Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in Linux
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in Linux
ID: SUSE-SU-2024:1641-1
Distribution: SUSE
Plattformen: SUSE Manager Proxy 4.3, SUSE Manager Server 4.3, SUSE Manager Retail Branch Server 4.3, SUSE Linux Enterprise Micro 5.3, SUSE Linux Enterprise Real Time 15 SP4, SUSE Linux Enterprise High Performance Computing 15 SP4, SUSE Linux Enterprise Server 15 SP4, SUSE Linux Enterprise Server for SAP Applications 15 SP4, SUSE Linux Enterprise Micro for Rancher 5.3, SUSE Linux Enterprise Micro 5.4, SUSE Linux Enterprise High Availability Extension 15 SP4, SUSE Linux Enterprise Live Patching 15-SP4, SUSE Linux Enterprise Micro for Rancher 5.4, SUSE openSUSE Leap 15.4, SUSE openSUSE Leap Micro 5.4, SUSE openSUSE Leap Micro 5.3, SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4, SUSE Linux Enterprise High Performance Computing LTSS 15 SP4, SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4, SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
Datum: Di, 14. Mai 2024, 19:53
Referenzen: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47210
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48662
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52616
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47195
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47216
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47211
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48660
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27389
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26898
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26727
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47184
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47182
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52500
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26739
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47193
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47218
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52590
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26704
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26816
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48667
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0841
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7042
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47209
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47202
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48656
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26733
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6270
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48657
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47181
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47207
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47194
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47196
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48650
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26903
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52607
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26688
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48663
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7192
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52591
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27043
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26689
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47183
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26601
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47217
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47219
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47212
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48668
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47206
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47204
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48648
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47197
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47198
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26764
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48653
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48655
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47192
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23850
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47201
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4881
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47188
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48631
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48637
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23848
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26687
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26773
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26614
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47189
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47215
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47200
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26610
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25742
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48654
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47191
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47199
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47205
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47047
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48647
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26766
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26642
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26792
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47187
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48651
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22099
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23307
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48638
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47185
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0160
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52476
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47203
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52628
Applikationen: Linux

Originalnachricht

--===============4443567924265903551==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit



# Security update for the Linux Kernel

Announcement ID: SUSE-SU-2024:1641-1
Rating: important
References:

* bsc#1192145
* bsc#1209657
* bsc#1215221
* bsc#1216223
* bsc#1218336
* bsc#1218479
* bsc#1218562
* bsc#1219104
* bsc#1219126
* bsc#1219169
* bsc#1219170
* bsc#1219264
* bsc#1220342
* bsc#1220703
* bsc#1220761
* bsc#1220883
* bsc#1221044
* bsc#1221061
* bsc#1221088
* bsc#1221293
* bsc#1221299
* bsc#1221612
* bsc#1221725
* bsc#1221830
* bsc#1222117
* bsc#1222422
* bsc#1222430
* bsc#1222435
* bsc#1222482
* bsc#1222503
* bsc#1222536
* bsc#1222559
* bsc#1222585
* bsc#1222618
* bsc#1222624
* bsc#1222660
* bsc#1222662
* bsc#1222664
* bsc#1222666
* bsc#1222669
* bsc#1222671
* bsc#1222703
* bsc#1222704
* bsc#1222706
* bsc#1222709
* bsc#1222721
* bsc#1222726
* bsc#1222773
* bsc#1222776
* bsc#1222785
* bsc#1222787
* bsc#1222790
* bsc#1222791
* bsc#1222792
* bsc#1222796
* bsc#1222824
* bsc#1222829
* bsc#1222832
* bsc#1222836
* bsc#1222838
* bsc#1222866
* bsc#1222867
* bsc#1222869
* bsc#1222876
* bsc#1222878
* bsc#1222879
* bsc#1222881
* bsc#1222883
* bsc#1222888
* bsc#1222894
* bsc#1222901
* bsc#1223016
* bsc#1223187
* bsc#1223380
* bsc#1223474
* bsc#1223475
* bsc#1223477
* bsc#1223479
* bsc#1223482
* bsc#1223484
* bsc#1223487
* bsc#1223503
* bsc#1223505
* bsc#1223509
* bsc#1223513
* bsc#1223516
* bsc#1223517
* bsc#1223518
* bsc#1223519
* bsc#1223522
* bsc#1223523
* bsc#1223705
* bsc#1223824


Cross-References:

* CVE-2021-47047
* CVE-2021-47181
* CVE-2021-47182
* CVE-2021-47183
* CVE-2021-47184
* CVE-2021-47185
* CVE-2021-47187
* CVE-2021-47188
* CVE-2021-47189
* CVE-2021-47191
* CVE-2021-47192
* CVE-2021-47193
* CVE-2021-47194
* CVE-2021-47195
* CVE-2021-47196
* CVE-2021-47197
* CVE-2021-47198
* CVE-2021-47199
* CVE-2021-47200
* CVE-2021-47201
* CVE-2021-47202
* CVE-2021-47203
* CVE-2021-47204
* CVE-2021-47205
* CVE-2021-47206
* CVE-2021-47207
* CVE-2021-47209
* CVE-2021-47210
* CVE-2021-47211
* CVE-2021-47212
* CVE-2021-47215
* CVE-2021-47216
* CVE-2021-47217
* CVE-2021-47218
* CVE-2021-47219
* CVE-2022-48631
* CVE-2022-48637
* CVE-2022-48638
* CVE-2022-48647
* CVE-2022-48648
* CVE-2022-48650
* CVE-2022-48651
* CVE-2022-48653
* CVE-2022-48654
* CVE-2022-48655
* CVE-2022-48656
* CVE-2022-48657
* CVE-2022-48660
* CVE-2022-48662
* CVE-2022-48663
* CVE-2022-48667
* CVE-2022-48668
* CVE-2023-0160
* CVE-2023-4881
* CVE-2023-52476
* CVE-2023-52500
* CVE-2023-52590
* CVE-2023-52591
* CVE-2023-52607
* CVE-2023-52616
* CVE-2023-52628
* CVE-2023-6270
* CVE-2023-7042
* CVE-2023-7192
* CVE-2024-0841
* CVE-2024-22099
* CVE-2024-23307
* CVE-2024-23848
* CVE-2024-23850
* CVE-2024-25742
* CVE-2024-26601
* CVE-2024-26610
* CVE-2024-26614
* CVE-2024-26642
* CVE-2024-26687
* CVE-2024-26688
* CVE-2024-26689
* CVE-2024-26704
* CVE-2024-26727
* CVE-2024-26733
* CVE-2024-26739
* CVE-2024-26764
* CVE-2024-26766
* CVE-2024-26773
* CVE-2024-26792
* CVE-2024-26816
* CVE-2024-26898
* CVE-2024-26903
* CVE-2024-27043
* CVE-2024-27389


CVSS scores:

* CVE-2021-47181 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47182 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47183 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47184 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47185 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47187 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47188 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47189 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47191 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47193 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47193 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47194 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47194 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47195 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47195 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47196 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47197 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47198 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47198 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47199 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47200 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47201 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47202 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47203 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47204 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47205 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47206 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47207 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47209 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47210 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47211 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47212 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47215 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47216 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2021-47217 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47218 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47219 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2022-48631 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48637 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48638 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48647 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48648 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48650 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48651 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48653 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-48654 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2022-48655 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2022-48655 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48656 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-48657 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-48660 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-48660 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48662 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48662 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48663 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48667 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
* CVE-2022-48668 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
* CVE-2023-0160 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-0160 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-4881 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L
* CVE-2023-4881 ( NVD ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2023-52476 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52500 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2023-52590 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
* CVE-2023-52591 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2023-52607 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52616 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52628 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-6270 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-6270 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-7042 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-7042 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-7192 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-7192 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-0841 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-0841 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-22099 ( SUSE ): 5.3 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-22099 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-23307 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-23307 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-23848 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2024-23848 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-23850 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-23850 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-25742 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26601 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26601 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26610 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-26614 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26642 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26687 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26688 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26689 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26704 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26727 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26733 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26739 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26764 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-26766 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26773 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26792 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26816 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-26898 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26898 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26903 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26903 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27043 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-27389 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H


Affected Products:

* openSUSE Leap 15.4
* openSUSE Leap Micro 5.3
* openSUSE Leap Micro 5.4
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise High Availability Extension 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Live Patching 15-SP4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3



An update that solves 90 vulnerabilities and has three security fixes can now
be
installed.

## Description:

The SUSE Linux Enterprise 15 SP4 LTSS kernel was updated to receive various
security bugfixes.

The following security bugs were fixed:

* CVE-2024-27389: Fixed pstore inode handling with d_invalidate()
(bsc#1223705).
* CVE-2024-27043: Fixed a use-after-free in edia/dvbdev in different places
(bsc#1223824).
* CVE-2024-26816: Ignore relocations in .notes section when building with
CONFIG_XEN_PV=y (bsc#1222624).
* CVE-2024-26773: Fixed ext4 block allocation from corrupted group in
ext4_mb_try_best_found() (bsc#1222618).
* CVE-2024-26766: Fixed SDMA off-by-one error in _pad_sdma_tx_descs()
(bsc#1222726).
* CVE-2024-26764: Fixed IOCB_AIO_RW check in fs/aio before the struct
aio_kiocb conversion (bsc#1222721).
* CVE-2024-26733: Fixed an overflow in arp_req_get() in arp (bsc#1222585).
* CVE-2024-26727: Fixed assertion if a newly created btrfs subvolume already
gets read (bsc#1222536).
* CVE-2024-26704: Fixed a double-free of blocks due to wrong extents
moved_len
in ext4 (bsc#1222422).
* CVE-2024-26689: Fixed a use-after-free in encode_cap_msg() (bsc#1222503).
* CVE-2024-26687: Fixed xen/events close evtchn after mapping cleanup
(bsc#1222435).
* CVE-2024-26642: Fixed the set of anonymous timeout flag in netfilter
nf_tables (bsc#1221830).
* CVE-2024-26614: Fixed the initialization of accept_queue's spinlocks
(bsc#1221293).
* CVE-2024-26610: Fixed memory corruption in wifi/iwlwifi (bsc#1221299).
* CVE-2024-26601: Fixed ext4 buddy bitmap corruption via fast commit replay
(bsc#1220342).
* CVE-2024-25742: Fixed insufficient validation during #VC instruction
emulation in x86/sev (bsc#1221725).
* CVE-2024-23850: Fixed double free of anonymous device after snapshot
creation failure (bsc#1219126).
* CVE-2024-23307: Fixed Integer Overflow or Wraparound vulnerability in x86
and ARM md, raid, raid5 modules (bsc#1219169).
* CVE-2024-22099: Fixed a null-pointer-dereference in rfcomm_check_security
(bsc#1219170).
* CVE-2024-0841: Fixed a null pointer dereference in the hugetlbfs_fill_super
function in hugetlbfs (HugeTLB pages) functionality (bsc#1219264).
* CVE-2023-7192: Fixed a memory leak problem in ctnetlink_create_conntrack in
net/netfilter/nf_conntrack_netlink.c (bsc#1218479).
* CVE-2023-7042: Fixed a null-pointer-dereference in
ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev() (bsc#1218336).
* CVE-2023-6270: Fixed a use-after-free issue in aoecmd_cfg_pkts
(bsc#1218562).
* CVE-2023-52628: Fixed 4-byte stack OOB write in nftables (bsc#1222117).
* CVE-2023-52616: Fixed unexpected pointer access in crypto/lib/mpi in
mpi_ec_init (bsc#1221612).
* CVE-2023-52607: Fixed NULL pointer dereference in pgtable_cache_add
kasprintf() (bsc#1221061).
* CVE-2023-52591: Fixed a possible reiserfs filesystem corruption via
directory renaming (bsc#1221044).
* CVE-2023-52590: Fixed a possible ocfs2 filesystem corruption via directory
renaming (bsc#1221088).
* CVE-2023-52500: Fixed information leaking when processing
OPC_INB_SET_CONTROLLER_CONFIG command (bsc#1220883).
* CVE-2023-52476: Fixed possible unhandled page fault via perf sampling NMI
during vsyscall (bsc#1220703).
* CVE-2023-4881: Fixed a out-of-bounds write flaw in the netfilter subsystem
that could lead to potential information disclosure or a denial of service
(bsc#1215221).
* CVE-2023-0160: Fixed deadlock flaw in BPF that could allow a local user to
potentially crash the system (bsc#1209657).
* CVE-2022-48662: Fixed a general protection fault (GPF) in
i915_perf_open_ioctl (bsc#1223505).
* CVE-2022-48651: Fixed an out-of-bound bug in ipvlan caused by unset
skb->mac_header (bsc#1223513).
* CVE-2021-47202: Fixed NULL pointer dereferences in of_thermal_ functions
(bsc#1222878)
* CVE-2021-47195: Fixed use-after-free inside SPI via add_lock mutex
(bsc#1222832).
* CVE-2021-47189: Fixed denial of service due to memory ordering issues
between normal and ordered work functions in btrfs (bsc#1222706).
* CVE-2021-47185: Fixed a softlockup issue in flush_to_ldisc in tty
tty_buffer
(bsc#1222669).
* CVE-2021-47183: Fixed a null pointer dereference during link down
processing
in scsi lpfc (bsc#1192145, bsc#1222664).
* CVE-2021-47182: Fixed scsi_mode_sense() buffer length handling
(bsc#1222662).
* CVE-2021-47181: Fixed a null pointer dereference caused by calling
platform_get_resource() (bsc#1222660).

