Security update for the Linux Kernel
Announcement ID: | SUSE-SU-2024:3194-1 |
---|---|
Rating: | important |
References: |
|
Cross-References: |
|
CVSS scores: |
|
Affected Products: |
|
An update that solves 394 vulnerabilities, contains eight features and has 83 security fixes can now be installed.
Description:
The SUSE Linux Enterprise 15 SP6 Azure kernel was updated to receive various security bugfixes.
The following security bugs were fixed:
- CVE-2024-41062: Sync sock recv cb and release (bsc#1228576).
- CVE-2023-52489: Fix race in accessing memory_section->usage (bsc#1221326).
- CVE-2024-43821: Fix a possible null pointer dereference (bsc#1229315).
- CVE-2024-43911: Fix NULL dereference at band check in starting tx ba session (bsc#1229827).
- CVE-2024-42277: Avoid NULL deref in sprd_iommu_hw_en (bsc#1229409).
- CVE-2024-43880: Put back removed metod in struct objagg_ops (bsc#1229481).
- CVE-2024-43899: Fix null pointer deref in dcn20_resource.c (bsc#1229754).
- CVE-2024-43882: Fixed ToCToU between perm check and set-uid/gid usage. (bsc#1229503)
- CVE-2024-43866: Always drain health in shutdown callback (bsc#1229495).
- CVE-2024-26812: Struct virqfd kABI workaround (bsc#1222808).
- CVE-2024-27010: Fix mirred deadlock on device recursion (bsc#1223720).
- CVE-2024-36270: Fix reference in patches.suse/netfilter-tproxy-bail-out-if-IP-has-been-disabled-on.patch (bsc#1226798)
- CVE-2024-36881: Reset ptes when close() for wr-protected ones (bsc#1225718).
- CVE-2024-42316: Fix div-by-zero in vmpressure_calc_level() (bsc#1229353).
- CVE-2024-43855: Fix deadlock between mddev_suspend and flush bio (bsc#1229342,).
- CVE-2024-43864: Fix CT entry update leaks of modify header context (bsc#1229496)
- CVE-2024-26631: Fix data-race in ipv6_mc_down / mld_ifc_work (bsc#1221630).
- CVE-2024-42109: Unconditionally flush pending work before notifier (bsc#1228505)
- CVE-2024-41084: Avoid null pointer dereference in region lookup (bsc#1228472)
- CVE-2024-40905: Fix possible race in __fib6_drop_pcpu_from() (bsc#1227761)
- CVE-2024-39489: Fix memleak in seg6_hmac_init_algo (bsc#1227623)
- CVE-2024-36489: Fix missing memory barrier in tls_init (bsc#1226874)
- CVE-2024-27079: Add kABI workaround patch (bsc#1223742).
- CVE-2024-41020: Fix fcntl/close race recovery compat path (bsc#1228427).
- CVE-2024-35897: Discard table flag update with pending basechain deletion (bsc#1224510).
- CVE-2024-27403: Restore const specifier in flow_offload_route_init() (bsc#1224415).
- CVE-2024-27011: Fix memleak in map from abort path (bsc#1223803).
- CVE-2024-26668: Reject configurations that cause integer overflow (bsc#1222335).
- CVE-2024-26835: Set dormant flag on hook register failure (bsc#1222967).
- CVE-2024-26808: Handle NETDEV_UNREGISTER for inet/ingress basechain (bsc#1222634).
- CVE-2024-26809: Release elements in clone only from destroy path (bsc#1222633).
- CVE-2023-52581: Fix memleak when more than 255 elements expired (bsc#1220877).
- CVE-2024-43837: Fix updating attached freplace prog in prog_array map (bsc#1229297).
- CVE-2024-35939: Fixed leak pages on dma_set_decrypted() failure (bsc#1224535).
- CVE-2024-42291: Add a per-VF limit on number of FDIR filters (bsc#1229374).
- CVE-2024-42268: Fix missing lock on sync reset reload (bsc#1229391).
- CVE-2024-43834: Fix invalid wait context of page_pool_destroy() (bsc#1229314)
- CVE-2024-27433: Fix an error handling path in clk_mt8135_apmixed_probe() (bsc#1224711).
- CVE-2024-36286: Acquire rcu_read_lock() in instance_destroy_rcu() (bsc#1226801)
- CVE-2024-26851: Add protection for bmp length out of range (bsc#1223074)
- CVE-2024-40920: Fix suspicious rcu usage in br_mst_set_state (bsc#1227781).
- CVE-2024-40921: Pass vlan group directly to br_mst_vlan_set_state (bsc#1227784).
- CVE-2024-36979: Fix vlan use-after-free (bsc#1226604).
- CVE-2024-26590: Fix inconsistent per-file compression format (bsc#1220252,).
- CVE-2023-52859: Fix use-after-free when register pmu fails (bsc#1225582).
- CVE-2024-42270: Fix null-ptr-deref in iptable_nat_table_init() (bsc#1229404)
- CVE-2024-42269: Fix potential null-ptr-deref in ip6table_nat_table_init() (bsc#1229402)
- CVE-2024-42284: Return non-zero value from tipc_udp_addr2str() on error (bsc#1229382)
- CVE-2024-42283: Initialize all fields in dumped nexthops (bsc#1229383)
- CVE-2024-42312: Always initialize i_uid/i_gid (bsc#1229357)
- CVE-2024-43854: Initialize integrity buffer to zero before writing it to media (bsc#1229345)
- CVE-2024-42322: Properly dereference pe in ip_vs_add_service (bsc#1229347)
- CVE-2024-42308: Update DRM patch reference (bsc#1229411)
- CVE-2024-42301: Update parport patch reference (bsc#1229407)
- CVE-2024-42290: Handle runtime power management correctly (bsc#1229379).
- CVE-2024-42318: Do not lose track of restrictions on cred_transfer (bsc#1229351).
- CVE-2023-52889: Fix null pointer deref when receiving skb during sock creation (bsc#1229287,).
- CVE-2024-42295: Handle inconsistent state in nilfs_btnode_create_block() (bsc#1229370).
- CVE-2024-43850: Fix refcount imbalance seen during bwmon_remove (bsc#1229316).
- CVE-2024-43831: Handle invalid decoder vsi (bsc#1229309).
- CVE-2024-43839: Adjust 'name' buf size of bna_tcb and bna_ccb structures (bsc#1229301).
- CVE-2024-41007: Use signed arithmetic in tcp_rtx_probe0_timed_out() (bsc#1227863).
- CVE-2024-42281: Fix a segment issue when downgrading gso_size (bsc#1229386).
- CVE-2024-26669: kABI fix for --Fix chain template offload (bsc#1222350).
- CVE-2024-26677: kABI fix for -Fix delayed ACKs to not set the reference serial number (bsc#1222387).
- CVE-2024-41050: Cyclic allocation of msg_id to avoid reuse (bsc#1228499).
- CVE-2024-41051: Wait for ondemand_object_worker to finish when dropping object (bsc#1228468).
- CVE-2024-41074: Set object to close if ondemand_id > 0 in copen (bsc#1228643).
- CVE-2024-41075: Add consistency check for copen/cread (bsc#1228646).
- CVE-2024-41012: Remove locks reliably when fcntl/close race is detected (bsc#1228247).
- CVE-2024-41080: Fix possible deadlock in io_register_iowq_max_workers() (bsc#1228616).
- CVE-2024-42246: Remap EPERM in case of connection failure in xs_tcp_setup_socket (bsc#1228989).
- CVE-2024-42159: Use proper format specifier in mpi3mr_sas_port_add() (bsc#1228754 CVE-2024-42159 git-fixes).
- CVE-2024-42241: Disable PMD-sized page cache if needed (bsc#1228986).
- CVE-2024-42245: Revert "Make sure to try to detach at least one movable task" (bsc#1228978).
- CVE-2024-26735: Fix possible use-after-free and null-ptr-deref (bsc#1222372).
- CVE-2024-26837: Skip MDB replays of deferred events on offload (bsc#1222973).
- CVE-2024-42155: Wipe copies of protected- and secure-keys (bsc#1228733).
- CVE-2024-42156: Wipe copies of clear-key structures on failure (bsc#1228722).
- CVE-2024-42157: Wipe sensitive data on failure (bsc#1228727).
- CVE-2024-42158: Use kfree_sensitive() to fix Coccinelle warnings (bsc#1228720).
- CVE-2024-38662: Cover verifier checks for mutating sockmap/sockhash (bsc#1226885).
- CVE-2024-36911: Do not free decrypted memory (bsc#1225745).
- CVE-2024-36910: Do not free decrypted memory (bsc#1225717).
- CVE-2024-36909: Do not free ring buffers that couldn't be re-encrypted (bsc#1225744).
- CVE-2024-40938: Fix d_parent walk (bsc#1227840).
- CVE-2024-42247: Avoid unaligned 64-bit memory accesses (bsc#1228988).
- CVE-2024-41010: Add netlink helper library (bsc#1228021).
- CVE-2024-42106: Initialize pad field in struct inet_diag_req_v2 (bsc#1228493).
- CVE-2024-42095: Fix Errata i2310 with RX FIFO level check (bsc#1228446).
- CVE-2024-41068: Fix sclp_init() cleanup on failure (bsc#1228579).
- CVE-2024-42138: Fix double memory deallocation in case of invalid INI file (bsc#1228500).
- CVE-2024-42107: Do not process extts if PTP is disabled (bsc#1228494).
- CVE-2024-42139: Fix improper extts handling (bsc#1228503).
- CVE-2024-42110: Move ntb_netdev_rx_handler() to call netif_rx() from __netif_rx() (bsc#1228501).
- CVE-2024-42113: Initialize num_q_vectors for MSI/INTx interrupts (bsc#1228568).
- CVE-2024-42148: Fix multiple UBSAN array-index-out-of-bounds (bsc#1228487).
- CVE-2024-42142: E-switch, Create ingress ACL when needed (bsc#1228491).
- CVE-2024-42073: Fix memory corruptions on Spectrum-4 systems (bsc#1228457).
- CVE-2024-42162: Account for stopped queues when reading NIC stats (bsc#1228706).
- CVE-2024-42082: Remove WARN() from __xdp_reg_mem_model() (bsc#1228482).
- CVE-2024-40978: Fix crash while reading debugfs attribute (bsc#1227929).
- CVE-2024-41000: Prefer different overflow check (bsc#1227867).
- CVE-2024-40995: Fix possible infinite loop in tcf_idr_check_alloc() (bsc#1227830).
- CVE-2024-42161: Avoid uninitialized value in BPF_CORE_READ_BITFIELD (bsc#1228756).
- CVE-2024-41069: Fix route memory corruption (bsc#1228644).
- CVE-2024-39506: Adjust a NULL pointer handling path in lio_vf_rep_copy_packet (bsc#1227729).
- CVE-2024-42145: Implement a limit on UMAD receive List (bsc#1228743).
- CVE-2024-40994: Fix integer overflow in max_vclocks_store (bsc#1227829).
- CVE-2024-42124: Make qedf_execute_tmf() non-preemptible (bsc#1228705).
- CVE-2024-42096: Stop playing stack games in profile_pc() (bsc#1228633).
- CVE-2024-42224: Correct check for empty list (bsc#1228723).
- CVE-2024-41048: Skip zero length skb in sk_msg_recvmsg (bsc#1228565).
- CVE-2024-40958: Make get_net_ns() handle zero refcount net (bsc#1227812).
- CVE-2024-40939: Fix tainted pointer delete is case of region creation fail (bsc#1227799).
- CVE-2024-36933: Restore skb->{protocol,data,mac_header} for outer header in nsh_gso_segment() (bsc#1225832).
- CVE-2024-36929: Reject skb_copy(_expand) for fraglist GSO skbs (bsc#1225814).
- CVE-2024-41044: Reject claimed-as-LCP but actually malformed packets (bsc#1228530).
- CVE-2024-41066: Add tx check to prevent skb leak (bsc#1228640).
- CVE-2024-42093: Avoid explicit cpumask var allocation on stack (bsc#1228680).
- CVE-2024-42122: Add NULL pointer check for kzalloc (bsc#1228591).
- CVE-2024-41078: Fix quota root leak after quota disable failure (bsc#1228655).
- CVE-2024-40989: Disassociate vcpus from redistributor region on teardown (bsc#1227823).
- CVE-2024-41064: Avoid possible crash when edev->pdev changes (bsc#1228599).
- CVE-2024-41036: Fix deadlock with the SPI chip variant (bsc#1228496)
- CVE-2024-41040: Fix UAF when resolving a clash (bsc#1228518).
- CVE-2024-35949: Make sure that WRITTEN is set on all metadata blocks (bsc#1224700).
- CVE-2024-41081: Block BH in ila_output() (bsc#1228617).
- CVE-2024-41076: Fix memory leak in nfs4_set_security_label (bsc#1228649).
- CVE-2024-42079: Fix NULL pointer dereference in gfs2_log_flush (bsc#1228672).
- CVE-2024-41057: Fix slab-use-after-free in cachefiles_withdraw_cookie() (bsc#1228462).
- CVE-2024-41058: Fix slab-use-after-free in fscache_withdraw_volume() (bsc#1228459).
- CVE-2024-41015: Add bounds checking to ocfs2_check_dir_entry() (bsc#1228409).
- CVE-2024-40956: Fix possible Use-After-Free in irq_process_work_list (bsc#1227810).
- CVE-2024-27437: Disable auto-enable of exclusive INTx IRQ (bsc#1222625).
- CVE-2024-41032: Check if a hash-index is in cpu_possible_mask (bsc#1228460)
- CVE-2024-40957: Fix parameter passing when calling NF_HOOK() in End.DX4 and End.DX6 behaviors (bsc#1227811)
- CVE-2024-41041: Set SOCK_RCU_FREE earlier in udp_lib_get_port() (bsc#1228520).
- CVE-2024-40954: Do not leave a dangling sk pointer, when socket creation fails (bsc#1227808)
- CVE-2024-42070: Fully validate NFT_DATA_VALUE on store to data registers (bsc#1228470).
- CVE-2024-41070: Prevent UAF in kvm_spapr_tce_attach_iommu_group() (bsc#1228581).
- CVE-2024-40959: Check ip6_dst_idev() return value in xfrm6_get_saddr() (bsc#1227884).
- CVE-2024-41009: Fix overrunning reservations in ringbuf (bsc#1228020).
- CVE-2024-40909: Fix a potential use-after-free in bpf_link_free() (bsc#1227798).
- CVE-2024-27024: Fix WARNING in rds_conn_connect_if_down (bsc#1223777).
The following non-security bugs were fixed:
- ACPI: battery: create alarm sysfs attribute atomically (stable-fixes).
- ACPI: processor_idle: use raw_safe_halt() in acpi_idle_play_dead() (git-fixes).
- ACPI: SBS: manage alarm sysfs attribute through psy core (stable-fixes).
- ACPI/NUMA: Apply SRAT proximity domain to entire CFMWS window (git-fixes).
- afs: fix __afs_break_callback() / afs_drop_open_mmap() race (git-fixes).
- ALSA: hda: Add HP MP9 G4 Retail System AMS to force connect list (stable-fixes).
- ALSA: hda: Add HP MP9 G4 Retail System AMS to force connect list (stable-fixes).
- ALSA: hda: Conditionally use snooping for AMD HDMI (git-fixes).
- ALSA: hda: conexant: Fix headset auto detect fail in the polling mode (git-fixes).
- ALSA: hda/hdmi: Yet more pin fix for HP EliteDesk 800 G4 (stable-fixes).
- ALSA: hda/hdmi: Yet more pin fix for HP EliteDesk 800 G4 (stable-fixes).
- ALSA: hda/realtek - Fixed ALC256 headphone no sound (stable-fixes).
- ALSA: hda/realtek - FIxed ALC285 headphone no sound (stable-fixes).
- ALSA: hda/realtek: Add Framework Laptop 13 (Intel Core Ultra) to quirks (stable-fixes).
- ALSA: hda/realtek: Add Framework Laptop 13 (Intel Core Ultra) to quirks (stable-fixes).
- ALSA: hda/realtek: Add quirk for Acer Aspire E5-574G (stable-fixes).
- ALSA: hda/realtek: Add support for new HP G12 laptops (stable-fixes).
- ALSA: hda/realtek: Enable mute/micmute LEDs on HP Laptop 14-ey0xxx (stable-fixes).
- ALSA: hda/realtek: Fix noise from speakers on Lenovo IdeaPad 3 15IAU7 (git-fixes).
- ALSA: hda/realtek: Fix the speaker output on Samsung Galaxy Book3 Ultra (stable-fixes).
- ALSA: hda/realtek: Implement sound init sequence for Samsung Galaxy Book3 Pro 360 (stable-fixes).
- ALSA: hda/realtek: support HP Pavilion Aero 13-bg0xxx Mute LED (stable-fixes).
- ALSA: hda/tas2781: fix wrong calibrated data order (git-fixes).
- ALSA: hda/tas2781: Use correct endian conversion (git-fixes).
- ALSA: line6: Fix racy access to midibuf (stable-fixes).
- ALSA: line6: Fix racy access to midibuf (stable-fixes).
- ALSA: seq: Skip event type filtering for UMP events (git-fixes).
- ALSA: seq: ump: Explicitly reset RPN with Null RPN (stable-fixes).
- ALSA: seq: ump: Optimize conversions from SysEx to UMP (git-fixes).
- ALSA: seq: ump: Transmit RPN/NRPN message at each MSB/LSB data reception (stable-fixes).
