[Bug 1220569] New: No mouse pointer in noVNC when installing latest Tumbleweed using BVCP
https://bugzilla.suse.com/show_bug.cgi?id=1220569 Bug ID: 1220569 Summary: No mouse pointer in noVNC when installing latest Tumbleweed using BVCP Classification: openSUSE Product: openSUSE Tumbleweed Version: Current Hardware: Other OS: Other Status: NEW Severity: Normal Priority: P5 - None Component: Installation Assignee: yast2-maintainers@suse.de Reporter: roger.whittaker@suse.com QA Contact: jsrain@suse.com Target Milestone: --- Found By: --- Blocker: --- I have been using an unusual but rather nice virtualisation setup BVCP (https://bhyve.npulse.net/) which runs on FreeBSD and displays VMs using noVNC ( https://novnc.com/info.html). When installing the latest Tumbleweed the mouse pointer in the noVNC window does not move, nor does it move in a completed install. This problem does not exist with for example Leap 15.5. I do not see this with virt-install / virt-viewer on Linux, so this seems to a specific problem with Tumbleweed when using noVNC. I understand that this is an unusual use case, but maybe something has changed that might be a problem in other circumstances as well. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1220569 https://bugzilla.suse.com/show_bug.cgi?id=1220569#c1 Ancor Gonzalez Sosa <ancor@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |ancor@suse.com --- Comment #1 from Ancor Gonzalez Sosa <ancor@suse.com> --- Just for the record, the reporter mentioned in another channel that this does not only happen during installation itself. IIUC, the problem persist in the installed TW system if he manages to complete the installation. So it's likely a general problem of TW and not an installation issue. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1220569 Roger Whittaker <roger.whittaker@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Component|Installation |Other QA Contact|jsrain@suse.com |qa-bugs@suse.de Assignee|yast2-maintainers@suse.de |screening-team-bugs@suse.de -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1220569 Roger Whittaker <roger.whittaker@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Summary|No mouse pointer in noVNC |No mouse pointer movement |when installing latest |in noVNC with latest |Tumbleweed using BVCP |Tumbleweed using BVCP -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1220569 https://bugzilla.suse.com/show_bug.cgi?id=1220569#c2 --- Comment #2 from Roger Whittaker <roger.whittaker@suse.com> --- I've changed the subject to reflect this and changed the component to "Other". -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1220569 https://bugzilla.suse.com/show_bug.cgi?id=1220569#c3 Stefan Hundhammer <shundhammer@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Assignee|screening-team-bugs@suse.de |gfx-bugs@suse.de QA Contact|qa-bugs@suse.de |gfx-bugs@suse.de Component|Other |X.Org Summary|No mouse pointer movement |No mouse pointer in noVNC |in noVNC with latest |when installing latest |Tumbleweed using BVCP |Tumbleweed using BVCP --- Comment #3 from Stefan Hundhammer <shundhammer@suse.com> --- I don't see how this could possibly be a problem of YaST. Mouse cursor movement is as low-level as it can possibly get; on the level of the X server / X protocol. For a graphical installation, YaST uses the Qt libs in version 5.x, which in turn use their own abstraction layer, and xcb calls in the case of X11. Qt 5.x makes heavy use of pixel buffers, no longer low-level Xlib calls, for any graphics; but mouse handling is independent of that. I could understand if you say that graphics is choppy in your setup (which it in fact is for remote X) because Qt renders locally into pixel buffers and then transfers the whole pixel buffer from the client application to the X server, but mouse handling? Let's ask our X11 experts. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1220569 https://bugzilla.suse.com/show_bug.cgi?id=1220569#c4 --- Comment #4 from Roger Whittaker <roger.whittaker@suse.com> --- Certainly it's not a problem with YaST, because it persists in the installed system. I came across this when testing agama, but it happens with the standard YaST install and in both cases the mouse pointer won't move after installation either. This was with the latest Tumbleweed (20240226). -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1220569 https://bugzilla.suse.com/show_bug.cgi?id=1220569#c5 Stefan Dirsch <sndirsch@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Status|NEW |IN_PROGRESS Flags| |needinfo?(roger.whittaker@s | |use.com) CC| |roger.whittaker@suse.com --- Comment #5 from Stefan Dirsch <sndirsch@suse.com> --- So I'm assuming you're running a VNC session/installation to access your VM. And noVNC is just a VNC client. Is this correct? Then please check with another VNC client, e.g. vncviewer (package tigervnc) it the issue is VNC client related. Thanks. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1220569 Stefan Dirsch <sndirsch@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Priority|P5 - None |P3 - Medium -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1220569 https://bugzilla.suse.com/show_bug.cgi?id=1220569#c6 Roger Whittaker <roger.whittaker@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Flags|needinfo?(roger.whittaker@s | |use.com) | --- Comment #6 from Roger Whittaker <roger.whittaker@suse.com> --- I can't do this because I don't know how this BVCP thing works. It's a web application that spawns a browser window called a "VNC console" which is using noVNC. If I look at the system where BVCP is running I don't see an open VNC port, so I can't connect with another VNC viewer. # nmap 192.168.1.7 Starting Nmap 7.94 ( https://nmap.org ) at 2024-02-28 16:03 GMT Nmap scan report for tigerlily.disruptive.org.uk (192.168.1.7) Host is up (0.00019s latency). Not shown: 995 closed tcp ports (reset) PORT STATE SERVICE 22/tcp open ssh 80/tcp open http 111/tcp open rpcbind 2049/tcp open nfs 8086/tcp open d-s-n MAC Address: 7C:D3:0A:36:33:C9 (Inventec) Nmap done: 1 IP address (1 host up) scanned in 6.28 seconds 8086 is the port where the management web page side of it is accessed. noVNC is a javascript VNC client that runs in a browser. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1220569 https://bugzilla.suse.com/show_bug.cgi?id=1220569#c7 Stefan Dirsch <sndirsch@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |joan.torres@suse.com --- Comment #7 from Stefan Dirsch <sndirsch@suse.com> --- Ok. Then I have no idea how to help here. Seems like a blackbox then. Maybe Joan has a better clue. Adding him... -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1220569 https://bugzilla.suse.com/show_bug.cgi?id=1220569#c8 Joan Torres <joan.torres@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Flags| |needinfo?(roger.whittaker@s | |use.com) --- Comment #8 from Joan Torres <joan.torres@suse.com> --- I've tried to reproduce this in an updated Tumbleweed and couldn't. What is the version of xorg-x11-Xvnc on your Tumbleweed image and what is the novnc version on that FreeBSD? (In reply to Roger Whittaker from comment #0)
When installing the latest Tumbleweed the mouse pointer in the noVNC window does not move, nor does it move in a completed install.
This problem does not exist with for example Leap 15.5.
I think if with the same FreeBSD setup and connecting with Leap 15.5 (which has an older Xvnc) doesn't have the problem, the issue might be at our latest Xvnc... -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1220569 https://bugzilla.suse.com/show_bug.cgi?id=1220569#c9 Roger Whittaker <roger.whittaker@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Flags|needinfo?(roger.whittaker@s | |use.com) | --- Comment #9 from Roger Whittaker <roger.whittaker@suse.com> --- This is the 20240226 version of Tumbleweed which has xorg-x11-Xvnc-1.13.1-5.1.x86_64.rpm. noVNC is a javascript library running in the browser. The browser window has a pop-out settings panel that shows the version as 1.2.0. I started an installation of Leap 15.5 but did not complete it - during that installation the mouse pointer moved correctly. I also have a fully installed but not updated SLES 15 SP4 VM which has xorg-x11-Xvnc-1.10.1-150400.5.6.x86_64, and the mouse pointer moves correctly. I'd be happy to experiment with different Xvnc versions (for example a forced downgrade on Tumbleweed) if you can suggest what to try and where to get them. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1220569 https://bugzilla.suse.com/show_bug.cgi?id=1220569#c10 Joan Torres <joan.torres@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Flags| |needinfo?(roger.whittaker@s | |use.com) --- Comment #10 from Joan Torres <joan.torres@suse.com> --- Some things we could check: 1. At the novnc menu settings, the "View Only" checkbox option is not set? 2. How is launched Xvnc? It has some parameters to disallow the mouse. i.e. sudo ps aux | grep Xvnc. 3. What logs novnc? At the browser window it spawns, can you access its console log? 4. What logs Xvnc? In the case of Yast installer it should be at /var/log/YaST2/vncserver.log -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1220569 https://bugzilla.suse.com/show_bug.cgi?id=1220569#c11 --- Comment #11 from Roger Whittaker <roger.whittaker@suse.com> --- One more test: the mouse pointer when installing the current 15.6 (Build604.1) does not move. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1220569 https://bugzilla.suse.com/show_bug.cgi?id=1220569#c12 --- Comment #12 from Roger Whittaker <roger.whittaker@suse.com> --- In answer to comment#10 (looking at the installed Tumbleweed): 1. No, "View Only" is not set. 2. There is no Xvnc running in the Tumbleweed guest. localhost:~ # ps wuaxf | grep [X]vnc localhost:~ # localhost:~ # ps wuaxf | grep [X]org root 1204 2.4 0.8 908728 147092 tty2 Ssl+ 09:57 0:10 \_ /usr/bin/Xorg.bin -nolisten tcp -background none -seat seat0 vt2 -auth /run/sddm/xauth_YbMLnG -noreset -displayfd 16 3. In the "Settings -> Advanced" menu on noVNC, there is a choice of logging levels, but I've no idea how to access any logs. 4. For this I'll try starting and install again and see what happens. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1220569 https://bugzilla.suse.com/show_bug.cgi?id=1220569#c13 --- Comment #13 from Joan Torres <joan.torres@suse.com> --- (In reply to Roger Whittaker from comment #12)
2. There is no Xvnc running in the Tumbleweed guest.
Hmm, I wonder how BVCP starts a vnc server on the guest. Maybe it could be x0vncserver, could you grep ps with "vnc". -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1220569 https://bugzilla.suse.com/show_bug.cgi?id=1220569#c14 --- Comment #14 from Roger Whittaker <roger.whittaker@suse.com> --- There is no process running with the string "vnc" in its name. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1220569 https://bugzilla.suse.com/show_bug.cgi?id=1220569#c15 --- Comment #15 from Roger Whittaker <roger.whittaker@suse.com> --- Nor is there in the 15.6 installer. Listing of /var/log/ during the 15.6 installation: total 312 -rw-r--r-- 1 root root 43596 Feb 29 05:21 boot.msg lrwxrwxrwx 1 root root 30 Feb 29 05:21 chrony -> /mounts/mp_0001/var/log/chrony drwxr-xr-x 2 root root 4096 Feb 7 19:20 cups drwxr-xr-x 2 root root 4096 Dec 14 08:17 krb5 -rw-r--r-- 1 root root 25968 Feb 29 05:21 linuxrc.log -rw-r--r-- 1 root root 72850 Feb 29 05:23 messages -rw------- 1 root root 64462 Feb 29 05:22 plymouth-debug.log -rw------- 1 root root 32000 Feb 7 19:20 tallylog -rw-r--r-- 1 root root 146 Feb 29 05:18 udev.log -rw-r--r-- 1 root root 1367 Feb 29 05:23 warn -rw-r--r-- 1 root root 17826 Feb 29 05:21 wickedd.log -rw-r----- 1 root root 40 Feb 29 05:18 wpa_supplicant.log -rw-r--r-- 1 root root 14363 Feb 29 05:24 Xorg.0.log drwxr-xr-x 3 root root 4096 Feb 29 05:23 YaST2 drwxr-xr-x 2 root root 4096 Feb 29 05:23 zypp -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1220569 https://bugzilla.suse.com/show_bug.cgi?id=1220569#c16 Roger Whittaker <roger.whittaker@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Flags|needinfo?(roger.whittaker@s | |use.com) | --- Comment #16 from Roger Whittaker <roger.whittaker@suse.com> --- Created attachment 873115 --> https://bugzilla.suse.com/attachment.cgi?id=873115&action=edit Xorg.0.log /var/log/Xorg.0.log from 15.6 installation after the graphical installer has started -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1220569 https://bugzilla.suse.com/show_bug.cgi?id=1220569#c17 --- Comment #17 from Joan Torres <joan.torres@suse.com> --- Thanks for those logs. I can see there that your SP6 uses Xorg 21.1.4 version while Tumbleweed uses 21.1.11. So if both have this mouse issue, it looks like it is not related with Xorg. Hmm, interesting, this Xorg logs:
[ 349.952] (II) event3 - Power Button: device removed [ 349.977] (II) event0 - AT Translated Set 2 keyboard: device removed [ 350.001] (II) event1 - PS/2 Generic Mouse: device removed
Maybe it's a regression with libinput. SP6 and Tumbleweed have 1.25 version and SP5 has 1.21 version. Could you test with the 1.21 version? Here I made a package with that version: https://build.opensuse.org/package/show/home:jtorres:branches:X11:XOrg:tiger... -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1220569 https://bugzilla.suse.com/show_bug.cgi?id=1220569#c18 --- Comment #18 from Roger Whittaker <roger.whittaker@suse.com> --- These are currently showing as not being published: "Build finished but repository publishing is disabled". -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1220569 https://bugzilla.suse.com/show_bug.cgi?id=1220569#c19 --- Comment #19 from Roger Whittaker <roger.whittaker@suse.com> --- On 15.6 I force downgraded these packages to the 15.5 versions: libinput-udev-1.21.0-150500.1.2 libinput10-1.21.0-150500.1.2 xf86-input-libinput-1.2.1-150500.1.2 But the problem remains. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1220569 https://bugzilla.suse.com/show_bug.cgi?id=1220569#c20 --- Comment #20 from Roger Whittaker <roger.whittaker@suse.com> --- And still remains after downgrading to xorg-x11-server-21.1.4-150500.5.1.x86_64.rpm -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1220569 https://bugzilla.suse.com/show_bug.cgi?id=1220569#c21 --- Comment #21 from Roger Whittaker <roger.whittaker@suse.com> --- I also downgraded to xf86-input-vmmouse-13.1.0-bp155.3.11.x86_64.rpm 15.6 has the same version of xf86-input-evdev as 15.5: xf86-input-evdev-2.10.6-150500.15.2.x86_64.rpm I see this in /var/log/Xorg.0.log [ 33.965] (II) config/udev: Adding input device PS/2 Generic Mouse (/dev/input/event1) [ 33.965] (**) PS/2 Generic Mouse: Applying InputClass "evdev pointer catchall" [ 33.965] (**) PS/2 Generic Mouse: Applying InputClass "libinput pointer catchall" [ 33.966] (II) Using input driver 'libinput' for 'PS/2 Generic Mouse' [ 33.966] (**) PS/2 Generic Mouse: always reports core events [ 33.966] (**) Option "Device" "/dev/input/event1" [ 33.973] (II) event1 - PS/2 Generic Mouse: is tagged by udev as: Mouse [ 33.974] (II) event1 - PS/2 Generic Mouse: device is a pointer [ 33.975] (II) event1 - PS/2 Generic Mouse: device removed [ 33.984] (**) Option "config_info" "udev:/sys/devices/platform/i8042/serio1/input/input2/event1" [ 33.984] (II) XINPUT: Adding extended input device "PS/2 Generic Mouse" (type: MOUSE, id 8) [ 33.985] (**) Option "AccelerationScheme" "none" [ 33.985] (**) PS/2 Generic Mouse: (accel) selected scheme none/0 [ 33.985] (**) PS/2 Generic Mouse: (accel) acceleration factor: 2.000 [ 33.985] (**) PS/2 Generic Mouse: (accel) acceleration threshold: 4 [ 33.991] (II) event1 - PS/2 Generic Mouse: is tagged by udev as: Mouse [ 33.992] (II) event1 - PS/2 Generic Mouse: device is a pointer [ 33.998] (II) config/udev: Adding input device PS/2 Generic Mouse (/dev/input/mouse0) [ 33.998] (II) No input driver specified, ignoring this device. [ 33.998] (II) This device may have been added with another device file. [ 34.000] (II) config/udev: Adding input device PC Speaker (/dev/input/event3) [ 34.000] (II) No input driver specified, ignoring this device. [ 34.000] (II) This device may have been added with another device file. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1220569 https://bugzilla.suse.com/show_bug.cgi?id=1220569#c22 --- Comment #22 from Roger Whittaker <roger.whittaker@suse.com> --- I have now replaced packages with those from https://download.opensuse.org/repositories/home:/jtorres:/branches:/X11:/XOr... but I still see the same behaviour. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1220569 https://bugzilla.suse.com/show_bug.cgi?id=1220569#c23 --- Comment #23 from Roger Whittaker <roger.whittaker@suse.com> --- Now I have installed the kernel 5.14.21-150500.53-default from 15.5, booted into that, and now the mouse pointer moves.... So it's a kernel thing. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1220569 https://bugzilla.suse.com/show_bug.cgi?id=1220569#c24 Joan Torres <joan.torres@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Flags| |needinfo?(tiwai@suse.com), | |needinfo?(oneukum@suse.com) CC| |oneukum@suse.com, | |tiwai@suse.com --- Comment #24 from Joan Torres <joan.torres@suse.com> --- It looks like something is happening with the PS/2 mouse and keyboard. They are being removed somehow? -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1220569 https://bugzilla.suse.com/show_bug.cgi?id=1220569#c25 Takashi Iwai <tiwai@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Flags|needinfo?(tiwai@suse.com) |needinfo?(roger.whittaker@s | |use.com) --- Comment #25 from Takashi Iwai <tiwai@suse.com> --- If it's a kernel regression, please give the dmesg outputs from both working and non-working caess. Also the outputs of hwinfo, too. You can try other older kernels found in my OBS repos, e.g. home:tiwai:kernel:5.15, home:tiwai:kernel:5.16, ... home:tiwai:kernel:6.6, and figure out which kernel version started failing. It'll be helpful to narrow down the regression range. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1220569 https://bugzilla.suse.com/show_bug.cgi?id=1220569#c26 --- Comment #26 from Roger Whittaker <roger.whittaker@suse.com> --- Created attachment 873131 --> https://bugzilla.suse.com/attachment.cgi?id=873131&action=edit hwinfo -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1220569 https://bugzilla.suse.com/show_bug.cgi?id=1220569#c27 --- Comment #27 from Roger Whittaker <roger.whittaker@suse.com> --- Created attachment 873132 --> https://bugzilla.suse.com/attachment.cgi?id=873132&action=edit dmesg.5.14.21-150500.53-default -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1220569 https://bugzilla.suse.com/show_bug.cgi?id=1220569#c28 --- Comment #28 from Roger Whittaker <roger.whittaker@suse.com> --- Created attachment 873133 --> https://bugzilla.suse.com/attachment.cgi?id=873133&action=edit dmesg.6.4.0-150600.5-default -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1220569 https://bugzilla.suse.com/show_bug.cgi?id=1220569#c29 --- Comment #29 from Takashi Iwai <tiwai@suse.com> --- Could you give the hwinfo from the non-working case, too? -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1220569 https://bugzilla.suse.com/show_bug.cgi?id=1220569#c30 --- Comment #30 from Roger Whittaker <roger.whittaker@suse.com> --- Created attachment 873134 --> https://bugzilla.suse.com/attachment.cgi?id=873134&action=edit hwinfo.6.4.0-150600.5-default -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1220569 https://bugzilla.suse.com/show_bug.cgi?id=1220569#c31 Roger Whittaker <roger.whittaker@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Flags|needinfo?(roger.whittaker@s | |use.com) | --- Comment #31 from Roger Whittaker <roger.whittaker@suse.com> --- In answer to comment#25 I find that I can't install the the 5.19 or 6.2 kernels from https://download.opensuse.org/repositories/home:/tiwai:/kernel:/ I see errors like Problem: the to be installed kernel-default-5.19.12-1.1.g95fa5b8.x86_64 conflicts with 'filesystem < 16' provided by the installed filesystem-15.0-11.8.1.x86_64 If I download the kernel and install with rpm --oldpackage --force --nodeps it fails with warning: %post(kernel-default-6.2.12-1.1.geb3255d.x86_64) scriptlet failed, exit status 1 and I find that there's no kernel or initrd in /boot, only broken symlinks. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1220569 https://bugzilla.suse.com/show_bug.cgi?id=1220569#c32 --- Comment #32 from Takashi Iwai <tiwai@suse.com> --- If you're installing on SLE/Leap, take the packages from "backport" instead of "standard" in my OBS home:tiwai:kernel:*. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1220569 https://bugzilla.suse.com/show_bug.cgi?id=1220569#c33 Stefan Dirsch <sndirsch@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- QA Contact|gfx-bugs@suse.de |qa-bugs@suse.de Component|X.Org |Kernel Assignee|gfx-bugs@suse.de |kernel-bugs@opensuse.org --- Comment #33 from Stefan Dirsch <sndirsch@suse.com> --- Let's assign to kernel component. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1220569 https://bugzilla.suse.com/show_bug.cgi?id=1220569#c34 --- Comment #34 from Roger Whittaker <roger.whittaker@suse.com> --- 5.19.12-lp153.1.g95fa5b8-default: mouse pointer moves -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1220569 https://bugzilla.suse.com/show_bug.cgi?id=1220569#c35 --- Comment #35 from Roger Whittaker <roger.whittaker@suse.com> --- 6.2.12-lp154.1.geb3255d-default: mouse pointer moves -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1220569 https://bugzilla.suse.com/show_bug.cgi?id=1220569#c36 --- Comment #36 from Roger Whittaker <roger.whittaker@suse.com> --- 6.3.9-lp154.1.g0df701d-default: mouse pointer moves -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1220569 https://bugzilla.suse.com/show_bug.cgi?id=1220569#c37 --- Comment #37 from Roger Whittaker <roger.whittaker@suse.com> --- 6.4.12-lp154.1.gf5aa89b-default: mouse pointer moves -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1220569 https://bugzilla.suse.com/show_bug.cgi?id=1220569#c38 --- Comment #38 from Roger Whittaker <roger.whittaker@suse.com> --- BUT:... 6.4.0-150600.5-default: mouse pointer does not move -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1220569 https://bugzilla.suse.com/show_bug.cgi?id=1220569#c39 --- Comment #39 from Roger Whittaker <roger.whittaker@suse.com> --- And as mentioned before: 6.7.6-1-default: mouse pointer does not move I hope this helps. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1220569 https://bugzilla.suse.com/show_bug.cgi?id=1220569#c40 --- Comment #40 from Roger Whittaker <roger.whittaker@suse.com> --- Installing the last (Tumbleweed) kernel has probably messed up the system because it forced the usr-merge thing. But I can rebuild it and test > 6.4 from your repositories if it helps. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1220569 https://bugzilla.suse.com/show_bug.cgi?id=1220569#c41 --- Comment #41 from Takashi Iwai <tiwai@suse.com> --- (In reply to Roger Whittaker from comment #40)
Installing the last (Tumbleweed) kernel has probably messed up the system because it forced the usr-merge thing.
Ah, that's bad. You should have installed the kernel from OBS Kernel:stable:Backport repo instead, which was built for SLE/Leap.
But I can rebuild it and test > 6.4 from your repositories if it helps.
Yes, please check which upstream kernel started breaking. It's already good to know that SLE15-SP6/Leap kernel breaks, but it has way too many (over 19000!) changes since the upstream 6.4 code. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1220569 https://bugzilla.suse.com/show_bug.cgi?id=1220569#c42 --- Comment #42 from Roger Whittaker <roger.whittaker@suse.com> --- This is a wild guess based on no knowledge of how the code works, but I was wondering if the change has anything to do with the references to psmouse_from_serio which I see in drivers/input/mouse/psmouse.* in 6.7.6-1 but not in 5.14.21-150500.55.49. Also, I was wondering if there's a convenient place to find all the historic Tumbleweed kernels so that I could bisect by downgrading the kernel on a Tumbleweed VM? -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1220569 https://bugzilla.suse.com/show_bug.cgi?id=1220569#c43 --- Comment #43 from Takashi Iwai <tiwai@suse.com> --- (In reply to Roger Whittaker from comment #42)
This is a wild guess based on no knowledge of how the code works, but I was wondering if the change has anything to do with the references to psmouse_from_serio which I see in drivers/input/mouse/psmouse.* in 6.7.6-1 but not in 5.14.21-150500.55.49.
Which commit (or changelog entry) are you referring to?
Also, I was wondering if there's a convenient place to find all the historic Tumbleweed kernels so that I could bisect by downgrading the kernel on a Tumbleweed VM?
TW history repo contains the old packages for a few weeks http://download.opensuse.org/history/ But it's for TW, i.e. with user-merge. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1220569 https://bugzilla.suse.com/show_bug.cgi?id=1220569#c44 --- Comment #44 from Roger Whittaker <roger.whittaker@suse.com> --- 6.5.9-lp155.1.g1823166-default: mouse pointer does *not* move. So the change is between 6.4.12-lp154.1.gf5aa89b-default and 6.5.9-lp155.1.g1823166-default in the kernels in https://download.opensuse.org/repositories/home:/tiwai:/kernel:/ -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1220569 https://bugzilla.suse.com/show_bug.cgi?id=1220569#c45 --- Comment #45 from Takashi Iwai <tiwai@suse.com> --- OK, thanks. Given that the breakage was seen on SLE15-SP6 branch, too, a suspected commit is e2cb5cc822b6c9ee72c56ce1d81671b22c05406a Input: psmouse - fix fast_reconnect function for PS/2 mode I'm build test kernels with the revert of the patch. For SLE15-SP6/Leap 15.6, it's being built in OBS home:tiwai:bsc1220569-sle15-sp6 repo. For 6.7.x Tumbleweed, it's being built in OBS home:tiwai:bsc1220569-stable repo. This will contain both for TW ("standard") and SLE/Leap installation ("backport"). Please give it a try later. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1220569 https://bugzilla.suse.com/show_bug.cgi?id=1220569#c46 --- Comment #46 from Roger Whittaker <roger.whittaker@suse.com> --- SP6 with 6.4.0-150600.1.g2fbacfa-default from https://download.opensuse.org/repositories/home:/tiwai:/bsc1220569-sle15-sp6... Mouse pointer does *not* move... -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1220569 https://bugzilla.suse.com/show_bug.cgi?id=1220569#c47 --- Comment #47 from Takashi Iwai <tiwai@suse.com> --- Hmm, that's tough. As this doesn't appear to be any logged error, it's hardly recognizable from the kernel messages, too. OK, then let's concentrate on SLE15-SP6 development and try to narrow down the range there. We have old SP6 kernels in kerncvs KOTD archive. https://kerncvs.suse.de/kernel-overview/?b=SLE15-SP6;a=kotd;p=sle15-sp6 For example, try this one on Aug 24, 2023: https://kerncvs.suse.de/kerneltest/suse/28f1b80/ The version is 6.4.12, and this should still work. OTOH, the one almost corresponding to the version you tested 6.4.0-150600.5 is on Jan 25, 2024: https://kerncvs.suse.de/kerneltest/suse/55022e2/ This should be broken. If the former works and the latter broken, you can try to bisect the package builds between them, as found in the KOTD archive list above. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1220569 https://bugzilla.suse.com/show_bug.cgi?id=1220569#c48 --- Comment #48 from Roger Whittaker <roger.whittaker@suse.com> --- I've installed both kernel-default-6.4.12-150600.3.1.g28f1b80.x86_64 and kernel-default-6.4.11-150600.4.1.g79fa783.x86_64 from the location you mentioned, but both of them fail to boot, hanging at "Loading initial ramdisk ..." - I'm not sure why this would be as the initrd seems to have been created correctly for each and is a sensible size. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1220569 https://bugzilla.suse.com/show_bug.cgi?id=1220569#c49 --- Comment #49 from Roger Whittaker <roger.whittaker@suse.com> --- 6.4.0-150600.26.gf468b74-default from https://kerncvs.suse.de/kerneltest/suse/f468b74/ (28 Sep 2023) boots but mouse pointer does not move. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1220569 https://bugzilla.suse.com/show_bug.cgi?id=1220569#c50 --- Comment #50 from Roger Whittaker <roger.whittaker@suse.com> --- 6.4.12-150600.17.g045364c-default (29 Aug 2023): mouse pointer moves. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1220569 https://bugzilla.suse.com/show_bug.cgi?id=1220569#c51 --- Comment #51 from Roger Whittaker <roger.whittaker@suse.com> --- 6.4.14-150600.7.g79dfe00-default (5 Sep 2023): mouse pointer moves. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1220569 https://bugzilla.suse.com/show_bug.cgi?id=1220569#c52 --- Comment #52 from Roger Whittaker <roger.whittaker@suse.com> --- 6.4.0-150600.33.geb0b8b0-default (7 Oct 2023): mouse pointer does not move. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1220569 https://bugzilla.suse.com/show_bug.cgi?id=1220569#c53 --- Comment #53 from Roger Whittaker <roger.whittaker@suse.com> --- 6.4.0-150600.4.g3c5d96c-default (15 Sep 2023): mouse pointer does not move. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1220569 https://bugzilla.suse.com/show_bug.cgi?id=1220569#c54 --- Comment #54 from Roger Whittaker <roger.whittaker@suse.com> --- 6.4.15-150600.10.g02c4a14-default (11 Sep 2023): mouse pointer does not move. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1220569 https://bugzilla.suse.com/show_bug.cgi?id=1220569#c55 --- Comment #55 from Roger Whittaker <roger.whittaker@suse.com> --- 6.4.15-150600.9.g83dedd5-default (9 Sep 2023): mouse pointer does not move. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1220569 https://bugzilla.suse.com/show_bug.cgi?id=1220569#c56 --- Comment #56 from Roger Whittaker <roger.whittaker@suse.com> --- 6.4.15-150600.6.ge3cf1f9-default (7 Sep 2023): mouse pointer does not move. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1220569 https://bugzilla.suse.com/show_bug.cgi?id=1220569#c57 --- Comment #57 from Roger Whittaker <roger.whittaker@suse.com> --- 6.4.14-150600.15.gf11caa7-default (6 Sep 2023): mouse pointer does not move. So between 6.4.14-150600.7.g79dfe00-default (5 Sep 2023) and 6.4.14-150600.15.gf11caa7-default (6 Sep 2023) -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1220569 https://bugzilla.suse.com/show_bug.cgi?id=1220569#c58 --- Comment #58 from Roger Whittaker <roger.whittaker@suse.com> --- 6.4.14-150600.12.g7e8d545-default (6 Sep 2023 15:30) mouse pointer moves. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1220569 https://bugzilla.suse.com/show_bug.cgi?id=1220569#c59 --- Comment #59 from Roger Whittaker <roger.whittaker@suse.com> --- 6.4.14-150600.13.g1247cee-default (6 Sep 2023 18:30) mouse pointer does not move. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1220569 https://bugzilla.suse.com/show_bug.cgi?id=1220569#c60 --- Comment #60 from Roger Whittaker <roger.whittaker@suse.com> --- So the change would seem to be between these two: 7e8d545 Wed Sep 6 15:30:32 2023 kernel-default-6.4.14-150600.12.1.g7e8d545.x86_64.rpm 1247cee Wed Sep 6 18:30:04 2023 kernel-default-6.4.14-150600.13.1.g1247cee.x86_64.rpm -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1220569 https://bugzilla.suse.com/show_bug.cgi?id=1220569#c61 --- Comment #61 from Roger Whittaker <roger.whittaker@suse.com> --- (Sorry for using bugzilla as my notebook...But I hope this has narrowed it down successfully.) -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1220569 https://bugzilla.suse.com/show_bug.cgi?id=1220569#c62 --- Comment #62 from Takashi Iwai <tiwai@suse.com> --- (In reply to Roger Whittaker from comment #60)
So the change would seem to be between these two:
7e8d545 Wed Sep 6 15:30:32 2023 kernel-default-6.4.14-150600.12.1.g7e8d545.x86_64.rpm
1247cee Wed Sep 6 18:30:04 2023 kernel-default-6.4.14-150600.13.1.g1247cee.x86_64.rpm
Thanks! This is really helpful, and the result is interesting. % git log --pretty=oneline 7e8d545..1247cee 1247ceec5c8e6d9fad9399c9c28b682767860ff6 Merge branch 'users/msuchanek/SLE15-SP6/for-next' into SLE15-SP6 d6762837a96bddd1fab0d5a592f7fa70cf26e051 Merge branch 'users/oneukum/SLE15-SP6/for-next' into SLE15-SP6 30a3314eef40dc4c00ae7e7445c27f7360b3190e update patch metadata 7c7578cc66b26e803969049de50119982e379316 thunderbolt: dma_test: Update MODULE_DESCRIPTION (jsc#PED-6061). 036b91f3046d0112cd69b0f3e8163d292449cc4b thunderbolt: Add MODULE_DESCRIPTION (jsc#PED-6061). 4cd9a389739cce900f92996e5f803e58880424b6 thunderbolt: Allow specifying custom credits for DMA tunnels (jsc#PED-6061). 905721871f7052e6dd5566d7726419dafd7ff1f1 thunderbolt: Check for ring 0 in tb_tunnel_alloc_dma() (jsc#PED-6061). 898ed7a0cf2d3fc44df8c57939b737e11a963c88 USB: core: Fix oversight in SuperSpeed initialization (bsc#1213123 CVE-2023-37453). a10e1a729ef1f964d97b27521233e89098fbe8fb USB: core: Fix race by not overwriting udev->descriptor in hub_port_init() (bsc#1213123 CVE-2023-37453). 0cbb8bf1b95a4afa4cfca31c885c9a82b6288c51 USB: core: Change usb_get_device_descriptor() API (bsc#1213123 CVE-2023-37453). 2d3dfbdbbfce8981b7e21a87c3f6b8a1a566179a USB: core: Unite old scheme and new scheme descriptor reads (bsc#1213123 CVE-2023-37453). So mainly only USB and Thunderbolt changes between those commits. And, I believe that the misleading thing was that it looks as if a mouse. But I believe it must be rather the device "BHYVE HID Tablet" that appears for the working case and disappears for the broken case. Check the both 6.4.* kernels you tested above; the working case should have BHYVE HID tablet while the broken one shouldn't. If my guess is right, it explains why the commits above may break. It's a (virtual) USB input device, after all. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1220569 https://bugzilla.suse.com/show_bug.cgi?id=1220569#c63 --- Comment #63 from Takashi Iwai <tiwai@suse.com> --- Also, Roger, could you give lsusb -v output? -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1220569 https://bugzilla.suse.com/show_bug.cgi?id=1220569#c64 --- Comment #64 from Roger Whittaker <roger.whittaker@suse.com> --- Yes: $ grep "BHYVE HID" dmesg.6.4.14-150600.12.g7e8d545-default [ 8.749490] input: BHYVE HID Tablet as /devices/pci0000:00/0000:00:1e.0/usb2/2-1/2-1:1.0/0003:FB5D:0001.0001/input/input3 [ 8.749841] hid-generic 0003:FB5D:0001.0001: input,hidraw0: USB HID v10.01 Mouse [BHYVE HID Tablet] on usb-0000:00:1e.0-1/input0 $ grep "BHYVE HID" dmesg.6.4.14-150600.13.g1247cee-default [no output] -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1220569 https://bugzilla.suse.com/show_bug.cgi?id=1220569#c65 --- Comment #65 from Roger Whittaker <roger.whittaker@suse.com> --- Created attachment 873178 --> https://bugzilla.suse.com/attachment.cgi?id=873178&action=edit dmesg.6.4.14-150600.12.g7e8d545-default -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1220569 https://bugzilla.suse.com/show_bug.cgi?id=1220569#c66 --- Comment #66 from Roger Whittaker <roger.whittaker@suse.com> --- Created attachment 873179 --> https://bugzilla.suse.com/attachment.cgi?id=873179&action=edit dmesg.6.4.14-150600.13.g1247cee-default -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1220569 https://bugzilla.suse.com/show_bug.cgi?id=1220569#c67 --- Comment #67 from Roger Whittaker <roger.whittaker@suse.com> --- Created attachment 873180 --> https://bugzilla.suse.com/attachment.cgi?id=873180&action=edit lsusb-v.6.4.14-150600.12.g7e8d545-default -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1220569 https://bugzilla.suse.com/show_bug.cgi?id=1220569#c68 --- Comment #68 from Roger Whittaker <roger.whittaker@suse.com> --- Created attachment 873181 --> https://bugzilla.suse.com/attachment.cgi?id=873181&action=edit lsusb-v.6.4.14-150600.13.g1247cee-default -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1220569 https://bugzilla.suse.com/show_bug.cgi?id=1220569#c69 Takashi Iwai <tiwai@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Assignee|kernel-bugs@opensuse.org |oneukum@suse.com Flags|needinfo?(oneukum@suse.com) | --- Comment #69 from Takashi Iwai <tiwai@suse.com> --- Thanks. Through a quick glance, the problem seems to be the device setting 8 to bMaxPacketSize0 while it's in super speed. For super speed, it should be a logarithmic value and that doesn't match with the endpoint. The patch patches.suse/USB-core-Fix-oversight-in-SuperSpeed-initialization.patch (the upstream commit 59cf445754566984fd55af19ba7146c76e6627bc) introduced a more strict check for the ep0 maxpacket size. Tossing to Oliver, as this is a USB core issue. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1220569 https://bugzilla.suse.com/show_bug.cgi?id=1220569#c70 Takashi Iwai <tiwai@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Flags| |needinfo?(roger.whittaker@s | |use.com) --- Comment #70 from Takashi Iwai <tiwai@suse.com> --- I'm building a test kernel with a potential workaround patch. It's being built in OBS home:tiwai:bsc1220569-2 repo. Could you give it a try later, and attach the dmesg output? -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1220569 https://bugzilla.suse.com/show_bug.cgi?id=1220569#c71 --- Comment #71 from Takashi Iwai <tiwai@suse.com> --- Created attachment 873185 --> https://bugzilla.suse.com/attachment.cgi?id=873185&action=edit Test patch -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1220569 https://bugzilla.suse.com/show_bug.cgi?id=1220569#c72 --- Comment #72 from Roger Whittaker <roger.whittaker@suse.com> --- 6.4.0-150600.1.g3905d67-default from https://download.opensuse.org/repositories/home:/tiwai:/bsc1220569-2/pool/ Mouse pointer does not move. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1220569 https://bugzilla.suse.com/show_bug.cgi?id=1220569#c73 --- Comment #73 from Roger Whittaker <roger.whittaker@suse.com> --- Created attachment 873186 --> https://bugzilla.suse.com/attachment.cgi?id=873186&action=edit dmesg.6.4.0-150600.1.g3905d67-default -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1220569 Roger Whittaker <roger.whittaker@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Flags|needinfo?(roger.whittaker@s | |use.com) | -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1220569 https://bugzilla.suse.com/show_bug.cgi?id=1220569#c74 Takashi Iwai <tiwai@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Flags| |needinfo? --- Comment #74 from Takashi Iwai <tiwai@suse.com> --- Ah I misunderstood the behavior. It's still the initial value 512 that didn't match with the descriptor value 8 (i.e. 256). I'm binding another test kernel in OBS home:tiwai:bsc1220569-3 repo. Could you retry later? -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1220569 https://bugzilla.suse.com/show_bug.cgi?id=1220569#c75 --- Comment #75 from Takashi Iwai <tiwai@suse.com> --- Created attachment 873187 --> https://bugzilla.suse.com/attachment.cgi?id=873187&action=edit Revised test patch -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1220569 https://bugzilla.suse.com/show_bug.cgi?id=1220569#c76 Takashi Iwai <tiwai@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Attachment #873187|0 |1 is obsolete| | --- Comment #76 from Takashi Iwai <tiwai@suse.com> --- Created attachment 873188 --> https://bugzilla.suse.com/attachment.cgi?id=873188&action=edit Revised test patch -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1220569 https://bugzilla.suse.com/show_bug.cgi?id=1220569#c77 --- Comment #77 from Roger Whittaker <roger.whittaker@suse.com> --- 6.4.0-150600.2.g8e5d5a9-default from https://download.opensuse.org/repositories/home:/tiwai:/bsc1220569-3/pool/ Mouse pointer moves. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1220569 https://bugzilla.suse.com/show_bug.cgi?id=1220569#c78 --- Comment #78 from Roger Whittaker <roger.whittaker@suse.com> --- Created attachment 873189 --> https://bugzilla.suse.com/attachment.cgi?id=873189&action=edit dmesg.6.4.0-150600.2.g8e5d5a9-default -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1220569 https://bugzilla.suse.com/show_bug.cgi?id=1220569#c79 --- Comment #79 from Roger Whittaker <roger.whittaker@suse.com> --- Created attachment 873190 --> https://bugzilla.suse.com/attachment.cgi?id=873190&action=edit lsusb-v.6.4.0-150600.2.g8e5d5a9-default -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1220569 Roger Whittaker <roger.whittaker@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Flags|needinfo? | -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1220569 https://bugzilla.suse.com/show_bug.cgi?id=1220569#c80 Roger Whittaker <roger.whittaker@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Flags| |needinfo?(tiwai@suse.com) --- Comment #80 from Roger Whittaker <roger.whittaker@suse.com> --- It looks like this is solved - thanks very much - is the fix final and will it go into future kernels? -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1220569 https://bugzilla.suse.com/show_bug.cgi?id=1220569#c81 Takashi Iwai <tiwai@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Flags|needinfo?(tiwai@suse.com) | --- Comment #81 from Takashi Iwai <tiwai@suse.com> --- (In reply to Roger Whittaker from comment #80)
It looks like this is solved - thanks very much - is the fix final and will it go into future kernels?
