Bug 1220569 - No mouse pointer in noVNC when installing latest Tumbleweed using BVCP
Summary: No mouse pointer in noVNC when installing latest Tumbleweed using BVCP
Status: IN_PROGRESS
Alias: None
Product: openSUSE Tumbleweed
Classification: openSUSE
Component: Kernel (show other bugs)
Version: Current
Hardware: Other Other
: P3 - Medium : Normal (vote)
Target Milestone: ---
Assignee: Oliver Neukum
QA Contact: E-mail List
URL:
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2024-02-28 14:16 UTC by Roger Whittaker
Modified: 2024-07-08 14:31 UTC (History)
5 users (show)

See Also:
Found By: ---
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments
Xorg.0.log (14.03 KB, text/x-log)
2024-02-29 10:47 UTC, Roger Whittaker
Details
hwinfo (337.65 KB, text/plain)
2024-02-29 16:59 UTC, Roger Whittaker
Details
dmesg.5.14.21-150500.53-default (51.36 KB, text/plain)
2024-02-29 16:59 UTC, Roger Whittaker
Details
dmesg.6.4.0-150600.5-default (51.65 KB, text/plain)
2024-02-29 17:01 UTC, Roger Whittaker
Details
hwinfo.6.4.0-150600.5-default (331.59 KB, text/plain)
2024-02-29 17:28 UTC, Roger Whittaker
Details
dmesg.6.4.14-150600.12.g7e8d545-default (51.58 KB, text/plain)
2024-03-01 21:54 UTC, Roger Whittaker
Details
dmesg.6.4.14-150600.13.g1247cee-default (51.31 KB, text/plain)
2024-03-01 21:54 UTC, Roger Whittaker
Details
lsusb-v.6.4.14-150600.12.g7e8d545-default (7.38 KB, text/plain)
2024-03-01 21:54 UTC, Roger Whittaker
Details
lsusb-v.6.4.14-150600.13.g1247cee-default (4.89 KB, text/plain)
2024-03-01 21:55 UTC, Roger Whittaker
Details
Test patch (1.88 KB, patch)
2024-03-02 20:34 UTC, Takashi Iwai
Details | Diff
dmesg.6.4.0-150600.1.g3905d67-default (51.69 KB, text/plain)
2024-03-02 21:25 UTC, Roger Whittaker
Details
Revised test patch (1.94 KB, patch)
2024-03-03 08:59 UTC, Takashi Iwai
Details | Diff
Revised test patch (1.94 KB, patch)
2024-03-03 09:33 UTC, Takashi Iwai
Details | Diff
dmesg.6.4.0-150600.2.g8e5d5a9-default (51.74 KB, text/plain)
2024-03-03 10:43 UTC, Roger Whittaker
Details
lsusb-v.6.4.0-150600.2.g8e5d5a9-default (7.38 KB, text/plain)
2024-03-03 10:45 UTC, Roger Whittaker
Details

Note You need to log in before you can comment on or make changes to this bug.
Description Roger Whittaker 2024-02-28 14:16:11 UTC
I have been using an unusual but rather nice virtualisation setup BVCP (https://bhyve.npulse.net/) which runs on FreeBSD and displays VMs using noVNC ( https://novnc.com/info.html).

When installing the latest Tumbleweed the mouse pointer in the noVNC window does not move, nor does it move in a completed install.

This problem does not exist with for example Leap 15.5.

I do not see this with virt-install / virt-viewer on Linux, so this seems to a specific problem with Tumbleweed when using noVNC.

I understand that this is an unusual use case, but maybe something has changed that might be a problem in other circumstances as well.
Comment 1 Ancor Gonzalez Sosa 2024-02-28 14:20:34 UTC
Just for the record, the reporter mentioned in another channel that this does not only happen during installation itself. IIUC, the problem persist in the installed TW system if he manages to complete the installation.

So it's likely a general problem of TW and not an installation issue.
Comment 2 Roger Whittaker 2024-02-28 14:50:31 UTC
I've changed the subject to reflect this and changed the component to "Other".
Comment 3 Stefan Hundhammer 2024-02-28 14:55:17 UTC
I don't see how this could possibly be a problem of YaST.

Mouse cursor movement is as low-level as it can possibly get; on the level of the X server / X protocol.

For a graphical installation, YaST uses the Qt libs in version 5.x, which in turn use their own abstraction layer, and xcb calls in the case of X11. Qt 5.x makes heavy use of pixel buffers, no longer low-level Xlib calls, for any graphics; but mouse handling is independent of that.

I could understand if you say that graphics is choppy in your setup (which it in fact is for remote X) because Qt renders locally into pixel buffers and then transfers the whole pixel buffer from the client application to the X server, but mouse handling?

Let's ask our X11 experts.
Comment 4 Roger Whittaker 2024-02-28 15:00:18 UTC
Certainly it's not a problem with YaST, because it persists in the installed system.

I came across this when testing agama, but it happens with the standard YaST install and in both cases the mouse pointer won't move after installation either.

This was with the latest Tumbleweed (20240226).
Comment 5 Stefan Dirsch 2024-02-28 16:01:13 UTC
So I'm assuming you're running a VNC session/installation to access your VM. And noVNC is just a VNC client.  Is this correct? Then please check with another VNC client, e.g. vncviewer (package tigervnc) it the issue is VNC client related. Thanks.
Comment 6 Roger Whittaker 2024-02-28 16:11:02 UTC
I can't do this because I don't know how this BVCP thing works.  It's a web application that spawns a browser window called a "VNC console" which is using noVNC.

If I look at the system where BVCP is running I don't see an open VNC port, so I can't connect with another VNC viewer.

# nmap 192.168.1.7
Starting Nmap 7.94 ( https://nmap.org ) at 2024-02-28 16:03 GMT
Nmap scan report for tigerlily.disruptive.org.uk (192.168.1.7)
Host is up (0.00019s latency).
Not shown: 995 closed tcp ports (reset)
PORT     STATE SERVICE
22/tcp   open  ssh
80/tcp   open  http
111/tcp  open  rpcbind
2049/tcp open  nfs
8086/tcp open  d-s-n
MAC Address: 7C:D3:0A:36:33:C9 (Inventec)

Nmap done: 1 IP address (1 host up) scanned in 6.28 seconds

8086 is the port where the management web page side of it is accessed. 

noVNC is a javascript VNC client that runs in a browser.
Comment 7 Stefan Dirsch 2024-02-28 16:19:02 UTC
Ok. Then I have no idea how to help here. Seems like a blackbox then. Maybe Joan has a better clue. Adding him...
Comment 8 Joan Torres 2024-02-28 17:38:18 UTC
I've tried to reproduce this in an updated Tumbleweed and couldn't.

What is the version of xorg-x11-Xvnc on your Tumbleweed image and what is the novnc version on that FreeBSD?

(In reply to Roger Whittaker from comment #0)
> When installing the latest Tumbleweed the mouse pointer in the noVNC window
> does not move, nor does it move in a completed install.
> 
> This problem does not exist with for example Leap 15.5.

I think if with the same FreeBSD setup and connecting with Leap 15.5 (which has an older Xvnc) doesn't have the problem, the issue might be at our latest Xvnc...
Comment 9 Roger Whittaker 2024-02-28 17:59:19 UTC
This is the 20240226 version of Tumbleweed which has xorg-x11-Xvnc-1.13.1-5.1.x86_64.rpm.

noVNC is a javascript library running in the browser.  The browser window has a pop-out settings panel that shows the version as 1.2.0.

I started an installation of Leap 15.5 but did not complete it - during that installation the mouse pointer moved correctly.

I also have a fully installed but not updated SLES 15 SP4 VM which has xorg-x11-Xvnc-1.10.1-150400.5.6.x86_64, and the mouse pointer moves correctly.

I'd be happy to experiment with different Xvnc versions (for example a forced downgrade on Tumbleweed) if you can suggest what to try and where to get them.
Comment 10 Joan Torres 2024-02-29 09:45:33 UTC
Some things we could check: 

1. At the novnc menu settings, the "View Only" checkbox option is not set?
2. How is launched Xvnc? It has some parameters to disallow the mouse. i.e. sudo ps aux | grep Xvnc.
3. What logs novnc? At the browser window it spawns, can you access its console log?
4. What logs Xvnc? In the case of Yast installer it should be at /var/log/YaST2/vncserver.log
Comment 11 Roger Whittaker 2024-02-29 10:00:48 UTC
One more test: the mouse pointer when installing the current 15.6 (Build604.1) does not move.
Comment 12 Roger Whittaker 2024-02-29 10:13:40 UTC
In answer to comment#10 (looking at the installed Tumbleweed):

1. No, "View Only" is not set.

2. There is no Xvnc running in the Tumbleweed guest.

localhost:~ # ps wuaxf  | grep [X]vnc
localhost:~ # 
localhost:~ # ps wuaxf  | grep [X]org
root      1204  2.4  0.8 908728 147092 tty2    Ssl+ 09:57   0:10  \_ /usr/bin/Xorg.bin -nolisten tcp -background none -seat seat0 vt2 -auth /run/sddm/xauth_YbMLnG -noreset -displayfd 16

3. In the "Settings -> Advanced" menu on noVNC, there is a choice of logging levels, but I've no idea how to access any logs.

4. For this I'll try starting and install again and see what happens.
Comment 13 Joan Torres 2024-02-29 10:35:01 UTC
(In reply to Roger Whittaker from comment #12)
> 2. There is no Xvnc running in the Tumbleweed guest.

Hmm, I wonder how BVCP starts a vnc server on the guest. Maybe it could be x0vncserver, could you grep ps with "vnc".
Comment 14 Roger Whittaker 2024-02-29 10:42:25 UTC
There is no process running with the string "vnc" in its name.
Comment 15 Roger Whittaker 2024-02-29 10:45:21 UTC
Nor is there in the 15.6 installer.

