Security update for the Linux Kernel

Announcement ID: SUSE-SU-2025:0117-1
Release Date: 2025-01-15T09:07:51Z
Rating: important
References:
Cross-References:
CVSS scores:
  • CVE-2024-26924 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-26924 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-27397 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-35839 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-36908 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-36908 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  • CVE-2024-36915 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
  • CVE-2024-39480 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:L
  • CVE-2024-39480 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2024-41042 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-44934 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-44934 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2024-44996 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-44996 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-47678 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
  • CVE-2024-47678 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
  • CVE-2024-47678 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
  • CVE-2024-49854 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  • CVE-2024-49854 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2024-49854 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2024-49884 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-49884 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2024-49915 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2024-49915 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-49915 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-50016 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-50016 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-50018 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  • CVE-2024-50018 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-50039 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-50039 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-50047 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2024-50047 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2024-50143 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  • CVE-2024-50143 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
  • CVE-2024-50143 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2024-50154 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  • CVE-2024-50154 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2024-50154 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2024-50154 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2024-50202 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2024-50202 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-50202 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-50203 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  • CVE-2024-50203 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
  • CVE-2024-50203 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2024-50211 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2024-50211 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-50211 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  • CVE-2024-50228 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
  • CVE-2024-50228 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N
  • CVE-2024-50228 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2024-50256 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2024-50256 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-50256 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-50262 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  • CVE-2024-50262 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
  • CVE-2024-50262 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2024-50262 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2024-50272 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-50272 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-50278 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H
  • CVE-2024-50278 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  • CVE-2024-50279 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
  • CVE-2024-50279 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  • CVE-2024-50280 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-50280 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2024-53050 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-53050 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-53064 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-53064 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-53090 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-53090 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-53099 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2024-53099 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
  • CVE-2024-53099 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  • CVE-2024-53103 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-53103 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2024-53105 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-53111 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2024-53111 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-53111 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-53113 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-53113 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-53117 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-53117 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-53118 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-53118 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-53119 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-53119 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-53120 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-53120 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-53122 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-53122 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-53125 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-53126 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-53126 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2024-53127 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-53129 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-53129 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-53130 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-53130 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-53131 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-53131 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-53133 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-53133 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2024-53134 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-53134 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-53136 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-53136 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-53141 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2024-53141 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-53141 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2024-53142 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
  • CVE-2024-53142 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2024-53144 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-53146 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  • CVE-2024-53146 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2024-53146 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-53148 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  • CVE-2024-53148 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2024-53150 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  • CVE-2024-53150 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
  • CVE-2024-53150 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  • CVE-2024-53151 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
  • CVE-2024-53151 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
  • CVE-2024-53151 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-53154 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2024-53154 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-53154 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-53155 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
  • CVE-2024-53155 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
  • CVE-2024-53155 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  • CVE-2024-53156 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  • CVE-2024-53156 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2024-53156 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2024-53157 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2024-53157 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-53157 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-53158 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2024-53158 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
  • CVE-2024-53159 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
  • CVE-2024-53159 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
  • CVE-2024-53160 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
  • CVE-2024-53160 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
  • CVE-2024-53161 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
  • CVE-2024-53161 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
  • CVE-2024-53162 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  • CVE-2024-53162 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
  • CVE-2024-53166 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  • CVE-2024-53166 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2024-53169 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2024-53169 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-53171 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  • CVE-2024-53171 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2024-53171 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2024-53173 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  • CVE-2024-53173 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2024-53173 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2024-53174 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2024-53174 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-53179 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  • CVE-2024-53179 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2024-53179 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2024-53180 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2024-53180 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-53188 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2024-53188 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-53190 ( SUSE ): 1.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  • CVE-2024-53190 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L
  • CVE-2024-53191 ( SUSE ): 7.5 CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  • CVE-2024-53191 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
  • CVE-2024-53200 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2024-53200 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-53200 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-53201 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2024-53201 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-53201 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-53202 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
  • CVE-2024-53202 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
  • CVE-2024-53202 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-53206 ( SUSE ): 5.9 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  • CVE-2024-53206 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
  • CVE-2024-53206 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2024-53207 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2024-53207 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-53207 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-53208 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  • CVE-2024-53208 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2024-53209 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
  • CVE-2024-53209 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
  • CVE-2024-53210 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2024-53210 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-53210 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-53213 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
  • CVE-2024-53213 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
  • CVE-2024-53213 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2024-53214 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  • CVE-2024-53214 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2024-53215 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2024-53215 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-53216 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  • CVE-2024-53216 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
  • CVE-2024-53217 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2024-53217 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-53222 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2024-53222 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-53222 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-53224 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2024-53224 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-53229 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2024-53229 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-53234 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2024-53234 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-53237 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  • CVE-2024-53237 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2024-53237 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2024-53241 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
  • CVE-2024-53241 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
  • CVE-2024-56536 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2024-56536 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-56536 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-56539 ( SUSE ): 8.6 CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  • CVE-2024-56539 ( SUSE ): 8.0 CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  • CVE-2024-56549 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2024-56549 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-56549 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-56551 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  • CVE-2024-56551 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
  • CVE-2024-56562 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2024-56562 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-56566 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
  • CVE-2024-56566 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H
  • CVE-2024-56567 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2024-56567 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-56567 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-56576 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2024-56576 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-56582 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  • CVE-2024-56582 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2024-56582 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2024-56599 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2024-56599 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-56599 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-56604 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  • CVE-2024-56604 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2024-56604 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2024-56605 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  • CVE-2024-56605 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2024-56605 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2024-56645 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  • CVE-2024-56645 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2024-56667 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2024-56667 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-56667 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-56752 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2024-56752 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-56752 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-56754 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
  • CVE-2024-56754 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
  • CVE-2024-56754 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-56755 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  • CVE-2024-56755 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
  • CVE-2024-56755 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-56756 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
  • CVE-2024-56756 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
  • CVE-2024-56756 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-8805 ( SUSE ): 8.8 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • CVE-2024-8805 ( NVD ): 8.8 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • CVE-2024-8805 ( NVD ): 8.8 CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Affected Products:
  • openSUSE Leap 15.6
  • Public Cloud Module 15-SP6
  • SUSE Linux Enterprise Server 15 SP6
  • SUSE Linux Enterprise Server for SAP Applications 15 SP6

An update that solves 116 vulnerabilities, contains one feature and has 103 security fixes can now be installed.

Description:

The SUSE Linux Enterprise 15 SP6 Azure kernel was updated to receive various security bugfixes.

The following security bugs were fixed:

  • CVE-2024-26924: scsi: lpfc: Release hbalock before calling lpfc_worker_wake_up() (bsc#1225820).
  • CVE-2024-27397: netfilter: nf_tables: use timestamp to check for set element timeout (bsc#1224095).
  • CVE-2024-35839: kABI fix for netfilter: bridge: replace physindev with physinif in nf_bridge_info (bsc#1224726).
  • CVE-2024-36915: nfc: llcp: fix nfc_llcp_setsockopt() unsafe copies (bsc#1225758).
  • CVE-2024-41042: Prefer nft_chain_validate (bsc#1228526).
  • CVE-2024-44934: net: bridge: mcast: wait for previous gc cycles when removing port (bsc#1229809).
  • CVE-2024-44996: vsock: fix recursive ->recvmsg calls (bsc#1230205).
  • CVE-2024-47678: icmp: change the order of rate limits (bsc#1231854).
  • CVE-2024-50018: net: napi: Prevent overflow of napi_defer_hard_irqs (bsc#1232419).
  • CVE-2024-50039: kABI: Restore deleted EXPORT_SYMBOL(__qdisc_calculate_pkt_len) (bsc#1231909).
  • CVE-2024-50202: nilfs2: propagate directory read errors from nilfs_find_entry() (bsc#1233324).
  • CVE-2024-50256: netfilter: nf_reject_ipv6: fix potential crash in nf_send_reset6() (bsc#1233200).
  • CVE-2024-50262: bpf: Fix out-of-bounds write in trie_get_next_key() (bsc#1233239).
  • CVE-2024-50278, CVE-2024-50280: dm cache: fix flushing uninitialized delayed_work on cache_ctr error (bsc#1233467).
  • CVE-2024-50278: dm cache: fix potential out-of-bounds access on the first resume (bsc#1233467).
  • CVE-2024-53050: drm/i915/hdcp: Add encoder check in hdcp2_get_capability (bsc#1233546).
  • CVE-2024-53064: idpf: fix idpf_vc_core_init error path (bsc#1233558).
  • CVE-2024-53090: afs: Fix lock recursion (bsc#1233637).
  • CVE-2024-53099: bpf: Check validity of link->type in bpf_link_show_fdinfo() (bsc#1233772).
