{"affected":[{"ecosystem_specific":{"binaries":[{"kernel-azure":"5.14.21-150500.33.69.1","kernel-azure-devel":"5.14.21-150500.33.69.1","kernel-devel-azure":"5.14.21-150500.33.69.1","kernel-source-azure":"5.14.21-150500.33.69.1","kernel-syms-azure":"5.14.21-150500.33.69.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for Public Cloud 15 SP5","name":"kernel-azure","purl":"pkg:rpm/suse/kernel-azure&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Public%20Cloud%2015%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.14.21-150500.33.69.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-azure":"5.14.21-150500.33.69.1","kernel-azure-devel":"5.14.21-150500.33.69.1","kernel-devel-azure":"5.14.21-150500.33.69.1","kernel-source-azure":"5.14.21-150500.33.69.1","kernel-syms-azure":"5.14.21-150500.33.69.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for Public Cloud 15 SP5","name":"kernel-source-azure","purl":"pkg:rpm/suse/kernel-source-azure&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Public%20Cloud%2015%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.14.21-150500.33.69.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-azure":"5.14.21-150500.33.69.1","kernel-azure-devel":"5.14.21-150500.33.69.1","kernel-devel-azure":"5.14.21-150500.33.69.1","kernel-source-azure":"5.14.21-150500.33.69.1","kernel-syms-azure":"5.14.21-150500.33.69.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for Public Cloud 15 SP5","name":"kernel-syms-azure","purl":"pkg:rpm/suse/kernel-syms-azure&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Public%20Cloud%2015%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.14.21-150500.33.69.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-azure":"5.14.21-150500.33.69.1","dlm-kmp-azure":"5.14.21-150500.33.69.1","gfs2-kmp-azure":"5.14.21-150500.33.69.1","kernel-azure":"5.14.21-150500.33.69.1","kernel-azure-devel":"5.14.21-150500.33.69.1","kernel-azure-extra":"5.14.21-150500.33.69.1","kernel-azure-livepatch-devel":"5.14.21-150500.33.69.1","kernel-azure-optional":"5.14.21-150500.33.69.1","kernel-azure-vdso":"5.14.21-150500.33.69.1","kernel-devel-azure":"5.14.21-150500.33.69.1","kernel-source-azure":"5.14.21-150500.33.69.1","kernel-syms-azure":"5.14.21-150500.33.69.1","kselftests-kmp-azure":"5.14.21-150500.33.69.1","ocfs2-kmp-azure":"5.14.21-150500.33.69.1","reiserfs-kmp-azure":"5.14.21-150500.33.69.1"}]},"package":{"ecosystem":"openSUSE:Leap 15.5","name":"kernel-azure","purl":"pkg:rpm/opensuse/kernel-azure&distro=openSUSE%20Leap%2015.5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.14.21-150500.33.69.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-azure":"5.14.21-150500.33.69.1","dlm-kmp-azure":"5.14.21-150500.33.69.1","gfs2-kmp-azure":"5.14.21-150500.33.69.1","kernel-azure":"5.14.21-150500.33.69.1","kernel-azure-devel":"5.14.21-150500.33.69.1","kernel-azure-extra":"5.14.21-150500.33.69.1","kernel-azure-livepatch-devel":"5.14.21-150500.33.69.1","kernel-azure-optional":"5.14.21-150500.33.69.1","kernel-azure-vdso":"5.14.21-150500.33.69.1","kernel-devel-azure":"5.14.21-150500.33.69.1","kernel-source-azure":"5.14.21-150500.33.69.1","kernel-syms-azure":"5.14.21-150500.33.69.1","kselftests-kmp-azure":"5.14.21-150500.33.69.1","ocfs2-kmp-azure":"5.14.21-150500.33.69.1","reiserfs-kmp-azure":"5.14.21-150500.33.69.1"}]},"package":{"ecosystem":"openSUSE:Leap 15.5","name":"kernel-source-azure","purl":"pkg:rpm/opensuse/kernel-source-azure&distro=openSUSE%20Leap%2015.5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.14.21-150500.33.69.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-azure":"5.14.21-150500.33.69.1","dlm-kmp-azure":"5.14.21-150500.33.69.1","gfs2-kmp-azure":"5.14.21-150500.33.69.1","kernel-azure":"5.14.21-150500.33.69.1","kernel-azure-devel":"5.14.21-150500.33.69.1","kernel-azure-extra":"5.14.21-150500.33.69.1","kernel-azure-livepatch-devel":"5.14.21-150500.33.69.1","kernel-azure-optional":"5.14.21-150500.33.69.1","kernel-azure-vdso":"5.14.21-150500.33.69.1","kernel-devel-azure":"5.14.21-150500.33.69.1","kernel-source-azure":"5.14.21-150500.33.69.1","kernel-syms-azure":"5.14.21-150500.33.69.1","kselftests-kmp-azure":"5.14.21-150500.33.69.1","ocfs2-kmp-azure":"5.14.21-150500.33.69.1","reiserfs-kmp-azure":"5.14.21-150500.33.69.1"}]},"package":{"ecosystem":"openSUSE:Leap 15.5","name":"kernel-syms-azure","purl":"pkg:rpm/opensuse/kernel-syms-azure&distro=openSUSE%20Leap%2015.5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.14.21-150500.33.69.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"\nThe SUSE Linux Enterprise 15 SP5 Azure kernel was updated to receive various security bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2022-48901: btrfs: do not start relocation until in progress drops are done  (bsc#1229607).\n- CVE-2022-48911: kabi: add __nf_queue_get_refs() for kabi compliance.  (bsc#1229633).\n- CVE-2022-48923: btrfs: prevent copying too big compressed lzo segment (bsc#1229662)\n- CVE-2022-48935: Fixed an unregister flowtable hooks on netns exit (bsc#1229619)\n- CVE-2023-52610: net/sched: act_ct: fix skb leak and crash on ooo frags (bsc#1221610).\n- CVE-2023-52916: media: aspeed: Fix memory overwrite if timing is 1600x900 (bsc#1230269).\n- CVE-2024-26640: tcp: add sanity checks to rx zerocopy (bsc#1221650).\n- CVE-2024-26759: mm/swap: fix race when skipping swapcache (bsc#1230340).\n- CVE-2024-26767: drm/amd/display: fixed integer types and null check locations  (bsc#1230339).\n- CVE-2024-26804: net: ip_tunnel: prevent perpetual headroom growth (bsc#1222629).\n- CVE-2024-26837: net: bridge: switchdev: race between creation of new group memberships and generation of the list of MDB events to replay (bsc#1222973).\n- CVE-2024-37353: virtio: fixed a double free in vp_del_vqs() (bsc#1226875).\n- CVE-2024-38538: net: bridge: xmit: make sure we have at least eth header len bytes (bsc#1226606).\n- CVE-2024-38596: af_unix: Fix data races in unix_release_sock/unix_stream_sendmsg (bsc#1226846).\n- CVE-2024-40910: Fix refcount imbalance on inbound connections (bsc#1227832).\n- CVE-2024-40973: media: mtk-vcodec: potential null pointer deference in SCP (bsc#1227890).\n- CVE-2024-40983: tipc: force a dst refcount before doing decryption (bsc#1227819).\n- CVE-2024-41062: Sync sock recv cb and release (bsc#1228576).\n- CVE-2024-41082: nvme-fabrics: use reserved tag for reg read/write command  (bsc#1228620 CVE-2024-41082).\n- CVE-2024-42154: tcp_metrics: validate source addr length (bsc#1228507).\n- CVE-2024-42259: Fix Virtual Memory mapping boundaries calculation (bsc#1229156)\n- CVE-2024-42265: protect the fetch of ->fd[fd] in do_dup2() from mispredictions (bsc#1229334).\n- CVE-2024-42304: ext4: make sure the first directory block is not a hole (bsc#1229364).\n- CVE-2024-42305: ext4: check dot and dotdot of dx_root before making dir indexed (bsc#1229363).\n- CVE-2024-42306: udf: Avoid using corrupted block bitmap buffer (bsc#1229362).\n- CVE-2024-43828: ext4: fix infinite loop when replaying fast_commit (bsc#1229394).\n- CVE-2024-43890: tracing: Fix overflow in get_free_elt() (bsc#1229764).\n- CVE-2024-43898: ext4: sanity check for NULL pointer after ext4_force_shutdown (bsc#1229753).\n- CVE-2024-43912: wifi: nl80211: disallow setting special AP channel widths (bsc#1229830)\n- CVE-2024-43914: md/raid5: avoid BUG_ON() while continue reshape after reassembling (bsc#1229790).\n- CVE-2024-44935: sctp: Fix null-ptr-deref in reuseport_add_sock() (bsc#1229810).\n- CVE-2024-44944: netfilter: ctnetlink: use helper function to calculate expect ID (bsc#1229899).\n- CVE-2024-44946: kcm: Serialise kcm_sendmsg() for the same socket (bsc#1230015).\n- CVE-2024-44950: serial: sc16is7xx: fix invalid FIFO access with special register set (bsc#1230180).\n- CVE-2024-44952: driver core: Fix uevent_show() vs driver detach race  (bsc#1230178).\n- CVE-2024-44970: net/mlx5e: SHAMPO, Fix invalid WQ linked list unlink (bsc#1230209).\n- CVE-2024-44971: net: dsa: bcm_sf2: Fix a possible memory leak in bcm_sf2_mdio_register() (bsc#1230211).\n- CVE-2024-44986: ipv6: fix possible UAF in ip6_finish_output2() (bsc#1230230)\n- CVE-2024-44987: ipv6: prevent UAF in ip6_send_skb() (bsc#1230185).\n- CVE-2024-44988: net: dsa: mv88e6xxx: Fix out-of-bound access (bsc#1230192).\n- CVE-2024-44989: bonding: fix xfrm real_dev null pointer dereference (bsc#1230193).\n- CVE-2024-44990: bonding: fix null pointer deref in bond_ipsec_offload_ok (bsc#1230194).\n- CVE-2024-44998: atm: idt77252: prevent use after free in dequeue_rx() (bsc#1230171).