Listing of /var/log/ during the 15.6 installation:

total 312
-rw-r--r-- 1 root root 43596 Feb 29 05:21 boot.msg
lrwxrwxrwx 1 root root    30 Feb 29 05:21 chrony -> /mounts/mp_0001/var/log/chrony
drwxr-xr-x 2 root root  4096 Feb  7 19:20 cups
drwxr-xr-x 2 root root  4096 Dec 14 08:17 krb5
-rw-r--r-- 1 root root 25968 Feb 29 05:21 linuxrc.log
-rw-r--r-- 1 root root 72850 Feb 29 05:23 messages
-rw------- 1 root root 64462 Feb 29 05:22 plymouth-debug.log
-rw------- 1 root root 32000 Feb  7 19:20 tallylog
-rw-r--r-- 1 root root   146 Feb 29 05:18 udev.log
-rw-r--r-- 1 root root  1367 Feb 29 05:23 warn
-rw-r--r-- 1 root root 17826 Feb 29 05:21 wickedd.log
-rw-r----- 1 root root    40 Feb 29 05:18 wpa_supplicant.log
-rw-r--r-- 1 root root 14363 Feb 29 05:24 Xorg.0.log
drwxr-xr-x 3 root root  4096 Feb 29 05:23 YaST2
drwxr-xr-x 2 root root  4096 Feb 29 05:23 zypp
Comment 16 Roger Whittaker 2024-02-29 10:47:15 UTC
Created attachment 873115 [details]
Xorg.0.log

/var/log/Xorg.0.log from 15.6 installation after the graphical installer has started
Comment 17 Joan Torres 2024-02-29 13:30:01 UTC
Thanks for those logs.

I can see there that your SP6 uses Xorg 21.1.4 version while Tumbleweed uses 21.1.11. So if both have this mouse issue, it looks like it is not related with Xorg.

Hmm, interesting, this Xorg logs:

> [   349.952] (II) event3  - Power Button: device removed
> [   349.977] (II) event0  - AT Translated Set 2 keyboard: device removed
> [   350.001] (II) event1  - PS/2 Generic Mouse: device removed


Maybe it's a regression with libinput. SP6 and Tumbleweed have 1.25 version and SP5 has 1.21 version.

Could you test with the 1.21 version?
Here I made a package with that version:
https://build.opensuse.org/package/show/home:jtorres:branches:X11:XOrg:tigervnc-test/libinput
Comment 18 Roger Whittaker 2024-02-29 13:44:52 UTC
These are currently showing as not being published: "Build finished but repository publishing is disabled".
Comment 19 Roger Whittaker 2024-02-29 15:19:22 UTC
On 15.6 I force downgraded these packages to the 15.5 versions:

libinput-udev-1.21.0-150500.1.2
libinput10-1.21.0-150500.1.2
xf86-input-libinput-1.2.1-150500.1.2

But the problem remains.
Comment 20 Roger Whittaker 2024-02-29 15:29:10 UTC
And still remains after downgrading to

xorg-x11-server-21.1.4-150500.5.1.x86_64.rpm
Comment 21 Roger Whittaker 2024-02-29 15:43:41 UTC
I also downgraded to 

xf86-input-vmmouse-13.1.0-bp155.3.11.x86_64.rpm

15.6 has the same version of xf86-input-evdev as 15.5:

xf86-input-evdev-2.10.6-150500.15.2.x86_64.rpm

I see this in /var/log/Xorg.0.log

[    33.965] (II) config/udev: Adding input device PS/2 Generic Mouse (/dev/input/event1)
[    33.965] (**) PS/2 Generic Mouse: Applying InputClass "evdev pointer catchall"
[    33.965] (**) PS/2 Generic Mouse: Applying InputClass "libinput pointer catchall"
[    33.966] (II) Using input driver 'libinput' for 'PS/2 Generic Mouse'
[    33.966] (**) PS/2 Generic Mouse: always reports core events
[    33.966] (**) Option "Device" "/dev/input/event1"
[    33.973] (II) event1  - PS/2 Generic Mouse: is tagged by udev as: Mouse
[    33.974] (II) event1  - PS/2 Generic Mouse: device is a pointer
[    33.975] (II) event1  - PS/2 Generic Mouse: device removed
[    33.984] (**) Option "config_info" "udev:/sys/devices/platform/i8042/serio1/input/input2/event1"
[    33.984] (II) XINPUT: Adding extended input device "PS/2 Generic Mouse" (type: MOUSE, id 8)
[    33.985] (**) Option "AccelerationScheme" "none"
[    33.985] (**) PS/2 Generic Mouse: (accel) selected scheme none/0
[    33.985] (**) PS/2 Generic Mouse: (accel) acceleration factor: 2.000
[    33.985] (**) PS/2 Generic Mouse: (accel) acceleration threshold: 4
[    33.991] (II) event1  - PS/2 Generic Mouse: is tagged by udev as: Mouse
[    33.992] (II) event1  - PS/2 Generic Mouse: device is a pointer
[    33.998] (II) config/udev: Adding input device PS/2 Generic Mouse (/dev/input/mouse0)
[    33.998] (II) No input driver specified, ignoring this device.
[    33.998] (II) This device may have been added with another device file.
[    34.000] (II) config/udev: Adding input device PC Speaker (/dev/input/event3)
[    34.000] (II) No input driver specified, ignoring this device.
[    34.000] (II) This device may have been added with another device file.
Comment 22 Roger Whittaker 2024-02-29 16:15:43 UTC
I have now replaced packages with those from

https://download.opensuse.org/repositories/home:/jtorres:/branches:/X11:/XOrg:/tigervnc-test/openSUSE_Leap_15.6/x86_64/

but I still see the same behaviour.
Comment 23 Roger Whittaker 2024-02-29 16:26:18 UTC
Now I have installed the kernel 5.14.21-150500.53-default from 15.5, booted into that, and now the mouse pointer moves....

So it's a kernel thing.
Comment 24 Joan Torres 2024-02-29 16:39:47 UTC
It looks like something is happening with the PS/2 mouse and keyboard.
They are being removed somehow?
Comment 25 Takashi Iwai 2024-02-29 16:41:38 UTC
If it's a kernel regression, please give the dmesg outputs from both working and non-working caess.  Also the outputs of hwinfo, too.

You can try other older kernels found in my OBS repos, e.g. home:tiwai:kernel:5.15, home:tiwai:kernel:5.16, ... home:tiwai:kernel:6.6,
and figure out which kernel version started failing.
It'll be helpful to narrow down the regression range.
Comment 26 Roger Whittaker 2024-02-29 16:59:13 UTC
Created attachment 873131 [details]
hwinfo
Comment 27 Roger Whittaker 2024-02-29 16:59:41 UTC
Created attachment 873132 [details]
dmesg.5.14.21-150500.53-default
Comment 28 Roger Whittaker 2024-02-29 17:01:18 UTC
Created attachment 873133 [details]
dmesg.6.4.0-150600.5-default
Comment 29 Takashi Iwai 2024-02-29 17:03:27 UTC
Could you give the hwinfo from the non-working case, too?
Comment 30 Roger Whittaker 2024-02-29 17:28:39 UTC
Created attachment 873134 [details]
hwinfo.6.4.0-150600.5-default
Comment 31 Roger Whittaker 2024-02-29 17:29:29 UTC
In answer to comment#25 I find that I can't install the the 5.19 or 6.2 kernels from https://download.opensuse.org/repositories/home:/tiwai:/kernel:/

I see errors like

Problem: the to be installed kernel-default-5.19.12-1.1.g95fa5b8.x86_64 conflicts with 'filesystem < 16' provided by the installed filesystem-15.0-11.8.1.x86_64

If I download the kernel and install with rpm --oldpackage --force --nodeps it fails with

warning: %post(kernel-default-6.2.12-1.1.geb3255d.x86_64) scriptlet failed, exit status 1

and I find that there's no kernel or initrd in /boot, only broken symlinks.
Comment 32 Takashi Iwai 2024-02-29 17:51:44 UTC
If you're installing on SLE/Leap, take the packages from "backport" instead of "standard" in my OBS home:tiwai:kernel:*.
Comment 33 Stefan Dirsch 2024-02-29 19:17:30 UTC
Let's assign to kernel component.
Comment 34 Roger Whittaker 2024-02-29 20:16:01 UTC
5.19.12-lp153.1.g95fa5b8-default: mouse pointer moves
Comment 35 Roger Whittaker 2024-02-29 20:24:53 UTC
6.2.12-lp154.1.geb3255d-default: mouse pointer moves
Comment 36 Roger Whittaker 2024-02-29 20:32:52 UTC
6.3.9-lp154.1.g0df701d-default: mouse pointer moves
Comment 37 Roger Whittaker 2024-02-29 20:39:49 UTC
6.4.12-lp154.1.gf5aa89b-default: mouse pointer moves
Comment 38 Roger Whittaker 2024-02-29 20:42:12 UTC
BUT:...

6.4.0-150600.5-default: mouse pointer does not move
Comment 39 Roger Whittaker 2024-02-29 20:52:23 UTC
And as mentioned before:

6.7.6-1-default: mouse pointer does not move

I hope this helps.
Comment 40 Roger Whittaker 2024-02-29 20:55:50 UTC
Installing the last (Tumbleweed) kernel has probably messed up the system because it forced the usr-merge thing.  But I can rebuild it and test > 6.4 from your repositories if it helps.
Comment 41 Takashi Iwai 2024-03-01 07:35:25 UTC
(In reply to Roger Whittaker from comment #40)
> Installing the last (Tumbleweed) kernel has probably messed up the system
> because it forced the usr-merge thing.

Ah, that's bad.  You should have installed the kernel from OBS Kernel:stable:Backport repo instead, which was built for SLE/Leap.

>  But I can rebuild it and test > 6.4
> from your repositories if it helps.

Yes, please check which upstream kernel started breaking.

It's already good to know that SLE15-SP6/Leap kernel breaks, but it has way too many (over 19000!) changes since the upstream 6.4 code.
Comment 42 Roger Whittaker 2024-03-01 08:03:43 UTC
This is a wild guess based on no knowledge of how the code works, but I was wondering if the change has anything to do with the references to psmouse_from_serio which I see in drivers/input/mouse/psmouse.* in 6.7.6-1 but not in 5.14.21-150500.55.49.

Also, I was wondering if there's a convenient place to find all the historic Tumbleweed kernels so that I could bisect by downgrading the kernel on a Tumbleweed VM?
Comment 43 Takashi Iwai 2024-03-01 08:31:33 UTC
(In reply to Roger Whittaker from comment #42)
> This is a wild guess based on no knowledge of how the code works, but I was
> wondering if the change has anything to do with the references to
> psmouse_from_serio which I see in drivers/input/mouse/psmouse.* in 6.7.6-1
> but not in 5.14.21-150500.55.49.

Which commit (or changelog entry) are you referring to?
 
> Also, I was wondering if there's a convenient place to find all the historic
> Tumbleweed kernels so that I could bisect by downgrading the kernel on a
> Tumbleweed VM?

TW history repo contains the old packages for a few weeks
  http://download.opensuse.org/history/

But it's for TW, i.e. with user-merge.
Comment 44 Roger Whittaker 2024-03-01 09:30:47 UTC
6.5.9-lp155.1.g1823166-default: mouse pointer does *not* move.

So the change is between 6.4.12-lp154.1.gf5aa89b-default and 6.5.9-lp155.1.g1823166-default in the kernels in https://download.opensuse.org/repositories/home:/tiwai:/kernel:/
Comment 45 Takashi Iwai 2024-03-01 10:34:19 UTC
OK, thanks.

Given that the breakage was seen on SLE15-SP6 branch, too, a suspected commit is
e2cb5cc822b6c9ee72c56ce1d81671b22c05406a
    Input: psmouse - fix fast_reconnect function for PS/2 mode

I'm build test kernels with the revert of the patch.

For SLE15-SP6/Leap 15.6, it's being built in OBS home:tiwai:bsc1220569-sle15-sp6 repo.

For 6.7.x Tumbleweed, it's being built in OBS home:tiwai:bsc1220569-stable repo.
This will contain both for TW ("standard") and SLE/Leap installation ("backport").

Please give it a try later.
Comment 46 Roger Whittaker 2024-03-01 11:38:14 UTC
SP6 with 6.4.0-150600.1.g2fbacfa-default from https://download.opensuse.org/repositories/home:/tiwai:/bsc1220569-sle15-sp6/pool/

Mouse pointer does *not* move...
Comment 47 Takashi Iwai 2024-03-01 12:09:08 UTC
Hmm, that's tough.  As this doesn't appear to be any logged error, it's hardly recognizable from the kernel messages, too.

OK, then let's concentrate on SLE15-SP6 development and try to narrow down the range there.

We have old SP6 kernels in kerncvs KOTD archive.
  https://kerncvs.suse.de/kernel-overview/?b=SLE15-SP6;a=kotd;p=sle15-sp6

For example, try this one on Aug 24, 2023:
  https://kerncvs.suse.de/kerneltest/suse/28f1b80/
The version is 6.4.12, and this should still work.

OTOH, the one almost corresponding to the version you tested 6.4.0-150600.5 is on Jan 25, 2024:
  https://kerncvs.suse.de/kerneltest/suse/55022e2/
This should be broken.

If the former works and the latter broken, you can try to bisect the package builds between them, as found in the KOTD archive list above.
Comment 48 Roger Whittaker 2024-03-01 14:34:17 UTC
I've installed both kernel-default-6.4.12-150600.3.1.g28f1b80.x86_64 and kernel-default-6.4.11-150600.4.1.g79fa783.x86_64 from the location you mentioned, but both of them fail to boot, hanging at "Loading initial ramdisk ..." - I'm not sure why this would be as the initrd seems to have been created correctly for each and is a sensible size.
Comment 49 Roger Whittaker 2024-03-01 15:36:56 UTC
6.4.0-150600.26.gf468b74-default from https://kerncvs.suse.de/kerneltest/suse/f468b74/ (28 Sep 2023) boots but mouse pointer does not move.
Comment 50 Roger Whittaker 2024-03-01 16:00:42 UTC
6.4.12-150600.17.g045364c-default (29 Aug 2023): mouse pointer moves.
Comment 51 Roger Whittaker 2024-03-01 16:09:28 UTC
6.4.14-150600.7.g79dfe00-default (5 Sep 2023): mouse pointer moves.
Comment 52 Roger Whittaker 2024-03-01 16:19:40 UTC
6.4.0-150600.33.geb0b8b0-default (7 Oct 2023): mouse pointer does not move.
Comment 53 Roger Whittaker 2024-03-01 16:44:28 UTC
6.4.0-150600.4.g3c5d96c-default (15 Sep 2023): mouse pointer does not move.
Comment 54 Roger Whittaker 2024-03-01 16:52:22 UTC
6.4.15-150600.10.g02c4a14-default (11 Sep 2023): mouse pointer does not move.
Comment 55 Roger Whittaker 2024-03-01 17:00:14 UTC
6.4.15-150600.9.g83dedd5-default (9 Sep 2023): mouse pointer does not move.
Comment 56 Roger Whittaker 2024-03-01 17:10:06 UTC
6.4.15-150600.6.ge3cf1f9-default (7 Sep 2023): mouse pointer does not move.
Comment 57 Roger Whittaker 2024-03-01 17:19:25 UTC
6.4.14-150600.15.gf11caa7-default (6 Sep 2023): mouse pointer does not move.

So between 6.4.14-150600.7.g79dfe00-default (5 Sep 2023) and 6.4.14-150600.15.gf11caa7-default (6 Sep 2023)
Comment 58 Roger Whittaker 2024-03-01 17:28:19 UTC
6.4.14-150600.12.g7e8d545-default (6 Sep 2023 15:30) mouse pointer moves.
Comment 59 Roger Whittaker 2024-03-01 17:36:46 UTC
6.4.14-150600.13.g1247cee-default (6 Sep 2023 18:30) mouse pointer does not move.
Comment 60 Roger Whittaker 2024-03-01 17:40:51 UTC
So the change would seem to be between these two:

7e8d545	Wed Sep 6 15:30:32 2023
kernel-default-6.4.14-150600.12.1.g7e8d545.x86_64.rpm

1247cee	Wed Sep 6 18:30:04 2023	
kernel-default-6.4.14-150600.13.1.g1247cee.x86_64.rpm
Comment 61 Roger Whittaker 2024-03-01 17:41:45 UTC
(Sorry for using bugzilla as my notebook...But I hope this has narrowed it down successfully.)
Comment 62 Takashi Iwai 2024-03-01 19:13:33 UTC
(In reply to Roger Whittaker from comment #60)
> So the change would seem to be between these two:
> 
> 7e8d545	Wed Sep 6 15:30:32 2023
> kernel-default-6.4.14-150600.12.1.g7e8d545.x86_64.rpm
> 
> 1247cee	Wed Sep 6 18:30:04 2023	
> kernel-default-6.4.14-150600.13.1.g1247cee.x86_64.rpm

Thanks!  This is really helpful, and the result is interesting.

% git log --pretty=oneline 7e8d545..1247cee
1247ceec5c8e6d9fad9399c9c28b682767860ff6 Merge branch 'users/msuchanek/SLE15-SP6/for-next' into SLE15-SP6
d6762837a96bddd1fab0d5a592f7fa70cf26e051 Merge branch 'users/oneukum/SLE15-SP6/for-next' into SLE15-SP6
30a3314eef40dc4c00ae7e7445c27f7360b3190e update patch metadata
7c7578cc66b26e803969049de50119982e379316 thunderbolt: dma_test: Update MODULE_DESCRIPTION (jsc#PED-6061).
036b91f3046d0112cd69b0f3e8163d292449cc4b thunderbolt: Add MODULE_DESCRIPTION (jsc#PED-6061).
4cd9a389739cce900f92996e5f803e58880424b6 thunderbolt: Allow specifying custom credits for DMA tunnels (jsc#PED-6061).
905721871f7052e6dd5566d7726419dafd7ff1f1 thunderbolt: Check for ring 0 in tb_tunnel_alloc_dma() (jsc#PED-6061).
898ed7a0cf2d3fc44df8c57939b737e11a963c88 USB: core: Fix oversight in SuperSpeed initialization (bsc#1213123 CVE-2023-37453).
a10e1a729ef1f964d97b27521233e89098fbe8fb USB: core: Fix race by not overwriting udev->descriptor in hub_port_init() (bsc#1213123 CVE-2023-37453).
0cbb8bf1b95a4afa4cfca31c885c9a82b6288c51 USB: core: Change usb_get_device_descriptor() API (bsc#1213123 CVE-2023-37453).
2d3dfbdbbfce8981b7e21a87c3f6b8a1a566179a USB: core: Unite old scheme and new scheme descriptor reads (bsc#1213123 CVE-2023-37453).

So mainly only USB and Thunderbolt changes between those commits.

And, I believe that the misleading thing was that it looks as if a mouse.
But I believe it must be rather the device "BHYVE HID Tablet" that appears for the working case and disappears for the broken case.

Check the both 6.4.* kernels you tested above; the working case should have BHYVE HID tablet while the broken one shouldn't.

If my guess is right, it explains why the commits above may break.  It's a (virtual) USB input device, after all.
Comment 63 Takashi Iwai 2024-03-01 19:18:34 UTC
Also, Roger, could you give lsusb -v output?
Comment 64 Roger Whittaker 2024-03-01 21:52:51 UTC
Yes:

$ grep "BHYVE HID" dmesg.6.4.14-150600.12.g7e8d545-default 
[    8.749490] input: BHYVE HID Tablet as /devices/pci0000:00/0000:00:1e.0/usb2/2-1/2-1:1.0/0003:FB5D:0001.0001/input/input3
[    8.749841] hid-generic 0003:FB5D:0001.0001: input,hidraw0: USB HID v10.01 Mouse [BHYVE HID Tablet] on usb-0000:00:1e.0-1/input0

$ grep "BHYVE HID" dmesg.6.4.14-150600.13.g1247cee-default
[no output]
Comment 65 Roger Whittaker 2024-03-01 21:54:05 UTC
Created attachment 873178 [details]
dmesg.6.4.14-150600.12.g7e8d545-default
Comment 66 Roger Whittaker 2024-03-01 21:54:24 UTC
Created attachment 873179 [details]
dmesg.6.4.14-150600.13.g1247cee-default
Comment 67 Roger Whittaker 2024-03-01 21:54:54 UTC
Created attachment 873180 [details]
lsusb-v.6.4.14-150600.12.g7e8d545-default
Comment 68 Roger Whittaker 2024-03-01 21:55:16 UTC
Created attachment 873181 [details]
lsusb-v.6.4.14-150600.13.g1247cee-default
Comment 69 Takashi Iwai 2024-03-02 17:26:18 UTC
Thanks.