  • CVE-2024-53105: mm: page_alloc: move mlocked flag clearance into free_pages_prepare() (bsc#1234069).
  • CVE-2024-53111: mm/mremap: fix address wraparound in move_page_tables() (bsc#1234086).
  • CVE-2024-53113: mm: fix NULL pointer dereference in alloc_pages_bulk_noprof (bsc#1234077).
  • CVE-2024-53117: virtio/vsock: Improve MSG_ZEROCOPY error handling (bsc#1234079).
  • CVE-2024-53118: vsock: Fix sk_error_queue memory leak (bsc#1234071).
  • CVE-2024-53119: virtio/vsock: Fix accept_queue memory leak (bsc#1234073).
  • CVE-2024-53122: mptcp: cope racing subflow creation in mptcp_rcv_space_adjust (bsc#1234076).
  • CVE-2024-53125: bpf: sync_linked_regs() must preserve subreg_def (bsc#1234156).
  • CVE-2024-53130: nilfs2: fix null-ptr-deref in block_dirty_buffer tracepoint (bsc#1234219).
  • CVE-2024-53131: nilfs2: fix null-ptr-deref in block_touch_buffer tracepoint (bsc#1234220).
  • CVE-2024-53133: drm/amd/display: Handle dml allocation failure to avoid crash (bsc#1234221)
  • CVE-2024-53134: pmdomain: imx93-blk-ctrl: correct remove path (bsc#1234159).
  • CVE-2024-53141: netfilter: ipset: add missing range check in bitmap_ip_uadt (bsc#1234381).
  • CVE-2024-53160: rcu/kvfree: Fix data-race in __mod_timer / kvfree_call_rcu (bsc#1234810).
  • CVE-2024-53161: EDAC/bluefield: Fix potential integer overflow (bsc#1234856).
  • CVE-2024-53179: smb: client: fix use-after-free of signing key (bsc#1234921).
  • CVE-2024-53214: vfio/pci: Properly hide first-in-list PCIe extended capability (bsc#1235004).
  • CVE-2024-53216: nfsd: fix UAF when access ex_uuid or ex_stats (bsc#1235003).
  • CVE-2024-53222: zram: fix NULL pointer in comp_algorithm_show() (bsc#1234974).
  • CVE-2024-53234: erofs: handle NONHEAD !delta[1] lclusters gracefully (bsc#1235045).
  • CVE-2024-53240: xen/netfront: fix crash when removing device (bsc#1234281).
  • CVE-2024-53241: x86/xen: use new hypercall functions instead of hypercall page (bsc#1234282).
  • CVE-2024-56549: cachefiles: Fix NULL pointer dereference in object->file (bsc#1234912).
  • CVE-2024-56566: mm/slub: Avoid list corruption when removing a slab from the full list (bsc#1235033).
  • CVE-2024-56582: btrfs: fix use-after-free in btrfs_encoded_read_endio() (bsc#1235128).
  • CVE-2024-56599: wifi: ath10k: avoid NULL pointer error during sdio remove (bsc#1235138).
  • CVE-2024-56604: Bluetooth: RFCOMM: avoid leaving dangling sk pointer in rfcomm_sock_alloc() (bsc#1235056).
  • CVE-2024-56755: netfs/fscache: Add a memory barrier for FSCACHE_VOLUME_CREATING (bsc#1234920).

The following non-security bugs were fixed:

  • 9p: v9fs_fid_find: also lookup by inode if not found dentry (git-fixes).
  • accel/habanalabs: export dma-buf only if size/offset multiples of PAGE_SIZE (stable-fixes).
  • accel/habanalabs: fix debugfs files permissions (stable-fixes).
  • accel/habanalabs: increase HL_MAX_STR to 64 bytes to avoid warnings (stable-fixes).
  • accel/habanalabs/gaudi2: unsecure tpc count registers (stable-fixes).
  • acpi: nfit: vmalloc-out-of-bounds Read in acpi_nfit_ctl (git-fixes).
  • ACPI: PRM: Add PRM handler direct call support (jsc#PED-10467).
  • ACPI: resource: Fix memory resource type union access (git-fixes).
  • ACPI: x86: Add skip i2c clients quirk for Acer Iconia One 8 A1-840 (stable-fixes).
  • ACPI: x86: Clean up Asus entries in acpi_quirk_skip_dmi_ids[] (stable-fixes).
  • ACPI: x86: Make UART skip quirks work on PCI UARTs without an UID (stable-fixes).
  • ACPI/HMAT: Move HMAT messages to pr_debug() (bsc#1234294)
  • ACPICA: events/evxfregn: do not release the ContextMutex that was never acquired (git-fixes).
  • af_unix: Call manage_oob() for every skb in unix_stream_read_generic() (bsc#1234725).
  • afs: Automatically generate trace tag enums (git-fixes).
  • afs: Fix missing subdir edit when renamed between parent dirs (git-fixes).
  • ALSA hda/realtek: Add quirk for Framework F111:000C (stable-fixes).
  • ALSA: hda: Add HP MP9 G4 Retail System AMS to force connect list (stable-fixes).
  • ALSA: hda/hdmi: Yet more pin fix for HP EliteDesk 800 G4 (stable-fixes).
  • ALSA: hda/realtek: Add Framework Laptop 13 (Intel Core Ultra) to quirks (stable-fixes).
  • ALSA: hda/realtek: Fix headset mic on Acer Nitro 5 (stable-fixes).
  • ALSA: line6: Fix racy access to midibuf (stable-fixes).
  • ALSA: seq: Check UMP support for midi_version change (git-fixes).
  • ALSA: seq: oss: Fix races at processing SysEx messages (stable-fixes).
  • ALSA: seq: ump: Fix seq port updates per FB info notify (git-fixes).
  • ALSA: seq: ump: Use automatic cleanup of kfree() (stable-fixes).
  • ALSA: seq: ump: Use guard() for locking (stable-fixes).
  • ALSA: usb-audio: Add implicit feedback quirk for Yamaha THR5 (stable-fixes).
  • ALSA: usb-audio: Notify xrun for low-latency mode (git-fixes).
  • ALSA: usb-audio: Re-add ScratchAmp quirk entries (git-fixes).
  • ALSA: usb-audio: US16x08: Initialize array before use (git-fixes).
  • amdgpu/uvd: get ring reference from rq scheduler (git-fixes).
  • arch: consolidate arch_irq_work_raise prototypes (git-fixes).
  • arch: Introduce arch_{,try_}_cmpxchg128{,_local}() (bsc#1220773).
  • arch: Remove cmpxchg_double (bsc#1220773).
  • arm64: dts: imx8mp: correct sdhc ipg clk (git-fixes).
  • arm64: Ensure bits ASID[15:8] are masked out when the kernel uses (bsc#1234605)
  • arm64: Force position-independent veneers (git-fixes).
  • ASoC: amd: yc: Add a quirk for microfone on Lenovo ThinkPad P14s Gen 5 21MES00B00 (stable-fixes).
  • ASoC: amd: yc: Add quirk for microphone on Lenovo Thinkpad T14s Gen 6 21M1CTO1WW (stable-fixes).
  • ASoC: amd: yc: fix internal mic on Redmi G 2022 (stable-fixes).
  • ASoC: amd: yc: Fix the wrong return value (git-fixes).
  • ASoC: amd: yc: Support mic on HP 14-em0002la (stable-fixes).
  • ASoC: amd: yc: Support mic on Lenovo Thinkpad E14 Gen 6 (stable-fixes).
  • ASoC: codecs: wcd938x-sdw: Correct Soundwire ports mask (git-fixes).
  • ASoC: codecs: wsa881x: Correct Soundwire ports mask (git-fixes).
  • ASoC: codecs: wsa883x: Correct Soundwire ports mask (git-fixes).
  • ASoC: codecs: wsa884x: Correct Soundwire ports mask (git-fixes).
  • ASoC: cs35l56: Handle OTP read latency over SoundWire (stable-fixes).
  • ASoC: cs35l56: Patch CS35L56_IRQ1_MASK_18 to the default value (stable-fixes).
  • ASoC: fsl_micfil: Expand the range of FIFO watermark mask (stable-fixes).
  • ASoC: hdmi-codec: reorder channel allocation list (stable-fixes).
  • ASoC: Intel: sof_sdw: add quirk for Dell SKU 0B8C (stable-fixes).
  • ASoC: Intel: sof_sdw: fix jack detection on ADL-N variant RVP (stable-fixes).
  • ASoC: meson: axg-fifo: fix irq scheduling issue with PREEMPT_RT (git-fixes).
  • ASoC: nau8822: Lower debug print priority (stable-fixes).
  • ASoC: SOF: Remove libraries from topology lookups (git-fixes).