The following non-security bugs were fixed:

* Call flush_delayed_fput() from nfsd main-loop (bsc#1223380).
* ibmvfc: make 'max_sectors' a module option (bsc#1216223).
* scsi: Update max_hw_sectors on rescan (bsc#1216223).

## Special Instructions and Notes:

* Please reboot the system after installing this update.

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap Micro 5.4
zypper in -t patch openSUSE-Leap-Micro-5.4-2024-1641=1

* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-1641=1

* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-1641=1

* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-1641=1

* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-1641=1

* SUSE Linux Enterprise Live Patching 15-SP4
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2024-1641=1
Please note that this is the initial kernel livepatch without fixes itself,
this
package is later updated by separate standalone kernel livepatch updates.

* SUSE Linux Enterprise High Availability Extension 15 SP4
zypper in -t patch SUSE-SLE-Product-HA-15-SP4-2024-1641=1

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1641=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1641=1

* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1641=1

* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1641=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1641=1

* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1641=1

* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-1641=1

* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1641=1

* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-1641=1

* openSUSE Leap Micro 5.3
zypper in -t patch openSUSE-Leap-Micro-5.3-2024-1641=1

## Package List:

* openSUSE Leap Micro 5.4 (aarch64 nosrc s390x x86_64)
* kernel-default-5.14.21-150400.24.119.1
* openSUSE Leap Micro 5.4 (aarch64 x86_64)
* kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1
* openSUSE Leap Micro 5.4 (aarch64 s390x x86_64)
* kernel-default-debugsource-5.14.21-150400.24.119.1
* kernel-default-debuginfo-5.14.21-150400.24.119.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 nosrc s390x x86_64)
* kernel-default-5.14.21-150400.24.119.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 x86_64)
* kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* kernel-default-debugsource-5.14.21-150400.24.119.1
* kernel-default-debuginfo-5.14.21-150400.24.119.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 nosrc s390x x86_64)
* kernel-default-5.14.21-150400.24.119.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 x86_64)
* kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* kernel-default-debugsource-5.14.21-150400.24.119.1
* kernel-default-debuginfo-5.14.21-150400.24.119.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 nosrc s390x x86_64)
* kernel-default-5.14.21-150400.24.119.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 x86_64)
* kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* kernel-default-debugsource-5.14.21-150400.24.119.1
* kernel-default-debuginfo-5.14.21-150400.24.119.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 nosrc s390x x86_64)
* kernel-default-5.14.21-150400.24.119.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 x86_64)
* kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* kernel-default-debugsource-5.14.21-150400.24.119.1
* kernel-default-debuginfo-5.14.21-150400.24.119.1
* SUSE Linux Enterprise Live Patching 15-SP4 (nosrc)
* kernel-default-5.14.21-150400.24.119.1
* SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64)
* kernel-default-livepatch-devel-5.14.21-150400.24.119.1
* kernel-livepatch-SLE15-SP4_Update_26-debugsource-1-150400.9.3.1
* kernel-default-debugsource-5.14.21-150400.24.119.1
* kernel-default-debuginfo-5.14.21-150400.24.119.1
* kernel-livepatch-5_14_21-150400_24_119-default-1-150400.9.3.1
* kernel-default-livepatch-5.14.21-150400.24.119.1
* kernel-livepatch-5_14_21-150400_24_119-default-debuginfo-1-150400.9.3.1
* SUSE Linux Enterprise High Availability Extension 15 SP4 (aarch64 ppc64le
s390x x86_64)
* ocfs2-kmp-default-debuginfo-5.14.21-150400.24.119.1
* gfs2-kmp-default-5.14.21-150400.24.119.1
* cluster-md-kmp-default-debuginfo-5.14.21-150400.24.119.1
* ocfs2-kmp-default-5.14.21-150400.24.119.1
* gfs2-kmp-default-debuginfo-5.14.21-150400.24.119.1
* kernel-default-debugsource-5.14.21-150400.24.119.1
* kernel-default-debuginfo-5.14.21-150400.24.119.1
* dlm-kmp-default-debuginfo-5.14.21-150400.24.119.1
* cluster-md-kmp-default-5.14.21-150400.24.119.1
* dlm-kmp-default-5.14.21-150400.24.119.1
* SUSE Linux Enterprise High Availability Extension 15 SP4 (nosrc)
* kernel-default-5.14.21-150400.24.119.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
nosrc)
* kernel-64kb-5.14.21-150400.24.119.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64)
* kernel-64kb-devel-5.14.21-150400.24.119.1
* kernel-64kb-devel-debuginfo-5.14.21-150400.24.119.1
* kernel-64kb-debuginfo-5.14.21-150400.24.119.1
* kernel-64kb-debugsource-5.14.21-150400.24.119.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
nosrc
x86_64)
* kernel-default-5.14.21-150400.24.119.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* kernel-syms-5.14.21-150400.24.119.1
* kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1
* reiserfs-kmp-default-5.14.21-150400.24.119.1
* kernel-default-debugsource-5.14.21-150400.24.119.1
* kernel-default-debuginfo-5.14.21-150400.24.119.1
* kernel-default-devel-5.14.21-150400.24.119.1
* kernel-default-devel-debuginfo-5.14.21-150400.24.119.1
* kernel-obs-build-5.14.21-150400.24.119.1
* reiserfs-kmp-default-debuginfo-5.14.21-150400.24.119.1
* kernel-obs-build-debugsource-5.14.21-150400.24.119.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* kernel-devel-5.14.21-150400.24.119.1
* kernel-macros-5.14.21-150400.24.119.1
* kernel-source-5.14.21-150400.24.119.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch
nosrc)
* kernel-docs-5.14.21-150400.24.119.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
nosrc)
* kernel-64kb-5.14.21-150400.24.119.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64)
* kernel-64kb-devel-5.14.21-150400.24.119.1
* kernel-64kb-devel-debuginfo-5.14.21-150400.24.119.1
* kernel-64kb-debuginfo-5.14.21-150400.24.119.1
* kernel-64kb-debugsource-5.14.21-150400.24.119.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 nosrc
x86_64)
* kernel-default-5.14.21-150400.24.119.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* kernel-syms-5.14.21-150400.24.119.1
* kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1
* reiserfs-kmp-default-5.14.21-150400.24.119.1
* kernel-default-debugsource-5.14.21-150400.24.119.1
* kernel-default-debuginfo-5.14.21-150400.24.119.1
* kernel-default-devel-5.14.21-150400.24.119.1
* kernel-default-devel-debuginfo-5.14.21-150400.24.119.1
* kernel-obs-build-5.14.21-150400.24.119.1
* reiserfs-kmp-default-debuginfo-5.14.21-150400.24.119.1
* kernel-obs-build-debugsource-5.14.21-150400.24.119.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* kernel-devel-5.14.21-150400.24.119.1
* kernel-macros-5.14.21-150400.24.119.1
* kernel-source-5.14.21-150400.24.119.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch nosrc)
* kernel-docs-5.14.21-150400.24.119.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (nosrc x86_64)
* kernel-default-5.14.21-150400.24.119.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* kernel-default-extra-5.14.21-150400.24.119.1
* kernel-syms-5.14.21-150400.24.119.1
* kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1
* kernel-default-extra-debuginfo-5.14.21-150400.24.119.1
* kernel-default-debugsource-5.14.21-150400.24.119.1
* kernel-default-debuginfo-5.14.21-150400.24.119.1
* kernel-default-devel-5.14.21-150400.24.119.1
* kernel-default-devel-debuginfo-5.14.21-150400.24.119.1
* kernel-obs-build-5.14.21-150400.24.119.1
* kernel-obs-build-debugsource-5.14.21-150400.24.119.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch)
* kernel-devel-5.14.21-150400.24.119.1
* kernel-macros-5.14.21-150400.24.119.1
* kernel-source-5.14.21-150400.24.119.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch nosrc)
* kernel-docs-5.14.21-150400.24.119.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 nosrc)
* kernel-64kb-5.14.21-150400.24.119.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64)
* kernel-64kb-devel-5.14.21-150400.24.119.1
* kernel-64kb-devel-debuginfo-5.14.21-150400.24.119.1
* kernel-64kb-debuginfo-5.14.21-150400.24.119.1
* kernel-64kb-debugsource-5.14.21-150400.24.119.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64 nosrc)
* kernel-default-5.14.21-150400.24.119.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le x86_64)
* kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* kernel-default-devel-debuginfo-5.14.21-150400.24.119.1
* kernel-syms-5.14.21-150400.24.119.1
* reiserfs-kmp-default-5.14.21-150400.24.119.1
* kernel-default-debugsource-5.14.21-150400.24.119.1
* kernel-default-debuginfo-5.14.21-150400.24.119.1
* kernel-obs-build-5.14.21-150400.24.119.1
