SUSE-SU-2024:2203-1: important: Security update for the Linux Kernel
SLE-SECURITY-UPDATES
null at suse.de
Mon Aug 19 12:38:58 UTC 2024
# Security update for the Linux Kernel
Announcement ID: SUSE-SU-2024:2203-1
Rating: important
References:
* bsc#1012628
* bsc#1065729
* bsc#1181674
* bsc#1187716
* bsc#1193599
* bsc#1194869
* bsc#1207948
* bsc#1208593
* bsc#1209657
* bsc#1213573
* bsc#1214852
* bsc#1215199
* bsc#1216196
* bsc#1216358
* bsc#1216702
* bsc#1217169
* bsc#1217384
* bsc#1217408
* bsc#1217489
* bsc#1217750
* bsc#1217959
* bsc#1218205
* bsc#1218336
* bsc#1218447
* bsc#1218779
* bsc#1218917
* bsc#1219104
* bsc#1219170
* bsc#1219596
* bsc#1219623
* bsc#1219834
* bsc#1220021
* bsc#1220045
* bsc#1220120
* bsc#1220148
* bsc#1220328
* bsc#1220342
* bsc#1220428
* bsc#1220430
* bsc#1220569
* bsc#1220587
* bsc#1220783
* bsc#1220915
* bsc#1221044
* bsc#1221293
* bsc#1221303
* bsc#1221504
* bsc#1221612
* bsc#1221615
* bsc#1221635
* bsc#1221645
* bsc#1221649
* bsc#1221765
* bsc#1221777
* bsc#1221783
* bsc#1221816
* bsc#1221829
* bsc#1221830
* bsc#1221858
* bsc#1222048
* bsc#1222173
* bsc#1222264
* bsc#1222273
* bsc#1222294
* bsc#1222301
* bsc#1222303
* bsc#1222304
* bsc#1222307
* bsc#1222357
* bsc#1222366
* bsc#1222368
* bsc#1222371
* bsc#1222378
* bsc#1222385
* bsc#1222422
* bsc#1222426
* bsc#1222428
* bsc#1222437
* bsc#1222445
* bsc#1222459
* bsc#1222464
* bsc#1222489
* bsc#1222522
* bsc#1222525
* bsc#1222532
* bsc#1222557
* bsc#1222559
* bsc#1222563
* bsc#1222585
* bsc#1222596
* bsc#1222606
* bsc#1222608
* bsc#1222613
* bsc#1222615
* bsc#1222618
* bsc#1222622
* bsc#1222624
* bsc#1222627
* bsc#1222630
* bsc#1222635
* bsc#1222721
* bsc#1222727
* bsc#1222769
* bsc#1222771
* bsc#1222775
* bsc#1222777
* bsc#1222780
* bsc#1222782
* bsc#1222793
* bsc#1222799
* bsc#1222801
* bsc#1222968
* bsc#1223007
* bsc#1223011
* bsc#1223015
* bsc#1223020
* bsc#1223023
* bsc#1223024
* bsc#1223033
* bsc#1223034
* bsc#1223035
* bsc#1223038
* bsc#1223039
* bsc#1223041
* bsc#1223045
* bsc#1223046
* bsc#1223051
* bsc#1223052
* bsc#1223058
* bsc#1223060
* bsc#1223061
* bsc#1223076
* bsc#1223077
* bsc#1223111
* bsc#1223113
* bsc#1223138
* bsc#1223143
* bsc#1223187
* bsc#1223189
* bsc#1223190
* bsc#1223191
* bsc#1223198
* bsc#1223202
* bsc#1223285
* bsc#1223315
* bsc#1223338
* bsc#1223369
* bsc#1223380
* bsc#1223384
* bsc#1223390
* bsc#1223439
* bsc#1223462
* bsc#1223532
* bsc#1223539
* bsc#1223575
* bsc#1223590
* bsc#1223591
* bsc#1223592
* bsc#1223593
* bsc#1223625
* bsc#1223629
* bsc#1223633
* bsc#1223634
* bsc#1223637
* bsc#1223641
* bsc#1223643
* bsc#1223649
* bsc#1223650
* bsc#1223651
* bsc#1223652
* bsc#1223653
* bsc#1223654
* bsc#1223655
* bsc#1223660
* bsc#1223661
* bsc#1223664
* bsc#1223665
* bsc#1223666
* bsc#1223668
* bsc#1223669
* bsc#1223670
* bsc#1223671
* bsc#1223675
* bsc#1223677
* bsc#1223678
* bsc#1223686
* bsc#1223692
* bsc#1223693
* bsc#1223695
* bsc#1223696
* bsc#1223698
* bsc#1223705
* bsc#1223712
* bsc#1223718
* bsc#1223728
* bsc#1223732
* bsc#1223735
* bsc#1223739
* bsc#1223741
* bsc#1223744
* bsc#1223745
* bsc#1223747
* bsc#1223748
* bsc#1223749
* bsc#1223750
* bsc#1223752
* bsc#1223754
* bsc#1223757
* bsc#1223759
* bsc#1223761
* bsc#1223762
* bsc#1223774
* bsc#1223782
* bsc#1223787
* bsc#1223788
* bsc#1223789
* bsc#1223790
* bsc#1223802
* bsc#1223805
* bsc#1223810
* bsc#1223822
* bsc#1223827
* bsc#1223831
* bsc#1223834
* bsc#1223838
* bsc#1223869
* bsc#1223870
* bsc#1223871
* bsc#1223872
* bsc#1223874
* bsc#1223944
* bsc#1223945
* bsc#1223946
* bsc#1223991
* bsc#1224076
* bsc#1224096
* bsc#1224098
* bsc#1224099
* bsc#1224137
* bsc#1224166
* bsc#1224174
* bsc#1224177
* bsc#1224180
* bsc#1224181
* bsc#1224331
* bsc#1224423
* bsc#1224429
* bsc#1224430
* bsc#1224432
* bsc#1224433
* bsc#1224437
* bsc#1224438
* bsc#1224442
* bsc#1224443
* bsc#1224445
* bsc#1224449
* bsc#1224477
* bsc#1224479
* bsc#1224480
* bsc#1224481
* bsc#1224482
* bsc#1224486
* bsc#1224487
* bsc#1224488
* bsc#1224491
* bsc#1224492
* bsc#1224493
* bsc#1224494
* bsc#1224495
* bsc#1224500
* bsc#1224501
* bsc#1224502
* bsc#1224504
* bsc#1224505
* bsc#1224506
* bsc#1224507
* bsc#1224508
* bsc#1224509
* bsc#1224511
* bsc#1224513
* bsc#1224517
* bsc#1224519
* bsc#1224521
* bsc#1224524
* bsc#1224525
* bsc#1224526
* bsc#1224530
* bsc#1224531
* bsc#1224534
* bsc#1224537
* bsc#1224541
* bsc#1224542
* bsc#1224543
* bsc#1224546
* bsc#1224550
* bsc#1224552
* bsc#1224553
* bsc#1224555
* bsc#1224557
* bsc#1224558
* bsc#1224559
* bsc#1224562
* bsc#1224565
* bsc#1224566
* bsc#1224567
* bsc#1224568
* bsc#1224569
* bsc#1224571
* bsc#1224573
* bsc#1224576
* bsc#1224577
* bsc#1224578
* bsc#1224579
* bsc#1224580
* bsc#1224581
* bsc#1224582
* bsc#1224585
* bsc#1224586
* bsc#1224587
* bsc#1224588
* bsc#1224592
* bsc#1224596
* bsc#1224598
* bsc#1224600
* bsc#1224601
* bsc#1224602
* bsc#1224603
* bsc#1224605
* bsc#1224607
* bsc#1224608
* bsc#1224609
* bsc#1224611
* bsc#1224613
* bsc#1224615
* bsc#1224617
* bsc#1224618
* bsc#1224620
* bsc#1224621
* bsc#1224622
* bsc#1224623
* bsc#1224624
* bsc#1224626
* bsc#1224627
* bsc#1224628
* bsc#1224629
* bsc#1224630
* bsc#1224632
* bsc#1224633
* bsc#1224634
* bsc#1224636
* bsc#1224637
* bsc#1224638
* bsc#1224639
* bsc#1224640
* bsc#1224643
* bsc#1224644
* bsc#1224645
* bsc#1224646
* bsc#1224647
* bsc#1224648
* bsc#1224649
* bsc#1224650
* bsc#1224651
* bsc#1224652
* bsc#1224653
* bsc#1224654
* bsc#1224657
* bsc#1224660
* bsc#1224663
* bsc#1224664
* bsc#1224665
* bsc#1224666
* bsc#1224667
* bsc#1224668
* bsc#1224671
* bsc#1224672
* bsc#1224674
* bsc#1224675
* bsc#1224676
* bsc#1224677
* bsc#1224678
* bsc#1224679
* bsc#1224680
* bsc#1224681
* bsc#1224682
* bsc#1224683
* bsc#1224685
* bsc#1224686
* bsc#1224687
* bsc#1224688
* bsc#1224692
* bsc#1224696
* bsc#1224697
* bsc#1224699
* bsc#1224701
* bsc#1224703
* bsc#1224704
* bsc#1224705
* bsc#1224706
* bsc#1224707
* bsc#1224709
* bsc#1224710
* bsc#1224712
* bsc#1224714
* bsc#1224716
* bsc#1224717
* bsc#1224718
* bsc#1224719
* bsc#1224720
* bsc#1224721
* bsc#1224722
* bsc#1224723
* bsc#1224725
* bsc#1224727
* bsc#1224728
* bsc#1224729
* bsc#1224730
* bsc#1224731
* bsc#1224732
* bsc#1224733
* bsc#1224736
* bsc#1224738
* bsc#1224739
* bsc#1224740
* bsc#1224741
* bsc#1224742
* bsc#1224747
* bsc#1224749
* bsc#1224763
* bsc#1224764
* bsc#1224765
* bsc#1224766
* bsc#1224790
* bsc#1224792
* bsc#1224793
* bsc#1224803
* bsc#1224804
* bsc#1224866
* bsc#1224936
* bsc#1224989
* bsc#1225007
* bsc#1225053
* bsc#1225133
* bsc#1225134
* bsc#1225136
* bsc#1225172
* bsc#1225502
* bsc#1225578
* bsc#1225579
* bsc#1225580
* bsc#1225593
* bsc#1225605
* bsc#1225607
* bsc#1225610
* bsc#1225616
* bsc#1225618
* bsc#1225640
* bsc#1225642
* bsc#1225692
* bsc#1225694
* bsc#1225695
* bsc#1225696
* bsc#1225698
* bsc#1225699
* bsc#1225704
* bsc#1225705
* bsc#1225708
* bsc#1225710
* bsc#1225712
* bsc#1225714
* bsc#1225715
* bsc#1225720
* bsc#1225722
* bsc#1225728
* bsc#1225734
* bsc#1225735
* bsc#1225736
* bsc#1225747
* bsc#1225748
* bsc#1225749
* bsc#1225750
* bsc#1225756
* bsc#1225765
* bsc#1225766
* bsc#1225769
* bsc#1225773
* bsc#1225775
* bsc#1225842
* bsc#1225945
* bsc#1226158
* jsc#PED-8111
* jsc#PED-8240
Cross-References:
* CVE-2023-0160
* CVE-2023-52434
* CVE-2023-52458
* CVE-2023-52472
* CVE-2023-52503
* CVE-2023-52616
* CVE-2023-52618
* CVE-2023-52631
* CVE-2023-52635
* CVE-2023-52640
* CVE-2023-52641
* CVE-2023-52645
* CVE-2023-52652
* CVE-2023-52653
* CVE-2023-52654
* CVE-2023-52655
* CVE-2023-52657
* CVE-2023-52658
* CVE-2023-52659
* CVE-2023-52660
* CVE-2023-52661
* CVE-2023-52662
* CVE-2023-52663
* CVE-2023-52664
* CVE-2023-52667
* CVE-2023-52669
* CVE-2023-52670
* CVE-2023-52671
* CVE-2023-52673
* CVE-2023-52674
* CVE-2023-52675
* CVE-2023-52676
* CVE-2023-52678
* CVE-2023-52679
* CVE-2023-52680
* CVE-2023-52681
* CVE-2023-52683
* CVE-2023-52685
* CVE-2023-52686
* CVE-2023-52687
* CVE-2023-52690
* CVE-2023-52691
* CVE-2023-52692
* CVE-2023-52693
* CVE-2023-52694
* CVE-2023-52695
* CVE-2023-52696
* CVE-2023-52697
* CVE-2023-52698
* CVE-2023-52771
* CVE-2023-52772
* CVE-2023-52860
* CVE-2023-52882
* CVE-2023-6238
* CVE-2023-7042
* CVE-2024-0639
* CVE-2024-21823
* CVE-2024-22099
* CVE-2024-23848
* CVE-2024-24861
* CVE-2024-25739
* CVE-2024-26601
* CVE-2024-26611
* CVE-2024-26614
* CVE-2024-26632
* CVE-2024-26638
* CVE-2024-26642
* CVE-2024-26643
* CVE-2024-26650
* CVE-2024-26654
* CVE-2024-26656
* CVE-2024-26657
* CVE-2024-26671
* CVE-2024-26673
* CVE-2024-26674
* CVE-2024-26679
* CVE-2024-26684
* CVE-2024-26685
* CVE-2024-26692
* CVE-2024-26704
* CVE-2024-26714
* CVE-2024-26726
* CVE-2024-26731
* CVE-2024-26733
* CVE-2024-26737
* CVE-2024-26739
* CVE-2024-26740
* CVE-2024-26742
* CVE-2024-26760
* CVE-2024-267600
* CVE-2024-26761
* CVE-2024-26764
* CVE-2024-26769
* CVE-2024-26772
* CVE-2024-26773
* CVE-2024-26774
* CVE-2024-26775
* CVE-2024-26783
* CVE-2024-26786
* CVE-2024-26791
* CVE-2024-26793
* CVE-2024-26794
* CVE-2024-26802
* CVE-2024-26805
* CVE-2024-26807
* CVE-2024-26815
* CVE-2024-26816
* CVE-2024-26822
* CVE-2024-26832
* CVE-2024-26836
* CVE-2024-26844
* CVE-2024-26846
* CVE-2024-26853
* CVE-2024-26854
* CVE-2024-26855
* CVE-2024-26856
* CVE-2024-26857
* CVE-2024-26858
* CVE-2024-26860
* CVE-2024-26861
* CVE-2024-26862
* CVE-2024-26866
* CVE-2024-26868
* CVE-2024-26870
* CVE-2024-26878
* CVE-2024-26881
* CVE-2024-26882
* CVE-2024-26883
* CVE-2024-26884
* CVE-2024-26885
* CVE-2024-26899
* CVE-2024-26900
* CVE-2024-26901
* CVE-2024-26903
* CVE-2024-26906
* CVE-2024-26909
* CVE-2024-26921
* CVE-2024-26922
* CVE-2024-26923
* CVE-2024-26925
* CVE-2024-26928
* CVE-2024-26932
* CVE-2024-26933
* CVE-2024-26934
* CVE-2024-26935
* CVE-2024-26937
* CVE-2024-26938
* CVE-2024-26940
* CVE-2024-26943
* CVE-2024-26945
* CVE-2024-26946
* CVE-2024-26948
* CVE-2024-26949
* CVE-2024-26950
* CVE-2024-26951
* CVE-2024-26957
* CVE-2024-26958
* CVE-2024-26960
* CVE-2024-26961
* CVE-2024-26962
* CVE-2024-26963
* CVE-2024-26964
* CVE-2024-26972
* CVE-2024-26973
* CVE-2024-26978
* CVE-2024-26981
* CVE-2024-26982
* CVE-2024-26983
* CVE-2024-26984
* CVE-2024-26986
* CVE-2024-26988
* CVE-2024-26989
* CVE-2024-26990
* CVE-2024-26991
* CVE-2024-26992
* CVE-2024-26993
* CVE-2024-26994
* CVE-2024-26995
* CVE-2024-26996
* CVE-2024-26997
* CVE-2024-26999
* CVE-2024-27000
* CVE-2024-27001
* CVE-2024-27002
* CVE-2024-27003
* CVE-2024-27004
* CVE-2024-27008
* CVE-2024-27013
* CVE-2024-27014
* CVE-2024-27022
* CVE-2024-27027
* CVE-2024-27028
* CVE-2024-27029
* CVE-2024-27030
* CVE-2024-27031
* CVE-2024-27036
* CVE-2024-27046
* CVE-2024-27056
* CVE-2024-27057
* CVE-2024-27062
* CVE-2024-27067
* CVE-2024-27080
* CVE-2024-27388
* CVE-2024-27389
* CVE-2024-27393
* CVE-2024-27395
* CVE-2024-27396
* CVE-2024-27398
* CVE-2024-27399
* CVE-2024-27400
* CVE-2024-27401
* CVE-2024-27405
* CVE-2024-27408
* CVE-2024-27410
* CVE-2024-27411
* CVE-2024-27412
* CVE-2024-27413
* CVE-2024-27416
* CVE-2024-27417
* CVE-2024-27418
* CVE-2024-27431
* CVE-2024-27432
* CVE-2024-27434
* CVE-2024-27435
* CVE-2024-27436
* CVE-2024-35784
* CVE-2024-35786
* CVE-2024-35788
* CVE-2024-35789
* CVE-2024-35790
* CVE-2024-35791
* CVE-2024-35794
* CVE-2024-35795
* CVE-2024-35796
* CVE-2024-35799
* CVE-2024-35800
* CVE-2024-35801
* CVE-2024-35803
* CVE-2024-35804
* CVE-2024-35806
* CVE-2024-35808
* CVE-2024-35809
* CVE-2024-35810
* CVE-2024-35811
* CVE-2024-35812
* CVE-2024-35813
* CVE-2024-35814
* CVE-2024-35815
* CVE-2024-35817
* CVE-2024-35819
* CVE-2024-35821
* CVE-2024-35822
* CVE-2024-35823
* CVE-2024-35824
* CVE-2024-35825
* CVE-2024-35828
* CVE-2024-35829
* CVE-2024-35830
* CVE-2024-35833
* CVE-2024-35834
* CVE-2024-35835
* CVE-2024-35836
* CVE-2024-35837
* CVE-2024-35838
* CVE-2024-35841
* CVE-2024-35842
* CVE-2024-35845
* CVE-2024-35847
* CVE-2024-35849
* CVE-2024-35850
* CVE-2024-35851
* CVE-2024-35852
* CVE-2024-35854
* CVE-2024-35860
* CVE-2024-35861
* CVE-2024-35862
* CVE-2024-35863
* CVE-2024-35864
* CVE-2024-35865
* CVE-2024-35866
* CVE-2024-35867
* CVE-2024-35868
* CVE-2024-35869
* CVE-2024-35870
* CVE-2024-35872
* CVE-2024-35875
* CVE-2024-35877
* CVE-2024-35878
* CVE-2024-35879
* CVE-2024-35883
* CVE-2024-35885
* CVE-2024-35887
* CVE-2024-35889
* CVE-2024-35891
* CVE-2024-35895
* CVE-2024-35901
* CVE-2024-35903
* CVE-2024-35904
* CVE-2024-35905
* CVE-2024-35907
* CVE-2024-35909
* CVE-2024-35911
* CVE-2024-35912
* CVE-2024-35914
* CVE-2024-35915
* CVE-2024-35916
* CVE-2024-35917
* CVE-2024-35921
* CVE-2024-35922
* CVE-2024-35924
* CVE-2024-35927
* CVE-2024-35928
* CVE-2024-35930
* CVE-2024-35931
* CVE-2024-35932
* CVE-2024-35933
* CVE-2024-35935
* CVE-2024-35936
* CVE-2024-35937
* CVE-2024-35938
* CVE-2024-35940
* CVE-2024-35943
* CVE-2024-35944
* CVE-2024-35945
* CVE-2024-35946
* CVE-2024-35947
* CVE-2024-35950
* CVE-2024-35951
* CVE-2024-35952
* CVE-2024-35953
* CVE-2024-35954
* CVE-2024-35955
* CVE-2024-35956
* CVE-2024-35958
* CVE-2024-35959
* CVE-2024-35960
* CVE-2024-35961
* CVE-2024-35963
* CVE-2024-35964
* CVE-2024-35965
* CVE-2024-35966
* CVE-2024-35967
* CVE-2024-35969
* CVE-2024-35971
* CVE-2024-35972
* CVE-2024-35973
* CVE-2024-35974
* CVE-2024-35975
* CVE-2024-35977
* CVE-2024-35978
* CVE-2024-35981
* CVE-2024-35982
* CVE-2024-35984
* CVE-2024-35986
* CVE-2024-35989
* CVE-2024-35990
* CVE-2024-35991
* CVE-2024-35992
* CVE-2024-35995
* CVE-2024-35997
* CVE-2024-35999
* CVE-2024-36002
* CVE-2024-36006
* CVE-2024-36007
* CVE-2024-36009
* CVE-2024-36011
* CVE-2024-36012
* CVE-2024-36013
* CVE-2024-36014
* CVE-2024-36015
* CVE-2024-36016
* CVE-2024-36018
* CVE-2024-36019
* CVE-2024-36020
* CVE-2024-36021
* CVE-2024-36025
* CVE-2024-36026
* CVE-2024-36029
* CVE-2024-36030
* CVE-2024-36032
* CVE-2024-36880
* CVE-2024-36885
* CVE-2024-36890
* CVE-2024-36891
* CVE-2024-36893
* CVE-2024-36894
* CVE-2024-36895
* CVE-2024-36896
* CVE-2024-36897
* CVE-2024-36898
* CVE-2024-36906
* CVE-2024-36918
* CVE-2024-36921
* CVE-2024-36922
* CVE-2024-36928
* CVE-2024-36930
* CVE-2024-36931
* CVE-2024-36936
* CVE-2024-36940
* CVE-2024-36941
* CVE-2024-36942
* CVE-2024-36944
* CVE-2024-36947
* CVE-2024-36949
* CVE-2024-36950
* CVE-2024-36951
* CVE-2024-36955
* CVE-2024-36959
CVSS scores:
* CVE-2023-0160 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-0160 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52434 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2023-52434 ( NVD ): 8.0 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52458 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52458 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52472 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-52472 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52503 ( SUSE ): 4.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2023-52616 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52618 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N
* CVE-2023-52631 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52635 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52640 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52641 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52645 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52645 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52652 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-52653 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-52654 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52655 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2023-52657 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52658 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52659 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52660 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52661 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
* CVE-2023-52662 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2023-52663 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52664 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52667 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52669 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52670 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52671 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2023-52673 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52674 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52675 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52676 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52678 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52679 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52680 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52681 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52683 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52685 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52686 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52687 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52690 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52691 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52692 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52693 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52694 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52695 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52696 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52697 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52698 ( SUSE ): 3.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:L
* CVE-2023-52771 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52772 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52772 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52860 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52882 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-6238 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-6238 ( NVD ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-7042 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-7042 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-0639 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-0639 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-21823 ( SUSE ): 6.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-22099 ( SUSE ): 5.3 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-22099 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-23848 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2024-23848 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-24861 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-24861 ( NVD ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-25739 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-25739 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26601 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26601 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26611 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26614 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26632 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26638 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-26642 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26643 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26650 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N
* CVE-2024-26654 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26656 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26657 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26671 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26673 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26674 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26679 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26684 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26685 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26692 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26704 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26714 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26726 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26731 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26733 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26737 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26739 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26740 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26742 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26760 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26764 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-26769 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26772 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26773 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26774 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26775 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26783 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26786 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26791 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26793 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26794 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26802 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26805 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26807 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26815 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26816 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-26822 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26832 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26836 ( SUSE ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-26844 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-26846 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26853 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26854 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26855 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26856 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26857 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26858 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26860 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26861 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26862 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-26866 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26868 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26870 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26878 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26881 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26881 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26882 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26882 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26883 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26883 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26884 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26884 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26885 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26885 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26899 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26899 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26900 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26900 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26901 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-26901 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26903 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26903 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26906 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26909 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26909 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26921 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26922 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26923 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26925 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26928 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26932 ( SUSE ): 6.6 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26932 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26933 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26933 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26934 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26934 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26935 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-26937 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-26938 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-26940 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26943 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26945 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26946 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26948 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26949 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26949 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26950 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26951 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26957 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26958 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26960 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26961 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26962 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26963 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26964 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26972 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26973 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26978 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26978 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26981 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26982 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26983 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26984 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26986 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26986 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26988 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-26989 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26990 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-26991 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26992 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-26993 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2024-26994 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26995 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26996 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26997 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26999 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27000 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-27001 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27002 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27003 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-27004 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-27008 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2024-27013 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27013 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27014 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27014 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27022 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27022 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-27027 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
* CVE-2024-27028 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27029 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-27030 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-27031 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27036 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-27046 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27056 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27057 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27062 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27067 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27080 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-27388 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27389 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27393 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27395 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27396 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27398 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-27399 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27400 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27401 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-27405 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-27408 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N
* CVE-2024-27410 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27411 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27412 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27413 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-27416 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27417 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27418 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27431 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27432 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27434 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27435 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27436 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35784 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35786 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35788 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35789 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35790 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35791 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35794 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35795 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35796 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35799 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35800 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35801 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35803 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35804 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35806 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35808 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35809 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35810 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35811 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35812 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35813 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35814 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35815 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35817 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35819 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35821 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35822 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-35823 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35824 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35825 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35828 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35829 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35830 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35833 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35834 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35835 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35836 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35837 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35838 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35841 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35842 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35845 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35847 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35849 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-35850 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35851 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35852 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35854 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35860 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35861 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35862 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35863 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35864 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35865 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35866 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35867 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35868 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35869 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35870 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35872 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35875 ( SUSE ): 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
* CVE-2024-35877 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35878 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35879 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35883 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35885 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35887 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35889 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35891 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35895 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35901 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35903 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35904 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35905 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35907 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35909 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35911 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35912 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35914 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35915 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35916 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35917 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35921 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35922 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35924 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-35927 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35928 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35930 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35931 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35932 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35933 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35935 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35936 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35937 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-35938 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-35940 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-35943 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35944 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L
* CVE-2024-35945 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35946 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35947 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35950 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35951 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35952 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35953 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35954 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35955 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35956 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35958 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35959 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35960 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35961 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35963 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-35964 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35965 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35966 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35967 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35969 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35971 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35972 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35972 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35973 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35974 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35975 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35977 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35978 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35978 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35981 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35982 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35982 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35984 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35984 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35986 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35989 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35990 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35990 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35991 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35992 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35992 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35995 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-35997 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35997 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35999 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L
* CVE-2024-36002 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36006 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36007 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36009 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36011 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36012 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-36013 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36014 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36015 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36016 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-36018 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-36019 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L
* CVE-2024-36020 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36021 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36025 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L
* CVE-2024-36026 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36029 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36030 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-36032 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-36880 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L
* CVE-2024-36885 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-36890 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36891 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36891 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36893 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36893 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36894 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-36895 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-36896 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36897 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36897 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36898 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L
* CVE-2024-36906 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2024-36918 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36921 ( SUSE ): 8.0 CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-36922 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36928 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36930 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36930 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36931 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L
* CVE-2024-36936 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-36940 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-36941 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36942 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2024-36944 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36947 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-36949 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36950 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36951 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36955 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-36959 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* Basesystem Module 15-SP6
* Development Tools Module 15-SP6
* Legacy Module 15-SP6
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Availability Extension 15 SP6
* SUSE Linux Enterprise Live Patching 15-SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Linux Enterprise Workstation Extension 15 SP6
An update that solves 408 vulnerabilities, contains two features and has 82
security fixes can now be installed.
## Description:
The SUSE Linux Enterprise 15 SP6 kernel was updated to receive various security
bugfixes.
The following security bugs were fixed:
* CVE-2023-0160: Fixed deadlock flaw in BPF that could allow a local user to
potentially crash the system (bsc#1209657).
* CVE-2023-52434: Fixed potential OOBs in smb2_parse_contexts() (bsc#1220148).
* CVE-2023-52458: Fixed check that partition length needs to be aligned with
block size (bsc#1220428).
* CVE-2023-52503: Fixed tee/amdtee use-after-free vulnerability in
amdtee_close_session (bsc#1220915).
* CVE-2023-52618: Fixed string overflow in block/rnbd-srv (bsc#1221615).
* CVE-2023-52631: Fixed an NULL dereference bug (bsc#1222264 CVE-2023-52631).
* CVE-2023-52635: Fixed PM/devfreq to synchronize devfreq_monitor_[start/stop]
(bsc#1222294).
* CVE-2023-52640: Fixed out-of-bounds in ntfs_listxattr (bsc#1222301).
* CVE-2023-52641: Fixed NULL ptr dereference checking at the end of
attr_allocate_frame() (bsc#1222303)
* CVE-2023-52645: Fixed pmdomain/mediatek race conditions with genpd
(bsc#1223033).
* CVE-2023-52652: Fixed NTB for possible name leak in ntb_register_device()
(bsc#1223686).
* CVE-2023-52659: Fixed to pfn_to_kaddr() not treated as a 64-bit type
(bsc#1224442).
* CVE-2023-52674: Add clamp() in scarlett2_mixer_ctl_put() (bsc#1224727).
* CVE-2023-52680: Fixed missing error checks to *_ctl_get() (bsc#1224608).
* CVE-2023-52692: Fixed missing error check to scarlett2_usb_set_config()
(bsc#1224628).
* CVE-2023-52698: Fixed memory leak in netlbl_calipso_add_pass()
(CVE-2023-52698 bsc#1224621)
* CVE-2023-52771: Fixed delete_endpoint() vs parent unregistration race
(bsc#1225007).
* CVE-2023-52772: Fixed use-after-free in unix_stream_read_actor()
(bsc#1224989).
* CVE-2023-52860: Fixed null pointer dereference in hisi_hns3 (bsc#1224936).
* CVE-2023-6238: Fixed kcalloc() arguments order (bsc#1217384).
* CVE-2023-7042: Fixed a null-pointer-dereference in
ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev() (bsc#1218336).
* CVE-2024-0639: Fixed a denial-of-service vulnerability due to a deadlock
found in sctp_auto_asconf_init in net/sctp/socket.c (bsc#1218917).
* CVE-2024-21823: Fixed safety flag to struct ends (bsc#1223625).
* CVE-2024-22099: Fixed a null-pointer-dereference in rfcomm_check_security
(bsc#1219170).
* CVE-2024-23848: Fixed media/cec for possible use-after-free in
cec_queue_msg_fh (bsc#1219104).
* CVE-2024-24861: Fixed an overflow due to race condition in media/xc4000
device driver in xc4000 xc4000_get_frequency() function (bsc#1219623).
* CVE-2024-25739: Fixed possible crash in create_empty_lvol() in
drivers/mtd/ubi/vtbl.c (bsc#1219834).
* CVE-2024-26601: Fixed ext4 buddy bitmap corruption via fast commit replay
(bsc#1220342).
* CVE-2024-26614: Fixed the initialization of accept_queue's spinlocks
(bsc#1221293).
* CVE-2024-26632: Fixed iterating over an empty bio with
bio_for_each_folio_all (bsc#1221635).
* CVE-2024-26638: Fixed uninitialize struct msghdr completely (bsc#1221649
CVE-2024-26638).
* CVE-2024-26642: Fixed the set of anonymous timeout flag in netfilter
nf_tables (bsc#1221830).
* CVE-2024-26643: Fixed mark set as dead when unbinding anonymous set with
timeout (bsc#1221829).
* CVE-2024-26654: Fixed use after free in ALSA/sh/aica (bsc#1222304).
* CVE-2024-26656: Fixed drm/amdgpu use-after-free bug (bsc#1222307).
* CVE-2024-26671: Fixed blk-mq IO hang from sbitmap wakeup race (bsc#1222357).
* CVE-2024-26673: Fixed netfilter/nft_ct layer 3 and 4 protocol sanitization
(bsc#1222368).
* CVE-2024-26674: Revert to _ASM_EXTABLE_UA() for {get,put}_user() fixups
(bsc#1222378).
* CVE-2024-26679: Fixed read sk->sk_family once in inet_recv_error()
(bsc#1222385).
* CVE-2024-26684: Fixed net/stmmac/xgmac handling of DPP safety error for DMA
channels (bsc#1222445).
* CVE-2024-26685: Fixed nilfs2 potential bug in end_buffer_async_write
(bsc#1222437).
* CVE-2024-26692: Fixed regression in writes when non-standard maximum write
size negotiated (bsc#1222464).
* CVE-2024-26704: Fixed a double-free of blocks due to wrong extents moved_len
in ext4 (bsc#1222422).
* CVE-2024-26726: Fixed invalid drop extent_map for free space inode on write
error (bsc#1222532)
* CVE-2024-26731: Fixed NULL pointer dereference in
sk_psock_verdict_data_ready() (bsc#1222371).
* CVE-2024-26733: Fixed an overflow in arp_req_get() in arp (bsc#1222585).
* CVE-2024-26737: Fixed selftests/bpf racing between bpf_timer_cancel_and_free
and bpf_timer_cancel (bsc#1222557).
* CVE-2024-26740: Fixed use the backlog for mirred ingress (bsc#1222563).
* CVE-2024-26760: Fixed bio_put() for error case (bsc#1222596
cve-2024-267600).
* CVE-2024-26760: Fixed scsi/target/pscsi bio_put() for error case
(bsc#1222596).
* CVE-2024-26764: Fixed IOCB_AIO_RW check in fs/aio before the struct
aio_kiocb conversion (bsc#1222721).
* CVE-2024-26772: Fixed ext4 to avoid allocating blocks from corrupted group
in ext4_mb_find_by_goal() (bsc#1222613).
* CVE-2024-26773: Fixed ext4 block allocation from corrupted group in
ext4_mb_try_best_found() (bsc#1222618).
* CVE-2024-26774: Fixed dividing by 0 in mb_update_avg_fragment_size() when
block bitmap corrupt (bsc#1222622).
* CVE-2024-26775: Fixed potential deadlock at set_capacity (bsc#1222627).
* CVE-2024-26783: Fixed mm/vmscan bug when calling wakeup_kswapd() with a
wrong zone index (bsc#1222615).
