h (git-fixes)\n- kexec: fix a memory leak in crash_shrink_memory() (git-fixes).\n- kvm: PPC: Book3S HV: remove unused varible (bsc#1194869).\n- mac80211: MAC80211_MESSAGE_TRACING should depend on TRACING (git-fixes).\n- media: adv7604: prevent underflow condition when reporting colorspace (git-fixes).\n- media: cx24116: prevent overflows on SNR calculus (git-fixes).\n- media: dvb-usb-v2: af9035: Fix null-ptr-deref in af9035_i2c_master_xfer (stable-fixes).\n- media: dvb-usb-v2: af9035: fix missing unlock (git-fixes).\n- media: dvb_frontend: do not play tricks with underflow values (git-fixes).\n- media: dvbdev: prevent the risk of out of memory access (git-fixes).\n- media: pci: cx23885: check cx23885_vdev_init() return (stable-fixes).\n- media: pulse8-cec: fix data timestamp at pulse8_setup() (git-fixes).\n- media: stb0899_algo: initialize cfr before using it (git-fixes).\n- media: v4l2-ctrls-api: fix error handling for v4l2_g_ctrl() (git-fixes).\n- media: v4l2-tpg: prevent the risk of a division by zero (git-fixes).\n- mei: use kvmalloc for read buffer (git-fixes).\n- misc: apds990x: Fix missing pm_runtime_disable() (git-fixes).\n- mm/hugetlb: fix nodes huge page allocation when there are surplus pages (bsc#1234012).\n- mm/memory: add non-anonymous page check in the copy_present_page() (bsc#1231646).\n- modpost: remove incorrect code in do_eisa_entry() (git-fixes).\n- net/mlx5: Add missing masks and QoS bit masks for scheduling elements (git-fixes).\n- net/mlx5: Added cond_resched() to crdump collection (git-fixes).\n- net/mlx5: Allow 0 for total host VFs (git-fixes).\n- net/mlx5: Correctly compare pkt reformat ids (git-fixes).\n- net/mlx5: DR, Can't go to uplink vport on RX rule (git-fixes).\n- net/mlx5: DR, Use the right GVMI number for drop action (git-fixes).\n- net/mlx5: DR, fix memory leak in mlx5dr_cmd_create_reformat_ctx (git-fixes).\n- net/mlx5: Drain health before unregistering devlink (git-fixes).\n- net/mlx5: E-switch, register event handler before arming the event (git-fixes).\n- net/mlx5: Explicitly set scheduling element and TSAR type (git-fixes).\n- net/mlx5: Fix fw tracer first block check (git-fixes).\n- net/mlx5: Handle fw tracer change ownership event based on MTRC (git-fixes).\n- net/mlx5: LAG, Check correct bucket when modifying LAG (git-fixes).\n- net/mlx5: Lag, do bond only if slaves agree on roce state (git-fixes).\n- net/mlx5: Lag, do not use the hardcoded value of the first port (git-fixes).\n- net/mlx5: Lag, restore buckets number to default after hash LAG deactivation (git-fixes).\n- net/mlx5: Skip clock update work when device is in error state (git-fixes).\n- net/mlx5: Unregister notifier on eswitch init failure (git-fixes).\n- net/mlx5: Update the list of the PCI supported devices (git-fixes).\n- net/mlx5: Use RMW accessors for changing LNKCTL (git-fixes).\n- net/mlx5: Use mlx5 device constant for selecting CQ period mode for ASO (git-fixes).\n- net/mlx5: Use recovery timeout on sync reset flow (git-fixes).\n- net/mlx5: fix potential memory leak in mlx5e_init_rep_rx (git-fixes).\n- net/mlx5: fs, lock FTE when checking if active (git-fixes).\n- net/mlx5e: Add a check for the return value from mlx5_port_set_eth_ptys (git-fixes).\n- net/mlx5e: Add missing link modes to ptys2ethtool_map (git-fixes).\n- net/mlx5e: Add mqprio_rl cleanup and free in mlx5e_priv_cleanup() (git-fixes).\n- net/mlx5e: Again mutually exclude RX-FCS and RX-port-timestamp (git-fixes).\n- net/mlx5e: Allow software parsing when IPsec crypto is enabled (git-fixes).\n- net/mlx5e: CT: Fix null-ptr-deref in add rule err flow (git-fixes).\n- net/mlx5e: Change the warning when ignore_flow_level is not supported (git-fixes).\n- net/mlx5e: Check return value of snprintf writing to fw_version buffer (git-fixes).\n- net/mlx5e: Check return value of snprintf writing to fw_version buffer for representors (git-fixes).\n- net/mlx5e: Correct snprintf truncation handling for fw_version buffer (git-fixes).\n- net/mlx5e: Correct snprintf truncation handling for fw_version buffer used by representors (git-fixes).\n- net/mlx5e: Correctly report errors for ethtool rx flows (git-fixes).\n- net/mlx5e: Do not offload internal port if filter device is out device (git-fixes).\n- net/mlx5e: Fix IPsec tunnel mode offload feature check (git-fixes).\n- net/mlx5e: Fix UDP GSO for encapsulated packets (git-fixes).\n- net/mlx5e: Fix crash moving to switchdev mode when ntuple offload is set (git-fixes).\n- net/mlx5e: Fix features validation check for tunneled UDP (non-VXLAN) packets (git-fixes).\n- net/mlx5e: Fix pedit endianness (git-fixes).\n- net/mlx5e: Fix possible deadlock on mlx5e_tx_timeout_work (git-fixes).\n- net/mlx5e: Fix slab-out-of-bounds in mlx5_query_nic_vport_mac_list() (git-fixes).\n- net/mlx5e: HTB, Fix inconsistencies with QoS SQs number (git-fixes).\n- net/mlx5e: Move representor neigh cleanup to profile cleanup_tx (git-fixes).\n- net/mlx5e: Reduce the size of icosq_str (git-fixes).\n- net/mlx5e: Take state lock during tx timeout reporter (git-fixes).\n- net/mlx5e: Use rx_missed_errors instead of rx_dropped for reporting buffer exhaustion (git-fixes).\n- net/mlx5e: fix a potential double-free in fs_udp_create_groups (git-fixes).\n- net/mlx5e: fix double free in macsec_fs_tx_create_crypto_table_groups (git-fixes).\n- net/mlx5e: fix double free of encap_header (git-fixes).\n- net/mlx5e: fix return value check in mlx5e_ipsec_remove_trailer() (git-fixes).\n- net/mlx5e: kTLS, Fix incorrect page refcounting (git-fixes).\n- net: ena: Fix potential sign extension issue (git-fixes).\n- net: ena: Remove ena_select_queue (git-fixes).\n- net: ena: Wrong missing IO completions check order (git-fixes).\n- net: qede: use return from qede_parse_flow_attr() for flow_spec (git-fixes).\n- net: relax socket state check at accept time (git-fixes).\n- net: usb: lan78xx: Fix memory leak on device unplug by freeing PHY device (git-fixes).\n- net: usb: lan78xx: Fix refcounting and autosuspend on invalid WoL configuration (git-fixes).\n- net: usb: qmi_wwan: add Fibocom FG132 0x0112 composition (stable-fixes).\n- net: usb: usbnet: fix race in probe failure (git-fixes).\n- nfs: Fix KMSAN warning in decode_getfattr_attrs() (git-fixes).\n- nvme-fabrics: fix kernel crash while shutting down controller (git-fixes).\n- nvme-pci: fix freeing of the HMB descriptor table (git-fixes).\n- nvme-pci: reverse request order in nvme_queue_rqs (git-fixes).\n- ocfs2: remove entry once instead of null-ptr-dereference in ocfs2_xa_remove() (git-fixes).\n- pci: Add T_PVPERL macro (git-fixes).\n- pci: Fix reset_method_store() memory leak (git-fixes).