Through a quick glance, the problem seems to be the device setting 8 to bMaxPacketSize0 while it's in super speed.  For super speed, it should be a logarithmic value and that doesn't match with the endpoint.

The patch patches.suse/USB-core-Fix-oversight-in-SuperSpeed-initialization.patch (the upstream commit 59cf445754566984fd55af19ba7146c76e6627bc) introduced a more strict check for the ep0 maxpacket size.

Tossing to Oliver, as this is a USB core issue.
Comment 70 Takashi Iwai 2024-03-02 20:33:53 UTC
I'm building a test kernel with a potential workaround patch.
It's being built in OBS home:tiwai:bsc1220569-2 repo.

Could you give it a try later, and attach the dmesg output?
Comment 71 Takashi Iwai 2024-03-02 20:34:12 UTC
Created attachment 873185 [details]
Test patch
Comment 72 Roger Whittaker 2024-03-02 21:23:52 UTC
6.4.0-150600.1.g3905d67-default from https://download.opensuse.org/repositories/home:/tiwai:/bsc1220569-2/pool/

Mouse pointer does not move.
Comment 73 Roger Whittaker 2024-03-02 21:25:48 UTC
Created attachment 873186 [details]
dmesg.6.4.0-150600.1.g3905d67-default
Comment 74 Takashi Iwai 2024-03-03 08:59:00 UTC
Ah I misunderstood the behavior.  It's still the initial value 512 that didn't match with the descriptor value 8 (i.e. 256).

I'm binding another test kernel in OBS home:tiwai:bsc1220569-3 repo.
Could you retry later?
Comment 75 Takashi Iwai 2024-03-03 08:59:41 UTC
Created attachment 873187 [details]
Revised test patch
Comment 76 Takashi Iwai 2024-03-03 09:33:27 UTC
Created attachment 873188 [details]
Revised test patch
Comment 77 Roger Whittaker 2024-03-03 10:40:03 UTC
6.4.0-150600.2.g8e5d5a9-default from https://download.opensuse.org/repositories/home:/tiwai:/bsc1220569-3/pool/

Mouse pointer moves.
Comment 78 Roger Whittaker 2024-03-03 10:43:50 UTC
Created attachment 873189 [details]
dmesg.6.4.0-150600.2.g8e5d5a9-default
Comment 79 Roger Whittaker 2024-03-03 10:45:03 UTC
Created attachment 873190 [details]
lsusb-v.6.4.0-150600.2.g8e5d5a9-default
Comment 80 Roger Whittaker 2024-03-07 09:23:42 UTC
It looks like this is solved - thanks very much - is the fix final and will it go into future kernels?
Comment 81 Takashi Iwai 2024-03-07 09:32:42 UTC
(In reply to Roger Whittaker from comment #80)
> It looks like this is solved - thanks very much - is the fix final and will
> it go into future kernels?

Err, no, it's not fixed yet at all.  The kernel I provided only for a test patch, and maybe it's not correct.

Oliver, could you move this issue to the USB upstream?  It's a recent upstream regression, after all.  (see comment 62 and comment 69, the USB core change caused it.)
Comment 82 Takashi Iwai 2024-03-25 09:30:32 UTC
Oliver?  This is an upstream USB core regression.
Comment 83 Roger Whittaker 2024-04-09 10:59:40 UTC
Just for the record, I tested SLES 15 SP6 RC1 to see whether the remote administration over web using noVNC would work:

"Allow Remote Administration With Session Management"

"Enable access using a web browser"

In the remote web session on port 5801 the mouse pointed *does* move correctly.

6.4.0-150600.10-default
Comment 84 Takashi Iwai 2024-04-24 08:54:08 UTC
We're still waiting for the proper upstream fix:
  https://lore.kernel.org/r/9efbd569-7059-4575-983f-0ea30df41871@suse.com

I'm building a newer test kernel with Alan's latest patch in OBS home:tiwai:bsc1220569-4 repo.  Could you try it later and confirm whether it still works or not?
Comment 85 Roger Whittaker 2024-04-24 15:48:00 UTC
Successful test.

I installed SLES 15 SP6 RC1.  During and after the install the mouse pointer did not move.

After installing and rebooting into your

kernel-default-6.4.0-150600.1.1.gb538367.x86_64.rpm

the mouse pointer does move.
Comment 86 Takashi Iwai 2024-04-30 07:38:11 UTC
(In reply to Roger Whittaker from comment #85)
> Successful test.
> 
> I installed SLES 15 SP6 RC1.  During and after the install the mouse pointer
> did not move.
> 
> After installing and rebooting into your
> 
> kernel-default-6.4.0-150600.1.1.gb538367.x86_64.rpm
> 
> the mouse pointer does move.

Good to hear!  Now we are slowly moving forward for the upstream resolution.
Are you OK with the following entries to be included in the upstream patch?
  Reported-and-tested-by: Roger Whittaker <roger.whittaker@suse.com>
  Link: https://bugzilla.suse.com/show_bug.cgi?id=1220569
Comment 87 Roger Whittaker 2024-04-30 07:59:34 UTC
Thank you.  That would be fine.
Comment 88 Takashi Iwai 2024-04-30 14:41:50 UTC
The upstream fix patch was submitted:
  https://lore.kernel.org/r/4058ac05-237c-4db4-9ecc-5af42bdb4501@rowland.harvard.edu

Now I backported the fix to SLE15-SP6 and stable branches.
Comment 95 Maintenance Automation 2024-05-14 16:31:55 UTC
SUSE-SU-2024:1644-1: An update that solves 190 vulnerabilities, contains one feature and has 41 security fixes can now be installed.

Category: security (important)
Bug References: 1141539, 1190576, 1192145, 1192837, 1193629, 1196869, 1200313, 1201308, 1201489, 1203906, 1203935, 1204614, 1207361, 1211592, 1213573, 1217339, 1217408, 1218562, 1218917, 1219104, 1219126, 1219141, 1219169, 1219170, 1219264, 1220342, 1220569, 1220761, 1221042, 1221044, 1221080, 1221084, 1221088, 1221299, 1221612, 1221617, 1221645, 1221825, 1222294, 1222307, 1222357, 1222368, 1222379, 1222385, 1222424, 1222430, 1222435, 1222482, 1222559, 1222585, 1222613, 1222615, 1222618, 1222624, 1222666, 1222669, 1222671, 1222703, 1222704, 1222709, 1222710, 1222721, 1222726, 1222773, 1222776, 1222785, 1222787, 1222790, 1222791, 1222792, 1222793, 1222796, 1222812, 1222824, 1222829, 1222832, 1222836, 1222838, 1222866, 1222867, 1222869, 1222870, 1222876, 1222878, 1222879, 1222881, 1222883, 1222888, 1222894, 1222901, 1222968, 1222976, 1223012, 1223014, 1223016, 1223024, 1223033, 1223034, 1223035, 1223036, 1223037, 1223041, 1223042, 1223051, 1223052, 1223056, 1223057, 1223058, 1223060, 1223061, 1223065, 1223066, 1223076, 1223078, 1223111, 1223115, 1223118, 1223119, 1223140, 1223187, 1223189, 1223190, 1223191, 1223196, 1223197, 1223198, 1223207, 1223275, 1223323, 1223360, 1223369, 1223380, 1223432, 1223473, 1223474, 1223475, 1223477, 1223478, 1223479, 1223481, 1223482, 1223484, 1223487, 1223490, 1223496, 1223498, 1223499, 1223501, 1223502, 1223503, 1223505, 1223509, 1223511, 1223512, 1223513, 1223516, 1223517, 1223518, 1223519, 1223520, 1223522, 1223523, 1223525, 1223536, 1223539, 1223574, 1223595, 1223598, 1223628, 1223634, 1223640, 1223643, 1223644, 1223645, 1223646, 1223648, 1223655, 1223657, 1223660, 1223661, 1223663, 1223664, 1223668, 1223670, 1223679, 1223686, 1223693, 1223705, 1223714, 1223735, 1223738, 1223745, 1223784, 1223785, 1223790, 1223816, 1223821, 1223822, 1223823, 1223824, 1223827, 1223834, 1223858, 1223875, 1223876, 1223877, 1223878, 1223879, 1223894, 1223921, 1223922, 1223923, 1223924, 1223929, 1223931, 1223932, 1223934, 1223941, 1223948, 1223949, 1223950, 1223951, 1223952, 1223953, 1223956, 1223957, 1223960, 1223962, 1223963, 1223964, 1223996
CVE References: CVE-2021-47047, CVE-2021-47184, CVE-2021-47185, CVE-2021-47187, CVE-2021-47188, CVE-2021-47191, CVE-2021-47192, CVE-2021-47193, CVE-2021-47194, CVE-2021-47195, CVE-2021-47196, CVE-2021-47197, CVE-2021-47198, CVE-2021-47199, CVE-2021-47200, CVE-2021-47201, CVE-2021-47202, CVE-2021-47203, CVE-2021-47204, CVE-2021-47205, CVE-2021-47206, CVE-2021-47207, CVE-2021-47209, CVE-2021-47210, CVE-2021-47211, CVE-2021-47212, CVE-2021-47214, CVE-2021-47215, CVE-2021-47216, CVE-2021-47217, CVE-2021-47218, CVE-2021-47219, CVE-2022-48631, CVE-2022-48632, CVE-2022-48634, CVE-2022-48636, CVE-2022-48637, CVE-2022-48638, CVE-2022-48639, CVE-2022-48640, CVE-2022-48642, CVE-2022-48644, CVE-2022-48646, CVE-2022-48647, CVE-2022-48648, CVE-2022-48650, CVE-2022-48651, CVE-2022-48652, CVE-2022-48653, CVE-2022-48654, CVE-2022-48655, CVE-2022-48656, CVE-2022-48657, CVE-2022-48658, CVE-2022-48659, CVE-2022-48660, CVE-2022-48662, CVE-2022-48663, CVE-2022-48667, CVE-2022-48668, CVE-2022-48671, CVE-2022-48672, CVE-2022-48673, CVE-2022-48675, CVE-2022-48686, CVE-2022-48687, CVE-2022-48688, CVE-2022-48690, CVE-2022-48692, CVE-2022-48693, CVE-2022-48694, CVE-2022-48695, CVE-2022-48697, CVE-2022-48698, CVE-2022-48699, CVE-2022-48700, CVE-2022-48701, CVE-2022-48702, CVE-2022-48703, CVE-2022-48704, CVE-2023-2860, CVE-2023-52585, CVE-2023-52589, CVE-2023-52590, CVE-2023-52591, CVE-2023-52593, CVE-2023-52614, CVE-2023-52616, CVE-2023-52620, CVE-2023-52635, CVE-2023-52645, CVE-2023-52646, CVE-2023-52652, CVE-2023-6270, CVE-2024-0639, CVE-2024-0841, CVE-2024-2201, CVE-2024-22099, CVE-2024-23307, CVE-2024-23848, CVE-2024-23850, CVE-2024-26601, CVE-2024-26610, CVE-2024-26656, CVE-2024-26671, CVE-2024-26673, CVE-2024-26675, CVE-2024-26679, CVE-2024-26687, CVE-2024-26688, CVE-2024-26700, CVE-2024-26702, CVE-2024-26733, CVE-2024-26739, CVE-2024-26764, CVE-2024-26766, CVE-2024-26772, CVE-2024-26773, CVE-2024-26783, CVE-2024-26791, CVE-2024-26792, CVE-2024-26816, CVE-2024-26817, CVE-2024-26820, CVE-2024-26825, CVE-2024-26830, CVE-2024-26833, CVE-2024-26836, CVE-2024-26840, CVE-2024-26843, CVE-2024-26852, CVE-2024-26853, CVE-2024-26855, CVE-2024-26856, CVE-2024-26857, CVE-2024-26861, CVE-2024-26862, CVE-2024-26866, CVE-2024-26872, CVE-2024-26875, CVE-2024-26876, CVE-2024-26877, CVE-2024-26878, CVE-2024-26879, CVE-2024-26881, CVE-2024-26882, CVE-2024-26883, CVE-2024-26884, CVE-2024-26885, CVE-2024-26891, CVE-2024-26893, CVE-2024-26895, CVE-2024-26896, CVE-2024-26897, CVE-2024-26898, CVE-2024-26901, CVE-2024-26903, CVE-2024-26915, CVE-2024-26917, CVE-2024-26927, CVE-2024-26933, CVE-2024-26939, CVE-2024-26948, CVE-2024-26950, CVE-2024-26951, CVE-2024-26955, CVE-2024-26956, CVE-2024-26960, CVE-2024-26965, CVE-2024-26966, CVE-2024-26969, CVE-2024-26970, CVE-2024-26972, CVE-2024-26979, CVE-2024-26981, CVE-2024-26982, CVE-2024-26993, CVE-2024-27013, CVE-2024-27014, CVE-2024-27030, CVE-2024-27038, CVE-2024-27039, CVE-2024-27041, CVE-2024-27042, CVE-2024-27043, CVE-2024-27046, CVE-2024-27056, CVE-2024-27059, CVE-2024-27062, CVE-2024-27389
Jira References: PED-7167
Maintenance Incident: [SUSE:Maintenance:33802](https://smelt.suse.de/incident/33802/)
Sources used:
openSUSE Leap 15.5 (src):
 kernel-source-azure-5.14.21-150500.33.51.1, kernel-syms-azure-5.14.21-150500.33.51.1
Public Cloud Module 15-SP5 (src):
 kernel-source-azure-5.14.21-150500.33.51.1, kernel-syms-azure-5.14.21-150500.33.51.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 96 Maintenance Automation 2024-05-15 12:30:10 UTC
SUSE-SU-2024:1659-1: An update that solves 218 vulnerabilities, contains two features and has 29 security fixes can now be installed.

Category: security (important)
Bug References: 1177529, 1192145, 1211592, 1217408, 1218562, 1218917, 1219104, 1219126, 1219169, 1219170, 1219264, 1220342, 1220569, 1220761, 1220901, 1220915, 1220935, 1221042, 1221044, 1221080, 1221084, 1221088, 1221162, 1221299, 1221612, 1221617, 1221645, 1221791, 1221825, 1222011, 1222051, 1222247, 1222266, 1222294, 1222307, 1222357, 1222368, 1222379, 1222416, 1222422, 1222424, 1222427, 1222428, 1222430, 1222431, 1222435, 1222437, 1222445, 1222449, 1222482, 1222503, 1222520, 1222536, 1222549, 1222550, 1222557, 1222559, 1222585, 1222586, 1222596, 1222609, 1222610, 1222613, 1222615, 1222618, 1222624, 1222630, 1222632, 1222660, 1222662, 1222664, 1222666, 1222669, 1222671, 1222677, 1222678, 1222680, 1222703, 1222704, 1222706, 1222709, 1222710, 1222720, 1222721, 1222724, 1222726, 1222727, 1222764, 1222772, 1222773, 1222776, 1222781, 1222784, 1222785, 1222787, 1222790, 1222791, 1222792, 1222796, 1222798, 1222801, 1222812, 1222824, 1222829, 1222832, 1222836, 1222838, 1222866, 1222867, 1222869, 1222876, 1222878, 1222879, 1222881, 1222883, 1222888, 1222894, 1222901, 1222968, 1223012, 1223014, 1223016, 1223024, 1223030, 1223033, 1223034, 1223035, 1223036, 1223037, 1223041, 1223042, 1223051, 1223052, 1223056, 1223057, 1223058, 1223060, 1223061, 1223065, 1223066, 1223067, 1223068, 1223076, 1223078, 1223111, 1223115, 1223118, 1223187, 1223189, 1223190, 1223191, 1223196, 1223197, 1223198, 1223275, 1223323, 1223369, 1223380, 1223473, 1223474, 1223475, 1223477, 1223478, 1223479, 1223481, 1223482, 1223484, 1223487, 1223490, 1223496, 1223498, 1223499, 1223501, 1223502, 1223503, 1223505, 1223509, 1223511, 1223512, 1223513, 1223516, 1223517, 1223518, 1223519, 1223520, 1223522, 1223523, 1223525, 1223539, 1223574, 1223595, 1223598, 1223634, 1223643, 1223644, 1223645, 1223646, 1223648, 1223655, 1223657, 1223660, 1223661, 1223663, 1223664, 1223668, 1223686, 1223693, 1223705, 1223714, 1223735, 1223745, 1223784, 1223785, 1223790, 1223816, 1223821, 1223822, 1223824, 1223827, 1223834, 1223875, 1223876, 1223877, 1223878, 1223879, 1223894, 1223921, 1223922, 1223923, 1223924, 1223929, 1223931, 1223932, 1223934, 1223941, 1223948, 1223949, 1223950, 1223951, 1223952, 1223953, 1223956, 1223957, 1223960, 1223962, 1223963, 1223964
CVE References: CVE-2021-47047, CVE-2021-47181, CVE-2021-47182, CVE-2021-47183, CVE-2021-47184, CVE-2021-47185, CVE-2021-47187, CVE-2021-47188, CVE-2021-47189, CVE-2021-47191, CVE-2021-47192, CVE-2021-47193, CVE-2021-47194, CVE-2021-47195, CVE-2021-47196, CVE-2021-47197, CVE-2021-47198, CVE-2021-47199, CVE-2021-47200, CVE-2021-47201, CVE-2021-47202, CVE-2021-47203, CVE-2021-47204, CVE-2021-47205, CVE-2021-47206, CVE-2021-47207, CVE-2021-47209, CVE-2021-47210, CVE-2021-47211, CVE-2021-47212, CVE-2021-47214, CVE-2021-47215, CVE-2021-47216, CVE-2021-47217, CVE-2021-47218, CVE-2021-47219, CVE-2022-48631, CVE-2022-48632, CVE-2022-48634, CVE-2022-48636, CVE-2022-48637, CVE-2022-48638, CVE-2022-48639, CVE-2022-48640, CVE-2022-48642, CVE-2022-48644, CVE-2022-48646, CVE-2022-48647, CVE-2022-48648, CVE-2022-48650, CVE-2022-48651, CVE-2022-48652, CVE-2022-48653, CVE-2022-48654, CVE-2022-48655, CVE-2022-48656, CVE-2022-48657, CVE-2022-48658, CVE-2022-48659, CVE-2022-48660, CVE-2022-48662, CVE-2022-48663, CVE-2022-48667, CVE-2022-48668, CVE-2022-48671, CVE-2022-48672, CVE-2022-48673, CVE-2022-48675, CVE-2022-48686, CVE-2022-48687, CVE-2022-48688, CVE-2022-48690, CVE-2022-48692, CVE-2022-48693, CVE-2022-48694, CVE-2022-48695, CVE-2022-48697, CVE-2022-48698, CVE-2022-48700, CVE-2022-48701, CVE-2022-48702, CVE-2022-48703, CVE-2022-48704, CVE-2023-2860, CVE-2023-52488, CVE-2023-52503, CVE-2023-52561, CVE-2023-52585, CVE-2023-52589, CVE-2023-52590, CVE-2023-52591, CVE-2023-52593, CVE-2023-52614, CVE-2023-52616, CVE-2023-52620, CVE-2023-52627, CVE-2023-52635, CVE-2023-52636, CVE-2023-52645, CVE-2023-52652, CVE-2023-6270, CVE-2024-0639, CVE-2024-0841, CVE-2024-22099, CVE-2024-23307, CVE-2024-23848, CVE-2024-23850, CVE-2024-26601, CVE-2024-26610, CVE-2024-26656, CVE-2024-26660, CVE-2024-26671, CVE-2024-26673, CVE-2024-26675, CVE-2024-26680, CVE-2024-26681, CVE-2024-26684, CVE-2024-26685, CVE-2024-26687, CVE-2024-26688, CVE-2024-26689, CVE-2024-26696, CVE-2024-26697, CVE-2024-26702, CVE-2024-26704, CVE-2024-26718, CVE-2024-26722, CVE-2024-26727, CVE-2024-26733, CVE-2024-26736, CVE-2024-26737, CVE-2024-26739, CVE-2024-26743, CVE-2024-26744, CVE-2024-26745, CVE-2024-26747, CVE-2024-26749, CVE-2024-26751, CVE-2024-26754, CVE-2024-26760, CVE-2024-26763, CVE-2024-26764, CVE-2024-26766, CVE-2024-26769, CVE-2024-26771, CVE-2024-26772, CVE-2024-26773, CVE-2024-26776, CVE-2024-26779, CVE-2024-26783, CVE-2024-26787, CVE-2024-26790, CVE-2024-26792, CVE-2024-26793, CVE-2024-26798, CVE-2024-26805, CVE-2024-26807, CVE-2024-26816, CVE-2024-26817, CVE-2024-26820, CVE-2024-26825, CVE-2024-26830, CVE-2024-26833, CVE-2024-26836, CVE-2024-26843, CVE-2024-26848, CVE-2024-26852, CVE-2024-26853, CVE-2024-26855, CVE-2024-26856, CVE-2024-26857, CVE-2024-26861, CVE-2024-26862, CVE-2024-26866, CVE-2024-26872, CVE-2024-26875, CVE-2024-26878, CVE-2024-26879, CVE-2024-26881, CVE-2024-26882, CVE-2024-26883, CVE-2024-26884, CVE-2024-26885, CVE-2024-26891, CVE-2024-26893, CVE-2024-26895, CVE-2024-26896, CVE-2024-26897, CVE-2024-26898, CVE-2024-26901, CVE-2024-26903, CVE-2024-26917, CVE-2024-26927, CVE-2024-26948, CVE-2024-26950, CVE-2024-26951, CVE-2024-26955, CVE-2024-26956, CVE-2024-26960, CVE-2024-26965, CVE-2024-26966, CVE-2024-26969, CVE-2024-26970, CVE-2024-26972, CVE-2024-26981, CVE-2024-26982, CVE-2024-26993, CVE-2024-27013, CVE-2024-27014, CVE-2024-27030, CVE-2024-27038, CVE-2024-27039, CVE-2024-27041, CVE-2024-27043, CVE-2024-27046, CVE-2024-27056, CVE-2024-27062, CVE-2024-27389
Jira References: PED-7167, PED-7619
Maintenance Incident: [SUSE:Maintenance:33750](https://smelt.suse.de/incident/33750/)
Sources used:
openSUSE Leap 15.5 (src):
 kernel-obs-build-5.14.21-150500.55.62.2, kernel-livepatch-SLE15-SP5_Update_13-1-150500.11.3.2, kernel-source-5.14.21-150500.55.62.2, kernel-obs-qa-5.14.21-150500.55.62.1, kernel-syms-5.14.21-150500.55.62.1, kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2
SUSE Linux Enterprise Micro 5.5 (src):
 kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2
Basesystem Module 15-SP5 (src):
 kernel-source-5.14.21-150500.55.62.2, kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2
Development Tools Module 15-SP5 (src):
 kernel-obs-build-5.14.21-150500.55.62.2, kernel-syms-5.14.21-150500.55.62.1, kernel-source-5.14.21-150500.55.62.2
SUSE Linux Enterprise Live Patching 15-SP5 (src):
 kernel-livepatch-SLE15-SP5_Update_13-1-150500.11.3.2