- ALSA: seq: ump: Use the common RPN/bank conversion context (stable-fixes).
- ALSA: timer: Relax start tick time check for slave timer elements (git-fixes).
- ALSA: ump: Explicitly reset RPN with Null RPN (stable-fixes).
- ALSA: ump: Transmit RPN/NRPN message at each MSB/LSB data reception (stable-fixes).
- ALSA: usb-audio: Add delay quirk for VIVO USB-C-XE710 HEADSET (stable-fixes).
- ALSA: usb-audio: Correct surround channels in UAC1 channel map (git-fixes).
- ALSA: usb-audio: Re-add ScratchAmp quirk entries (git-fixes).
- ALSA: usb-audio: Re-add ScratchAmp quirk entries (git-fixes).
- ALSA: usb-audio: Support Yamaha P-125 quirk entry (stable-fixes).
- ALSA: usb: Fix UBSAN warning in parse_audio_unit() (stable-fixes).
- apparmor: unpack transition table if dfa is not present (bsc#1226031).
- arm64: ACPI: NUMA: initialize all values of acpi_early_node_map to (git-fixes)
- arm64: Add Neoverse-V2 part (git-fixes)
- arm64: armv8_deprecated: Fix warning in isndep cpuhp starting process (git-fixes)
- arm64: barrier: Restore spec_bar() macro (git-fixes)
- arm64: cputype: Add Cortex-A720 definitions (git-fixes)
- arm64: cputype: Add Cortex-A725 definitions (git-fixes)
- arm64: cputype: Add Cortex-X1C definitions (git-fixes)
- arm64: cputype: Add Cortex-X3 definitions (git-fixes)
- arm64: cputype: Add Cortex-X4 definitions (git-fixes)
- arm64: cputype: Add Cortex-X925 definitions (git-fixes)
- arm64: cputype: Add Neoverse-V3 definitions (git-fixes)
- arm64: dts: imx8mp: add HDMI power-domains (git-fixes)
- arm64: dts: imx8mp: Add NPU Node (git-fixes)
- arm64: dts: imx8mp: Fix pgc vpu locations (git-fixes)
- arm64: dts: imx8mp: Fix pgc_mlmix location (git-fixes)
- arm64: errata: Expand speculative SSBS workaround (again) (git-fixes)
- arm64: errata: Expand speculative SSBS workaround (git-fixes)
- arm64: errata: Unify speculative SSBS errata logic (git-fixes). Update config files.
- arm64: Fix KASAN random tag seed initialization (git-fixes)
- arm64: jump_label: Ensure patched jump_labels are visible to all CPUs (git-fixes)
- ASoC: allow module autoloading for table board_ids (stable-fixes).
- ASoC: allow module autoloading for table db1200_pids (stable-fixes).
- ASoC: amd: acp: fix module autoloading (git-fixes).
- ASoC: amd: yc: Add quirk entry for OMEN by HP Gaming Laptop 16-n0xxx (bsc#1227182).
- ASoC: amd: yc: Support mic on HP 14-em0002la (stable-fixes).
- ASoC: amd: yc: Support mic on HP 14-em0002la (stable-fixes).
- ASoC: amd: yc: Support mic on Lenovo Thinkpad E14 Gen 6 (stable-fixes).
- ASoC: amd: yc: Support mic on Lenovo Thinkpad E14 Gen 6 (stable-fixes).
- ASoC: codecs: wcd938x-sdw: Correct Soundwire ports mask (git-fixes).
- ASoC: codecs: wcd938x-sdw: Correct Soundwire ports mask (git-fixes).
- ASoC: codecs: wsa881x: Correct Soundwire ports mask (git-fixes).
- ASoC: codecs: wsa881x: Correct Soundwire ports mask (git-fixes).
- ASoC: codecs: wsa883x: Correct Soundwire ports mask (git-fixes).
- ASoC: codecs: wsa883x: Correct Soundwire ports mask (git-fixes).
- ASoC: codecs: wsa884x: Correct Soundwire ports mask (git-fixes).
- ASoC: codecs: wsa884x: Correct Soundwire ports mask (git-fixes).
- ASoC: cs35l45: Checks index of cs35l45_irqs[] (stable-fixes).
- ASoC: cs35l56: Handle OTP read latency over SoundWire (stable-fixes).
- ASoC: cs35l56: Handle OTP read latency over SoundWire (stable-fixes).
- ASoC: cs35l56: Patch CS35L56_IRQ1_MASK_18 to the default value (stable-fixes).
- ASoC: cs35l56: Patch CS35L56_IRQ1_MASK_18 to the default value (stable-fixes).
- ASoC: fsl_micfil: Expand the range of FIFO watermark mask (stable-fixes).
- ASoC: fsl_micfil: Expand the range of FIFO watermark mask (stable-fixes).
- ASoC: mediatek: mt8188: Mark AFE_DAC_CON0 register as volatile (stable-fixes).
- ASoC: meson: axg-fifo: fix irq scheduling issue with PREEMPT_RT (git-fixes).
- ASoC: meson: axg-fifo: fix irq scheduling issue with PREEMPT_RT (git-fixes).
- ASoC: nau8822: Lower debug print priority (stable-fixes).
- ASoC: nau8822: Lower debug print priority (stable-fixes).
- ASoC: SOF: amd: Fix for acp init sequence (git-fixes).
- ASoC: SOF: Intel: hda-dsp: Make sure that no irq handler is pending before suspend (stable-fixes).
- ASoC: SOF: ipc4: check return value of snd_sof_ipc_msg_data (stable-fixes).
- ASoC: SOF: mediatek: Add missing board compatible (stable-fixes).
- ASoC: SOF: Remove libraries from topology lookups (git-fixes).
- ASoC: SOF: Remove libraries from topology lookups (git-fixes).
- ata: libata-scsi: Do not overwrite valid sense data when CK_COND=1 (stable-fixes).
- ata: libata-scsi: Honor the D_SENSE bit for CK_COND=1 and no error (stable-fixes).
- Bluetooth: Add device 13d3:3572 IMC Networks Bluetooth Radio (stable-fixes).
- Bluetooth: bnep: Fix out-of-bound access (stable-fixes).
- Bluetooth: btintel: Fail setup on error (git-fixes).
- Bluetooth: btnxpuart: Shutdown timer and prevent rearming when driver unloading (stable-fixes).
- Bluetooth: btusb: Add Realtek RTL8852BE support ID 0x13d3:0x3591 (stable-fixes).
- Bluetooth: btusb: Add RTL8852BE device 0489:e125 to device tables (stable-fixes).
- Bluetooth: Fix usage of __hci_cmd_sync_status (git-fixes).
- Bluetooth: hci_conn: Check non NULL function before calling for HFP offload (stable-fixes).
- Bluetooth: hci_core: Fix LE quote calculation (git-fixes).
- Bluetooth: hci_core: Fix not handling hibernation actions (git-fixes).
- Bluetooth: hci_sync: avoid dup filtering when passive scanning with adv monitor (git-fixes).
- Bluetooth: hci_sync: Fix suspending with wrong filter policy (git-fixes).
- Bluetooth: l2cap: always unlock channel in l2cap_conless_channel() (git-fixes).
- Bluetooth: L2CAP: Fix deadlock (git-fixes).
- Bluetooth: MGMT: Add error handling to pair_device() (git-fixes).
- Bluetooth: SMP: Fix assumption of Central always being Initiator (git-fixes).
- bnxt_re: Fix imm_data endianness (git-fixes)
- bpf, arm64: Fix trampoline for BPF_TRAMP_F_CALL_ORIG (git-fixes)
- bpf, lpm: Fix check prefixlen before walking trie (git-fixes).
- bpf: Add crosstask check to __bpf_get_stack (git-fixes).
- bpf: Detect IP == ksym.end as part of BPF program (git-fixes).
- bpf: do not infer PTR_TO_CTX for programs with unnamed context type (git-fixes).
- bpf: enforce precision of R0 on callback return (git-fixes).
- bpf: Ensure proper register state printing for cond jumps (git-fixes).
- bpf: extract bpf_ctx_convert_map logic and make it more reusable (git-fixes).
- bpf: Fix a few selftest failures due to llvm18 change (git-fixes).
- bpf: Fix a kernel verifier crash in stacksafe() (bsc#1225903).
- bpf: Fix check_stack_write_fixed_off() to correctly spill imm (git-fixes).
- bpf: fix control-flow graph checking in privileged mode (git-fixes).
- bpf: Fix kfunc callback register type handling (git-fixes).
- bpf: Fix prog_array_map_poke_run map poke update (git-fixes).
- bpf: Fix unnecessary -EBUSY from htab_lock_bucket (git-fixes).
- bpf: handle bpf_user_pt_regs_t typedef explicitly for PTR_TO_CTX global arg (git-fixes).
- bpf: hardcode BPF_PROG_PACK_SIZE to 2MB * num_possible_nodes() (git-fixes).
- bpf: kprobe: remove unused declaring of bpf_kprobe_override (git-fixes).
- bpf: Mark bpf_spin_{lock,unlock}() helpers with notrace correctly (git-fixes).
- bpf: Remove unnecessary wait from bpf_map_copy_value() (git-fixes).
- bpf: Set uattr->batch.count as zero before batched update or deletion (git-fixes).
- bpf: simplify btf_get_prog_ctx_type() into btf_is_prog_ctx_type() (git-fixes).
- bpf/tests: Remove duplicate JSGT tests (git-fixes).
- bpftool: Align output skeleton ELF code (git-fixes).
- bpftool: Fix -Wcast-qual warning (git-fixes).
- bpftool: mark orphaned programs during prog show (git-fixes).
- bpftool: Silence build warning about calloc() (git-fixes).
- btrfs: add a btrfs_finish_ordered_extent helper (git-fixes).
- btrfs: add a is_data_bbio helper (git-fixes).
- btrfs: add an ordered_extent pointer to struct btrfs_bio (git-fixes).
- btrfs: copy dir permission and time when creating a stub subvolume (bsc#1228321).
- btrfs: ensure fast fsync waits for ordered extents after a write failure (git-fixes).
- btrfs: factor out a btrfs_queue_ordered_fn helper (git-fixes).
- btrfs: factor out a can_finish_ordered_extent helper (git-fixes).
- btrfs: fix corruption after buffer fault in during direct IO append write (git-fixes).
- btrfs: fix double inode unlock for direct IO sync writes (git-fixes).
- btrfs: fix extent map use-after-free when adding pages to compressed bio (git-fixes).
- btrfs: fix leak of qgroup extent records after transaction abort (git-fixes).
- btrfs: fix ordered extent split error handling in btrfs_dio_submit_io (git-fixes).
- btrfs: limit write bios to a single ordered extent (git-fixes).
- btrfs: make btrfs_finish_ordered_extent() return void (git-fixes).
- btrfs: merge the two calls to btrfs_add_ordered_extent in run_delalloc_nocow (git-fixes).
- btrfs: open code btrfs_bio_end_io in btrfs_dio_submit_io (git-fixes).
- btrfs: open code end_extent_writepage in end_bio_extent_writepage (git-fixes).
- btrfs: pass a btrfs_inode to btrfs_fdatawrite_range() (git-fixes).
- btrfs: pass a btrfs_inode to btrfs_wait_ordered_range() (git-fixes).
- btrfs: pass an ordered_extent to btrfs_reloc_clone_csums (git-fixes).
- btrfs: pass an ordered_extent to btrfs_submit_compressed_write (git-fixes).
- btrfs: remove btrfs_add_ordered_extent (git-fixes).
- btrfs: rename err to ret in btrfs_direct_write() (git-fixes).
- btrfs: uninline some static inline helpers from tree-log.h (git-fixes).
- btrfs: use a btrfs_inode in the log context (struct btrfs_log_ctx) (git-fixes).
- btrfs: use a btrfs_inode local variable at btrfs_sync_file() (git-fixes).
- btrfs: use bbio->ordered in btrfs_csum_one_bio (git-fixes).
- btrfs: use btrfs_finish_ordered_extent to complete buffered writes (git-fixes).
- btrfs: use btrfs_finish_ordered_extent to complete compressed writes (git-fixes).
- btrfs: use btrfs_finish_ordered_extent to complete direct writes (git-fixes).
- btrfs: use irq safe locking when running and adding delayed iputs (git-fixes).
- cachefiles, erofs: Fix NULL deref in when cachefiles is not doing ondemand-mode (bsc#1229245).
- cachefiles: add missing lock protection when polling (bsc#1229256).
- cachefiles: add restore command to recover inflight ondemand read requests (bsc#1229244).
- cachefiles: add spin_lock for cachefiles_ondemand_info (bsc#1229249).
- cachefiles: cancel all requests for the object that is being dropped (bsc#1229255).
- cachefiles: defer exposing anon_fd until after copy_to_user() succeeds (bsc#1229251).
- cachefiles: extract ondemand info field from cachefiles_object (bsc#1229240).
- cachefiles: fix slab-use-after-free in cachefiles_ondemand_daemon_read() (bsc#1229247).
- cachefiles: fix slab-use-after-free in cachefiles_ondemand_get_fd() (bsc#1229246).
- cachefiles: introduce object ondemand state (bsc#1229239).
- cachefiles: make on-demand read killable (bsc#1229252).
- cachefiles: narrow the scope of triggering EPOLLIN events in ondemand mode (bsc#1229243).
- cachefiles: never get a new anonymous fd if ondemand_id is valid (bsc#1229250).
- cachefiles: propagate errors from vfs_getxattr() to avoid infinite loop (bsc#1229253).
- cachefiles: remove err_put_fd label in cachefiles_ondemand_daemon_read() (bsc#1229248).
- cachefiles: resend an open request if the read request's object is closed (bsc#1229241).
- cachefiles: stop sending new request when dropping object (bsc#1229254).
- can: mcp251xfd: tef: prepare to workaround broken TEF FIFO tail index erratum (stable-fixes).
- can: mcp251xfd: tef: update workaround for erratum DS80000789E 6 of mcp2518fd (stable-fixes).
- ceph: periodically flush the cap releases (bsc#1230056).
- cgroup: Add annotation for holding namespace_sem in current_cgns_cgroup_from_root() (bsc#1222254).
- cgroup: Eliminate the need for cgroup_mutex in proc_cgroup_show() (bsc#1222254).
- cgroup: Make operations on the cgroup root_list RCU safe (bsc#1222254).
- cgroup: preserve KABI of cgroup_root (bsc#1222254).
- cgroup: Remove unnecessary list_empty() (bsc#1222254).
- cgroup/cpuset: Prevent UAF in proc_cpuset_show() (bsc#1228801).
- char: xillybus: Check USB endpoints when probing device (git-fixes).
- char: xillybus: Do not destroy workqueue from work item running on it (stable-fixes).
- char: xillybus: Refine workqueue handling (git-fixes).
- clk: en7523: fix rate divider for slic and spi clocks (git-fixes).
- clk: qcom: camcc-sc7280: Add parent dependency to all camera GDSCs (git-fixes).
- clk: qcom: gcc-sa8775p: Update the GDSC wait_val fields and flags (git-fixes).
- clk: qcom: gcc-sc7280: Update force mem core bit for UFS ICE clock (git-fixes).
- clk: qcom: gpucc-sa8775p: Park RCG's clk source at XO during disable (git-fixes).
- clk: qcom: gpucc-sa8775p: Remove the CLK_IS_CRITICAL and ALWAYS_ON flags (git-fixes).
- clk: qcom: gpucc-sa8775p: Update wait_val fields for GPU GDSC's (git-fixes).
- clk: qcom: gpucc-sm8350: Park RCG's clk source at XO during disable (git-fixes).
- clk: qcom: kpss-xcc: Return of_clk_add_hw_provider to transfer the error (git-fixes).
- clk: qcom: Park shared RCGs upon registration (git-fixes).
- clk: visconti: Add bounds-checking coverage for struct visconti_pll_provider (stable-fixes).
- clocksource/drivers/sh_cmt: Address race condition for clock events (stable-fixes).
- cpu/SMT: Enable SMT only if a core is online (bsc#1214285 bsc#1205462 ltc#200161 ltc#200588 git-fixes).
- cxl/region: Move cxl_dpa_to_region() work to the region driver (bsc#1228472)
- dev/parport: fix the array out-of-bounds risk (stable-fixes).
- device property: Add cleanup.h based fwnode_handle_put() scope based cleanup (stable-fixes).
- dmaengine: dw: Add memory bus width verification (git-fixes).
- dmaengine: dw: Add peripheral bus width verification (git-fixes).
- docs: KVM: Fix register ID of SPSR_FIQ (git-fixes).
- driver core: Fix uevent_show() vs driver detach race (git-fixes).
- drm/admgpu: fix dereferencing null pointer context (stable-fixes).
- drm/amd/display: Add delay to improve LTTPR UHBR interop (stable-fixes).
- drm/amd/display: Add NULL check for 'afb' before dereferencing in amdgpu_dm_plane_handle_cursor_update (stable-fixes).
- drm/amd/display: Add null checker before passing variables (stable-fixes).
- drm/amd/display: Adjust cursor position (git-fixes).
- drm/amd/display: avoid using null object of framebuffer (git-fixes).
- drm/amd/display: Check for NULL pointer (stable-fixes).
- drm/amd/display: fix cursor offset on rotation 180 (git-fixes).
- drm/amd/display: fix s2idle entry for DCN3.5+ (stable-fixes).
- drm/amd/display: Skip Recompute DSC Params if no Stream on Link (stable-fixes).