\n- pci: endpoint: Clear secondary (not primary) EPC in pci_epc_remove_epf() (git-fixes).\n- pci: j721e: Deassert PERST# after a delay of PCIE_T_PVPERL_MS milliseconds (git-fixes).\n- pci: keystone: Add link up check to ks_pcie_other_map_bus() (git-fixes).\n- pci: keystone: Set mode as Root Complex for 'ti,keystone-pcie' compatible (git-fixes).\n- pci: rockchip-ep: Fix address translation unit programming (git-fixes).\n- phy: tegra: xusb: Add error pointer check in xusb.c (git-fixes).\n- platform/chrome: cros_ec_typec: fix missing fwnode reference decrement (git-fixes).\n- platform/surface: aggregator: Fix warning when controller is destroyed in probe (git-fixes).\n- platform/x86: dell-sysman: add support for alienware products (stable-fixes).\n- platform/x86: dell-wmi: Ignore suspend notifications (stable-fixes).\n- posix-cpu-timers: Clear TICK_DEP_BIT_POSIX_TIMER on clone (bsc#1234098).\n- power: supply: bq27xxx: Fix registers of bq27426 (git-fixes).\n- power: supply: core: Remove might_sleep() from power_supply_put() (git-fixes).\n- powerpc/asm: Remove UPD_CONSTR after GCC 4.9 removal (bsc#1194869).\n- powerpc/atomic: Use YZ constraints for DS-form instructions (bsc#1194869).\n- powerpc/kexec: Fix return of uninitialized variable (bsc#1194869).\n- powerpc/mm/fault: Fix kfence page fault reporting (bsc#1194869).\n- powerpc/mm: Fix boot crash with FLATMEM (bsc#1194869).\n- powerpc/mm: Fix boot warning with hugepages and CONFIG_DEBUG_VIRTUAL (bsc#1194869).\n- powerpc/powernv: Free name on error in opal_event_init() (bsc#1194869).\n- powerpc/pseries: Fix KVM guest detection for disabling hardlockup detector (bsc#1194869).\n- powerpc/pseries: Fix dtl_access_lock to be a rw_semaphore (bsc#1194869).\n- powerpc: remove GCC version check for UPD_CONSTR (bsc#1194869).\n- qed: avoid truncating work queue length (git-fixes).\n- rdma/bnxt_re: Check cqe flags to know imm_data vs inv_irkey (git-fixes)\n- rdma/hns: Add clear_hem return value to log (git-fixes)\n- rdma/hns: Add mutex_destroy() (git-fixes)\n- rdma/hns: Fix NULL pointer derefernce in hns_roce_map_mr_sg() (git-fixes)\n- rdma/hns: Fix an AEQE overflow error caused by untimely update of eq_db_ci (git-fixes)\n- rdma/hns: Fix cpu stuck caused by printings during reset (git-fixes)\n- rdma/hns: Fix different dgids mapping to the same dip_idx (git-fixes)\n- rdma/hns: Fix flush cqe error when racing with destroy qp (git-fixes)\n- rdma/hns: Fix out-of-order issue of requester when setting FENCE (git-fixes)\n- rdma/hns: Remove unnecessary QP type checks (git-fixes)\n- rdma/hns: Use dev_* printings in hem code instead of ibdev_* (git-fixes)\n- rdma/hns: Use macro instead of magic number (git-fixes)\n- rdma/mlx5: Move events notifier registration to be after device registration (git-fixes)\n- rdma/mlx5: Use sq timestamp as QP timestamp when RoCE is disabled (git-fixes).\n- rdma/rxe: Fix the qp flush warnings in req (git-fixes)\n- rdma/rxe: Set queue pair cur_qp_state when being queried (git-fixes)\n- rpm/scripts: Remove obsolete Symbols.list Symbols.list is not longer needed by the new klp-convert implementation. (bsc#1218644)\n- rtc: ab-eoz9: do not fail temperature reads on undervoltage notification (git-fixes).\n- rtc: abx80x: Fix WDT bit position of the status register (git-fixes).\n- rtc: check if __rtc_read_time was successful in rtc_timer_do_work() (git-fixes).\n- rtc: st-lpc: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).\n- scsi: lpfc: Add cleanup of nvmels_wq after HBA reset (bsc#1233241).\n- scsi: lpfc: Call lpfc_sli4_queue_unset() in restart and rmmod paths (bsc#1233241).\n- scsi: lpfc: Change lpfc_nodelist nlp_flag member into a bitmask (bsc#1233241).\n- scsi: lpfc: Check SLI_ACTIVE flag in FDMI cmpl before submitting follow up FDMI (bsc#1233241).\n- scsi: lpfc: Check devloss callbk done flag for potential stale NDLP ptrs (bsc#1233241).\n- scsi: lpfc: Copyright updates for 14.4.0.6 patches (bsc#1233241).\n- scsi: lpfc: Modify CGN warning signal calculation based on EDC response (bsc#1233241).\n- scsi: lpfc: Prevent NDLP reference count underflow in dev_loss_tmo callback (bsc#1233241).\n- scsi: lpfc: Remove NLP_RELEASE_RPI flag from nodelist structure (bsc#1233241).\n- scsi: lpfc: Update lpfc version to 14.4.0.6 (bsc#1233241).\n- scsi: lpfc: Update lpfc_els_flush_cmd() to check for SLI_ACTIVE before BSG flag (bsc#1233241).\n- scsi: scsi_transport_fc: Allow setting rport state to current state (git-fixes).\n- scsi: sd_zbc: Use kvzalloc() to allocate REPORT ZONES buffer (git-fixes).\n- security/keys: fix slab-out-of-bounds in key_task_permission (git-fixes).\n- serial: 8250: omap: Move pm_runtime_get_sync (git-fixes).\n- sfc: Check firmware supports Ethernet PTP filter (git-fixes).\n- sfc: do not unregister flow_indr if it was never registered (git-fixes).\n- sfc: fix a double-free bug in efx_probe_filters (git-fixes).\n- signal: Replace BUG_ON()s (bsc#1234093).\n- spi: Fix acpi deferred irq probe (git-fixes).\n- spi: atmel-quadspi: Fix register name in verbose logging function (git-fixes).\n- staging: iio: frequency: ad9832: fix division by zero in ad9832_calc_freqreg() (git-fixes).\n- thermal: core: Initialize thermal zones before registering them (git-fixes).\n- thermal: intel: int340x: processor: Fix warning during module unload (git-fixes).\n- tpm: Lock TPM chip in tpm_pm_suspend() first (bsc#1082555 git-fixes).\n- tun: Fix xdp_rxq_info's queue_index when detaching (git-fixes).\n- tun: prevent negative ifindex (git-fixes).\n- ucounts: fix counter leak in inc_rlimit_get_ucounts() (bsc#1233460).\n- usb: chaoskey: Fix possible deadlock chaoskey_list_lock (git-fixes).\n- usb: chaoskey: fail open after removal (git-fixes).\n- usb: dwc3: gadget: Add missing check for single port RAM in TxFIFO resizing logic (git-fixes).\n- usb: dwc3: gadget: Fix checking for number of TRBs left (git-fixes).\n- usb: dwc3: gadget: Fix looping of queued SG entries (git-fixes).\n- usb: ehci-spear: fix call balance of sehci clk handling routines (git-fixes).\n- usb: musb: sunxi: Fix accessing an released usb phy (git-fixes).\n- usb: phy: Fix API devm_usb_put_phy() can not release the phy (git-fixes).\n- usb: serial: ftdi_sio: Fix atomicity violation in get_serial_info() (git-fixes).\n- usb: serial: io_edgeport: fix use after free in debug printk (git-fixes).\n- usb: serial: option: add Fibocom FG132 0x0112 composition (stable-fixes).\n- usb: serial: option: add Quectel RG650V (stable-fixes).\n- usb: serial: qcserial: add support for Sierra Wireless EM86xx (stable-fixes).\n- usb: typec: fix potential out of bounds in ucsi_ccg_update_set_new_cam_cmd() (git-fixes).\n- usb: typec: fix unreleased fwnode_handle in typec_port_register_altmodes() (git-fixes).\n- usb: using mutex lock and supporting O_NONBLOCK flag in iowarrior_read() (git-fixes).\n- usb: xhci: Fix TD invalidation under pending Set TR Dequeue (git-fixes).\n- usb: yurex: make waiting on yurex_write interruptible (git-fixes).\n- usbip: tools: Fix detach_port() invalid port error path (git-fixes).\n- vdpa/mlx5: preserve CVQ vringh index (git-fixes).\n- watchdog: mediatek: Make sure system reset gets asserted in mtk_wdt_restart() (git-fixes).\n- watchdog: rti: of: honor timeout-sec property (git-fixes).\n- wifi: ath10k: Fix memory leak in management tx (git-fixes).\n- wifi: ath10k: fix invalid VHT parameters in supported_vht_mcs_rate_nss1 (git-fixes).\n- wifi: ath10k: fix invalid VHT parameters in supported_vht_mcs_rate_nss2 (git-fixes).\n- wifi: ath11k: Fix invalid ring usage in full monitor mode (git-fixes).\n- wifi: ath9k: add range check for conn_rsp_epid in htc_connect_service() (git-fixes).\n- wifi: brcm80211: BRCM_TRACING should depend on TRACING (git-fixes).\n- wifi: iwlegacy: Clear stale interrupts before resuming device (stable-fixes).\n- wifi: iwlwifi: mvm: Fix response handling in iwl_mvm_send_recovery_cmd() (git-fixes).\n- wifi: iwlwifi: mvm: disconnect station vifs if recovery failed (stable-fixes).\n- wifi: mac80211: do not pass a stopped vif to the driver in .get_txpower (git-fixes).\n- wifi: mac80211: skip non-uploaded keys in ieee80211_iter_keys (git-fixes).\n- wifi: mwifiex: Fix memcpy() field-spanning write warning in mwifiex_config_scan() (git-fixes).\n- wifi: mwifiex: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).\n- wifi: p54: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).\n- x86/kvm: fix is_stale_page_fault() (bsc#1221333).\n- xhci: Fix Link TRB DMA in command ring stopped completion event (git-fixes).\n- xhci: Separate PORT and CAPs macros into dedicated file (stable-fixes).\n- xhci: Use pm_runtime_get to prevent RPM on unsupported systems (git-fixes).\n","id":"SUSE-SU-2024:4376-1","modified":"2024-12-18T15:03:33Z","published":"2024-12-18T15:03:33Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2024/suse-su-20244376-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1082555"},{"type":"REPORT","url":"https://bugzilla.suse.com/1194869"},{"type":"REPORT","url":"https://bugzilla.suse.com/1218644"},{"type":"REPORT","url":"https://bugzilla.suse.com/1220382"},{"type":"REPORT","url":"https://bugzilla.suse.com/1221309"},{"type":"REPORT","url":"https://bugzilla.suse.com/1221333"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222364"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222590"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223202"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223656"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223848"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223919"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223942"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224518"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224526"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224574"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225725"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225730"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225742"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225764"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225812"},{"type":"REPORT","url":"https://bugzilla.suse.com/1226560"},{"type":"REPORT","url":"https://bugzilla.suse.com/1226592"},{"type":"REPORT","url":"https://bugzilla.suse.com/1226631"},{"type":"REPORT","url":"https://bugzilla.suse.com/1226748"},{"type":"REPORT","url":"https://bugzilla.suse.com/1226872"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227853"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228410"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228430"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228486"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228650"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228857"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229312"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229429"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229585"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229752"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229808"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230055"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230220"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230231"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230270"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230558"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230827"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230918"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231083"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231089"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231098"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231101"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231108"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231111"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231132"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231135"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231138"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231169"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231178"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231180"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231181"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231187"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231202"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231434"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231441"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231452"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231465"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231474"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231481"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231537"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231541"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231646"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231849"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231856"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231858"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231859"