\n- CVE-2024-44999: gtp: pull network headers in gtp_dev_xmit() (bsc#1230233).\n- CVE-2024-45003: Don't evict inode under the inode lru traversing context (bsc#1230245).\n- CVE-2024-45007: char: xillybus: Refine workqueue handling (bsc#1230175).\n- CVE-2024-45008: Input: MT - limit max slots (bsc#1230248).\n- CVE-2024-45013: nvme: move stopping keep-alive into nvme_uninit_ctrl() (bsc#1230442).\n- CVE-2024-45015: drm/msm/dpu: move dpu_encoder's connector assignment to (bsc#1230444)\n- CVE-2024-45018: netfilter: flowtable: initialise extack before use (bsc#1230431).\n- CVE-2024-45021: memcg_write_event_control(): fix a user-triggerable oops (bsc#1230434).\n- CVE-2024-45029: i2c: tegra: Do not mark ACPI devices as irq safe (bsc#1230451).\n- CVE-2024-46673: scsi: aacraid: Fix double-free on probe failure (bsc#1230506).\n- CVE-2024-46674: usb: dwc3: st: fix probed platform device ref count on probe  error path (bsc#1230507).\n- CVE-2024-46677: gtp: fix a potential NULL pointer dereference (bsc#1230549).\n- CVE-2024-46678: bonding: change ipsec_lock from spin lock to mutex (bsc#1230550).\n- CVE-2024-46679: ethtool: check device is present when getting link settings (bsc#1230556).\n- CVE-2024-46685: pinctrl: single: fix potential NULL dereference in pcs_get_function() (bsc#1230515)\n- CVE-2024-46686: smb/client: avoid dereferencing rdata=NULL in smb2_new_read_req() (bsc#1230517).\n- CVE-2024-46689: soc: qcom: cmd-db: Map shared memory as WC, not WB (bsc#1230524)\n- CVE-2024-46702: thunderbolt: Mark XDomain as unplugged when router is removed (bsc#1230589)\n- CVE-2024-46707: KVM: arm64: Make ICC_*SGI*_EL1 undef in the absence of a vGICv3  (bsc#1230582).\n- CVE-2024-46715: driver: iio: add missing checks on iio_info's callback access  (bsc#1230700).\n- CVE-2024-46717: net/mlx5e: SHAMPO, Fix incorrect page release (bsc#1230719).\n- CVE-2024-46721: pparmor: fix possible NULL pointer dereference (bsc#1230710)\n- CVE-2024-46728: drm/amd/display: Check index for aux_rd_interval before using (bsc#1230703)\n- CVE-2024-46730: drm/amd/display: Ensure array index tg_inst won't be -1 (bsc#1230701)\n- CVE-2024-46743: of/irq: Prevent device address out-of-bounds read in interrupt map walk (bsc#1230756).\n- CVE-2024-46751: btrfs: do not BUG_ON() when 0 reference count at btrfs_lookup_extent_info() (bsc#1230786).\n- CVE-2024-46752: btrfs: reduce nesting for extent processing at btrfs_lookup_extent_info() (bsc#1230794).\n- CVE-2024-46753: btrfs: handle errors from btrfs_dec_ref() properly (bsc#1230796).\n- CVE-2024-46770: ice: Add netif_device_attach/detach into PF reset flow (bsc#1230763).\n- CVE-2024-46775: drm/amd/display: Validate function returns (bsc#1230774).\n- CVE-2024-46783: tcp_bpf: fix return value of tcp_bpf_sendmsg() (bsc#1230810).\n- CVE-2024-46787: userfaultfd: fix checks for huge PMDs (bsc#1230815).\n- CVE-2024-46794: x86/tdx: Fix data leak in mmio_read() (bsc#1230825).\n- CVE-2024-46822: arm64: acpi: Harden get_cpu_for_acpi_id() against missing CPU entry (bsc#1231120).\n- CVE-2024-46826: ELF: fix kernel.randomize_va_space double read (bsc#1231115).\n- CVE-2024-46830: KVM: x86: Acquire kvm->srcu when handling KVM_SET_VCPU_EVENTS  (bsc#1231116).\n- CVE-2024-46854: net: dpaa: Pad packets to ETH_ZLEN (bsc#1231084).\n- CVE-2024-46855: netfilter: nft_socket: fix sk refcount leaks (bsc#1231085).\n- CVE-2024-46857: net/mlx5: Fix bridge mode operations when there are no VFs (bsc#1231087).\n\nThe following non-security bugs were fixed:\n\n- ACPI: CPPC: Fix MASK_VAL() usage (git-fixes).\n- ACPI: PMIC: Remove unneeded check in tps68470_pmic_opregion_probe() (git-fixes).\n- ACPI: SBS: manage alarm sysfs attribute through psy core (git-fixes).\n- ACPI: battery: create alarm sysfs attribute atomically (git-fixes).\n- ACPI: processor: Fix memory leaks in error paths of processor_add() (stable-fixes).\n- ACPI: processor: Return an error if acpi_processor_get_info() fails in processor_add() (stable-fixes).\n- ACPI: sysfs: validate return type of _STR method (git-fixes).\n- ALSA: hda/conexant: Add pincfg quirk to enable top speakers on Sirius devices (stable-fixes).\n- ALSA: hda/conexant: Mute speakers at suspend / shutdown (stable-fixes).\n- ALSA: hda/generic: Add a helper to mute speakers at suspend/shutdown (stable-fixes).\n- ALSA: hda/realtek: Support mute LED on HP Laptop 14-dq2xxx (stable-fixes).\n- ALSA: hda/realtek: add patch for internal mic in Lenovo V145 (stable-fixes).\n- ALSA: hda: Add input value sanity checks to HDMI channel map controls (stable-fixes).\n- ASoC: dapm: Fix UAF for snd_soc_pcm_runtime object (git-fixes).\n- ASoC: meson: axg-card: fix 'use-after-free' (git-fixes).\n- ASoC: sunxi: sun4i-i2s: fix LRCLK polarity in i2s mode (git-fixes).\n- ASoC: tegra: Fix CBB error during probe() (git-fixes).\n- ASoC: topology: Properly initialize soc_enum values (stable-fixes).\n- ASoc: SOF: topology: Clear SOF link platform name upon unload (git-fixes).\n- Bluetooth: L2CAP: Fix deadlock (git-fixes).\n- Bluetooth: MGMT: Ignore keys being loaded with invalid type (git-fixes).\n- Bluetooth: btusb: Fix not handling ZPL/short-transfer (git-fixes).\n- Bluetooth: hci_core: Fix sending MGMT_EV_CONNECT_FAILED (git-fixes).\n- Bluetooth: hci_sync: Ignore errors from HCI_OP_REMOTE_NAME_REQ_CANCEL (git-fixes).\n- Drivers: hv: vmbus: Fix rescind handling in uio_hv_generic (git-fixes).\n- Drivers: hv: vmbus: Fix the misplaced function description (git-fixes).\n- HID: amd_sfh: free driver_data after destroying hid device (stable-fixes).\n- HID: cougar: fix slab-out-of-bounds Read in cougar_report_fixup (stable-fixes).\n- IB/core: Fix ib_cache_setup_one error flow cleanup (git-fixes)\n- IB/hfi1: Fix potential deadlock on &irq_src_lock and &dd->uctxt_lock (git-fixes)\n- Input: ilitek_ts_i2c - add report id message validation (git-fixes).\n- Input: ilitek_ts_i2c - avoid wrong input subsystem sync (git-fixes).\n- Input: ps2-gpio - use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).\n- Input: uinput - reject requests with unreasonable number of slots (stable-fixes).\n- KVM: s390: Fix SORTL and DFLTCC instruction format error in __insn32_query (git-fixes bsc#1231277).\n- NFS: Do not re-read the entire page cache to find the next cookie (bsc#1226662).\n- NFS: Reduce use of uncached readdir (bsc#1226662).\n- NFS: never reuse a NFSv4.0 lock-owner (bsc#1227726).\n- NFSD: Fix frame size warning in svc_export_parse() (git-fixes).\n- NFSD: Rewrite synopsis of nfsd_percpu_counters_init() (git-fixes).\n- NFSv4: Add missing rescheduling points in nfs_client_return_marked_delegations (git-fixes).\n- PCI/ASPM: Move pci_function_0() upward (bsc#1226915)\n- PCI/ASPM: Remove struct aspm_latency (bsc#1226915)\n- PCI/ASPM: Stop caching device L0s, L1 acceptable exit latencies (bsc#1226915)\n- PCI/ASPM: Stop caching link L0s, L1 exit latencies (bsc#1226915)\n- PCI: Add missing bridge lock to pci_bus_lock() (stable-fixes).\n- PCI: Support BAR sizes up to 8TB (bsc#1231017)\n- PCI: Wait for Link before restoring Downstream Buses (git-fixes).\n- PCI: al: Check IORESOURCE_BUS existence during probe (git-fixes).\n- PCI: dra7xx: Fix error handling when IRQ request fails in probe (git-fixes).\n- PCI: dwc: Expose dw_pcie_ep_exit() to module (git-fixes).\n- PCI: dwc: Restore MSI Receiver mask during resume (git-fixes).\n- PCI: keystone: Add workaround for Errata #i2037 (AM65x SR 1.0) (stable-fixes).\n- PCI: keystone: Fix if-statement expression in ks_pcie_quirk() (git-fixes).\n- PCI: xilinx-nwl: Clean up clock on probe failure/removal (git-fixes).\n- PCI: xilinx-nwl: Fix off-by-one in INTx IRQ handler (git-fixes).\n- PCI: xilinx-nwl: Fix register misspelling (git-fixes).\n- PKCS#7: Check codeSigning EKU of certificates in PKCS#7 (bsc#1226666).\n- RDMA/core: Remove unused declaration rdma_resolve_ip_route() (git-fixes)\n- RDMA/cxgb4: Added NULL check for lookup_atid (git-fixes)\n- RDMA/efa: Properly handle unexpected AQ completions (git-fixes)\n- RDMA/hns: Do not modify rq next block addr in HIP09 QPC (git-fixes)\n- RDMA/hns: Fix VF triggering PF reset in abnormal interrupt handler (git-fixes)\n- RDMA/hns: Fix spin_unlock_irqrestore() called with IRQs enabled (git-fixes)\n- RDMA/hns: Fix the overflow risk of hem_list_calc_ba_range() (git-fixes)\n- RDMA/hns: Optimize hem allocation performance (git-fixes)\n- RDMA/irdma: fix error message in irdma_modify_qp_roce() (git-fixes)\n- RDMA/iwcm: Fix WARNING:at_kernel/workqueue.c:#check_flush_dependency (git-fixes)\n- RDMA/rtrs-clt: Reset cid to con_num - 1 to stay in bounds (git-fixes)\n- RDMA/rtrs: Fix the problem of variable not initialized fully (git-fixes)\n- RDMA/rtrs: Reset hb_missed_cnt after receiving other traffic from peer (git-fixes)\n- Restore dropped fields for bluetooth MGMT/SMP structs (git-fixes).\n- Revert 'Bluetooth: MGMT/SMP: Fix address type when using SMP over BREDR/LE' (git-fixes).\n- Revert 'media: tuners: fix error return code of hybrid_tuner_request_state()' (git-fixes).\n- Revert 'media: tuners: fix error return code of hybrid_tuner_request_state()' (stable-fixes).\n- Revert 'mm, kmsan: fix infinite recursion due to RCU critical section'.\n- Revert 'mm/sparsemem: fix race in accessing memory_section->usage'.\n- Revert 'mm: prevent derefencing NULL ptr in pfn_section_valid()'.\n- Squashfs: sanity check symbolic link size (git-fixes).\n- USB: class: CDC-ACM: fix race between get_serial and set_serial (git-fixes).\n- USB: serial: kobil_sct: restore initial terminal settings (git-fixes).\n- USB: serial: option: add MeiG Smart SRM825L (git-fixes).\n- USB: usbtmc: prevent kernel-usb-infoleak (git-fixes).\n- VMCI: Fix use-after-free when removing resource in vmci_resource_remove() (git-fixes).\n- af_unix: Fix data races around sk->sk_shutdown (bsc#1226846).\n- af_unix: Fix data-races around sk->sk_shutdown (git-fixes).\n- af_unix: annotate lockless accesses to sk->sk_err (bsc#1226846).\n- apparmor: fix possible NULL pointer dereference (stable-fixes).\n- arm64/mm: Modify range-based tlbi to decrement scale (bsc#1229585)\n- arm64/mm: Update tlb invalidation routines for FEAT_LPA2 (bsc#1229585)\n- arm64: acpi: Move get_cpu_for_acpi_id() to a header (git-fixes).\n- arm64: dts: rockchip: Correct the Pinebook Pro battery design capacity (git-fixes).\n- arm64: dts: rockchip: Raise Pinebook Pro's panel backlight PWM frequency (git-fixes).\n- arm64: dts: rockchip: fix PMIC interrupt pin in pinctrl for ROCK Pi E (git-fixes).\n- arm64: tlb: Allow range operation for MAX_TLBI_RANGE_PAGES (bsc#1229585)\n- arm64: tlb: Fix TLBI RANGE operand (bsc#1229585)\n- arm64: tlb: Improve __TLBI_VADDR_RANGE() (bsc#1229585)\n- ata: libata: Fix memory leak for error path in ata_host_alloc() (git-fixes).\n- ata: pata_macio: Use WARN instead of BUG (stable-fixes).\n- blk-mq: Build default queue map via group_cpus_evenly() (bsc#1229031).\n- blk-mq: add helper for checking if one CPU is mapped to specified hctx (bsc#1223600).\n- blk-mq: add number of queue calc helper (bsc#1229034).\n- blk-mq: do not schedule block kworker on isolated CPUs (bsc#1223600).\n- blk-mq: introduce blk_mq_dev_map_queues (bsc#1229034).\n- blk-mq: issue warning when offlining hctx with online isolcpus (bsc#1229034).\n- blk-mq: use hk cpus only when isolcpus=io_queue is enabled (bsc#1229034).\n- cachefiles: Fix non-taking of sb_writers around set/removexattr (bsc#1231013).\n- cachefiles: fix dentry leak in cachefiles_open_file() (bsc#1231181).\n- can: bcm: Clear bo->bcm_proc_read after remove_proc_entry() (git-fixes).\n- can: bcm: Remove proc entry when dev is unregistered (git-fixes).\n- can: j1939: use correct function name in comment (git-fixes).\n- can: mcp251x: fix deadlock if an interrupt occurs during mcp251x_open (git-fixes).\n- cdc-acm: Add DISABLE_ECHO quirk for GE HealthCare UI Controller (git-fixes).\n- ceph: remove the incorrect Fw reference check when dirtying pages (bsc#1231180).\n- char: tpm: Fix possible memory leak in tpm_bios_measurements_open() (git-fixes).\n- char: xillybus: Check USB endpoints when probing device (git-fixes).\n- clk: qcom: clk-alpha-pll: Fix the pll post div mask (git-fixes).\n- clk: qcom: clk-alpha-pll: Fix the trion pll postdiv set rate API (git-fixes).\n- clk: qcom: clk-alpha-pll: Fix zonda set_rate failure when PLL is disabled (git-fixes).\n- cpufreq: ti-cpufreq: Introduce quirks to handle syscon fails appropriately (git-fixes).\n- crypto: ccp - Properly unregister /dev/sev on sev PLATFORM_STATUS failure (git-fixes).\n- crypto: virtio - Handle dataq logic with tasklet (git-fixes).\n- crypto: virtio - Wait for tasklet to complete on device remove (git-fixes).\n- crypto: xor - fix template benchmarking (git-fixes).\n- devres: Initialize an uninitialized struct member (stable-fixes).\n- driver core: Add debug logs when fwnode links are added/deleted (git-fixes).\n- driver core: Add missing parameter description to __fwnode_link_add() (git-fixes).\n- driver core: Create __fwnode_link_del() helper function (git-fixes).\n- driver core: Set deferred probe reason when deferred by driver core (git-fixes).\n- driver core: fw_devlink: Allow marking a fwnode link as being part of a cycle (git-fixes).\n- driver core: fw_devlink: Consolidate device link flag computation (git-fixes).\n- drivers: media: dvb-frontends/rtl2830: fix an out-of-bounds write error (git-fixes).\n- drivers: media: dvb-frontends/rtl2832: fix an out-of-bounds write error (git-fixes).\n- drivers:drm:exynos_drm_gsc:Fix wrong assignment in gsc_bind() (git-fixes).\n- drm/amd/amdgpu: Check tbo resource pointer (stable-fixes).\n- drm/amd/amdgpu: Properly tune the size of struct (git-fixes).\n- drm/amd/display: Add array index check for hdcp ddc access (stable-fixes).\n- drm/amd/display: Assign linear_pitch_alignment even for VM (stable-fixes).\n- drm/amd/display: Check HDCP returned status (stable-fixes).\n- drm/amd/display: Check denominator pbn_div before used (stable-fixes).\n- drm/amd/display: Check gpio_id before used as array index (stable-fixes).\n- drm/amd/display: Check msg_id before processing transcation (stable-fixes).\n- drm/amd/display: Check num_valid_sets before accessing reader_wm_sets[] (stable-fixes).\n- drm/amd/display: Correct the defined value for AMDGPU_DMUB_NOTIFICATION_MAX (stable-fixes).\n- drm/amd/display: Ensure index calculation will not overflow (stable-fixes).\n- drm/amd/display: Fix Coverity INTEGER_OVERFLOW within dal_gpio_service_create (stable-fixes).\n- drm/amd/display: Skip inactive planes within ModeSupportAndSystemConfiguration (stable-fixes).\n- drm/amd/display: Skip wbscl_set_scaler_filter if filter is null (stable-fixes).\n- drm/amd/display: Spinlock before reading event (stable-fixes).\n- drm/amd/display: Stop amdgpu_dm initialize when stream nums greater than 6 (stable-fixes).\n- drm/amd/display: added NULL check at start of dc_validate_stream (stable-fixes).\n- drm/amd/pm: Fix negative array index read (stable-fixes).\n- drm/amd/pm: check negtive return for table entries (stable-fixes).\n- drm/amd/pm: check specific index for aldebaran (stable-fixes).\n- drm/amd/pm: fix the Out-of-bounds read warning (stable-fixes).\n- drm/amd/pm: fix uninitialized variable warning (stable-fixes).\n- drm/amd/pm: fix uninitialized variable warning for smu8_hwmgr (stable-fixes).\n- drm/amd/pm: fix uninitialized variable warnings for vangogh_ppt (stable-fixes).\n- drm/amd/pm: fix uninitialized variable warnings for vega10_hwmgr (stable-fixes).\n- drm/amd/pm: fix warning using uninitialized value of max_vid_step (stable-fixes).\n- drm/amdgpu/atomfirmware: Silence UBSAN warning (stable-fixes).\n- drm/amdgpu/pm: Check input value for CUSTOM profile mode setting on legacy SOCs (stable-fixes).\n- drm/amdgpu/pm: Check the return value of smum_send_msg_to_smc (stable-fixes).\n- drm/amdgpu/pm: Fix uninitialized variable agc_btc_response (stable-fixes).\n- drm/amdgpu/pm: Fix uninitialized variable warning for smu10 (stable-fixes).\n- drm/amdgpu: Fix out-of-bounds read of df_v1_7_channel_number (stable-fixes).\n- drm/amdgpu: Fix out-of-bounds write warning (stable-fixes).\n- drm/amdgpu: Fix smatch static checker warning (stable-fixes).\n- drm/amdgpu: Fix uninitialized variable warning in amdgpu_afmt_acr (stable-fixes).\n- drm/amdgpu: Set no_hw_access when VF request full GPU fails (stable-fixes).\n- drm/amdgpu: avoid reading vf2pf info size from FB (stable-fixes).\n- drm/amdgpu: check for LINEAR_ALIGNED correctly in check_tiling_flags_gfx6 (stable-fixes).\n- drm/amdgpu: clear RB_OVERFLOW bit when enabling interrupts (stable-fixes).\n- drm/amdgpu: fix a possible null pointer dereference (git-fixes).\n- drm/amdgpu: fix dereference after null check (stable-fixes).\n- drm/amdgpu: fix mc_data out-of-bounds read warning (stable-fixes).\n- drm/amdgpu: fix overflowed array index read warning (stable-fixes).\n- drm/amdgpu: fix the waring dereferencing hive (stable-fixes).\n- drm/amdgpu: fix ucode out-of-bounds read warning (stable-fixes).\n- drm/amdgpu: the warning dereferencing obj for nbio_v7_4 (stable-fixes).