- drm/amd/pm: Fix the null pointer dereference for vega10_hwmgr (stable-fixes).
- drm/amdgpu: Actually check flags for all context ops (stable-fixes).
- drm/amdgpu: Add lock around VF RLCG interface (stable-fixes).
- drm/amdgpu: fix dereference null return value for the function amdgpu_vm_pt_parent (stable-fixes).
- drm/amdgpu: fix potential resource leak warning (stable-fixes).
- drm/amdgpu: Fix the null pointer dereference to ras_manager (stable-fixes).
- drm/amdgpu: Forward soft recovery errors to userspace (stable-fixes).
- drm/amdgpu: reset vm state machine after gpu reset(vram lost) (stable-fixes).
- drm/amdgpu: Validate TA binary size (stable-fixes).
- drm/amdgpu/jpeg2: properly set atomics vmid field (stable-fixes).
- drm/amdgpu/jpeg4: properly set atomics vmid field (stable-fixes).
- drm/amdgpu/pm: Fix the null pointer dereference for smu7 (stable-fixes).
- drm/amdgpu/pm: Fix the null pointer dereference in apply_state_adjust_rules (stable-fixes).
- drm/amdgpu/pm: Fix the param type of set_power_profile_mode (stable-fixes).
- drm/amdgpu/sdma5.2: limit wptr workaround to sdma 5.2.1 (git-fixes).
- drm/amdgpu/sdma5.2: Update wptr registers as well as doorbell (stable-fixes).
- drm/bridge: analogix_dp: properly handle zero sized AUX transactions (stable-fixes).
- drm/client: fix null pointer dereference in drm_client_modeset_probe (git-fixes).
- drm/dp_mst: Skip CSN if topology probing is not done yet (stable-fixes).
- drm/etnaviv: do not block scheduler when GPU is still active (stable-fixes).
- drm/i915: Fix possible int overflow in skl_ddi_calculate_wrpll() (git-fixes).
- drm/i915/dsi: Make Lenovo Yoga Tab 3 X90F DMI match less strict (git-fixes).
- drm/i915/gem: Adjust vma offset for framebuffer mmap offset (stable-fixes).
- drm/i915/gem: Fix Virtual Memory mapping boundaries calculation (git-fixes).
- drm/i915/hdcp: Fix HDCP2_STREAM_STATUS macro (git-fixes).
- drm/lima: set gp bus_stop bit before hard reset (stable-fixes).
- drm/mediatek/dp: Fix spurious kfree() (git-fixes).
- drm/msm: Reduce fallout of fence signaling vs reclaim hangs (stable-fixes).
- drm/msm/dp: fix the max supported bpp logic (git-fixes).
- drm/msm/dp: reset the link phy params before link training (git-fixes).
- drm/msm/dpu: capture snapshot on the first commit_done timeout (stable-fixes).
- drm/msm/dpu: cleanup FB if dpu_format_populate_layout fails (git-fixes).
- drm/msm/dpu: do not play tricks with debug macros (git-fixes).
- drm/msm/dpu: drop MSM_ENC_VBLANK support (stable-fixes).
- drm/msm/dpu: move dpu_encoder's connector assignment to atomic_enable() (git-fixes).
- drm/msm/dpu: split dpu_encoder_wait_for_event into two functions (stable-fixes).
- drm/msm/dpu: take plane rotation into account for wide planes (git-fixes).
- drm/msm/dpu: try multirect based on mdp clock limits (stable-fixes).
- drm/msm/dpu: use drmm-managed allocation for dpu_encoder_phys (stable-fixes).
- drm/msm/mdss: Rename path references to mdp_path (stable-fixes).
- drm/msm/mdss: switch mdss to use devm_of_icc_get() (stable-fixes).
- drm/nouveau: prime: fix refcount underflow (git-fixes).
- drm/panel: nt36523: Set 120Hz fps for xiaomi,elish panels (stable-fixes).
- drm/radeon: Remove __counted_by from StateArray.states[] (git-fixes).
- drm/radeon/evergreen_cs: Clean up errors in evergreen_cs.c (bsc#1229024).
- drm/rockchip: vop2: clear afbc en and transform bit for cluster window at linear mode (stable-fixes).
- drm/virtio: Fix type of dma-fence context variable (git-fixes).
- drm/vmwgfx: Fix a deadlock in dma buf fence polling (git-fixes).
- drm/vmwgfx: Fix overlay when using Screen Targets (git-fixes).
- drm/vmwgfx: Fix prime with external buffers (git-fixes).
- efi/libstub: Zero initialize heap allocated struct screen_info (git-fixes).
- evm: do not copy up 'security.evm' xattr (git-fixes).
- firmware: cirrus: cs_dsp: Initialize debugfs_root to invalid (stable-fixes).
- fs/netfs/fscache_cookie: add missing "n_accesses" check (bsc#1229455).
- fuse: Initialize beyond-EOF page contents before setting uptodate (bsc#1229456).
- genirq/cpuhotplug, x86/vector: Prevent vector leak during CPU offline (git-fixes).
- genirq/generic_chip: Make irq_remove_generic_chip() irqdomain aware (git-fixes).
- genirq/matrix: Exclude managed interrupts in irq_matrix_allocated() (git-fixes).
- gfs2: setattr_chown: Add missing initialization (git-fixes).
- gpio: mlxbf3: Support shutdown() function (git-fixes).
- gpio: prevent potential speculation leaks in gpio_device_get_desc() (stable-fixes).
- gpio: sysfs: extend the critical section for unregistering sysfs devices (stable-fixes).
- gss_krb5: Fix the error handling path for crypto_sync_skcipher_setkey (git-fixes).
- hfs: fix to initialize fields of hfs_inode_info after hfs_alloc_inode() (git-fixes).
- HID: wacom: Defer calculation of resolution until resolution_code is known (git-fixes).
- hwmon: (ltc2992) Avoid division by zero (stable-fixes).
- hwmon: (ltc2992) Fix memory leak in ltc2992_parse_dt() (git-fixes).
- hwmon: (pc87360) Bounds check data->innr usage (stable-fixes).
- i2c: Fix conditional for substituting empty ACPI functions (stable-fixes).
- i2c: qcom-geni: Add missing clk_disable_unprepare in geni_i2c_runtime_resume (git-fixes).
- i2c: qcom-geni: Add missing geni_icc_disable in geni_i2c_runtime_resume (git-fixes).
- i2c: qcom-geni: Add missing geni_icc_disable in geni_i2c_runtime_resume (git-fixes).
- i2c: riic: avoid potential division by zero (stable-fixes).
- i2c: smbus: Improve handling of stuck alerts (git-fixes).
- i2c: smbus: Send alert notifications to all devices if source not found (git-fixes).
- i2c: stm32f7: Add atomic_xfer method to driver (stable-fixes).
- i2c: Use IS_REACHABLE() for substituting empty ACPI functions (git-fixes).
- i3c: mipi-i3c-hci: Do not unmap region not mapped for transfer (stable-fixes).
- i3c: mipi-i3c-hci: Remove BUG() when Ring Abort request times out (stable-fixes).
- i915/perf: Remove code to update PWR_CLK_STATE for gen12 (git-fixes).
- ice: Fix NULL pointer access, if PF does not support SRIOV_LAG (bsc#1228737).
- Input: i8042 - add forcenorestore quirk to leave controller untouched even on s3 (stable-fixes).
- Input: i8042 - add Fujitsu Lifebook E756 to i8042 quirk table (bsc#1229056).
- Input: i8042 - use new forcenorestore quirk to replace old buggy quirk combination (stable-fixes).
- Input: MT - limit max slots (stable-fixes).
- io_uring: Drop per-ctx dummy_ubuf (git-fixes).
- io_uring: fix io_match_task must_hold (git-fixes).
- io_uring: Fix probe of disabled operations (git-fixes).
- io_uring: tighten task exit cancellations (git-fixes).
- io_uring/advise: support 64-bit lengths (git-fixes).
- iommu/amd: Convert comma to semicolon (git-fixes).
- iommu/vt-d: Fix identity map bounds in si_domain_init() (git-fixes).
- iommufd/device: Fix hwpt at err_unresv in iommufd_device_do_replace() (git-fixes).
- ip6_tunnel: Fix broken GRO (bsc#1229444).
- ipv6: sr: fix incorrect unregister order (git-fixes).
- irqdomain: Fixed unbalanced fwnode get and put (git-fixes).
- jfs: define xtree root and page independently (git-fixes).
- jfs: fix null ptr deref in dtInsertEntry (git-fixes).
- jfs: Fix shift-out-of-bounds in dbDiscardAG (git-fixes).
- jump_label: Clarify condition in static_key_fast_inc_not_disabled() (git-fixes).
- jump_label: Fix concurrency issues in static_key_slow_dec() (git-fixes).
- jump_label: Fix the fix, brown paper bags galore (git-fixes).
- jump_label: Simplify and clarify static_key_fast_inc_cpus_locked() (git-fixes).
- kabi fix for KVM: s390: fix LPSWEY handling (bsc#1227634 git-fixes).
- kabi fix for SUNRPC: add a missing rpc_stat for TCP TLS (git-fixes).
- kABI fix of: virtio-crypto: handle config changed by work queue (git-fixes).
- kABI workaround for sound core UMP conversion (stable-fixes).
- kabi/severities: ignore kABI for FireWire sound local symbols (bsc#1208783)
- kabi/severity: add nvme common code The nvme common code is also allowed to change the data structures, there are only internal users.
- kcov: properly check for softirq context (git-fixes).
- kernfs: Convert kernfs_path_from_node_locked() from strlcpy() to strscpy() (bsc#1229134).
- kernfs: fix false-positive WARN(nr_mmapped) in kernfs_drain_open_files (git-fixes).
- kprobes: Fix to check symbol prefixes correctly (git-fixes).
- kprobes: Prohibit probing on CFI preamble symbol (git-fixes).
- KVM: Always flush async #PF workqueue when vCPU is being destroyed (git-fixes).
- KVM: arm64: AArch32: Fix spurious trapping of conditional instructions (git-fixes).
- KVM: arm64: Add missing memory barriers when switching to pKVM's hyp pgd (git-fixes).
- KVM: arm64: Allow AArch32 PSTATE.M to be restored as System mode (git-fixes).
- KVM: arm64: Fix __pkvm_init_switch_pgd call ABI (git-fixes).
- KVM: arm64: Fix AArch32 register narrowing on userspace write (git-fixes).
- KVM: arm64: Fix clobbered ELR in sync abort/SError (git-fixes)
- KVM: arm64: GICv4: Do not perform a map to a mapped vLPI (git-fixes).
- KVM: arm64: timers: Correctly handle TGE flip with CNTPOFF_EL2 (git-fixes).
- KVM: arm64: timers: Fix resource leaks in kvm_timer_hyp_init() (git-fixes).
- KVM: arm64: vgic-its: Test for valid IRQ in its_sync_lpi_pending_table() (git-fixes).
- KVM: arm64: vgic-its: Test for valid IRQ in MOVALL handler (git-fixes).
- KVM: arm64: vgic-v2: Use cpuid from userspace as vcpu_id (git-fixes).
- KVM: arm64: vgic-v4: Restore pending state on host userspace write (git-fixes).
- KVM: arm64: vgic: Add a non-locking primitive for kvm_vgic_vcpu_destroy() (git-fixes).
- KVM: arm64: vgic: Force vcpu vgic teardown on vcpu destroy (git-fixes).
- KVM: arm64: vgic: Simplify kvm_vgic_destroy() (git-fixes).
- KVM: fix kvm_mmu_memory_cache allocation warning (git-fixes).
- KVM: Make KVM_MEM_GUEST_MEMFD mutually exclusive with KVM_MEM_READONLY (git-fixes).
- KVM: nVMX: Add a helper to get highest pending from Posted Interrupt vector (git-fixes).
- KVM: nVMX: Check for pending posted interrupts when looking for nested events (git-fixes).
- KVM: nVMX: Request immediate exit iff pending nested event needs injection (git-fixes).
- KVM: PPC: Book3S HV: Fix the set_one_reg for MMCR3 (bsc#1194869).
- KVM: PPC: Book3S HV: Handle pending exceptions on guest entry with MSR_EE (bsc#1215199).
- KVM: Protect vcpu->pid dereference via debugfs with RCU (git-fixes).
- KVM: Reject overly excessive IDs in KVM_CREATE_VCPU (git-fixes).
- KVM: s390: fix LPSWEY handling (bsc#1227634 git-fixes).
- KVM: s390: fix validity interception issue when gisa is switched off (git-fixes bsc#1229167).
- kvm: s390: Reject memory region operations for ucontrol VMs (git-fixes bsc#1229168).
- KVM: Stop processing all memslots when "null" mmu_notifier handler is found (git-fixes).
- KVM: VMX: Move posted interrupt descriptor out of VMX code (git-fixes).
- KVM: VMX: Split out the non-virtualization part of vmx_interrupt_blocked() (git-fixes).
- KVM: VMX: Switch __vmx_exit() and kvm_x86_vendor_exit() in vmx_exit() (git-fixes).
- KVM: x86: Limit check IDs for KVM_SET_BOOT_CPU_ID (git-fixes).
- KVM: x86/mmu: Bug the VM if KVM tries to split a !hugepage SPTE (git-fixes).
- libbpf: Add missing LIBBPF_API annotation to libbpf_set_memlock_rlim API (git-fixes).
- libbpf: Apply map_set_def_max_entries() for inner_maps on creation (git-fixes).
- libbpf: Fix faccessat() usage on Android (git-fixes).
- libbpf: Use OPTS_SET() macro in bpf_xdp_query() (git-fixes).
- md-cluster: fix hanging issue while a new disk adding (bsc#1223395).
- md-cluster: fix hanging issue while a new disk adding (bsc#1223395).
- md-cluster: fix no recovery job when adding/re-adding a disk (bsc#1223395).
- md-cluster: fix no recovery job when adding/re-adding a disk (bsc#1223395).
- md-cluster: keeping kabi compatibility for upstream commit 35a0a409fa26 (bsc#1223395).
- md: add a mddev_add_trace_msg helper (git-fixes).
- md: add check for sleepers in md_wakeup_thread() (git-fixes).
- md: change the return value type of md_write_start to void (git-fixes).
- md: do not account sync_io if iostats of the disk is disabled (git-fixes).
- md: do not delete safemode_timer in mddev_suspend (git-fixes).
- md: Do not wait for MD_RECOVERY_NEEDED for HOT_REMOVE_DISK ioctl (git-fixes).
- md: factor out a helper exceed_read_errors() to check read_errors (git-fixes).
- md: fix a suspicious RCU usage warning (git-fixes).
- md/md-bitmap: fix writing non bitmap pages (git-fixes).
- md/raid1: set max_sectors during early return from choose_slow_rdev() (git-fixes).
- md/raid1: support read error check (git-fixes).
- md/raid5: fix deadlock that raid5d() wait for itself to clear MD_SB_CHANGE_PENDING (git-fixes).
- md/raid5: fix spares errors about rcu usage (git-fixes).
- md/raid5: recheck if reshape has finished with device_lock held (git-fixes).
- media: amphion: Remove lock in s_ctrl callback (stable-fixes).
- media: drivers/media/dvb-core: copy user arrays safely (stable-fixes).
- media: pci: cx23885: check cx23885_vdev_init() return (stable-fixes).
- media: Revert "media: dvb-usb: Fix unexpected infinite loop in dvb_usb_read_remote_control()" (git-fixes).
- media: uvcvideo: Add quirk for invalid dev_sof in Logitech C920 (git-fixes).
- media: uvcvideo: Disable autosuspend for Insta360 Link (stable-fixes).
- media: uvcvideo: Fix the bandwdith quirk on USB 3.x (stable-fixes).
- media: uvcvideo: Ignore empty TS packets (stable-fixes).
- media: uvcvideo: Quirk for invalid dev_sof in Logitech C922 (stable-fixes).
- media: xc2028: avoid use-after-free in load_firmware_cb() (stable-fixes).
- memcg: protect concurrent access to mem_cgroup_idr (git-fixes).
- memory: stm32-fmc2-ebi: check regmap_read return value (stable-fixes).
- memory: tegra: Skip SID programming if SID registers are not set (stable-fixes).
- minmax: add a few more MIN_T/MAX_T users (bsc#1229024).
- minmax: avoid overly complicated constant expressions in VM code (bsc#1229024).
- minmax: do not use max() in situations that want a C constant expression (bsc#1229024).
- minmax: fix up min3() and max3() too (bsc#1229024).
- minmax: improve macro expansion and type checking (bsc#1229024).
- minmax: make generic MIN() and MAX() macros available everywhere (bsc#1229024).
- minmax: simplify and clarify min_t()/max_t() implementation (bsc#1229024).
- minmax: simplify min()/max()/clamp() implementation (bsc#1229024).
- mm, kmsan: fix infinite recursion due to RCU critical section (git-fixes).
- mm: prevent derefencing NULL ptr in pfn_section_valid() (git-fixes).
- mmc: dw_mmc: allow biu and ciu clocks to defer (git-fixes).
- mmc: mmc_test: Fix NULL dereference on allocation failure (git-fixes).
- mmc: mtk-sd: receive cmd8 data when hs400 tuning fail (git-fixes).
- net: drop bad gso csum_start and offset in virtio_net_hdr (git-fixes).
- net: ethernet: mtk_wed: fix use-after-free panic in mtk_wed_setup_tc_block_cb() (git-fixes).
- net: fix sk_memory_allocated_{add|sub} vs softirqs (bsc#1228757).