* CVE-2024-26791: Fixed properly validate device names in btrfs (bsc#1222793)
* CVE-2024-26793: Fixed an use-after-free and null-ptr-deref in gtp_newlink()
in gtp (bsc#1222428).
* CVE-2024-26805: Fixed a kernel-infoleak-after-free in __skb_datagram_iter in
netlink (bsc#1222630).
* CVE-2024-26807: Fixed spi/cadence-qspi NULL pointer reference in runtime PM
hooks (bsc#1222801).
* CVE-2024-26815: Fixed improper TCA_TAPRIO_TC_ENTRY_INDEX check
(bsc#1222635).
* CVE-2024-26816: Fixed relocations in .notes section when building with
CONFIG_XEN_PV=y (bsc#1222624).
* CVE-2024-26822: Set correct id, uid and cruid for multiuser automounts
(bsc#1223011).
* CVE-2024-26832: Fixed missing folio cleanup in writeback race path
(bsc#1223007).
* CVE-2024-26836: Fixed platform/x86/think-lmi password opcode ordering for
workstations (bsc#1222968).
* CVE-2024-26844: Fixed WARNING in _copy_from_iter (bsc#1223015).
* CVE-2024-26853: Fixed igc returning frame twice in XDP_REDIRECT
(bsc#1223061).
* CVE-2024-26855: Fixed net/ice potential NULL pointer dereference in
ice_bridge_setlink() (bsc#1223051).
* CVE-2024-26856: Fixed use-after-free inside sparx5_del_mact_entry
(bsc#1223052).
* CVE-2024-26857: Fixed geneve to make sure to pull inner header in
geneve_rx() (bsc#1223058).
* CVE-2024-26860: Fixed a memory leak when rechecking the data (bsc#1223077).
* CVE-2024-26861: Fixed wireguard/receive annotate data-race around
receiving_counter.counter (bsc#1223076).
* CVE-2024-26862: Fixed packet annotate data-races around ignore_outgoing
(bsc#1223111).
* CVE-2024-26866: Fixed spi/spi-fsl-lpspi by removing redundant
spi_controller_put call (bsc#1223024).
* CVE-2024-26878: Fixed quota for potential NULL pointer dereference
(bsc#1223060).
* CVE-2024-26881: Fixed net/hns3 kernel crash when 1588 is received on HIP08
devices (bsc#1223041).
* CVE-2024-26882: Fixed net/ip_tunnel to make sure to pull inner header in
ip_tunnel_rcv() (bsc#1223034).
* CVE-2024-26883: Fixed bpf stackmap overflow check on 32-bit arches
(bsc#1223035).
* CVE-2024-26884: Fixed bpf hashtab overflow check on 32-bit arches
(bsc#1223189).
* CVE-2024-26885: Fixed bpf DEVMAP_HASH overflow check on 32-bit arches
(bsc#1223190).
* CVE-2024-26899: Fixed deadlock between bd_link_disk_holder and partition
scan (bsc#1223045).
* CVE-2024-26901: Fixed do_sys_name_to_handle() to use kzalloc() to prevent
kernel-infoleak (bsc#1223198).
* CVE-2024-26906: Fixed invalid vsyscall page read for
copy_from_kernel_nofault() (bsc#1223202).
* CVE-2024-26909: Fixed drm bridge use-after-free (bsc#1223143).
* CVE-2024-26921: Preserve kabi for sk_buff (bsc#1223138).
* CVE-2024-26923: Fixed false-positive lockdep splat for spin_lock() in
__unix_gc() (bsc#1223384).
* CVE-2024-26925: Release mutex after nft_gc_seq_end from abort path
(bsc#1223390).
* CVE-2024-26928: Fix potential UAF in cifs_debug_files_proc_show()
(bsc#1223532).
* CVE-2024-26945: Fixed nr_cpus < nr_iaa case (bsc#1223732).
* CVE-2024-26946: Fixed copy_from_kernel_nofault() to read from unsafe address
(bsc#1223669).
* CVE-2024-26948: Fixed drm/amd/display by adding dc_state NULL check in
dc_state_release (bsc#1223664).
* CVE-2024-26950: Fixed wireguard/netlink to access device through ctx instead
of peer (bsc#1223661).
* CVE-2024-26951: Fixed wireguard/netlink check for dangling peer via is_dead
instead of empty list (bsc#1223660).
* CVE-2024-26958: Fixed UAF in direct writes (bsc#1223653).
* CVE-2024-26960: Fixed mm/swap race between free_swap_and_cache() and
swapoff() (bsc#1223655).
* CVE-2024-26982: Fixed Squashfs inode number check not to be an invalid value
of zero (bsc#1223634).
* CVE-2024-26991: Fixed overflow lpage_info when checking attributes
(bsc#1223695).
* CVE-2024-26993: Fixed fs/sysfs reference leak in
sysfs_break_active_protection() (bsc#1223693).
* CVE-2024-27013: Fixed tun limit printing rate when illegal packet received
by tun device (bsc#1223745).
* CVE-2024-27014: Fixed net/mlx5e to prevent deadlock while disabling aRFS
(bsc#1223735).
* CVE-2024-27022: Fixed linking file vma until vma is fully initialized
(bsc#1223774).
* CVE-2024-27030: Fixed octeontx2-af to use separate handlers for interrupts
(bsc#1223790).
* CVE-2024-27036: Fixed writeback data corruption (bsc#1223810).
* CVE-2024-27046: Fixed nfp/flower handling acti_netdevs allocation failure
(bsc#1223827).
* CVE-2024-27056: Fixed wifi/iwlwifi/mvm to ensure offloading TID queue exists
(bsc#1223822).
* CVE-2024-27062: Fixed nouveau lock inside client object tree (bsc#1223834).
* CVE-2024-27389: Fixed pstore inode handling with d_invalidate()
(bsc#1223705).
* CVE-2024-27395: Fixed Use-After-Free in ovs_ct_exit (bsc#1224098).
* CVE-2024-27396: Fixed Use-After-Free in gtp_dellink (bsc#1224096).
* CVE-2024-27401: Fixed user_length taken into account when fetching packet
contents (bsc#1224181).
* CVE-2024-27408: Fixed race condition in dmaengine w-edma/eDMA (bsc#1224430).
* CVE-2024-27417: Fixed potential "struct net" leak in inet6_rtm_getaddr()
(bsc#1224721)
* CVE-2024-27418: Fixed memory leak in mctp_local_output (bsc#1224720)
* CVE-2024-27431: Fixed Zero-initialise xdp_rxq_info struct before running XDP
program (bsc#1224718).
* CVE-2024-35852: Fixed memory leak when canceling rehash work (bsc#1224502).
* CVE-2024-35854: Fixed possible use-after-free during rehash (bsc#1224636).
* CVE-2024-35860: struct bpf_link and bpf_link_ops kABI workaround
(bsc#1224531).
* CVE-2024-35861: Fixed potential UAF in cifs_signal_cifsd_for_reconnect()
(bsc#1224766).
* CVE-2024-35862: Fixed potential UAF in smb2_is_network_name_deleted()
(bsc#1224764).
* CVE-2024-35863: Fixed potential UAF in is_valid_oplock_break()
(bsc#1224763).
* CVE-2024-35864: Fixed potential UAF in smb2_is_valid_lease_break()
(bsc#1224765).
* CVE-2024-35865: Fixed potential UAF in smb2_is_valid_oplock_break()
(bsc#1224668).
* CVE-2024-35866: Fixed potential UAF in cifs_dump_full_key() (bsc#1224667).
* CVE-2024-35867: Fixed potential UAF in cifs_stats_proc_show() (bsc#1224664).
* CVE-2024-35868: Fixed potential UAF in cifs_stats_proc_write()
(bsc#1224678).
* CVE-2024-35869: Guarantee refcounted children from parent session
(bsc#1224679).
* CVE-2024-35870: Fixed UAF in smb2_reconnect_server() (bsc#1224672).
* CVE-2024-35872: Fixed GUP-fast succeeding on secretmem folios (bsc#1224530).
* CVE-2024-35877: Fixed VM_PAT handling in COW mappings (bsc#1224525).
* CVE-2024-35895: Fixed lock inversion deadlock in map delete elem
(bsc#1224511).
* CVE-2024-35903: Fixed IP after emitting call depth accounting (bsc#1224493).
* CVE-2024-35905: Fixed int overflow for stack access size (bsc#1224488).
* CVE-2024-35917: Fixed Fix bpf_plt pointer arithmetic (bsc#1224481).
* CVE-2024-35921: Fixed oops when HEVC init fails (bsc#1224477).
* CVE-2024-35931: Fixed PCI error slot reset during RAS recovery
(bsc#1224652).
* CVE-2024-35943: Fixed a null pointer dereference in omap_prm_domain_init
(bsc#1224649).
* CVE-2024-35944: Fixed memcpy() run-time warning in dg_dispatch_as_host()
(bsc#1224648).
* CVE-2024-35956: Fixed qgroup prealloc rsv leak in subvolume operations
(bsc#1224674)
* CVE-2024-35964: Fixed not validating setsockopt user input (bsc#1224581).
* CVE-2024-35969: Fixed race condition between ipv6_get_ifaddr and
ipv6_del_addr (bsc#1224580).
* CVE-2024-35991: Fixed kABI workaround for struct idxd_evl (bsc#1224553).
* CVE-2024-35999: Fixed missing lock when picking channel (bsc#1224550).
* CVE-2024-36006: Fixed incorrect list API usage (bsc#1224541).
* CVE-2024-36007: Fixed warning during rehash (bsc#1224543).
* CVE-2024-36030: Fixed the double free in rvu_npc_freemem() (bsc#1225712)
The following non-security bugs were fixed:
* 9p: add missing locking around taking dentry fid list (git-fixes)
* accel/ivpu: Fix deadlock in context_xa (git-fixes).
* ACPI: bus: Indicate support for IRQ ResourceSource thru _OSC (git-fixes).
* ACPI: bus: Indicate support for _TFP thru _OSC (git-fixes).
* ACPI: bus: Indicate support for the Generic Event Device thru _OSC (git-
fixes).
* ACPICA: debugger: check status of acpi_evaluate_object() in
acpi_db_walk_for_fields() (git-fixes).
* ACPI: CPPC: Fix access width used for PCC registers (git-fixes).
* ACPI: CPPC: Fix bit_offset shift in MASK_VAL() macro (git-fixes).
* ACPI: CPPC: Use access_width over bit_width for system memory accesses
(stable-fixes).
* ACPI: disable -Wstringop-truncation (git-fixes).
* ACPI: Fix Generic Initiator Affinity _OSC bit (git-fixes).
* ACPI: LPSS: Advertise number of chip selects via property (git-fixes).
* ACPI: resource: Add Infinity laptops to irq1_edge_low_force_override
(stable-fixes).
* ACPI: resource: Do IRQ override on Lunnen Ground laptops (stable-fixes).
* ACPI: scan: Do not increase dep_unmet for already met dependencies (git-
fixes).
* ACPI: video: Add backlight=native quirk for Lenovo Slim 7 16ARH7
(bsc#1217750).
* ACPI: x86: Move acpi_quirk_skip_serdev_enumeration() out of
CONFIG_X86_ANDROID_TABLETS (stable-fixes).
* Add alt-commit to a nouveau patch
* Add reference to L3 bsc#1225765 in BPF control flow graph and precision
backtrack fixes (bsc#1225756) The L3 bsc#1225765 was created seperately
since our customer requires PTF.
* admin-guide/hw-vuln/core-scheduling: fix return type of PR_SCHED_CORE_GET
(git-fixes).
* ahci: asm1064: asm1166: do not limit reported ports (git-fixes).
* ahci: asm1064: correct count of reported ports (stable-fixes).
* ALSA: aoa: avoid false-positive format truncation warning (git-fixes).
* ALSA: core: Fix NULL module pointer assignment at card init (git-fixes).
* ALSA: core: Remove debugfs at disconnection (git-fixes).
* ALSA: firewire-lib: handle quirk to calculate payload quadlets as data block
counter (stable-fixes).
* ALSA: Fix deadlocks with kctl removals at disconnection (stable-fixes).
* ALSA: hda: Add Intel BMG PCI ID and HDMI codec vid (stable-fixes).
* ALSA: hda: clarify Copyright information (stable-fixes).
* ALSA: hda: cs35l41: Add support for ASUS ROG 2024 Laptops (stable-fixes).
* ALSA: hda: cs35l41: Ignore errors when configuring IRQs (stable-fixes).
* ALSA: hda: cs35l41: Remove redundant argument to
cs35l41_request_firmware_file() (stable-fixes).
* ALSA: hda: cs35l41: Remove Speaker ID for Lenovo Legion slim 7 16ARHA7 (git-
fixes).
* ALSA: hda: cs35l41: Set the max PCM Gain using tuning setting (stable-
fixes).
* ALSA: hda: cs35l41: Support HP Omen models without _DSD (stable-fixes).
* ALSA: hda: cs35l41: Support Lenovo 13X laptop without _DSD (stable-fixes).
* ALSA: hda: cs35l41: Update DSP1RX5/6 Sources for DSP config (stable-fixes).
* ALSA: hda: cs35l56: Add ACPI device match tables (git-fixes).
* ALSA: hda: cs35l56: Exit cache-only after cs35l56_wait_for_firmware_boot()
(stable-fixes).
* ALSA: hda: cs35l56: Fix lifetime of cs_dsp instance (git-fixes).
* ALSA: hda: cs35l56: Set the init_done flag before component_add() (git-
fixes).
* ALSA: hda/cs_dsp_ctl: Use private_free for control cleanup (git-fixes).
* ALSA: hda: hda_cs_dsp_ctl: Remove notification of driver write (stable-
fixes).
* ALSA: hda: intel-dsp-config: harden I2C/I2S codec detection (stable-fixes).
* ALSA/hda: intel-dsp-config: reduce log verbosity (git-fixes).
* ALSA: hda: intel-sdw-acpi: fix usage of device_get_named_child_node() (git-
fixes).
* ALSA: hda/realtek: Add quirk for HP SnowWhite laptops (stable-fixes).
* ALSA: hda/realtek: Add quirk for HP Spectre x360 14 eu0000 (stable-fixes).
* ALSA: hda/realtek: Add quirks for ASUS Laptops using CS35L56 (stable-fixes).
* ALSA: hda/realtek: Add quirks for HP Omen models using CS35L41 (stable-
fixes).
* ALSA: hda/realtek: Add quirks for Huawei Matebook D14 NBLB-WAX9N (stable-
fixes).
* ALSA: hda/realtek: Add quirks for Lenovo 13X (stable-fixes).
* ALSA: hda/realtek: Add quirks for some Clevo laptops (stable-fixes).
* ALSA: hda/realtek: Add sound quirks for Lenovo Legion slim 7 16ARHA7 models
(stable-fixes).
* ALSA: hda/realtek: Add support for ASUS Zenbook 2024 HN7306W (stable-fixes).
* ALSA: hda/realtek: Adjust G814JZR to use SPI init for amp (git-fixes).
* ALSA: hda/realtek: cs35l41: Support ASUS ROG G634JYR (stable-fixes).
* ALSA: hda/realtek: Drop doubly quirk entry for 103c:8a2e (git-fixes).
* ALSA: hda/realtek - Enable audio jacks of Haier Boyue G42 with ALC269VC
(stable-fixes).
* ALSA: hda/realtek: Enable headset mic of JP-IK LEAP W502 with ALC897
(stable-fixes).
* ALSA: hda/realtek: Fix build error without CONFIG_PM (stable-fixes).
* ALSA: hda/realtek: Fix conflicting PCI SSID 17aa:386f for Lenovo Legion
models (bsc#1223462).
* ALSA: hda/realtek - fixed headset Mic not show (stable-fixes).
* ALSA: hda/realtek: Fixes for Asus GU605M and GA403U sound (stable-fixes).
* ALSA: hda/realtek - Fix inactive headset mic jack (stable-fixes).
* ALSA: hda/realtek: Fix internal speakers for Legion Y9000X 2022 IAH7
(stable-fixes).
* ALSA: hda/realtek: Fix mute led of HP Laptop 15-da3001TU (stable-fixes).
* ALSA: hda/realtek: fix mute/micmute LEDs do not work for ProBook 440/460 G11
(stable-fixes).
* ALSA: hda/realtek: fix the hp playback volume issue for LG machines (stable-
fixes).
* ALSA: hda/realtek: Fix volumn control of ThinkBook 16P Gen4 (git-fixes).
* ALSA: hda/realtek - Set GPIO3 to default at S4 state for Thinkpad with
ALC1318 (stable-fixes).
* ALSA: hda/realtek: Update Panasonic CF-SZ6 quirk to support headset with
microphone (git-fixes).
* ALSA: hda/tas2781: add locks to kcontrols (git-fixes).
* ALSA: hda/tas2781: Add new vendor_id and subsystem_id to support ThinkPad
ICE-1 (stable-fixes).
* ALSA: hda/tas2781: correct the register for pow calibrated data (git-fixes).
* ALSA: hda/tas2781: remove digital gain kcontrol (git-fixes).
* ALSA: line6: Zero-initialize message buffers (stable-fixes).
* ALSA: scarlett2: Add Focusrite Clarett+ 2Pre and 4Pre support (stable-
fixes).
* ALSA: scarlett2: Add Focusrite Clarett 2Pre and 4Pre USB support (stable-
fixes).
* ALSA: scarlett2: Add missing error check to scarlett2_config_save() (git-
fixes).
* ALSA: scarlett2: Add support for Clarett 8Pre USB (stable-fixes).
* ALSA: scarlett2: Default mixer driver to enabled (stable-fixes).
* ALSA: scarlett2: Move USB IDs out from device_info struct (stable-fixes).
* ALSA: seq: Do not clear bank selection at event -> UMP MIDI2 conversion
(git-fixes).
* ALSA: seq: Fix incorrect UMP type for system messages (git-fixes).
* ALSA: seq: Fix missing bank setup between MIDI1/MIDI2 UMP conversion (git-
fixes).
* ALSA: seq: Fix yet another spot for system message conversion (git-fixes).
* ALSA: seq: ump: Fix conversion from MIDI2 to MIDI1 UMP messages (git-fixes).
* ALSA: seq: ump: Fix swapped song position pointer data (git-fixes).
* ALSA: sh: aica: reorder cleanup operations to avoid UAF bugs (git-fixes).
* ALSA: timer: Set lower bound of start tick time (stable-fixes).
* ALSA: ump: Do not accept an invalid UMP protocol number (git-fixes).
* ALSA: ump: Do not clear bank selection after sending a program change (git-
fixes).
* ALSA: ump: Set default protocol when not given explicitly (git-fixes).
* ALSA: usb-audio: Add sampling rates support for Mbox3 (stable-fixes).
* ALSA: usb-audio: Fix for sampling rates support for Mbox3 (stable-fixes).
* amd/amdkfd: sync all devices to wait all processes being evicted (stable-
fixes).
* amdkfd: use calloc instead of kzalloc to avoid integer overflow (stable-
fixes).
* arm64: bpf: fix 32bit unconditional bswap (git-fixes).
* arm64: dts: allwinner: h616: Fix I2C0 pins (git-fixes)
* arm64: dts: allwinner: Pine H64: correctly remove reg_gmac_3v3 (git-fixes)
* arm64: dts: broadcom: bcmbca: bcm4908: drop invalid switch cells (git-fixes)
* arm64: dts: Fix dtc interrupt_provider warnings (git-fixes)
* arm64: dts: hi3798cv200: fix the size of GICR (git-fixes)
* arm64: dts: imx8qm-ss-dma: fix can lpcg indices (git-fixes)
* arm64: dts: imx8-ss-conn: fix usb lpcg indices (git-fixes)
* arm64: dts: imx8-ss-conn: fix usdhc wrong lpcg clock order (git-fixes)
* arm64: dts: imx8-ss-dma: fix adc lpcg indices (git-fixes)
* arm64: dts: imx8-ss-dma: fix can lpcg indices (git-fixes)
* arm64: dts: imx8-ss-dma: fix spi lpcg indices (git-fixes)
* arm64: dts: imx8-ss-lsio: fix pwm lpcg indices (git-fixes)
* arm64: dts: marvell: reorder crypto interrupts on Armada SoCs (git-fixes)
* arm64: dts: microchip: sparx5: fix mdio reg (git-fixes)
* arm64: dts: rockchip: Add enable-strobe-pulldown to emmc phy on ROCK (git-
fixes)
* arm64: dts: rockchip: enable internal pull-up for Q7_THRM# on RK3399 (git-
fixes)
* arm64: dts: rockchip: enable internal pull-up on PCIE_WAKE# for (git-fixes)
* arm64: dts: rockchip: enable internal pull-up on Q7_USB_ID for RK3399 (git-
fixes)
* arm64: dts: rockchip: fix rk3328 hdmi ports node (git-fixes)
* arm64: dts: rockchip: fix rk3399 hdmi ports node (git-fixes)
* arm64: dts: rockchip: regulator for sd needs to be always on for (git-fixes)
* arm64: dts: rockchip: Remove unsupported node from the Pinebook Pro (git-
fixes)
* arm64: dts: rockchip: set PHY address of MT7531 switch to 0x1f (git-fixes)
* arm64/head: Disable MMU at EL2 before clearing HCR_EL2.E2H (git-fixes).
* arm64: hibernate: Fix level3 translation fault in swsusp_save() (git-fixes).
* arm64/ptrace: Use saved floating point state type to determine SVE (git-
fixes)
* arm64/sve: Lower the maximum allocation for the SVE ptrace regset (git-
fixes)
* arm64: tegra: Correct Tegra132 I2C alias (git-fixes)
* arm64: tegra: Set the correct PHY mode for MGBE (git-fixes)
* ARM: 9381/1: kasan: clear stale stack poison (git-fixes).
* ARM: imx: Check return value of devm_kasprintf in imx_mmdc_perf_init (git-
fixes).
* ARM: imx_v6_v7_defconfig: Restore CONFIG_BACKLIGHT_CLASS_DEVICE (git-fixes).
* ARM: OMAP2+: fix N810 MMC gpiod table (git-fixes).
* ARM: OMAP2+: fix USB regression on Nokia N8x0 (git-fixes).
* arm_pmu: acpi: Add a representative platform device for TRBE (bsc#1220587)
* arm_pmu: acpi: Refactor arm_spe_acpi_register_device() (bsc#1220587)
* ARM: prctl: reject PR_SET_MDWE on pre-ARMv6 (stable-fixes).
* ARM: s5pv210: fix pm.c kernel-doc warning (git-fixes).
* asm-generic: make sparse happy with odd-sized put_unaligned_*() (stable-
fixes).
* ASoC: acp: Support microphone from device Acer 315-24p (git-fixes).
* ASoC: amd: acp: fix for acp_init function error handling (git-fixes).
* ASoC: amd: yc: Add Lenovo ThinkBook 21J0 into DMI quirk table (stable-
fixes).
* ASoC: amd: yc: Fix non-functional mic on ASUS M7600RE (stable-fixes).
* ASoC: amd: yc: Fix non-functional mic on Lenovo 21J2 (stable-fixes).
* ASoC: amd: yc: Revert "Fix non-functional mic on Lenovo 21J2" (stable-
fixes).
* ASoC: codecs: wsa881x: set clk_stop_mode1 flag (git-fixes).
* ASoC: cs35l56: Fix unintended bus access while resetting amp (git-fixes).
* ASoC: cs35l56: Prevent overwriting firmware ASP config (git-fixes).
* ASoC: da7219-aad: fix usage of device_get_named_child_node() (git-fixes).
* ASoC: Intel: avs: Fix ASRC module initialization (git-fixes).
* ASoC: Intel: avs: Fix potential integer overflow (git-fixes).
* ASoC: Intel: avs: Populate board selection with new I2S entries (stable-
fixes).
* ASoC: Intel: avs: Set name of control as in topology (git-fixes).
* ASoC: Intel: avs: ssm4567: Do not ignore route checks (git-fixes).
* ASoC: Intel: avs: Test result of avs_get_module_entry() (git-fixes).
* ASoC: Intel: bytcr_rt5640: Apply Asus T100TA quirk to Asus T100TAM too (git-
fixes).
* ASoC: Intel: common: DMI remap for rebranded Intel NUC M15 (LAPRC710)
laptops (stable-fixes).
* ASoC: Intel: Disable route checks for Skylake boards (git-fixes).
* ASoC: kirkwood: Fix potential NULL dereference (git-fixes).
* ASoC: mediatek: Assign dummy when codec not specified for a DAI link (git-
fixes).
* ASoC: mediatek: mt8192: fix register configuration for tdm (git-fixes).
* ASoC: meson: axg-card: make links nonatomic (git-fixes).
* ASoC: meson: axg-fifo: use FIELD helpers (stable-fixes).
* ASoC: meson: axg-fifo: use threaded irq to check periods (git-fixes).
* ASoC: meson: axg-tdm-interface: manage formatters in trigger (git-fixes).
* ASoC: meson: cards: select SND_DYNAMIC_MINORS (git-fixes).
* ASoC: ops: Fix wraparound for mask in snd_soc_get_volsw (git-fixes).
* ASoC: rockchip: i2s-tdm: Fix inaccurate sampling rates (git-fixes).
* ASoC: rt5645: Fix the electric noise due to the CBJ contacts floating (git-
fixes).
* ASoC: rt5645: Make LattePanda board DMI match more precise (stable-fixes).
* ASoC: rt5682-sdw: fix locking sequence (git-fixes).
* ASoC: rt711-sdca: fix locking sequence (git-fixes).
* ASoC: rt711-sdw: fix locking sequence (git-fixes).
* ASoC: rt712-sdca-sdw: fix locking sequence (git-fixes).
* ASoC: rt715: add vendor clear control register (git-fixes).
* ASoC: rt715-sdca: volume step modification (git-fixes).
* ASoC: rt722-sdca: add headset microphone vrefo setting (git-fixes).
* ASoC: rt722-sdca: modify channel number to support 4 channels (git-fixes).
* ASoC: rt722-sdca-sdw: fix locking sequence (git-fixes).
* ASoC: soc-core.c: Skip dummy codec when adding platforms (stable-fixes).
* ASoC: SOF: amd: Optimize quirk for Valve Galileo (stable-fixes).
* ASoC: SOF: Intel: add default firmware library path for LNL (git-fixes).
* ASoC: SOF: Intel: hda-dsp: Skip IMR boot on ACE platforms in case of S3
suspend (stable-fixes).
* ASoC: SOF: Intel: lnl: Correct rom_status_reg (git-fixes).
* ASoC: SOF: Intel: mtl: call dsp dump when boot retry fails (stable-fixes).
* ASoC: SOF: Intel: mtl: Correct rom_status_reg (git-fixes).
* ASoC: SOF: Intel: mtl: Disable interrupts when firmware boot failed (git-
fixes).
* ASoC: SOF: Intel: mtl: Implement firmware boot state check (git-fixes).
* ASoC: SOF: ipc4-pcm: Workaround for crashed firmware on system suspend
(stable-fixes).
* ASoC: SOF: ipc4-topology: Fix input format query of process modules without
base extension (git-fixes).
* ASoC: tas2552: Add TX path for capturing AUDIO-OUT data (git-fixes).
* ASoC: tas2781: Fix a warning reported by robot kernel test (git-fixes).
* ASoC: tas2781: Fix wrong loading calibrated data sequence (git-fixes).
* ASoC: tas2781: mark dvc_tlv with __maybe_unused (git-fixes).
* ASoC: tegra: Fix DSPK 16-bit playback (git-fixes).
* ASoC: ti: Convert Pandora ASoC to GPIO descriptors (stable-fixes).
* ASoC: ti: davinci-mcasp: Fix race condition during probe (git-fixes).
* ASoC: tlv320adc3xxx: Do not strip remove function when driver is builtin
(git-fixes).
* ASoC: tracing: Export SND_SOC_DAPM_DIR_OUT to its value (git-fixes).
* ASoC: wm_adsp: Add missing MODULE_DESCRIPTION() (git-fixes).
* ASoC: wm_adsp: Fix missing mutex_lock in wm_adsp_write_ctl() (git-fixes).
* ata: libata-core: Allow command duration limits detection for ACS-4 drives
(git-fixes).
* ata: pata_legacy: make legacy_exit() work again (git-fixes).
* ata: sata_gemini: Check clk_enable() result (stable-fixes).
* ata: sata_mv: Fix PCI device ID table declaration compilation warning (git-
fixes).
* ata: sata_sx4: fix pdc20621_get_from_dimm() on 64-bit (git-fixes).
* autofs: use wake_up() instead of wake_up_interruptible(() (bsc#1224166).
* ax25: Fix netdev refcount issue (git-fixes).
* ax25: Fix reference count leak issue of net_device (git-fixes).
* ax25: Fix reference count leak issues of ax25_dev (git-fixes).
* ax25: fix use-after-free bugs caused by ax25_ds_del_timer (git-fixes).
* batman-adv: Avoid infinite loop trying to resize local TT (git-fixes).
* bitops: add missing prototype check (git-fixes).
* blk-cgroup: fix list corruption from reorder of WRITE ->lqueued
(bsc#1225605).
* blk-cgroup: fix list corruption from resetting io stat (bsc#1225605).
* block: fix q->blkg_list corruption during disk rebind (bsc#1223591).
* Bluetooth: Add new quirk for broken read key length on ATS2851 (stable-
fixes).
* Bluetooth: add quirk for broken address properties (git-fixes).
* Bluetooth: btintel: Fixe build regression (git-fixes).
* Bluetooth: btintel: Fix null ptr deref in btintel_read_version (stable-
fixes).
* Bluetooth: btusb: Add Realtek RTL8852BE support ID 0x0bda:0x4853 (stable-
fixes).
* Bluetooth: btusb: Fix triggering coredump implementation for QCA (git-
fixes).
* Bluetooth: Fix memory leak in hci_req_sync_complete() (git-fixes).
* Bluetooth: Fix TOCTOU in HCI debugfs implementation (git-fixes).
* Bluetooth: Fix type of len in {l2cap,sco}_sock_getsockopt_old() (stable-
fixes).
* Bluetooth: Fix use-after-free bugs caused by sco_sock_timeout (git-fixes).
* Bluetooth: hci_core: Cancel request on command timeout (stable-fixes).
* Bluetooth: hci_event: Fix sending HCI_OP_READ_ENC_KEY_SIZE (git-fixes).
* Bluetooth: hci_event: set the conn encrypted before conn establishes
(stable-fixes).
* Bluetooth: HCI: Fix potential null-ptr-deref (git-fixes).
* Bluetooth: hci_sock: Fix not validating setsockopt user input (git-fixes).
* Bluetooth: hci_sync: Fix not checking error on hci_cmd_sync_cancel_sync
(git-fixes).
* Bluetooth: hci_sync: Fix using the same interval and window for Coded PHY
(git-fixes).
* Bluetooth: hci_sync: Use QoS to determine which PHY to scan (stable-fixes).
* Bluetooth: ISO: Align broadcast sync_timeout with connection timeout
(stable-fixes).
* Bluetooth: ISO: Do not reject BT_ISO_QOS if parameters are unset (git-
fixes).
* Bluetooth: l2cap: Do not double set the HCI_CONN_MGMT_CONNECTED bit (git-
fixes).
* Bluetooth: L2CAP: Fix not validating setsockopt user input (git-fixes).
* Bluetooth: l2cap: fix null-ptr-deref in l2cap_chan_timeout (git-fixes).
* Bluetooth: L2CAP: Fix slab-use-after-free in l2cap_connect() (git-fixes).
* Bluetooth: MGMT: Fix failing to MGMT_OP_ADD_UUID/MGMT_OP_REMOVE_UUID
(bsc#1221504).
* Bluetooth: mgmt: Fix limited discoverable off timeout (stable-fixes).
* Bluetooth: msft: fix slab-use-after-free in msft_do_close() (git-fixes).
* Bluetooth: qca: add missing firmware sanity checks (git-fixes).
* Bluetooth: qca: fix device-address endianness (git-fixes).
* Bluetooth: qca: Fix error code in qca_read_fw_build_info() (git-fixes).
* Bluetooth: qca: fix firmware check error path (git-fixes).
* Bluetooth: qca: fix info leak when fetching fw build id (git-fixes).
* Bluetooth: qca: fix NULL-deref on non-serdev setup (git-fixes).
* Bluetooth: qca: fix NULL-deref on non-serdev suspend (git-fixes).
* Bluetooth: qca: fix NVM configuration parsing (git-fixes).
* Bluetooth: RFCOMM: Fix not validating setsockopt user input (git-fixes).
* Bluetooth: SCO: Fix not validating setsockopt user input (git-fixes).
* bnx2x: Fix firmware version string character counts (git-fixes).
* bnxt_en: Fix error recovery for RoCE ulp client (git-fixes).
* bnxt_en: Fix possible memory leak in bnxt_rdma_aux_device_init() (git-
fixes).
* bnxt_en: Reset PTP tx_avail after possible firmware reset (git-fixes).
* bnxt_re: avoid shift undefined behavior in bnxt_qplib_alloc_init_hwq (git-
fixes)
* bootconfig: Fix the kerneldoc of _xbc_exit() (git-fixes).
* bootconfig: use memblock_free_late to free xbc memory to buddy (git-fixes).
* bootmem: use kmemleak_free_part_phys in free_bootmem_page (git-fixes).
* bootmem: use kmemleak_free_part_phys in put_page_bootmem (git-fixes).
* bpf, arm64: fix bug in BPF_LDX_MEMSX (git-fixes)
* bpf, arm64: Fix incorrect runtime stats (git-fixes)
* bpf: fix precision backtracking instruction iteration (bsc#1225756).
* bpf: Fix precision tracking for BPF_ALU | BPF_TO_BE | BPF_END (git-fixes).
* bpf: handle ldimm64 properly in check_cfg() (bsc#1225756).
* bpf, scripts: Correct GPL license name (git-fixes).
* btrfs: add a helper to read the superblock metadata_uuid (git-fixes)
* btrfs: add and use helper to check if block group is used (bsc#1220120).
* btrfs: add missing mutex_unlock in btrfs_relocate_sys_chunks() (git-fixes)
* btrfs: add new unused block groups to the list of unused block groups
(bsc#1220120).
* btrfs: allow to run delayed refs by bytes to be released instead of count
(bsc#1220120).
* btrfs: always print transaction aborted messages with an error level (git-
fixes)
* btrfs: always reserve space for delayed refs when starting transaction
(bsc#1220120).
* btrfs: assert correct lock is held at btrfs_select_ref_head() (bsc#1220120).
* btrfs: assert delayed node locked when removing delayed item (git-fixes)
* btrfs: avoid starting and committing empty transaction when flushing space
(bsc#1220120).
* btrfs: avoid starting new transaction when flushing delayed items and refs
(bsc#1220120).
* btrfs: check for BTRFS_FS_ERROR in pending ordered assert (git-fixes)
* btrfs: compare the correct fsid/metadata_uuid in btrfs_validate_super (git-
fixes)
* btrfs: defrag: avoid unnecessary defrag caused by incorrect extent size
(git-fixes)
* btrfs: defrag: reject unknown flags of btrfs_ioctl_defrag_range_args (git-
fixes)
* btrfs: do not allow non subvolume root targets for snapshot (git-fixes)
* btrfs: do not arbitrarily slow down delalloc if we're committing (git-fixes)
* btrfs: do not delete unused block group if it may be used soon
(bsc#1220120).
* btrfs: do not refill whole delayed refs block reserve when starting
transaction (bsc#1220120).
* btrfs: do not start transaction when joining with TRANS_JOIN_NOSTART (git-
fixes)
* btrfs: do not steal space from global rsv after a transaction abort
(bsc#1220120).
* btrfs: do not warn if discard range is not aligned to sector (git-fixes)
* btrfs: ensure fiemap does not race with writes when FIEMAP_FLAG_SYNC is
given (bsc#1223285).
* btrfs: error out when COWing block using a stale transaction (git-fixes)
* btrfs: error out when reallocating block for defrag using a stale
transaction (git-fixes)
* btrfs: error when COWing block from a root that is being deleted (git-fixes)
* btrfs: export: handle invalid inode or root reference in btrfs_get_parent()
(git-fixes)
* btrfs: fail priority metadata ticket with real fs error (bsc#1220120).
* btrfs: file_remove_privs needs an exclusive lock in direct io write (git-
fixes)
* btrfs: fix 64bit compat send ioctl arguments not initializing version member
(git-fixes)
* btrfs: fix deadlock with fiemap and extent locking (bsc#1223285).
* btrfs: fix information leak in btrfs_ioctl_logical_to_ino() (git-fixes)
* btrfs: fix kvcalloc() arguments order in btrfs_ioctl_send() (git-fixes)
* btrfs: fix lockdep splat and potential deadlock after failure running
delayed items (git-fixes)
* btrfs: fix off-by-one chunk length calculation at contains_pending_extent()
(git-fixes)
* btrfs: fix off-by-one when checking chunk map includes logical address (git-
fixes)
* btrfs: fix race between ordered extent completion and fiemap (bsc#1223285).
* btrfs: fix race when detecting delalloc ranges during fiemap (bsc#1223285).
* btrfs: fix race when refilling delayed refs block reserve (git-fixes)
* btrfs: fix start transaction qgroup rsv double free (git-fixes)
* btrfs: fix stripe length calculation for non-zoned data chunk allocation
(bsc#1217489).
* btrfs: fix wrong block_start calculation for btrfs_drop_extent_map_range()
(git-fixes) Dropped hunk in selftests (test_case_7), 92e1229b204d6.
* btrfs: free qgroup rsv on io failure (git-fixes)
* btrfs: free the allocated memory if btrfs_alloc_page_array() fails (git-
fixes)
* btrfs: get rid of label and goto at insert_delayed_ref() (bsc#1220120).
* btrfs: handle chunk tree lookup error in btrfs_relocate_sys_chunks() (git-
fixes)
* btrfs: handle errors properly in update_inline_extent_backref() (git-fixes)
* btrfs: initialize key where it's used when running delayed data ref
(bsc#1220120).
* btrfs: log message if extent item not found when running delayed extent op
(bsc#1220120).
* btrfs: make btrfs_cleanup_fs_roots() static (bsc#1220120).
* btrfs: make btrfs_destroy_delayed_refs() return void (bsc#1220120).
* btrfs: make btrfs_destroy_marked_extents() return void (bsc#1220120).
* btrfs: make btrfs_destroy_pinned_extent() return void (bsc#1220120).
* btrfs: make error messages more clear when getting a chunk map (git-fixes)
* btrfs: make find_first_extent_bit() return a boolean (bsc#1220120).
* btrfs: make find_free_dev_extent() static (bsc#1220120).
* btrfs: make insert_delayed_ref() return a bool instead of an int
(bsc#1220120).
* btrfs: merge find_free_dev_extent() and find_free_dev_extent_start()
(bsc#1220120).
* btrfs: move btrfs_free_excluded_extents() into block-group.c (bsc#1220120).
* btrfs: open code trivial btrfs_add_excluded_extent() (bsc#1220120).
* btrfs: output extra debug info if we failed to find an inline backref (git-
fixes)
* btrfs: pass a space_info argument to btrfs_reserve_metadata_bytes()
(bsc#1220120).
* btrfs: prevent transaction block reserve underflow when starting transaction
(git-fixes)
* btrfs: print available space across all block groups when dumping space info
(bsc#1220120).
* btrfs: print available space for a block group when dumping a space info
(bsc#1220120).
* btrfs: print block group super and delalloc bytes when dumping space info
(bsc#1220120).
* btrfs: print target number of bytes when dumping free space (bsc#1220120).
* btrfs: qgroup: always free reserved space for extent records (bsc#1216196).
* btrfs: qgroup: convert PREALLOC to PERTRANS after record_root_in_trans (git-
fixes)
* btrfs: record delayed inode root in transaction (git-fixes)
* btrfs: reject encoded write if inode has nodatasum flag set (git-fixes)
* btrfs: release path before inode lookup during the ino lookup ioctl (git-
fixes)
* btrfs: remove pointless initialization at btrfs_delayed_refs_rsv_release()
(bsc#1220120).
* btrfs: remove pointless in_tree field from struct btrfs_delayed_ref_node
(bsc#1220120).
* btrfs: remove pointless 'ref_root' variable from run_delayed_data_ref()
(bsc#1220120).
* btrfs: remove redundant BUG_ON() from __btrfs_inc_extent_ref()
(bsc#1220120).
* btrfs: remove refs_to_add argument from __btrfs_inc_extent_ref()
(bsc#1220120).
* btrfs: remove refs_to_drop argument from __btrfs_free_extent()
(bsc#1220120).
* btrfs: remove the refcount warning/check at btrfs_put_delayed_ref()
(bsc#1220120).
* btrfs: remove unnecessary logic when running new delayed references
(bsc#1220120).
* btrfs: remove unnecessary prototype declarations at disk-io.c (bsc#1220120).
* btrfs: remove unused is_head field from struct btrfs_delayed_ref_node
(bsc#1220120).
* btrfs: rename add_new_free_space() to btrfs_add_new_free_space()
(bsc#1220120).
* btrfs: reorder some members of struct btrfs_delayed_ref_head (bsc#1220120).
* btrfs: reserve space for delayed refs on a per ref basis (bsc#1220120).
* btrfs: reset destination buffer when read_extent_buffer() gets invalid range
(git-fixes)
* btrfs: return -EUCLEAN for delayed tree ref with a ref count not equals to 1
(git-fixes)
* btrfs: return -EUCLEAN if extent item is missing when searching inline
backref (bsc#1220120).
* btrfs: return real error when orphan cleanup fails due to a transaction
abort (bsc#1220120).
* btrfs: send: do not issue unnecessary zero writes for trailing hole
(bsc#1222459).
* btrfs: send: ensure send_fd is writable (git-fixes)
* btrfs: send: handle path ref underflow in header iterate_inode_ref() (git-
fixes)
* btrfs: send: return EOPNOTSUPP on unknown flags (git-fixes)
* btrfs: set page extent mapped after read_folio in relocate_one_page (git-
fixes)
* btrfs: simplify check for extent item overrun at
lookup_inline_extent_backref() (bsc#1220120).
* btrfs: stop doing excessive space reservation for csum deletion
(bsc#1220120).
* btrfs: store the error that turned the fs into error state (bsc#1220120).
* btrfs: sysfs: validate scrub_speed_max value (git-fixes)
* btrfs: tree-checker: fix inline ref size in error messages (git-fixes)
* btrfs: update comment for btrfs_join_transaction_nostart() (bsc#1220120).
* btrfs: update documentation for add_new_free_space() (bsc#1220120).
* btrfs: use a bool to track qgroup record insertion when adding ref head
(bsc#1220120).
* btrfs: use a single switch statement when initializing delayed ref head
(bsc#1220120).
* btrfs: use a single variable for return value at
lookup_inline_extent_backref() (bsc#1220120).
* btrfs: use a single variable for return value at run_delayed_extent_op()
(bsc#1220120).
* btrfs: use bool type for delayed ref head fields that are used as booleans
(bsc#1220120).
* btrfs: use the correct superblock to compare fsid in btrfs_validate_super
(git-fixes)
* btrfs: use u64 for buffer sizes in the tree search ioctls (git-fixes)
* btrfs: zoned: do not skip block groups with 100% zone unusable
(bsc#1220120).
* bus: mhi: ep: check the correct variable in mhi_ep_register_controller()
(git-fixes).
* ceph: redirty page before returning AOP_WRITEPAGE_ACTIVATE (bsc#1224866).
* ceph: stop copying to iter at EOF on sync reads (bsc#1222606).
* certs: Add ECDSA signature verification self-test (bsc#1222777).
* certs: Move RSA self-test data to separate file (bsc#1222777).
* cifs: account for primary channel in the interface list (bsc#1225172).
* cifs: cifs_chan_is_iface_active should be called with chan_lock held
(bsc#1225172).
* cifs: distribute channels across interfaces based on speed (bsc#1225172).++
kernel-source.spec (revision 4)%define git_commit
596cd3fdbd0fb5902e80279485ad8596f4e82397Release: <RELEASE>.g596cd3f
* cifs: do not pass cifs_sb when trying to add channels (bsc#1225172).
* cifs: Do not use certain unnecessary folio_*() functions (bsc#1225172).
* cifs: failure to add channel on iface should bump up weight (git-fixes,
bsc#1225172).
* cifs: fix charset issue in reconnection (bsc#1225172).
* cifs: fix leak of iface for primary channel (git-fixes, bsc#1225172).
* cifs: handle cases where a channel is closed (bsc#1225172).
* cifs: handle cases where multiple sessions share connection (bsc#1225172).
* cifs: reconnect work should have reference on server struct (bsc#1225172).
* clk: Do not hold prepare_lock when calling kref_put() (stable-fixes).
* clk: Get runtime PM before walking tree during disable_unused (git-fixes).
* clk: Get runtime PM before walking tree for clk_summary (git-fixes).
* clk: Initialize struct clk_core kref earlier (stable-fixes).
* clk: mediatek: Do a runtime PM get on controllers during probe (git-fixes).
* clk: mediatek: mt8365-mm: fix DPI0 parent (git-fixes).
* clk: mediatek: pllfh: Do not log error for missing fhctl node (git-fixes).
* clk: qcom: clk-alpha-pll: fix rate setting for Stromer PLLs (git-fixes).
* clk: qcom: clk-alpha-pll: remove invalid Stromer register offset (git-
fixes).
* clk: qcom: dispcc-sm6350: fix DisplayPort clocks (git-fixes).
* clk: qcom: dispcc-sm8450: fix DisplayPort clocks (git-fixes).
* clk: qcom: dispcc-sm8550: fix DisplayPort clocks (git-fixes).
* clk: qcom: mmcc-msm8998: fix venus clock issue (git-fixes).
* clk: qcom: reset: Commonize the de/assert functions (stable-fixes).
* clk: qcom: reset: Ensure write completion on reset de/assertion (git-fixes).
* clk: Remove prepare_lock hold assertion in __clk_release() (git-fixes).
* clk: renesas: r8a779a0: Fix CANFD parent clock (git-fixes).
* clk: renesas: r9a07g043: Add clock and reset entry for PLIC (git-fixes).
* clk: rs9: fix wrong default value for clock amplitude (git-fixes).
* clk: samsung: exynosautov9: fix wrong pll clock id value (git-fixes).
* clk: Show active consumers of clocks in debugfs (stable-fixes).
* clk: sunxi-ng: h6: Reparent CPUX during PLL CPUX rate change (git-fixes).
* clocksource/drivers/arm_global_timer: Fix maximum prescaler value (git-
fixes).
* clocksource/drivers/imx: Fix -Wunused-but-set-variable warning (git-fixes).
* comedi: vmk80xx: fix incomplete endpoint checking (git-fixes).
* coresight: trbe: Add a representative coresight_platform_data for
(bsc#1220587)
* coresight: trbe: Allocate platform data per device (bsc#1220587)
* coresight: trbe: Enable ACPI based TRBE devices (bsc#1220587)
* counter: linux/counter.h: fix Excess kernel-doc description warning (git-
fixes).
* cppc_cpufreq: Fix possible null pointer dereference (git-fixes).
* cpufreq: brcmstb-avs-cpufreq: ISO C90 forbids mixed declarations (git-
fixes).
* cpufreq: exit() callback is optional (git-fixes).
* cpumask: Add for_each_cpu_from() (bsc#1225053).
* crypto: bcm - Fix pointer arithmetic (git-fixes).
* crypto: ccp - Add support for PCI device 0x156E (bsc#1223338).
* crypto: ccp - Add support for PCI device 0x17E0 (bsc#1223338).
* crypto: ccp - drop platform ifdef checks (git-fixes).
* crypto: ecc - update ecc_gen_privkey for FIPS 186-5 (bsc#1222782).
* crypto: ecdsa - Fix module auto-load on add-key (git-fixes).
* crypto: lib/mpi - Fix unexpected pointer access in mpi_ec_init (git-fixes).
* crypto: qat - Fix ADF_DEV_RESET_SYNC memory leak (git-fixes).
* crypto: qat - fix ring to service map for dcc in 4xxx (git-fixes).
* crypto: qat - improve error logging to be consistent across features (git-
fixes).
* crypto: qat - relocate and rename get_service_enabled() (stable-fixes).
* crypto: qat - specify firmware files for 402xx (git-fixes).
* crypto: rsa - add a check for allocation failure (bsc#1222775).
* crypto: rsa - allow only odd e and restrict value in FIPS mode
(bsc#1222775).
* crypto: testmgr - remove unused xts4096 and xts512 algorithms from testmgr.c
(bsc#1222769).
* crypto: x86/nh-avx2 - add missing vzeroupper (git-fixes).
* crypto: x86/sha256-avx2 - add missing vzeroupper (git-fixes).
* crypto: x86/sha512-avx2 - add missing vzeroupper (git-fixes).
* cxl/acpi: Fix load failures due to single window creation failure (git-
fixes).
* cxl/pci: Fix disabling memory if DVSEC CXL Range does not match a CFMWS
window (git-fixes).
* cxl/trace: Properly initialize cxl_poison region name (git-fixes).
* dax: alloc_dax() return ERR_PTR(-EOPNOTSUPP) for CONFIG_DAX=n
(jsc#PED-5853).
* dax/bus.c: replace driver-core lock usage by a local rwsem (jsc#PED-5853).
* dax/bus.c: replace several sprintf() with sysfs_emit() (jsc#PED-5853).
* device-dax: make dax_bus_type const (jsc#PED-5853).
* dlm: fix user space lkb refcounting (git-fixes).
* dma-buf: Fix NULL pointer dereference in sanitycheck() (git-fixes).
* dma-buf/sw-sync: do not enable IRQ from sync_print_obj() (git-fixes).
* dmaengine: axi-dmac: fix possible race in remove() (git-fixes).
* dmaengine: idma64: Add check for dma_set_max_seg_size (git-fixes).
* dmaengine: idxd: Avoid unnecessary destruction of file_ida (git-fixes).
* dmaengine: idxd: Fix oops during rmmod on single-CPU platforms (git-fixes).
* dmaengine: owl: fix register access functions (git-fixes).
* dmaengine: tegra186: Fix residual calculation (git-fixes).
* dma-mapping: benchmark: fix node id validation (git-fixes).
* dma-mapping: benchmark: handle NUMA_NO_NODE correctly (git-fixes).
* dm/amd/pm: Fix problems with reboot/shutdown for some SMU 13.0.4/13.0.11
users (git-fixes).
* dma: xilinx_dpdma: Fix locking (git-fixes).
* dm crypt: remove redundant state settings after waking up (jsc#PED-7542).
* dm-integrity: set max_integrity_segments in dm_integrity_io_hints
(jsc#PED-7542).
* dm-multipath: dont't attempt SG_IO on non-SCSI-disks (bsc#1223575).
* dm-raid: add a new helper prepare_suspend() in md_personality
(jsc#PED-7542).
* dm-raid: really frozen sync_thread during suspend (jsc#PED-7542).
* dm thin: add braces around conditional code that spans lines (jsc#PED-7542).
* dm: update relevant MODULE_AUTHOR entries to latest dm-devel mailing list
(jsc#PED-7542).
* dm verity: set DM_TARGET_SINGLETON feature flag (jsc#PED-7542).
* Docs/admin-guide/mm/damon/usage: fix wrong example of DAMOS filter matching
sysfs file (git-fixes).
* docs: kernel_include.py: Cope with docutils 0.21 (stable-fixes).
* docs: netdev: Fix typo in Signed-off-by tag (git-fixes).
* docs: Restore "smart quotes" for quotes (stable-fixes).
* driver core: Introduce device_link_wait_removal() (stable-fixes).
* drivers/nvme: Add quirks for device 126f:2262 (git-fixes).
* drm: add drm_gem_object_is_shared_for_memory_stats() helper (stable-fixes).
* drm/amd/amdgpu: Fix potential ioremap() memory leaks in amdgpu_device_init()
(stable-fixes).
* drm/amd/display: Add dml2 copy functions (stable-fixes).
* drm/amd/display: Allow dirty rects to be sent to dmub when abm is active
(stable-fixes).
* drm/amd/display: Atom Integrated System Info v2_2 for DCN35 (stable-fixes).
* drm/amd/display: Change default size for dummy plane in DML2 (stable-fixes).
* drm/amd/display: Do not recursively call manual trigger programming (stable-
fixes).
* drm/amd/display: Enable colorspace property for MST connectors (git-fixes).
* drm/amd/display: Fix bounds check for dcn35 DcfClocks (git-fixes).
* drm/amd/display: fix disable otg wa logic in DCN316 (stable-fixes).
* drm/amd/display: Fix division by zero in setup_dsc_config (stable-fixes).
* drm/amd/display: Fix idle check for shared firmware state (stable-fixes).
* drm/amd/display: Fix incorrect DSC instance for MST (stable-fixes).
* drm/amd/display: fix input states translation error for dcn35 & dcn351
(stable-fixes).
* drm/amd/display: Fix nanosec stat overflow (stable-fixes).
* drm/amd/display: Fix noise issue on HDMI AV mute (stable-fixes).
* drm/amd/display: Fix potential index out of bounds in color transformation
function (git-fixes).
* drm/amd/display: handle range offsets in VRR ranges (stable-fixes).
* drm/amd/display: Handle Y carry-over in VCP X.Y calculation (stable-fixes).
* drm/amd/display: Init DPPCLK from SMU on dcn32 (stable-fixes).
* drm/amd/display: Override min required DCFCLK in dml1_validate (stable-
fixes).
* drm/amd/display: Prevent crash when disable stream (stable-fixes).
* drm/amd/display: Program VSC SDP colorimetry for all DP sinks >= 1.4
(stable-fixes).
* drm/amd/display: Remove MPC rate control logic from DCN30 and above (stable-
fixes).
* drm/amd/display: Remove redundant condition in dcn35_calc_blocks_to_gate()
(git-fixes).
* drm/amd/display: Return the correct HDCP error code (stable-fixes).
* drm/amd/display: Set DCN351 BB and IP the same as DCN35 (stable-fixes).
* drm/amd/display: Set VSC SDP Colorimetry same way for MST and SST (stable-
fixes).
* drm/amd/display: Use freesync when `DRM_EDID_FEATURE_CONTINUOUS_FREQ` found
(stable-fixes).
* drm/amd: Flush GFXOFF requests in prepare stage (git-fixes).
* drm/amdgpu: always force full reset for SOC21 (stable-fixes).
* drm/amdgpu: amdgpu_ttm_gart_bind set gtt bound flag (stable-fixes).
* drm/amdgpu: Assign correct bits for SDMA HDP flush (stable-fixes).
* drm/amdgpu/display: Address kdoc for 'is_psr_su' in 'fill_dc_dirty_rects'
(git-fixes).
* drm/amdgpu: drop setting buffer funcs in sdma442 (git-fixes).
* drm/amdgpu: Fix comparison in amdgpu_res_cpu_visible (git-fixes).
* drm/amdgpu: fix deadlock while reading mqd from debugfs (git-fixes).
* drm/amdgpu: fix doorbell regression (git-fixes).
* drm/amdgpu: fix incorrect number of active RBs for gfx11 (stable-fixes).
* drm/amdgpu: Fix leak when GPU memory allocation fails (stable-fixes).
* drm/amdgpu: fix mmhub client id out-of-bounds access (git-fixes).
* drm/amdgpu: fix use-after-free bug (stable-fixes).
* drm/amdgpu: Fix VCN allocation in CPX partition (stable-fixes).
* drm/amdgpu: fix visible VRAM handling during faults (git-fixes).
* drm/amdgpu: implement IRQ_STATE_ENABLE for SDMA v4.4.2 (stable-fixes).
* drm/amdgpu: make damage clips support configurable (stable-fixes).
* drm/amdgpu: once more fix the call oder in amdgpu_ttm_move() v2 (git-fixes).
* drm/amdgpu/pm: Check the validity of overdiver power limit (git-fixes).
* drm/amdgpu/pm: Fix NULL pointer dereference when get power limit (git-
fixes).
* drm/amdgpu/pm: Fix the error of pwm1_enable setting (stable-fixes).
* drm/amdgpu: Refine IB schedule error logging (stable-fixes).
* drm/amdgpu: remove invalid resource->start check v2 (git-fixes).
* drm/amdgpu: Reset dGPU if suspend got aborted (stable-fixes).
* drm/amdgpu/sdma5.2: use legacy HDP flush for SDMA2/3 (stable-fixes).
* drm/amdgpu: validate the parameters of bo mapping operations more clearly
(git-fixes).
* drm/amdkfd: Check cgroup when returning DMABuf info (stable-fixes).
* drm/amdkfd: do not allow mapping the MMIO HDP page with large pages (git-
fixes).
* drm/amdkfd: Fix memory leak in create_process failure (git-fixes).
* drm/amdkfd: fix TLB flush after unmap for GFX9.4.2 (stable-fixes).
* drm/amdkfd: range check cp bad op exception interrupts (stable-fixes).
* drm/amdkfd: Reset GPU on queue preemption failure (stable-fixes).
* drm/amd/pm: fixes a random hang in S4 for SMU v13.0.4/11 (stable-fixes).
* drm/amd/swsmu: modify the gfx activity scaling (stable-fixes).
* drm/arm/malidp: fix a possible null pointer dereference (git-fixes).
* drm/ast: Fix soft lockup (git-fixes).
* drm/bridge: anx7625: Do not log an error when DSI host can't be found (git-
fixes).
* drm: bridge: cdns-mhdp8546: Fix possible null pointer dereference (git-
fixes).
* drm/bridge: dpc3433: Do not log an error when DSI host can't be found (git-
fixes).
* drm/bridge: Fix improper bridge init order with pre_enable_prev_first (git-
fixes).
* drm/bridge: icn6211: Do not log an error when DSI host can't be found (git-
fixes).
* drm/bridge: lt8912b: Do not log an error when DSI host can't be found (git-
fixes).
* drm/bridge: lt9611: Do not log an error when DSI host can't be found (git-
fixes).
* drm/bridge: lt9611uxc: Do not log an error when DSI host can't be found
(git-fixes).
* drm/bridge: tc358775: Do not log an error when DSI host can't be found (git-
fixes).
* drm/bridge: tc358775: fix support for jeida-18 and jeida-24 (git-fixes).
* drm/buddy: check range allocation matches alignment (stable-fixes).
* drm: Check output polling initialized before disabling (stable-fixes).
* drm: Check polling initialized before enabling in
drm_helper_probe_single_connector_modes (stable-fixes).
* drm/client: Fully protect modes[] with dev->mode_config.mutex (stable-
fixes).
* drm/connector: Add \n to message about demoting connector force-probes (git-
fixes).
* drm/display: fix typo (git-fixes).
* drm/exynos: do not return negative values from .get_modes() (stable-fixes).
* drm/fbdev-generic: Do not set physical framebuffer address (git-fixes).
* drm: Fix drm_fixp2int_round() making it add 0.5 (git-fixes).
* drm/gma500: Remove lid code (git-fixes).
* drm/i915/audio: Fix audio time stamp programming for DP (stable-fixes).
* drm/i915/bios: Fix parsing backlight BDB data (git-fixes).
* drm/i915/bios: Tolerate devdata==NULL in
intel_bios_encoder_supports_dp_dual_mode() (stable-fixes).
* drm/i915/cdclk: Fix CDCLK programming order when pipes are active (git-
fixes).
* drm/i915: Disable live M/N updates when using bigjoiner (stable-fixes).
* drm/i915: Disable port sync when bigjoiner is used (stable-fixes).
* drm/i915/display: Use i915_gem_object_get_dma_address to get dma address
(stable-fixes).
* drm/i915: Do not match JSL in ehl_combo_pll_div_frac_wa_needed() (git-
fixes).
* drm/i915/dp: Fix the computation for compressed_bpp for DISPLAY < 13
(git-fixes).
* drm/i915/dp: Remove support for UHBR13.5 (git-fixes).
* drm/i915/dpt: Make DPT object unshrinkable (git-fixes).
* drm/i915/dsb: Fix DSB vblank waits when using VRR (git-fixes).
* drm/i915/dsi: Go back to the previous INIT_OTP/DISPLAY_ON order, mostly
(git-fixes).
* drm/i915: Fix audio component initialization (git-fixes).
* drm/i915/gt: Automate CCS Mode setting during engine resets (git-fixes).
* drm/i915/gt: Disable HW load balancing for CCS (git-fixes).
* drm/i915/gt: Disarm breadcrumbs if engines are already idle (git-fixes).
* drm/i915/gt: Do not generate the command streamer for all the CCS (git-
fixes).
* drm/i915/gt: Enable only one CCS for compute workload (git-fixes).
* drm/i915/gt: Fix CCS id's calculation for CCS mode setting (git-fixes).
* drm/i915/gt: Reset queue_priority_hint on parking (git-fixes).
* drm/i915/guc: avoid FIELD_PREP warning (git-fixes).
* drm/i915/hwmon: Fix locking inversion in sysfs getter (git-fixes).
* drm/i915: Include the PLL name in the debug messages (stable-fixes).
* drm/i915/lspcon: Separate function to set expected mode (bsc#1193599).
* drm/i915/lspcon: Separate lspcon probe and lspcon init (bsc#1193599).
* drm/i915/mst: Limit MST+DSC to TGL+ (git-fixes).
* drm/i915/mst: Reject FEC+MST on ICL (git-fixes).
* drm/i915: Pre-populate the cursor physical dma address (git-fixes).
* drm/i915: Replace a memset() with zero initialization (stable-fixes).
* drm/i915: Stop printing pipe name as hex (stable-fixes).
* drm/i915: Suppress old PLL pipe_mask checks for MG/TC/TBT PLLs (stable-
fixes).
* drm/i915: Try to preserve the current shared_dpll for fastset on type-c
ports (stable-fixes).
* drm/i915: Use named initializers for DPLL info (stable-fixes).
* drm/i915/vrr: Disable VRR when using bigjoiner (stable-fixes).
* drm/i915/vrr: Generate VRR "safe window" for DSB (git-fixes).
* drm/imx/ipuv3: do not return negative values from .get_modes() (stable-
fixes).
* drm/lcdif: Do not disable clocks on already suspended hardware (git-fixes).
* drm/mediatek: Add 0 size check to mtk_drm_gem_obj (git-fixes).
* drm/mediatek: dp: Fix mtk_dp_aux_transfer return value (git-fixes).
* drm/mediatek: Init `ddp_comp` with devm_kcalloc() (git-fixes).
* drm/meson: dw-hdmi: add bandgap setting for g12 (git-fixes).
* drm/meson: dw-hdmi: power up phy on device init (git-fixes).
* drm/meson: gate px_clk when setting rate (git-fixes).
* drm/meson: vclk: fix calculation of 59.94 fractional rates (git-fixes).
* drm/msm/a6xx: Avoid a nullptr dereference when speedbin setting fails (git-
fixes).
* drm/msm: Add newlines to some debug prints (git-fixes).
* drm/msm/adreno: fix CP cycles stat retrieval on a7xx (git-fixes).
* drm/msm/dp: allow voltage swing / pre emphasis of 3 (git-fixes).
* drm/msm/dp: Avoid a long timeout for AUX transfer if nothing connected (git-
fixes).
* drm/msm/dp: fix typo in dp_display_handle_port_status_changed() (git-fixes).
* drm/msm/dpu: Add callback function pointer check before its call (git-
fixes).
* drm/msm/dpu: Allow configuring multiple active DSC blocks (git-fixes).
* drm/msm/dpu: Always flush the slave INTF on the CTL (git-fixes).
* drm/msm/dpu: do not allow overriding data from catalog (git-fixes).
* drm/msm/dpu: make error messages at dpu_core_irq_register_callback() more
sensible (git-fixes).
* drm/msm/dpu: use devres-managed allocation for MDP TOP (stable-fixes).
* drm/msm/dsi: Print dual-DSI-adjusted pclk instead of original mode pclk
(git-fixes).
* drm/nouveau/disp: Fix missing backlight control on Macbook 5, 1
(bsc#1223838).
* drm/nouveau/dp: Do not probe eDP ports twice harder (stable-fixes).
* drm/nouveau/dp: Fix incorrect return code in r535_dp_aux_xfer() (git-fixes).
* drm/nouveau/firmware: Fix SG_DEBUG error with nvkm_firmware_ctor() (stable-
fixes).
* drm/nouveau: use tile_mode and pte_kind for VM_BIND bo allocations (git-
fixes).
* drm: nv04: Fix out of bounds access (git-fixes).
* drm/omapdrm: Fix console by implementing fb_dirty (git-fixes).
* drm/panel: do not return negative error codes from drm_panel_get_modes()
(stable-fixes).
* drm/panel: ili9341: Respect deferred probe (git-fixes).
* drm/panel: ili9341: Use predefined error codes (git-fixes).
* drm/panel: ltk050h3146w: add MIPI_DSI_MODE_VIDEO to LTK050H3148W flags (git-
fixes).
* drm/panel: ltk050h3146w: drop duplicate commands from LTK050H3148W init
(git-fixes).
* drm/panel: novatek-nt35950: Do not log an error when DSI host can't be found
(git-fixes).
* drm: panel-orientation-quirks: Add quirk for GPD Win Mini (stable-fixes).
* drm/panel: simple: Add missing Innolux G121X1-L03 format, flags, connector
(git-fixes).
* drm/panel: sitronix-st7789v: fix display size for jt240mhqs_hwt_ek_e3 panel
(git-fixes).
* drm/panel: sitronix-st7789v: fix timing for jt240mhqs_hwt_ek_e3 panel (git-
fixes).
* drm/panel: sitronix-st7789v: tweak timing for jt240mhqs_hwt_ek_e3 panel
(git-fixes).
* drm/panel: visionox-rm69299: do not unregister DSI device (git-fixes).
* drm/panfrost: fix power transition timeout warnings (git-fixes).
* drm/panfrost: Fix the error path in panfrost_mmu_map_fault_addr() (git-
fixes).
* drm/prime: Unbreak virtgpu dma-buf export (git-fixes).
* drm/probe-helper: warn about negative .get_modes() (stable-fixes).
* drm/qxl: remove unused `count` variable from `qxl_surface_id_alloc()` (git-
fixes).
* drm/qxl: remove unused variable from `qxl_process_single_command()` (git-
fixes).
* drm/radeon: make -fstrict-flex-arrays=3 happy (git-fixes).
* drm/radeon: silence UBSAN warning (v3) (stable-fixes).
* drm/rockchip: vop2: Do not divide height twice for YUV (git-fixes).
* drm/rockchip: vop2: Remove AR30 and AB30 format support (git-fixes).
* drm/sched: fix null-ptr-deref in init entity (git-fixes).
* drm/shmem-helper: Fix BUG_ON() on mmap(PROT_WRITE, MAP_PRIVATE) (git-fixes).
* drm/ttm: return ENOSPC from ttm_bo_mem_space v3 (stable-fixes).
* drm/ttm: stop pooling cached NUMA pages v2 (git-fixes).
* drm/vc4: do not check if plane->state->fb == state->fb (stable-fixes).
* drm: vc4: Fix possible null pointer dereference (git-fixes).
* drm/vc4: hdmi: do not return negative values from .get_modes() (stable-
fixes).
* drm/vmwgfx: Create debugfs ttm_resource_manager entry only if needed (git-
fixes).
* drm/vmwgfx: Enable DMA mappings with SEV (git-fixes).
* drm/vmwgfx: Fix crtc's atomic check conditional (git-fixes).
* drm/vmwgfx: Fix invalid reads in fence signaled events (git-fixes).
* drm/vmwgfx: Fix Legacy Display Unit (git-fixes).
* drm/vmwgfx: Fix prime import/export (git-fixes).
* drm/vmwgfx: Sort primary plane formats by order of preference (git-fixes).
* drm: zynqmp_dpsub: Always register bridge (git-fixes).
* dt-bindings: clock: qcom: Add missing UFS QREF clocks (git-fixes)
* dump_stack: Do not get cpu_sync for panic CPU (bsc#1225607).
* dyndbg: fix old BUG_ON in >control parser (stable-fixes).
* e1000e: Minor flow correction in e1000_shutdown function (git-fixes).
* e1000e: move force SMBUS from enable ulp function to avoid PHY loss issue
(git-fixes).
