drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Mehrere Probleme in Linux
Name: |
Mehrere Probleme in Linux |
|
ID: |
SUSE-SU-2024:1641-1 |
|
Distribution: |
SUSE |
|
Plattformen: |
SUSE Manager Proxy 4.3, SUSE Manager Server 4.3, SUSE Manager Retail Branch Server 4.3, SUSE Linux Enterprise Micro 5.3, SUSE Linux Enterprise Real Time 15 SP4, SUSE Linux Enterprise High Performance Computing 15 SP4, SUSE Linux Enterprise Server 15 SP4, SUSE Linux Enterprise Server for SAP Applications 15 SP4, SUSE Linux Enterprise Micro for Rancher 5.3, SUSE Linux Enterprise Micro 5.4, SUSE Linux Enterprise High Availability Extension 15 SP4, SUSE Linux Enterprise Live Patching 15-SP4, SUSE Linux Enterprise Micro for Rancher 5.4, SUSE openSUSE Leap 15.4, SUSE openSUSE Leap Micro 5.4, SUSE openSUSE Leap Micro 5.3, SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4, SUSE Linux Enterprise High Performance Computing LTSS 15 SP4, SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4, SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 |
|
Datum: |
Di, 14. Mai 2024, 19:53 |
|
Referenzen: |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47210
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48662
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52616
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47195
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47216
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47211
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48660
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27389
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26898
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26727
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47184
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47182
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52500
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26739
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47193
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47218
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52590
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26704
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26816
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48667
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0841
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7042
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47209
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47202
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48656
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26733
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6270
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48657
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47181
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47207
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47194
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47196
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48650
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26903
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52607
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26688
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48663
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7192
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52591
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27043
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26689
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47183
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26601
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47217
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47219
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47212
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48668
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47206
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47204
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48648
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47197
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47198
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26764
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48653
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48655
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47192
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23850
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47201
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4881
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47188
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48631
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48637
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23848
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26687
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26773
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26614
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47189
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47215
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47200
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26610
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25742
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48654
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47191
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47199
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47205
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47047
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48647
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26766
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26642
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26792
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47187
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48651
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22099
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23307
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48638
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47185
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0160
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52476
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47203
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52628 |
|
Applikationen: |
Linux |
|
Originalnachricht |
--===============4443567924265903551== Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit
# Security update for the Linux Kernel
Announcement ID: SUSE-SU-2024:1641-1 Rating: important References:
* bsc#1192145 * bsc#1209657 * bsc#1215221 * bsc#1216223 * bsc#1218336 * bsc#1218479 * bsc#1218562 * bsc#1219104 * bsc#1219126 * bsc#1219169 * bsc#1219170 * bsc#1219264 * bsc#1220342 * bsc#1220703 * bsc#1220761 * bsc#1220883 * bsc#1221044 * bsc#1221061 * bsc#1221088 * bsc#1221293 * bsc#1221299 * bsc#1221612 * bsc#1221725 * bsc#1221830 * bsc#1222117 * bsc#1222422 * bsc#1222430 * bsc#1222435 * bsc#1222482 * bsc#1222503 * bsc#1222536 * bsc#1222559 * bsc#1222585 * bsc#1222618 * bsc#1222624 * bsc#1222660 * bsc#1222662 * bsc#1222664 * bsc#1222666 * bsc#1222669 * bsc#1222671 * bsc#1222703 * bsc#1222704 * bsc#1222706 * bsc#1222709 * bsc#1222721 * bsc#1222726 * bsc#1222773 * bsc#1222776 * bsc#1222785 * bsc#1222787 * bsc#1222790 * bsc#1222791 * bsc#1222792 * bsc#1222796 * bsc#1222824 * bsc#1222829 * bsc#1222832 * bsc#1222836 * bsc#1222838 * bsc#1222866 * bsc#1222867 * bsc#1222869 * bsc#1222876 * bsc#1222878 * bsc#1222879 * bsc#1222881 * bsc#1222883 * bsc#1222888 * bsc#1222894 * bsc#1222901 * bsc#1223016 * bsc#1223187 * bsc#1223380 * bsc#1223474 * bsc#1223475 * bsc#1223477 * bsc#1223479 * bsc#1223482 * bsc#1223484 * bsc#1223487 * bsc#1223503 * bsc#1223505 * bsc#1223509 * bsc#1223513 * bsc#1223516 * bsc#1223517 * bsc#1223518 * bsc#1223519 * bsc#1223522 * bsc#1223523 * bsc#1223705 * bsc#1223824
Cross-References:
* CVE-2021-47047 * CVE-2021-47181 * CVE-2021-47182 * CVE-2021-47183 * CVE-2021-47184 * CVE-2021-47185 * CVE-2021-47187 * CVE-2021-47188 * CVE-2021-47189 * CVE-2021-47191 * CVE-2021-47192 * CVE-2021-47193 * CVE-2021-47194 * CVE-2021-47195 * CVE-2021-47196 * CVE-2021-47197 * CVE-2021-47198 * CVE-2021-47199 * CVE-2021-47200 * CVE-2021-47201 * CVE-2021-47202 * CVE-2021-47203 * CVE-2021-47204 * CVE-2021-47205 * CVE-2021-47206 * CVE-2021-47207 * CVE-2021-47209 * CVE-2021-47210 * CVE-2021-47211 * CVE-2021-47212 * CVE-2021-47215 * CVE-2021-47216 * CVE-2021-47217 * CVE-2021-47218 * CVE-2021-47219 * CVE-2022-48631 * CVE-2022-48637 * CVE-2022-48638 * CVE-2022-48647 * CVE-2022-48648 * CVE-2022-48650 * CVE-2022-48651 * CVE-2022-48653 * CVE-2022-48654 * CVE-2022-48655 * CVE-2022-48656 * CVE-2022-48657 * CVE-2022-48660 * CVE-2022-48662 * CVE-2022-48663 * CVE-2022-48667 * CVE-2022-48668 * CVE-2023-0160 * CVE-2023-4881 * CVE-2023-52476 * CVE-2023-52500 * CVE-2023-52590 * CVE-2023-52591 * CVE-2023-52607 * CVE-2023-52616 * CVE-2023-52628 * CVE-2023-6270 * CVE-2023-7042 * CVE-2023-7192 * CVE-2024-0841 * CVE-2024-22099 * CVE-2024-23307 * CVE-2024-23848 * CVE-2024-23850 * CVE-2024-25742 * CVE-2024-26601 * CVE-2024-26610 * CVE-2024-26614 * CVE-2024-26642 * CVE-2024-26687 * CVE-2024-26688 * CVE-2024-26689 * CVE-2024-26704 * CVE-2024-26727 * CVE-2024-26733 * CVE-2024-26739 * CVE-2024-26764 * CVE-2024-26766 * CVE-2024-26773 * CVE-2024-26792 * CVE-2024-26816 * CVE-2024-26898 * CVE-2024-26903 * CVE-2024-27043 * CVE-2024-27389
CVSS scores:
* CVE-2021-47181 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47182 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47183 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47184 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47185 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47187 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47188 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47189 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47191 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47193 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47193 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47194 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47194 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47195 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47195 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47196 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47197 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47198 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47198 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47199 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47200 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47201 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47202 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47203 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47204 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47205 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47206 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47207 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47209 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47210 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47211 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47212 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47215 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47216 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2021-47217 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47218 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47219 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2022-48631 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48637 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48638 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48647 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48648 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48650 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48651 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48653 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-48654 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2022-48655 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2022-48655 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48656 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-48657 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-48660 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-48660 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48662 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48662 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48663 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48667 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2022-48668 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2023-0160 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-0160 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-4881 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L * CVE-2023-4881 ( NVD ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2023-52476 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52500 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2023-52590 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2023-52591 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-52607 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52616 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52628 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6270 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6270 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-7042 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-7042 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-7192 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-7192 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-0841 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-0841 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-22099 ( SUSE ): 5.3 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-22099 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-23307 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-23307 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-23848 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-23848 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-23850 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-23850 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-25742 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26601 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26601 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26610 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-26614 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26642 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26687 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26688 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26689 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26704 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26727 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26733 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26739 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26764 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-26766 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26773 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26792 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26816 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-26898 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26898 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26903 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26903 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27043 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27389 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.4 * openSUSE Leap Micro 5.3 * openSUSE Leap Micro 5.4 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise High Availability Extension 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Live Patching 15-SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3
An update that solves 90 vulnerabilities and has three security fixes can now be installed.
## Description:
The SUSE Linux Enterprise 15 SP4 LTSS kernel was updated to receive various security bugfixes.
The following security bugs were fixed:
* CVE-2024-27389: Fixed pstore inode handling with d_invalidate() (bsc#1223705). * CVE-2024-27043: Fixed a use-after-free in edia/dvbdev in different places (bsc#1223824). * CVE-2024-26816: Ignore relocations in .notes section when building with CONFIG_XEN_PV=y (bsc#1222624). * CVE-2024-26773: Fixed ext4 block allocation from corrupted group in ext4_mb_try_best_found() (bsc#1222618). * CVE-2024-26766: Fixed SDMA off-by-one error in _pad_sdma_tx_descs() (bsc#1222726). * CVE-2024-26764: Fixed IOCB_AIO_RW check in fs/aio before the struct aio_kiocb conversion (bsc#1222721). * CVE-2024-26733: Fixed an overflow in arp_req_get() in arp (bsc#1222585). * CVE-2024-26727: Fixed assertion if a newly created btrfs subvolume already gets read (bsc#1222536). * CVE-2024-26704: Fixed a double-free of blocks due to wrong extents moved_len in ext4 (bsc#1222422). * CVE-2024-26689: Fixed a use-after-free in encode_cap_msg() (bsc#1222503). * CVE-2024-26687: Fixed xen/events close evtchn after mapping cleanup (bsc#1222435). * CVE-2024-26642: Fixed the set of anonymous timeout flag in netfilter nf_tables (bsc#1221830). * CVE-2024-26614: Fixed the initialization of accept_queue's spinlocks (bsc#1221293). * CVE-2024-26610: Fixed memory corruption in wifi/iwlwifi (bsc#1221299). * CVE-2024-26601: Fixed ext4 buddy bitmap corruption via fast commit replay (bsc#1220342). * CVE-2024-25742: Fixed insufficient validation during #VC instruction emulation in x86/sev (bsc#1221725). * CVE-2024-23850: Fixed double free of anonymous device after snapshot creation failure (bsc#1219126). * CVE-2024-23307: Fixed Integer Overflow or Wraparound vulnerability in x86 and ARM md, raid, raid5 modules (bsc#1219169). * CVE-2024-22099: Fixed a null-pointer-dereference in rfcomm_check_security (bsc#1219170). * CVE-2024-0841: Fixed a null pointer dereference in the hugetlbfs_fill_super function in hugetlbfs (HugeTLB pages) functionality (bsc#1219264). * CVE-2023-7192: Fixed a memory leak problem in ctnetlink_create_conntrack in net/netfilter/nf_conntrack_netlink.c (bsc#1218479). * CVE-2023-7042: Fixed a null-pointer-dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev() (bsc#1218336). * CVE-2023-6270: Fixed a use-after-free issue in aoecmd_cfg_pkts (bsc#1218562). * CVE-2023-52628: Fixed 4-byte stack OOB write in nftables (bsc#1222117). * CVE-2023-52616: Fixed unexpected pointer access in crypto/lib/mpi in mpi_ec_init (bsc#1221612). * CVE-2023-52607: Fixed NULL pointer dereference in pgtable_cache_add kasprintf() (bsc#1221061). * CVE-2023-52591: Fixed a possible reiserfs filesystem corruption via directory renaming (bsc#1221044). * CVE-2023-52590: Fixed a possible ocfs2 filesystem corruption via directory renaming (bsc#1221088). * CVE-2023-52500: Fixed information leaking when processing OPC_INB_SET_CONTROLLER_CONFIG command (bsc#1220883). * CVE-2023-52476: Fixed possible unhandled page fault via perf sampling NMI during vsyscall (bsc#1220703). * CVE-2023-4881: Fixed a out-of-bounds write flaw in the netfilter subsystem that could lead to potential information disclosure or a denial of service (bsc#1215221). * CVE-2023-0160: Fixed deadlock flaw in BPF that could allow a local user to potentially crash the system (bsc#1209657). * CVE-2022-48662: Fixed a general protection fault (GPF) in i915_perf_open_ioctl (bsc#1223505). * CVE-2022-48651: Fixed an out-of-bound bug in ipvlan caused by unset skb->mac_header (bsc#1223513). * CVE-2021-47202: Fixed NULL pointer dereferences in of_thermal_ functions (bsc#1222878) * CVE-2021-47195: Fixed use-after-free inside SPI via add_lock mutex (bsc#1222832). * CVE-2021-47189: Fixed denial of service due to memory ordering issues between normal and ordered work functions in btrfs (bsc#1222706). * CVE-2021-47185: Fixed a softlockup issue in flush_to_ldisc in tty tty_buffer (bsc#1222669). * CVE-2021-47183: Fixed a null pointer dereference during link down processing in scsi lpfc (bsc#1192145, bsc#1222664). * CVE-2021-47182: Fixed scsi_mode_sense() buffer length handling (bsc#1222662). * CVE-2021-47181: Fixed a null pointer dereference caused by calling platform_get_resource() (bsc#1222660).