- net: mana: Add support for page sizes other than 4KB on ARM64 (jsc#PED-8491 bsc#1226530).
- net: mana: Fix doorbell out of order violation and avoid unnecessary doorbell rings (bsc#1229154).
- net: mana: Fix race of mana_hwc_post_rx_wqe and new hwc response (git-fixes).
- net: mana: Fix RX buf alloc_size alignment and atomic op panic (bsc#1229086).
- net: missing check virtio (git-fixes).
- net: phy: micrel: Fix the KSZ9131 MDI-X status issue (git-fixes).
- net: phy: realtek: add support for RTL8366S Gigabit PHY (git-fixes).
- net: usb: qmi_wwan: fix memory leak for not ip packets (git-fixes).
- net: usb: sr9700: fix uninitialized variable use in sr_mdio_read (git-fixes).
- net/iucv: fix the allocation size of iucv_path_table array (git-fixes bsc#1229451).
- net/iucv: fix use after free in iucv_sock_close() (bsc#1228973).
- net/rds: fix possible cp null dereference (git-fixes).
- net/sched: initialize noop_qdisc owner (git-fixes).
- netfs, fscache: export fscache_put_volume() and add fscache_try_get_volume() (bsc#1228459 bsc#1228462).
- nfc: pn533: Add poll mod list filling check (git-fixes).
- nfs: do not invalidate dentries on transient errors (git-fixes).
- nfs: expose /proc/net/sunrpc/nfs in net namespaces (git-fixes).
- nfs: make the rpc_stat per net namespace (git-fixes).
- nfs: pass explicit offset/count to trace events (git-fixes).
- nfs: propagate readlink errors in nfs_symlink_filler (git-fixes).
- NFSD: Support write delegations in LAYOUTGET (git-fixes).
- NFSv4.1 another fix for EXCHGID4_FLAG_USE_PNFS_DS for DS server (git-fixes).
- nouveau/firmware: use dma non-coherent allocator (git-fixes).
- nvme_core: scan namespaces asynchronously (bsc#1224105).
- nvme-multipath: find NUMA path only for online numa-node (git-fixes).
- nvme-multipath: implement "queue-depth" iopolicy (bsc#1227706).
- nvme-multipath: prepare for "queue-depth" iopolicy (bsc#1227706).
- nvme-pci: add missing condition check for existence of mapped data (git-fixes).
- nvme-pci: do not directly handle subsys reset fallout (bsc#1220066).
- nvme-pci: Fix the instructions for disabling power management (git-fixes).
- nvme-sysfs: add 'tls_configured_key' sysfs attribute (bsc#1221857).
- nvme-sysfs: add 'tls_keyring' attribute (bsc#1221857).
- nvme-tcp: check for invalidated or revoked key (bsc#1221857).
- nvme-tcp: sanitize TLS key handling (bsc#1221857).
- nvme: add a newline to the 'tls_key' sysfs attribute (bsc#1221857).
- nvme: adjust multiples of NVME_CTRL_PAGE_SIZE in offset (git-fixes).
- nvme: avoid double free special payload (git-fixes).
- nvme: fix NVME_NS_DEAC may incorrectly identifying the disk as EXT_LBA (git-fixes).
- nvme: fixup comment for nvme RDMA Provider Type (git-fixes).
- nvme: split off TLS sysfs attributes into a separate group (bsc#1221857).
- nvme: tcp: remove unnecessary goto statement (bsc#1221857).
- nvmet-auth: fix nvmet_auth hash error handling (git-fixes).
- nvmet: always initialize cqe.result (git-fixes).
- nvmet: do not return 'reserved' for empty TSAS values (git-fixes).
- nvmet: fix a possible leak when destroy a ctrl during qp establishment (git-fixes).
- nvmet: make 'tsas' attribute idempotent for RDMA (git-fixes).
- ocfs2: strict bound check before memcmp in ocfs2_xattr_find_entry() (bsc#1228410).
- padata: Fix possible divide-by-0 panic in padata_mt_helper() (git-fixes).
- PCI: Add Edimax Vendor ID to pci_ids.h (stable-fixes).
- PCI: hv: Return zero, not garbage, when reading PCI_INTERRUPT_PIN (git-fixes).
- PCI: loongson: Enable MSI in LS7A Root Complex (stable-fixes).
- perf/smmuv3: Enable HiSilicon Erratum 162001900 quirk for HIP08/09 (git-fixes).
- pinctrl: mediatek: common-v2: Fix broken bias-disable for PULL_PU_PD_RSEL_TYPE (git-fixes).
- pinctrl: rockchip: correct RK3328 iomux width flag for GPIO2-B pins (git-fixes).
- pinctrl: single: fix potential NULL dereference in pcs_get_function() (git-fixes).
- pinctrl: starfive: jh7110: Correct the level trigger configuration of iev register (git-fixes).
- platform/chrome: cros_ec_proto: Lock device when updating MKBP version (git-fixes).
- platform/chrome: cros_ec_proto: Lock device when updating MKBP version (git-fixes).
- platform/surface: aggregator: Fix warning when controller is destroyed in probe (git-fixes).
- platform/x86: lg-laptop: fix %s null argument warning (stable-fixes).
- platform/x86/amd/hsmp: Add support for ACPI based probing (jsc#PED-8779).
- platform/x86/amd/hsmp: Cache pci_dev in struct hsmp_socket (jsc#PED-8779).
- platform/x86/amd/hsmp: Change devm_kzalloc() to devm_kcalloc() (jsc#PED-8779).
- platform/x86/amd/hsmp: Check HSMP support on AMD family of processors (jsc#PED-8779).
- platform/x86/amd/hsmp: Check num_sockets against MAX_AMD_SOCKETS (jsc#PED-8779).
- platform/x86/amd/hsmp: Create static func to handle platdev (jsc#PED-8779).
- platform/x86/amd/hsmp: Define a struct to hold mailbox regs (jsc#PED-8779).
- platform/x86/amd/hsmp: Move dev from platdev to hsmp_socket (jsc#PED-8779).
- platform/x86/amd/hsmp: Move hsmp_test to probe (jsc#PED-8779).
- platform/x86/amd/hsmp: Non-ACPI support for AMD F1A_M00~0Fh (jsc#PED-8779).
- platform/x86/amd/hsmp: Remove extra parenthesis and add a space (jsc#PED-8779).
- platform/x86/amd/hsmp: Restructure sysfs group creation (jsc#PED-8779).
- platform/x86/amd/hsmp: switch to use device_add_groups() (jsc#PED-8779).
- platform/x86/intel/ifs: Initialize union ifs_status to zero (git-fixes).
- power: supply: axp288_charger: Fix constant_charge_voltage writes (git-fixes).
- power: supply: axp288_charger: Round constant_charge_voltage writes down (git-fixes).
- power: supply: qcom_battmgr: return EAGAIN when firmware service is not up (git-fixes).
- powerpc: fix a file leak in kvm_vcpu_ioctl_enable_cap() (bsc#1194869).
- powerpc: xor_vmx: Add '-mhard-float' to CFLAGS (bsc#1194869).
- powerpc/64: Set _IO_BASE to POISON_POINTER_DELTA not 0 for CONFIG_PCI=n (bsc#1194869).
- powerpc/io: Avoid clang null pointer arithmetic warnings (bsc#1194869).
- powerpc/kexec_file: fix cpus node update to FDT (bsc#1194869).
- powerpc/kexec: make the update_cpus_node() function public (bsc#1194869).
- powerpc/kexec: split CONFIG_KEXEC_FILE and CONFIG_CRASH_DUMP (bsc#1194869).
- powerpc/pseries: Add failure related checks for h_get_mpp and h_get_ppp (bsc#1194869).
- powerpc/pseries: Whitelist dtl slub object for copying to userspace (bsc#1194869).
- powerpc/radix: Move some functions into #ifdef CONFIG_KVM_BOOK3S_HV_POSSIBLE (bsc#1194869).
- powerpc/topology: Check if a core is online (bsc#1214285 bsc#1205462 ltc#200161 ltc#200588 git-fixes).
- powerpc/xmon: Check cpu id in commands "c#", "dp#" and "dx#" (bsc#1194869).
- printk/panic: Allow cpu backtraces to be written into ringbuffer during panic (bsc#1225607).
- RDMA: Fix netdev tracker in ib_device_set_netdev (git-fixes)
- RDMA/cache: Release GID table even if leak is detected (git-fixes)
- RDMA/device: Return error earlier if port in not valid (git-fixes)
- RDMA/hns: Check atomic wr length (git-fixes)
- RDMA/hns: Fix insufficient extend DB for VFs. (git-fixes)
- RDMA/hns: Fix mbx timing out before CMD execution is completed (git-fixes)
- RDMA/hns: Fix missing pagesize and alignment check in FRMR (git-fixes)
- RDMA/hns: Fix shift-out-bounds when max_inline_data is 0 (git-fixes)
- RDMA/hns: Fix soft lockup under heavy CEQE load (git-fixes)
- RDMA/hns: Fix undifined behavior caused by invalid max_sge (git-fixes)
- RDMA/hns: Fix unmatch exception handling when init eq table fails (git-fixes)
- RDMA/iwcm: Fix a use-after-free related to destroying CM IDs (git-fixes)
- RDMA/mana_ib: Use virtual address in dma regions for MRs (git-fixes).
- RDMA/mlx4: Fix truncated output warning in alias_GUID.c (git-fixes)
- RDMA/mlx4: Fix truncated output warning in mad.c (git-fixes)
- RDMA/mlx5: Set mkeys for dmabuf at PAGE_SIZE (git-fixes)
- RDMA/rxe: Do not set BTH_ACK_MASK for UC or UD QPs (git-fixes)
- reiserfs: fix uninit-value in comp_keys (git-fixes).
- rtc: nct3018y: fix possible NULL dereference (stable-fixes).
- s390/cpum_cf: Fix endless loop in CF_DIAG event stop (git-fixes bsc#1229171).
- s390/dasd: fix error checks in dasd_copy_pair_store() (git-fixes bsc#1229173).
- s390/dasd: fix error recovery leading to data corruption on ESE devices (git-fixes bsc#1229452).
- s390/pci: Add missing virt_to_phys() for directed DIBV (git-fixes bsc#1229174).
- s390/pci: Allow allocation of more than 1 MSI interrupt (git-fixes bsc#1229172).
- s390/pci: Refactor arch_setup_msi_irqs() (git-fixes bsc#1229172).
- s390/pkey: harmonize pkey s390 debug feature calls (bsc#1228720).
- s390/pkey: introduce dynamic debugging for pkey (bsc#1228720).
- s390/sclp: Prevent release of buffer in I/O (git-fixes bsc#1229169).
- s390/uv: Panic for set and remove shared access UVC errors (git-fixes bsc#1229170).
- samples/bpf: syscall_tp_user: Fix array out-of-bound access (git-fixes).
- samples/bpf: syscall_tp_user: Rename num_progs into nr_tests (git-fixes).
- sbitmap: use READ_ONCE to access map->word (stable-fixes).
- scsi: lpfc: Allow DEVICE_RECOVERY mode after RSCN receipt if in PRLI_ISSUE state (bsc#1228857).
- scsi: lpfc: Cancel ELS WQE instead of issuing abort when SLI port is inactive (bsc#1228857).
- scsi: lpfc: Fix handling of fully recovered fabric node in dev_loss callbk (bsc#1228857).
- scsi: lpfc: Fix incorrect request len mbox field when setting trunking via sysfs (bsc#1228857).
- scsi: lpfc: Handle mailbox timeouts in lpfc_get_sfp_info (bsc#1228857).
- scsi: lpfc: Relax PRLI issue conditions after GID_FT response (bsc#1228857).
- scsi: lpfc: Revise lpfc_prep_embed_io routine with proper endian macro usages (bsc#1228857).
- scsi: lpfc: Update lpfc version to 14.4.0.3 (bsc#1228857).
- scsi: qla2xxx: Avoid possible run-time warning with long model_num (bsc#1228850).
- scsi: qla2xxx: Complete command early within lock (bsc#1228850).
- scsi: qla2xxx: Convert comma to semicolon (bsc#1228850).
- scsi: qla2xxx: Drop driver owner assignment (bsc#1228850).
- scsi: qla2xxx: During vport delete send async logout explicitly (bsc#1228850).
- scsi: qla2xxx: Fix debugfs output for fw_resource_count (bsc#1228850).
- scsi: qla2xxx: Fix flash read failure (bsc#1228850).
- scsi: qla2xxx: Fix for possible memory corruption (bsc#1228850).
- scsi: qla2xxx: Fix optrom version displayed in FDMI (bsc#1228850).
- scsi: qla2xxx: Indent help text (bsc#1228850).
- scsi: qla2xxx: Reduce fabric scan duplicate code (bsc#1228850).
- scsi: qla2xxx: Remove unused struct 'scsi_dif_tuple' (bsc#1228850).
- scsi: qla2xxx: Return ENOBUFS if sg_cnt is more than one for ELS cmds (bsc#1228850).
- scsi: qla2xxx: Unable to act on RSCN for port online (bsc#1228850).
- scsi: qla2xxx: Update version to 10.02.09.300-k (bsc#1228850).
- scsi: qla2xxx: Use QP lock to search for bsg (bsc#1228850).
- scsi: qla2xxx: validate nvme_local_port correctly (bsc#1228850).
- selftest/bpf: Add map_in_maps with BPF_MAP_TYPE_PERF_EVENT_ARRAY values (git-fixes).
- selftests/bpf: Add a test to verify previous stacksafe() fix (bsc#1225903).
- selftests/bpf: Add assert for user stacks in test_task_stack (git-fixes).
- selftests/bpf: Add netkit to tc_redirect selftest (git-fixes).
- selftests/bpf: De-veth-ize the tc_redirect test case (git-fixes).
- selftests/bpf: Disable IPv6 for lwt_redirect test (git-fixes).
- selftests/bpf: fix bpf_loop_bench for new callback verification scheme (git-fixes).
- selftests/bpf: fix compiler warnings in RELEASE=1 mode (git-fixes).
- selftests/bpf: Fix erroneous bitmask operation (git-fixes).
- selftests/bpf: Fix issues in setup_classid_environment() (git-fixes).
- selftests/bpf: Fix potential premature unload in bpf_testmod (git-fixes).
- selftests/bpf: Fix pyperf180 compilation failure with clang18 (git-fixes).
- selftests/bpf: fix RELEASE=1 build for tc_opts (git-fixes).
- selftests/bpf: Fix the flaky tc_redirect_dtime test (git-fixes).
- selftests/bpf: Fix up xdp bonding test wrt feature flags (git-fixes).
- selftests/bpf: Make linked_list failure test more robust (git-fixes).
- selftests/bpf: Relax time_tai test for equal timestamps in tai_forward (git-fixes).
- selftests/bpf: satisfy compiler by having explicit return in btf test (git-fixes).
- selftests/bpf: Skip module_fentry_shadow test when bpf_testmod is not available (git-fixes).
- selftests/bpf: Wait for the netstamp_needed_key static key to be turned on (git-fixes).
- serial: core: check uartclk for zero to avoid divide by zero (stable-fixes).
- soc: qcom: cmd-db: Map shared memory as WC, not WB (git-fixes).
- soc: qcom: pmic_glink: Actually communicate when remote goes down (git-fixes).
- soundwire: stream: fix programming slave ports for non-continous port maps (git-fixes).
- spi: Add empty versions of ACPI functions (stable-fixes).
- spi: microchip-core: fix init function not setting the master and motorola modes (git-fixes).
- spi: microchip-core: switch to use modern name (stable-fixes).
- spi: spi-fsl-lpspi: Fix scldiv calculation (git-fixes).
- spi: spidev: Add missing spi_device_id for bh2228fv (git-fixes).
- Squashfs: fix variable overflow triggered by sysbot (git-fixes).
- squashfs: squashfs_read_data need to check if the length is 0 (git-fixes).
- ssb: Fix division by zero issue in ssb_calc_clock_rate (stable-fixes).
- staging: iio: resolver: ad2s1210: fix use before initialization (stable-fixes).
- staging: ks7010: disable bh on tx_dev_lock (stable-fixes).
- string.h: Introduce memtostr() and memtostr_pad() (bsc#1228849).
- SUNRPC: add a missing rpc_stat for TCP TLS (git-fixes).
- sunrpc: add a struct rpc_stats arg to rpc_create_args (git-fixes).
- SUNRPC: Fix a race to wake a sync task (git-fixes).
- swiotlb: do not set total_used to 0 in swiotlb_create_debugfs_files() (git-fixes).
- swiotlb: fix swiotlb_bounce() to do partial sync's correctly (git-fixes).
- syscalls: fix compat_sys_io_pgetevents_time64 usage (git-fixes).
- thermal: bcm2835: Convert to platform remove callback returning void (stable-fixes).
- thermal/drivers/broadcom: Fix race between removal and clock disable (git-fixes).
- thunderbolt: Mark XDomain as unplugged when router is removed (stable-fixes).
- tools/perf: Fix perf bench epoll to enable the run when some CPU's are offline (bsc#1227747).
- tools/perf: Fix perf bench futex to enable the run when some CPU's are offline (bsc#1227747).
- tools/perf: Fix timing issue with parallel threads in perf bench wake-up-parallel (bsc#1227747).
- tools/resolve_btfids: fix build with musl libc (git-fixes).
- tools/resolve_btfids: Fix comparison of distinct pointer types warning in resolve_btfids (git-fixes).