  • autofs: fix memory leak of waitqueues in autofs_catatonic_mode (git-fixes).
  • batman-adv: Do not let TT changes list grows indefinitely (git-fixes).
  • batman-adv: Do not send uninitialized TT changes (git-fixes).
  • batman-adv: Remove uninitialized data in full table TT response (git-fixes).
  • blk-cgroup: Fix UAF in blkcg_unpin_online() (bsc#1234726).
  • blk-core: use pr_warn_ratelimited() in bio_check_ro() (bsc#1234139).
  • blk-iocost: do not WARN if iocg was already offlined (bsc#1234147).
  • blk-iocost: Fix an UBSAN shift-out-of-bounds warning (bsc#1234144).
  • blk-throttle: fix lockdep warning of "cgroup_mutex or RCU read lock required!" (bsc#1234140).
  • block, bfq: choose the last bfqq from merge chain in bfq_setup_cooperator() (bsc#1234149).
  • block, bfq: do not break merge chain in bfq_split_bfqq() (bsc#1234150).
  • block, bfq: fix bfqq uaf in bfq_limit_depth() (bsc#1234160).
  • block, bfq: fix procress reference leakage for bfqq in merge chain (bsc#1234280).
  • block, bfq: fix uaf for accessing waker_bfqq after splitting (bsc#1234279).
  • block: Call .limit_depth() after .hctx has been set (bsc#1234148).
  • block: Fix where bio IO priority gets set (bsc#1234145).
  • block: prevent an integer overflow in bvec_try_merge_hw_page (bsc#1234142).
  • block: update the stable_writes flag in bdev_add (bsc#1234141).
  • block/mq-deadline: Fix the tag reservation code (bsc#1234148).
  • Bluetooth: btusb: Add RTL8852BE device 0489:e123 to device tables (stable-fixes).
  • Bluetooth: Fix type of len in rfcomm_sock_getsockopt{,_old}() (stable-fixes).
  • Bluetooth: hci_core: Fix not checking skb length on hci_acldata_packet (stable-fixes).
  • Bluetooth: hci_event: Fix using rcu_read_(un)lock while iterating (git-fixes).
  • Bluetooth: iso: Fix recursive locking warning (git-fixes).
  • Bluetooth: ISO: Reassociate a socket with an active BIS (stable-fixes).
  • Bluetooth: L2CAP: do not leave dangling sk pointer on error in l2cap_sock_create() (stable-fixes).
  • Bluetooth: MGMT: Fix possible deadlocks (git-fixes).
  • Bluetooth: SCO: Add support for 16 bits transparent voice setting (git-fixes).
  • bnxt_en: Fix receive ring space parameters when XDP is active (git-fixes).
  • bnxt_en: Reserve rings after PCIe AER recovery if NIC interface is down (git-fixes).
  • bnxt_en: Set backplane link modes correctly for ethtool (git-fixes).
  • bpf, x86: Fix PROBE_MEM runtime load check (git-fixes).
  • bpf: verifier: prevent userspace memory access (git-fixes).
  • btrfs: fix use-after-free waiting for encoded read endios (bsc#1235128)
  • can: gs_usb: add VID/PID for Xylanta SAINT3 product family (stable-fixes).
  • can: j1939: fix error in J1939 documentation (stable-fixes).
  • checkpatch: always parse orig_commit in fixes tag (git-fixes).
  • checkpatch: check for missing Fixes tags (stable-fixes).
  • clocksource/drivers:sp804: Make user selectable (git-fixes).
  • clocksource/drivers/timer-ti-dm: Fix child node refcount handling (git-fixes).
  • counter: stm32-timer-cnt: Add check for clk_enable() (git-fixes).
  • counter: ti-ecap-capture: Add check for clk_enable() (git-fixes).
  • crypto: qat - disable IOV in adf_dev_stop() (git-fixes).
  • crypto: x86/sha256 - Add parentheses around macros' single arguments (stable-fixes).
  • cyrpto/b128ops: Remove struct u128 (bsc#1220773).
  • devlink: Fix length of eswitch inline-mode (git-fixes).
  • dma-buf: fix dma_fence_array_signaled v4 (stable-fixes).
  • dma-debug: fix a possible deadlock on radix_lock (stable-fixes).
  • dmaengine: apple-admac: Avoid accessing registers in probe (git-fixes).
  • dmaengine: at_xdmac: avoid null_prt_deref in at_xdmac_prep_dma_memset (git-fixes).
  • dmaengine: dw: Select only supported masters for ACPI devices (git-fixes).
  • dmaengine: idxd: Check for driver name match before sva user feature (bsc#1234357).
  • dmaengine: mv_xor: fix child node refcount handling in early exit (git-fixes).
  • dmaengine: tegra: Return correct DMA status when paused (git-fixes).
  • Documentation: PM: Clarify pm_runtime_resume_and_get() return value (git-fixes).
  • driver core: Add FWLINK_FLAG_IGNORE to completely ignore a fwnode link (stable-fixes).
  • driver core: fw_devlink: Improve logs for cycle detection (stable-fixes).
  • driver core: fw_devlink: Stop trying to optimize cycle detection logic (git-fixes).
  • Drivers: hv: util: Avoid accessing a ringbuffer not initialized yet (git-fixes).
  • drivers: net: ionic: add missed debugfs cleanup to ionic_probe() error path (git-fixes).
  • drm: adv7511: Drop dsi single lane support (git-fixes).
  • drm: adv7511: Fix use-after-free in adv7533_attach_dsi() (git-fixes).
  • drm: panel-orientation-quirks: Add quirk for AYA NEO 2 model (stable-fixes).
  • drm: panel-orientation-quirks: Add quirk for AYA NEO Founder edition (stable-fixes).
  • drm: panel-orientation-quirks: Add quirk for AYA NEO GEEK (stable-fixes).
  • drm: panel-orientation-quirks: Make Lenovo Yoga Tab 3 X90F DMI match less strict (stable-fixes).
  • drm/amd/display: Add HDR workaround for specific eDP (stable-fixes).
  • drm/amd/display: Add NULL check for clk_mgr in dcn32_init_hw (stable-fixes).
  • drm/amd/display: Allow backlight to go below AMDGPU_DM_DEFAULT_MIN_BACKLIGHT (stable-fixes).
  • drm/amd/display: Avoid overflow assignment in link_dp_cts (stable-fixes).
  • drm/amd/display: Fix Synaptics Cascaded Panamera DSC Determination (stable-fixes).
  • drm/amd/display: Revert Avoid overflow assignment (stable-fixes).
  • drm/amd/display: Use gpuvm_min_page_size_kbytes for DML2 surfaces (stable-fixes).
  • drm/amd/pm: fix the high voltage issue after unload (stable-fixes).
  • drm/amd/pm: update current_socclk and current_uclk in gpu_metrics on smu v13.0.7 (stable-fixes).
  • drm/amdgpu: add raven1 gfxoff quirk (stable-fixes).
  • drm/amdgpu: add smu 14.0.1 discovery support (stable-fixes).
  • drm/amdgpu: Block MMR_READ IOCTL in reset (stable-fixes).
  • drm/amdgpu: clear RB_OVERFLOW bit when enabling interrupts for vega20_ih (stable-fixes).
  • drm/amdgpu: Dereference the ATCS ACPI buffer (stable-fixes).
  • drm/amdgpu: differentiate external rev id for gfx 11.5.0 (stable-fixes).
  • drm/amdgpu: disallow multiple BO_HANDLES chunks in one submit (stable-fixes).
  • drm/amdgpu: do not access invalid sched (git-fixes).
  • drm/amdgpu: enable gfxoff quirk on HP 705G4 (stable-fixes).
  • drm/amdgpu: fix unchecked return value warning for amdgpu_gfx (stable-fixes).
  • drm/amdgpu: fix usage slab after free (stable-fixes).
  • drm/amdgpu: prevent BO_HANDLES error from being overwritten (git-fixes).
  • drm/amdgpu: refine error handling in amdgpu_ttm_tt_pin_userptr (stable-fixes).
  • drm/amdgpu: set the right AMDGPU sg segment limitation (stable-fixes).
  • drm/amdgpu: skip amdgpu_device_cache_pci_state under sriov (stable-fixes).
  • drm/amdgpu/gfx10: use rlc safe mode for soft recovery (stable-fixes).
  • drm/amdgpu/gfx11: use rlc safe mode for soft recovery (stable-fixes).
  • drm/amdgpu/gfx9: properly handle error ints on all pipes (stable-fixes).
  • drm/amdgpu/gfx9: use rlc safe mode for soft recovery (stable-fixes).
  • drm/amdgpu/hdp5.2: do a posting read when flushing HDP (stable-fixes).
  • drm/amdgpu/pm: Remove gpu_od if it's an empty directory (stable-fixes).
  • drm/amdgpu/umsch: do not execute umsch test when GPU is in reset/suspend (stable-fixes).
  • drm/amdgpu/umsch: reinitialize write pointer in hw init (stable-fixes).
  • drm/amdgpu/vcn: reset fw_shared when VCPU buffers corrupted on vcn v4.0.3 (stable-fixes).
  • drm/amdkfd: Fix resource leak in criu restore queue (stable-fixes).
  • drm/amdkfd: pause autosuspend when creating pdd (stable-fixes).
  • drm/amdkfd: Use device based logging for errors (stable-fixes).
  • drm/amdkfd: Use the correct wptr size (stable-fixes).
  • drm/bridge: adv7511_audio: Update Audio InfoFrame properly (git-fixes).
  • drm/bridge: it6505: Enable module autoloading (stable-fixes).
  • drm/bridge: it6505: Fix inverted reset polarity (git-fixes).
  • drm/bridge: it6505: update usleep_range for RC circuit charge time (stable-fixes).
  • drm/display: Fix building with GCC 15 (stable-fixes).
  • drm/dp_mst: Ensure mst_primary pointer is valid in drm_dp_mst_handle_up_req() (stable-fixes).
  • drm/dp_mst: Fix MST sideband message body length check (stable-fixes).
  • drm/dp_mst: Fix resetting msg rx state after topology removal (git-fixes).
  • drm/dp_mst: Verify request type in the corresponding down message reply (stable-fixes).
  • drm/etnaviv: flush shader L1 cache after user commandstream (stable-fixes).
  • drm/i915: Fix memory leak by correcting cache object name in error handler (git-fixes).
  • drm/i915: Fix NULL pointer dereference in capture_engine (git-fixes).
  • drm/i915/dg1: Fix power gate sequence (git-fixes).
  • drm/mcde: Enable module autoloading (stable-fixes).
  • drm/modes: Avoid divide by zero harder in drm_mode_vrefresh() (stable-fixes).
  • drm/nouveau/gsp: Use the sg allocator for level 2 of radix3 (stable-fixes).
  • drm/panel: novatek-nt35950: fix return value check in nt35950_probe() (git-fixes).
  • drm/panel: simple: Add Microchip AC69T88A LVDS Display panel (stable-fixes).
  • drm/printer: Allow NULL data in devcoredump printer (stable-fixes).
  • drm/radeon: add helper rdev_to_drm(rdev) (stable-fixes).
  • drm/radeon: change rdev->ddev to rdev_to_drm(rdev) (stable-fixes).
  • drm/radeon: Fix spurious unplug event on radeon HDMI (git-fixes).
  • drm/radeon/r100: Handle unknown family in r100_cp_init_microcode() (stable-fixes).
  • drm/radeon/r600_cs: Fix possible int overflow in r600_packet3_check() (stable-fixes).
  • drm/sched: memset() 'job' in drm_sched_job_init() (stable-fixes).
  • drm/vc4: hdmi: Avoid log spam for audio start failure (stable-fixes).
  • drm/vc4: hvs: Set AXI panic modes for the HVS (stable-fixes).
  • erofs: avoid debugging output for (de)compressed data (git-fixes).
  • exfat: fix uninit-value in __exfat_get_dentry_set (git-fixes).
  • ext4: add a new helper to check if es must be kept (bsc#1234170).
  • ext4: add correct group descriptors and reserved GDT blocks to system zone (bsc#1234164).
  • ext4: add missed brelse in update_backups (bsc#1234171).
  • ext4: allow for the last group to be marked as trimmed (bsc#1234278).
  • ext4: avoid buffer_head leak in ext4_mark_inode_used() (bsc#1234191).
  • ext4: avoid excessive credit estimate in ext4_tmpfile() (bsc#1234180).
  • ext4: avoid negative min_clusters in find_group_orlov() (bsc#1234193).
  • ext4: avoid overlapping preallocations due to overflow (bsc#1234162).
  • ext4: avoid potential buffer_head leak in __ext4_new_inode() (bsc#1234192).
  • ext4: avoid writing unitialized memory to disk in EA inodes (bsc#1234187).
  • ext4: check the extent status again before inserting delalloc block (bsc#1234186).
  • ext4: clear EXT4_GROUP_INFO_WAS_TRIMMED_BIT even mount with discard (bsc#1234190).
  • ext4: convert to exclusive lock while inserting delalloc extents (bsc#1234178).
  • ext4: correct best extent lstart adjustment logic (bsc#1234179).
  • ext4: correct grp validation in ext4_mb_good_group (bsc#1234163).
  • ext4: correct return value of ext4_convert_meta_bg (bsc#1234172).
  • ext4: correct the hole length returned by ext4_map_blocks() (bsc#1234178).
  • ext4: correct the start block of counting reserved clusters (bsc#1234169).
  • ext4: do not let fstrim block system suspend (https://bugzilla.kernel.org/show_bug.cgi?id=216322 bsc#1234166).
  • ext4: do not trim the group with corrupted block bitmap (bsc#1234177).
  • ext4: factor out __es_alloc_extent() and __es_free_extent() (bsc#1234170).
  • ext4: factor out a common helper to query extent map (bsc#1234186).
  • ext4: fix inconsistent between segment fstrim and full fstrim (bsc#1234176).
  • ext4: fix incorrect tid assumption in __jbd2_log_wait_for_space() (bsc#1234188).
  • ext4: fix incorrect tid assumption in ext4_wait_for_tail_page_commit() (bsc#1234188).
  • ext4: fix incorrect tid assumption in jbd2_journal_shrink_checkpoint_list() (bsc#1234188).
  • ext4: fix memory leaks in ext4_fname_{setup_filename,prepare_lookup} (bsc#1214954).
  • ext4: fix potential unnitialized variable (bsc#1234183).
  • ext4: fix race between writepages and remount (bsc#1234168).
  • ext4: fix rec_len verify error (bsc#1234167).
  • ext4: fix slab-use-after-free in ext4_es_insert_extent() (bsc#1234170).
  • ext4: fix uninitialized variable in ext4_inlinedir_to_tree (bsc#1234185).
  • ext4: forbid commit inconsistent quota data when errors=remount-ro (bsc#1234178).
  • ext4: make ext4_es_insert_delayed_block() return void (bsc#1234170).
  • ext4: make ext4_es_insert_extent() return void (bsc#1234170).
  • ext4: make ext4_es_remove_extent() return void (bsc#1234170).
  • ext4: make ext4_zeroout_es() return void (bsc#1234170).
  • ext4: make sure allocate pending entry not fail (bsc#1234170).
  • ext4: mark buffer new if it is unwritten to avoid stale data exposure (bsc#1234175).
  • ext4: move 'ix' sanity check to corrent position (bsc#1234174).
  • ext4: move setting of trimmed bit into ext4_try_to_trim_range() (bsc#1234165).
  • ext4: nested locking for xattr inode (bsc#1234189).
  • ext4: propagate errors from ext4_find_extent() in ext4_insert_range() (bsc#1234194).
  • ext4: refactor ext4_da_map_blocks() (bsc#1234178).
  • ext4: remove gdb backup copy for meta bg in setup_new_flex_group_blocks (bsc#1234173).
  • ext4: remove the redundant folio_wait_stable() (bsc#1234184).
  • ext4: set the type of max_zeroout to unsigned int to avoid overflow (bsc#1234182).
  • ext4: set type of ac_groups_linear_remaining to __u32 to avoid overflow (bsc#1234181).
  • ext4: use pre-allocated es in __es_insert_extent() (bsc#1234170).
  • ext4: use pre-allocated es in __es_remove_extent() (bsc#1234170).
  • ext4: using nofail preallocation in ext4_es_insert_delayed_block() (bsc#1234170).
  • ext4: using nofail preallocation in ext4_es_insert_extent() (bsc#1234170).
  • ext4: using nofail preallocation in ext4_es_remove_extent() (bsc#1234170).
  • filemap: add a per-mapping stable writes flag (bsc#1234141).
  • filemap: Fix bounds checking in filemap_read() (bsc#1234209).
  • firmware: arm_scmi: Reject clear channel request on A2P (stable-fixes).
  • fs-writeback: do not requeue a clean inode having skipped pages (bsc#1234200).
  • fs/writeback: bail out if there is no more inodes for IO and queued once (bsc#1234207).
  • fsnotify: fix sending inotify event with unexpected filename (bsc#1234198).
  • genirq/cpuhotplug: Retry with cpu_online_mask when migration fails (git-fixes).
  • genirq/cpuhotplug: Skip suspended interrupts when restoring affinity (git-fixes).
  • genirq/irqdesc: Honor caller provided affinity in alloc_desc() (git-fixes).