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 97 Maintenance Automation 2024-05-15 20:30:12 UTC
SUSE-SU-2024:1663-1: An update that solves 219 vulnerabilities, contains 20 features and has 45 security fixes can now be installed.

Category: security (important)
Bug References: 1141539, 1177529, 1190576, 1192145, 1192837, 1193629, 1196869, 1200313, 1201308, 1201489, 1203906, 1203935, 1204614, 1207361, 1211592, 1213573, 1217408, 1218562, 1218917, 1219104, 1219126, 1219141, 1219169, 1219170, 1219264, 1220342, 1220492, 1220569, 1220761, 1220901, 1220915, 1220935, 1221042, 1221044, 1221080, 1221084, 1221088, 1221162, 1221299, 1221612, 1221617, 1221645, 1221791, 1221825, 1222011, 1222051, 1222247, 1222266, 1222294, 1222307, 1222357, 1222368, 1222379, 1222416, 1222422, 1222424, 1222427, 1222428, 1222430, 1222431, 1222435, 1222437, 1222445, 1222449, 1222482, 1222503, 1222520, 1222536, 1222549, 1222550, 1222557, 1222559, 1222585, 1222586, 1222596, 1222609, 1222610, 1222613, 1222615, 1222618, 1222624, 1222630, 1222632, 1222660, 1222662, 1222664, 1222666, 1222669, 1222671, 1222677, 1222678, 1222680, 1222703, 1222704, 1222706, 1222709, 1222710, 1222720, 1222721, 1222724, 1222726, 1222727, 1222764, 1222772, 1222773, 1222776, 1222781, 1222784, 1222785, 1222787, 1222790, 1222791, 1222792, 1222796, 1222798, 1222801, 1222812, 1222824, 1222829, 1222832, 1222836, 1222838, 1222866, 1222867, 1222869, 1222876, 1222878, 1222879, 1222881, 1222883, 1222888, 1222894, 1222901, 1222968, 1223012, 1223014, 1223016, 1223024, 1223030, 1223033, 1223034, 1223035, 1223036, 1223037, 1223041, 1223042, 1223051, 1223052, 1223056, 1223057, 1223058, 1223060, 1223061, 1223065, 1223066, 1223067, 1223068, 1223076, 1223078, 1223111, 1223115, 1223118, 1223187, 1223189, 1223190, 1223191, 1223196, 1223197, 1223198, 1223275, 1223323, 1223369, 1223380, 1223473, 1223474, 1223475, 1223477, 1223478, 1223479, 1223481, 1223482, 1223484, 1223487, 1223490, 1223496, 1223498, 1223499, 1223501, 1223502, 1223503, 1223505, 1223509, 1223511, 1223512, 1223513, 1223516, 1223517, 1223518, 1223519, 1223520, 1223522, 1223523, 1223525, 1223536, 1223539, 1223574, 1223595, 1223598, 1223634, 1223640, 1223643, 1223644, 1223645, 1223646, 1223648, 1223655, 1223657, 1223660, 1223661, 1223663, 1223664, 1223668, 1223686, 1223693, 1223705, 1223714, 1223735, 1223745, 1223784, 1223785, 1223790, 1223816, 1223821, 1223822, 1223824, 1223827, 1223834, 1223875, 1223876, 1223877, 1223878, 1223879, 1223894, 1223921, 1223922, 1223923, 1223924, 1223929, 1223931, 1223932, 1223934, 1223941, 1223948, 1223949, 1223950, 1223951, 1223952, 1223953, 1223956, 1223957, 1223960, 1223962, 1223963, 1223964
CVE References: CVE-2021-47047, CVE-2021-47181, CVE-2021-47182, CVE-2021-47183, CVE-2021-47184, CVE-2021-47185, CVE-2021-47187, CVE-2021-47188, CVE-2021-47189, CVE-2021-47191, CVE-2021-47192, CVE-2021-47193, CVE-2021-47194, CVE-2021-47195, CVE-2021-47196, CVE-2021-47197, CVE-2021-47198, CVE-2021-47199, CVE-2021-47200, CVE-2021-47201, CVE-2021-47202, CVE-2021-47203, CVE-2021-47204, CVE-2021-47205, CVE-2021-47206, CVE-2021-47207, CVE-2021-47209, CVE-2021-47210, CVE-2021-47211, CVE-2021-47212, CVE-2021-47214, CVE-2021-47215, CVE-2021-47216, CVE-2021-47217, CVE-2021-47218, CVE-2021-47219, CVE-2022-48631, CVE-2022-48632, CVE-2022-48634, CVE-2022-48636, CVE-2022-48637, CVE-2022-48638, CVE-2022-48639, CVE-2022-48640, CVE-2022-48642, CVE-2022-48644, CVE-2022-48646, CVE-2022-48647, CVE-2022-48648, CVE-2022-48650, CVE-2022-48651, CVE-2022-48652, CVE-2022-48653, CVE-2022-48654, CVE-2022-48655, CVE-2022-48656, CVE-2022-48657, CVE-2022-48658, CVE-2022-48659, CVE-2022-48660, CVE-2022-48662, CVE-2022-48663, CVE-2022-48667, CVE-2022-48668, CVE-2022-48671, CVE-2022-48672, CVE-2022-48673, CVE-2022-48675, CVE-2022-48686, CVE-2022-48687, CVE-2022-48688, CVE-2022-48690, CVE-2022-48692, CVE-2022-48693, CVE-2022-48694, CVE-2022-48695, CVE-2022-48697, CVE-2022-48698, CVE-2022-48700, CVE-2022-48701, CVE-2022-48702, CVE-2022-48703, CVE-2022-48704, CVE-2023-2860, CVE-2023-52488, CVE-2023-52503, CVE-2023-52561, CVE-2023-52585, CVE-2023-52589, CVE-2023-52590, CVE-2023-52591, CVE-2023-52593, CVE-2023-52614, CVE-2023-52616, CVE-2023-52620, CVE-2023-52627, CVE-2023-52635, CVE-2023-52636, CVE-2023-52645, CVE-2023-52652, CVE-2023-6270, CVE-2024-0639, CVE-2024-0841, CVE-2024-22099, CVE-2024-23307, CVE-2024-23848, CVE-2024-23850, CVE-2024-26601, CVE-2024-26610, CVE-2024-26656, CVE-2024-26660, CVE-2024-26671, CVE-2024-26673, CVE-2024-26675, CVE-2024-26680, CVE-2024-26681, CVE-2024-26684, CVE-2024-26685, CVE-2024-26687, CVE-2024-26688, CVE-2024-26689, CVE-2024-26696, CVE-2024-26697, CVE-2024-26702, CVE-2024-26704, CVE-2024-26718, CVE-2024-26722, CVE-2024-26727, CVE-2024-26733, CVE-2024-26736, CVE-2024-26737, CVE-2024-26739, CVE-2024-26743, CVE-2024-26744, CVE-2024-26745, CVE-2024-26747, CVE-2024-26749, CVE-2024-26751, CVE-2024-26754, CVE-2024-26760, CVE-2024-267600, CVE-2024-26763, CVE-2024-26764, CVE-2024-26766, CVE-2024-26769, CVE-2024-26771, CVE-2024-26772, CVE-2024-26773, CVE-2024-26776, CVE-2024-26779, CVE-2024-26783, CVE-2024-26787, CVE-2024-26790, CVE-2024-26792, CVE-2024-26793, CVE-2024-26798, CVE-2024-26805, CVE-2024-26807, CVE-2024-26816, CVE-2024-26817, CVE-2024-26820, CVE-2024-26825, CVE-2024-26830, CVE-2024-26833, CVE-2024-26836, CVE-2024-26843, CVE-2024-26848, CVE-2024-26852, CVE-2024-26853, CVE-2024-26855, CVE-2024-26856, CVE-2024-26857, CVE-2024-26861, CVE-2024-26862, CVE-2024-26866, CVE-2024-26872, CVE-2024-26875, CVE-2024-26878, CVE-2024-26879, CVE-2024-26881, CVE-2024-26882, CVE-2024-26883, CVE-2024-26884, CVE-2024-26885, CVE-2024-26891, CVE-2024-26893, CVE-2024-26895, CVE-2024-26896, CVE-2024-26897, CVE-2024-26898, CVE-2024-26901, CVE-2024-26903, CVE-2024-26917, CVE-2024-26927, CVE-2024-26948, CVE-2024-26950, CVE-2024-26951, CVE-2024-26955, CVE-2024-26956, CVE-2024-26960, CVE-2024-26965, CVE-2024-26966, CVE-2024-26969, CVE-2024-26970, CVE-2024-26972, CVE-2024-26981, CVE-2024-26982, CVE-2024-26993, CVE-2024-27013, CVE-2024-27014, CVE-2024-27030, CVE-2024-27038, CVE-2024-27039, CVE-2024-27041, CVE-2024-27043, CVE-2024-27046, CVE-2024-27056, CVE-2024-27062, CVE-2024-27389
Jira References: PED-1166, PED-1168, PED-1170, PED-1218, PED-1220, PED-1222, PED-1223, PED-1225, PED-1565, PED-2849, PED-376, PED-542, PED-7167, PED-7619, SLE-18378, SLE-18383, SLE-18385, SLE-18978, SLE-19249, SLE-19253
Maintenance Incident: [SUSE:Maintenance:33809](https://smelt.suse.de/incident/33809/)
Sources used:
openSUSE Leap 15.5 (src):
 kernel-syms-rt-5.14.21-150500.13.52.1, kernel-livepatch-SLE15-SP5-RT_Update_14-1-150500.11.5.1, kernel-source-rt-5.14.21-150500.13.52.1
SUSE Linux Enterprise Micro 5.5 (src):
 kernel-source-rt-5.14.21-150500.13.52.1
SUSE Linux Enterprise Live Patching 15-SP5 (src):
 kernel-livepatch-SLE15-SP5-RT_Update_14-1-150500.11.5.1
SUSE Real Time Module 15-SP5 (src):
 kernel-syms-rt-5.14.21-150500.13.52.1, kernel-source-rt-5.14.21-150500.13.52.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 109 Maintenance Automation 2024-06-21 12:30:50 UTC
SUSE-SU-2024:2135-1: An update that solves 428 vulnerabilities, contains 15 features and has 78 security fixes can now be installed.

Category: security (important)
Bug References: 1012628, 1065729, 1181674, 1187716, 1193599, 1194869, 1207948, 1208593, 1209657, 1213573, 1214852, 1215199, 1216196, 1216358, 1216702, 1217169, 1217384, 1217408, 1217489, 1217750, 1217959, 1218205, 1218336, 1218447, 1218562, 1218779, 1218917, 1219104, 1219170, 1219596, 1219623, 1219834, 1220021, 1220045, 1220120, 1220148, 1220328, 1220342, 1220428, 1220430, 1220569, 1220587, 1220738, 1220783, 1220915, 1221044, 1221276, 1221293, 1221303, 1221375, 1221504, 1221612, 1221615, 1221635, 1221645, 1221649, 1221765, 1221777, 1221783, 1221816, 1221829, 1221830, 1221858, 1222115, 1222173, 1222264, 1222273, 1222294, 1222301, 1222303, 1222304, 1222307, 1222357, 1222366, 1222368, 1222371, 1222378, 1222379, 1222385, 1222422, 1222426, 1222428, 1222437, 1222445, 1222459, 1222464, 1222489, 1222522, 1222525, 1222527, 1222531, 1222532, 1222549, 1222550, 1222557, 1222559, 1222563, 1222585, 1222586, 1222596, 1222606, 1222608, 1222613, 1222615, 1222618, 1222622, 1222624, 1222627, 1222630, 1222635, 1222721, 1222727, 1222769, 1222771, 1222772, 1222775, 1222777, 1222780, 1222782, 1222793, 1222799, 1222801, 1222968, 1223007, 1223011, 1223015, 1223016, 1223020, 1223023, 1223024, 1223030, 1223033, 1223034, 1223035, 1223038, 1223039, 1223041, 1223045, 1223046, 1223051, 1223052, 1223058, 1223060, 1223061, 1223076, 1223077, 1223084, 1223111, 1223113, 1223138, 1223143, 1223187, 1223189, 1223190, 1223191, 1223198, 1223202, 1223285, 1223315, 1223338, 1223369, 1223380, 1223384, 1223390, 1223439, 1223462, 1223532, 1223539, 1223575, 1223590, 1223591, 1223592, 1223593, 1223625, 1223628, 1223629, 1223633, 1223634, 1223637, 1223641, 1223643, 1223649, 1223650, 1223651, 1223652, 1223653, 1223654, 1223655, 1223660, 1223661, 1223663, 1223664, 1223665, 1223666, 1223668, 1223669, 1223670, 1223671, 1223675, 1223677, 1223678, 1223686, 1223692, 1223693, 1223695, 1223696, 1223698, 1223705, 1223712, 1223718, 1223728, 1223732, 1223735, 1223739, 1223741, 1223744, 1223745, 1223747, 1223748, 1223749, 1223750, 1223752, 1223754, 1223757, 1223759, 1223761, 1223762, 1223774, 1223782, 1223787, 1223788, 1223789, 1223790, 1223802, 1223805, 1223810, 1223822, 1223827, 1223831, 1223834, 1223838, 1223869, 1223870, 1223871, 1223872, 1223874, 1223944, 1223945, 1223946, 1223991, 1224076, 1224096, 1224098, 1224099, 1224137, 1224166, 1224174, 1224177, 1224180, 1224181, 1224331, 1224348, 1224423, 1224429, 1224430, 1224432, 1224433, 1224437, 1224438, 1224442, 1224443, 1224445, 1224449, 1224477, 1224479, 1224480, 1224481, 1224482, 1224486, 1224487, 1224488, 1224491, 1224492, 1224493, 1224494, 1224495, 1224500, 1224501, 1224502, 1224504, 1224505, 1224506, 1224507, 1224508, 1224509, 1224511, 1224513, 1224517, 1224519, 1224521, 1224524, 1224525, 1224526, 1224530, 1224531, 1224534, 1224537, 1224541, 1224542, 1224543, 1224546, 1224550, 1224552, 1224553, 1224555, 1224557, 1224558, 1224559, 1224562, 1224565, 1224566, 1224567, 1224568, 1224569, 1224571, 1224573, 1224576, 1224577, 1224578, 1224579, 1224580, 1224581, 1224582, 1224585, 1224586, 1224587, 1224588, 1224592, 1224596, 1224598, 1224600, 1224601, 1224602, 1224603, 1224605, 1224607, 1224608, 1224609, 1224611, 1224613, 1224615, 1224617, 1224618, 1224620, 1224621, 1224622, 1224623, 1224624, 1224626, 1224627, 1224628, 1224629, 1224630, 1224632, 1224633, 1224634, 1224636, 1224637, 1224638, 1224639, 1224640, 1224643, 1224644, 1224645, 1224646, 1224647, 1224648, 1224649, 1224650, 1224651, 1224652, 1224653, 1224654, 1224657, 1224660, 1224663, 1224664, 1224665, 1224666, 1224667, 1224668, 1224671, 1224672, 1224674, 1224675, 1224676, 1224677, 1224678, 1224679, 1224680, 1224681, 1224682, 1224683, 1224685, 1224686, 1224687, 1224688, 1224692, 1224696, 1224697, 1224699, 1224701, 1224703, 1224704, 1224705, 1224706, 1224707, 1224709, 1224710, 1224712, 1224714, 1224716, 1224717, 1224718, 1224719, 1224720, 1224721, 1224722, 1224723, 1224725, 1224727, 1224728, 1224729, 1224730, 1224731, 1224732, 1224733, 1224736, 1224738, 1224739, 1224740, 1224741, 1224742, 1224747, 1224749, 1224763, 1224764, 1224765, 1224766, 1224790, 1224792, 1224793, 1224803, 1224804, 1224866, 1224936, 1224989, 1225007, 1225053, 1225133, 1225134, 1225136, 1225172, 1225502, 1225578, 1225579, 1225580, 1225593, 1225605, 1225607, 1225610, 1225616, 1225618, 1225640, 1225642, 1225692, 1225694, 1225695, 1225696, 1225698, 1225699, 1225704, 1225705, 1225708, 1225710, 1225712, 1225714, 1225715, 1225720, 1225722, 1225728, 1225734, 1225735, 1225736, 1225747, 1225748, 1225749, 1225750, 1225756, 1225765, 1225766, 1225769, 1225773, 1225775, 1225842, 1225945
CVE References: CVE-2023-0160, CVE-2023-47233, CVE-2023-52434, CVE-2023-52458, CVE-2023-52463, CVE-2023-52472, CVE-2023-52483, CVE-2023-52492, CVE-2023-52503, CVE-2023-52591, CVE-2023-52608, CVE-2023-52616, CVE-2023-52618, CVE-2023-52631, CVE-2023-52635, CVE-2023-52640, CVE-2023-52641, CVE-2023-52645, CVE-2023-52652, CVE-2023-52653, CVE-2023-52654, CVE-2023-52655, CVE-2023-52657, CVE-2023-52658, CVE-2023-52659, CVE-2023-52660, CVE-2023-52661, CVE-2023-52662, CVE-2023-52663, CVE-2023-52664, CVE-2023-52667, CVE-2023-52669, CVE-2023-52670, CVE-2023-52671, CVE-2023-52673, CVE-2023-52674, CVE-2023-52675, CVE-2023-52676, CVE-2023-52678, CVE-2023-52679, CVE-2023-52680, CVE-2023-52681, CVE-2023-52683, CVE-2023-52685, CVE-2023-52686, CVE-2023-52687, CVE-2023-52690, CVE-2023-52691, CVE-2023-52692, CVE-2023-52693, CVE-2023-52694, CVE-2023-52695, CVE-2023-52696, CVE-2023-52697, CVE-2023-52698, CVE-2023-52771, CVE-2023-52772, CVE-2023-52860, CVE-2023-52882, CVE-2023-6238, CVE-2023-6270, CVE-2023-6531, CVE-2023-7042, CVE-2024-0639, CVE-2024-21823, CVE-2024-22099, CVE-2024-23848, CVE-2024-24861, CVE-2024-25739, CVE-2024-26601, CVE-2024-26611, CVE-2024-26614, CVE-2024-26632, CVE-2024-26638, CVE-2024-26642, CVE-2024-26643, CVE-2024-26652, CVE-2024-26654, CVE-2024-26656, CVE-2024-26657, CVE-2024-26671, CVE-2024-26673, CVE-2024-26674, CVE-2024-26675, CVE-2024-26679, CVE-2024-26684, CVE-2024-26685, CVE-2024-26692, CVE-2024-26696, CVE-2024-26697, CVE-2024-26704, CVE-2024-26714, CVE-2024-26726, CVE-2024-26731, CVE-2024-26733, CVE-2024-26736, CVE-2024-26737, CVE-2024-26739, CVE-2024-26740, CVE-2024-26742, CVE-2024-26756, CVE-2024-26757, CVE-2024-26760, CVE-2024-267600, CVE-2024-26761, CVE-2024-26764, CVE-2024-26769, CVE-2024-26772, CVE-2024-26773, CVE-2024-26774, CVE-2024-26775, CVE-2024-26779, CVE-2024-26783, CVE-2024-26786, CVE-2024-26791, CVE-2024-26793, CVE-2024-26794, CVE-2024-26802, CVE-2024-26805, CVE-2024-26807, CVE-2024-26815, CVE-2024-26816, CVE-2024-26822, CVE-2024-26828, CVE-2024-26832, CVE-2024-26836, CVE-2024-26844, CVE-2024-26846, CVE-2024-26848, CVE-2024-26853, CVE-2024-26854, CVE-2024-26855, CVE-2024-26856, CVE-2024-26857, CVE-2024-26858, CVE-2024-26860, CVE-2024-26861, CVE-2024-26862, CVE-2024-26866, CVE-2024-26868, CVE-2024-26870, CVE-2024-26878, CVE-2024-26881, CVE-2024-26882, CVE-2024-26883, CVE-2024-26884, CVE-2024-26885, CVE-2024-26898, CVE-2024-26899, CVE-2024-26900, CVE-2024-26901, CVE-2024-26903, CVE-2024-26906, CVE-2024-26909, CVE-2024-26921, CVE-2024-26922, CVE-2024-26923, CVE-2024-26925, CVE-2024-26928, CVE-2024-26932, CVE-2024-26933, CVE-2024-26934, CVE-2024-26935, CVE-2024-26937, CVE-2024-26938, CVE-2024-26940, CVE-2024-26943, CVE-2024-26945, CVE-2024-26946, CVE-2024-26948, CVE-2024-26949, CVE-2024-26950, CVE-2024-26951, CVE-2024-26956, CVE-2024-26957, CVE-2024-26958, CVE-2024-26960, CVE-2024-26961, CVE-2024-26962, CVE-2024-26963, CVE-2024-26964, CVE-2024-26972, CVE-2024-26973, CVE-2024-26978, CVE-2024-26979, CVE-2024-26981, CVE-2024-26982, CVE-2024-26983, CVE-2024-26984, CVE-2024-26986, CVE-2024-26988, CVE-2024-26989, CVE-2024-26990, CVE-2024-26991, CVE-2024-26992, CVE-2024-26993, CVE-2024-26994, CVE-2024-26995, CVE-2024-26996, CVE-2024-26997, CVE-2024-26999, CVE-2024-27000, CVE-2024-27001, CVE-2024-27002, CVE-2024-27003, CVE-2024-27004, CVE-2024-27008, CVE-2024-27013, CVE-2024-27014, CVE-2024-27022, CVE-2024-27027, CVE-2024-27028, CVE-2024-27029, CVE-2024-27030, CVE-2024-27031, CVE-2024-27036, CVE-2024-27046, CVE-2024-27056, CVE-2024-27057, CVE-2024-27062, CVE-2024-27067, CVE-2024-27080, CVE-2024-27388, CVE-2024-27389, CVE-2024-27393, CVE-2024-27395, CVE-2024-27396, CVE-2024-27398, CVE-2024-27399, CVE-2024-27400, CVE-2024-27401, CVE-2024-27405, CVE-2024-27408, CVE-2024-27410, CVE-2024-27411, CVE-2024-27412, CVE-2024-27413, CVE-2024-27416, CVE-2024-27417, CVE-2024-27418, CVE-2024-27431, CVE-2024-27432, CVE-2024-27434, CVE-2024-27435, CVE-2024-27436, CVE-2024-35784, CVE-2024-35786, CVE-2024-35788, CVE-2024-35789, CVE-2024-35790, CVE-2024-35791, CVE-2024-35794, CVE-2024-35795, CVE-2024-35796, CVE-2024-35799, CVE-2024-35800, CVE-2024-35801, CVE-2024-35803, CVE-2024-35804, CVE-2024-35806, CVE-2024-35808, CVE-2024-35809, CVE-2024-35810, CVE-2024-35811, CVE-2024-35812, CVE-2024-35813, CVE-2024-35814, CVE-2024-35815, CVE-2024-35817, CVE-2024-35819, CVE-2024-35821, CVE-2024-35822, CVE-2024-35823, CVE-2024-35824, CVE-2024-35825, CVE-2024-35828, CVE-2024-35829, CVE-2024-35830, CVE-2024-35833, CVE-2024-35834, CVE-2024-35835, CVE-2024-35836, CVE-2024-35837, CVE-2024-35838, CVE-2024-35841, CVE-2024-35842, CVE-2024-35845, CVE-2024-35847, CVE-2024-35849, CVE-2024-35850, CVE-2024-35851, CVE-2024-35852, CVE-2024-35854, CVE-2024-35860, CVE-2024-35861, CVE-2024-35862, CVE-2024-35863, CVE-2024-35864, CVE-2024-35865, CVE-2024-35866, CVE-2024-35867, CVE-2024-35868, CVE-2024-35869, CVE-2024-35870, CVE-2024-35872, CVE-2024-35875, CVE-2024-35877, CVE-2024-35878, CVE-2024-35879, CVE-2024-35883, CVE-2024-35885, CVE-2024-35887, CVE-2024-35889, CVE-2024-35891, CVE-2024-35895, CVE-2024-35901, CVE-2024-35903, CVE-2024-35904, CVE-2024-35905, CVE-2024-35907, CVE-2024-35909, CVE-2024-35911, CVE-2024-35912, CVE-2024-35914, CVE-2024-35915, CVE-2024-35916, CVE-2024-35917, CVE-2024-35921, CVE-2024-35922, CVE-2024-35924, CVE-2024-35927, CVE-2024-35928, CVE-2024-35930, CVE-2024-35931, CVE-2024-35932, CVE-2024-35933, CVE-2024-35935, CVE-2024-35936, CVE-2024-35937, CVE-2024-35938, CVE-2024-35940, CVE-2024-35943, CVE-2024-35944, CVE-2024-35945, CVE-2024-35946, CVE-2024-35947, CVE-2024-35950, CVE-2024-35951, CVE-2024-35952, CVE-2024-35953, CVE-2024-35954, CVE-2024-35955, CVE-2024-35956, CVE-2024-35958, CVE-2024-35959, CVE-2024-35960, CVE-2024-35961, CVE-2024-35963, CVE-2024-35964, CVE-2024-35965, CVE-2024-35966, CVE-2024-35967, CVE-2024-35969, CVE-2024-35971, CVE-2024-35972, CVE-2024-35973, CVE-2024-35974, CVE-2024-35975, CVE-2024-35977, CVE-2024-35978, CVE-2024-35981, CVE-2024-35982, CVE-2024-35984, CVE-2024-35986, CVE-2024-35989, CVE-2024-35990, CVE-2024-35991, CVE-2024-35992, CVE-2024-35995, CVE-2024-35997, CVE-2024-35999, CVE-2024-36002, CVE-2024-36006, CVE-2024-36007, CVE-2024-36009, CVE-2024-36011, CVE-2024-36012, CVE-2024-36013, CVE-2024-36014, CVE-2024-36015, CVE-2024-36016, CVE-2024-36018, CVE-2024-36019, CVE-2024-36020, CVE-2024-36021, CVE-2024-36025, CVE-2024-36026, CVE-2024-36029, CVE-2024-36030, CVE-2024-36032, CVE-2024-36880, CVE-2024-36885, CVE-2024-36890, CVE-2024-36891, CVE-2024-36893, CVE-2024-36894, CVE-2024-36895, CVE-2024-36896, CVE-2024-36897, CVE-2024-36898, CVE-2024-36906, CVE-2024-36918, CVE-2024-36921, CVE-2024-36922, CVE-2024-36928, CVE-2024-36930, CVE-2024-36931, CVE-2024-36936, CVE-2024-36940, CVE-2024-36941, CVE-2024-36942, CVE-2024-36944, CVE-2024-36947, CVE-2024-36949, CVE-2024-36950, CVE-2024-36951, CVE-2024-36955, CVE-2024-36959
Jira References: PED-3184, PED-3311, PED-3535, PED-4486, PED-4593, PED-5062, PED-542, PED-5728, PED-5853, PED-6079, PED-6252, PED-7542, PED-7619, PED-8111, PED-8240
Maintenance Incident: [SUSE:Maintenance:34127](https://smelt.suse.de/incident/34127/)
Sources used:
openSUSE Leap 15.6 (src):
 kernel-syms-azure-6.4.0-150600.8.5.1, kernel-source-azure-6.4.0-150600.8.5.4
Public Cloud Module 15-SP6 (src):
 kernel-syms-azure-6.4.0-150600.8.5.1, kernel-source-azure-6.4.0-150600.8.5.4

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.