Err, no, it's not fixed yet at all. The kernel I provided only for a test patch, and maybe it's not correct. Oliver, could you move this issue to the USB upstream? It's a recent upstream regression, after all. (see comment 62 and comment 69, the USB core change caused it.) -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1220569 https://bugzilla.suse.com/show_bug.cgi?id=1220569#c82 --- Comment #82 from Takashi Iwai <tiwai@suse.com> --- Oliver? This is an upstream USB core regression. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1220569 https://bugzilla.suse.com/show_bug.cgi?id=1220569#c83 --- Comment #83 from Roger Whittaker <roger.whittaker@suse.com> --- Just for the record, I tested SLES 15 SP6 RC1 to see whether the remote administration over web using noVNC would work: "Allow Remote Administration With Session Management" "Enable access using a web browser" In the remote web session on port 5801 the mouse pointed *does* move correctly. 6.4.0-150600.10-default -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1220569 https://bugzilla.suse.com/show_bug.cgi?id=1220569#c84 Takashi Iwai <tiwai@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Flags| |needinfo?(roger.whittaker@s | |use.com) --- Comment #84 from Takashi Iwai <tiwai@suse.com> --- We're still waiting for the proper upstream fix: https://lore.kernel.org/r/9efbd569-7059-4575-983f-0ea30df41871@suse.com I'm building a newer test kernel with Alan's latest patch in OBS home:tiwai:bsc1220569-4 repo. Could you try it later and confirm whether it still works or not? -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1220569 https://bugzilla.suse.com/show_bug.cgi?id=1220569#c85 Roger Whittaker <roger.whittaker@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Flags|needinfo?(roger.whittaker@s | |use.com) | --- Comment #85 from Roger Whittaker <roger.whittaker@suse.com> --- Successful test. I installed SLES 15 SP6 RC1. During and after the install the mouse pointer did not move. After installing and rebooting into your kernel-default-6.4.0-150600.1.1.gb538367.x86_64.rpm the mouse pointer does move. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1220569 https://bugzilla.suse.com/show_bug.cgi?id=1220569#c86 --- Comment #86 from Takashi Iwai <tiwai@suse.com> --- (In reply to Roger Whittaker from comment #85)
Successful test.
I installed SLES 15 SP6 RC1. During and after the install the mouse pointer did not move.
After installing and rebooting into your
kernel-default-6.4.0-150600.1.1.gb538367.x86_64.rpm
the mouse pointer does move.
Good to hear! Now we are slowly moving forward for the upstream resolution. Are you OK with the following entries to be included in the upstream patch? Reported-and-tested-by: Roger Whittaker <roger.whittaker@suse.com> Link: https://bugzilla.suse.com/show_bug.cgi?id=1220569 -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1220569 https://bugzilla.suse.com/show_bug.cgi?id=1220569#c87 --- Comment #87 from Roger Whittaker <roger.whittaker@suse.com> --- Thank you. That would be fine. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1220569 https://bugzilla.suse.com/show_bug.cgi?id=1220569#c88 --- Comment #88 from Takashi Iwai <tiwai@suse.com> --- The upstream fix patch was submitted: https://lore.kernel.org/r/4058ac05-237c-4db4-9ecc-5af42bdb4501@rowland.harva... Now I backported the fix to SLE15-SP6 and stable branches. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1220569 https://bugzilla.suse.com/show_bug.cgi?id=1220569#c95 --- Comment #95 from Maintenance Automation <maint-coord+maintenance-robot@suse.de> --- SUSE-SU-2024:1644-1: An update that solves 190 vulnerabilities, contains one feature and has 41 security fixes can now be installed. Category: security (important) Bug References: 1141539, 1190576, 1192145, 1192837, 1193629, 1196869, 1200313, 1201308, 1201489, 1203906, 1203935, 1204614, 1207361, 1211592, 1213573, 1217339, 1217408, 1218562, 1218917, 1219104, 1219126, 1219141, 1219169, 1219170, 1219264, 1220342, 1220569, 1220761, 1221042, 1221044, 1221080, 1221084, 1221088, 1221299, 1221612, 1221617, 1221645, 1221825, 1222294, 1222307, 1222357, 1222368, 1222379, 1222385, 1222424, 1222430, 1222435, 1222482, 1222559, 1222585, 1222613, 1222615, 1222618, 1222624, 1222666, 1222669, 1222671, 1222703, 1222704, 1222709, 1222710, 1222721, 1222726, 1222773, 1222776, 1222785, 1222787, 1222790, 1222791, 1222792, 1222793, 1222796, 1222812, 1222824, 1222829, 1222832, 1222836, 1222838, 1222866, 1222867, 1222869, 1222870, 1222876, 1222878, 1222879, 1222881, 1222883, 1222888, 1222894, 1222901, 1222968, 1222976, 1223012, 1223014, 1223016, 1223024, 1223033, 1223034, 1223035, 1223036, 1223037, 1223041, 1223042, 1223051, 1223052, 1223056, 1223057, 1223058, 1223060, 1223061, 1223065, 1223066, 1223076, 1223078, 1223111, 1223115, 1223118, 1223119, 1223140, 1223187, 1223189, 1223190, 1223191, 1223196, 1223197, 1223198, 1223207, 1223275, 1223323, 1223360, 1223369, 1223380, 1223432, 1223473, 1223474, 1223475, 1223477, 1223478, 1223479, 1223481, 1223482, 1223484, 1223487, 1223490, 1223496, 1223498, 1223499, 1223501, 1223502, 1223503, 1223505, 1223509, 1223511, 1223512, 1223513, 1223516, 1223517, 1223518, 1223519, 1223520, 1223522, 1223523, 1223525, 1223536, 1223539, 1223574, 1223595, 1223598, 1223628, 1223634, 1223640, 1223643, 1223644, 1223645, 1223646, 1223648, 1223655, 1223657, 1223660, 1223661, 1223663, 1223664, 1223668, 1223670, 1223679, 1223686, 1223693, 1223705, 1223714, 1223735, 1223738, 1223745, 1223784, 1223785, 1223790, 1223816, 1223821, 1223822, 1223823, 1223824, 1223827, 1223834, 1223858, 1223875, 1223876, 1223877, 1223878, 1223879, 1223894, 1223921, 1223922, 1223923, 1223924, 1223929, 1223931, 1223932, 1223934, 1223941, 1223948, 1223949, 1223950, 1223951, 1223952, 1223953, 1223956, 1223957, 1223960, 1223962, 1223963, 1223964, 1223996 CVE References: CVE-2021-47047, CVE-2021-47184, CVE-2021-47185, CVE-2021-47187, CVE-2021-47188, CVE-2021-47191, CVE-2021-47192, CVE-2021-47193, CVE-2021-47194, CVE-2021-47195, CVE-2021-47196, CVE-2021-47197, CVE-2021-47198, CVE-2021-47199, CVE-2021-47200, CVE-2021-47201, CVE-2021-47202, CVE-2021-47203, CVE-2021-47204, CVE-2021-47205, CVE-2021-47206, CVE-2021-47207, CVE-2021-47209, CVE-2021-47210, CVE-2021-47211, CVE-2021-47212, CVE-2021-47214, CVE-2021-47215, CVE-2021-47216, CVE-2021-47217, CVE-2021-47218, CVE-2021-47219, CVE-2022-48631, CVE-2022-48632, CVE-2022-48634, CVE-2022-48636, CVE-2022-48637, CVE-2022-48638, CVE-2022-48639, CVE-2022-48640, CVE-2022-48642, CVE-2022-48644, CVE-2022-48646, CVE-2022-48647, CVE-2022-48648, CVE-2022-48650, CVE-2022-48651, CVE-2022-48652, CVE-2022-48653, CVE-2022-48654, CVE-2022-48655, CVE-2022-48656, CVE-2022-48657, CVE-2022-48658, CVE-2022-48659, CVE-2022-48660, CVE-2022-48662, CVE-2022-48663, CVE-2022-48667, CVE-2022-48668, CVE-2022-48671, CVE-2022-48672, CVE-2022-48673, CVE-2022-48675, CVE-2022-48686, CVE-2022-48687, CVE-2022-48688, CVE-2022-48690, CVE-2022-48692, CVE-2022-48693, CVE-2022-48694, CVE-2022-48695, CVE-2022-48697, CVE-2022-48698, CVE-2022-48699, CVE-2022-48700, CVE-2022-48701, CVE-2022-48702, CVE-2022-48703, CVE-2022-48704, CVE-2023-2860, CVE-2023-52585, CVE-2023-52589, CVE-2023-52590, CVE-2023-52591, CVE-2023-52593, CVE-2023-52614, CVE-2023-52616, CVE-2023-52620, CVE-2023-52635, CVE-2023-52645, CVE-2023-52646, CVE-2023-52652, CVE-2023-6270, CVE-2024-0639, CVE-2024-0841, CVE-2024-2201, CVE-2024-22099, CVE-2024-23307, CVE-2024-23848, CVE-2024-23850, CVE-2024-26601, CVE-2024-26610, CVE-2024-26656, CVE-2024-26671, CVE-2024-26673, CVE-2024-26675, CVE-2024-26679, CVE-2024-26687, CVE-2024-26688, CVE-2024-26700, CVE-2024-26702, CVE-2024-26733, CVE-2024-26739, CVE-2024-26764, CVE-2024-26766, CVE-2024-26772, CVE-2024-26773, CVE-2024-26783, CVE-2024-26791, CVE-2024-26792, CVE-2024-26816, CVE-2024-26817, CVE-2024-26820, CVE-2024-26825, CVE-2024-26830, CVE-2024-26833, CVE-2024-26836, CVE-2024-26840, CVE-2024-26843, CVE-2024-26852, CVE-2024-26853, CVE-2024-26855, CVE-2024-26856, CVE-2024-26857, CVE-2024-26861, CVE-2024-26862, CVE-2024-26866, CVE-2024-26872, CVE-2024-26875, CVE-2024-26876, CVE-2024-26877, CVE-2024-26878, CVE-2024-26879, CVE-2024-26881, CVE-2024-26882, CVE-2024-26883, CVE-2024-26884, CVE-2024-26885, CVE-2024-26891, CVE-2024-26893, CVE-2024-26895, CVE-2024-26896, CVE-2024-26897, CVE-2024-26898, CVE-2024-26901, CVE-2024-26903, CVE-2024-26915, CVE-2024-26917, CVE-2024-26927, CVE-2024-26933, CVE-2024-26939, CVE-2024-26948, CVE-2024-26950, CVE-2024-26951, CVE-2024-26955, CVE-2024-26956, CVE-2024-26960, CVE-2024-26965, CVE-2024-26966, CVE-2024-26969, CVE-2024-26970, CVE-2024-26972, CVE-2024-26979, CVE-2024-26981, CVE-2024-26982, CVE-2024-26993, CVE-2024-27013, CVE-2024-27014, CVE-2024-27030, CVE-2024-27038, CVE-2024-27039, CVE-2024-27041, CVE-2024-27042, CVE-2024-27043, CVE-2024-27046, CVE-2024-27056, CVE-2024-27059, CVE-2024-27062, CVE-2024-27389 Jira References: PED-7167 Maintenance Incident: [SUSE:Maintenance:33802](https://smelt.suse.de/incident/33802/) Sources used: openSUSE Leap 15.5 (src): kernel-source-azure-5.14.21-150500.33.51.1, kernel-syms-azure-5.14.21-150500.33.51.1 Public Cloud Module 15-SP5 (src): kernel-source-azure-5.14.21-150500.33.51.1, kernel-syms-azure-5.14.21-150500.33.51.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1220569 https://bugzilla.suse.com/show_bug.cgi?id=1220569#c96 --- Comment #96 from Maintenance Automation <maint-coord+maintenance-robot@suse.de> --- SUSE-SU-2024:1659-1: An update that solves 218 vulnerabilities, contains two features and has 29 security fixes can now be installed. Category: security (important) Bug References: 1177529, 1192145, 1211592, 1217408, 1218562, 1218917, 1219104, 1219126, 1219169, 1219170, 1219264, 1220342, 1220569, 1220761, 1220901, 1220915, 1220935, 1221042, 1221044, 1221080, 1221084, 1221088, 1221162, 1221299, 1221612, 1221617, 1221645, 1221791, 1221825, 1222011, 1222051, 1222247, 1222266, 1222294, 1222307, 1222357, 1222368, 1222379, 1222416, 1222422, 1222424, 1222427, 1222428, 1222430, 1222431, 1222435, 1222437, 1222445, 1222449, 1222482, 1222503, 1222520, 1222536, 1222549, 1222550, 1222557, 1222559, 1222585, 1222586, 1222596, 1222609, 1222610, 1222613, 1222615, 1222618, 1222624, 1222630, 1222632, 1222660, 1222662, 1222664, 1222666, 1222669, 1222671, 1222677, 1222678, 1222680, 1222703, 1222704, 1222706, 1222709, 1222710, 1222720, 1222721, 1222724, 1222726, 1222727, 1222764, 1222772, 1222773, 1222776, 1222781, 1222784, 1222785, 1222787, 1222790, 1222791, 1222792, 1222796, 1222798, 1222801, 1222812, 1222824, 1222829, 1222832, 1222836, 1222838, 1222866, 1222867, 1222869, 1222876, 1222878, 1222879, 1222881, 1222883, 1222888, 1222894, 1222901, 1222968, 1223012, 1223014, 1223016, 1223024, 1223030, 1223033, 1223034, 1223035, 1223036, 1223037, 1223041, 1223042, 1223051, 1223052, 1223056, 1223057, 1223058, 1223060, 1223061, 1223065, 1223066, 1223067, 1223068, 1223076, 1223078, 1223111, 1223115, 1223118, 1223187, 1223189, 1223190, 1223191, 1223196, 1223197, 1223198, 1223275, 1223323, 1223369, 1223380, 1223473, 1223474, 1223475, 1223477, 1223478, 1223479, 1223481, 1223482, 1223484, 1223487, 1223490, 1223496, 1223498, 1223499, 1223501, 1223502, 1223503, 1223505, 1223509, 1223511, 1223512, 1223513, 1223516, 1223517, 1223518, 1223519, 1223520, 1223522, 1223523, 1223525, 1223539, 1223574, 1223595, 1223598, 1223634, 1223643, 1223644, 1223645, 1223646, 1223648, 1223655, 1223657, 1223660, 1223661, 1223663, 1223664, 1223668, 1223686, 1223693, 1223705, 1223714, 1223735, 1223745, 1223784, 1223785, 1223790, 1223816, 1223821, 1223822, 1223824, 1223827, 1223834, 1223875, 1223876, 1223877, 1223878, 1223879, 1223894, 1223921, 1223922, 1223923, 1223924, 1223929, 1223931, 1223932, 1223934, 1223941, 1223948, 1223949, 1223950, 1223951, 1223952, 1223953, 1223956, 1223957, 1223960, 1223962, 1223963, 1223964 CVE References: CVE-2021-47047, CVE-2021-47181, CVE-2021-47182, CVE-2021-47183, CVE-2021-47184, CVE-2021-47185, CVE-2021-47187, CVE-2021-47188, CVE-2021-47189, CVE-2021-47191, CVE-2021-47192, CVE-2021-47193, CVE-2021-47194, CVE-2021-47195, CVE-2021-47196, CVE-2021-47197, CVE-2021-47198, CVE-2021-47199, CVE-2021-47200, CVE-2021-47201, CVE-2021-47202, CVE-2021-47203, CVE-2021-47204, CVE-2021-47205, CVE-2021-47206, CVE-2021-47207, CVE-2021-47209, CVE-2021-47210, CVE-2021-47211, CVE-2021-47212, CVE-2021-47214, CVE-2021-47215, CVE-2021-47216, CVE-2021-47217, CVE-2021-47218, CVE-2021-47219, CVE-2022-48631, CVE-2022-48632, CVE-2022-48634, CVE-2022-48636, CVE-2022-48637, CVE-2022-48638, CVE-2022-48639, CVE-2022-48640, CVE-2022-48642, CVE-2022-48644, CVE-2022-48646, CVE-2022-48647, CVE-2022-48648, CVE-2022-48650, CVE-2022-48651, CVE-2022-48652, CVE-2022-48653, CVE-2022-48654, CVE-2022-48655, CVE-2022-48656, CVE-2022-48657, CVE-2022-48658, CVE-2022-48659, CVE-2022-48660, CVE-2022-48662, CVE-2022-48663, CVE-2022-48667, CVE-2022-48668, CVE-2022-48671, CVE-2022-48672, CVE-2022-48673, CVE-2022-48675, CVE-2022-48686, CVE-2022-48687, CVE-2022-48688, CVE-2022-48690, CVE-2022-48692, CVE-2022-48693, CVE-2022-48694, CVE-2022-48695, CVE-2022-48697, CVE-2022-48698, CVE-2022-48700, CVE-2022-48701, CVE-2022-48702, CVE-2022-48703, CVE-2022-48704, CVE-2023-2860, CVE-2023-52488, CVE-2023-52503, CVE-2023-52561, CVE-2023-52585, CVE-2023-52589, CVE-2023-52590, CVE-2023-52591, CVE-2023-52593, CVE-2023-52614, CVE-2023-52616, CVE-2023-52620, CVE-2023-52627, CVE-2023-52635, CVE-2023-52636, CVE-2023-52645, CVE-2023-52652, CVE-2023-6270, CVE-2024-0639, CVE-2024-0841, CVE-2024-22099, CVE-2024-23307, CVE-2024-23848, CVE-2024-23850, CVE-2024-26601, CVE-2024-26610, CVE-2024-26656, CVE-2024-26660, CVE-2024-26671, CVE-2024-26673, CVE-2024-26675, CVE-2024-26680, CVE-2024-26681, CVE-2024-26684, CVE-2024-26685, CVE-2024-26687, CVE-2024-26688, CVE-2024-26689, CVE-2024-26696, CVE-2024-26697, CVE-2024-26702, CVE-2024-26704, CVE-2024-26718, CVE-2024-26722, CVE-2024-26727, CVE-2024-26733, CVE-2024-26736, CVE-2024-26737, CVE-2024-26739, CVE-2024-26743, CVE-2024-26744, CVE-2024-26745, CVE-2024-26747, CVE-2024-26749, CVE-2024-26751, CVE-2024-26754, CVE-2024-26760, CVE-2024-26763, CVE-2024-26764, CVE-2024-26766, CVE-2024-26769, CVE-2024-26771, CVE-2024-26772, CVE-2024-26773, CVE-2024-26776, CVE-2024-26779, CVE-2024-26783, CVE-2024-26787, CVE-2024-26790, CVE-2024-26792, CVE-2024-26793, CVE-2024-26798, CVE-2024-26805, CVE-2024-26807, CVE-2024-26816, CVE-2024-26817, CVE-2024-26820, CVE-2024-26825, CVE-2024-26830, CVE-2024-26833, CVE-2024-26836, CVE-2024-26843, CVE-2024-26848, CVE-2024-26852, CVE-2024-26853, CVE-2024-26855, CVE-2024-26856, CVE-2024-26857, CVE-2024-26861, CVE-2024-26862, CVE-2024-26866, CVE-2024-26872, CVE-2024-26875, CVE-2024-26878, CVE-2024-26879, CVE-2024-26881, CVE-2024-26882, CVE-2024-26883, CVE-2024-26884, CVE-2024-26885, CVE-2024-26891, CVE-2024-26893, CVE-2024-26895, CVE-2024-26896, CVE-2024-26897, CVE-2024-26898, CVE-2024-26901, CVE-2024-26903, CVE-2024-26917, CVE-2024-26927, CVE-2024-26948, CVE-2024-26950, CVE-2024-26951, CVE-2024-26955, CVE-2024-26956, CVE-2024-26960, CVE-2024-26965, CVE-2024-26966, CVE-2024-26969, CVE-2024-26970, CVE-2024-26972, CVE-2024-26981, CVE-2024-26982, CVE-2024-26993, CVE-2024-27013, CVE-2024-27014, CVE-2024-27030, CVE-2024-27038, CVE-2024-27039, CVE-2024-27041, CVE-2024-27043, CVE-2024-27046, CVE-2024-27056, CVE-2024-27062, CVE-2024-27389 Jira References: PED-7167, PED-7619 Maintenance Incident: [SUSE:Maintenance:33750](https://smelt.suse.de/incident/33750/) Sources used: openSUSE Leap 15.5 (src): kernel-obs-build-5.14.21-150500.55.62.2, kernel-livepatch-SLE15-SP5_Update_13-1-150500.11.3.2, kernel-source-5.14.21-150500.55.62.2, kernel-obs-qa-5.14.21-150500.55.62.1, kernel-syms-5.14.21-150500.55.62.1, kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 SUSE Linux Enterprise Micro 5.5 (src): kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 Basesystem Module 15-SP5 (src): kernel-source-5.14.21-150500.55.62.2, kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 Development Tools Module 15-SP5 (src): kernel-obs-build-5.14.21-150500.55.62.2, kernel-syms-5.14.21-150500.55.62.1, kernel-source-5.14.21-150500.55.62.2 SUSE Linux Enterprise Live Patching 15-SP5 (src): kernel-livepatch-SLE15-SP5_Update_13-1-150500.11.3.2 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1220569 https://bugzilla.suse.com/show_bug.cgi?id=1220569#c97 --- Comment #97 from Maintenance Automation <maint-coord+maintenance-robot@suse.de> --- SUSE-SU-2024:1663-1: An update that solves 219 vulnerabilities, contains 20 features and has 45 security fixes can now be installed. Category: security (important) Bug References: 1141539, 1177529, 1190576, 1192145, 1192837, 1193629, 1196869, 1200313, 1201308, 1201489, 1203906, 1203935, 1204614, 1207361, 1211592, 1213573, 1217408, 1218562, 1218917, 1219104, 1219126, 1219141, 1219169, 1219170, 1219264, 1220342, 1220492, 1220569, 1220761, 1220901, 1220915, 1220935, 1221042, 1221044, 1221080, 1221084, 1221088, 1221162, 1221299, 1221612, 1221617, 1221645, 1221791, 1221825, 1222011, 1222051, 1222247, 1222266, 1222294, 1222307, 1222357, 1222368, 1222379, 1222416, 1222422, 1222424, 1222427, 1222428, 1222430, 1222431, 1222435, 1222437, 1222445, 1222449, 1222482, 1222503, 1222520, 1222536, 1222549, 1222550, 1222557, 1222559, 1222585, 1222586, 1222596, 1222609, 1222610, 1222613, 1222615, 1222618, 1222624, 1222630, 1222632, 1222660, 1222662, 1222664, 1222666, 1222669, 1222671, 1222677, 1222678, 1222680, 1222703, 1222704, 1222706, 1222709, 1222710, 1222720, 1222721, 1222724, 1222726, 1222727, 1222764, 1222772, 1222773, 1222776, 1222781, 1222784, 1222785, 1222787, 1222790, 1222791, 1222792, 1222796, 1222798, 1222801, 1222812, 1222824, 1222829, 1222832, 1222836, 1222838, 1222866, 1222867, 1222869, 1222876, 1222878, 1222879, 1222881, 1222883, 1222888, 1222894, 1222901, 1222968, 1223012, 1223014, 1223016, 1223024, 1223030, 1223033, 1223034, 1223035, 1223036, 1223037, 1223041, 1223042, 1223051, 1223052, 1223056, 1223057, 1223058, 1223060, 1223061, 1223065, 1223066, 1223067, 1223068, 1223076, 1223078, 1223111, 1223115, 1223118, 1223187, 1223189, 1223190, 1223191, 1223196, 1223197, 1223198, 1223275, 1223323, 1223369, 1223380, 1223473, 1223474, 1223475, 1223477, 1223478, 1223479, 1223481, 1223482, 1223484, 1223487, 1223490, 1223496, 1223498, 1223499, 1223501, 1223502, 1223503, 1223505, 1223509, 1223511, 1223512, 1223513, 1223516, 1223517, 1223518, 1223519, 1223520, 1223522, 1223523, 1223525, 1223536, 1223539, 1223574, 1223595, 1223598, 1223634, 1223640, 1223643, 1223644, 1223645, 1223646, 1223648, 1223655, 1223657, 1223660, 1223661, 1223663, 1223664, 1223668, 1223686, 1223693, 1223705, 1223714, 1223735, 1223745, 1223784, 1223785, 1223790, 1223816, 1223821, 1223822, 1223824, 1223827, 1223834, 1223875, 1223876, 1223877, 1223878, 1223879, 1223894, 1223921, 1223922, 1223923, 1223924, 1223929, 1223931, 1223932, 1223934, 1223941, 1223948, 1223949, 1223950, 1223951, 1223952, 1223953, 1223956, 1223957, 1223960, 1223962, 1223963, 1223964 CVE References: CVE-2021-47047, CVE-2021-47181, CVE-2021-47182, CVE-2021-47183, CVE-2021-47184, CVE-2021-47185, CVE-2021-47187, CVE-2021-47188, CVE-2021-47189, CVE-2021-47191, CVE-2021-47192, CVE-2021-47193, CVE-2021-47194, CVE-2021-47195, CVE-2021-47196, CVE-2021-47197, CVE-2021-47198, CVE-2021-47199, CVE-2021-47200, CVE-2021-47201, CVE-2021-47202, CVE-2021-47203, CVE-2021-47204, CVE-2021-47205, CVE-2021-47206, CVE-2021-47207, CVE-2021-47209, CVE-2021-47210, CVE-2021-47211, CVE-2021-47212, CVE-2021-47214, CVE-2021-47215, CVE-2021-47216, CVE-2021-47217, CVE-2021-47218, CVE-2021-47219, CVE-2022-48631, CVE-2022-48632, CVE-2022-48634, CVE-2022-48636, CVE-2022-48637, CVE-2022-48638, CVE-2022-48639, CVE-2022-48640, CVE-2022-48642, CVE-2022-48644, CVE-2022-48646, CVE-2022-48647, CVE-2022-48648, CVE-2022-48650, CVE-2022-48651, CVE-2022-48652, CVE-2022-48653, CVE-2022-48654, CVE-2022-48655, CVE-2022-48656, CVE-2022-48657, CVE-2022-48658, CVE-2022-48659, CVE-2022-48660, CVE-2022-48662, CVE-2022-48663, CVE-2022-48667, CVE-2022-48668, CVE-2022-48671, CVE-2022-48672, CVE-2022-48673, CVE-2022-48675, CVE-2022-48686, CVE-2022-48687, CVE-2022-48688, CVE-2022-48690, CVE-2022-48692, CVE-2022-48693, CVE-2022-48694, CVE-2022-48695, CVE-2022-48697, CVE-2022-48698, CVE-2022-48700, CVE-2022-48701, CVE-2022-48702, CVE-2022-48703, CVE-2022-48704, CVE-2023-2860, CVE-2023-52488, CVE-2023-52503, CVE-2023-52561, CVE-2023-52585, CVE-2023-52589, CVE-2023-52590, CVE-2023-52591, CVE-2023-52593, CVE-2023-52614, CVE-2023-52616, CVE-2023-52620, CVE-2023-52627, CVE-2023-52635, CVE-2023-52636, CVE-2023-52645, CVE-2023-52652, CVE-2023-6270, CVE-2024-0639, CVE-2024-0841, CVE-2024-22099, CVE-2024-23307, CVE-2024-23848, CVE-2024-23850, CVE-2024-26601, CVE-2024-26610, CVE-2024-26656, CVE-2024-26660, CVE-2024-26671, CVE-2024-26673, CVE-2024-26675, CVE-2024-26680, CVE-2024-26681, CVE-2024-26684, CVE-2024-26685, CVE-2024-26687, CVE-2024-26688, CVE-2024-26689, CVE-2024-26696, CVE-2024-26697, CVE-2024-26702, CVE-2024-26704, CVE-2024-26718, CVE-2024-26722, CVE-2024-26727, CVE-2024-26733, CVE-2024-26736, CVE-2024-26737, CVE-2024-26739, CVE-2024-26743, CVE-2024-26744, CVE-2024-26745, CVE-2024-26747, CVE-2024-26749, CVE-2024-26751, CVE-2024-26754, CVE-2024-26760, CVE-2024-267600, CVE-2024-26763, CVE-2024-26764, CVE-2024-26766, CVE-2024-26769, CVE-2024-26771, CVE-2024-26772, CVE-2024-26773, CVE-2024-26776, CVE-2024-26779, CVE-2024-26783, CVE-2024-26787, CVE-2024-26790, CVE-2024-26792, CVE-2024-26793, CVE-2024-26798, CVE-2024-26805, CVE-2024-26807, CVE-2024-26816, CVE-2024-26817, CVE-2024-26820, CVE-2024-26825, CVE-2024-26830, CVE-2024-26833, CVE-2024-26836, CVE-2024-26843, CVE-2024-26848, CVE-2024-26852, CVE-2024-26853, CVE-2024-26855, CVE-2024-26856, CVE-2024-26857, CVE-2024-26861, CVE-2024-26862, CVE-2024-26866, CVE-2024-26872, CVE-2024-26875, CVE-2024-26878, CVE-2024-26879, CVE-2024-26881, CVE-2024-26882, CVE-2024-26883, CVE-2024-26884, CVE-2024-26885, CVE-2024-26891, CVE-2024-26893, CVE-2024-26895, CVE-2024-26896, CVE-2024-26897, CVE-2024-26898, CVE-2024-26901, CVE-2024-26903, CVE-2024-26917, CVE-2024-26927, CVE-2024-26948, CVE-2024-26950, CVE-2024-26951, CVE-2024-26955, CVE-2024-26956, CVE-2024-26960, CVE-2024-26965, CVE-2024-26966, CVE-2024-26969, CVE-2024-26970, CVE-2024-26972, CVE-2024-26981, CVE-2024-26982, CVE-2024-26993, CVE-2024-27013, CVE-2024-27014, CVE-2024-27030, CVE-2024-27038, CVE-2024-27039, CVE-2024-27041, CVE-2024-27043, CVE-2024-27046, CVE-2024-27056, CVE-2024-27062, CVE-2024-27389 Jira References: PED-1166, PED-1168, PED-1170, PED-1218, PED-1220, PED-1222, PED-1223, PED-1225, PED-1565, PED-2849, PED-376, PED-542, PED-7167, PED-7619, SLE-18378, SLE-18383, SLE-18385, SLE-18978, SLE-19249, SLE-19253 Maintenance Incident: [SUSE:Maintenance:33809](https://smelt.suse.de/incident/33809/) Sources used: openSUSE Leap 15.5 (src): kernel-syms-rt-5.14.21-150500.13.52.1, kernel-livepatch-SLE15-SP5-RT_Update_14-1-150500.11.5.1, kernel-source-rt-5.14.21-150500.13.52.1 SUSE Linux Enterprise Micro 5.5 (src): kernel-source-rt-5.14.21-150500.13.52.1 SUSE Linux Enterprise Live Patching 15-SP5 (src): kernel-livepatch-SLE15-SP5-RT_Update_14-1-150500.11.5.1 SUSE Real Time Module 15-SP5 (src): kernel-syms-rt-5.14.21-150500.13.52.1, kernel-source-rt-5.14.21-150500.13.52.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1220569 https://bugzilla.suse.com/show_bug.cgi?id=1220569#c109 --- Comment #109 from Maintenance Automation <maint-coord+maintenance-robot@suse.de> --- SUSE-SU-2024:2135-1: An update that solves 428 vulnerabilities, contains 15 features and has 78 security fixes can now be installed. Category: security (important) Bug References: 1012628, 1065729, 1181674, 1187716, 1193599, 1194869, 1207948, 1208593, 1209657, 1213573, 1214852, 1215199, 1216196, 1216358, 1216702, 1217169, 1217384, 1217408, 1217489, 1217750, 1217959, 1218205, 1218336, 1218447, 1218562, 1218779, 1218917, 1219104, 1219170, 1219596, 1219623, 1219834, 1220021, 1220045, 1220120, 1220148, 1220328, 1220342, 1220428, 1220430, 1220569, 1220587, 1220738, 1220783, 1220915, 1221044, 1221276, 1221293, 1221303, 1221375, 1221504, 1221612, 1221615, 1221635, 1221645, 1221649, 1221765, 1221777, 1221783, 1221816, 1221829, 1221830, 1221858, 1222115, 1222173, 1222264, 1222273, 1222294, 1222301, 1222303, 1222304, 1222307, 1222357, 1222366, 1222368, 1222371, 1222378, 1222379, 1222385, 1222422, 1222426, 1222428, 1222437, 1222445, 1222459, 1222464, 1222489, 1222522, 1222525, 1222527, 1222531, 1222532, 1222549, 1222550, 1222557, 1222559, 1222563, 1222585, 1222586, 1222596, 1222606, 1222608, 1222613, 1222615, 1222618, 1222622, 1222624, 1222627, 1222630, 1222635, 1222721, 1222727, 1222769, 1222771, 1222772, 1222775, 1222777, 1222780, 1222782, 1222793, 1222799, 1222801, 1222968, 1223007, 1223011, 1223015, 1223016, 1223020, 1223023, 1223024, 1223030, 1223033, 1223034, 1223035, 1223038, 1223039, 1223041, 1223045, 1223046, 1223051, 1223052, 1223058, 1223060, 1223061, 1223076, 1223077, 1223084, 1223111, 1223113, 1223138, 1223143, 1223187, 1223189, 1223190, 1223191, 1223198, 1223202, 1223285, 1223315, 1223338, 1223369, 1223380, 1223384, 1223390, 1223439, 1223462, 1223532, 1223539, 1223575, 1223590, 1223591, 1223592, 1223593, 1223625, 1223628, 1223629, 1223633, 1223634, 1223637, 1223641, 1223643, 1223649, 1223650, 1223651, 1223652, 1223653, 1223654, 1223655, 1223660, 1223661, 1223663, 1223664, 1223665, 1223666, 1223668, 1223669, 1223670, 1223671, 1223675, 1223677, 1223678, 1223686, 1223692, 1223693, 1223695, 1223696, 1223698, 1223705, 1223712, 1223718, 1223728, 1223732, 1223735, 1223739, 1223741, 1223744, 1223745, 1223747, 1223748, 1223749, 1223750, 1223752, 1223754, 1223757, 1223759, 1223761, 1223762, 1223774, 1223782, 1223787, 1223788, 1223789, 1223790, 1223802, 1223805, 1223810, 1223822, 1223827, 1223831, 1223834, 1223838, 1223869, 1223870, 1223871, 1223872, 1223874, 1223944, 1223945, 1223946, 1223991, 1224076, 1224096, 1224098, 1224099, 1224137, 1224166, 1224174, 1224177, 1224180, 1224181, 1224331, 1224348, 1224423, 1224429, 1224430, 1224432, 1224433, 1224437, 1224438, 1224442, 1224443, 1224445, 1224449, 1224477, 1224479, 1224480, 1224481, 1224482, 1224486, 1224487, 1224488, 1224491, 1224492, 1224493, 1224494, 1224495, 1224500, 1224501, 1224502, 1224504, 1224505, 1224506, 1224507, 1224508, 1224509, 1224511, 1224513, 1224517, 1224519, 1224521, 1224524, 1224525, 1224526, 1224530, 1224531, 1224534, 1224537, 1224541, 1224542, 1224543, 1224546, 1224550, 1224552, 1224553, 1224555, 1224557, 1224558, 1224559, 1224562, 1224565, 1224566, 1224567, 1224568, 1224569, 1224571, 1224573, 1224576, 1224577, 1224578, 1224579, 1224580, 1224581, 1224582, 1224585, 1224586, 1224587, 1224588, 1224592, 1224596, 1224598, 1224600, 1224601, 1224602, 1224603, 1224605, 1224607, 1224608, 1224609, 1224611, 1224613, 1224615, 1224617, 1224618, 1224620, 1224621, 1224622, 1224623, 1224624, 1224626, 1224627, 1224628, 1224629, 1224630, 1224632, 1224633, 1224634, 1224636, 1224637, 1224638, 1224639, 1224640, 1224643, 1224644, 1224645, 1224646, 1224647, 1224648, 1224649, 1224650, 1224651, 1224652, 1224653, 1224654, 1224657, 1224660, 1224663, 1224664, 1224665, 1224666, 1224667, 1224668, 1224671, 1224672, 1224674, 1224675, 1224676, 1224677, 1224678, 1224679, 1224680, 1224681, 1224682, 1224683, 1224685, 1224686, 1224687, 1224688, 1224692, 1224696, 1224697, 1224699, 1224701, 1224703, 1224704, 1224705, 1224706, 1224707, 1224709, 1224710, 1224712, 1224714, 1224716, 1224717, 1224718, 1224719, 1224720, 1224721, 1224722, 1224723, 1224725, 1224727, 1224728, 1224729, 1224730, 1224731, 1224732, 1224733, 1224736, 1224738, 1224739, 1224740, 1224741, 1224742, 1224747, 1224749, 1224763, 1224764, 1224765, 1224766, 1224790, 1224792, 1224793, 1224803, 1224804, 1224866, 1224936, 1224989, 1225007, 1225053, 1225133, 1225134, 1225136, 1225172, 1225502, 1225578, 1225579, 1225580, 1225593, 1225605, 1225607, 1225610, 1225616, 1225618, 1225640, 1225642, 1225692, 1225694, 1225695, 1225696, 1225698, 1225699, 1225704, 1225705, 1225708, 1225710, 1225712, 1225714, 1225715, 1225720, 1225722, 1225728, 1225734, 1225735, 1225736, 1225747, 1225748, 1225749, 1225750, 1225756, 1225765, 1225766, 1225769, 1225773, 1225775, 1225842, 1225945 CVE References: CVE-2023-0160, CVE-2023-47233, CVE-2023-52434, CVE-2023-52458, CVE-2023-52463, CVE-2023-52472, CVE-2023-52483, CVE-2023-52492, CVE-2023-52503, CVE-2023-52591, CVE-2023-52608, CVE-2023-52616, CVE-2023-52618, CVE-2023-52631, CVE-2023-52635, CVE-2023-52640, CVE-2023-52641, CVE-2023-52645, CVE-2023-52652, CVE-2023-52653, CVE-2023-52654, CVE-2023-52655, CVE-2023-52657, CVE-2023-52658, CVE-2023-52659, CVE-2023-52660, CVE-2023-52661, CVE-2023-52662, CVE-2023-52663, CVE-2023-52664, CVE-2023-52667, CVE-2023-52669, CVE-2023-52670, CVE-2023-52671, CVE-2023-52673, CVE-2023-52674, CVE-2023-52675, CVE-2023-52676, CVE-2023-52678, CVE-2023-52679, CVE-2023-52680, CVE-2023-52681, CVE-2023-52683, CVE-2023-52685, CVE-2023-52686, CVE-2023-52687, CVE-2023-52690, CVE-2023-52691, CVE-2023-52692, CVE-2023-52693, CVE-2023-52694, CVE-2023-52695, CVE-2023-52696, CVE-2023-52697, CVE-2023-52698, CVE-2023-52771, CVE-2023-52772, CVE-2023-52860, CVE-2023-52882, CVE-2023-6238, CVE-2023-6270, CVE-2023-6531, CVE-2023-7042, CVE-2024-0639, CVE-2024-21823, CVE-2024-22099, CVE-2024-23848, CVE-2024-24861, CVE-2024-25739, CVE-2024-26601, CVE-2024-26611, CVE-2024-26614, CVE-2024-26632, CVE-2024-26638, CVE-2024-26642, CVE-2024-26643, CVE-2024-26652, CVE-2024-26654, CVE-2024-26656, CVE-2024-26657, CVE-2024-26671, CVE-2024-26673, CVE-2024-26674, CVE-2024-26675, CVE-2024-26679, CVE-2024-26684, CVE-2024-26685, CVE-2024-26692, CVE-2024-26696, CVE-2024-26697, CVE-2024-26704, CVE-2024-26714, CVE-2024-26726, CVE-2024-26731, CVE-2024-26733, CVE-2024-26736, CVE-2024-26737, CVE-2024-26739, CVE-2024-26740, CVE-2024-26742, CVE-2024-26756, CVE-2024-26757, CVE-2024-26760, CVE-2024-267600, CVE-2024-26761, CVE-2024-26764, CVE-2024-26769, CVE-2024-26772, CVE-2024-26773, CVE-2024-26774, CVE-2024-26775, CVE-2024-26779, CVE-2024-26783, CVE-2024-26786, CVE-2024-26791, CVE-2024-26793, CVE-2024-26794, CVE-2024-26802, CVE-2024-26805, CVE-2024-26807, CVE-2024-26815, CVE-2024-26816, CVE-2024-26822, CVE-2024-26828, CVE-2024-26832, CVE-2024-26836, CVE-2024-26844, CVE-2024-26846, CVE-2024-26848, CVE-2024-26853, CVE-2024-26854, CVE-2024-26855, CVE-2024-26856, CVE-2024-26857, CVE-2024-26858, CVE-2024-26860, CVE-2024-26861, CVE-2024-26862, CVE-2024-26866, CVE-2024-26868, CVE-2024-26870, CVE-2024-26878, CVE-2024-26881, CVE-2024-26882, CVE-2024-26883, CVE-2024-26884, CVE-2024-26885, CVE-2024-26898, CVE-2024-26899, CVE-2024-26900, CVE-2024-26901, CVE-2024-26903, CVE-2024-26906, CVE-2024-26909, CVE-2024-26921, CVE-2024-26922, CVE-2024-26923, CVE-2024-26925, CVE-2024-26928, CVE-2024-26932, CVE-2024-26933, CVE-2024-26934, CVE-2024-26935, CVE-2024-26937, CVE-2024-26938, CVE-2024-26940, CVE-2024-26943, CVE-2024-26945, CVE-2024-26946, CVE-2024-26948, CVE-2024-26949, CVE-2024-26950, CVE-2024-26951, CVE-2024-26956, CVE-2024-26957, CVE-2024-26958, CVE-2024-26960, CVE-2024-26961, CVE-2024-26962, CVE-2024-26963, CVE-2024-26964, CVE-2024-26972, CVE-2024-26973, CVE-2024-26978, CVE-2024-26979, CVE-2024-26981, CVE-2024-26982, CVE-2024-26983, CVE-2024-26984, CVE-2024-26986, CVE-2024-26988, CVE-2024-26989, CVE-2024-26990, CVE-2024-26991, CVE-2024-26992, CVE-2024-26993, CVE-2024-26994, CVE-2024-26995, CVE-2024-26996, CVE-2024-26997, CVE-2024-26999, CVE-2024-27000, CVE-2024-27001, CVE-2024-27002, CVE-2024-27003, CVE-2024-27004, CVE-2024-27008, CVE-2024-27013, CVE-2024-27014, CVE-2024-27022, CVE-2024-27027, CVE-2024-27028, CVE-2024-27029, CVE-2024-27030, CVE-2024-27031, CVE-2024-27036, CVE-2024-27046, CVE-2024-27056, CVE-2024-27057, CVE-2024-27062, CVE-2024-27067, CVE-2024-27080, CVE-2024-27388, CVE-2024-27389, CVE-2024-27393, CVE-2024-27395, CVE-2024-27396, CVE-2024-27398, CVE-2024-27399, CVE-2024-27400, CVE-2024-27401, CVE-2024-27405, CVE-2024-27408, CVE-2024-27410, CVE-2024-27411, CVE-2024-27412, CVE-2024-27413, CVE-2024-27416, CVE-2024-27417, CVE-2024-27418, CVE-2024-27431, CVE-2024-27432, CVE-2024-27434, CVE-2024-27435, CVE-2024-27436, CVE-2024-35784, CVE-2024-35786, CVE-2024-35788, CVE-2024-35789, CVE-2024-35790, CVE-2024-35791, CVE-2024-35794, CVE-2024-35795, CVE-2024-35796, CVE-2024-35799, CVE-2024-35800, CVE-2024-35801, CVE-2024-35803, CVE-2024-35804, CVE-2024-35806, CVE-2024-35808, CVE-2024-35809, CVE-2024-35810, CVE-2024-35811, CVE-2024-35812, CVE-2024-35813, CVE-2024-35814, CVE-2024-35815, CVE-2024-35817, CVE-2024-35819, CVE-2024-35821, CVE-2024-35822, CVE-2024-35823, CVE-2024-35824, CVE-2024-35825, CVE-2024-35828, CVE-2024-35829, CVE-2024-35830, CVE-2024-35833, CVE-2024-35834, CVE-2024-35835, CVE-2024-35836, CVE-2024-35837, CVE-2024-35838, CVE-2024-35841, CVE-2024-35842, CVE-2024-35845, CVE-2024-35847, CVE-2024-35849, CVE-2024-35850, CVE-2024-35851, CVE-2024-35852, CVE-2024-35854, CVE-2024-35860, CVE-2024-35861, CVE-2024-35862, CVE-2024-35863, CVE-2024-35864, CVE-2024-35865, CVE-2024-35866, CVE-2024-35867, CVE-2024-35868, CVE-2024-35869, CVE-2024-35870, CVE-2024-35872, CVE-2024-35875, CVE-2024-35877, CVE-2024-35878, CVE-2024-35879, CVE-2024-35883, CVE-2024-35885, CVE-2024-35887, CVE-2024-35889, CVE-2024-35891, CVE-2024-35895, CVE-2024-35901, CVE-2024-35903, CVE-2024-35904, CVE-2024-35905, CVE-2024-35907, CVE-2024-35909, CVE-2024-35911, CVE-2024-35912, CVE-2024-35914, CVE-2024-35915, CVE-2024-35916, CVE-2024-35917, CVE-2024-35921, CVE-2024-35922, CVE-2024-35924, CVE-2024-35927, CVE-2024-35928, CVE-2024-35930, CVE-2024-35931, CVE-2024-35932, CVE-2024-35933, CVE-2024-35935, CVE-2024-35936, CVE-2024-35937, CVE-2024-35938, CVE-2024-35940, CVE-2024-35943, CVE-2024-35944, CVE-2024-35945, CVE-2024-35946, CVE-2024-35947, CVE-2024-35950, CVE-2024-35951, CVE-2024-35952, CVE-2024-35953, CVE-2024-35954, CVE-2024-35955, CVE-2024-35956, CVE-2024-35958, CVE-2024-35959, CVE-2024-35960, CVE-2024-35961, CVE-2024-35963, CVE-2024-35964, CVE-2024-35965, CVE-2024-35966, CVE-2024-35967, CVE-2024-35969, CVE-2024-35971, CVE-2024-35972, CVE-2024-35973, CVE-2024-35974, CVE-2024-35975, CVE-2024-35977, CVE-2024-35978, CVE-2024-35981, CVE-2024-35982, CVE-2024-35984, CVE-2024-35986, CVE-2024-35989, CVE-2024-35990, CVE-2024-35991, CVE-2024-35992, CVE-2024-35995, CVE-2024-35997, CVE-2024-35999, CVE-2024-36002, CVE-2024-36006, CVE-2024-36007, CVE-2024-36009, CVE-2024-36011, CVE-2024-36012, CVE-2024-36013, CVE-2024-36014, CVE-2024-36015, CVE-2024-36016, CVE-2024-36018, CVE-2024-36019, CVE-2024-36020, CVE-2024-36021, CVE-2024-36025, CVE-2024-36026, CVE-2024-36029, CVE-2024-36030, CVE-2024-36032, CVE-2024-36880, CVE-2024-36885, CVE-2024-36890, CVE-2024-36891, CVE-2024-36893, CVE-2024-36894, CVE-2024-36895, CVE-2024-36896, CVE-2024-36897, CVE-2024-36898, CVE-2024-36906, CVE-2024-36918, CVE-2024-36921, CVE-2024-36922, CVE-2024-36928, CVE-2024-36930, CVE-2024-36931, CVE-2024-36936, CVE-2024-36940, CVE-2024-36941, CVE-2024-36942, CVE-2024-36944, CVE-2024-36947, CVE-2024-36949, CVE-2024-36950, CVE-2024-36951, CVE-2024-36955, CVE-2024-36959 Jira References: PED-3184, PED-3311, PED-3535, PED-4486, PED-4593, PED-5062, PED-542, PED-5728, PED-5853, PED-6079, PED-6252, PED-7542, PED-7619, PED-8111, PED-8240 Maintenance Incident: [SUSE:Maintenance:34127](https://smelt.suse.de/incident/34127/) Sources used: openSUSE Leap 15.6 (src): kernel-syms-azure-6.4.0-150600.8.5.1, kernel-source-azure-6.4.0-150600.8.5.4 Public Cloud Module 15-SP6 (src): kernel-syms-azure-6.4.0-150600.8.5.1, kernel-source-azure-6.4.0-150600.8.5.4 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1220569 https://bugzilla.suse.com/show_bug.cgi?id=1220569#c124 --- Comment #124 from Maintenance Automation <maint-coord+maintenance-robot@suse.de> --- SUSE-SU-2024:2203-1: An update that solves 408 vulnerabilities, contains two features and has 82 security fixes can now be installed. URL: https://www.suse.com/support/update/announcement/2024/suse-su-20242203-1 Category: security (important) Bug References: 1012628, 1065729, 1181674, 1187716, 1193599, 1194869, 1207948, 1208593, 1209657, 1213573, 1214852, 1215199, 1216196, 1216358, 1216702, 1217169, 1217384, 1217408, 1217489, 1217750, 1217959, 1218205, 1218336, 1218447, 1218779, 1218917, 1219104, 1219170, 1219596, 1219623, 1219834, 1220021, 1220045, 1220120, 1220148, 1220328, 1220342, 1220428, 1220430, 1220569, 1220587, 1220783, 1220915, 1221044, 1221293, 1221303, 1221504, 1221612, 1221615, 1221635, 1221645, 1221649, 1221765, 1221777, 1221783, 1221816, 1221829, 1221830, 1221858, 1222048, 1222173, 1222264, 1222273, 1222294, 1222301, 1222303, 1222304, 1222307, 1222357, 1222366, 1222368, 1222371, 1222378, 1222385, 1222422, 1222426, 1222428, 1222437, 1222445, 1222459, 1222464, 1222489, 1222522, 1222525, 1222532, 1222557, 1222559, 1222563, 1222585, 1222596, 1222606, 1222608, 1222613, 1222615, 1222618, 1222622, 1222624, 1222627, 1222630, 1222635, 1222721, 1222727, 1222769, 1222771, 1222775, 1222777, 1222780, 1222782, 1222793, 1222799, 1222801, 1222968, 1223007, 1223011, 1223015, 1223020, 1223023, 1223024, 1223033, 1223034, 1223035, 1223038, 1223039, 1223041, 1223045, 1223046, 1223051, 1223052, 1223058, 1223060, 1223061, 1223076, 1223077, 1223111, 1223113, 1223138, 1223143, 1223187, 1223189, 1223190, 1223191, 1223198, 1223202, 1223285, 1223315, 1223338, 1223369, 1223380, 1223384, 1223390, 1223439, 1223462, 1223532, 1223539, 1223575, 1223590, 1223591, 1223592, 1223593, 1223625, 1223629, 1223633, 1223634, 1223637, 1223641, 1223643, 1223649, 1223650, 1223651, 1223652, 1223653, 1223654, 1223655, 1223660, 1223661, 1223664, 1223665, 1223666, 1223668, 1223669, 1223670, 1223671, 1223675, 1223677, 1223678, 1223686, 1223692, 1223693, 1223695, 1223696, 1223698, 1223705, 1223712, 1223718, 1223728, 1223732, 1223735, 1223739, 1223741, 1223744, 1223745, 1223747, 1223748, 1223749, 1223750, 1223752, 1223754, 1223757, 1223759, 1223761, 1223762, 1223774, 1223782, 1223787, 1223788, 1223789, 1223790, 1223802, 1223805, 1223810, 1223822, 1223827, 1223831, 1223834, 1223838, 1223869, 1223870, 1223871, 1223872, 1223874, 1223944, 1223945, 1223946, 1223991, 1224076, 1224096, 1224098, 1224099, 1224137, 1224166, 1224174, 1224177, 1224180, 1224181, 1224331, 1224423, 1224429, 1224430, 1224432, 1224433, 1224437, 1224438, 1224442, 1224443, 1224445, 1224449, 1224477, 1224479, 1224480, 1224481, 1224482, 1224486, 1224487, 1224488, 1224491, 1224492, 1224493, 1224494, 1224495, 1224500, 1224501, 1224502, 1224504, 1224505, 1224506, 1224507, 1224508, 1224509, 1224511, 1224513, 1224517, 1224519, 1224521, 1224524, 1224525, 1224526, 1224530, 1224531, 1224534, 1224537, 1224541, 1224542, 1224543, 1224546, 1224550, 1224552, 1224553, 1224555, 1224557, 1224558, 1224559, 1224562, 1224565, 1224566, 1224567, 1224568, 1224569, 1224571, 1224573, 1224576, 1224577, 1224578, 1224579, 1224580, 1224581, 1224582, 1224585, 1224586, 1224587, 1224588, 1224592, 1224596, 1224598, 1224600, 1224601, 1224602, 1224603, 1224605, 1224607, 1224608, 1224609, 1224611, 1224613, 1224615, 1224617, 1224618, 1224620, 1224621, 1224622, 1224623, 1224624, 1224626, 1224627, 1224628, 1224629, 1224630, 1224632, 1224633, 1224634, 1224636, 1224637, 1224638, 1224639, 1224640, 1224643, 1224644, 1224645, 1224646, 1224647, 1224648, 1224649, 1224650, 1224651, 1224652, 1224653, 1224654, 1224657, 1224660, 1224663, 1224664, 1224665, 1224666, 1224667, 1224668, 1224671, 1224672, 1224674, 1224675, 1224676, 1224677, 1224678, 1224679, 1224680, 1224681, 1224682, 1224683, 1224685, 1224686, 1224687, 1224688, 1224692, 1224696, 1224697, 1224699, 1224701, 1224703, 1224704, 1224705, 1224706, 1224707, 1224709, 1224710, 1224712, 1224714, 1224716, 1224717, 1224718, 1224719, 1224720, 1224721, 1224722, 1224723, 1224725, 1224727, 1224728, 1224729, 1224730, 1224731, 1224732, 1224733, 1224736, 1224738, 1224739, 1224740, 1224741, 1224742, 1224747, 1224749, 1224763, 1224764, 1224765, 1224766, 1224790, 1224792, 1224793, 1224803, 1224804, 1224866, 1224936, 1224989, 1225007, 1225053, 1225133, 1225134, 1225136, 1225172, 1225502, 1225578, 1225579, 1225580, 1225593, 1225605, 1225607, 1225610, 1225616, 1225618, 1225640, 1225642, 1225692, 1225694, 1225695, 1225696, 1225698, 1225699, 1225704, 1225705, 1225708, 1225710, 1225712, 1225714, 1225715, 1225720, 1225722, 1225728, 1225734, 1225735, 1225736, 1225747, 1225748, 1225749, 1225750, 1225756, 1225765, 1225766, 1225769, 1225773, 1225775, 1225842, 1225945, 1226158 CVE References: CVE-2023-0160, CVE-2023-52434, CVE-2023-52458, CVE-2023-52472, CVE-2023-52503, CVE-2023-52616, CVE-2023-52618, CVE-2023-52631, CVE-2023-52635, CVE-2023-52640, CVE-2023-52641, CVE-2023-52645, CVE-2023-52652, CVE-2023-52653, CVE-2023-52654, CVE-2023-52655, CVE-2023-52657, CVE-2023-52658, CVE-2023-52659, CVE-2023-52660, CVE-2023-52661, CVE-2023-52662, CVE-2023-52663, CVE-2023-52664, CVE-2023-52667, CVE-2023-52669, CVE-2023-52670, CVE-2023-52671, CVE-2023-52673, CVE-2023-52674, CVE-2023-52675, CVE-2023-52676, CVE-2023-52678, CVE-2023-52679, CVE-2023-52680, CVE-2023-52681, CVE-2023-52683, CVE-2023-52685, CVE-2023-52686, CVE-2023-52687, CVE-2023-52690, CVE-2023-52691, CVE-2023-52692, CVE-2023-52693, CVE-2023-52694, CVE-2023-52695, CVE-2023-52696, CVE-2023-52697, CVE-2023-52698, CVE-2023-52771, CVE-2023-52772, CVE-2023-52860, CVE-2023-52882, CVE-2023-6238, CVE-2023-7042, CVE-2024-0639, CVE-2024-21823, CVE-2024-22099, CVE-2024-23848, CVE-2024-24861, CVE-2024-25739, CVE-2024-26601, CVE-2024-26611, CVE-2024-26614, CVE-2024-26632, CVE-2024-26638, CVE-2024-26642, CVE-2024-26643, CVE-2024-26650, CVE-2024-26654, CVE-2024-26656, CVE-2024-26657, CVE-2024-26671, CVE-2024-26673, CVE-2024-26674, CVE-2024-26679, CVE-2024-26684, CVE-2024-26685, CVE-2024-26692, CVE-2024-26704, CVE-2024-26714, CVE-2024-26726, CVE-2024-26731, CVE-2024-26733, CVE-2024-26737, CVE-2024-26739, CVE-2024-26740, CVE-2024-26742, CVE-2024-26760, CVE-2024-267600, CVE-2024-26761, CVE-2024-26764, CVE-2024-26769, CVE-2024-26772, CVE-2024-26773, CVE-2024-26774, CVE-2024-26775, CVE-2024-26783, CVE-2024-26786, CVE-2024-26791, CVE-2024-26793, CVE-2024-26794, CVE-2024-26802, CVE-2024-26805, CVE-2024-26807, CVE-2024-26815, CVE-2024-26816, CVE-2024-26822, CVE-2024-26832, CVE-2024-26836, CVE-2024-26844, CVE-2024-26846, CVE-2024-26853, CVE-2024-26854, CVE-2024-26855, CVE-2024-26856, CVE-2024-26857, CVE-2024-26858, CVE-2024-26860, CVE-2024-26861, CVE-2024-26862, CVE-2024-26866, CVE-2024-26868, CVE-2024-26870, CVE-2024-26878, CVE-2024-26881, CVE-2024-26882, CVE-2024-26883, CVE-2024-26884, CVE-2024-26885, CVE-2024-26899, CVE-2024-26900, CVE-2024-26901, CVE-2024-26903, CVE-2024-26906, CVE-2024-26909, CVE-2024-26921, CVE-2024-26922, CVE-2024-26923, CVE-2024-26925, CVE-2024-26928, CVE-2024-26932, CVE-2024-26933, CVE-2024-26934, CVE-2024-26935, CVE-2024-26937, CVE-2024-26938, CVE-2024-26940, CVE-2024-26943, CVE-2024-26945, CVE-2024-26946, CVE-2024-26948, CVE-2024-26949, CVE-2024-26950, CVE-2024-26951, CVE-2024-26957, CVE-2024-26958, CVE-2024-26960, CVE-2024-26961, CVE-2024-26962, CVE-2024-26963, CVE-2024-26964, CVE-2024-26972, CVE-2024-26973, CVE-2024-26978, CVE-2024-26981, CVE-2024-26982, CVE-2024-26983, CVE-2024-26984, CVE-2024-26986, CVE-2024-26988, CVE-2024-26989, CVE-2024-26990, CVE-2024-26991, CVE-2024-26992, CVE-2024-26993, CVE-2024-26994, CVE-2024-26995, CVE-2024-26996, CVE-2024-26997, CVE-2024-26999, CVE-2024-27000, CVE-2024-27001, CVE-2024-27002, CVE-2024-27003, CVE-2024-27004, CVE-2024-27008, CVE-2024-27013, CVE-2024-27014, CVE-2024-27022, CVE-2024-27027, CVE-2024-27028, CVE-2024-27029, CVE-2024-27030, CVE-2024-27031, CVE-2024-27036, CVE-2024-27046, CVE-2024-27056, CVE-2024-27057, CVE-2024-27062, CVE-2024-27067, CVE-2024-27080, CVE-2024-27388, CVE-2024-27389, CVE-2024-27393, CVE-2024-27395, CVE-2024-27396, CVE-2024-27398, CVE-2024-27399, CVE-2024-27400, CVE-2024-27401, CVE-2024-27405, CVE-2024-27408, CVE-2024-27410, CVE-2024-27411, CVE-2024-27412, CVE-2024-27413, CVE-2024-27416, CVE-2024-27417, CVE-2024-27418, CVE-2024-27431, CVE-2024-27432, CVE-2024-27434, CVE-2024-27435, CVE-2024-27436, CVE-2024-35784, CVE-2024-35786, CVE-2024-35788, CVE-2024-35789, CVE-2024-35790, CVE-2024-35791, CVE-2024-35794, CVE-2024-35795, CVE-2024-35796, CVE-2024-35799, CVE-2024-35800, CVE-2024-35801, CVE-2024-35803, CVE-2024-35804, CVE-2024-35806, CVE-2024-35808, CVE-2024-35809, CVE-2024-35810, CVE-2024-35811, CVE-2024-35812, CVE-2024-35813, CVE-2024-35814, CVE-2024-35815, CVE-2024-35817, CVE-2024-35819, CVE-2024-35821, CVE-2024-35822, CVE-2024-35823, CVE-2024-35824, CVE-2024-35825, CVE-2024-35828, CVE-2024-35829, CVE-2024-35830, CVE-2024-35833, CVE-2024-35834, CVE-2024-35835, CVE-2024-35836, CVE-2024-35837, CVE-2024-35838, CVE-2024-35841, CVE-2024-35842, CVE-2024-35845, CVE-2024-35847, CVE-2024-35849, CVE-2024-35850, CVE-2024-35851, CVE-2024-35852, CVE-2024-35854, CVE-2024-35860, CVE-2024-35861, CVE-2024-35862, CVE-2024-35863, CVE-2024-35864, CVE-2024-35865, CVE-2024-35866, CVE-2024-35867, CVE-2024-35868, CVE-2024-35869, CVE-2024-35870, CVE-2024-35872, CVE-2024-35875, CVE-2024-35877, CVE-2024-35878, CVE-2024-35879, CVE-2024-35883, CVE-2024-35885, CVE-2024-35887, CVE-2024-35889, CVE-2024-35891, CVE-2024-35895, CVE-2024-35901, CVE-2024-35903, CVE-2024-35904, CVE-2024-35905, CVE-2024-35907, CVE-2024-35909, CVE-2024-35911, CVE-2024-35912, CVE-2024-35914, CVE-2024-35915, CVE-2024-35916, CVE-2024-35917, CVE-2024-35921, CVE-2024-35922, CVE-2024-35924, CVE-2024-35927, CVE-2024-35928, CVE-2024-35930, CVE-2024-35931, CVE-2024-35932, CVE-2024-35933, CVE-2024-35935, CVE-2024-35936, CVE-2024-35937, CVE-2024-35938, CVE-2024-35940, CVE-2024-35943, CVE-2024-35944, CVE-2024-35945, CVE-2024-35946, CVE-2024-35947, CVE-2024-35950, CVE-2024-35951, CVE-2024-35952, CVE-2024-35953, CVE-2024-35954, CVE-2024-35955, CVE-2024-35956, CVE-2024-35958, CVE-2024-35959, CVE-2024-35960, CVE-2024-35961, CVE-2024-35963, CVE-2024-35964, CVE-2024-35965, CVE-2024-35966, CVE-2024-35967, CVE-2024-35969, CVE-2024-35971, CVE-2024-35972, CVE-2024-35973, CVE-2024-35974, CVE-2024-35975, CVE-2024-35977, CVE-2024-35978, CVE-2024-35981, CVE-2024-35982, CVE-2024-35984, CVE-2024-35986, CVE-2024-35989, CVE-2024-35990, CVE-2024-35991, CVE-2024-35992, CVE-2024-35995, CVE-2024-35997, CVE-2024-35999, CVE-2024-36002, CVE-2024-36006, CVE-2024-36007, CVE-2024-36009, CVE-2024-36011, CVE-2024-36012, CVE-2024-36013, CVE-2024-36014, CVE-2024-36015, CVE-2024-36016, CVE-2024-36018, CVE-2024-36019, CVE-2024-36020, CVE-2024-36021, CVE-2024-36025, CVE-2024-36026, CVE-2024-36029, CVE-2024-36030, CVE-2024-36032, CVE-2024-36880, CVE-2024-36885, CVE-2024-36890, CVE-2024-36891, CVE-2024-36893, CVE-2024-36894, CVE-2024-36895, CVE-2024-36896, CVE-2024-36897, CVE-2024-36898, CVE-2024-36906, CVE-2024-36918, CVE-2024-36921, CVE-2024-36922, CVE-2024-36928, CVE-2024-36930, CVE-2024-36931, CVE-2024-36936, CVE-2024-36940, CVE-2024-36941, CVE-2024-36942, CVE-2024-36944, CVE-2024-36947, CVE-2024-36949, CVE-2024-36950, CVE-2024-36951, CVE-2024-36955, CVE-2024-36959 Jira References: PED-8111, PED-8240 Maintenance Incident: [SUSE:Maintenance:34123](https://smelt.suse.de/incident/34123/) Sources used: openSUSE Leap 15.6 (src): kernel-obs-build-6.4.0-150600.23.7.3, kernel-syms-6.4.0-150600.23.7.1, kernel-livepatch-SLE15-SP6_Update_1-1-150600.13.3.7, kernel-default-base-6.4.0-150600.23.7.3.150600.12.2.7, kernel-obs-qa-6.4.0-150600.23.7.1, kernel-source-6.4.0-150600.23.7.2 Basesystem Module 15-SP6 (src): kernel-default-base-6.4.0-150600.23.7.3.150600.12.2.7, kernel-source-6.4.0-150600.23.7.2 Development Tools Module 15-SP6 (src): kernel-obs-build-6.4.0-150600.23.7.3, kernel-source-6.4.0-150600.23.7.2, kernel-syms-6.4.0-150600.23.7.1 SUSE Linux Enterprise Live Patching 15-SP6 (src): kernel-livepatch-SLE15-SP6_Update_1-1-150600.13.3.7 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1220569 https://bugzilla.suse.com/show_bug.cgi?id=1220569#c125 --- Comment #125 from Maintenance Automation <maint-coord+maintenance-robot@suse.de> --- SUSE-SU-2024:2973-1: An update that solves 783 vulnerabilities, contains eight features and has 143 security fixes can now be installed. URL: https://www.suse.com/support/update/announcement/2024/suse-su-20242973-1 Category: security (important) Bug References: 1012628, 1065729, 1181674, 1186716, 1187716, 1193599, 1194869, 1195775, 1204562, 1207948, 1208593, 1209657, 1209834, 1213573, 1214683, 1214852, 1215199, 1215587, 1216196, 1216358, 1216702, 1217384, 1217408, 1217481, 1217489, 1217750, 1217912, 1217959, 1218205, 1218336, 1218442, 1218730, 1218779, 1218820, 1218917, 1219104, 1219170, 1219224, 1219478, 1219596, 1219623, 1219633, 1219832, 1219834, 1219847, 1219953, 1220021, 1220045, 1220120, 1220138, 1220328, 1220342, 1220427, 1220428, 1220430, 1220569, 1220587, 1220783, 1220915, 1220942, 1221044, 1221057, 1221086, 1221293, 1221303, 1221504, 1221612, 1221615, 1221635, 1221645, 1221647, 1221649, 1221654, 1221656, 1221659, 1221765, 1221777, 1221783, 1221816, 1221829, 1221830, 1221858, 1221958, 1222011, 1222015, 1222048, 1222080, 1222115, 1222173, 1222241, 1222264, 1222273, 1222294, 1222301, 1222303, 1222304, 1222307, 1222326, 1222328, 1222357, 1222366, 1222368, 1222371, 1222378, 1222380, 1222385, 1222422, 1222426, 1222428, 1222437, 1222438, 1222445, 1222459, 1222463, 1222489, 1222522, 1222525, 1222531, 1222532, 1222557, 1222559, 1222563, 1222585, 1222588, 1222596, 1222606, 1222608, 1222613, 1222615, 1222617, 1222618, 1222619, 1222622, 1222624, 1222627, 1222630, 1222635, 1222721, 1222727, 1222768, 1222769, 1222771, 1222775, 1222779, 1222780, 1222782, 1222793, 1222799, 1222801, 1222809, 1222810, 1222893, 1222968, 1223007, 1223010, 1223011, 1223013, 1223015, 1223018, 1223020, 1223021, 1223023, 1223024, 1223033, 1223034, 1223035, 1223038, 1223039, 1223041, 1223045, 1223046, 1223051, 1223052, 1223058, 1223060, 1223061, 1223076, 1223077, 1223111, 1223113, 1223138, 1223143, 1223187, 1223189, 1223190, 1223191, 1223198, 1223202, 1223265, 1223285, 1223315, 1223338, 1223369, 1223380, 1223384, 1223390, 1223439, 1223462, 1223532, 1223539, 1223570, 1223575, 1223590, 1223591, 1223592, 1223593, 1223625, 1223629, 1223633, 1223634, 1223637, 1223641, 1223643, 1223649, 1223650, 1223651, 1223652, 1223653, 1223654, 1223655, 1223660, 1223661, 1223664, 1223665, 1223666, 1223668, 1223669, 1223670, 1223671, 1223675, 1223677, 1223678, 1223686, 1223692, 1223693, 1223695, 1223696, 1223698, 1223705, 1223712, 1223718, 1223728, 1223731, 1223732, 1223735, 1223739, 1223740, 1223741, 1223744, 1223745, 1223747, 1223748, 1223749, 1223750, 1223752, 1223754, 1223757, 1223759, 1223761, 1223762, 1223774, 1223778, 1223782, 1223787, 1223788, 1223790, 1223802, 1223804, 1223805, 1223806, 1223807, 1223813, 1223815, 1223822, 1223827, 1223831, 1223834, 1223836, 1223838, 1223863, 1223869, 1223870, 1223871, 1223872, 1223874, 1223944, 1223945, 1223946, 1223991, 1224049, 1224076, 1224096, 1224098, 1224137, 1224166, 1224177, 1224180, 1224181, 1224187, 1224331, 1224414, 1224422, 1224423, 1224429, 1224430, 1224432, 1224433, 1224437, 1224438, 1224439, 1224442, 1224443, 1224445, 1224449, 1224477, 1224479, 1224480, 1224481, 1224482, 1224486, 1224487, 1224488, 1224490, 1224491, 1224492, 1224493, 1224494, 1224495, 1224497, 1224498, 1224499, 1224500, 1224501, 1224502, 1224504, 1224505, 1224506, 1224507, 1224508, 1224509, 1224511, 1224512, 1224513, 1224515, 1224516, 1224517, 1224519, 1224520, 1224521, 1224523, 1224524, 1224525, 1224526, 1224530, 1224531, 1224534, 1224537, 1224539, 1224540, 1224541, 1224542, 1224543, 1224544, 1224545, 1224546, 1224549, 1224550, 1224552, 1224553, 1224555, 1224557, 1224558, 1224559, 1224562, 1224565, 1224566, 1224567, 1224568, 1224569, 1224571, 1224572, 1224573, 1224575, 1224576, 1224577, 1224578, 1224579, 1224580, 1224581, 1224582, 1224583, 1224584, 1224585, 1224586, 1224587, 1224588, 1224589, 1224592, 1224596, 1224598, 1224600, 1224601, 1224602, 1224603, 1224604, 1224605, 1224606, 1224607, 1224608, 1224609, 1224611, 1224612, 1224613, 1224614, 1224615, 1224617, 1224618, 1224619, 1224620, 1224621, 1224622, 1224623, 1224624, 1224626, 1224627, 1224628, 1224629, 1224630, 1224632, 1224633, 1224634, 1224636, 1224637, 1224638, 1224639, 1224640, 1224641, 1224643, 1224644, 1224645, 1224646, 1224647, 1224648, 1224649, 1224650, 1224651, 1224652, 1224653, 1224654, 1224655, 1224657, 1224659, 1224660, 1224661, 1224662, 1224663, 1224664, 1224665, 1224666, 1224667, 1224668, 1224670, 1224671, 1224673, 1224674, 1224675, 1224676, 1224677, 1224678, 1224680, 1224681, 1224682, 1224683, 1224685, 1224686, 1224687, 1224688, 1224692, 1224696, 1224697, 1224698, 1224699, 1224701, 1224703, 1224704, 1224705, 1224706, 1224707, 1224709, 1224710, 1224712, 1224714, 1224716, 1224717, 1224718, 1224719, 1224720, 1224721, 1224722, 1224723, 1224725, 1224727, 1224728, 1224729, 1224730, 1224731, 1224732, 1224733, 1224735, 1224736, 1224738, 1224739, 1224740, 1224741, 1224742, 1224743, 1224747, 1224749, 1224751, 1224759, 1224763, 1224764, 1224765, 1224766, 1224767, 1224790, 1224792, 1224793, 1224803, 1224804, 1224866, 1224928, 1224930, 1224932, 1224933, 1224935, 1224936, 1224937, 1224939, 1224941, 1224944, 1224946, 1224947, 1224949, 1224951, 1224988, 1224989, 1224992, 1224998, 1225000, 1225001, 1225004, 1225006, 1225007, 1225008, 1225009, 1225014, 1225015, 1225022, 1225025, 1225028, 1225029, 1225031, 1225036, 1225041, 1225044, 1225049, 1225050, 1225053, 1225076, 1225077, 1225078, 1225081, 1225085, 1225086, 1225088, 1225090, 1225092, 1225096, 1225097, 1225101, 1225103, 1225104, 1225105, 1225106, 1225108, 1225120, 1225132, 1225133, 1225134, 1225136, 1225172, 1225180, 1225272, 1225300, 1225391, 1225472, 1225475, 1225476, 1225477, 1225478, 1225485, 1225489, 1225490, 1225502, 1225527, 1225529, 1225530, 1225532, 1225534, 1225548, 1225550, 1225553, 1225554, 1225555, 1225556, 1225557, 1225559, 1225560, 1225564, 1225565, 1225566, 1225568, 1225569, 1225570, 1225571, 1225572, 1225573, 1225577, 1225578, 1225579, 1225580, 1225581, 1225583, 1225584, 1225585, 1225586, 1225587, 1225588, 1225589, 1225590, 1225591, 1225592, 1225593, 1225594, 1225595, 1225599, 1225600, 1225601, 1225602, 1225605, 1225607, 1225609, 1225610, 1225611, 1225616, 1225618, 1225640, 1225642, 1225681, 1225692, 1225694, 1225695, 1225696, 1225698, 1225699, 1225702, 1225704, 1225705, 1225708, 1225710, 1225711, 1225712, 1225714, 1225715, 1225717, 1225719, 1225720, 1225722, 1225723, 1225726, 1225728, 1225731, 1225732, 1225734, 1225735, 1225736, 1225737, 1225741, 1225744, 1225745, 1225746, 1225747, 1225748, 1225749, 1225750, 1225752, 1225753, 1225756, 1225757, 1225758, 1225759, 1225760, 1225761, 1225762, 1225763, 1225765, 1225766, 1225767, 1225769, 1225770, 1225773, 1225775, 1225805, 1225810, 1225815, 1225820, 1225823, 1225827, 1225829, 1225830, 1225834, 1225839, 1225840, 1225842, 1225843, 1225847, 1225851, 1225866, 1225872, 1225894, 1225895, 1225896, 1225898, 1225903, 1225945, 1226022, 1226131, 1226145, 1226149, 1226155, 1226158, 1226163, 1226202, 1226211, 1226212, 1226213, 1226226, 1226457, 1226502, 1226503, 1226513, 1226514, 1226520, 1226582, 1226587, 1226588, 1226592, 1226593, 1226594, 1226597, 1226607, 1226608, 1226610, 1226612, 1226613, 1226630, 1226632, 1226633, 1226634, 1226637, 1226657, 1226658, 1226734, 1226735, 1226737, 1226738, 1226739, 1226740, 1226741, 1226742, 1226744, 1226746, 1226747, 1226749, 1226750, 1226754, 1226757, 1226758, 1226760, 1226761, 1226764, 1226767, 1226768, 1226769, 1226771, 1226772, 1226774, 1226775, 1226776, 1226777, 1226780, 1226781, 1226783, 1226788, 1226789, 1226790, 1226791, 1226796, 1226799, 1226837, 1226839, 1226840, 1226841, 1226842, 1226844, 1226848, 1226852, 1226856, 1226857, 1226859, 1226861, 1226863, 1226864, 1226866, 1226867, 1226868, 1226875, 1226876, 1226878, 1226879, 1226883, 1226886, 1226890, 1226891, 1226894, 1226895, 1226905, 1226908, 1226909, 1226911, 1226915, 1226928, 1226934, 1226938, 1226939, 1226941, 1226948, 1226949, 1226950, 1226962, 1226976, 1226989, 1226990, 1226992, 1226993, 1226994, 1226995, 1226996, 1227066, 1227072, 1227085, 1227089, 1227090, 1227096, 1227101, 1227103, 1227149, 1227190, 1227282, 1227362, 1227363, 1227383, 1227432, 1227433, 1227434, 1227435, 1227443, 1227446, 1227447, 1227487, 1227573, 1227626, 1227716, 1227719, 1227723, 1227730, 1227736, 1227755, 1227757, 1227762, 1227763, 1227779, 1227780, 1227783, 1227786, 1227788, 1227789, 1227797, 1227800, 1227801, 1227803, 1227806, 1227813, 1227814, 1227836, 1227855, 1227862, 1227866, 1227886, 1227899, 1227910, 1227913, 1227926, 1228090, 1228192, 1228193, 1228211, 1228269, 1228289, 1228327, 1228328, 1228403, 1228405, 1228408, 1228417 CVE References: CVE-2021-47432, CVE-2022-48772, CVE-2023-0160, CVE-2023-38417, CVE-2023-47210, CVE-2023-51780, CVE-2023-52435, CVE-2023-52458, CVE-2023-52472, CVE-2023-52503, CVE-2023-52616, CVE-2023-52618, CVE-2023-52622, CVE-2023-52631, CVE-2023-52635, CVE-2023-52640, CVE-2023-52641, CVE-2023-52645, CVE-2023-52652, CVE-2023-52653, CVE-2023-52656, CVE-2023-52657, CVE-2023-52658, CVE-2023-52659, CVE-2023-52660, CVE-2023-52661, CVE-2023-52662, CVE-2023-52663, CVE-2023-52664, CVE-2023-52667, CVE-2023-52669, CVE-2023-52670, CVE-2023-52671, CVE-2023-52672, CVE-2023-52673, CVE-2023-52674, CVE-2023-52675, CVE-2023-52676, CVE-2023-52678, CVE-2023-52679, CVE-2023-52680, CVE-2023-52681, CVE-2023-52683, CVE-2023-52685, CVE-2023-52686, CVE-2023-52687, CVE-2023-52690, CVE-2023-52691, CVE-2023-52692, CVE-2023-52693, CVE-2023-52694, CVE-2023-52695, CVE-2023-52696, CVE-2023-52697, CVE-2023-52698, CVE-2023-52699, CVE-2023-52735, CVE-2023-52749, CVE-2023-52750, CVE-2023-52751, CVE-2023-52753, CVE-2023-52754, CVE-2023-52757, CVE-2023-52759, CVE-2023-52762, CVE-2023-52763, CVE-2023-52764, CVE-2023-52765, CVE-2023-52766, CVE-2023-52767, CVE-2023-52768, CVE-2023-52769, CVE-2023-52771, CVE-2023-52772, CVE-2023-52773, CVE-2023-52774, CVE-2023-52775, CVE-2023-52776, CVE-2023-52777, CVE-2023-52780, CVE-2023-52781, CVE-2023-52782, CVE-2023-52783, CVE-2023-52784, CVE-2023-52786, CVE-2023-52787, CVE-2023-52788, CVE-2023-52789, CVE-2023-52791, CVE-2023-52792, CVE-2023-52794, CVE-2023-52795, CVE-2023-52796, CVE-2023-52798, CVE-2023-52799, CVE-2023-52800, CVE-2023-52801, CVE-2023-52803, CVE-2023-52804, CVE-2023-52805, CVE-2023-52806, CVE-2023-52807, CVE-2023-52808, CVE-2023-52809, CVE-2023-52810, CVE-2023-52811, CVE-2023-52812, CVE-2023-52813, CVE-2023-52814, CVE-2023-52815, CVE-2023-52816, CVE-2023-52817, CVE-2023-52818, CVE-2023-52819, CVE-2023-52821, CVE-2023-52825, CVE-2023-52826, CVE-2023-52827, CVE-2023-52829, CVE-2023-52832, CVE-2023-52833, CVE-2023-52834, CVE-2023-52835, CVE-2023-52836, CVE-2023-52837, CVE-2023-52838, CVE-2023-52840, CVE-2023-52841, CVE-2023-52842, CVE-2023-52843, CVE-2023-52844, CVE-2023-52845, CVE-2023-52847, CVE-2023-52849, CVE-2023-52850, CVE-2023-52851, CVE-2023-52853, CVE-2023-52854, CVE-2023-52855, CVE-2023-52856, CVE-2023-52857, CVE-2023-52858, CVE-2023-52860, CVE-2023-52861, CVE-2023-52862, CVE-2023-52863, CVE-2023-52864, CVE-2023-52865, CVE-2023-52866, CVE-2023-52867, CVE-2023-52868, CVE-2023-52869, CVE-2023-52870, CVE-2023-52871, CVE-2023-52872, CVE-2023-52873, CVE-2023-52874, CVE-2023-52875, CVE-2023-52876, CVE-2023-52877, CVE-2023-52878, CVE-2023-52879, CVE-2023-52880, CVE-2023-52881, CVE-2023-52882, CVE-2023-52883, CVE-2023-52884, CVE-2023-6238, CVE-2023-7042, CVE-2024-0639, CVE-2024-21823, CVE-2024-22099, CVE-2024-23848, CVE-2024-24861, CVE-2024-25739, CVE-2024-25741, CVE-2024-26601, CVE-2024-26611, CVE-2024-26614, CVE-2024-26615, CVE-2024-26623, CVE-2024-26625, CVE-2024-26632, CVE-2024-26633, CVE-2024-26635, CVE-2024-26636, CVE-2024-26638, CVE-2024-26641, CVE-2024-26642, CVE-2024-26643, CVE-2024-26650, CVE-2024-26652, CVE-2024-26654, CVE-2024-26656, CVE-2024-26657, CVE-2024-26663, CVE-2024-26665, CVE-2024-26671, CVE-2024-26673, CVE-2024-26674, CVE-2024-26676, CVE-2024-26679, CVE-2024-26684, CVE-2024-26685, CVE-2024-26691, CVE-2024-26704, CVE-2024-26714, CVE-2024-26726, CVE-2024-26731, CVE-2024-26733, CVE-2024-26734, CVE-2024-26737, CVE-2024-26739, CVE-2024-26740, CVE-2024-26742, CVE-2024-26750, CVE-2024-26756, CVE-2024-26758, CVE-2024-26760, CVE-2024-26761, CVE-2024-26764, CVE-2024-26767, CVE-2024-26769, CVE-2024-26772, CVE-2024-26773, CVE-2024-26774, CVE-2024-26775, CVE-2024-26780, CVE-2024-26783, CVE-2024-26785, CVE-2024-26786, CVE-2024-26791, CVE-2024-26793, CVE-2024-26794, CVE-2024-26802, CVE-2024-26805, CVE-2024-26807, CVE-2024-26813, CVE-2024-26814, CVE-2024-26815, CVE-2024-26816, CVE-2024-26822, CVE-2024-26826, CVE-2024-26832, CVE-2024-26836, CVE-2024-26842, CVE-2024-26844, CVE-2024-26845, CVE-2024-26846, CVE-2024-26853, CVE-2024-26854, CVE-2024-26855, CVE-2024-26856, CVE-2024-26857, CVE-2024-26858, CVE-2024-26860, CVE-2024-26861, CVE-2024-26862, CVE-2024-26863, CVE-2024-26866, CVE-2024-26868, CVE-2024-26870, CVE-2024-26878, CVE-2024-26881, CVE-2024-26882, CVE-2024-26883, CVE-2024-26884, CVE-2024-26885, CVE-2024-26889, CVE-2024-26899, CVE-2024-26900, CVE-2024-26901, CVE-2024-26903, CVE-2024-26906, CVE-2024-26909, CVE-2024-26920, CVE-2024-26921, CVE-2024-26922, CVE-2024-26923, CVE-2024-26925, CVE-2024-26928, CVE-2024-26932, CVE-2024-26933, CVE-2024-26934, CVE-2024-26935, CVE-2024-26937, CVE-2024-26938, CVE-2024-26940, CVE-2024-26943, CVE-2024-26944, CVE-2024-26945, CVE-2024-26946, CVE-2024-26948, CVE-2024-26949, CVE-2024-26950, CVE-2024-26951, CVE-2024-26957, CVE-2024-26958, CVE-2024-26960, CVE-2024-26961, CVE-2024-26962, CVE-2024-26963, CVE-2024-26964, CVE-2024-26972, CVE-2024-26973, CVE-2024-26978, CVE-2024-26981, CVE-2024-26982, CVE-2024-26983, CVE-2024-26984, CVE-2024-26986, CVE-2024-26988, CVE-2024-26989, CVE-2024-26990, CVE-2024-26991, CVE-2024-26992, CVE-2024-26993, CVE-2024-26994, CVE-2024-26995, CVE-2024-26996, CVE-2024-26997, CVE-2024-26999, CVE-2024-27000, CVE-2024-27001, CVE-2024-27002, CVE-2024-27003, CVE-2024-27004, CVE-2024-27008, CVE-2024-27012, CVE-2024-27013, CVE-2024-27014, CVE-2024-27015, CVE-2024-27016, CVE-2024-27019, CVE-2024-27020, CVE-2024-27022, CVE-2024-27025, CVE-2024-27027, CVE-2024-27028, CVE-2024-27030, CVE-2024-27031, CVE-2024-27046, CVE-2024-27056, CVE-2024-27057, CVE-2024-27062, CVE-2024-27064, CVE-2024-27065, CVE-2024-27067, CVE-2024-27080, CVE-2024-27388, CVE-2024-27389, CVE-2024-27393, CVE-2024-27395, CVE-2024-27396, CVE-2024-27399, CVE-2024-27400, CVE-2024-27401, CVE-2024-27402, CVE-2024-27404, CVE-2024-27405, CVE-2024-27408, CVE-2024-27410, CVE-2024-27411, CVE-2024-27412, CVE-2024-27413, CVE-2024-27414, CVE-2024-27416, CVE-2024-27417, CVE-2024-27418, CVE-2024-27419, CVE-2024-27431, CVE-2024-27432, CVE-2024-27434, CVE-2024-27435, CVE-2024-27436, CVE-2024-33619, CVE-2024-34777, CVE-2024-35247, CVE-2024-35784, CVE-2024-35786, CVE-2024-35788, CVE-2024-35789, CVE-2024-35790, CVE-2024-35791, CVE-2024-35794, CVE-2024-35795, CVE-2024-35796, CVE-2024-35799, CVE-2024-35800, CVE-2024-35801, CVE-2024-35803, CVE-2024-35804, CVE-2024-35805, CVE-2024-35806, CVE-2024-35807, CVE-2024-35808, CVE-2024-35809, CVE-2024-35810, CVE-2024-35811, CVE-2024-35812, CVE-2024-35813, CVE-2024-35814, CVE-2024-35815, CVE-2024-35817, CVE-2024-35819, CVE-2024-35821, CVE-2024-35822, CVE-2024-35823, CVE-2024-35824, CVE-2024-35825, CVE-2024-35827, CVE-2024-35828, CVE-2024-35829, CVE-2024-35830, CVE-2024-35831, CVE-2024-35833, CVE-2024-35834, CVE-2024-35835, CVE-2024-35836, CVE-2024-35837, CVE-2024-35838, CVE-2024-35841, CVE-2024-35842, CVE-2024-35843, CVE-2024-35845, CVE-2024-35847, CVE-2024-35848, CVE-2024-35849, CVE-2024-35850, CVE-2024-35851, CVE-2024-35852, CVE-2024-35853, CVE-2024-35854, CVE-2024-35857, CVE-2024-35860, CVE-2024-35861, CVE-2024-35862, CVE-2024-35863, CVE-2024-35864, CVE-2024-35865, CVE-2024-35866, CVE-2024-35867, CVE-2024-35868, CVE-2024-35872, CVE-2024-35875, CVE-2024-35877, CVE-2024-35878, CVE-2024-35879, CVE-2024-35880, CVE-2024-35883, CVE-2024-35884, CVE-2024-35885, CVE-2024-35886, CVE-2024-35887, CVE-2024-35889, CVE-2024-35890, CVE-2024-35891, CVE-2024-35892, CVE-2024-35893, CVE-2024-35895, CVE-2024-35896, CVE-2024-35898, CVE-2024-35899, CVE-2024-35900, CVE-2024-35901, CVE-2024-35903, CVE-2024-35904, CVE-2024-35905, CVE-2024-35907, CVE-2024-35908, CVE-2024-35909, CVE-2024-35911, CVE-2024-35912, CVE-2024-35914, CVE-2024-35915, CVE-2024-35916, CVE-2024-35917, CVE-2024-35921, CVE-2024-35922, CVE-2024-35924, CVE-2024-35925, CVE-2024-35926, CVE-2024-35927, CVE-2024-35928, CVE-2024-35930, CVE-2024-35931, CVE-2024-35932, CVE-2024-35933, CVE-2024-35934, CVE-2024-35935, CVE-2024-35936, CVE-2024-35937, CVE-2024-35938, CVE-2024-35940, CVE-2024-35942, CVE-2024-35943, CVE-2024-35944, CVE-2024-35945, CVE-2024-35946, CVE-2024-35947, CVE-2024-35950, CVE-2024-35951, CVE-2024-35952, CVE-2024-35953, CVE-2024-35954, CVE-2024-35955, CVE-2024-35956, CVE-2024-35957, CVE-2024-35958, CVE-2024-35959, CVE-2024-35960, CVE-2024-35961, CVE-2024-35962, CVE-2024-35963, CVE-2024-35964, CVE-2024-35965, CVE-2024-35966, CVE-2024-35967, CVE-2024-35969, CVE-2024-35970, CVE-2024-35971, CVE-2024-35972, CVE-2024-35973, CVE-2024-35974, CVE-2024-35975, CVE-2024-35976, CVE-2024-35977, CVE-2024-35978, CVE-2024-35979, CVE-2024-35981, CVE-2024-35982, CVE-2024-35984, CVE-2024-35986, CVE-2024-35989, CVE-2024-35990, CVE-2024-35991, CVE-2024-35992, CVE-2024-35995, CVE-2024-35997, CVE-2024-35998, CVE-2024-35999, CVE-2024-36002, CVE-2024-36003, CVE-2024-36004, CVE-2024-36005, CVE-2024-36006, CVE-2024-36007, CVE-2024-36008, CVE-2024-36009, CVE-2024-36010, CVE-2024-36011, CVE-2024-36012, CVE-2024-36013, CVE-2024-36014, CVE-2024-36015, CVE-2024-36016, CVE-2024-36017, CVE-2024-36018, CVE-2024-36019, CVE-2024-36020, CVE-2024-36021, CVE-2024-36024, CVE-2024-36025, CVE-2024-36026, CVE-2024-36029, CVE-2024-36030, CVE-2024-36032, CVE-2024-36281, CVE-2024-36477, CVE-2024-36478, CVE-2024-36479, CVE-2024-36880, CVE-2024-36882, CVE-2024-36885, CVE-2024-36887, CVE-2024-36889, CVE-2024-36890, CVE-2024-36891, CVE-2024-36893, CVE-2024-36894, CVE-2024-36895, CVE-2024-36896, CVE-2024-36897, CVE-2024-36898, CVE-2024-36899, CVE-2024-36900, CVE-2024-36901, CVE-2024-36902, CVE-2024-36903, CVE-2024-36904, CVE-2024-36906, CVE-2024-36909, CVE-2024-36910, CVE-2024-36911, CVE-2024-36912, CVE-2024-36913, CVE-2024-36914, CVE-2024-36915, CVE-2024-36916, CVE-2024-36917, CVE-2024-36918, CVE-2024-36919, CVE-2024-36921, CVE-2024-36922, CVE-2024-36923, CVE-2024-36924, CVE-2024-36926, CVE-2024-36928, CVE-2024-36930, CVE-2024-36931, CVE-2024-36934, CVE-2024-36935, CVE-2024-36936, CVE-2024-36937, CVE-2024-36938, CVE-2024-36940, CVE-2024-36942, CVE-2024-36944, CVE-2024-36945, CVE-2024-36946, CVE-2024-36947, CVE-2024-36949, CVE-2024-36950, CVE-2024-36951, CVE-2024-36952, CVE-2024-36955, CVE-2024-36957, CVE-2024-36959, CVE-2024-36960, CVE-2024-36962, CVE-2024-36964, CVE-2024-36965, CVE-2024-36967, CVE-2024-36969, CVE-2024-36971, CVE-2024-36972, CVE-2024-36973, CVE-2024-36975, CVE-2024-36977, CVE-2024-36978, CVE-2024-37021, CVE-2024-37078, CVE-2024-37353, CVE-2024-37354, CVE-2024-38381, CVE-2024-38384, CVE-2024-38385, CVE-2024-38388, CVE-2024-38390, CVE-2024-38391, CVE-2024-38539, CVE-2024-38540, CVE-2024-38541, CVE-2024-38543, CVE-2024-38544, CVE-2024-38546, CVE-2024-38547, CVE-2024-38548, CVE-2024-38549, CVE-2024-38550, CVE-2024-38551, CVE-2024-38552, CVE-2024-38553, CVE-2024-38554, CVE-2024-38555, CVE-2024-38556, CVE-2024-38557, CVE-2024-38558, CVE-2024-38562, CVE-2024-38564, CVE-2024-38565, CVE-2024-38566, CVE-2024-38567, CVE-2024-38568, CVE-2024-38569, CVE-2024-38570, CVE-2024-38571, CVE-2024-38572, CVE-2024-38573, CVE-2024-38575, CVE-2024-38578, CVE-2024-38579, CVE-2024-38580, CVE-2024-38581, CVE-2024-38582, CVE-2024-38583, CVE-2024-38586, CVE-2024-38587, CVE-2024-38588, CVE-2024-38590, CVE-2024-38591, CVE-2024-38592, CVE-2024-38594, CVE-2024-38595, CVE-2024-38597, CVE-2024-38598, CVE-2024-38599, CVE-2024-38600, CVE-2024-38601, CVE-2024-38602, CVE-2024-38603, CVE-2024-38604, CVE-2024-38605, CVE-2024-38608, CVE-2024-38610, CVE-2024-38611, CVE-2024-38615, CVE-2024-38616, CVE-2024-38617, CVE-2024-38618, CVE-2024-38619, CVE-2024-38621, CVE-2024-38622, CVE-2024-38627, CVE-2024-38628, CVE-2024-38629, CVE-2024-38630, CVE-2024-38633, CVE-2024-38634, CVE-2024-38635, CVE-2024-38636, CVE-2024-38659, CVE-2024-38661, CVE-2024-38663, CVE-2024-38664, CVE-2024-38780, CVE-2024-39276, CVE-2024-39277, CVE-2024-39291, CVE-2024-39296, CVE-2024-39301, CVE-2024-39362, CVE-2024-39371, CVE-2024-39463, CVE-2024-39466, CVE-2024-39468, CVE-2024-39469, CVE-2024-39471, CVE-2024-39472, CVE-2024-39473, CVE-2024-39474, CVE-2024-39475, CVE-2024-39479, CVE-2024-39481, CVE-2024-39482, CVE-2024-39487, CVE-2024-39490, CVE-2024-39494, CVE-2024-39496, CVE-2024-39498, CVE-2024-39502, CVE-2024-39504, CVE-2024-39507, CVE-2024-40901, CVE-2024-40906, CVE-2024-40908, CVE-2024-40919, CVE-2024-40923, CVE-2024-40925, CVE-2024-40928, CVE-2024-40931, CVE-2024-40935, CVE-2024-40937, CVE-2024-40940, CVE-2024-40947, CVE-2024-40948, CVE-2024-40953, CVE-2024-40960, CVE-2024-40961, CVE-2024-40966, CVE-2024-40970, CVE-2024-40972, CVE-2024-40975, CVE-2024-40979, CVE-2024-40998, CVE-2024-40999, CVE-2024-41006, CVE-2024-41011, CVE-2024-41013, CVE-2024-41014, CVE-2024-41017, CVE-2024-41090, CVE-2024-41091 Jira References: PED-8111, PED-8240, PED-8491, PED-8570, PED-8644, PED-8688, PED-8701, PED-8954 Maintenance Incident: [SUSE:Maintenance:35180](https://smelt.suse.de/incident/35180/) Sources used: openSUSE Leap 15.6 (src): kernel-syms-rt-6.4.0-150600.10.5.1, kernel-source-rt-6.4.0-150600.10.5.1 SUSE Linux Enterprise Live Patching 15-SP6 (src): kernel-livepatch-SLE15-SP6-RT_Update_1-1-150600.1.5.1 SUSE Real Time Module 15-SP6 (src): kernel-syms-rt-6.4.0-150600.10.5.1, kernel-source-rt-6.4.0-150600.10.5.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. -- You are receiving this mail because: You are on the CC list for the bug.
participants (1)
-
bugzilla_noreply@suse.com