  • gpio: grgpio: Add NULL check in grgpio_probe (git-fixes).
  • gpio: grgpio: use a helper variable to store the address of ofdev->dev (stable-fixes).
  • hfsplus: do not query the device logical block size multiple times (git-fixes).
  • HID: magicmouse: Apple Magic Trackpad 2 USB-C driver support (stable-fixes).
  • hvc/xen: fix console unplug (git-fixes).
  • hvc/xen: fix error path in xen_hvc_init() to always register frontend driver (git-fixes).
  • hvc/xen: fix event channel handling for secondary consoles (git-fixes).
  • hwmon: (nct6775) Add 665-ACE/600M-CL to ASUS WMI monitoring list (stable-fixes).
  • hwmon: (pmbus_core) Allow to hook PMBUS_SMBALERT_MASK (stable-fixes).
  • hwmon: (pmbus/core) clear faults after setting smbalert mask (git-fixes).
  • hwmon: (tmp513) Do not use "proxy" headers (stable-fixes).
  • hwmon: (tmp513) Fix Current Register value interpretation (git-fixes).
  • hwmon: (tmp513) Fix interpretation of values of Shunt Voltage and Limit Registers (git-fixes).
  • hwmon: (tmp513) Fix interpretation of values of Temperature Result and Limit Registers (git-fixes).
  • hwmon: (tmp513) Simplify with dev_err_probe() (stable-fixes).
  • hwmon: (tmp513) Use SI constants from units.h (stable-fixes).
  • i2c: imx: add imx7d compatible string for applying erratum ERR007805 (git-fixes).
  • i2c: microchip-core: actually use repeated sends (git-fixes).
  • i2c: microchip-core: fix "ghost" detections (git-fixes).
  • i2c: pnx: Fix timeout in wait functions (git-fixes).
  • i2c: riic: Always round-up when calculating bus period (git-fixes).
  • i40e: Fix handling changed priv flags (git-fixes).
  • i915/guc: Accumulate active runtime on gt reset (git-fixes).
  • i915/guc: Ensure busyness counter increases motonically (git-fixes).
  • i915/guc: Reset engine utilization buffer before registration (git-fixes).
  • ice: change q_index variable type to s16 to store -1 value (git-fixes).
  • ice: consistently use q_idx in ice_vc_cfg_qs_msg() (git-fixes).
  • ice: fix PHY Clock Recovery availability check (git-fixes).
  • ice: Unbind the workqueue (bsc#1234989)
  • idpf: add support for SW triggered interrupts (bsc#1235507).
  • idpf: enable WB_ON_ITR (bsc#1235507).
  • idpf: trigger SW interrupt when exiting wb_on_itr mode (bsc#1235507).
  • igb: Fix potential invalid memory access in igb_init_module() (git-fixes).
  • iio: magnetometer: yas530: use signed integer type for clamp limits (git-fixes).
  • instrumentation: Wire up cmpxchg128() (bsc#1220773).
  • io_uring: always lock __io_cqring_overflow_flush (git-fixes).
  • io_uring: check if iowq is killed before queuing (git-fixes).
  • io_uring: Fix registered ring file refcount leak (git-fixes).
  • io_uring/rw: avoid punting to io-wq directly (git-fixes).
  • io_uring/tctx: work around xa_store() allocation error issue (git-fixes).
  • iommu/io-pgtable-arm: Fix stage-2 map/unmap for concatenated tables (git-fixes).
  • irqflags: Explicitly ignore lockdep_hrtimer_exit() argument (git-fixes).
  • isofs: handle CDs with bad root inode but good Joliet root directory (bsc#1234199).
  • ixgbe: downgrade logging of unsupported VF API version to debug (git-fixes).
  • ixgbevf: stop attempting IPSEC offload on Mailbox API 1.5 (git-fixes).
  • jffs2: Fix rtime decompressor (git-fixes).
  • jffs2: fix use of uninitialized variable (git-fixes).
  • jffs2: Prevent rtime decompress memory corruption (git-fixes).
  • jfs: add a check to prevent array-index-out-of-bounds in dbAdjTree (git-fixes).
  • jfs: array-index-out-of-bounds fix in dtReadFirst (git-fixes).
  • jfs: fix array-index-out-of-bounds in jfs_readdir (git-fixes).
  • jfs: fix shift-out-of-bounds in dbSplit (git-fixes).
  • jfs: xattr: check invalid xattr size more strictly (git-fixes).
  • kasan: make report_lock a raw spinlock (git-fixes).
  • kdb: address -Wformat-security warnings (bsc#1234659).
  • kdb: Fix buffer overflow during tab-complete (bsc#1234652).
  • kdb: Fix console handling when editing and tab-completing commands (bsc#1234655).
  • kdb: Merge identical case statements in kdb_read() (bsc#1234657).
  • kdb: Use format-specifiers rather than memset() for padding in kdb_read() (bsc#1234658).
  • kdb: Use format-strings rather than '\0' injection in kdb_read() (bsc#1234654).
  • kdb: Use the passed prompt in kdb_position_cursor() (bsc#1234654).
  • kgdb: Flush console before entering kgdb on panic (bsc#1234651).
  • leds: class: Protect brightness_show() with led_cdev->led_access mutex (stable-fixes).
  • linux/dmaengine.h: fix a few kernel-doc warnings (git-fixes).
  • locking/atomic/x86: Correct the definition of __arch_try_cmpxchg128() (bsc#1220773 git-fix).
  • loop: fix the the direct I/O support check when used on top of block devices (bsc#1234143).
  • mac80211: fix user-power when emulating chanctx (stable-fixes).
  • media: cx231xx: Add support for Dexatek USB Video Grabber 1d19:6108 (stable-fixes).
  • media: dvb-frontends: dib3000mb: fix uninit-value in dib3000_write_reg (git-fixes).
  • media: uvcvideo: Add a quirk for the Kaiweets KTI-W02 infrared camera (stable-fixes).
  • media: uvcvideo: RealSense D421 Depth module metadata (stable-fixes).
  • mfd: da9052-spi: Change read-mask to write-mask (git-fixes).
  • mfd: intel_soc_pmic_bxtwc: Use IRQ domain for PMIC devices (git-fixes).
  • mfd: intel_soc_pmic_bxtwc: Use IRQ domain for TMU device (git-fixes).
  • mfd: intel_soc_pmic_bxtwc: Use IRQ domain for USB Type-C device (git-fixes).
  • mm/filemap: avoid buffered read/write race to read inconsistent data (bsc#1234204).
  • mm/readahead: do not allow order-1 folio (bsc#1234205).
  • mm/readahead: limit page cache size in page_cache_ra_order() (bsc#1234208).
  • mmc: core: Add SD card quirk for broken poweroff notification (stable-fixes).
  • mmc: mtk-sd: fix devm_clk_get_optional usage (stable-fixes).
  • mmc: mtk-sd: Fix MMC_CAP2_CRYPTO flag setting (git-fixes).
  • mmc: sdhci-esdhc-imx: enable quirks SDHCI_QUIRK_NO_LED (stable-fixes).
  • mmc: sdhci-pci: Add DMI quirk for missing CD GPIO on Vexia Edu Atla 10 tablet (stable-fixes).
  • mmc: sdhci-tegra: Remove SDHCI_QUIRK_BROKEN_ADMA_ZEROLEN_DESC quirk (git-fixes).
  • mtd: diskonchip: Cast an operand to prevent potential overflow (git-fixes).
  • mtd: hyperbus: rpc-if: Add missing MODULE_DEVICE_TABLE (git-fixes).
  • mtd: hyperbus: rpc-if: Convert to platform remove callback returning void (stable-fixes).
  • mtd: rawnand: arasan: Fix double assertion of chip-select (git-fixes).
  • mtd: rawnand: arasan: Fix missing de-registration of NAND (git-fixes).
  • mtd: rawnand: fix double free in atmel_pmecc_create_user() (git-fixes).
  • net :mana :Request a V2 response version for MANA_QUERY_GF_STAT (git-fixes).
  • net: mana: Increase the DEF_RX_BUFFERS_PER_QUEUE to 1024 (bsc#1235246).
  • net: Return error from sk_stream_wait_connect() if sk_wait_event() fails (git-fixes).
  • net: usb: qmi_wwan: add Quectel RG650V (stable-fixes).
  • net/ipv6: release expired exception dst cached in socket (bsc#1216813).
  • net/mlx5e: clear xdp features on non-uplink representors (git-fixes).
  • net/mlx5e: CT: Fix null-ptr-deref in add rule err flow (git-fixes).
  • net/mlx5e: Remove workaround to avoid syndrome for internal port (git-fixes).
  • net/qed: allow old cards not supporting "num_images" to work (git-fixes).