The following non-security bugs were fixed:
* Call flush_delayed_fput() from nfsd main-loop (bsc#1223380). * ibmvfc: make 'max_sectors' a module option (bsc#1216223). * scsi: Update max_hw_sectors on rescan (bsc#1216223).
## Special Instructions and Notes:
* Please reboot the system after installing this update.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product:
* openSUSE Leap Micro 5.4 zypper in -t patch openSUSE-Leap-Micro-5.4-2024-1641=1
* SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-1641=1
* SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-1641=1
* SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-1641=1
* SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-1641=1
* SUSE Linux Enterprise Live Patching 15-SP4 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2024-1641=1 Please note that this is the initial kernel livepatch without fixes itself, this package is later updated by separate standalone kernel livepatch updates.
* SUSE Linux Enterprise High Availability Extension 15 SP4 zypper in -t patch SUSE-SLE-Product-HA-15-SP4-2024-1641=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1641=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1641=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1641=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1641=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1641=1
* SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1641=1
* SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-1641=1
* SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1641=1
* openSUSE Leap 15.4 zypper in -t patch SUSE-2024-1641=1
* openSUSE Leap Micro 5.3 zypper in -t patch openSUSE-Leap-Micro-5.3-2024-1641=1
## Package List:
* openSUSE Leap Micro 5.4 (aarch64 nosrc s390x x86_64) * kernel-default-5.14.21-150400.24.119.1 * openSUSE Leap Micro 5.4 (aarch64 x86_64) * kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1 * openSUSE Leap Micro 5.4 (aarch64 s390x x86_64) * kernel-default-debugsource-5.14.21-150400.24.119.1 * kernel-default-debuginfo-5.14.21-150400.24.119.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 nosrc s390x x86_64) * kernel-default-5.14.21-150400.24.119.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 x86_64) * kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * kernel-default-debugsource-5.14.21-150400.24.119.1 * kernel-default-debuginfo-5.14.21-150400.24.119.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 nosrc s390x x86_64) * kernel-default-5.14.21-150400.24.119.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 x86_64) * kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * kernel-default-debugsource-5.14.21-150400.24.119.1 * kernel-default-debuginfo-5.14.21-150400.24.119.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 nosrc s390x x86_64) * kernel-default-5.14.21-150400.24.119.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 x86_64) * kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * kernel-default-debugsource-5.14.21-150400.24.119.1 * kernel-default-debuginfo-5.14.21-150400.24.119.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 nosrc s390x x86_64) * kernel-default-5.14.21-150400.24.119.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 x86_64) * kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * kernel-default-debugsource-5.14.21-150400.24.119.1 * kernel-default-debuginfo-5.14.21-150400.24.119.1 * SUSE Linux Enterprise Live Patching 15-SP4 (nosrc) * kernel-default-5.14.21-150400.24.119.1 * SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64) * kernel-default-livepatch-devel-5.14.21-150400.24.119.1 * kernel-livepatch-SLE15-SP4_Update_26-debugsource-1-150400.9.3.1 * kernel-default-debugsource-5.14.21-150400.24.119.1 * kernel-default-debuginfo-5.14.21-150400.24.119.1 * kernel-livepatch-5_14_21-150400_24_119-default-1-150400.9.3.1 * kernel-default-livepatch-5.14.21-150400.24.119.1 * kernel-livepatch-5_14_21-150400_24_119-default-debuginfo-1-150400.9.3.1 * SUSE Linux Enterprise High Availability Extension 15 SP4 (aarch64 ppc64le s390x x86_64) * ocfs2-kmp-default-debuginfo-5.14.21-150400.24.119.1 * gfs2-kmp-default-5.14.21-150400.24.119.1 * cluster-md-kmp-default-debuginfo-5.14.21-150400.24.119.1 * ocfs2-kmp-default-5.14.21-150400.24.119.1 * gfs2-kmp-default-debuginfo-5.14.21-150400.24.119.1 * kernel-default-debugsource-5.14.21-150400.24.119.1 * kernel-default-debuginfo-5.14.21-150400.24.119.1 * dlm-kmp-default-debuginfo-5.14.21-150400.24.119.1 * cluster-md-kmp-default-5.14.21-150400.24.119.1 * dlm-kmp-default-5.14.21-150400.24.119.1 * SUSE Linux Enterprise High Availability Extension 15 SP4 (nosrc) * kernel-default-5.14.21-150400.24.119.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 nosrc) * kernel-64kb-5.14.21-150400.24.119.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64) * kernel-64kb-devel-5.14.21-150400.24.119.1 * kernel-64kb-devel-debuginfo-5.14.21-150400.24.119.1 * kernel-64kb-debuginfo-5.14.21-150400.24.119.1 * kernel-64kb-debugsource-5.14.21-150400.24.119.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 nosrc x86_64) * kernel-default-5.14.21-150400.24.119.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * kernel-syms-5.14.21-150400.24.119.1 * kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1 * reiserfs-kmp-default-5.14.21-150400.24.119.1 * kernel-default-debugsource-5.14.21-150400.24.119.1 * kernel-default-debuginfo-5.14.21-150400.24.119.1 * kernel-default-devel-5.14.21-150400.24.119.1 * kernel-default-devel-debuginfo-5.14.21-150400.24.119.1 * kernel-obs-build-5.14.21-150400.24.119.1 * reiserfs-kmp-default-debuginfo-5.14.21-150400.24.119.1 * kernel-obs-build-debugsource-5.14.21-150400.24.119.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * kernel-devel-5.14.21-150400.24.119.1 * kernel-macros-5.14.21-150400.24.119.1 * kernel-source-5.14.21-150400.24.119.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch nosrc) * kernel-docs-5.14.21-150400.24.119.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 nosrc) * kernel-64kb-5.14.21-150400.24.119.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64) * kernel-64kb-devel-5.14.21-150400.24.119.1 * kernel-64kb-devel-debuginfo-5.14.21-150400.24.119.1 * kernel-64kb-debuginfo-5.14.21-150400.24.119.1 * kernel-64kb-debugsource-5.14.21-150400.24.119.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 nosrc x86_64) * kernel-default-5.14.21-150400.24.119.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * kernel-syms-5.14.21-150400.24.119.1 * kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1 * reiserfs-kmp-default-5.14.21-150400.24.119.1 * kernel-default-debugsource-5.14.21-150400.24.119.1 * kernel-default-debuginfo-5.14.21-150400.24.119.1 * kernel-default-devel-5.14.21-150400.24.119.1 * kernel-default-devel-debuginfo-5.14.21-150400.24.119.1 * kernel-obs-build-5.14.21-150400.24.119.1 * reiserfs-kmp-default-debuginfo-5.14.21-150400.24.119.1 * kernel-obs-build-debugsource-5.14.21-150400.24.119.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * kernel-devel-5.14.21-150400.24.119.1 * kernel-macros-5.14.21-150400.24.119.1 * kernel-source-5.14.21-150400.24.119.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch nosrc) * kernel-docs-5.14.21-150400.24.119.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (nosrc x86_64) * kernel-default-5.14.21-150400.24.119.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * kernel-default-extra-5.14.21-150400.24.119.1 * kernel-syms-5.14.21-150400.24.119.1 * kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1 * kernel-default-extra-debuginfo-5.14.21-150400.24.119.1 * kernel-default-debugsource-5.14.21-150400.24.119.1 * kernel-default-debuginfo-5.14.21-150400.24.119.1 * kernel-default-devel-5.14.21-150400.24.119.1 * kernel-default-devel-debuginfo-5.14.21-150400.24.119.1 * kernel-obs-build-5.14.21-150400.24.119.1 * kernel-obs-build-debugsource-5.14.21-150400.24.119.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch) * kernel-devel-5.14.21-150400.24.119.1 * kernel-macros-5.14.21-150400.24.119.1 * kernel-source-5.14.21-150400.24.119.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch nosrc) * kernel-docs-5.14.21-150400.24.119.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 nosrc) * kernel-64kb-5.14.21-150400.24.119.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64) * kernel-64kb-devel-5.14.21-150400.24.119.1 * kernel-64kb-devel-debuginfo-5.14.21-150400.24.119.1 * kernel-64kb-debuginfo-5.14.21-150400.24.119.1 * kernel-64kb-debugsource-5.14.21-150400.24.119.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-5.14.21-150400.24.119.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le x86_64) * kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * kernel-default-devel-debuginfo-5.14.21-150400.24.119.1 * kernel-syms-5.14.21-150400.24.119.1 * reiserfs-kmp-default-5.14.21-150400.24.119.1 * kernel-default-debugsource-5.14.21-150400.24.119.1 * kernel-default-debuginfo-5.14.21-150400.24.119.1 * kernel-obs-build-5.14.21-150400.24.119.1 * kernel-default-devel-5.14.21-150400.24.119.1 * reiserfs-kmp-default-debuginfo-5.14.21-150400.24.119.1 * kernel-obs-build-debugsource-5.14.21-150400.24.119.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch) * kernel-devel-5.14.21-150400.24.119.1 * kernel-macros-5.14.21-150400.24.119.1 * kernel-source-5.14.21-150400.24.119.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch nosrc) * kernel-docs-5.14.21-150400.24.119.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (nosrc s390x) * kernel-zfcpdump-5.14.21-150400.24.119.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (s390x) * kernel-zfcpdump-debugsource-5.14.21-150400.24.119.1 * kernel-zfcpdump-debuginfo-5.14.21-150400.24.119.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (nosrc ppc64le x86_64) * kernel-default-5.14.21-150400.24.119.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * kernel-syms-5.14.21-150400.24.119.1 * kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1 * reiserfs-kmp-default-5.14.21-150400.24.119.1 * kernel-default-debugsource-5.14.21-150400.24.119.1 * kernel-default-debuginfo-5.14.21-150400.24.119.1 * kernel-default-devel-5.14.21-150400.24.119.1 * kernel-default-devel-debuginfo-5.14.21-150400.24.119.1 * kernel-obs-build-5.14.21-150400.24.119.1 * reiserfs-kmp-default-debuginfo-5.14.21-150400.24.119.1 * kernel-obs-build-debugsource-5.14.21-150400.24.119.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * kernel-devel-5.14.21-150400.24.119.1 * kernel-macros-5.14.21-150400.24.119.1 * kernel-source-5.14.21-150400.24.119.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch nosrc) * kernel-docs-5.14.21-150400.24.119.1 * SUSE Manager Proxy 4.3 (nosrc x86_64) * kernel-default-5.14.21-150400.24.119.1 * SUSE Manager Proxy 4.3 (x86_64) * kernel-syms-5.14.21-150400.24.119.1 * kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1 * kernel-default-debugsource-5.14.21-150400.24.119.1 * kernel-default-debuginfo-5.14.21-150400.24.119.1 * kernel-default-devel-5.14.21-150400.24.119.1 * kernel-default-devel-debuginfo-5.14.21-150400.24.119.1 * SUSE Manager Proxy 4.3 (noarch) * kernel-devel-5.14.21-150400.24.119.1 * kernel-macros-5.14.21-150400.24.119.1 * kernel-source-5.14.21-150400.24.119.1 * SUSE Manager Retail Branch Server 4.3 (nosrc x86_64) * kernel-default-5.14.21-150400.24.119.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1 * kernel-default-debugsource-5.14.21-150400.24.119.1 * kernel-default-debuginfo-5.14.21-150400.24.119.1 * kernel-default-devel-5.14.21-150400.24.119.1 * kernel-default-devel-debuginfo-5.14.21-150400.24.119.1 * SUSE Manager Retail Branch Server 4.3 (noarch) * kernel-devel-5.14.21-150400.24.119.1 * kernel-macros-5.14.21-150400.24.119.1 * SUSE Manager Server 4.3 (nosrc ppc64le s390x x86_64) * kernel-default-5.14.21-150400.24.119.1 * SUSE Manager Server 4.3 (ppc64le x86_64) * kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * kernel-syms-5.14.21-150400.24.119.1 * kernel-default-debugsource-5.14.21-150400.24.119.1 * kernel-default-debuginfo-5.14.21-150400.24.119.1 * kernel-default-devel-5.14.21-150400.24.119.1 * kernel-default-devel-debuginfo-5.14.21-150400.24.119.1 * SUSE Manager Server 4.3 (noarch) * kernel-devel-5.14.21-150400.24.119.1 * kernel-macros-5.14.21-150400.24.119.1 * kernel-source-5.14.21-150400.24.119.1 * SUSE Manager Server 4.3 (nosrc s390x) * kernel-zfcpdump-5.14.21-150400.24.119.1 * SUSE Manager Server 4.3 (s390x) * kernel-zfcpdump-debugsource-5.14.21-150400.24.119.1 * kernel-zfcpdump-debuginfo-5.14.21-150400.24.119.1 * openSUSE Leap 15.4 (noarch nosrc) * kernel-docs-5.14.21-150400.24.119.1 * openSUSE Leap 15.4 (noarch) * kernel-devel-5.14.21-150400.24.119.1 * kernel-source-vanilla-5.14.21-150400.24.119.1 * kernel-macros-5.14.21-150400.24.119.1 * kernel-docs-html-5.14.21-150400.24.119.1 * kernel-source-5.14.21-150400.24.119.1 * openSUSE Leap 15.4 (nosrc ppc64le x86_64) * kernel-debug-5.14.21-150400.24.119.1 * openSUSE Leap 15.4 (ppc64le x86_64) * kernel-debug-debuginfo-5.14.21-150400.24.119.1 * kernel-debug-livepatch-devel-5.14.21-150400.24.119.1 * kernel-debug-debugsource-5.14.21-150400.24.119.1 * kernel-debug-devel-5.14.21-150400.24.119.1 * kernel-debug-devel-debuginfo-5.14.21-150400.24.119.1 * openSUSE Leap 15.4 (aarch64 ppc64le x86_64) * kernel-kvmsmall-devel-debuginfo-5.14.21-150400.24.119.1 * kernel-kvmsmall-debugsource-5.14.21-150400.24.119.1 * kernel-kvmsmall-devel-5.14.21-150400.24.119.1 * kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1 * kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.119.1 * kernel-default-base-rebuild-5.14.21-150400.24.119.1.150400.24.56.1 * kernel-kvmsmall-debuginfo-5.14.21-150400.24.119.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64) * cluster-md-kmp-default-debuginfo-5.14.21-150400.24.119.1 * kernel-default-extra-debuginfo-5.14.21-150400.24.119.1 * ocfs2-kmp-default-5.14.21-150400.24.119.1 * gfs2-kmp-default-debuginfo-5.14.21-150400.24.119.1 * kernel-default-debuginfo-5.14.21-150400.24.119.1 * dlm-kmp-default-debuginfo-5.14.21-150400.24.119.1 * kernel-default-devel-5.14.21-150400.24.119.1 * cluster-md-kmp-default-5.14.21-150400.24.119.1 * reiserfs-kmp-default-debuginfo-5.14.21-150400.24.119.1 * kernel-obs-build-debugsource-5.14.21-150400.24.119.1 * kernel-default-extra-5.14.21-150400.24.119.1 * ocfs2-kmp-default-debuginfo-5.14.21-150400.24.119.1 * kernel-obs-qa-5.14.21-150400.24.119.1 * reiserfs-kmp-default-5.14.21-150400.24.119.1 * kernel-obs-build-5.14.21-150400.24.119.1 * kernel-default-livepatch-5.14.21-150400.24.119.1 * dlm-kmp-default-5.14.21-150400.24.119.1 * kernel-default-optional-debuginfo-5.14.21-150400.24.119.1 * kernel-default-optional-5.14.21-150400.24.119.1 * kselftests-kmp-default-5.14.21-150400.24.119.1 * gfs2-kmp-default-5.14.21-150400.24.119.1 * kernel-default-devel-debuginfo-5.14.21-150400.24.119.1 * kernel-default-livepatch-devel-5.14.21-150400.24.119.1 * kselftests-kmp-default-debuginfo-5.14.21-150400.24.119.1 * kernel-syms-5.14.21-150400.24.119.1 * kernel-default-debugsource-5.14.21-150400.24.119.