* e1000e: Workaround for sporadic MDI error on Meteor Lake systems (git-
fixes).
* ecryptfs: Fix buffer size for tag 66 packet (git-fixes)
* ecryptfs: Reject casefold directory inodes (git-fixes)
* EDAC/synopsys: Fix ECC status and IRQ control race condition (git-fixes).
* Edit "amdkfd: use calloc instead of kzalloc to avoid integer overflow"
Reference CVE and bug numbers.
* efi: disable mirror feature during crashkernel (stable-fixes).
* efi: fix panic in kdump kernel (git-fixes).
* efi: libstub: only free priv.runtime_map when allocated (git-fixes).
* efi/unaccepted: do not let /proc/vmcore try to access unaccepted memory
(git-fixes).
* efi/unaccepted: touch soft lockup during memory accept (git-fixes).
* Enable CONFIG_FIPS_SIGNATURE_SELFTEST (bsc#1222771)
* Enable new CONFIG_FIPS_SIGNATURE_SELFTEST_ECDSA.
* Enable new CONFIG_FIPS_SIGNATURE_SELFTEST_RSA.
* extcon: max8997: select IRQ_DOMAIN instead of depending on it (git-fixes).
* fast_dput(): handle underflows gracefully (git-fixes)
* fat: fix uninitialized field in nostale filehandles (git-fixes)
* fbdev: fix incorrect address computation in deferred IO (git-fixes).
* fbdev: savage: Handle err return when savagefb_check_var failed (git-fixes).
* fbdev: sh7760fb: allow modular build (git-fixes).
* fbdev: shmobile: fix snprintf truncation (git-fixes).
* fbdev: sisfb: hide unused variables (git-fixes).
* fbdev: viafb: fix typo in hw_bitblt_1 and hw_bitblt_2 (stable-fixes).
* fbmon: prevent division by zero in fb_videomode_from_videomode() (stable-
fixes).
* firewire: core: use long bus reset on gap count error (stable-fixes).
* firewire: ohci: mask bus reset interrupts between ISR and bottom half
(stable-fixes).
* firmware: arm_scmi: Make raw debugfs entries non-seekable (git-fixes).
* firmware: dmi-id: add a release callback function (git-fixes).
* firmware: raspberrypi: Use correct device for DMA mappings (git-fixes).
* firmware: tegra: bpmp: Return directly after a failed kzalloc() in
get_filename() (stable-fixes).
* Fix a potential infinite loop in extract_user_to_sg() (git-fixes).
* Fix build errors due to new UIO_MEM_DMA_COHERENT mess (git-fixes).
* fs/9p: only translate RWX permissions for plain 9P2000 (git-fixes)
* fs/9p: translate O_TRUNC into OTRUNC (git-fixes)
* fs: Fix error checking for d_hash_and_lookup() (git-fixes)
* fs: indicate request originates from old mount API (git-fixes)
* fs: relax mount_setattr() permission checks (git-fixes)
* fsverity: skip PKCS#7 parser when keyring is empty (git-fixes)
* ftrace: Fix possible use-after-free issue in ftrace_location() (git-fixes).
* fuse: do not unhash root (bsc#1223946).
* fuse: fix root lookup with nonzero generation (bsc#1223945).
* geneve: fix header validation in geneve[6]_xmit_skb (git-fixes).
* geneve: make sure to pull inner header in geneve_rx() (git-fixes).
* gpio: cdev: check for NULL labels when sanitizing them for irqs (git-fixes).
* gpio: cdev: fix missed label sanitizing in debounce_setup() (git-fixes).
* gpio: cdev: sanitize the label before requesting the interrupt (stable-
fixes).
* gpio: crystalcove: Use -ENOTSUPP consistently (stable-fixes).
* gpiolib: cdev: fix uninitialised kfifo (git-fixes).
* gpiolib: cdev: relocate debounce_period_us from struct gpio_desc (stable-
fixes).
* gpiolib: swnode: Remove wrong header inclusion (git-fixes).
* gpio: tangier: Use correct type for the IRQ chip data (git-fixes).
* gpio: tegra186: Fix tegra186_gpio_is_accessible() check (git-fixes).
* gpio: wcove: Use -ENOTSUPP consistently (stable-fixes).
* gpu: host1x: Do not setup DMA for virtual devices (stable-fixes).
* gtp: fix use-after-free and null-ptr-deref in gtp_newlink() (git-fixes).
* HID: amd_sfh: Handle "no sensors" in PM operations (git-fixes).
* HID: i2c-hid: remove I2C_HID_READ_PENDING flag to prevent lock-up (git-
fixes).
* HID: input: avoid polling stylus battery on Chromebook Pompom (stable-
fixes).
* HID: intel-ish-hid: ipc: Add check for pci_alloc_irq_vectors (git-fixes).
* HID: intel-ish-hid: ipc: Fix dev_err usage with uninitialized dev->devc
(git-fixes).
* HID: logitech-dj: allow mice to use all types of reports (git-fixes).
* HID: multitouch: Add required quirk for Synaptics 0xcddc device (stable-
fixes).
* hwmon: (amc6821) add of_match table (stable-fixes).
* hwmon: (corsair-cpro) Protect ccp->wait_input_report with a spinlock (git-
fixes).
* hwmon: (corsair-cpro) Use a separate buffer for sending commands (git-
fixes).
* hwmon: (corsair-cpro) Use complete_all() instead of complete() in
ccp_raw_event() (git-fixes).
* hwmon: (intel-m10-bmc-hwmon) Fix multiplier for N6000 board power sensor
(git-fixes).
* hwmon: (lm70) fix links in doc and comments (git-fixes).
* hwmon: (pmbus/ucd9000) Increase delay from 250 to 500us (git-fixes).
* hwmon: (shtc1) Fix property misspelling (git-fixes).
* hwtracing: hisi_ptt: Move type check to the beginning of
hisi_ptt_pmu_event_init() (git-fixes).
* i2c: acpi: Unbind mux adapters before delete (git-fixes).
* i2c: cadence: Avoid fifo clear after start (git-fixes).
* i2c: pxa: hide unused icr_bits[] variable (git-fixes).
* i2c: smbus: fix NULL function pointer dereference (git-fixes).
* i2c: synquacer: Fix an error handling path in synquacer_i2c_probe() (git-
fixes).
* i3c: master: svc: change ENXIO to EAGAIN when IBI occurs during start frame
(git-fixes).
* i3c: master: svc: fix invalidate IBI type and miss call client IBI handler
(git-fixes).
* i40e: disable NAPI right after disabling irqs when handling xsk_pool (git-
fixes).
* i40e: Enforce software interrupt during busy-poll exit (git-fixes).
* i40e: Fix firmware version comparison function (git-fixes).
* i40e: fix i40e_count_filters() to count only active/new filters (git-fixes).
* i40e: Fix VF MAC filter removal (git-fixes).
* i40e: fix vf may be used uninitialized in this function warning (git-fixes).
* i915: make inject_virtual_interrupt() void (stable-fixes).
* IB/mlx5: Use __iowrite64_copy() for write combining stores (git-fixes)
* ice: fix enabling RX VLAN filtering (git-fixes).
* ice: fix memory corruption bug with suspend and rebuild (git-fixes).
* ice: fix stats being updated by way too large values (git-fixes).
* ice: fix typo in assignment (git-fixes).
* ice: fix uninitialized dplls mutex usage (git-fixes).
* ice: reconfig host after changing MSI-X on VF (git-fixes).
* ice: Refactor FW data type and fix bitmap casting issue (git-fixes).
* ice: reorder disabling IRQ and NAPI in ice_qp_dis (git-fixes).
* ice: use relative VSI index for VFs instead of PF VSI number (git-fixes).
* ice: virtchnl: stop pretending to support RSS over AQ or registers (git-
fixes).
* ida: make 'ida_dump' static (git-fixes).
* idma64: Do not try to serve interrupts when device is powered off (git-
fixes).
* idpf: disable local BH when scheduling napi for marker packets (git-fixes).
* idpf: extend tx watchdog timeout (bsc#1224137).
* idpf: fix kernel panic on unknown packet types (git-fixes).
* igb: extend PTP timestamp adjustments to i211 (git-fixes).
* igb: Fix missing time sync events (git-fixes).
* igc: avoid returning frame twice in XDP_REDIRECT (git-fixes).
* igc: Fix missing time sync events (git-fixes).
* igc: Remove stale comment about Tx timestamping (git-fixes).
* iio: accel: mxc4005: Interrupt handling fixes (git-fixes).
* iio: adc: stm32: Fixing err code to not indicate success (git-fixes).
* iio: core: Leave private pointer NULL when no private data supplied (git-
fixes).
* iio: dummy_evgen: remove Excess kernel-doc comments (git-fixes).
* iio: gts-helper: Fix division loop (git-fixes).
* iio:imu: adis16475: Fix sync mode setting (git-fixes).
* iio: pressure: dps310: support negative temperature values (git-fixes).
* iio: pressure: Fixes BME280 SPI driver data (git-fixes).
* inet_diag: annotate data-races around inet_diag_table[] (git-fixes).
* inet: frags: eliminate kernel-doc warning (git-fixes).
* init/main.c: Fix potential static_command_line memory overflow (git-fixes).
* init: open /initrd.image with O_LARGEFILE (stable-fixes).
* Input: allocate keycode for Display refresh rate toggle (stable-fixes).
* Input: cyapa - add missing input core locking to suspend/resume functions
(git-fixes).
* Input: gpio_keys_polled - suppress deferred probe error for gpio (stable-
fixes).
* Input: imagis - use FIELD_GET where applicable (stable-fixes).
* Input: ims-pcu - fix printf string overflow (git-fixes).
* Input: pm8xxx-vibrator - correct VIB_MAX_LEVELS calculation (git-fixes).
* Input: synaptics-rmi4 - fail probing if memory allocation for "phys" fails
(stable-fixes).
* input/touchscreen: imagis: Correct the maximum touch area value (stable-
fixes).
* Input: xpad - add additional HyperX Controller Identifiers (stable-fixes).
* Input: xpad - add support for Snakebyte GAMEPADs (stable-fixes).
* intel: legacy: Partial revert of field get conversion (git-fixes).
* interconnect: qcom: osm-l3: Replace custom implementation of COUNT_ARGS()
(git-fixes).
* interconnect: qcom: qcm2290: Fix mas_snoc_bimc QoS port assignment (git-
fixes).
* interconnect: qcom: sc8180x: Mark CO0 BCM keepalive (git-fixes).
* interconnect: qcom: sm8550: Enable sync_state (git-fixes).
* iomap: clear the per-folio dirty bits on all writeback failures (git-fixes)
* iommu/arm-smmu-v3: Check that the RID domain is S1 in SVA (git-fixes).
* iommu/dma: Force swiotlb_max_mapping_size on an untrusted device
(bsc#1224331)
* iommu/dma: Trace bounce buffer usage when mapping buffers (git-fixes).
* iommufd: Add missing IOMMUFD_DRIVER kconfig for the selftest (git-fixes).
* iommufd: Fix iopt_access_list_id overwrite bug (git-fixes).
* iommufd/iova_bitmap: Bounds check mapped::pages access (git-fixes).
* iommufd/iova_bitmap: Consider page offset for the pages to be pinned (git-
fixes).
* iommufd/iova_bitmap: Switch iova_bitmap::bitmap to an u8 array (git-fixes).
* iommufd: Reject non-zero data_type if no data_len is provided (git-fixes).
* iommu: Map reserved memory as cacheable if device is coherent (git-fixes).
* iommu/vt-d: Allocate local memory for page request queue (git-fixes).
* iommu/vt-d: Fix wrong use of pasid config (git-fixes).
* iommu/vt-d: Set SSADE when attaching to a parent with dirty tracking (git-
fixes).
* iommu/vt-d: Update iotlb in nested domain attach (git-fixes).
* ionic: set adminq irq affinity (git-fixes).
* io_uring: kabi cookie remove (bsc#1217384).
* ipv4: annotate data-races around fi->fib_dead (git-fixes).
* irqchip/alpine-msi: Fix off-by-one in allocation error path (git-fixes).
* irqchip/armada-370-xp: Suppress unused-function warning (git-fixes).
* irqchip/gic-v3-its: Do not assume vPE tables are preallocated (git-fixes).
* irqchip/gic-v3-its: Fix VSYNC referencing an unmapped VPE on GIC v4.1 (git-
fixes).
* irqchip/gic-v3-its: Prevent double free on error (git-fixes).
* irqchip/loongson-pch-msi: Fix off-by-one on allocation error path (git-
fixes).
* irqchip/mbigen: Do not use bus_get_dev_root() to find the parent (git-
fixes).
* irqchip/renesas-rzg2l: Add macro to retrieve TITSR register offset based on
register's index (stable-fixes).
* irqchip/renesas-rzg2l: Flush posted write in irq_eoi() (git-fixes).
* irqchip/renesas-rzg2l: Implement restriction when writing ISCR register
(stable-fixes).
* irqchip/renesas-rzg2l: Prevent spurious interrupts when setting trigger type
(git-fixes).
* irqchip/renesas-rzg2l: Rename rzg2l_irq_eoi() (stable-fixes).
* irqchip/renesas-rzg2l: Rename rzg2l_tint_eoi() (stable-fixes).
* ixgbe: avoid sleeping allocation in ixgbe_ipsec_vf_add_sa() (git-fixes).
* ixgbe: {dis, en}able irqs in ixgbe_txrx_ring_{dis, en}able (git-fixes).
* jffs2: prevent xattr node from overflowing the eraseblock (git-fixes).
* kABI: Adjust trace_iterator.wait_index (git-fixes).
* kABI fix of KVM: x86/pmu: Allow programming events that match unsupported
arch events (bsc#1225696).
* kABI fix of KVM: x86: Snapshot if a vCPU's vendor model is AMD vs. Intel
compatible (git-fixes).
* kabi fix of perf/x86/intel: Expose existence of callback support to KVM (git
fixes).
* kabi/severities: ignore brcmfmac-specific local symbols
* kabi/severities: ignore IMS functions They were dropped in previous patches.
Noone is supposed to use them.
* kabi/severities: ignore TAS2781 symbol drop, it's only locally used
* kabi/severities: ignore Wangxun ethernet driver local symbols
* kabi/severities: Remove mitigation-related symbols Those are used by the
core kernel to implement CPU vulnerabilities mitigation and are not expected
to be consumed by 3rd party users.
* kABI workaround for cs35l56 (git-fixes).
* kABI workaround for of driver changes (git-fixes).
* kasan: disable kasan_non_canonical_hook() for HW tags (git-fixes).
* kasan, fortify: properly rename memintrinsics (git-fixes).
* kasan: print the original fault addr when access invalid shadow (git-fixes).
* kasan/test: avoid gcc warning for intentional overflow (git-fixes).
* kbuild: Move -Wenum-{compare-conditional,enum-conversion} into W=1 (stable-
fixes).
* kconfig: fix infinite loop when expanding a macro at the end of file (git-
fixes).
* kexec: do syscore_shutdown() in kernel_kexec (git-fixes).
* KEYS: trusted: Do not use WARN when encode fails (git-fixes).
* KEYS: trusted: Fix memory leak in tpm2_key_encode() (git-fixes).
* kprobes: Fix possible use-after-free issue on kprobe registration (git-
fixes).
* kselftest: Add a ksft_perror() helper (stable-fixes).
* kunit/fortify: Fix mismatched kvalloc()/vfree() usage (git-fixes).
* KVM: nVMX: Clear EXIT_QUALIFICATION when injecting an EPT Misconfig (git-
fixes).
* KVM: s390: Check kvm pointer when testing KVM_CAP_S390_HPAGE_1M (git-fixes
bsc#1224790).
* KVM: SVM: Add support for allowing zero SEV ASIDs (git-fixes).
* KVM: SVM: Flush pages under kvm->lock to fix UAF in
svm_register_enc_region() (git-fixes).
* KVM: SVM: Use unsigned integers when dealing with ASIDs (git-fixes).
* KVM: VMX: Disable LBR virtualization if the CPU does not support LBR
callstacks (git-fixes).
* KVM: VMX: Report up-to-date exit qualification to userspace (git-fixes).
* KVM: x86: Allow, do not ignore, same-value writes to immutable MSRs (git-
fixes).
* KVM: x86: Fix broken debugregs ABI for 32 bit kernels (git-fixes).
* KVM: x86: Fully re-initialize supported_mce_cap on vendor module load (git-
fixes).
* KVM: x86: Introduce __kvm_get_hypervisor_cpuid() helper (git-fixes).
* KVM: x86: Mark target gfn of emulated atomic instruction as dirty (git-
fixes).
* KVM: x86/mmu: Do not force emulation of L2 accesses to non-APIC internal
slots (git-fixes).
* KVM: x86/mmu: Move private vs. shared check above slot validity checks (git-
fixes).
* KVM: x86/mmu: Restrict KVM_SW_PROTECTED_VM to the TDP MMU (git-fixes).
* KVM: x86/mmu: Write-protect L2 SPTEs in TDP MMU when clearing dirty status
(git-fixes).
* KVM: x86: Only set APICV_INHIBIT_REASON_ABSENT if APICv is enabled (git-
fixes).
* KVM: x86/pmu: Allow programming events that match unsupported arch events
(git-fixes).
* KVM: x86/pmu: Always treat Fixed counters as available when supported (git-
fixes).
* KVM: x86/pmu: Apply "fast" RDPMC only to Intel PMUs (git-fixes).
* KVM: x86/pmu: Disable support for adaptive PEBS (git-fixes).
* KVM: x86/pmu: Disallow "fast" RDPMC for architectural Intel PMUs (git-
fixes).
* KVM: x86/pmu: Do not ignore bits 31:30 for RDPMC index on AMD (git-fixes).
* KVM: x86/pmu: Do not mask LVTPC when handling a PMI on AMD platforms (git-
fixes).
* KVM: x86/pmu: Explicitly check NMI from guest to reducee false positives
(git-fixes).
* KVM: x86/pmu: Prioritize VMX interception over #GP on RDPMC due to bad index
(git-fixes).
* KVM: x86/pmu: Set enable bits for GP counters in PERF_GLOBAL_CTRL at "RESET"
(git-fixes).
* KVM: x86/pmu: Zero out PMU metadata on AMD if PMU is disabled (git-fixes).
* KVM: x86: Snapshot if a vCPU's vendor model is AMD vs. Intel compatible
(git-fixes).
* KVM: x86: Update KVM_SW_PROTECTED_VM docs to make it clear they're a WIP
(git-fixes).
* KVM: x86: Use actual kvm_cpuid.base for clearing KVM_FEATURE_PV_UNHALT (git-
fixes).
* KVM: x86/xen: fix recursive deadlock in timer injection (git-fixes).
* KVM: x86/xen: improve accuracy of Xen timers (git-fixes).
* KVM: x86/xen: inject vCPU upcall vector when local APIC is enabled (git-
fixes).
* KVM: x86/xen: remove WARN_ON_ONCE() with false positives in evtchn delivery
(git-fixes).
* leds: pwm: Disable PWM when going to suspend (git-fixes).
* libnvdimm: Fix ACPI_NFIT in BLK_DEV_PMEM help (jsc#PED-5853).
* libperf evlist: Avoid out-of-bounds access (git-fixes).
* libsubcmd: Fix parse-options memory leak (git-fixes).
* lib/test_hmm.c: handle src_pfns and dst_pfns allocation failure (git-fixes).
* livepatch: Fix missing newline character in klp_resolve_symbols()
(bsc#1223539).
* locks: fix KASAN: use-after-free in trace_event_raw_event_filelock_lock
(git-fixes)
* lsm: fix the logic in security_inode_getsecctx() (git-fixes).
* mac802154: fix llsec key resources release in mac802154_llsec_key_del (git-
fixes).
* maple_tree: fix mas_empty_area_rev() null pointer dereference (git-fixes).
* md: add a new helper rdev_has_badblock() (jsc#PED-7542).
* md: add a new helper reshape_interrupted() (jsc#PED-7542).
* md: changed the switch of RAID_VERSION to if (jsc#PED-7542).
* md: check mddev->pers before calling md_set_readonly() (jsc#PED-7542).
* md: clean up invalid BUG_ON in md_ioctl (jsc#PED-7542).
* md: clean up openers check in do_md_stop() and md_set_readonly()
(jsc#PED-7542).
* md/dm-raid: do not call md_reap_sync_thread() directly (jsc#PED-7542).
* md: Do not clear MD_CLOSING when the raid is about to stop (jsc#PED-7542).
* md: do not clear MD_RECOVERY_FROZEN for new dm-raid until resume
(jsc#PED-7542).
* md: export helper md_is_rdwr() (jsc#PED-7542).
* md: export helpers to stop sync_thread (jsc#PED-7542).
* md: factor out a helper to sync mddev (jsc#PED-7542).
* md: fix kmemleak of rdev->serial (jsc#PED-7542).
* md: get rdev->mddev with READ_ONCE() (jsc#PED-7542).
* md: merge the check of capabilities into md_ioctl_valid() (jsc#PED-7542).
* md: preserve KABI in struct md_personality (jsc#PED-7542).
* md/raid1-10: add a helper raid1_check_read_range() (jsc#PED-7542).
* md/raid1-10: factor out a new helper raid1_should_read_first()
(jsc#PED-7542).
* md/raid1: factor out choose_bb_rdev() from read_balance() (jsc#PED-7542).
* md/raid1: factor out choose_slow_rdev() from read_balance() (jsc#PED-7542).
* md/raid1: factor out helpers to add rdev to conf (jsc#PED-7542).
* md/raid1: factor out helpers to choose the best rdev from read_balance()
(jsc#PED-7542).
* md/raid1: factor out read_first_rdev() from read_balance() (jsc#PED-7542).
* md/raid1: factor out the code to manage sequential IO (jsc#PED-7542).
* md/raid1: fix choose next idle in read_balance() (jsc#PED-7542).
* md/raid1: record nonrot rdevs while adding/removing rdevs to conf
(jsc#PED-7542).
* md: remove redundant check of 'mddev->sync_thread' (jsc#PED-7542).
* md: remove redundant md_wakeup_thread() (jsc#PED-7542).
* md: return directly before setting did_set_md_closing (jsc#PED-7542).
* md: sync blockdev before stopping raid or setting readonly (jsc#PED-7542).
* md: use RCU lock to protect traversal in md_spares_need_change()
(jsc#PED-7542).
* media: atomisp: ssh_css: Fix a null-pointer dereference in
load_video_binaries (git-fixes).
* media: cadence: csi2rx: use match fwnode for media link (git-fixes).
* media: cec: core: remove length check of Timer Status (stable-fixes).
* media: dt-bindings: ovti,ov2680: Fix the power supply names (git-fixes).
* media: flexcop-usb: fix sanity check of bNumEndpoints (git-fixes).
* media: i2c: et8ek8: Do not strip remove function when driver is builtin
(git-fixes).
* media: ipu3-cio2: Request IRQ earlier (git-fixes).
* media: mc: Fix flags handling when creating pad links (stable-fixes).
* media: mc: Fix graph walk in media_pipeline_start (git-fixes).
* media: mc: mark the media devnode as registered from the, start (git-fixes).
* media: mc: Rename pad variable to clarify intent (stable-fixes).
* media: ngene: Add dvb_ca_en50221_init return value check (git-fixes).
* media: rcar-vin: work around -Wenum-compare-conditional warning (git-fixes).
* media: rkisp1: Fix IRQ handling due to shared interrupts (stable-fixes).
* media: sta2x11: fix irq handler cast (stable-fixes).
* media: stk1160: fix bounds checking in stk1160_copy_video() (git-fixes).
* media: sunxi: a83-mips-csi2: also select GENERIC_PHY (git-fixes).
* media: uvcvideo: Add quirk for Logitech Rally Bar (git-fixes).
* media: v4l2-subdev: Fix stream handling for crop API (git-fixes).
* media: v4l: Do not turn on privacy LED if streamon fails (git-fixes).
* mei: me: add arrow lake point H DID (stable-fixes).
* mei: me: add arrow lake point S DID (stable-fixes).
* mei: me: add lunar lake point M DID (stable-fixes).
* mei: me: disable RPL-S on SPS and IGN firmwares (git-fixes).
* mlxbf_gige: call request_irq() after NAPI initialized (git-fixes).
* mlxbf_gige: stop interface during shutdown (git-fixes).
* mlxbf_gige: stop PHY during open() error paths (git-fixes).
* mlxsw: Use refcount_t for reference counting (git-fixes).
* mmc: core: Add HS400 tuning in HS400es initialization (stable-fixes).
* mmc: core: Avoid negative index with array access (git-fixes).
* mmc: core: Initialize mmc_blk_ioc_data (git-fixes).
* mmc: davinci: Do not strip remove function when driver is builtin (git-
fixes).
* mmc: omap: fix broken slot switch lookup (git-fixes).
* mmc: omap: fix deferred probe (git-fixes).
* mmc: omap: restore original power up/down steps (git-fixes).
* mmc: sdhci_am654: Add ITAPDLYSEL in sdhci_j721e_4bit_set_clock (git-fixes).
* mmc: sdhci_am654: Add OTAP/ITAP delay enable (git-fixes).
* mmc: sdhci_am654: Add tuning algorithm for delay chain (git-fixes).
* mmc: sdhci_am654: Fix ITAPDLY for HS400 timing (git-fixes).
* mmc: sdhci_am654: Write ITAPDLY for DDR52 timing (git-fixes).
* mmc: sdhci-msm: pervent access to suspended controller (git-fixes).
* mmc: sdhci-omap: re-tuning is needed after a pm transition to support emmc
HS200 mode (git-fixes).
* mm_init kABI workaround (git-fixes).
* mm: memcg: do not periodically flush stats when memcg is disabled
(bsc#1222525).
* mm: memcg: use larger batches for proactive reclaim (bsc#1222522).
* mm,page_owner: check for null stack_record before bumping its refcount
(bsc#1222366).
* mm,page_owner: Defer enablement of static branch (bsc#1222366).
* mm,page_owner: drop unnecessary check (bsc#1222366).
* mm,page_owner: Fix accounting of pages when migrating (bsc#1222366).
* mm,page_owner: Fix printing of stack records (bsc#1222366).
* mm,page_owner: fix recursion (bsc#1222366).
* mm,page_owner: Fix refcount imbalance (bsc#1222366).
* mm: page_owner: fix wrong information in dump_page_owner (git-fixes).
* mm,page_owner: Update metadata for tail pages (bsc#1222366).
* mm/slab: make __free(kfree) accept error pointers (git-fixes).
* modpost: Add '.ltext' and '.ltext.*' to TEXT_SECTIONS (stable-fixes).
* mptcp: annotate data-races around msk->rmem_fwd_alloc (git-fixes).
* mptcp: fix bogus receive window shrinkage with multiple subflows (git-
fixes).
* mptcp: move __mptcp_error_report in protocol.c (git-fixes).
* mptcp: process pending subflow error on close (git-fixes).
* mptcp: Remove unnecessary test for __mptcp_init_sock() (git-fixes).
* mtd: core: Report error if first mtd_otp_size() call fails in
mtd_otp_nvmem_add() (git-fixes).
* mtd: diskonchip: work around ubsan link failure (stable-fixes).
* mtd: rawnand: hynix: fixed typo (git-fixes).
* mtd: spinand: Add support for 5-byte IDs (stable-fixes).
* net: add netdev_lockdep_set_classes() to virtual drivers (git-fixes).
* net: annotate data-races around sk->sk_bind_phc (git-fixes).
* net: annotate data-races around sk->sk_forward_alloc (git-fixes).
* net: annotate data-races around sk->sk_lingertime (git-fixes).
* net: annotate data-races around sk->sk_tsflags (git-fixes).
* net: bonding: remove kernel-doc comment marker (git-fixes).
* net: cfg802154: fix kernel-doc notation warnings (git-fixes).
* net: dsa: microchip: fix register write order in ksz8_ind_write8() (git-
fixes).
* net: dsa: mt7530: fix handling of all link-local frames (git-fixes).
* net: dsa: mt7530: fix link-local frames that ingress vlan filtering ports
(git-fixes).
* net: dsa: mt7530: prevent possible incorrect XTAL frequency selection (git-
fixes).
* net: dsa: mt7530: trap link-local frames regardless of ST Port State (git-
fixes).
* net: dsa: sja1105: Fix parameters order in sja1110_pcs_mdio_write_c45()
(git-fixes).
* net: ena: Fix incorrect descriptor free behavior (git-fixes).
* net: ena: Fix potential sign extension issue (git-fixes).
* net: ena: Move XDP code to its new files (git-fixes).
* net: ena: Pass ena_adapter instead of net_device to ena_xmit_common() (git-
fixes).
* net: ena: Remove ena_select_queue (git-fixes).
* net: ena: Set tx_info->xdpf value to NULL (git-fixes).
* net: ena: Use tx_ring instead of xdp_ring for XDP channel TX (git-fixes).
* net: ena: Wrong missing IO completions check order (git-fixes).
* net: ethernet: mtk_eth_soc: fix PPE hanging issue (git-fixes).
* net: ethernet: ti: cpsw: enable mac_managed_pm to fix mdio (git-fixes).
* net: fec: Set mac_managed_pm during probe (git-fixes).
* netfilter: nf_tables: disable toggling dormant table state more than once
(git-fixes).
* netfilter: nf_tables: uapi: Describe NFTA_RULE_CHAIN_ID (git-fixes).
* netfilter: nft_ct: fix l3num expectations with inet pseudo family (git-
fixes).
* netfilter: nft_set_rbtree: use read spinlock to avoid datapath contention
(git-fixes).
* net: hns3: fix index limit to support all queue stats (git-fixes).
* net: hns3: fix kernel crash when 1588 is received on HIP08 devices (git-
fixes).
* net: hns3: fix kernel crash when devlink reload during pf initialization
(git-fixes).
* net: hns3: fix port duplex configure error in IMP reset (git-fixes).
* net: hns3: fix wrong judgment condition issue (git-fixes).
* net: hns3: mark unexcuted loopback test result as UNEXECUTED (git-fixes).
* net: hns3: tracing: fix hclgevf trace event strings (git-fixes).
* net: ice: Fix potential NULL pointer dereference in ice_bridge_setlink()
(git-fixes).
* net: ks8851: Handle softirqs at the end of IRQ thread to fix hang (git-
fixes).
* net: ks8851: Inline ks8851_rx_skb() (git-fixes).
* net: ks8851: Queue RX packets in IRQ handler instead of disabling BHs (git-
fixes).
* net: lan743x: Add set RFE read fifo threshold for PCI1x1x chips (git-fixes).
* net: libwx: fix memory leak on free page (git-fixes).
* net: llc: fix kernel-doc notation warnings (git-fixes).
* net: ll_temac: platform_get_resource replaced by wrong function (git-fixes).
* net: mana: Fix Rx DMA datasize and skb_over_panic (git-fixes).
* net: mediatek: mtk_eth_soc: clear MAC_MCR_FORCE_LINK only when MAC is up
(git-fixes).
* net/mlx5: Correctly compare pkt reformat ids (git-fixes).
* net/mlx5e: Change the warning when ignore_flow_level is not supported (git-
fixes).
* net/mlx5e: Do not produce metadata freelist entries in Tx port ts WQE xmit
(git-fixes).
* net/mlx5e: Fix MACsec state loss upon state update in offload path (git-
fixes).
* net/mlx5e: Fix mlx5e_priv_init() cleanup flow (git-fixes).
* net/mlx5e: HTB, Fix inconsistencies with QoS SQs number (git-fixes).
* net/mlx5e: RSS, Block changing channels number when RXFH is configured (git-
fixes).
* net/mlx5e: RSS, Block XOR hash with over 128 channels (git-fixes).
* net/mlx5: E-switch, Change flow rule destination checking (git-fixes).
* net/mlx5: E-switch, store eswitch pointer before registering devlink_param
(git-fixes).
* net/mlx5e: Switch to using _bh variant of of spinlock API in port
timestamping NAPI poll context (git-fixes).
* net/mlx5e: Use a memory barrier to enforce PTP WQ xmit submission tracking
occurs after populating the metadata_map (git-fixes).
* net/mlx5: Fix fw reporter diagnose output (git-fixes).
* net/mlx5: Fix peer devlink set for SF representor devlink port (git-fixes).
* net/mlx5: Lag, restore buckets number to default after hash LAG deactivation
(git-fixes).
* net/mlx5: offset comp irq index in name by one (git-fixes).
* net/mlx5: Properly link new fs rules into the tree (git-fixes).
* net/mlx5: Register devlink first under devlink lock (git-fixes).
* net/mlx5: Restore mistakenly dropped parts in register devlink flow (git-
fixes).
* net/mlx5: SF, Stop waiting for FW as teardown was called (git-fixes).
* net: nfc: remove inappropriate attrs check (stable-fixes).
* net: NSH: fix kernel-doc notation warning (git-fixes).
* net: pcs: xpcs: Return EINVAL in the internal methods (git-fixes).
* net: phy: fix phy_read_poll_timeout argument type in genphy_loopback (git-
fixes).
* net: phy: micrel: Fix potential null pointer dereference (git-fixes).
* net: phy: micrel: lan8814: Fix when enabling/disabling 1-step timestamping
(git-fixes).
* net: phy: micrel: set soft_reset callback to genphy_soft_reset for KSZ8061
(git-fixes).
* net: phy: phy_device: Prevent nullptr exceptions on ISR (git-fixes).
* net: phy: phy_device: Prevent nullptr exceptions on ISR (stable-fixes).
* net: ravb: Always process TX descriptor ring (git-fixes).
* net: ravb: Let IP-specific receive function to interrogate descriptors (git-
fixes).
* net/smc: bugfix for smcr v2 server connect success statistic (git-fixes).
* net/smc: fix documentation of buffer sizes (git-fixes).
* net/smc: use smc_lgr_list.lock to protect smc_lgr_list.list iterate in
smcr_port_add (git-fixes).
* net: smsc95xx: add support for SYS TEC USB-SPEmodule1 (git-fixes).
* net: sparx5: Fix use after free inside sparx5_del_mact_entry (git-fixes).
* net: sparx5: fix wrong config being used when reconfiguring PCS (git-fixes).
* net: sparx5: flower: fix fragment flags handling (git-fixes).