\n- drm/amdgpu: update type of buf size to u32 for eeprom functions (stable-fixes).\n- drm/amdkfd: Reconcile the definition and use of oem_id in struct kfd_topology_device (stable-fixes).\n- drm/bridge: lontium-lt8912b: Validate mode in drm_bridge_funcs::mode_valid() (git-fixes).\n- drm/bridge: tc358767: Check if fully initialized before signalling HPD event via IRQ (stable-fixes).\n- drm/i915/fence: Mark debug_fence_free() with __maybe_unused (git-fixes).\n- drm/i915/fence: Mark debug_fence_init_onstack() with __maybe_unused (git-fixes).\n- drm/i915/guc: prevent a possible int overflow in wq offsets (git-fixes).\n- drm/meson: plane: Add error handling (stable-fixes).\n- drm/msm/a5xx: disable preemption in submits by default (git-fixes).\n- drm/msm/a5xx: fix races in preemption evaluation stage (git-fixes).\n- drm/msm/a5xx: properly clear preemption records on resume (git-fixes).\n- drm/msm/a5xx: workaround early ring-buffer emptiness check (git-fixes).\n- drm/msm/adreno: Fix error return if missing firmware-name (stable-fixes).\n- drm/msm/disp/dpu: use atomic enable/disable callbacks for encoder (bsc#1230444)\n- drm/msm: Fix incorrect file name output in adreno_request_fw() (git-fixes).\n- drm/msm: fix %s null argument error (git-fixes).\n- drm/radeon/evergreen_cs: fix int overflow errors in cs track offsets (git-fixes).\n- drm/radeon: fix null pointer dereference in radeon_add_common_modes (git-fixes).\n- drm/rockchip: dw_hdmi: Fix reading EDID when using a forced mode (git-fixes).\n- drm/rockchip: vop: Allow 4096px width scaling (git-fixes).\n- drm/stm: ltdc: check memory returned by devm_kzalloc() (git-fixes).\n- drm: omapdrm: Add missing check for alloc_ordered_workqueue (git-fixes).\n- exfat: fix memory leak in exfat_load_bitmap() (git-fixes).\n- fbdev: hpfb: Fix an error handling path in hpfb_dio_probe() (git-fixes).\n- filemap: remove use of wait bookmarks (bsc#1224085).\n- firmware_loader: Block path traversal (git-fixes).\n- fscache: delete fscache_cookie_lru_timer when fscache exits to avoid UAF (bsc#1230592).\n- fuse: update stats for pages in dropped aux writeback list (bsc#1230130).\n- fuse: use unsigned type for getxattr/listxattr size truncation (bsc#1230129).\n- genirq/affinity: Do not pass irq_affinity_desc array to irq_build_affinity_masks (bsc#1229031).\n- genirq/affinity: Move group_cpus_evenly() into lib/ (bsc#1229031).\n- genirq/affinity: Only build SMP-only helper functions on SMP kernels (bsc#1229031).\n- genirq/affinity: Pass affinity managed mask array to irq_build_affinity_masks (bsc#1229031).\n- genirq/affinity: Remove the 'firstvec' parameter from irq_build_affinity_masks (bsc#1229031).\n- genirq/affinity: Rename irq_build_affinity_masks as group_cpus_evenly (bsc#1229031).\n- genirq/affinity: Replace cpumask_weight() with cpumask_empty() where appropriate (bsc#1229031).\n- gfs2: setattr_chown: Add missing initialization (git-fixes).\n- hwmon: (adc128d818) Fix underflows seen when writing limit attributes (stable-fixes).\n- hwmon: (lm95234) Fix underflows seen when writing limit attributes (stable-fixes).\n- hwmon: (max16065) Fix overflows seen when writing limits (git-fixes).\n- hwmon: (ntc_thermistor) fix module autoloading (git-fixes).\n- hwmon: (w83627ehf) Fix underflows seen when writing limit attributes (stable-fixes).\n- hwrng: bcm2835 - Add missing clk_disable_unprepare in bcm2835_rng_init (git-fixes).\n- hwrng: cctrng - Add missing clk_disable_unprepare in cctrng_resume (git-fixes).\n- hwrng: mtk - Use devm_pm_runtime_enable (git-fixes).\n- i2c: Fix conditional for substituting empty ACPI functions (stable-fixes).\n- i2c: Use IS_REACHABLE() for substituting empty ACPI functions (git-fixes).\n- i2c: aspeed: Update the stop sw state when the bus recovery occurs (git-fixes).\n- i2c: isch: Add missed 'else' (git-fixes).\n- i2c: qcom-geni: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).\n- i2c: xiic: Wait for TX empty to avoid missed TX NAKs (git-fixes).\n- i3c: mipi-i3c-hci: Error out instead on BUG_ON() in IBI DMA setup (stable-fixes).\n- iio: adc: ad7124: fix chip ID mismatch (git-fixes).\n- iio: adc: ad7124: fix config comparison (git-fixes).\n- iio: adc: ad7606: fix oversampling gpio array (git-fixes).\n- iio: adc: ad7606: fix standby gpio state to match the documentation (git-fixes).\n- iio: buffer-dmaengine: fix releasing dma channel on error (git-fixes).\n- iio: chemical: bme680: Fix read/write ops to device by adding mutexes (git-fixes).\n- iio: fix scale application in iio_convert_raw_to_processed_unlocked (git-fixes).\n- iio: magnetometer: ak8975: Fix reading for ak099xx sensors (git-fixes).\n- ipmi: docs: do not advertise deprecated sysfs entries (git-fixes).\n- ipmi:ssif: Improve detecting during probing (bsc#1228771)\n- ipmi:ssif: Improve detecting during probing (bsc#1228771)\n- jfs: fix out-of-bounds in dbNextAG() and diAlloc() (git-fixes).\n- kABI, crypto: virtio - Handle dataq logic with tasklet (git-fixes).\n- kabi: add __nf_queue_get_refs() for kabi compliance.\n- kthread: Fix task state in kthread worker if being frozen (bsc#1231146).\n- lib/group_cpus.c: avoid acquiring cpu hotplug lock in group_cpus_evenly (bsc#1229031).\n- lib/group_cpus.c: honor housekeeping config when grouping CPUs (bsc#1229034).\n- lib/group_cpus: Export group_cpus_evenly() (bsc#1229031).\n- lirc: rc_dev_get_from_fd(): fix file leak (git-fixes).\n- mailbox: bcm2835: Fix timeout during suspend mode (git-fixes).\n- mailbox: rockchip: fix a typo in module autoloading (git-fixes).\n- media: Revert 'media: dvb-usb: Fix unexpected infinite loop in dvb_usb_read_remote_control()' (git-fixes).\n- media: aspeed: Fix no complete irq for non-64-aligned width (bsc#1230269)\n- media: qcom: camss: Add check for v4l2_fwnode_endpoint_parse (stable-fixes).\n- media: qcom: camss: Fix ordering of pm_runtime_enable (git-fixes).\n- media: sun4i_csi: Implement link validate for sun4i_csi subdev (git-fixes).\n- media: uapi/linux/cec.h: cec_msg_set_reply_to: zero flags (git-fixes).\n- media: uvcvideo: Enforce alignment of frame and interval (stable-fixes).\n- media: venus: fix use after free bug in venus_remove due to race condition (git-fixes).\n- media: vicodec: allow en/decoder cmd w/o CAPTURE (git-fixes).\n- media: vivid: do not set HDMI TX controls if there are no HDMI outputs (stable-fixes).\n- media: vivid: fix wrong sizeimage value for mplane (stable-fixes).\n- mmc: cqhci: Fix checking of CQHCI_HALT state (git-fixes).\n- mmc: dw_mmc: Fix IDMAC operation with pages bigger than 4K (git-fixes).\n- mmc: sdhci-of-aspeed: fix module autoloading (git-fixes).\n- mtd: powernv: Add check devm_kasprintf() returned value (git-fixes).\n- mtd: slram: insert break after errors in parsing the map (git-fixes).\n- net: drop bad gso csum_start and offset in virtio_net_hdr (git-fixes).\n- net: mana: Fix error handling in mana_create_txq/rxq's NAPI cleanup (git-fixes).\n- net: mana: Implement get_ringparam/set_ringparam for mana (bsc#1229891).\n- net: mana: Improve mana_set_channels() in low mem conditions (bsc#1230289).\n- net: missing check virtio (git-fixes).\n- net: tighten bad gso csum offset check in virtio_net_hdr (git-fixes).\n- nf_conntrack_proto_udp: do not accept packets with IPS_NAT_CLASH (bsc#1199769).\n- nilfs2: Constify struct kobj_type (git-fixes).\n- nilfs2: determine empty node blocks as corrupted (git-fixes).\n- nilfs2: fix missing cleanup on rollforward recovery error (git-fixes).\n- nilfs2: fix potential null-ptr-deref in nilfs_btree_insert() (git-fixes).\n- nilfs2: fix potential oob read in nilfs_btree_check_delete() (git-fixes).\n- nilfs2: fix state management in error path of log writing function (git-fixes).\n- nilfs2: protect references to superblock parameters exposed in sysfs (git-fixes).\n- nilfs2: replace snprintf in show functions with sysfs_emit (git-fixes).\n- nilfs2: use default_groups in kobj_type (git-fixes).\n- nvme-pci: Add sleep quirk for Samsung 990 Evo (git-fixes).\n- nvme-pci: use block layer helpers to calculate num of queues (bsc#1229034).\n- nvme/pci: Add APST quirk for Lenovo N60z laptop (git-fixes).\n- nvme: move stopping keep-alive into nvme_uninit_ctrl() (git-fixes).\n- nvme: replace blk_mq_pci_map_queues with blk_mq_dev_map_queues (bsc#1229034).\n- nvmet-rdma: fix possible bad dereference when freeing rsps (git-fixes).\n- nvmet-tcp: do not continue for invalid icreq (git-fixes).\n- nvmet-tcp: fix kernel crash if commands allocation fails (git-fixes).\n- nvmet-trace: avoid dereferencing pointer too early (git-fixes).\n- nvmet: Identify-Active Namespace ID List command should reject invalid nsid (git-fixes).\n- ocfs2: cancel dqi_sync_work before freeing oinfo (git-fixes).\n- ocfs2: fix null-ptr-deref when journal load failed (git-fixes).\n- ocfs2: fix possible null-ptr-deref in ocfs2_set_buffer_uptodate (git-fixes).\n- ocfs2: remove unreasonable unlock in ocfs2_read_blocks (git-fixes).\n- pci/hotplug/pnv_php: Fix hotplug driver crash on Powernv (stable-fixes).\n- pcmcia: Use resource_size function on resource object (stable-fixes).\n- pinctrl: single: fix missing error code in pcs_probe() (git-fixes).\n- pinctrl: single: fix potential NULL dereference in pcs_get_function() (git-fixes).\n- platform/x86: dell-smbios: Fix error path in dell_smbios_init() (git-fixes).\n- platform/x86: panasonic-laptop: Allocate 1 entry extra in the sinf array (git-fixes).\n- platform/x86: panasonic-laptop: Fix SINF array out of bounds accesses (git-fixes).\n- power: supply: Drop use_cnt check from power_supply_property_is_writeable() (git-fixes).\n- power: supply: axp20x_battery: Remove design from min and max voltage (git-fixes).\n- power: supply: hwmon: Fix missing temp1_max_alarm attribute (git-fixes).\n- power: supply: max17042_battery: Fix SOC threshold calc w/ no current sense (git-fixes).\n- powerpc/64: Convert patch_instruction() to patch_u32() (bsc#1194869).\n- powerpc/boot: Handle allocation failure in simple_realloc() (bsc#1194869).\n- powerpc/boot: Only free if realloc() succeeds (bsc#1194869).\n- powerpc/code-patching: Add generic memory patching (bsc#1194869).\n- powerpc/code-patching: Consolidate and cache per-cpu patching context (bsc#1194869).\n- powerpc/code-patching: Do not call is_vmalloc_or_module_addr() without CONFIG_MODULES (bsc#1194869).\n- powerpc/code-patching: Fix error handling in do_patch_instruction() (bsc#1194869).\n- powerpc/code-patching: Fix oops with DEBUG_VM enabled (bsc#1194869).\n- powerpc/code-patching: Fix unmap_patch_area() error handling (bsc#1194869).\n- powerpc/code-patching: Perform hwsync in __patch_instruction() in case of failure (bsc#1194869).\n- powerpc/code-patching: Pre-map patch area (bsc#1194869).\n- powerpc/code-patching: Remove #ifdef CONFIG_STRICT_KERNEL_RWX (bsc#1194869).\n- powerpc/code-patching: Remove pr_debug()/pr_devel() messages and fix check() (bsc#1194869).\n- powerpc/code-patching: Reorganise do_patch_instruction() to ease error handling (bsc#1194869).\n- powerpc/code-patching: Speed up page mapping/unmapping (bsc#1194869).\n- powerpc/code-patching: Use WARN_ON and fix check in poking_init (bsc#1194869).\n- powerpc/code-patching: Use jump_label to check if poking_init() is done (bsc#1194869).\n- powerpc/code-patching: Use temporary mm for Radix MMU (bsc#1194869).\n- powerpc/code-patching: introduce patch_instructions() (bsc#1194869).\n- powerpc/ftrace: Use patch_instruction() return directly (bsc#1194869).\n- powerpc/imc-pmu: Fix use of mutex in IRQs disabled section (bsc#1054914 git-fixes).\n- powerpc/imc-pmu: Use the correct spinlock initializer (bsc#1054914 git-fixes).\n- powerpc/inst: Refactor ___get_user_instr() (bsc#1194869).\n- powerpc/lib: Add __init attribute to eligible functions (bsc#1194869).\n- powerpc/tlb: Add local flush for page given mm_struct and psize (bsc#1194869).\n- powerpc/vdso: Fix VDSO data access when running in a non-root time namespace (bsc#1194869).\n- powerpc/vdso: Merge vdso64 and vdso32 into a single directory (bsc#1194869).\n- powerpc/vdso: Rework VDSO32 makefile to add a prefix to object files (bsc#1194869).\n- powerpc/vdso: augment VDSO32 functions to support 64 bits build (bsc#1194869).\n- powerpc/xics: Check return value of kasprintf in icp_native_map_one_cpu (bsc#1194869).\n- powerpc/xmon: Fix disassembly CPU feature checks (bsc#1065729).\n- powerpc: Allow clearing and restoring registers independent of saved breakpoint state (bsc#1194869).\n- rcu-tasks: Fix show_rcu_tasks_trace_gp_kthread buffer overflow (bsc#1226631).\n- rcu: Add rcutree.nohz_full_patience_delay to reduce nohz_full (bsc#1231327)\n- rtc: at91sam9: fix OF node leak in probe() error path (git-fixes).\n- s390/mm: Add cond_resched() to cmm_alloc/free_pages() (bsc#1228747).\n- sched/isolation: Prevent boot crash when the boot CPU is (bsc#1231327)\n- scsi: fnic: Move flush_work initialization out of if block (bsc#1230055).\n- scsi: ibmvfc: Add max_sectors module parameter (bsc#1216223).\n- scsi: lpfc: Change diagnostic log flag during receipt of unknown ELS cmds (bsc#1229429).\n- scsi: lpfc: Fix overflow build issue (bsc#1229429).\n- scsi: lpfc: Fix unintentional double clearing of vmid_flag (bsc#1229429).\n- scsi: lpfc: Fix unsolicited FLOGI kref imbalance when in direct attached topology (bsc#1229429).\n- scsi: lpfc: Remove redundant vport assignment when building an abort request (bsc#1229429).\n- scsi: lpfc: Update PRLO handling in direct attached topology (bsc#1229429).\n- scsi: lpfc: Update lpfc version to 14.4.0.4 (bsc#1229429).\n- scsi: lpfc: Validate hdwq pointers before dereferencing in reset/errata paths (bsc#1229429).\n- scsi: pm8001: do not overwrite PCI queue mapping (bsc#1229034).\n- scsi: replace blk_mq_pci_map_queues with blk_mq_dev_map_queues (bsc#1229034).\n- scsi: sd: Fix off-by-one error in sd_read_block_characteristics() (bsc#1223848).\n- scsi: use block layer helpers to calculate num of queues (bsc#1229034).\n- spi: nxp-fspi: fix the KASAN report out-of-bounds bug (git-fixes).\n- staging: iio: frequency: ad9834: Validate frequency parameter value (git-fixes).\n- thunderbolt: Mark XDomain as unplugged when router is removed (stable-fixes).\n- tomoyo: fallback to realpath if symlink's pathname does not exist (git-fixes).\n- tools/virtio: fix build (git-fixes).\n- tpm: Clean up TPM space after command failure (git-fixes).\n- tracing: Avoid possible softlockup in tracing_iter_reset() (git-fixes).\n- tty: rp2: Fix reset with non forgiving PCIe host bridges (git-fixes).\n- udp: fix receiving fraglist GSO packets (git-fixes).\n- uio_hv_generic: Fix kernel NULL pointer dereference in hv_uio_rescind (git-fixes).\n- usb: cdnsp: Fix incorrect usb_request status (git-fixes).\n- usb: dwc2: Skip clock gating on Broadcom SoCs (git-fixes).\n- usb: dwc2: drd: fix clock gating on USB role switch (git-fixes).\n- usb: dwc3: core: Prevent USB core invalid event buffer address access (git-fixes).\n- usb: dwc3: core: Skip setting event buffers for host only controllers (git-fixes).\n- usb: dwc3: core: update LC timer as per USB Spec V3.2 (git-fixes).\n- usb: dwc3: core: update LC timer as per USB Spec V3.2 (stable-fixes).\n- usb: dwc3: omap: add missing depopulate in probe error path (git-fixes).\n- usb: dwc3: st: add missing depopulate in probe error path (git-fixes).\n- usb: dwc3: st: fix probed platform device ref count on probe error path (git-fixes).\n- usb: typec: ucsi: Fix null pointer dereference in trace (stable-fixes).\n- usb: uas: set host status byte on data completion error (git-fixes).\n- usb: uas: set host status byte on data completion error (stable-fixes).\n- usb: xhci: fix loss of data on Cadence xHC (git-fixes).\n- usbip: Do not submit special requests twice (stable-fixes).\n- usbnet: fix cyclical race on disconnect with work queue (git-fixes).\n- usbnet: ipheth: race between ipheth_close and error handling (git-fixes).\n- usbnet: modern method to get random MAC (git-fixes).\n- vhost-vdpa: switch to use vmf_insert_pfn() in the fault handler (git-fixes).\n- vhost: Add smp_rmb() in vhost_vq_avail_empty() (git-fixes).\n- virito: add APIs for retrieving vq affinity (bsc#1229034).\n- virtio-blk: Ensure no requests in virtqueues before deleting vqs (git-fixes).\n- virtio/vsock: fix logic which reduces credit update messages (git-fixes).\n- virtio: blk/scs: replace blk_mq_virtio_map_queues with blk_mq_dev_map_queues (bsc#1229034).\n- virtio: blk/scsi: use block layer helpers to calculate num of queues (bsc#1229034).\n- virtio: reenable config if freezing device failed (git-fixes).\n- virtio_net: Fix ''%d' directive writing between 1 and 11 bytes into a region of size 10' warnings (git-fixes).\n- virtio_net: checksum offloading handling fix (git-fixes).\n- virtio_net: use u64_stats_t infra to avoid data-races (git-fixes).\n- virtiofs: forbid newlines in tags (bsc#1230591).\n- vsock/virtio: add support for device suspend/resume (git-fixes).\n- vsock/virtio: factor our the code to initialize and delete VQs (git-fixes).\n- vsock/virtio: initialize the_virtio_vsock before using VQs (git-fixes).\n- vsock/virtio: remove socket from connected/bound list on shutdown (git-fixes).\n- watchdog: imx_sc_wdt: Do not disable WDT in suspend (git-fixes).\n- wifi: brcmsmac: advertise MFP_CAPABLE to enable WPA3 (stable-fixes).\n- wifi: cfg80211: fix UBSAN noise in cfg80211_wext_siwscan() (git-fixes).\n- wifi: cfg80211: fix two more possible UBSAN-detected off-by-one errors (git-fixes).\n- wifi: iwlwifi: mvm: increase the time between ranging measurements (git-fixes).\n- wifi: mac80211: use two-phase skb reclamation in ieee80211_do_stop() (git-fixes).\n- wifi: mt76: mt7615: check devm_kasprintf() returned value (git-fixes).\n- wifi: mt76: mt7915: fix rx filter setting for bfee functionality (git-fixes).\n- wifi: mwifiex: Do not return unused priv in mwifiex_get_priv_by_id() (stable-fixes).\n- wifi: rtw88: 8822c: Fix reported RX band width (git-fixes).\n- wifi: rtw88: always wait for both firmware loading attempts (git-fixes).\n- wifi: rtw88: remove CPT execution branch never used (git-fixes).\n- wifi: wilc1000: fix potential RCU dereference issue in wilc_parse_join_bss_param (git-fixes).\n- workqueue: Avoid using isolated cpus' timers on (bsc#1231327)\n- workqueue: mark power efficient workqueue as unbounded if (bsc#1231327)\n- x86/hyperv: fix kexec crash due to VP assist page corruption (git-fixes).\n- x86/kexec: Add EFI config table identity mapping for kexec kernel (bsc#1220382).\n- x86/mm/ident_map: Use gbpages only where full GB page should be mapped (bsc#1220382).\n- x86/xen: Convert comma to semicolon (git-fixes).\n- xen/swiotlb: add alignment check for dma buffers (bsc#1229928).\n- xen/swiotlb: fix allocated size (git-fixes).\n- xen: add capability to remap non-RAM pages to different PFNs (bsc#1226003).\n- xen: allow mapping ACPI data using a different physical address (bsc#1226003).\n- xen: introduce generic helper checking for memory map conflicts (bsc#1226003).\n- xen: move checks for e820 conflicts further up (bsc#1226003).\n- xen: move max_pfn in xen_memory_setup() out of function scope (bsc#1226003).\n- xen: tolerate ACPI NVS memory overlapping with Xen allocated memory (bsc#1226003).\n- xen: use correct end address of kernel for conflict checking (bsc#1226003).\n- xfs: do not include bnobt blocks when reserving free block pool (git-fixes).\n- xhci: Set quirky xHC PCI hosts to D3 _after_ stopping and freeing them (git-fixes).\n- xz: cleanup CRC32 edits from 2018 (git-fixes).\n","id":"SUSE-SU-2024:3587-1","modified":"2024-10-10T13:29:54Z","published":"2024-10-10T13:29:54Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2024/suse-su-20243587-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1054914"},{"type":"REPORT","url":"https://bugzilla.suse.com/1065729"},{"type":"REPORT","url":"https://bugzilla.suse.com/1194869"},{"type":"REPORT","url":"https://bugzilla.suse.com/1199769"},{"type":"REPORT","url":"https://bugzilla.suse.com/1216223"},{"type":"REPORT","url":"https://bugzilla.suse.com/1220382"},{"type":"REPORT","url":"https://bugzilla.suse.com/1221610"},{"type":"REPORT","url":"https://bugzilla.suse.com/1221650"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222629"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222973"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223600"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223848"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224085"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225903"},{"type":"REPORT","url":"https://bugzilla.suse.com/1226003"},{"type":"REPORT","url":"https://bugzilla.suse.com/1226606"},{"type":"REPORT","url":"https://bugzilla.suse.com/1226631"},{"type":"REPORT","url":"https://bugzilla.suse.com/1226662"},{"type":"REPORT","url":"https://bugzilla.suse.com/1226666"},{"type":"REPORT","url":"https://bugzilla.suse.com/1226846"},{"type":"REPORT","url":"https://bugzilla.suse.com/1226860"},{"type":"REPORT","url":"https://bugzilla.suse.com/1226875"},{"type":"REPORT","url":"https://bugzilla.suse.com/1226915"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227487"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227726"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227819"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227832"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227890"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228507"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228576"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228620"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228747"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228771"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229031"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229034"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229086"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229156"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229334"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229362"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229363"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229364"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229394"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229429"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229453"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229572"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229573"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229585"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229607"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229619"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229633"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229662"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229753"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229764"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229790"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229810"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229830"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229891"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229899"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229928"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229947"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230015"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230055"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230129"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230130"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230170"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230171"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230174"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230175"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230176"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230178"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230180"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230185"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230192"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230193"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230194"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230200"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230204"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230209"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230211"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230217"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230224"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230230"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230233"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230244"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230245"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230247"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230248"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230269"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230289"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230339"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230340"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230392"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230398"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230431"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230433"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230434"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230440"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230442"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230444"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230450"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230451"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230454"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230506"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230507"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230511"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230515"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230517"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230524"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230533"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230535"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230549"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230550"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230556"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230582"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230589"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230591"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230592"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230699"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230700"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230701"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230702"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230703"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230705"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230706"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230709"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230710"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230711"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230712"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230719"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230724"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230725"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230730"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230731"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230732"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230733"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230747"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230748"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230751"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230752"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230756"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230761"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230763"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230766"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230767"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230768"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230771"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230774"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230783"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230786"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230791"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230794"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230796"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230802"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230806"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230808"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230810"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230812"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230813"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230814"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230815"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230821"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230825"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230830"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231013"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231017"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231084"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231085"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231087"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231115"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231116"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231120"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231146"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231180"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231181"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231277"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231327"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48901"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48911"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48923"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48935"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48944"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48945"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52610"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52916"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26640"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26759"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26767"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26804"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26837"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-37353"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-38538"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-38596"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-38632"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-40910"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-40973"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-40983"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41062"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41082"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42154"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42259"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42265"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42304"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42305"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42306"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43828"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43890"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43898"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43912"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43914"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-44935"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-44944"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-44946"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-44948"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-44950"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-44952"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-44954"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-44967"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-44969"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-44970"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-44971"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-44977"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-44982"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-44986"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-44987"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-44988"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-44989"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-44990"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-44998"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-44999"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-45000"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-45001"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-45003"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-45006"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-45007"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-45008"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-45011"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-45013"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-45015"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-45018"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-45020"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-45021"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-45026"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-45028"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-45029"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46673"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46674"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46675"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46676"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46677"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46678"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46679"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46685"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46686"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46689"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46694"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46702"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46707"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46714"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46715"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46717"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46720"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46721"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46722"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46723"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46724"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46725"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46726"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46728"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46730"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46731"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46732"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46737"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46738"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46739"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46743"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46744"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46745"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46746"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46747"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46750"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46751"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46752"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46753"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46755"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46756"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46758"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46759"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46761"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46770"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46771"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46773"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46774"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46775"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46780"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46781"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46783"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46784"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46786"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46787"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46791"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46794"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46798"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46822"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46826"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46830"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46854"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46855"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-46857"}],"related":["CVE-2022-48901","CVE-2022-48911","CVE-2022-48923","CVE-2022-48935","CVE-2022-48944","CVE-2022-48945","CVE-2023-52610","CVE-2023-52916","CVE-2024-26640","CVE-2024-26759","CVE-2024-26767","CVE-2024-26804","CVE-2024-26837","CVE-2024-37353","CVE-2024-38538","CVE-2024-38596","CVE-2024-38632","CVE-2024-40910","CVE-2024-40973","CVE-2024-40983","CVE-2024-41062","CVE-2024-41082","CVE-2024-42154","CVE-2024-42259","CVE-2024-42265","CVE-2024-42304","CVE-2024-42305","CVE-2024-42306","CVE-2024-43828","CVE-2024-43890","CVE-2024-43898","CVE-2024-43912","CVE-2024-43914","CVE-2024-44935","CVE-2024-44944","CVE-2024-44946","CVE-2024-44948","CVE-2024-44950","CVE-2024-44952","CVE-2024-44954","CVE-2024-44967","CVE-2024-44969","CVE-2024-44970","CVE-2024-44971","CVE-2024-44977","CVE-2024-44982","CVE-2024-44986","CVE-2024-44987","CVE-2024-44988","CVE-2024-44989","CVE-2024-44990","CVE-2024-44998","CVE-2024-44999","CVE-2024-45000","CVE-2024-45001","CVE-2024-45003","CVE-2024-45006","CVE-2024-45007","CVE-2024-45008","CVE-2024-45011","CVE-2024-45013","CVE-2024-45015","CVE-2024-45018","CVE-2024-45020","CVE-2024-45021","CVE-2024-45026","CVE-2024-45028","CVE-2024-45029","CVE-2024-46673","CVE-2024-46674","CVE-2024-46675","CVE-2024-46676","CVE-2024-46677","CVE-2024-46678","CVE-2024-46679","CVE-2024-46685","CVE-2024-46686","CVE-2024-46689","CVE-2024-46694","CVE-2024-46702","CVE-2024-46707","CVE-2024-46714","CVE-2024-46715","CVE-2024-46717","CVE-2024-46720","CVE-2024-46721","CVE-2024-46722","CVE-2024-46723","CVE-2024-46724","CVE-2024-46725","CVE-2024-46726","CVE-2024-46728","CVE-2024-46730","CVE-2024-46731","CVE-2024-46732","CVE-2024-46737","CVE-2024-46738","CVE-2024-46739","CVE-2024-46743","CVE-2024-46744","CVE-2024-46745","CVE-2024-46746","CVE-2024-46747","CVE-2024-46750","CVE-2024-46751","CVE-2024-46752","CVE-2024-46753","CVE-2024-46755","CVE-2024-46756","CVE-2024-46758","CVE-2024-46759","CVE-2024-46761","CVE-2024-46770","CVE-2024-46771","CVE-2024-46773","CVE-2024-46774","CVE-2024-46775","CVE-2024-46780","CVE-2024-46781","CVE-2024-46783","CVE-2024-46784","CVE-2024-46786","CVE-2024-46787","CVE-2024-46791","CVE-2024-46794","CVE-2024-46798","CVE-2024-46822","CVE-2024-46826","CVE-2024-46830","CVE-2024-46854","CVE-2024-46855","CVE-2024-46857"],"summary":"Security update for the Linux Kernel","upstream":["CVE-2022-48901","CVE-2022-48911","CVE-2022-48923","CVE-2022-48935","CVE-2022-48944","CVE-2022-48945","CVE-2023-52610","CVE-2023-52916","CVE-2024-26640","CVE-2024-26759","CVE-2024-26767","CVE-2024-26804","CVE-2024-26837","CVE-2024-37353","CVE-2024-38538","CVE-2024-38596","CVE-2024-38632","CVE-2024-40910","CVE-2024-40973","CVE-2024-40983","CVE-2024-41062","CVE-2024-41082","CVE-2024-42154","CVE-2024-42259","CVE-2024-42265","CVE-2024-42304","CVE-2024-42305","CVE-2024-42306","CVE-2024-43828","CVE-2024-43890","CVE-2024-43898","CVE-2024-43912","CVE-2024-43914","CVE-2024-44935","CVE-2024-44944","CVE-2024-44946","CVE-2024-44948","CVE-2024-44950","CVE-2024-44952","CVE-2024-44954","CVE-2024-44967","CVE-2024-44969","CVE-2024-44970","CVE-2024-44971","CVE-2024-44977","CVE-2024-44982","CVE-2024-44986","CVE-2024-44987","CVE-2024-44988","CVE-2024-44989","CVE-2024-44990","CVE-2024-44998","CVE-2024-44999","CVE-2024-45000","CVE-2024-45001","CVE-2024-45003","CVE-2024-45006","CVE-2024-45007","CVE-2024-45008","CVE-2024-45011","CVE-2024-45013","CVE-2024-45015","CVE-2024-45018","CVE-2024-45020","CVE-2024-45021","CVE-2024-45026","CVE-2024-45028","CVE-2024-45029","CVE-2024-46673","CVE-2024-46674","CVE-2024-46675","CVE-2024-46676","CVE-2024-46677","CVE-2024-46678","CVE-2024-46679","CVE-2024-46685","CVE-2024-46686","CVE-2024-46689","CVE-2024-46694","CVE-2024-46702","CVE-2024-46707","CVE-2024-46714","CVE-2024-46715","CVE-2024-46717","CVE-2024-46720","CVE-2024-46721","CVE-2024-46722","CVE-2024-46723","CVE-2024-46724","CVE-2024-46725","CVE-2024-46726","CVE-2024-46728","CVE-2024-46730","CVE-2024-46731","CVE-2024-46732","CVE-2024-46737","CVE-2024-46738","CVE-2024-46739","CVE-2024-46743","CVE-2024-46744","CVE-2024-46745","CVE-2024-46746","CVE-2024-46747","CVE-2024-46750","CVE-2024-46751","CVE-2024-46752","CVE-2024-46753","CVE-2024-46755","CVE-2024-46756","CVE-2024-46758","CVE-2024-46759","CVE-2024-46761","CVE-2024-46770","CVE-2024-46771","CVE-2024-46773","CVE-2024-46774","CVE-2024-46775","CVE-2024-46780","CVE-2024-46781","CVE-2024-46783","CVE-2024-46784","CVE-2024-46786","CVE-2024-46787","CVE-2024-46791","CVE-2024-46794","CVE-2024-46798","CVE-2024-46822","CVE-2024-46826","CVE-2024-46830","CVE-2024-46854","CVE-2024-46855","CVE-2024-46857"]}