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-5.14.21-150400.24.119.1 * openSUSE Leap 15.4 (aarch64 nosrc ppc64le x86_64) * kernel-kvmsmall-5.14.21-150400.24.119.1 * openSUSE Leap 15.4 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP4_Update_26-debugsource-1-150400.9.3.1 * kernel-livepatch-5_14_21-150400_24_119-default-debuginfo-1-150400.9.3.1 * kernel-livepatch-5_14_21-150400_24_119-default-1-150400.9.3.1 * openSUSE Leap 15.4 (nosrc s390x) * kernel-zfcpdump-5.14.21-150400.24.119.1 * openSUSE Leap 15.4 (s390x) * kernel-zfcpdump-debugsource-5.14.21-150400.24.119.1 * kernel-zfcpdump-debuginfo-5.14.21-150400.24.119.1 * openSUSE Leap 15.4 (nosrc) * dtb-aarch64-5.14.21-150400.24.119.1 * openSUSE Leap 15.4 (aarch64) * dtb-nvidia-5.14.21-150400.24.119.1 * dtb-rockchip-5.14.21-150400.24.119.1 * kselftests-kmp-64kb-5.14.21-150400.24.119.1 * dtb-freescale-5.14.21-150400.24.119.1 * kselftests-kmp-64kb-debuginfo-5.14.21-150400.24.119.1 * dtb-apm-5.14.21-150400.24.119.1 * ocfs2-kmp-64kb-5.14.21-150400.24.119.1 * kernel-64kb-livepatch-devel-5.14.21-150400.24.119.1 * dtb-mediatek-5.14.21-150400.24.119.1 * dtb-amazon-5.14.21-150400.24.119.1 * kernel-64kb-devel-debuginfo-5.14.21-150400.24.119.1 * dlm-kmp-64kb-5.14.21-150400.24.119.1 * kernel-64kb-debugsource-5.14.21-150400.24.119.1 * gfs2-kmp-64kb-5.14.21-150400.24.119.1 * reiserfs-kmp-64kb-debuginfo-5.14.21-150400.24.119.1 * dtb-arm-5.14.21-150400.24.119.1 * dtb-marvell-5.14.21-150400.24.119.1 * dlm-kmp-64kb-debuginfo-5.14.21-150400.24.119.1 * gfs2-kmp-64kb-debuginfo-5.14.21-150400.24.119.1 * dtb-renesas-5.14.21-150400.24.119.1 * reiserfs-kmp-64kb-5.14.21-150400.24.119.1 * dtb-altera-5.14.21-150400.24.119.1 * dtb-lg-5.14.21-150400.24.119.1 * dtb-socionext-5.14.21-150400.24.119.1 * dtb-xilinx-5.14.21-150400.24.119.1 * cluster-md-kmp-64kb-5.14.21-150400.24.119.1 * dtb-amlogic-5.14.21-150400.24.119.1 * dtb-hisilicon-5.14.21-150400.24.119.1 * dtb-broadcom-5.14.21-150400.24.119.1 * dtb-amd-5.14.21-150400.24.119.1 * ocfs2-kmp-64kb-debuginfo-5.14.21-150400.24.119.1 * dtb-exynos-5.14.21-150400.24.119.1 * kernel-64kb-extra-debuginfo-5.14.21-150400.24.119.1 * dtb-cavium-5.14.21-150400.24.119.1 * dtb-apple-5.14.21-150400.24.119.1 * dtb-qcom-5.14.21-150400.24.119.1 * dtb-sprd-5.14.21-150400.24.119.1 * kernel-64kb-optional-debuginfo-5.14.21-150400.24.119.1 * kernel-64kb-debuginfo-5.14.21-150400.24.119.1 * kernel-64kb-optional-5.14.21-150400.24.119.1 * kernel-64kb-devel-5.14.21-150400.24.119.1 * dtb-allwinner-5.14.21-150400.24.119.1 * kernel-64kb-extra-5.14.21-150400.24.119.1 * cluster-md-kmp-64kb-debuginfo-5.14.21-150400.24.119.1 * openSUSE Leap 15.4 (aarch64 nosrc) * kernel-64kb-5.14.21-150400.24.119.1 * openSUSE Leap Micro 5.3 (aarch64 nosrc x86_64) * kernel-default-5.14.21-150400.24.119.1 * openSUSE Leap Micro 5.3 (aarch64 x86_64) * kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1 * kernel-default-debugsource-5.14.21-150400.24.119.1 * kernel-default-debuginfo-5.14.21-150400.24.119.1
## References:
* https://www.suse.com/security/cve/CVE-2021-47047.html * https://www.suse.com/security/cve/CVE-2021-47181.html * https://www.suse.com/security/cve/CVE-2021-47182.html * https://www.suse.com/security/cve/CVE-2021-47183.html * https://www.suse.com/security/cve/CVE-2021-47184.html * https://www.suse.com/security/cve/CVE-2021-47185.html * https://www.suse.com/security/cve/CVE-2021-47187.html * https://www.suse.com/security/cve/CVE-2021-47188.html * https://www.suse.com/security/cve/CVE-2021-47189.html * https://www.suse.com/security/cve/CVE-2021-47191.html * https://www.suse.com/security/cve/CVE-2021-47192.html * https://www.suse.com/security/cve/CVE-2021-47193.html * https://www.suse.com/security/cve/CVE-2021-47194.html * https://www.suse.com/security/cve/CVE-2021-47195.html * https://www.suse.com/security/cve/CVE-2021-47196.html * https://www.suse.com/security/cve/CVE-2021-47197.html * https://www.suse.com/security/cve/CVE-2021-47198.html * https://www.suse.com/security/cve/CVE-2021-47199.html * https://www.suse.com/security/cve/CVE-2021-47200.html * https://www.suse.com/security/cve/CVE-2021-47201.html * https://www.suse.com/security/cve/CVE-2021-47202.html * https://www.suse.com/security/cve/CVE-2021-47203.html * https://www.suse.com/security/cve/CVE-2021-47204.html * https://www.suse.com/security/cve/CVE-2021-47205.html * https://www.suse.com/security/cve/CVE-2021-47206.html * https://www.suse.com/security/cve/CVE-2021-47207.html * https://www.suse.com/security/cve/CVE-2021-47209.html * https://www.suse.com/security/cve/CVE-2021-47210.html * https://www.suse.com/security/cve/CVE-2021-47211.html * https://www.suse.com/security/cve/CVE-2021-47212.html * https://www.suse.com/security/cve/CVE-2021-47215.html * https://www.suse.com/security/cve/CVE-2021-47216.html * https://www.suse.com/security/cve/CVE-2021-47217.html * https://www.suse.com/security/cve/CVE-2021-47218.html * https://www.suse.com/security/cve/CVE-2021-47219.html * https://www.suse.com/security/cve/CVE-2022-48631.html * https://www.suse.com/security/cve/CVE-2022-48637.html * https://www.suse.com/security/cve/CVE-2022-48638.html * https://www.suse.com/security/cve/CVE-2022-48647.html * https://www.suse.com/security/cve/CVE-2022-48648.html * https://www.suse.com/security/cve/CVE-2022-48650.html * https://www.suse.com/security/cve/CVE-2022-48651.html * https://www.suse.com/security/cve/CVE-2022-48653.html * https://www.suse.com/security/cve/CVE-2022-48654.html * https://www.suse.com/security/cve/CVE-2022-48655.html * https://www.suse.com/security/cve/CVE-2022-48656.html * https://www.suse.com/security/cve/CVE-2022-48657.html * https://www.suse.com/security/cve/CVE-2022-48660.html * https://www.suse.com/security/cve/CVE-2022-48662.html * https://www.suse.com/security/cve/CVE-2022-48663.html * https://www.suse.com/security/cve/CVE-2022-48667.html * https://www.suse.com/security/cve/CVE-2022-48668.html * https://www.suse.com/security/cve/CVE-2023-0160.html * https://www.suse.com/security/cve/CVE-2023-4881.html * https://www.suse.com/security/cve/CVE-2023-52476.html * https://www.suse.com/security/cve/CVE-2023-52500.html * https://www.suse.com/security/cve/CVE-2023-52590.html * https://www.suse.com/security/cve/CVE-2023-52591.html * https://www.suse.com/security/cve/CVE-2023-52607.html * https://www.suse.com/security/cve/CVE-2023-52616.html * https://www.suse.com/security/cve/CVE-2023-52628.html * https://www.suse.com/security/cve/CVE-2023-6270.html * https://www.suse.com/security/cve/CVE-2023-7042.html * https://www.suse.com/security/cve/CVE-2023-7192.html * https://www.suse.com/security/cve/CVE-2024-0841.html * https://www.suse.com/security/cve/CVE-2024-22099.html * https://www.suse.com/security/cve/CVE-2024-23307.html * https://www.suse.com/security/cve/CVE-2024-23848.html * https://www.suse.com/security/cve/CVE-2024-23850.html * https://www.suse.com/security/cve/CVE-2024-25742.html * https://www.suse.com/security/cve/CVE-2024-26601.html * https://www.suse.com/security/cve/CVE-2024-26610.html * https://www.suse.com/security/cve/CVE-2024-26614.html * https://www.suse.com/security/cve/CVE-2024-26642.html * https://www.suse.com/security/cve/CVE-2024-26687.html * https://www.suse.com/security/cve/CVE-2024-26688.html * https://www.suse.com/security/cve/CVE-2024-26689.html * https://www.suse.com/security/cve/CVE-2024-26704.html * https://www.suse.com/security/cve/CVE-2024-26727.html * https://www.suse.com/security/cve/CVE-2024-26733.html * https://www.suse.com/security/cve/CVE-2024-26739.html * https://www.suse.com/security/cve/CVE-2024-26764.html * https://www.suse.com/security/cve/CVE-2024-26766.html * https://www.suse.com/security/cve/CVE-2024-26773.html * https://www.suse.com/security/cve/CVE-2024-26792.html * https://www.suse.com/security/cve/CVE-2024-26816.html * https://www.suse.com/security/cve/CVE-2024-26898.html * https://www.suse.com/security/cve/CVE-2024-26903.html * https://www.suse.com/security/cve/CVE-2024-27043.html * https://www.suse.com/security/cve/CVE-2024-27389.html * https://bugzilla.suse.com/show_bug.cgi?id=1192145 * https://bugzilla.suse.com/show_bug.cgi?id=1209657 * https://bugzilla.suse.com/show_bug.cgi?id=1215221 * https://bugzilla.suse.com/show_bug.cgi?id=1216223 * https://bugzilla.suse.com/show_bug.cgi?id=1218336 * https://bugzilla.suse.com/show_bug.cgi?id=1218479 * https://bugzilla.suse.com/show_bug.cgi?id=1218562 * https://bugzilla.suse.com/show_bug.cgi?id=1219104 * https://bugzilla.suse.com/show_bug.cgi?id=1219126 * https://bugzilla.suse.com/show_bug.cgi?id=1219169 * https://bugzilla.suse.com/show_bug.cgi?id=1219170 * https://bugzilla.suse.com/show_bug.cgi?id=1219264 * https://bugzilla.suse.com/show_bug.cgi?id=1220342 * https://bugzilla.suse.com/show_bug.cgi?id=1220703 * https://bugzilla.suse.com/show_bug.cgi?id=1220761 * https://bugzilla.suse.com/show_bug.cgi?id=1220883 * https://bugzilla.suse.com/show_bug.cgi?id=1221044 * https://bugzilla.suse.com/show_bug.cgi?id=1221061 * https://bugzilla.suse.com/show_bug.cgi?id=1221088 * https://bugzilla.suse.com/show_bug.cgi?id=1221293 * https://bugzilla.suse.com/show_bug.cgi?id=1221299 * https://bugzilla.suse.com/show_bug.cgi?id=1221612 * https://bugzilla.suse.com/show_bug.cgi?id=1221725 * https://bugzilla.suse.com/show_bug.cgi?id=1221830 * https://bugzilla.suse.com/show_bug.cgi?id=1222117 * https://bugzilla.suse.com/show_bug.cgi?id=1222422 * https://bugzilla.suse.com/show_bug.cgi?id=1222430 * https://bugzilla.suse.com/show_bug.cgi?id=1222435 * https://bugzilla.suse.com/show_bug.cgi?id=1222482 * https://bugzilla.suse.com/show_bug.cgi?id=1222503 * https://bugzilla.suse.com/show_bug.cgi?id=1222536 * https://bugzilla.suse.com/show_bug.cgi?id=1222559 * https://bugzilla.suse.com/show_bug.cgi?id=1222585 * https://bugzilla.suse.com/show_bug.cgi?id=1222618 * https://bugzilla.suse.com/show_bug.cgi?id=1222624 * https://bugzilla.suse.com/show_bug.cgi?id=1222660 * https://bugzilla.suse.com/show_bug.cgi?id=1222662 * https://bugzilla.suse.com/show_bug.cgi?id=1222664 * https://bugzilla.suse.com/show_bug.cgi?id=1222666 * https://bugzilla.suse.com/show_bug.cgi?id=1222669 * https://bugzilla.suse.com/show_bug.cgi?id=1222671 * https://bugzilla.suse.com/show_bug.cgi?id=1222703 * https://bugzilla.suse.com/show_bug.cgi?id=1222704 * https://bugzilla.suse.com/show_bug.cgi?id=1222706 * https://bugzilla.suse.com/show_bug.cgi?id=1222709 * https://bugzilla.suse.com/show_bug.cgi?id=1222721 * https://bugzilla.suse.com/show_bug.cgi?id=1222726 * https://bugzilla.suse.com/show_bug.cgi?id=1222773 * https://bugzilla.suse.com/show_bug.cgi?id=1222776 * https://bugzilla.suse.com/show_bug.cgi?id=1222785 * https://bugzilla.suse.com/show_bug.cgi?id=1222787 * https://bugzilla.suse.com/show_bug.cgi?id=1222790 * https://bugzilla.suse.com/show_bug.cgi?id=1222791 * https://bugzilla.suse.com/show_bug.cgi?id=1222792 * https://bugzilla.suse.com/show_bug.cgi?id=1222796 * https://bugzilla.suse.com/show_bug.cgi?id=1222824 * https://bugzilla.suse.com/show_bug.cgi?id=1222829 * https://bugzilla.suse.com/show_bug.cgi?id=1222832 * https://bugzilla.suse.com/show_bug.cgi?id=1222836 * https://bugzilla.suse.com/show_bug.cgi?id=1222838 * https://bugzilla.suse.com/show_bug.cgi?id=1222866 * https://bugzilla.suse.com/show_bug.cgi?id=1222867 * https://bugzilla.suse.com/show_bug.cgi?id=1222869 * https://bugzilla.suse.com/show_bug.cgi?id=1222876 * https://bugzilla.suse.com/show_bug.cgi?id=1222878 * https://bugzilla.suse.com/show_bug.cgi?id=1222879 * https://bugzilla.suse.com/show_bug.cgi?id=1222881 * https://bugzilla.suse.com/show_bug.cgi?id=1222883 * https://bugzilla.suse.com/show_bug.cgi?id=1222888 * https://bugzilla.suse.com/show_bug.cgi?id=1222894 * https://bugzilla.suse.com/show_bug.cgi?id=1222901 * https://bugzilla.suse.com/show_bug.cgi?id=1223016 * https://bugzilla.suse.com/show_bug.cgi?id=1223187 * https://bugzilla.suse.com/show_bug.cgi?id=1223380 * https://bugzilla.suse.com/show_bug.cgi?id=1223474 * https://bugzilla.suse.com/show_bug.cgi?id=1223475 * https://bugzilla.suse.com/show_bug.cgi?id=1223477 * https://bugzilla.suse.com/show_bug.cgi?id=1223479 * https://bugzilla.suse.com/show_bug.cgi?id=1223482 * https://bugzilla.suse.com/show_bug.cgi?id=1223484 * https://bugzilla.suse.com/show_bug.cgi?id=1223487 * https://bugzilla.suse.com/show_bug.cgi?id=1223503 * https://bugzilla.suse.com/show_bug.cgi?id=1223505 * https://bugzilla.suse.com/show_bug.cgi?id=1223509 * https://bugzilla.suse.com/show_bug.cgi?id=1223513 * https://bugzilla.suse.com/show_bug.cgi?id=1223516 * https://bugzilla.suse.com/show_bug.cgi?id=1223517 * https://bugzilla.suse.com/show_bug.cgi?id=1223518 * https://bugzilla.suse.com/show_bug.cgi?id=1223519 * https://bugzilla.suse.com/show_bug.cgi?id=1223522 * https://bugzilla.suse.com/show_bug.cgi?id=1223523 * https://bugzilla.suse.com/show_bug.cgi?id=1223705 * https://bugzilla.suse.com/show_bug.cgi?id=1223824
--===============4443567924265903551== Content-Type: text/html; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit
<div class="container"> <h1>Security update for the Linux Kernel</h1>
<table class="table table-striped table-bordered"> <tbody> <tr> <th>Announcement ID:</th> <td>SUSE-SU-2024:1641-1</td> </tr> <tr> <th>Rating:</th> <td>important</td> </tr> <tr> <th>References:</th> <td> <ul> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1192145">bsc#1192145</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1209657">bsc#1209657</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1215221">bsc#1215221</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1216223">bsc#1216223</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1218336">bsc#1218336</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1218479">bsc#1218479</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1218562">bsc#1218562</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1219104">bsc#1219104</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1219126">bsc#1219126</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1219169">bsc#1219169</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1219170">bsc#1219170</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1219264">bsc#1219264</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220342">bsc#1220342</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220703">bsc#1220703</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220761">bsc#1220761</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220883">bsc#1220883</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221044">bsc#1221044</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221061">bsc#1221061</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221088">bsc#1221088</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221293">bsc#1221293</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221299">bsc#1221299</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221612">bsc#1221612</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221725">bsc#1221725</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221830">bsc#1221830</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222117">bsc#1222117</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222422">bsc#1222422</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222430">bsc#1222430</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222435">bsc#1222435</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222482">bsc#1222482</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222503">bsc#1222503</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222536">bsc#1222536</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222559">bsc#1222559</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222585">bsc#1222585</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222618">bsc#1222618</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222624">bsc#1222624</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222660">bsc#1222660</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222662">bsc#1222662</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222664">bsc#1222664</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222666">bsc#1222666</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222669">bsc#1222669</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222671">bsc#1222671</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222703">bsc#1222703</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222704">bsc#1222704</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222706">bsc#1222706</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222709">bsc#1222709</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222721">bsc#1222721</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222726">bsc#1222726</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222773">bsc#1222773</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222776">bsc#1222776</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222785">bsc#1222785</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222787">bsc#1222787</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222790">bsc#1222790</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222791">bsc#1222791</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222792">bsc#1222792</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222796">bsc#1222796</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222824">bsc#1222824</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222829">bsc#1222829</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222832">bsc#1222832</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222836">bsc#1222836</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222838">bsc#1222838</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222866">bsc#1222866</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222867">bsc#1222867</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222869">bsc#1222869</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222876">bsc#1222876</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222878">bsc#1222878</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222879">bsc#1222879</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222881">bsc#1222881</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222883">bsc#1222883</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222888">bsc#1222888</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222894">bsc#1222894</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222901">bsc#1222901</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223016">bsc#1223016</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223187">bsc#1223187</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223380">bsc#1223380</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223474">bsc#1223474</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223475">bsc#1223475</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223477">bsc#1223477</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223479">bsc#1223479</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223482">bsc#1223482</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223484">bsc#1223484</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223487">bsc#1223487</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223503">bsc#1223503</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223505">bsc#1223505</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223509">bsc#1223509</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223513">bsc#1223513</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223516">bsc#1223516</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223517">bsc#1223517</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223518">bsc#1223518</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223519">bsc#1223519</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223522">bsc#1223522</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223523">bsc#1223523</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223705">bsc#1223705</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223824">bsc#1223824</a> </li> </ul> </td> </tr> <tr> <th> Cross-References: </th> <td> <ul> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47047.html">CVE-2021-47047</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47181.html">CVE-2021-47181</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47182.html">CVE-2021-47182</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47183.html">CVE-2021-47183</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47184.html">CVE-2021-47184</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47185.html">CVE-2021-47185</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47187.html">CVE-2021-47187</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47188.html">CVE-2021-47188</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47189.html">CVE-2021-47189</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47191.html">CVE-2021-47191</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47192.html">CVE-2021-47192</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47193.html">CVE-2021-47193</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47194.html">CVE-2021-47194</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47195.html">CVE-2021-47195</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47196.html">CVE-2021-47196</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47197.html">CVE-2021-47197</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47198.html">CVE-2021-47198</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47199.html">CVE-2021-47199</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47200.html">CVE-2021-47200</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47201.html">CVE-2021-47201</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47202.html">CVE-2021-47202</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47203.html">CVE-2021-47203</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47204.html">CVE-2021-47204</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47205.html">CVE-2021-47205</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47206.html">CVE-2021-47206</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47207.html">CVE-2021-47207</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47209.html">CVE-2021-47209</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47210.html">CVE-2021-47210</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47211.html">CVE-2021-47211</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47212.html">CVE-2021-47212</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47215.html">CVE-2021-47215</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47216.html">CVE-2021-47216</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47217.html">CVE-2021-47217</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47218.html">CVE-2021-47218</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47219.html">CVE-2021-47219</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2022-48631.html">CVE-2022-48631</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2022-48637.html">CVE-2022-48637</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2022-48638.html">CVE-2022-48638</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2022-48647.html">CVE-2022-48647</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2022-48648.html">CVE-2022-48648</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2022-48650.html">CVE-2022-48650</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2022-48651.html">CVE-2022-48651</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2022-48653.html">CVE-2022-48653</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2022-48654.html">CVE-2022-48654</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2022-48655.html">CVE-2022-48655</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2022-48656.html">CVE-2022-48656</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2022-48657.html">CVE-2022-48657</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2022-48660.html">CVE-2022-48660</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2022-48662.html">CVE-2022-48662</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2022-48663.html">CVE-2022-48663</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2022-48667.html">CVE-2022-48667</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2022-48668.html">CVE-2022-48668</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-0160.html">CVE-2023-0160</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-4881.html">CVE-2023-4881</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-52476.html">CVE-2023-52476</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-52500.html">CVE-2023-52500</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-52590.html">CVE-2023-52590</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-52591.html">CVE-2023-52591</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-52607.html">CVE-2023-52607</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-52616.html">CVE-2023-52616</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-52628.html">CVE-2023-52628</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-6270.html">CVE-2023-6270</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-7042.html">CVE-2023-7042</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-7192.html">CVE-2023-7192</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-0841.html">CVE-2024-0841</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-22099.html">CVE-2024-22099</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-23307.html">CVE-2024-23307</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-23848.html">CVE-2024-23848</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-23850.html">CVE-2024-23850</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-25742.html">CVE-2024-25742</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-26601.html">CVE-2024-26601</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-26610.html">CVE-2024-26610</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-26614.html">CVE-2024-26614</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-26642.html">CVE-2024-26642</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-26687.html">CVE-2024-26687</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-26688.html">CVE-2024-26688</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-26689.html">CVE-2024-26689</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-26704.html">CVE-2024-26704</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-26727.html">CVE-2024-26727</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-26733.html">CVE-2024-26733</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-26739.html">CVE-2024-26739</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-26764.html">CVE-2024-26764</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-26766.html">CVE-2024-26766</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-26773.html">CVE-2024-26773</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-26792.html">CVE-2024-26792</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-26816.html">CVE-2024-26816</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-26898.html">CVE-2024-26898</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-26903.html">CVE-2024-26903</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-27043.html">CVE-2024-27043</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-27389.html">CVE-2024-27389</a> </li> </ul> </td> </tr> <tr> <th>CVSS scores:</th> <td> <ul