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231864"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231904"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231916"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231920"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231923"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231930"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231931"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231947"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231952"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231953"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231959"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231978"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232013"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232015"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232016"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232017"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232027"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232028"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232047"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232048"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232050"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232056"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232076"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232080"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232094"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232096"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232098"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232111"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232126"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232134"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232135"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232141"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232142"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232147"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232152"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232159"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232162"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232165"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232180"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232185"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232187"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232189"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232195"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232198"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232201"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232218"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232224"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232232"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232254"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232255"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232264"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232272"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232279"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232287"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232293"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232312"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232317"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232318"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232333"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232334"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232335"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232339"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232349"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232357"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232359"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232362"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232364"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232370"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232371"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232378"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232385"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232387"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232394"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232413"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232416"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232436"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232483"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232500"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232503"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232504"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232507"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232520"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232552"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232757"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232819"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232860"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232870"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232873"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232877"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232878"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232881"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232884"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232885"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232887"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232888"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232890"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232892"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232896"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232897"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232905"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232907"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232919"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232926"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232928"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232935"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233035"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233049"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233051"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233056"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233057"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233061"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233063"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233065"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233067"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233070"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233073"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233074"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233100"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233103"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233104"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233105"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233106"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233107"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233108"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233110"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233111"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233113"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233114"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233117"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233123"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233125"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233129"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233130"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233134"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233135"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233150"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233189"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233191"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233197"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233205"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233206"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233209"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233210"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233211"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233212"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233214"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233216"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233238"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233241"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233253"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233255"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233293"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233350"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233452"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233453"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233454"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233456"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233457"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233458"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233460"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233462"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233463"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233468"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233471"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233476"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233478"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233479"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233481"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233484"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233487"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233490"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233491"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233528"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233548"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233552"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233553"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233554"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233555"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233557"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233560"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233561"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233570"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233577"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233580"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233977"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234012"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234025"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234085"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234093"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234098"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234108"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47594"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48674"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48979"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48982"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48983"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48989"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48990"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52915"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52917"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52918"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52921"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52922"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26782"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26906"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26953"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-35888"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-35937"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-35980"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-36484"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-36883"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-36886"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-36905"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-36953"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-36954"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-38577"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-38589"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-38615"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-40997"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41016"