Security update for the Linux Kernel
Announcement ID: | SUSE-SU-2024:4364-1 |
---|---|
Release Date: | 2024-12-17T15:57:52Z |
Rating: | important |
References: |
|
Cross-References: |
|
CVSS scores: |
|
Affected Products: |
|
An update that solves 439 vulnerabilities, contains nine features and has 68 security fixes can now be installed.
Description:
The SUSE Linux Enterprise 15 SP5 kernel was updated to receive various security bugfixes.
The following security bugs were fixed:
- CVE-2021-47594: mptcp: never allow the PM to close a listener subflow (bsc#1226560).
- CVE-2022-48879: efi: fix NULL-deref in init error path (bsc#1229556).
- CVE-2022-48956: ipv6: avoid use-after-free in ip6_fragment() (bsc#1231893).
- CVE-2022-48957: dpaa2-switch: Fix memory leak in dpaa2_switch_acl_entry_add() and dpaa2_switch_acl_entry_remove() (bsc#1231973).
- CVE-2022-48958: ethernet: aeroflex: fix potential skb leak in greth_init_rings() (bsc#1231889).
- CVE-2022-48959: net: dsa: sja1105: fix memory leak in sja1105_setup_devlink_regions() (bsc#1231976).
- CVE-2022-48960: net: hisilicon: Fix potential use-after-free in hix5hd2_rx() (bsc#1231979).
- CVE-2022-48962: net: hisilicon: Fix potential use-after-free in hisi_femac_rx() (bsc#1232286).
- CVE-2022-48966: net: mvneta: Fix an out of bounds check (bsc#1232191).
- CVE-2022-48980: net: dsa: sja1105: avoid out of bounds access in sja1105_init_l2_policing() (bsc#1232233).
- CVE-2022-48983: io_uring: Fix a null-ptr-deref in io_tctx_exit_cb() (bsc#1231959).
- CVE-2022-48991: mm/khugepaged: fix collapse_pte_mapped_thp() to allow anon_vma (bsc#1232070).
- CVE-2022-49015: net: hsr: Fix potential use-after-free (bsc#1231938).
- CVE-2022-49017: tipc: re-fetch skb cb after tipc_msg_validate (bsc#1232004).
- CVE-2022-49020: net/9p: Fix a potential socket leak in p9_socket_open (bsc#1232175).
- CVE-2024-26782: mptcp: fix double-free on socket dismantle (bsc#1222590).
- CVE-2024-26906: Fixed invalid vsyscall page read for copy_from_kernel_nofault() (bsc#1223202).
- CVE-2024-26953: net: esp: fix bad handling of pages from page_pool (bsc#1223656).
- CVE-2024-35888: erspan: make sure erspan_base_hdr is present in skb->head (bsc#1224518).
- CVE-2024-35937: wifi: cfg80211: check A-MSDU format more carefully (bsc#1224526).
- CVE-2024-36244: net/sched: taprio: extend minimum interval restriction to entire cycle too (bsc#1226797).
- CVE-2024-36883: net: fix out-of-bounds access in ops_init (bsc#1225725).
- CVE-2024-36886: tipc: fix UAF in error path (bsc#1225730).
- CVE-2024-36905: tcp: defer shutdown(SEND_SHUTDOWN) for TCP_SYN_RECV sockets (bsc#1225742).
- CVE-2024-36954: tipc: fix a possible memleak in tipc_buf_append (bsc#1225764).
- CVE-2024-36957: octeontx2-af: avoid off-by-one read from userspace (bsc#1225762).
- CVE-2024-38589: netrom: fix possible dead-lock in nr_rt_ioctl() (bsc#1226748).
- CVE-2024-38615: cpufreq: exit() callback is optional (bsc#1226592).
- CVE-2024-39476: md/raid5: fix deadlock that raid5d() wait for itself to clear MD_SB_CHANGE_PENDING (bsc#1227437).
- CVE-2024-40965: i2c: lpi2c: Avoid calling clk_get_rate during transfer (bsc#1227885).
- CVE-2024-40997: cpufreq: amd-pstate: fix memory leak on CPU EPP exit (bsc#1227853).
- CVE-2024-41023: sched/deadline: Fix task_struct reference leak (bsc#1228430).
- CVE-2024-42226: Prevent potential failure in handle_tx_event() for Transfer events without TRB (bsc#1228709).
- CVE-2024-42253: gpio: pca953x: fix pca953x_irq_bus_sync_unlock race (bsc#1229005).
- CVE-2024-44931: gpio: prevent potential speculation leaks in gpio_device_get_desc() (bsc#1229837).
- CVE-2024-44932: idpf: fix UAFs when destroying the queues (bsc#1229808).
- CVE-2024-44958: sched/smt: Fix unbalance sched_smt_present dec/inc (bsc#1230179).
- CVE-2024-44964: idpf: fix memory leaks and crashes while performing a soft reset (bsc#1230220).
- CVE-2024-44995: net: hns3: fix a deadlock problem when config TC during resetting (bsc#1230231).
- CVE-2024-45016: netem: fix return value if duplicate enqueue fails (bsc#1230429).
- CVE-2024-45025: fix bitmap corruption on close_range() with CLOSE_RANGE_UNSHARE (bsc#1230456).
- CVE-2024-46678: bonding: change ipsec_lock from spin lock to mutex (bsc#1230550).
- CVE-2024-46681: pktgen: use cpus_read_lock() in pg_net_init() (bsc#1230558).
- CVE-2024-46716: dmaengine: altera-msgdma: properly free descriptor in msgdma_free_descriptor (bsc#1230715).
- CVE-2024-46754: bpf: Remove tst_run from lwt_seg6local_prog_ops (bsc#1230801).
- CVE-2024-46770: ice: Add netif_device_attach/detach into PF reset flow (bsc#1230763).
- CVE-2024-46775: drm/amd/display: Validate function returns (bsc#1230774).
- CVE-2024-46777: udf: Avoid excessive partition lengths (bsc#1230773).
- CVE-2024-46800: sch/netem: fix use after free in netem_dequeue (bsc#1230827).
- CVE-2024-46809: drm/amd/display: Check BIOS images before it is used (bsc#1231148).
- CVE-2024-46811: drm/amd/display: Fix index may exceed array range within fpu_update_bw_bounding_box (bsc#1231179).
- CVE-2024-46813: drm/amd/display: Check link_index before accessing dc->links (bsc#1231191).
- CVE-2024-46814: drm/amd/display: Check msg_id before processing transcation (bsc#1231193).
- CVE-2024-46815: drm/amd/display: Check num_valid_sets before accessing reader_wm_sets (bsc#1231195).
- CVE-2024-46816: drm/amd/display: Stop amdgpu_dm initialize when link nums greater than max_links (bsc#1231197).
- CVE-2024-46817: drm/amd/display: Stop amdgpu_dm initialize when stream nums greater than 6 (bsc#1231200).
- CVE-2024-46818: drm/amd/display: Check gpio_id before used as array index (bsc#1231203).
- CVE-2024-46826: ELF: fix kernel.randomize_va_space double read (bsc#1231115).
- CVE-2024-46828: uprobes: fix kernel info leak via "[uprobes]" vma (bsc#1231114).
- CVE-2024-46834: ethtool: fail closed if we can't get max channel used in indirection tables (bsc#1231096).
- CVE-2024-46840: btrfs: clean up our handling of refs == 0 in snapshot delete (bsc#1231105).
- CVE-2024-46841: btrfs: do not BUG_ON on ENOMEM from btrfs_lookup_extent_info() in walk_down_proc() (bsc#1231094).
- CVE-2024-46848: perf/x86/intel: Limit the period on Haswell (bsc#1231072).
- CVE-2024-46849: ASoC: meson: axg-card: fix 'use-after-free' (bsc#1231073).
- CVE-2024-46854: net: dpaa: Pad packets to ETH_ZLEN (bsc#1231084).
- CVE-2024-46855: netfilter: nft_socket: fix sk refcount leaks (bsc#1231085).
- CVE-2024-46857: net/mlx5: Fix bridge mode operations when there are no VFs (bsc#1231087).
- CVE-2024-47660: fsnotify: clear PARENT_WATCHED flags lazily (bsc#1231439).
- CVE-2024-47661: drm/amd/display: Avoid overflow from uint32_t to uint8_t (bsc#1231496).
- CVE-2024-47664: spi: hisi-kunpeng: Add verification for the max_frequency provided by the firmware (bsc#1231442).
- CVE-2024-47668: lib/generic-radix-tree.c: Fix rare race in __genradix_ptr_alloc() (bsc#1231502).
- CVE-2024-47672: wifi: iwlwifi: mvm: do not wait for tx queues if firmware is dead (bsc#1231540).
- CVE-2024-47673: wifi: iwlwifi: mvm: pause TCM when the firmware is stopped (bsc#1231539).
- CVE-2024-47674: mm: avoid leaving partial pfn mappings around in error case (bsc#1231673).
- CVE-2024-47679: vfs: fix race between evice_inodes() and find_inode()&iput() (bsc#1231930).
- CVE-2024-47684: tcp: check skb is non-NULL in tcp_rto_delta_us() (bsc#1231987).
- CVE-2024-47685: netfilter: nf_reject_ipv6: fix nf_reject_ip6_tcphdr_put() (bsc#1231998).
- CVE-2024-47692: nfsd: return -EINVAL when namelen is 0 (bsc#1231857).
- CVE-2024-47701: ext4: explicitly exit when ext4_find_inline_entry returns an error (bsc#1231920).
- CVE-2024-47704: drm/amd/display: Check link_res->hpo_dp_link_enc before using it (bsc#1231944).
- CVE-2024-47705: block: fix potential invalid pointer dereference in blk_add_partition (bsc#1231872).
- CVE-2024-47706: block, bfq: fix possible UAF for bfqq->bic with merge chain (bsc#1231942).
- CVE-2024-47707: ipv6: avoid possible NULL deref in rt6_uncached_list_flush_dev() (bsc#1231935).
- CVE-2024-47710: sock_map: Add a cond_resched() in sock_hash_free() (bsc#1232049).
- CVE-2024-47720: drm/amd/display: Add null check for set_output_gamma in dcn30_set_output_transfer_func (bsc#1232043).
- CVE-2024-47727: x86/tdx: Fix "in-kernel MMIO" check (bsc#1232116).
- CVE-2024-47730: crypto: hisilicon/qm - inject error before stopping queue (bsc#1232075).
- CVE-2024-47738: wifi: mac80211: do not use rate mask for offchannel TX either (bsc#1232114).
- CVE-2024-47739: padata: use integer wrap around to prevent deadlock on seq_nr overflow (bsc#1232124).
- CVE-2024-47745: mm: split critical region in remap_file_pages() and invoke LSMs in between (bsc#1232135).
- CVE-2024-47747: net: seeq: Fix use after free vulnerability in ether3 Driver Due to Race Condition (bsc#1232145).
- CVE-2024-47748: vhost_vdpa: assign irq bypass producer token correctly (bsc#1232174).
- CVE-2024-47757: nilfs2: fix potential oob read in nilfs_btree_check_delete() (bsc#1232187).
- CVE-2024-49858: efistub/tpm: Use ACPI reclaim memory for event log to avoid corruption (bsc#1232251).
- CVE-2024-49860: ACPI: sysfs: validate return type of _STR method (bsc#1231861).
- CVE-2024-49866: tracing/timerlat: Fix a race during cpuhp processing (bsc#1232259).
- CVE-2024-49868: btrfs: fix a NULL pointer dereference when failed to start a new trasacntion (bsc#1232272).
- CVE-2024-49881: ext4: update orig_path in ext4_find_extent() (bsc#1232201).
- CVE-2024-49882: ext4: fix double brelse() the buffer of the extents path (bsc#1232200).
- CVE-2024-49883: ext4: aovid use-after-free in ext4_ext_insert_extent() (bsc#1232199).
- CVE-2024-49886: platform/x86: ISST: Fix the KASAN report slab-out-of-bounds bug (bsc#1232196).
- CVE-2024-49890: drm/amd/pm: ensure the fw_info is not null before using it (bsc#1232217).
- CVE-2024-49892: drm/amd/display: Initialize get_bytes_per_element's default to 1 (bsc#1232220).
- CVE-2024-49896: drm/amd/display: Check stream before comparing them (bsc#1232221).
- CVE-2024-49897: drm/amd/display: Check phantom_stream before it is used (bsc#1232355).
- CVE-2024-49899: drm/amd/display: Initialize denominators' default to 1 (bsc#1232358).
- CVE-2024-49901: drm/msm/adreno: Assign msm_gpu->pdev earlier to avoid nullptrs (bsc#1232305).
- CVE-2024-49906: drm/amd/display: Check null pointer before try to access it (bsc#1232332).
- CVE-2024-49909: drm/amd/display: Add NULL check for function pointer in dcn32_set_output_transfer_func (bsc#1232337).
- CVE-2024-49911: drm/amd/display: Add NULL check for function pointer in dcn20_set_output_transfer_func (bsc#1232366).
- CVE-2024-49914: drm/amd/display: Add null check for pipe_ctx->plane_state in (bsc#1232369).
- CVE-2024-49917: drm/amd/display: Add NULL check for clk_mgr and clk_mgr->funcs in dcn30_init_hw (bsc#1231965).
- CVE-2024-49918: drm/amd/display: Add null check for head_pipe in dcn32_acquire_idle_pipe_for_head_pipe_in_layer (bsc#1231967).
- CVE-2024-49919: drm/amd/display: Add null check for head_pipe in dcn201_acquire_free_pipe_for_layer (bsc#1231968).
- CVE-2024-49920: drm/amd/display: Check null pointers before multiple uses (bsc#1232313).
- CVE-2024-49921: drm/amd/display: Check null pointers before used (bsc#1232371).
- CVE-2024-49922: drm/amd/display: Check null pointers before using them (bsc#1232374).
- CVE-2024-49923: drm/amd/display: Pass non-null to dcn20_validate_apply_pipe_split_flags (bsc#1232361).
- CVE-2024-49925: fbdev: efifb: Register sysfs groups through driver core (bsc#1232224)
- CVE-2024-49929: wifi: iwlwifi: mvm: avoid NULL pointer dereference (bsc#1232253).
- CVE-2024-49930: wifi: ath11k: fix array out-of-bound access in SoC stats (bsc#1232260).
- CVE-2024-49933: blk_iocost: fix more out of bound shifts (bsc#1232368).
- CVE-2024-49934: fs/inode: Prevent dump_mapping() accessing invalid dentry.d_name.name (bsc#1232387).
- CVE-2024-49936: net/xen-netback: prevent UAF in xenvif_flush_hash() (bsc#1232424).
- CVE-2024-49939: wifi: rtw89: avoid to add interface to list twice when SER (bsc#1232381).
- CVE-2024-49945: net/ncsi: Disable the ncsi work before freeing the associated structure (bsc#1232165).
- CVE-2024-49946: ppp: do not assume bh is held in ppp_channel_bridge_input() (bsc#1232164).
- CVE-2024-49949: net: avoid potential underflow in qdisc_pkt_len_init() with UFO (bsc#1232160).
- CVE-2024-49950: Bluetooth: L2CAP: Fix uaf in l2cap_connect (bsc#1232159).
- CVE-2024-49954: static_call: Replace pointless WARN_ON() in static_call_module_notify() (bsc#1232155).
- CVE-2024-49955: ACPI: battery: Fix possible crash when unregistering a battery hook (bsc#1232154).
- CVE-2024-49958: ocfs2: reserve space for inline xattr before attaching reflink tree (bsc#1232151).
- CVE-2024-49959: jbd2: stop waiting for space when jbd2_cleanup_journal_tail() returns error (bsc#1232149).
- CVE-2024-49960: ext4: fix timer use-after-free on failed mount (bsc#1232395).
- CVE-2024-49967: ext4: no need to continue when the number of entries is 1 (bsc#1232140).
- CVE-2024-49968: ext4: fix error message when rejecting the default hash (bsc#1232264).
- CVE-2024-49969: drm/amd/display: Fix index out of bounds in DCN30 color transformation (bsc#1232519).
- CVE-2024-49973: r8169: add tally counter fields added with RTL8125 (bsc#1232105).
- CVE-2024-49974: NFSD: Force all NFSv4.2 COPY requests to be synchronous (bsc#1232383).
- CVE-2024-49975: uprobes: fix kernel info leak via "[uprobes]" vma (bsc#1232104).
- CVE-2024-49983: ext4: drop ppath from ext4_ext_replay_update_ex() to avoid double-free (bsc#1232096).
- CVE-2024-49989: drm/amd/display: fix double free issue during amdgpu module unload (bsc#1232483).
- CVE-2024-49991: drm/amdkfd: amdkfd_free_gtt_mem clear the correct pointer (bsc#1232282).
- CVE-2024-49993: iommu/vt-d: Fix potential lockup if qi_submit_sync called with 0 count (bsc#1232316).
- CVE-2024-49995: tipc: guard against string buffer overrun (bsc#1232432).
- CVE-2024-49996: cifs: Fix buffer overflow when parsing NFS reparse points (bsc#1232089).
- CVE-2024-50000: net/mlx5e: Fix NULL deref in mlx5e_tir_builder_alloc() (bsc#1232085).
- CVE-2024-50001: net/mlx5: Fix error path in multi-packet WQE transmit (bsc#1232084).
- CVE-2024-50002: static_call: Handle module init failure correctly in static_call_del_module() (bsc#1232083).
- CVE-2024-50006: ext4: fix i_data_sem unlock order in ext4_ind_migrate() (bsc#1232442).
- CVE-2024-50009: cpufreq: amd-pstate: add check for cpufreq_cpu_get's return value (bsc#1232318).
- CVE-2024-50014: ext4: fix access to uninitialised lock in fc replay path (bsc#1232446).
- CVE-2024-50019: kthread: unpark only parked kthread (bsc#1231990).
- CVE-2024-50024: net: Fix an unsafe loop on the list (bsc#1231954).
- CVE-2024-50028: thermal: core: Reference count the zone in thermal_zone_get_by_id() (bsc#1231950).
- CVE-2024-50033: slip: make slhc_remember() more robust against malicious packets (bsc#1231914).
- CVE-2024-50035: ppp: fix ppp_async_encode() illegal access (bsc#1232392).
- CVE-2024-50041: i40e: Fix macvlan leak by synchronizing access to mac_filter_hash (bsc#1231907).
- CVE-2024-50045: netfilter: br_netfilter: fix panic with metadata_dst skb (bsc#1231903).
- CVE-2024-50046: kabi fix for NFSv4: Prevent NULL-pointer dereference in nfs42_complete_copies() (bsc#1231902).
- CVE-2024-50047: smb: client: fix UAF in async decryption (bsc#1232418).
- CVE-2024-50048: fbcon: Fix a NULL pointer dereference issue in fbcon_putcs (bsc#1232310).
- CVE-2024-50055: driver core: bus: Fix double free in driver API bus_register() (bsc#1232329).
- CVE-2024-50058: serial: protect uart_port_dtr_rts() in uart_shutdown() too (bsc#1232285).
- CVE-2024-50059: ntb: ntb_hw_switchtec: Fix use after free vulnerability in switchtec_ntb_remove due to race condition (bsc#1232345).
- CVE-2024-50061: i3c: master: cdns: Fix use after free vulnerability in cdns_i3c_master Driver Due to Race Condition (bsc#1232263).
- CVE-2024-50063: kABI: bpf: struct bpf_map kABI workaround (bsc#1232435).
- CVE-2024-50073: tty: n_gsm: Fix use-after-free in gsm_cleanup_mux (bsc#1232520).
- CVE-2024-50081: blk-mq: setup queue ->tag_set before initializing hctx (bsc#1232501).
- CVE-2024-50082: blk-rq-qos: fix crash on rq_qos_wait vs. rq_qos_wake_function race (bsc#1232500).
- CVE-2024-50089: unicode: Do not special case ignorable code points (bsc#1232860).
- CVE-2024-50093: thermal: intel: int340x: processor: Fix warning during module unload (bsc#1232877).
- CVE-2024-50098: scsi: ufs: core: Set SDEV_OFFLINE when UFS is shut down (bsc#1232881).
- CVE-2024-50108: drm/amd/display: Disable PSR-SU on Parade 08-01 TCON too (bsc#1232884).
- CVE-2024-50110: xfrm: fix one more kernel-infoleak in algo dumping (bsc#1232885).
- CVE-2024-50115: KVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from memory (bsc#1232919).
- CVE-2024-50125: Bluetooth: SCO: Fix UAF on sco_sock_timeout (bsc#1232928).
- CVE-2024-50127: net: sched: fix use-after-free in taprio_change() (bsc#1232907).
- CVE-2024-50128: net: wwan: fix global oob in wwan_rtnl_policy (bsc#1232905).
- CVE-2024-50134: drm/vboxvideo: Replace fake VLA at end of vbva_mouse_pointer_shape (bsc#1232890).
- CVE-2024-50135: nvme-pci: fix race condition between reset and nvme_dev_disable() (bsc#1232888).
- CVE-2024-50138: bpf: Use raw_spinlock_t in ringbuf (bsc#1232935).
- CVE-2024-50146: net/mlx5e: Do not call cleanup on profile rollback failure (bsc#1233056).
- CVE-2024-50147: net/mlx5: Fix command bitmask initialization (bsc#1233067).
- CVE-2024-50153: scsi: target: core: Fix null-ptr-deref in target_alloc_device() (bsc#1233061).