class="list-group"> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47181</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47182</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47183</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47184</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47185</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47187</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47188</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47189</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47191</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47193</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47193</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47194</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47194</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47195</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47195</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47196</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47197</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47198</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47198</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47199</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47200</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47201</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47202</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47203</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47204</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47205</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47206</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47207</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47209</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47210</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47211</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47212</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47215</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47216</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">3.3</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47217</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47218</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47219</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2022-48631</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2022-48637</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2022-48638</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2022-48647</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2022-48648</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2022-48650</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.7</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2022-48651</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2022-48653</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">3.3</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2022-48654</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">3.3</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2022-48655</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2022-48655</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2022-48656</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">3.3</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2022-48657</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">3.3</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2022-48660</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">3.3</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2022-48660</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2022-48662</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2022-48662</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2022-48663</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2022-48667</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.4</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2022-48668</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.4</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-0160</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.7</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-0160</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">4.7</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-4881</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.1</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-4881</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">6.1</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-52476</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.7</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-52500</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">3.3</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-52590</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.4</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-52591</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.1</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-52607</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-52616</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-52628</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-6270</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.0</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-6270</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.0</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-7042</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.4</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-7042</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-7192</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.4</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-7192</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">4.4</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-0841</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.4</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-0841</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-22099</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.3</span> <span class="cvss-vector">CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-22099</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-23307</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-23307</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-23848</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.3</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-23848</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-23850</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.1</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-23850</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-25742</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.4</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26601</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26601</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26610</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.1</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26614</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.9</span> <span class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26642</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.7</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26687</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26688</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26689</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26704</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26727</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26733</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26739</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26764</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">3.3</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26766</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26773</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26792</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26816</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26898</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26898</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26903</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26903</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-27043</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-27389</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.7</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> </ul> </td> </tr> <tr> <th>Affected Products:</th> <td> <ul class="list-group"> <li class="list-group-item">openSUSE Leap 15.4</li> <li class="list-group-item">openSUSE Leap Micro 5.3</li> <li class="list-group-item">openSUSE Leap Micro 5.4</li> <li class="list-group-item">SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4</li> <li class="list-group-item">SUSE Linux Enterprise High Availability Extension 15 SP4</li> <li class="list-group-item">SUSE Linux Enterprise High Performance Computing 15 SP4</li> <li class="list-group-item">SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4</li> <li class="list-group-item">SUSE Linux Enterprise High Performance Computing LTSS 15 SP4</li> <li class="list-group-item">SUSE Linux Enterprise Live Patching 15-SP4</li> <li class="list-group-item">SUSE Linux Enterprise Micro 5.3</li> <li class="list-group-item">SUSE Linux Enterprise Micro 5.4</li> <li class="list-group-item">SUSE Linux Enterprise Micro for Rancher 5.3</li> <li class="list-group-item">SUSE Linux Enterprise Micro for Rancher 5.4</li> <li class="list-group-item">SUSE Linux Enterprise Real Time 15 SP4</li> <li class="list-group-item">SUSE Linux Enterprise Server 15 SP4</li> <li class="list-group-item">SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4</li> <li class="list-group-item">SUSE Linux Enterprise Server for SAP Applications 15 SP4</li> <li class="list-group-item">SUSE Manager Proxy 4.3</li> <li class="list-group-item">SUSE Manager Retail Branch Server 4.3</li> <li class="list-group-item">SUSE Manager Server 4.3</li> </ul> </td> </tr> </tbody> </table>
<p>An update that solves 90 vulnerabilities and has three security fixes can now be installed.</p>
<h2>Description:</h2> <p>The SUSE Linux Enterprise 15 SP4 LTSS kernel was updated to receive various security bugfixes.</p> <p>The following security bugs were fixed:</p> <ul> <li>CVE-2024-27389: Fixed pstore inode handling with d_invalidate() (bsc#1223705).</li> <li>CVE-2024-27043: Fixed a use-after-free in edia/dvbdev in different places (bsc#1223824).</li> <li>CVE-2024-26816: Ignore relocations in .notes section when building with CONFIG_XEN_PV=y (bsc#1222624).</li> <li>CVE-2024-26773: Fixed ext4 block allocation from corrupted group in ext4_mb_try_best_found() (bsc#1222618). </li> <li>CVE-2024-26766: Fixed SDMA off-by-one error in _pad_sdma_tx_descs() (bsc#1222726).</li> <li>CVE-2024-26764: Fixed IOCB_AIO_RW check in fs/aio before the struct aio_kiocb conversion (bsc#1222721).</li> <li>CVE-2024-26733: Fixed an overflow in arp_req_get() in arp (bsc#1222585).</li> <li>CVE-2024-26727: Fixed assertion if a newly created btrfs subvolume already gets read (bsc#1222536).</li> <li>CVE-2024-26704: Fixed a double-free of blocks due to wrong extents moved_len in ext4 (bsc#1222422).</li> <li>CVE-2024-26689: Fixed a use-after-free in encode_cap_msg() (bsc#1222503).</li> <li>CVE-2024-26687: Fixed xen/events close evtchn after mapping cleanup (bsc#1222435).</li> <li>CVE-2024-26642: Fixed the set of anonymous timeout flag in netfilter nf_tables (bsc#1221830).</li> <li>CVE-2024-26614: Fixed the initialization of accept_queue's spinlocks (bsc#1221293).</li> <li>CVE-2024-26610: Fixed memory corruption in wifi/iwlwifi (bsc#1221299).</li> <li>CVE-2024-26601: Fixed ext4 buddy bitmap corruption via fast commit replay (bsc#1220342).</li> <li>CVE-2024-25742: Fixed insufficient validation during #VC instruction emulation in x86/sev (bsc#1221725).</li> <li>CVE-2024-23850: Fixed double free of anonymous device after snapshot creation failure (bsc#1219126).</li> <li>CVE-2024-23307: Fixed Integer Overflow or Wraparound vulnerability in x86 and ARM md, raid, raid5 modules (bsc#1219169).</li> <li>CVE-2024-22099: Fixed a null-pointer-dereference in rfcomm_check_security (bsc#1219170).</li> <li>CVE-2024-0841: Fixed a null pointer dereference in the hugetlbfs_fill_super function in hugetlbfs (HugeTLB pages) functionality (bsc#1219264).</li> <li>CVE-2023-7192: Fixed a memory leak problem in ctnetlink_create_conntrack in net/netfilter/nf_conntrack_netlink.c (bsc#1218479).</li> <li>CVE-2023-7042: Fixed a null-pointer-dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev() (bsc#1218336).</li> <li>CVE-2023-6270: Fixed a use-after-free issue in aoecmd_cfg_pkts (bsc#1218562).</li> <li>CVE-2023-52628: Fixed 4-byte stack OOB write in nftables (bsc#1222117).</li> <li>CVE-2023-52616: Fixed unexpected pointer access in crypto/lib/mpi in mpi_ec_init (bsc#1221612).</li> <li>CVE-2023-52607: Fixed NULL pointer dereference in pgtable_cache_add kasprintf() (bsc#1221061).</li> <li>CVE-2023-52591: Fixed a possible reiserfs filesystem corruption via directory renaming (bsc#1221044).</li> <li>CVE-2023-52590: Fixed a possible ocfs2 filesystem corruption via directory renaming (bsc#1221088).</li> <li>CVE-2023-52500: Fixed information leaking when processing OPC_INB_SET_CONTROLLER_CONFIG command (bsc#1220883).</li> <li>CVE-2023-52476: Fixed possible unhandled page fault via perf sampling NMI during vsyscall (bsc#1220703).</li> <li>CVE-2023-4881: Fixed a out-of-bounds write flaw in the netfilter subsystem that could lead to potential information disclosure or a denial of service (bsc#1215221).</li> <li>CVE-2023-0160: Fixed deadlock flaw in BPF that could allow a local user to potentially crash the system (bsc#1209657).</li> <li>CVE-2022-48662: Fixed a general protection fault (GPF) in i915_perf_open_ioctl (bsc#1223505).</li> <li>CVE-2022-48651: Fixed an out-of-bound bug in ipvlan caused by unset skb->mac_header (bsc#1223513).</li> <li>CVE-2021-47202: Fixed NULL pointer dereferences in of_thermal_ functions (bsc#1222878)</li> <li>CVE-2021-47195: Fixed use-after-free inside SPI via add_lock mutex (bsc#1222832).</li> <li>CVE-2021-47189: Fixed denial of service due to memory ordering issues between normal and ordered work functions in btrfs (bsc#1222706).</li> <li>CVE-2021-47185: Fixed a softlockup issue in flush_to_ldisc in tty tty_buffer (bsc#1222669).</li> <li>CVE-2021-47183: Fixed a null pointer dereference during link down processing in scsi lpfc (bsc#1192145, bsc#1222664).</li> <li>CVE-2021-47182: Fixed scsi_mode_sense() buffer length handling (bsc#1222662).</li> <li>CVE-2021-47181: Fixed a null pointer dereference caused by calling platform_get_resource() (bsc#1222660).</li> </ul> <p>The following non-security bugs were fixed:</p> <ul> <li>Call flush_delayed_fput() from nfsd main-loop (bsc#1223380).</li> <li>ibmvfc: make 'max_sectors' a module option (bsc#1216223).</li> <li>scsi: Update max_hw_sectors on rescan (bsc#1216223).</li> </ul>
<h2>Special Instructions and Notes:</h2> <ul> <li>Please reboot the system after installing this update.</li> </ul>
<h2>Patch Instructions:</h2> <p> To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch".<br/>
Alternatively you can run the command listed for your product: </p> <ul class="list-group"> <li class="list-group-item"> openSUSE Leap Micro 5.4 <br/> <code>zypper in -t patch openSUSE-Leap-Micro-5.4-2024-1641=1</code> </li> <li class="list-group-item"> SUSE Linux Enterprise Micro for Rancher 5.3 <br/> <code>zypper in -t patch SUSE-SLE-Micro-5.3-2024-1641=1</code> </li> <li class="list-group-item"> SUSE Linux Enterprise Micro 5.3 <br/> <code>zypper in -t patch SUSE-SLE-Micro-5.3-2024-1641=1</code> </li> <li class="list-group-item"> SUSE Linux Enterprise Micro for Rancher 5.4 <br/> <code>zypper in -t patch SUSE-SLE-Micro-5.4-2024-1641=1</code> </li> <li class="list-group-item"> SUSE Linux Enterprise Micro 5.4 <br/> <code>zypper in -t patch SUSE-SLE-Micro-5.4-2024-1641=1</code> </li> <li class="list-group-item"> SUSE Linux Enterprise Live Patching 15-SP4 <br/> <code>zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2024-1641=1</code> <br/> Please note that this is the initial kernel livepatch without fixes itself, this package is later updated by separate standalone kernel livepatch updates. </li> <li class="list-group-item"> SUSE Linux Enterprise High Availability Extension 15 SP4 <br/> <code>zypper in -t patch SUSE-SLE-Product-HA-15-SP4-2024-1641=1</code> </li> <li class="list-group-item"> SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 <br/> <code>zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1641=1</code> </li> <li class="list-group-item"> SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 <br/> <code>zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1641=1</code> </li> <li class="list-group-item"> SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 <br/> <code>zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1641=1</code> </li> <li class="list-group-item"> SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 <br/> <code>zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1641=1</code> </li> <li class="list-group-item"> SUSE Linux Enterprise Server for SAP Applications 15 SP4 <br/> <code>zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1641=1</code> </li> <li class="list-group-item"> SUSE Manager Proxy 4.3 <br/> <code>zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1641=1</code> </li> <li class="list-group-item"> SUSE Manager Retail Branch Server 4.3 <br/> <code>zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.3-2024-1641=1</code> </li> <li class="list-group-item"> SUSE Manager Server 4.3 <br/> <code>zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1641=1</code> </li> <li class="list-group-item"> openSUSE Leap 15.4 <br/> <code>zypper in -t patch SUSE-2024-1641=1</code> </li> <li class="list-group-item"> openSUSE Leap Micro 5.3 <br/> <code>zypper in -t patch openSUSE-Leap-Micro-5.3-2024-1641=1</code> </li> </ul>
<h2>Package List:</h2> <ul> <li> openSUSE Leap Micro 5.4 (aarch64 nosrc s390x x86_64) <ul> <li>kernel-default-5.14.21-150400.24.119.1</li> </ul> </li> <li> openSUSE Leap Micro 5.4 (aarch64 x86_64) <ul> <li>kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1</li> </ul> </li> <li> openSUSE Leap Micro 5.4 (aarch64 s390x x86_64) <ul> <li>kernel-default-debugsource-5.14.21-150400.24.119.1</li> <li>kernel-default-debuginfo-5.14.21-150400.24.119.1</li> </ul> </li> <li> SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 nosrc s390x x86_64) <ul> <li>kernel-default-5.14.21-150400.24.119.1</li> </ul> </li> <li> SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 x86_64) <ul> <li>kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1</li> </ul> </li> <li> SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) <ul> <li>kernel-default-debugsource-5.14.21-150400.24.119.1</li> <li>kernel-default-debuginfo-5.14.21-150400.24.119.1</li> </ul> </li> <li> SUSE Linux Enterprise Micro 5.3 (aarch64 nosrc s390x x86_64) <ul> <li>kernel-default-5.14.21-150400.24.119.1</li> </ul> </li> <li> SUSE Linux Enterprise Micro 5.3 (aarch64 x86_64) <ul> <li>kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1</li> </ul> </li> <li> SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) <ul> <li>kernel-default-debugsource-5.14.21-150400.24.119.1</li> <li>kernel-default-debuginfo-5.14.21-150400.24.119.1</li> </ul> </li> <li> SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 nosrc s390x x86_64) <ul> <li>kernel-default-5.14.21-150400.24.119.1</li> </ul> </li> <li> SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 x86_64) <ul> <li>kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1</li> </ul> </li> <li> SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) <ul> <li>kernel-default-debugsource-5.14.21-150400.24.119.1</li> <li>kernel-default-debuginfo-5.14.21-150400.24.119.1</li> </ul> </li> <li> SUSE Linux Enterprise Micro 5.4 (aarch64 nosrc s390x x86_64) <ul> <li>kernel-default-5.14.21-150400.24.119.1</li> </ul> </li> <li> SUSE Linux Enterprise Micro 5.4 (aarch64 x86_64) <ul> <li>kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1</li> </ul> </li> <li> SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) <ul> <li>kernel-default-debugsource-5.14.21-150400.24.119.1</li> <li>kernel-default-debuginfo-5.14.21-150400.24.119.1</li> </ul> </li> <li> SUSE Linux Enterprise Live Patching 15-SP4 (nosrc) <ul> <li>kernel-default-5.14.21-150400.24.119.1</li> </ul> </li> <li> SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64) <ul> <li>kernel-default-livepatch-devel-5.14.21-150400.24.119.1</li> <li>kernel-livepatch-SLE15-SP4_Update_26-debugsource-1-150400.9.3.1</li> <li>kernel-default-debugsource-5.14.21-150400.24.119.1</li> <li>kernel-default-debuginfo-5.14.21-150400.24.119.1</li> <li>kernel-livepatch-5_14_21-150400_24_119-default-1-150400.9.3.1</li> <li>kernel-default-livepatch-5.14.21-150400.24.119.1</li> <li>kernel-livepatch-5_14_21-150400_24_119-default-debuginfo-1-150400.9.3.1</li> </ul> </li> <li> SUSE Linux Enterprise High Availability Extension 15 SP4 (aarch64 ppc64le s390x x86_64) <ul> <li>ocfs2-kmp-default-debuginfo-5.14.21-150400.24.119.1</li> <li>gfs2-kmp-default-5.14.21-150400.24.119.1</li> <li>cluster-md-kmp-default-debuginfo-5.14.21-150400.24.119.1</li> <li>ocfs2-kmp-default-5.14.21-150400.24.119.1</li> <li>gfs2-kmp-default-debuginfo-5.14.21-150400.24.119.1</li> <li>kernel-default-debugsource-5.14.21-150400.24.119.1</li> <li>kernel-default-debuginfo-5.14.21-150400.24.119.1</li> <li>dlm-kmp-default-debuginfo-5.14.21-150400.24.119.1</li> <li>cluster-md-kmp-default-5.14.21-150400.24.119.1</li> <li>dlm-kmp-default-5.14.21-150400.24.119.1</li> </ul> </li> <li> SUSE Linux Enterprise High Availability Extension 15 SP4 (nosrc) <ul> <li>kernel-default-5.14.21-150400.24.119.1</li> </ul> </li> <li> SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 nosrc) <ul> <li>kernel-64kb-5.14.21-150400.24.119.1</li> </ul> </li> <li> SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64) <ul> <li>kernel-64kb-devel-5.14.21-150400.24.119.1</li> <li>kernel-64kb-devel-debuginfo-5.14.21-150400.24.119.1</li> <li>kernel-64kb-debuginfo-5.14.21-150400.24.119.1</li> <li>kernel-64kb-debugsource-5.14.21-150400.24.119.1</li> </ul> </li> <li> SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 nosrc x86_64) <ul> <li>kernel-default-5.14.21-150400.24.119.1</li> </ul> </li> <li> SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) <ul> <li>kernel-syms-5.14.21-150400.24.119.1</li> <li>kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1</li> <li>reiserfs-kmp-default-5.14.21-150400.24.119.1</li> <li>kernel-default-debugsource-5.14.21-150400.24.119.1</li> <li>kernel-default-debuginfo-5.14.21-150400.24.119.1</li> <li>kernel-default-devel-5.14.21-150400.24.119.1</li> <li>kernel-default-devel-debuginfo-5.14.21-150400.24.119.1</li> <li>kernel-obs-build-5.14.21-150400.24.119.1</li> <li>reiserfs-kmp-default-debuginfo-5.14.21-150400.24.119.1</li> <li>kernel-obs-build-debugsource-5.14.21-150400.24.119.1</li> </ul> </li> <li> SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) <ul> <li>kernel-devel-5.14.21-150400.24.119.1</li> <li>kernel-macros-5.14.21-150400.24.119.1</li> <li>kernel-source-5.14.21-150400.24.119.1</li> </ul> </li> <li> SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch nosrc) <ul> <li>kernel-docs-5.14.21-150400.24.119.1</li> </ul> </li> <li> SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 nosrc) <ul> <li>kernel-64kb-5.14.21-150400.24.119.1</li> </ul> </li> <li> SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64) <ul> <li>kernel-64kb-devel-5.14.21-150400.24.119.1</li> <li>kernel-64kb-devel-debuginfo-5.14.21-150400.24.119.1</li> <li>kernel-64kb-debuginfo-5.14.21-150400.24.119.1</li> <li>kernel-64kb-debugsource-5.14.21-150400.24.119.1</li> </ul> </li> <li> SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 nosrc x86_64) <ul> <li>kernel-default-5.14.21-150400.24.119.1</li> </ul> </li> <li> SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) <ul> <li>kernel-syms-5.14.21-150400.24.119.1</li> <li>kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1</li> <li>reiserfs-kmp-default-5.14.21-150400.24.119.1</li> <li>kernel-default-debugsource-5.14.21-150400.24.119.1</li> <li>kernel-default-debuginfo-5.14.21-150400.24.119.1</li> <li>kernel-default-devel-5.14.21-150400.24.119.1</li> <li>kernel-default-devel-debuginfo-5.14.21-150400.24.119.1</li> <li>kernel-obs-build-5.14.21-150400.24.119.1</li> <li>reiserfs-kmp-default-debuginfo-5.14.21-150400.24.119.1</li> <li>kernel-obs-build-debugsource-5.14.21-150400.24.119.1</li> </ul> </li> <li> SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) <ul> <li>kernel-devel-5.14.21-150400.24.119.1</li> <li>kernel-macros-5.14.21-150400.24.119.1</li> <li>kernel-source-5.14.21-150400.24.119.1</li> </ul> </li> <li> SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch nosrc) <ul> <li>kernel-docs-5.14.21-150400.24.119.1</li> </ul> </li> <li> SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (nosrc x86_64) <ul> <li>kernel-default-5.14.21-150400.24.119.1</li> </ul> </li> <li> SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) <ul> <li>kernel-default-extra-5.14.21-150400.24.119.1</li> <li>kernel-syms-5.14.21-150400.24.119.1</li> <li>kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1</li> <li>kernel-default-extra-debuginfo-5.14.21-150400.24.119.1</li> <li>kernel-default-debugsource-5.14.21-150400.24.119.1</li> <li>kernel-default-debuginfo-5.14.21-150400.24.119.1</li> <li>kernel-default-devel-5.14.21-150400.24.119.1</li> <li>kernel-default-devel-debuginfo-5.14.21-150400.24.119.1</li> <li>kernel-obs-build-5.14.21-150400.24.119.1</li> <li>kernel-obs-build-debugsource-5.14.21-150400.24.119.1</li> </ul> </li> <li> SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch) <ul> <li>kernel-devel-5.14.21-150400.24.119.1</li> <li>kernel-macros-5.14.21-150400.24.119.1</li> <li>kernel-source-5.14.21-150400.24.119.1</li> </ul> </li> <li> SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch nosrc) <ul> <li>kernel-docs-5.14.21-150400.24.119.1</li> </ul> </li> <li> SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 nosrc) <ul> <li>kernel-64kb-5.14.21-150400.24.119.1</li> </ul> </li> <li> SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64) <ul> <li>kernel-64kb-devel-5.14.21-150400.24.119.1</li> <li>kernel-64kb-devel-debuginfo-5.14.21-150400.24.119.1</li> <li>kernel-64kb-debuginfo-5.14.21-150400.24.119.1</li> <li>kernel-64kb-debugsource-5.14.21-150400.24.119.1</li> </ul> </li> <li> SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64 nosrc) <ul> <li>kernel-default-5.14.21-150400.24.119.1</li> </ul> </li> <li> SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le x86_64) <ul> <li>kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1</li> </ul> </li> <li> SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) <ul> <li>kernel-default-devel-debuginfo-5.14.21-150400.24.119.1</li> <li>kernel-syms-5.14.21-150400.24.119.1</li> <li>reiserfs-kmp-default-5.14.21-150400.24.119.1</li> <li>kernel-default-debugsource-5.14.21-150400.24.119.1</li> <li>kernel-default-debuginfo-5.14.21-150400.24.119.1</li> <li>kernel-obs-build-5.14.21-150400.24.119.1</li> <li>kernel-default-devel-5.14.21-150400.24.119.1</li> <li>reiserfs-kmp-default-debuginfo-5.14.21-150400.24.119.1</li> <li>kernel-obs-build-debugsource-5.14.21-150400.24.119.1</li> </ul> </li> <li> SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch) <ul> <li>kernel-devel-5.14.21-150400.24.119.1</li> <li>kernel-macros-5.14.21-150400.24.119.1</li> <li>kernel-source-5.14.21-150400.24.119.1</li> </ul> </li> <li> SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch nosrc) <ul> <li>kernel-docs-5.14.21-150400.24.119.1</li> </ul> </li> <li> SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (nosrc s390x) <ul> <li>kernel-zfcpdump-5.14.21-150400.24.119.1</li> </ul> </li> <li> SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (s390x) <ul> <li>kernel-zfcpdump-debugsource-5.14.21-150400.24.119.1</li> <li>kernel-zfcpdump-debuginfo-5.14.21-150400.24.119.1</li> </ul> </li> <li> SUSE Linux Enterprise Server for SAP Applications 15 SP4 (nosrc ppc64le x86_64) <ul> <li>kernel-default-5.14.21-150400.24.119.1</li> </ul> </li> <li> SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) <ul> <li>kernel-syms-5.14.21-150400.24.119.1</li> <li>kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1</li> <li>reiserfs-kmp-default-5.14.21-150400.24.119.1</li> <li>kernel-default-debugsource-5.14.21-150400.24.119.1</li> <li>kernel-default-debuginfo-5.14.21-150400.24.119.1</li> <li>kernel-default-devel-5.14.21-150400.24.119.1</li> <li>kernel-default-devel-debuginfo-5.14.21-150400.24.119.1</li> <li>kernel-obs-build-5.14.21-150400.24.119.1</li> <li>reiserfs-kmp-default-debuginfo-5.14.21-150400.24.119.1</li> <li>kernel-obs-build-debugsource-5.14.21-150400.24.119.1</li> </ul> </li> <li> SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) <ul> <li>kernel-devel-5.14.21-150400.24.119.1</li> <li>kernel-macros-5.14.21-150400.24.119.1</li> <li>kernel-source-5.14.21-150400.24.119.1</li> </ul> </li> <li> SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch nosrc) <ul> <li>kernel-docs-5.14.21-150400.24.119.1</li> </ul> </li> <li> SUSE Manager Proxy 4.3 (nosrc x86_64) <ul> <li>kernel-default-5.14.21-150400.24.119.1</li> </ul> </li> <li> SUSE Manager Proxy 4.3 (x86_64) <ul> <li>kernel-syms-5.14.21-150400.24.119.1</li> <li>kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1</li> <li>kernel-default-debugsource-5.14.21-150400.24.119.1</li> <li>kernel-default-debuginfo-5.14.21-150400.24.119.1</li> <li>kernel-default-devel-5.14.21-150400.24.119.1</li> <li>kernel-default-devel-debuginfo-5.14.21-150400.24.119.1</li> </ul> </li> <li> SUSE Manager Proxy 4.3 (noarch) <ul> <li>kernel-devel-5.14.21-150400.24.119.1</li> <li>kernel-macros-5.14.21-150400.24.119.1</li> <li>kernel-source-5.14.21-150400.24.119.1</li> </ul> </li> <li> SUSE Manager Retail Branch Server 4.3 (nosrc x86_64) <ul> <li>kernel-default-5.14.21-150400.24.119.1</li> </ul> </li> <li> SUSE Manager Retail Branch Server 4.3 (x86_64) <ul> <li>kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1</li> <li>kernel-default-debugsource-5.14.21-150400.24.119.1</li> <li>kernel-default-debuginfo-5.14.21-150400.24.119.1</li> <li>kernel-default-devel-5.14.21-150400.24.119.1</li> <li>kernel-default-devel-debuginfo-5.14.21-150400.24.119.1</li> </ul> </li> <li> SUSE Manager Retail Branch Server 4.3 (noarch) <ul> <li>kernel-devel-5.14.21-150400.24.119.1</li> <li>kernel-macros-5.14.21-150400.24.119.1</li> </ul> </li> <li> SUSE Manager Server 4.3 (nosrc ppc64le s390x x86_64) <ul> <li>kernel-default-5.14.21-150400.24.119.1</li> </ul> </li> <li> SUSE Manager Server 4.3 (ppc64le x86_64) <ul> <li>kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1</li> </ul> </li> <li> SUSE Manager Server 4.3 (ppc64le s390x x86_64) <ul> <li>kernel-syms-5.14.21-150400.24.119.1</li> <li>kernel-default-debugsource-5.14.21-150400.24.119.1</li> <li>kernel-default-debuginfo-5.14.21-150400.24.119.1</li> <li>kernel-default-devel-5.14.21-150400.24.119.1</li> <li>kernel-default-devel-debuginfo-5.14.21-150400.24.119.1</li> </ul> </li> <li> SUSE Manager Server 4.3 (noarch) <ul> <li>kernel-devel-5.14.21-150400.24.119.1</li> <li>kernel-macros-5.14.21-150400.24.119.1</li> <li>kernel-source-5.14.21-150400.24.119.1</li> </ul> </li> <li> SUSE Manager Server 4.3 (nosrc s390x) <ul> <li>kernel-zfcpdump-5.14.21-150400.24.119.1</li> </ul> </li> <li> SUSE Manager Server 4.3 (s390x) <ul> <li>kernel-zfcpdump-debugsource-5.14.21-150400.24.119.1</li> <li>kernel-zfcpdump-debuginfo-5.14.21-150400.24.119.1</li> </ul> </li> <li> openSUSE Leap 15.4 (noarch nosrc) <ul> <li>kernel-docs-5.14.21-150400.24.119.1</li> </ul> </li> <li> openSUSE Leap 15.4 (noarch) <ul> <li>kernel-devel-5.14.21-150400.24.119.1</li> <li>kernel-source-vanilla-5.14.21-150400.24.119.1</li> <li>kernel-macros-5.14.21-150400.24.119.1</li> <li>kernel-docs-html-5.14.21-150400.24.119.1</li> <li>kernel-source-5.14.21-150400.24.119.1</li> </ul> </li> <li> openSUSE Leap 15.4 (nosrc ppc64le x86_64) <ul> <li>kernel-debug-5.14.21-150400.24.119.1</li> </ul> </li> <li> openSUSE Leap 15.4 (ppc64le x86_64) <ul> <li>kernel-debug-debuginfo-5.14.21-150400.24.119.1</li> <li>kernel-debug-livepatch-devel-5.14.21-150400.24.119.1</li> <li>kernel-debug-debugsource-5.14.21-150400.24.119.1</li> <li>kernel-debug-devel-5.14.21-150400.24.119.1</li> <li>kernel-debug-devel-debuginfo-5.14.21-150400.24.119.1</li> </ul> </li> <li> openSUSE Leap 15.4 (aarch64 ppc64le x86_64) <ul> <li>kernel-kvmsmall-devel-debuginfo-5.14.21-150400.24.119.1</li> <li>kernel-kvmsmall-debugsource-5.14.21-150400.24.119.1</li> <li>kernel-kvmsmall-devel-5.14.21-150400.24.119.1</li> <li>kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1</li> <li>kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.119.1</li> <li>kernel-default-base-rebuild-5.14.21-150400.24.119.1.150400.24.56.1</li> <li>kernel-kvmsmall-debuginfo-5.14.21-150400.24.119.1</li> </ul> </li> <li> openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64) <ul> <li>cluster-md-kmp-default-debuginfo-5.14.21-150400.24.119.1</li> <li>kernel-default-extra-debuginfo-5.14.21-150400.24.119.1</li> <li>ocfs2-kmp-default-5.14.21-150400.24.119.1</li> <li>gfs2-kmp-default-debuginfo-5.14.21-150400.24.119.1</li> <li>kernel-default-debuginfo-5.14.21-150400.24.119.1</li> <li>dlm-kmp-default-debuginfo-5.14.21-150400.24.119.1</li> <li>kernel-default-devel-5.14.21-150400.24.119.1</li> <li>cluster-md-kmp-default-5.14.21-150400.24.119.1</li> <li>reiserfs-kmp-default-debuginfo-5.14.21-150400.24.119.1</li> <li>kernel-obs-build-debugsource-5.14.21-150400.24.119.1</li> <li>kernel-default-extra-5.14.21-150400.24.119.1</li> <li>ocfs2-kmp-default-debuginfo-5.14.21-150400.24.119.1</li> <li>kernel-obs-qa-5.14.21-150400.24.119.1</li> <li>reiserfs-kmp-default-5.14.21-150400.24.119.1</li> <li>kernel-obs-build-5.14.21-150400.24.119.1</li> <li>kernel-default-livepatch-5.14.21-150400.24.119.1</li> <li>dlm-kmp-default-5.14.21-150400.24.119.1</li> <li>kernel-default-optional-debuginfo-5.14.21-150400.24.119.1</li> <li>kernel-default-optional-5.14.21-150400.24.119.1</li> <li>kselftests-kmp-default-5.14.21-150400.24.119.1</li> <li>gfs2-kmp-default-5.14.21-150400.24.119.1</li> <li>kernel-default-devel-debuginfo-5.14.21-150400.24.119.1</li> <li>kernel-default-livepatch-devel-5.14.21-150400.24.119.1</li> <li>kselftests-kmp-default-debuginfo-5.14.21-150400.24.119.1</li> <li>kernel-syms-5.14.21-150400.24.119.1</li> <li>kernel-default-debugsource-5.14.21-150400.24.119.1</li> </ul> </li> <li> openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 nosrc) <ul> <li>kernel-default-5.14.21-150400.24.119.1</li> </ul> </li> <li> openSUSE Leap 15.4 (aarch64 nosrc ppc64le x86_64) <ul> <li>kernel-kvmsmall-5.14.21-150400.24.119.1</li> </ul> </li> <li> openSUSE Leap 15.4 (ppc64le s390x x86_64) <ul> <li>kernel-livepatch-SLE15-SP4_Update_26-debugsource-1-150400.9.3.1</li> <li>kernel-livepatch-5_14_21-150400_24_119-default-debuginfo-1-150400.9.3.1</li> <li>kernel-livepatch-5_14_21-150400_24_119-default-1-150400.9.3.1</li> </ul> </li> <li> openSUSE Leap 15.4 (nosrc s390x) <ul> <li>kernel-zfcpdump-5.14.21-150400.24.119.1</li> </ul> </li> <li> openSUSE Leap 15.4 (s390x) <ul> <li>kernel-zfcpdump-debugsource-5.14.21-150400.24.119.1</li> <li>kernel-zfcpdump-debuginfo-5.14.21-150400.24.119.1</li> </ul> </li> <li> openSUSE Leap 15.4 (nosrc) <ul> <li>dtb-aarch64-5.14.21-150400.24.119.1</li> </ul> </li> <li> openSUSE Leap 15.4 (aarch64) <ul> <li>dtb-nvidia-5.14.21-150400.24.119.1</li> <li>dtb-rockchip-5.14.21-150400.24.119.1</li> <li>kselftests-kmp-64kb-5.14.21-150400.24.119.1</li> <li>dtb-freescale-5.14.21-150400.24.119.1</li> <li>kselftests-kmp-64kb-debuginfo-5.14.21-150400.24.119.1</li> <li>dtb-apm-5.14.21-150400.24.119.1</li> <li>ocfs2-kmp-64kb-5.14.21-150400.24.119.1</li> <li>kernel-64kb-livepatch-devel-5.14.21-150400.24.119.1</li> <li>dtb-mediatek-5.14.21-150400.24.119.1</li> <li>dtb-amazon-5.14.21-150400.24.119.1</li> <li>kernel-64kb-devel-debuginfo-5.14.21-150400.24.119.1</li> <li>dlm-kmp-64kb-5.14.21-150400.24.119.1</li> <li>kernel-64kb-debugsource-5.14.21-150400.24.119.1</li> <li>gfs2-kmp-64kb-5.14.21-150400.24.119.1</li> <li>reiserfs-kmp-64kb-debuginfo-5.14.21-150400.24.119.1</li> <li>dtb-arm-5.14.21-150400.24.119.1</li> <li>dtb-marvell-5.14.21-150400.24.119.1</li> <li>dlm-kmp-64kb-debuginfo-5.14.21-150400.24.119.1</li> <li>gfs2-kmp-64kb-debuginfo-5.14.21-150400.24.119.1</li> <li>dtb-renesas-5.14.21-150400.24.119.1</li> <li>reiserfs-kmp-64kb-5.14.21-150400.24.119.1</li> <li>dtb-altera-5.14.21-150400.24.119.1</li> <li>dtb-lg-5.14.21-150400.24.119.1</li> <li>dtb-socionext-5.14.21-150400.24.119.1</li> <li>dtb-xilinx-5.14.21-150400.24.119.1</li> <li>cluster-md-kmp-64kb-5.14.21-150400.24.119.1</li> <li>dtb-amlogic-5.14.21-150400.24.119.1</li> <li>dtb-hisilicon-5.14.21-150400.24.119.1</li> <li>dtb-broadcom-5.14.21-150400.24.119.1</li> <li>dtb-amd-5.14.21-150400.24.119.1</li> <li>ocfs2-kmp-64kb-debuginfo-5.14.21-150400.24.119.1</li> <li>dtb-exynos-5.14.21-150400.24.119.1</li> <li>kernel-64kb-extra-debuginfo-5.14.21-150400.24.119.1</li> <li>dtb-cavium-5.14.21-150400.24.119.1</li> <li>dtb-apple-5.14.21-150400.24.119.1</li> <li>dtb-qcom-5.14.21-150400.24.119.1</li> <li>dtb-sprd-5.14.21-150400.24.119.1</li> <li>kernel-64kb-optional-debuginfo-5.14.21-150400.24.119.1</li> <li>kernel-64kb-debuginfo-5.14.21-150400.24.119.1</li> <li>kernel-64kb-optional-5.14.21-150400.24.119.1</li> <li>kernel-64kb-devel-5.14.21-150400.24.119.1</li> <li>dtb-allwinner-5.14.21-150400.24.119.1</li> <li>kernel-64kb-extra-5.14.21-150400.24.119.1</li> <li>cluster-md-kmp-64kb-debuginfo-5.14.21-150400.24.119.1</li> </ul> </li> <li> openSUSE Leap 15.4 (aarch64 nosrc) <ul> <li>kernel-64kb-5.14.21-150400.24.119.1</li> </ul> </li> <li> openSUSE Leap Micro 5.3 (aarch64 nosrc x86_64) <ul> <li>kernel-default-5.14.21-150400.24.119.1</li> </ul> </li> <li> openSUSE Leap Micro 5.3 (aarch64 x86_64) <ul> <li>kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1</li> <li>kernel-default-debugsource-5.14.21-150400.24.119.1</li> <li>kernel-default-debuginfo-5.14.21-150400.24.119.1</li> </ul> </li> </ul>
<h2>References:</h2> <ul> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47047.html">https://www.suse.com/security/cve/CVE-2021-47047.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47181.html">https://www.suse.com/security/cve/CVE-2021-47181.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47182.html">https://www.suse.com/security/cve/CVE-2021-47182.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47183.html">https://www.suse.com/security/cve/CVE-2021-47183.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47184.html">https://www.suse.com/security/cve/CVE-2021-47184.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47185.html">https://www.suse.com/security/cve/CVE-2021-47185.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47187.html">https://www.suse.com/security/cve/CVE-2021-47187.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47188.html">https://www.suse.com/security/cve/CVE-2021-47188.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47189.html">https://www.suse.com/security/cve/CVE-2021-47189.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47191.html">https://www.suse.com/security/cve/CVE-2021-47191.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47192.html">https://www.suse.com/security/cve/CVE-2021-47192.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47193.html">https://www.suse.com/security/cve/CVE-2021-47193.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47194.html">https://www.suse.com/security/cve/CVE-2021-47194.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47195.html">https://www.suse.com/security/cve/CVE-2021-47195.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47196.html">https://www.suse.com/security/cve/CVE-2021-47196.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47197.html">https://www.suse.com/security/cve/CVE-2021-47197.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47198.html">https://www.suse.com/security/cve/CVE-2021-47198.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47199.html">https://www.suse.com/security/cve/CVE-2021-47199.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47200.html">https://www.suse.com/security/cve/CVE-2021-47200.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47201.html">https://www.suse.com/security/cve/CVE-2021-47201.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47202.html">https://www.suse.com/security/cve/CVE-2021-47202.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47203.html">https://www.suse.com/security/cve/CVE-2021-47203.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47204.html">https://www.suse.com/security/cve/CVE-2021-47204.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47205.html">https://www.suse.com/security/cve/CVE-2021-47205.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47206.html">https://www.suse.com/security/cve/CVE-2021-47206.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47207.html">https://www.suse.com/security/cve/CVE-2021-47207.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47209.html">https://www.suse.com/security/cve/CVE-2021-47209.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47210.html">https://www.suse.com/security/cve/CVE-2021-47210.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47211.html">https://www.suse.com/security/cve/CVE-2021-47211.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47212.html">https://www.suse.com/security/cve/CVE-2021-47212.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47215.html">https://www.suse.com/security/cve/CVE-2021-47215.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47216.html">https://www.suse.com/security/cve/CVE-2021-47216.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47217.html">https://www.suse.com/security/cve/CVE-2021-47217.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47218.html">https://www.suse.com/security/cve/CVE-2021-47218.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47219.html">https://www.suse.com/security/cve/CVE-2021-47219.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2022-48631.html">https://www.suse.com/security/cve/CVE-2022-48631.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2022-48637.html">https://www.suse.com/security/cve/CVE-2022-48637.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2022-48638.html">https://www.suse.com/security/cve/CVE-2022-48638.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2022-48647.html">https://www.suse.com/security/cve/CVE-2022-48647.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2022-48648.html">https://www.suse.com/security/cve/CVE-2022-48648.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2022-48650.html">https://www.suse.com/security/cve/CVE-2022-48650.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2022-48651.html">https://www.suse.com/security/cve/CVE-2022-48651.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2022-48653.html">https://www.suse.com/security/cve/CVE-2022-48653.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2022-48654.html">https://www.suse.com/security/cve/CVE-2022-48654.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2022-48655.html">https://www.suse.com/security/cve/CVE-2022-48655.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2022-48656.html">https://www.suse.com/security/cve/CVE-2022-48656.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2022-48657.html">https://www.suse.com/security/cve/CVE-2022-48657.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2022-48660.html">https://www.suse.com/security/cve/CVE-2022-48660.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2022-48662.html">https://www.suse.com/security/cve/CVE-2022-48662.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2022-48663.html">https://www.suse.com/security/cve/CVE-2022-48663.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2022-48667.html">https://www.suse.com/security/cve/CVE-2022-48667.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2022-48668.html">https://www.suse.com/security/cve/CVE-2022-48668.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-0160.html">https://www.suse.com/security/cve/CVE-2023-0160.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-4881.html">https://www.suse.com/security/cve/CVE-2023-4881.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-52476.html">https://www.suse.com/security/cve/CVE-2023-52476.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-52500.html">https://www.suse.com/security/cve/CVE-2023-52500.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-52590.html">https://www.suse.com/security/cve/CVE-2023-52590.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-52591.html">https://www.suse.com/security/cve/CVE-2023-52591.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-52607.html">https://www.suse.com/security/cve/CVE-2023-52607.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-52616.html">https://www.suse.com/security/cve/CVE-2023-52616.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-52628.html">https://www.suse.com/security/cve/CVE-2023-52628.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-6270.html">https://www.suse.com/security/cve/CVE-2023-6270.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-7042.html">https://www.suse.com/security/cve/CVE-2023-7042.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-7192.html">https://www.suse.com/security/cve/CVE-2023-7192.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-0841.html">https://www.suse.com/security/cve/CVE-2024-0841.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-22099.html">https://www.suse.com/security/cve/CVE-2024-22099.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-23307.html">https://www.suse.com/security/cve/CVE-2024-23307.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-23848.html">https://www.suse.com/security/cve/CVE-2024-23848.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-23850.html">https://www.suse.com/security/cve/CVE-2024-23850.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-25742.html">https://www.suse.com/security/cve/CVE-2024-25742.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-26601.html">https://www.suse.com/security/cve/CVE-2024-26601.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-26610.html">https://www.suse.com/security/cve/CVE-2024-26610.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-26614.html">https://www.suse.com/security/cve/CVE-2024-26614.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-26642.html">https://www.suse.com/security/cve/CVE-2024-26642.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-26687.html">https://www.suse.com/security/cve/CVE-2024-26687.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-26688.html">https://www.suse.com/security/cve/CVE-2024-26688.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-26689.html">https://www.suse.com/security/cve/CVE-2024-26689.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-26704.html">https://www.suse.com/security/cve/CVE-2024-26704.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-26727.html">https://www.suse.com/security/cve/CVE-2024-26727.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-26733.html">https://www.suse.com/security/cve/CVE-2024-26733.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-26739.html">https://www.suse.com/security/cve/CVE-2024-26739.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-26764.html">https://www.suse.com/security/cve/CVE-2024-26764.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-26766.html">https://www.suse.com/security/cve/CVE-2024-26766.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-26773.html">https://www.suse.com/security/cve/CVE-2024-26773.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-26792.html">https://www.suse.com/security/cve/CVE-2024-26792.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-26816.html">https://www.suse.com/security/cve/CVE-2024-26816.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-26898.html">https://www.suse.com/security/cve/CVE-2024-26898.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-26903.html">https://www.suse.com/security/cve/CVE-2024-26903.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-27043.html">https://www.suse.com/security/cve/CVE-2024-27043.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-27389.html">https://www.suse.com/security/cve/CVE-2024-27389.html</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1192145">https://bugzilla.suse.com/show_bug.cgi?id=1192145</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1209657">https://bugzilla.suse.com/show_bug.cgi?id=1209657</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1215221">https://bugzilla.suse.com/show_bug.cgi?id=1215221</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1216223">https://bugzilla.suse.com/show_bug.cgi?id=1216223</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1218336">https://bugzilla.suse.com/show_bug.cgi?id=1218336</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1218479">https://bugzilla.suse.com/show_bug.cgi?id=1218479</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1218562">https://bugzilla.suse.com/show_bug.cgi?id=1218562</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1219104">https://bugzilla.suse.com/show_bug.cgi?id=1219104</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1219126">https://bugzilla.suse.com/show_bug.cgi?id=1219126</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1219169">https://bugzilla.suse.com/show_bug.cgi?id=1219169</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1219170">https://bugzilla.suse.com/show_bug.cgi?id=1219170</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1219264">https://bugzilla.suse.com/show_bug.cgi?id=1219264</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220342">https://bugzilla.suse.com/show_bug.cgi?id=1220342</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220703">https://bugzilla.suse.com/show_bug.cgi?id=1220703</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220761">https://bugzilla.suse.com/show_bug.cgi?id=1220761</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220883">https://bugzilla.suse.com/show_bug.cgi?id=1220883</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221044">https://bugzilla.suse.com/show_bug.cgi?id=1221044</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221061">https://bugzilla.suse.com/show_bug.cgi?id=1221061</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221088">https://bugzilla.suse.com/show_bug.cgi?id=1221088</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221293">https://bugzilla.suse.com/show_bug.cgi?id=1221293</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221299">https://bugzilla.suse.com/show_bug.cgi?id=1221299</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221612">https://bugzilla.suse.com/show_bug.cgi?id=1221612</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221725">https://bugzilla.suse.com/show_bug.cgi?id=1221725</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221830">https://bugzilla.suse.com/show_bug.cgi?id=1221830</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222117">https://bugzilla.suse.com/show_bug.cgi?id=1222117</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222422">https://bugzilla.suse.com/show_bug.cgi?id=1222422</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222430">https://bugzilla.suse.com/show_bug.cgi?id=1222430</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222435">https://bugzilla.suse.com/show_bug.cgi?id=1222435</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222482">https://bugzilla.suse.com/show_bug.cgi?id=1222482</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222503">https://bugzilla.suse.com/show_bug.cgi?id=1222503</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222536">https://bugzilla.suse.com/show_bug.cgi?id=1222536</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222559">https://bugzilla.suse.com/show_bug.cgi?id=1222559</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222585">https://bugzilla.suse.com/show_bug.cgi?id=1222585</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222618">https://bugzilla.suse.com/show_bug.cgi?id=1222618</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222624">https://bugzilla.suse.com/show_bug.cgi?id=1222624</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222660">https://bugzilla.suse.com/show_bug.cgi?id=1222660</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222662">https://bugzilla.suse.com/show_bug.cgi?id=1222662</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222664">https://bugzilla.suse.com/show_bug.cgi?id=1222664</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222666">https://bugzilla.suse.com/show_bug.cgi?id=1222666</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222669">https://bugzilla.suse.com/show_bug.cgi?id=1222669</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222671">https://bugzilla.suse.com/show_bug.cgi?id=1222671</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222703">https://bugzilla.suse.com/show_bug.cgi?id=1222703</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222704">https://bugzilla.suse.com/show_bug.cgi?id=1222704</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222706">https://bugzilla.suse.com/show_bug.cgi?id=1222706</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222709">https://bugzilla.suse.com/show_bug.cgi?id=1222709</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222721">https://bugzilla.suse.com/show_bug.cgi?id=1222721</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222726">https://bugzilla.suse.com/show_bug.cgi?id=1222726</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222773">https://bugzilla.suse.com/show_bug.cgi?id=1222773</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222776">https://bugzilla.suse.com/show_bug.cgi?id=1222776</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222785">https://bugzilla.suse.com/show_bug.cgi?id=1222785</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222787">https://bugzilla.suse.com/show_bug.cgi?id=1222787</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222790">https://bugzilla.suse.com/show_bug.cgi?id=1222790</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222791">https://bugzilla.suse.com/show_bug.cgi?id=1222791</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222792">https://bugzilla.suse.com/show_bug.cgi?id=1222792</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222796">https://bugzilla.suse.com/show_bug.cgi?id=1222796</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222824">https://bugzilla.suse.com/show_bug.cgi?id=1222824</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222829">https://bugzilla.suse.com/show_bug.cgi?id=1222829</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222832">https://bugzilla.suse.com/show_bug.cgi?id=1222832</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222836">https://bugzilla.suse.com/show_bug.cgi?id=1222836</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222838">https://bugzilla.suse.com/show_bug.cgi?id=1222838</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222866">https://bugzilla.suse.com/show_bug.cgi?id=1222866</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222867">https://bugzilla.suse.com/show_bug.cgi?id=1222867</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222869">https://bugzilla.suse.com/show_bug.cgi?id=1222869</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222876">https://bugzilla.suse.com/show_bug.cgi?id=1222876</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222878">https://bugzilla.suse.com/show_bug.cgi?id=1222878</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222879">https://bugzilla.suse.com/show_bug.cgi?id=1222879</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222881">https://bugzilla.suse.com/show_bug.cgi?id=1222881</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222883">https://bugzilla.suse.com/show_bug.cgi?id=1222883</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222888">https://bugzilla.suse.com/show_bug.cgi?id=1222888</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222894">https://bugzilla.suse.com/show_bug.cgi?id=1222894</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222901">https://bugzilla.suse.com/show_bug.cgi?id=1222901</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223016">https://bugzilla.suse.com/show_bug.cgi?id=1223016</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223187">https://bugzilla.suse.com/show_bug.cgi?id=1223187</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223380">https://bugzilla.suse.com/show_bug.cgi?id=1223380</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223474">https://bugzilla.suse.com/show_bug.cgi?id=1223474</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223475">https://bugzilla.suse.com/show_bug.cgi?id=1223475</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223477">https://bugzilla.suse.com/show_bug.cgi?id=1223477</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223479">https://bugzilla.suse.com/show_bug.cgi?id=1223479</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223482">https://bugzilla.suse.com/show_bug.cgi?id=1223482</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223484">https://bugzilla.suse.com/show_bug.cgi?id=1223484</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223487">https://bugzilla.suse.com/show_bug.cgi?id=1223487</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223503">https://bugzilla.suse.com/show_bug.cgi?id=1223503</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223505">https://bugzilla.suse.com/show_bug.cgi?id=1223505</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223509">https://bugzilla.suse.com/show_bug.cgi?id=1223509</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223513">https://bugzilla.suse.com/show_bug.cgi?id=1223513</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223516">https://bugzilla.suse.com/show_bug.cgi?id=1223516</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223517">https://bugzilla.suse.com/show_bug.cgi?id=1223517</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223518">https://bugzilla.suse.com/show_bug.cgi?id=1223518</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223519">https://bugzilla.suse.com/show_bug.cgi?id=1223519</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223522">https://bugzilla.suse.com/show_bug.cgi?id=1223522</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223523">https://bugzilla.suse.com/show_bug.cgi?id=1223523</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223705">https://bugzilla.suse.com/show_bug.cgi?id=1223705</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1223824">https://bugzilla.suse.com/show_bug.cgi?id=1223824</a> </li> </ul> </div>
--===============4443567924265903551==--
|
|
|
|