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41023"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41049"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42131"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43817"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43897"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-44932"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-44964"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-44995"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46681"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46800"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46802"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46804"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46805"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46807"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46810"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46812"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46819"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46821"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46835"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46842"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46853"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46859"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46864"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46871"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47663"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47665"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47667"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47669"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47670"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47671"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47679"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47682"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47693"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47695"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47696"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47697"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47698"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47699"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47701"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47709"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47712"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47713"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47718"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47723"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47728"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47735"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47737"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47742"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47745"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47749"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47756"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47757"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49850"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49851"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49852"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49855"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49861"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49863"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49868"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49870"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49871"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49875"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49877"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49879"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49884"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49891"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49900"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49902"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49903"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49905"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49907"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49908"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49921"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49924"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49925"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49934"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49935"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49938"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49945"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49947"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49950"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49957"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49963"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49965"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49966"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49968"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49981"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49983"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49985"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49989"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50003"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50007"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50008"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50009"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50013"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50017"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50025"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50026"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50031"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50044"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50062"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50067"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50073"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50074"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50077"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50078"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50082"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50089"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50093"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50095"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50096"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50098"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50099"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50103"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50108"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50110"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50115"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50116"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50117"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50124"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50125"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50127"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50128"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50131"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50134"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50135"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50138"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50141"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50146"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50147"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50148"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50150"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50153"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50154"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50155"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50156"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50160"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50167"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50171"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50179"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50180"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50182"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50183"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50184"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50186"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50187"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50188"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50189"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50192"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50194"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50195"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50196"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50198"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50201"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50205"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50208"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50209"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50215"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50218"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50229"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50230"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50232"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50233"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50234"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50236"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50237"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50249"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50255"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50259"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50261"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50264"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50265"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50267"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50268"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50269"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50271"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50273"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50274"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50279"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50282"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50287"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50289"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50290"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50292"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50295"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50298"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50301"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50302"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53052"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53058"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53059"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53060"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53061"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53063"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53066"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53068"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53079"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53085"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53088"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53104"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53110"}],"related":["CVE-2021-47594","CVE-2022-48674","CVE-2022-48979","CVE-2022-48982","CVE-2022-48983","CVE-2022-48989","CVE-2022-48990","CVE-2023-52915","CVE-2023-52917","CVE-2023-52918","CVE-2023-52921","CVE-2023-52922","CVE-2024-26782","CVE-2024-26906","CVE-2024-26953","CVE-2024-35888","CVE-2024-35937","CVE-2024-35980","CVE-2024-36484","CVE-2024-36883","CVE-2024-36886","CVE-2024-36905","CVE-2024-36953","CVE-2024-36954","CVE-2024-38577","CVE-2024-38589","CVE-2024-38615","CVE-2024-40997","CVE-2024-41016","CVE-2024-41023","CVE-2024-41049","CVE-2024-42131","CVE-2024-43817","CVE-2024-43897","CVE-2024-44932","CVE-2024-44964","CVE-2024-44995","CVE-2024-46681","CVE-2024-46800","CVE-2024-46802","CVE-2024-46804","CVE-2024-46805","CVE-2024-46807","CVE-2024-46810","CVE-2024-46812","CVE-2024-46819","CVE-2024-46821","CVE-2024-46835","CVE-2024-46842","CVE-2024-46853","CVE-2024-46859","CVE-2024-46864","CVE-2024-46871","CVE-2024-47663","CVE-2024-47665","CVE-2024-47667","CVE-2024-47669","CVE-2024-47670","CVE-2024-47671","CVE-2024-47679","CVE-2024-47682","CVE-2024-47693","CVE-2024-47695","CVE-2024-47696","CVE-2024-47697","CVE-2024-47698","CVE-2024-47699","CVE-2024-47701","CVE-2024-47709","CVE-2024-47712","CVE-2024-47713","CVE-2024-47718","CVE-2024-47723","CVE-2024-47728","CVE-2024-47735","CVE-2024-47737","CVE-