- CVE-2024-50154: tcp: Fix use-after-free of nreq in reqsk_timer_handler() (bsc#1233070).
- CVE-2024-50167: be2net: fix potential memory leak in be_xmit() (bsc#1233049).
- CVE-2024-50171: net: systemport: fix potential memory leak in bcm_sysport_xmit() (bsc#1233057).
- CVE-2024-50182: secretmem: disable memfd_secret() if arch cannot set direct map (bsc#1233129).
- CVE-2024-50184: virtio_pmem: Check device status before requesting flush (bsc#1233135).
- CVE-2024-50186: net: explicitly clear the sk pointer, when pf->create fails (bsc#1233110).
- CVE-2024-50188: net: phy: dp83869: fix memory corruption when enabling fiber (bsc#1233107).
- CVE-2024-50192: irqchip/gic-v4: Correctly deal with set_affinity on lazily-mapped VPEs (bsc#1233106).
- CVE-2024-50195: posix-clock: posix-clock: Fix unbalanced locking in pc_clock_settime() (bsc#1233103).
- CVE-2024-50196: pinctrl: ocelot: fix system hang on level based interrupts (bsc#1233113).
- CVE-2024-50205: ALSA: firewire-lib: Avoid division by zero in apply_constraint_to_size() (bsc#1233293).
- CVE-2024-50208: RDMA/bnxt_re: Fix a bug while setting up Level-2 PBL pages (bsc#1233117).
- CVE-2024-50229: nilfs2: fix potential deadlock with newly created symlinks (bsc#1233205).
- CVE-2024-50230: nilfs2: fix kernel bug due to missing clearing of checked flag (bsc#1233206).
- CVE-2024-50259: netdevsim: Add trailing zero to terminate the string in nsim_nexthop_bucket_activity_write() (bsc#1233214).
- CVE-2024-50261: macsec: Fix use-after-free while sending the offloading packet (bsc#1233253).
- CVE-2024-50264: vsock/virtio: Initialization of the dangling pointer occurring in vsk->trans (bsc#1233453).
- CVE-2024-50267: usb: serial: io_edgeport: fix use after free in debug printk (bsc#1233456).
- CVE-2024-50271: signal: restore the override_rlimit logic (bsc#1233460).
- CVE-2024-50273: btrfs: reinitialize delayed ref list after deleting it from the list (bsc#1233462).
- CVE-2024-50274: idpf: avoid vport access in idpf_get_link_ksettings (bsc#1233463).
- CVE-2024-50279: dm cache: fix out-of-bounds access to the dirty bitset when resizing (bsc#1233468).
- CVE-2024-50289: media: av7110: fix a spectre vulnerability (bsc#1233478).
- CVE-2024-50295: net: arc: fix the device for dma_map_single/dma_unmap_single (bsc#1233484).
- CVE-2024-50298: net: enetc: allocate vf_state during PF probes (bsc#1233487).
- CVE-2024-53052: io_uring/rw: fix missing NOWAIT check for O_DIRECT start write (bsc#1233548).
- CVE-2024-53058: net: stmmac: TSO: Fix unbalanced DMA map/unmap for non-paged SKB data (bsc#1233552).
- CVE-2024-53061: media: s5p-jpeg: prevent buffer overflows (bsc#1233555).
- CVE-2024-53063: media: dvbdev: prevent the risk of out of memory access (bsc#1233557).
- CVE-2024-53068: firmware: arm_scmi: Fix slab-use-after-free in scmi_bus_notifier() (bsc#1233561).
- CVE-2024-53079: mm/thp: fix deferred split unqueue naming and locking (bsc#1233570).
- CVE-2024-53088: i40e: fix race condition by adding filter's intermediate sync state (bsc#1233580).
- CVE-2024-53104: media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format (bsc#1234025).
- CVE-2024-53110: vp_vdpa: fix id_table array not null terminated error (bsc#1234085).
The following non-security bugs were fixed:
- acpi: battery: Call power_supply_changed() when adding hooks (bsc#1232154)
- acpi: battery: Simplify battery hook locking (bsc#1232154)
- acpi: button: Add DMI quirk for Samsung Galaxy Book2 to fix initial lid detection issue (stable-fixes).
- acpi: CPPC: Fix _CPC register setting issue (git-fixes).
- acpi: CPPC: Make rmw_lock a raw_spin_lock (git-fixes).
- acpi: EC: Do not release locks during operation region accesses (stable-fixes).
- acpi: PAD: fix crash in exit_round_robin() (stable-fixes).
- acpi: PRM: Clean up guid type in struct prm_handler_info (git-fixes).
- acpi: PRM: Find EFI_MEMORY_RUNTIME block for PRM handler and context (git-fixes).
- acpi: resource: Add another DMI match for the TongFang GMxXGxx (stable-fixes).
- acpi: resource: Add Asus ExpertBook B2502CVA to irq1_level_low_skip_override[] (stable-fixes).
- acpi: resource: Add Asus Vivobook X1704VAP to irq1_level_low_skip_override[] (stable-fixes).
- acpi: resource: Add LG 16T90SP to irq1_level_low_skip_override[] (stable-fixes).
- acpica: check null return of ACPI_ALLOCATE_ZEROED() in acpi_db_convert_to_package() (stable-fixes).
- acpica: Fix memory leak if acpi_ps_get_next_field() fails (stable-fixes).
- acpica: Fix memory leak if acpi_ps_get_next_namepath() fails (stable-fixes).
- acpica: iasl: handle empty connection_node (stable-fixes).
- ad7780: fix division by zero in ad7780_write_raw() (git-fixes).
- adapt same struct naming as similar kABI workaround in SLE15-SP6 (prefixed with "suse_" to make it more obvious its a downstream thing.
- add bug reference for a mana change (bsc#1229769).
- add bug references to existing mana changes (bsc#1232033, bsc#1232034, bsc#1232036).
- add bugreference to a hv_netvsc patch (bsc#1232413).
- afs: Revert "afs: Hide silly-rename files from userspace" (git-fixes).
- alsa: 6fire: Release resources at card release (git-fixes).
- alsa: ac97: bus: Fix the mistake in the comment (git-fixes).
- alsa: asihpi: Fix potential OOB array access (stable-fixes).
- alsa: caiaq: Use snd_card_free_when_closed() at disconnection (git-fixes).
- alsa: core: add isascii() check to card ID generator (stable-fixes).
- alsa: firewire-lib: Avoid division by zero in apply_constraint_to_size() (git-fixes).
- alsa: firewire-lib: fix return value on fail in amdtp_tscm_init() (git-fixes).
- alsa: hda: cs35l41: fix module autoloading (git-fixes).
- alsa: hda: Fix kctl->id initialization (git-fixes).
- alsa: hda/conexant - Fix audio routing for HP EliteOne 1000 G2 (stable-fixes).
- alsa: hda/conexant - Use cached pin control for Node 0x1d on HP EliteOne 1000 G2 (git-fixes).
- alsa: hda/conexant: Fix conflicting quirk for System76 Pangolin (git-fixes).
- alsa: hda/cs8409: Fix possible NULL dereference (git-fixes).
- alsa: hda/generic: Unconditionally prefer preferred_dacs pairs (git-fixes).
- alsa: hda/realtek - Fixed ALC256 headphone no sound (stable-fixes).
- alsa: hda/realtek - FIxed ALC285 headphone no sound (stable-fixes).
- alsa: hda/realtek - Fixed Clevo platform headset Mic issue (stable-fixes).
- alsa: hda/realtek: Add a quirk for HP Pavilion 15z-ec200 (stable-fixes).
- alsa: hda/realtek: Add quirk for Huawei MateBook 13 KLV-WX9 (stable-fixes).
- alsa: hda/realtek: Add subwoofer quirk for Acer Predator G9-593 (stable-fixes).
- alsa: hda/realtek: Fix headset mic on TUXEDO Gemini 17 Gen3 (stable-fixes).
- alsa: hda/realtek: Fix headset mic on TUXEDO Stellaris 16 Gen6 mb1 (stable-fixes).
- alsa: hda/realtek: fix mute/micmute LEDs for a HP EliteBook 645 G10 (stable-fixes).
- alsa: hda/realtek: Fix the push button function for the ALC257 (git-fixes).
- alsa: hda/realtek: Limit internal Mic boost on Dell platform (stable-fixes).
- alsa: hda/realtek: Update ALC225 depop procedure (git-fixes).
- alsa: hda/realtek: Update ALC256 depop procedure (git-fixes).
- alsa: hda/realtek: Update default depop procedure (git-fixes).
- alsa: hdsp: Break infinite MIDI input flush loop (stable-fixes).
- alsa: line6: add hw monitor volume control to POD HD500X (stable-fixes).
- alsa: mixer_oss: Remove some incorrect kfree_const() usages (git-fixes).
- alsa: us122l: Use snd_card_free_when_closed() at disconnection (git-fixes).
- alsa: usb-audio: Add delay quirk for VIVO USB-C HEADSET (stable-fixes).
- alsa: usb-audio: Add input value sanity checks for standard types (stable-fixes).
- alsa: usb-audio: Add logitech Audio profile quirk (stable-fixes).
- alsa: usb-audio: Add native DSD support for Luxman D-08u (stable-fixes).
- alsa: usb-audio: Add quirk for HP 320 FHD Webcam (stable-fixes).
- alsa: usb-audio: Add quirks for Dell WD19 dock (stable-fixes).
- alsa: usb-audio: Define macros for quirk table entries (stable-fixes).
- alsa: usb-audio: Replace complex quirk lines with macros (stable-fixes).
- alsa: usx2y: Use snd_card_free_when_closed() at disconnection (git-fixes).
- amd-pstate: Set min_perf to nominal_perf for active mode performance gov (git-fixes).
- arm64: cputype: Add Neoverse-N3 definitions (git-fixes)
- arm64: dts: imx8mp: correct sdhc ipg clk (git-fixes).
- arm64: dts: rockchip: override BIOS_DISABLE signal via GPIO hog on RK3399 Puma (git-fixes).
- arm64: errata: Expand speculative SSBS workaround once more (git-fixes)
- arm64: esr: Define ESR_ELx_EC_* constants as UL (git-fixes)
- arm64: fix .data.rel.ro size assertion when CONFIG_LTO_CLANG (git-fixes)
- arm64: Force position-independent veneers (git-fixes).
- arm64: probes: Fix simulate_ldr*_literal() (git-fixes)
- arm64: probes: Fix uprobes for big-endian kernels (git-fixes)
- arm64: probes: Remove broken LDR (literal) uprobe support (git-fixes)
- arm64: smccc: Remove broken support for SMCCCv1.3 SVE discard hint (git-fixes)
- arm64: smccc: replace custom COUNT_ARGS() & CONCATENATE() (git-fixes)
- arm64: tls: Fix context-switching of tpidrro_el0 when kpti is enabled (git-fixes)
- arm64:uprobe fix the uprobe SWBP_INSN in big-endian (git-fixes)
- arm64/sve: Discard stale CPU state when handling SVE traps (git-fixes)
- asoc: allow module autoloading for table db1200_pids (stable-fixes).
- asoc: amd: yc: Fix for enabling DMIC on acp6x via _DSD entry (git-fixes).
- asoc: codecs: Fix atomicity violation in snd_soc_component_get_drvdata() (git-fixes).
- asoc: codecs: lpass-rx-macro: add missing CDC_RX_BCL_VBAT_RF_PROC2 to default regs values (stable-fixes).
- asoc: cs42l51: Fix some error handling paths in cs42l51_probe() (git-fixes).
- asoc: fsl_sai: Enable 'FIFO continue on error' FCONT bit (stable-fixes).
- asoc: imx-card: Set card.owner to avoid a warning calltrace if SND=m (git-fixes).
- asoc: intel: fix module autoloading (stable-fixes).
- asoc: qcom: Fix NULL Dereference in asoc_qcom_lpass_cpu_platform_probe() (git-fixes).
- asoc: qcom: sm8250: add qrb4210-rb2-sndcard compatible string (stable-fixes).
- asoc: rt5682: Return devm_of_clk_add_hw_provider to transfer the error (git-fixes).
- asoc: soc-pcm: Do not zero TDM masks in __soc_pcm_open() (git-fixes).
- asoc: stm32: spdifrx: fix dma channel release in stm32_spdifrx_remove (git-fixes).
- asoc: tda7419: fix module autoloading (stable-fixes).
- blk-throttle: Fix io statistics for cgroup v1 (bsc#1233528).
- block: Avoid leaking hctx->nr_active counter on batched completion (bsc#1231923).
- block: print symbolic error name instead of error code (bsc#1231872).
- bluetooth: bnep: fix wild-memory-access in proto_unregister (git-fixes).
- bluetooth: btmrvl: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
- bluetooth: btusb: Fix regression with fake CSR controllers 0a12:0001 (git-fixes).
- bluetooth: Call iso_exit() on module unload (git-fixes).
- bluetooth: hci_event: Align BR/EDR JUST_WORKS paring with LE (git-fixes).
- bluetooth: hci: fix null-ptr-deref in hci_read_supported_codecs (git-fixes).
- bluetooth: ISO: Fix multiple init when debugfs is disabled (git-fixes).
- bluetooth: MGMT: Fix slab-use-after-free Read in set_powered_sync (git-fixes).
- bluetooth: Remove debugfs directory on module init failure (git-fixes).
- bluetooth: RFCOMM: FIX possible deadlock in rfcomm_sk_state_change (git-fixes).
- bnxt_en: Fix the PCI-AER routines (git-fixes).
- bnxt_en: refactor reset close code (git-fixes).
- bnxt_en: Remove mis-applied code from bnxt_cfg_ntp_filters() (git-fixes).
- bnxt_en: Reserve rings after PCIe AER recovery if NIC interface is down (git-fixes).
- bnxt_en: Reset PTP tx_avail after possible firmware reset (git-fixes).
- bnxt_en: Restore PTP tx_avail count in case of skb_pad() error (git-fixes).
- bnxt_en: Wait for FLR to complete during probe (git-fixes).
- bpf, lsm: Add disabled BPF LSM hook list (git-fixes).
- bpf, net: Fix a potential race in do_sock_getsockopt() (git-fixes).
- bpf, verifier: Correct tail_call_reachable for bpf prog (git-fixes).
- bpf, x64: Remove tail call detection (git-fixes).
- bpf,perf: Fix perf_event_detach_bpf_prog error handling (git-fixes).
- bpf: Add --skip_encoding_btf_inconsistent_proto, --btf_gen_optimized to pahole flags for v1.25 (bsc#1230414 bsc#1229450).
- bpf: Allow helpers to accept pointers with a fixed size (git-fixes).
- bpf: Check for helper calls in check_subprogs() (git-fixes).
- bpf: correctly handle malformed BPF_CORE_TYPE_ID_LOCAL relos (git-fixes).
- bpf: Fix bpf_strtol and bpf_strtoul helpers for 32bit (git-fixes).
- bpf: Fix helper writes to read-only maps (git-fixes).
- bpf: Fix pointer-leak due to insufficient speculative store bypass mitigation (bsc#1231375).
- bpf: Fix tailcall cases in test_bpf (git-fixes).
- bpf: Improve check_raw_mode_ok test for MEM_UNINIT-tagged types (git-fixes).
- bpf: Remove truncation test in bpf_strtol and bpf_strtoul helpers (git-fixes).
- bpf: Zero former ARG_PTR_TO_{LONG,INT} args in case of error (git-fixes).
- btf, scripts: Exclude Rust CUs with pahole (bsc#1230414 bsc#1229450).
- bus: integrator-lm: fix OF node leak in probe() (git-fixes).
- can: c_can: c_can_handle_bus_err(): update statistics if skb allocation fails (git-fixes).
- can: c_can: fix {rx,tx}_errors statistics (git-fixes).
- can: ems_usb: ems_usb_rx_err(): fix {rx,tx}_errors statistics (git-fixes).
- can: ifi_canfd: ifi_canfd_handle_lec_err(): fix {rx,tx}_errors statistics (git-fixes).
- can: j1939: j1939_session_new(): fix skb reference counting (git-fixes).
- can: m_can: m_can_handle_lec_err(): fix {rx,tx}_errors statistics (git-fixes).
- can: sun4i_can: sun4i_can_err(): call can_change_state() even if cf is NULL (git-fixes).
- can: sun4i_can: sun4i_can_err(): fix {rx,tx}_errors statistics (git-fixes).
- ceph: fix cap ref leak via netfs init_request (bsc#1231383).
- cgroup/bpf: only cgroup v2 can be attached by bpf programs (bsc#1234108).
- char: tpm: Fix possible memory leak in tpm_bios_measurements_open() (git-fixes).
- chtls: fix tp->rcv_tstamp initialization (git-fixes).
- clk: Add a devm variant of clk_rate_exclusive_get() (bsc#1227885).
- clk: Provide !COMMON_CLK dummy for devm_clk_rate_exclusive_get() (bsc#1227885).
- comedi: Flush partial mappings in error case (git-fixes).
- comedi: ni_routing: tools: Check when the file could not be opened (stable-fixes).
- cpufreq/amd-pstate: Fix amd_pstate mode switch on shared memory systems (git-fixes).
- crypto: bcm - add error check in the ahash_hmac_init function (git-fixes).
- crypto: caam - add error check to caam_rsa_set_priv_key_form (git-fixes).
- crypto: caam - Fix the pointer passed to caam_qi_shutdown() (git-fixes).
- crypto: cavium - Fix an error handling path in cpt_ucode_load_fw() (git-fixes).
- crypto: cavium - Fix the if condition to exit loop after timeout (git-fixes).
- crypto: hisilicon - Remove pci_aer_clear_nonfatal_status() call (bsc#1232075)
- crypto: hisilicon/qm - re-enable communicate interrupt before notifying PF (bsc#1232075)
- crypto: inside-secure - Fix the return value of safexcel_xcbcmac_cra_init() (git-fixes).
- crypto: x86/aegis128 - access 32-bit arguments as 32-bit (git-fixes).
- cxgb4: add forgotten u64 ivlan cast before shift (git-fixes).
- cxgb4: Properly lock TX queue for the selftest (git-fixes).
- cxgb4: unnecessary check for 0 in the free_sge_txq_uld() function (git-fixes).
- debugfs: fix automount d_fsdata usage (git-fixes).
- dn_route: set rt neigh to blackhole_netdev instead of loopback_dev in ifdown (bsc#1216813).
- drbd: Add NULL check for net_conf to prevent dereference in state validation (git-fixes).
- drbd: Fix atomicity violation in drbd_uuid_set_bm() (git-fixes).
- driver core: bus: Return -EIO instead of 0 when show/store invalid bus attribute (stable-fixes).
- drivers: net: prevent tun_build_skb() to exceed the packet size limit (git-fixes).
- drm: Consistently use struct drm_mode_rect for FB_DAMAGE_CLIPS (git-fixes).
- drm: komeda: Fix an issue related to normalized zpos (stable-fixes).
- drm/amd: Fix initialization mistake for NBIO 7.7.0 (stable-fixes).
- drm/amd: Guard against bad data for ATIF ACPI method (git-fixes).
- drm/amd/amdgpu: Fix double unlock in amdgpu_mes_add_ring (git-fixes).
- drm/amd/display: Add null check for 'afb' in amdgpu_dm_plane_handle_cursor_update (v2) (stable-fixes).
- drm/amd/display: Add null check for top_pipe_to_program in commit_planes_for_stream (stable-fixes).
- drm/amd/display: Allow backlight to go below
AMDGPU_DM_DEFAULT_MIN_BACKLIGHT
(stable-fixes). - drm/amd/display: Check link_res->hpo_dp_link_enc before using it (bsc#1231944)
- drm/amd/display: Check null pointer before dereferencing se (stable-fixes).
- drm/amd/display: Check null pointers before using dc->clk_mgr (stable-fixes).
- drm/amd/display: Check stream before comparing them (stable-fixes).
- drm/amd/display: Fix index out of bounds in DCN30 color transformation (stable-fixes).
- drm/amd/display: Fix index out of bounds in DCN30 degamma hardware format translation (stable-fixes).
- drm/amd/display: Fix index out of bounds in degamma hardware format translation (stable-fixes).
- drm/amd/display: Fix Synaptics Cascaded Panamera DSC Determination (stable-fixes).
- drm/amd/display: Fix system hang while resume with TBT monitor (stable-fixes).
- drm/amd/display: Handle null 'stream_status' in 'planes_changed_for_existing_stream' (stable-fixes).
- drm/amd/display: Initialize get_bytes_per_element's default to 1 (stable-fixes).
- drm/amd/display: Round calculated vtotal (stable-fixes).
- drm/amd/display: Validate backlight caps are sane (stable-fixes).
- drm/amd/pm: ensure the fw_info is not null before using it (stable-fixes).
- drm/amdgpu: add missing size check in amdgpu_debugfs_gprwave_read() (stable-fixes).
- drm/amdgpu: add raven1 gfxoff quirk (stable-fixes).
- drm/amdgpu: Adjust debugfs eviction and IB access permissions (stable-fixes).
- drm/amdgpu: disallow multiple BO_HANDLES chunks in one submit (stable-fixes).
- drm/amdgpu: enable gfxoff quirk on HP 705G4 (stable-fixes).
- drm/amdgpu: fix unchecked return value warning for amdgpu_gfx (stable-fixes).
- drm/amdgpu: prevent BO_HANDLES error from being overwritten (git-fixes).
- drm/amdgpu: prevent NULL pointer dereference if ATIF is not supported (git-fixes).
- drm/amdgpu: properly handle vbios fake edid sizing (git-fixes).
- drm/amdgpu: Replace one-element array with flexible-array member (stable-fixes).
- drm/amdkfd: Fix resource leak in criu restore queue (stable-fixes).
- drm/bridge: anx7625: Drop EDID cache on bridge power off (git-fixes).
- drm/bridge: tc358767: Fix link properties discovery (git-fixes).
- drm/bridge: tc358768: Fix DSI command tx (git-fixes).
- drm/etnaviv: Request pages from DMA32 zone on addressing_limited (git-fixes).
- drm/imx/dcss: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
- drm/mm: Mark drm_mm_interval_tree*() functions with __maybe_unused (git-fixes).
- drm/msm: Allocate memory for disp snapshot with kvzalloc() (git-fixes).
- drm/msm: Avoid NULL dereference in msm_disp_state_print_regs() (git-fixes).
- drm/msm/adreno: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
- drm/msm/dpu: cast crtc_clk calculation to u64 in _dpu_core_perf_calc_clk() (git-fixes).
- drm/msm/dpu: do not always program merge_3d block (git-fixes).
- drm/msm/dpu: make sure phys resources are properly initialized (git-fixes).
- drm/msm/dsi: fix 32-bit signed integer extension in pclk_rate calculation (git-fixes).
- drm/omap: Fix locking in omap_gem_new_dmabuf() (git-fixes).
- drm/omap: Fix possible NULL dereference (git-fixes).
- drm/panfrost: Remove unused id_mask from struct panfrost_model (git-fixes).
- drm/printer: Allow NULL data in devcoredump printer (stable-fixes).
- drm/radeon: Fix encoder->possible_clones (git-fixes).
- drm/radeon: properly handle vbios fake edid sizing (git-fixes).
- drm/radeon: Replace one-element array with flexible-array member (stable-fixes).
- drm/radeon/r100: Handle unknown family in r100_cp_init_microcode() (stable-fixes).
- drm/rockchip: define gamma registers for RK3399 (stable-fixes).
- drm/rockchip: support gamma control on RK3399 (stable-fixes).
- drm/rockchip: vop: Fix a dereferenced before check warning (git-fixes).
- drm/sched: Add locking to drm_sched_entity_modify_sched (git-fixes).
- drm/sti: avoid potential dereference of error pointers (git-fixes).
- drm/sti: avoid potential dereference of error pointers in sti_gdp_atomic_check (git-fixes).
- drm/sti: avoid potential dereference of error pointers in sti_hqvdp_atomic_check (git-fixes).
- drm/v3d: Address race-condition in MMU flush (git-fixes).
- drm/v3d: Stop the active perfmon before being destroyed (git-fixes).
- drm/vboxvideo: Replace fake VLA at end of vbva_mouse_pointer_shape with real VLA (stable-fixes).
- drm/vc4: hvs: Do not write gamma luts on 2711 (git-fixes).
- drm/vc4: hvs: Fix dlist debug not resetting the next entry pointer (git-fixes).
- drm/vc4: hvs: Remove incorrect limit from hvs_dlist debugfs function (git-fixes).
- drm/vc4: Stop the active perfmon before being destroyed (git-fixes).
- drm/vmwgfx: Handle surface check failure correctly (git-fixes).
- drm/vmwgfx: Limit display layout ioctl array size to VMWGFX_NUM_DISPLAY_UNITS (stable-fixes).
- drop HD-audio conexant patch that caused a regression on Thinkpad (bsc#1228269)
- Drop OCFS2 patch causing a regression (bsc#1233255)
- drop USB dwc2 patch that caused a regression on RPi3 (bsc#1232342)
- e1000e: Fix S0ix residency on corporate systems (git-fixes).
- efi/memattr: Ignore table if the size is clearly bogus (bsc#1231465).
- efistub/tpm: Use ACPI reclaim memory for event log to avoid corruption (stable-fixes).
- erofs: avoid consecutive detection for Highmem memory (git-fixes).
- erofs: avoid infinite loop in z_erofs_do_read_page() when reading beyond EOF (git-fixes).
- erofs: fix pcluster use-after-free on UP platforms (git-fixes).
- erofs: fix potential overflow calculating xattr_isize (git-fixes).
- erofs: stop parsing non-compact HEAD index if clusterofs is invalid (git-fixes).
- eth: bnxt: fix counting packets discarded due to OOM and netpoll (git-fixes).
- exportfs: use pr_debug for unreachable debug statements (git-fixes).
- ext4: fix slab-use-after-free in ext4_split_extent_at() (bsc#1232201)
- fat: fix uninitialized variable (git-fixes).
- fbdev: pxafb: Fix possible use after free in pxafb_task() (stable-fixes).
- fbdev: sisfb: Fix strbuf array overflow (stable-fixes).
- fgraph: Change the name of cpuhp state to "fgraph:online" (git-fixes).
- fgraph: Fix missing unlock in register_ftrace_graph() (git-fixes).
- fgraph: Use CPU hotplug mechanism to initialize idle shadow stacks (git-fixes).
- filelock: fix potential use-after-free in posix_lock_inode (git-fixes).
- firmware: google: Unregister driver_info on failure (git-fixes).
- firmware: tegra: bpmp: Drop unused mbox_client_to_bpmp() (git-fixes).
- Fix regression on AMDGPU driver (bsc#1233134)
- fs: Fix file_set_fowner LSM hook inconsistencies (git-fixes).
- fs/namespace: fnic: Switch to use %ptTd (git-fixes).
- fs/pipe: Fix lockdep false-positive in watchqueue pipe_write() (git-fixes).
- genirq/msi: Fix off-by-one error in msi_domain_alloc() (git-fixes).
- goldfish: Fix unused const variable 'goldfish_pipe_acpi_match' (git-fixes).
- gpio: aspeed: Add the flush write to ensure the write complete (git-fixes).
- gpio: aspeed: Use devm_clk api to manage clock source (git-fixes).
- gpio: davinci: fix lazy disable (git-fixes).
- gve: Fix an edge case for TSO skb validity check (git-fixes).
- gve: Fix skb truesize underestimation (git-fixes).
- gve: Fix XDP TX completion handling when counters overflow (git-fixes).
- gve: ignore nonrelevant GSO type bits when processing TSO headers (git-fixes).
- hid: amd_sfh: Switch to device-managed dmam_alloc_coherent() (git-fixes).
- hid: core: zero-initialize the report buffer (git-fixes).
- hid: intel-ish-hid: Fix uninitialized variable 'rv' in ish_fw_xfer_direct_dma (git-fixes).
- hid: lenovo: Add support for Thinkpad X1 Tablet Gen 3 keyboard (stable-fixes).
- hid: multitouch: Add quirk for HONOR MagicBook Art 14 touchpad (stable-fixes).
- hid: multitouch: Add quirk for Logitech Bolt receiver w/ Casa touchpad (stable-fixes).
- hid: multitouch: Add support for B2402FVA track point (stable-fixes).
- hid: multitouch: Add support for GT7868Q (stable-fixes).
- hid: multitouch: Add support for Thinkpad X12 Gen 2 Kbd Portfolio (stable-fixes).
- hid: plantronics: Workaround for an unexcepted opposite volume key (stable-fixes).
- hid: wacom: Defer calculation of resolution until resolution_code is known (git-fixes).
- hid: wacom: fix when get product name maybe null pointer (git-fixes).
- hid: wacom: Interpret tilt data from Intuos Pro BT as signed values (git-fixes).
- hv_netvsc: Fix VF namespace also in synthetic NIC NETDEV_REGISTER event (git-fixes).
- hv_sock: Initializing vsk->trans to NULL to prevent a dangling pointer (git-fixes).
- hwmon: (adm9240) Add missing dependency on REGMAP_I2C (git-fixes).
- hwmon: (tmp513) Add missing dependency on REGMAP_I2C (git-fixes).
- hwmon: (tps23861) Fix reporting of negative temperatures (git-fixes).
- i2c: i801: Use a different adapter-name for IDF adapters (stable-fixes).
- i2c: imx-lpi2c: return -EINVAL when i2c peripheral clk does not work (bsc#1227885).
- i2c: imx-lpi2c: use bulk clk API (bsc#1227885).
- i2c: stm32f7: Do not prepare/unprepare clock during runtime suspend/resume (git-fixes).
- i2c: xiic: Fix broken locking on tx_msg (stable-fixes).
- i2c: xiic: Fix pm_runtime_set_suspended() with runtime pm enabled (git-fixes).
- i2c: xiic: Fix RX IRQ busy check (stable-fixes).
- i2c: xiic: improve error message when transfer fails to start (stable-fixes).
- i2c: xiic: Switch from waitqueue to completion (stable-fixes).
- i2c: xiic: Try re-initialization on bus busy timeout (git-fixes).
- i2c: xiic: Use devm_clk_get_enabled() (stable-fixes).
- i2c: xiic: xiic_xfer(): Fix runtime PM leak on error path (git-fixes).
- i3c: master: Fix miss free init_dyn_addr at i3c_master_put_i3c_addrs() (git-fixes).
- i40e: avoid double calling i40e_pf_rxq_wait() (git-fixes).
- i40e: disable NAPI right after disabling irqs when handling xsk_pool (git-fixes).
- i40e: Fix filter input checks to prevent config with invalid values (git-fixes).
- i40e: fix use-after-free in i40e_aqc_add_filters() (git-fixes).
- i40e: Fix waiting for queues of all VSIs to be disabled (git-fixes).
- i40e: Fix XDP program unloading while removing the driver (git-fixes).
- i40e: Report MFS in decimal base instead of hex (git-fixes).
- i40e: Restore VF MSI-X state during PCI reset (git-fixes).
- i40e: take into account XDP Tx queues when stopping rings (git-fixes).
- iavf: do not process adminq tasks when __IAVF_IN_REMOVE_TASK is set (git-fixes).
- iavf: fix FDIR rule fields masks validation (git-fixes).
- iavf: Fix promiscuous mode configuration flow messages (git-fixes).
- iavf: Fix TC config comparison with existing adapter TC config (git-fixes).
- iavf: in iavf_down, disable queues when removing the driver (git-fixes).
- iavf: initialize waitqueues before starting watchdog_task (git-fixes).
- iavf: Introduce new state machines for flow director (git-fixes).
- iavf: send VLAN offloading caps once after VFR (git-fixes).
- iavf: validate tx_coalesce_usecs even if rx_coalesce_usecs is zero (git-fixes).
- ibmvnic: Do partial reset on login failure (bsc#1233150).
- ibmvnic: Enforce stronger sanity checks on login response (bsc#1233150).
- ibmvnic: Ensure login failure recovery is safe from other resets (bsc#1233150).
- ibmvnic: Handle DMA unmapping of login buffs in release functions (bsc#1233150).
- ibmvnic: Unmap DMA login rsp buffer on send login fail (bsc#1233150).
- ice: avoid executing commands on other ports when driving sync (git-fixes).
- ice: Block switchdev mode when ADQ is active and vice versa (git-fixes).
- ice: change q_index variable type to s16 to store -1 value (git-fixes).
- ice: fix accounting for filters shared by multiple VSIs (git-fixes).
- ice: fix accounting if a VLAN already exists (git-fixes).
- ice: fix ICE_LAST_OFFSET formula (git-fixes).
- ice: Fix link_down_on_close message (git-fixes).
- ice: Fix netif_is_ice() in Safe Mode (git-fixes).
- ice: Fix NULL pointer deref during VF reset (git-fixes).
- ice: fix over-shifted variable (git-fixes).
- ice: fix receive buffer size miscalculation (git-fixes).
- ice: fix VLAN replay after reset (git-fixes).
- ice: Fix VSI list rule with ICE_SW_LKUP_LAST type (git-fixes).
- ice: ice_aq_check_events: fix off-by-one check when filling buffer (git-fixes).
- ice: Interpret .set_channels() input differently (git-fixes).
- ice: reset first in crash dump kernels (git-fixes).
- ice: respect netif readiness in AF_XDP ZC related ndo's (git-fixes).
- ice: Shut down VSI with "link-down-on-close" enabled (git-fixes).
- ice: tc: allow zero flags in parsing tc flower (git-fixes).
- ice: Unbind the workqueue (bsc#1231344).
- ice: virtchnl: stop pretending to support RSS over AQ or registers (git-fixes).
- idpf: avoid compiler introduced padding in virtchnl2_rss_key struct (git-fixes).
- idpf: avoid compiler padding in virtchnl2_ptype struct (git-fixes).
- idpf: disable local BH when scheduling napi for marker packets (git-fixes).
- idpf: distinguish vports by the dev_port attribute (git-fixes).
- idpf: do not enable NAPI and interrupts prior to allocating Rx buffers (git-fixes).
- idpf: fix corrupted frames and skb leaks in singleq mode (git-fixes).
- idpf: fix memleak in vport interrupt configuration (git-fixes).
- idpf: fix memory leaks and crashes while performing a soft reset (git-fixes).
- idpf: fix UAFs when destroying the queues (git-fixes).
- idpf: Interpret .set_channels() input differently (git-fixes).
- igb: Always call igb_xdp_ring_update_tail() under Tx lock (git-fixes).
- igb: extend PTP timestamp adjustments to i211 (git-fixes).
- igb: Fix missing time sync events (git-fixes).
- igb: Fix not clearing TimeSync interrupts for 82580 (git-fixes).
- igc: Check VLAN EtherType mask (git-fixes).
- igc: Check VLAN TCI mask (git-fixes).
- igc: Fix hicredit calculation (git-fixes).
- igc: Fix missing time sync events (git-fixes).
- igc: Remove temporary workaround (git-fixes).
- igc: Report VLAN EtherType matching back to user (git-fixes).
- igc: Unlock on error in igc_io_resume() (git-fixes).
- iio: adc: ad7124: fix division by zero in ad7124_set_channel_odr() (git-fixes).
- iio: adc: ad7606: Fix typo in the driver name (git-fixes).
- iio: adc: ad7923: Fix buffer overflow for tx_buf and ring_xfer (git-fixes).
- iio: dac: ad5770r: add missing select REGMAP_SPI in Kconfig (git-fixes).
- iio: dac: ltc1660: add missing select REGMAP_SPI in Kconfig (git-fixes).
- iio: dac: stm32-dac-core: add missing select REGMAP_MMIO in Kconfig (git-fixes).
- iio: hid-sensors: Fix an error handling path in _hid_sensor_set_report_latency() (git-fixes).
- iio: light: al3010: Fix an error handling path in al3010_probe() (git-fixes).
- iio: light: opt3001: add missing full-scale range value (git-fixes).
- iio: light: veml6030: fix ALS sensor resolution (git-fixes).
- iio: light: veml6030: fix IIO device retrieval from embedded device (git-fixes).
- iio: light: veml6030: fix microlux value calculation (git-fixes).
- iio: proximity: mb1232: add missing select IIO_(TRIGGERED_)BUFFER in Kconfig (git-fixes).
- initramfs: avoid filename buffer overrun (bsc#1232436).
- input: adp5589-keys - fix adp5589_gpio_get_value() (git-fixes).
- input: adp5589-keys - fix NULL pointer dereference (git-fixes).
- input: ads7846 - ratelimit the spi_sync error message (stable-fixes).
- input: goodix - use the new soc_intel_is_byt() helper (stable-fixes).
- input: i8042 - add another board name for TUXEDO Stellaris Gen5 AMD line (git-fixes).
- input: i8042 - add Ayaneo Kun to i8042 quirk table (git-fixes).
- input: i8042 - add Fujitsu Lifebook E756 to i8042 quirk table (git-fixes).
- input: i8042 - add TUXEDO Stellaris 15 Slim Gen6 AMD to i8042 quirk table (git-fixes).
- input: i8042 - add TUXEDO Stellaris 16 Gen5 AMD to i8042 quirk table (git-fixes).
- input: synaptics - enable SMBus for HP Elitebook 840 G2 (stable-fixes).
- iommu/vt-d: Always reserve a domain ID for identity setup (git-fixes).
- ipv6: blackhole_netdev needs snmp6 counters (bsc#1216813).
- ipv6: give an IPv6 dev to blackhole_netdev (bsc#1216813).
- irqchip/gic-v3-its: Avoid explicit cpumask allocation on stack (git-fixes).
- irqchip/gic-v3-its: Fix VSYNC referencing an unmapped VPE on GIC v4.1 (git-fixes).
- itco_wdt: mask NMI_NOW bit for update_no_reboot_bit() call (git-fixes).
- ixgbe: {dis, en}able irqs in ixgbe_txrx_ring_{dis, en}able (git-fixes).
- ixgbe: avoid sleeping allocation in ixgbe_ipsec_vf_add_sa() (git-fixes).
- ixgbe: fix crash with empty VF macvlan list (git-fixes).
- ixgbe: fix timestamp configuration code (git-fixes).
- jfs: check if leafidx greater than num leaves per dmap tree (git-fixes).
- jfs: Fix sanity check in dbMount (git-fixes).
- jfs: Fix uaf in dbFreeBits (git-fixes).
- jfs: Fix uninit-value access of new_ea in ea_buffer (git-fixes).
- jfs: UBSAN: shift-out-of-bounds in dbFindBits (git-fixes).
- kab: fix after net: add more sanity check in virtio_net_hdr_to_skb() (git-fixes).
- kabi fix of KVM: arm64: Preserve PSTATE.SS for the guest while single-step is enabled (git-fixes).
- kABI: bpf: enum bpf_{type_flag,arg_type} kABI workaround (git-fixes).
- kABI: bpf: struct bpf_func_proto kABI workaround (git-fixes).
- kabi: fix after kvm: add guest_state_{enter,exit}_irqoff() (git-fixes).
- kabi: fix after KVM: arm64: mixed-width check should be skipped for uninitialized vCPUs (git-fixes).
- kabi: Restore exported __arm_smccc_sve_check (git-fixes)
- kbuild, bpf: Use test-ge check for v1.25-only pahole (bsc#1230414 bsc#1229450).
- kbuild,bpf: Add module-specific pahole flags for distilled base BTF (bsc#1230414 bsc#1229450).
- kbuild,bpf: Switch to using --btf_features for pahole v1.26 and later (bsc#1230414 bsc#1229450).
- kbuild: add test-{ge,gt,le,lt} macros (bsc#1230414 bsc#1229450).
- kbuild: avoid too many execution of scripts/pahole-flags.sh (bsc#1230414 bsc#1229450).
- kbuild: bpf: Tell pahole to DECL_TAG kfuncs (bsc#1230414 bsc#1229450).
- kernel-binary: Enable livepatch package only when livepatch is enabled Otherwise the filelist may be empty failing the build (bsc#1218644).
- kernel.h: split out COUNT_ARGS() and CONCATENATE() to args.h (git-fixes)
- kexec: fix a memory leak in crash_shrink_memory() (git-fixes).
- kvm: add guest_state_{enter,exit}_irqoff() (git-fixes).
- kvm: Add support for arch compat vm ioctls (git-fixes).
- kvm: arm64: Add missing memory barriers when switching to pKVM's hyp pgd (git-fixes).
- kvm: arm64: Allow AArch32 PSTATE.M to be restored as System mode (git-fixes).
- kvm: arm64: Fix AArch32 register narrowing on userspace write (git-fixes).
- kvm: arm64: GICv4: Do not perform a map to a mapped vLPI (git-fixes).
- kvm: arm64: Invalidate EL1&0 TLB entries for all VMIDs in nvhe hyp init (git-fixes).
- kvm: arm64: mixed-width check should be skipped for uninitialized vCPUs (git-fixes).
- kvm: arm64: Preserve PSTATE.SS for the guest while single-step is enabled (git-fixes).
- kvm: arm64: Release pfn, i.e. put page, if copying MTE tags hits ZONE_DEVICE (git-fixes).
- kvm: arm64: vgic-its: Test for valid IRQ in its_sync_lpi_pending_table() (git-fixes).
- kvm: arm64: vgic-its: Test for valid IRQ in MOVALL handler (git-fixes).
- kvm: arm64: vgic-v2: Check for non-NULL vCPU in vgic_v2_parse_attr() (git-fixes).
- kvm: arm64: vgic-v2: Use cpuid from userspace as vcpu_id (git-fixes).
- kvm: arm64: vgic-v4: Restore pending state on host userspace write (git-fixes).
- kvm: eventfd: Fix false positive RCU usage warning (git-fixes).
- kvm: Fix coalesced_mmio_has_room() to avoid premature userspace exit (git-fixes).
- kvm: Fix lockdep false negative during host resume (git-fixes).
- kvm: fix memoryleak in kvm_init() (git-fixes).
- kvm: Grab a reference to KVM for VM and vCPU stats file descriptors (git-fixes).
- kvm: Optimize kvm_make_vcpus_request_mask() a bit (git-fixes).
- kvm: PPC: Book3S HV: remove unused varible (bsc#1194869).
- kvm: Pre-allocate cpumasks for kvm_make_all_cpus_request_except() (git-fixes).
- kvm: Reject overly excessive IDs in KVM_CREATE_VCPU (git-fixes).
- kvm: s390: Change virtual to physical address access in diag 0x258 handler (git-fixes bsc#1232631).
- kvm: s390: Fix SORTL and DFLTCC instruction format error in __insn32_query (git-fixes bsc#1231277).
- kvm: s390: gaccess: Check if guest address is in memslot (git-fixes bsc#1232630).
- kvm: SVM: Disallow guest from changing userspace's MSR_AMD64_DE_CFG value (git-fixes).