* net: stmmac: dwmac-starfive: Add support for JH7100 SoC (git-fixes).
* net: stmmac: Fix incorrect dereference in interrupt handlers (git-fixes).
* net: stmmac: fix rx queue priority assignment (git-fixes).
* net: sunrpc: Fix an off by one in rpc_sockaddr2uaddr() (git-fixes).
* net: tcp: fix unexcepted socket die when snd_wnd is 0 (git-fixes).
* net: tls: fix returned read length with async decrypt (bsc#1221858).
* net: tls: fix use-after-free with partial reads and async (bsc#1221858).
* net: tls, fix WARNIING in __sk_msg_free (bsc#1221858).
* net: usb: ax88179_178a: avoid the interface always configured as random
address (git-fixes).
* net: usb: ax88179_178a: avoid writing the mac address before first reading
(git-fixes).
* net: usb: ax88179_178a: fix link status when link is set to down/up (git-
fixes).
* net: usb: ax88179_178a: stop lying about skb->truesize (git-fixes).
* net:usb:qmi_wwan: support Rolling modules (stable-fixes).
* net: usb: smsc95xx: stop lying about skb->truesize (git-fixes).
* net: usb: sr9700: stop lying about skb->truesize (git-fixes).
* net: Use sockaddr_storage for getsockopt(SO_PEERNAME) (git-fixes).
* net: veth: do not manipulate GRO when using XDP (git-fixes).
* net: wwan: t7xx: Split 64bit accesses to fix alignment issues (git-fixes).
* net/x25: fix incorrect parameter validation in the x25_getsockopt() function
(git-fixes).
* nfc: nci: Fix handling of zero-length payload packets in nci_rx_work() (git-
fixes).
* nfc: nci: Fix kcov check in nci_rx_work() (git-fixes).
* nfc: nci: Fix uninit-value in nci_dev_up and nci_ntf_packet (git-fixes).
* nfc: nci: Fix uninit-value in nci_rx_work (git-fixes).
* nf_conntrack: fix -Wunused-const-variable= (git-fixes).
* NFC: trf7970a: disable all regulators on removal (git-fixes).
* nfp: flower: handle acti_netdevs allocation failure (git-fixes).
* NFSD: change LISTXATTRS cookie encoding to big-endian (git-fixes).
* NFSD: Convert the callback workqueue to use delayed_work (git-fixes).
* nfsd: do not call locks_release_private() twice concurrently (git-fixes).
* nfsd: Fix a regression in nfsd_setattr() (git-fixes).
* NFSD: fix LISTXATTRS returning a short list with eof=TRUE (git-fixes).
* NFSD: fix LISTXATTRS returning more bytes than maxcount (git-fixes).
* NFSD: fix nfsd4_listxattr_validate_cookie (git-fixes).
* NFSD: Fix nfsd_clid_class use of __string_len() macro (git-fixes).
* NFSD: Reschedule CB operations when backchannel rpc_clnt is shut down (git-
fixes).
* NFSD: Reset cb_seq_status after NFS4ERR_DELAY (git-fixes).
* NFSD: Retransmit callbacks after client reconnects (git-fixes).
* nfsd: use __fput_sync() to avoid delayed closing of files (bsc#1223380
bsc#1217408).
* NFS: Fix an off by one in root_nfs_cat() (git-fixes).
* NFS: Fix nfs_netfs_issue_read() xarray locking for writeback interrupt (git-
fixes).
* nfs: fix panic when nfs4_ff_layout_prepare_ds() fails (git-fixes).
* NFS: Read unlock folio on nfs_page_create_from_folio() error (git-fixes).
* NFSv4.1/pnfs: fix NFS with TLS in pnfs (git-fixes).
* NFSv4.2: fix listxattr maximum XDR buffer size (git-fixes).
* NFSv4.2: fix nfs4_listxattr kernel BUG at mm/usercopy.c:102 (git-fixes).
* nilfs2: fix OOB in nilfs_set_de_type (git-fixes).
* nilfs2: fix out-of-range warning (git-fixes).
* nilfs2: fix potential bug in end_buffer_async_write (git-fixes).
* nilfs2: fix unexpected freezing of nilfs_segctor_sync() (git-fixes).
* nilfs2: fix use-after-free of timer for log writer thread (git-fixes).
* nilfs2: make superblock data array index computation sparse friendly (git-
fixes).
* nouveau/dmem: handle kcalloc() allocation failure (git-fixes).
* nouveau: fix devinit paths to only handle display on GSP (git-fixes).
* nouveau: fix function cast warning (git-fixes).
* nouveau: fix instmem race condition around ptr stores (git-fixes).
* nouveau/gsp: do not check devinit disable on GSP (git-fixes).
* nouveau: lock the client object tree (stable-fixes).
* nouveau: reset the bo resource bus info after an eviction (git-fixes).
* nouveau/uvmm: fix addr/range calcs for remap operations (git-fixes).
* nvdimm: make nvdimm_bus_type const (jsc#PED-5853).
* nvdimm/pmem: fix leak on dax_add_host() failure (jsc#PED-5853).
* nvdimm/pmem: Treat alloc_dax() -EOPNOTSUPP failure as non-fatal
(jsc#PED-5853).
* nvme-fc: do not wait in vain when unloading module (git-fixes).
* nvme: fix multipath batched completion accounting (git-fixes).
* nvme: fix reconnection fail due to reserved tag allocation (git-fixes).
* nvme: fix warn output about shared namespaces without CONFIG_NVME_MULTIPATH
(git-fixes).
* nvme-multipath: fix io accounting on failover (git-fixes).
* nvme-pci: Add quirk for broken MSIs (git-fixes).
* nvme-tcp: strict pdu pacing to avoid send stalls on TLS (bsc#1221858).
* nvmet-fc: abort command when there is no binding (git-fixes).
* nvmet-fc: avoid deadlock on delete association path (git-fixes).
* nvmet-fc: defer cleanup using RCU properly (git-fixes).
* nvmet-fc: hold reference on hostport match (git-fixes).
* nvmet-fcloop: swap the list_add_tail arguments (git-fixes).
* nvmet-fc: release reference on target port (git-fixes).
* nvmet-fc: take ref count on tgtport before delete assoc (git-fixes).
* nvmet: fix ns enable/disable possible hang (git-fixes).
* nvmet-tcp: fix nvme tcp ida memory leak (git-fixes).
* octeontx2-af: Add array index check (git-fixes).
* octeontx2-af: Fix devlink params (git-fixes).
* octeontx2-af: Fix issue with loading coalesced KPU profiles (git-fixes).
* octeontx2-af: Fix NIX SQ mode and BP config (git-fixes).
* Octeontx2-af: fix pause frame configuration in GMP mode (git-fixes).
* octeontx2-af: Use matching wake_up API variant in CGX command interface
(git-fixes).
* octeontx2-af: Use separate handlers for interrupts (git-fixes).
* octeontx2: Detect the mbox up or down message via register (git-fixes).
* octeontx2-pf: check negative error code in otx2_open() (git-fixes).
* octeontx2-pf: fix FLOW_DIS_IS_FRAGMENT implementation (git-fixes).
* octeontx2-pf: Fix transmit scheduler resource leak (git-fixes).
* octeontx2-pf: Send UP messages to VF only when VF is up (git-fixes).
* octeontx2-pf: Use default max_active works instead of one (git-fixes).
* octeontx2-pf: Wait till detach_resources msg is complete (git-fixes).
* of: dynamic: Synchronize of_changeset_destroy() with the devlink removals
(git-fixes).
* of: module: add buffer overflow check in of_modalias() (git-fixes).
* of: module: prevent NULL pointer dereference in vsnprintf() (stable-fixes).
* of: property: Add in-ports/out-ports support to of_graph_get_port_parent()
(stable-fixes).
* of: property: fix typo in io-channels (git-fixes).
* of: property: fw_devlink: Fix stupid bug in remote-endpoint parsing (git-
fixes).
* of: property: Improve finding the consumer of a remote-endpoint property
(git-fixes).
* of: property: Improve finding the supplier of a remote-endpoint property
(git-fixes).
* of: unittest: Fix compile in the non-dynamic case (git-fixes).
* overflow: Allow non-type arg to type_max() and type_min() (stable-fixes).
* PCI/AER: Block runtime suspend when handling errors (stable-fixes).
* PCI/ASPM: Use RMW accessors for changing LNKCTL (git-fixes).
* PCI: Delay after FLR of Solidigm P44 Pro NVMe (stable-fixes).
* PCI: Disable D3cold on Asus B1400 PCI-NVMe bridge (stable-fixes).
* PCI/DPC: Quirk PIO log size for Intel Raptor Lake Root Ports (stable-fixes).
* PCI/DPC: Use FIELD_GET() (stable-fixes).
* PCI: dwc: ep: Fix DBI access failure for drivers requiring refclk from host
(git-fixes).
* PCI/EDR: Align EDR_PORT_DPC_ENABLE_DSM with PCI Firmware r3.3 (git-fixes).
* PCI/EDR: Align EDR_PORT_LOCATE_DSM with PCI Firmware r3.3 (git-fixes).
* PCI: Execute quirk_enable_clear_retrain_link() earlier (stable-fixes).
* PCI: Fix typos in docs and comments (stable-fixes).
* PCI: hv: Fix ring buffer size calculation (git-fixes).
* PCI: Make link retraining use RMW accessors for changing LNKCTL (git-fixes).
* PCI/PM: Drain runtime-idle callbacks before driver removal (stable-fixes).
* PCI: qcom: Add support for sa8775p SoC (git-fixes).
* PCI: qcom: Disable ASPM L0s for sc8280xp, sa8540p and sa8295p (git-fixes).
* PCI: rockchip-ep: Remove wrong mask on subsys_vendor_id (git-fixes).
* PCI: rpaphp: Error out on busy status from get-sensor-state (bsc#1223369
ltc#205888).
* PCI: Simplify pcie_capability_clear_and_set_word() to ..._clear_word()
(stable-fixes).
* PCI: switchtec: Add support for PCIe Gen5 devices (stable-fixes).
* PCI: switchtec: Use normal comment style (stable-fixes).
* PCI: tegra194: Fix probe path for Endpoint mode (git-fixes).
* peci: linux/peci.h: fix Excess kernel-doc description warning (git-fixes).
* perf annotate: Fix annotation_calc_lines() to pass correct address to
get_srcline() (git-fixes).
* perf annotate: Get rid of duplicate --group option item (git-fixes).
* perf auxtrace: Fix multiple use of --itrace option (git-fixes).
* perf bench internals inject-build-id: Fix trap divide when collecting just
one DSO (git-fixes).
* perf bench uprobe: Remove lib64 from libc.so.6 binary path (git-fixes).
* perf bpf: Clean up the generated/copied vmlinux.h (git-fixes).
* perf daemon: Fix file leak in daemon_session__control (git-fixes).
* perf docs: Document bpf event modifier (git-fixes).
* perf evsel: Fix duplicate initialization of data->id in
evsel__parse_sample() (git-fixes).
* perf expr: Fix "has_event" function for metric style events (git-fixes).
* perf intel-pt: Fix unassigned instruction op (discovered by MemorySanitizer)
(git-fixes).
* perf jevents: Drop or simplify small integer values (git-fixes).
* perf list: fix short description for some cache events (git-fixes).
* perf lock contention: Add a missing NULL check (git-fixes).
* perf metric: Do not remove scale from counts (git-fixes).
* perf pmu: Count sys and cpuid JSON events separately (git fixes).
* perf pmu: Fix a potential memory leak in perf_pmu__lookup() (git-fixes).
* perf pmu: Treat the msr pmu as software (git-fixes).
* perf print-events: make is_event_supported() more robust (git-fixes).
* perf probe: Add missing libgen.h header needed for using basename() (git-
fixes).
* perf record: Check conflict between '\--timestamp-filename' option and pipe
mode before recording (git-fixes).
* perf record: Fix debug message placement for test consumption (git-fixes).
* perf record: Fix possible incorrect free in record__switch_output() (git-
fixes).
* perf report: Avoid SEGV in report__setup_sample_type() (git-fixes).
* perf sched timehist: Fix -g/--call-graph option failure (git-fixes).
* perf script: Show also errors for --insn-trace option (git-fixes).
* perf srcline: Add missed addr2line closes (git-fixes).
* perf stat: Avoid metric-only segv (git-fixes).
* perf stat: Do not display metric header for non-leader uncore events (git-
fixes).
* perf stat: Do not fail on metrics on s390 z/VM systems (git-fixes).
* perf symbols: Fix ownership of string in dso__load_vmlinux() (git-fixes).
* perf tests: Apply attributes to all events in object code reading test (git-
fixes).
* perf test shell arm_coresight: Increase buffer size for Coresight basic
tests (git-fixes).
* perf tests: Make data symbol test wait for perf to start (bsc#1220045).
* perf tests: Make "test data symbol" more robust on Neoverse N1 (git-fixes).
* perf tests: Skip data symbol test if buf1 symbol is missing (bsc#1220045).
* perf thread: Fixes to thread__new() related to initializing comm (git-
fixes).
* perf thread_map: Free strlist on normal path in thread_map__new_by_tid_str()
(git-fixes).
* perf top: Uniform the event name for the hybrid machine (git-fixes).
* perf top: Use evsel's cpus to replace user_requested_cpus (git-fixes).
* perf ui browser: Avoid SEGV on title (git fixes).
* perf ui browser: Do not save pointer to stack memory (git-fixes).
* perf vendor events amd: Add Zen 4 memory controller events (git-fixes).
* perf vendor events amd: Fix Zen 4 cache latency events (git-fixes).
* perf/x86/amd/core: Avoid register reset when CPU is dead (git-fixes).
* perf/x86/amd/lbr: Discard erroneous branch entries (git-fixes).
* perf/x86/amd/lbr: Use freeze based on availability (git-fixes).
* perf/x86: Fix out of range data (git-fixes).
* perf/x86/intel/ds: Do not clear ->pebs_data_cfg for the last PEBS event
(git-fixes).
* perf/x86/intel: Expose existence of callback support to KVM (git-fixes).
* phy: freescale: imx8m-pcie: fix pcie link-up instability (git-fixes).
* phy: marvell: a3700-comphy: Fix hardcoded array size (git-fixes).
* phy: marvell: a3700-comphy: Fix out of bounds read (git-fixes).
* phy: rockchip: naneng-combphy: Fix mux on rk3588 (git-fixes).
* phy: rockchip-snps-pcie3: fix bifurcation on rk3588 (git-fixes).
* phy: rockchip-snps-pcie3: fix clearing PHP_GRF_PCIESEL_CON bits (git-fixes).
* phy: ti: tusb1210: Resolve charger-det crash if charger psy is unregistered
(git-fixes).
* pinctrl: armada-37xx: remove an unused variable (git-fixes).
* pinctrl: baytrail: Fix selecting gpio pinctrl state (git-fixes).
* pinctrl: core: delete incorrect free in pinctrl_enable() (git-fixes).
* pinctrl: devicetree: fix refcount leak in pinctrl_dt_to_map() (git-fixes).
* pinctrl: mediatek: paris: Fix PIN_CONFIG_INPUT_SCHMITT_ENABLE readback (git-
fixes).
* pinctrl: mediatek: paris: Rework support for
PIN_CONFIG_{INPUT,OUTPUT}_ENABLE (git-fixes).
* pinctrl/meson: fix typo in PDM's pin name (git-fixes).
* pinctrl: pinctrl-aspeed-g6: Fix register offset for pinconf of GPIOR-T (git-
fixes).
* pinctrl: qcom: pinctrl-sm7150: Fix sdc1 and ufs special pins regs (git-
fixes).
* pinctrl: renesas: checker: Limit cfg reg enum checks to provided IDs
(stable-fixes).
* platform/chrome: cros_ec_uart: properly fix race condition (git-fixes).
* platform/x86/amd/pmc: Extend Framework 13 quirk to more BIOSes (stable-
fixes).
* platform/x86/intel-uncore-freq: Do not present root domain on error (git-
fixes).
* platform/x86: intel-vbtn: Update tablet mode switch at end of probe (git-
fixes).
* platform/x86: ISST: Add Granite Rapids-D to HPM CPU list (stable-fixes).
* platform/x86: touchscreen_dmi: Add an extra entry for a variant of the Chuwi
Vi8 tablet (stable-fixes).
* platform/x86: x86-android-tablets: Fix acer_b1_750_goodix_gpios name
(stable-fixes).
* platform/x86: xiaomi-wmi: Fix race condition when reporting key events (git-
fixes).
* PM / devfreq: Synchronize devfreq_monitor_[start/stop] (stable-fixes).
* PM: s2idle: Make sure CPUs will wakeup directly on resume (git-fixes).
* Port "certs: Add ECDSA signature verification self-test".
* Port "certs: Move RSA self-test data to separate file".
* powerpc: Avoid nmi_enter/nmi_exit in real mode interrupt (bsc#1221645
ltc#205739 bsc#1223191).
* powerpc/crypto/chacha-p10: Fix failure on non Power10 (bsc#1218205).
* powerpc/eeh: Permanently disable the removed device (bsc#1223991
ltc#205740).
* powerpc/hv-gpci: Fix the H_GET_PERF_COUNTER_INFO hcall return value checks
(git-fixes).
* powerpc/pseries/lparcfg: drop error message from guest name lookup
(bsc#1187716 ltc#193451 git-fixes).
* powerpc/pseries: make max polling consistent for longer H_CALLs
(bsc#1215199).
* powerpc/pseries/vio: Do not return ENODEV if node or compatible missing
(bsc#1220783).
* powerpc/uaccess: Fix build errors seen with GCC 13/14 (bsc#1194869).
* powerpc/uaccess: Use YZ asm constraint for ld (bsc#1194869).
* power: rt9455: hide unused rt9455_boost_voltage_values (git-fixes).
* power: supply: mt6360_charger: Fix of_match for usb-otg-vbus regulator (git-
fixes).
* ppdev: Add an error check in register_device (git-fixes).
* prctl: generalize PR_SET_MDWE support check to be per-arch (bsc#1225610).
* printk: Add this_cpu_in_panic() (bsc#1225607).
* printk: Adjust mapping for 32bit seq macros (bsc#1225607).
* printk: Avoid non-panic CPUs writing to ringbuffer (bsc#1225607).
* printk: Consolidate console deferred printing (bsc#1225607).
* printk: Disable passing console lock owner completely during panic()
(bsc#1225607).
* printk: Do not take console lock for console_flush_on_panic() (bsc#1225607).
* printk: For @suppress_panic_printk check for other CPU in panic
(bsc#1225607).
* printk: Keep non-panic-CPUs out of console lock (bsc#1225607).
* printk: Let no_printk() use _printk() (bsc#1225618).
* printk: nbcon: Relocate 32bit seq macros (bsc#1225607).
* printk: Reduce console_unblank() usage in unsafe scenarios (bsc#1225607).
* printk: Rename abandon_console_lock_in_panic() to other_cpu_in_panic()
(bsc#1225607).
* printk: ringbuffer: Clarify special lpos values (bsc#1225607).
* printk: ringbuffer: Cleanup reader terminology (bsc#1225607).
* printk: ringbuffer: Do not skip non-finalized records with prb_next_seq()
(bsc#1225607).
* printk: ringbuffer: Skip non-finalized records in panic (bsc#1225607).
* printk: Update @console_may_schedule in console_trylock_spinning()
(bsc#1225616).
* printk: Use prb_first_seq() as base for 32bit seq macros (bsc#1225607).
* printk: Wait for all reserved records with pr_flush() (bsc#1225607).
* proc/kcore: do not try to access unaccepted memory (git-fixes).
* pstore: inode: Convert mutex usage to guard(mutex) (stable-fixes).
* pstore: inode: Only d_invalidate() is needed (git-fixes).
* pstore/zone: Add a null pointer check to the psz_kmsg_read (stable-fixes).
* pwm: img: fix pwm clock lookup (git-fixes).
* qibfs: fix dentry leak (git-fixes)
* r8169: fix issue caused by buggy BIOS on certain boards with RTL8168d (git-
fixes).
* r8169: skip DASH fw status checks when DASH is disabled (git-fixes).
* random: handle creditable entropy from atomic process context (git-fixes).
* RAS/AMD/FMPM: Avoid NULL ptr deref in get_saved_records() (jsc#PED-7619).
* RAS/AMD/FMPM: Fix build when debugfs is not enabled (jsc#PED-7619).
* RAS/AMD/FMPM: Safely handle saved records of various sizes (jsc#PED-7619).
* RDMA/cm: add timeout to cm_destroy_id wait (git-fixes)
* RDMA/cma: Fix kmemleak in rdma_core observed during blktests nvme/rdma use
siw (git-fixes)
* RDMA/cm: Print the old state when cm_destroy_id gets timeout (git-fixes)
* RDMA/hns: Add max_ah and cq moderation capacities in query_device() (git-
fixes)
* RDMA/hns: Fix deadlock on SRQ async events. (git-fixes)
* RDMA/hns: Fix GMV table pagesize (git-fixes)
* RDMA/hns: Fix return value in hns_roce_map_mr_sg (git-fixes)
* RDMA/hns: Fix UAF for cq async event (git-fixes)
* RDMA/hns: Modify the print level of CQE error (git-fixes)
* RDMA/hns: Use complete parentheses in macros (git-fixes)
* RDMA/IPoIB: Fix format truncation compilation errors (git-fixes)
* RDMA/mana_ib: Fix bug in creation of dma regions (git-fixes).
* RDMA/mlx5: Adding remote atomic access flag to updatable flags (git-fixes)
* RDMA/mlx5: Change check for cacheable mkeys (git-fixes)
* RDMA/mlx5: Fix port number for counter query in multi-port configuration
(git-fixes)
* RDMA/mlx5: Uncacheable mkey has neither rb_key or cache_ent (git-fixes)
* RDMA/rxe: Allow good work requests to be executed (git-fixes)
* RDMA/rxe: Fix incorrect rxe_put in error path (git-fixes)
* RDMA/rxe: Fix seg fault in rxe_comp_queue_pkt (git-fixes)
* RDMA/rxe: Fix the problem "mutex_destroy missing" (git-fixes)
* README.BRANCH: Remove copy of branch name
* Reapply "drm/qxl: simplify qxl_fence_wait" (stable-fixes).
* regmap: Add regmap_read_bypassed() (git-fixes).
* regmap: kunit: Ensure that changed bytes are actually different (stable-
fixes).
* regmap: maple: Fix cache corruption in regcache_maple_drop() (git-fixes).
* regmap: maple: Fix uninitialized symbol 'ret' warnings (git-fixes).
* regulator: bd71828: Do not overwrite runtime voltages (git-fixes).
* regulator: change devm_regulator_get_enable_optional() stub to return Ok
(git-fixes).
* regulator: change stubbed devm_regulator_get_enable to return Ok (git-
fixes).
* regulator: core: fix debugfs creation regression (git-fixes).
* regulator: mt6360: De-capitalize devicetree regulator subnodes (git-fixes).
* regulator: tps65132: Add of_match table (stable-fixes).
* remoteproc: k3-r5: Do not allow core1 to power up before core0 via sysfs
(git-fixes).
* remoteproc: k3-r5: Jump to error handling labels in start/stop errors (git-
fixes).
* remoteproc: k3-r5: Wait for core0 power-up before powering up core1 (git-
fixes).
* remoteproc: mediatek: Make sure IPI buffer fits in L2TCM (git-fixes).
* remoteproc: stm32: Fix incorrect type assignment returned by
stm32_rproc_get_loaded_rsc_tablef (git-fixes).
* remoteproc: virtio: Fix wdg cannot recovery remote processor (git-fixes).
* Remove NTFSv3 from configs (bsc#1224429) References: bsc#1224429 comment#3
We only support fuse version of the NTFS-3g driver. Disable NTFSv3 from all
configs. This was enabled in d016c04d731 ("Bump to 6.4 kernel
(jsc#PED-4593)")
* Revert "ACPI: PM: Block ASUS B1400CEAE from suspend to idle by default"
(stable-fixes).
* Revert "ASoC: SOF: Intel: hda-dai-ops: only allocate/release streams for
first CPU DAI" (stable-fixes).
* Revert "ASoC: SOF: Intel: hda-dai-ops: reset device count for SoundWire
DAIs" (stable-fixes).
* Revert "cifs: reconnect work should have reference on server struct" (git-
fixes, bsc#1225172).
* Revert "drm/amd/amdgpu: Fix potential ioremap() memory leaks in
amdgpu_device_init()" (stable-fixes).
* Revert "drm/amd/display: Fix sending VSC (+ colorimetry) packets for DP/eDP
displays without PSR" (stable-fixes).
* Revert "drm/amdkfd: fix gfx_target_version for certain 11.0.3 devices"
(stable-fixes).
* Revert "drm/bridge: ti-sn65dsi83: Fix enable error path" (git-fixes).
* Revert "drm/nouveau/firmware: Fix SG_DEBUG error with nvkm_firmware_ctor()"
(stable-fixes).
* Revert "drm/qxl: simplify qxl_fence_wait" (git-fixes).
* Revert "iommu/amd: Enable PCI/IMS" (git-fixes).
* Revert "iommu/vt-d: Enable PCI/IMS" (git-fixes).
* Revert "net/mlx5: Block entering switchdev mode with ns inconsistency" (git-
fixes).
* Revert "net/mlx5e: Check the number of elements before walk TC rhashtable"
(git-fixes).
* Revert "PCI/MSI: Provide IMS (Interrupt Message Store) support" (git-fixes).
* Revert "PCI/MSI: Provide pci_ims_alloc/free_irq()" (git-fixes).
* Revert "PCI/MSI: Provide stubs for IMS functions" (git-fixes).
* Revert "selinux: introduce an initial SID for early boot processes"
(bsc#1208593) It caused a regression on ALP-current branch, kernel-obs-qa
build failed.
* Revert "usb: cdc-wdm: close race between read and workqueue" (git-fixes).
* Revert "usb: phy: generic: Get the vbus supply" (git-fixes).
* ring-buffer: Do not set shortest_full when full target is hit (git-fixes).
* ring-buffer: Fix a race between readers and resize checks (git-fixes).
* ring-buffer: Fix full_waiters_pending in poll (git-fixes).
* ring-buffer: Fix resetting of shortest_full (git-fixes).
* ring-buffer: Fix waking up ring buffer readers (git-fixes).
* ring-buffer: Make wake once of ring_buffer_wait() more robust (git-fixes).
* ring-buffer: use READ_ONCE() to read cpu_buffer->commit_page in concurrent
environment (git-fixes).
* ring-buffer: Use wait_event_interruptible() in ring_buffer_wait() (git-
fixes).
* rtc: mt6397: select IRQ_DOMAIN instead of depending on it (git-fixes).
* s390/bpf: Emit a barrier for BPF_FETCH instructions (git-fixes bsc#1224792).
* s390/cio: Ensure the copied buf is NUL terminated (git-fixes bsc#1223869).
* s390/cio: fix tracepoint subchannel type field (git-fixes bsc#1224793).
* s390/cpacf: Split and rework cpacf query functions (git-fixes bsc#1225133).
* s390/ipl: Fix incorrect initialization of len fields in nvme reipl block
(git-fixes bsc#1225136).
* s390/ipl: Fix incorrect initialization of nvme dump block (git-fixes
bsc#1225134).
* s390/ism: Properly fix receive message buffer allocation (git-fixes
bsc#1223590).
* s390/mm: Fix clearing storage keys for huge pages (git-fixes bsc#1223871).
* s390/mm: Fix storage key clearing for guest huge pages (git-fixes
bsc#1223872).
* s390/qeth: Fix kernel panic after setting hsuid (git-fixes bsc#1223874).
* s390/vdso: Add CFI for RA register to asm macro vdso_func (git-fixes
bsc#1223870).
* s390/vdso: drop '-fPIC' from LDFLAGS (git-fixes bsc#1223593).
* s390/vtime: fix average steal time calculation (git-fixes bsc#1221783).
* s390/zcrypt: fix reference counting on zcrypt card objects (git-fixes
bsc#1223592).
* sched/balancing: Rename newidle_balance() => sched_balance_newidle()
(bsc#1222173).
* sched/fair: Check root_domain::overload value before update (bsc#1222173).
* sched/fair: Use helper functions to access root_domain::overload
(bsc#1222173).
* sched/psi: Select KERNFS as needed (git-fixes).
* sched/topology: Optimize topology_span_sane() (bsc#1225053).
* scsi: bfa: Fix function pointer type mismatch for hcb_qe->cbfn (git-fixes).
* scsi: core: Consult supported VPD page list prior to fetching page (git-
fixes).
* scsi: core: Fix unremoved procfs host directory regression (git-fixes).
* scsi: csiostor: Avoid function pointer casts (git-fixes).
* scsi: hisi_sas: Modify the deadline for ata_wait_after_reset() (git-fixes).
* scsi: libsas: Add a helper sas_get_sas_addr_and_dev_type() (git-fixes).
* scsi: libsas: Fix disk not being scanned in after being removed (git-fixes).
* scsi: lpfc: Add support for 32 byte CDBs (bsc#1225842).
* scsi: lpfc: Change default logging level for unsolicited CT MIB commands
(bsc#1225842).
* scsi: lpfc: Change lpfc_hba hba_flag member into a bitmask (bsc#1225842).
Refresh: - patches.suse/lpfc-reintroduce-old-irq-probe-logic.patch
* scsi: lpfc: Clear deferred RSCN processing flag when driver is unloading
(bsc#1225842).
* scsi: lpfc: Copyright updates for 14.4.0.1 patches (bsc#1221777).
* scsi: lpfc: Copyright updates for 14.4.0.2 patches (bsc#1225842).
* scsi: lpfc: Correct size for cmdwqe/rspwqe for memset() (bsc#1221777).
* scsi: lpfc: Correct size for wqe for memset() (bsc#1221777).
* scsi: lpfc: Define lpfc_dmabuf type for ctx_buf ptr (bsc#1221777).
* scsi: lpfc: Define lpfc_nodelist type for ctx_ndlp ptr (bsc#1221777).
* scsi: lpfc: Define types in a union for generic void *context3 ptr
(bsc#1221777).
* scsi: lpfc: Introduce rrq_list_lock to protect active_rrq_list
(bsc#1225842).
* scsi: lpfc: Move NPIV's transport unregistration to after resource clean up
(bsc#1221777).
* scsi: lpfc: Release hbalock before calling lpfc_worker_wake_up()
(bsc#1221777).
* scsi: lpfc: Remove IRQF_ONESHOT flag from threaded IRQ handling (bsc#1221777
bsc#1217959).
* scsi: lpfc: Remove unnecessary log message in queuecommand path
(bsc#1221777).
* scsi: lpfc: Replace hbalock with ndlp lock in lpfc_nvme_unregister_port()
(bsc#1221777).
* scsi: lpfc: Update logging of protection type for T10 DIF I/O (bsc#1225842).
* scsi: lpfc: Update lpfc_ramp_down_queue_handler() logic (bsc#1221777).
* scsi: lpfc: Update lpfc version to 14.4.0.1 (bsc#1221777).
* scsi: lpfc: Update lpfc version to 14.4.0.2 (bsc#1225842).
* scsi: lpfc: Use a dedicated lock for ras_fwlog state (bsc#1221777).
* scsi: mpt3sas: Prevent sending diag_reset when the controller is ready (git-
fixes).
* scsi: mylex: Fix sysfs buffer lengths (git-fixes).
* scsi: qla2xxx: Change debug message during driver unload (bsc1221816).
* scsi: qla2xxx: Delay I/O Abort on PCI error (bsc1221816).
* scsi: qla2xxx: Fix command flush on cable pull (bsc1221816).
* scsi: qla2xxx: Fix double free of fcport (bsc1221816).
* scsi: qla2xxx: Fix double free of the ha->vp_map pointer (bsc1221816).
* scsi: qla2xxx: Fix N2N stuck connection (bsc1221816).
* scsi: qla2xxx: Fix off by one in qla_edif_app_getstats() (git-fixes).
* scsi: qla2xxx: NVME|FCP prefer flag not being honored (bsc1221816).
* scsi: qla2xxx: Prevent command send on chip reset (bsc1221816).
* scsi: qla2xxx: Split FCE|EFT trace control (bsc1221816).
* scsi: qla2xxx: Update manufacturer detail (bsc1221816).
* scsi: qla2xxx: Update version to 10.02.09.200-k (bsc1221816).
* scsi: sd: Unregister device if device_add_disk() failed in sd_probe() (git-
fixes).
* scsi: sg: Avoid race in error handling & drop bogus warn (git-fixes).
* scsi: sg: Avoid sg device teardown race (git-fixes).
* scsi: smartpqi: Fix disable_managed_interrupts (git-fixes).
* sctp: annotate data-races around sk->sk_wmem_queued (git-fixes).
* sdhci-of-dwcmshc: disable PM runtime in dwcmshc_remove() (git-fixes).
* selftests/binderfs: use the Makefile's rules, not Make's implicit rules
(git-fixes).
* selftests/bpf: add edge case backtracking logic test (bsc#1225756).
* selftests/bpf: precision tracking test for BPF_NEG and BPF_END
(bsc#1225756).
* selftests: default to host arch for LLVM builds (git-fixes).
* selftests: forwarding: Fix ping failure due to short timeout (git-fixes).
* selftests/ftrace: Fix event filter target_func selection (stable-fixes).
* selftests/ftrace: Limit length in subsystem-enable tests (git-fixes).
* selftests/kcmp: remove unused open mode (git-fixes).
* selftests: kselftest: Fix build failure with NOLIBC (git-fixes).
* selftests: kselftest: Mark functions that unconditionally call exit() as
__noreturn (git-fixes).
* selftests: net: bridge: increase IGMP/MLD exclude timeout membership
interval (git-fixes).
* selftests/net: convert test_bridge_neigh_suppress.sh to run it in unique
namespace (stable-fixes).
* selftests: net: kill smcrouted in the cleanup logic in amt.sh (git-fixes).
* selftests: net: move amt to socat for better compatibility (git-fixes).
* selftests/pidfd: Fix config for pidfd_setns_test (git-fixes).
* selftests/powerpc/dexcr: Add -no-pie to hashchk tests (git-fixes).
* selftests/powerpc/papr-vpd: Fix missing variable initialization
(jsc#PED-4486 git-fixes).
* selftests/resctrl: fix clang build failure: use LOCAL_HDRS (git-fixes).
* selftests: test_bridge_neigh_suppress.sh: Fix failures due to duplicate MAC
(git-fixes).
* selftests: timers: Convert posix_timers test to generate KTAP output
(stable-fixes).
* selftests: timers: Fix abs() warning in posix_timers test (git-fixes).
* selftests: timers: Fix posix_timers ksft_print_msg() warning (git-fixes).
* selftests: timers: Fix valid-adjtimex signed left-shift undefined behavior
(stable-fixes).
* selftests/timers/posix_timers: Reimplement check_timer_distribution() (git-
fixes).
* selftests: vxlan_mdb: Fix failures with old libnet (git-fixes).
* selinux: avoid dereference of garbage after mount failure (git-fixes).
* selinux: introduce an initial SID for early boot processes (bsc#1208593).
* serial: 8250_bcm7271: use default_mux_rate if possible (git-fixes).
* serial: 8250_dw: Revert: Do not reclock if already at correct rate (git-
fixes).
* serial: 8250_exar: Do not remove GPIO device on suspend (git-fixes).
* serial: 8520_mtk: Set RTS on shutdown for Rx in-band wakeup (git-fixes).
* serial: core: Fix atomicity violation in uart_tiocmget (git-fixes).
* serial: core: only stop transmit when HW fifo is empty (git-fixes).
* serial: kgdboc: Fix NMI-safety problems from keyboard reset code (stable-
fixes).
* serial: Lock console when calling into driver before registration (git-
fixes).
* serial: max3100: Fix bitwise types (git-fixes).
* serial: max3100: Lock port->lock when calling uart_handle_cts_change() (git-
fixes).
* serial: max310x: fix NULL pointer dereference in I2C instantiation (git-
fixes).
* serial: max310x: fix syntax error in IRQ error message (git-fixes).
* serial: mxs-auart: add spinlock around changing cts state (git-fixes).
* serial/pmac_zilog: Remove flawed mitigation for rx irq flood (git-fixes).
* serial: sc16is7xx: add proper sched.h include for sched_set_fifo() (git-
fixes).
* serial: sc16is7xx: fix bug in sc16is7xx_set_baud() when using prescaler
(git-fixes).
* serial: sh-sci: protect invalidating RXDMA on shutdown (git-fixes).
* serial: stm32: Reset .throttled state in .startup() (git-fixes).
* series.conf: cleanup Fix subsection header to silence series_insert error.
* SEV: disable SEV-ES DebugSwap by default (git-fixes).
* slimbus: core: Remove usage of the deprecated ida_simple_xx() API (git-
fixes).
* slimbus: qcom-ngd-ctrl: Add timeout for wait operation (git-fixes).
* smb3: show beginning time for per share stats (bsc#1225172).
* smb: client: ensure to try all targets when finding nested links
(bsc#1225172).
* smb: client: fix mount when dns_resolver key is not available (git-fixes,
bsc#1225172).
* smb: client: fix parsing of SMB3.1.1 POSIX create context (git-fixes,
bsc#1225172).
* smb: client: get rid of dfs code dep in namespace.c (bsc#1225172).
* smb: client: get rid of dfs naming in automount code (bsc#1225172).
* smb: client: introduce DFS_CACHE_TGT_LIST() (bsc#1225172).
* smb: client: reduce stack usage in cifs_try_adding_channels() (bsc#1225172).
* smb: client: remove extra @chan_count check in __cifs_put_smb_ses()
(bsc#1225172).
* smb: client: rename cifs_dfs_ref.c to namespace.c (bsc#1225172).
* soc: fsl: qbman: Always disable interrupts when taking cgr_lock (git-fixes).
* soc: fsl: qbman: Use raw spinlock for cgr_lock (git-fixes).
* sock_diag: annotate data-races around sock_diag_handlers[family] (git-
fixes).
* soc: mediatek: cmdq: Fix typo of CMDQ_JUMP_RELATIVE (git-fixes).
* soc: microchip: Fix POLARFIRE_SOC_SYS_CTRL input prompt (stable-fixes).
* soc: qcom: pmic_glink: do not traverse clients list without a lock (git-
fixes).
* soc: qcom: pmic_glink: Make client-lock non-sleeping (git-fixes).
* soc: qcom: pmic_glink: notify clients about the current state (git-fixes).
* soc: qcom: rpmh-rsc: Enhance check for VRM in-flight request (git-fixes).
* soundwire: amd: fix for wake interrupt handling for clockstop mode (git-
fixes).
* speakup: Avoid crash on very long word (git-fixes).
* speakup: Fix 8bit characters from direct synth (git-fixes).
* speakup: Fix sizeof() vs ARRAY_SIZE() bug (git-fixes).
* spi: Do not mark message DMA mapped when no transfer in it is (git-fixes).
* spi: fix null pointer dereference within spi_sync (git-fixes).
* spi: intel-pci: Add support for Lunar Lake-M SPI serial flash (stable-
fixes).
* spi: lm70llp: fix links in doc and comments (git-fixes).
* spi: lpspi: Avoid potential use-after-free in probe() (git-fixes).
* spi: mchp-pci1xxx: Fix a possible null pointer dereference in
pci1xxx_spi_probe (git-fixes).
* spi: microchip-core-qspi: fix setting spi bus clock rate (git-fixes).
* spi: spi-fsl-lpspi: remove redundant spi_controller_put call (git-fixes).
* spi: spi-mt65xx: Fix NULL pointer access in interrupt handler (git-fixes).
* spi: stm32: Do not warn about spurious interrupts (git-fixes).
* spi: xilinx: Fix kernel documentation in the xilinx_spi.h (git-fixes).
* spmi: hisi-spmi-controller: Do not override device identifier (git-fixes).
* staging: vc04_services: changen strncpy() to strscpy_pad() (stable-fixes).
* staging: vc04_services: fix information leak in create_component() (git-
fixes).
* staging: vt6655: Remove unused declaration of
RFbAL7230SelectChannelPostProcess() (git-fixes).
* stmmac: Clear variable when destroying workqueue (git-fixes).
* SUNRPC: fix a memleak in gss_import_v2_context (git-fixes).
* SUNRPC: fix some memleaks in gssx_dec_option_array (git-fixes).
* supported.conf: support tcp_dctcp module (jsc#PED-8111)
* swiotlb: extend buffer pre-padding to alloc_align_mask if necessary
(bsc#1224331)
* swiotlb: Fix alignment checks when both allocation and DMA masks are
(bsc#1224331)
* swiotlb: Fix double-allocation of slots due to broken alignment
(bsc#1224331)
* swiotlb: Honour dma_alloc_coherent() alignment in swiotlb_alloc()
(bsc#1224331)
* swiotlb: use the calculated number of areas (git-fixes).
* Temporarily drop KVM patch that caused a regression (bsc#1226158).
* thermal: devfreq_cooling: Fix perf state when calculate dfc res_util (git-
fixes).
* thermal/drivers/qcom/lmh: Check for SCM availability at probe (git-fixes).
* thermal/drivers/tsens: Fix null pointer dereference (git-fixes).
* thermal/of: Assume polling-delay(-passive) 0 when absent (stable-fixes).
* thunderbolt: Avoid notify PM core about runtime PM resume (stable-fixes).
* thunderbolt: Do not create DisplayPort tunnels on adapters of the same
router (git-fixes).
* thunderbolt: Fix wake configurations after device unplug (stable-fixes).
* thunderbolt: Introduce tb_path_deactivate_hop() (stable-fixes).
* thunderbolt: Introduce tb_port_reset() (stable-fixes).
* thunderbolt: Make tb_switch_reset() support Thunderbolt 2, 3 and USB4
routers (stable-fixes).
* thunderbolt: Reset only non-USB4 host routers in resume (git-fixes).
* tls: break out of main loop when PEEK gets a non-data record (bsc#1221858).
* tls: do not skip over different type records from the rx_list (bsc#1221858).
* tls: fix peeking with sync+async decryption (bsc#1221858).
* tls: stop recv() if initial process_rx_list gave us non-DATA (bsc#1221858).
* tools/arch/x86/intel_sdsi: Fix maximum meter bundle length (git-fixes).
* tools/arch/x86/intel_sdsi: Fix meter_certificate decoding (git-fixes).
* tools/arch/x86/intel_sdsi: Fix meter_show display (git-fixes).
* tools/latency-collector: Fix -Wformat-security compile warns (git-fixes).
* tools/power turbostat: Expand probe_intel_uncore_frequency() (bsc#1221765).
* tools/power/turbostat: Fix uncore frequency file string (bsc#1221765).
* tpm_tis_spi: Account for SPI header when allocating TPM SPI xfer buffer
(git-fixes).
* tracing: Add MODULE_DESCRIPTION() to preemptirq_delay_test (git-fixes).
* tracing: Have saved_cmdlines arrays all in one allocation (git-fixes).
* tracing: hide unused ftrace_event_id_fops (git-fixes).
* tracing/net_sched: Fix tracepoints that save qdisc_dev() as a string (git-
fixes).
* tracing: Remove precision vsnprintf() check from print event (git-fixes).
* tracing/ring-buffer: Fix wait_on_pipe() race (git-fixes).
* tracing: Use .flush() call to wake up readers (git-fixes).
* tty: n_gsm: fix missing receive state reset after mode switch (git-fixes).
* tty: n_gsm: fix possible out-of-bounds in gsm0_receive() (git-fixes).
* tty: serial: samsung: fix tx_empty() to return TIOCSER_TEMT (git-fixes).
* tty: vt: fix 20 vs 0x20 typo in EScsiignore (git-fixes).
* ubifs: dbg_check_idx_size: Fix kmemleak if loading znode failed (git-fixes).
* ubifs: fix sort function prototype (git-fixes).
* ubifs: Queue up space reservation tasks if retrying many times (git-fixes).
* ubifs: Remove unreachable code in dbg_check_ltab_lnum (git-fixes).
* ubifs: Set page uptodate in the correct place (git-fixes).
* Update config files. Disable N_GSM (jsc#PED-8240).
* Update patches.suse/nvme-ensure-disabling-pairs-with-unquiesce.patch
(jsc#PED-6252 jsc#PED-5728 jsc#PED-5062 jsc#PED-3535 bsc#1224534).
* usb: aqc111: stop lying about skb->truesize (git-fixes).
* usb: audio-v2: Correct comments for struct uac_clock_selector_descriptor
(git-fixes).
* usb: cdc-wdm: close race between read and workqueue (git-fixes).
* USB: core: Add hub_get() and hub_put() routines (stable-fixes).
* USB: core: Fix access violation during port device removal (git-fixes).
* USB: core: Fix deadlock in port "disable" sysfs attribute (stable-fixes).
* USB: core: Fix deadlock in usb_deauthorize_interface() (git-fixes).
* usb: Disable USB3 LPM at shutdown (stable-fixes).
* usb: dwc2: gadget: Fix exiting from clock gating (git-fixes).
* usb: dwc2: gadget: LPM flow fix (git-fixes).
* usb: dwc2: host: Fix dereference issue in DDMA completion flow (git-fixes).
* usb: dwc2: host: Fix hibernation flow (git-fixes).
* usb: dwc2: host: Fix ISOC flow in DDMA mode (git-fixes).
* usb: dwc2: host: Fix remote wakeup from hibernation (git-fixes).
* usb: dwc3-am62: Disable wakeup at remove (git-fixes).
* usb: dwc3-am62: fix module unload/reload behavior (git-fixes).
* usb: dwc3-am62: Rename private data (git-fixes).
* usb: dwc3: core: Prevent phy suspend during init (Git-fixes).
* usb: dwc3: pci: Drop duplicate ID (git-fixes).
* usb: dwc3: Properly set system wakeup (git-fixes).
* usb: dwc3: Wait unconditionally after issuing EndXfer command (git-fixes).
* usb: Fix regression caused by invalid ep0 maxpacket in virtual SuperSpeed
device (bsc#1220569).
* usb: fotg210: Add missing kernel doc description (git-fixes).
* usb: gadget: composite: fix OS descriptors w_value logic (git-fixes).
* usb: gadget: f_fs: Fix a race condition when processing setup packets (git-
fixes).
* usb: gadget: f_fs: Fix race between aio_cancel() and AIO request complete
(git-fixes).
* usb: gadget: f_ncm: Fix UAF ncm object at re-bind after usb ep transport
error (stable-fixes).
* usb: gadget: net2272: Use irqflags in the call to net2272_probe_fin (git-
fixes).
* usb: gadget: u_audio: Clear uac pointer when freed (git-fixes).
* usb: gadget: u_audio: Fix race condition use of controls after free during
gadget unbind (git-fixes).
* usb: gadget: uvc: mark incomplete frames with UVC_STREAM_ERR (stable-fixes).
* usb: gadget: uvc: use correct buffer size when parsing configfs lists (git-
fixes).
* usb: ohci: Prevent missed ohci interrupts (git-fixes).
* usb: phy: generic: Get the vbus supply (git-fixes).
* USB: serial: add device ID for VeriFone adapter (stable-fixes).
* USB: serial: cp210x: add ID for MGP Instruments PDS100 (stable-fixes).
* USB: serial: cp210x: add pid/vid for TDK NC0110013M and MM0110113M (stable-
fixes).
* USB: serial: ftdi_sio: add support for GMC Z216C Adapter IR-USB (stable-
fixes).
* USB: serial: option: add Fibocom FM135-GL variants (stable-fixes).
* USB: serial: option: add Lonsung U8300/U9300 product (stable-fixes).
* USB: serial: option: add MeiG Smart SLM320 product (stable-fixes).
* USB: serial: option: add Rolling RW101-GL and RW135-GL support (stable-
fixes).
* USB: serial: option: add support for Fibocom FM650/FG650 (stable-fixes).
* USB: serial: option: add Telit FN920C04 rmnet compositions (stable-fixes).
* USB: serial: option: support Quectel EM060K sub-models (stable-fixes).
* usb: sl811-hcd: only defined function checkdone if QUIRK2 is defined
(stable-fixes).
* usb: typec: Return size of buffer if pd_set operation succeeds (git-fixes).
* usb: typec: tcpci: add generic tcpci fallback compatible (stable-fixes).
* usb: typec: tcpm: Check for port partner validity before consuming it (git-
fixes).
* usb: typec: tcpm: clear pd_event queue in PORT_RESET (git-fixes).
* usb: typec: tcpm: Correct port source pdo array in pd_set callback (git-
fixes).
* usb: typec: tcpm: Correct the PDO counting in pd_set (git-fixes).
* usb: typec: tcpm: fix double-free issue in tcpm_port_unregister_pd() (git-
fixes).
* usb: typec: tcpm: unregister existing source caps before re-registration
(git-fixes).
* usb: typec: tipd: fix event checking for tps6598x (git-fixes).
* usb: typec: ucsi: Ack unsupported commands (stable-fixes).
* usb: typec: ucsi_acpi: Refactor and fix DELL quirk (git-fixes).
* usb: typec: ucsi: always register a link to USB PD device (git-fixes).
* usb: typec: ucsi: Check for notifications after init (git-fixes).
* usb: typec: ucsi: Clean up UCSI_CABLE_PROP macros (git-fixes).
* usb: typec: ucsi: Clear EVENT_PENDING under PPM lock (git-fixes).
* usb: typec: ucsi: Clear UCSI_CCI_RESET_COMPLETE before reset (stable-fixes).
* usb: typec: ucsi: displayport: Fix potential deadlock (git-fixes).
* usb: typec: ucsi: Fix connector check on init (git-fixes).
* usb: typec: ucsi: Fix race between typec_switch and role_switch (git-fixes).
* usb: typec: ucsi: Limit read size on v1.2 (stable-fixes).
* usb: typec: ucsi: simplify partner's PD caps registration (git-fixes).
* USB: UAS: return ENODEV when submit urbs fail with device not attached
(stable-fixes).
* usb: udc: remove warning when queue disabled ep (stable-fixes).
* usb: xhci: Add error handling in xhci_map_urb_for_dma (git-fixes).
* usb: xhci: correct return value in case of STS_HCE (git-fixes).
* usb: xhci: Implement xhci_handshake_check_state() helper.
* usb: xhci-plat: Do not include xhci.h (stable-fixes).
* vboxsf: Avoid an spurious warning if load_nls_xxx() fails (git-fixes).
* vboxsf: explicitly deny setlease attempts (stable-fixes).
* vdpa/mlx5: Allow CVQ size changes (git-fixes).
* vdpa_sim: reset must not run (git-fixes).
* veth: try harder when allocating queue memory (git-fixes).
* vhost: Add smp_rmb() in vhost_enable_notify() (git-fixes).
* vhost: Add smp_rmb() in vhost_vq_avail_empty() (git-fixes).
* virtio-blk: Ensure no requests in virtqueues before deleting vqs (git-
fixes).
* virtio_net: Do not send RSS key if it is not supported (git-fixes).
* virtio: treat alloc_dax() -EOPNOTSUPP failure as non-fatal (bsc#1223944).
* VMCI: Fix an error handling path in vmci_guest_probe_device() (git-fixes).
* VMCI: Fix possible memcpy() run-time warning in
vmci_datagram_invoke_guest_handler() (stable-fixes).
* vmci: prevent speculation leaks by sanitizing event in event_deliver() (git-
fixes).
* vsock/virtio: fix packet delivery to tap device (git-fixes).
* watchdog: bd9576: Drop "always-running" property (git-fixes).
* watchdog: cpu5wdt.c: Fix use-after-free bug caused by cpu5wdt_trigger (git-
fixes).
* watchdog: rti_wdt: Set min_hw_heartbeat_ms to accommodate a safety margin
(git-fixes).
* watchdog: sa1100: Fix PTR_ERR_OR_ZERO() vs NULL check in sa1100dog_probe()
(git-fixes).
* wifi: ar5523: enable proper endpoint verification (git-fixes).
* wifi: ath10k: Fix an error code problem in
ath10k_dbg_sta_write_peer_debug_trigger() (git-fixes).
* wifi: ath10k: poll service ready message before failing (git-fixes).
* wifi: ath10k: populate board data for WCN3990 (git-fixes).
* wifi: ath11k: decrease MHI channel buffer length to 8KB (bsc#1207948).
* wifi: ath11k: do not force enable power save on non-running vdevs (git-
fixes).
* wifi: ath12k: fix out-of-bound access of qmi_invoke_handler() (git-fixes).
* wifi: ath9k: fix LNA selection in ath_ant_try_scan() (stable-fixes).
* wifi: brcmfmac: Add DMI nvram filename quirk for ACEPC W5 Pro (stable-
fixes).
* wifi: brcmfmac: add per-vendor feature detection callback (stable-fixes).
* wifi: brcmfmac: cfg80211: Use WSEC to set SAE password (stable-fixes).
* wifi: brcmfmac: Demote vendor-specific attach/detach messages to info (git-
fixes).
* wifi: brcmfmac: pcie: handle randbuf allocation failure (git-fixes).
* wifi: carl9170: add a proper sanity check for endpoints (git-fixes).
* wifi: carl9170: re-fix fortified-memset warning (git-fixes).
* wifi: cfg80211: check A-MSDU format more carefully (stable-fixes).
* wifi: cfg80211: fix rdev_dump_mpp() arguments order (stable-fixes).
* wifi: ieee80211: fix ieee80211_mle_basic_sta_prof_size_ok() (git-fixes).
* wifi: iwlwifi: fw: do not always use FW dump trig (git-fixes).
* wifi: iwlwifi: fw: fix compile w/o CONFIG_ACPI (git-fixes).
* wifi: iwlwifi: mvm: allocate STA links only for active links (git-fixes).
* wifi: iwlwifi: mvm: fix active link counting during recovery (git-fixes).
* wifi: iwlwifi: mvm: fix check in iwl_mvm_sta_fw_id_mask (git-fixes).
* wifi: iwlwifi: mvm: guard against invalid STA ID on removal (stable-fixes).
* wifi: iwlwifi: mvm: include link ID when releasing frames (git-fixes).
* wifi: iwlwifi: mvm: init vif works only once (git-fixes).
* wifi: iwlwifi: mvm: remove old PASN station when adding a new one (git-
fixes).
* wifi: iwlwifi: mvm: return uid from iwl_mvm_build_scan_cmd (git-fixes).
* wifi: iwlwifi: mvm: rfi: fix potential response leaks (git-fixes).
* wifi: iwlwifi: mvm: select STA mask only for active links (git-fixes).
* wifi: iwlwifi: mvm: use correct address 3 in A-MSDU (stable-fixes).
* wifi: iwlwifi: pcie: Add the PCI device id for new hardware (stable-fixes).
* wifi: iwlwifi: pcie: fix RB status reading (stable-fixes).
* wifi: iwlwifi: read txq->read_ptr under lock (stable-fixes).
* wifi: iwlwifi: reconfigure TLC during HW restart (git-fixes).
* wifi: mac80211: check/clear fast rx for non-4addr sta VLAN changes (stable-
fixes).
* wifi: mac80211: clean up assignments to pointer cache (stable-fixes).
* wifi: mac80211: fix ieee80211_bss_*_flags kernel-doc (stable-fixes).
* wifi: mac80211: fix prep_connection error path (stable-fixes).
* wifi: mac80211: fix unaligned le16 access (git-fixes).
* wifi: mac80211_hwsim: init peer measurement result (git-fixes).
* wifi: mac80211: only call drv_sta_rc_update for uploaded stations (stable-
fixes).
* wifi: mac80211: remove link before AP (git-fixes).
* wifi: mt76: mt7603: add wpdma tx eof flag for PSE client reset (git-fixes).
* wifi: mt76: mt7603: fix tx queue of loopback packets (git-fixes).
* wifi: mt76: mt7915: workaround too long expansion sparse warnings (git-
fixes).
* wifi: mt76: mt7996: add locking for accessing mapped registers (stable-
fixes).
* wifi: mt76: mt7996: disable AMSDU for non-data frames (stable-fixes).
* wifi: mwl8k: initialize cmd->addr[] properly (git-fixes).
* wifi: nl80211: do not free NULL coalescing rule (git-fixes).
* wifi: rtw88: 8821cu: Fix connection failure (stable-fixes).
* wifi: rtw88: Add missing VID/PIDs for 8811CU and 8821CU (stable-fixes).
* wifi: rtw89: fix null pointer access when abort scan (stable-fixes).
* wifi: rtw89: pci: correct TX resource checking for PCI DMA channel of
firmware command (git-fixes).
* wifi: rtw89: pci: enlarge RX DMA buffer to consider size of RX descriptor
(stable-fixes).
* wireguard: netlink: access device through ctx instead of peer (git-fixes).
* wireguard: netlink: check for dangling peer via is_dead instead of empty
list (git-fixes).
* wireguard: receive: annotate data-race around receiving_counter.counter
(git-fixes).
* Workaround broken chacha crypto fallback (bsc#1218205).
* x86/bugs: Fix BHI retpoline check (git-fixes).
* x86/bugs: Fix the SRSO mitigation on Zen3/4 (git-fixes).
* x86/bugs: Remove default case for fully switched enums (git-fixes).
* x86/calldepth: Rename __x86_return_skl() to call_depth_return_thunk() (git-
fixes).
* x86/coco: Require seeding RNG with RDRAND on CoCo systems (git-fixes).
* x86/cpu: Add model number for Intel Arrow Lake mobile processor (git-fixes).
* x86/CPU/AMD: Add models 0x10-0x1f to the Zen5 range (git-fixes).
* x86/CPU/AMD: Update the Zenbleed microcode revisions (git-fixes).
* x86/cpufeatures: Fix dependencies for GFNI, VAES, and VPCLMULQDQ (git-
fixes).
* x86/efistub: Add missing boot_params for mixed mode compat entry (git-
fixes).
* x86/efistub: Call mixed mode boot services on the firmware's stack (git-
fixes).
* x86/fpu: Keep xfd_state in sync with MSR_IA32_XFD (git-fixes).
* x86/hyperv: Allow 15-bit APIC IDs for VTL platforms (git-fixes).
* x86/hyperv: Use per cpu initial stack for vtl context (git-fixes).
* x86/Kconfig: Remove CONFIG_AMD_MEM_ENCRYPT_ACTIVE_BY_DEFAULT (git-fixes).
* x86/kconfig: Select ARCH_WANT_FRAME_POINTERS again when
UNWINDER_FRAME_POINTER=y (git-fixes).
* x86/kvm/Kconfig: Have KVM_AMD_SEV select ARCH_HAS_CC_PLATFORM (git-fixes).
* x86/mce: Make sure to grab mce_sysfs_mutex in set_bank() (git-fixes).
* x86/nmi: Fix the inverse "in NMI handler" check (git-fixes).
* x86/nospec: Refactor UNTRAIN_RET[_*] (git-fixes).
* x86/pm: Work around false positive kmemleak report in msr_build_context()
(git-fixes).
* x86/purgatory: Switch to the position-independent small code model (git-
fixes).
* x86/rethunk: Use SYM_CODE_START[_LOCAL]_NOALIGN macros (git-fixes).
* x86/retpoline: Add NOENDBR annotation to the SRSO dummy return thunk (git-
fixes).
* x86/retpoline: Do the necessary fixup to the Zen3/4 srso return thunk for
!SRSO (git-fixes).
* x86/srso: Disentangle rethunk-dependent options (git-fixes).
* x86/srso: Fix unret validation dependencies (git-fixes).
* x86/srso: Improve i-cache locality for alias mitigation (git-fixes).
* x86/srso: Print actual mitigation if requested mitigation isn't possible
(git-fixes).
* x86/srso: Remove 'pred_cmd' label (git-fixes).
* x86/srso: Unexport untraining functions (git-fixes).
* x86/xen: Add some null pointer checking to smp.c (git-fixes).
* x86/xen: attempt to inflate the memory balloon on PVH (git-fixes).
* xdp, bonding: Fix feature flags when there are no slave devs anymore (git-
fixes).
* xen/events: drop xen_allocate_irqs_dynamic() (git-fixes).
* xen/events: fix error code in xen_bind_pirq_msi_to_irq() (git-fixes).
* xen/events: increment refcnt only if event channel is refcounted (git-
fixes).
* xen/events: modify internal [un]bind interfaces (git-fixes).
* xen/events: reduce externally visible helper functions (git-fixes).
* xen/events: remove some simple helpers from events_base.c (git-fixes).
* xen: evtchn: Allow shared registration of IRQ handers (git-fixes).
* xen/evtchn: avoid WARN() when unbinding an event channel (git-fixes).
* xen-netfront: Add missing skb_mark_for_recycle (git-fixes).
* xfs: add lock protection when remove perag from radix tree (git-fixes).
* xfs: allow extent free intents to be retried (git-fixes).
* xfs: fix perag leak when growfs fails (git-fixes).
* xfs: force all buffers to be written during btree bulk load (git-fixes).
* xfs: make xchk_iget safer in the presence of corrupt inode btrees (git-
fixes).
* xfs: pass the xfs_defer_pending object to iop_recover (git-fixes).
* xfs: recompute growfsrtfree transaction reservation while growing rt volume
(git-fixes).
* xfs: transfer recovered intent item ownership in ->iop_recover (git-fixes).
* xfs: use xfs_defer_pending objects to recover intent items (git-fixes).
* xhci: add helper that checks for unhandled events on a event ring (git-
fixes).
* xhci: remove unnecessary event_ring_deq parameter from xhci_handle_event()
(git-fixes).
* xhci: Simplify event ring dequeue pointer update for port change events
(git-fixes).
* xhci: simplify event ring dequeue tracking for transfer events (git-fixes).
## Special Instructions and Notes:
* Please reboot the system after installing this update.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-2203=1 openSUSE-SLE-15.6-2024-2203=1
* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-2203=1
* Development Tools Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2024-2203=1
* Legacy Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Legacy-15-SP6-2024-2203=1
* SUSE Linux Enterprise Live Patching 15-SP6
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2024-2203=1
Please note that this is the initial kernel livepatch without fixes itself, this
package is later updated by separate standalone kernel livepatch updates.
* SUSE Linux Enterprise High Availability Extension 15 SP6
zypper in -t patch SUSE-SLE-Product-HA-15-SP6-2024-2203=1
* SUSE Linux Enterprise Workstation Extension 15 SP6
zypper in -t patch SUSE-SLE-Product-WE-15-SP6-2024-2203=1
## Package List:
* openSUSE Leap 15.6 (noarch nosrc)
* kernel-docs-6.4.0-150600.23.7.4
* openSUSE Leap 15.6 (noarch)
* kernel-macros-6.4.0-150600.23.7.2
* kernel-devel-6.4.0-150600.23.7.2
* kernel-source-6.4.0-150600.23.7.2
* kernel-docs-html-6.4.0-150600.23.7.4
* kernel-source-vanilla-6.4.0-150600.23.7.2
* openSUSE Leap 15.6 (nosrc ppc64le x86_64)
* kernel-debug-6.4.0-150600.23.7.3
* openSUSE Leap 15.6 (ppc64le x86_64)
* kernel-debug-debugsource-6.4.0-150600.23.7.3
* kernel-debug-devel-6.4.0-150600.23.7.3
* kernel-debug-livepatch-devel-6.4.0-150600.23.7.3
* kernel-debug-devel-debuginfo-6.4.0-150600.23.7.3
* kernel-debug-debuginfo-6.4.0-150600.23.7.3
* openSUSE Leap 15.6 (x86_64)
* kernel-default-vdso-6.4.0-150600.23.7.3
* kernel-kvmsmall-vdso-debuginfo-6.4.0-150600.23.7.3
* kernel-default-vdso-debuginfo-6.4.0-150600.23.7.3
* kernel-kvmsmall-vdso-6.4.0-150600.23.7.3
* kernel-debug-vdso-6.4.0-150600.23.7.3
* kernel-debug-vdso-debuginfo-6.4.0-150600.23.7.3
* openSUSE Leap 15.6 (aarch64 ppc64le x86_64)
* kernel-kvmsmall-livepatch-devel-6.4.0-150600.23.7.3
* kernel-kvmsmall-debuginfo-6.4.0-150600.23.7.3
* kernel-kvmsmall-debugsource-6.4.0-150600.23.7.3
* kernel-default-base-rebuild-6.4.0-150600.23.7.3.150600.12.2.7
* kernel-kvmsmall-devel-debuginfo-6.4.0-150600.23.7.3
* kernel-kvmsmall-devel-6.4.0-150600.23.7.3
* kernel-default-base-6.4.0-150600.23.7.3.150600.12.2.7
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* cluster-md-kmp-default-debuginfo-6.4.0-150600.23.7.3
* kernel-default-livepatch-devel-6.4.0-150600.23.7.3
* kernel-default-debuginfo-6.4.0-150600.23.7.3
* reiserfs-kmp-default-6.4.0-150600.23.7.3
* kselftests-kmp-default-debuginfo-6.4.0-150600.23.7.3
* ocfs2-kmp-default-6.4.0-150600.23.7.3
* ocfs2-kmp-default-debuginfo-6.4.0-150600.23.7.3
* kernel-obs-build-6.4.0-150600.23.7.3
* kernel-obs-build-debugsource-6.4.0-150600.23.7.3
* kernel-default-extra-debuginfo-6.4.0-150600.23.7.3
* dlm-kmp-default-debuginfo-6.4.0-150600.23.7.3
* kernel-default-optional-6.4.0-150600.23.7.3
* kernel-default-devel-debuginfo-6.4.0-150600.23.7.3
* kernel-default-debugsource-6.4.0-150600.23.7.3
* kselftests-kmp-default-6.4.0-150600.23.7.3
* kernel-default-devel-6.4.0-150600.23.7.3
* kernel-default-extra-6.4.0-150600.23.7.3
* reiserfs-kmp-default-debuginfo-6.4.0-150600.23.7.3
* kernel-default-livepatch-6.4.0-150600.23.7.3
* gfs2-kmp-default-debuginfo-6.4.0-150600.23.7.3
* kernel-obs-qa-6.4.0-150600.23.7.1
* kernel-default-optional-debuginfo-6.4.0-150600.23.7.3
* dlm-kmp-default-6.4.0-150600.23.7.3
* kernel-syms-6.4.0-150600.23.7.1
* gfs2-kmp-default-6.4.0-150600.23.7.3
* cluster-md-kmp-default-6.4.0-150600.23.7.3
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 nosrc)
* kernel-default-6.4.0-150600.23.7.3
* openSUSE Leap 15.6 (aarch64 nosrc ppc64le x86_64)
* kernel-kvmsmall-6.4.0-150600.23.7.3
* openSUSE Leap 15.6 (ppc64le s390x x86_64)
* kernel-livepatch-SLE15-SP6_Update_1-debugsource-1-150600.13.3.7
* kernel-livepatch-6_4_0-150600_23_7-default-debuginfo-1-150600.13.3.7
* kernel-livepatch-6_4_0-150600_23_7-default-1-150600.13.3.7
* openSUSE Leap 15.6 (nosrc s390x)
* kernel-zfcpdump-6.4.0-150600.23.7.3
* openSUSE Leap 15.6 (s390x)
* kernel-zfcpdump-debugsource-6.4.0-150600.23.7.3
* kernel-zfcpdump-debuginfo-6.4.0-150600.23.7.3
* openSUSE Leap 15.6 (nosrc)
* dtb-aarch64-6.4.0-150600.23.7.1
* openSUSE Leap 15.6 (aarch64)
* reiserfs-kmp-64kb-debuginfo-6.4.0-150600.23.7.3
* dtb-rockchip-6.4.0-150600.23.7.1
* kernel-64kb-extra-6.4.0-150600.23.7.3
* ocfs2-kmp-64kb-debuginfo-6.4.0-150600.23.7.3
* gfs2-kmp-64kb-debuginfo-6.4.0-150600.23.7.3
* kernel-64kb-devel-debuginfo-6.4.0-150600.23.7.3
* kselftests-kmp-64kb-debuginfo-6.4.0-150600.23.7.3
* dlm-kmp-64kb-debuginfo-6.4.0-150600.23.7.3
* dtb-broadcom-6.4.0-150600.23.7.1
* dtb-sprd-6.4.0-150600.23.7.1
* kernel-64kb-debuginfo-6.4.0-150600.23.7.3
* ocfs2-kmp-64kb-6.4.0-150600.23.7.3
* dtb-amazon-6.4.0-150600.23.7.1
* dtb-allwinner-6.4.0-150600.23.7.1
* dtb-amlogic-6.4.0-150600.23.7.1
* dtb-lg-6.4.0-150600.23.7.1
* dtb-altera-6.4.0-150600.23.7.1
* dtb-socionext-6.4.0-150600.23.7.1
* dtb-mediatek-6.4.0-150600.23.7.1
* gfs2-kmp-64kb-6.4.0-150600.23.7.3
* dtb-amd-6.4.0-150600.23.7.1
* dtb-freescale-6.4.0-150600.23.7.1
* kernel-64kb-extra-debuginfo-6.4.0-150600.23.7.3
* kernel-64kb-optional-6.4.0-150600.23.7.3
* dtb-renesas-6.4.0-150600.23.7.1
* kselftests-kmp-64kb-6.4.0-150600.23.7.3
* cluster-md-kmp-64kb-6.4.0-150600.23.7.3
* kernel-64kb-devel-6.4.0-150600.23.7.3
* dtb-apple-6.4.0-150600.23.7.1
* dtb-arm-6.4.0-150600.23.7.1
* dlm-kmp-64kb-6.4.0-150600.23.7.3
* kernel-64kb-optional-debuginfo-6.4.0-150600.23.7.3
* dtb-exynos-6.4.0-150600.23.7.1
* dtb-xilinx-6.4.0-150600.23.7.1
* cluster-md-kmp-64kb-debuginfo-6.4.0-150600.23.7.3
* reiserfs-kmp-64kb-6.4.0-150600.23.7.3
* kernel-64kb-debugsource-6.4.0-150600.23.7.3
* kernel-64kb-livepatch-devel-6.4.0-150600.23.7.3
* dtb-cavium-6.4.0-150600.23.7.1
* dtb-nvidia-6.4.0-150600.23.7.1
* dtb-apm-6.4.0-150600.23.7.1
* dtb-qcom-6.4.0-150600.23.7.1
* dtb-marvell-6.4.0-150600.23.7.1
* dtb-hisilicon-6.4.0-150600.23.7.1
* openSUSE Leap 15.6 (aarch64 nosrc)
* kernel-64kb-6.4.0-150600.23.7.3
* Basesystem Module 15-SP6 (aarch64 nosrc)
* kernel-64kb-6.4.0-150600.23.7.3
* Basesystem Module 15-SP6 (aarch64)
* kernel-64kb-devel-6.4.0-150600.23.7.3
* kernel-64kb-debugsource-6.4.0-150600.23.7.3
* kernel-64kb-devel-debuginfo-6.4.0-150600.23.7.3
* kernel-64kb-debuginfo-6.4.0-150600.23.7.3
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64 nosrc)
* kernel-default-6.4.0-150600.23.7.3
* Basesystem Module 15-SP6 (aarch64 ppc64le x86_64)
* kernel-default-base-6.4.0-150600.23.7.3.150600.12.2.7
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* kernel-default-debuginfo-6.4.0-150600.23.7.3
* kernel-default-devel-6.4.0-150600.23.7.3
* kernel-default-devel-debuginfo-6.4.0-150600.23.7.3
* kernel-default-debugsource-6.4.0-150600.23.7.3
* Basesystem Module 15-SP6 (noarch)
* kernel-macros-6.4.0-150600.23.7.2
* kernel-devel-6.4.0-150600.23.7.2
* Basesystem Module 15-SP6 (nosrc s390x)
* kernel-zfcpdump-6.4.0-150600.23.7.3
* Basesystem Module 15-SP6 (s390x)
* kernel-zfcpdump-debugsource-6.4.0-150600.23.7.3
* kernel-zfcpdump-debuginfo-6.4.0-150600.23.7.3
* Development Tools Module 15-SP6 (noarch nosrc)
* kernel-docs-6.4.0-150600.23.7.4
* Development Tools Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* kernel-obs-build-debugsource-6.4.0-150600.23.7.3
* kernel-obs-build-6.4.0-150600.23.7.3
* kernel-syms-6.4.0-150600.23.7.1
* Development Tools Module 15-SP6 (noarch)
* kernel-source-6.4.0-150600.23.7.2
* Legacy Module 15-SP6 (nosrc)
* kernel-default-6.4.0-150600.23.7.3
* Legacy Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* kernel-default-debuginfo-6.4.0-150600.23.7.3
* reiserfs-kmp-default-6.4.0-150600.23.7.3
* reiserfs-kmp-default-debuginfo-6.4.0-150600.23.7.3
* kernel-default-debugsource-6.4.0-150600.23.7.3
* SUSE Linux Enterprise Live Patching 15-SP6 (nosrc)
* kernel-default-6.4.0-150600.23.7.3
* SUSE Linux Enterprise Live Patching 15-SP6 (ppc64le s390x x86_64)
* kernel-livepatch-SLE15-SP6_Update_1-debugsource-1-150600.13.3.7
* kernel-default-debugsource-6.4.0-150600.23.7.3
* kernel-default-livepatch-devel-6.4.0-150600.23.7.3
* kernel-livepatch-6_4_0-150600_23_7-default-1-150600.13.3.7
* kernel-default-debuginfo-6.4.0-150600.23.7.3
* kernel-livepatch-6_4_0-150600_23_7-default-debuginfo-1-150600.13.3.7
* kernel-default-livepatch-6.4.0-150600.23.7.3
* SUSE Linux Enterprise High Availability Extension 15 SP6 (aarch64 ppc64le
s390x x86_64)
* ocfs2-kmp-default-6.4.0-150600.23.7.3
* ocfs2-kmp-default-debuginfo-6.4.0-150600.23.7.3
* cluster-md-kmp-default-debuginfo-6.4.0-150600.23.7.3
* gfs2-kmp-default-debuginfo-6.4.0-150600.23.7.3
* kernel-default-debugsource-6.4.0-150600.23.7.3
* kernel-default-debuginfo-6.4.0-150600.23.7.3
* dlm-kmp-default-6.4.0-150600.23.7.3
* gfs2-kmp-default-6.4.0-150600.23.7.3
* dlm-kmp-default-debuginfo-6.4.0-150600.23.7.3
* cluster-md-kmp-default-6.4.0-150600.23.7.3
* SUSE Linux Enterprise High Availability Extension 15 SP6 (nosrc)
* kernel-default-6.4.0-150600.23.7.3
* SUSE Linux Enterprise Workstation Extension 15 SP6 (nosrc)
* kernel-default-6.4.0-150600.23.7.3
* SUSE Linux Enterprise Workstation Extension 15 SP6 (x86_64)
* kernel-default-debuginfo-6.4.0-150600.23.7.3
* kernel-default-extra-debuginfo-6.4.0-150600.23.7.3
* kernel-default-extra-6.4.0-150600.23.7.3
* kernel-default-debugsource-6.4.0-150600.23.7.3
## References:
* https://www.suse.com/security/cve/CVE-2023-0160.html
* https://www.suse.com/security/cve/CVE-2023-52434.html
* https://www.suse.com/security/cve/CVE-2023-52458.html
* https://www.suse.com/security/cve/CVE-2023-52472.html
* https://www.suse.com/security/cve/CVE-2023-52503.html
* https://www.suse.com/security/cve/CVE-2023-52616.html
* https://www.suse.com/security/cve/CVE-2023-52618.html
* https://www.suse.com/security/cve/CVE-2023-52631.html
* https://www.suse.com/security/cve/CVE-2023-52635.html
* https://www.suse.com/security/cve/CVE-2023-52640.html
* https://www.suse.com/security/cve/CVE-2023-52641.html
* https://www.suse.com/security/cve/CVE-2023-52645.html
* https://www.suse.com/security/cve/CVE-2023-52652.html
* https://www.suse.com/security/cve/CVE-2023-52653.html
* https://www.suse.com/security/cve/CVE-2023-52654.html
* https://www.suse.com/security/cve/CVE-2023-52655.html
* https://www.suse.com/security/cve/CVE-2023-52657.html
* https://www.suse.com/security/cve/CVE-2023-52658.html
* https://www.suse.com/security/cve/CVE-2023-52659.html
* https://www.suse.com/security/cve/CVE-2023-52660.html
* https://www.suse.com/security/cve/CVE-2023-52661.html
* https://www.suse.com/security/cve/CVE-2023-52662.html
* https://www.suse.com/security/cve/CVE-2023-52663.html
* https://www.suse.com/security/cve/CVE-2023-52664.html
* https://www.suse.com/security/cve/CVE-2023-52667.html
* https://www.suse.com/security/cve/CVE-2023-52669.html
* https://www.suse.com/security/cve/CVE-2023-52670.html
* https://www.suse.com/security/cve/CVE-2023-52671.html
* https://www.suse.com/security/cve/CVE-2023-52673.html
* https://www.suse.com/security/cve/CVE-2023-52674.html
* https://www.suse.com/security/cve/CVE-2023-52675.html
* https://www.suse.com/security/cve/CVE-2023-52676.html
* https://www.suse.com/security/cve/CVE-2023-52678.html
* https://www.suse.com/security/cve/CVE-2023-52679.html
* https://www.suse.com/security/cve/CVE-2023-52680.html
* https://www.suse.com/security/cve/CVE-2023-52681.html
* https://www.suse.com/security/cve/CVE-2023-52683.html
* https://www.suse.com/security/cve/CVE-2023-52685.html
* https://www.suse.com/security/cve/CVE-2023-52686.html
* https://www.suse.com/security/cve/CVE-2023-52687.html
* https://www.suse.com/security/cve/CVE-2023-52690.html
* https://www.suse.com/security/cve/CVE-2023-52691.html
* https://www.suse.com/security/cve/CVE-2023-52692.html
* https://www.suse.com/security/cve/CVE-2023-52693.html
* https://www.suse.com/security/cve/CVE-2023-52694.html
* https://www.suse.com/security/cve/CVE-2023-52695.html
* https://www.suse.com/security/cve/CVE-2023-52696.html
* https://www.suse.com/security/cve/CVE-2023-52697.html
* https://www.suse.com/security/cve/CVE-2023-52698.html
* https://www.suse.com/security/cve/CVE-2023-52771.html
* https://www.suse.com/security/cve/CVE-2023-52772.html
* https://www.suse.com/security/cve/CVE-2023-52860.html
* https://www.suse.com/security/cve/CVE-2023-52882.html
* https://www.suse.com/security/cve/CVE-2023-6238.html
* https://www.suse.com/security/cve/CVE-2023-7042.html
* https://www.suse.com/security/cve/CVE-2024-0639.html
* https://www.suse.com/security/cve/CVE-2024-21823.html
* https://www.suse.com/security/cve/CVE-2024-22099.html
* https://www.suse.com/security/cve/CVE-2024-23848.html
* https://www.suse.com/security/cve/CVE-2024-24861.html
* https://www.suse.com/security/cve/CVE-2024-25739.html
* https://www.suse.com/security/cve/CVE-2024-26601.html
* https://www.suse.com/security/cve/CVE-2024-26611.html
* https://www.suse.com/security/cve/CVE-2024-26614.html
* https://www.suse.com/security/cve/CVE-2024-26632.html
* https://www.suse.com/security/cve/CVE-2024-26638.html
* https://www.suse.com/security/cve/CVE-2024-26642.html
* https://www.suse.com/security/cve/CVE-2024-26643.html
* https://www.suse.com/security/cve/CVE-2024-26650.html
* https://www.suse.com/security/cve/CVE-2024-26654.html
* https://www.suse.com/security/cve/CVE-2024-26656.html
* https://www.suse.com/security/cve/CVE-2024-26657.html
* https://www.suse.com/security/cve/CVE-2024-26671.html
* https://www.suse.com/security/cve/CVE-2024-26673.html
* https://www.suse.com/security/cve/CVE-2024-26674.html
* https://www.suse.com/security/cve/CVE-2024-26679.html
* https://www.suse.com/security/cve/CVE-2024-26684.html
* https://www.suse.com/security/cve/CVE-2024-26685.html
* https://www.suse.com/security/cve/CVE-2024-26692.html
* https://www.suse.com/security/cve/CVE-2024-26704.html
* https://www.suse.com/security/cve/CVE-2024-26714.html
* https://www.suse.com/security/cve/CVE-2024-26726.html
* https://www.suse.com/security/cve/CVE-2024-26731.html
* https://www.suse.com/security/cve/CVE-2024-26733.html
* https://www.suse.com/security/cve/CVE-2024-26737.html
* https://www.suse.com/security/cve/CVE-2024-26739.html
* https://www.suse.com/security/cve/CVE-2024-26740.html
* https://www.suse.com/security/cve/CVE-2024-26742.html
* https://www.suse.com/security/cve/CVE-2024-26760.html
* https://www.suse.com/security/cve/CVE-2024-267600.html
* https://www.suse.com/security/cve/CVE-2024-26761.html
* https://www.suse.com/security/cve/CVE-2024-26764.html
* https://www.suse.com/security/cve/CVE-2024-26769.html
* https://www.suse.com/security/cve/CVE-2024-26772.html
* https://www.suse.com/security/cve/CVE-2024-26773.html
* https://www.suse.com/security/cve/CVE-2024-26774.html
* https://www.suse.com/security/cve/CVE-2024-26775.html
* https://www.suse.com/security/cve/CVE-2024-26783.html
* https://www.suse.com/security/cve/CVE-2024-26786.html
* https://www.suse.com/security/cve/CVE-2024-26791.html
* https://www.suse.com/security/cve/CVE-2024-26793.html
* https://www.suse.com/security/cve/CVE-2024-26794.html
* https://www.suse.com/security/cve/CVE-2024-26802.html
* https://www.suse.com/security/cve/CVE-2024-26805.html
* https://www.suse.com/security/cve/CVE-2024-26807.html
* https://www.suse.com/security/cve/CVE-2024-26815.html
* https://www.suse.com/security/cve/CVE-2024-26816.html
* https://www.suse.com/security/cve/CVE-2024-26822.html
* https://www.suse.com/security/cve/CVE-2024-26832.html
* https://www.suse.com/security/cve/CVE-2024-26836.html
* https://www.suse.com/security/cve/CVE-2024-26844.html
* https://www.suse.com/security/cve/CVE-2024-26846.html
* https://www.suse.com/security/cve/CVE-2024-26853.html
* https://www.suse.com/security/cve/CVE-2024-26854.html
* https://www.suse.com/security/cve/CVE-2024-26855.html
* https://www.suse.com/security/cve/CVE-2024-26856.html
* https://www.suse.com/security/cve/CVE-2024-26857.html
* https://www.suse.com/security/cve/CVE-2024-26858.html
* https://www.suse.com/security/cve/CVE-2024-26860.html
* https://www.suse.com/security/cve/CVE-2024-26861.html
* https://www.suse.com/security/cve/CVE-2024-26862.html
* https://www.suse.com/security/cve/CVE-2024-26866.html
* https://www.suse.com/security/cve/CVE-2024-26868.html
* https://www.suse.com/security/cve/CVE-2024-26870.html
* https://www.suse.com/security/cve/CVE-2024-26878.html
* https://www.suse.com/security/cve/CVE-2024-26881.html
* https://www.suse.com/security/cve/CVE-2024-26882.html
* https://www.suse.com/security/cve/CVE-2024-26883.html
* https://www.suse.com/security/cve/CVE-2024-26884.html
* https://www.suse.com/security/cve/CVE-2024-26885.html
* https://www.suse.com/security/cve/CVE-2024-26899.html
* https://www.suse.com/security/cve/CVE-2024-26900.html
* https://www.suse.com/security/cve/CVE-2024-26901.html
* https://www.suse.com/security/cve/CVE-2024-26903.html
* https://www.suse.com/security/cve/CVE-2024-26906.html
* https://www.suse.com/security/cve/CVE-2024-26909.html
* https://www.suse.com/security/cve/CVE-2024-26921.html
* https://www.suse.com/security/cve/CVE-2024-26922.html
* https://www.suse.com/security/cve/CVE-2024-26923.html
* https://www.suse.com/security/cve/CVE-2024-26925.html
* https://www.suse.com/security/cve/CVE-2024-26928.html
* https://www.suse.com/security/cve/CVE-2024-26932.html
* https://www.suse.com/security/cve/CVE-2024-26933.html
* https://www.suse.com/security/cve/CVE-2024-26934.html
* https://www.suse.com/security/cve/CVE-2024-26935.html
* https://www.suse.com/security/cve/CVE-2024-26937.html
* https://www.suse.com/security/cve/CVE-2024-26938.html
* https://www.suse.com/security/cve/CVE-2024-26940.html
* https://www.suse.com/security/cve/CVE-2024-26943.html
* https://www.suse.com/security/cve/CVE-2024-26945.html
* https://www.suse.com/security/cve/CVE-2024-26946.html
* https://www.suse.com/security/cve/CVE-2024-26948.html
* https://www.suse.com/security/cve/CVE-2024-26949.html
* https://www.suse.com/security/cve/CVE-2024-26950.html
* https://www.suse.com/security/cve/CVE-2024-26951.html
* https://www.suse.com/security/cve/CVE-2024-26957.html
* https://www.suse.com/security/cve/CVE-2024-26958.html
* https://www.suse.com/security/cve/CVE-2024-26960.html
* https://www.suse.com/security/cve/CVE-2024-26961.html
* https://www.suse.com/security/cve/CVE-2024-26962.html
* https://www.suse.com/security/cve/CVE-2024-26963.html
* https://www.suse.com/security/cve/CVE-2024-26964.html
* https://www.suse.com/security/cve/CVE-2024-26972.html
* https://www.suse.com/security/cve/CVE-2024-26973.html
* https://www.suse.com/security/cve/CVE-2024-26978.html
* https://www.suse.com/security/cve/CVE-2024-26981.html
* https://www.suse.com/security/cve/CVE-2024-26982.html
* https://www.suse.com/security/cve/CVE-2024-26983.html
* https://www.suse.com/security/cve/CVE-2024-26984.html
* https://www.suse.com/security/cve/CVE-2024-26986.html
* https://www.suse.com/security/cve/CVE-2024-26988.html
* https://www.suse.com/security/cve/CVE-2024-26989.html
* https://www.suse.com/security/cve/CVE-2024-26990.html
* https://www.suse.com/security/cve/CVE-2024-26991.html
* https://www.suse.com/security/cve/CVE-2024-26992.html
* https://www.suse.com/security/cve/CVE-2024-26993.html
* https://www.suse.com/security/cve/CVE-2024-26994.html
* https://www.suse.com/security/cve/CVE-2024-26995.html
* https://www.suse.com/security/cve/CVE-2024-26996.html
* https://www.suse.com/security/cve/CVE-2024-26997.html
* https://www.suse.com/security/cve/CVE-2024-26999.html
* https://www.suse.com/security/cve/CVE-2024-27000.html
* https://www.suse.com/security/cve/CVE-2024-27001.html
* https://www.suse.com/security/cve/CVE-2024-27002.html
* https://www.suse.com/security/cve/CVE-2024-27003.html
* https://www.suse.com/security/cve/CVE-2024-27004.html
* https://www.suse.com/security/cve/CVE-2024-27008.html
* https://www.suse.com/security/cve/CVE-2024-27013.html
* https://www.suse.com/security/cve/CVE-2024-27014.html
* https://www.suse.com/security/cve/CVE-2024-27022.html
* https://www.suse.com/security/cve/CVE-2024-27027.html
* https://www.suse.com/security/cve/CVE-2024-27028.html
* https://www.suse.com/security/cve/CVE-2024-27029.html
* https://www.suse.com/security/cve/CVE-2024-27030.html
* https://www.suse.com/security/cve/CVE-2024-27031.html
* https://www.suse.com/security/cve/CVE-2024-27036.html
* https://www.suse.com/security/cve/CVE-2024-27046.html
* https://www.suse.com/security/cve/CVE-2024-27056.html
* https://www.suse.com/security/cve/CVE-2024-27057.html
* https://www.suse.com/security/cve/CVE-2024-27062.html
* https://www.suse.com/security/cve/CVE-2024-27067.html
* https://www.suse.com/security/cve/CVE-2024-27080.html
* https://www.suse.com/security/cve/CVE-2024-27388.html
* https://www.suse.com/security/cve/CVE-2024-27389.html
* https://www.suse.com/security/cve/CVE-2024-27393.html
* https://www.suse.com/security/cve/CVE-2024-27395.html
* https://www.suse.com/security/cve/CVE-2024-27396.html
* https://www.suse.com/security/cve/CVE-2024-27398.html
* https://www.suse.com/security/cve/CVE-2024-27399.html
* https://www.suse.com/security/cve/CVE-2024-27400.html
* https://www.suse.com/security/cve/CVE-2024-27401.html
* https://www.suse.com/security/cve/CVE-2024-27405.html
* https://www.suse.com/security/cve/CVE-2024-27408.html
* https://www.suse.com/security/cve/CVE-2024-27410.html
* https://www.suse.com/security/cve/CVE-2024-27411.html
* https://www.suse.com/security/cve/CVE-2024-27412.html
* https://www.suse.com/security/cve/CVE-2024-27413.html
* https://www.suse.com/security/cve/CVE-2024-27416.html
* https://www.suse.com/security/cve/CVE-2024-27417.html
* https://www.suse.com/security/cve/CVE-2024-27418.html
* https://www.suse.com/security/cve/CVE-2024-27431.html
* https://www.suse.com/security/cve/CVE-2024-27432.html
* https://www.suse.com/security/cve/CVE-2024-27434.html
* https://www.suse.com/security/cve/CVE-2024-27435.html
* https://www.suse.com/security/cve/CVE-2024-27436.html
* https://www.suse.com/security/cve/CVE-2024-35784.html
* https://www.suse.com/security/cve/CVE-2024-35786.html
* https://www.suse.com/security/cve/CVE-2024-35788.html
* https://www.suse.com/security/cve/CVE-2024-35789.html
* https://www.suse.com/security/cve/CVE-2024-35790.html
* https://www.suse.com/security/cve/CVE-2024-35791.html
* https://www.suse.com/security/cve/CVE-2024-35794.html
* https://www.suse.com/security/cve/CVE-2024-35795.html
* https://www.suse.com/security/cve/CVE-2024-35796.html
* https://www.suse.com/security/cve/CVE-2024-35799.html
* https://www.suse.com/security/cve/CVE-2024-35800.html
* https://www.suse.com/security/cve/CVE-2024-35801.html
* https://www.suse.com/security/cve/CVE-2024-35803.html
* https://www.suse.com/security/cve/CVE-2024-35804.html
* https://www.suse.com/security/cve/CVE-2024-35806.html
* https://www.suse.com/security/cve/CVE-2024-35808.html
* https://www.suse.com/security/cve/CVE-2024-35809.html
* https://www.suse.com/security/cve/CVE-2024-35810.html
* https://www.suse.com/security/cve/CVE-2024-35811.html
* https://www.suse.com/security/cve/CVE-2024-35812.html
* https://www.suse.com/security/cve/CVE-2024-35813.html
* https://www.suse.com/security/cve/CVE-2024-35814.html
* https://www.suse.com/security/cve/CVE-2024-35815.html
* https://www.suse.com/security/cve/CVE-2024-35817.html
* https://www.suse.com/security/cve/CVE-2024-35819.html
* https://www.suse.com/security/cve/CVE-2024-35821.html
* https://www.suse.com/security/cve/CVE-2024-35822.html
* https://www.suse.com/security/cve/CVE-2024-35823.html
* https://www.suse.com/security/cve/CVE-2024-35824.html
* https://www.suse.com/security/cve/CVE-2024-35825.html
* https://www.suse.com/security/cve/CVE-2024-35828.html
* https://www.suse.com/security/cve/CVE-2024-35829.html
* https://www.suse.com/security/cve/CVE-2024-35830.html
* https://www.suse.com/security/cve/CVE-2024-35833.html
* https://www.suse.com/security/cve/CVE-2024-35834.html
* https://www.suse.com/security/cve/CVE-2024-35835.html
* https://www.suse.com/security/cve/CVE-2024-35836.html
* https://www.suse.com/security/cve/CVE-2024-35837.html
* https://www.suse.com/security/cve/CVE-2024-35838.html
* https://www.suse.com/security/cve/CVE-2024-35841.html
* https://www.suse.com/security/cve/CVE-2024-35842.html
* https://www.suse.com/security/cve/CVE-2024-35845.html
* https://www.suse.com/security/cve/CVE-2024-35847.html
* https://www.suse.com/security/cve/CVE-2024-35849.html
* https://www.suse.com/security/cve/CVE-2024-35850.html
* https://www.suse.com/security/cve/CVE-2024-35851.html
* https://www.suse.com/security/cve/CVE-2024-35852.html
* https://www.suse.com/security/cve/CVE-2024-35854.html
* https://www.suse.com/security/cve/CVE-2024-35860.html
* https://www.suse.com/security/cve/CVE-2024-35861.html
* https://www.suse.com/security/cve/CVE-2024-35862.html
* https://www.suse.com/security/cve/CVE-2024-35863.html
* https://www.suse.com/security/cve/CVE-2024-35864.html
* https://www.suse.com/security/cve/CVE-2024-35865.html
* https://www.suse.com/security/cve/CVE-2024-35866.html
* https://www.suse.com/security/cve/CVE-2024-35867.html
* https://www.suse.com/security/cve/CVE-2024-35868.html
* https://www.suse.com/security/cve/CVE-2024-35869.html
* https://www.suse.com/security/cve/CVE-2024-35870.html
* https://www.suse.com/security/cve/CVE-2024-35872.html
* https://www.suse.com/security/cve/CVE-2024-35875.html
* https://www.suse.com/security/cve/CVE-2024-35877.html
* https://www.suse.com/security/cve/CVE-2024-35878.html
* https://www.suse.com/security/cve/CVE-2024-35879.html
* https://www.suse.com/security/cve/CVE-2024-35883.html
* https://www.suse.com/security/cve/CVE-2024-35885.html
* https://www.suse.com/security/cve/CVE-2024-35887.html
* https://www.suse.com/security/cve/CVE-2024-35889.html
* https://www.suse.com/security/cve/CVE-2024-35891.html
* https://www.suse.com/security/cve/CVE-2024-35895.html
* https://www.suse.com/security/cve/CVE-2024-35901.html
* https://www.suse.com/security/cve/CVE-2024-35903.html
* https://www.suse.com/security/cve/CVE-2024-35904.html
* https://www.suse.com/security/cve/CVE-2024-35905.html
* https://www.suse.com/security/cve/CVE-2024-35907.html
* https://www.suse.com/security/cve/CVE-2024-35909.html
* https://www.suse.com/security/cve/CVE-2024-35911.html
* https://www.suse.com/security/cve/CVE-2024-35912.html
* https://www.suse.com/security/cve/CVE-2024-35914.html
* https://www.suse.com/security/cve/CVE-2024-35915.html
* https://www.suse.com/security/cve/CVE-2024-35916.html
* https://www.suse.com/security/cve/CVE-2024-35917.html
* https://www.suse.com/security/cve/CVE-2024-35921.html
* https://www.suse.com/security/cve/CVE-2024-35922.html
* https://www.suse.com/security/cve/CVE-2024-35924.html
* https://www.suse.com/security/cve/CVE-2024-35927.html
* https://www.suse.com/security/cve/CVE-2024-35928.html
* https://www.suse.com/security/cve/CVE-2024-35930.html
* https://www.suse.com/security/cve/CVE-2024-35931.html
* https://www.suse.com/security/cve/CVE-2024-35932.html
* https://www.suse.com/security/cve/CVE-2024-35933.html
* https://www.suse.com/security/cve/CVE-2024-35935.html
* https://www.suse.com/security/cve/CVE-2024-35936.html
* https://www.suse.com/security/cve/CVE-2024-35937.html
* https://www.suse.com/security/cve/CVE-2024-35938.html
* https://www.suse.com/security/cve/CVE-2024-35940.html
* https://www.suse.com/security/cve/CVE-2024-35943.html
* https://www.suse.com/security/cve/CVE-2024-35944.html
* https://www.suse.com/security/cve/CVE-2024-35945.html
* https://www.suse.com/security/cve/CVE-2024-35946.html
* https://www.suse.com/security/cve/CVE-2024-35947.html
* https://www.suse.com/security/cve/CVE-2024-35950.html
* https://www.suse.com/security/cve/CVE-2024-35951.html
* https://www.suse.com/security/cve/CVE-2024-35952.html
* https://www.suse.com/security/cve/CVE-2024-35953.html
* https://www.suse.com/security/cve/CVE-2024-35954.html
* https://www.suse.com/security/cve/CVE-2024-35955.html
* https://www.suse.com/security/cve/CVE-2024-35956.html
* https://www.suse.com/security/cve/CVE-2024-35958.html
* https://www.suse.com/security/cve/CVE-2024-35959.html
* https://www.suse.com/security/cve/CVE-2024-35960.html
* https://www.suse.com/security/cve/CVE-2024-35961.html
* https://www.suse.com/security/cve/CVE-2024-35963.html
* https://www.suse.com/security/cve/CVE-2024-35964.html
* https://www.suse.com/security/cve/CVE-2024-35965.html
* https://www.suse.com/security/cve/CVE-2024-35966.html
* https://www.suse.com/security/cve/CVE-2024-35967.html
* https://www.suse.com/security/cve/CVE-2024-35969.html
* https://www.suse.com/security/cve/CVE-2024-35971.html
* https://www.suse.com/security/cve/CVE-2024-35972.html
* https://www.suse.com/security/cve/CVE-2024-35973.html
* https://www.suse.com/security/cve/CVE-2024-35974.html
* https://www.suse.com/security/cve/CVE-2024-35975.html
* https://www.suse.com/security/cve/CVE-2024-35977.html
* https://www.suse.com/security/cve/CVE-2024-35978.html
* https://www.suse.com/security/cve/CVE-2024-35981.html
* https://www.suse.com/security/cve/CVE-2024-35982.html
* https://www.suse.com/security/cve/CVE-2024-35984.html
* https://www.suse.com/security/cve/CVE-2024-35986.html
* https://www.suse.com/security/cve/CVE-2024-35989.html
* https://www.suse.com/security/cve/CVE-2024-35990.html
* https://www.suse.com/security/cve/CVE-2024-35991.html
* https://www.suse.com/security/cve/CVE-2024-35992.html
* https://www.suse.com/security/cve/CVE-2024-35995.html
* https://www.suse.com/security/cve/CVE-2024-35997.html
* https://www.suse.com/security/cve/CVE-2024-35999.html
* https://www.suse.com/security/cve/CVE-2024-36002.html
* https://www.suse.com/security/cve/CVE-2024-36006.html
* https://www.suse.com/security/cve/CVE-2024-36007.html
* https://www.suse.com/security/cve/CVE-2024-36009.html
* https://www.suse.com/security/cve/CVE-2024-36011.html
* https://www.suse.com/security/cve/CVE-2024-36012.html
* https://www.suse.com/security/cve/CVE-2024-36013.html
* https://www.suse.com/security/cve/CVE-2024-36014.html
* https://www.suse.com/security/cve/CVE-2024-36015.html
* https://www.suse.com/security/cve/CVE-2024-36016.html
* https://www.suse.com/security/cve/CVE-2024-36018.html
* https://www.suse.com/security/cve/CVE-2024-36019.html
* https://www.suse.com/security/cve/CVE-2024-36020.html
* https://www.suse.com/security/cve/CVE-2024-36021.html
* https://www.suse.com/security/cve/CVE-2024-36025.html
* https://www.suse.com/security/cve/CVE-2024-36026.html
* https://www.suse.com/security/cve/CVE-2024-36029.html
* https://www.suse.com/security/cve/CVE-2024-36030.html
* https://www.suse.com/security/cve/CVE-2024-36032.html
* https://www.suse.com/security/cve/CVE-2024-36880.html
* https://www.suse.com/security/cve/CVE-2024-36885.html
* https://www.suse.com/security/cve/CVE-2024-36890.html
* https://www.suse.com/security/cve/CVE-2024-36891.html
* https://www.suse.com/security/cve/CVE-2024-36893.html
* https://www.suse.com/security/cve/CVE-2024-36894.html
* https://www.suse.com/security/cve/CVE-2024-36895.html
* https://www.suse.com/security/cve/CVE-2024-36896.html
* https://www.suse.com/security/cve/CVE-2024-36897.html
* https://www.suse.com/security/cve/CVE-2024-36898.html
* https://www.suse.com/security/cve/CVE-2024-36906.html
* https://www.suse.com/security/cve/CVE-2024-36918.html
* https://www.suse.com/security/cve/CVE-2024-36921.html
* https://www.suse.com/security/cve/CVE-2024-36922.html
* https://www.suse.com/security/cve/CVE-2024-36928.html
* https://www.suse.com/security/cve/CVE-2024-36930.html
* https://www.suse.com/security/cve/CVE-2024-36931.html
* https://www.suse.com/security/cve/CVE-2024-36936.html
* https://www.suse.com/security/cve/CVE-2024-36940.html
* https://www.suse.com/security/cve/CVE-2024-36941.html
* https://www.suse.com/security/cve/CVE-2024-36942.html
* https://www.suse.com/security/cve/CVE-2024-36944.html
* https://www.suse.com/security/cve/CVE-2024-36947.html
* https://www.suse.com/security/cve/CVE-2024-36949.html
* https://www.suse.com/security/cve/CVE-2024-36950.html
* https://www.suse.com/security/cve/CVE-2024-36951.html
* https://www.suse.com/security/cve/CVE-2024-36955.html
* https://www.suse.com/security/cve/CVE-2024-36959.html
* https://bugzilla.suse.com/show_bug.cgi?id=1012628
* https://bugzilla.suse.com/show_bug.cgi?id=1065729
* https://bugzilla.suse.com/show_bug.cgi?id=1181674
* https://bugzilla.suse.com/show_bug.cgi?id=1187716
* https://bugzilla.suse.com/show_bug.cgi?id=1193599
* https://bugzilla.suse.com/show_bug.cgi?id=1194869
* https://bugzilla.suse.com/show_bug.cgi?id=1207948
* https://bugzilla.suse.com/show_bug.cgi?id=1208593
* https://bugzilla.suse.com/show_bug.cgi?id=1209657
* https://bugzilla.suse.com/show_bug.cgi?id=1213573
* https://bugzilla.suse.com/show_bug.cgi?id=1214852
* https://bugzilla.suse.com/show_bug.cgi?id=1215199
* https://bugzilla.suse.com/show_bug.cgi?id=1216196
* https://bugzilla.suse.com/show_bug.cgi?id=1216358
* https://bugzilla.suse.com/show_bug.cgi?id=1216702
* https://bugzilla.suse.com/show_bug.cgi?id=1217169
* https://bugzilla.suse.com/show_bug.cgi?id=1217384
* https://bugzilla.suse.com/show_bug.cgi?id=1217408
* https://bugzilla.suse.com/show_bug.cgi?id=1217489
* https://bugzilla.suse.com/show_bug.cgi?id=1217750
* https://bugzilla.suse.com/show_bug.cgi?id=1217959
* https://bugzilla.suse.com/show_bug.cgi?id=1218205
* https://bugzilla.suse.com/show_bug.cgi?id=1218336
* https://bugzilla.suse.com/show_bug.cgi?id=1218447
* https://bugzilla.suse.com/show_bug.cgi?id=1218779
* https://bugzilla.suse.com/show_bug.cgi?id=1218917
* https://bugzilla.suse.com/show_bug.cgi?id=1219104
* https://bugzilla.suse.com/show_bug.cgi?id=1219170
* https://bugzilla.suse.com/show_bug.cgi?id=1219596
* https://bugzilla.suse.com/show_bug.cgi?id=1219623
* https://bugzilla.suse.com/show_bug.cgi?id=1219834
* https://bugzilla.suse.com/show_bug.cgi?id=1220021
* https://bugzilla.suse.com/show_bug.cgi?id=1220045
* https://bugzilla.suse.com/show_bug.cgi?id=1220120
* https://bugzilla.suse.com/show_bug.cgi?id=1220148
* https://bugzilla.suse.com/show_bug.cgi?id=1220328
* https://bugzilla.suse.com/show_bug.cgi?id=1220342
* https://bugzilla.suse.com/show_bug.cgi?id=1220428
* https://bugzilla.suse.com/show_bug.cgi?id=1220430
* https://bugzilla.suse.com/show_bug.cgi?id=1220569
* https://bugzilla.suse.com/show_bug.cgi?id=1220587
* https://bugzilla.suse.com/show_bug.cgi?id=1220783
* https://bugzilla.suse.com/show_bug.cgi?id=1220915
* https://bugzilla.suse.com/show_bug.cgi?id=1221044
* https://bugzilla.suse.com/show_bug.cgi?id=1221293
* https://bugzilla.suse.com/show_bug.cgi?id=1221303
* https://bugzilla.suse.com/show_bug.cgi?id=1221504
* https://bugzilla.suse.com/show_bug.cgi?id=1221612
* https://bugzilla.suse.com/show_bug.cgi?id=1221615
* https://bugzilla.suse.com/show_bug.cgi?id=1221635
* https://bugzilla.suse.com/show_bug.cgi?id=1221645
* https://bugzilla.suse.com/show_bug.cgi?id=1221649
* https://bugzilla.suse.com/show_bug.cgi?id=1221765
* https://bugzilla.suse.com/show_bug.cgi?id=1221777
* https://bugzilla.suse.com/show_bug.cgi?id=1221783
* https://bugzilla.suse.com/show_bug.cgi?id=1221816
* https://bugzilla.suse.com/show_bug.cgi?id=1221829
* https://bugzilla.suse.com/show_bug.cgi?id=1221830
* https://bugzilla.suse.com/show_bug.cgi?id=1221858
* https://bugzilla.suse.com/show_bug.cgi?id=1222048
* https://bugzilla.suse.com/show_bug.cgi?id=1222173
* https://bugzilla.suse.com/show_bug.cgi?id=1222264
* https://bugzilla.suse.com/show_bug.cgi?id=1222273
* https://bugzilla.suse.com/show_bug.cgi?id=1222294
* https://bugzilla.suse.com/show_bug.cgi?id=1222301
* https://bugzilla.suse.com/show_bug.cgi?id=1222303
* https://bugzilla.suse.com/show_bug.cgi?id=1222304
* https://bugzilla.suse.com/show_bug.cgi?id=1222307
* https://bugzilla.suse.com/show_bug.cgi?id=1222357
* https://bugzilla.suse.com/show_bug.cgi?id=1222366
* https://bugzilla.suse.com/show_bug.cgi?id=1222368
* https://bugzilla.suse.com/show_bug.cgi?id=1222371
* https://bugzilla.suse.com/show_bug.cgi?id=1222378
* https://bugzilla.suse.com/show_bug.cgi?id=1222385
* https://bugzilla.suse.com/show_bug.cgi?id=1222422
* https://bugzilla.suse.com/show_bug.cgi?id=1222426
* https://bugzilla.suse.com/show_bug.cgi?id=1222428
* https://bugzilla.suse.com/show_bug.cgi?id=1222437
* https://bugzilla.suse.com/show_bug.cgi?id=1222445
* https://bugzilla.suse.com/show_bug.cgi?id=1222459
* https://bugzilla.suse.com/show_bug.cgi?id=1222464
* https://bugzilla.suse.com/show_bug.cgi?id=1222489
* https://bugzilla.suse.com/show_bug.cgi?id=1222522
* https://bugzilla.suse.com/show_bug.cgi?id=1222525
* https://bugzilla.suse.com/show_bug.cgi?id=1222532
* https://bugzilla.suse.com/show_bug.cgi?id=1222557
* https://bugzilla.suse.com/show_bug.cgi?id=1222559
* https://bugzilla.suse.com/show_bug.cgi?id=1222563
* https://bugzilla.suse.com/show_bug.cgi?id=1222585
* https://bugzilla.suse.com/show_bug.cgi?id=1222596
* https://bugzilla.suse.com/show_bug.cgi?id=1222606
* https://bugzilla.suse.com/show_bug.cgi?id=1222608
* https://bugzilla.suse.com/show_bug.cgi?id=1222613
* https://bugzilla.suse.com/show_bug.cgi?id=1222615
* https://bugzilla.suse.com/show_bug.cgi?id=1222618
* https://bugzilla.suse.com/show_bug.cgi?id=1222622
* https://bugzilla.suse.com/show_bug.cgi?id=1222624
* https://bugzilla.suse.com/show_bug.cgi?id=1222627
* https://bugzilla.suse.com/show_bug.cgi?id=1222630
* https://bugzilla.suse.com/show_bug.cgi?id=1222635
* https://bugzilla.suse.com/show_bug.cgi?id=1222721
* https://bugzilla.suse.com/show_bug.cgi?id=1222727
* https://bugzilla.suse.com/show_bug.cgi?id=1222769
* https://bugzilla.suse.com/show_bug.cgi?id=1222771
* https://bugzilla.suse.com/show_bug.cgi?id=1222775
* https://bugzilla.suse.com/show_bug.cgi?id=1222777
* https://bugzilla.suse.com/show_bug.cgi?id=1222780
* https://bugzilla.suse.com/show_bug.cgi?id=1222782
* https://bugzilla.suse.com/show_bug.cgi?id=1222793
* https://bugzilla.suse.com/show_bug.cgi?id=1222799
* https://bugzilla.suse.com/show_bug.cgi?id=1222801
* https://bugzilla.suse.com/show_bug.cgi?id=1222968
* https://bugzilla.suse.com/show_bug.cgi?id=1223007
* https://bugzilla.suse.com/show_bug.cgi?id=1223011
* https://bugzilla.suse.com/show_bug.cgi?id=1223015
* https://bugzilla.suse.com/show_bug.cgi?id=1223020
* https://bugzilla.suse.com/show_bug.cgi?id=1223023
* https://bugzilla.suse.com/show_bug.cgi?id=1223024
* https://bugzilla.suse.com/show_bug.cgi?id=1223033
* https://bugzilla.suse.com/show_bug.cgi?id=1223034
* https://bugzilla.suse.com/show_bug.cgi?id=1223035
* https://bugzilla.suse.com/show_bug.cgi?id=1223038
* https://bugzilla.suse.com/show_bug.cgi?id=1223039
* https://bugzilla.suse.com/show_bug.cgi?id=1223041
* https://bugzilla.suse.com/show_bug.cgi?id=1223045
* https://bugzilla.suse.com/show_bug.cgi?id=1223046
* https://bugzilla.suse.com/show_bug.cgi?id=1223051
* https://bugzilla.suse.com/show_bug.cgi?id=1223052
* https://bugzilla.suse.com/show_bug.cgi?id=1223058
* https://bugzilla.suse.com/show_bug.cgi?id=1223060
* https://bugzilla.suse.com/show_bug.cgi?id=1223061
* https://bugzilla.suse.com/show_bug.cgi?id=1223076
* https://bugzilla.suse.com/show_bug.cgi?id=1223077
* https://bugzilla.suse.com/show_bug.cgi?id=1223111
* https://bugzilla.suse.com/show_bug.cgi?id=1223113
* https://bugzilla.suse.com/show_bug.cgi?id=1223138
* https://bugzilla.suse.com/show_bug.cgi?id=1223143
* https://bugzilla.suse.com/show_bug.cgi?id=1223187
* https://bugzilla.suse.com/show_bug.cgi?id=1223189
* https://bugzilla.suse.com/show_bug.cgi?id=1223190
* https://bugzilla.suse.com/show_bug.cgi?id=1223191
* https://bugzilla.suse.com/show_bug.cgi?id=1223198
* https://bugzilla.suse.com/show_bug.cgi?id=1223202
* https://bugzilla.suse.com/show_bug.cgi?id=1223285
* https://bugzilla.suse.com/show_bug.cgi?id=1223315
* https://bugzilla.suse.com/show_bug.cgi?id=1223338
* https://bugzilla.suse.com/show_bug.cgi?id=1223369
* https://bugzilla.suse.com/show_bug.cgi?id=1223380
* https://bugzilla.suse.com/show_bug.cgi?id=1223384
* https://bugzilla.suse.com/show_bug.cgi?id=1223390
* https://bugzilla.suse.com/show_bug.cgi?id=1223439
* https://bugzilla.suse.com/show_bug.cgi?id=1223462
* https://bugzilla.suse.com/show_bug.cgi?id=1223532
* https://bugzilla.suse.com/show_bug.cgi?id=1223539
* https://bugzilla.suse.com/show_bug.cgi?id=1223575
* https://bugzilla.suse.com/show_bug.cgi?id=1223590
* https://bugzilla.suse.com/show_bug.cgi?id=1223591
* https://bugzilla.suse.com/show_bug.cgi?id=1223592
* https://bugzilla.suse.com/show_bug.cgi?id=1223593
* https://bugzilla.suse.com/show_bug.cgi?id=1223625
* https://bugzilla.suse.com/show_bug.cgi?id=1223629
* https://bugzilla.suse.com/show_bug.cgi?id=1223633
* https://bugzilla.suse.com/show_bug.cgi?id=1223634
* https://bugzilla.suse.com/show_bug.cgi?id=1223637
* https://bugzilla.suse.com/show_bug.cgi?id=1223641
* https://bugzilla.suse.com/show_bug.cgi?id=1223643
* https://bugzilla.suse.com/show_bug.cgi?id=1223649
* https://bugzilla.suse.com/show_bug.cgi?id=1223650
* https://bugzilla.suse.com/show_bug.cgi?id=1223651
* https://bugzilla.suse.com/show_bug.cgi?id=1223652
* https://bugzilla.suse.com/show_bug.cgi?id=1223653
* https://bugzilla.suse.com/show_bug.cgi?id=1223654
* https://bugzilla.suse.com/show_bug.cgi?id=1223655
* https://bugzilla.suse.com/show_bug.cgi?id=1223660
* https://bugzilla.suse.com/show_bug.cgi?id=1223661
* https://bugzilla.suse.com/show_bug.cgi?id=1223664
* https://bugzilla.suse.com/show_bug.cgi?id=1223665
* https://bugzilla.suse.com/show_bug.cgi?id=1223666
* https://bugzilla.suse.com/show_bug.cgi?id=1223668
* https://bugzilla.suse.com/show_bug.cgi?id=1223669
* https://bugzilla.suse.com/show_bug.cgi?id=1223670
* https://bugzilla.suse.com/show_bug.cgi?id=1223671
* https://bugzilla.suse.com/show_bug.cgi?id=1223675
* https://bugzilla.suse.com/show_bug.cgi?id=1223677
* https://bugzilla.suse.com/show_bug.cgi?id=1223678
* https://bugzilla.suse.com/show_bug.cgi?id=1223686
* https://bugzilla.suse.com/show_bug.cgi?id=1223692
* https://bugzilla.suse.com/show_bug.cgi?id=1223693
* https://bugzilla.suse.com/show_bug.cgi?id=1223695
* https://bugzilla.suse.com/show_bug.cgi?id=1223696
* https://bugzilla.suse.com/show_bug.cgi?id=1223698
* https://bugzilla.suse.com/show_bug.cgi?id=1223705
* https://bugzilla.suse.com/show_bug.cgi?id=1223712
* https://bugzilla.suse.com/show_bug.cgi?id=1223718
* https://bugzilla.suse.com/show_bug.cgi?id=1223728
* https://bugzilla.suse.com/show_bug.cgi?id=1223732
* https://bugzilla.suse.com/show_bug.cgi?id=1223735
* https://bugzilla.suse.com/show_bug.cgi?id=1223739
* https://bugzilla.suse.com/show_bug.cgi?id=1223741
* https://bugzilla.suse.com/show_bug.cgi?id=1223744
* https://bugzilla.suse.com/show_bug.cgi?id=1223745
* https://bugzilla.suse.com/show_bug.cgi?id=1223747
* https://bugzilla.suse.com/show_bug.cgi?id=1223748
* https://bugzilla.suse.com/show_bug.cgi?id=1223749
* https://bugzilla.suse.com/show_bug.cgi?id=1223750
* https://bugzilla.suse.com/show_bug.cgi?id=1223752
* https://bugzilla.suse.com/show_bug.cgi?id=1223754
* https://bugzilla.suse.com/show_bug.cgi?id=1223757
* https://bugzilla.suse.com/show_bug.cgi?id=1223759
* https://bugzilla.suse.com/show_bug.cgi?id=1223761
* https://bugzilla.suse.com/show_bug.cgi?id=1223762
* https://bugzilla.suse.com/show_bug.cgi?id=1223774
* https://bugzilla.suse.com/show_bug.cgi?id=1223782
* https://bugzilla.suse.com/show_bug.cgi?id=1223787
* https://bugzilla.suse.com/show_bug.cgi?id=1223788
* https://bugzilla.suse.com/show_bug.cgi?id=1223789
* https://bugzilla.suse.com/show_bug.cgi?id=1223790
* https://bugzilla.suse.com/show_bug.cgi?id=1223802
* https://bugzilla.suse.com/show_bug.cgi?id=1223805
* https://bugzilla.suse.com/show_bug.cgi?id=1223810
* https://bugzilla.suse.com/show_bug.cgi?id=1223822
* https://bugzilla.suse.com/show_bug.cgi?id=1223827
* https://bugzilla.suse.com/show_bug.cgi?id=1223831
* https://bugzilla.suse.com/show_bug.cgi?id=1223834
* https://bugzilla.suse.com/show_bug.cgi?id=1223838
* https://bugzilla.suse.com/show_bug.cgi?id=1223869
* https://bugzilla.suse.com/show_bug.cgi?id=1223870
* https://bugzilla.suse.com/show_bug.cgi?id=1223871
* https://bugzilla.suse.com/show_bug.cgi?id=1223872
* https://bugzilla.suse.com/show_bug.cgi?id=1223874
* https://bugzilla.suse.com/show_bug.cgi?id=1223944
* https://bugzilla.suse.com/show_bug.cgi?id=1223945
* https://bugzilla.suse.com/show_bug.cgi?id=1223946
* https://bugzilla.suse.com/show_bug.cgi?id=1223991
* https://bugzilla.suse.com/show_bug.cgi?id=1224076
* https://bugzilla.suse.com/show_bug.cgi?id=1224096
* https://bugzilla.suse.com/show_bug.cgi?id=1224098
* https://bugzilla.suse.com/show_bug.cgi?id=1224099
* https://bugzilla.suse.com/show_bug.cgi?id=1224137
* https://bugzilla.suse.com/show_bug.cgi?id=1224166
* https://bugzilla.suse.com/show_bug.cgi?id=1224174
* https://bugzilla.suse.com/show_bug.cgi?id=1224177
* https://bugzilla.suse.com/show_bug.cgi?id=1224180
* https://bugzilla.suse.com/show_bug.cgi?id=1224181
* https://bugzilla.suse.com/show_bug.cgi?id=1224331
* https://bugzilla.suse.com/show_bug.cgi?id=1224423
* https://bugzilla.suse.com/show_bug.cgi?id=1224429
* https://bugzilla.suse.com/show_bug.cgi?id=1224430
* https://bugzilla.suse.com/show_bug.cgi?id=1224432
* https://bugzilla.suse.com/show_bug.cgi?id=1224433
* https://bugzilla.suse.com/show_bug.cgi?id=1224437
* https://bugzilla.suse.com/show_bug.cgi?id=1224438
* https://bugzilla.suse.com/show_bug.cgi?id=1224442
* https://bugzilla.suse.com/show_bug.cgi?id=1224443
* https://bugzilla.suse.com/show_bug.cgi?id=1224445
* https://bugzilla.suse.com/show_bug.cgi?id=1224449
* https://bugzilla.suse.com/show_bug.cgi?id=1224477
* https://bugzilla.suse.com/show_bug.cgi?id=1224479
* https://bugzilla.suse.com/show_bug.cgi?id=1224480
* https://bugzilla.suse.com/show_bug.cgi?id=1224481
* https://bugzilla.suse.com/show_bug.cgi?id=1224482
* https://bugzilla.suse.com/show_bug.cgi?id=1224486
* https://bugzilla.suse.com/show_bug.cgi?id=1224487
* https://bugzilla.suse.com/show_bug.cgi?id=1224488
* https://bugzilla.suse.com/show_bug.cgi?id=1224491
* https://bugzilla.suse.com/show_bug.cgi?id=1224492
* https://bugzilla.suse.com/show_bug.cgi?id=1224493
* https://bugzilla.suse.com/show_bug.cgi?id=1224494
* https://bugzilla.suse.com/show_bug.cgi?id=1224495
* https://bugzilla.suse.com/show_bug.cgi?id=1224500
* https://bugzilla.suse.com/show_bug.cgi?id=1224501
* https://bugzilla.suse.com/show_bug.cgi?id=1224502
* https://bugzilla.suse.com/show_bug.cgi?id=1224504
* https://bugzilla.suse.com/show_bug.cgi?id=1224505
* https://bugzilla.suse.com/show_bug.cgi?id=1224506
* https://bugzilla.suse.com/show_bug.cgi?id=1224507
* https://bugzilla.suse.com/show_bug.cgi?id=1224508
* https://bugzilla.suse.com/show_bug.cgi?id=1224509
* https://bugzilla.suse.com/show_bug.cgi?id=1224511
* https://bugzilla.suse.com/show_bug.cgi?id=1224513
* https://bugzilla.suse.com/show_bug.cgi?id=1224517
* https://bugzilla.suse.com/show_bug.cgi?id=1224519
* https://bugzilla.suse.com/show_bug.cgi?id=1224521
* https://bugzilla.suse.com/show_bug.cgi?id=1224524
* https://bugzilla.suse.com/show_bug.cgi?id=1224525
* https://bugzilla.suse.com/show_bug.cgi?id=1224526
* https://bugzilla.suse.com/show_bug.cgi?id=1224530
* https://bugzilla.suse.com/show_bug.cgi?id=1224531
* https://bugzilla.suse.com/show_bug.cgi?id=1224534
* https://bugzilla.suse.com/show_bug.cgi?id=1224537
* https://bugzilla.suse.com/show_bug.cgi?id=1224541
* https://bugzilla.suse.com/show_bug.cgi?id=1224542
* https://bugzilla.suse.com/show_bug.cgi?id=1224543
* https://bugzilla.suse.com/show_bug.cgi?id=1224546
* https://bugzilla.suse.com/show_bug.cgi?id=1224550
* https://bugzilla.suse.com/show_bug.cgi?id=1224552
* https://bugzilla.suse.com/show_bug.cgi?id=1224553
* https://bugzilla.suse.com/show_bug.cgi?id=1224555
* https://bugzilla.suse.com/show_bug.cgi?id=1224557
* https://bugzilla.suse.com/show_bug.cgi?id=1224558
* https://bugzilla.suse.com/show_bug.cgi?id=1224559
* https://bugzilla.suse.com/show_bug.cgi?id=1224562
* https://bugzilla.suse.com/show_bug.cgi?id=1224565
* https://bugzilla.suse.com/show_bug.cgi?id=1224566
* https://bugzilla.suse.com/show_bug.cgi?id=1224567
* https://bugzilla.suse.com/show_bug.cgi?id=1224568
* https://bugzilla.suse.com/show_bug.cgi?id=1224569
* https://bugzilla.suse.com/show_bug.cgi?id=1224571
* https://bugzilla.suse.com/show_bug.cgi?id=1224573
* https://bugzilla.suse.com/show_bug.cgi?id=1224576
* https://bugzilla.suse.com/show_bug.cgi?id=1224577
* https://bugzilla.suse.com/show_bug.cgi?id=1224578
* https://bugzilla.suse.com/show_bug.cgi?id=1224579
* https://bugzilla.suse.com/show_bug.cgi?id=1224580
* https://bugzilla.suse.com/show_bug.cgi?id=1224581
* https://bugzilla.suse.com/show_bug.cgi?id=1224582
* https://bugzilla.suse.com/show_bug.cgi?id=1224585
* https://bugzilla.suse.com/show_bug.cgi?id=1224586
* https://bugzilla.suse.com/show_bug.cgi?id=1224587
* https://bugzilla.suse.com/show_bug.cgi?id=1224588
* https://bugzilla.suse.com/show_bug.cgi?id=1224592
* https://bugzilla.suse.com/show_bug.cgi?id=1224596
* https://bugzilla.suse.com/show_bug.cgi?id=1224598
* https://bugzilla.suse.com/show_bug.cgi?id=1224600
* https://bugzilla.suse.com/show_bug.cgi?id=1224601
* https://bugzilla.suse.com/show_bug.cgi?id=1224602
* https://bugzilla.suse.com/show_bug.cgi?id=1224603
* https://bugzilla.suse.com/show_bug.cgi?id=1224605
* https://bugzilla.suse.com/show_bug.cgi?id=1224607
* https://bugzilla.suse.com/show_bug.cgi?id=1224608
* https://bugzilla.suse.com/show_bug.cgi?id=1224609
* https://bugzilla.suse.com/show_bug.cgi?id=1224611
* https://bugzilla.suse.com/show_bug.cgi?id=1224613
* https://bugzilla.suse.com/show_bug.cgi?id=1224615
* https://bugzilla.suse.com/show_bug.cgi?id=1224617
* https://bugzilla.suse.com/show_bug.cgi?id=1224618
* https://bugzilla.suse.com/show_bug.cgi?id=1224620
* https://bugzilla.suse.com/show_bug.cgi?id=1224621
* https://bugzilla.suse.com/show_bug.cgi?id=1224622
* https://bugzilla.suse.com/show_bug.cgi?id=1224623
* https://bugzilla.suse.com/show_bug.cgi?id=1224624
* https://bugzilla.suse.com/show_bug.cgi?id=1224626
* https://bugzilla.suse.com/show_bug.cgi?id=1224627
* https://bugzilla.suse.com/show_bug.cgi?id=1224628
* https://bugzilla.suse.com/show_bug.cgi?id=1224629
* https://bugzilla.suse.com/show_bug.cgi?id=1224630
* https://bugzilla.suse.com/show_bug.cgi?id=1224632
* https://bugzilla.suse.com/show_bug.cgi?id=1224633
* https://bugzilla.suse.com/show_bug.cgi?id=1224634
* https://bugzilla.suse.com/show_bug.cgi?id=1224636
* https://bugzilla.suse.com/show_bug.cgi?id=1224637
* https://bugzilla.suse.com/show_bug.cgi?id=1224638
* https://bugzilla.suse.com/show_bug.cgi?id=1224639
* https://bugzilla.suse.com/show_bug.cgi?id=1224640
* https://bugzilla.suse.com/show_bug.cgi?id=1224643
* https://bugzilla.suse.com/show_bug.cgi?id=1224644
* https://bugzilla.suse.com/show_bug.cgi?id=1224645
* https://bugzilla.suse.com/show_bug.cgi?id=1224646
* https://bugzilla.suse.com/show_bug.cgi?id=1224647
* https://bugzilla.suse.com/show_bug.cgi?id=1224648
* https://bugzilla.suse.com/show_bug.cgi?id=1224649
* https://bugzilla.suse.com/show_bug.cgi?id=1224650
* https://bugzilla.suse.com/show_bug.cgi?id=1224651
* https://bugzilla.suse.com/show_bug.cgi?id=1224652
* https://bugzilla.suse.com/show_bug.cgi?id=1224653
* https://bugzilla.suse.com/show_bug.cgi?id=1224654
* https://bugzilla.suse.com/show_bug.cgi?id=1224657
* https://bugzilla.suse.com/show_bug.cgi?id=1224660
* https://bugzilla.suse.com/show_bug.cgi?id=1224663
* https://bugzilla.suse.com/show_bug.cgi?id=1224664
* https://bugzilla.suse.com/show_bug.cgi?id=1224665
* https://bugzilla.suse.com/show_bug.cgi?id=1224666
* https://bugzilla.suse.com/show_bug.cgi?id=1224667
* https://bugzilla.suse.com/show_bug.cgi?id=1224668
* https://bugzilla.suse.com/show_bug.cgi?id=1224671
* https://bugzilla.suse.com/show_bug.cgi?id=1224672
* https://bugzilla.suse.com/show_bug.cgi?id=1224674
* https://bugzilla.suse.com/show_bug.cgi?id=1224675
* https://bugzilla.suse.com/show_bug.cgi?id=1224676
* https://bugzilla.suse.com/show_bug.cgi?id=1224677
* https://bugzilla.suse.com/show_bug.cgi?id=1224678
* https://bugzilla.suse.com/show_bug.cgi?id=1224679
* https://bugzilla.suse.com/show_bug.cgi?id=1224680
* https://bugzilla.suse.com/show_bug.cgi?id=1224681
* https://bugzilla.suse.com/show_bug.cgi?id=1224682
* https://bugzilla.suse.com/show_bug.cgi?id=1224683
* https://bugzilla.suse.com/show_bug.cgi?id=1224685
* https://bugzilla.suse.com/show_bug.cgi?id=1224686
* https://bugzilla.suse.com/show_bug.cgi?id=1224687
* https://bugzilla.suse.com/show_bug.cgi?id=1224688
* https://bugzilla.suse.com/show_bug.cgi?id=1224692
* https://bugzilla.suse.com/show_bug.cgi?id=1224696
* https://bugzilla.suse.com/show_bug.cgi?id=1224697
* https://bugzilla.suse.com/show_bug.cgi?id=1224699
* https://bugzilla.suse.com/show_bug.cgi?id=1224701
* https://bugzilla.suse.com/show_bug.cgi?id=1224703
* https://bugzilla.suse.com/show_bug.cgi?id=1224704
* https://bugzilla.suse.com/show_bug.cgi?id=1224705
* https://bugzilla.suse.com/show_bug.cgi?id=1224706
* https://bugzilla.suse.com/show_bug.cgi?id=1224707
* https://bugzilla.suse.com/show_bug.cgi?id=1224709
* https://bugzilla.suse.com/show_bug.cgi?id=1224710
* https://bugzilla.suse.com/show_bug.cgi?id=1224712
* https://bugzilla.suse.com/show_bug.cgi?id=1224714
* https://bugzilla.suse.com/show_bug.cgi?id=1224716
* https://bugzilla.suse.com/show_bug.cgi?id=1224717
* https://bugzilla.suse.com/show_bug.cgi?id=1224718
* https://bugzilla.suse.com/show_bug.cgi?id=1224719
* https://bugzilla.suse.com/show_bug.cgi?id=1224720
* https://bugzilla.suse.com/show_bug.cgi?id=1224721
* https://bugzilla.suse.com/show_bug.cgi?id=1224722
* https://bugzilla.suse.com/show_bug.cgi?id=1224723
* https://bugzilla.suse.com/show_bug.cgi?id=1224725
* https://bugzilla.suse.com/show_bug.cgi?id=1224727
* https://bugzilla.suse.com/show_bug.cgi?id=1224728
* https://bugzilla.suse.com/show_bug.cgi?id=1224729
* https://bugzilla.suse.com/show_bug.cgi?id=1224730
* https://bugzilla.suse.com/show_bug.cgi?id=1224731
* https://bugzilla.suse.com/show_bug.cgi?id=1224732
* https://bugzilla.suse.com/show_bug.cgi?id=1224733
* https://bugzilla.suse.com/show_bug.cgi?id=1224736
* https://bugzilla.suse.com/show_bug.cgi?id=1224738
* https://bugzilla.suse.com/show_bug.cgi?id=1224739
* https://bugzilla.suse.com/show_bug.cgi?id=1224740
* https://bugzilla.suse.com/show_bug.cgi?id=1224741
* https://bugzilla.suse.com/show_bug.cgi?id=1224742
* https://bugzilla.suse.com/show_bug.cgi?id=1224747
* https://bugzilla.suse.com/show_bug.cgi?id=1224749
* https://bugzilla.suse.com/show_bug.cgi?id=1224763
* https://bugzilla.suse.com/show_bug.cgi?id=1224764
* https://bugzilla.suse.com/show_bug.cgi?id=1224765
* https://bugzilla.suse.com/show_bug.cgi?id=1224766
* https://bugzilla.suse.com/show_bug.cgi?id=1224790
* https://bugzilla.suse.com/show_bug.cgi?id=1224792
* https://bugzilla.suse.com/show_bug.cgi?id=1224793
* https://bugzilla.suse.com/show_bug.cgi?id=1224803
* https://bugzilla.suse.com/show_bug.cgi?id=1224804
* https://bugzilla.suse.com/show_bug.cgi?id=1224866
* https://bugzilla.suse.com/show_bug.cgi?id=1224936
* https://bugzilla.suse.com/show_bug.cgi?id=1224989
* https://bugzilla.suse.com/show_bug.cgi?id=1225007
* https://bugzilla.suse.com/show_bug.cgi?id=1225053
* https://bugzilla.suse.com/show_bug.cgi?id=1225133
* https://bugzilla.suse.com/show_bug.cgi?id=1225134
* https://bugzilla.suse.com/show_bug.cgi?id=1225136
* https://bugzilla.suse.com/show_bug.cgi?id=1225172
* https://bugzilla.suse.com/show_bug.cgi?id=1225502
* https://bugzilla.suse.com/show_bug.cgi?id=1225578
* https://bugzilla.suse.com/show_bug.cgi?id=1225579
* https://bugzilla.suse.com/show_bug.cgi?id=1225580
* https://bugzilla.suse.com/show_bug.cgi?id=1225593
* https://bugzilla.suse.com/show_bug.cgi?id=1225605
* https://bugzilla.suse.com/show_bug.cgi?id=1225607
* https://bugzilla.suse.com/show_bug.cgi?id=1225610
* https://bugzilla.suse.com/show_bug.cgi?id=1225616
* https://bugzilla.suse.com/show_bug.cgi?id=1225618
* https://bugzilla.suse.com/show_bug.cgi?id=1225640
* https://bugzilla.suse.com/show_bug.cgi?id=1225642
* https://bugzilla.suse.com/show_bug.cgi?id=1225692
* https://bugzilla.suse.com/show_bug.cgi?id=1225694
* https://bugzilla.suse.com/show_bug.cgi?id=1225695
* https://bugzilla.suse.com/show_bug.cgi?id=1225696
* https://bugzilla.suse.com/show_bug.cgi?id=1225698
* https://bugzilla.suse.com/show_bug.cgi?id=1225699
* https://bugzilla.suse.com/show_bug.cgi?id=1225704
* https://bugzilla.suse.com/show_bug.cgi?id=1225705
* https://bugzilla.suse.com/show_bug.cgi?id=1225708
* https://bugzilla.suse.com/show_bug.cgi?id=1225710
* https://bugzilla.suse.com/show_bug.cgi?id=1225712
* https://bugzilla.suse.com/show_bug.cgi?id=1225714
* https://bugzilla.suse.com/show_bug.cgi?id=1225715
* https://bugzilla.suse.com/show_bug.cgi?id=1225720
* https://bugzilla.suse.com/show_bug.cgi?id=1225722
* https://bugzilla.suse.com/show_bug.cgi?id=1225728
* https://bugzilla.suse.com/show_bug.cgi?id=1225734
* https://bugzilla.suse.com/show_bug.cgi?id=1225735
* https://bugzilla.suse.com/show_bug.cgi?id=1225736
* https://bugzilla.suse.com/show_bug.cgi?id=1225747
* https://bugzilla.suse.com/show_bug.cgi?id=1225748
* https://bugzilla.suse.com/show_bug.cgi?id=1225749
* https://bugzilla.suse.com/show_bug.cgi?id=1225750
* https://bugzilla.suse.com/show_bug.cgi?id=1225756
* https://bugzilla.suse.com/show_bug.cgi?id=1225765
* https://bugzilla.suse.com/show_bug.cgi?id=1225766
* https://bugzilla.suse.com/show_bug.cgi?id=1225769
* https://bugzilla.suse.com/show_bug.cgi?id=1225773
* https://bugzilla.suse.com/show_bug.cgi?id=1225775
* https://bugzilla.suse.com/show_bug.cgi?id=1225842
* https://bugzilla.suse.com/show_bug.cgi?id=1225945
* https://bugzilla.suse.com/show_bug.cgi?id=1226158
* https://jira.suse.com/browse/PED-8111
* https://jira.suse.com/browse/PED-8240
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.suse.com/pipermail/sle-security-updates/attachments/20240819/67d25764/attachment.htm>
More information about the sle-security-updates
mailing list