2024-47742","CVE-2024-47745","CVE-2024-47749","CVE-2024-47756","CVE-2024-47757","CVE-2024-49850","CVE-2024-49851","CVE-2024-49852","CVE-2024-49855","CVE-2024-49861","CVE-2024-49863","CVE-2024-49868","CVE-2024-49870","CVE-2024-49871","CVE-2024-49875","CVE-2024-49877","CVE-2024-49879","CVE-2024-49884","CVE-2024-49891","CVE-2024-49900","CVE-2024-49902","CVE-2024-49903","CVE-2024-49905","CVE-2024-49907","CVE-2024-49908","CVE-2024-49921","CVE-2024-49924","CVE-2024-49925","CVE-2024-49934","CVE-2024-49935","CVE-2024-49938","CVE-2024-49945","CVE-2024-49947","CVE-2024-49950","CVE-2024-49957","CVE-2024-49963","CVE-2024-49965","CVE-2024-49966","CVE-2024-49968","CVE-2024-49981","CVE-2024-49983","CVE-2024-49985","CVE-2024-49989","CVE-2024-50003","CVE-2024-50007","CVE-2024-50008","CVE-2024-50009","CVE-2024-50013","CVE-2024-50017","CVE-2024-50025","CVE-2024-50026","CVE-2024-50031","CVE-2024-50044","CVE-2024-50062","CVE-2024-50067","CVE-2024-50073","CVE-2024-50074","CVE-2024-50077","CVE-2024-50078","CVE-2024-50082","CVE-2024-50089","CVE-2024-50093","CVE-2024-50095","CVE-2024-50096","CVE-2024-50098","CVE-2024-50099","CVE-2024-50103","CVE-2024-50108","CVE-2024-50110","CVE-2024-50115","CVE-2024-50116","CVE-2024-50117","CVE-2024-50124","CVE-2024-50125","CVE-2024-50127","CVE-2024-50128","CVE-2024-50131","CVE-2024-50134","CVE-2024-50135","CVE-2024-50138","CVE-2024-50141","CVE-2024-50146","CVE-2024-50147","CVE-2024-50148","CVE-2024-50150","CVE-2024-50153","CVE-2024-50154","CVE-2024-50155","CVE-2024-50156","CVE-2024-50160","CVE-2024-50167","CVE-2024-50171","CVE-2024-50179","CVE-2024-50180","CVE-2024-50182","CVE-2024-50183","CVE-2024-50184","CVE-2024-50186","CVE-2024-50187","CVE-2024-50188","CVE-2024-50189","CVE-2024-50192","CVE-2024-50194","CVE-2024-50195","CVE-2024-50196","CVE-2024-50198","CVE-2024-50201","CVE-2024-50205","CVE-2024-50208","CVE-2024-50209","CVE-2024-50215","CVE-2024-50218","CVE-2024-50229","CVE-2024-50230","CVE-2024-50232","CVE-2024-50233","CVE-2024-50234","CVE-2024-50236","CVE-2024-50237","CVE-2024-50249","CVE-2024-50255","CVE-2024-50259","CVE-2024-50261","CVE-2024-50264","CVE-2024-50265","CVE-2024-50267","CVE-2024-50268","CVE-2024-50269","CVE-2024-50271","CVE-2024-50273","CVE-2024-50274","CVE-2024-50279","CVE-2024-50282","CVE-2024-50287","CVE-2024-50289","CVE-2024-50290","CVE-2024-50292","CVE-2024-50295","CVE-2024-50298","CVE-2024-50301","CVE-2024-50302","CVE-2024-53052","CVE-2024-53058","CVE-2024-53059","CVE-2024-53060","CVE-2024-53061","CVE-2024-53063","CVE-2024-53066","CVE-2024-53068","CVE-2024-53079","CVE-2024-53085","CVE-2024-53088","CVE-2024-53104","CVE-2024-53110"],"summary":"Security update for the Linux Kernel","upstream":["CVE-2021-47594","CVE-2022-48674","CVE-2022-48979","CVE-2022-48982","CVE-2022-48983","CVE-2022-48989","CVE-2022-48990","CVE-2023-52915","CVE-2023-52917","CVE-2023-52918","CVE-2023-52921","CVE-2023-52922","CVE-2024-26782","CVE-2024-26906","CVE-2024-26953","CVE-2024-35888","CVE-2024-35937","CVE-2024-35980","CVE-2024-36484","CVE-2024-36883","CVE-2024-36886","CVE-2024-36905","CVE-2024-36953","CVE-2024-36954","CVE-2024-38577","CVE-2024-38589","CVE-2024-38615","CVE-2024-40997","CVE-2024-41016","CVE-2024-41023","CVE-2024-41049","CVE-2024-42131","CVE-2024-43817","CVE-2024-43897","CVE-2024-44932","CVE-2024-44964","CVE-2024-44995","CVE-2024-46681","CVE-2024-46800","CVE-2024-46802","CVE-2024-46804","CVE-2024-46805","CVE-2024-46807","CVE-2024-46810","CVE-2024-46812","CVE-2024-46819","CVE-2024-46821","CVE-2024-46835","CVE-2024-46842","CVE-2024-46853","CVE-2024-46859","CVE-2024-46864","CVE-2024-46871","CVE-2024-47663","CVE-2024-47665","CVE-2024-47667","CVE-2024-47669","CVE-2024-47670","CVE-2024-47671","CVE-2024-47679","CVE-2024-47682","CVE-2024-47693","CVE-2024-47695","CVE-2024-47696","CVE-2024-47697","CVE-2024-47698","CVE-2024-47699","CVE-2024-47701","CVE-2024-47709","CVE-2024-47712","CVE-2024-47713","CVE-2024-47718","CVE-2024-47723","CVE-2024-47728","CVE-2024-47735","CVE-2024-47737","CVE-2024-47742","CVE-2024-47745","CVE-2024-47749","CVE-2024-47756","CVE-2024-47757","CVE-2024-49850","CVE-2024-49851","CVE-2024-49852","CVE-2024-49855","CVE-2024-49861","CVE-2024-49863","CVE-2024-49868","CVE-2024-49870","CVE-2024-49871","CVE-2024-49875","CVE-2024-49877","CVE-2024-49879","CVE-2024-49884","CVE-2024-49891","CVE-2024-49900","CVE-2024-49902","CVE-2024-49903","CVE-2024-49905","CVE-2024-49907","CVE-2024-49908","CVE-2024-49921","CVE-2024-49924","CVE-2024-49925","CVE-2024-49934","CVE-2024-49935","CVE-2024-49938","CVE-2024-49945","CVE-2024-49947","CVE-2024-49950","CVE-2024-49957","CVE-2024-49963","CVE-2024-49965","CVE-2024-49966","CVE-2024-49968","CVE-2024-49981","CVE-2024-49983","CVE-2024-49985","CVE-2024-49989","CVE-2024-50003","CVE-2024-50007","CVE-2024-50008","CVE-2024-50009","CVE-2024-50013","CVE-2024-50017","CVE-2024-50025","CVE-2024-50026","CVE-2024-50031","CVE-2024-50044","CVE-2024-50062","CVE-2024-50067","CVE-2024-50073","CVE-2024-50074","CVE-2024-50077","CVE-2024-50078","CVE-2024-50082","CVE-2024-50089","CVE-2024-50093","CVE-2024-50095","CVE-2024-50096","CVE-2024-50098","CVE-2024-50099","CVE-2024-50103","CVE-2024-50108","CVE-2024-50110","CVE-2024-50115","CVE-2024-50116","CVE-2024-50117","CVE-2024-50124","CVE-2024-50125","CVE-2024-50127","CVE-2024-50128","CVE-2024-50131","CVE-2024-50134","CVE-2024-50135","CVE-2024-50138","CVE-2024-50141","CVE-2024-50146","CVE-2024-50147","CVE-2024-50148","CVE-2024-50150","CVE-2024-50153","CVE-2024-50154","CVE-2024-50155","CVE-2024-50156","CVE-2024-50160","CVE-2024-50167","CVE-2024-50171","CVE-2024-50179","CVE-2024-50180","CVE-2024-50182","CVE-2024-50183","CVE-2024-50184","CVE-2024-50186","CVE-2024-50187","CVE-2024-50188","CVE-2024-50189","CVE-2024-50192","CVE-2024-50194","CVE-2024-50195","CVE-2024-50196","CVE-2024-50198","CVE-2024-50201","CVE-2024-50205","CVE-2024-50208","CVE-2024-50209","CVE-2024-50215","CVE-2024-50218","CVE-2024-50229","CVE-2024-50230","CVE-2024-50232","CVE-2024-50233","CVE-2024-50234","CVE-2024-50236","CVE-2024-50237","CVE-2024-50249","CVE-2024-50255","CVE-2024-50259","CVE-2024-50261","CVE-2024-50264","CVE-2024-50265","CVE-2024-50267","CVE-2024-50268","CVE-2024-50269","CVE-2024-50271","CVE-2024-50273","CVE-2024-50274","CVE-2024-50279","CVE-2024-50282","CVE-2024-50287","CVE-2024-50289","CVE-2024-50290","CVE-2024-50292","CVE-2024-50295","CVE-2024-50298","CVE-2024-50301","CVE-2024-50302","CVE-2024-53052","CVE-2024-53058","CVE-2024-53059","CVE-2024-53060","CVE-2024-53061","CVE-2024-53063","CVE-2024-53066","CVE-2024-53068","CVE-2024-53079","CVE-2024-53085","CVE-2024-53088","CVE-2024-53104","CVE-2024-53110"]}