- kvm: SVM: Do not advertise Bus Lock Detect to guest if SVM support is missing (git-fixes).
- kvm: SVM: fix emulation of msr reads/writes of MSR_FS_BASE and MSR_GS_BASE (git-fixes).
- kvm: Unconditionally get a ref to /dev/kvm module when creating a VM (git-fixes).
- kvm: Write the per-page "segment" when clearing (part of) a guest page (git-fixes).
- kvm: x86: Use a stable condition around all VT-d PI paths (git-fixes).
- kvm: x86/mmu: Fold rmap_recycle into rmap_add (git-fixes).
- kvm: x86/mmu: Rename slot_handle_leaf to slot_handle_level_4k (git-fixes).
- kvm/arm64: rework guest entry logic (git-fixes).
- mac80211: MAC80211_MESSAGE_TRACING should depend on TRACING (git-fixes).
- Makefile.compiler: replace cc-ifversion with compiler-specific macros (bsc#1230414 bsc#1229450).
- media: adv7604: prevent underflow condition when reporting colorspace (git-fixes).
- media: cx24116: prevent overflows on SNR calculus (git-fixes).
- media: dvb_frontend: do not play tricks with underflow values (git-fixes).
- media: dvb-usb-v2: af9035: fix missing unlock (git-fixes).
- media: dvb-usb-v2: af9035: Fix null-ptr-deref in af9035_i2c_master_xfer (stable-fixes).
- media: dvbdev: prevent the risk of out of memory access (git-fixes).
- media: pci: cx23885: check cx23885_vdev_init() return (stable-fixes).
- media: pulse8-cec: fix data timestamp at pulse8_setup() (git-fixes).
- media: stb0899_algo: initialize cfr before using it (git-fixes).
- media: v4l2-ctrls-api: fix error handling for v4l2_g_ctrl() (git-fixes).
- media: v4l2-tpg: prevent the risk of a division by zero (git-fixes).
- media: videobuf2-core: clear memory related fields in __vb2_plane_dmabuf_put() (stable-fixes).
- mei: use kvmalloc for read buffer (git-fixes).
- misc: apds990x: Fix missing pm_runtime_disable() (git-fixes).
- mm/hugetlb: fix nodes huge page allocation when there are surplus pages (bsc#1234012).
- mm/memory: add non-anonymous page check in the copy_present_page() (bsc#1231646).
- modpost: remove incorrect code in do_eisa_entry() (git-fixes).
- module: abort module loading when sysfs setup suffer errors (git-fixes).
- nbd: fix race between timeout and normal completion (bsc#1230918).
- net: add more sanity check in virtio_net_hdr_to_skb() (git-fixes).
- net: ena: Fix potential sign extension issue (git-fixes).
- net: ena: Remove ena_select_queue (git-fixes).
- net: ena: Wrong missing IO completions check order (git-fixes).
- net: mana: Implement get_ringparam/set_ringparam for mana (bsc#1229891).
- net: mana: Improve mana_set_channels() in low mem conditions (bsc#1230289).
- net: qede: use return from qede_parse_flow_attr() for flow_spec (git-fixes).
- net: relax socket state check at accept time (git-fixes).
- net: socket: suppress unused warning (git-fixes).
- net: test for not too small csum_start in virtio_net_hdr_to_skb() (git-fixes).
- net: usb: lan78xx: Fix memory leak on device unplug by freeing PHY device (git-fixes).
- net: usb: lan78xx: Fix refcounting and autosuspend on invalid WoL configuration (git-fixes).
- net: usb: qmi_wwan: add Fibocom FG132 0x0112 composition (stable-fixes).
- net: usb: usbnet: fix name regression (git-fixes).
- net: usb: usbnet: fix race in probe failure (git-fixes).
- net/mlx5: Add missing masks and QoS bit masks for scheduling elements (git-fixes).
- net/mlx5: Added cond_resched() to crdump collection (git-fixes).
- net/mlx5: Allow 0 for total host VFs (git-fixes).
- net/mlx5: Correctly compare pkt reformat ids (git-fixes).
- net/mlx5: DR, Can't go to uplink vport on RX rule (git-fixes).
- net/mlx5: DR, fix memory leak in mlx5dr_cmd_create_reformat_ctx (git-fixes).
- net/mlx5: DR, Use the right GVMI number for drop action (git-fixes).
- net/mlx5: Drain health before unregistering devlink (git-fixes).
- net/mlx5: E-switch, register event handler before arming the event (git-fixes).
- net/mlx5: Explicitly set scheduling element and TSAR type (git-fixes).
- net/mlx5: Fix fw tracer first block check (git-fixes).
- net/mlx5: fix potential memory leak in mlx5e_init_rep_rx (git-fixes).
- net/mlx5: fs, lock FTE when checking if active (git-fixes).
- net/mlx5: Handle fw tracer change ownership event based on MTRC (git-fixes).
- net/mlx5: LAG, Check correct bucket when modifying LAG (git-fixes).
- net/mlx5: Lag, do bond only if slaves agree on roce state (git-fixes).
- net/mlx5: Lag, do not use the hardcoded value of the first port (git-fixes).
- net/mlx5: Lag, restore buckets number to default after hash LAG deactivation (git-fixes).
- net/mlx5: Skip clock update work when device is in error state (git-fixes).
- net/mlx5: Unregister notifier on eswitch init failure (git-fixes).
- net/mlx5: Update the list of the PCI supported devices (git-fixes).
- net/mlx5: Use mlx5 device constant for selecting CQ period mode for ASO (git-fixes).
- net/mlx5: Use recovery timeout on sync reset flow (git-fixes).
- net/mlx5: Use RMW accessors for changing LNKCTL (git-fixes).
- net/mlx5e: Add a check for the return value from mlx5_port_set_eth_ptys (git-fixes).
- net/mlx5e: Add missing link modes to ptys2ethtool_map (git-fixes).
- net/mlx5e: Add mqprio_rl cleanup and free in mlx5e_priv_cleanup() (git-fixes).
- net/mlx5e: Again mutually exclude RX-FCS and RX-port-timestamp (git-fixes).
- net/mlx5e: Allow software parsing when IPsec crypto is enabled (git-fixes).
- net/mlx5e: Change the warning when ignore_flow_level is not supported (git-fixes).
- net/mlx5e: Check return value of snprintf writing to fw_version buffer (git-fixes).
- net/mlx5e: Check return value of snprintf writing to fw_version buffer for representors (git-fixes).
- net/mlx5e: Correct snprintf truncation handling for fw_version buffer (git-fixes).
- net/mlx5e: Correct snprintf truncation handling for fw_version buffer used by representors (git-fixes).
- net/mlx5e: Correctly report errors for ethtool rx flows (git-fixes).
- net/mlx5e: CT: Fix null-ptr-deref in add rule err flow (git-fixes).
- net/mlx5e: Do not offload internal port if filter device is out device (git-fixes).
- net/mlx5e: fix a potential double-free in fs_udp_create_groups (git-fixes).
- net/mlx5e: Fix crash moving to switchdev mode when ntuple offload is set (git-fixes).
- net/mlx5e: fix double free in macsec_fs_tx_create_crypto_table_groups (git-fixes).
- net/mlx5e: fix double free of encap_header (git-fixes).
- net/mlx5e: Fix features validation check for tunneled UDP (non-VXLAN) packets (git-fixes).
- net/mlx5e: Fix IPsec tunnel mode offload feature check (git-fixes).
- net/mlx5e: Fix pedit endianness (git-fixes).
- net/mlx5e: Fix possible deadlock on mlx5e_tx_timeout_work (git-fixes).
- net/mlx5e: fix return value check in mlx5e_ipsec_remove_trailer() (git-fixes).
- net/mlx5e: Fix slab-out-of-bounds in mlx5_query_nic_vport_mac_list() (git-fixes).
- net/mlx5e: Fix UDP GSO for encapsulated packets (git-fixes).
- net/mlx5e: HTB, Fix inconsistencies with QoS SQs number (git-fixes).
- net/mlx5e: kTLS, Fix incorrect page refcounting (git-fixes).
- net/mlx5e: Move representor neigh cleanup to profile cleanup_tx (git-fixes).
- net/mlx5e: Reduce the size of icosq_str (git-fixes).
- net/mlx5e: Take state lock during tx timeout reporter (git-fixes).
- net/mlx5e: Use rx_missed_errors instead of rx_dropped for reporting buffer exhaustion (git-fixes).
- net/sched: taprio: Limit TCA_TAPRIO_ATTR_SCHED_CYCLE_TIME to INT_MAX (bsc#1226797)
- netdevsim: use cond_resched() in nsim_dev_trap_report_work() (git-fixes).
- nfs: Avoid unnecessary rescanning of the per-server delegation list (git-fixes).
- nfs: Fix KMSAN warning in decode_getfattr_attrs() (git-fixes).
- nfs: fix memory leak in error path of nfs4_do_reclaim (git-fixes).
- nfsd: call cache_put if xdr_reserve_space returns NULL (git-fixes).
- nfsd: fix delegation_blocked() to block correctly for at least 30 seconds (git-fixes).
- nfsd: Fix NFSv4's PUTPUBFH operation (git-fixes).
- nfsd: fix refcount leak when file is unhashed after being found (git-fixes).
- nfsd: map the EBADMSG to nfserr_io to avoid warning (git-fixes).
- nfsd: Mark filecache "down" if init fails (git-fixes).
- nfsd: remove unneeded EEXIST error check in nfsd_do_file_acquire (git-fixes).
- nfsd: return -EINVAL when namelen is 0 (git-fixes).
- nfsv3: only use NFS timeout for MOUNT when protocols are compatible (bsc#1231016).
- nfsv4: Fix clearing of layout segments in layoutreturn (git-fixes).
- nilfs2: fix kernel bug due to missing clearing of buffer delay flag (git-fixes).
- nouveau/dmem: Fix vulnerability in migrate_to_ram upon copy error (git-fixes).
- ntb: intel: Fix the NULL vs IS_ERR() bug for debugfs_create_dir() (git-fixes).
- ntb: ntb_hw_switchtec: Fix use after free vulnerability in switchtec_ntb_remove due to race condition (stable-fixes).
- nvme-fabrics: fix kernel crash while shutting down controller (git-fixes).
- nvme-multipath: system fails to create generic nvme device (git-fixes).
- nvme-pci: fix freeing of the HMB descriptor table (git-fixes).
- nvme-pci: qdepth 1 quirk (git-fixes).
- nvme-pci: reverse request order in nvme_queue_rqs (git-fixes).
- nvmet-auth: assign dh_key to NULL after kfree_sensitive (git-fixes).
- ocfs2: fix the la space leak when unmounting an ocfs2 volume (git-fixes).
- ocfs2: fix uninit-value in ocfs2_get_block() (git-fixes).
- ocfs2: pass u64 to ocfs2_truncate_inline maybe overflow (git-fixes).
- ocfs2: remove entry once instead of null-ptr-dereference in ocfs2_xa_remove() (git-fixes).
- parport: Proper fix for array out-of-bounds access (git-fixes).
- pci: Add ACS quirk for Qualcomm SA8775P (stable-fixes).
- pci: Add function 0 DMA alias quirk for Glenfly Arise chip (stable-fixes).
- pci: Add T_PVPERL macro (git-fixes).
- pci: endpoint: Clear secondary (not primary) EPC in pci_epc_remove_epf() (git-fixes).
- pci: Fix pci_enable_acs() support for the ACS quirks (bsc#1229019).
- pci: Fix reset_method_store() memory leak (git-fixes).
- pci: j721e: Deassert PERST# after a delay of PCIE_T_PVPERL_MS milliseconds (git-fixes).
- pci: keystone: Add link up check to ks_pcie_other_map_bus() (git-fixes).
- pci: keystone: Set mode as Root Complex for "ti,keystone-pcie" compatible (git-fixes).
- pci: Mark Creative Labs EMU20k2 INTx masking as broken (stable-fixes).
- pci: rockchip-ep: Fix address translation unit programming (git-fixes).
- phy: tegra: xusb: Add error pointer check in xusb.c (git-fixes).
- platform/chrome: cros_ec_typec: fix missing fwnode reference decrement (git-fixes).
- platform/surface: aggregator_registry: Add support for Surface Laptop Go 3 (stable-fixes).
- platform/surface: aggregator: Fix warning when controller is destroyed in probe (git-fixes).
- platform/x86: dell-sysman: add support for alienware products (stable-fixes).
- platform/x86: dell-wmi: Ignore suspend notifications (stable-fixes).
- platform/x86: touchscreen_dmi: add nanote-next quirk (stable-fixes).
- posix-cpu-timers: Clear TICK_DEP_BIT_POSIX_TIMER on clone (bsc#1234098).
- power: reset: brcmstb: Do not go into infinite loop if reset fails (stable-fixes).
- power: supply: bq27xxx: Fix registers of bq27426 (git-fixes).
- power: supply: core: Remove might_sleep() from power_supply_put() (git-fixes).
- powerpc: Allow clearing and restoring registers independent of saved breakpoint state (bsc#1194869).
- powerpc: remove GCC version check for UPD_CONSTR (bsc#1194869).
- powerpc/64: Convert patch_instruction() to patch_u32() (bsc#1194869).
- powerpc/asm: Remove UPD_CONSTR after GCC 4.9 removal (bsc#1194869).
- powerpc/atomic: Use YZ constraints for DS-form instructions (bsc#1194869).
- powerpc/boot: Handle allocation failure in simple_realloc() (bsc#1194869).
- powerpc/boot: Only free if realloc() succeeds (bsc#1194869).
- powerpc/code-patching: Add generic memory patching (bsc#1194869).
- powerpc/code-patching: Consolidate and cache per-cpu patching context (bsc#1194869).
- powerpc/code-patching: Do not call is_vmalloc_or_module_addr() without CONFIG_MODULES (bsc#1194869).
- powerpc/code-patching: Fix error handling in do_patch_instruction() (bsc#1194869).
- powerpc/code-patching: Fix oops with DEBUG_VM enabled (bsc#1194869).
- powerpc/code-patching: Fix unmap_patch_area() error handling (bsc#1194869).
- powerpc/code-patching: introduce patch_instructions() (bsc#1194869).
- powerpc/code-patching: Perform hwsync in __patch_instruction() in case of failure (bsc#1194869).
- powerpc/code-patching: Pre-map patch area (bsc#1194869).
- powerpc/code-patching: Remove #ifdef CONFIG_STRICT_KERNEL_RWX (bsc#1194869).
- powerpc/code-patching: Remove pr_debug()/pr_devel() messages and fix check() (bsc#1194869).
- powerpc/code-patching: Reorganise do_patch_instruction() to ease error handling (bsc#1194869).
- powerpc/code-patching: Speed up page mapping/unmapping (bsc#1194869).
- powerpc/code-patching: Use jump_label to check if poking_init() is done (bsc#1194869).
- powerpc/code-patching: Use temporary mm for Radix MMU (bsc#1194869).
- powerpc/code-patching: Use WARN_ON and fix check in poking_init (bsc#1194869).
- powerpc/ftrace: Use patch_instruction() return directly (bsc#1194869).
- powerpc/imc-pmu: Fix use of mutex in IRQs disabled section (bsc#1054914 git-fixes).
- powerpc/imc-pmu: Use the correct spinlock initializer (bsc#1054914 git-fixes).
- powerpc/inst: Refactor ___get_user_instr() (bsc#1194869).
- powerpc/kexec: Fix return of uninitialized variable (bsc#1194869).
- powerpc/lib: Add __init attribute to eligible functions (bsc#1194869).
- powerpc/mm: Fix boot crash with FLATMEM (bsc#1194869).
- powerpc/mm: Fix boot warning with hugepages and CONFIG_DEBUG_VIRTUAL (bsc#1194869).
- powerpc/mm/fault: Fix kfence page fault reporting (bsc#1194869).
- powerpc/powernv: Free name on error in opal_event_init() (bsc#1194869).
- powerpc/pseries: Fix dtl_access_lock to be a rw_semaphore (bsc#1194869).
- powerpc/pseries: Fix KVM guest detection for disabling hardlockup detector (bsc#1194869).
- powerpc/tlb: Add local flush for page given mm_struct and psize (bsc#1194869).
- powerpc/vdso: augment VDSO32 functions to support 64 bits build (bsc#1194869).
- powerpc/vdso: Fix VDSO data access when running in a non-root time namespace (bsc#1194869).
- powerpc/vdso: Merge vdso64 and vdso32 into a single directory (bsc#1194869).
- powerpc/vdso: Rework VDSO32 makefile to add a prefix to object files (bsc#1194869).
- powerpc/xics: Check return value of kasprintf in icp_native_map_one_cpu (bsc#1194869).
- powerpc/xmon: Fix disassembly CPU feature checks (bsc#1065729).
- qed: avoid truncating work queue length (git-fixes).
- rcu-tasks: Fix show_rcu_tasks_trace_gp_kthread buffer overflow (bsc#1226631).
- rcu: Add rcutree.nohz_full_patience_delay to reduce nohz_full (bsc#1231327)
- rdma/bnxt_re: Add a check for memory allocation (git-fixes)
- rdma/bnxt_re: Check cqe flags to know imm_data vs inv_irkey (git-fixes)
- rdma/bnxt_re: Fix a bug while setting up Level-2 PBL pages (git-fixes)
- rdma/bnxt_re: Fix incorrect AVID type in WQE structure (git-fixes)
- rdma/bnxt_re: Fix the GID table length (git-fixes)
- rdma/bnxt_re: Fix the max CQ WQEs for older adapters (git-fixes)
- rdma/bnxt_re: Fix the usage of control path spin locks (git-fixes)
- rdma/bnxt_re: Return more meaningful error (git-fixes)
- rdma/bnxt_re: synchronize the qp-handle table array (git-fixes)
- rdma/cxgb4: Dump vendor specific QP details (git-fixes)
- rdma/cxgb4: Fix RDMA_CM_EVENT_UNREACHABLE error for iWARP (git-fixes)
- rdma/hns: Add clear_hem return value to log (git-fixes)
- rdma/hns: Add mutex_destroy() (git-fixes)
- rdma/hns: Fix an AEQE overflow error caused by untimely update of eq_db_ci (git-fixes)
- rdma/hns: Fix cpu stuck caused by printings during reset (git-fixes)
- rdma/hns: Fix different dgids mapping to the same dip_idx (git-fixes)
- rdma/hns: Fix flush cqe error when racing with destroy qp (git-fixes)
- rdma/hns: Fix NULL pointer derefernce in hns_roce_map_mr_sg() (git-fixes)
- rdma/hns: Fix out-of-order issue of requester when setting FENCE (git-fixes)
- rdma/hns: Remove unnecessary QP type checks (git-fixes)
- rdma/hns: Remove unused abnormal interrupt of type RAS (git-fixes)
- rdma/hns: Use dev_ printings in hem code instead of ibdev_ (git-fixes)
- rdma/hns: Use macro instead of magic number (git-fixes)
- rdma/irdma: Fix misspelling of "accept*" (git-fixes)
- rdma/mad: Improve handling of timed out WRs of mad agent (git-fixes)
- rdma/mana_ib: use the correct page size for mapping user-mode doorbell page (git-fixes).
- rdma/mana_ib: use the correct page table index based on hardware page size (git-fixes).
- rdma/mlx5: Move events notifier registration to be after device registration (git-fixes)
- rdma/mlx5: Round max_rd_atomic/max_dest_rd_atomic up instead of down (git-fixes)
- rdma/mlx5: Use sq timestamp as QP timestamp when RoCE is disabled (git-fixes).
- rdma/rtrs-srv: Avoid null pointer deref during path establishment (git-fixes)
- rdma/rxe: Fix the qp flush warnings in req (git-fixes)
- rdma/rxe: Set queue pair cur_qp_state when being queried (git-fixes)
- rdma/srpt: Make slab cache names unique (git-fixes)
- Removed the duplicated check of static_assert(sizeof(struct work_struct) >= sizeof(struct rcu_head)).
- Removed unnecessary white-space change in kernel/bpf/syscall.c
- Revert "cgroup: Fix memory leak caused by missing cgroup_bpf_offline" (bsc#1234108).
- Revert "ixgbe: Manual AN-37 for troublesome link partners for X550 SFI" (git-fixes).
- Revert "KVM: Prevent module exit until all VMs are freed" (git-fixes).
- Revert "mmc: dw_mmc: Fix IDMAC operation with pages bigger than 4K" (git-fixes).
- Revert "usb: gadget: composite: fix OS descriptors w_value logic" (git-fixes).
- Revert "usb: yurex: Replace snprintf() with the safer scnprintf() variant" (stable-fixes).
- Revert PM changes that caused a regression on S4 resume (bsc#1231578).
- rpm/check-for-config-changes: add HAVE_RUST and RUSTC_SUPPORTS_ to IGNORED_CONFIGS_RE They depend on SHADOW_CALL_STACK.
- rpm/check-for-config-changes: Exclude ARCH_USING_PATCHABLE_FUNCTION_ENTRY gcc version dependent, at least on ppc
- rpm/release-projects: Add SLFO projects (bsc#1231293).
- rpm/scripts: Remove obsolete Symbols.list Symbols.list is not longer needed by the new klp-convert implementation. (bsc#1218644)
- rtc: ab-eoz9: do not fail temperature reads on undervoltage notification (git-fixes).
- rtc: abx80x: Fix WDT bit position of the status register (git-fixes).
- rtc: check if __rtc_read_time was successful in rtc_timer_do_work() (git-fixes).
- rtc: st-lpc: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
- s390/mm: Add cond_resched() to cmm_alloc/free_pages() (bsc#1228747).
- s390/sclp_vt220: Convert newlines to CRLF instead of LFCR (git-fixes bsc#1232632).
- sched/isolation: Prevent boot crash when the boot CPU is (bsc#1231327)
- scsi: aacraid: Rearrange order of struct aac_srb_unit (git-fixes).
- scsi: core: alua: I/O errors for ALUA state transitions (git-fixes).
- scsi: core: Fix the return value of scsi_logical_block_count() (git-fixes).
- scsi: core: Handle devices which return an unusually large VPD page count (git-fixes).
- scsi: elx: libefc: Fix potential use after free in efc_nport_vport_del() (git-fixes).
- scsi: fnic: Move flush_work initialization out of if block (bsc#1230055).
- scsi: hpsa: Fix allocation size for Scsi_Host private data (git-fixes).
- scsi: libsas: Fix exp-attached device scan after probe failure scanned in again after probe failed (git-fixes).
- scsi: libsas: Fix the failure of adding phy with zero-address to port (git-fixes).
- scsi: lpfc: Add cleanup of nvmels_wq after HBA reset (bsc#1233241).
- scsi: lpfc: Add ELS_RSP cmd to the list of WQEs to flush in lpfc_els_flush_cmd() (bsc#1232757).
- scsi: lpfc: Call lpfc_sli4_queue_unset() in restart and rmmod paths (bsc#1233241).
- scsi: lpfc: Change lpfc_nodelist nlp_flag member into a bitmask (bsc#1233241).
- scsi: lpfc: Check devloss callbk done flag for potential stale NDLP ptrs (bsc#1233241).
- scsi: lpfc: Check SLI_ACTIVE flag in FDMI cmpl before submitting follow up FDMI (bsc#1233241).
- scsi: lpfc: Copyright updates for 14.4.0.6 patches (bsc#1233241).
- scsi: lpfc: Ensure DA_ID handling completion before deleting an NPIV instance (bsc#1232757).
- scsi: lpfc: Fix kref imbalance on fabric ndlps from dev_loss_tmo handler (bsc#1232757).
- scsi: lpfc: Modify CGN warning signal calculation based on EDC response (bsc#1233241).
- scsi: lpfc: Prevent NDLP reference count underflow in dev_loss_tmo callback (bsc#1233241).
- scsi: lpfc: Remove NLP_RELEASE_RPI flag from nodelist structure (bsc#1233241).
- scsi: lpfc: Remove trailing space after \n newline (bsc#1232757).
- scsi: lpfc: Restrict support for 32 byte CDBs to specific HBAs (git-fixes).
- scsi: lpfc: Revise TRACE_EVENT log flag severities from KERN_ERR to KERN_WARNING (bsc#1232757).
- scsi: lpfc: Support loopback tests with VMID enabled (bsc#1232757).
- scsi: lpfc: Update lpfc version to 14.4.0.5 (bsc#1232757).
- scsi: lpfc: Update lpfc version to 14.4.0.6 (bsc#1233241).
- scsi: lpfc: Update lpfc_els_flush_cmd() to check for SLI_ACTIVE before BSG flag (bsc#1233241).
- scsi: lpfc: Update phba link state conditional before sending CMF_SYNC_WQE (bsc#1232757).
- scsi: mac_scsi: Disallow bus errors during PDMA send (git-fixes).
- scsi: mac_scsi: Refactor polling loop (git-fixes).
- scsi: mac_scsi: Revise printk(KERN_DEBUG ...) messages (git-fixes).
- scsi: mpi3mr: Avoid IOMMU page faults on REPORT ZONES (git-fixes).
- scsi: mpi3mr: Fix ATA NCQ priority support (git-fixes).
- scsi: mpt3sas: Avoid IOMMU page faults on REPORT ZONES (git-fixes).
- scsi: NCR5380: Check for phase match during PDMA fixup (git-fixes).
- scsi: qedf: Set qed_slowpath_params to zero before use (git-fixes).
- scsi: scsi_transport_fc: Allow setting rport state to current state (git-fixes).
- scsi: sd_zbc: Use kvzalloc() to allocate REPORT ZONES buffer (git-fixes).
- scsi: smartpqi: correct stream detection (git-fixes).
- scsi: smartpqi: revert propagate-the-multipath-failure-to-SML-quickly (git-fixes).
- scsi: spi: Fix sshdr use (git-fixes).
- scsi: wd33c93: Do not use stale scsi_pointer value (git-fixes).
- security/keys: fix slab-out-of-bounds in key_task_permission (git-fixes).
- selftests/bpf: Add a test case to write mtu result into .rodata (git-fixes).
- selftests/bpf: Add a test case to write strtol result into .rodata (git-fixes).
- selftests/bpf: Fix ARG_PTR_TO_LONG {half-,}uninitialized test (git-fixes).
- selftests/bpf: Rename ARG_PTR_TO_LONG test description (git-fixes).
- selftests/bpf: test for malformed BPF_CORE_TYPE_ID_LOCAL relocation (git-fixes).
- serial: 8250: omap: Move pm_runtime_get_sync (git-fixes).
- sfc: Check firmware supports Ethernet PTP filter (git-fixes).
- sfc: do not unregister flow_indr if it was never registered (git-fixes).
- sfc: fix a double-free bug in efx_probe_filters (git-fixes).
- signal: Replace BUG_ON()s (bsc#1234093).
- spi: atmel-quadspi: Fix register name in verbose logging function (git-fixes).
- spi: bcm63xx: Enable module autoloading (stable-fixes).
- spi: bcm63xx: Fix module autoloading (git-fixes).
- spi: Fix acpi deferred irq probe (git-fixes).
- spi: lpspi: release requested DMA channels (stable-fixes).
- spi: lpspi: Silence error message upon deferred probe (stable-fixes).
- spi: lpspi: Simplify some error message (git-fixes).
- spi: ppc4xx: Avoid returning 0 when failed to parse and map IRQ (git-fixes).
- spi: ppc4xx: handle irq_of_parse_and_map() errors (git-fixes).
- spi: s3c64xx: fix timeout counters in flush_fifo (git-fixes).
- spi: spi-fsl-lpspi: Undo runtime PM changes at driver exit time (git-fixes).
- spi: spi-imx: Fix pm_runtime_set_suspended() with runtime pm enabled (git-fixes).
- spi: spidev: Add missing spi_device_id for jg10309-01 (git-fixes).
- staging: iio: frequency: ad9832: fix division by zero in ad9832_calc_freqreg() (git-fixes).
- static_call: Do not make __static_call_return0 static (git-fixes).
- sunrpc: clnt.c: Remove misleading comment (git-fixes).
- sunrpc: Fix integer overflow in decode_rc_list() (git-fixes).
- sunrpc: Fixup gss_status tracepoint error output (git-fixes).
- thermal: core: Initialize thermal zones before registering them (git-fixes).
- thermal: intel: int340x: processor: Fix warning during module unload (git-fixes).
- tpm: Lock TPM chip in tpm_pm_suspend() first (bsc#1082555 git-fixes).
- tracing: Consider the NULL character when validating the event length (git-fixes).
- tracing/hwlat: Fix a race during cpuhp processing (git-fixes).
- tracing/uprobes: Use trace_event_buffer_reserve() helper (git-fixes).
- tun: Fix xdp_rxq_info's queue_index when detaching (git-fixes).
- tun: prevent negative ifindex (git-fixes).
- ucounts: fix counter leak in inc_rlimit_get_ucounts() (bsc#1233460).
- Update config files (bsc#1218644). LIVEPATCH_IPA_CLONES=n => LIVEPATCH=n
- Update config files. Enabled IDPF for ARM64 (bsc#1221309)
- uprobe: avoid out-of-bounds memory access of fetching args (git-fixes).
- uprobes: encapsulate preparation of uprobe args buffer (git-fixes).
- usb: appledisplay: close race between probe and completion handler (stable-fixes).
- usb: chaoskey: fail open after removal (git-fixes).
- usb: chaoskey: Fix possible deadlock chaoskey_list_lock (git-fixes).
- usb: chipidea: udc: enable suspend interrupt after usb reset (stable-fixes).
- usb: dwc2: Adjust the timing of USB Driver Interrupt Registration in the Crashkernel Scenario (stable-fixes).
- usb: dwc3: core: Stop processing of pending events if controller is halted (git-fixes).
- usb: dwc3: gadget: Add missing check for single port RAM in TxFIFO resizing logic (git-fixes).
- usb: dwc3: gadget: Fix checking for number of TRBs left (git-fixes).
- usb: dwc3: gadget: Fix looping of queued SG entries (git-fixes).
- usb: ehci-spear: fix call balance of sehci clk handling routines (git-fixes).
- usb: gadget: core: force synchronous registration (git-fixes).
- usb: misc: cypress_cy7c63: check for short transfer (stable-fixes).
- usb: misc: yurex: fix race between read and write (stable-fixes).
- usb: musb: sunxi: Fix accessing an released usb phy (git-fixes).
- usb: phy: Fix API devm_usb_put_phy() can not release the phy (git-fixes).
- usb: serial: ftdi_sio: Fix atomicity violation in get_serial_info() (git-fixes).
- usb: serial: io_edgeport: fix use after free in debug printk (git-fixes).
- usb: serial: option: add Fibocom FG132 0x0112 composition (stable-fixes).
- usb: serial: option: add Quectel RG650V (stable-fixes).
- usb: serial: option: add support for Quectel EG916Q-GL (stable-fixes).
- usb: serial: option: add Telit FN920C04 MBIM compositions (stable-fixes).
- usb: serial: pl2303: add device id for Macrosilicon MS3020 (stable-fixes).
- usb: serial: qcserial: add support for Sierra Wireless EM86xx (stable-fixes).
- usb: storage: ignore bogus device raised by JieLi BR21 USB sound chip (stable-fixes).
- usb: typec: altmode should keep reference to parent (git-fixes).
- usb: typec: fix potential out of bounds in ucsi_ccg_update_set_new_cam_cmd() (git-fixes).
- usb: typec: fix unreleased fwnode_handle in typec_port_register_altmodes() (git-fixes).
- usb: using mutex lock and supporting O_NONBLOCK flag in iowarrior_read() (git-fixes).
- usb: xhci: Fix problem with xhci resume from suspend (stable-fixes).
- usb: xhci: Fix TD invalidation under pending Set TR Dequeue (git-fixes).
- usb: yurex: Fix inconsistent locking bug in yurex_read() (git-fixes).
- usb: yurex: make waiting on yurex_write interruptible (git-fixes).
- usb: yurex: Replace snprintf() with the safer scnprintf() variant (stable-fixes).
- usbip: tools: Fix detach_port() invalid port error path (git-fixes).
- usbnet: ipheth: fix carrier detection in modes 1 and 4 (stable-fixes).
- Use pahole -j1 option for reproducible builds (bsc#1230414 bsc#1229450).
- vdpa/mlx5: preserve CVQ vringh index (git-fixes).
- vhost_vdpa: assign irq bypass producer token correctly (git-fixes).
- vhost/scsi: null-ptr-dereference in vhost_scsi_get_req() (git-fixes).
- virtio_console: fix misc probe bugs (git-fixes).
- virtio_net: fixing XDP for fully checksummed packets handling (git-fixes).
- virtio-net: synchronize probe with ndo_set_features (git-fixes).
- vmxnet3: add command to allow disabling of offloads (bsc#1226498).
- vmxnet3: add latency measurement support in vmxnet3 (bsc#1226498).
- vmxnet3: prepare for version 9 changes (bsc#1226498).
- vmxnet3: update to version 9 (bsc#1226498).
- vsock/virtio: fix packet delivery to tap device (git-fixes).
- watchdog: mediatek: Make sure system reset gets asserted in mtk_wdt_restart() (git-fixes).
- watchdog: rti: of: honor timeout-sec property (git-fixes).
- wifi: ath10k: fix invalid VHT parameters in supported_vht_mcs_rate_nss1 (git-fixes).
- wifi: ath10k: fix invalid VHT parameters in supported_vht_mcs_rate_nss2 (git-fixes).
- wifi: ath10k: Fix memory leak in management tx (git-fixes).
- wifi: ath11k: fix array out-of-bound access in SoC stats (stable-fixes).
- wifi: ath11k: Fix invalid ring usage in full monitor mode (git-fixes).
- wifi: ath9k_htc: Use __skb_set_length() for resetting urb before resubmit (stable-fixes).
- wifi: ath9k: add range check for conn_rsp_epid in htc_connect_service() (git-fixes).
- wifi: ath9k: fix parameter check in ath9k_init_debug() (stable-fixes).
- wifi: ath9k: fix possible integer overflow in ath9k_get_et_stats() (stable-fixes).
- wifi: ath9k: Remove error checks when creating debugfs entries (git-fixes).
- wifi: brcm80211: BRCM_TRACING should depend on TRACING (git-fixes).
- wifi: iwlegacy: Clear stale interrupts before resuming device (stable-fixes).
- wifi: iwlwifi: clear trans->state earlier upon error (stable-fixes).
- wifi: iwlwifi: lower message level for FW buffer destination (stable-fixes).
- wifi: iwlwifi: mvm: disconnect station vifs if recovery failed (stable-fixes).
- wifi: iwlwifi: mvm: fix iwl_mvm_scan_fits() calculation (stable-fixes).
- wifi: iwlwifi: mvm: Fix response handling in iwl_mvm_send_recovery_cmd() (git-fixes).
- wifi: mac80211: do not pass a stopped vif to the driver in .get_txpower (git-fixes).
- wifi: mac80211: skip non-uploaded keys in ieee80211_iter_keys (git-fixes).
- wifi: mwifiex: Fix memcpy() field-spanning write warning in mwifiex_cmd_802_11_scan_ext() (stable-fixes).
- wifi: mwifiex: Fix memcpy() field-spanning write warning in mwifiex_config_scan() (git-fixes).
- wifi: mwifiex: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
- wifi: p54: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
- wifi: rtw88: select WANT_DEV_COREDUMP (stable-fixes).
- workqueue: Avoid using isolated cpus' timers on (bsc#1231327)
- workqueue: mark power efficient workqueue as unbounded if (bsc#1231327)
- x86/bugs: Do not use UNTRAIN_RET with IBPB on entry (git-fixes).
- x86/bugs: Skip RSB fill at VMEXIT (git-fixes).
- x86/cpufeatures: Add a IBPB_NO_RET BUG flag (git-fixes).
- x86/cpufeatures: Define X86_FEATURE_AMD_IBPB_RET (git-fixes).
- x86/entry: Have entry_ibpb() invalidate return predictions (git-fixes).
- x86/hyperv: Set X86_FEATURE_TSC_KNOWN_FREQ when Hyper-V provides frequency (git-fixes).
- x86/kaslr: Expose and use the end of the physical memory address space (bsc#1230405).
- x86/kvm: fix is_stale_page_fault() (bsc#1221333).
- xfrm: set dst dev to blackhole_netdev instead of loopback_dev in ifdown (bsc#1216813).
- xhci: Fix incorrect stream context type macro (git-fixes).
- xhci: Fix Link TRB DMA in command ring stopped completion event (git-fixes).
- xhci: Mitigate failed set dequeue pointer commands (git-fixes).
- xhci: Separate PORT and CAPs macros into dedicated file (stable-fixes).
- xhci: Use pm_runtime_get to prevent RPM on unsupported systems (git-fixes).
Special Instructions and Notes:
- Please reboot the system after installing this update.
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-4364=1
-
Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-4364=1
-
Development Tools Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-4364=1
-
Legacy Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Legacy-15-SP5-2024-4364=1
-
SUSE Linux Enterprise Live Patching 15-SP5
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-4364=1
Please note that this is the initial kernel livepatch without fixes itself, this package is later updated by separate standalone kernel livepatch updates. -
SUSE Linux Enterprise High Availability Extension 15 SP5
zypper in -t patch SUSE-SLE-Product-HA-15-SP5-2024-4364=1
Package List:
-
SUSE Linux Enterprise Micro 5.5 (aarch64 nosrc ppc64le s390x)
- kernel-default-5.14.21-150500.55.88.1
-
SUSE Linux Enterprise Micro 5.5 (aarch64)
- kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4
-
SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x)
- kernel-default-debuginfo-5.14.21-150500.55.88.1
- kernel-default-debugsource-5.14.21-150500.55.88.1
-
Basesystem Module 15-SP5 (aarch64 nosrc)
- kernel-64kb-5.14.21-150500.55.88.1
-
Basesystem Module 15-SP5 (aarch64)
- kernel-64kb-devel-debuginfo-5.14.21-150500.55.88.1
- kernel-64kb-debuginfo-5.14.21-150500.55.88.1
- kernel-64kb-devel-5.14.21-150500.55.88.1
- kernel-64kb-debugsource-5.14.21-150500.55.88.1
-
Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64 nosrc)
- kernel-default-5.14.21-150500.55.88.1
-
Basesystem Module 15-SP5 (aarch64 ppc64le x86_64)
- kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4
-
Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
- kernel-default-debuginfo-5.14.21-150500.55.88.1
- kernel-default-devel-5.14.21-150500.55.88.1
- kernel-default-devel-debuginfo-5.14.21-150500.55.88.1
- kernel-default-debugsource-5.14.21-150500.55.88.1
-
Basesystem Module 15-SP5 (noarch)
- kernel-macros-5.14.21-150500.55.88.1
- kernel-devel-5.14.21-150500.55.88.1
-
Basesystem Module 15-SP5 (nosrc s390x)
- kernel-zfcpdump-5.14.21-150500.55.88.1
-
Basesystem Module 15-SP5 (s390x)
- kernel-zfcpdump-debugsource-5.14.21-150500.55.88.1
- kernel-zfcpdump-debuginfo-5.14.21-150500.55.88.1
-
Development Tools Module 15-SP5 (noarch nosrc)
- kernel-docs-5.14.21-150500.55.88.1
-
Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64)
- kernel-syms-5.14.21-150500.55.88.1
- kernel-obs-build-5.14.21-150500.55.88.1
- kernel-obs-build-debugsource-5.14.21-150500.55.88.1
-
Development Tools Module 15-SP5 (noarch)
- kernel-source-5.14.21-150500.55.88.1
-
Legacy Module 15-SP5 (nosrc)
- kernel-default-5.14.21-150500.55.88.1
-
Legacy Module 15-SP5 (aarch64)
- kernel-default-debuginfo-5.14.21-150500.55.88.1
- reiserfs-kmp-default-debuginfo-5.14.21-150500.55.88.1
- kernel-default-debugsource-5.14.21-150500.55.88.1
- reiserfs-kmp-default-5.14.21-150500.55.88.1
-
SUSE Linux Enterprise Live Patching 15-SP5 (nosrc)
- kernel-default-5.14.21-150500.55.88.1
-
SUSE Linux Enterprise Live Patching 15-SP5 (s390x x86_64)
- kernel-livepatch-5_14_21-150500_55_88-default-debuginfo-1-150500.11.5.1
- kernel-default-livepatch-5.14.21-150500.55.88.1
- kernel-default-debugsource-5.14.21-150500.55.88.1
- kernel-livepatch-5_14_21-150500_55_88-default-1-150500.11.5.1
- kernel-default-livepatch-devel-5.14.21-150500.55.88.1
- kernel-default-debuginfo-5.14.21-150500.55.88.1
- kernel-livepatch-SLE15-SP5_Update_21-debugsource-1-150500.11.5.1
-
SUSE Linux Enterprise High Availability Extension 15 SP5 (ppc64le x86_64)
- cluster-md-kmp-default-debuginfo-5.14.21-150500.55.88.1
- ocfs2-kmp-default-5.14.21-150500.55.88.1
- ocfs2-kmp-default-debuginfo-5.14.21-150500.55.88.1
- dlm-kmp-default-5.14.21-150500.55.88.1
- cluster-md-kmp-default-5.14.21-150500.55.88.1
- gfs2-kmp-default-5.14.21-150500.55.88.1
- dlm-kmp-default-debuginfo-5.14.21-150500.55.88.1
- gfs2-kmp-default-debuginfo-5.14.21-150500.55.88.1
- kernel-default-debugsource-5.14.21-150500.55.88.1
- kernel-default-debuginfo-5.14.21-150500.55.88.1
-
SUSE Linux Enterprise High Availability Extension 15 SP5 (nosrc)
- kernel-default-5.14.21-150500.55.88.1
References:
- https://www.suse.com/security/cve/CVE-2021-47416.html
- https://www.suse.com/security/cve/CVE-2021-47534.html
- https://www.suse.com/security/cve/CVE-2021-47594.html
- https://www.suse.com/security/cve/CVE-2022-3435.html
- https://www.suse.com/security/cve/CVE-2022-45934.html
- https://www.suse.com/security/cve/CVE-2022-48664.html
- https://www.suse.com/security/cve/CVE-2022-48674.html
- https://www.suse.com/security/cve/CVE-2022-48879.html
- https://www.suse.com/security/cve/CVE-2022-48946.html
- https://www.suse.com/security/cve/CVE-2022-48947.html
- https://www.suse.com/security/cve/CVE-2022-48948.html
- https://www.suse.com/security/cve/CVE-2022-48949.html
- https://www.suse.com/security/cve/CVE-2022-48951.html
- https://www.suse.com/security/cve/CVE-2022-48953.html
- https://www.suse.com/security/cve/CVE-2022-48954.html
- https://www.suse.com/security/cve/CVE-2022-48955.html
- https://www.suse.com/security/cve/CVE-2022-48956.html
- https://www.suse.com/security/cve/CVE-2022-48957.html
- https://www.suse.com/security/cve/CVE-2022-48958.html
- https://www.suse.com/security/cve/CVE-2022-48959.html
- https://www.suse.com/security/cve/CVE-2022-48960.html
- https://www.suse.com/security/cve/CVE-2022-48961.html
- https://www.suse.com/security/cve/CVE-2022-48962.html
- https://www.suse.com/security/cve/CVE-2022-48966.html
- https://www.suse.com/security/cve/CVE-2022-48967.html
- https://www.suse.com/security/cve/CVE-2022-48968.html
- https://www.suse.com/security/cve/CVE-2022-48969.html
- https://www.suse.com/security/cve/CVE-2022-48970.html
- https://www.suse.com/security/cve/CVE-2022-48971.html
- https://www.suse.com/security/cve/CVE-2022-48972.html
- https://www.suse.com/security/cve/CVE-2022-48973.html
- https://www.suse.com/security/cve/CVE-2022-48975.html
- https://www.suse.com/security/cve/CVE-2022-48977.html
- https://www.suse.com/security/cve/CVE-2022-48978.html
- https://www.suse.com/security/cve/CVE-2022-48979.html
- https://www.suse.com/security/cve/CVE-2022-48980.html
- https://www.suse.com/security/cve/CVE-2022-48981.html
- https://www.suse.com/security/cve/CVE-2022-48982.html
- https://www.suse.com/security/cve/CVE-2022-48983.html
- https://www.suse.com/security/cve/CVE-2022-48985.html
- https://www.suse.com/security/cve/CVE-2022-48987.html
- https://www.suse.com/security/cve/CVE-2022-48988.html
- https://www.suse.com/security/cve/CVE-2022-48989.html
- https://www.suse.com/security/cve/CVE-2022-48990.html
- https://www.suse.com/security/cve/CVE-2022-48991.html
- https://www.suse.com/security/cve/CVE-2022-48992.html
- https://www.suse.com/security/cve/CVE-2022-48994.html
- https://www.suse.com/security/cve/CVE-2022-48995.html
- https://www.suse.com/security/cve/CVE-2022-48997.html
- https://www.suse.com/security/cve/CVE-2022-48999.html
- https://www.suse.com/security/cve/CVE-2022-49000.html
- https://www.suse.com/security/cve/CVE-2022-49002.html
- https://www.suse.com/security/cve/CVE-2022-49003.html
- https://www.suse.com/security/cve/CVE-2022-49005.html
- https://www.suse.com/security/cve/CVE-2022-49006.html
- https://www.suse.com/security/cve/CVE-2022-49007.html
- https://www.suse.com/security/cve/CVE-2022-49010.html
- https://www.suse.com/security/cve/CVE-2022-49011.html
- https://www.suse.com/security/cve/CVE-2022-49012.html
- https://www.suse.com/security/cve/CVE-2022-49014.html
- https://www.suse.com/security/cve/CVE-2022-49015.html
- https://www.suse.com/security/cve/CVE-2022-49016.html
- https://www.suse.com/security/cve/CVE-2022-49017.html
- https://www.suse.com/security/cve/CVE-2022-49019.html
- https://www.suse.com/security/cve/CVE-2022-49020.html
- https://www.suse.com/security/cve/CVE-2022-49021.html
- https://www.suse.com/security/cve/CVE-2022-49022.html
- https://www.suse.com/security/cve/CVE-2022-49023.html
- https://www.suse.com/security/cve/CVE-2022-49024.html
- https://www.suse.com/security/cve/CVE-2022-49025.html
- https://www.suse.com/security/cve/CVE-2022-49026.html
- https://www.suse.com/security/cve/CVE-2022-49027.html
- https://www.suse.com/security/cve/CVE-2022-49028.html
- https://www.suse.com/security/cve/CVE-2022-49029.html
- https://www.suse.com/security/cve/CVE-2022-49031.html
- https://www.suse.com/security/cve/CVE-2022-49032.html
- https://www.suse.com/security/cve/CVE-2023-2166.html
- https://www.suse.com/security/cve/CVE-2023-28327.html
- https://www.suse.com/security/cve/CVE-2023-52766.html
- https://www.suse.com/security/cve/CVE-2023-52800.html
- https://www.suse.com/security/cve/CVE-2023-52881.html
- https://www.suse.com/security/cve/CVE-2023-52915.html
- https://www.suse.com/security/cve/CVE-2023-52917.html
- https://www.suse.com/security/cve/CVE-2023-52918.html
- https://www.suse.com/security/cve/CVE-2023-52919.html
- https://www.suse.com/security/cve/CVE-2023-52921.html
- https://www.suse.com/security/cve/CVE-2023-52922.html
- https://www.suse.com/security/cve/CVE-2023-6270.html
- https://www.suse.com/security/cve/CVE-2024-26782.html
- https://www.suse.com/security/cve/CVE-2024-26906.html
- https://www.suse.com/security/cve/CVE-2024-26953.html
- https://www.suse.com/security/cve/CVE-2024-27043.html
- https://www.suse.com/security/cve/CVE-2024-35888.html
- https://www.suse.com/security/cve/CVE-2024-35937.html
- https://www.suse.com/security/cve/CVE-2024-35980.html
- https://www.suse.com/security/cve/CVE-2024-36244.html
- https://www.suse.com/security/cve/CVE-2024-36484.html
- https://www.suse.com/security/cve/CVE-2024-36883.html
- https://www.suse.com/security/cve/CVE-2024-36886.html
- https://www.suse.com/security/cve/CVE-2024-36905.html
- https://www.suse.com/security/cve/CVE-2024-36953.html
- https://www.suse.com/security/cve/CVE-2024-36954.html
- https://www.suse.com/security/cve/CVE-2024-36957.html
- https://www.suse.com/security/cve/CVE-2024-38577.html
- https://www.suse.com/security/cve/CVE-2024-38589.html
- https://www.suse.com/security/cve/CVE-2024-38615.html
- https://www.suse.com/security/cve/CVE-2024-39476.html
- https://www.suse.com/security/cve/CVE-2024-40965.html
- https://www.suse.com/security/cve/CVE-2024-40997.html
- https://www.suse.com/security/cve/CVE-2024-41016.html
- https://www.suse.com/security/cve/CVE-2024-41023.html
- https://www.suse.com/security/cve/CVE-2024-41049.html
- https://www.suse.com/security/cve/CVE-2024-42131.html
- https://www.suse.com/security/cve/CVE-2024-42145.html
- https://www.suse.com/security/cve/CVE-2024-42226.html
- https://www.suse.com/security/cve/CVE-2024-42253.html
- https://www.suse.com/security/cve/CVE-2024-43817.html
- https://www.suse.com/security/cve/CVE-2024-43897.html
- https://www.suse.com/security/cve/CVE-2024-44931.html
- https://www.suse.com/security/cve/CVE-2024-44932.html
- https://www.suse.com/security/cve/CVE-2024-44947.html
- https://www.suse.com/security/cve/CVE-2024-44958.html
- https://www.suse.com/security/cve/CVE-2024-44964.html
- https://www.suse.com/security/cve/CVE-2024-44995.html
- https://www.suse.com/security/cve/CVE-2024-45016.html
- https://www.suse.com/security/cve/CVE-2024-45025.html
- https://www.suse.com/security/cve/CVE-2024-46678.html
- https://www.suse.com/security/cve/CVE-2024-46681.html
- https://www.suse.com/security/cve/CVE-2024-46716.html
- https://www.suse.com/security/cve/CVE-2024-46719.html
- https://www.suse.com/security/cve/CVE-2024-46754.html
- https://www.suse.com/security/cve/CVE-2024-46770.html
- https://www.suse.com/security/cve/CVE-2024-46775.html
- https://www.suse.com/security/cve/CVE-2024-46777.html
- https://www.suse.com/security/cve/CVE-2024-46800.html
- https://www.suse.com/security/cve/CVE-2024-46802.html
- https://www.suse.com/security/cve/CVE-2024-46804.html
- https://www.suse.com/security/cve/CVE-2024-46805.html
- https://www.suse.com/security/cve/CVE-2024-46807.html
- https://www.suse.com/security/cve/CVE-2024-46809.html
- https://www.suse.com/security/cve/CVE-2024-46810.html
- https://www.suse.com/security/cve/CVE-2024-46811.html
- https://www.suse.com/security/cve/CVE-2024-46812.html
- https://www.suse.com/security/cve/CVE-2024-46813.html
- https://www.suse.com/security/cve/CVE-2024-46814.html
- https://www.suse.com/security/cve/CVE-2024-46815.html
- https://www.suse.com/security/cve/CVE-2024-46816.html
- https://www.suse.com/security/cve/CVE-2024-46817.html
- https://www.suse.com/security/cve/CVE-2024-46818.html
- https://www.suse.com/security/cve/CVE-2024-46819.html
- https://www.suse.com/security/cve/CVE-2024-46821.html
- https://www.suse.com/security/cve/CVE-2024-46826.html
- https://www.suse.com/security/cve/CVE-2024-46828.html
- https://www.suse.com/security/cve/CVE-2024-46834.html
- https://www.suse.com/security/cve/CVE-2024-46835.html
- https://www.suse.com/security/cve/CVE-2024-46840.html
- https://www.suse.com/security/cve/CVE-2024-46841.html
- https://www.suse.com/security/cve/CVE-2024-46842.html
- https://www.suse.com/security/cve/CVE-2024-46848.html
- https://www.suse.com/security/cve/CVE-2024-46849.html
- https://www.suse.com/security/cve/CVE-2024-46853.html
- https://www.suse.com/security/cve/CVE-2024-46854.html
- https://www.suse.com/security/cve/CVE-2024-46855.html
- https://www.suse.com/security/cve/CVE-2024-46857.html
- https://www.suse.com/security/cve/CVE-2024-46859.html
- https://www.suse.com/security/cve/CVE-2024-46864.html
- https://www.suse.com/security/cve/CVE-2024-46871.html
- https://www.suse.com/security/cve/CVE-2024-47660.html
- https://www.suse.com/security/cve/CVE-2024-47661.html
- https://www.suse.com/security/cve/CVE-2024-47663.html
- https://www.suse.com/security/cve/CVE-2024-47664.html
- https://www.suse.com/security/cve/CVE-2024-47665.html
- https://www.suse.com/security/cve/CVE-2024-47667.html
- https://www.suse.com/security/cve/CVE-2024-47668.html
- https://www.suse.com/security/cve/CVE-2024-47669.html
- https://www.suse.com/security/cve/CVE-2024-47670.html
- https://www.suse.com/security/cve/CVE-2024-47671.html
- https://www.suse.com/security/cve/CVE-2024-47672.html
- https://www.suse.com/security/cve/CVE-2024-47673.html
- https://www.suse.com/security/cve/CVE-2024-47674.html
- https://www.suse.com/security/cve/CVE-2024-47679.html
- https://www.suse.com/security/cve/CVE-2024-47682.html
- https://www.suse.com/security/cve/CVE-2024-47684.html
- https://www.suse.com/security/cve/CVE-2024-47685.html
- https://www.suse.com/security/cve/CVE-2024-47692.html
- https://www.suse.com/security/cve/CVE-2024-47693.html
- https://www.suse.com/security/cve/CVE-2024-47695.html
- https://www.suse.com/security/cve/CVE-2024-47696.html
- https://www.suse.com/security/cve/CVE-2024-47697.html
- https://www.suse.com/security/cve/CVE-2024-47698.html
- https://www.suse.com/security/cve/CVE-2024-47699.html
- https://www.suse.com/security/cve/CVE-2024-47701.html
- https://www.suse.com/security/cve/CVE-2024-47704.html
- https://www.suse.com/security/cve/CVE-2024-47705.html
- https://www.suse.com/security/cve/CVE-2024-47706.html
- https://www.suse.com/security/cve/CVE-2024-47707.html
- https://www.suse.com/security/cve/CVE-2024-47709.html
- https://www.suse.com/security/cve/CVE-2024-47710.html
- https://www.suse.com/security/cve/CVE-2024-47712.html
- https://www.suse.com/security/cve/CVE-2024-47713.html
- https://www.suse.com/security/cve/CVE-2024-47718.html
- https://www.suse.com/security/cve/CVE-2024-47720.html
- https://www.suse.com/security/cve/CVE-2024-47723.html
- https://www.suse.com/security/cve/CVE-2024-47727.html
- https://www.suse.com/security/cve/CVE-2024-47728.html
- https://www.suse.com/security/cve/CVE-2024-47730.html
- https://www.suse.com/security/cve/CVE-2024-47735.html
- https://www.suse.com/security/cve/CVE-2024-47737.html
- https://www.suse.com/security/cve/CVE-2024-47738.html
- https://www.suse.com/security/cve/CVE-2024-47739.html
- https://www.suse.com/security/cve/CVE-2024-47742.html
- https://www.suse.com/security/cve/CVE-2024-47745.html
- https://www.suse.com/security/cve/CVE-2024-47747.html
- https://www.suse.com/security/cve/CVE-2024-47748.html
- https://www.suse.com/security/cve/CVE-2024-47749.html
- https://www.suse.com/security/cve/CVE-2024-47756.html
- https://www.suse.com/security/cve/CVE-2024-47757.html
- https://www.suse.com/security/cve/CVE-2024-49850.html
- https://www.suse.com/security/cve/CVE-2024-49851.html
- https://www.suse.com/security/cve/CVE-2024-49852.html
- https://www.suse.com/security/cve/CVE-2024-49855.html
- https://www.suse.com/security/cve/CVE-2024-49858.html
- https://www.suse.com/security/cve/CVE-2024-49860.html
- https://www.suse.com/security/cve/CVE-2024-49861.html
- https://www.suse.com/security/cve/CVE-2024-49863.html
- https://www.suse.com/security/cve/CVE-2024-49866.html
- https://www.suse.com/security/cve/CVE-2024-49867.html
- https://www.suse.com/security/cve/CVE-2024-49868.html
- https://www.suse.com/security/cve/CVE-2024-49870.html
- https://www.suse.com/security/cve/CVE-2024-49871.html
- https://www.suse.com/security/cve/CVE-2024-49875.html
- https://www.suse.com/security/cve/CVE-2024-49877.html
- https://www.suse.com/security/cve/CVE-2024-49879.html
- https://www.suse.com/security/cve/CVE-2024-49881.html
- https://www.suse.com/security/cve/CVE-2024-49882.html
- https://www.suse.com/security/cve/CVE-2024-49883.html
- https://www.suse.com/security/cve/CVE-2024-49884.html
- https://www.suse.com/security/cve/CVE-2024-49886.html
- https://www.suse.com/security/cve/CVE-2024-49890.html
- https://www.suse.com/security/cve/CVE-2024-49891.html
- https://www.suse.com/security/cve/CVE-2024-49892.html
- https://www.suse.com/security/cve/CVE-2024-49894.html
- https://www.suse.com/security/cve/CVE-2024-49895.html
- https://www.suse.com/security/cve/CVE-2024-49896.html
- https://www.suse.com/security/cve/CVE-2024-49897.html
- https://www.suse.com/security/cve/CVE-2024-49899.html
- https://www.suse.com/security/cve/CVE-2024-49900.html
- https://www.suse.com/security/cve/CVE-2024-49901.html
- https://www.suse.com/security/cve/CVE-2024-49902.html
- https://www.suse.com/security/cve/CVE-2024-49903.html
- https://www.suse.com/security/cve/CVE-2024-49905.html
- https://www.suse.com/security/cve/CVE-2024-49906.html
- https://www.suse.com/security/cve/CVE-2024-49907.html
- https://www.suse.com/security/cve/CVE-2024-49908.html
- https://www.suse.com/security/cve/CVE-2024-49909.html
- https://www.suse.com/security/cve/CVE-2024-49911.html
- https://www.suse.com/security/cve/CVE-2024-49912.html
- https://www.suse.com/security/cve/CVE-2024-49913.html
- https://www.suse.com/security/cve/CVE-2024-49914.html
- https://www.suse.com/security/cve/CVE-2024-49917.html
- https://www.suse.com/security/cve/CVE-2024-49918.html
- https://www.suse.com/security/cve/CVE-2024-49919.html
- https://www.suse.com/security/cve/CVE-2024-49920.html
- https://www.suse.com/security/cve/CVE-2024-49921.html
- https://www.suse.com/security/cve/CVE-2024-49922.html
- https://www.suse.com/security/cve/CVE-2024-49923.html
- https://www.suse.com/security/cve/CVE-2024-49924.html
- https://www.suse.com/security/cve/CVE-2024-49925.html
- https://www.suse.com/security/cve/CVE-2024-49929.html
- https://www.suse.com/security/cve/CVE-2024-49930.html
- https://www.suse.com/security/cve/CVE-2024-49933.html
- https://www.suse.com/security/cve/CVE-2024-49934.html
- https://www.suse.com/security/cve/CVE-2024-49935.html
- https://www.suse.com/security/cve/CVE-2024-49936.html
- https://www.suse.com/security/cve/CVE-2024-49938.html
- https://www.suse.com/security/cve/CVE-2024-49939.html
- https://www.suse.com/security/cve/CVE-2024-49945.html
- https://www.suse.com/security/cve/CVE-2024-49946.html
- https://www.suse.com/security/cve/CVE-2024-49947.html
- https://www.suse.com/security/cve/CVE-2024-49949.html
- https://www.suse.com/security/cve/CVE-2024-49950.html
- https://www.suse.com/security/cve/CVE-2024-49954.html
- https://www.suse.com/security/cve/CVE-2024-49955.html
- https://www.suse.com/security/cve/CVE-2024-49957.html
- https://www.suse.com/security/cve/CVE-2024-49958.html
- https://www.suse.com/security/cve/CVE-2024-49959.html
- https://www.suse.com/security/cve/CVE-2024-49960.html
- https://www.suse.com/security/cve/CVE-2024-49962.html
- https://www.suse.com/security/cve/CVE-2024-49963.html
- https://www.suse.com/security/cve/CVE-2024-49965.html
- https://www.suse.com/security/cve/CVE-2024-49966.html
- https://www.suse.com/security/cve/CVE-2024-49967.html
- https://www.suse.com/security/cve/CVE-2024-49968.html
- https://www.suse.com/security/cve/CVE-2024-49969.html
- https://www.suse.com/security/cve/CVE-2024-49973.html
- https://www.suse.com/security/cve/CVE-2024-49974.html
- https://www.suse.com/security/cve/CVE-2024-49975.html
- https://www.suse.com/security/cve/CVE-2024-49981.html
- https://www.suse.com/security/cve/CVE-2024-49982.html
- https://www.suse.com/security/cve/CVE-2024-49983.html
- https://www.suse.com/security/cve/CVE-2024-49985.html
- https://www.suse.com/security/cve/CVE-2024-49989.html
- https://www.suse.com/security/cve/CVE-2024-49991.html
- https://www.suse.com/security/cve/CVE-2024-49993.html
- https://www.suse.com/security/cve/CVE-2024-49995.html
- https://www.suse.com/security/cve/CVE-2024-49996.html
- https://www.suse.com/security/cve/CVE-2024-50000.html
- https://www.suse.com/security/cve/CVE-2024-50001.html
- https://www.suse.com/security/cve/CVE-2024-50002.html
- https://www.suse.com/security/cve/CVE-2024-50003.html
- https://www.suse.com/security/cve/CVE-2024-50006.html
- https://www.suse.com/security/cve/CVE-2024-50007.html
- https://www.suse.com/security/cve/CVE-2024-50008.html
- https://www.suse.com/security/cve/CVE-2024-50009.html
- https://www.suse.com/security/cve/CVE-2024-50013.html
- https://www.suse.com/security/cve/CVE-2024-50014.html
- https://www.suse.com/security/cve/CVE-2024-50017.html
- https://www.suse.com/security/cve/CVE-2024-50019.html
- https://www.suse.com/security/cve/CVE-2024-50024.html
- https://www.suse.com/security/cve/CVE-2024-50025.html
- https://www.suse.com/security/cve/CVE-2024-50026.html
- https://www.suse.com/security/cve/CVE-2024-50028.html
- https://www.suse.com/security/cve/CVE-2024-50031.html
- https://www.suse.com/security/cve/CVE-2024-50033.html
- https://www.suse.com/security/cve/CVE-2024-50035.html
- https://www.suse.com/security/cve/CVE-2024-50041.html
- https://www.suse.com/security/cve/CVE-2024-50044.html
- https://www.suse.com/security/cve/CVE-2024-50045.html
- https://www.suse.com/security/cve/CVE-2024-50046.html
- https://www.suse.com/security/cve/CVE-2024-50047.html
- https://www.suse.com/security/cve/CVE-2024-50048.html
- https://www.suse.com/security/cve/CVE-2024-50049.html
- https://www.suse.com/security/cve/CVE-2024-50055.html
- https://www.suse.com/security/cve/CVE-2024-50058.html
- https://www.suse.com/security/cve/CVE-2024-50059.html
- https://www.suse.com/security/cve/CVE-2024-50061.html
- https://www.suse.com/security/cve/CVE-2024-50062.html
- https://www.suse.com/security/cve/CVE-2024-50063.html
- https://www.suse.com/security/cve/CVE-2024-50067.html
- https://www.suse.com/security/cve/CVE-2024-50073.html
- https://www.suse.com/security/cve/CVE-2024-50074.html
- https://www.suse.com/security/cve/CVE-2024-50077.html
- https://www.suse.com/security/cve/CVE-2024-50078.html
- https://www.suse.com/security/cve/CVE-2024-50081.html
- https://www.suse.com/security/cve/CVE-2024-50082.html
- https://www.suse.com/security/cve/CVE-2024-50089.html
- https://www.suse.com/security/cve/CVE-2024-50093.html
- https://www.suse.com/security/cve/CVE-2024-50095.html
- https://www.suse.com/security/cve/CVE-2024-50096.html
- https://www.suse.com/security/cve/CVE-2024-50098.html
- https://www.suse.com/security/cve/CVE-2024-50099.html
- https://www.suse.com/security/cve/CVE-2024-50103.html
- https://www.suse.com/security/cve/CVE-2024-50108.html
- https://www.suse.com/security/cve/CVE-2024-50110.html
- https://www.suse.com/security/cve/CVE-2024-50115.html
- https://www.suse.com/security/cve/CVE-2024-50116.html
- https://www.suse.com/security/cve/CVE-2024-50117.html
- https://www.suse.com/security/cve/CVE-2024-50124.html
- https://www.suse.com/security/cve/CVE-2024-50125.html
- https://www.suse.com/security/cve/CVE-2024-50127.html
- https://www.suse.com/security/cve/CVE-2024-50128.html
- https://www.suse.com/security/cve/CVE-2024-50131.html
- https://www.suse.com/security/cve/CVE-2024-50134.html
- https://www.suse.com/security/cve/CVE-2024-50135.html
- https://www.suse.com/security/cve/CVE-2024-50138.html
- https://www.suse.com/security/cve/CVE-2024-50141.html
- https://www.suse.com/security/cve/CVE-2024-50146.html
- https://www.suse.com/security/cve/CVE-2024-50147.html
- https://www.suse.com/security/cve/CVE-2024-50148.html
- https://www.suse.com/security/cve/CVE-2024-50150.html
- https://www.suse.com/security/cve/CVE-2024-50153.html
- https://www.suse.com/security/cve/CVE-2024-50154.html
- https://www.suse.com/security/cve/CVE-2024-50155.html
- https://www.suse.com/security/cve/CVE-2024-50156.html
- https://www.suse.com/security/cve/CVE-2024-50160.html
- https://www.suse.com/security/cve/CVE-2024-50167.html
- https://www.suse.com/security/cve/CVE-2024-50171.html
- https://www.suse.com/security/cve/CVE-2024-50179.html
- https://www.suse.com/security/cve/CVE-2024-50180.html
- https://www.suse.com/security/cve/CVE-2024-50182.html
- https://www.suse.com/security/cve/CVE-2024-50183.html
- https://www.suse.com/security/cve/CVE-2024-50184.html
- https://www.suse.com/security/cve/CVE-2024-50186.html
- https://www.suse.com/security/cve/CVE-2024-50187.html
- https://www.suse.com/security/cve/CVE-2024-50188.html
- https://www.suse.com/security/cve/CVE-2024-50189.html
- https://www.suse.com/security/cve/CVE-2024-50192.html
- https://www.suse.com/security/cve/CVE-2024-50194.html
- https://www.suse.com/security/cve/CVE-2024-50195.html
- https://www.suse.com/security/cve/CVE-2024-50196.html
- https://www.suse.com/security/cve/CVE-2024-50198.html
- https://www.suse.com/security/cve/CVE-2024-50201.html
- https://www.suse.com/security/cve/CVE-2024-50205.html
- https://www.suse.com/security/cve/CVE-2024-50208.html
- https://www.suse.com/security/cve/CVE-2024-50209.html
- https://www.suse.com/security/cve/CVE-2024-50215.html
- https://www.suse.com/security/cve/CVE-2024-50218.html
- https://www.suse.com/security/cve/CVE-2024-50229.html
- https://www.suse.com/security/cve/CVE-2024-50230.html
- https://www.suse.com/security/cve/CVE-2024-50232.html
- https://www.suse.com/security/cve/CVE-2024-50233.html
- https://www.suse.com/security/cve/CVE-2024-50234.html
- https://www.suse.com/security/cve/CVE-2024-50236.html
- https://www.suse.com/security/cve/CVE-2024-50237.html
- https://www.suse.com/security/cve/CVE-2024-50249.html
- https://www.suse.com/security/cve/CVE-2024-50255.html
- https://www.suse.com/security/cve/CVE-2024-50259.html
- https://www.suse.com/security/cve/CVE-2024-50261.html
- https://www.suse.com/security/cve/CVE-2024-50264.html
- https://www.suse.com/security/cve/CVE-2024-50265.html
- https://www.suse.com/security/cve/CVE-2024-50267.html
- https://www.suse.com/security/cve/CVE-2024-50268.html
- https://www.suse.com/security/cve/CVE-2024-50269.html
- https://www.suse.com/security/cve/CVE-2024-50271.html
- https://www.suse.com/security/cve/CVE-2024-50273.html
- https://www.suse.com/security/cve/CVE-2024-50274.html
- https://www.suse.com/security/cve/CVE-2024-50279.html
- https://www.suse.com/security/cve/CVE-2024-50282.html
- https://www.suse.com/security/cve/CVE-2024-50287.html
- https://www.suse.com/security/cve/CVE-2024-50289.html
- https://www.suse.com/security/cve/CVE-2024-50290.html
- https://www.suse.com/security/cve/CVE-2024-50292.html
- https://www.suse.com/security/cve/CVE-2024-50295.html
- https://www.suse.com/security/cve/CVE-2024-50298.html
- https://www.suse.com/security/cve/CVE-2024-50301.html
- https://www.suse.com/security/cve/CVE-2024-50302.html
- https://www.suse.com/security/cve/CVE-2024-53052.html
- https://www.suse.com/security/cve/CVE-2024-53058.html
- https://www.suse.com/security/cve/CVE-2024-53059.html
- https://www.suse.com/security/cve/CVE-2024-53060.html
- https://www.suse.com/security/cve/CVE-2024-53061.html
- https://www.suse.com/security/cve/CVE-2024-53063.html
- https://www.suse.com/security/cve/CVE-2024-53066.html
- https://www.suse.com/security/cve/CVE-2024-53068.html
- https://www.suse.com/security/cve/CVE-2024-53079.html
- https://www.suse.com/security/cve/CVE-2024-53085.html
- https://www.suse.com/security/cve/CVE-2024-53088.html
- https://www.suse.com/security/cve/CVE-2024-53104.html
- https://www.suse.com/security/cve/CVE-2024-53110.html
- https://bugzilla.suse.com/show_bug.cgi?id=1054914
- https://bugzilla.suse.com/show_bug.cgi?id=1065729
- https://bugzilla.suse.com/show_bug.cgi?id=1082555
- https://bugzilla.suse.com/show_bug.cgi?id=1194869
- https://bugzilla.suse.com/show_bug.cgi?id=1204171
- https://bugzilla.suse.com/show_bug.cgi?id=1205796
- https://bugzilla.suse.com/show_bug.cgi?id=1206188
- https://bugzilla.suse.com/show_bug.cgi?id=1206344
- https://bugzilla.suse.com/show_bug.cgi?id=1209290
- https://bugzilla.suse.com/show_bug.cgi?id=1210449
- https://bugzilla.suse.com/show_bug.cgi?id=1210627
- https://bugzilla.suse.com/show_bug.cgi?id=1213034
- https://bugzilla.suse.com/show_bug.cgi?id=1216813
- https://bugzilla.suse.com/show_bug.cgi?id=1218562
- https://bugzilla.suse.com/show_bug.cgi?id=1218644
- https://bugzilla.suse.com/show_bug.cgi?id=1220382
- https://bugzilla.suse.com/show_bug.cgi?id=1221309
- https://bugzilla.suse.com/show_bug.cgi?id=1221333
- https://bugzilla.suse.com/show_bug.cgi?id=1222364
- https://bugzilla.suse.com/show_bug.cgi?id=1222590
- https://bugzilla.suse.com/show_bug.cgi?id=1223202
- https://bugzilla.suse.com/show_bug.cgi?id=1223384
- https://bugzilla.suse.com/show_bug.cgi?id=1223524
- https://bugzilla.suse.com/show_bug.cgi?id=1223656
- https://bugzilla.suse.com/show_bug.cgi?id=1223824
- https://bugzilla.suse.com/show_bug.cgi?id=1223848
- https://bugzilla.suse.com/show_bug.cgi?id=1223919
- https://bugzilla.suse.com/show_bug.cgi?id=1223942
- https://bugzilla.suse.com/show_bug.cgi?id=1224518
- https://bugzilla.suse.com/show_bug.cgi?id=1224526
- https://bugzilla.suse.com/show_bug.cgi?id=1224574
- https://bugzilla.suse.com/show_bug.cgi?id=1225189
- https://bugzilla.suse.com/show_bug.cgi?id=1225336
- https://bugzilla.suse.com/show_bug.cgi?id=1225611
- https://bugzilla.suse.com/show_bug.cgi?id=1225725
- https://bugzilla.suse.com/show_bug.cgi?id=1225730
- https://bugzilla.suse.com/show_bug.cgi?id=1225742
- https://bugzilla.suse.com/show_bug.cgi?id=1225762
- https://bugzilla.suse.com/show_bug.cgi?id=1225764
- https://bugzilla.suse.com/show_bug.cgi?id=1225812
- https://bugzilla.suse.com/show_bug.cgi?id=1226498
- https://bugzilla.suse.com/show_bug.cgi?id=1226560
- https://bugzilla.suse.com/show_bug.cgi?id=1226592
- https://bugzilla.suse.com/show_bug.cgi?id=1226631
- https://bugzilla.suse.com/show_bug.cgi?id=1226748
- https://bugzilla.suse.com/show_bug.cgi?id=1226797
- https://bugzilla.suse.com/show_bug.cgi?id=1226872
- https://bugzilla.suse.com/show_bug.cgi?id=1227437
- https://bugzilla.suse.com/show_bug.cgi?id=1227853
- https://bugzilla.suse.com/show_bug.cgi?id=1227885
- https://bugzilla.suse.com/show_bug.cgi?id=1228119
- https://bugzilla.suse.com/show_bug.cgi?id=1228269
- https://bugzilla.suse.com/show_bug.cgi?id=1228410
- https://bugzilla.suse.com/show_bug.cgi?id=1228430
- https://bugzilla.suse.com/show_bug.cgi?id=1228486
- https://bugzilla.suse.com/show_bug.cgi?id=1228650
- https://bugzilla.suse.com/show_bug.cgi?id=1228709
- https://bugzilla.suse.com/show_bug.cgi?id=1228743
- https://bugzilla.suse.com/show_bug.cgi?id=1228747
- https://bugzilla.suse.com/show_bug.cgi?id=1228857
- https://bugzilla.suse.com/show_bug.cgi?id=1229005
- https://bugzilla.suse.com/show_bug.cgi?id=1229019
- https://bugzilla.suse.com/show_bug.cgi?id=1229312
- https://bugzilla.suse.com/show_bug.cgi?id=1229429
- https://bugzilla.suse.com/show_bug.cgi?id=1229450
- https://bugzilla.suse.com/show_bug.cgi?id=1229454
- https://bugzilla.suse.com/show_bug.cgi?id=1229456
- https://bugzilla.suse.com/show_bug.cgi?id=1229556
- https://bugzilla.suse.com/show_bug.cgi?id=1229585
- https://bugzilla.suse.com/show_bug.cgi?id=1229752
- https://bugzilla.suse.com/show_bug.cgi?id=1229769
- https://bugzilla.suse.com/show_bug.cgi?id=1229808
- https://bugzilla.suse.com/show_bug.cgi?id=1229837
- https://bugzilla.suse.com/show_bug.cgi?id=1229891
- https://bugzilla.suse.com/show_bug.cgi?id=1230055
- https://bugzilla.suse.com/show_bug.cgi?id=1230179
- https://bugzilla.suse.com/show_bug.cgi?id=1230220
- https://bugzilla.suse.com/show_bug.cgi?id=1230231
- https://bugzilla.suse.com/show_bug.cgi?id=1230270
- https://bugzilla.suse.com/show_bug.cgi?id=1230289
- https://bugzilla.suse.com/show_bug.cgi?id=1230405
- https://bugzilla.suse.com/show_bug.cgi?id=1230414
- https://bugzilla.suse.com/show_bug.cgi?id=1230429
- https://bugzilla.suse.com/show_bug.cgi?id=1230456
- https://bugzilla.suse.com/show_bug.cgi?id=1230550
- https://bugzilla.suse.com/show_bug.cgi?id=1230558
- https://bugzilla.suse.com/show_bug.cgi?id=1230600
- https://bugzilla.suse.com/show_bug.cgi?id=1230620
- https://bugzilla.suse.com/show_bug.cgi?id=1230715
- https://bugzilla.suse.com/show_bug.cgi?id=1230722
- https://bugzilla.suse.com/show_bug.cgi?id=1230763
- https://bugzilla.suse.com/show_bug.cgi?id=1230773
- https://bugzilla.suse.com/show_bug.cgi?id=1230774
- https://bugzilla.suse.com/show_bug.cgi?id=1230801
- https://bugzilla.suse.com/show_bug.cgi?id=1230827
- https://bugzilla.suse.com/show_bug.cgi?id=1230903
- https://bugzilla.suse.com/show_bug.cgi?id=1230918
- https://bugzilla.suse.com/show_bug.cgi?id=1231016
- https://bugzilla.suse.com/show_bug.cgi?id=1231072
- https://bugzilla.suse.com/show_bug.cgi?id=1231073
- https://bugzilla.suse.com/show_bug.cgi?id=1231083
- https://bugzilla.suse.com/show_bug.cgi?id=1231084
- https://bugzilla.suse.com/show_bug.cgi?id=1231085
- https://bugzilla.suse.com/show_bug.cgi?id=1231087
- https://bugzilla.suse.com/show_bug.cgi?id=1231089
- https://bugzilla.suse.com/show_bug.cgi?id=1231094
- https://bugzilla.suse.com/show_bug.cgi?id=1231096
- https://bugzilla.suse.com/show_bug.cgi?id=1231098
- https://bugzilla.suse.com/show_bug.cgi?id=1231101
- https://bugzilla.suse.com/show_bug.cgi?id=1231105
- https://bugzilla.suse.com/show_bug.cgi?id=1231108
- https://bugzilla.suse.com/show_bug.cgi?id=1231111
- https://bugzilla.suse.com/show_bug.cgi?id=1231114
- https://bugzilla.suse.com/show_bug.cgi?id=1231115
- https://bugzilla.suse.com/show_bug.cgi?id=1231132
- https://bugzilla.suse.com/show_bug.cgi?id=1231135
- https://bugzilla.suse.com/show_bug.cgi?id=1231138
- https://bugzilla.suse.com/show_bug.cgi?id=1231148
- https://bugzilla.suse.com/show_bug.cgi?id=1231169
- https://bugzilla.suse.com/show_bug.cgi?id=1231178
- https://bugzilla.suse.com/show_bug.cgi?id=1231179
- https://bugzilla.suse.com/show_bug.cgi?id=1231180
- https://bugzilla.suse.com/show_bug.cgi?id=1231181
- https://bugzilla.suse.com/show_bug.cgi?id=1231187
- https://bugzilla.suse.com/show_bug.cgi?id=1231191
- https://bugzilla.suse.com/show_bug.cgi?id=1231193
- https://bugzilla.suse.com/show_bug.cgi?id=1231195
- https://bugzilla.suse.com/show_bug.cgi?id=1231197
- https://bugzilla.suse.com/show_bug.cgi?id=1231200
- https://bugzilla.suse.com/show_bug.cgi?id=1231202
- https://bugzilla.suse.com/show_bug.cgi?id=1231203
- https://bugzilla.suse.com/show_bug.cgi?id=1231277
- https://bugzilla.suse.com/show_bug.cgi?id=1231293
- https://bugzilla.suse.com/show_bug.cgi?id=1231327
- https://bugzilla.suse.com/show_bug.cgi?id=1231344
- https://bugzilla.suse.com/show_bug.cgi?id=1231375
- https://bugzilla.suse.com/show_bug.cgi?id=1231383
- https://bugzilla.suse.com/show_bug.cgi?id=1231434
- https://bugzilla.suse.com/show_bug.cgi?id=1231439
- https://bugzilla.suse.com/show_bug.cgi?id=1231441
- https://bugzilla.suse.com/show_bug.cgi?id=1231442
- https://bugzilla.suse.com/show_bug.cgi?id=1231452
- https://bugzilla.suse.com/show_bug.cgi?id=1231465
- https://bugzilla.suse.com/show_bug.cgi?id=1231474
- https://bugzilla.suse.com/show_bug.cgi?id=1231481
- https://bugzilla.suse.com/show_bug.cgi?id=1231496
- https://bugzilla.suse.com/show_bug.cgi?id=1231502
- https://bugzilla.suse.com/show_bug.cgi?id=1231537
- https://bugzilla.suse.com/show_bug.cgi?id=1231539
- https://bugzilla.suse.com/show_bug.cgi?id=1231540
- https://bugzilla.suse.com/show_bug.cgi?id=1231541
- https://bugzilla.suse.com/show_bug.cgi?id=1231578
- https://bugzilla.suse.com/show_bug.cgi?id=1231646
- https://bugzilla.suse.com/show_bug.cgi?id=1231673
- https://bugzilla.suse.com/show_bug.cgi?id=1231849
- https://bugzilla.suse.com/show_bug.cgi?id=1231856
- https://bugzilla.suse.com/show_bug.cgi?id=1231857
- https://bugzilla.suse.com/show_bug.cgi?id=1231858
- https://bugzilla.suse.com/show_bug.cgi?id=1231859
- https://bugzilla.suse.com/show_bug.cgi?id=1231861
- https://bugzilla.suse.com/show_bug.cgi?id=1231864
- https://bugzilla.suse.com/show_bug.cgi?id=1231872
- https://bugzilla.suse.com/show_bug.cgi?id=1231883
- https://bugzilla.suse.com/show_bug.cgi?id=1231885
- https://bugzilla.suse.com/show_bug.cgi?id=1231887
- https://bugzilla.suse.com/show_bug.cgi?id=1231888
- https://bugzilla.suse.com/show_bug.cgi?id=1231889
- https://bugzilla.suse.com/show_bug.cgi?id=1231890
- https://bugzilla.suse.com/show_bug.cgi?id=1231892
- https://bugzilla.suse.com/show_bug.cgi?id=1231893
- https://bugzilla.suse.com/show_bug.cgi?id=1231895
- https://bugzilla.suse.com/show_bug.cgi?id=1231896
- https://bugzilla.suse.com/show_bug.cgi?id=1231897
- https://bugzilla.suse.com/show_bug.cgi?id=1231902
- https://bugzilla.suse.com/show_bug.cgi?id=1231903
- https://bugzilla.suse.com/show_bug.cgi?id=1231904
- https://bugzilla.suse.com/show_bug.cgi?id=1231907
- https://bugzilla.suse.com/show_bug.cgi?id=1231914
- https://bugzilla.suse.com/show_bug.cgi?id=1231916
- https://bugzilla.suse.com/show_bug.cgi?id=1231920
- https://bugzilla.suse.com/show_bug.cgi?id=1231923
- https://bugzilla.suse.com/show_bug.cgi?id=1231929
- https://bugzilla.suse.com/show_bug.cgi?id=1231930
- https://bugzilla.suse.com/show_bug.cgi?id=1231931
- https://bugzilla.suse.com/show_bug.cgi?id=1231935
- https://bugzilla.suse.com/show_bug.cgi?id=1231936
- https://bugzilla.suse.com/show_bug.cgi?id=1231937
- https://bugzilla.suse.com/show_bug.cgi?id=1231938
- https://bugzilla.suse.com/show_bug.cgi?id=1231939
- https://bugzilla.suse.com/show_bug.cgi?id=1231940
- https://bugzilla.suse.com/show_bug.cgi?id=1231941
- https://bugzilla.suse.com/show_bug.cgi?id=1231942
- https://bugzilla.suse.com/show_bug.cgi?id=1231944
- https://bugzilla.suse.com/show_bug.cgi?id=1231947
- https://bugzilla.suse.com/show_bug.cgi?id=1231950
- https://bugzilla.suse.com/show_bug.cgi?id=1231952
- https://bugzilla.suse.com/show_bug.cgi?id=1231953
- https://bugzilla.suse.com/show_bug.cgi?id=1231954
- https://bugzilla.suse.com/show_bug.cgi?id=1231958
- https://bugzilla.suse.com/show_bug.cgi?id=1231959
- https://bugzilla.suse.com/show_bug.cgi?id=1231960
- https://bugzilla.suse.com/show_bug.cgi?id=1231961
- https://bugzilla.suse.com/show_bug.cgi?id=1231962
- https://bugzilla.suse.com/show_bug.cgi?id=1231965
- https://bugzilla.suse.com/show_bug.cgi?id=1231967
- https://bugzilla.suse.com/show_bug.cgi?id=1231968
- https://bugzilla.suse.com/show_bug.cgi?id=1231972
- https://bugzilla.suse.com/show_bug.cgi?id=1231973
- https://bugzilla.suse.com/show_bug.cgi?id=1231976
- https://bugzilla.suse.com/show_bug.cgi?id=1231978
- https://bugzilla.suse.com/show_bug.cgi?id=1231979
- https://bugzilla.suse.com/show_bug.cgi?id=1231987
- https://bugzilla.suse.com/show_bug.cgi?id=1231988
- https://bugzilla.suse.com/show_bug.cgi?id=1231990
- https://bugzilla.suse.com/show_bug.cgi?id=1231991
- https://bugzilla.suse.com/show_bug.cgi?id=1231992
- https://bugzilla.suse.com/show_bug.cgi?id=1231995
- https://bugzilla.suse.com/show_bug.cgi?id=1231996
- https://bugzilla.suse.com/show_bug.cgi?id=1231997
- https://bugzilla.suse.com/show_bug.cgi?id=1231998
- https://bugzilla.suse.com/show_bug.cgi?id=1232001
- https://bugzilla.suse.com/show_bug.cgi?id=1232004
- https://bugzilla.suse.com/show_bug.cgi?id=1232005
- https://bugzilla.suse.com/show_bug.cgi?id=1232006
- https://bugzilla.suse.com/show_bug.cgi?id=1232007
- https://bugzilla.suse.com/show_bug.cgi?id=1232013
- https://bugzilla.suse.com/show_bug.cgi?id=1232015
- https://bugzilla.suse.com/show_bug.cgi?id=1232016
- https://bugzilla.suse.com/show_bug.cgi?id=1232017
- https://bugzilla.suse.com/show_bug.cgi?id=1232025
- https://bugzilla.suse.com/show_bug.cgi?id=1232026
- https://bugzilla.suse.com/show_bug.cgi?id=1232027
- https://bugzilla.suse.com/show_bug.cgi?id=1232028
- https://bugzilla.suse.com/show_bug.cgi?id=1232033
- https://bugzilla.suse.com/show_bug.cgi?id=1232034
- https://bugzilla.suse.com/show_bug.cgi?id=1232035
- https://bugzilla.suse.com/show_bug.cgi?id=1232036
- https://bugzilla.suse.com/show_bug.cgi?id=1232037
- https://bugzilla.suse.com/show_bug.cgi?id=1232038
- https://bugzilla.suse.com/show_bug.cgi?id=1232039
- https://bugzilla.suse.com/show_bug.cgi?id=1232043
- https://bugzilla.suse.com/show_bug.cgi?id=1232047
- https://bugzilla.suse.com/show_bug.cgi?id=1232048
- https://bugzilla.suse.com/show_bug.cgi?id=1232049
- https://bugzilla.suse.com/show_bug.cgi?id=1232050
- https://bugzilla.suse.com/show_bug.cgi?id=1232056
- https://bugzilla.suse.com/show_bug.cgi?id=1232067
- https://bugzilla.suse.com/show_bug.cgi?id=1232069
- https://bugzilla.suse.com/show_bug.cgi?id=1232070
- https://bugzilla.suse.com/show_bug.cgi?id=1232071
- https://bugzilla.suse.com/show_bug.cgi?id=1232075
- https://bugzilla.suse.com/show_bug.cgi?id=1232076
- https://bugzilla.suse.com/show_bug.cgi?id=1232080
- https://bugzilla.suse.com/show_bug.cgi?id=1232083
- https://bugzilla.suse.com/show_bug.cgi?id=1232084
- https://bugzilla.suse.com/show_bug.cgi?id=1232085
- https://bugzilla.suse.com/show_bug.cgi?id=1232089
- https://bugzilla.suse.com/show_bug.cgi?id=1232094
- https://bugzilla.suse.com/show_bug.cgi?id=1232096
- https://bugzilla.suse.com/show_bug.cgi?id=1232097
- https://bugzilla.suse.com/show_bug.cgi?id=1232098
- https://bugzilla.suse.com/show_bug.cgi?id=1232104
- https://bugzilla.suse.com/show_bug.cgi?id=1232105
- https://bugzilla.suse.com/show_bug.cgi?id=1232108
- https://bugzilla.suse.com/show_bug.cgi?id=1232111
- https://bugzilla.suse.com/show_bug.cgi?id=1232114
- https://bugzilla.suse.com/show_bug.cgi?id=1232116
- https://bugzilla.suse.com/show_bug.cgi?id=1232119
- https://bugzilla.suse.com/show_bug.cgi?id=1232120
- https://bugzilla.suse.com/show_bug.cgi?id=1232123
- https://bugzilla.suse.com/show_bug.cgi?id=1232124
- https://bugzilla.suse.com/show_bug.cgi?id=1232126
- https://bugzilla.suse.com/show_bug.cgi?id=1232133
- https://bugzilla.suse.com/show_bug.cgi?id=1232134
- https://bugzilla.suse.com/show_bug.cgi?id=1232135
- https://bugzilla.suse.com/show_bug.cgi?id=1232136
- https://bugzilla.suse.com/show_bug.cgi?id=1232140
- https://bugzilla.suse.com/show_bug.cgi?id=1232141
- https://bugzilla.suse.com/show_bug.cgi?id=1232142
- https://bugzilla.suse.com/show_bug.cgi?id=1232145
- https://bugzilla.suse.com/show_bug.cgi?id=1232147
- https://bugzilla.suse.com/show_bug.cgi?id=1232149
- https://bugzilla.suse.com/show_bug.cgi?id=1232150
- https://bugzilla.suse.com/show_bug.cgi?id=1232151
- https://bugzilla.suse.com/show_bug.cgi?id=1232152
- https://bugzilla.suse.com/show_bug.cgi?id=1232154
- https://bugzilla.suse.com/show_bug.cgi?id=1232155
- https://bugzilla.suse.com/show_bug.cgi?id=1232159
- https://bugzilla.suse.com/show_bug.cgi?id=1232160
- https://bugzilla.suse.com/show_bug.cgi?id=1232162
- https://bugzilla.suse.com/show_bug.cgi?id=1232163
- https://bugzilla.suse.com/show_bug.cgi?id=1232164
- https://bugzilla.suse.com/show_bug.cgi?id=1232165
- https://bugzilla.suse.com/show_bug.cgi?id=1232170
- https://bugzilla.suse.com/show_bug.cgi?id=1232172
- https://bugzilla.suse.com/show_bug.cgi?id=1232174
- https://bugzilla.suse.com/show_bug.cgi?id=1232175
- https://bugzilla.suse.com/show_bug.cgi?id=1232180
- https://bugzilla.suse.com/show_bug.cgi?id=1232185
- https://bugzilla.suse.com/show_bug.cgi?id=1232187
- https://bugzilla.suse.com/show_bug.cgi?id=1232189
- https://bugzilla.suse.com/show_bug.cgi?id=1232191
- https://bugzilla.suse.com/show_bug.cgi?id=1232195
- https://bugzilla.suse.com/show_bug.cgi?id=1232196
- https://bugzilla.suse.com/show_bug.cgi?id=1232198
- https://bugzilla.suse.com/show_bug.cgi?id=1232199
- https://bugzilla.suse.com/show_bug.cgi?id=1232200
- https://bugzilla.suse.com/show_bug.cgi?id=1232201
- https://bugzilla.suse.com/show_bug.cgi?id=1232217
- https://bugzilla.suse.com/show_bug.cgi?id=1232218
- https://bugzilla.suse.com/show_bug.cgi?id=1232220
- https://bugzilla.suse.com/show_bug.cgi?id=1232221
- https://bugzilla.suse.com/show_bug.cgi?id=1232224
- https://bugzilla.suse.com/show_bug.cgi?id=1232229
- https://bugzilla.suse.com/show_bug.cgi?id=1232232
- https://bugzilla.suse.com/show_bug.cgi?id=1232233
- https://bugzilla.suse.com/show_bug.cgi?id=1232237
- https://bugzilla.suse.com/show_bug.cgi?id=1232251
- https://bugzilla.suse.com/show_bug.cgi?id=1232253
- https://bugzilla.suse.com/show_bug.cgi?id=1232254
- https://bugzilla.suse.com/show_bug.cgi?id=1232255
- https://bugzilla.suse.com/show_bug.cgi?id=1232259
- https://bugzilla.suse.com/show_bug.cgi?id=1232260
- https://bugzilla.suse.com/show_bug.cgi?id=1232262
- https://bugzilla.suse.com/show_bug.cgi?id=1232263
- https://bugzilla.suse.com/show_bug.cgi?id=1232264
- https://bugzilla.suse.com/show_bug.cgi?id=1232272
- https://bugzilla.suse.com/show_bug.cgi?id=1232279
- https://bugzilla.suse.com/show_bug.cgi?id=1232282
- https://bugzilla.suse.com/show_bug.cgi?id=1232285
- https://bugzilla.suse.com/show_bug.cgi?id=1232286
- https://bugzilla.suse.com/show_bug.cgi?id=1232287
- https://bugzilla.suse.com/show_bug.cgi?id=1232293
- https://bugzilla.suse.com/show_bug.cgi?id=1232304
- https://bugzilla.suse.com/show_bug.cgi?id=1232305
- https://bugzilla.suse.com/show_bug.cgi?id=1232307
- https://bugzilla.suse.com/show_bug.cgi?id=1232309
- https://bugzilla.suse.com/show_bug.cgi?id=1232310
- https://bugzilla.suse.com/show_bug.cgi?id=1232312
- https://bugzilla.suse.com/show_bug.cgi?id=1232313
- https://bugzilla.suse.com/show_bug.cgi?id=1232314
- https://bugzilla.suse.com/show_bug.cgi?id=1232316
- https://bugzilla.suse.com/show_bug.cgi?id=1232317
- https://bugzilla.suse.com/show_bug.cgi?id=1232318
- https://bugzilla.suse.com/show_bug.cgi?id=1232329
- https://bugzilla.suse.com/show_bug.cgi?id=1232332
- https://bugzilla.suse.com/show_bug.cgi?id=1232333
- https://bugzilla.suse.com/show_bug.cgi?id=1232334
- https://bugzilla.suse.com/show_bug.cgi?id=1232335
- https://bugzilla.suse.com/show_bug.cgi?id=1232337
- https://bugzilla.suse.com/show_bug.cgi?id=1232339
- https://bugzilla.suse.com/show_bug.cgi?id=1232342
- https://bugzilla.suse.com/show_bug.cgi?id=1232345
- https://bugzilla.suse.com/show_bug.cgi?id=1232349
- https://bugzilla.suse.com/show_bug.cgi?id=1232352
- https://bugzilla.suse.com/show_bug.cgi?id=1232354
- https://bugzilla.suse.com/show_bug.cgi?id=1232355
- https://bugzilla.suse.com/show_bug.cgi?id=1232357
- https://bugzilla.suse.com/show_bug.cgi?id=1232358
- https://bugzilla.suse.com/show_bug.cgi?id=1232359
- https://bugzilla.suse.com/show_bug.cgi?id=1232361
- https://bugzilla.suse.com/show_bug.cgi?id=1232362
- https://bugzilla.suse.com/show_bug.cgi?id=1232364
- https://bugzilla.suse.com/show_bug.cgi?id=1232366
- https://bugzilla.suse.com/show_bug.cgi?id=1232367
- https://bugzilla.suse.com/show_bug.cgi?id=1232368
- https://bugzilla.suse.com/show_bug.cgi?id=1232369
- https://bugzilla.suse.com/show_bug.cgi?id=1232370
- https://bugzilla.suse.com/show_bug.cgi?id=1232371
- https://bugzilla.suse.com/show_bug.cgi?id=1232374
- https://bugzilla.suse.com/show_bug.cgi?id=1232378
- https://bugzilla.suse.com/show_bug.cgi?id=1232381
- https://bugzilla.suse.com/show_bug.cgi?id=1232383
- https://bugzilla.suse.com/show_bug.cgi?id=1232385
- https://bugzilla.suse.com/show_bug.cgi?id=1232387
- https://bugzilla.suse.com/show_bug.cgi?id=1232392
- https://bugzilla.suse.com/show_bug.cgi?id=1232394
- https://bugzilla.suse.com/show_bug.cgi?id=1232395
- https://bugzilla.suse.com/show_bug.cgi?id=1232413
- https://bugzilla.suse.com/show_bug.cgi?id=1232416
- https://bugzilla.suse.com/show_bug.cgi?id=1232418
- https://bugzilla.suse.com/show_bug.cgi?id=1232424
- https://bugzilla.suse.com/show_bug.cgi?id=1232432
- https://bugzilla.suse.com/show_bug.cgi?id=1232435
- https://bugzilla.suse.com/show_bug.cgi?id=1232436
- https://bugzilla.suse.com/show_bug.cgi?id=1232442
- https://bugzilla.suse.com/show_bug.cgi?id=1232446
- https://bugzilla.suse.com/show_bug.cgi?id=1232483
- https://bugzilla.suse.com/show_bug.cgi?id=1232500
- https://bugzilla.suse.com/show_bug.cgi?id=1232501
- https://bugzilla.suse.com/show_bug.cgi?id=1232503
- https://bugzilla.suse.com/show_bug.cgi?id=1232504
- https://bugzilla.suse.com/show_bug.cgi?id=1232507
- https://bugzilla.suse.com/show_bug.cgi?id=1232519
- https://bugzilla.suse.com/show_bug.cgi?id=1232520
- https://bugzilla.suse.com/show_bug.cgi?id=1232552
- https://bugzilla.suse.com/show_bug.cgi?id=1232630
- https://bugzilla.suse.com/show_bug.cgi?id=1232631
- https://bugzilla.suse.com/show_bug.cgi?id=1232632
- https://bugzilla.suse.com/show_bug.cgi?id=1232757
- https://bugzilla.suse.com/show_bug.cgi?id=1232819
- https://bugzilla.suse.com/show_bug.cgi?id=1232860
- https://bugzilla.suse.com/show_bug.cgi?id=1232870
- https://bugzilla.suse.com/show_bug.cgi?id=1232873
- https://bugzilla.suse.com/show_bug.cgi?id=1232877
- https://bugzilla.suse.com/show_bug.cgi?id=1232878
- https://bugzilla.suse.com/show_bug.cgi?id=1232881
- https://bugzilla.suse.com/show_bug.cgi?id=1232884
- https://bugzilla.suse.com/show_bug.cgi?id=1232885
- https://bugzilla.suse.com/show_bug.cgi?id=1232887
- https://bugzilla.suse.com/show_bug.cgi?id=1232888
- https://bugzilla.suse.com/show_bug.cgi?id=1232890
- https://bugzilla.suse.com/show_bug.cgi?id=1232892
- https://bugzilla.suse.com/show_bug.cgi?id=1232896
- https://bugzilla.suse.com/show_bug.cgi?id=1232897
- https://bugzilla.suse.com/show_bug.cgi?id=1232905
- https://bugzilla.suse.com/show_bug.cgi?id=1232907
- https://bugzilla.suse.com/show_bug.cgi?id=1232919
- https://bugzilla.suse.com/show_bug.cgi?id=1232926
- https://bugzilla.suse.com/show_bug.cgi?id=1232928
- https://bugzilla.suse.com/show_bug.cgi?id=1232935
- https://bugzilla.suse.com/show_bug.cgi?id=1233035
- https://bugzilla.suse.com/show_bug.cgi?id=1233049
- https://bugzilla.suse.com/show_bug.cgi?id=1233051
- https://bugzilla.suse.com/show_bug.cgi?id=1233056
- https://bugzilla.suse.com/show_bug.cgi?id=1233057
- https://bugzilla.suse.com/show_bug.cgi?id=1233061
- https://bugzilla.suse.com/show_bug.cgi?id=1233063
- https://bugzilla.suse.com/show_bug.cgi?id=1233065
- https://bugzilla.suse.com/show_bug.cgi?id=1233067
- https://bugzilla.suse.com/show_bug.cgi?id=1233070
- https://bugzilla.suse.com/show_bug.cgi?id=1233073
- https://bugzilla.suse.com/show_bug.cgi?id=1233074
- https://bugzilla.suse.com/show_bug.cgi?id=1233100
- https://bugzilla.suse.com/show_bug.cgi?id=1233103
- https://bugzilla.suse.com/show_bug.cgi?id=1233104
- https://bugzilla.suse.com/show_bug.cgi?id=1233105
- https://bugzilla.suse.com/show_bug.cgi?id=1233106
- https://bugzilla.suse.com/show_bug.cgi?id=1233107
- https://bugzilla.suse.com/show_bug.cgi?id=1233108
- https://bugzilla.suse.com/show_bug.cgi?id=1233110
- https://bugzilla.suse.com/show_bug.cgi?id=1233111
- https://bugzilla.suse.com/show_bug.cgi?id=1233113
- https://bugzilla.suse.com/show_bug.cgi?id=1233114
- https://bugzilla.suse.com/show_bug.cgi?id=1233117
- https://bugzilla.suse.com/show_bug.cgi?id=1233123
- https://bugzilla.suse.com/show_bug.cgi?id=1233125
- https://bugzilla.suse.com/show_bug.cgi?id=1233129
- https://bugzilla.suse.com/show_bug.cgi?id=1233130
- https://bugzilla.suse.com/show_bug.cgi?id=1233134
- https://bugzilla.suse.com/show_bug.cgi?id=1233135
- https://bugzilla.suse.com/show_bug.cgi?id=1233150
- https://bugzilla.suse.com/show_bug.cgi?id=1233189
- https://bugzilla.suse.com/show_bug.cgi?id=1233191
- https://bugzilla.suse.com/show_bug.cgi?id=1233197
- https://bugzilla.suse.com/show_bug.cgi?id=1233205
- https://bugzilla.suse.com/show_bug.cgi?id=1233206
- https://bugzilla.suse.com/show_bug.cgi?id=1233209
- https://bugzilla.suse.com/show_bug.cgi?id=1233210
- https://bugzilla.suse.com/show_bug.cgi?id=1233211
- https://bugzilla.suse.com/show_bug.cgi?id=1233212
- https://bugzilla.suse.com/show_bug.cgi?id=1233214
- https://bugzilla.suse.com/show_bug.cgi?id=1233216
- https://bugzilla.suse.com/show_bug.cgi?id=1233238
- https://bugzilla.suse.com/show_bug.cgi?id=1233241
- https://bugzilla.suse.com/show_bug.cgi?id=1233253
- https://bugzilla.suse.com/show_bug.cgi?id=1233255
- https://bugzilla.suse.com/show_bug.cgi?id=1233293
- https://bugzilla.suse.com/show_bug.cgi?id=1233350
- https://bugzilla.suse.com/show_bug.cgi?id=1233452
- https://bugzilla.suse.com/show_bug.cgi?id=1233453
- https://bugzilla.suse.com/show_bug.cgi?id=1233454
- https://bugzilla.suse.com/show_bug.cgi?id=1233456
- https://bugzilla.suse.com/show_bug.cgi?id=1233457
- https://bugzilla.suse.com/show_bug.cgi?id=1233458
- https://bugzilla.suse.com/show_bug.cgi?id=1233460
- https://bugzilla.suse.com/show_bug.cgi?id=1233462
- https://bugzilla.suse.com/show_bug.cgi?id=1233463
- https://bugzilla.suse.com/show_bug.cgi?id=1233468
- https://bugzilla.suse.com/show_bug.cgi?id=1233471
- https://bugzilla.suse.com/show_bug.cgi?id=1233476
- https://bugzilla.suse.com/show_bug.cgi?id=1233478
- https://bugzilla.suse.com/show_bug.cgi?id=1233479
- https://bugzilla.suse.com/show_bug.cgi?id=1233481
- https://bugzilla.suse.com/show_bug.cgi?id=1233484
- https://bugzilla.suse.com/show_bug.cgi?id=1233487
- https://bugzilla.suse.com/show_bug.cgi?id=1233490
- https://bugzilla.suse.com/show_bug.cgi?id=1233491
- https://bugzilla.suse.com/show_bug.cgi?id=1233528
- https://bugzilla.suse.com/show_bug.cgi?id=1233548
- https://bugzilla.suse.com/show_bug.cgi?id=1233552
- https://bugzilla.suse.com/show_bug.cgi?id=1233553
- https://bugzilla.suse.com/show_bug.cgi?id=1233554
- https://bugzilla.suse.com/show_bug.cgi?id=1233555
- https://bugzilla.suse.com/show_bug.cgi?id=1233557
- https://bugzilla.suse.com/show_bug.cgi?id=1233560
- https://bugzilla.suse.com/show_bug.cgi?id=1233561
- https://bugzilla.suse.com/show_bug.cgi?id=1233570
- https://bugzilla.suse.com/show_bug.cgi?id=1233577
- https://bugzilla.suse.com/show_bug.cgi?id=1233580
- https://bugzilla.suse.com/show_bug.cgi?id=1233977
- https://bugzilla.suse.com/show_bug.cgi?id=1234012
- https://bugzilla.suse.com/show_bug.cgi?id=1234025
- https://bugzilla.suse.com/show_bug.cgi?id=1234085
- https://bugzilla.suse.com/show_bug.cgi?id=1234093
- https://bugzilla.suse.com/show_bug.cgi?id=1234098
- https://bugzilla.suse.com/show_bug.cgi?id=1234108
- https://jira.suse.com/browse/PED-1166
- https://jira.suse.com/browse/PED-1168
- https://jira.suse.com/browse/PED-1170
- https://jira.suse.com/browse/PED-1218
- https://jira.suse.com/browse/PED-1220
- https://jira.suse.com/browse/PED-1222
- https://jira.suse.com/browse/PED-1223
- https://jira.suse.com/browse/PED-1225
- https://jira.suse.com/browse/PED-2849