This bug was fixed in the package linux-aws - 6.11.0-1012.13

---------------
linux-aws (6.11.0-1012.13) oracular; urgency=medium

  * oracular/linux-aws: 6.11.0-1012.13 -proposed tracker (LP: #2102434)

  * wdat_wdt.ko should be pulled in by linux-image-virtual (LP: #2098554)
    - [Packaging]: wdat_wdt.ko is moved from "linux-modules-extra-*-generic" to
      "linux-modules-*-generic"

  * Backport patches to support NVIDIA GB200 (LP: #2101185)
    - iommu/arm-smmu-v3: Issue a batch of commands to the same cmdq
    - iommu/arm-smmu-v3: Pass in cmdq pointer to arm_smmu_cmdq_build_sync_cmd
    - iommu/arm-smmu-v3: Pass in cmdq pointer to arm_smmu_cmdq_init
    - iommu/arm-smmu-v3: Make symbols public for CONFIG_TEGRA241_CMDQV
    - iommu/arm-smmu-v3: Add ARM_SMMU_OPT_TEGRA241_CMDQV
    - iommu/arm-smmu-v3: Add acpi_smmu_iort_probe_model for impl
    - iommu/arm-smmu-v3: Add struct arm_smmu_impl_ops
    - iommu/arm-smmu-v3: Add in-kernel support for NVIDIA Tegra241 (Grace) CMDQV
    - [Config] updateconfigs to enable CONFIG_TEGRA241_CMDQV
    - iommu/arm-smmu-v3: Start a new batch if new command is not supported
    - iommu/tegra241-cmdqv: Limit CMDs for VCMDQs of a guest owned VINTF
    - iommu/tegra241-cmdqv: Fix -Wformat-truncation warnings in
      lvcmdq_error_header
    - iommu/tegra241-cmdqv: Fix ioremap() error handling in probe()
    - iommu/tegra241-cmdqv: Drop static at local variable
    - iommu/tegra241-cmdqv: Do not allocate vcmdq until 
dma_set_mask_and_coherent
    - iommu/tegra241-cmdqv: Staticize cmdqv_debugfs_dir
    - iommu/tegra241-cmdqv: Fix alignment failure at max_n_shift
    - iommu/tegra241-cmdqv: do not use smp_processor_id in preemptible context
    - iommu/tegra241-cmdqv: Read SMMU IDR1.CMDQS instead of hardcoding

  [ Ubuntu: 6.11.0-24.24 ]

  * oracular/linux: 6.11.0-24.24 -proposed tracker (LP: #2102476)
  * Packaging resync (LP: #1786013)
    - [Packaging] debian.master/dkms-versions -- update from kernel-versions
      (main/2025.03.17)
  * ipsec_offload in rtnetlink.sh from ubunsu_kselftests_net fails on O/J
    (LP: #2096976)
    - SAUCE: selftest: netfilter: fix null IP field in kci_test_ipsec_offload
  * Add additional PCI ids for BMG support (LP: #2098969)
    - drm/xe/bmg: Add new PCI IDs
  * wdat_wdt.ko should be pulled in by linux-image-virtual (LP: #2098554)
    - [Packaging]: wdat_wdt.ko is moved from "linux-modules-extra-*-generic" to
      "linux-modules-*-generic"
  * CVE-2025-21756
    - vsock: Keep the binding until socket destruction
    - vsock: Orphan socket after transport release
  * Oracular update: upstream stable patchset 2025-03-05 (LP: #2100983)
    - ASoC: wm8994: Add depends on MFD core
    - ASoC: samsung: Add missing selects for MFD_WM8994
    - seccomp: Stub for !CONFIG_SECCOMP
    - scsi: iscsi: Fix redundant response for ISCSI_UEVENT_GET_HOST_STATS 
request
    - of/unittest: Add test that of_address_to_resource() fails on non-
      translatable address
    - irqchip/sunxi-nmi: Add missing SKIP_WAKE flag
    - hwmon: (drivetemp) Set scsi command timeout to 10s
    - gfs2: Truncate address space when flipping GFS2_DIF_JDATA flag
    - smb: client: handle lack of EA support in smb2_query_path_info()
    - net: sched: fix ets qdisc OOB Indexing
    - Revert "HID: multitouch: Add support for lenovo Y9000P Touchpad"
    - cachestat: fix page cache statistics permission checking
    - scsi: storvsc: Ratelimit warning logs to prevent VM denial of service
    - USB: serial: quatech2: fix null-ptr-deref in qt2_process_read_urb()
    - ALSA: usb-audio: Add delay quirk for USB Audio Device
    - Input: xpad - add support for Nacon Pro Compact
    - Input: atkbd - map F23 key to support default copilot shortcut
    - Input: xpad - add unofficial Xbox 360 wireless receiver clone
    - Input: xpad - add QH Electronics VID/PID
    - Input: xpad - improve name of 8BitDo controller 2dc8:3106
    - Input: xpad - add support for Nacon Evol-X Xbox One Controller
    - Input: xpad - add support for wooting two he (arm)
    - drm/v3d: Assign job pointer to NULL before signaling the fence
    - ASoC: codecs: es8316: Fix HW rate calculation for 48Mhz MCLK
    - ASoC: cs42l43: Add codec force suspend/resume ops
    - drm/amd/display: Initialize denominator defaults to 1
    - ALSA: hda/realtek: Fix volume adjustment issue on Lenovo ThinkBook 16P 
Gen5
    - drm/connector: hdmi: Validate supported_formats matches ycbcr_420_allowed
    - ASoC: samsung: Add missing depends on I2C
    - mm: zswap: properly synchronize freeing resources during CPU hotunplug
    - mm: zswap: move allocations during CPU init outside the lock
    - libfs: Return ENOSPC when the directory offset range is exhausted
    - Revert "libfs: Add simple_offset_empty()"
    - Revert "libfs: fix infinite directory reads for offset dir"
    - libfs: Replace simple_offset end-of-directory detection
    - libfs: Use d_children list to iterate simple_offset directories
    - wifi: rtl8xxxu: add more missing rtl8192cu USB IDs
    - HID: wacom: Initialize brightness of LED trigger
    - Upstream stable to v6.6.75, v6.12.12
  * CVE-2025-21702
    - pfifo_tail_enqueue: Drop new packet when sch->limit == 0
  * CVE-2025-21703
    - netem: Update sch->q.qlen before qdisc_tree_reduce_backlog()
  * Fix line-out playback on some platforms with Cirrus Logic “Dolphin” hardware
    (LP: #2099880)
    - ALSA: hda/cirrus: Correct the full scale volume set logic
  * Enable Large Language Model (LLM) workloads using Intel NPU (LP: #2098972)
    - accel/ivpu: Increase DMA address range
  * Introduce and use sendpages_ok() instead of sendpage_ok() in nvme-tcp and
    drbd (LP: #2093871)
    - net: introduce helper sendpages_ok()
    - nvme-tcp: use sendpages_ok() instead of sendpage_ok()
    - drbd: use sendpages_ok() instead of sendpage_ok()
  * Intel Be201 Bluetooth hardware error 0x0f on Arrow Lake (LP: #2088151)
    - Bluetooth: btintel: Add DSBR support for BlazarIW, BlazarU and GaP
  * Oracular update: upstream stable patchset 2025-02-26 (LP: #2100328)
    - net: ethernet: ti: cpsw_ale: Fix cpsw_ale_get_field()
    - bpf: Fix bpf_sk_select_reuseport() memory leak
    - openvswitch: fix lockup on tx to unregistering netdev with carrier
    - pktgen: Avoid out-of-bounds access in get_imix_entries
    - gtp: Use for_each_netdev_rcu() in gtp_genl_dump_pdp().
    - gtp: Destroy device along with udp socket's netns dismantle.
    - nfp: bpf: prevent integer overflow in nfp_bpf_event_output()
    - net: xilinx: axienet: Fix IRQ coalescing packet count overflow
    - net: fec: handle page_pool_dev_alloc_pages error
    - net/mlx5: Fix RDMA TX steering prio
    - net/mlx5: Clear port select structure when fail to create
    - net/mlx5e: Fix inversion dependency warning while enabling IPsec tunnel
    - net/mlx5e: Rely on reqid in IPsec tunnel mode
    - net/mlx5e: Always start IPsec sequence number from 1
    - drm/vmwgfx: Add new keep_resv BO param
    - drm/v3d: Ensure job pointer is set to NULL after job completion
    - soc: ti: pruss: Fix pruss APIs
    - hwmon: (tmp513) Fix division of negative numbers
    - Revert "mtd: spi-nor: core: replace dummy buswidth from addr to data"
    - i2c: mux: demux-pinctrl: check initial mux selection, too
    - i2c: rcar: fix NACK handling when being a target
    - smb: client: fix double free of TCP_Server_Info::hostname
    - mac802154: check local interfaces before deleting sdata list
    - hfs: Sanity check the root record
    - fs: fix missing declaration of init_files
    - kheaders: Ignore silly-rename files
    - cachefiles: Parse the "secctx" immediately
    - scsi: ufs: core: Honor runtime/system PM levels if set by host controller
      drivers
    - selftests: tc-testing: reduce rshift value
    - ACPI: resource: acpi_dev_irq_override(): Check DMI match last
    - iomap: avoid avoid truncating 64-bit offset to 32 bits
    - poll_wait: add mb() to fix theoretical race between waitqueue_active() and
      .poll()
    - RDMA/bnxt_re: Fix to export port num to ib_query_qp
    - nvmet: propagate npwg topology
    - ALSA: hda/realtek: Add support for Ayaneo System using CS35L41 HDA
    - i2c: atr: Fix client detach
    - mptcp: be sure to send ack when mptcp-level window re-opens
    - mptcp: fix spurious wake-up on under memory pressure
    - selftests: mptcp: avoid spurious errors on disconnect
    - net: ethernet: xgbe: re-add aneg to supported features in PHY quirks
    - vsock/bpf: return early if transport is not assigned
    - vsock/virtio: discard packets if the transport changes
    - vsock/virtio: cancel close work in the destructor
    - vsock: reset socket state when de-assigning the transport
    - vsock: prevent null-ptr-deref in vsock_*[has_data|has_space]
    - nouveau/fence: handle cross device fences properly
    - filemap: avoid truncating 64-bit offset to 32 bits
    - fs/proc: fix softlockup in __read_vmcore (part 2)
    - gpio: xilinx: Convert gpio_lock to raw spinlock
    - pmdomain: imx8mp-blk-ctrl: add missing loop break condition
    - irqchip: Plug a OF node reference leak in platform_irqchip_probe()
    - irqchip/gic-v3: Handle CPU_PM_ENTER_FAILED correctly
    - irqchip/gic-v3-its: Don't enable interrupts in its_irq_set_vcpu_affinity()
    - hrtimers: Handle CPU state correctly on hotplug
    - drm/i915/fb: Relax clear color alignment to 64 bytes
    - drm/amdgpu: always sync the GFX pipe on ctx switch
    - ocfs2: fix deadlock in ocfs2_get_system_file_inode
    - nfsd: add list_head nf_gc to struct nfsd_file
    - x86/xen: fix SLS mitigation in xen_hypercall_iret()
    - efi/zboot: Limit compression options to GZIP and ZSTD
    - [Config] updateconfigs for EFI_ZBOOT
    - eth: bnxt: always recalculate features after XDP clearing, fix null-deref
    - net: ravb: Fix max TX frame size for RZ/V2M
    - ice: Fix E825 initialization
    - ice: Fix quad registers read on E825
    - ice: Fix ETH56G FC-FEC Rx offset value
    - ice: Introduce ice_get_phy_model() wrapper
    - ice: Add ice_get_ctrl_ptp() wrapper to simplify the code
    - ice: Use ice_adapter for PTP shared data instead of auxdev
    - ice: Add correct PHY lane assignment
    - cpuidle: teo: Update documentation after previous changes
    - pfcp: Destroy device along with udp socket's netns dismantle.
    - cpufreq: Move endif to the end of Kconfig file
    - net/mlx5: Fix a lockdep warning as part of the write combining test
    - net/mlx5: SF, Fix add port error handling
    - drm/tests: helpers: Fix compiler warning
    - drm/vmwgfx: Unreserve BO on error
    - reset: rzg2l-usbphy-ctrl: Assign proper of node to the allocated device
    - i2c: core: fix reference leak in i2c_register_adapter()
    - platform/x86: dell-uart-backlight: fix serdev race
    - platform/x86: lenovo-yoga-tab2-pro-1380-fastcharger: fix serdev race
    - i2c: testunit: sort case blocks
    - i2c: testunit: on errors, repeat NACK until STOP
    - hwmon: (ltc2991) Fix mixed signed/unsigned in DIV_ROUND_CLOSEST
    - fs/qnx6: Fix building with GCC 15
    - gpio: virtuser: lock up configfs that an instantiated device depends on
    - gpio: sim: lock up configfs that an instantiated device depends on
    - platform/x86/intel: power-domains: Add Clearwater Forest support
    - platform/x86: ISST: Add Clearwater Forest to support list
    - afs: Fix merge preference rule failure condition
    - sched/fair: Fix update_cfs_group() vs DELAY_DEQUEUE
    - ALSA: hda/realtek: fixup ASUS GA605W
    - ALSA: hda/realtek: fixup ASUS H7606W
    - drm/nouveau/disp: Fix missing backlight control on Macbook 5,1
    - net/ncsi: fix locking in Get MAC Address handling
    - selftests/mm: set allocated memory to non-zero content in cow test
    - drm/amd/display: Do not elevate mem_type change to full update
    - mm: clear uffd-wp PTE/PMD state on mremap()
    - tracing: gfp: Fix the GFP enum values shown for user space tracing tools
    - timers/migration: Fix another race between hotplug and idle entry/exit
    - timers/migration: Enforce group initialization visibility to tree walkers
    - drm/xe: Mark ComputeCS read mode as UC on iGPU
    - drm/xe/oa: Add missing VISACTL mux registers
    - drm/amdgpu/smu13: update powersave optimizations
    - drm/amdgpu: fix fw attestation for MP0_14_0_{2/3}
    - drm/amdgpu: disable gfxoff with the compute workload on gfx12
    - drm/amd/display: Fix PSR-SU not support but still call the
      amdgpu_dm_psr_enable
    - drm/amd/display: Disable replay and psr while VRR is enabled
    - drm/amd/display: Do not wait for PSR disable on vbl enable
    - Revert "drm/amd/display: Enable urgent latency adjustments for DCN35"
    - drm/amd/display: Validate mdoe under MST LCT=1 case as well
    - Upstream stable to v6.6.74, v6.12.11
  * CVE-2025-21700
    - net: sched: Disallow replacing of child qdisc from one parent to another
  * iBFT iSCSI out-of-bounds shift UBSAN warning (LP: #2097824)
    - iscsi_ibft: Fix UBSAN shift-out-of-bounds warning in ibft_attr_show_nic()
  * Fix dmesg warn during x11perf testing. (LP: #2097106)
    - drm/xe: Fix xe_pt_abort_unbind
  * btrfs will WARN_ON() in btrfs_remove_qgroup() unnecessarily (LP: #2091719)
    - btrfs: improve the warning and error message for btrfs_remove_qgroup()
  * CVE-2025-21701
    - net: avoid race between device unregistration and ethnl ops

 -- Philip Cox <philip....@canonical.com>  Thu, 27 Mar 2025 10:23:22
-0400

** Changed in: linux-aws (Ubuntu Oracular)
       Status: Fix Committed => Fix Released

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-21700

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-21701

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-21702

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-21703

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-21756

** Changed in: linux-aws (Ubuntu Noble)
       Status: Fix Committed => Fix Released

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-49034

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-41014

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-41932

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-41935

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-42122

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-43098

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-44955

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-45828

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-47141

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-47143

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-47794

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-47809

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-48873

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-48875

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-48876

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-48881

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-49569

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-49899

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-49906

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50051

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50167

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50215

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50216

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50218

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50220

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50221

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50222

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50223

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50224

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50225

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50226

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50230

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50231

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50232

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50234

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50235

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50236

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50237

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50238

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50239

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50240

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50242

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50243

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50244

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50245

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50246

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50247

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50248

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50249

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50250

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50251

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50252

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50255

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50256

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50257

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50258

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50259

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50261

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50262

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50263

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50265

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50267

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50268

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50269

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50270

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50271

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50272

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50273

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50274

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50275

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50276

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50278

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50279

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50280

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50282

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50283

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50284

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50285

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50286

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50287

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50288

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50289

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50290

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50291

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50292

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50294

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50295

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50296

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50297

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50298

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50299

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50300

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50301

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50302

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50303

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50304

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-52332

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53042

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53043

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53044

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53045

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53046

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53047

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53048

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53050

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53051

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53052

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53053

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53055

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53058

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53059

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53060

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53061

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53062

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53063

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53066

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53067

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53068

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53072

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53076

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53081

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53082

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53083

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53084

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53085

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53086

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53087

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53088

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53140

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53142

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53145

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53146

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53147

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53148

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53150

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53151

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53154

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53155

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53157

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53158

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53160

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53161

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53162

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53163

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53166

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53168

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53169

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53171

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53172

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53173

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53174

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53175

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53176

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53177

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53178

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53180

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53181

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53183

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53184

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53185

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53187

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53188

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53190

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53191

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53194

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53195

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53196

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53197

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53198

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53200

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53201

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53202

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53203

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53208

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53209

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53210

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53213

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53214

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53215

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53216

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53217

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53218

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53219

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53220

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53221

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53222

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53223

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53224

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53226

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53227

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53228

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53229

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53230

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53231

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53232

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53233

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53234

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53236

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53237

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53239

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56531

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56532

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56533

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56538

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56539

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56540

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56543

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56545

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56546

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56548

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56549

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56550

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56551

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56557

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56558

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56561

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56562

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56565

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56566

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56567

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56568

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56569

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56570

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56572

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56573

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56574

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56575

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56576

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56577

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56578

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56579

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56580

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56581

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56583

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56584

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56585

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56586

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56587

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56588

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56589

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56590

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56592

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56593

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56594

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56595

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56596

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56597

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56598

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56599

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56600

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56601

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56602

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56603

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56604

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56605

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56606

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56607

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56608

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56609

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56610

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56611

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56613

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56615

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56616

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56619

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56620

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56621

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56622

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56623

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56625

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56626

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56627

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56628

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56629

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56630

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56631

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56632

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56633

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56634

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56635

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56636

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56637

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56638

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56640

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56641

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56642

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56643

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56644

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56645

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56647

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56648

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56649

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56650

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56651

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56658

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56661

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56672

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56677

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56678

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56679

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56681

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56683

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56685

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56687

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56688

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56689

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56690

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56691

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56692

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56693

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56694

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56698

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56700

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56701

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56703

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56704

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56705

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56707

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56708

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56720

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56721

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56722

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56723

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56724

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56725

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56726

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56727

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56728

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56729

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56739

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56741

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56742

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56744

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56745

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56746

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56747

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56748

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56751

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56752

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56754

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56755

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56756

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56765

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56771

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56772

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56773

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56774

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56775

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56776

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56777

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56778

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56779

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56780

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56781

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56782

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56783

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56785

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56786

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-56787

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-57798

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-57838

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-57843

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-57849

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-57850

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-57872

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-57874

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-57876

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-aws in Ubuntu.
https://bugs.launchpad.net/bugs/2101185

Title:
  Backport patches to support NVIDIA GB200

Status in linux-aws package in Ubuntu:
  New
Status in linux-aws source package in Noble:
  Fix Released
Status in linux-aws source package in Oracular:
  Fix Released

Bug description:
  [Impact]
  AWS requested the following patchsets to support GB200 to be backported
  to 6.8 kernels and newer:
  #1: Update SMMUv3 to the modern iommu API (part 2b/3)
  
(https://lore.kernel.org/linux-iommu/0-v9-5cd718286059+79186-smmuv3_newapi_p2b_...@nvidia.com/)
  #2: Add Tegra241 (Grace) CMDQV Support (part 1/2)
  
(https://lore.kernel.org/linux-iommu/cover.1724970714.git.nicol...@nvidia.com/)
  #3: iommu/tegra241-cmdqv: Fix alignment failure at max_n_shift
  (https://lore.kernel.org/all/20241111030226.1940737-1-nicol...@nvidia.com/)

  [Fix]
  Oracular:
  - Patchset #1 is already included in the o:aws tree.
  - All patches from patchset #2 are clean cherry-picks. Fixes to commit
  918eb5c856f6 ("iommu/arm-smmu-v3: Add in-kernel support for NVIDIA
  Tegra241 (Grace) CMDQV"), from patchset 2, which were also clean
  cherry-picks, were added.
  - Patchset #3's only patch and one fix to it were clean cherry-picks.

  Noble:
  Backporting patchset #1 required backporting the patchsets it was built on 
top of:
    - All patches from "Update SMMUv3 to the modern iommu API (part 1/3)" 
(https://lore.kernel.org/all/0-v6-96275f25c39d+2d4-smmuv3_newapi_p1_...@nvidia.com/),
 except for "iommu/arm-smmu-v3: Hold arm_smmu_asid_lock during all of 
attach_dev", which is already in the tree. And
      * "iommu/arm-smmu-v3: Add cpu_to_le64() around STRTAB_STE_0_V", as a fix 
to "iommu/arm-smmu-v3: Make STE programming independent of the callers".
    - Parts of "Update SMMUv3 to the modern iommu API (part 2/3)" 
(https://lore.kernel.org/all/0-v6-228e7adf25eb+4155-smmuv3_newapi_p2_...@nvidia.com/).
    - All patches from "Make the SMMUv3 CD logic match the new STE design" 
(part 2a/3) 
(https://lore.kernel.org/all/0-v9-5040dc602008+177d7-smmuv3_newapi_p2_...@nvidia.com/).
 And
      * "iommu: Introduce  iommu_group_mutex_assert()", as pre-req for 
"iommu/arm-smmu-v3: Move the CD generation for SVA into a function".
      * "iommu/arm-smmu-v3: Fix access for STE.SHCFG", as pre-req for 
"iommu/arm-smmu-v3: Add unit tests for arm_smmu_write_entry".
      * "iommu/arm-smmu-v3: Avoid uninitialized asid in case of error", as a 
fix for "iommu/arm-smmu-v3: Build the whole CD in arm_smmu_make_s1_cd()".
  Other pre-reqs for patchset #1 included:
    - "iommu: Pass domain to remove_dev_pasid() op", as pre-req for 
"iommu/arm-smmu-v3: Put the SVA mmu notifier in the smmu_domain".
    - A backport of "iommu: Add ops->domain_alloc_sva()", as pre-req for 
"iommu/arm-smmu-v3: Convert to domain_alloc_sva()".

  Patchset #2 was almost all clean cherry-picks except for "iommu/arm-smmu-v3: 
Add acpi_smmu_iort_probe_model for impl". Additionally, these were needed:
    * "iommu/arm-smmu-v3: Make the kunit into a module" and "iommu/arm-smmu-v3: 
Use *-y instead of *-objs in Makefile" to clean cherry-pick "iommu/arm-smmu-v3: 
Add in-kernel support for NVIDIA Tegra241 (Grace) CMDQV".
    * "iommu/arm-smmu-v3: add missing MODULE_DESCRIPTION() macro", as a fix for 
"iommu/arm-smmu-v3: Make the kunit into a module".
    * Other `Fixes` to commit 918eb5c856f6 ("iommu/arm-smmu-v3: Add in-kernel 
support for NVIDIA Tegra241 (Grace) CMDQV"), which were clean cherry-picks.

  Patchset #3's only patch and one fix to it were clean cherry-picks.

  [Test Case]
  Compile and boot tested.
  Tested by AWS.

  [Where problems could occur]
  These patches introduce significant refactoring and features to the
  SMMUv3 driver. Additionally, support to Tegra241's CMDQ-Virtualization
  is being added.

  [Other info]
  SF #00404773

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-aws/+bug/2101185/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to     : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to