- tools/resolve_btfids: Fix cross-compilation to non-host endianness (git-fixes).
- tools/resolve_btfids: Refactor set sorting with types from btf_ids.h (git-fixes).
- trace/pid_list: Change gfp flags in pid_list_fill_irq() (git-fixes).
- tracing: Return from tracing_buffers_read() if the file has been closed (bsc#1229136 git-fixes).
- tty: atmel_serial: use the correct RTS flag (git-fixes).
- tty: serial: fsl_lpuart: mark last busy before uart_add_one_port (git-fixes).
- usb: cdnsp: fix for Link TRB with TC (git-fixes).
- usb: cdnsp: fix incorrect index in cdnsp_get_hw_deq function (git-fixes).
- usb: core: sysfs: Unmerge @usb3_hardware_lpm_attr_group in remove_power_attributes() (git-fixes).
- usb: dwc3: core: Skip setting event buffers for host only controllers (stable-fixes).
- usb: dwc3: omap: add missing depopulate in probe error path (git-fixes).
- usb: dwc3: st: add missing depopulate in probe error path (git-fixes).
- usb: dwc3: st: fix probed platform device ref count on probe error path (git-fixes).
- usb: gadget: core: Check for unset descriptor (git-fixes).
- usb: gadget: fsl: Increase size of name buffer for endpoints (stable-fixes).
- usb: gadget: u_audio: Check return codes from usb_ep_enable and config_ep_by_speed (git-fixes).
- usb: gadget: u_serial: Set start_delayed during suspend (git-fixes).
- usb: gadget: uvc: cleanup request when not in correct state (stable-fixes).
- USB: serial: debug: do not echo input by default (stable-fixes).
- usb: typec: fsa4480: add support for Audio Accessory Mode (git-fixes).
- usb: typec: fsa4480: Add support to swap SBU orientation (git-fixes).
- usb: typec: fsa4480: Check if the chip is really there (git-fixes).
- usb: typec: fsa4480: Relax CHIP_ID check (git-fixes).
- usb: typec: fsa4480: rework mux & switch setup to handle more states (git-fixes).
- usb: vhci-hcd: Do not drop references before new references are gained (stable-fixes).
- vfio/pci: fix potential memory leak in vfio_intx_enable() (git-fixes).
- vhost-scsi: Handle vhost_vq_work_queue failures for events (git-fixes).
- vhost-vdpa: switch to use vmf_insert_pfn() in the fault handler (git-fixes).
- vhost: Release worker mutex during flushes (git-fixes).
- vhost: Use virtqueue mutex for swapping worker (git-fixes).
- vhost/vsock: always initialize seqpacket_allow (git-fixes).
- virt: guest_memfd: fix reference leak on hwpoisoned page (git-fixes).
- virtio_net: use u64_stats_t infra to avoid data-races (git-fixes).
- virtio-crypto: handle config changed by work queue (git-fixes).
- virtio: reenable config if freezing device failed (git-fixes).
- virtiofs: forbid newlines in tags (bsc#1229940).
- wifi: ath12k: fix memory leak in ath12k_dp_rx_peer_frag_setup() (stable-fixes).
- wifi: ath12k: fix soft lockup on suspend (git-fixes).
- wifi: brcmfmac: cfg80211: Handle SSID based pmksa deletion (git-fixes).
- wifi: cfg80211: fix reporting failed MLO links status with cfg80211_connect_done (git-fixes).
- wifi: iwlwifi: fw: fix wgds rev 3 exact size (git-fixes).
- wifi: mac80211: use monitor sdata with driver only if desired (git-fixes).
- wifi: mwifiex: duplicate static structs used in driver instances (git-fixes).
- wifi: nl80211: disallow setting special AP channel widths (stable-fixes).
- wifi: nl80211: do not give key data to userspace (stable-fixes).
- wifi: rtw88: usb: Fix disconnection after beacon loss (stable-fixes).
- wifi: wfx: repair open network AP mode (git-fixes).
- workqueue: Improve scalability of workqueue watchdog touch (bsc#1193454).
- workqueue: wq_watchdog_touch is always called with valid CPU (bsc#1193454).
- x86/asm: Use %c/%n instead of %P operand modifier in asm templates (git-fixes).
- x86/entry/64: Remove obsolete comment on tracing vs. SYSRET (git-fixes).
- x86/mm: Fix pti_clone_entry_text() for i386 (git-fixes).
- x86/mm: Fix pti_clone_pgtable() alignment assumption (git-fixes).
- x86/mtrr: Check if fixed MTRRs exist before saving them (git-fixes).
- x86/numa: Fix SRAT lookup of CFMWS ranges with numa_fill_memblks() (git-fixes).
- x86/numa: Fix the address overlap check in numa_fill_memblks() (git-fixes).
- x86/numa: Fix the sort compare func used in numa_fill_memblks() (git-fixes).
- x86/numa: Introduce numa_fill_memblks() (git-fixes).
- x86/pci: Skip early E820 check for ECAM region (git-fixes).
- x86/xen: Convert comma to semicolon (git-fixes).
- xfs: allow cross-linking special files without project quota (git-fixes).
- xfs: allow symlinks with short remote targets (bsc#1229160).
- xfs: allow unlinked symlinks and dirs with zero size (git-fixes).
- xfs: attr forks require attr, not attr2 (git-fixes).
- xfs: convert comma to semicolon (git-fixes).
- xfs: do not use current->journal_info (git-fixes).
- xfs: Fix missing interval for missing_owner in xfs fsmap (git-fixes).
- xfs: Fix the owner setting issue for rmap query in xfs fsmap (git-fixes).
- xfs: fix unlink vs cluster buffer instantiation race (git-fixes).
- xfs: honor init_xattrs in xfs_init_new_inode for !ATTR fs (git-fixes).
- xfs: journal geometry is not properly bounds checked (git-fixes).
- xfs: match lock mode in xfs_buffered_write_iomap_begin() (git-fixes).
- xfs: require XFS_SB_FEAT_INCOMPAT_LOG_XATTRS for attr log intent item recovery (git-fixes).
- xfs: upgrade the extent counters in xfs_reflink_end_cow_extent later (git-fixes).
- xfs: use consistent uid/gid when grabbing dquots for inodes (git-fixes).
- xfs: use XFS_BUF_DADDR_NULL for daddrs in getfsmap code (git-fixes).
- xhci: Fix Panther point NULL pointer deref at full-speed re-enumeration (git-fixes).
- xprtrdma: Fix rpcrdma_reqs_reset() (git-fixes).
Special Instructions and Notes:
- Please reboot the system after installing this update.
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
openSUSE Leap 15.6
zypper in -t patch SUSE-2024-3194=1 openSUSE-SLE-15.6-2024-3194=1
-
Public Cloud Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP6-2024-3194=1
Package List:
-
openSUSE Leap 15.6 (aarch64 x86_64)
- ocfs2-kmp-azure-debuginfo-6.4.0-150600.8.11.1
- kernel-azure-devel-debuginfo-6.4.0-150600.8.11.1
- kernel-azure-debuginfo-6.4.0-150600.8.11.1
- kernel-azure-optional-debuginfo-6.4.0-150600.8.11.1
- dlm-kmp-azure-6.4.0-150600.8.11.1
- ocfs2-kmp-azure-6.4.0-150600.8.11.1
- kernel-azure-devel-6.4.0-150600.8.11.1
- reiserfs-kmp-azure-debuginfo-6.4.0-150600.8.11.1
- gfs2-kmp-azure-debuginfo-6.4.0-150600.8.11.1
- dlm-kmp-azure-debuginfo-6.4.0-150600.8.11.1
- kernel-azure-livepatch-devel-6.4.0-150600.8.11.1
- kernel-azure-debugsource-6.4.0-150600.8.11.1
- kernel-azure-extra-debuginfo-6.4.0-150600.8.11.1
- gfs2-kmp-azure-6.4.0-150600.8.11.1
- kselftests-kmp-azure-debuginfo-6.4.0-150600.8.11.1
- cluster-md-kmp-azure-6.4.0-150600.8.11.1
- kernel-azure-extra-6.4.0-150600.8.11.1
- kernel-azure-optional-6.4.0-150600.8.11.1
- kernel-syms-azure-6.4.0-150600.8.11.1
- reiserfs-kmp-azure-6.4.0-150600.8.11.1
- kselftests-kmp-azure-6.4.0-150600.8.11.1
- cluster-md-kmp-azure-debuginfo-6.4.0-150600.8.11.1
-
openSUSE Leap 15.6 (aarch64 nosrc x86_64)
- kernel-azure-6.4.0-150600.8.11.1
-
openSUSE Leap 15.6 (x86_64)
- kernel-azure-vdso-6.4.0-150600.8.11.1
- kernel-azure-vdso-debuginfo-6.4.0-150600.8.11.1
-
openSUSE Leap 15.6 (noarch)
- kernel-source-azure-6.4.0-150600.8.11.1
- kernel-devel-azure-6.4.0-150600.8.11.1
-
Public Cloud Module 15-SP6 (aarch64 nosrc x86_64)
- kernel-azure-6.4.0-150600.8.11.1
-
Public Cloud Module 15-SP6 (aarch64 x86_64)
- kernel-azure-debugsource-6.4.0-150600.8.11.1
- kernel-azure-devel-debuginfo-6.4.0-150600.8.11.1
- kernel-azure-devel-6.4.0-150600.8.11.1
- kernel-azure-debuginfo-6.4.0-150600.8.11.1
- kernel-syms-azure-6.4.0-150600.8.11.1
-
Public Cloud Module 15-SP6 (noarch)
- kernel-source-azure-6.4.0-150600.8.11.1
- kernel-devel-azure-6.4.0-150600.8.11.1
References:
- https://www.suse.com/security/cve/CVE-2023-52489.html
- https://www.suse.com/security/cve/CVE-2023-52581.html
- https://www.suse.com/security/cve/CVE-2023-52668.html
- https://www.suse.com/security/cve/CVE-2023-52688.html
- https://www.suse.com/security/cve/CVE-2023-52735.html
- https://www.suse.com/security/cve/CVE-2023-52859.html
- https://www.suse.com/security/cve/CVE-2023-52885.html
- https://www.suse.com/security/cve/CVE-2023-52886.html
- https://www.suse.com/security/cve/CVE-2023-52887.html
- https://www.suse.com/security/cve/CVE-2023-52889.html
- https://www.suse.com/security/cve/CVE-2024-26590.html
- https://www.suse.com/security/cve/CVE-2024-26631.html
- https://www.suse.com/security/cve/CVE-2024-26637.html
- https://www.suse.com/security/cve/CVE-2024-26668.html
- https://www.suse.com/security/cve/CVE-2024-26669.html
- https://www.suse.com/security/cve/CVE-2024-26677.html
- https://www.suse.com/security/cve/CVE-2024-26682.html
- https://www.suse.com/security/cve/CVE-2024-26683.html
- https://www.suse.com/security/cve/CVE-2024-26691.html
- https://www.suse.com/security/cve/CVE-2024-26735.html
- https://www.suse.com/security/cve/CVE-2024-26808.html
- https://www.suse.com/security/cve/CVE-2024-26809.html
- https://www.suse.com/security/cve/CVE-2024-26812.html
- https://www.suse.com/security/cve/CVE-2024-26835.html
- https://www.suse.com/security/cve/CVE-2024-26837.html
- https://www.suse.com/security/cve/CVE-2024-26849.html
- https://www.suse.com/security/cve/CVE-2024-26851.html
- https://www.suse.com/security/cve/CVE-2024-26889.html
- https://www.suse.com/security/cve/CVE-2024-26920.html
- https://www.suse.com/security/cve/CVE-2024-26944.html
- https://www.suse.com/security/cve/CVE-2024-26976.html
- https://www.suse.com/security/cve/CVE-2024-27010.html
- https://www.suse.com/security/cve/CVE-2024-27011.html
- https://www.suse.com/security/cve/CVE-2024-27024.html
- https://www.suse.com/security/cve/CVE-2024-27049.html
- https://www.suse.com/security/cve/CVE-2024-27050.html
- https://www.suse.com/security/cve/CVE-2024-27079.html
- https://www.suse.com/security/cve/CVE-2024-27403.html
- https://www.suse.com/security/cve/CVE-2024-27433.html
- https://www.suse.com/security/cve/CVE-2024-27437.html
- https://www.suse.com/security/cve/CVE-2024-31076.html
- https://www.suse.com/security/cve/CVE-2024-35854.html
- https://www.suse.com/security/cve/CVE-2024-35855.html
- https://www.suse.com/security/cve/CVE-2024-35897.html
- https://www.suse.com/security/cve/CVE-2024-35902.html
- https://www.suse.com/security/cve/CVE-2024-35913.html
- https://www.suse.com/security/cve/CVE-2024-35939.html
- https://www.suse.com/security/cve/CVE-2024-35949.html
- https://www.suse.com/security/cve/CVE-2024-36270.html
- https://www.suse.com/security/cve/CVE-2024-36286.html
- https://www.suse.com/security/cve/CVE-2024-36288.html
- https://www.suse.com/security/cve/CVE-2024-36489.html
- https://www.suse.com/security/cve/CVE-2024-36881.html
- https://www.suse.com/security/cve/CVE-2024-36907.html
- https://www.suse.com/security/cve/CVE-2024-36909.html
- https://www.suse.com/security/cve/CVE-2024-36910.html
- https://www.suse.com/security/cve/CVE-2024-36911.html
- https://www.suse.com/security/cve/CVE-2024-36929.html
- https://www.suse.com/security/cve/CVE-2024-36933.html
- https://www.suse.com/security/cve/CVE-2024-36939.html
- https://www.suse.com/security/cve/CVE-2024-36970.html
- https://www.suse.com/security/cve/CVE-2024-36979.html
- https://www.suse.com/security/cve/CVE-2024-38548.html
- https://www.suse.com/security/cve/CVE-2024-38563.html
- https://www.suse.com/security/cve/CVE-2024-38609.html
- https://www.suse.com/security/cve/CVE-2024-38662.html
- https://www.suse.com/security/cve/CVE-2024-39476.html
- https://www.suse.com/security/cve/CVE-2024-39483.html
- https://www.suse.com/security/cve/CVE-2024-39484.html
- https://www.suse.com/security/cve/CVE-2024-39486.html
- https://www.suse.com/security/cve/CVE-2024-39488.html
- https://www.suse.com/security/cve/CVE-2024-39489.html
- https://www.suse.com/security/cve/CVE-2024-39491.html
- https://www.suse.com/security/cve/CVE-2024-39493.html
- https://www.suse.com/security/cve/CVE-2024-39497.html
- https://www.suse.com/security/cve/CVE-2024-39499.html
- https://www.suse.com/security/cve/CVE-2024-39500.html
- https://www.suse.com/security/cve/CVE-2024-39501.html
- https://www.suse.com/security/cve/CVE-2024-39505.html
- https://www.suse.com/security/cve/CVE-2024-39506.html
- https://www.suse.com/security/cve/CVE-2024-39508.html
- https://www.suse.com/security/cve/CVE-2024-39509.html
- https://www.suse.com/security/cve/CVE-2024-39510.html
- https://www.suse.com/security/cve/CVE-2024-40899.html
- https://www.suse.com/security/cve/CVE-2024-40900.html
- https://www.suse.com/security/cve/CVE-2024-40902.html
- https://www.suse.com/security/cve/CVE-2024-40903.html
- https://www.suse.com/security/cve/CVE-2024-40904.html
- https://www.suse.com/security/cve/CVE-2024-40905.html
- https://www.suse.com/security/cve/CVE-2024-40909.html
- https://www.suse.com/security/cve/CVE-2024-40910.html
- https://www.suse.com/security/cve/CVE-2024-40911.html
- https://www.suse.com/security/cve/CVE-2024-40912.html
- https://www.suse.com/security/cve/CVE-2024-40913.html
- https://www.suse.com/security/cve/CVE-2024-40916.html
- https://www.suse.com/security/cve/CVE-2024-40920.html
- https://www.suse.com/security/cve/CVE-2024-40921.html
- https://www.suse.com/security/cve/CVE-2024-40922.html
- https://www.suse.com/security/cve/CVE-2024-40924.html
- https://www.suse.com/security/cve/CVE-2024-40926.html
- https://www.suse.com/security/cve/CVE-2024-40927.html
- https://www.suse.com/security/cve/CVE-2024-40929.html
- https://www.suse.com/security/cve/CVE-2024-40930.html
- https://www.suse.com/security/cve/CVE-2024-40932.html
- https://www.suse.com/security/cve/CVE-2024-40934.html
- https://www.suse.com/security/cve/CVE-2024-40936.html
- https://www.suse.com/security/cve/CVE-2024-40938.html
- https://www.suse.com/security/cve/CVE-2024-40939.html
- https://www.suse.com/security/cve/CVE-2024-40941.html
- https://www.suse.com/security/cve/CVE-2024-40942.html
- https://www.suse.com/security/cve/CVE-2024-40943.html
- https://www.suse.com/security/cve/CVE-2024-40944.html
- https://www.suse.com/security/cve/CVE-2024-40945.html
- https://www.suse.com/security/cve/CVE-2024-40954.html
- https://www.suse.com/security/cve/CVE-2024-40956.html
- https://www.suse.com/security/cve/CVE-2024-40957.html
- https://www.suse.com/security/cve/CVE-2024-40958.html
- https://www.suse.com/security/cve/CVE-2024-40959.html
- https://www.suse.com/security/cve/CVE-2024-40962.html
- https://www.suse.com/security/cve/CVE-2024-40964.html
- https://www.suse.com/security/cve/CVE-2024-40967.html
- https://www.suse.com/security/cve/CVE-2024-40976.html
- https://www.suse.com/security/cve/CVE-2024-40977.html
- https://www.suse.com/security/cve/CVE-2024-40978.html
- https://www.suse.com/security/cve/CVE-2024-40981.html
- https://www.suse.com/security/cve/CVE-2024-40982.html
- https://www.suse.com/security/cve/CVE-2024-40984.html
- https://www.suse.com/security/cve/CVE-2024-40987.html
- https://www.suse.com/security/cve/CVE-2024-40988.html
- https://www.suse.com/security/cve/CVE-2024-40989.html
- https://www.suse.com/security/cve/CVE-2024-40990.html
- https://www.suse.com/security/cve/CVE-2024-40992.html
- https://www.suse.com/security/cve/CVE-2024-40994.html
- https://www.suse.com/security/cve/CVE-2024-40995.html
- https://www.suse.com/security/cve/CVE-2024-40997.html
- https://www.suse.com/security/cve/CVE-2024-41000.html
- https://www.suse.com/security/cve/CVE-2024-41001.html
- https://www.suse.com/security/cve/CVE-2024-41002.html
- https://www.suse.com/security/cve/CVE-2024-41004.html
- https://www.suse.com/security/cve/CVE-2024-41007.html
- https://www.suse.com/security/cve/CVE-2024-41009.html
- https://www.suse.com/security/cve/CVE-2024-41010.html
- https://www.suse.com/security/cve/CVE-2024-41011.html
- https://www.suse.com/security/cve/CVE-2024-41012.html
- https://www.suse.com/security/cve/CVE-2024-41015.html
- https://www.suse.com/security/cve/CVE-2024-41016.html
- https://www.suse.com/security/cve/CVE-2024-41020.html
- https://www.suse.com/security/cve/CVE-2024-41022.html
- https://www.suse.com/security/cve/CVE-2024-41024.html
- https://www.suse.com/security/cve/CVE-2024-41025.html
- https://www.suse.com/security/cve/CVE-2024-41028.html
- https://www.suse.com/security/cve/CVE-2024-41032.html
- https://www.suse.com/security/cve/CVE-2024-41035.html
- https://www.suse.com/security/cve/CVE-2024-41036.html
- https://www.suse.com/security/cve/CVE-2024-41037.html
- https://www.suse.com/security/cve/CVE-2024-41038.html
- https://www.suse.com/security/cve/CVE-2024-41039.html
- https://www.suse.com/security/cve/CVE-2024-41040.html
- https://www.suse.com/security/cve/CVE-2024-41041.html
- https://www.suse.com/security/cve/CVE-2024-41044.html
- https://www.suse.com/security/cve/CVE-2024-41045.html
- https://www.suse.com/security/cve/CVE-2024-41048.html
- https://www.suse.com/security/cve/CVE-2024-41049.html
- https://www.suse.com/security/cve/CVE-2024-41050.html
- https://www.suse.com/security/cve/CVE-2024-41051.html
- https://www.suse.com/security/cve/CVE-2024-41056.html
- https://www.suse.com/security/cve/CVE-2024-41057.html
- https://www.suse.com/security/cve/CVE-2024-41058.html
- https://www.suse.com/security/cve/CVE-2024-41059.html
- https://www.suse.com/security/cve/CVE-2024-41060.html
- https://www.suse.com/security/cve/CVE-2024-41061.html
- https://www.suse.com/security/cve/CVE-2024-41062.html
- https://www.suse.com/security/cve/CVE-2024-41063.html
- https://www.suse.com/security/cve/CVE-2024-41064.html
- https://www.suse.com/security/cve/CVE-2024-41065.html
- https://www.suse.com/security/cve/CVE-2024-41066.html
- https://www.suse.com/security/cve/CVE-2024-41068.html
- https://www.suse.com/security/cve/CVE-2024-41069.html
- https://www.suse.com/security/cve/CVE-2024-41070.html
- https://www.suse.com/security/cve/CVE-2024-41071.html
- https://www.suse.com/security/cve/CVE-2024-41072.html
- https://www.suse.com/security/cve/CVE-2024-41073.html
- https://www.suse.com/security/cve/CVE-2024-41074.html
- https://www.suse.com/security/cve/CVE-2024-41075.html
- https://www.suse.com/security/cve/CVE-2024-41076.html
- https://www.suse.com/security/cve/CVE-2024-41078.html
- https://www.suse.com/security/cve/CVE-2024-41079.html
- https://www.suse.com/security/cve/CVE-2024-41080.html
- https://www.suse.com/security/cve/CVE-2024-41081.html
- https://www.suse.com/security/cve/CVE-2024-41084.html
- https://www.suse.com/security/cve/CVE-2024-41087.html
- https://www.suse.com/security/cve/CVE-2024-41088.html
- https://www.suse.com/security/cve/CVE-2024-41089.html
- https://www.suse.com/security/cve/CVE-2024-41092.html
- https://www.suse.com/security/cve/CVE-2024-41093.html
- https://www.suse.com/security/cve/CVE-2024-41094.html
- https://www.suse.com/security/cve/CVE-2024-41095.html
- https://www.suse.com/security/cve/CVE-2024-41096.html
- https://www.suse.com/security/cve/CVE-2024-41097.html
- https://www.suse.com/security/cve/CVE-2024-41098.html
- https://www.suse.com/security/cve/CVE-2024-42064.html
- https://www.suse.com/security/cve/CVE-2024-42069.html
- https://www.suse.com/security/cve/CVE-2024-42070.html
- https://www.suse.com/security/cve/CVE-2024-42073.html
- https://www.suse.com/security/cve/CVE-2024-42074.html
- https://www.suse.com/security/cve/CVE-2024-42076.html
- https://www.suse.com/security/cve/CVE-2024-42077.html
- https://www.suse.com/security/cve/CVE-2024-42079.html
- https://www.suse.com/security/cve/CVE-2024-42080.html
- https://www.suse.com/security/cve/CVE-2024-42082.html
- https://www.suse.com/security/cve/CVE-2024-42085.html
- https://www.suse.com/security/cve/CVE-2024-42086.html
- https://www.suse.com/security/cve/CVE-2024-42087.html
- https://www.suse.com/security/cve/CVE-2024-42089.html
- https://www.suse.com/security/cve/CVE-2024-42090.html
- https://www.suse.com/security/cve/CVE-2024-42092.html
- https://www.suse.com/security/cve/CVE-2024-42093.html
- https://www.suse.com/security/cve/CVE-2024-42095.html
- https://www.suse.com/security/cve/CVE-2024-42096.html
- https://www.suse.com/security/cve/CVE-2024-42097.html
- https://www.suse.com/security/cve/CVE-2024-42098.html
- https://www.suse.com/security/cve/CVE-2024-42101.html
- https://www.suse.com/security/cve/CVE-2024-42104.html
- https://www.suse.com/security/cve/CVE-2024-42105.html
- https://www.suse.com/security/cve/CVE-2024-42106.html
- https://www.suse.com/security/cve/CVE-2024-42107.html
- https://www.suse.com/security/cve/CVE-2024-42109.html
- https://www.suse.com/security/cve/CVE-2024-42110.html
- https://www.suse.com/security/cve/CVE-2024-42113.html
- https://www.suse.com/security/cve/CVE-2024-42114.html
- https://www.suse.com/security/cve/CVE-2024-42115.html
- https://www.suse.com/security/cve/CVE-2024-42117.html
- https://www.suse.com/security/cve/CVE-2024-42119.html
- https://www.suse.com/security/cve/CVE-2024-42120.html
- https://www.suse.com/security/cve/CVE-2024-42121.html
- https://www.suse.com/security/cve/CVE-2024-42122.html
- https://www.suse.com/security/cve/CVE-2024-42124.html
- https://www.suse.com/security/cve/CVE-2024-42125.html
- https://www.suse.com/security/cve/CVE-2024-42126.html
- https://www.suse.com/security/cve/CVE-2024-42127.html
- https://www.suse.com/security/cve/CVE-2024-42130.html
- https://www.suse.com/security/cve/CVE-2024-42131.html
- https://www.suse.com/security/cve/CVE-2024-42132.html
- https://www.suse.com/security/cve/CVE-2024-42133.html
- https://www.suse.com/security/cve/CVE-2024-42136.html
- https://www.suse.com/security/cve/CVE-2024-42137.html
- https://www.suse.com/security/cve/CVE-2024-42138.html
- https://www.suse.com/security/cve/CVE-2024-42139.html
- https://www.suse.com/security/cve/CVE-2024-42141.html
- https://www.suse.com/security/cve/CVE-2024-42142.html
- https://www.suse.com/security/cve/CVE-2024-42143.html
- https://www.suse.com/security/cve/CVE-2024-42144.html
- https://www.suse.com/security/cve/CVE-2024-42145.html
- https://www.suse.com/security/cve/CVE-2024-42147.html
- https://www.suse.com/security/cve/CVE-2024-42148.html
- https://www.suse.com/security/cve/CVE-2024-42152.html
- https://www.suse.com/security/cve/CVE-2024-42153.html
- https://www.suse.com/security/cve/CVE-2024-42155.html
- https://www.suse.com/security/cve/CVE-2024-42156.html
- https://www.suse.com/security/cve/CVE-2024-42157.html
- https://www.suse.com/security/cve/CVE-2024-42158.html
- https://www.suse.com/security/cve/CVE-2024-42159.html
- https://www.suse.com/security/cve/CVE-2024-42161.html
- https://www.suse.com/security/cve/CVE-2024-42162.html
- https://www.suse.com/security/cve/CVE-2024-42223.html
- https://www.suse.com/security/cve/CVE-2024-42224.html
- https://www.suse.com/security/cve/CVE-2024-42225.html
- https://www.suse.com/security/cve/CVE-2024-42226.html
- https://www.suse.com/security/cve/CVE-2024-42227.html
- https://www.suse.com/security/cve/CVE-2024-42228.html
- https://www.suse.com/security/cve/CVE-2024-42229.html
- https://www.suse.com/security/cve/CVE-2024-42230.html
- https://www.suse.com/security/cve/CVE-2024-42232.html
- https://www.suse.com/security/cve/CVE-2024-42236.html
- https://www.suse.com/security/cve/CVE-2024-42237.html
- https://www.suse.com/security/cve/CVE-2024-42238.html
- https://www.suse.com/security/cve/CVE-2024-42239.html
- https://www.suse.com/security/cve/CVE-2024-42240.html
- https://www.suse.com/security/cve/CVE-2024-42241.html
- https://www.suse.com/security/cve/CVE-2024-42244.html
- https://www.suse.com/security/cve/CVE-2024-42245.html
- https://www.suse.com/security/cve/CVE-2024-42246.html
- https://www.suse.com/security/cve/CVE-2024-42247.html
- https://www.suse.com/security/cve/CVE-2024-42250.html
- https://www.suse.com/security/cve/CVE-2024-42253.html
- https://www.suse.com/security/cve/CVE-2024-42259.html
- https://www.suse.com/security/cve/CVE-2024-42268.html
- https://www.suse.com/security/cve/CVE-2024-42269.html
- https://www.suse.com/security/cve/CVE-2024-42270.html
- https://www.suse.com/security/cve/CVE-2024-42271.html
- https://www.suse.com/security/cve/CVE-2024-42274.html
- https://www.suse.com/security/cve/CVE-2024-42276.html
- https://www.suse.com/security/cve/CVE-2024-42277.html
- https://www.suse.com/security/cve/CVE-2024-42278.html
- https://www.suse.com/security/cve/CVE-2024-42279.html
- https://www.suse.com/security/cve/CVE-2024-42280.html
- https://www.suse.com/security/cve/CVE-2024-42281.html
- https://www.suse.com/security/cve/CVE-2024-42283.html
- https://www.suse.com/security/cve/CVE-2024-42284.html
- https://www.suse.com/security/cve/CVE-2024-42285.html
- https://www.suse.com/security/cve/CVE-2024-42286.html
- https://www.suse.com/security/cve/CVE-2024-42287.html
- https://www.suse.com/security/cve/CVE-2024-42288.html
- https://www.suse.com/security/cve/CVE-2024-42289.html
- https://www.suse.com/security/cve/CVE-2024-42290.html
- https://www.suse.com/security/cve/CVE-2024-42291.html
- https://www.suse.com/security/cve/CVE-2024-42292.html
- https://www.suse.com/security/cve/CVE-2024-42295.html
- https://www.suse.com/security/cve/CVE-2024-42298.html
- https://www.suse.com/security/cve/CVE-2024-42301.html
- https://www.suse.com/security/cve/CVE-2024-42302.html
- https://www.suse.com/security/cve/CVE-2024-42303.html
- https://www.suse.com/security/cve/CVE-2024-42308.html
- https://www.suse.com/security/cve/CVE-2024-42309.html
- https://www.suse.com/security/cve/CVE-2024-42310.html
- https://www.suse.com/security/cve/CVE-2024-42311.html
- https://www.suse.com/security/cve/CVE-2024-42312.html
- https://www.suse.com/security/cve/CVE-2024-42313.html
- https://www.suse.com/security/cve/CVE-2024-42314.html
- https://www.suse.com/security/cve/CVE-2024-42315.html
- https://www.suse.com/security/cve/CVE-2024-42316.html
- https://www.suse.com/security/cve/CVE-2024-42318.html
- https://www.suse.com/security/cve/CVE-2024-42319.html
- https://www.suse.com/security/cve/CVE-2024-42320.html
- https://www.suse.com/security/cve/CVE-2024-42322.html
- https://www.suse.com/security/cve/CVE-2024-43816.html
- https://www.suse.com/security/cve/CVE-2024-43817.html
- https://www.suse.com/security/cve/CVE-2024-43818.html
- https://www.suse.com/security/cve/CVE-2024-43819.html
- https://www.suse.com/security/cve/CVE-2024-43821.html
- https://www.suse.com/security/cve/CVE-2024-43823.html
- https://www.suse.com/security/cve/CVE-2024-43824.html
- https://www.suse.com/security/cve/CVE-2024-43825.html
- https://www.suse.com/security/cve/CVE-2024-43826.html
- https://www.suse.com/security/cve/CVE-2024-43829.html
- https://www.suse.com/security/cve/CVE-2024-43830.html
- https://www.suse.com/security/cve/CVE-2024-43831.html
- https://www.suse.com/security/cve/CVE-2024-43833.html
- https://www.suse.com/security/cve/CVE-2024-43834.html
- https://www.suse.com/security/cve/CVE-2024-43837.html
- https://www.suse.com/security/cve/CVE-2024-43839.html
- https://www.suse.com/security/cve/CVE-2024-43840.html
- https://www.suse.com/security/cve/CVE-2024-43841.html
- https://www.suse.com/security/cve/CVE-2024-43842.html
- https://www.suse.com/security/cve/CVE-2024-43846.html
- https://www.suse.com/security/cve/CVE-2024-43847.html
- https://www.suse.com/security/cve/CVE-2024-43849.html
- https://www.suse.com/security/cve/CVE-2024-43850.html
- https://www.suse.com/security/cve/CVE-2024-43851.html
- https://www.suse.com/security/cve/CVE-2024-43853.html
- https://www.suse.com/security/cve/CVE-2024-43854.html
- https://www.suse.com/security/cve/CVE-2024-43855.html
- https://www.suse.com/security/cve/CVE-2024-43856.html
- https://www.suse.com/security/cve/CVE-2024-43858.html
- https://www.suse.com/security/cve/CVE-2024-43860.html
- https://www.suse.com/security/cve/CVE-2024-43861.html
- https://www.suse.com/security/cve/CVE-2024-43863.html
- https://www.suse.com/security/cve/CVE-2024-43864.html
- https://www.suse.com/security/cve/CVE-2024-43866.html
- https://www.suse.com/security/cve/CVE-2024-43867.html
- https://www.suse.com/security/cve/CVE-2024-43871.html
- https://www.suse.com/security/cve/CVE-2024-43872.html
- https://www.suse.com/security/cve/CVE-2024-43873.html
- https://www.suse.com/security/cve/CVE-2024-43874.html
- https://www.suse.com/security/cve/CVE-2024-43875.html
- https://www.suse.com/security/cve/CVE-2024-43876.html
- https://www.suse.com/security/cve/CVE-2024-43877.html
- https://www.suse.com/security/cve/CVE-2024-43879.html
- https://www.suse.com/security/cve/CVE-2024-43880.html
- https://www.suse.com/security/cve/CVE-2024-43881.html
- https://www.suse.com/security/cve/CVE-2024-43882.html
- https://www.suse.com/security/cve/CVE-2024-43883.html
- https://www.suse.com/security/cve/CVE-2024-43884.html
- https://www.suse.com/security/cve/CVE-2024-43885.html
- https://www.suse.com/security/cve/CVE-2024-43889.html
- https://www.suse.com/security/cve/CVE-2024-43892.html
- https://www.suse.com/security/cve/CVE-2024-43893.html
- https://www.suse.com/security/cve/CVE-2024-43894.html
- https://www.suse.com/security/cve/CVE-2024-43895.html
- https://www.suse.com/security/cve/CVE-2024-43897.html
- https://www.suse.com/security/cve/CVE-2024-43899.html
- https://www.suse.com/security/cve/CVE-2024-43900.html
- https://www.suse.com/security/cve/CVE-2024-43902.html
- https://www.suse.com/security/cve/CVE-2024-43903.html
- https://www.suse.com/security/cve/CVE-2024-43905.html
- https://www.suse.com/security/cve/CVE-2024-43906.html
- https://www.suse.com/security/cve/CVE-2024-43907.html
- https://www.suse.com/security/cve/CVE-2024-43908.html
- https://www.suse.com/security/cve/CVE-2024-43909.html
- https://www.suse.com/security/cve/CVE-2024-43911.html
- https://www.suse.com/security/cve/CVE-2024-43912.html
- https://www.suse.com/security/cve/CVE-2024-44931.html
- https://www.suse.com/security/cve/CVE-2024-44938.html
- https://www.suse.com/security/cve/CVE-2024-44939.html
- https://bugzilla.suse.com/show_bug.cgi?id=1012628
- https://bugzilla.suse.com/show_bug.cgi?id=1193454
- https://bugzilla.suse.com/show_bug.cgi?id=1194869
- https://bugzilla.suse.com/show_bug.cgi?id=1205462
- https://bugzilla.suse.com/show_bug.cgi?id=1208783
- https://bugzilla.suse.com/show_bug.cgi?id=1213123
- https://bugzilla.suse.com/show_bug.cgi?id=1214285
- https://bugzilla.suse.com/show_bug.cgi?id=1215199
- https://bugzilla.suse.com/show_bug.cgi?id=1220066
- https://bugzilla.suse.com/show_bug.cgi?id=1220252
- https://bugzilla.suse.com/show_bug.cgi?id=1220877
- https://bugzilla.suse.com/show_bug.cgi?id=1221326
- https://bugzilla.suse.com/show_bug.cgi?id=1221630
- https://bugzilla.suse.com/show_bug.cgi?id=1221645
- https://bugzilla.suse.com/show_bug.cgi?id=1221652
- https://bugzilla.suse.com/show_bug.cgi?id=1221857
- https://bugzilla.suse.com/show_bug.cgi?id=1222254
- https://bugzilla.suse.com/show_bug.cgi?id=1222335
- https://bugzilla.suse.com/show_bug.cgi?id=1222350
- https://bugzilla.suse.com/show_bug.cgi?id=1222364
- https://bugzilla.suse.com/show_bug.cgi?id=1222372
- https://bugzilla.suse.com/show_bug.cgi?id=1222387
- https://bugzilla.suse.com/show_bug.cgi?id=1222433
- https://bugzilla.suse.com/show_bug.cgi?id=1222434
- https://bugzilla.suse.com/show_bug.cgi?id=1222463
- https://bugzilla.suse.com/show_bug.cgi?id=1222625
- https://bugzilla.suse.com/show_bug.cgi?id=1222633
- https://bugzilla.suse.com/show_bug.cgi?id=1222634
- https://bugzilla.suse.com/show_bug.cgi?id=1222808
- https://bugzilla.suse.com/show_bug.cgi?id=1222967
- https://bugzilla.suse.com/show_bug.cgi?id=1222973
- https://bugzilla.suse.com/show_bug.cgi?id=1223053
- https://bugzilla.suse.com/show_bug.cgi?id=1223074
- https://bugzilla.suse.com/show_bug.cgi?id=1223191
- https://bugzilla.suse.com/show_bug.cgi?id=1223395
- https://bugzilla.suse.com/show_bug.cgi?id=1223635
- https://bugzilla.suse.com/show_bug.cgi?id=1223720
- https://bugzilla.suse.com/show_bug.cgi?id=1223731
- https://bugzilla.suse.com/show_bug.cgi?id=1223742
- https://bugzilla.suse.com/show_bug.cgi?id=1223763
- https://bugzilla.suse.com/show_bug.cgi?id=1223767
- https://bugzilla.suse.com/show_bug.cgi?id=1223777
- https://bugzilla.suse.com/show_bug.cgi?id=1223803
- https://bugzilla.suse.com/show_bug.cgi?id=1224105
- https://bugzilla.suse.com/show_bug.cgi?id=1224415
- https://bugzilla.suse.com/show_bug.cgi?id=1224485
- https://bugzilla.suse.com/show_bug.cgi?id=1224496
- https://bugzilla.suse.com/show_bug.cgi?id=1224510
- https://bugzilla.suse.com/show_bug.cgi?id=1224535
- https://bugzilla.suse.com/show_bug.cgi?id=1224631
- https://bugzilla.suse.com/show_bug.cgi?id=1224636
- https://bugzilla.suse.com/show_bug.cgi?id=1224690
- https://bugzilla.suse.com/show_bug.cgi?id=1224694
- https://bugzilla.suse.com/show_bug.cgi?id=1224700
- https://bugzilla.suse.com/show_bug.cgi?id=1224711
- https://bugzilla.suse.com/show_bug.cgi?id=1225475
- https://bugzilla.suse.com/show_bug.cgi?id=1225582
- https://bugzilla.suse.com/show_bug.cgi?id=1225607
- https://bugzilla.suse.com/show_bug.cgi?id=1225717
- https://bugzilla.suse.com/show_bug.cgi?id=1225718
- https://bugzilla.suse.com/show_bug.cgi?id=1225744
- https://bugzilla.suse.com/show_bug.cgi?id=1225745
- https://bugzilla.suse.com/show_bug.cgi?id=1225751
- https://bugzilla.suse.com/show_bug.cgi?id=1225814
- https://bugzilla.suse.com/show_bug.cgi?id=1225832
- https://bugzilla.suse.com/show_bug.cgi?id=1225838
- https://bugzilla.suse.com/show_bug.cgi?id=1225903
- https://bugzilla.suse.com/show_bug.cgi?id=1226031
- https://bugzilla.suse.com/show_bug.cgi?id=1226127
- https://bugzilla.suse.com/show_bug.cgi?id=1226502
- https://bugzilla.suse.com/show_bug.cgi?id=1226530
- https://bugzilla.suse.com/show_bug.cgi?id=1226588
- https://bugzilla.suse.com/show_bug.cgi?id=1226604
- https://bugzilla.suse.com/show_bug.cgi?id=1226743
- https://bugzilla.suse.com/show_bug.cgi?id=1226751
- https://bugzilla.suse.com/show_bug.cgi?id=1226765
- https://bugzilla.suse.com/show_bug.cgi?id=1226798
- https://bugzilla.suse.com/show_bug.cgi?id=1226801
- https://bugzilla.suse.com/show_bug.cgi?id=1226834
- https://bugzilla.suse.com/show_bug.cgi?id=1226874
- https://bugzilla.suse.com/show_bug.cgi?id=1226885
- https://bugzilla.suse.com/show_bug.cgi?id=1226920
- https://bugzilla.suse.com/show_bug.cgi?id=1227149
- https://bugzilla.suse.com/show_bug.cgi?id=1227182
- https://bugzilla.suse.com/show_bug.cgi?id=1227383
- https://bugzilla.suse.com/show_bug.cgi?id=1227437
- https://bugzilla.suse.com/show_bug.cgi?id=1227492
- https://bugzilla.suse.com/show_bug.cgi?id=1227493
- https://bugzilla.suse.com/show_bug.cgi?id=1227494
- https://bugzilla.suse.com/show_bug.cgi?id=1227618
- https://bugzilla.suse.com/show_bug.cgi?id=1227620
- https://bugzilla.suse.com/show_bug.cgi?id=1227623
- https://bugzilla.suse.com/show_bug.cgi?id=1227627
- https://bugzilla.suse.com/show_bug.cgi?id=1227634
- https://bugzilla.suse.com/show_bug.cgi?id=1227706
- https://bugzilla.suse.com/show_bug.cgi?id=1227722
- https://bugzilla.suse.com/show_bug.cgi?id=1227724
- https://bugzilla.suse.com/show_bug.cgi?id=1227725
- https://bugzilla.suse.com/show_bug.cgi?id=1227728
- https://bugzilla.suse.com/show_bug.cgi?id=1227729
- https://bugzilla.suse.com/show_bug.cgi?id=1227732
- https://bugzilla.suse.com/show_bug.cgi?id=1227733
- https://bugzilla.suse.com/show_bug.cgi?id=1227734
- https://bugzilla.suse.com/show_bug.cgi?id=1227747
- https://bugzilla.suse.com/show_bug.cgi?id=1227750
- https://bugzilla.suse.com/show_bug.cgi?id=1227754
- https://bugzilla.suse.com/show_bug.cgi?id=1227758
- https://bugzilla.suse.com/show_bug.cgi?id=1227760
- https://bugzilla.suse.com/show_bug.cgi?id=1227761
- https://bugzilla.suse.com/show_bug.cgi?id=1227764
- https://bugzilla.suse.com/show_bug.cgi?id=1227766
- https://bugzilla.suse.com/show_bug.cgi?id=1227770
- https://bugzilla.suse.com/show_bug.cgi?id=1227771
- https://bugzilla.suse.com/show_bug.cgi?id=1227772
- https://bugzilla.suse.com/show_bug.cgi?id=1227774
- https://bugzilla.suse.com/show_bug.cgi?id=1227781
- https://bugzilla.suse.com/show_bug.cgi?id=1227784
- https://bugzilla.suse.com/show_bug.cgi?id=1227785
- https://bugzilla.suse.com/show_bug.cgi?id=1227787
- https://bugzilla.suse.com/show_bug.cgi?id=1227790
- https://bugzilla.suse.com/show_bug.cgi?id=1227791
- https://bugzilla.suse.com/show_bug.cgi?id=1227792
- https://bugzilla.suse.com/show_bug.cgi?id=1227796
- https://bugzilla.suse.com/show_bug.cgi?id=1227798
- https://bugzilla.suse.com/show_bug.cgi?id=1227799
- https://bugzilla.suse.com/show_bug.cgi?id=1227802
- https://bugzilla.suse.com/show_bug.cgi?id=1227808
- https://bugzilla.suse.com/show_bug.cgi?id=1227810
- https://bugzilla.suse.com/show_bug.cgi?id=1227811
- https://bugzilla.suse.com/show_bug.cgi?id=1227812
- https://bugzilla.suse.com/show_bug.cgi?id=1227815
- https://bugzilla.suse.com/show_bug.cgi?id=1227816
- https://bugzilla.suse.com/show_bug.cgi?id=1227818
- https://bugzilla.suse.com/show_bug.cgi?id=1227820
- https://bugzilla.suse.com/show_bug.cgi?id=1227823
- https://bugzilla.suse.com/show_bug.cgi?id=1227824
- https://bugzilla.suse.com/show_bug.cgi?id=1227826
- https://bugzilla.suse.com/show_bug.cgi?id=1227828
- https://bugzilla.suse.com/show_bug.cgi?id=1227829
- https://bugzilla.suse.com/show_bug.cgi?id=1227830
- https://bugzilla.suse.com/show_bug.cgi?id=1227832
- https://bugzilla.suse.com/show_bug.cgi?id=1227833
- https://bugzilla.suse.com/show_bug.cgi?id=1227834
- https://bugzilla.suse.com/show_bug.cgi?id=1227839
- https://bugzilla.suse.com/show_bug.cgi?id=1227840
- https://bugzilla.suse.com/show_bug.cgi?id=1227846
- https://bugzilla.suse.com/show_bug.cgi?id=1227849
- https://bugzilla.suse.com/show_bug.cgi?id=1227851
- https://bugzilla.suse.com/show_bug.cgi?id=1227853
- https://bugzilla.suse.com/show_bug.cgi?id=1227863
- https://bugzilla.suse.com/show_bug.cgi?id=1227864
- https://bugzilla.suse.com/show_bug.cgi?id=1227865
- https://bugzilla.suse.com/show_bug.cgi?id=1227867
- https://bugzilla.suse.com/show_bug.cgi?id=1227869
- https://bugzilla.suse.com/show_bug.cgi?id=1227870
- https://bugzilla.suse.com/show_bug.cgi?id=1227883
- https://bugzilla.suse.com/show_bug.cgi?id=1227884
- https://bugzilla.suse.com/show_bug.cgi?id=1227891
- https://bugzilla.suse.com/show_bug.cgi?id=1227893
- https://bugzilla.suse.com/show_bug.cgi?id=1227929
- https://bugzilla.suse.com/show_bug.cgi?id=1227950
- https://bugzilla.suse.com/show_bug.cgi?id=1227957
- https://bugzilla.suse.com/show_bug.cgi?id=1227981
- https://bugzilla.suse.com/show_bug.cgi?id=1228020
- https://bugzilla.suse.com/show_bug.cgi?id=1228021
- https://bugzilla.suse.com/show_bug.cgi?id=1228114
- https://bugzilla.suse.com/show_bug.cgi?id=1228192
- https://bugzilla.suse.com/show_bug.cgi?id=1228195
- https://bugzilla.suse.com/show_bug.cgi?id=1228202
- https://bugzilla.suse.com/show_bug.cgi?id=1228235
- https://bugzilla.suse.com/show_bug.cgi?id=1228236
- https://bugzilla.suse.com/show_bug.cgi?id=1228237
- https://bugzilla.suse.com/show_bug.cgi?id=1228247
- https://bugzilla.suse.com/show_bug.cgi?id=1228321
- https://bugzilla.suse.com/show_bug.cgi?id=1228409
- https://bugzilla.suse.com/show_bug.cgi?id=1228410
- https://bugzilla.suse.com/show_bug.cgi?id=1228426
- https://bugzilla.suse.com/show_bug.cgi?id=1228427
- https://bugzilla.suse.com/show_bug.cgi?id=1228429
- https://bugzilla.suse.com/show_bug.cgi?id=1228446
- https://bugzilla.suse.com/show_bug.cgi?id=1228447
- https://bugzilla.suse.com/show_bug.cgi?id=1228449
- https://bugzilla.suse.com/show_bug.cgi?id=1228450
- https://bugzilla.suse.com/show_bug.cgi?id=1228452
- https://bugzilla.suse.com/show_bug.cgi?id=1228456
- https://bugzilla.suse.com/show_bug.cgi?id=1228457
- https://bugzilla.suse.com/show_bug.cgi?id=1228458
- https://bugzilla.suse.com/show_bug.cgi?id=1228459
- https://bugzilla.suse.com/show_bug.cgi?id=1228460
- https://bugzilla.suse.com/show_bug.cgi?id=1228462
- https://bugzilla.suse.com/show_bug.cgi?id=1228463
- https://bugzilla.suse.com/show_bug.cgi?id=1228466
- https://bugzilla.suse.com/show_bug.cgi?id=1228467
- https://bugzilla.suse.com/show_bug.cgi?id=1228468
- https://bugzilla.suse.com/show_bug.cgi?id=1228469
- https://bugzilla.suse.com/show_bug.cgi?id=1228470
- https://bugzilla.suse.com/show_bug.cgi?id=1228472
- https://bugzilla.suse.com/show_bug.cgi?id=1228479
- https://bugzilla.suse.com/show_bug.cgi?id=1228480
- https://bugzilla.suse.com/show_bug.cgi?id=1228481
- https://bugzilla.suse.com/show_bug.cgi?id=1228482
- https://bugzilla.suse.com/show_bug.cgi?id=1228483
- https://bugzilla.suse.com/show_bug.cgi?id=1228484
- https://bugzilla.suse.com/show_bug.cgi?id=1228485
- https://bugzilla.suse.com/show_bug.cgi?id=1228486
- https://bugzilla.suse.com/show_bug.cgi?id=1228487
- https://bugzilla.suse.com/show_bug.cgi?id=1228489
- https://bugzilla.suse.com/show_bug.cgi?id=1228491
- https://bugzilla.suse.com/show_bug.cgi?id=1228492
- https://bugzilla.suse.com/show_bug.cgi?id=1228493
- https://bugzilla.suse.com/show_bug.cgi?id=1228494
- https://bugzilla.suse.com/show_bug.cgi?id=1228495
- https://bugzilla.suse.com/show_bug.cgi?id=1228496
- https://bugzilla.suse.com/show_bug.cgi?id=1228499
- https://bugzilla.suse.com/show_bug.cgi?id=1228500
- https://bugzilla.suse.com/show_bug.cgi?id=1228501
- https://bugzilla.suse.com/show_bug.cgi?id=1228502
- https://bugzilla.suse.com/show_bug.cgi?id=1228503
- https://bugzilla.suse.com/show_bug.cgi?id=1228505
- https://bugzilla.suse.com/show_bug.cgi?id=1228508
- https://bugzilla.suse.com/show_bug.cgi?id=1228509
- https://bugzilla.suse.com/show_bug.cgi?id=1228510
- https://bugzilla.suse.com/show_bug.cgi?id=1228511
- https://bugzilla.suse.com/show_bug.cgi?id=1228513
- https://bugzilla.suse.com/show_bug.cgi?id=1228515
- https://bugzilla.suse.com/show_bug.cgi?id=1228516
- https://bugzilla.suse.com/show_bug.cgi?id=1228518
- https://bugzilla.suse.com/show_bug.cgi?id=1228520
- https://bugzilla.suse.com/show_bug.cgi?id=1228525
- https://bugzilla.suse.com/show_bug.cgi?id=1228527
- https://bugzilla.suse.com/show_bug.cgi?id=1228530
- https://bugzilla.suse.com/show_bug.cgi?id=1228531
- https://bugzilla.suse.com/show_bug.cgi?id=1228539
- https://bugzilla.suse.com/show_bug.cgi?id=1228561
- https://bugzilla.suse.com/show_bug.cgi?id=1228563
- https://bugzilla.suse.com/show_bug.cgi?id=1228564
- https://bugzilla.suse.com/show_bug.cgi?id=1228565
- https://bugzilla.suse.com/show_bug.cgi?id=1228567
- https://bugzilla.suse.com/show_bug.cgi?id=1228568
- https://bugzilla.suse.com/show_bug.cgi?id=1228572
- https://bugzilla.suse.com/show_bug.cgi?id=1228576
- https://bugzilla.suse.com/show_bug.cgi?id=1228579
- https://bugzilla.suse.com/show_bug.cgi?id=1228580
- https://bugzilla.suse.com/show_bug.cgi?id=1228581
- https://bugzilla.suse.com/show_bug.cgi?id=1228582
- https://bugzilla.suse.com/show_bug.cgi?id=1228584
- https://bugzilla.suse.com/show_bug.cgi?id=1228586
- https://bugzilla.suse.com/show_bug.cgi?id=1228588
- https://bugzilla.suse.com/show_bug.cgi?id=1228590
- https://bugzilla.suse.com/show_bug.cgi?id=1228591
- https://bugzilla.suse.com/show_bug.cgi?id=1228599
- https://bugzilla.suse.com/show_bug.cgi?id=1228615
- https://bugzilla.suse.com/show_bug.cgi?id=1228616
- https://bugzilla.suse.com/show_bug.cgi?id=1228617
- https://bugzilla.suse.com/show_bug.cgi?id=1228625
- https://bugzilla.suse.com/show_bug.cgi?id=1228626
- https://bugzilla.suse.com/show_bug.cgi?id=1228633
- https://bugzilla.suse.com/show_bug.cgi?id=1228635
- https://bugzilla.suse.com/show_bug.cgi?id=1228636
- https://bugzilla.suse.com/show_bug.cgi?id=1228640
- https://bugzilla.suse.com/show_bug.cgi?id=1228643
- https://bugzilla.suse.com/show_bug.cgi?id=1228644
- https://bugzilla.suse.com/show_bug.cgi?id=1228646
- https://bugzilla.suse.com/show_bug.cgi?id=1228649
- https://bugzilla.suse.com/show_bug.cgi?id=1228650
- https://bugzilla.suse.com/show_bug.cgi?id=1228654
- https://bugzilla.suse.com/show_bug.cgi?id=1228655
- https://bugzilla.suse.com/show_bug.cgi?id=1228656
- https://bugzilla.suse.com/show_bug.cgi?id=1228658
- https://bugzilla.suse.com/show_bug.cgi?id=1228660
- https://bugzilla.suse.com/show_bug.cgi?id=1228662
- https://bugzilla.suse.com/show_bug.cgi?id=1228665
- https://bugzilla.suse.com/show_bug.cgi?id=1228666
- https://bugzilla.suse.com/show_bug.cgi?id=1228667
- https://bugzilla.suse.com/show_bug.cgi?id=1228672
- https://bugzilla.suse.com/show_bug.cgi?id=1228673
- https://bugzilla.suse.com/show_bug.cgi?id=1228674
- https://bugzilla.suse.com/show_bug.cgi?id=1228677
- https://bugzilla.suse.com/show_bug.cgi?id=1228680
- https://bugzilla.suse.com/show_bug.cgi?id=1228687
- https://bugzilla.suse.com/show_bug.cgi?id=1228705
- https://bugzilla.suse.com/show_bug.cgi?id=1228706
- https://bugzilla.suse.com/show_bug.cgi?id=1228707
- https://bugzilla.suse.com/show_bug.cgi?id=1228708
- https://bugzilla.suse.com/show_bug.cgi?id=1228709
- https://bugzilla.suse.com/show_bug.cgi?id=1228710
- https://bugzilla.suse.com/show_bug.cgi?id=1228718
- https://bugzilla.suse.com/show_bug.cgi?id=1228720
- https://bugzilla.suse.com/show_bug.cgi?id=1228721
- https://bugzilla.suse.com/show_bug.cgi?id=1228722
- https://bugzilla.suse.com/show_bug.cgi?id=1228723
- https://bugzilla.suse.com/show_bug.cgi?id=1228724
- https://bugzilla.suse.com/show_bug.cgi?id=1228726
- https://bugzilla.suse.com/show_bug.cgi?id=1228727
- https://bugzilla.suse.com/show_bug.cgi?id=1228733
- https://bugzilla.suse.com/show_bug.cgi?id=1228737
- https://bugzilla.suse.com/show_bug.cgi?id=1228743
- https://bugzilla.suse.com/show_bug.cgi?id=1228748
- https://bugzilla.suse.com/show_bug.cgi?id=1228754
- https://bugzilla.suse.com/show_bug.cgi?id=1228756
- https://bugzilla.suse.com/show_bug.cgi?id=1228757
- https://bugzilla.suse.com/show_bug.cgi?id=1228758
- https://bugzilla.suse.com/show_bug.cgi?id=1228764
- https://bugzilla.suse.com/show_bug.cgi?id=1228766
- https://bugzilla.suse.com/show_bug.cgi?id=1228779
- https://bugzilla.suse.com/show_bug.cgi?id=1228801
- https://bugzilla.suse.com/show_bug.cgi?id=1228849
- https://bugzilla.suse.com/show_bug.cgi?id=1228850
- https://bugzilla.suse.com/show_bug.cgi?id=1228857
- https://bugzilla.suse.com/show_bug.cgi?id=1228959
- https://bugzilla.suse.com/show_bug.cgi?id=1228964
- https://bugzilla.suse.com/show_bug.cgi?id=1228966
- https://bugzilla.suse.com/show_bug.cgi?id=1228967
- https://bugzilla.suse.com/show_bug.cgi?id=1228973
- https://bugzilla.suse.com/show_bug.cgi?id=1228977
- https://bugzilla.suse.com/show_bug.cgi?id=1228978
- https://bugzilla.suse.com/show_bug.cgi?id=1228979
- https://bugzilla.suse.com/show_bug.cgi?id=1228986
- https://bugzilla.suse.com/show_bug.cgi?id=1228988
- https://bugzilla.suse.com/show_bug.cgi?id=1228989
- https://bugzilla.suse.com/show_bug.cgi?id=1228991
- https://bugzilla.suse.com/show_bug.cgi?id=1228992
- https://bugzilla.suse.com/show_bug.cgi?id=1229005
- https://bugzilla.suse.com/show_bug.cgi?id=1229024
- https://bugzilla.suse.com/show_bug.cgi?id=1229042
- https://bugzilla.suse.com/show_bug.cgi?id=1229045
- https://bugzilla.suse.com/show_bug.cgi?id=1229046
- https://bugzilla.suse.com/show_bug.cgi?id=1229054
- https://bugzilla.suse.com/show_bug.cgi?id=1229056
- https://bugzilla.suse.com/show_bug.cgi?id=1229086
- https://bugzilla.suse.com/show_bug.cgi?id=1229134
- https://bugzilla.suse.com/show_bug.cgi?id=1229136
- https://bugzilla.suse.com/show_bug.cgi?id=1229154
- https://bugzilla.suse.com/show_bug.cgi?id=1229156
- https://bugzilla.suse.com/show_bug.cgi?id=1229160
- https://bugzilla.suse.com/show_bug.cgi?id=1229167
- https://bugzilla.suse.com/show_bug.cgi?id=1229168
- https://bugzilla.suse.com/show_bug.cgi?id=1229169
- https://bugzilla.suse.com/show_bug.cgi?id=1229170
- https://bugzilla.suse.com/show_bug.cgi?id=1229171
- https://bugzilla.suse.com/show_bug.cgi?id=1229172
- https://bugzilla.suse.com/show_bug.cgi?id=1229173
- https://bugzilla.suse.com/show_bug.cgi?id=1229174
- https://bugzilla.suse.com/show_bug.cgi?id=1229239
- https://bugzilla.suse.com/show_bug.cgi?id=1229240
- https://bugzilla.suse.com/show_bug.cgi?id=1229241
- https://bugzilla.suse.com/show_bug.cgi?id=1229243
- https://bugzilla.suse.com/show_bug.cgi?id=1229244
- https://bugzilla.suse.com/show_bug.cgi?id=1229245
- https://bugzilla.suse.com/show_bug.cgi?id=1229246
- https://bugzilla.suse.com/show_bug.cgi?id=1229247
- https://bugzilla.suse.com/show_bug.cgi?id=1229248
- https://bugzilla.suse.com/show_bug.cgi?id=1229249
- https://bugzilla.suse.com/show_bug.cgi?id=1229250
- https://bugzilla.suse.com/show_bug.cgi?id=1229251
- https://bugzilla.suse.com/show_bug.cgi?id=1229252
- https://bugzilla.suse.com/show_bug.cgi?id=1229253
- https://bugzilla.suse.com/show_bug.cgi?id=1229254
- https://bugzilla.suse.com/show_bug.cgi?id=1229255
- https://bugzilla.suse.com/show_bug.cgi?id=1229256
- https://bugzilla.suse.com/show_bug.cgi?id=1229287
- https://bugzilla.suse.com/show_bug.cgi?id=1229290
- https://bugzilla.suse.com/show_bug.cgi?id=1229291
- https://bugzilla.suse.com/show_bug.cgi?id=1229292
- https://bugzilla.suse.com/show_bug.cgi?id=1229294
- https://bugzilla.suse.com/show_bug.cgi?id=1229296
- https://bugzilla.suse.com/show_bug.cgi?id=1229297
- https://bugzilla.suse.com/show_bug.cgi?id=1229298
- https://bugzilla.suse.com/show_bug.cgi?id=1229299
- https://bugzilla.suse.com/show_bug.cgi?id=1229301
- https://bugzilla.suse.com/show_bug.cgi?id=1229303
- https://bugzilla.suse.com/show_bug.cgi?id=1229304
- https://bugzilla.suse.com/show_bug.cgi?id=1229305
- https://bugzilla.suse.com/show_bug.cgi?id=1229307
- https://bugzilla.suse.com/show_bug.cgi?id=1229309
- https://bugzilla.suse.com/show_bug.cgi?id=1229312
- https://bugzilla.suse.com/show_bug.cgi?id=1229313
- https://bugzilla.suse.com/show_bug.cgi?id=1229314
- https://bugzilla.suse.com/show_bug.cgi?id=1229315
- https://bugzilla.suse.com/show_bug.cgi?id=1229316
- https://bugzilla.suse.com/show_bug.cgi?id=1229317
- https://bugzilla.suse.com/show_bug.cgi?id=1229318
- https://bugzilla.suse.com/show_bug.cgi?id=1229319
- https://bugzilla.suse.com/show_bug.cgi?id=1229320
- https://bugzilla.suse.com/show_bug.cgi?id=1229327
- https://bugzilla.suse.com/show_bug.cgi?id=1229341
- https://bugzilla.suse.com/show_bug.cgi?id=1229342
- https://bugzilla.suse.com/show_bug.cgi?id=1229344
- https://bugzilla.suse.com/show_bug.cgi?id=1229345
- https://bugzilla.suse.com/show_bug.cgi?id=1229346
- https://bugzilla.suse.com/show_bug.cgi?id=1229347
- https://bugzilla.suse.com/show_bug.cgi?id=1229349
- https://bugzilla.suse.com/show_bug.cgi?id=1229350
- https://bugzilla.suse.com/show_bug.cgi?id=1229351
- https://bugzilla.suse.com/show_bug.cgi?id=1229353
- https://bugzilla.suse.com/show_bug.cgi?id=1229354
- https://bugzilla.suse.com/show_bug.cgi?id=1229355
- https://bugzilla.suse.com/show_bug.cgi?id=1229356
- https://bugzilla.suse.com/show_bug.cgi?id=1229357
- https://bugzilla.suse.com/show_bug.cgi?id=1229358
- https://bugzilla.suse.com/show_bug.cgi?id=1229359
- https://bugzilla.suse.com/show_bug.cgi?id=1229360
- https://bugzilla.suse.com/show_bug.cgi?id=1229365
- https://bugzilla.suse.com/show_bug.cgi?id=1229366
- https://bugzilla.suse.com/show_bug.cgi?id=1229369
- https://bugzilla.suse.com/show_bug.cgi?id=1229370
- https://bugzilla.suse.com/show_bug.cgi?id=1229373
- https://bugzilla.suse.com/show_bug.cgi?id=1229374
- https://bugzilla.suse.com/show_bug.cgi?id=1229379
- https://bugzilla.suse.com/show_bug.cgi?id=1229381
- https://bugzilla.suse.com/show_bug.cgi?id=1229382
- https://bugzilla.suse.com/show_bug.cgi?id=1229383
- https://bugzilla.suse.com/show_bug.cgi?id=1229386
- https://bugzilla.suse.com/show_bug.cgi?id=1229388
- https://bugzilla.suse.com/show_bug.cgi?id=1229390
- https://bugzilla.suse.com/show_bug.cgi?id=1229391
- https://bugzilla.suse.com/show_bug.cgi?id=1229392
- https://bugzilla.suse.com/show_bug.cgi?id=1229395
- https://bugzilla.suse.com/show_bug.cgi?id=1229398
- https://bugzilla.suse.com/show_bug.cgi?id=1229399
- https://bugzilla.suse.com/show_bug.cgi?id=1229400
- https://bugzilla.suse.com/show_bug.cgi?id=1229402
- https://bugzilla.suse.com/show_bug.cgi?id=1229403
- https://bugzilla.suse.com/show_bug.cgi?id=1229404
- https://bugzilla.suse.com/show_bug.cgi?id=1229407
- https://bugzilla.suse.com/show_bug.cgi?id=1229409
- https://bugzilla.suse.com/show_bug.cgi?id=1229410
- https://bugzilla.suse.com/show_bug.cgi?id=1229411
- https://bugzilla.suse.com/show_bug.cgi?id=1229413
- https://bugzilla.suse.com/show_bug.cgi?id=1229414
- https://bugzilla.suse.com/show_bug.cgi?id=1229417
- https://bugzilla.suse.com/show_bug.cgi?id=1229444
- https://bugzilla.suse.com/show_bug.cgi?id=1229451
- https://bugzilla.suse.com/show_bug.cgi?id=1229452
- https://bugzilla.suse.com/show_bug.cgi?id=1229455
- https://bugzilla.suse.com/show_bug.cgi?id=1229456
- https://bugzilla.suse.com/show_bug.cgi?id=1229480
- https://bugzilla.suse.com/show_bug.cgi?id=1229481
- https://bugzilla.suse.com/show_bug.cgi?id=1229482
- https://bugzilla.suse.com/show_bug.cgi?id=1229484
- https://bugzilla.suse.com/show_bug.cgi?id=1229485
- https://bugzilla.suse.com/show_bug.cgi?id=1229486
- https://bugzilla.suse.com/show_bug.cgi?id=1229487
- https://bugzilla.suse.com/show_bug.cgi?id=1229488
- https://bugzilla.suse.com/show_bug.cgi?id=1229489
- https://bugzilla.suse.com/show_bug.cgi?id=1229490
- https://bugzilla.suse.com/show_bug.cgi?id=1229493
- https://bugzilla.suse.com/show_bug.cgi?id=1229495
- https://bugzilla.suse.com/show_bug.cgi?id=1229496
- https://bugzilla.suse.com/show_bug.cgi?id=1229497
- https://bugzilla.suse.com/show_bug.cgi?id=1229500
- https://bugzilla.suse.com/show_bug.cgi?id=1229503
- https://bugzilla.suse.com/show_bug.cgi?id=1229707
- https://bugzilla.suse.com/show_bug.cgi?id=1229739
- https://bugzilla.suse.com/show_bug.cgi?id=1229743
- https://bugzilla.suse.com/show_bug.cgi?id=1229746
- https://bugzilla.suse.com/show_bug.cgi?id=1229747
- https://bugzilla.suse.com/show_bug.cgi?id=1229752
- https://bugzilla.suse.com/show_bug.cgi?id=1229754
- https://bugzilla.suse.com/show_bug.cgi?id=1229755
- https://bugzilla.suse.com/show_bug.cgi?id=1229756
- https://bugzilla.suse.com/show_bug.cgi?id=1229759
- https://bugzilla.suse.com/show_bug.cgi?id=1229761
- https://bugzilla.suse.com/show_bug.cgi?id=1229767
- https://bugzilla.suse.com/show_bug.cgi?id=1229781
- https://bugzilla.suse.com/show_bug.cgi?id=1229784
- https://bugzilla.suse.com/show_bug.cgi?id=1229785
- https://bugzilla.suse.com/show_bug.cgi?id=1229787
- https://bugzilla.suse.com/show_bug.cgi?id=1229788
- https://bugzilla.suse.com/show_bug.cgi?id=1229789
- https://bugzilla.suse.com/show_bug.cgi?id=1229792
- https://bugzilla.suse.com/show_bug.cgi?id=1229820
- https://bugzilla.suse.com/show_bug.cgi?id=1229827
- https://bugzilla.suse.com/show_bug.cgi?id=1229830
- https://bugzilla.suse.com/show_bug.cgi?id=1229837
- https://bugzilla.suse.com/show_bug.cgi?id=1229940
- https://bugzilla.suse.com/show_bug.cgi?id=1230056
- https://jira.suse.com/browse/PED-10029
- https://jira.suse.com/browse/PED-10045
- https://jira.suse.com/browse/PED-10055
- https://jira.suse.com/browse/PED-10105
- https://jira.suse.com/browse/PED-10108
- https://jira.suse.com/browse/PED-8491
- https://jira.suse.com/browse/PED-8779
- https://jira.suse.com/browse/PED-8954