* kernel-default-devel-5.14.21-150400.24.119.1
* reiserfs-kmp-default-debuginfo-5.14.21-150400.24.119.1
* kernel-obs-build-debugsource-5.14.21-150400.24.119.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch)
* kernel-devel-5.14.21-150400.24.119.1
* kernel-macros-5.14.21-150400.24.119.1
* kernel-source-5.14.21-150400.24.119.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch nosrc)
* kernel-docs-5.14.21-150400.24.119.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (nosrc s390x)
* kernel-zfcpdump-5.14.21-150400.24.119.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (s390x)
* kernel-zfcpdump-debugsource-5.14.21-150400.24.119.1
* kernel-zfcpdump-debuginfo-5.14.21-150400.24.119.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (nosrc ppc64le
x86_64)
* kernel-default-5.14.21-150400.24.119.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* kernel-syms-5.14.21-150400.24.119.1
* kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1
* reiserfs-kmp-default-5.14.21-150400.24.119.1
* kernel-default-debugsource-5.14.21-150400.24.119.1
* kernel-default-debuginfo-5.14.21-150400.24.119.1
* kernel-default-devel-5.14.21-150400.24.119.1
* kernel-default-devel-debuginfo-5.14.21-150400.24.119.1
* kernel-obs-build-5.14.21-150400.24.119.1
* reiserfs-kmp-default-debuginfo-5.14.21-150400.24.119.1
* kernel-obs-build-debugsource-5.14.21-150400.24.119.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* kernel-devel-5.14.21-150400.24.119.1
* kernel-macros-5.14.21-150400.24.119.1
* kernel-source-5.14.21-150400.24.119.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch nosrc)
* kernel-docs-5.14.21-150400.24.119.1
* SUSE Manager Proxy 4.3 (nosrc x86_64)
* kernel-default-5.14.21-150400.24.119.1
* SUSE Manager Proxy 4.3 (x86_64)
* kernel-syms-5.14.21-150400.24.119.1
* kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1
* kernel-default-debugsource-5.14.21-150400.24.119.1
* kernel-default-debuginfo-5.14.21-150400.24.119.1
* kernel-default-devel-5.14.21-150400.24.119.1
* kernel-default-devel-debuginfo-5.14.21-150400.24.119.1
* SUSE Manager Proxy 4.3 (noarch)
* kernel-devel-5.14.21-150400.24.119.1
* kernel-macros-5.14.21-150400.24.119.1
* kernel-source-5.14.21-150400.24.119.1
* SUSE Manager Retail Branch Server 4.3 (nosrc x86_64)
* kernel-default-5.14.21-150400.24.119.1
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1
* kernel-default-debugsource-5.14.21-150400.24.119.1
* kernel-default-debuginfo-5.14.21-150400.24.119.1
* kernel-default-devel-5.14.21-150400.24.119.1
* kernel-default-devel-debuginfo-5.14.21-150400.24.119.1
* SUSE Manager Retail Branch Server 4.3 (noarch)
* kernel-devel-5.14.21-150400.24.119.1
* kernel-macros-5.14.21-150400.24.119.1
* SUSE Manager Server 4.3 (nosrc ppc64le s390x x86_64)
* kernel-default-5.14.21-150400.24.119.1
* SUSE Manager Server 4.3 (ppc64le x86_64)
* kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* kernel-syms-5.14.21-150400.24.119.1
* kernel-default-debugsource-5.14.21-150400.24.119.1
* kernel-default-debuginfo-5.14.21-150400.24.119.1
* kernel-default-devel-5.14.21-150400.24.119.1
* kernel-default-devel-debuginfo-5.14.21-150400.24.119.1
* SUSE Manager Server 4.3 (noarch)
* kernel-devel-5.14.21-150400.24.119.1
* kernel-macros-5.14.21-150400.24.119.1
* kernel-source-5.14.21-150400.24.119.1
* SUSE Manager Server 4.3 (nosrc s390x)
* kernel-zfcpdump-5.14.21-150400.24.119.1
* SUSE Manager Server 4.3 (s390x)
* kernel-zfcpdump-debugsource-5.14.21-150400.24.119.1
* kernel-zfcpdump-debuginfo-5.14.21-150400.24.119.1
* openSUSE Leap 15.4 (noarch nosrc)
* kernel-docs-5.14.21-150400.24.119.1
* openSUSE Leap 15.4 (noarch)
* kernel-devel-5.14.21-150400.24.119.1
* kernel-source-vanilla-5.14.21-150400.24.119.1
* kernel-macros-5.14.21-150400.24.119.1
* kernel-docs-html-5.14.21-150400.24.119.1
* kernel-source-5.14.21-150400.24.119.1
* openSUSE Leap 15.4 (nosrc ppc64le x86_64)
* kernel-debug-5.14.21-150400.24.119.1
* openSUSE Leap 15.4 (ppc64le x86_64)
* kernel-debug-debuginfo-5.14.21-150400.24.119.1
* kernel-debug-livepatch-devel-5.14.21-150400.24.119.1
* kernel-debug-debugsource-5.14.21-150400.24.119.1
* kernel-debug-devel-5.14.21-150400.24.119.1
* kernel-debug-devel-debuginfo-5.14.21-150400.24.119.1
* openSUSE Leap 15.4 (aarch64 ppc64le x86_64)
* kernel-kvmsmall-devel-debuginfo-5.14.21-150400.24.119.1
* kernel-kvmsmall-debugsource-5.14.21-150400.24.119.1
* kernel-kvmsmall-devel-5.14.21-150400.24.119.1
* kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1
* kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.119.1
* kernel-default-base-rebuild-5.14.21-150400.24.119.1.150400.24.56.1
* kernel-kvmsmall-debuginfo-5.14.21-150400.24.119.1
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64)
* cluster-md-kmp-default-debuginfo-5.14.21-150400.24.119.1
* kernel-default-extra-debuginfo-5.14.21-150400.24.119.1
* ocfs2-kmp-default-5.14.21-150400.24.119.1
* gfs2-kmp-default-debuginfo-5.14.21-150400.24.119.1
* kernel-default-debuginfo-5.14.21-150400.24.119.1
* dlm-kmp-default-debuginfo-5.14.21-150400.24.119.1
* kernel-default-devel-5.14.21-150400.24.119.1
* cluster-md-kmp-default-5.14.21-150400.24.119.1
* reiserfs-kmp-default-debuginfo-5.14.21-150400.24.119.1
* kernel-obs-build-debugsource-5.14.21-150400.24.119.1
* kernel-default-extra-5.14.21-150400.24.119.1
* ocfs2-kmp-default-debuginfo-5.14.21-150400.24.119.1
* kernel-obs-qa-5.14.21-150400.24.119.1
* reiserfs-kmp-default-5.14.21-150400.24.119.1
* kernel-obs-build-5.14.21-150400.24.119.1
* kernel-default-livepatch-5.14.21-150400.24.119.1
* dlm-kmp-default-5.14.21-150400.24.119.1
* kernel-default-optional-debuginfo-5.14.21-150400.24.119.1
* kernel-default-optional-5.14.21-150400.24.119.1
* kselftests-kmp-default-5.14.21-150400.24.119.1
* gfs2-kmp-default-5.14.21-150400.24.119.1
* kernel-default-devel-debuginfo-5.14.21-150400.24.119.1
* kernel-default-livepatch-devel-5.14.21-150400.24.119.1
* kselftests-kmp-default-debuginfo-5.14.21-150400.24.119.1
* kernel-syms-5.14.21-150400.24.119.1
* kernel-default-debugsource-5.14.21-150400.24.119.1
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 nosrc)
* kernel-default-5.14.21-150400.24.119.1
* openSUSE Leap 15.4 (aarch64 nosrc ppc64le x86_64)
* kernel-kvmsmall-5.14.21-150400.24.119.1
* openSUSE Leap 15.4 (ppc64le s390x x86_64)
* kernel-livepatch-SLE15-SP4_Update_26-debugsource-1-150400.9.3.1
* kernel-livepatch-5_14_21-150400_24_119-default-debuginfo-1-150400.9.3.1
* kernel-livepatch-5_14_21-150400_24_119-default-1-150400.9.3.1
* openSUSE Leap 15.4 (nosrc s390x)
* kernel-zfcpdump-5.14.21-150400.24.119.1
* openSUSE Leap 15.4 (s390x)
* kernel-zfcpdump-debugsource-5.14.21-150400.24.119.1
* kernel-zfcpdump-debuginfo-5.14.21-150400.24.119.1
* openSUSE Leap 15.4 (nosrc)
* dtb-aarch64-5.14.21-150400.24.119.1
* openSUSE Leap 15.4 (aarch64)
* dtb-nvidia-5.14.21-150400.24.119.1
* dtb-rockchip-5.14.21-150400.24.119.1
* kselftests-kmp-64kb-5.14.21-150400.24.119.1
* dtb-freescale-5.14.21-150400.24.119.1
* kselftests-kmp-64kb-debuginfo-5.14.21-150400.24.119.1
* dtb-apm-5.14.21-150400.24.119.1
* ocfs2-kmp-64kb-5.14.21-150400.24.119.1
* kernel-64kb-livepatch-devel-5.14.21-150400.24.119.1
* dtb-mediatek-5.14.21-150400.24.119.1
* dtb-amazon-5.14.21-150400.24.119.1
* kernel-64kb-devel-debuginfo-5.14.21-150400.24.119.1
* dlm-kmp-64kb-5.14.21-150400.24.119.1
* kernel-64kb-debugsource-5.14.21-150400.24.119.1
* gfs2-kmp-64kb-5.14.21-150400.24.119.1
* reiserfs-kmp-64kb-debuginfo-5.14.21-150400.24.119.1
* dtb-arm-5.14.21-150400.24.119.1
* dtb-marvell-5.14.21-150400.24.119.1
* dlm-kmp-64kb-debuginfo-5.14.21-150400.24.119.1
* gfs2-kmp-64kb-debuginfo-5.14.21-150400.24.119.1
* dtb-renesas-5.14.21-150400.24.119.1
* reiserfs-kmp-64kb-5.14.21-150400.24.119.1
* dtb-altera-5.14.21-150400.24.119.1
* dtb-lg-5.14.21-150400.24.119.1
* dtb-socionext-5.14.21-150400.24.119.1
* dtb-xilinx-5.14.21-150400.24.119.1
* cluster-md-kmp-64kb-5.14.21-150400.24.119.1
* dtb-amlogic-5.14.21-150400.24.119.1
* dtb-hisilicon-5.14.21-150400.24.119.1
* dtb-broadcom-5.14.21-150400.24.119.1
* dtb-amd-5.14.21-150400.24.119.1
* ocfs2-kmp-64kb-debuginfo-5.14.21-150400.24.119.1
* dtb-exynos-5.14.21-150400.24.119.1
* kernel-64kb-extra-debuginfo-5.14.21-150400.24.119.1
* dtb-cavium-5.14.21-150400.24.119.1
* dtb-apple-5.14.21-150400.24.119.1
* dtb-qcom-5.14.21-150400.24.119.1
* dtb-sprd-5.14.21-150400.24.119.1
* kernel-64kb-optional-debuginfo-5.14.21-150400.24.119.1
* kernel-64kb-debuginfo-5.14.21-150400.24.119.1
* kernel-64kb-optional-5.14.21-150400.24.119.1
* kernel-64kb-devel-5.14.21-150400.24.119.1
* dtb-allwinner-5.14.21-150400.24.119.1
* kernel-64kb-extra-5.14.21-150400.24.119.1
* cluster-md-kmp-64kb-debuginfo-5.14.21-150400.24.119.1
* openSUSE Leap 15.4 (aarch64 nosrc)
* kernel-64kb-5.14.21-150400.24.119.1
* openSUSE Leap Micro 5.3 (aarch64 nosrc x86_64)
* kernel-default-5.14.21-150400.24.119.1
* openSUSE Leap Micro 5.3 (aarch64 x86_64)
* kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1
* kernel-default-debugsource-5.14.21-150400.24.119.1
* kernel-default-debuginfo-5.14.21-150400.24.119.1