  • nfs: ignore SB_RDONLY when mounting nfs (git-fixes).
  • NFS/pnfs: Fix a live lock between recalled layouts and layoutget (git-fixes).
  • NFSD: Async COPY result needs to return a write verifier (git-fixes).
  • NFSD: Cap the number of bytes copied by nfs4_reset_recoverydir() (git-fixes).
  • nfsd: fix nfs4_openowner leak when concurrent nfsd4_open occur (git-fixes).
  • NFSD: Fix nfsd4_shutdown_copy() (git-fixes).
  • NFSD: initialize copy->cp_clp early in nfsd4_copy for use by trace point (git-fixes).
  • nfsd: make sure exp active before svc_export_show (git-fixes).
  • NFSD: Prevent a potential integer overflow (git-fixes).
  • NFSD: Prevent NULL dereference in nfsd4_process_cb_update() (git-fixes).
  • nfsd: release svc_expkey/svc_export with rcu_work (git-fixes).
  • NFSD: Remove a never-true comparison (git-fixes).
  • nfsd: restore callback functionality for NFSv4.0 (git-fixes).
  • NFSv4.0: Fix a use-after-free problem in the asynchronous open() (git-fixes).
  • nilfs2: fix buffer head leaks in calls to truncate_inode_pages() (git-fixes).
  • nilfs2: fix potential out-of-bounds memory access in nilfs_find_entry() (git-fixes).
  • nilfs2: prevent use of deleted inode (git-fixes).
  • nvme-pci: 512 byte aligned dma pool segment quirk (git-fixes).
  • nvme-rdma: unquiesce admin_q before destroy it (git-fixes).
  • nvme-tcp: fix the memleak while create new ctrl failed (git-fixes).
  • nvme: apple: fix device reference counting (git-fixes).
  • nvme: fix metadata handling in nvme-passthrough (git-fixes).
  • nvme/multipath: Fix RCU list traversal to use SRCU primitive (git-fixes).
  • nvmet-loop: avoid using mutex in IO hotpath (git-fixes).
  • ocfs2: fix uninitialized value in ocfs2_file_read_iter() (git-fixes).
  • ocfs2: free inode when ocfs2_get_init_inode() fails (git-fixes).
  • Octeontx2-pf: Free send queue buffers incase of leaf to inner (git-fixes).
  • of: address: Report error on resource bounds overflow (stable-fixes).
  • of: Fix error path in of_parse_phandle_with_args_map() (git-fixes).
  • of: Fix refcount leakage for OF node returned by __of_get_dma_parent() (git-fixes).
  • of/irq: Fix using uninitialized variable @addr_len in API of_irq_parse_one() (git-fixes).
  • parisc: Raise minimal GCC version (bsc#1220773).
  • parisc: Raise minimal GCC version to 12.0.0 (bsc#1220773 git-fix).
  • PCI: Add 'reset_subordinate' to reset hierarchy below bridge (stable-fixes).
  • PCI: Add ACS quirk for Broadcom BCM5760X NIC (stable-fixes).
  • PCI: Add ACS quirk for Wangxun FF5xxx NICs (stable-fixes).
  • PCI: Add T_PERST_CLK_US macro (git-fixes).
  • PCI: cadence: Extract link setup sequence from cdns_pcie_host_setup() (stable-fixes).
  • PCI: cadence: Set cdns_pcie_host_init() global (stable-fixes).
  • PCI: cpqphp: Use PCI_POSSIBLE_ERROR() to check config reads (stable-fixes).
  • PCI: Detect and trust built-in Thunderbolt chips (stable-fixes).
  • PCI: Fix use-after-free of slot->bus on hot remove (stable-fixes).
  • PCI: j721e: Add PCIe 4x lane selection support (stable-fixes).
  • PCI: j721e: Add per platform maximum lane settings (stable-fixes).
  • PCI: j721e: Add reset GPIO to struct j721e_pcie (stable-fixes).
  • PCI: j721e: Add suspend and resume support (git-fixes).
  • PCI: j721e: Use T_PERST_CLK_US macro (git-fixes).
  • PCI: qcom: Add support for IPQ9574 (stable-fixes).
  • PCI: Use preserve_config in place of pci_flags (stable-fixes).
  • PCI: vmd: Add DID 8086:B06F and 8086:B60B for Intel client SKUs (stable-fixes).
  • PCI: vmd: Set devices to D0 before enabling PM L1 Substates (stable-fixes).
  • PCI/AER: Disable AER service on suspend (stable-fixes).
  • PCI/MSI: Handle lack of irqdomain gracefully (git-fixes).
  • percpu: Add {raw,this}_cpu_try_cmpxchg() (bsc#1220773).
  • percpu: Fix self-assignment of __old in raw_cpu_generic_try_cmpxchg() (bsc#1220773 git-fix).
  • percpu: Wire up cmpxchg128 (bsc#1220773).
  • phy: core: Fix an OF node refcount leakage in _of_phy_get() (git-fixes).
  • phy: core: Fix an OF node refcount leakage in of_phy_provider_lookup() (git-fixes).
  • phy: core: Fix that API devm_of_phy_provider_unregister() fails to unregister the phy provider (git-fixes).
  • phy: core: Fix that API devm_phy_destroy() fails to destroy the phy (git-fixes).
  • phy: core: Fix that API devm_phy_put() fails to release the phy (git-fixes).
  • phy: qcom-qmp: Fix register name in RX Lane config of SC8280XP (git-fixes).
  • phy: rockchip: naneng-combphy: fix phy reset (git-fixes).
  • phy: usb: Toggle the PHY power during init (git-fixes).
  • pinctrl: mcp23s08: Fix sleeping in atomic context due to regmap locking (git-fixes).
  • pinctrl: qcom-pmic-gpio: add support for PM8937 (stable-fixes).
  • pinctrl: qcom: spmi-mpp: Add PM8937 compatible (stable-fixes).
  • pinmux: Use sequential access to access desc->pinmux data (stable-fixes).
  • platform/chrome: cros_ec_proto: Lock device when updating MKBP version (git-fixes).
  • platform/x86: asus-nb-wmi: Ignore unknown event 0xCF (stable-fixes).
  • platform/x86: dell-smbios-base: Extends support to Alienware products (stable-fixes).
  • platform/x86: dell-wmi-base: Handle META key Lock/Unlock events (stable-fixes).
  • platform/x86: thinkpad_acpi: Fix for ThinkPad's with ECFW showing incorrect fan speed (stable-fixes).
  • power: supply: gpio-charger: Fix set charge current limits (git-fixes).
  • powerpc/book3s64/hugetlb: Fix disabling hugetlb when fadump is active (bsc#1235108).
  • proc/softirqs: replace seq_printf with seq_put_decimal_ull_width (git-fixes).
  • quota: explicitly forbid quota files from being encrypted (bsc#1234196).
  • quota: Fix rcu annotations of inode dquot pointers (bsc#1234197).
  • quota: flush quota_release_work upon quota writeback (bsc#1234195).
  • quota: simplify drop_dquot_ref() (bsc#1234197).
  • RAS/AMD/ATL: Translate normalized to system physical addresses using PRM (jsc#PED-10467).
  • RDMA/bnxt_re: Add check for path mtu in modify_qp (git-fixes)
  • RDMA/bnxt_re: Avoid initializing the software queue for user queues (git-fixes)
  • RDMA/bnxt_re: Avoid sending the modify QP workaround for latest adapters (git-fixes)
  • RDMA/bnxt_re: Disable use of reserved wqes (git-fixes)
  • RDMA/bnxt_re: Fix max_qp_wrs reported (git-fixes)
  • RDMA/bnxt_re: Fix reporting hw_ver in query_device (git-fixes)
  • RDMA/bnxt_re: Fix the check for 9060 condition (git-fixes)
  • RDMA/bnxt_re: Fix the locking while accessing the QP table (git-fixes)
  • RDMA/bnxt_re: Remove always true dattr validity check (git-fixes)
  • RDMA/core: Fix ENODEV error for iWARP test over vlan (git-fixes)
  • RDMA/hns: Fix accessing invalid dip_ctx during destroying QP (git-fixes)
  • RDMA/hns: Fix mapping error of zero-hop WQE buffer (git-fixes)
  • RDMA/hns: Fix missing flush CQE for DWQE (git-fixes)
  • RDMA/hns: Fix warning storm caused by invalid input in IO path (git-fixes)
  • RDMA/mlx5: Enforce same type port association for multiport RoCE (git-fixes)
  • RDMA/rtrs: Ensure 'ib_sge list' is accessible (git-fixes)
  • RDMA/uverbs: Prevent integer overflow issue (git-fixes)
  • readahead: use ilog2 instead of a while loop in page_cache_ra_order() (bsc#1234208).
  • regmap: Use correct format specifier for logging range errors (stable-fixes).
  • regulator: rk808: Add apply_bit for BUCK3 on RK809 (stable-fixes).
  • rtc: cmos: avoid taking rtc_lock for extended period of time (stable-fixes).
  • s390/cio: Do not unregister the subchannel based on DNV (git-fixes).
  • s390/cpum_sf: Convert to cmpxchg128() (bsc#1220773).
  • s390/cpum_sf: Handle CPU hotplug remove during sampling (git-fixes).
  • s390/cpum_sf: Remove WARN_ON_ONCE statements (git-fixes).
  • s390/facility: Disable compile time optimization for decompressor code (git-fixes).
  • s390/iucv: MSG_PEEK causes memory leak in iucv_sock_destruct() (git-fixes).
  • s390/pageattr: Implement missing kernel_page_present() (git-fixes).
  • scatterlist: fix incorrect func name in kernel-doc (git-fixes).
  • sched/numa: fix memory leak due to the overwritten vma->numab_state (git fixes (sched/numa)).
  • scsi: lpfc: Add handling for LS_RJT reason explanation authentication required (bsc#1235409).
  • scsi: lpfc: Add support for large fw object application layer reads (bsc#1235409).
  • scsi: lpfc: Change lpfc_nodelist save_flags member into a bitmask (bsc#1235409).
  • scsi: lpfc: Copyright updates for 14.4.0.7 patches (bsc#1235409).
  • scsi: lpfc: Delete NLP_TARGET_REMOVE flag due to obsolete usage (bsc#1235409).
  • scsi: lpfc: Modify handling of ADISC based on ndlp state and RPI registration (bsc#1235409).
  • scsi: lpfc: Redefine incorrect type in lpfc_create_device_data() (bsc#1235409).
  • scsi: lpfc: Restrict the REG_FCFI MAM field to FCoE adapters only (bsc#1235409).
  • scsi: lpfc: Update definition of firmware configuration mbox cmds (bsc#1235409).
  • scsi: lpfc: Update lpfc version to 14.4.0.7 (bsc#1235409).
  • scsi: qla2xxx: Fix abort in bsg timeout (bsc#1235406).
  • scsi: qla2xxx: Fix NVMe and NPIV connect issue (bsc#1235406).
  • scsi: qla2xxx: Fix use after free on unload (bsc#1235406).
  • scsi: qla2xxx: Remove check req_sg_cnt should be equal to rsp_sg_cnt (bsc#1235406).
  • scsi: qla2xxx: Remove the unused 'del_list_entry' field in struct fc_port (bsc#1235406).
  • scsi: qla2xxx: Supported speed displayed incorrectly for VPorts (bsc#1235406).
  • scsi: qla2xxx: Update version to 10.02.09.400-k (bsc#1235406).
  • scsi: storvsc: Do not flag MAINTENANCE_IN return of SRB_STATUS_DATA_OVERRUN as an error (git-fixes).
  • selftests/bpf: Test PROBE_MEM of VSYSCALL_ADDR on x86-64 (git-fixes).
  • serial: 8250_dw: Add Sophgo SG2044 quirk (stable-fixes).
  • serial: 8250_dw: Do not use struct dw8250_data outside of 8250_dw (git-fixes).
  • serial: 8250_dw: Replace ACPI device check by a quirk (git-fixes).
  • serial: 8250_fintek: Add support for F81216E (stable-fixes).
  • serial: amba-pl011: fix build regression (git-fixes).
  • serial: amba-pl011: Fix RX stall when DMA is used (git-fixes).
  • serial: amba-pl011: Use port lock wrappers (stable-fixes).
  • serial: Do not hold the port lock when setting rx-during-tx GPIO (git-fixes).
  • serial: do not use uninitialized value in uart_poll_init() (git-fixes).
  • serial: imx: only set receiver level if it is zero (git-fixes).
  • serial: imx: set receiver level before starting uart (git-fixes).
  • serial: qcom-geni: disable interrupts during console writes (git-fixes).
  • serial: qcom-geni: Do not cancel/abort if we can't get the port lock (git-fixes).
  • serial: qcom-geni: fix arg types for qcom_geni_serial_poll_bit() (git-fixes).
  • serial: qcom-geni: fix console corruption (git-fixes).
  • serial: qcom-geni: fix dma rx cancellation (git-fixes).
  • serial: qcom-geni: fix false console tx restart (git-fixes).
  • serial: qcom-geni: fix fifo polling timeout (git-fixes).
  • serial: qcom-geni: fix hard lockup on buffer flush (git-fixes).
  • serial: qcom-geni: fix polled console corruption (git-fixes).
  • serial: qcom-geni: fix polled console initialisation (git-fixes).
  • serial: qcom-geni: fix receiver enable (git-fixes).
  • serial: qcom-geni: fix shutdown race (git-fixes).
  • serial: qcom-geni: fix soft lockup on sw flow control and suspend (git-fixes).
  • serial: qcom-geni: introduce qcom_geni_serial_poll_bitfield() (git-fixes).
  • serial: qcom-geni: revert broken hibernation support (git-fixes).
  • serial: stm32: do not always set SER_RS485_RX_DURING_TX if RS485 is enabled (git-fixes).
  • serial: stm32: Return IRQ_NONE in the ISR if no handling happend (git-fixes).
  • slub: Replace cmpxchg_double() - KABI fix (bsc#1220773).
  • slub: Replace cmpxchg_double() (bsc#1220773).
  • smb: client: fix TCP timers deadlock after rmmod (git-fixes) [hcarvalho: fix issue described in bsc#1233642]
  • soc: fsl: cpm1: qmc: Fix blank line and spaces (stable-fixes).
  • soc: fsl: cpm1: qmc: Introduce qmc_{init,exit}_xcc() and their CPM1 version (stable-fixes).
  • soc: fsl: cpm1: qmc: Introduce qmc_init_resource() and its CPM1 version (stable-fixes).
  • soc: fsl: cpm1: qmc: Re-order probe() operations (stable-fixes).
  • soc: fsl: cpm1: qmc: Set the ret error code on platform_get_irq() failure (git-fixes).
  • soc: imx8m: Probe the SoC driver as platform driver (stable-fixes).
  • soc: qcom: Add check devm_kasprintf() returned value (stable-fixes).
  • soc: qcom: geni-se: add GP_LENGTH/IRQ_EN_SET/IRQ_EN_CLEAR registers (git-fixes).
  • soc: qcom: geni-se: Add M_TX_FIFO_NOT_EMPTY bit definition (git-fixes).
  • soc: qcom: socinfo: fix revision check in qcom_socinfo_probe() (git-fixes).
  • soc/fsl: cpm: qmc: Convert to platform remove callback returning void (stable-fixes).
  • spi: aspeed: Fix an error handling path in aspeed_spi_[read|write]_user() (git-fixes).
  • sunrpc: clear XPRT_SOCK_UPD_TIMEOUT when reset transport (git-fixes).
  • sunrpc: fix one UAF issue caused by sunrpc kernel tcp socket (git-fixes).
  • sunrpc: handle -ENOTCONN in xs_tcp_setup_socket() (git-fixes).
  • SUNRPC: make sure cache entry active before cache_show (git-fixes).
  • SUNRPC: timeout and cancel TLS handshake with -ETIMEDOUT (git-fixes).
  • svcrdma: Address an integer overflow (git-fixes).
  • svcrdma: fix miss destroy percpu_counter in svc_rdma_proc_init() (git-fixes).
  • swiotlb: Enforce page alignment in swiotlb_alloc() (git-fixes).
  • swiotlb: Reinstate page-alignment for mappings >= PAGE_SIZE (git-fixes).
  • thermal/drivers/qcom/tsens-v1: Add support for MSM8937 tsens (stable-fixes).
  • tools: hv: change permissions of NetworkManager configuration file (git-fixes).
  • tpm_tis_spi: Release chip select when flow control fails (bsc#1234338)
  • tpm/eventlog: Limit memory allocations for event logs with excessive size (bsc#1233260 bsc#1233259 bsc#1232421).
  • tty: serial: kgdboc: Fix 8250_* kgdb over serial (git-fixes).
  • types: Introduce [us]128 (bsc#1220773).
  • ubifs: authentication: Fix use-after-free in ubifs_tnc_end_commit (git-fixes).
  • ubifs: Correct the total block count by deducting journal reservation (git-fixes).
  • udf: Fix lock ordering in udf_evict_inode() (bsc#1234238).
  • udf: fix uninit-value use in udf_get_fileshortad (bsc#1234243).
  • udf: prevent integer overflow in udf_bitmap_free_blocks() (bsc#1234239).
  • udf: refactor inode_bmap() to handle error (bsc#1234242).
  • udf: refactor udf_current_aext() to handle error (bsc#1234240).
  • udf: refactor udf_next_aext() to handle error (bsc#1234241).
  • udf: udftime: prevent overflow in udf_disk_stamp_to_time() (bsc#1234237).
  • usb: add support for new USB device ID 0x17EF:0x3098 for the r8152 driver (stable-fixes).
  • usb: cdns3-ti: Add workaround for Errata i2409 (stable-fixes).
  • usb: cdns3: Add quirk flag to enable suspend residency (stable-fixes).
  • usb: chipidea: udc: handle USB Error Interrupt if IOC not set (stable-fixes).
  • usb: dwc2: Fix HCD port connection race (git-fixes).
  • usb: dwc2: Fix HCD resume (git-fixes).
  • usb: dwc2: gadget: Do not write invalid mapped sg entries into dma_desc with iommu enabled (stable-fixes).
  • usb: dwc2: hcd: Fix GetPortStatus & SetPortFeature (git-fixes).
  • usb: dwc3: ep0: Do not clear ep0 DWC3_EP_TRANSFER_STARTED (git-fixes).
  • usb: dwc3: ep0: Do not reset resource alloc flag (git-fixes).
  • usb: dwc3: ep0: Do not reset resource alloc flag (including ep0) (git-fixes).
  • usb: dwc3: gadget: Rewrite endpoint allocation flow (stable-fixes).
  • usb: dwc3: xilinx: make sure pipe clock is deselected in usb2 only mode (git-fixes).
  • usb: ehci-hcd: fix call balance of clocks handling routines (git-fixes).
  • usb: gadget: u_serial: Fix the issue that gs_start_io crashed due to accessing null pointer (git-fixes).
  • usb: host: max3421-hcd: Correctly abort a USB request (git-fixes).
  • USB: serial: option: add MediaTek T7XX compositions (stable-fixes).
  • USB: serial: option: add MeiG Smart SLM770A (stable-fixes).
  • USB: serial: option: add Netprisma LCUK54 modules for WWAN Ready (stable-fixes).
  • USB: serial: option: add TCL IK512 MBIM & ECM (stable-fixes).
  • USB: serial: option: add Telit FE910C04 rmnet compositions (stable-fixes).
  • usb: typec: anx7411: fix fwnode_handle reference leak (git-fixes).
  • usb: typec: anx7411: fix OF node reference leaks in anx7411_typec_switch_probe() (git-fixes).
  • usb: typec: use cleanup facility for 'altmodes_node' (stable-fixes).
  • vdpa: solidrun: Fix UB bug with devres (git-fixes).
  • vDPA/ifcvf: Fix pci_read_config_byte() return code handling (git-fixes).
  • vdpa/mlx5: Fix PA offset with unaligned starting iotlb map (git-fixes).
  • vdpa/mlx5: Fix suboptimal range on iotlb iteration (git-fixes).
  • vfs: fix readahead(2) on block devices (bsc#1234201).
  • wifi: ath5k: add PCI ID for Arcadyan devices (git-fixes).
  • wifi: ath5k: add PCI ID for SX76X (git-fixes).
  • wifi: brcmfmac: Fix oops due to NULL pointer dereference in brcmf_sdiod_sglist_rw() (stable-fixes).
  • wifi: cfg80211: sme: init n_channels before channels[] access (git-fixes).
  • wifi: cw1200: Fix potential NULL dereference (git-fixes).
  • wifi: ipw2x00: libipw_rx_any(): fix bad alignment (stable-fixes).
  • wifi: iwlwifi: mvm: Use the sync timepoint API in suspend (stable-fixes).
  • wifi: mac80211: clean up 'ret' in sta_link_apply_parameters() (stable-fixes).
  • wifi: mac80211: fix station NSS capability initialization order (git-fixes).
  • wifi: mac80211: init cnt before accessing elem in ieee80211_copy_mbssid_beacon (git-fixes).
  • wifi: nl80211: fix NL80211_ATTR_MLO_LINK_ID off-by-one (git-fixes).
  • wifi: rtlwifi: Drastically reduce the attempts to read efuse in case of failures (stable-fixes).
  • wifi: rtw89: check return value of ieee80211_probereq_get() for RNR (stable-fixes).
  • workqueue: Do not warn when cancelling WQ_MEM_RECLAIM work from !WQ_MEM_RECLAIM worker (bsc#1235416).
  • writeback, cgroup: switch inodes with dirty timestamps to release dying cgwbs (bsc#1234203).
  • x86,amd_iommu: Replace cmpxchg_double() (bsc#1220773).
  • x86,intel_iommu: Replace cmpxchg_double() (bsc#1220773).
  • x86/hyperv: Fix hv tsc page based sched_clock for hibernation (git-fixes).
  • xfs: do not allocate COW extents when unsharing a hole (git-fixes).
  • xfs: fix sb_spino_align checks for large fsblock sizes (git-fixes).
  • xfs: remove unknown compat feature check in superblock write validation (git-fixes).
  • xfs: return from xfs_symlink_verify early on V4 filesystems (git-fixes).
  • xfs: sb_spino_align is not verified (git-fixes).
  • xhci: Add usb cold attach (CAS) as a reason to resume root hub (git-fixes).
  • xhci: Allow RPM on the USB controller (1022:43f7) by default (stable-fixes).
  • xhci: fix possible null pointer deref during xhci urb enqueue (git-fixes).

Special Instructions and Notes:

  • Please reboot the system after installing this update.

Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  • openSUSE Leap 15.6
    zypper in -t patch SUSE-2025-117=1 openSUSE-SLE-15.6-2025-117=1
  • Public Cloud Module 15-SP6
    zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP6-2025-117=1

Package List:

  • openSUSE Leap 15.6 (aarch64 x86_64)
    • kernel-azure-extra-debuginfo-6.4.0-150600.8.23.1
    • cluster-md-kmp-azure-debuginfo-6.4.0-150600.8.23.1
    • ocfs2-kmp-azure-6.4.0-150600.8.23.1
    • kselftests-kmp-azure-6.4.0-150600.8.23.1
    • dlm-kmp-azure-debuginfo-6.4.0-150600.8.23.1
    • kernel-azure-optional-6.4.0-150600.8.23.1
    • reiserfs-kmp-azure-6.4.0-150600.8.23.1
    • cluster-md-kmp-azure-6.4.0-150600.8.23.1
    • reiserfs-kmp-azure-debuginfo-6.4.0-150600.8.23.1
    • kernel-azure-devel-debuginfo-6.4.0-150600.8.23.1
    • kernel-azure-optional-debuginfo-6.4.0-150600.8.23.1
    • gfs2-kmp-azure-debuginfo-6.4.0-150600.8.23.1
    • kernel-azure-debugsource-6.4.0-150600.8.23.1
    • kernel-azure-devel-6.4.0-150600.8.23.1
    • kselftests-kmp-azure-debuginfo-6.4.0-150600.8.23.1
    • dlm-kmp-azure-6.4.0-150600.8.23.1
    • kernel-azure-extra-6.4.0-150600.8.23.1
    • kernel-syms-azure-6.4.0-150600.8.23.1
    • ocfs2-kmp-azure-debuginfo-6.4.0-150600.8.23.1
    • kernel-azure-debuginfo-6.4.0-150600.8.23.1
    • gfs2-kmp-azure-6.4.0-150600.8.23.1
  • openSUSE Leap 15.6 (aarch64 nosrc x86_64)
    • kernel-azure-6.4.0-150600.8.23.1
  • openSUSE Leap 15.6 (x86_64)
    • kernel-azure-vdso-6.4.0-150600.8.23.1
    • kernel-azure-vdso-debuginfo-6.4.0-150600.8.23.1
  • openSUSE Leap 15.6 (noarch)
    • kernel-source-azure-6.4.0-150600.8.23.1
    • kernel-devel-azure-6.4.0-150600.8.23.1
  • Public Cloud Module 15-SP6 (aarch64 nosrc x86_64)
    • kernel-azure-6.4.0-150600.8.23.1
  • Public Cloud Module 15-SP6 (aarch64 x86_64)
    • kernel-azure-devel-debuginfo-6.4.0-150600.8.23.1
    • kernel-syms-azure-6.4.0-150600.8.23.1
    • kernel-azure-debugsource-6.4.0-150600.8.23.1
    • kernel-azure-debuginfo-6.4.0-150600.8.23.1
    • kernel-azure-devel-6.4.0-150600.8.23.1
  • Public Cloud Module 15-SP6 (noarch)
    • kernel-source-azure-6.4.0-150600.8.23.1
    • kernel-devel-azure-6.4.0-150600.8.23.1

References: