{"affected":[{"ecosystem_specific":{"binaries":[{"kernel-azure":"5.14.21-150500.33.48.1","kernel-azure-devel":"5.14.21-150500.33.48.1","kernel-devel-azure":"5.14.21-150500.33.48.1","kernel-source-azure":"5.14.21-150500.33.48.1","kernel-syms-azure":"5.14.21-150500.33.48.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for Public Cloud 15 SP5","name":"kernel-azure","purl":"pkg:rpm/suse/kernel-azure&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Public%20Cloud%2015%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.14.21-150500.33.48.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-azure":"5.14.21-150500.33.48.1","kernel-azure-devel":"5.14.21-150500.33.48.1","kernel-devel-azure":"5.14.21-150500.33.48.1","kernel-source-azure":"5.14.21-150500.33.48.1","kernel-syms-azure":"5.14.21-150500.33.48.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for Public Cloud 15 SP5","name":"kernel-source-azure","purl":"pkg:rpm/suse/kernel-source-azure&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Public%20Cloud%2015%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.14.21-150500.33.48.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-azure":"5.14.21-150500.33.48.1","kernel-azure-devel":"5.14.21-150500.33.48.1","kernel-devel-azure":"5.14.21-150500.33.48.1","kernel-source-azure":"5.14.21-150500.33.48.1","kernel-syms-azure":"5.14.21-150500.33.48.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for Public Cloud 15 SP5","name":"kernel-syms-azure","purl":"pkg:rpm/suse/kernel-syms-azure&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Public%20Cloud%2015%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.14.21-150500.33.48.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-azure":"5.14.21-150500.33.48.1","dlm-kmp-azure":"5.14.21-150500.33.48.1","gfs2-kmp-azure":"5.14.21-150500.33.48.1","kernel-azure":"5.14.21-150500.33.48.1","kernel-azure-devel":"5.14.21-150500.33.48.1","kernel-azure-extra":"5.14.21-150500.33.48.1","kernel-azure-livepatch-devel":"5.14.21-150500.33.48.1","kernel-azure-optional":"5.14.21-150500.33.48.1","kernel-azure-vdso":"5.14.21-150500.33.48.1","kernel-devel-azure":"5.14.21-150500.33.48.1","kernel-source-azure":"5.14.21-150500.33.48.1","kernel-syms-azure":"5.14.21-150500.33.48.1","kselftests-kmp-azure":"5.14.21-150500.33.48.1","ocfs2-kmp-azure":"5.14.21-150500.33.48.1","reiserfs-kmp-azure":"5.14.21-150500.33.48.1"}]},"package":{"ecosystem":"openSUSE:Leap 15.5","name":"kernel-azure","purl":"pkg:rpm/opensuse/kernel-azure&distro=openSUSE%20Leap%2015.5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.14.21-150500.33.48.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-azure":"5.14.21-150500.33.48.1","dlm-kmp-azure":"5.14.21-150500.33.48.1","gfs2-kmp-azure":"5.14.21-150500.33.48.1","kernel-azure":"5.14.21-150500.33.48.1","kernel-azure-devel":"5.14.21-150500.33.48.1","kernel-azure-extra":"5.14.21-150500.33.48.1","kernel-azure-livepatch-devel":"5.14.21-150500.33.48.1","kernel-azure-optional":"5.14.21-150500.33.48.1","kernel-azure-vdso":"5.14.21-150500.33.48.1","kernel-devel-azure":"5.14.21-150500.33.48.1","kernel-source-azure":"5.14.21-150500.33.48.1","kernel-syms-azure":"5.14.21-150500.33.48.1","kselftests-kmp-azure":"5.14.21-150500.33.48.1","ocfs2-kmp-azure":"5.14.21-150500.33.48.1","reiserfs-kmp-azure":"5.14.21-150500.33.48.1"}]},"package":{"ecosystem":"openSUSE:Leap 15.5","name":"kernel-source-azure","purl":"pkg:rpm/opensuse/kernel-source-azure&distro=openSUSE%20Leap%2015.5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.14.21-150500.33.48.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-azure":"5.14.21-150500.33.48.1","dlm-kmp-azure":"5.14.21-150500.33.48.1","gfs2-kmp-azure":"5.14.21-150500.33.48.1","kernel-azure":"5.14.21-150500.33.48.1","kernel-azure-devel":"5.14.21-150500.33.48.1","kernel-azure-extra":"5.14.21-150500.33.48.1","kernel-azure-livepatch-devel":"5.14.21-150500.33.48.1","kernel-azure-optional":"5.14.21-150500.33.48.1","kernel-azure-vdso":"5.14.21-150500.33.48.1","kernel-devel-azure":"5.14.21-150500.33.48.1","kernel-source-azure":"5.14.21-150500.33.48.1","kernel-syms-azure":"5.14.21-150500.33.48.1","kselftests-kmp-azure":"5.14.21-150500.33.48.1","ocfs2-kmp-azure":"5.14.21-150500.33.48.1","reiserfs-kmp-azure":"5.14.21-150500.33.48.1"}]},"package":{"ecosystem":"openSUSE:Leap 15.5","name":"kernel-syms-azure","purl":"pkg:rpm/opensuse/kernel-syms-azure&distro=openSUSE%20Leap%2015.5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.14.21-150500.33.48.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"\n\nThe SUSE Linux Enterprise 15 SP5 Azure kernel was updated to receive various security bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2021-46925: Fixed kernel panic caused by race of smc_sock (bsc#1220466).\n- CVE-2021-46926: Fixed bug when detecting controllers in ALSA/hda/intel-sdw-acpi (bsc#1220478).\n- CVE-2021-46927: Fixed assertion bug in nitro_enclaves: Use get_user_pages_unlocked() (bsc#1220443).\n- CVE-2021-46929: Fixed use-after-free issue in sctp_sock_dump() (bsc#1220482).\n- CVE-2021-46930: Fixed usb/mtu3 list_head check warning (bsc#1220484).\n- CVE-2021-46931: Fixed wrong type casting in mlx5e_tx_reporter_dump_sq() (bsc#1220486).\n- CVE-2021-46933: Fixed possible underflow in ffs_data_clear() (bsc#1220487).\n- CVE-2021-46936: Fixed use-after-free in tw_timer_handler() (bsc#1220439).\n- CVE-2021-47082: Fixed ouble free in tun_free_netdev() (bsc#1220969).\n- CVE-2021-47087: Fixed incorrect page free bug in tee/optee (bsc#1220954).\n- CVE-2021-47091: Fixed locking in ieee80211_start_ap()) error path (bsc#1220959).\n- CVE-2021-47093: Fixed memleak on registration failure in intel_pmc_core (bsc#1220978).\n- CVE-2021-47094: Fixed possible memory leak in KVM x86/mmu (bsc#1221551).\n- CVE-2021-47095: Fixed missing initialization in ipmi/ssif (bsc#1220979).\n- CVE-2021-47096: Fixed uninitalized user_pversion in ALSA rawmidi (bsc#1220981).\n- CVE-2021-47097: Fixed stack out of bound access in elantech_change_report_id() (bsc#1220982).\n- CVE-2021-47098: Fixed integer overflow/underflow in hysteresis calculations hwmon: (lm90) (bsc#1220983).\n- CVE-2021-47099: Fixed BUG_ON assertion in veth when skb entering GRO are cloned (bsc#1220955).\n- CVE-2021-47100: Fixed UAF when uninstall in ipmi (bsc#1220985).\n- CVE-2021-47101: Fixed uninit-value in asix_mdio_read() (bsc#1220987).\n- CVE-2021-47102: Fixed incorrect structure access In line: upper = info->upper_dev in net/marvell/prestera (bsc#1221009).\n- CVE-2021-47104: Fixed memory leak in qib_user_sdma_queue_pkts() (bsc#1220960).\n- CVE-2021-47105: Fixed potential memory leak in ice/xsk (bsc#1220961).\n- CVE-2021-47107: Fixed READDIR buffer overflow in NFSD (bsc#1220965).\n- CVE-2021-47108: Fixed possible NULL pointer dereference for mtk_hdmi_conf in drm/mediatek (bsc#1220986).\n- CVE-2021-47181: Fixed a null pointer dereference caused by calling platform_get_resource()  (bsc#1222660).\n- CVE-2021-47182: Fixed buffer length handling in scsi_mode_sense() in scsi core (bsc#1222662).\n- CVE-2021-47183: Fixed a null pointer dereference during link down processing in scsi lpfc (bsc#1192145, bsc#1222664).\n- CVE-2021-47185: Fixed a softlockup issue in flush_to_ldisc in tty tty_buffer (bsc#1222669).\n- CVE-2021-47189: Fixed denial of service due to memory ordering issues between normal and ordered work functions in btrfs (bsc#1222706).\n- CVE-2022-4744: Fixed double-free that could lead to DoS or privilege escalation in TUN/TAP device driver functionality (bsc#1209635).\n- CVE-2022-48626: Fixed a potential use-after-free on remove path moxart (bsc#1220366).\n- CVE-2022-48629: Fixed possible memory leak in qcom-rng (bsc#1220989).\n- CVE-2022-48630: Fixed infinite loop on requests not multiple of WORD_SZ in crypto: qcom-rng (bsc#1220990).\n- CVE-2023-0160: Fixed deadlock flaw in BPF that could allow a local user to potentially crash the system (bsc#1209657).\n- CVE-2023-28746: Fixed Register File Data Sampling (bsc#1213456).\n- CVE-2023-35827: Fixed a use-after-free issue in ravb_tx_timeout_work() (bsc#1212514).\n- CVE-2023-4881: Fixed a out-of-bounds write flaw in the netfilter subsystem that could lead to potential information disclosure or a denial of service (bsc#1215221).\n- CVE-2023-52447: Fixed map_fd_put_ptr() signature kABI workaround  (bsc#1220251).\n- CVE-2023-52450: Fixed NULL pointer dereference issue in upi_fill_topology() (bsc#1220237).\n- CVE-2023-52453: Fixed data corruption in hisi_acc_vfio_pci (bsc#1220337).\n- CVE-2023-52454: Fixed a kernel panic when host sends an invalid H2C PDU length (bsc#1220320).\n- CVE-2023-52469: Fixed a use-after-free in kv_parse_power_table (bsc#1220411).\n- CVE-2023-52470: Fixed null-ptr-deref in radeon_crtc_init() (bsc#1220413).\n- CVE-2023-52474: Fixed a vulnerability with non-PAGE_SIZE-end multi-iovec user SDMA requests (bsc#1220445).\n- CVE-2023-52476: Fixed possible unhandled page fault via perf sampling NMI during vsyscall (bsc#1220703).\n- CVE-2023-52477: Fixed USB Hub accesses to uninitialized BOS descriptors (bsc#1220790).\n- CVE-2023-52481: Fixed speculative unprivileged load in Cortex-A520 (bsc#1220887).\n- CVE-2023-52484: Fixed a soft lockup triggered by arm_smmu_mm_invalidate_range (bsc#1220797).\n- CVE-2023-52486: Fixed possible use-after-free in drm (bsc#1221277).\n- CVE-2023-52488: Fixed data corruption due to error on incrementing register address in regmap functions for FIFO in serial sc16is7xx (bsc#1221162).\n- CVE-2023-52492: Fixed a null-pointer-dereference in channel unregistration function __dma_async_device_channel_register() (bsc#1221276).\n- CVE-2023-52493: Fixed possible soft lockup in bus/mhi/host (bsc#1221274).\n- CVE-2023-52494: Fixed missing alignment check for event ring read pointer in bus/mhi/host (bsc#1221273).\n- CVE-2023-52497: Fixed data corruption in erofs (bsc#1220879).\n- CVE-2023-52500: Fixed information leaking when processing OPC_INB_SET_CONTROLLER_CONFIG command (bsc#1220883).\n- CVE-2023-52501: Fixed possible memory corruption in ring-buffer (bsc#1220885).\n- CVE-2023-52502: Fixed a race condition in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn() (bsc#1220831).\n- CVE-2023-52503: Fixed use-after-free in amdtee_close_session due to race condition with amdtee_open_session in tee amdtee (bsc#1220915).\n- CVE-2023-52504: Fixed possible out-of bounds in apply_alternatives() on a 5-level paging machine (bsc#1221553).\n- CVE-2023-52507: Fixed possible shift-out-of-bounds in nfc/nci (bsc#1220833).\n- CVE-2023-52508: Fixed null pointer dereference in nvme_fc_io_getuuid() (bsc#1221015).\n- CVE-2023-52509: Fixed a use-after-free issue in ravb_tx_timeout_work() (bsc#1220836).\n- CVE-2023-52510: Fixed a potential UAF in ca8210_probe() (bsc#1220898).\n- CVE-2023-52511: Fixed possible memory corruption in spi/sun6i (bsc#1221012).\n- CVE-2023-52513: Fixed connection failure handling  in RDMA/siw (bsc#1221022).\n- CVE-2023-52515: Fixed possible use-after-free in RDMA/srp (bsc#1221048).\n- CVE-2023-52517: Fixed race between DMA RX transfer completion and RX FIFO drain in spi/sun6i (bsc#1221055).\n- CVE-2023-52518: Fixed information leak in bluetooth/hci_codec (bsc#1221056).\n- CVE-2023-52519: Fixed possible overflow in HID/intel-ish-hid/ipc (bsc#1220920).\n- CVE-2023-52520: Fixed reference leak in platform/x86/think-lmi (bsc#1220921).\n- CVE-2023-52523: Fixed wrong redirects to non-TCP sockets in bpf (bsc#1220926).\n- CVE-2023-52524: Fixed possible corruption in nfc/llcp (bsc#1220927).\n- CVE-2023-52525: Fixed out of bounds check mwifiex_process_rx_packet() (bsc#1220840).\n- CVE-2023-52528: Fixed uninit-value access in __smsc75xx_read_reg() (bsc#1220843).\n- CVE-2023-52529: Fixed a potential memory leak in sony_probe() (bsc#1220929).\n- CVE-2023-52532: Fixed a bug in TX CQE error handling (bsc#1220932).\n- CVE-2023-52561: Fixed denial of service due to missing reserved attribute on cont splash memory region in arm64 dts qcom sdm845-db845c (bsc#1220935).\n- CVE-2023-52563: Fixed memory leak on ->hpd_notify callback() in drm/meson (bsc#1220937).\n- CVE-2023-52564: Reverted invalid fix for UAF in gsm_cleanup_mux() (bsc#1220938).\n- CVE-2023-52566: Fixed potential use after free in nilfs_gccache_submit_read_data() (bsc#1220940).\n- CVE-2023-52567: Fixed possible Oops in  serial/8250_port: when using IRQ polling (irq = 0) (bsc#1220839).\n- CVE-2023-52569: Fixed a bug in btrfs by remoning BUG() after failure to insert delayed dir index item (bsc#1220918).\n- CVE-2023-52574: Fixed a bug by hiding new member header_ops (bsc#1220870).\n- CVE-2023-52575: Fixed SBPB enablement for spec_rstack_overflow=off (bsc#1220871).\n- CVE-2023-52576: Fixed potential use after free in memblock_isolate_range() (bsc#1220872).\n- CVE-2023-52582: Fixed possible oops in netfs (bsc#1220878).\n- CVE-2023-52583: Fixed deadlock or deadcode of misusing dget() inside ceph (bsc#1221058).\n- CVE-2023-52587: Fixed mcast list locking in IB/ipoib (bsc#1221082).\n- CVE-2023-52591: Fixed a possible reiserfs filesystem corruption via directory renaming (bsc#1221044).\n- CVE-2023-52594: Fixed potential array-index-out-of-bounds read in ath9k_htc_txstatus() (bsc#1221045).\n- CVE-2023-52595: Fixed possible deadlock in wifi/rt2x00 (bsc#1221046).\n- CVE-2023-52597: Fixed a setting of fpc register in KVM (bsc#1221040).\n- CVE-2023-52598: Fixed wrong setting of fpc register in s390/ptrace (bsc#1221060).\n- CVE-2023-52599: Fixed array-index-out-of-bounds in diNewExt() in jfs (bsc#1221062).\n- CVE-2023-52600: Fixed uaf in jfs_evict_inode() (bsc#1221071).\n- CVE-2023-52601: Fixed array-index-out-of-bounds in dbAdjTree() in jfs (bsc#1221068).\n- CVE-2023-52602: Fixed slab-out-of-bounds Read in dtSearch() in jfs (bsc#1221070).\n- CVE-2023-52603: Fixed array-index-out-of-bounds in dtSplitRoot() (bsc#1221066).\n- CVE-2023-52604: Fixed array-index-out-of-bounds in dbAdjTree() (bsc#1221067).\n- CVE-2023-52605: Fixed a NULL pointer dereference check (bsc#1221039)\n- CVE-2023-52606: Fixed possible kernel stack corruption in powerpc/lib (bsc#1221069).\n- CVE-2023-52607: Fixed a null-pointer-dereference in pgtable_cache_add kasprintf() (bsc#1221061).\n- CVE-2023-52608: Fixed possible race condition in firmware/arm_scmi (bsc#1221375).\n- CVE-2023-52612: Fixed req->dst buffer overflow in crypto/scomp (bsc#1221616).\n- CVE-2023-52615: Fixed page fault dead lock on mmap-ed hwrng (bsc#1221614).\n- CVE-2023-52617: Fixed stdev_release() crash after surprise hot remove (bsc#1221613).\n- CVE-2023-52619: Fixed possible crash when setting number of cpus to an odd number in pstore/ram (bsc#1221618).\n- CVE-2023-52621: Fixed missing asserion in bpf (bsc#1222073).\n- CVE-2023-52623: Fixed suspicious RCU usage in SUNRPC (bsc#1222060).\n- CVE-2023-52627: Fixed null pointer dereference due to lack of callback functions in iio adc ad7091r (bsc#1222051)\n- CVE-2023-52628: Fixed 4-byte stack OOB write in nftables (bsc#1222117).\n- CVE-2023-52632: Fixed lock dependency warning with srcu in drm/amdkfd (bsc#1222274).\n- CVE-2023-52636: Fixed denial of service due to wrongly init the cursor when preparing sparse read in msgr2 in libceph  (bsc#1222247).\n- CVE-2023-52637: Fixed UAF in j1939_sk_match_filter() in can/k1939 (bsc#1222291).\n- CVE-2023-52639: Fixed race during shadow creation in KVM/s390/vsie Fixed (bsc#1222300).\n- CVE-2023-6356: Fixed a NULL pointer dereference in nvmet_tcp_build_pdu_iovec (bsc#1217987).\n- CVE-2023-6535: Fixed a NULL pointer dereference in nvmet_tcp_execute_request (bsc#1217988).\n- CVE-2023-6536: Fixed a NULL pointer dereference in __nvmet_req_complete (bsc#1217989).\n- CVE-2023-7042: Fixed a null-pointer-dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev() (bsc#1218336).\n- CVE-2023-7192: Fixed a memory leak problem in ctnetlink_create_conntrack in net/netfilter/nf_conntrack_netlink.c (bsc#1218479).\n- CVE-2024-0841: Fixed null pointer dereference in hugetlbfs_fill_super() (bsc#1219264).\n- CVE-2024-2201: Fixed information leak in x86/BHI (bsc#1217339).\n- CVE-2024-22099: Fixed a null-pointer-dereference in rfcomm_check_security (bsc#1219170).\n- CVE-2024-23307: Fixed Integer Overflow or Wraparound vulnerability in x86 and ARM md, raid, raid5 modules (bsc#1219169).\n- CVE-2024-23850: Fixed denial of service due to assertion failure due to subvolume readed before root item insertion in btrfs_get_root_ref in btrfs (bsc#1219126).\n- CVE-2024-23850: Fixed double free of anonymous device after snapshot  creation failure (bsc#1219126).\n- CVE-2024-25739: Fixed possible crash in create_empty_lvol() in drivers/mtd/ubi/vtbl.c (bsc#1219834).\n- CVE-2024-25742: Fixed insufficient validation during #VC instruction emulation in x86/sev (bsc#1221725).\n- CVE-2024-26599: Fixed out-of-bounds access in of_pwm_single_xlate() (bsc#1220365).\n- CVE-2024-26600: Fixed NULL pointer dereference for SRP in phy-omap-usb2 (bsc#1220340).\n- CVE-2024-26602: Fixed overall slowdowns with sys_membarrier (bsc1220398).\n- CVE-2024-26612: Fixed Oops in fscache_put_cache() This function dereferences  (bsc#1221291).\n- CVE-2024-26614: Fixed the initialization of accept_queue's spinlocks (bsc#1221293).\n- CVE-2024-26620: Fixed possible device model violation in s390/vfio-ap (bsc#1221298).\n- CVE-2024-26627: Fixed possible hard lockup in scsi (bsc#1221090).\n- CVE-2024-26629: Fixed possible protocol violation via RELEASE_LOCKOWNER in nfsd (bsc#1221379).\n- CVE-2024-26642: Fixed the set of anonymous timeout flag in netfilter nf_tables (bsc#1221830).\n- CVE-2024-26645: Fixed missing visibility when inserting an element into tracing_map (bsc#1222056).\n- CVE-2024-26646: Fixed potential memory corruption when resuming from suspend or hibernation in thermal/intel/hfi (bsc#1222070).\n- CVE-2024-26651: Fixed possible oops via malicious devices in sr9800 (bsc#1221337).\n- CVE-2024-26654: Fixed use after free in ALSA/sh/aica (bsc#1222304).\n- CVE-2024-26659: Fixed wrong handling of isoc Babble and Buffer Overrun events in xhci (bsc#1222317).\n- CVE-2024-26660: Fixed buffer overflow in dcn301_stream_encoder_create in drm amd display (bsc#1222266)\n- CVE-2024-26664: Fixed out-of-bounds memory access in create_core_data() in hwmon coretemp (bsc#1222355).\n- CVE-2024-26667: Fixed null pointer reference in dpu_encoder_helper_phys_cleanup in drm/msm/dpu (bsc#1222331).\n- CVE-2024-26670: Fixed ARM64_WORKAROUND_SPECULATIVE_UNPRIV_LOAD workaround in kernel arm64 (bsc#1222356).\n- CVE-2024-26680: Fixed denial of service due to DMA mapping for PTP hwts ring in net atlantic (bsc#1222427).\n- CVE-2024-26681: Fixed denial of service in nsim_dev_trap_report_work() in netdevsim (bsc#1222431).\n- CVE-2024-26684: Fixed handling of DPP safety error for DMA channels in net stmmac xgmac (bsc#1222445).\n- CVE-2024-26685: Fixed denial of service in end_buffer_async_write() in nilfs2 (bsc#1222437).\n- CVE-2024-26689: Fixed use-after-free in encode_cap_msg() in ceph (bsc#1222503).\n- CVE-2024-26695: Fixed null pointer dereference in __sev_platform_shutdown_locked in crypto ccp (bsc#1222373).\n- CVE-2024-26696: Fixed denial of service in nilfs_lookup_dirty_data_buffers() in nilfs2 (bsc#1222549).\n- CVE-2024-26697: Fixed data corruption in dsync block recovery for small block sizes in nilfs2 (bsc#1222550).\n- CVE-2024-26704: Fixed a double-free of blocks due to wrong extents moved_len in ext4 (bsc#1222422).\n- CVE-2024-26717: Fixed null pointer dereference on failed power up in HID i2c-hid-of (bsc#1222360).\n- CVE-2024-26718: Fixed memory corruption in tasklet_unlock via disabling tasklets in dm-crypt and dm-verify (bsc#1222416).\n- CVE-2024-26722: Fixed denial of service in rt5645_jack_detect_work() due to mutex left locked forever in ASoC rt5645 (bsc#1222520).\n- CVE-2024-26727: Fixed denial of service due to assertion failure during subvolume creation (bsc#1222536).\n- CVE-2024-26733: Fixed an overflow in arp_req_get() in arp (bsc#1222585).\n- CVE-2024-26736: Fixed buffer overflow in afs_update_volume_status() in afs (bsc#1222586).\n- CVE-2024-26737: Fixed use-after-free due to race between bpf_timer_cancel_and_free and bpf_timer_cancel in bpf (bsc#1222557).\n- CVE-2024-26743: Fixed memory leak in qedr_create_user_qp error flow in rdma/qedr (bsc#1222677)\n- CVE-2024-26744: Fixed null pointer dereference in srpt_service_guid parameter in rdma/srpt (bsc#1222449)\n- CVE-2024-26745: Fixed null pointer dereference due to IOMMU table not initialized for kdump over SR-IOV (bsc#1220492, bsc#1222678).\n- CVE-2024-26747: Fixed null pointer issue when put module's reference in usb roles  (bsc#1222609).\n- CVE-2024-26749: Fixed use-after-free at cdns3_gadget_ep_disable() in usb cdns3 (bsc#1222680).\n- CVE-2024-26751: Fixed denial of service due to gpiod_lookup_table search loop not ending correctly (bsc#1222724)\n- CVE-2024-26754: Fixed an use-after-free and null-ptr-deref in gtp_genl_dump_pdp() in gtp  (bsc#1222632).\n- CVE-2024-26760: Fixed null pointer dereference on error case in bio_put() in scsi target pscsi (bsc#1222596)\n- CVE-2024-26763: Fixed user corruption via by writing data with O_DIRECT on device in dm-crypt (bsc#1222720).\n- CVE-2024-26766: Fixed off-by-one error in sdma.h tx->num_descs in ib/hfi1 (bsc#1222726)\n- CVE-2024-26769: Fixed deadlock on delete association path in nvmet-fc  (bsc#1222727).\n- CVE-2024-26771: Fixed a null pointer dereference on edma_probe in dmaengine ti edma  (bsc#1222610)\n- CVE-2024-26776: Fixed null pointer dereference due to null value returned by interrupt handler in spi hisi-sfc-v3xx (bsc#1222764)\n- CVE-2024-26779: Fixed denial of service due to race condition on enabling fast-xmit in wifi mac80211  (bsc#1222772).\n- CVE-2024-26787: Fixed DMA API overlapping mappings in mmc mmci stm32 (bsc#1222781)\n- CVE-2024-26790: Fixed denial of service on 16 bytes unaligned read in dmaengine fsl-qdma (bsc#1222784)\n- CVE-2024-26793: Fixed an use-after-free and null-ptr-deref in gtp_newlink() in gtp  (bsc#1222428).\n- CVE-2024-26798: Fixed denial of service due to wrongly restore fond data upon failure in fbcon (bsc#1222798).\n- CVE-2024-26805: Fixed a kernel-infoleak-after-free in __skb_datagram_iter in netlink  (bsc#1222630).\n- CVE-2024-26807: Fixed memory corruption due to wrong pointer reference in spi cadence-qspi (bsc#1222801)\n- CVE-2024-26848: Fixed denial of service due to endless loop in directory parsing in afs (bsc#1223030).\n\nThe following non-security bugs were fixed:\n\n- Revert 'PCI: tegra194: Enable support for 256 Byte payload' (git-fixes).\n- Revert 'Revert 'drm/amdgpu/display: change pipe policy for DCN 2.0'' (git-fixes).\n- Revert 'SUNRPC dont update timeout value on connection reset' (git-fixes).\n- Revert 'drm/amd: Disable PSR-SU on Parade 0803 TCON' (git-fixes).\n- Revert 'drm/amd: Disable S/G for APUs when 64GB or more host memory' (git-fixes).\n- Revert 'drm/amdgpu/display: change pipe policy for DCN 2.0' (git-fixes).\n- Revert 'drm/amdgpu/display: change pipe policy for DCN 2.1' (git-fixes).\n- Revert 'drm/vc4: hdmi: Enforce the minimum rate at runtime_resume' (git-fixes).\n- Revert 'fbdev: flush deferred IO before closing (git-fixes).' (bsc#1221814)\n- acpi: CPPC: enable AMD CPPC V2 support for family 17h processors (git-fixes).\n- acpi: processor_idle: Fix memory leak in acpi_processor_power_exit() (git-fixes).\n- acpi: resource: Add Infinity laptops to irq1_edge_low_force_override (stable-fixes).\n- acpi: resource: Add MAIBENBEN X577 to irq1_edge_low_force_override (git-fixes).\n- acpi: resource: Do IRQ override on Lunnen Ground laptops (stable-fixes).\n- acpi: scan: Fix device check notification handling (git-fixes).\n- acpica: debugger: check status of acpi_evaluate_object() in acpi_db_walk_for_fields() (git-fixes).\n- alsa: aaci: Delete unused variable in aaci_do_suspend (git-fixes).\n- alsa: aoa: avoid false-positive format truncation warning (git-fixes).\n- alsa: aw2: avoid casting function pointers (git-fixes).\n- alsa: ctxfi: avoid casting function pointers (git-fixes).\n- alsa: hda/realtek - ALC285 reduce pop noise from Headphone port (stable-fixes).\n- alsa: hda/realtek - Add Headset Mic supported Acer NB platform (stable-fixes).\n- alsa: hda/realtek - Fix headset Mic no show at resume back for Lenovo ALC897 platform (git-fixes).\n- alsa: hda/realtek: Enable Mute LED on HP 840 G8 (MB 8AB8) (git-fixes).\n- alsa: hda/realtek: Update Panasonic CF-SZ6 quirk to support headset with microphone (git-fixes).\n- alsa: hda/realtek: fix ALC285 issues on HP Envy x360 laptops (stable-fixes).\n- alsa: hda/realtek: fix mute/micmute LED For HP mt440 (git-fixes).\n- alsa: hda/realtek: fix mute/micmute LEDs for HP EliteBook (stable-fixes).\n- alsa: seq: fix function cast warnings (git-fixes).\n- alsa: sh: aica: reorder cleanup operations to avoid UAF bugs (git-fixes).\n- alsa: usb-audio: Stop parsing channels bits when all channels are found (git-fixes).\n- arm64: dts: allwinner: h6: Add RX DMA channel for SPDIF (git-fixes)\n- arm64: dts: broadcom: bcmbca: bcm4908: drop invalid switch cells (git-fixes)\n- arm64: dts: imx8mm-kontron: Add support for ultra high speed modes on (git-fixes)\n- arm64: dts: imx8mm-venice-gw71xx: fix USB OTG VBUS (git-fixes)\n- arm64: dts: marvell: reorder crypto interrupts on Armada SoCs (git-fixes)\n- arm64: dts: rockchip: add ES8316 codec for ROCK Pi 4 (git-fixes)\n- arm64: dts: rockchip: add SPDIF node for ROCK Pi 4 (git-fixes)\n- arm64: dts: rockchip: fix regulator name on rk3399-rock-4 (git-fixes)\n- arm64: dts: rockchip: set num-cs property for spi on px30 (git-fixes)\n- arm64: mm: fix VA-range sanity check (git-fixes)\n- arm64: set __exception_irq_entry with __irq_entry as a default (git-fixes)\n- asoc: Intel: bytcr_rt5640: Add an extra entry for the Chuwi Vi8 tablet (stable-fixes).\n- asoc: amd: acp: Add missing error handling in sof-mach (git-fixes).\n- asoc: amd: acp: fix for acp_init function error handling (git-fixes).\n- asoc: madera: Fix typo in madera_set_fll_clks shift value (git-fixes).\n- asoc: meson: Use dev_err_probe() helper (stable-fixes).\n- asoc: meson: aiu: fix function pointer type mismatch (git-fixes).\n- asoc: meson: axg-tdm-interface: add frame rate constraint (git-fixes).\n- asoc: meson: axg-tdm-interface: fix mclk setup without mclk-fs (git-fixes).\n- asoc: meson: t9015: fix function pointer type mismatch (git-fixes).\n- asoc: ops: Fix wraparound for mask in snd_soc_get_volsw (git-fixes).\n- asoc: rcar: adg: correct TIMSEL setting for SSI9 (git-fixes).\n- asoc: rt5645: Make LattePanda board DMI match more precise (stable-fixes).\n- asoc: rt5682-sdw: fix locking sequence (git-fixes).\n- asoc: rt711-sdca: fix locking sequence (git-fixes).\n- asoc: rt711-sdw: fix locking sequence (git-fixes).\n- asoc: wm8962: Enable both SPKOUTR_ENA and SPKOUTL_ENA in mono mode (stable-fixes).\n- asoc: wm8962: Enable oscillator if selecting WM8962_FLL_OSC (stable-fixes).\n- asoc: wm8962: Fix up incorrect error message in wm8962_set_fll (stable-fixes).\n- ata: sata_mv: Fix PCI device ID table declaration compilation warning (git-fixes).\n- ata: sata_sx4: fix pdc20621_get_from_dimm() on 64-bit (git-fixes).\n- backlight: da9052: Fully initialize backlight_properties during probe (git-fixes).\n- backlight: lm3630a: Do not set bl->props.brightness in get_brightness (git-fixes).\n- backlight: lm3630a: Initialize backlight_properties on init (git-fixes).\n- backlight: lm3639: Fully initialize backlight_properties during probe (git-fixes).\n- backlight: lp8788: Fully initialize backlight_properties during probe (git-fixes).\n- bcache: Fix __bch_btree_node_alloc to make the failure behavior consistent (git-fixes).\n- bcache: Remove dead references to cache_readaheads (git-fixes).\n- bcache: Remove unnecessary NULL point check in node allocations (git-fixes).\n- bcache: add code comments for bch_btree_node_get() and __bch_btree_node_alloc() (git-fixes).\n- bcache: avoid NULL checking to c->root in run_cache_set() (git-fixes).\n- bcache: avoid oversize memory allocation by small stripe_size (git-fixes).\n- bcache: bset: Fix comment typos (git-fixes).\n- bcache: check return value from btree_node_alloc_replacement() (git-fixes).\n- bcache: fix NULL pointer reference in cached_dev_detach_finish (git-fixes).\n- bcache: fix error info in register_bcache() (git-fixes).\n- bcache: fixup bcache_dev_sectors_dirty_add() multithreaded CPU false sharing (git-fixes).\n- bcache: fixup btree_cache_wait list damage (git-fixes).\n- bcache: fixup init dirty data errors (git-fixes).\n- bcache: fixup lock c->root error (git-fixes).\n- bcache: fixup multi-threaded bch_sectors_dirty_init() wake-up race (git-fixes).\n- bcache: move calc_cached_dev_sectors to proper place on backing device detach (git-fixes).\n- bcache: move uapi header bcache.h to bcache code directory (git-fixes).\n- bcache: prevent potential division by zero error (git-fixes).\n- bcache: remove EXPERIMENTAL for Kconfig option 'Asynchronous device registration' (git-fixes).\n- bcache: remove bch_crc64_update (git-fixes).\n- bcache: remove redundant assignment to variable cur_idx (git-fixes).\n- bcache: remove the backing_dev_name field from struct cached_dev (git-fixes).\n- bcache: remove the cache_dev_name field from struct cache (git-fixes).\n- bcache: remove unnecessary flush_workqueue (git-fixes).\n- bcache: remove unused bch_mark_cache_readahead function def in stats.h (git-fixes).\n- bcache: replace a mistaken IS_ERR() by IS_ERR_OR_NULL() in btree_gc_coalesce() (git-fixes).\n- bcache: replace snprintf in show functions with sysfs_emit (git-fixes).\n- bcache: revert replacing IS_ERR_OR_NULL with IS_ERR (git-fixes).\n- bcache: use bvec_kmap_local in bch_data_verify (git-fixes).\n- bcache: use bvec_kmap_local in bio_csum (git-fixes).\n- bcache: use default_groups in kobj_type (git-fixes).\n- bcache:: fix repeated words in comments (git-fixes).\n- blocklayoutdriver: Fix reference leak of pnfs_device_node (git-fixes).\n- bluetooth: hci_core: Fix possible buffer overflow (git-fixes).\n- bluetooth: mgmt: Remove leftover queuing of power_off work (git-fixes).\n- bluetooth: remove HCI_POWER_OFF_TIMEOUT (git-fixes).\n- bluetooth: remove superfluous call to hci_conn_check_pending() (git-fixes).\n- bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security (stable-fixes).\n- bpf, scripts: Correct GPL license name (git-fixes).\n- bpf, sockmap: Fix preempt_rt splat when using raw_spin_lock_t (git-fixes).\n- can: softing: remove redundant NULL check (git-fixes).\n- ceph: stop copying to iter at EOF on sync reads (bsc#1223068).\n- ceph: switch to corrected encoding of max_xattr_size in mdsmap (bsc#1223067).\n- clk: zynq: Prevent null pointer dereference caused by kmalloc failure (git-fixes).\n- comedi: comedi_test: Prevent timers rescheduling during deletion (git-fixes).\n- coresight: etm4x: Do not access TRCIDR1 for identification (bsc#1220775)\n- coresight: etm4x: Fix accesses to TRCSEQRSTEVR and TRCSEQSTR (bsc#1220775)\n- coresight: etm: Override TRCIDR3.CCITMIN on errata affected cpus (bsc#1220775)\n- cpufreq: amd-pstate: Fix min_perf assignment in amd_pstate_adjust_perf() (git-fixes).\n- cpufreq: brcmstb-avs-cpufreq: add check for cpufreq_cpu_get's return value (git-fixes).\n- crypto: arm/sha - fix function cast warnings (git-fixes).\n- crypto: qat - avoid division by zero (git-fixes).\n- crypto: qat - fix deadlock in backlog processing (git-fixes).\n- crypto: qat - fix double free during reset (git-fixes).\n- crypto: qat - fix state machines cleanup paths (bsc#1218321).\n- crypto: qat - fix unregistration of compression algorithms (git-fixes).\n- crypto: qat - fix unregistration of crypto algorithms (git-fixes).\n- crypto: qat - ignore subsequent state up commands (git-fixes).\n- crypto: qat - increase size of buffers (git-fixes).\n- crypto: qat - resolve race condition during AER recovery (git-fixes).\n- crypto: xilinx - call finalize with bh disabled (git-fixes).\n- dm cache policy smq: ensure IO does not prevent cleaner policy progress (git-fixes).\n- dm cache: add cond_resched() to various workqueue loops (git-fixes).\n- dm clone: call kmem_cache_destroy() in dm_clone_init() error path (git-fixes).\n- dm crypt: add cond_resched() to dmcrypt_write() (git-fixes).\n- dm crypt: avoid accessing uninitialized tasklet (git-fixes).\n- dm flakey: do not corrupt the zero page (git-fixes).\n- dm flakey: fix a bug with 32-bit highmem systems (git-fixes).\n- dm flakey: fix a crash with invalid table line (git-fixes).\n- dm flakey: fix logic when corrupting a bio (git-fixes).\n- dm init: add dm-mod.waitfor to wait for asynchronously probed block devices (git-fixes).\n- dm integrity: call kmem_cache_destroy() in dm_integrity_init() error path (git-fixes).\n- dm integrity: fix out-of-range warning (git-fixes).\n- dm integrity: reduce vmalloc space footprint on 32-bit architectures (git-fixes).\n- dm raid: clean up four equivalent goto tags in raid_ctr() (git-fixes).\n- dm raid: fix false positive for requeue needed during reshape (git-fixes).\n- dm raid: fix missing reconfig_mutex unlock in raid_ctr() error paths (git-fixes).\n- dm stats: check for and propagate alloc_percpu failure (git-fixes).\n- dm thin metadata: Fix ABBA deadlock by resetting dm_bufio_client (git-fixes).\n- dm thin metadata: check fail_io before using data_sm (git-fixes).\n- dm thin: add cond_resched() to various workqueue loops (git-fixes).\n- dm thin: fix deadlock when swapping to thin device (bsc#1177529).\n- dm verity: do not perform FEC for failed readahead IO (git-fixes).\n- dm verity: fix error handling for check_at_most_once on FEC (git-fixes).\n- dm zoned: free dmz->ddev array in dmz_put_zoned_devices (git-fixes).\n- dm-delay: fix a race between delay_presuspend and delay_bio (git-fixes).\n- dm-integrity: do not modify bio's immutable bio_vec in integrity_metadata() (git-fixes).\n- dm-raid: fix lockdep waring in 'pers->hot_add_disk' (git-fixes).\n- dm-verity, dm-crypt: align 'struct bvec_iter' correctly (git-fixes).\n- dm-verity: align struct dm_verity_fec_io properly (git-fixes).\n- dm: add cond_resched() to dm_wq_work() (git-fixes).\n- dm: call the resume method on internal suspend (git-fixes).\n- dm: do not lock fs when the map is NULL during suspend or resume (git-fixes).\n- dm: do not lock fs when the map is NULL in process of resume (git-fixes).\n- dm: remove flush_scheduled_work() during local_exit() (git-fixes).\n- dm: send just one event on resize, not two (git-fixes).\n- doc-guide: kernel-doc: tell about object-like macros (git-fixes).\n- doc/README.SUSE: Update information about module support status (jsc#PED-5759)\n- drivers: hv: vmbus: Calculate ring buffer size for more efficient use of memory (git-fixes).\n- drm/amd/display: Add FAMS validation before trying to use it (git-fixes).\n- drm/amd/display: Add function for validate and update new stream (git-fixes).\n- drm/amd/display: Avoid ABM when ODM combine is enabled for eDP (git-fixes).\n- drm/amd/display: Blocking invalid 420 modes on HDMI TMDS for DCN31 (git-fixes).\n- drm/amd/display: Check if link state is valid (git-fixes).\n- drm/amd/display: Copy DC context in the commit streams (git-fixes).\n- drm/amd/display: Disable PSR-SU on Parade 0803 TCON again (git-fixes).\n- drm/amd/display: Enable fast plane updates on DCN3.2 and above (git-fixes).\n- drm/amd/display: Enable new commit sequence only for DCN32x (git-fixes).\n- drm/amd/display: Exit idle optimizations before attempt to access PHY (git-fixes).\n- drm/amd/display: Expand kernel doc for DC (git-fixes).\n- drm/amd/display: Fix a bug when searching for insert_above_mpcc (git-fixes).\n- drm/amd/display: Fix a potential buffer overflow in 'dp_dsc_clock_en_read()' (git-fixes).\n- drm/amd/display: Fix possible underflow for displays with large vblank (git-fixes).\n- drm/amd/display: Fix the delta clamping for shaper LUT (git-fixes).\n- drm/amd/display: Fix underflow issue on 175hz timing (git-fixes).\n- drm/amd/display: For prefetch mode > 0, extend prefetch if possible (git-fixes).\n- drm/amd/display: Guard DCN31 PHYD32CLK logic against chip family (git-fixes).\n- drm/amd/display: Guard against invalid RPTR/WPTR being set (git-fixes).\n- drm/amd/display: Handle seamless boot stream (git-fixes).\n- drm/amd/display: Handle virtual hardware detect (git-fixes).\n- drm/amd/display: Include surface of unaffected streams (git-fixes).\n- drm/amd/display: Include udelay when waiting for INBOX0 ACK (git-fixes).\n- drm/amd/display: Increase frame warning limit with KASAN or KCSAN in dml (git-fixes).\n- drm/amd/display: Keep PHY active for dp config (git-fixes).\n- drm/amd/display: Prevent vtotal from being set to 0 (git-fixes).\n- drm/amd/display: Remove min_dst_y_next_start check for Z8 (git-fixes).\n- drm/amd/display: Restore rptr/wptr for DMCUB as workaround (git-fixes).\n- drm/amd/display: Return the correct HDCP error code (stable-fixes).\n- drm/amd/display: Revert vblank change that causes null pointer crash (git-fixes).\n- drm/amd/display: Rework comments on dc file (git-fixes).\n- drm/amd/display: Rework context change check (git-fixes).\n- drm/amd/display: Set minimum requirement for using PSR-SU on Phoenix (git-fixes).\n- drm/amd/display: Set minimum requirement for using PSR-SU on Rembrandt (git-fixes).\n- drm/amd/display: Update OTG instance in the commit stream (git-fixes).\n- drm/amd/display: Update correct DCN314 register header (git-fixes).\n- drm/amd/display: Update min Z8 residency time to 2100 for DCN314 (git-fixes).\n- drm/amd/display: Use DRAM speed from validation for dummy p-state (git-fixes).\n- drm/amd/display: Use DTBCLK as refclk instead of DPREFCLK (git-fixes).\n- drm/amd/display: Use min transition for all SubVP plane add/remove (git-fixes).\n- drm/amd/display: Write to correct dirty_rect (git-fixes).\n- drm/amd/display: Wrong colorimetry workaround (git-fixes).\n- drm/amd/display: add FB_DAMAGE_CLIPS support (git-fixes).\n- drm/amd/display: add ODM case when looking for first split pipe (git-fixes).\n- drm/amd/display: always switch off ODM before committing more streams (git-fixes).\n- drm/amd/display: clean code-style issues in dcn30_set_mpc_shaper_3dlut (git-fixes).\n- drm/amd/display: dc.h: eliminate kernel-doc warnings (git-fixes).\n- drm/amd/display: ensure async flips are only accepted for fast updates (git-fixes).\n- drm/amd/display: fix ABM disablement (git-fixes).\n- drm/amd/display: fix a NULL pointer dereference in amdgpu_dm_i2c_xfer() (git-fixes).\n- drm/amd/display: fix dc/core/dc.c kernel-doc (git-fixes).\n- drm/amd/display: fix hw rotated modes when PSR-SU is enabled (git-fixes).\n- drm/amd/display: fix kernel-doc issues in dc.h (git-fixes).\n- drm/amd/display: fix unbounded requesting for high pixel rate modes on dcn315 (git-fixes).\n- drm/amd/display: handle range offsets in VRR ranges (stable-fixes).\n- drm/amd/display: perform a bounds check before filling dirty rectangles (git-fixes).\n- drm/amd/display: set per pipe dppclk to 0 when dpp is off (git-fixes).\n- drm/amd/display: update extended blank for dcn314 onwards (git-fixes).\n- drm/amd/display: use low clocks for no plane configs (git-fixes).\n- drm/amd/pm: Fix error of MACO flag setting code (git-fixes).\n- drm/amd/pm: fix a memleak in aldebaran_tables_init (git-fixes).\n- drm/amd/smu: use AverageGfxclkFrequency* to replace previous GFX Curr Clock (git-fixes).\n- drm/amd: Enable PCIe PME from D3 (git-fixes).\n- drm/amdgpu/pm: Fix the error of pwm1_enable setting (stable-fixes).\n- drm/amdgpu/pm: make gfxclock consistent for sienna cichlid (git-fixes).\n- drm/amdgpu/pm: make mclk consistent for smu 13.0.7 (git-fixes).\n- drm/amdgpu/smu13: drop compute workload workaround (git-fixes).\n- drm/amdgpu: Enable gpu reset for S3 abort cases on Raven series (stable-fixes).\n- drm/amdgpu: Fix missing break in ATOM_ARG_IMM Case of atom_get_src_int() (git-fixes).\n- drm/amdgpu: Force order between a read and write to the same address (git-fixes).\n- drm/amdgpu: Match against exact bootloader status (git-fixes).\n- drm/amdgpu: Unset context priority is now invalid (git-fixes).\n- drm/amdgpu: Update min() to min_t() in 'amdgpu_info_ioctl' (git-fixes).\n- drm/amdgpu: amdgpu_ttm_gart_bind set gtt bound flag (stable-fixes).\n- drm/amdgpu: lower CS errors to debug severity (git-fixes).\n- drm/amdkfd: fix TLB flush after unmap for GFX9.4.2 (stable-fixes).\n- drm/bridge: tc358762: Instruct DSI host to generate HSE packets (git-fixes).\n- drm/display: fix typo (git-fixes).\n- drm/edid: Add quirk for OSVR HDK 2.0 (git-fixes).\n- drm/etnaviv: Restore some id values (git-fixes).\n- drm/exynos: do not return negative values from .get_modes() (stable-fixes).\n- drm/exynos: fix a possible null-pointer dereference due to data race in exynos_drm_crtc_atomic_disable() (git-fixes).\n- drm/i915/bios: Tolerate devdata==NULL in intel_bios_encoder_supports_dp_dual_mode() (stable-fixes).\n- drm/i915/gt: Do not generate the command streamer for all the CCS (git-fixes).\n- drm/i915/gt: Reset queue_priority_hint on parking (git-fixes).\n- drm/i915/gt: Use i915_vm_put on ppgtt_create error paths (git-fixes).\n- drm/i915/selftests: Fix dependency of some timeouts on HZ (git-fixes).\n- drm/i915: Add missing CCS documentation (git-fixes).\n- drm/i915: Call intel_pre_plane_updates() also for pipes getting enabled (git-fixes).\n- drm/i915: Check before removing mm notifier (git-fixes).\n- drm/lima: fix a memleak in lima_heap_alloc (git-fixes).\n- drm/mediatek: Fix a null pointer crash in mtk_drm_crtc_finish_page_flip (git-fixes).\n- drm/mediatek: dsi: Fix DSI RGB666 formats and definitions (git-fixes).\n- drm/msm/dpu: Only enable DSC_MODE_MULTIPLEX if dsc_merge is enabled (git-fixes).\n- drm/msm/dpu: add division of drm_display_mode's hskew parameter (git-fixes).\n- drm/msm/dpu: fix the programming of INTF_CFG2_DATA_HCTL_EN (git-fixes).\n- drm/msm/dpu: improve DSC allocation (git-fixes).\n- drm/panel-edp: use put_sync in unprepare (git-fixes).\n- drm/panel: Move AUX B116XW03 out of panel-edp back to panel-simple (git-fixes).\n- drm/panel: auo,b101uan08.3: Fine tune the panel power sequence (git-fixes).\n- drm/panel: boe-tv101wum-nl6: Fine tune the panel power sequence (git-fixes).\n- drm/panel: do not return negative error codes from drm_panel_get_modes() (stable-fixes).\n- drm/panfrost: fix power transition timeout warnings (git-fixes).\n- drm/probe-helper: warn about negative .get_modes() (stable-fixes).\n- drm/qxl: remove unused `count` variable from `qxl_surface_id_alloc()` (git-fixes).\n- drm/qxl: remove unused variable from `qxl_process_single_command()` (git-fixes).\n- drm/radeon/ni: Fix wrong firmware size logging in ni_init_microcode() (git-fixes).\n- drm/radeon/ni_dpm: remove redundant NULL check (git-fixes).\n- drm/radeon: remove dead code in ni_mc_load_microcode() (git-fixes).\n- drm/rockchip: dsi: Clean up 'usage_mode' when failing to attach (git-fixes).\n- drm/rockchip: inno_hdmi: Fix video timing (git-fixes).\n- drm/rockchip: lvds: do not overwrite error code (git-fixes).\n- drm/rockchip: lvds: do not print scary message when probing defer (git-fixes).\n- drm/tegra: dpaux: Fix PM disable depth imbalance in tegra_dpaux_probe (git-fixes).\n- drm/tegra: dsi: Add missing check for of_find_device_by_node (git-fixes).\n- drm/tegra: dsi: Fix missing pm_runtime_disable() in the error handling path of tegra_dsi_probe() (git-fixes).\n- drm/tegra: dsi: Fix some error handling paths in tegra_dsi_probe() (git-fixes).\n- drm/tegra: dsi: Make use of the helper function dev_err_probe() (stable-fixes).\n- drm/tegra: hdmi: Convert to devm_platform_ioremap_resource() (stable-fixes).\n- drm/tegra: hdmi: Fix some error handling paths in tegra_hdmi_probe() (git-fixes).\n- drm/tegra: output: Fix missing i2c_put_adapter() in the error handling paths of tegra_output_probe() (git-fixes).\n- drm/tegra: put drm_gem_object ref on error in tegra_fb_create (git-fixes).\n- drm/tegra: rgb: Fix missing clk_put() in the error handling paths of tegra_dc_rgb_probe() (git-fixes).\n- drm/tegra: rgb: Fix some error handling paths in tegra_dc_rgb_probe() (git-fixes).\n- drm/tidss: Fix initial plane zpos values (git-fixes).\n- drm/tidss: Fix sync-lost issue with two displays (git-fixes).\n- drm/ttm: Do not leak a resource on eviction error (git-fixes).\n- drm/ttm: Do not print error message if eviction was interrupted (git-fixes).\n- drm/vc4: Add module dependency on hdmi-codec (git-fixes).\n- drm/vmwgfx: Create debugfs ttm_resource_manager entry only if needed (git-fixes).\n- drm/vmwgfx: Fix possible null pointer derefence with invalid contexts (git-fixes).\n- drm/vmwgfx: fix a memleak in vmw_gmrid_man_get_node (git-fixes).\n- drm: Do not treat 0 as -1 in drm_fixp2int_ceil (git-fixes).\n- drm: Fix drm_fixp2int_round() making it add 0.5 (git-fixes).\n- drm: panel-orientation-quirks: Add quirk for Acer Switch V 10 (SW5-017) (git-fixes).\n- firewire: core: use long bus reset on gap count error (stable-fixes).\n- fix 'coresight: etm4x: Change etm4_platform_driver driver for MMIO devices' (bsc#1220775) Hunk with clk_put(drvdata->pclk) was incorrectly moved to another function.\n- force config_TCG_TIS_CORE=m on aarch64 for workaround kconfig issues\n- group-source-files.pl: Quote filenames (boo#1221077). The kernel source now contains a file with a space in the name. Add quotes in group-source-files.pl to avoid splitting the filename. Also use -print0 / -0 when updating timestamps.\n- hid: amd_sfh: Update HPD sensor structure elements (git-fixes).\n- hid: lenovo: Add middleclick_workaround sysfs knob for cptkbd (git-fixes).\n- hid: multitouch: Add required quirk for Synaptics 0xcddc device (stable-fixes).\n- hv_netvsc: Calculate correct ring size when PAGE_SIZE is not 4 Kbytes (git-fixes).\n- hv_netvsc: Fix race condition between netvsc_probe and netvsc_remove (git-fixes).\n- hv_netvsc: Register VF in netvsc_probe if NET_DEVICE_REGISTER missed (git-fixes).\n- i2c: aspeed: Fix the dummy irq expected print (git-fixes).\n- i2c: i801: Avoid potential double call to gpiod_remove_lookup_table (git-fixes).\n- i2c: wmt: Fix an error handling path in wmt_i2c_probe() (git-fixes).\n- ib/ipoib: fix mcast list locking (git-fixes)\n- iio: dummy_evgen: remove Excess kernel-doc comments (git-fixes).\n- iio: pressure: dlhl60d: Initialize empty DLH bytes (git-fixes).\n- input: gpio_keys_polled - suppress deferred probe error for gpio (stable-fixes).\n- input: synaptics-rmi4 - fix UAF of IRQ domain on driver removal (git-fixes).\n- iommu/amd: Add a length limitation for the ivrs_acpihid command-line parameter (git-fixes).\n- iommu/amd: Do not block updates to GATag if guest mode is on (git-fixes).\n- iommu/amd: Fix 'Guest Virtual APIC Table Root Pointer' configuration in IRTE (git-fixes).\n- iommu/amd: Fix domain flush size when syncing iotlb (git-fixes).\n- iommu/amd: Fix error handling for pdev_pri_ats_enable() (git-fixes).\n- iommu/amd: Mark interrupt as managed (git-fixes).\n- iommu/arm-smmu-qcom: Limit the SMR groups to 128 (git-fixes).\n- iommu/arm-smmu-v3: Acknowledge pri/event queue overflow if any (git-fixes).\n- iommu/arm-smmu-v3: Work around MMU-600 erratum 1076982 (git-fixes).\n- iommu/dma: Trace bounce buffer usage when mapping buffers (git-fixes).\n- iommu/fsl: fix all kernel-doc warnings in fsl_pamu.c (git-fixes).\n- iommu/iova: Fix alloc iova overflows issue (git-fixes).\n- iommu/mediatek-v1: Fix an error handling path in mtk_iommu_v1_probe() (git-fixes).\n- iommu/mediatek: Fix forever loop in error handling (git-fixes).\n- iommu/mediatek: Flush IOTLB completely only if domain has been attached (git-fixes).\n- iommu/rockchip: Fix unwind goto issue (git-fixes).\n- iommu/sprd: Release dma buffer to avoid memory leak (git-fixes).\n- iommu/vt-d: Allocate local memory for page request queue (git-fixes).\n- iommu/vt-d: Allow to use flush-queue when first level is default (git-fixes).\n- iommu/vt-d: Allow zero SAGAW if second-stage not supported (git-fixes).\n- iommu/vt-d: Do not issue ATS Invalidation request when device is disconnected (git-fixes).\n- iommu/vt-d: Fix PASID directory pointer coherency (git-fixes).\n- iommu/vt-d: Fix error handling in sva enable/disable paths (git-fixes).\n- iommu/vt-d: Set No Execute Enable bit in PASID table entry (git-fixes).\n- iommu: Fix error unwind in iommu_group_alloc() (git-fixes).\n- kABI: PCI: Add locking to RMW PCI Express Capability Register accessors (kabi).\n- kabi: Adjust trace_iterator.wait_index (git-fixes).\n- kconfig: fix infinite loop when expanding a macro at the end of file (git-fixes).\n- kernel-binary: Fix i386 build Fixes: 89eaf4cdce05 ('rpm templates: Move macro definitions below buildrequires')\n- kernel-binary: Move build script to the end All other spec templates have the build script at the end, only kernel-binary has it in the middle. Align with the other templates.\n- kernel-binary: certs: Avoid trailing space\n- kernel-binary: vdso: fix filelist for non-usrmerged kernel Fixes: a6ad8af207e6 ('rpm templates: Always define usrmerged')\n- kprobes: Fix double free of kretprobe_holder (bsc#1220901).\n- kvm: s390: only deliver the set service event bits (git-fixes bsc#1221631).\n- leds: aw2013: Unlock mutex before destroying it (git-fixes).\n- lib/cmdline: Fix an invalid format specifier in an assertion msg (git-fixes).\n- libnvdimm/of_pmem: Use devm_kstrdup instead of kstrdup and check its return value (git-fixes).\n- libnvdimm/region: Allow setting align attribute on regions without mappings (git-fixes).\n- make nvidia Grace-Hopper TPM related drivers build-ins (bsc#1221156)\n- md/raid1: fix choose next idle in read_balance() (git-fixes).\n- md: Do not clear MD_CLOSING when the raid is about to stop (git-fixes).\n- md: do not clear MD_RECOVERY_FROZEN for new dm-raid until resume (git-fixes).\n- md: fix data corruption for raid456 when reshape restart while grow up (git-fixes).\n- media: dvb-frontends: avoid stack overflow warnings with clang (git-fixes).\n- media: edia: dvbdev: fix a use-after-free (git-fixes).\n- media: em28xx: annotate unchecked call to media_device_register() (git-fixes).\n- media: go7007: add check of return value of go7007_read_addr() (git-fixes).\n- media: go7007: fix a memleak in go7007_load_encoder (git-fixes).\n- media: imx: csc/scaler: fix v4l2_ctrl_handler memory leak (git-fixes).\n- media: pvrusb2: fix pvr2_stream_callback casts (git-fixes).\n- media: pvrusb2: fix uaf in pvr2_context_set_notify (git-fixes).\n- media: pvrusb2: remove redundant NULL check (git-fixes).\n- media: staging: ipu3-imgu: Set fields before media_entity_pads_init() (git-fixes).\n- media: sun8i-di: Fix chroma difference threshold (git-fixes).\n- media: sun8i-di: Fix coefficient writes (git-fixes).\n- media: sun8i-di: Fix power on/off sequences (git-fixes).\n- media: tc358743: register v4l2 async device only after successful setup (git-fixes).\n- media: ttpci: fix two memleaks in budget_av_attach (git-fixes).\n- media: usbtv: Remove useless locks in usbtv_video_free() (git-fixes).\n- media: v4l2-mem2mem: fix a memleak in v4l2_m2m_register_entity (git-fixes).\n- media: v4l2-tpg: fix some memleaks in tpg_alloc (git-fixes).\n- media: xc4000: Fix atomicity violation in xc4000_get_frequency (git-fixes).\n- mfd: altera-sysmgr: Call of_node_put() only when of_parse_phandle() takes a ref (git-fixes).\n- mfd: syscon: Call of_node_put() only when of_parse_phandle() takes a ref (git-fixes).\n- mm,page_owner: Defer enablement of static branch (bsc#1222366).\n- mm,page_owner: Fix accounting of pages when migrating (bsc#1222366).\n- mm,page_owner: Fix printing of stack records (bsc#1222366).\n- mm,page_owner: Fix refcount imbalance (bsc#1222366).\n- mm,page_owner: Update metadata for tail pages (bsc#1222366).\n- mm,page_owner: check for null stack_record before bumping its refcount (bsc#1222366).\n- mm,page_owner: drop unnecessary check (bsc#1222366).\n- mm,page_owner: fix recursion (bsc#1222366).\n- mm/vmalloc: huge vmalloc backing pages should be split rather than compound (bsc#1217829).\n- mmc: core: Avoid negative index with array access (git-fixes).\n- mmc: core: Fix switch on gp3 partition (git-fixes).\n- mmc: core: Initialize mmc_blk_ioc_data (git-fixes).\n- mmc: mmci: stm32: fix DMA API overlapping mappings warning (git-fixes).\n- mmc: mmci: stm32: use a buffer for unaligned DMA requests (git-fixes).\n- mmc: tmio: avoid concurrent runs of mmc_request_done() (git-fixes).\n- mmc: wmt-sdmmc: remove an incorrect release_mem_region() call in the .remove function (git-fixes).\n- mtd: maps: physmap-core: fix flash size larger than 32-bit (git-fixes).\n- mtd: rawnand: lpc32xx_mlc: fix irq handler prototype (git-fixes).\n- mtd: rawnand: meson: fix scrambling mode value in command macro (git-fixes).\n- nd_btt: Make BTT lanes preemptible (git-fixes).\n- net/bnx2x: Prevent access to a freed page in page_pool (bsc#1215322).\n- net/x25: fix incorrect parameter validation in the x25_getsockopt() function (git-fixes).\n- net: Fix features skip in for_each_netdev_feature() (git-fixes).\n- net: lan78xx: fix runtime PM count underflow on link stop (git-fixes).\n- net: ll_temac: platform_get_resource replaced by wrong function (git-fixes).\n- net: mana: Fix Rx DMA datasize and skb_over_panic (git-fixes).\n- net: phy: fix phy_get_internal_delay accessing an empty array (git-fixes).\n- net: sunrpc: Fix an off by one in rpc_sockaddr2uaddr() (git-fixes).\n- net: usb: ax88179_178a: avoid the interface always configured as random address (git-fixes).\n- nfc: nci: Fix uninit-value in nci_dev_up and nci_ntf_packet (git-fixes).\n- nfs: avoid spurious warning of lost lock that is being unlocked (bsc#1221791).\n- nfs: fix an off by one in root_nfs_cat() (git-fixes).\n- nfs: rename nfs_client_kset to nfs_kset (git-fixes).\n- nfsd: change LISTXATTRS cookie encoding to big-endian (git-fixes).\n- nfsd: convert the callback workqueue to use delayed_work (git-fixes).\n- nfsd: do not take fi_lock in nfsd_break_deleg_cb() (git-fixes).\n- nfsd: fix file memleak on client_opens_release (git-fixes).\n- nfsd: fix liSTXATTRS returning a short list with eof=TRUE (git-fixes).\n- nfsd: fix liSTXATTRS returning more bytes than maxcount (git-fixes).\n- nfsd: fix nfsd4_listxattr_validate_cookie (git-fixes).\n- nfsd: lock_rename() needs both directories to live on the same fs (git-fixes).\n- nfsd: reschedule CB operations when backchannel rpc_clnt is shut down (git-fixes).\n- nfsd: reset cb_seq_status after NFS4ERR_DELAY (git-fixes).\n- nfsd: retransmit callbacks after client reconnects (git-fixes).\n- nfsd: use vfs setgid helper (git-fixes).\n- nfsv4.1/pnfs: Ensure we handle the error NFS4ERR_RETURNCONFLICT (git-fixes).\n- nfsv4.1: fix SP4_MACH_CRED protection for pnfs IO (git-fixes).\n- nfsv4.1: fixup use EXCHGID4_FLAG_USE_PNFS_DS for DS server (git-fixes).\n- nfsv4.1: use EXCHGID4_FLAG_USE_PNFS_DS for DS server (git-fixes).\n- nfsv4.2: fix listxattr maximum XDR buffer size (git-fixes).\n- nfsv4.2: fix nfs4_listxattr kernel BUG at mm/usercopy.c:102 (git-fixes).\n- nfsv4.2: fix wrong shrinker_id (git-fixes).\n- nfsv4: fix a nfs4_state_manager() race (git-fixes).\n- nfsv4: fix a state manager thread deadlock regression (git-fixes).\n- nilfs2: fix failure to detect DAT corruption in btree and direct mappings (git-fixes).\n- nilfs2: prevent kernel bug at submit_bh_wbc() (git-fixes).\n- nouveau/dmem: handle kcalloc() allocation failure (git-fixes).\n- nouveau: reset the bo resource bus info after an eviction (git-fixes).\n- ntfs: fix use-after-free in ntfs_ucsncmp() (bsc#1221713).\n- nvdimm/namespace: drop nested variable in create_namespace_pmem() (git-fixes).\n- nvdimm: Allow overwrite in the presence of disabled dimms (git-fixes).\n- nvdimm: Fix badblocks clear off-by-one error (git-fixes).\n- nvdimm: Fix dereference after free in register_nvdimm_pmu() (git-fixes).\n- nvdimm: Fix firmware activation deadlock scenarios (git-fixes).\n- nvdimm: Fix memleak of pmu attr_groups in unregister_nvdimm_pmu() (git-fixes).\n- nvme-fc: do not wait in vain when unloading module (git-fixes).\n- nvme: fix reconnection fail due to reserved tag allocation (git-fixes).\n- nvmet-fc: abort command when there is no binding (git-fixes).\n- nvmet-fc: avoid deadlock on delete association path (git-fixes).\n- nvmet-fc: defer cleanup using RCU properly (git-fixes).\n- nvmet-fc: hold reference on hostport match (git-fixes).\n- nvmet-fc: release reference on target port (git-fixes).\n- nvmet-fc: take ref count on tgtport before delete assoc (git-fixes).\n- nvmet-fcloop: swap the list_add_tail arguments (git-fixes).\n- nvmet-tcp: fix nvme tcp ida memory leak (git-fixes).\n- pNFS/flexfiles: Check the layout validity in ff_layout_mirror_prepare_stats (git-fixes).\n- pNFS: Fix a hang in nfs4_evict_inode() (git-fixes).\n- pNFS: Fix the pnfs block driver's calculation of layoutget size (git-fixes).\n- pci/aer: Block runtime suspend when handling errors (git-fixes).\n- pci/aer: fix rootport attribute paths in ABI docs (git-fixes).\n- pci/aspm: use RMW accessors for changing LNKCTL (git-fixes).\n- pci/dpc: Quirk PIO log size for Intel Ice Lake Root Ports (git-fixes).\n- pci/dpc: Quirk PIO log size for Intel Raptor Lake Root Ports (git-fixes).\n- pci/dpc: Quirk PIO log size for certain Intel Root Ports (git-fixes).\n- pci/dpc: print all TLP Prefixes, not just the first (git-fixes).\n- pci/msi: prevent MSI hardware interrupt number truncation (bsc#1218777)\n- pci/p2pdma: Fix a sleeping issue in a RCU read section (git-fixes).\n- pci/pm: Drain runtime-idle callbacks before driver removal (git-fixes).\n- pci: Drop pci_device_remove() test of pci_dev->driver (git-fixes).\n- pci: add locking to RMW PCI Express Capability Register accessors (git-fixes).\n- pci: dwc: endpoint: Fix advertised resizable BAR size (git-fixes).\n- pci: dwc: endpoint: Fix dw_pcie_ep_raise_msix_irq() alignment support (git-fixes).\n- pci: dwc: fix a 64bit bug in dw_pcie_ep_raise_msix_irq() (git-fixes).\n- pci: fu740: Set the number of MSI vectors (git-fixes).\n- pci: lengthen reset delay for VideoPropulsion Torrent QN16e card (git-fixes).\n- pci: make link retraining use RMW accessors for changing LNKCTL (git-fixes).\n- pci: mark 3ware-9650SE Root Port Extended Tags as broken (git-fixes).\n- pci: mediatek-gen3: Fix translation window size calculation (git-fixes).\n- pci: mediatek: Clear interrupt status before dispatching handler (git-fixes).\n- pci: qcom: enable BDF to SID translation properly (git-fixes).\n- pci: qcom: use DWC helpers for modifying the read-only DBI registers (git-fixes).\n- pci: rockchip: Do not advertise MSI-X in PCIe capabilities (git-fixes).\n- pci: rockchip: Fix window mapping and address translation for endpoint (git-fixes).\n- pci: rockchip: Use 64-bit mask on MSI 64-bit PCI address (git-fixes).\n- pci: switchtec: Fix an error handling path in switchtec_pci_probe() (git-fixes).\n- pci_iounmap(): Fix MMIO mapping leak (git-fixes).\n- pinctrl: mediatek: Drop bogus slew rate register range for MT8192 (git-fixes).\n- platform/mellanox: mlxreg-hotplug: Remove redundant NULL-check (git-fixes).\n- pm: suspend: Set mem_sleep_current during kernel command line setup (git-fixes).\n- powerpc/64s: POWER10 CPU Kconfig build option (bsc#1194869).\n- powerpc/boot: Disable power10 features after BOOTAFLAGS assignment (bsc#1194869).\n- powerpc/boot: Fix boot wrapper code generation with CONFIG_POWER10_CPU (bsc#1194869).\n- powerpc/lib/sstep: Do not use __{get/put}_user() on kernel addresses (bsc#1194869).\n- powerpc/lib/sstep: Remove unneeded #ifdef __powerpc64__ (bsc#1194869).\n- powerpc/lib/sstep: Use l1_dcache_bytes() instead of opencoding (bsc#1194869).\n- powerpc/lib/sstep: use truncate_if_32bit() (bsc#1194869).\n- powerpc/pseries/iommu: IOMMU table is not initialized for kdump over SR-IOV (bsc#1220492 ltc#205270).\n- powerpc/pseries/iommu: LPAR panics when rebooted with a frozen PE (bsc#1222011 ltc#205900).\n- powerpc/pseries: Fix potential memleak in papr_get_attr() (bsc#1200465 ltc#197256 jsc#SLE-18130 git-fixes).\n- powerpc/sstep: Use bitwise instead of arithmetic operator for flags (bsc#1194869).\n- powerpc: add compile-time support for lbarx, lharx (bsc#1194869).\n- pwm: mediatek: Update kernel doc for struct pwm_mediatek_of_data (git-fixes).\n- qedf: Do not process stag work during unload (bsc#1214852).\n- qedf: Wait for stag work during unload (bsc#1214852).\n- raid1: fix use-after-free for original bio in raid1_write_request() (bsc#1221097).\n- ras/amd/fmpm: Add debugfs interface to print record entries (jsc#PED-7619).\n- ras/amd/fmpm: Avoid NULL ptr deref in get_saved_records() (jsc#PED-7619).\n- ras/amd/fmpm: Fix build when debugfs is not enabled (jsc#PED-7619).\n- ras/amd/fmpm: Fix off by one when unwinding on error (jsc#PED-7619).\n- ras/amd/fmpm: Safely handle saved records of various sizes (jsc#PED-7619).\n- ras/amd/fmpm: Save SPA values (jsc#PED-7619).\n- ras: Avoid build errors when CONFIG_DEBUG_FS=n (git-fixes).\n- ras: Avoid build errors when CONFIG_DEBUG_FS=n (jsc#PED-7619).\n- ras: export helper to get ras_debugfs_dir (jsc#PED-7619).\n- rdma/cm: add timeout to cm_destroy_id wait (git-fixes)\n- rdma/device: Fix a race between mad_client and cm_client init (git-fixes)\n- rdma/hns: fix mis-modifying default congestion control algorithm (git-fixes)\n- rdma/ipoib: Fix error code return in ipoib_mcast_join (git-fixes)\n- rdma/irdma: Remove duplicate assignment (git-fixes)\n- rdma/mana_ib: Fix bug in creation of dma regions (git-fixes).\n- rdma/mlx5: fix fortify source warning while accessing Eth segment (git-fixes)\n- rdma/mlx5: relax DEVX access upon modify commands (git-fixes)\n- rdma/rtrs-clt: Check strnlen return len in sysfs mpath_policy_store() (git-fixes)\n- rdma/srpt: do not register event handler until srpt device is fully setup (git-fixes)\n- ring-buffer: Do not set shortest_full when full target is hit (git-fixes).\n- ring-buffer: Fix full_waiters_pending in poll (git-fixes).\n- ring-buffer: Fix resetting of shortest_full (git-fixes).\n- ring-buffer: Fix waking up ring buffer readers (git-fixes).\n- ring-buffer: Make wake once of ring_buffer_wait() more robust (git-fixes).\n- ring-buffer: Use wait_event_interruptible() in ring_buffer_wait() (git-fixes).\n- rtc: mt6397: select IRQ_DOMAIN instead of depending on it (git-fixes).\n- s390/pai: fix attr_event_free upper limit for pai device drivers (git-fixes bsc#1221633).\n- s390/vfio-ap: realize the VFIO_DEVICE_GET_IRQ_INFO ioctl (bsc#1205316).\n- s390/vfio-ap: realize the VFIO_DEVICE_SET_IRQS ioctl (bsc#1205316).\n- s390/vfio-ap: wire in the vfio_device_ops request callback (bsc#1205316).\n- s390/vtime: fix average steal time calculation (git-fixes bsc#1221951).\n- sched/rt: Disallow writing invalid values to sched_rt_period_us (bsc#1220176).\n- sched/rt: sysctl_sched_rr_timeslice show default timeslice after reset (bsc#1220176).\n- scsi: lpfc: Copyright updates for 14.4.0.1 patches (bsc#1221777).\n- scsi: lpfc: Correct size for cmdwqe/rspwqe for memset() (bsc#1221777).\n- scsi: lpfc: Correct size for wqe for memset() (bsc#1221777).\n- scsi: lpfc: Define lpfc_dmabuf type for ctx_buf ptr (bsc#1221777).\n- scsi: lpfc: Define lpfc_nodelist type for ctx_ndlp ptr (bsc#1221777).\n- scsi: lpfc: Define types in a union for generic void *context3 ptr (bsc#1221777).\n- scsi: lpfc: Move NPIV's transport unregistration to after resource clean up (bsc#1221777).\n- scsi: lpfc: Release hbalock before calling lpfc_worker_wake_up() (bsc#1221777).\n- scsi: lpfc: Remove IRQF_ONESHOT flag from threaded IRQ handling (bsc#1221777 bsc#1217959).\n- scsi: lpfc: Remove unnecessary log message in queuecommand path (bsc#1221777).\n- scsi: lpfc: Replace hbalock with ndlp lock in lpfc_nvme_unregister_port() (bsc#1221777).\n- scsi: lpfc: Update lpfc version to 14.4.0.1 (bsc#1221777).\n- scsi: lpfc: Update lpfc_ramp_down_queue_handler() logic (bsc#1221777).\n- scsi: lpfc: Use a dedicated lock for ras_fwlog state (bsc#1221777).\n- scsi: qedf: Remove set but unused variable 'page' (bsc#1214852).\n- scsi: qedf: Remove unused 'num_handled' variable (bsc#1214852).\n- scsi: qedf: Remove unused declaration (bsc#1214852).\n- scsi: qla2xxx: Change debug message during driver unload (bsc1221816).\n- scsi: qla2xxx: Delay I/O Abort on PCI error (bsc1221816).\n- scsi: qla2xxx: Fix N2N stuck connection (bsc1221816).\n- scsi: qla2xxx: Fix command flush on cable pull (bsc1221816).\n- scsi: qla2xxx: Fix double free of fcport (bsc1221816).\n- scsi: qla2xxx: Fix double free of the ha->vp_map pointer (bsc1221816).\n- scsi: qla2xxx: NVME|FCP prefer flag not being honored (bsc1221816).\n- scsi: qla2xxx: Prevent command send on chip reset (bsc1221816).\n- scsi: qla2xxx: Split FCE|EFT trace control (bsc1221816).\n- scsi: qla2xxx: Update manufacturer detail (bsc1221816).\n- scsi: qla2xxx: Update version to 10.02.09.200-k (bsc1221816).\n- scsi: storvsc: Fix ring buffer size calculation (git-fixes).\n- scsi: target: core: Silence the message about unknown VPD pages (bsc#1221252).\n- selftests/bpf: add generic BPF program tester-loader (bsc#1222033).\n- serial: 8250_exar: Do not remove GPIO device on suspend (git-fixes).\n- serial: max310x: fix syntax error in IRQ error message (git-fixes).\n- slimbus: core: Remove usage of the deprecated ida_simple_xx() API (git-fixes).\n- soc: fsl: qbman: Always disable interrupts when taking cgr_lock (git-fixes).\n- spi: lm70llp: fix links in doc and comments (git-fixes).\n- spi: spi-mt65xx: Fix NULL pointer access in interrupt handler (git-fixes).\n- sr9800: Add check for usbnet_get_endpoints (git-fixes).\n- stackdepot: rename pool_index to pool_index_plus_1 (git-fixes).\n- staging: vc04_services: fix information leak in create_component() (git-fixes).\n- sunrpc: Add an IS_ERR() check back to where it was (git-fixes).\n- sunrpc: ECONNRESET might require a rebind (git-fixes).\n- sunrpc: Fix RPC client cleaned up the freed pipefs dentries (git-fixes).\n- sunrpc: Fix a suspicious RCU usage warning (git-fixes).\n- sunrpc: fix a memleak in gss_import_v2_context (git-fixes).\n- sunrpc: fix some memleaks in gssx_dec_option_array (git-fixes).\n- svcrdma: Drop connection after an RDMA Read error (git-fixes).\n- tracing/ring-buffer: Fix wait_on_pipe() race (git-fixes).\n- tracing: Have saved_cmdlines arrays all in one allocation (git-fixes).\n- tracing: Remove precision vsnprintf() check from print event (git-fixes).\n- tracing: Use .flush() call to wake up readers (git-fixes).\n- tty: n_gsm: require CAP_NET_ADMIN to attach N_GSM0710 ldisc (bsc#1222619).\n- tty: serial: fsl_lpuart: avoid idle preamble pending if CTS is enabled (git-fixes).\n- tty: serial: samsung: fix tx_empty() to return TIOCSER_TEMT (git-fixes).\n- tty: vt: fix 20 vs 0x20 typo in EScsiignore (git-fixes).\n- ubifs: Queue up space reservation tasks if retrying many times (git-fixes).\n- ubifs: Remove unreachable code in dbg_check_ltab_lnum (git-fixes).\n- ubifs: Set page uptodate in the correct place (git-fixes).\n- ubifs: dbg_check_idx_size: Fix kmemleak if loading znode failed (git-fixes).\n- ubifs: fix sort function prototype (git-fixes).\n- usb: audio-v2: Correct comments for struct uac_clock_selector_descriptor (git-fixes).\n- usb: cdc-wdm: close race between read and workqueue (git-fixes).\n- usb: core: Fix deadlock in usb_deauthorize_interface() (git-fixes).\n- usb: dwc2: gadget: Fix exiting from clock gating (git-fixes).\n- usb: dwc2: gadget: LPM flow fix (git-fixes).\n- usb: dwc2: host: Fix ISOC flow in DDMA mode (git-fixes).\n- usb: dwc2: host: Fix hibernation flow (git-fixes).\n- usb: dwc2: host: Fix remote wakeup from hibernation (git-fixes).\n- usb: dwc3: Properly set system wakeup (git-fixes).\n- usb: gadget: ncm: Fix handling of zero block length packets (git-fixes).\n- usb: gadget: net2272: Use irqflags in the call to net2272_probe_fin (git-fixes).\n- usb: port: Do not try to peer unused USB ports based on location (git-fixes).\n- usb: typec: Return size of buffer if pd_set operation succeeds (git-fixes).\n- usb: typec: ucsi: Check for notifications after init (git-fixes).\n- usb: typec: ucsi: Clean up UCSI_CABLE_PROP macros (git-fixes).\n- usb: typec: ucsi: Clear EVENT_PENDING under PPM lock (git-fixes).\n- usb: usb-storage: Prevent divide-by-0 error in isd200_ata_command (git-fixes).\n- usb: xhci: Add error handling in xhci_map_urb_for_dma (git-fixes).\n- vboxsf: Avoid an spurious warning if load_nls_xxx() fails (git-fixes).\n- vdpa/mlx5: Allow CVQ size changes (git-fixes).\n- vt: fix unicode buffer corruption when deleting characters (git-fixes).\n- watchdog: stm32_iwdg: initialize default timeout (git-fixes).\n- wifi: ath10k: fix NULL pointer dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev() (git-fixes).\n- wifi: ath11k: decrease MHI channel buffer length to 8KB (bsc#1207948).\n- wifi: ath11k: initialize rx_mcs_80 and rx_mcs_160 before use (git-fixes).\n- wifi: ath9k: delay all of ath9k_wmi_event_tasklet() until init is complete (git-fixes).\n- wifi: b43: Disable QoS for bcm4331 (git-fixes).\n- wifi: b43: Stop correct queue in DMA worker when QoS is disabled (git-fixes).\n- wifi: b43: Stop/wake correct queue in DMA Tx path when QoS is disabled (git-fixes).\n- wifi: b43: Stop/wake correct queue in PIO Tx path when QoS is disabled (git-fixes).\n- wifi: brcmfmac: fix copyright year mentioned in platform_data header (git-fixes).\n- wifi: brcmsmac: avoid function pointer casts (git-fixes).\n- wifi: iwlwifi: dbg-tlv: ensure NUL termination (git-fixes).\n- wifi: iwlwifi: fix EWRD table validity check (git-fixes).\n- wifi: iwlwifi: fw: do not always use FW dump trig (git-fixes).\n- wifi: iwlwifi: mvm: do not set replay counters to 0xff (git-fixes).\n- wifi: iwlwifi: mvm: report beacon protection failures (git-fixes).\n- wifi: iwlwifi: mvm: rfi: fix potential response leaks (git-fixes).\n- wifi: iwlwifi: mvm: use FW rate for non-data only on new devices (git-fixes).\n- wifi: libertas: fix some memleaks in lbs_allocate_cmd_buffer() (git-fixes).\n- wifi: mwifiex: debugfs: Drop unnecessary error check for debugfs_create_dir() (git-fixes).\n- wifi: rtl8xxxu: add cancel_work_sync() for c2hcmd_work (git-fixes).\n- wifi: rtw88: 8821c: Fix false alarm count (git-fixes).\n- wifi: wilc1000: fix RCU usage in connect path (git-fixes).\n- wifi: wilc1000: fix declarations ordering (stable-fixes).\n- wifi: wilc1000: fix multi-vif management when deleting a vif (git-fixes).\n- wifi: wilc1000: prevent use-after-free on vif when cleaning up all interfaces (git-fixes).\n- x86/CPU/AMD: Update the Zenbleed microcode revisions (git-fixes).\n- x86/bugs: Fix the SRSO mitigation on Zen3/4 (git-fixes).\n- x86/fpu: Keep xfd_state in sync with MSR_IA32_XFD (git-fixes).\n- x86/xen: Add some null pointer checking to smp.c (git-fixes).\n- x86/xen: add CPU dependencies for 32-bit build (git-fixes).\n- x86/xen: fix percpu vcpu_info allocation (git-fixes).\n- xen-netback: properly sync TX responses (git-fixes).\n- xen-netfront: Add missing skb_mark_for_recycle (git-fixes).\n- xen/gntdev: Fix the abuse of underlying struct page in DMA-buf import (git-fixes).\n- xen/xenbus: document will_handle argument for xenbus_watch_path() (git-fixes).\n- xhci: handle isoc Babble and Buffer Overrun events properly (git-fixes).\n- xhci: process isoc TD properly when there was a transaction error mid TD (git-fixes).\n","id":"SUSE-SU-2024:1490-1","modified":"2024-05-03T07:54:25Z","published":"2024-05-03T07:54:25Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2024/suse-su-20241490-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1177529"},{"type":"REPORT","url":"https://bugzilla.suse.com/1192145"},{"type":"REPORT","url":"https://bugzilla.suse.com/1194869"},{"type":"REPORT","url":"https://bugzilla.suse.com/1200465"},{"type":"REPORT","url":"https://bugzilla.suse.com/1205316"},{"type":"REPORT","url":"https://bugzilla.suse.com/1207948"},{"type":"REPORT","url":"https://bugzilla.suse.com/1209635"},{"type":"REPORT","url":"https://bugzilla.suse.com/1209657"},{"type":"REPORT","url":"https://bugzilla.suse.com/1212514"},{"type":"REPORT","url":"https://bugzilla.suse.com/1213456"},{"type":"REPORT","url":"https://bugzilla.suse.com/1214852"},{"type":"REPORT","url":"https://bugzilla.suse.com/1215221"},{"type":"REPORT","url":"https://bugzilla.suse.com/1215322"},{"type":"REPORT","url":"https://bugzilla.suse.com/1217339"},{"type":"REPORT","url":"https://bugzilla.suse.com/1217829"},{"type":"REPORT","url":"https://bugzilla.suse.com/1217959"},{"type":"REPORT","url":"https://bugzilla.suse.com/1217987"},{"type":"REPORT","url":"https://bugzilla.suse.com/1217988"},{"type":"REPORT","url":"https://bugzilla.suse.com/1217989"},{"type":"REPORT","url":"https://bugzilla.suse.com/1218321"},{"type":"REPORT","url":"https://bugzilla.suse.com/1218336"},{"type":"REPORT","url":"https://bugzilla.suse.com/1218479"},{"type":"REPORT","url":"https://bugzilla.suse.com/1218643"},{"type":"REPORT","url":"https://bugzilla.suse.com/1218777"},{"type":"REPORT","url":"https://bugzilla.suse.com/1219126"},{"type":"REPORT","url":"https://bugzilla.suse.com/1219169"},{"type":"REPORT","url":"https://bugzilla.suse.com/1219170"},{"type":"REPORT","url":"https://bugzilla.suse.com/1219264"},{"type":"REPORT","url":"https://bugzilla.suse.com/1219834"},{"type":"REPORT","url":"https://bugzilla.suse.com/1220114"},{"type":"REPORT","url":"https://bugzilla.suse.com/1220176"},{"type":"REPORT","url":"https://bugzilla.suse.com/1220237"},{"type":"REPORT","url":"https://bugzilla.suse.com/1220251"},{"type":"REPORT","url":"https://bugzilla.suse.com/1220320"},{"type":"REPORT","url":"https://bugzilla.suse.com/1220337"},{"type":"REPORT","url":"https://bugzilla.suse.com/1220340"},{"type":"REPORT","url":"https://bugzilla.suse.com/1220365"},{"type":"REPORT","url":"https://bugzilla.suse.com/1220366"},{"type":"REPORT","url":"https://bugzilla.suse.com/1220398"},{"type":"REPORT","url":"https://bugzilla.suse.com/1220411"},{"type":"REPORT","url":"https://bugzilla.suse.com/1220413"},{"type":"REPORT","url":"https://bugzilla.suse.com/1220439"},{"type":"REPORT","url":"https://bugzilla.suse.com/1220443"},{"type":"REPORT","url":"https://bugzilla.suse.com/1220445"},{"type":"REPORT","url":"https://bugzilla.suse.com/1220466"},{"type":"REPORT","url":"https://bugzilla.suse.com/1220478"},{"type":"REPORT","url":"https://bugzilla.suse.com/1220482"},{"type":"REPORT","url":"https://bugzilla.suse.com/1220484"},{"type":"REPORT","url":"https://bugzilla.suse.com/1220486"},{"type":"REPORT","url":"https://bugzilla.suse.com/1220487"},{"type":"REPORT","url":"https://bugzilla.suse.com/1220492"},{"type":"REPORT","url":"https://bugzilla.suse.com/1220703"},{"type":"REPORT","url":"https://bugzilla.suse.com/1220775"},{"type":"REPORT","url":"https://bugzilla.suse.com/1220790"},{"type":"REPORT","url":"https://bugzilla.suse.com/1220797"},{"type":"REPORT","url":"https://bugzilla.suse.com/1220831"},{"type":"REPORT","url":"https://bugzilla.suse.com/1220833"},{"type":"REPORT","url":"https://bugzilla.suse.com/1220836"},{"type":"REPORT","url":"https://bugzilla.suse.com/1220839"},{"type":"REPORT","url":"https://bugzilla.suse.com/1220840"},{"type":"REPORT","url":"https://bugzilla.suse.com/1220843"},{"type":"REPORT","url":"https://bugzilla.suse.com/1220870"},{"type":"REPORT","url":"https://bugzilla.suse.com/1220871"},{"type":"REPORT","url":"https://bugzilla.suse.com/1220872"},{"type":"REPORT","url":"https://bugzilla.suse.com/1220878"},{"type":"REPORT","url":"https://bugzilla.suse.com/1220879"},{"type":"REPORT","url":"https://bugzilla.suse.com/1220883"},{"type":"REPORT","url":"https://bugzilla.suse.com/1220885"},{"type":"REPORT","url":"https://bugzilla.suse.com/1220887"},{"type":"REPORT","url":"https://bugzilla.suse.com/1220898"},{"type":"REPORT","url":"https://bugzilla.suse.com/1220901"},{"type":"REPORT","url":"https://bugzilla.suse.com/1220915"},{"type":"REPORT","url":"https://bugzilla.suse.com/1220918"},{"type":"REPORT","url":"https://bugzilla.suse.com/1220920"},{"type":"REPORT","url":"https://bugzilla.suse.com/1220921"},{"type":"REPORT","url":"https://bugzilla.suse.com/1220926"},{"type":"REPORT","url":"https://bugzilla.suse.com/1220927"},{"type":"REPORT","url":"https://bugzilla.suse.com/1220929"},{"type":"REPORT","url":"https://bugzilla.suse.com/1220932"},{"type":"REPORT","url":"https://bugzilla.suse.com/1220935"},{"type":"REPORT","url":"https://bugzilla.suse.com/1220937"},{"type":"REPORT","url":"https://bugzilla.suse.com/1220938"},{"type":"REPORT","url":"https://bugzilla.suse.com/1220940"},{"type":"REPORT","url":"https://bugzilla.suse.com/1220954"},{"type":"REPORT","url":"https://bugzilla.suse.com/1220955"},{"type":"REPORT","url":"https://bugzilla.suse.com/1220959"},{"type":"REPORT","url":"https://bugzilla.suse.com/1220960"},{"type":"REPORT","url":"https://bugzilla.suse.com/1220961"},{"type":"REPORT","url":"https://bugzilla.suse.com/1220965"},{"type":"REPORT","url":"https://bugzilla.suse.com/1220969"},{"type":"REPORT","url":"https://bugzilla.suse.com/1220978"},{"type":"REPORT","url":"https://bugzilla.suse.com/1220979"},{"type":"REPORT","url":"https://bugzilla.suse.com/1220981"},{"type":"REPORT","url":"https://bugzilla.suse.com/1220982"},{"type":"REPORT","url":"https://bugzilla.suse.com/1220983"},{"type":"REPORT","url":"https://bugzilla.suse.com/1220985"},{"type":"REPORT","url":"https://bugzilla.suse.com/1220986"},{"type":"REPORT","url":"https://bugzilla.suse.com/1220987"},{"type":"REPORT","url":"https://bugzilla.suse.com/1220989"},{"type":"REPORT","url":"https://bugzilla.suse.com/1220990"},{"type":"REPORT","url":"https://bugzilla.suse.com/1221009"},{"type":"REPORT","url":"https://bugzilla.suse.com/1221012"},{"type":"REPORT","url":"https://bugzilla.suse.com/1221015"},{"type":"REPORT","url":"https://bugzilla.suse.com/1221022"},{"type":"REPORT","url":"https://bugzilla.suse.com/1221039"},{"type":"REPORT","url":"https://bugzilla.suse.com/1221040"},{"type":"REPORT","url":"https://bugzilla.suse.com/1221044"},{"type":"REPORT","url":"https://bugzilla.suse.com/1221045"},{"type":"REPORT","url":"https://bugzilla.suse.com/1221046"},{"type":"REPORT","url":"https://bugzilla.suse.com/1221048"},{"type":"REPORT","url":"https://bugzilla.suse.com/1221055"},{"type":"REPORT","url":"https://bugzilla.suse.com/1221056"},{"type":"REPORT","url":"https://bugzilla.suse.com/1221058"},{"type":"REPORT","url":"https://bugzilla.suse.com/1221060"},{"type":"REPORT","url":"https://bugzilla.suse.com/1221061"},{"type":"REPORT","url":"https://bugzilla.suse.com/1221062"},{"type":"REPORT","url":"https://bugzilla.suse.com/1221066"},{"type":"REPORT","url":"https://bugzilla.suse.com/1221067"},{"type":"REPORT","url":"https://bugzilla.suse.com/1221068"},{"type":"REPORT","url":"https://bugzilla.suse.com/1221069"},{"type":"REPORT","url":"https://bugzilla.suse.com/1221070"},{"type":"REPORT","url":"https://bugzilla.suse.com/1221071"},{"type":"REPORT","url":"https://bugzilla.suse.com/1221077"},{"type":"REPORT","url":"https://bugzilla.suse.com/1221082"},{"type":"REPORT","url":"https://bugzilla.suse.com/1221090"},{"type":"REPORT","url":"https://bugzilla.suse.com/1221097"},{"type":"REPORT","url":"https://bugzilla.suse.com/1221156"},{"type":"REPORT","url":"https://bugzilla.suse.com/1221162"},{"type":"REPORT","url":"https://bugzilla.suse.com/1221252"},{"type":"REPORT","url":"https://bugzilla.suse.com/1221273"},{"type":"REPORT","url":"https://bugzilla.suse.com/1221274"},{"type":"REPORT","url":"https://bugzilla.suse.com/1221276"},{"type":"REPORT","url":"https://bugzilla.suse.com/1221277"},{"type":"REPORT","url":"https://bugzilla.suse.com/1221291"},{"type":"REPORT","url":"https://bugzilla.suse.com/1221293"},{"type":"REPORT","url":"https://bugzilla.suse.com/1221298"},{"type":"REPORT","url":"https://bugzilla.suse.com/1221337"},{"type":"REPORT","url":"https://bugzilla.suse.com/1221338"},{"type":"REPORT","url":"https://bugzilla.suse.com/1221375"},{"type":"REPORT","url":"https://bugzilla.suse.com/1221379"},{"type":"REPORT","url":"https://bugzilla.suse.com/1221551"},{"type":"REPORT","url":"https://bugzilla.suse.com/1221553"},{"type":"REPORT","url":"https://bugzilla.suse.com/1221613"},{"type":"REPORT","url":"https://bugzilla.suse.com/1221614"},{"type":"REPORT","url":"https://bugzilla.suse.com/1221616"},{"type":"REPORT","url":"https://bugzilla.suse.com/1221618"},{"type":"REPORT","url":"https://bugzilla.suse.com/1221631"},{"type":"REPORT","url":"https://bugzilla.suse.com/1221633"},{"type":"REPORT","url":"https://bugzilla.suse.com/1221713"},{"type":"REPORT","url":"https://bugzilla.suse.com/1221725"},{"type":"REPORT","url":"https://bugzilla.suse.com/1221777"},{"type":"REPORT","url":"https://bugzilla.suse.com/1221791"},{"type":"REPORT","url":"https://bugzilla.suse.com/1221814"},{"type":"REPORT","url":"https://bugzilla.suse.com/1221816"},{"type":"REPORT","url":"https://bugzilla.suse.com/1221830"},{"type":"REPORT","url":"https://bugzilla.suse.com/1221951"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222011"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222033"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222051"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222056"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222060"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222070"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222073"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222117"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222247"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222266"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222274"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222291"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222300"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222304"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222317"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222331"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222355"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222356"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222360"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222366"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222373"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222416"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222422"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222427"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222428"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222431"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222437"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222445"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222449"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222503"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222520"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222536"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222549"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222550"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222557"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222585"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222586"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222596"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222609"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222610"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222619"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222630"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222632"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222660"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222662"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222664"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222669"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222677"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222678"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222680"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222706"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222720"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222724"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222726"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222727"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222764"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222772"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222781"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222784"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222798"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222801"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222952"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223030"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223067"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223068"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-46925"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-46926"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-46927"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-46929"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-46930"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-46931"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-46933"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-46936"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47082"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47087"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47091"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47093"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47094"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47095"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47096"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47097"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47098"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47099"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47100"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47101"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47102"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47104"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47105"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47107"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47108"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47181"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47182"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47183"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47185"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47189"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-4744"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48626"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48629"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48630"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-0160"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-28746"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-35827"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-4881"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52447"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52450"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52453"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52454"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52469"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52470"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52474"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52476"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52477"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52481"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52484"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52486"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52488"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52492"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52493"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52494"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52497"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52500"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52501"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52502"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52503"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52504"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52507"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52508"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52509"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52510"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52511"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52513"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52515"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52517"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52518"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52519"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52520"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52523"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52524"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52525"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52528"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52529"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52532"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52561"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52563"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52564"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52566"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52567"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52569"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52574"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52575"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52576"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52582"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52583"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52587"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52591"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52594"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52595"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52597"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52598"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52599"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52600"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52601"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52602"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52603"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52604"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52605"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52606"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52607"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52608"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52612"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52615"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52617"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52619"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52621"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52623"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52627"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52628"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52632"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52636"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52637"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52639"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-6356"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-6535"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-6536"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-7042"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-7192"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-0841"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-2201"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-22099"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-23307"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-23850"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-25739"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-25742"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26599"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26600"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26602"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26612"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26614"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26620"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26627"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26629"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26642"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26645"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26646"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26651"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26654"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26659"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26660"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26664"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26667"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26670"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26680"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26681"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26684"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26685"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26689"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26695"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26696"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26697"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26704"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26717"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26718"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26722"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26727"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26733"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26736"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26737"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26743"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26744"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26745"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26747"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26749"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26751"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26754"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26760"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26763"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26766"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26769"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26771"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26776"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26779"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26787"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26790"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26793"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26798"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26805"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26807"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26848"}],"related":["CVE-2021-46925","CVE-2021-46926","CVE-2021-46927","CVE-2021-46929","CVE-2021-46930","CVE-2021-46931","CVE-2021-46933","CVE-2021-46936","CVE-2021-47082","CVE-2021-47087","CVE-2021-47091","CVE-2021-47093","CVE-2021-47094","CVE-2021-47095","CVE-2021-47096","CVE-2021-47097","CVE-2021-47098","CVE-2021-47099","CVE-2021-47100","CVE-2021-47101","CVE-2021-47102","CVE-2021-47104","CVE-2021-47105","CVE-2021-47107","CVE-2021-47108","CVE-2021-47181","CVE-2021-47182","CVE-2021-47183","CVE-2021-47185","CVE-2021-47189","CVE-2022-4744","CVE-2022-48626","CVE-2022-48629","CVE-2022-48630","CVE-2023-0160","CVE-2023-28746","CVE-2023-35827","CVE-2023-4881","CVE-2023-52447","CVE-2023-52450","CVE-2023-52453","CVE-2023-52454","CVE-2023-52469","CVE-2023-52470","CVE-2023-52474","CVE-2023-52476","CVE-2023-52477","CVE-2023-52481","CVE-2023-52484","CVE-2023-52486","CVE-2023-52488","CVE-2023-52492","CVE-2023-52493","CVE-2023-52494","CVE-2023-52497","CVE-2023-52500","CVE-2023-52501","CVE-2023-52502","CVE-2023-52503","CVE-2023-52504","CVE-2023-52507","CVE-2023-52508","CVE-2023-52509","CVE-2023-52510","CVE-2023-52511","CVE-2023-52513","CVE-2023-52515","CVE-2023-52517","CVE-2023-52518","CVE-2023-52519","CVE-2023-52520","CVE-2023-52523","CVE-2023-52524","CVE-2023-52525","CVE-2023-52528","CVE-2023-52529","CVE-2023-52532","CVE-2023-52561","CVE-2023-52563","CVE-2023-52564","CVE-2023-52566","CVE-2023-52567","CVE-2023-52569","CVE-2023-52574","CVE-2023-52575","CVE-2023-52576","CVE-2023-52582","CVE-2023-52583","CVE-2023-52587","CVE-2023-52591","CVE-2023-52594","CVE-2023-52595","CVE-2023-52597","CVE-2023-52598","CVE-2023-52599","CVE-2023-52600","CVE-2023-52601","CVE-2023-52602","CVE-2023-52603","CVE-2023-52604","CVE-2023-52605","CVE-2023-52606","CVE-2023-52607","CVE-2023-52608","CVE-2023-52612","CVE-2023-52615","CVE-2023-52617","CVE-2023-52619","CVE-2023-52621","CVE-2023-52623","CVE-2023-52627","CVE-2023-52628","CVE-2023-52632","CVE-2023-52636","CVE-2023-52637","CVE-2023-52639","CVE-2023-6356","CVE-2023-6535","CVE-2023-6536","CVE-2023-7042","CVE-2023-7192","CVE-2024-0841","CVE-2024-2201","CVE-2024-22099","CVE-2024-23307","CVE-2024-23850","CVE-2024-25739","CVE-2024-25742","CVE-2024-26599","CVE-2024-26600","CVE-2024-26602","CVE-2024-26612","CVE-2024-26614","CVE-2024-26620","CVE-2024-26627","CVE-2024-26629","CVE-2024-26642","CVE-2024-26645","CVE-2024-26646","CVE-2024-26651","CVE-2024-26654","CVE-2024-26659","CVE-2024-26660","CVE-2024-26664","CVE-2024-26667","CVE-2024-26670","CVE-2024-26680","CVE-2024-26681","CVE-2024-26684","CVE-2024-26685","CVE-2024-26689","CVE-2024-26695","CVE-2024-26696","CVE-2024-26697","CVE-2024-26704","CVE-2024-26717","CVE-2024-26718","CVE-2024-26722","CVE-2024-26727","CVE-2024-26733","CVE-2024-26736","CVE-2024-26737","CVE-2024-26743","CVE-2024-26744","CVE-2024-26745","CVE-2024-26747","CVE-2024-26749","CVE-2024-26751","CVE-2024-26754","CVE-2024-26760","CVE-2024-26763","CVE-2024-26766","CVE-2024-26769","CVE-2024-26771","CVE-2024-26776","CVE-2024-26779","CVE-2024-26787","CVE-2024-26790","CVE-2024-26793","CVE-2024-26798","CVE-2024-26805","CVE-2024-26807","CVE-2024-26848"],"summary":"Security update for the Linux Kernel","upstream":["CVE-2021-46925","CVE-2021-46926","CVE-2021-46927","CVE-2021-46929","CVE-2021-46930","CVE-2021-46931","CVE-2021-46933","CVE-2021-46936","CVE-2021-47082","CVE-2021-47087","CVE-2021-47091","CVE-2021-47093","CVE-2021-47094","CVE-2021-47095","CVE-2021-47096","CVE-2021-47097","CVE-2021-47098","CVE-2021-47099","CVE-2021-47100","CVE-2021-47101","CVE-2021-47102","CVE-2021-47104","CVE-2021-47105","CVE-2021-47107","CVE-2021-47108","CVE-2021-47181","CVE-2021-47182","CVE-2021-47183","CVE-2021-47185","CVE-2021-47189","CVE-2022-4744","CVE-2022-48626","CVE-2022-48629","CVE-2022-48630","CVE-2023-0160","CVE-2023-28746","CVE-2023-35827","CVE-2023-4881","CVE-2023-52447","CVE-2023-52450","CVE-2023-52453","CVE-2023-52454","CVE-2023-52469","CVE-2023-52470","CVE-2023-52474","CVE-2023-52476","CVE-2023-52477","CVE-2023-52481","CVE-2023-52484","CVE-2023-52486","CVE-2023-52488","CVE-2023-52492","CVE-2023-52493","CVE-2023-52494","CVE-2023-52497","CVE-2023-52500","CVE-2023-52501","CVE-2023-52502","CVE-2023-52503","CVE-2023-52504","CVE-2023-52507","CVE-2023-52508","CVE-2023-52509","CVE-2023-52510","CVE-2023-52511","CVE-2023-52513","CVE-2023-52515","CVE-2023-52517","CVE-2023-52518","CVE-2023-52519","CVE-2023-52520","CVE-2023-52523","CVE-2023-52524","CVE-2023-52525","CVE-2023-52528","CVE-2023-52529","CVE-2023-52532","CVE-2023-52561","CVE-2023-52563","CVE-2023-52564","CVE-2023-52566","CVE-2023-52567","CVE-2023-52569","CVE-2023-52574","CVE-2023-52575","CVE-2023-52576","CVE-2023-52582","CVE-2023-52583","CVE-2023-52587","CVE-2023-52591","CVE-2023-52594","CVE-2023-52595","CVE-2023-52597","CVE-2023-52598","CVE-2023-52599","CVE-2023-52600","CVE-2023-52601","CVE-2023-52602","CVE-2023-52603","CVE-2023-52604","CVE-2023-52605","CVE-2023-52606","CVE-2023-52607","CVE-2023-52608","CVE-2023-52612","CVE-2023-52615","CVE-2023-52617","CVE-2023-52619","CVE-2023-52621","CVE-2023-52623","CVE-2023-52627","CVE-2023-52628","CVE-2023-52632","CVE-2023-52636","CVE-2023-52637","CVE-2023-52639","CVE-2023-6356","CVE-2023-6535","CVE-2023-6536","CVE-2023-7042","CVE-2023-7192","CVE-2024-0841","CVE-2024-2201","CVE-2024-22099","CVE-2024-23307","CVE-2024-23850","CVE-2024-25739","CVE-2024-25742","CVE-2024-26599","CVE-2024-26600","CVE-2024-26602","CVE-2024-26612","CVE-2024-26614","CVE-2024-26620","CVE-2024-26627","CVE-2024-26629","CVE-2024-26642","CVE-2024-26645","CVE-2024-26646","CVE-2024-26651","CVE-2024-26654","CVE-2024-26659","CVE-2024-26660","CVE-2024-26664","CVE-2024-26667","CVE-2024-26670","CVE-2024-26680","CVE-2024-26681","CVE-2024-26684","CVE-2024-26685","CVE-2024-26689","CVE-2024-26695","CVE-2024-26696","CVE-2024-26697","CVE-2024-26704","CVE-2024-26717","CVE-2024-26718","CVE-2024-26722","CVE-2024-26727","CVE-2024-26733","CVE-2024-26736","CVE-2024-26737","CVE-2024-26743","CVE-2024-26744","CVE-2024-26745","CVE-2024-26747","CVE-2024-26749","CVE-2024-26751","CVE-2024-26754","CVE-2024-26760","CVE-2024-26763","CVE-2024-26766","CVE-2024-26769","CVE-2024-26771","CVE-2024-26776","CVE-2024-26779","CVE-2024-26787","CVE-2024-26790","CVE-2024-26793","CVE-2024-26798","CVE-2024-26805","CVE-2024-26807","CVE-2024-26848"]}