## References:

* https://www.suse.com/security/cve/CVE-2021-47047.html
* https://www.suse.com/security/cve/CVE-2021-47181.html
* https://www.suse.com/security/cve/CVE-2021-47182.html
* https://www.suse.com/security/cve/CVE-2021-47183.html
* https://www.suse.com/security/cve/CVE-2021-47184.html
* https://www.suse.com/security/cve/CVE-2021-47185.html
* https://www.suse.com/security/cve/CVE-2021-47187.html
* https://www.suse.com/security/cve/CVE-2021-47188.html
* https://www.suse.com/security/cve/CVE-2021-47189.html
* https://www.suse.com/security/cve/CVE-2021-47191.html
* https://www.suse.com/security/cve/CVE-2021-47192.html
* https://www.suse.com/security/cve/CVE-2021-47193.html
* https://www.suse.com/security/cve/CVE-2021-47194.html
* https://www.suse.com/security/cve/CVE-2021-47195.html
* https://www.suse.com/security/cve/CVE-2021-47196.html
* https://www.suse.com/security/cve/CVE-2021-47197.html
* https://www.suse.com/security/cve/CVE-2021-47198.html
* https://www.suse.com/security/cve/CVE-2021-47199.html
* https://www.suse.com/security/cve/CVE-2021-47200.html
* https://www.suse.com/security/cve/CVE-2021-47201.html
* https://www.suse.com/security/cve/CVE-2021-47202.html
* https://www.suse.com/security/cve/CVE-2021-47203.html
* https://www.suse.com/security/cve/CVE-2021-47204.html
* https://www.suse.com/security/cve/CVE-2021-47205.html
* https://www.suse.com/security/cve/CVE-2021-47206.html
* https://www.suse.com/security/cve/CVE-2021-47207.html
* https://www.suse.com/security/cve/CVE-2021-47209.html
* https://www.suse.com/security/cve/CVE-2021-47210.html
* https://www.suse.com/security/cve/CVE-2021-47211.html
* https://www.suse.com/security/cve/CVE-2021-47212.html
* https://www.suse.com/security/cve/CVE-2021-47215.html
* https://www.suse.com/security/cve/CVE-2021-47216.html
* https://www.suse.com/security/cve/CVE-2021-47217.html
* https://www.suse.com/security/cve/CVE-2021-47218.html
* https://www.suse.com/security/cve/CVE-2021-47219.html
* https://www.suse.com/security/cve/CVE-2022-48631.html
* https://www.suse.com/security/cve/CVE-2022-48637.html
* https://www.suse.com/security/cve/CVE-2022-48638.html
* https://www.suse.com/security/cve/CVE-2022-48647.html
* https://www.suse.com/security/cve/CVE-2022-48648.html
* https://www.suse.com/security/cve/CVE-2022-48650.html
* https://www.suse.com/security/cve/CVE-2022-48651.html
* https://www.suse.com/security/cve/CVE-2022-48653.html
* https://www.suse.com/security/cve/CVE-2022-48654.html
* https://www.suse.com/security/cve/CVE-2022-48655.html
* https://www.suse.com/security/cve/CVE-2022-48656.html
* https://www.suse.com/security/cve/CVE-2022-48657.html
* https://www.suse.com/security/cve/CVE-2022-48660.html
* https://www.suse.com/security/cve/CVE-2022-48662.html
* https://www.suse.com/security/cve/CVE-2022-48663.html
* https://www.suse.com/security/cve/CVE-2022-48667.html
* https://www.suse.com/security/cve/CVE-2022-48668.html
* https://www.suse.com/security/cve/CVE-2023-0160.html
* https://www.suse.com/security/cve/CVE-2023-4881.html
* https://www.suse.com/security/cve/CVE-2023-52476.html
* https://www.suse.com/security/cve/CVE-2023-52500.html
* https://www.suse.com/security/cve/CVE-2023-52590.html
* https://www.suse.com/security/cve/CVE-2023-52591.html
* https://www.suse.com/security/cve/CVE-2023-52607.html
* https://www.suse.com/security/cve/CVE-2023-52616.html
* https://www.suse.com/security/cve/CVE-2023-52628.html
* https://www.suse.com/security/cve/CVE-2023-6270.html
* https://www.suse.com/security/cve/CVE-2023-7042.html
* https://www.suse.com/security/cve/CVE-2023-7192.html
* https://www.suse.com/security/cve/CVE-2024-0841.html
* https://www.suse.com/security/cve/CVE-2024-22099.html
* https://www.suse.com/security/cve/CVE-2024-23307.html
* https://www.suse.com/security/cve/CVE-2024-23848.html
* https://www.suse.com/security/cve/CVE-2024-23850.html
* https://www.suse.com/security/cve/CVE-2024-25742.html
* https://www.suse.com/security/cve/CVE-2024-26601.html
* https://www.suse.com/security/cve/CVE-2024-26610.html
* https://www.suse.com/security/cve/CVE-2024-26614.html
* https://www.suse.com/security/cve/CVE-2024-26642.html
* https://www.suse.com/security/cve/CVE-2024-26687.html
* https://www.suse.com/security/cve/CVE-2024-26688.html
* https://www.suse.com/security/cve/CVE-2024-26689.html
* https://www.suse.com/security/cve/CVE-2024-26704.html
* https://www.suse.com/security/cve/CVE-2024-26727.html
* https://www.suse.com/security/cve/CVE-2024-26733.html
* https://www.suse.com/security/cve/CVE-2024-26739.html
* https://www.suse.com/security/cve/CVE-2024-26764.html
* https://www.suse.com/security/cve/CVE-2024-26766.html
* https://www.suse.com/security/cve/CVE-2024-26773.html
* https://www.suse.com/security/cve/CVE-2024-26792.html
* https://www.suse.com/security/cve/CVE-2024-26816.html
* https://www.suse.com/security/cve/CVE-2024-26898.html
* https://www.suse.com/security/cve/CVE-2024-26903.html
* https://www.suse.com/security/cve/CVE-2024-27043.html
* https://www.suse.com/security/cve/CVE-2024-27389.html
* https://bugzilla.suse.com/show_bug.cgi?id=1192145
* https://bugzilla.suse.com/show_bug.cgi?id=1209657
* https://bugzilla.suse.com/show_bug.cgi?id=1215221
* https://bugzilla.suse.com/show_bug.cgi?id=1216223
* https://bugzilla.suse.com/show_bug.cgi?id=1218336
* https://bugzilla.suse.com/show_bug.cgi?id=1218479
* https://bugzilla.suse.com/show_bug.cgi?id=1218562
* https://bugzilla.suse.com/show_bug.cgi?id=1219104
* https://bugzilla.suse.com/show_bug.cgi?id=1219126
* https://bugzilla.suse.com/show_bug.cgi?id=1219169
* https://bugzilla.suse.com/show_bug.cgi?id=1219170
* https://bugzilla.suse.com/show_bug.cgi?id=1219264
* https://bugzilla.suse.com/show_bug.cgi?id=1220342
* https://bugzilla.suse.com/show_bug.cgi?id=1220703
* https://bugzilla.suse.com/show_bug.cgi?id=1220761
* https://bugzilla.suse.com/show_bug.cgi?id=1220883
* https://bugzilla.suse.com/show_bug.cgi?id=1221044
* https://bugzilla.suse.com/show_bug.cgi?id=1221061
* https://bugzilla.suse.com/show_bug.cgi?id=1221088
* https://bugzilla.suse.com/show_bug.cgi?id=1221293
* https://bugzilla.suse.com/show_bug.cgi?id=1221299
* https://bugzilla.suse.com/show_bug.cgi?id=1221612
* https://bugzilla.suse.com/show_bug.cgi?id=1221725
* https://bugzilla.suse.com/show_bug.cgi?id=1221830
* https://bugzilla.suse.com/show_bug.cgi?id=1222117
* https://bugzilla.suse.com/show_bug.cgi?id=1222422
* https://bugzilla.suse.com/show_bug.cgi?id=1222430
* https://bugzilla.suse.com/show_bug.cgi?id=1222435
* https://bugzilla.suse.com/show_bug.cgi?id=1222482
* https://bugzilla.suse.com/show_bug.cgi?id=1222503
* https://bugzilla.suse.com/show_bug.cgi?id=1222536
* https://bugzilla.suse.com/show_bug.cgi?id=1222559
* https://bugzilla.suse.com/show_bug.cgi?id=1222585
* https://bugzilla.suse.com/show_bug.cgi?id=1222618
* https://bugzilla.suse.com/show_bug.cgi?id=1222624
* https://bugzilla.suse.com/show_bug.cgi?id=1222660
* https://bugzilla.suse.com/show_bug.cgi?id=1222662
* https://bugzilla.suse.com/show_bug.cgi?id=1222664
* https://bugzilla.suse.com/show_bug.cgi?id=1222666
* https://bugzilla.suse.com/show_bug.cgi?id=1222669
* https://bugzilla.suse.com/show_bug.cgi?id=1222671
* https://bugzilla.suse.com/show_bug.cgi?id=1222703
* https://bugzilla.suse.com/show_bug.cgi?id=1222704
* https://bugzilla.suse.com/show_bug.cgi?id=1222706
* https://bugzilla.suse.com/show_bug.cgi?id=1222709
* https://bugzilla.suse.com/show_bug.cgi?id=1222721
* https://bugzilla.suse.com/show_bug.cgi?id=1222726
* https://bugzilla.suse.com/show_bug.cgi?id=1222773
* https://bugzilla.suse.com/show_bug.cgi?id=1222776
* https://bugzilla.suse.com/show_bug.cgi?id=1222785
* https://bugzilla.suse.com/show_bug.cgi?id=1222787
* https://bugzilla.suse.com/show_bug.cgi?id=1222790
* https://bugzilla.suse.com/show_bug.cgi?id=1222791
* https://bugzilla.suse.com/show_bug.cgi?id=1222792
* https://bugzilla.suse.com/show_bug.cgi?id=1222796
* https://bugzilla.suse.com/show_bug.cgi?id=1222824
* https://bugzilla.suse.com/show_bug.cgi?id=1222829
* https://bugzilla.suse.com/show_bug.cgi?id=1222832
* https://bugzilla.suse.com/show_bug.cgi?id=1222836
* https://bugzilla.suse.com/show_bug.cgi?id=1222838
* https://bugzilla.suse.com/show_bug.cgi?id=1222866
* https://bugzilla.suse.com/show_bug.cgi?id=1222867
* https://bugzilla.suse.com/show_bug.cgi?id=1222869
* https://bugzilla.suse.com/show_bug.cgi?id=1222876
* https://bugzilla.suse.com/show_bug.cgi?id=1222878
* https://bugzilla.suse.com/show_bug.cgi?id=1222879
* https://bugzilla.suse.com/show_bug.cgi?id=1222881
* https://bugzilla.suse.com/show_bug.cgi?id=1222883
* https://bugzilla.suse.com/show_bug.cgi?id=1222888
* https://bugzilla.suse.com/show_bug.cgi?id=1222894
* https://bugzilla.suse.com/show_bug.cgi?id=1222901
* https://bugzilla.suse.com/show_bug.cgi?id=1223016
* https://bugzilla.suse.com/show_bug.cgi?id=1223187
* https://bugzilla.suse.com/show_bug.cgi?id=1223380
* https://bugzilla.suse.com/show_bug.cgi?id=1223474
* https://bugzilla.suse.com/show_bug.cgi?id=1223475
* https://bugzilla.suse.com/show_bug.cgi?id=1223477
* https://bugzilla.suse.com/show_bug.cgi?id=1223479
* https://bugzilla.suse.com/show_bug.cgi?id=1223482
* https://bugzilla.suse.com/show_bug.cgi?id=1223484
* https://bugzilla.suse.com/show_bug.cgi?id=1223487
* https://bugzilla.suse.com/show_bug.cgi?id=1223503
* https://bugzilla.suse.com/show_bug.cgi?id=1223505
* https://bugzilla.suse.com/show_bug.cgi?id=1223509
* https://bugzilla.suse.com/show_bug.cgi?id=1223513
* https://bugzilla.suse.com/show_bug.cgi?id=1223516
* https://bugzilla.suse.com/show_bug.cgi?id=1223517
* https://bugzilla.suse.com/show_bug.cgi?id=1223518
* https://bugzilla.suse.com/show_bug.cgi?id=1223519
* https://bugzilla.suse.com/show_bug.cgi?id=1223522
* https://bugzilla.suse.com/show_bug.cgi?id=1223523
* https://bugzilla.suse.com/show_bug.cgi?id=1223705
* https://bugzilla.suse.com/show_bug.cgi?id=1223824


--===============4443567924265903551==
Content-Type: text/html; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit




<div class="container">
<h1>Security update for the Linux Kernel</h1>

<table class="table table-striped table-bordered">
<tbody>
<tr>
<th>Announcement ID:</th>
<td>SUSE-SU-2024:1641-1</td>
</tr>

<tr>
<th>Rating:</th>
<td>important</td>
</tr>
<tr>
<th>References:</th>
<td>
<ul>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1192145">bsc#1192145</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1209657">bsc#1209657</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1215221">bsc#1215221</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1216223">bsc#1216223</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1218336">bsc#1218336</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1218479">bsc#1218479</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1218562">bsc#1218562</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1219104">bsc#1219104</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1219126">bsc#1219126</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1219169">bsc#1219169</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1219170">bsc#1219170</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1219264">bsc#1219264</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220342">bsc#1220342</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220703">bsc#1220703</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220761">bsc#1220761</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220883">bsc#1220883</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221044">bsc#1221044</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221061">bsc#1221061</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221088">bsc#1221088</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221293">bsc#1221293</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221299">bsc#1221299</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221612">bsc#1221612</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221725">bsc#1221725</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221830">bsc#1221830</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222117">bsc#1222117</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222422">bsc#1222422</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222430">bsc#1222430</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222435">bsc#1222435</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222482">bsc#1222482</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222503">bsc#1222503</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222536">bsc#1222536</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222559">bsc#1222559</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222585">bsc#1222585</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222618">bsc#1222618</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222624">bsc#1222624</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222660">bsc#1222660</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222662">bsc#1222662</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222664">bsc#1222664</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222666">bsc#1222666</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222669">bsc#1222669</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222671">bsc#1222671</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222703">bsc#1222703</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222704">bsc#1222704</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222706">bsc#1222706</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222709">bsc#1222709</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222721">bsc#1222721</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222726">bsc#1222726</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222773">bsc#1222773</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222776">bsc#1222776</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222785">bsc#1222785</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222787">bsc#1222787</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222790">bsc#1222790</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222791">bsc#1222791</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222792">bsc#1222792</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222796">bsc#1222796</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222824">bsc#1222824</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222829">bsc#1222829</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222832">bsc#1222832</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222836">bsc#1222836</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222838">bsc#1222838</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222866">bsc#1222866</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222867">bsc#1222867</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222869">bsc#1222869</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222876">bsc#1222876</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222878">bsc#1222878</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222879">bsc#1222879</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222881">bsc#1222881</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222883">bsc#1222883</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222888">bsc#1222888</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222894">bsc#1222894</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222901">bsc#1222901</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223016">bsc#1223016</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223187">bsc#1223187</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223380">bsc#1223380</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223474">bsc#1223474</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223475">bsc#1223475</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223477">bsc#1223477</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223479">bsc#1223479</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223482">bsc#1223482</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223484">bsc#1223484</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223487">bsc#1223487</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223503">bsc#1223503</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223505">bsc#1223505</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223509">bsc#1223509</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223513">bsc#1223513</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223516">bsc#1223516</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223517">bsc#1223517</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223518">bsc#1223518</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223519">bsc#1223519</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223522">bsc#1223522</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223523">bsc#1223523</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223705">bsc#1223705</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223824">bsc#1223824</a>
</li>


</ul>
</td>
</tr>

<tr>
<th>
Cross-References:
</th>
<td>
<ul>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47047.html">CVE-2021-47047</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47181.html">CVE-2021-47181</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47182.html">CVE-2021-47182</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47183.html">CVE-2021-47183</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47184.html">CVE-2021-47184</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47185.html">CVE-2021-47185</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47187.html">CVE-2021-47187</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47188.html">CVE-2021-47188</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47189.html">CVE-2021-47189</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47191.html">CVE-2021-47191</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47192.html">CVE-2021-47192</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47193.html">CVE-2021-47193</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47194.html">CVE-2021-47194</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47195.html">CVE-2021-47195</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47196.html">CVE-2021-47196</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47197.html">CVE-2021-47197</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47198.html">CVE-2021-47198</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47199.html">CVE-2021-47199</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47200.html">CVE-2021-47200</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47201.html">CVE-2021-47201</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47202.html">CVE-2021-47202</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47203.html">CVE-2021-47203</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47204.html">CVE-2021-47204</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47205.html">CVE-2021-47205</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47206.html">CVE-2021-47206</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47207.html">CVE-2021-47207</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47209.html">CVE-2021-47209</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47210.html">CVE-2021-47210</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47211.html">CVE-2021-47211</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47212.html">CVE-2021-47212</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47215.html">CVE-2021-47215</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47216.html">CVE-2021-47216</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47217.html">CVE-2021-47217</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47218.html">CVE-2021-47218</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47219.html">CVE-2021-47219</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48631.html">CVE-2022-48631</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48637.html">CVE-2022-48637</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48638.html">CVE-2022-48638</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48647.html">CVE-2022-48647</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48648.html">CVE-2022-48648</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48650.html">CVE-2022-48650</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48651.html">CVE-2022-48651</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48653.html">CVE-2022-48653</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48654.html">CVE-2022-48654</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48655.html">CVE-2022-48655</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48656.html">CVE-2022-48656</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48657.html">CVE-2022-48657</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48660.html">CVE-2022-48660</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48662.html">CVE-2022-48662</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48663.html">CVE-2022-48663</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48667.html">CVE-2022-48667</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48668.html">CVE-2022-48668</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-0160.html">CVE-2023-0160</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-4881.html">CVE-2023-4881</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52476.html">CVE-2023-52476</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52500.html">CVE-2023-52500</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52590.html">CVE-2023-52590</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52591.html">CVE-2023-52591</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52607.html">CVE-2023-52607</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52616.html">CVE-2023-52616</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52628.html">CVE-2023-52628</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-6270.html">CVE-2023-6270</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-7042.html">CVE-2023-7042</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-7192.html">CVE-2023-7192</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-0841.html">CVE-2024-0841</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-22099.html">CVE-2024-22099</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-23307.html">CVE-2024-23307</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-23848.html">CVE-2024-23848</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-23850.html">CVE-2024-23850</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-25742.html">CVE-2024-25742</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26601.html">CVE-2024-26601</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26610.html">CVE-2024-26610</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26614.html">CVE-2024-26614</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26642.html">CVE-2024-26642</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26687.html">CVE-2024-26687</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26688.html">CVE-2024-26688</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26689.html">CVE-2024-26689</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26704.html">CVE-2024-26704</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26727.html">CVE-2024-26727</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26733.html">CVE-2024-26733</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26739.html">CVE-2024-26739</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26764.html">CVE-2024-26764</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26766.html">CVE-2024-26766</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26773.html">CVE-2024-26773</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26792.html">CVE-2024-26792</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26816.html">CVE-2024-26816</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26898.html">CVE-2024-26898</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26903.html">CVE-2024-26903</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27043.html">CVE-2024-27043</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27389.html">CVE-2024-27389</a>
</li>

</ul>
</td>
</tr>
<tr>
<th>CVSS scores:</th>
<td>
<ul class="list-group">

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47181</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47182</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47183</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47184</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47185</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47187</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47188</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47189</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47191</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47193</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47193</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47194</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47194</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47195</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47195</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47196</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47197</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47198</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47198</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47199</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47200</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47201</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47202</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47203</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47204</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47205</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47206</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47207</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47209</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47210</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47211</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47212</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47215</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47216</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47217</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47218</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47219</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48631</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48637</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48638</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48647</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48648</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48650</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48651</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48653</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48654</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48655</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48655</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48656</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48657</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48660</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48660</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48662</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48662</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48663</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48667</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-48668</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-0160</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-0160</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-4881</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-4881</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">6.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52476</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52500</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52590</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52591</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52607</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52616</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52628</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-6270</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-6270</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-7042</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-7042</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-7192</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-7192</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-0841</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-0841</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-22099</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-22099</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-23307</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-23307</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-23848</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-23848</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-23850</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-23850</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-25742</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26601</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26601</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26610</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26614</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.9</span>
<span
class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26642</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26687</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26688</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26689</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26704</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26727</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26733</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26739</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26764</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26766</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26773</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26792</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26816</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26898</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26898</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26903</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-26903</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-27043</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-27389</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

</ul>
</td>
</tr>

<tr>
<th>Affected Products:</th>
<td>
<ul class="list-group">

<li class="list-group-item">openSUSE Leap
15.4</li>

<li class="list-group-item">openSUSE Leap
Micro 5.3</li>

<li class="list-group-item">openSUSE Leap
Micro 5.4</li>

<li class="list-group-item">SUSE Linux
Enterprise Desktop 15 SP4 LTSS 15-SP4</li>

<li class="list-group-item">SUSE Linux
Enterprise High Availability Extension 15 SP4</li>

<li class="list-group-item">SUSE Linux
Enterprise High Performance Computing 15 SP4</li>

<li class="list-group-item">SUSE Linux
Enterprise High Performance Computing ESPOS 15 SP4</li>

<li class="list-group-item">SUSE Linux
Enterprise High Performance Computing LTSS 15 SP4</li>

<li class="list-group-item">SUSE Linux
Enterprise Live Patching 15-SP4</li>

<li class="list-group-item">SUSE Linux
Enterprise Micro 5.3</li>

<li class="list-group-item">SUSE Linux
Enterprise Micro 5.4</li>

<li class="list-group-item">SUSE Linux
Enterprise Micro for Rancher 5.3</li>

<li class="list-group-item">SUSE Linux
Enterprise Micro for Rancher 5.4</li>

<li class="list-group-item">SUSE Linux
Enterprise Real Time 15 SP4</li>

<li class="list-group-item">SUSE Linux
Enterprise Server 15 SP4</li>

<li class="list-group-item">SUSE Linux
Enterprise Server 15 SP4 LTSS 15-SP4</li>

<li class="list-group-item">SUSE Linux
Enterprise Server for SAP Applications 15 SP4</li>

<li class="list-group-item">SUSE Manager
Proxy 4.3</li>

<li class="list-group-item">SUSE Manager
Retail Branch Server 4.3</li>

<li class="list-group-item">SUSE Manager
Server 4.3</li>

</ul>
</td>
</tr>
</tbody>
</table>

<p>An update that solves 90 vulnerabilities and has three security
fixes can now be installed.</p>





<h2>Description:</h2>

<p>The SUSE Linux Enterprise 15 SP4 LTSS kernel was updated to
receive various security bugfixes.</p>
<p>The following security bugs were fixed:</p>
<ul>
<li>CVE-2024-27389: Fixed pstore inode handling with d_invalidate()
(bsc#1223705).</li>
<li>CVE-2024-27043: Fixed a use-after-free in edia/dvbdev in different
places (bsc#1223824).</li>
<li>CVE-2024-26816: Ignore relocations in .notes section when building
with CONFIG_XEN_PV=y (bsc#1222624).</li>
<li>CVE-2024-26773: Fixed ext4 block allocation from corrupted group in
ext4_mb_try_best_found() (bsc#1222618). </li>
<li>CVE-2024-26766: Fixed SDMA off-by-one error in _pad_sdma_tx_descs()
(bsc#1222726).</li>
<li>CVE-2024-26764: Fixed IOCB_AIO_RW check in fs/aio before the struct
aio_kiocb conversion (bsc#1222721).</li>
<li>CVE-2024-26733: Fixed an overflow in arp_req_get() in arp
(bsc#1222585).</li>
<li>CVE-2024-26727: Fixed assertion if a newly created btrfs subvolume
already gets read (bsc#1222536).</li>
<li>CVE-2024-26704: Fixed a double-free of blocks due to wrong extents
moved_len in ext4 (bsc#1222422).</li>
<li>CVE-2024-26689: Fixed a use-after-free in encode_cap_msg()
(bsc#1222503).</li>
<li>CVE-2024-26687: Fixed xen/events close evtchn after mapping cleanup
(bsc#1222435).</li>
<li>CVE-2024-26642: Fixed the set of anonymous timeout flag in netfilter
nf_tables (bsc#1221830).</li>
<li>CVE-2024-26614: Fixed the initialization of accept_queue&#x27;s
spinlocks (bsc#1221293).</li>
<li>CVE-2024-26610: Fixed memory corruption in wifi/iwlwifi
(bsc#1221299).</li>
<li>CVE-2024-26601: Fixed ext4 buddy bitmap corruption via fast commit
replay (bsc#1220342).</li>
<li>CVE-2024-25742: Fixed insufficient validation during #VC instruction
emulation in x86/sev (bsc#1221725).</li>
<li>CVE-2024-23850: Fixed double free of anonymous device after snapshot
creation failure (bsc#1219126).</li>
<li>CVE-2024-23307: Fixed Integer Overflow or Wraparound vulnerability in
x86 and ARM md, raid, raid5 modules (bsc#1219169).</li>
<li>CVE-2024-22099: Fixed a null-pointer-dereference in
rfcomm_check_security (bsc#1219170).</li>
<li>CVE-2024-0841: Fixed a null pointer dereference in the
hugetlbfs_fill_super function in hugetlbfs (HugeTLB pages) functionality (bsc#1219264).</li>
<li>CVE-2023-7192: Fixed a memory leak problem in
ctnetlink_create_conntrack in net/netfilter/nf_conntrack_netlink.c (bsc#1218479).</li>
<li>CVE-2023-7042: Fixed a null-pointer-dereference in
ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev() (bsc#1218336).</li>
<li>CVE-2023-6270: Fixed a use-after-free issue in aoecmd_cfg_pkts
(bsc#1218562).</li>
<li>CVE-2023-52628: Fixed 4-byte stack OOB write in nftables
(bsc#1222117).</li>
<li>CVE-2023-52616: Fixed unexpected pointer access in crypto/lib/mpi in
mpi_ec_init (bsc#1221612).</li>
<li>CVE-2023-52607: Fixed NULL pointer dereference in pgtable_cache_add
kasprintf() (bsc#1221061).</li>
<li>CVE-2023-52591: Fixed a possible reiserfs filesystem corruption via
directory renaming (bsc#1221044).</li>
<li>CVE-2023-52590: Fixed a possible ocfs2 filesystem corruption via
directory renaming (bsc#1221088).</li>
<li>CVE-2023-52500: Fixed information leaking when processing
OPC_INB_SET_CONTROLLER_CONFIG command (bsc#1220883).</li>
<li>CVE-2023-52476: Fixed possible unhandled page fault via perf sampling
NMI during vsyscall (bsc#1220703).</li>
<li>CVE-2023-4881: Fixed a out-of-bounds write flaw in the netfilter
subsystem that could lead to potential information disclosure or a denial of service (bsc#1215221).</li>
<li>CVE-2023-0160: Fixed deadlock flaw in BPF that could allow a local
user to potentially crash the system (bsc#1209657).</li>
<li>CVE-2022-48662: Fixed a general protection fault (GPF) in
i915_perf_open_ioctl (bsc#1223505).</li>
<li>CVE-2022-48651: Fixed an out-of-bound bug in ipvlan caused by unset
skb-&gt;mac_header (bsc#1223513).</li>
<li>CVE-2021-47202: Fixed NULL pointer dereferences in of_thermal_
functions (bsc#1222878)</li>
<li>CVE-2021-47195: Fixed use-after-free inside SPI via add_lock mutex
(bsc#1222832).</li>
<li>CVE-2021-47189: Fixed denial of service due to memory ordering issues
between normal and ordered work functions in btrfs (bsc#1222706).</li>
<li>CVE-2021-47185: Fixed a softlockup issue in flush_to_ldisc in tty
tty_buffer (bsc#1222669).</li>
<li>CVE-2021-47183: Fixed a null pointer dereference during link down
processing in scsi lpfc (bsc#1192145, bsc#1222664).</li>
<li>CVE-2021-47182: Fixed scsi_mode_sense() buffer length handling
(bsc#1222662).</li>
<li>CVE-2021-47181: Fixed a null pointer dereference caused by calling
platform_get_resource() (bsc#1222660).</li>
</ul>
<p>The following non-security bugs were fixed:</p>
<ul>
<li>Call flush_delayed_fput() from nfsd main-loop
(bsc#1223380).</li>
<li>ibmvfc: make &#x27;max_sectors&#x27; a module option
(bsc#1216223).</li>
<li>scsi: Update max_hw_sectors on rescan (bsc#1216223).</li>
</ul>




<h2>Special Instructions and Notes:</h2>
<ul>


<li>Please reboot the system after installing this
update.</li>


</ul>


<h2>Patch Instructions:</h2>
<p>
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper
patch".<br/>

Alternatively you can run the command listed for your product:
</p>
<ul class="list-group">

<li class="list-group-item">
openSUSE Leap Micro 5.4


<br/>
<code>zypper in -t patch
openSUSE-Leap-Micro-5.4-2024-1641=1</code>



</li>

<li class="list-group-item">
SUSE Linux Enterprise Micro for Rancher 5.3


<br/>
<code>zypper in -t patch
SUSE-SLE-Micro-5.3-2024-1641=1</code>



</li>

<li class="list-group-item">
SUSE Linux Enterprise Micro 5.3


<br/>
<code>zypper in -t patch
SUSE-SLE-Micro-5.3-2024-1641=1</code>



</li>

<li class="list-group-item">
SUSE Linux Enterprise Micro for Rancher 5.4


<br/>
<code>zypper in -t patch
SUSE-SLE-Micro-5.4-2024-1641=1</code>



</li>

<li class="list-group-item">
SUSE Linux Enterprise Micro 5.4


<br/>
<code>zypper in -t patch
SUSE-SLE-Micro-5.4-2024-1641=1</code>



</li>

<li class="list-group-item">
SUSE Linux Enterprise Live Patching 15-SP4


<br/>
<code>zypper in -t patch
SUSE-SLE-Module-Live-Patching-15-SP4-2024-1641=1</code>


<br/>
Please note that this is the initial kernel livepatch
without fixes itself,
this package is later updated by separate standalone
kernel livepatch
updates.


</li>

<li class="list-group-item">
SUSE Linux Enterprise High Availability Extension 15 SP4


<br/>
<code>zypper in -t patch
SUSE-SLE-Product-HA-15-SP4-2024-1641=1</code>



</li>

<li class="list-group-item">
SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4


<br/>
<code>zypper in -t patch
SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1641=1</code>



</li>

<li class="list-group-item">
SUSE Linux Enterprise High Performance Computing LTSS 15 SP4


<br/>
<code>zypper in -t patch
SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1641=1</code>



</li>

<li class="list-group-item">
SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4


<br/>
<code>zypper in -t patch
SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1641=1</code>



</li>

<li class="list-group-item">
SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4


<br/>
<code>zypper in -t patch
SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1641=1</code>



</li>

<li class="list-group-item">
SUSE Linux Enterprise Server for SAP Applications 15 SP4


<br/>
<code>zypper in -t patch
SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1641=1</code>



</li>

<li class="list-group-item">
SUSE Manager Proxy 4.3


<br/>
<code>zypper in -t patch
SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1641=1</code>



</li>

<li class="list-group-item">
SUSE Manager Retail Branch Server 4.3


<br/>
<code>zypper in -t patch
SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.3-2024-1641=1</code>



</li>

<li class="list-group-item">
SUSE Manager Server 4.3


<br/>
<code>zypper in -t patch
SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1641=1</code>



</li>

<li class="list-group-item">
openSUSE Leap 15.4


<br/>
<code>zypper in -t patch
SUSE-2024-1641=1</code>



</li>

<li class="list-group-item">
openSUSE Leap Micro 5.3


<br/>
<code>zypper in -t patch
openSUSE-Leap-Micro-5.3-2024-1641=1</code>



</li>

</ul>

<h2>Package List:</h2>
<ul>


<li>
openSUSE Leap Micro 5.4 (aarch64 nosrc s390x x86_64)
<ul>


<li>kernel-default-5.14.21-150400.24.119.1</li>

</ul>
</li>

<li>
openSUSE Leap Micro 5.4 (aarch64 x86_64)
<ul>


<li>kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1</li>

</ul>
</li>

<li>
openSUSE Leap Micro 5.4 (aarch64 s390x x86_64)
<ul>


<li>kernel-default-debugsource-5.14.21-150400.24.119.1</li>


<li>kernel-default-debuginfo-5.14.21-150400.24.119.1</li>

</ul>
</li>



<li>
SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 nosrc
s390x x86_64)
<ul>


<li>kernel-default-5.14.21-150400.24.119.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64
x86_64)
<ul>


<li>kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x
x86_64)
<ul>


<li>kernel-default-debugsource-5.14.21-150400.24.119.1</li>


<li>kernel-default-debuginfo-5.14.21-150400.24.119.1</li>

</ul>
</li>



<li>
SUSE Linux Enterprise Micro 5.3 (aarch64 nosrc s390x
x86_64)
<ul>


<li>kernel-default-5.14.21-150400.24.119.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise Micro 5.3 (aarch64 x86_64)
<ul>


<li>kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
<ul>


<li>kernel-default-debugsource-5.14.21-150400.24.119.1</li>


<li>kernel-default-debuginfo-5.14.21-150400.24.119.1</li>

</ul>
</li>



<li>
SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 nosrc
s390x x86_64)
<ul>


<li>kernel-default-5.14.21-150400.24.119.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64
x86_64)
<ul>


<li>kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x
x86_64)
<ul>


<li>kernel-default-debugsource-5.14.21-150400.24.119.1</li>


<li>kernel-default-debuginfo-5.14.21-150400.24.119.1</li>

</ul>
</li>



<li>
SUSE Linux Enterprise Micro 5.4 (aarch64 nosrc s390x
x86_64)
<ul>


<li>kernel-default-5.14.21-150400.24.119.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise Micro 5.4 (aarch64 x86_64)
<ul>


<li>kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
<ul>


<li>kernel-default-debugsource-5.14.21-150400.24.119.1</li>


<li>kernel-default-debuginfo-5.14.21-150400.24.119.1</li>

</ul>
</li>



<li>
SUSE Linux Enterprise Live Patching 15-SP4 (nosrc)
<ul>


<li>kernel-default-5.14.21-150400.24.119.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x
x86_64)
<ul>


<li>kernel-default-livepatch-devel-5.14.21-150400.24.119.1</li>


<li>kernel-livepatch-SLE15-SP4_Update_26-debugsource-1-150400.9.3.1</li>


<li>kernel-default-debugsource-5.14.21-150400.24.119.1</li>


<li>kernel-default-debuginfo-5.14.21-150400.24.119.1</li>


<li>kernel-livepatch-5_14_21-150400_24_119-default-1-150400.9.3.1</li>


<li>kernel-default-livepatch-5.14.21-150400.24.119.1</li>


<li>kernel-livepatch-5_14_21-150400_24_119-default-debuginfo-1-150400.9.3.1</li>

</ul>
</li>



<li>
SUSE Linux Enterprise High Availability Extension 15 SP4
(aarch64 ppc64le s390x x86_64)
<ul>


<li>ocfs2-kmp-default-debuginfo-5.14.21-150400.24.119.1</li>


<li>gfs2-kmp-default-5.14.21-150400.24.119.1</li>


<li>cluster-md-kmp-default-debuginfo-5.14.21-150400.24.119.1</li>


<li>ocfs2-kmp-default-5.14.21-150400.24.119.1</li>


<li>gfs2-kmp-default-debuginfo-5.14.21-150400.24.119.1</li>


<li>kernel-default-debugsource-5.14.21-150400.24.119.1</li>


<li>kernel-default-debuginfo-5.14.21-150400.24.119.1</li>


<li>dlm-kmp-default-debuginfo-5.14.21-150400.24.119.1</li>


<li>cluster-md-kmp-default-5.14.21-150400.24.119.1</li>


<li>dlm-kmp-default-5.14.21-150400.24.119.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise High Availability Extension 15 SP4
(nosrc)
<ul>


<li>kernel-default-5.14.21-150400.24.119.1</li>

</ul>
</li>



<li>
SUSE Linux Enterprise High Performance Computing ESPOS 15
SP4 (aarch64 nosrc)
<ul>


<li>kernel-64kb-5.14.21-150400.24.119.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise High Performance Computing ESPOS 15
SP4 (aarch64)
<ul>


<li>kernel-64kb-devel-5.14.21-150400.24.119.1</li>


<li>kernel-64kb-devel-debuginfo-5.14.21-150400.24.119.1</li>


<li>kernel-64kb-debuginfo-5.14.21-150400.24.119.1</li>


<li>kernel-64kb-debugsource-5.14.21-150400.24.119.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise High Performance Computing ESPOS 15
SP4 (aarch64 nosrc x86_64)
<ul>


<li>kernel-default-5.14.21-150400.24.119.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise High Performance Computing ESPOS 15
SP4 (aarch64 x86_64)
<ul>


<li>kernel-syms-5.14.21-150400.24.119.1</li>


<li>kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1</li>


<li>reiserfs-kmp-default-5.14.21-150400.24.119.1</li>


<li>kernel-default-debugsource-5.14.21-150400.24.119.1</li>


<li>kernel-default-debuginfo-5.14.21-150400.24.119.1</li>


<li>kernel-default-devel-5.14.21-150400.24.119.1</li>


<li>kernel-default-devel-debuginfo-5.14.21-150400.24.119.1</li>


<li>kernel-obs-build-5.14.21-150400.24.119.1</li>


<li>reiserfs-kmp-default-debuginfo-5.14.21-150400.24.119.1</li>


<li>kernel-obs-build-debugsource-5.14.21-150400.24.119.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise High Performance Computing ESPOS 15
SP4 (noarch)
<ul>


<li>kernel-devel-5.14.21-150400.24.119.1</li>


<li>kernel-macros-5.14.21-150400.24.119.1</li>


<li>kernel-source-5.14.21-150400.24.119.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise High Performance Computing ESPOS 15
SP4 (noarch nosrc)
<ul>


<li>kernel-docs-5.14.21-150400.24.119.1</li>

</ul>
</li>



<li>
SUSE Linux Enterprise High Performance Computing LTSS 15
SP4 (aarch64 nosrc)
<ul>


<li>kernel-64kb-5.14.21-150400.24.119.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise High Performance Computing LTSS 15
SP4 (aarch64)
<ul>


<li>kernel-64kb-devel-5.14.21-150400.24.119.1</li>


<li>kernel-64kb-devel-debuginfo-5.14.21-150400.24.119.1</li>


<li>kernel-64kb-debuginfo-5.14.21-150400.24.119.1</li>


<li>kernel-64kb-debugsource-5.14.21-150400.24.119.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise High Performance Computing LTSS 15
SP4 (aarch64 nosrc x86_64)
<ul>


<li>kernel-default-5.14.21-150400.24.119.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise High Performance Computing LTSS 15
SP4 (aarch64 x86_64)
<ul>


<li>kernel-syms-5.14.21-150400.24.119.1</li>


<li>kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1</li>


<li>reiserfs-kmp-default-5.14.21-150400.24.119.1</li>


<li>kernel-default-debugsource-5.14.21-150400.24.119.1</li>


<li>kernel-default-debuginfo-5.14.21-150400.24.119.1</li>


<li>kernel-default-devel-5.14.21-150400.24.119.1</li>


<li>kernel-default-devel-debuginfo-5.14.21-150400.24.119.1</li>


<li>kernel-obs-build-5.14.21-150400.24.119.1</li>


<li>reiserfs-kmp-default-debuginfo-5.14.21-150400.24.119.1</li>


<li>kernel-obs-build-debugsource-5.14.21-150400.24.119.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise High Performance Computing LTSS 15
SP4 (noarch)
<ul>


<li>kernel-devel-5.14.21-150400.24.119.1</li>


<li>kernel-macros-5.14.21-150400.24.119.1</li>


<li>kernel-source-5.14.21-150400.24.119.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise High Performance Computing LTSS 15
SP4 (noarch nosrc)
<ul>


<li>kernel-docs-5.14.21-150400.24.119.1</li>

</ul>
</li>



<li>
SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (nosrc
x86_64)
<ul>


<li>kernel-default-5.14.21-150400.24.119.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
<ul>


<li>kernel-default-extra-5.14.21-150400.24.119.1</li>


<li>kernel-syms-5.14.21-150400.24.119.1</li>


<li>kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1</li>


<li>kernel-default-extra-debuginfo-5.14.21-150400.24.119.1</li>


<li>kernel-default-debugsource-5.14.21-150400.24.119.1</li>


<li>kernel-default-debuginfo-5.14.21-150400.24.119.1</li>


<li>kernel-default-devel-5.14.21-150400.24.119.1</li>


<li>kernel-default-devel-debuginfo-5.14.21-150400.24.119.1</li>


<li>kernel-obs-build-5.14.21-150400.24.119.1</li>


<li>kernel-obs-build-debugsource-5.14.21-150400.24.119.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch)
<ul>


<li>kernel-devel-5.14.21-150400.24.119.1</li>


<li>kernel-macros-5.14.21-150400.24.119.1</li>


<li>kernel-source-5.14.21-150400.24.119.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch
nosrc)
<ul>


<li>kernel-docs-5.14.21-150400.24.119.1</li>

</ul>
</li>



<li>
SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64
nosrc)
<ul>


<li>kernel-64kb-5.14.21-150400.24.119.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64)
<ul>


<li>kernel-64kb-devel-5.14.21-150400.24.119.1</li>


<li>kernel-64kb-devel-debuginfo-5.14.21-150400.24.119.1</li>


<li>kernel-64kb-debuginfo-5.14.21-150400.24.119.1</li>


<li>kernel-64kb-debugsource-5.14.21-150400.24.119.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64
ppc64le s390x x86_64 nosrc)
<ul>


<li>kernel-default-5.14.21-150400.24.119.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64
ppc64le x86_64)
<ul>


<li>kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64
ppc64le s390x x86_64)
<ul>


<li>kernel-default-devel-debuginfo-5.14.21-150400.24.119.1</li>


<li>kernel-syms-5.14.21-150400.24.119.1</li>


<li>reiserfs-kmp-default-5.14.21-150400.24.119.1</li>


<li>kernel-default-debugsource-5.14.21-150400.24.119.1</li>


<li>kernel-default-debuginfo-5.14.21-150400.24.119.1</li>


<li>kernel-obs-build-5.14.21-150400.24.119.1</li>


<li>kernel-default-devel-5.14.21-150400.24.119.1</li>


<li>reiserfs-kmp-default-debuginfo-5.14.21-150400.24.119.1</li>


<li>kernel-obs-build-debugsource-5.14.21-150400.24.119.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch)
<ul>


<li>kernel-devel-5.14.21-150400.24.119.1</li>


<li>kernel-macros-5.14.21-150400.24.119.1</li>


<li>kernel-source-5.14.21-150400.24.119.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch
nosrc)
<ul>


<li>kernel-docs-5.14.21-150400.24.119.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (nosrc
s390x)
<ul>


<li>kernel-zfcpdump-5.14.21-150400.24.119.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (s390x)
<ul>


<li>kernel-zfcpdump-debugsource-5.14.21-150400.24.119.1</li>


<li>kernel-zfcpdump-debuginfo-5.14.21-150400.24.119.1</li>

</ul>
</li>



<li>
SUSE Linux Enterprise Server for SAP Applications 15 SP4
(nosrc ppc64le x86_64)
<ul>


<li>kernel-default-5.14.21-150400.24.119.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise Server for SAP Applications 15 SP4
(ppc64le x86_64)
<ul>


<li>kernel-syms-5.14.21-150400.24.119.1</li>


<li>kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1</li>


<li>reiserfs-kmp-default-5.14.21-150400.24.119.1</li>


<li>kernel-default-debugsource-5.14.21-150400.24.119.1</li>


<li>kernel-default-debuginfo-5.14.21-150400.24.119.1</li>


<li>kernel-default-devel-5.14.21-150400.24.119.1</li>


<li>kernel-default-devel-debuginfo-5.14.21-150400.24.119.1</li>


<li>kernel-obs-build-5.14.21-150400.24.119.1</li>


<li>reiserfs-kmp-default-debuginfo-5.14.21-150400.24.119.1</li>


<li>kernel-obs-build-debugsource-5.14.21-150400.24.119.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise Server for SAP Applications 15 SP4
(noarch)
<ul>


<li>kernel-devel-5.14.21-150400.24.119.1</li>


<li>kernel-macros-5.14.21-150400.24.119.1</li>


<li>kernel-source-5.14.21-150400.24.119.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise Server for SAP Applications 15 SP4
(noarch nosrc)
<ul>


<li>kernel-docs-5.14.21-150400.24.119.1</li>

</ul>
</li>



<li>
SUSE Manager Proxy 4.3 (nosrc x86_64)
<ul>


<li>kernel-default-5.14.21-150400.24.119.1</li>

</ul>
</li>

<li>
SUSE Manager Proxy 4.3 (x86_64)
<ul>


<li>kernel-syms-5.14.21-150400.24.119.1</li>


<li>kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1</li>


<li>kernel-default-debugsource-5.14.21-150400.24.119.1</li>


<li>kernel-default-debuginfo-5.14.21-150400.24.119.1</li>


<li>kernel-default-devel-5.14.21-150400.24.119.1</li>


<li>kernel-default-devel-debuginfo-5.14.21-150400.24.119.1</li>

</ul>
</li>

<li>
SUSE Manager Proxy 4.3 (noarch)
<ul>


<li>kernel-devel-5.14.21-150400.24.119.1</li>


<li>kernel-macros-5.14.21-150400.24.119.1</li>


<li>kernel-source-5.14.21-150400.24.119.1</li>

</ul>
</li>



<li>
SUSE Manager Retail Branch Server 4.3 (nosrc x86_64)
<ul>


<li>kernel-default-5.14.21-150400.24.119.1</li>

</ul>
</li>

<li>
SUSE Manager Retail Branch Server 4.3 (x86_64)
<ul>


<li>kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1</li>


<li>kernel-default-debugsource-5.14.21-150400.24.119.1</li>


<li>kernel-default-debuginfo-5.14.21-150400.24.119.1</li>


<li>kernel-default-devel-5.14.21-150400.24.119.1</li>


<li>kernel-default-devel-debuginfo-5.14.21-150400.24.119.1</li>

</ul>
</li>

<li>
SUSE Manager Retail Branch Server 4.3 (noarch)
<ul>


<li>kernel-devel-5.14.21-150400.24.119.1</li>


<li>kernel-macros-5.14.21-150400.24.119.1</li>

</ul>
</li>



<li>
SUSE Manager Server 4.3 (nosrc ppc64le s390x x86_64)
<ul>


<li>kernel-default-5.14.21-150400.24.119.1</li>

</ul>
</li>

<li>
SUSE Manager Server 4.3 (ppc64le x86_64)
<ul>


<li>kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1</li>

</ul>
</li>

<li>
SUSE Manager Server 4.3 (ppc64le s390x x86_64)
<ul>


<li>kernel-syms-5.14.21-150400.24.119.1</li>


<li>kernel-default-debugsource-5.14.21-150400.24.119.1</li>


<li>kernel-default-debuginfo-5.14.21-150400.24.119.1</li>


<li>kernel-default-devel-5.14.21-150400.24.119.1</li>


<li>kernel-default-devel-debuginfo-5.14.21-150400.24.119.1</li>

</ul>
</li>

<li>
SUSE Manager Server 4.3 (noarch)
<ul>


<li>kernel-devel-5.14.21-150400.24.119.1</li>


<li>kernel-macros-5.14.21-150400.24.119.1</li>


<li>kernel-source-5.14.21-150400.24.119.1</li>

</ul>
</li>

<li>
SUSE Manager Server 4.3 (nosrc s390x)
<ul>


<li>kernel-zfcpdump-5.14.21-150400.24.119.1</li>

</ul>
</li>

<li>
SUSE Manager Server 4.3 (s390x)
<ul>


<li>kernel-zfcpdump-debugsource-5.14.21-150400.24.119.1</li>


<li>kernel-zfcpdump-debuginfo-5.14.21-150400.24.119.1</li>

</ul>
</li>



<li>
openSUSE Leap 15.4 (noarch nosrc)
<ul>


<li>kernel-docs-5.14.21-150400.24.119.1</li>

</ul>
</li>

<li>
openSUSE Leap 15.4 (noarch)
<ul>


<li>kernel-devel-5.14.21-150400.24.119.1</li>


<li>kernel-source-vanilla-5.14.21-150400.24.119.1</li>


<li>kernel-macros-5.14.21-150400.24.119.1</li>


<li>kernel-docs-html-5.14.21-150400.24.119.1</li>


<li>kernel-source-5.14.21-150400.24.119.1</li>

</ul>
</li>

<li>
openSUSE Leap 15.4 (nosrc ppc64le x86_64)
<ul>


<li>kernel-debug-5.14.21-150400.24.119.1</li>

</ul>
</li>

<li>
openSUSE Leap 15.4 (ppc64le x86_64)
<ul>


<li>kernel-debug-debuginfo-5.14.21-150400.24.119.1</li>


<li>kernel-debug-livepatch-devel-5.14.21-150400.24.119.1</li>


<li>kernel-debug-debugsource-5.14.21-150400.24.119.1</li>


<li>kernel-debug-devel-5.14.21-150400.24.119.1</li>


<li>kernel-debug-devel-debuginfo-5.14.21-150400.24.119.1</li>

</ul>
</li>

<li>
openSUSE Leap 15.4 (aarch64 ppc64le x86_64)
<ul>


<li>kernel-kvmsmall-devel-debuginfo-5.14.21-150400.24.119.1</li>


<li>kernel-kvmsmall-debugsource-5.14.21-150400.24.119.1</li>


<li>kernel-kvmsmall-devel-5.14.21-150400.24.119.1</li>


<li>kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1</li>


<li>kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.119.1</li>


<li>kernel-default-base-rebuild-5.14.21-150400.24.119.1.150400.24.56.1</li>


<li>kernel-kvmsmall-debuginfo-5.14.21-150400.24.119.1</li>

</ul>
</li>

<li>
openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64)
<ul>


<li>cluster-md-kmp-default-debuginfo-5.14.21-150400.24.119.1</li>


<li>kernel-default-extra-debuginfo-5.14.21-150400.24.119.1</li>


<li>ocfs2-kmp-default-5.14.21-150400.24.119.1</li>


<li>gfs2-kmp-default-debuginfo-5.14.21-150400.24.119.1</li>


<li>kernel-default-debuginfo-5.14.21-150400.24.119.1</li>


<li>dlm-kmp-default-debuginfo-5.14.21-150400.24.119.1</li>


<li>kernel-default-devel-5.14.21-150400.24.119.1</li>


<li>cluster-md-kmp-default-5.14.21-150400.24.119.1</li>


<li>reiserfs-kmp-default-debuginfo-5.14.21-150400.24.119.1</li>


<li>kernel-obs-build-debugsource-5.14.21-150400.24.119.1</li>


<li>kernel-default-extra-5.14.21-150400.24.119.1</li>


<li>ocfs2-kmp-default-debuginfo-5.14.21-150400.24.119.1</li>


<li>kernel-obs-qa-5.14.21-150400.24.119.1</li>


<li>reiserfs-kmp-default-5.14.21-150400.24.119.1</li>


<li>kernel-obs-build-5.14.21-150400.24.119.1</li>


<li>kernel-default-livepatch-5.14.21-150400.24.119.1</li>


<li>dlm-kmp-default-5.14.21-150400.24.119.1</li>


<li>kernel-default-optional-debuginfo-5.14.21-150400.24.119.1</li>


<li>kernel-default-optional-5.14.21-150400.24.119.1</li>


<li>kselftests-kmp-default-5.14.21-150400.24.119.1</li>


<li>gfs2-kmp-default-5.14.21-150400.24.119.1</li>


<li>kernel-default-devel-debuginfo-5.14.21-150400.24.119.1</li>


<li>kernel-default-livepatch-devel-5.14.21-150400.24.119.1</li>


<li>kselftests-kmp-default-debuginfo-5.14.21-150400.24.119.1</li>


<li>kernel-syms-5.14.21-150400.24.119.1</li>


<li>kernel-default-debugsource-5.14.21-150400.24.119.1</li>

</ul>
</li>

<li>
openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 nosrc)
<ul>


<li>kernel-default-5.14.21-150400.24.119.1</li>

</ul>
</li>

<li>
openSUSE Leap 15.4 (aarch64 nosrc ppc64le x86_64)
<ul>


<li>kernel-kvmsmall-5.14.21-150400.24.119.1</li>

</ul>
</li>

<li>
openSUSE Leap 15.4 (ppc64le s390x x86_64)
<ul>


<li>kernel-livepatch-SLE15-SP4_Update_26-debugsource-1-150400.9.3.1</li>


<li>kernel-livepatch-5_14_21-150400_24_119-default-debuginfo-1-150400.9.3.1</li>


<li>kernel-livepatch-5_14_21-150400_24_119-default-1-150400.9.3.1</li>

</ul>
</li>

<li>
openSUSE Leap 15.4 (nosrc s390x)
<ul>


<li>kernel-zfcpdump-5.14.21-150400.24.119.1</li>

</ul>
</li>

<li>
openSUSE Leap 15.4 (s390x)
<ul>


<li>kernel-zfcpdump-debugsource-5.14.21-150400.24.119.1</li>


<li>kernel-zfcpdump-debuginfo-5.14.21-150400.24.119.1</li>

</ul>
</li>

<li>
openSUSE Leap 15.4 (nosrc)
<ul>


<li>dtb-aarch64-5.14.21-150400.24.119.1</li>

</ul>
</li>

<li>
openSUSE Leap 15.4 (aarch64)
<ul>


<li>dtb-nvidia-5.14.21-150400.24.119.1</li>


<li>dtb-rockchip-5.14.21-150400.24.119.1</li>


<li>kselftests-kmp-64kb-5.14.21-150400.24.119.1</li>


<li>dtb-freescale-5.14.21-150400.24.119.1</li>


<li>kselftests-kmp-64kb-debuginfo-5.14.21-150400.24.119.1</li>


<li>dtb-apm-5.14.21-150400.24.119.1</li>


<li>ocfs2-kmp-64kb-5.14.21-150400.24.119.1</li>


<li>kernel-64kb-livepatch-devel-5.14.21-150400.24.119.1</li>


<li>dtb-mediatek-5.14.21-150400.24.119.1</li>


<li>dtb-amazon-5.14.21-150400.24.119.1</li>


<li>kernel-64kb-devel-debuginfo-5.14.21-150400.24.119.1</li>


<li>dlm-kmp-64kb-5.14.21-150400.24.119.1</li>


<li>kernel-64kb-debugsource-5.14.21-150400.24.119.1</li>


<li>gfs2-kmp-64kb-5.14.21-150400.24.119.1</li>


<li>reiserfs-kmp-64kb-debuginfo-5.14.21-150400.24.119.1</li>


<li>dtb-arm-5.14.21-150400.24.119.1</li>


<li>dtb-marvell-5.14.21-150400.24.119.1</li>


<li>dlm-kmp-64kb-debuginfo-5.14.21-150400.24.119.1</li>


<li>gfs2-kmp-64kb-debuginfo-5.14.21-150400.24.119.1</li>


<li>dtb-renesas-5.14.21-150400.24.119.1</li>


<li>reiserfs-kmp-64kb-5.14.21-150400.24.119.1</li>


<li>dtb-altera-5.14.21-150400.24.119.1</li>

<li>dtb-lg-5.14.21-150400.24.119.1</li>


<li>dtb-socionext-5.14.21-150400.24.119.1</li>


<li>dtb-xilinx-5.14.21-150400.24.119.1</li>


<li>cluster-md-kmp-64kb-5.14.21-150400.24.119.1</li>


<li>dtb-amlogic-5.14.21-150400.24.119.1</li>


<li>dtb-hisilicon-5.14.21-150400.24.119.1</li>


<li>dtb-broadcom-5.14.21-150400.24.119.1</li>


<li>dtb-amd-5.14.21-150400.24.119.1</li>


<li>ocfs2-kmp-64kb-debuginfo-5.14.21-150400.24.119.1</li>


<li>dtb-exynos-5.14.21-150400.24.119.1</li>


<li>kernel-64kb-extra-debuginfo-5.14.21-150400.24.119.1</li>


<li>dtb-cavium-5.14.21-150400.24.119.1</li>


<li>dtb-apple-5.14.21-150400.24.119.1</li>


<li>dtb-qcom-5.14.21-150400.24.119.1</li>


<li>dtb-sprd-5.14.21-150400.24.119.1</li>


<li>kernel-64kb-optional-debuginfo-5.14.21-150400.24.119.1</li>


<li>kernel-64kb-debuginfo-5.14.21-150400.24.119.1</li>


<li>kernel-64kb-optional-5.14.21-150400.24.119.1</li>


<li>kernel-64kb-devel-5.14.21-150400.24.119.1</li>


<li>dtb-allwinner-5.14.21-150400.24.119.1</li>


<li>kernel-64kb-extra-5.14.21-150400.24.119.1</li>


<li>cluster-md-kmp-64kb-debuginfo-5.14.21-150400.24.119.1</li>

</ul>
</li>

<li>
openSUSE Leap 15.4 (aarch64 nosrc)
<ul>


<li>kernel-64kb-5.14.21-150400.24.119.1</li>

</ul>
</li>



<li>
openSUSE Leap Micro 5.3 (aarch64 nosrc x86_64)
<ul>


<li>kernel-default-5.14.21-150400.24.119.1</li>

</ul>
</li>

<li>
openSUSE Leap Micro 5.3 (aarch64 x86_64)
<ul>


<li>kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1</li>


<li>kernel-default-debugsource-5.14.21-150400.24.119.1</li>


<li>kernel-default-debuginfo-5.14.21-150400.24.119.1</li>

</ul>
</li>


</ul>


<h2>References:</h2>
<ul>


<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47047.html">https://www.suse.com/security/cve/CVE-2021-47047.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47181.html">https://www.suse.com/security/cve/CVE-2021-47181.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47182.html">https://www.suse.com/security/cve/CVE-2021-47182.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47183.html">https://www.suse.com/security/cve/CVE-2021-47183.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47184.html">https://www.suse.com/security/cve/CVE-2021-47184.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47185.html">https://www.suse.com/security/cve/CVE-2021-47185.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47187.html">https://www.suse.com/security/cve/CVE-2021-47187.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47188.html">https://www.suse.com/security/cve/CVE-2021-47188.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47189.html">https://www.suse.com/security/cve/CVE-2021-47189.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47191.html">https://www.suse.com/security/cve/CVE-2021-47191.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47192.html">https://www.suse.com/security/cve/CVE-2021-47192.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47193.html">https://www.suse.com/security/cve/CVE-2021-47193.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47194.html">https://www.suse.com/security/cve/CVE-2021-47194.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47195.html">https://www.suse.com/security/cve/CVE-2021-47195.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47196.html">https://www.suse.com/security/cve/CVE-2021-47196.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47197.html">https://www.suse.com/security/cve/CVE-2021-47197.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47198.html">https://www.suse.com/security/cve/CVE-2021-47198.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47199.html">https://www.suse.com/security/cve/CVE-2021-47199.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47200.html">https://www.suse.com/security/cve/CVE-2021-47200.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47201.html">https://www.suse.com/security/cve/CVE-2021-47201.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47202.html">https://www.suse.com/security/cve/CVE-2021-47202.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47203.html">https://www.suse.com/security/cve/CVE-2021-47203.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47204.html">https://www.suse.com/security/cve/CVE-2021-47204.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47205.html">https://www.suse.com/security/cve/CVE-2021-47205.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47206.html">https://www.suse.com/security/cve/CVE-2021-47206.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47207.html">https://www.suse.com/security/cve/CVE-2021-47207.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47209.html">https://www.suse.com/security/cve/CVE-2021-47209.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47210.html">https://www.suse.com/security/cve/CVE-2021-47210.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47211.html">https://www.suse.com/security/cve/CVE-2021-47211.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47212.html">https://www.suse.com/security/cve/CVE-2021-47212.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47215.html">https://www.suse.com/security/cve/CVE-2021-47215.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47216.html">https://www.suse.com/security/cve/CVE-2021-47216.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47217.html">https://www.suse.com/security/cve/CVE-2021-47217.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47218.html">https://www.suse.com/security/cve/CVE-2021-47218.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47219.html">https://www.suse.com/security/cve/CVE-2021-47219.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48631.html">https://www.suse.com/security/cve/CVE-2022-48631.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48637.html">https://www.suse.com/security/cve/CVE-2022-48637.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48638.html">https://www.suse.com/security/cve/CVE-2022-48638.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48647.html">https://www.suse.com/security/cve/CVE-2022-48647.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48648.html">https://www.suse.com/security/cve/CVE-2022-48648.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48650.html">https://www.suse.com/security/cve/CVE-2022-48650.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48651.html">https://www.suse.com/security/cve/CVE-2022-48651.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48653.html">https://www.suse.com/security/cve/CVE-2022-48653.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48654.html">https://www.suse.com/security/cve/CVE-2022-48654.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48655.html">https://www.suse.com/security/cve/CVE-2022-48655.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48656.html">https://www.suse.com/security/cve/CVE-2022-48656.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48657.html">https://www.suse.com/security/cve/CVE-2022-48657.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48660.html">https://www.suse.com/security/cve/CVE-2022-48660.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48662.html">https://www.suse.com/security/cve/CVE-2022-48662.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48663.html">https://www.suse.com/security/cve/CVE-2022-48663.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48667.html">https://www.suse.com/security/cve/CVE-2022-48667.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48668.html">https://www.suse.com/security/cve/CVE-2022-48668.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-0160.html">https://www.suse.com/security/cve/CVE-2023-0160.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-4881.html">https://www.suse.com/security/cve/CVE-2023-4881.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52476.html">https://www.suse.com/security/cve/CVE-2023-52476.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52500.html">https://www.suse.com/security/cve/CVE-2023-52500.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52590.html">https://www.suse.com/security/cve/CVE-2023-52590.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52591.html">https://www.suse.com/security/cve/CVE-2023-52591.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52607.html">https://www.suse.com/security/cve/CVE-2023-52607.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52616.html">https://www.suse.com/security/cve/CVE-2023-52616.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52628.html">https://www.suse.com/security/cve/CVE-2023-52628.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-6270.html">https://www.suse.com/security/cve/CVE-2023-6270.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-7042.html">https://www.suse.com/security/cve/CVE-2023-7042.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-7192.html">https://www.suse.com/security/cve/CVE-2023-7192.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-0841.html">https://www.suse.com/security/cve/CVE-2024-0841.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-22099.html">https://www.suse.com/security/cve/CVE-2024-22099.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-23307.html">https://www.suse.com/security/cve/CVE-2024-23307.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-23848.html">https://www.suse.com/security/cve/CVE-2024-23848.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-23850.html">https://www.suse.com/security/cve/CVE-2024-23850.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-25742.html">https://www.suse.com/security/cve/CVE-2024-25742.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26601.html">https://www.suse.com/security/cve/CVE-2024-26601.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26610.html">https://www.suse.com/security/cve/CVE-2024-26610.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26614.html">https://www.suse.com/security/cve/CVE-2024-26614.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26642.html">https://www.suse.com/security/cve/CVE-2024-26642.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26687.html">https://www.suse.com/security/cve/CVE-2024-26687.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26688.html">https://www.suse.com/security/cve/CVE-2024-26688.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26689.html">https://www.suse.com/security/cve/CVE-2024-26689.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26704.html">https://www.suse.com/security/cve/CVE-2024-26704.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26727.html">https://www.suse.com/security/cve/CVE-2024-26727.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26733.html">https://www.suse.com/security/cve/CVE-2024-26733.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26739.html">https://www.suse.com/security/cve/CVE-2024-26739.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26764.html">https://www.suse.com/security/cve/CVE-2024-26764.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26766.html">https://www.suse.com/security/cve/CVE-2024-26766.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26773.html">https://www.suse.com/security/cve/CVE-2024-26773.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26792.html">https://www.suse.com/security/cve/CVE-2024-26792.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26816.html">https://www.suse.com/security/cve/CVE-2024-26816.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26898.html">https://www.suse.com/security/cve/CVE-2024-26898.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26903.html">https://www.suse.com/security/cve/CVE-2024-26903.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27043.html">https://www.suse.com/security/cve/CVE-2024-27043.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27389.html">https://www.suse.com/security/cve/CVE-2024-27389.html</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1192145">https://bugzilla.suse.com/show_bug.cgi?id=1192145</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1209657">https://bugzilla.suse.com/show_bug.cgi?id=1209657</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1215221">https://bugzilla.suse.com/show_bug.cgi?id=1215221</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1216223">https://bugzilla.suse.com/show_bug.cgi?id=1216223</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1218336">https://bugzilla.suse.com/show_bug.cgi?id=1218336</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1218479">https://bugzilla.suse.com/show_bug.cgi?id=1218479</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1218562">https://bugzilla.suse.com/show_bug.cgi?id=1218562</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1219104">https://bugzilla.suse.com/show_bug.cgi?id=1219104</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1219126">https://bugzilla.suse.com/show_bug.cgi?id=1219126</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1219169">https://bugzilla.suse.com/show_bug.cgi?id=1219169</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1219170">https://bugzilla.suse.com/show_bug.cgi?id=1219170</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1219264">https://bugzilla.suse.com/show_bug.cgi?id=1219264</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220342">https://bugzilla.suse.com/show_bug.cgi?id=1220342</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220703">https://bugzilla.suse.com/show_bug.cgi?id=1220703</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220761">https://bugzilla.suse.com/show_bug.cgi?id=1220761</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220883">https://bugzilla.suse.com/show_bug.cgi?id=1220883</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221044">https://bugzilla.suse.com/show_bug.cgi?id=1221044</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221061">https://bugzilla.suse.com/show_bug.cgi?id=1221061</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221088">https://bugzilla.suse.com/show_bug.cgi?id=1221088</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221293">https://bugzilla.suse.com/show_bug.cgi?id=1221293</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221299">https://bugzilla.suse.com/show_bug.cgi?id=1221299</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221612">https://bugzilla.suse.com/show_bug.cgi?id=1221612</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221725">https://bugzilla.suse.com/show_bug.cgi?id=1221725</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221830">https://bugzilla.suse.com/show_bug.cgi?id=1221830</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222117">https://bugzilla.suse.com/show_bug.cgi?id=1222117</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222422">https://bugzilla.suse.com/show_bug.cgi?id=1222422</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222430">https://bugzilla.suse.com/show_bug.cgi?id=1222430</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222435">https://bugzilla.suse.com/show_bug.cgi?id=1222435</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222482">https://bugzilla.suse.com/show_bug.cgi?id=1222482</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222503">https://bugzilla.suse.com/show_bug.cgi?id=1222503</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222536">https://bugzilla.suse.com/show_bug.cgi?id=1222536</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222559">https://bugzilla.suse.com/show_bug.cgi?id=1222559</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222585">https://bugzilla.suse.com/show_bug.cgi?id=1222585</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222618">https://bugzilla.suse.com/show_bug.cgi?id=1222618</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222624">https://bugzilla.suse.com/show_bug.cgi?id=1222624</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222660">https://bugzilla.suse.com/show_bug.cgi?id=1222660</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222662">https://bugzilla.suse.com/show_bug.cgi?id=1222662</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222664">https://bugzilla.suse.com/show_bug.cgi?id=1222664</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222666">https://bugzilla.suse.com/show_bug.cgi?id=1222666</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222669">https://bugzilla.suse.com/show_bug.cgi?id=1222669</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222671">https://bugzilla.suse.com/show_bug.cgi?id=1222671</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222703">https://bugzilla.suse.com/show_bug.cgi?id=1222703</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222704">https://bugzilla.suse.com/show_bug.cgi?id=1222704</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222706">https://bugzilla.suse.com/show_bug.cgi?id=1222706</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222709">https://bugzilla.suse.com/show_bug.cgi?id=1222709</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222721">https://bugzilla.suse.com/show_bug.cgi?id=1222721</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222726">https://bugzilla.suse.com/show_bug.cgi?id=1222726</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222773">https://bugzilla.suse.com/show_bug.cgi?id=1222773</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222776">https://bugzilla.suse.com/show_bug.cgi?id=1222776</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222785">https://bugzilla.suse.com/show_bug.cgi?id=1222785</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222787">https://bugzilla.suse.com/show_bug.cgi?id=1222787</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222790">https://bugzilla.suse.com/show_bug.cgi?id=1222790</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222791">https://bugzilla.suse.com/show_bug.cgi?id=1222791</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222792">https://bugzilla.suse.com/show_bug.cgi?id=1222792</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222796">https://bugzilla.suse.com/show_bug.cgi?id=1222796</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222824">https://bugzilla.suse.com/show_bug.cgi?id=1222824</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222829">https://bugzilla.suse.com/show_bug.cgi?id=1222829</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222832">https://bugzilla.suse.com/show_bug.cgi?id=1222832</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222836">https://bugzilla.suse.com/show_bug.cgi?id=1222836</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222838">https://bugzilla.suse.com/show_bug.cgi?id=1222838</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222866">https://bugzilla.suse.com/show_bug.cgi?id=1222866</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222867">https://bugzilla.suse.com/show_bug.cgi?id=1222867</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222869">https://bugzilla.suse.com/show_bug.cgi?id=1222869</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222876">https://bugzilla.suse.com/show_bug.cgi?id=1222876</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222878">https://bugzilla.suse.com/show_bug.cgi?id=1222878</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222879">https://bugzilla.suse.com/show_bug.cgi?id=1222879</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222881">https://bugzilla.suse.com/show_bug.cgi?id=1222881</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222883">https://bugzilla.suse.com/show_bug.cgi?id=1222883</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222888">https://bugzilla.suse.com/show_bug.cgi?id=1222888</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222894">https://bugzilla.suse.com/show_bug.cgi?id=1222894</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222901">https://bugzilla.suse.com/show_bug.cgi?id=1222901</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223016">https://bugzilla.suse.com/show_bug.cgi?id=1223016</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223187">https://bugzilla.suse.com/show_bug.cgi?id=1223187</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223380">https://bugzilla.suse.com/show_bug.cgi?id=1223380</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223474">https://bugzilla.suse.com/show_bug.cgi?id=1223474</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223475">https://bugzilla.suse.com/show_bug.cgi?id=1223475</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223477">https://bugzilla.suse.com/show_bug.cgi?id=1223477</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223479">https://bugzilla.suse.com/show_bug.cgi?id=1223479</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223482">https://bugzilla.suse.com/show_bug.cgi?id=1223482</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223484">https://bugzilla.suse.com/show_bug.cgi?id=1223484</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223487">https://bugzilla.suse.com/show_bug.cgi?id=1223487</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223503">https://bugzilla.suse.com/show_bug.cgi?id=1223503</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223505">https://bugzilla.suse.com/show_bug.cgi?id=1223505</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223509">https://bugzilla.suse.com/show_bug.cgi?id=1223509</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223513">https://bugzilla.suse.com/show_bug.cgi?id=1223513</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223516">https://bugzilla.suse.com/show_bug.cgi?id=1223516</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223517">https://bugzilla.suse.com/show_bug.cgi?id=1223517</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223518">https://bugzilla.suse.com/show_bug.cgi?id=1223518</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223519">https://bugzilla.suse.com/show_bug.cgi?id=1223519</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223522">https://bugzilla.suse.com/show_bug.cgi?id=1223522</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223523">https://bugzilla.suse.com/show_bug.cgi?id=1223523</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223705">https://bugzilla.suse.com/show_bug.cgi?id=1223705</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223824">https://bugzilla.suse.com/show_bug.cgi?id=1223824</a>
</li>


</ul>

</div>

--===============4443567924265903551==--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung