drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Mehrere Probleme in Linux
Name: |
Mehrere Probleme in Linux |
|
ID: |
SUSE-SU-2024:1489-1 |
|
Distribution: |
SUSE |
|
Plattformen: |
SUSE Linux Enterprise Micro 5.1, SUSE Manager Server 4.2, SUSE Manager Proxy 4.2, SUSE Manager Retail Branch Server 4.2, SUSE Linux Enterprise Micro 5.2, SUSE Enterprise Storage 7.1, SUSE Linux Enterprise High Performance Computing 15 SP3, SUSE Linux Enterprise Server 15 SP3, SUSE Linux Enterprise Server for SAP Applications 15 SP3, SUSE Linux Enterprise High Performance Computing LTSS 15 SP3, SUSE Linux Enterprise Micro for Rancher 5.2, SUSE Linux Enterprise High Availability Extension 15 SP3, SUSE Linux Enterprise Server 15 SP3 Business Critical Linux 15-SP3, SUSE Linux Enterprise Live Patching 15-SP3, SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3, SUSE openSUSE Leap 15.3 |
|
Datum: |
Mo, 19. August 2024, 20:03 |
|
Referenzen: |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46956
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46998
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52575
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26600
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47173
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47164
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47056
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47160
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6531
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47038
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47003
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26704
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47095
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46944
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47065
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23134
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35827
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47183
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52591
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47017
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47071
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47177
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4744
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52476
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46921
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47138
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47189
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47117
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47174
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47049
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47167
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52509
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47150
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6536
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46971
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47045
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47069
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47171
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47100
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46981
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52469
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47070
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47153
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52470
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29155
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0487
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47001
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52572
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26642
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47101
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47141
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7042
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47068
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47046
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36782
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47170
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52492
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47015
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52590
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46951
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47185
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47165
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46919
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47118
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47181
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47112
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47051
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46922
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6535
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0160
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47044
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46980
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47077
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47175
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47063
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52474
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47026
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52454
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52628
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47161
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47137
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47172
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47097
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52583
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46930
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47176
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47119
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47180
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47061
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46918
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47142
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47009
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46950
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52500
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47110
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46990
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47055
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46911
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26614
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46962
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46959
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47000
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6270
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46939
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47034
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46984
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47169
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46961
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7192
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46976
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1192
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46991
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46908
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47014
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47082
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47166
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46933
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47130
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36781
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47179
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47109
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47136
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46963
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46917
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46938
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47013
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52477
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46983
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36783
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47139
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46960
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52508
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47144
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47058
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46909
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47006
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47087
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26733
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36780
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52607
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47020
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46914
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46988
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28746
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46958
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47168
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47073
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48626
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6356
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47035
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46992
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22099
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46931
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47114
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46943
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47120
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46920 |
|
Applikationen: |
Linux |
|
Originalnachricht |
--===============3656136079492087187== Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit
# Security update for the Linux Kernel
Announcement ID: SUSE-SU-2024:1489-1 Rating: important References:
* bsc#1184942 * bsc#1186060 * bsc#1192145 * bsc#1194516 * bsc#1208995 * bsc#1209635 * bsc#1209657 * bsc#1212514 * bsc#1213456 * bsc#1217987 * bsc#1217988 * bsc#1217989 * bsc#1218336 * bsc#1218447 * bsc#1218479 * bsc#1218562 * bsc#1219170 * bsc#1219264 * bsc#1220320 * bsc#1220340 * bsc#1220366 * bsc#1220400 * bsc#1220411 * bsc#1220413 * bsc#1220414 * bsc#1220425 * bsc#1220426 * bsc#1220429 * bsc#1220432 * bsc#1220442 * bsc#1220445 * bsc#1220465 * bsc#1220468 * bsc#1220475 * bsc#1220484 * bsc#1220486 * bsc#1220487 * bsc#1220516 * bsc#1220521 * bsc#1220528 * bsc#1220529 * bsc#1220532 * bsc#1220554 * bsc#1220556 * bsc#1220557 * bsc#1220560 * bsc#1220561 * bsc#1220566 * bsc#1220575 * bsc#1220580 * bsc#1220583 * bsc#1220611 * bsc#1220615 * bsc#1220621 * bsc#1220625 * bsc#1220630 * bsc#1220631 * bsc#1220638 * bsc#1220639 * bsc#1220640 * bsc#1220641 * bsc#1220662 * bsc#1220663 * bsc#1220669 * bsc#1220670 * bsc#1220677 * bsc#1220678 * bsc#1220685 * bsc#1220687 * bsc#1220688 * bsc#1220692 * bsc#1220697 * bsc#1220703 * bsc#1220706 * bsc#1220733 * bsc#1220734 * bsc#1220739 * bsc#1220743 * bsc#1220745 * bsc#1220749 * bsc#1220751 * bsc#1220753 * bsc#1220758 * bsc#1220759 * bsc#1220764 * bsc#1220768 * bsc#1220769 * bsc#1220777 * bsc#1220779 * bsc#1220785 * bsc#1220790 * bsc#1220794 * bsc#1220824 * bsc#1220826 * bsc#1220829 * bsc#1220836 * bsc#1220846 * bsc#1220850 * bsc#1220861 * bsc#1220871 * bsc#1220883 * bsc#1220946 * bsc#1220954 * bsc#1220969 * bsc#1220979 * bsc#1220982 * bsc#1220985 * bsc#1220987 * bsc#1221015 * bsc#1221044 * bsc#1221058 * bsc#1221061 * bsc#1221077 * bsc#1221088 * bsc#1221276 * bsc#1221293 * bsc#1221532 * bsc#1221534 * bsc#1221541 * bsc#1221548 * bsc#1221552 * bsc#1221575 * bsc#1221605 * bsc#1221606 * bsc#1221608 * bsc#1221830 * bsc#1221931 * bsc#1221932 * bsc#1221934 * bsc#1221935 * bsc#1221949 * bsc#1221952 * bsc#1221965 * bsc#1221966 * bsc#1221969 * bsc#1221973 * bsc#1221974 * bsc#1221978 * bsc#1221989 * bsc#1221990 * bsc#1221991 * bsc#1221992 * bsc#1221993 * bsc#1221994 * bsc#1221996 * bsc#1221997 * bsc#1221998 * bsc#1221999 * bsc#1222000 * bsc#1222001 * bsc#1222002 * bsc#1222003 * bsc#1222004 * bsc#1222117 * bsc#1222422 * bsc#1222585 * bsc#1222619 * bsc#1222660 * bsc#1222664 * bsc#1222669 * bsc#1222706 * jsc#PED-5759 * jsc#SLE-13706 * jsc#SLE-15131 * jsc#SLE-15172 * jsc#SLE-15176
Cross-References:
* CVE-2020-36780 * CVE-2020-36781 * CVE-2020-36782 * CVE-2020-36783 * CVE-2021-23134 * CVE-2021-29155 * CVE-2021-46908 * CVE-2021-46909 * CVE-2021-46911 * CVE-2021-46914 * CVE-2021-46917 * CVE-2021-46918 * CVE-2021-46919 * CVE-2021-46920 * CVE-2021-46921 * CVE-2021-46922 * CVE-2021-46930 * CVE-2021-46931 * CVE-2021-46933 * CVE-2021-46938 * CVE-2021-46939 * CVE-2021-46943 * CVE-2021-46944 * CVE-2021-46950 * CVE-2021-46951 * CVE-2021-46956 * CVE-2021-46958 * CVE-2021-46959 * CVE-2021-46960 * CVE-2021-46961 * CVE-2021-46962 * CVE-2021-46963 * CVE-2021-46971 * CVE-2021-46976 * CVE-2021-46980 * CVE-2021-46981 * CVE-2021-46983 * CVE-2021-46984 * CVE-2021-46988 * CVE-2021-46990 * CVE-2021-46991 * CVE-2021-46992 * CVE-2021-46998 * CVE-2021-47000 * CVE-2021-47001 * CVE-2021-47003 * CVE-2021-47006 * CVE-2021-47009 * CVE-2021-47013 * CVE-2021-47014 * CVE-2021-47015 * CVE-2021-47017 * CVE-2021-47020 * CVE-2021-47026 * CVE-2021-47034 * CVE-2021-47035 * CVE-2021-47038 * CVE-2021-47044 * CVE-2021-47045 * CVE-2021-47046 * CVE-2021-47049 * CVE-2021-47051 * CVE-2021-47055 * CVE-2021-47056 * CVE-2021-47058 * CVE-2021-47061 * CVE-2021-47063 * CVE-2021-47065 * CVE-2021-47068 * CVE-2021-47069 * CVE-2021-47070 * CVE-2021-47071 * CVE-2021-47073 * CVE-2021-47077 * CVE-2021-47082 * CVE-2021-47087 * CVE-2021-47095 * CVE-2021-47097 * CVE-2021-47100 * CVE-2021-47101 * CVE-2021-47109 * CVE-2021-47110 * CVE-2021-47112 * CVE-2021-47114 * CVE-2021-47117 * CVE-2021-47118 * CVE-2021-47119 * CVE-2021-47120 * CVE-2021-47130 * CVE-2021-47136 * CVE-2021-47137 * CVE-2021-47138 * CVE-2021-47139 * CVE-2021-47141 * CVE-2021-47142 * CVE-2021-47144 * CVE-2021-47150 * CVE-2021-47153 * CVE-2021-47160 * CVE-2021-47161 * CVE-2021-47164 * CVE-2021-47165 * CVE-2021-47166 * CVE-2021-47167 * CVE-2021-47168 * CVE-2021-47169 * CVE-2021-47170 * CVE-2021-47171 * CVE-2021-47172 * CVE-2021-47173 * CVE-2021-47174 * CVE-2021-47175 * CVE-2021-47176 * CVE-2021-47177 * CVE-2021-47179 * CVE-2021-47180 * CVE-2021-47181 * CVE-2021-47183 * CVE-2021-47185 * CVE-2021-47189 * CVE-2022-0487 * CVE-2022-4744 * CVE-2022-48626 * CVE-2023-0160 * CVE-2023-1192 * CVE-2023-28746 * CVE-2023-35827 * CVE-2023-52454 * CVE-2023-52469 * CVE-2023-52470 * CVE-2023-52474 * CVE-2023-52476 * CVE-2023-52477 * CVE-2023-52492 * CVE-2023-52500 * CVE-2023-52508 * CVE-2023-52509 * CVE-2023-52572 * CVE-2023-52575 * CVE-2023-52583 * CVE-2023-52590 * CVE-2023-52591 * CVE-2023-52607 * CVE-2023-52628 * CVE-2023-6270 * CVE-2023-6356 * CVE-2023-6531 * CVE-2023-6535 * CVE-2023-6536 * CVE-2023-7042 * CVE-2023-7192 * CVE-2024-22099 * CVE-2024-26600 * CVE-2024-26614 * CVE-2024-26642 * CVE-2024-26704 * CVE-2024-26733
CVSS scores:
* CVE-2020-36780 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2020-36781 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2020-36782 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2020-36783 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-23134 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-23134 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-29155 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2021-29155 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2021-46908 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2021-46908 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-46909 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-46909 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-46911 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2021-46914 ( SUSE ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-46914 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-46917 ( SUSE ): 3.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L * CVE-2021-46917 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2021-46918 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2021-46918 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-46919 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2021-46919 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-46920 ( SUSE ): 1.9 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L * CVE-2021-46920 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2021-46921 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N * CVE-2021-46922 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2021-46922 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-46930 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2021-46930 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-46931 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-46931 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-46933 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2021-46933 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-46938 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H * CVE-2021-46938 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-46939 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-46939 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-46943 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-46943 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-46944 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-46944 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-46950 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2021-46950 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-46951 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2021-46951 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-46956 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-46958 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-46959 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2021-46960 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L * CVE-2021-46961 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-46962 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N * CVE-2021-46963 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-46971 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-46976 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2021-46980 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-46981 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-46983 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-46984 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-46988 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-46990 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-46991 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2021-46992 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2021-46998 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47000 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47001 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47003 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47006 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47009 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H * CVE-2021-47013 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47014 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2021-47015 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47017 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47020 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2021-47026 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47034 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47035 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N * CVE-2021-47038 ( SUSE ): 5.7 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47044 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2021-47045 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47046 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H * CVE-2021-47049 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47051 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N * CVE-2021-47055 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47056 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47058 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H * CVE-2021-47061 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47063 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47065 ( SUSE ): 6.3 CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H * CVE-2021-47068 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47069 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47070 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2021-47071 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2021-47073 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47077 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47082 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47087 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2021-47095 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47097 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47100 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47101 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N * CVE-2021-47109 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47110 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47112 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47114 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47117 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47118 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47119 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47120 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47130 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47136 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2021-47137 ( SUSE ): 6.4 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2021-47138 ( SUSE ): 4.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2021-47139 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47141 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47142 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47144 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47150 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47153 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47160 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47161 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47164 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47164 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47165 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47166 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47167 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47168 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47169 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47170 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47171 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47171 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47172 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47173 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47173 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47174 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47175 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47176 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47177 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47179 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47179 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47180 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47181 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47183 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47185 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47189 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-0487 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-0487 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2022-4744 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-4744 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48626 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2022-48626 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-0160 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-0160 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-1192 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-1192 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-28746 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N * CVE-2023-35827 ( SUSE ): 6.4 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2023-35827 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52454 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52454 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52469 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2023-52469 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52470 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52470 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52474 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2023-52474 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52476 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52477 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52492 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52500 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2023-52508 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52509 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52572 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2023-52575 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52583 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52590 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2023-52591 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-52607 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52628 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6270 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6270 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6356 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-6356 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-6531 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6531 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6535 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-6535 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-6536 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-6536 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-7042 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-7042 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-7192 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-7192 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-22099 ( SUSE ): 5.3 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-22099 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26600 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26600 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26614 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26642 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26704 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26733 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.3 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Availability Extension 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Live Patching 15-SP3 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 Business Critical Linux 15-SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Manager Proxy 4.2 * SUSE Manager Retail Branch Server 4.2 * SUSE Manager Server 4.2
An update that solves 157 vulnerabilities, contains five features and has four security fixes can now be installed.
## Description:
The SUSE Linux Enterprise 15 SP3 LTSS kernel was updated to receive various security bugfixes.
The following security bugs were fixed:
* CVE-2020-36781: Fixed reference leak when pm_runtime_get_sync fails in i2c/imx (bsc#1220557). * CVE-2021-46911: Fixed kernel panic (bsc#1220400). * CVE-2021-46914: Fixed unbalanced device enable/disable in suspend/resume in pci_disable_device() (bsc#1220465). * CVE-2021-46917: Fixed wq cleanup of WQCFG registers in idxd (bsc#1220432). * CVE-2021-46918: Fixed not clearing MSIX permission entry on shutdown in idxd (bsc#1220429). * CVE-2021-46919: Fixed wq size store permission state in idxd (bsc#1220414). * CVE-2021-46920: Fixed clobbering of SWERR overflow bit on writeback (bsc#1220426). * CVE-2021-46922: Fixed TPM reservation for seal/unseal (bsc#1220475). * CVE-2021-46930: Fixed usb/mtu3 list_head check warning (bsc#1220484). * CVE-2021-46931: Fixed wrong type casting in mlx5e_tx_reporter_dump_sq() (bsc#1220486). * CVE-2021-46933: Fixed possible underflow in ffs_data_clear() (bsc#1220487). * CVE-2021-46956: Fixed memory leak in virtio_fs_probe() (bsc#1220516). * CVE-2021-46959: Fixed use-after-free with devm_spi_alloc_* (bsc#1220734). * CVE-2021-46961: Fixed spurious interrup handling (bsc#1220529). * CVE-2021-46971: Fixed unconditional security_locked_down() call (bsc#1220697). * CVE-2021-46976: Fixed crash in auto_retire in drm/i915 (bsc#1220621). * CVE-2021-46980: Fixed not retrieving all the PDOs instead of just the first 4 in usb/typec/ucsi (bsc#1220663). * CVE-2021-46983: Fixed NULL pointer dereference when SEND is completed with error (bsc#1220639). * CVE-2021-46988: Fixed release page in error path to avoid BUG_ON (bsc#1220706). * CVE-2021-47001: Fixed cwnd update ordering in xprtrdma (bsc#1220670). * CVE-2021-47003: Fixed potential null dereference on pointer status in idxd_cmd_exec (bsc#1220677). * CVE-2021-47009: Fixed memory leak on object td (bsc#1220733). * CVE-2021-47014: Fixed wild memory access when clearing fragments in net/sched/act_ct (bsc#1220630). * CVE-2021-47017: Fixed use after free in ath10k_htc_send_bundle (bsc#1220678). * CVE-2021-47026: Fixed not destroying sysfs after removing session from active list (bsc#1220685). * CVE-2021-47035: Fixed wrong WO permissions on second-level paging entries in iommu/vt-d (bsc#1220688). * CVE-2021-47038: Fixed deadlock between hci_dev->lock and socket lock in bluetooth (bsc#1220753). * CVE-2021-47044: Fixed shift-out-of-bounds in load_balance() in sched/fair (bsc#1220759). * CVE-2021-47046: Fixed off by one in hdmi_14_process_transaction() (bsc#1220758). * CVE-2021-47087: Fixed incorrect page free bug in tee/optee (bsc#1220954). * CVE-2021-47095: Fixed missing initialization in ipmi/ssif (bsc#1220979). * CVE-2021-47097: Fixed stack out of bound access in elantech_change_report_id() (bsc#1220982). * CVE-2021-47100: Fixed UAF when uninstall in ipmi (bsc#1220985). * CVE-2021-47101: Fixed uninit-value in asix_mdio_read() (bsc#1220987). * CVE-2021-47109: Fixed NUD_NOARP entries to be forced GCed (bsc#1221534). * CVE-2021-47130: Fixed freeing unallocated p2pmem in nvmet (bsc#1221552). * CVE-2021-47137: Fixed memory corruption in RX ring in net/lantiq (bsc#1221932). * CVE-2021-47150: Fixed the potential memory leak in fec_enet_init() (bsc#1221973). * CVE-2021-47160: Fixed VLAN traffic leaks in dsa: mt7530 (bsc#1221974). * CVE-2021-47164: Fixed null pointer dereference accessing lag dev in net/mlx5e (bsc#1221978). * CVE-2021-47174: Fixed missing check in irq_fpu_usable() (bsc#1221990). * CVE-2021-47175: Fixed OOB access in net/sched/fq_pie (bsc#1222003). * CVE-2021-47181: Fixed a null pointer dereference caused by calling platform_get_resource() (bsc#1222660). * CVE-2021-47183: Fixed a null pointer dereference during link down processing in scsi lpfc (bsc#1192145, bsc#1222664). * CVE-2021-47185: Fixed a softlockup issue in flush_to_ldisc in tty tty_buffer (bsc#1222669). * CVE-2021-47189: Fixed denial of service due to memory ordering issues between normal and ordered work functions in btrfs (bsc#1222706). * CVE-2023-0160: Fixed deadlock flaw in BPF that could allow a local user to potentially crash the system (bsc#1209657). * CVE-2023-28746: Fixed Register File Data Sampling (bsc#1213456). * CVE-2023-52469: Fixed a use-after-free in kv_parse_power_table (bsc#1220411). * CVE-2023-52470: Fixed null-ptr-deref in radeon_crtc_init() (bsc#1220413). * CVE-2023-52474: Fixed a vulnerability with non-PAGE_SIZE-end multi-iovec user SDMA requests (bsc#1220445). * CVE-2023-52476: Fixed possible unhandled page fault via perf sampling NMI during vsyscall (bsc#1220703). * CVE-2023-52492: Fixed a null-pointer-dereference in channel unregistration function __dma_async_device_channel_register() (bsc#1221276). * CVE-2023-52500: Fixed information leaking when processing OPC_INB_SET_CONTROLLER_CONFIG command (bsc#1220883). * CVE-2023-52508: Fixed null pointer dereference in nvme_fc_io_getuuid() (bsc#1221015). * CVE-2023-52575: Fixed SBPB enablement for spec_rstack_overflow=off (bsc#1220871). * CVE-2023-52583: Fixed deadlock or deadcode of misusing dget() inside ceph (bsc#1221058). * CVE-2023-52607: Fixed a null-pointer-dereference in pgtable_cache_add kasprintf() (bsc#1221061). * CVE-2023-52628: Fixed 4-byte stack OOB write in nftables (bsc#1222117). * CVE-2023-6270: Fixed a use-after-free issue in aoecmd_cfg_pkts (bsc#1218562). * CVE-2023-6531: Fixed a use-after-free flaw due to a race problem in the unix garbage collector's deletion of SKB races with unix_stream_read_generic()on the socket that the SKB is queued on (bsc#1218447). * CVE-2023-7042: Fixed a null-pointer-dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev() (bsc#1218336). * CVE-2023-7192: Fixed a memory leak problem in ctnetlink_create_conntrack in net/netfilter/nf_conntrack_netlink.c (bsc#1218479). * CVE-2024-22099: Fixed a null-pointer-dereference in rfcomm_check_security (bsc#1219170). * CVE-2024-26600: Fixed NULL pointer dereference for SRP in phy-omap-usb2 (bsc#1220340). * CVE-2024-26614: Fixed the initialization of accept_queue's spinlocks (bsc#1221293). * CVE-2024-26642: Fixed the set of anonymous timeout flag in netfilter nf_tables (bsc#1221830). * CVE-2024-26704: Fixed a double-free of blocks due to wrong extents moved_len in ext4 (bsc#1222422). * CVE-2024-26733: Fixed an overflow in arp_req_get() in arp (bsc#1222585).
The following non-security bugs were fixed:
* fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super (bsc#1219264). * tty: n_gsm: require CAP_NET_ADMIN to attach N_GSM0710 ldisc (bsc#1222619). * group-source-files.pl: Quote filenames (boo#1221077). * kernel-binary: certs: Avoid trailing space * mm: fix gup_pud_range (bsc#1220824).
## Special Instructions and Notes:
* Please reboot the system after installing this update.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product:
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1489=1
* SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-1489=1
* SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-1489=1
* SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-1489=1
* SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-1489=1
* openSUSE Leap 15.3 zypper in -t patch SUSE-2024-1489=1
* SUSE Linux Enterprise Live Patching 15-SP3 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP3-2024-1489=1
* SUSE Linux Enterprise High Availability Extension 15 SP3 zypper in -t patch SUSE-SLE-Product-HA-15-SP3-2024-1489=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1489=1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1489=1
## Package List:
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (nosrc ppc64le x86_64) * kernel-default-5.3.18-150300.59.158.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * kernel-default-devel-5.3.18-150300.59.158.1 * kernel-syms-5.3.18-150300.59.158.1 * reiserfs-kmp-default-debuginfo-5.3.18-150300.59.158.1 * reiserfs-kmp-default-5.3.18-150300.59.158.1 * kernel-default-debuginfo-5.3.18-150300.59.158.1 * kernel-obs-build-5.3.18-150300.59.158.1 * kernel-default-debugsource-5.3.18-150300.59.158.1 * kernel-default-base-5.3.18-150300.59.158.1.150300.18.92.5 * kernel-obs-build-debugsource-5.3.18-150300.59.158.1 * kernel-default-devel-debuginfo-5.3.18-150300.59.158.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * kernel-source-5.3.18-150300.59.158.1 * kernel-devel-5.3.18-150300.59.158.1 * kernel-macros-5.3.18-150300.59.158.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch nosrc) * kernel-docs-5.3.18-150300.59.158.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (nosrc x86_64) * kernel-preempt-5.3.18-150300.59.158.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (x86_64) * kernel-preempt-devel-debuginfo-5.3.18-150300.59.158.1 * kernel-preempt-devel-5.3.18-150300.59.158.1 * kernel-preempt-debuginfo-5.3.18-150300.59.158.1 * kernel-preempt-debugsource-5.3.18-150300.59.158.1 * SUSE Enterprise Storage 7.1 (aarch64 nosrc) * kernel-64kb-5.3.18-150300.59.158.1 * SUSE Enterprise Storage 7.1 (aarch64) * kernel-64kb-debugsource-5.3.18-150300.59.158.1 * kernel-64kb-devel-5.3.18-150300.59.158.1 * kernel-64kb-devel-debuginfo-5.3.18-150300.59.158.1 * kernel-64kb-debuginfo-5.3.18-150300.59.158.1 * SUSE Enterprise Storage 7.1 (aarch64 nosrc x86_64) * kernel-default-5.3.18-150300.59.158.1 * kernel-preempt-5.3.18-150300.59.158.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * kernel-default-devel-5.3.18-150300.59.158.1 * kernel-preempt-debugsource-5.3.18-150300.59.158.1 * kernel-syms-5.3.18-150300.59.158.1 * kernel-preempt-devel-5.3.18-150300.59.158.1 * reiserfs-kmp-default-debuginfo-5.3.18-150300.59.158.1 * kernel-preempt-debuginfo-5.3.18-150300.59.158.1 * reiserfs-kmp-default-5.3.18-150300.59.158.1 * kernel-default-debuginfo-5.3.18-150300.59.158.1 * kernel-obs-build-5.3.18-150300.59.158.1 * kernel-default-debugsource-5.3.18-150300.59.158.1 * kernel-default-base-5.3.18-150300.59.158.1.150300.18.92.5 * kernel-preempt-devel-debuginfo-5.3.18-150300.59.158.1 * kernel-obs-build-debugsource-5.3.18-150300.59.158.1 * kernel-default-devel-debuginfo-5.3.18-150300.59.158.1 * SUSE Enterprise Storage 7.1 (noarch) * kernel-source-5.3.18-150300.59.158.1 * kernel-devel-5.3.18-150300.59.158.1 * kernel-macros-5.3.18-150300.59.158.1 * SUSE Enterprise Storage 7.1 (noarch nosrc) * kernel-docs-5.3.18-150300.59.158.1 * SUSE Linux Enterprise Micro 5.1 (aarch64 nosrc s390x x86_64) * kernel-default-5.3.18-150300.59.158.1 * SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64) * kernel-default-debuginfo-5.3.18-150300.59.158.1 * kernel-default-debugsource-5.3.18-150300.59.158.1 * kernel-default-base-5.3.18-150300.59.158.1.150300.18.92.5 * SUSE Linux Enterprise Micro 5.2 (aarch64 nosrc s390x x86_64) * kernel-default-5.3.18-150300.59.158.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 x86_64) * kernel-default-base-5.3.18-150300.59.158.1.150300.18.92.5 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * kernel-default-debuginfo-5.3.18-150300.59.158.1 * kernel-default-debugsource-5.3.18-150300.59.158.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 nosrc s390x x86_64) * kernel-default-5.3.18-150300.59.158.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 x86_64) * kernel-default-base-5.3.18-150300.59.158.1.150300.18.92.5 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * kernel-default-debuginfo-5.3.18-150300.59.158.1 * kernel-default-debugsource-5.3.18-150300.59.158.1 * openSUSE Leap 15.3 (noarch nosrc) * kernel-docs-5.3.18-150300.59.158.1 * openSUSE Leap 15.3 (noarch) * kernel-devel-5.3.18-150300.59.158.1 * kernel-docs-html-5.3.18-150300.59.158.1 * kernel-source-vanilla-5.3.18-150300.59.158.1 * kernel-source-5.3.18-150300.59.158.1 * kernel-macros-5.3.18-150300.59.158.1 * openSUSE Leap 15.3 (nosrc ppc64le x86_64) * kernel-kvmsmall-5.3.18-150300.59.158.1 * kernel-debug-5.3.18-150300.59.158.1 * openSUSE Leap 15.3 (ppc64le x86_64) * kernel-kvmsmall-devel-debuginfo-5.3.18-150300.59.158.1 * kernel-debug-devel-5.3.18-150300.59.158.1 * kernel-kvmsmall-debugsource-5.3.18-150300.59.158.1 * kernel-debug-devel-debuginfo-5.3.18-150300.59.158.1 * kernel-debug-debugsource-5.3.18-150300.59.158.1 * kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.158.1 * kernel-kvmsmall-devel-5.3.18-150300.59.158.1 * kernel-debug-debuginfo-5.3.18-150300.59.158.1 * kernel-kvmsmall-debuginfo-5.3.18-150300.59.158.1 * kernel-debug-livepatch-devel-5.3.18-150300.59.158.1 * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64) * kselftests-kmp-default-5.3.18-150300.59.158.1 * dlm-kmp-default-5.3.18-150300.59.158.1 * cluster-md-kmp-default-5.3.18-150300.59.158.1 * kernel-default-base-5.3.18-150300.59.158.1.150300.18.92.5 * kernel-default-extra-debuginfo-5.3.18-150300.59.158.1 * kernel-default-livepatch-5.3.18-150300.59.158.1 * gfs2-kmp-default-debuginfo-5.3.18-150300.59.158.1 * kernel-obs-qa-5.3.18-150300.59.158.1 * kernel-default-devel-5.3.18-150300.59.158.1 * kernel-syms-5.3.18-150300.59.158.1 * reiserfs-kmp-default-debuginfo-5.3.18-150300.59.158.1 * kernel-default-debugsource-5.3.18-150300.59.158.1 * kernel-default-optional-debuginfo-5.3.18-150300.59.158.1 * cluster-md-kmp-default-debuginfo-5.3.18-150300.59.158.1 * kernel-obs-build-debugsource-5.3.18-150300.59.158.1 * gfs2-kmp-default-5.3.18-150300.59.158.1 * kernel-default-livepatch-devel-5.3.18-150300.59.158.1 * kernel-default-extra-5.3.18-150300.59.158.1 * kselftests-kmp-default-debuginfo-5.3.18-150300.59.158.1 * reiserfs-kmp-default-5.3.18-150300.59.158.1 * dlm-kmp-default-debuginfo-5.3.18-150300.59.158.1 * kernel-default-devel-debuginfo-5.3.18-150300.59.158.1 * ocfs2-kmp-default-5.3.18-150300.59.158.1 * kernel-default-base-rebuild-5.3.18-150300.59.158.1.150300.18.92.5 * kernel-default-optional-5.3.18-150300.59.158.1 * kernel-default-debuginfo-5.3.18-150300.59.158.1 * kernel-obs-build-5.3.18-150300.59.158.1 * ocfs2-kmp-default-debuginfo-5.3.18-150300.59.158.1 * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-5.3.18-150300.59.158.1 * openSUSE Leap 15.3 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP3_Update_43-debugsource-1-150300.7.3.5 * kernel-livepatch-5_3_18-150300_59_158-default-1-150300.7.3.5 * kernel-livepatch-5_3_18-150300_59_158-default-debuginfo-1-150300.7.3.5 * openSUSE Leap 15.3 (x86_64) * kernel-livepatch-5_3_18-150300_59_158-preempt-1-150300.7.3.5 * kernel-livepatch-5_3_18-150300_59_158-preempt-debuginfo-1-150300.7.3.5 * openSUSE Leap 15.3 (aarch64 x86_64) * reiserfs-kmp-preempt-debuginfo-5.3.18-150300.59.158.1 * kernel-preempt-livepatch-devel-5.3.18-150300.59.158.1 * kselftests-kmp-preempt-5.3.18-150300.59.158.1 * dlm-kmp-preempt-5.3.18-150300.59.158.1 * kselftests-kmp-preempt-debuginfo-5.3.18-150300.59.158.1 * kernel-preempt-optional-debuginfo-5.3.18-150300.59.158.1 * ocfs2-kmp-preempt-debuginfo-5.3.18-150300.59.158.1 * ocfs2-kmp-preempt-5.3.18-150300.59.158.1 * kernel-preempt-debugsource-5.3.18-150300.59.158.1 * kernel-preempt-debuginfo-5.3.18-150300.59.158.1 * reiserfs-kmp-preempt-5.3.18-150300.59.158.1 * kernel-preempt-extra-5.3.18-150300.59.158.1 * gfs2-kmp-preempt-debuginfo-5.3.18-150300.59.158.1 * cluster-md-kmp-preempt-5.3.18-150300.59.158.1 * cluster-md-kmp-preempt-debuginfo-5.3.18-150300.59.158.1 * kernel-preempt-optional-5.3.18-150300.59.158.1 * kernel-preempt-devel-5.3.18-150300.59.158.1 * dlm-kmp-preempt-debuginfo-5.3.18-150300.59.158.1 * kernel-preempt-extra-debuginfo-5.3.18-150300.59.158.1 * kernel-preempt-devel-debuginfo-5.3.18-150300.59.158.1 * gfs2-kmp-preempt-5.3.18-150300.59.158.1 * openSUSE Leap 15.3 (aarch64 nosrc x86_64) * kernel-preempt-5.3.18-150300.59.158.1 * openSUSE Leap 15.3 (nosrc s390x) * kernel-zfcpdump-5.3.18-150300.59.158.1 * openSUSE Leap 15.3 (s390x) * kernel-zfcpdump-debugsource-5.3.18-150300.59.158.1 * kernel-zfcpdump-debuginfo-5.3.18-150300.59.158.1 * openSUSE Leap 15.3 (nosrc) * dtb-aarch64-5.3.18-150300.59.158.1 * openSUSE Leap 15.3 (aarch64) * gfs2-kmp-64kb-5.3.18-150300.59.158.1 * dtb-al-5.3.18-150300.59.158.1 * dtb-xilinx-5.3.18-150300.59.158.1 * ocfs2-kmp-64kb-5.3.18-150300.59.158.1 * dtb-marvell-5.3.18-150300.59.158.1 * kernel-64kb-extra-5.3.18-150300.59.158.1 * kselftests-kmp-64kb-5.3.18-150300.59.158.1 * dtb-freescale-5.3.18-150300.59.158.1 * dtb-exynos-5.3.18-150300.59.158.1 * dtb-rockchip-5.3.18-150300.59.158.1 * dtb-broadcom-5.3.18-150300.59.158.1 * dtb-arm-5.3.18-150300.59.158.1 * dtb-mediatek-5.3.18-150300.59.158.1 * dlm-kmp-64kb-debuginfo-5.3.18-150300.59.158.1 * kernel-64kb-devel-5.3.18-150300.59.158.1 * kernel-64kb-optional-5.3.18-150300.59.158.1 * dtb-cavium-5.3.18-150300.59.158.1 * dtb-renesas-5.3.18-150300.59.158.1 * dtb-socionext-5.3.18-150300.59.158.1 * cluster-md-kmp-64kb-5.3.18-150300.59.158.1 * kselftests-kmp-64kb-debuginfo-5.3.18-150300.59.158.1 * kernel-64kb-devel-debuginfo-5.3.18-150300.59.158.1 * reiserfs-kmp-64kb-debuginfo-5.3.18-150300.59.158.1 * kernel-64kb-debugsource-5.3.18-150300.59.158.1 * dtb-amlogic-5.3.18-150300.59.158.1 * dtb-apm-5.3.18-150300.59.158.1 * dtb-allwinner-5.3.18-150300.59.158.1 * gfs2-kmp-64kb-debuginfo-5.3.18-150300.59.158.1 * kernel-64kb-extra-debuginfo-5.3.18-150300.59.158.1 * dtb-sprd-5.3.18-150300.59.158.1 * dtb-qcom-5.3.18-150300.59.158.1 * dtb-lg-5.3.18-150300.59.158.1 * kernel-64kb-debuginfo-5.3.18-150300.59.158.1 * reiserfs-kmp-64kb-5.3.18-150300.59.158.1 * ocfs2-kmp-64kb-debuginfo-5.3.18-150300.59.158.1 * dtb-altera-5.3.18-150300.59.158.1 * dtb-nvidia-5.3.18-150300.59.158.1 * cluster-md-kmp-64kb-debuginfo-5.3.18-150300.59.158.1 * kernel-64kb-livepatch-devel-5.3.18-150300.59.158.1 * dtb-hisilicon-5.3.18-150300.59.158.1 * dtb-zte-5.3.18-150300.59.158.1 * dlm-kmp-64kb-5.3.18-150300.59.158.1 * kernel-64kb-optional-debuginfo-5.3.18-150300.59.158.1 * dtb-amd-5.3.18-150300.59.158.1 * openSUSE Leap 15.3 (aarch64 nosrc) * kernel-64kb-5.3.18-150300.59.158.1 * SUSE Linux Enterprise Live Patching 15-SP3 (nosrc) * kernel-default-5.3.18-150300.59.158.1 * SUSE Linux Enterprise Live Patching 15-SP3 (ppc64le s390x x86_64) * kernel-default-debuginfo-5.3.18-150300.59.158.1 * kernel-default-debugsource-5.3.18-150300.59.158.1 * kernel-default-livepatch-5.3.18-150300.59.158.1 * kernel-livepatch-5_3_18-150300_59_158-default-1-150300.7.3.5 * kernel-default-livepatch-devel-5.3.18-150300.59.158.1 * SUSE Linux Enterprise High Availability Extension 15 SP3 (aarch64 ppc64le s390x x86_64) * ocfs2-kmp-default-5.3.18-150300.59.158.1 * dlm-kmp-default-debuginfo-5.3.18-150300.59.158.1 * kernel-default-debuginfo-5.3.18-150300.59.158.1 * dlm-kmp-default-5.3.18-150300.59.158.1 * kernel-default-debugsource-5.3.18-150300.59.158.1 * cluster-md-kmp-default-5.3.18-150300.59.158.1 * ocfs2-kmp-default-debuginfo-5.3.18-150300.59.158.1 * cluster-md-kmp-default-debuginfo-5.3.18-150300.59.158.1 * gfs2-kmp-default-debuginfo-5.3.18-150300.59.158.1 * gfs2-kmp-default-5.3.18-150300.59.158.1 * SUSE Linux Enterprise High Availability Extension 15 SP3 (nosrc) * kernel-default-5.3.18-150300.59.158.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 nosrc) * kernel-64kb-5.3.18-150300.59.158.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64) * kernel-64kb-debugsource-5.3.18-150300.59.158.1 * kernel-64kb-devel-5.3.18-150300.59.158.1 * kernel-64kb-devel-debuginfo-5.3.18-150300.59.158.1 * kernel-64kb-debuginfo-5.3.18-150300.59.158.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 nosrc x86_64) * kernel-default-5.3.18-150300.59.158.1 * kernel-preempt-5.3.18-150300.59.158.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * kernel-default-devel-5.3.18-150300.59.158.1 * kernel-preempt-debugsource-5.3.18-150300.59.158.1 * kernel-syms-5.3.18-150300.59.158.1 * kernel-preempt-devel-5.3.18-150300.59.158.1 * reiserfs-kmp-default-debuginfo-5.3.18-150300.59.158.1 * kernel-preempt-debuginfo-5.3.18-150300.59.158.1 * reiserfs-kmp-default-5.3.18-150300.59.158.1 * kernel-default-debuginfo-5.3.18-150300.59.158.1 * kernel-obs-build-5.3.18-150300.59.158.1 * kernel-default-debugsource-5.3.18-150300.59.158.1 * kernel-default-base-5.3.18-150300.59.158.1.150300.18.92.5 * kernel-preempt-devel-debuginfo-5.3.18-150300.59.158.1 * kernel-obs-build-debugsource-5.3.18-150300.59.158.1 * kernel-default-devel-debuginfo-5.3.18-150300.59.158.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * kernel-source-5.3.18-150300.59.158.1 * kernel-devel-5.3.18-150300.59.158.1 * kernel-macros-5.3.18-150300.59.158.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch nosrc) * kernel-docs-5.3.18-150300.59.158.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 nosrc) * kernel-64kb-5.3.18-150300.59.158.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64) * kernel-64kb-debugsource-5.3.18-150300.59.158.1 * kernel-64kb-devel-5.3.18-150300.59.158.1 * kernel-64kb-devel-debuginfo-5.3.18-150300.59.158.1 * kernel-64kb-debuginfo-5.3.18-150300.59.158.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-5.3.18-150300.59.158.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * kernel-default-devel-5.3.18-150300.59.158.1 * kernel-syms-5.3.18-150300.59.158.1 * reiserfs-kmp-default-debuginfo-5.3.18-150300.59.158.1 * reiserfs-kmp-default-5.3.18-150300.59.158.1 * kernel-default-debuginfo-5.3.18-150300.59.158.1 * kernel-obs-build-5.3.18-150300.59.158.1 * kernel-default-debugsource-5.3.18-150300.59.158.1 * kernel-default-base-5.3.18-150300.59.158.1.150300.18.92.5 * kernel-obs-build-debugsource-5.3.18-150300.59.158.1 * kernel-default-devel-debuginfo-5.3.18-150300.59.158.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch) * kernel-source-5.3.18-150300.59.158.1 * kernel-devel-5.3.18-150300.59.158.1 * kernel-macros-5.3.18-150300.59.158.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch nosrc) * kernel-docs-5.3.18-150300.59.158.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 nosrc x86_64) * kernel-preempt-5.3.18-150300.59.158.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 x86_64) * kernel-preempt-devel-debuginfo-5.3.18-150300.59.158.1 * kernel-preempt-devel-5.3.18-150300.59.158.1 * kernel-preempt-debuginfo-5.3.18-150300.59.158.1 * kernel-preempt-debugsource-5.3.18-150300.59.158.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (nosrc s390x) * kernel-zfcpdump-5.3.18-150300.59.158.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (s390x) * kernel-zfcpdump-debugsource-5.3.18-150300.59.158.1 * kernel-zfcpdump-debuginfo-5.3.18-150300.59.158.1
## References:
* https://www.suse.com/security/cve/CVE-2020-36780.html * https://www.suse.com/security/cve/CVE-2020-36781.html * https://www.suse.com/security/cve/CVE-2020-36782.html * https://www.suse.com/security/cve/CVE-2020-36783.html * https://www.suse.com/security/cve/CVE-2021-23134.html * https://www.suse.com/security/cve/CVE-2021-29155.html * https://www.suse.com/security/cve/CVE-2021-46908.html * https://www.suse.com/security/cve/CVE-2021-46909.html * https://www.suse.com/security/cve/CVE-2021-46911.html * https://www.suse.com/security/cve/CVE-2021-46914.html * https://www.suse.com/security/cve/CVE-2021-46917.html * https://www.suse.com/security/cve/CVE-2021-46918.html * https://www.suse.com/security/cve/CVE-2021-46919.html * https://www.suse.com/security/cve/CVE-2021-46920.html * https://www.suse.com/security/cve/CVE-2021-46921.html * https://www.suse.com/security/cve/CVE-2021-46922.html * https://www.suse.com/security/cve/CVE-2021-46930.html * https://www.suse.com/security/cve/CVE-2021-46931.html * https://www.suse.com/security/cve/CVE-2021-46933.html * https://www.suse.com/security/cve/CVE-2021-46938.html * https://www.suse.com/security/cve/CVE-2021-46939.html * https://www.suse.com/security/cve/CVE-2021-46943.html * https://www.suse.com/security/cve/CVE-2021-46944.html * https://www.suse.com/security/cve/CVE-2021-46950.html * https://www.suse.com/security/cve/CVE-2021-46951.html * https://www.suse.com/security/cve/CVE-2021-46956.html * https://www.suse.com/security/cve/CVE-2021-46958.html * https://www.suse.com/security/cve/CVE-2021-46959.html * https://www.suse.com/security/cve/CVE-2021-46960.html * https://www.suse.com/security/cve/CVE-2021-46961.html * https://www.suse.com/security/cve/CVE-2021-46962.html * https://www.suse.com/security/cve/CVE-2021-46963.html * https://www.suse.com/security/cve/CVE-2021-46971.html * https://www.suse.com/security/cve/CVE-2021-46976.html * https://www.suse.com/security/cve/CVE-2021-46980.html * https://www.suse.com/security/cve/CVE-2021-46981.html * https://www.suse.com/security/cve/CVE-2021-46983.html * https://www.suse.com/security/cve/CVE-2021-46984.html * https://www.suse.com/security/cve/CVE-2021-46988.html * https://www.suse.com/security/cve/CVE-2021-46990.html * https://www.suse.com/security/cve/CVE-2021-46991.html * https://www.suse.com/security/cve/CVE-2021-46992.html * https://www.suse.com/security/cve/CVE-2021-46998.html * https://www.suse.com/security/cve/CVE-2021-47000.html * https://www.suse.com/security/cve/CVE-2021-47001.html * https://www.suse.com/security/cve/CVE-2021-47003.html * https://www.suse.com/security/cve/CVE-2021-47006.html * https://www.suse.com/security/cve/CVE-2021-47009.html * https://www.suse.com/security/cve/CVE-2021-47013.html * https://www.suse.com/security/cve/CVE-2021-47014.html * https://www.suse.com/security/cve/CVE-2021-47015.html * https://www.suse.com/security/cve/CVE-2021-47017.html * https://www.suse.com/security/cve/CVE-2021-47020.html * https://www.suse.com/security/cve/CVE-2021-47026.html * https://www.suse.com/security/cve/CVE-2021-47034.html * https://www.suse.com/security/cve/CVE-2021-47035.html * https://www.suse.com/security/cve/CVE-2021-47038.html * https://www.suse.com/security/cve/CVE-2021-47044.html * https://www.suse.com/security/cve/CVE-2021-47045.html * https://www.suse.com/security/cve/CVE-2021-47046.html * https://www.suse.com/security/cve/CVE-2021-47049.html * https://www.suse.com/security/cve/CVE-2021-47051.html * https://www.suse.com/security/cve/CVE-2021-47055.html * https://www.suse.com/security/cve/CVE-2021-47056.html * https://www.suse.com/security/cve/CVE-2021-47058.html * https://www.suse.com/security/cve/CVE-2021-47061.html * https://www.suse.com/security/cve/CVE-2021-47063.html * https://www.suse.com/security/cve/CVE-2021-47065.html * https://www.suse.com/security/cve/CVE-2021-47068.html * https://www.suse.com/security/cve/CVE-2021-47069.html * https://www.suse.com/security/cve/CVE-2021-47070.html * https://www.suse.com/security/cve/CVE-2021-47071.html * https://www.suse.com/security/cve/CVE-2021-47073.html * https://www.suse.com/security/cve/CVE-2021-47077.html * https://www.suse.com/security/cve/CVE-2021-47082.html * https://www.suse.com/security/cve/CVE-2021-47087.html * https://www.suse.com/security/cve/CVE-2021-47095.html * https://www.suse.com/security/cve/CVE-2021-47097.html * https://www.suse.com/security/cve/CVE-2021-47100.html * https://www.suse.com/security/cve/CVE-2021-47101.html * https://www.suse.com/security/cve/CVE-2021-47109.html * https://www.suse.com/security/cve/CVE-2021-47110.html * https://www.suse.com/security/cve/CVE-2021-47112.html * https://www.suse.com/security/cve/CVE-2021-47114.html * https://www.suse.com/security/cve/CVE-2021-47117.html * https://www.suse.com/security/cve/CVE-2021-47118.html * https://www.suse.com/security/cve/CVE-2021-47119.html * https://www.suse.com/security/cve/CVE-2021-47120.html * https://www.suse.com/security/cve/CVE-2021-47130.html * https://www.suse.com/security/cve/CVE-2021-47136.html * https://www.suse.com/security/cve/CVE-2021-47137.html * https://www.suse.com/security/cve/CVE-2021-47138.html * https://www.suse.com/security/cve/CVE-2021-47139.html * https://www.suse.com/security/cve/CVE-2021-47141.html * https://www.suse.com/security/cve/CVE-2021-47142.html * https://www.suse.com/security/cve/CVE-2021-47144.html * https://www.suse.com/security/cve/CVE-2021-47150.html * https://www.suse.com/security/cve/CVE-2021-47153.html * https://www.suse.com/security/cve/CVE-2021-47160.html * https://www.suse.com/security/cve/CVE-2021-47161.html * https://www.suse.com/security/cve/CVE-2021-47164.html * https://www.suse.com/security/cve/CVE-2021-47165.html * https://www.suse.com/security/cve/CVE-2021-47166.html * https://www.suse.com/security/cve/CVE-2021-47167.html * https://www.suse.com/security/cve/CVE-2021-47168.html * https://www.suse.com/security/cve/CVE-2021-47169.html * https://www.suse.com/security/cve/CVE-2021-47170.html * https://www.suse.com/security/cve/CVE-2021-47171.html * https://www.suse.com/security/cve/CVE-2021-47172.html * https://www.suse.com/security/cve/CVE-2021-47173.html * https://www.suse.com/security/cve/CVE-2021-47174.html * https://www.suse.com/security/cve/CVE-2021-47175.html * https://www.suse.com/security/cve/CVE-2021-47176.html * https://www.suse.com/security/cve/CVE-2021-47177.html * https://www.suse.com/security/cve/CVE-2021-47179.html * https://www.suse.com/security/cve/CVE-2021-47180.html * https://www.suse.com/security/cve/CVE-2021-47181.html * https://www.suse.com/security/cve/CVE-2021-47183.html * https://www.suse.com/security/cve/CVE-2021-47185.html * https://www.suse.com/security/cve/CVE-2021-47189.html * https://www.suse.com/security/cve/CVE-2022-0487.html * https://www.suse.com/security/cve/CVE-2022-4744.html * https://www.suse.com/security/cve/CVE-2022-48626.html * https://www.suse.com/security/cve/CVE-2023-0160.html * https://www.suse.com/security/cve/CVE-2023-1192.html * https://www.suse.com/security/cve/CVE-2023-28746.html * https://www.suse.com/security/cve/CVE-2023-35827.html * https://www.suse.com/security/cve/CVE-2023-52454.html * https://www.suse.com/security/cve/CVE-2023-52469.html * https://www.suse.com/security/cve/CVE-2023-52470.html * https://www.suse.com/security/cve/CVE-2023-52474.html * https://www.suse.com/security/cve/CVE-2023-52476.html * https://www.suse.com/security/cve/CVE-2023-52477.html * https://www.suse.com/security/cve/CVE-2023-52492.html * https://www.suse.com/security/cve/CVE-2023-52500.html * https://www.suse.com/security/cve/CVE-2023-52508.html * https://www.suse.com/security/cve/CVE-2023-52509.html * https://www.suse.com/security/cve/CVE-2023-52572.html * https://www.suse.com/security/cve/CVE-2023-52575.html * https://www.suse.com/security/cve/CVE-2023-52583.html * https://www.suse.com/security/cve/CVE-2023-52590.html * https://www.suse.com/security/cve/CVE-2023-52591.html * https://www.suse.com/security/cve/CVE-2023-52607.html * https://www.suse.com/security/cve/CVE-2023-52628.html * https://www.suse.com/security/cve/CVE-2023-6270.html * https://www.suse.com/security/cve/CVE-2023-6356.html * https://www.suse.com/security/cve/CVE-2023-6531.html * https://www.suse.com/security/cve/CVE-2023-6535.html * https://www.suse.com/security/cve/CVE-2023-6536.html * https://www.suse.com/security/cve/CVE-2023-7042.html * https://www.suse.com/security/cve/CVE-2023-7192.html * https://www.suse.com/security/cve/CVE-2024-22099.html * https://www.suse.com/security/cve/CVE-2024-26600.html * https://www.suse.com/security/cve/CVE-2024-26614.html * https://www.suse.com/security/cve/CVE-2024-26642.html * https://www.suse.com/security/cve/CVE-2024-26704.html * https://www.suse.com/security/cve/CVE-2024-26733.html * https://bugzilla.suse.com/show_bug.cgi?id=1184942 * https://bugzilla.suse.com/show_bug.cgi?id=1186060 * https://bugzilla.suse.com/show_bug.cgi?id=1192145 * https://bugzilla.suse.com/show_bug.cgi?id=1194516 * https://bugzilla.suse.com/show_bug.cgi?id=1208995 * https://bugzilla.suse.com/show_bug.cgi?id=1209635 * https://bugzilla.suse.com/show_bug.cgi?id=1209657 * https://bugzilla.suse.com/show_bug.cgi?id=1212514 * https://bugzilla.suse.com/show_bug.cgi?id=1213456 * https://bugzilla.suse.com/show_bug.cgi?id=1217987 * https://bugzilla.suse.com/show_bug.cgi?id=1217988 * https://bugzilla.suse.com/show_bug.cgi?id=1217989 * https://bugzilla.suse.com/show_bug.cgi?id=1218336 * https://bugzilla.suse.com/show_bug.cgi?id=1218447 * https://bugzilla.suse.com/show_bug.cgi?id=1218479 * https://bugzilla.suse.com/show_bug.cgi?id=1218562 * https://bugzilla.suse.com/show_bug.cgi?id=1219170 * https://bugzilla.suse.com/show_bug.cgi?id=1219264 * https://bugzilla.suse.com/show_bug.cgi?id=1220320 * https://bugzilla.suse.com/show_bug.cgi?id=1220340 * https://bugzilla.suse.com/show_bug.cgi?id=1220366 * https://bugzilla.suse.com/show_bug.cgi?id=1220400 * https://bugzilla.suse.com/show_bug.cgi?id=1220411 * https://bugzilla.suse.com/show_bug.cgi?id=1220413 * https://bugzilla.suse.com/show_bug.cgi?id=1220414 * https://bugzilla.suse.com/show_bug.cgi?id=1220425 * https://bugzilla.suse.com/show_bug.cgi?id=1220426 * https://bugzilla.suse.com/show_bug.cgi?id=1220429 * https://bugzilla.suse.com/show_bug.cgi?id=1220432 * https://bugzilla.suse.com/show_bug.cgi?id=1220442 * https://bugzilla.suse.com/show_bug.cgi?id=1220445 * https://bugzilla.suse.com/show_bug.cgi?id=1220465 * https://bugzilla.suse.com/show_bug.cgi?id=1220468 * https://bugzilla.suse.com/show_bug.cgi?id=1220475 * https://bugzilla.suse.com/show_bug.cgi?id=1220484 * https://bugzilla.suse.com/show_bug.cgi?id=1220486 * https://bugzilla.suse.com/show_bug.cgi?id=1220487 * https://bugzilla.suse.com/show_bug.cgi?id=1220516 * https://bugzilla.suse.com/show_bug.cgi?id=1220521 * https://bugzilla.suse.com/show_bug.cgi?id=1220528 * https://bugzilla.suse.com/show_bug.cgi?id=1220529 * https://bugzilla.suse.com/show_bug.cgi?id=1220532 * https://bugzilla.suse.com/show_bug.cgi?id=1220554 * https://bugzilla.suse.com/show_bug.cgi?id=1220556 * https://bugzilla.suse.com/show_bug.cgi?id=1220557 * https://bugzilla.suse.com/show_bug.cgi?id=1220560 * https://bugzilla.suse.com/show_bug.cgi?id=1220561 * https://bugzilla.suse.com/show_bug.cgi?id=1220566 * https://bugzilla.suse.com/show_bug.cgi?id=1220575 * https://bugzilla.suse.com/show_bug.cgi?id=1220580 * https://bugzilla.suse.com/show_bug.cgi?id=1220583 * https://bugzilla.suse.com/show_bug.cgi?id=1220611 * https://bugzilla.suse.com/show_bug.cgi?id=1220615 * https://bugzilla.suse.com/show_bug.cgi?id=1220621 * https://bugzilla.suse.com/show_bug.cgi?id=1220625 * https://bugzilla.suse.com/show_bug.cgi?id=1220630 * https://bugzilla.suse.com/show_bug.cgi?id=1220631 * https://bugzilla.suse.com/show_bug.cgi?id=1220638 * https://bugzilla.suse.com/show_bug.cgi?id=1220639 * https://bugzilla.suse.com/show_bug.cgi?id=1220640 * https://bugzilla.suse.com/show_bug.cgi?id=1220641 * https://bugzilla.suse.com/show_bug.cgi?id=1220662 * https://bugzilla.suse.com/show_bug.cgi?id=1220663 * https://bugzilla.suse.com/show_bug.cgi?id=1220669 * https://bugzilla.suse.com/show_bug.cgi?id=1220670 * https://bugzilla.suse.com/show_bug.cgi?id=1220677 * https://bugzilla.suse.com/show_bug.cgi?id=1220678 * https://bugzilla.suse.com/show_bug.cgi?id=1220685 * https://bugzilla.suse.com/show_bug.cgi?id=1220687 * https://bugzilla.suse.com/show_bug.cgi?id=1220688 * https://bugzilla.suse.com/show_bug.cgi?id=1220692 * https://bugzilla.suse.com/show_bug.cgi?id=1220697 * https://bugzilla.suse.com/show_bug.cgi?id=1220703 * https://bugzilla.suse.com/show_bug.cgi?id=1220706 * https://bugzilla.suse.com/show_bug.cgi?id=1220733 * https://bugzilla.suse.com/show_bug.cgi?id=1220734 * https://bugzilla.suse.com/show_bug.cgi?id=1220739 * https://bugzilla.suse.com/show_bug.cgi?id=1220743 * https://bugzilla.suse.com/show_bug.cgi?id=1220745 * https://bugzilla.suse.com/show_bug.cgi?id=1220749 * https://bugzilla.suse.com/show_bug.cgi?id=1220751 * https://bugzilla.suse.com/show_bug.cgi?id=1220753 * https://bugzilla.suse.com/show_bug.cgi?id=1220758 * https://bugzilla.suse.com/show_bug.cgi?id=1220759 * https://bugzilla.suse.com/show_bug.cgi?id=1220764 * https://bugzilla.suse.com/show_bug.cgi?id=1220768 * https://bugzilla.suse.com/show_bug.cgi?id=1220769 * https://bugzilla.suse.com/show_bug.cgi?id=1220777 * https://bugzilla.suse.com/show_bug.cgi?id=1220779 * https://bugzilla.suse.com/show_bug.cgi?id=1220785 * https://bugzilla.suse.com/show_bug.cgi?id=1220790 * https://bugzilla.suse.com/show_bug.cgi?id=1220794 * https://bugzilla.suse.com/show_bug.cgi?id=1220824 * https://bugzilla.suse.com/show_bug.cgi?id=1220826 * https://bugzilla.suse.com/show_bug.cgi?id=1220829 * https://bugzilla.suse.com/show_bug.cgi?id=1220836 * https://bugzilla.suse.com/show_bug.cgi?id=1220846 * https://bugzilla.suse.com/show_bug.cgi?id=1220850 * https://bugzilla.suse.com/show_bug.cgi?id=1220861 * https://bugzilla.suse.com/show_bug.cgi?id=1220871 * https://bugzilla.suse.com/show_bug.cgi?id=1220883 * https://bugzilla.suse.com/show_bug.cgi?id=1220946 * https://bugzilla.suse.com/show_bug.cgi?id=1220954 * https://bugzilla.suse.com/show_bug.cgi?id=1220969 * https://bugzilla.suse.com/show_bug.cgi?id=1220979 * https://bugzilla.suse.com/show_bug.cgi?id=1220982 * https://bugzilla.suse.com/show_bug.cgi?id=1220985 * https://bugzilla.suse.com/show_bug.cgi?id=1220987 * https://bugzilla.suse.com/show_bug.cgi?id=1221015 * https://bugzilla.suse.com/show_bug.cgi?id=1221044 * https://bugzilla.suse.com/show_bug.cgi?id=1221058 * https://bugzilla.suse.com/show_bug.cgi?id=1221061 * https://bugzilla.suse.com/show_bug.cgi?id=1221077 * https://bugzilla.suse.com/show_bug.cgi?id=1221088 * https://bugzilla.suse.com/show_bug.cgi?id=1221276 * https://bugzilla.suse.com/show_bug.cgi?id=1221293 * https://bugzilla.suse.com/show_bug.cgi?id=1221532 * https://bugzilla.suse.com/show_bug.cgi?id=1221534 * https://bugzilla.suse.com/show_bug.cgi?id=1221541 * https://bugzilla.suse.com/show_bug.cgi?id=1221548 * https://bugzilla.suse.com/show_bug.cgi?id=1221552 * https://bugzilla.suse.com/show_bug.cgi?id=1221575 * https://bugzilla.suse.com/show_bug.cgi?id=1221605 * https://bugzilla.suse.com/show_bug.cgi?id=1221606 * https://bugzilla.suse.com/show_bug.cgi?id=1221608 * https://bugzilla.suse.com/show_bug.cgi?id=1221830 * https://bugzilla.suse.com/show_bug.cgi?id=1221931 * https://bugzilla.suse.com/show_bug.cgi?id=1221932 * https://bugzilla.suse.com/show_bug.cgi?id=1221934 * https://bugzilla.suse.com/show_bug.cgi?id=1221935 * https://bugzilla.suse.com/show_bug.cgi?id=1221949 * https://bugzilla.suse.com/show_bug.cgi?id=1221952 * https://bugzilla.suse.com/show_bug.cgi?id=1221965 * https://bugzilla.suse.com/show_bug.cgi?id=1221966 * https://bugzilla.suse.com/show_bug.cgi?id=1221969 * https://bugzilla.suse.com/show_bug.cgi?id=1221973 * https://bugzilla.suse.com/show_bug.cgi?id=1221974 * https://bugzilla.suse.com/show_bug.cgi?id=1221978 * https://bugzilla.suse.com/show_bug.cgi?id=1221989 * https://bugzilla.suse.com/show_bug.cgi?id=1221990 * https://bugzilla.suse.com/show_bug.cgi?id=1221991 * https://bugzilla.suse.com/show_bug.cgi?id=1221992 * https://bugzilla.suse.com/show_bug.cgi?id=1221993 * https://bugzilla.suse.com/show_bug.cgi?id=1221994 * https://bugzilla.suse.com/show_bug.cgi?id=1221996 * https://bugzilla.suse.com/show_bug.cgi?id=1221997 * https://bugzilla.suse.com/show_bug.cgi?id=1221998 * https://bugzilla.suse.com/show_bug.cgi?id=1221999 * https://bugzilla.suse.com/show_bug.cgi?id=1222000 * https://bugzilla.suse.com/show_bug.cgi?id=1222001 * https://bugzilla.suse.com/show_bug.cgi?id=1222002 * https://bugzilla.suse.com/show_bug.cgi?id=1222003 * https://bugzilla.suse.com/show_bug.cgi?id=1222004 * https://bugzilla.suse.com/show_bug.cgi?id=1222117 * https://bugzilla.suse.com/show_bug.cgi?id=1222422 * https://bugzilla.suse.com/show_bug.cgi?id=1222585 * https://bugzilla.suse.com/show_bug.cgi?id=1222619 * https://bugzilla.suse.com/show_bug.cgi?id=1222660 * https://bugzilla.suse.com/show_bug.cgi?id=1222664 * https://bugzilla.suse.com/show_bug.cgi?id=1222669 * https://bugzilla.suse.com/show_bug.cgi?id=1222706 * https://jira.suse.com/browse/PED-5759 * https://jira.suse.com/browse/SLE-13706 * https://jira.suse.com/browse/SLE-15131 * https://jira.suse.com/browse/SLE-15172 * https://jira.suse.com/browse/SLE-15176
--===============3656136079492087187== Content-Type: text/html; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit
<div class="container"> <h1>Security update for the Linux Kernel</h1>
<table class="table table-striped table-bordered"> <tbody> <tr> <th>Announcement ID:</th> <td>SUSE-SU-2024:1489-1</td> </tr> <tr> <th>Rating:</th> <td>important</td> </tr> <tr> <th>References:</th> <td> <ul> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1184942">bsc#1184942</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1186060">bsc#1186060</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1192145">bsc#1192145</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1194516">bsc#1194516</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1208995">bsc#1208995</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1209635">bsc#1209635</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1209657">bsc#1209657</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1212514">bsc#1212514</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1213456">bsc#1213456</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1217987">bsc#1217987</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1217988">bsc#1217988</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1217989">bsc#1217989</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1218336">bsc#1218336</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1218447">bsc#1218447</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1218479">bsc#1218479</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1218562">bsc#1218562</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1219170">bsc#1219170</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1219264">bsc#1219264</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220320">bsc#1220320</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220340">bsc#1220340</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220366">bsc#1220366</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220400">bsc#1220400</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220411">bsc#1220411</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220413">bsc#1220413</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220414">bsc#1220414</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220425">bsc#1220425</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220426">bsc#1220426</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220429">bsc#1220429</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220432">bsc#1220432</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220442">bsc#1220442</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220445">bsc#1220445</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220465">bsc#1220465</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220468">bsc#1220468</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220475">bsc#1220475</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220484">bsc#1220484</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220486">bsc#1220486</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220487">bsc#1220487</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220516">bsc#1220516</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220521">bsc#1220521</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220528">bsc#1220528</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220529">bsc#1220529</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220532">bsc#1220532</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220554">bsc#1220554</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220556">bsc#1220556</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220557">bsc#1220557</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220560">bsc#1220560</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220561">bsc#1220561</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220566">bsc#1220566</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220575">bsc#1220575</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220580">bsc#1220580</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220583">bsc#1220583</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220611">bsc#1220611</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220615">bsc#1220615</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220621">bsc#1220621</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220625">bsc#1220625</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220630">bsc#1220630</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220631">bsc#1220631</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220638">bsc#1220638</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220639">bsc#1220639</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220640">bsc#1220640</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220641">bsc#1220641</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220662">bsc#1220662</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220663">bsc#1220663</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220669">bsc#1220669</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220670">bsc#1220670</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220677">bsc#1220677</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220678">bsc#1220678</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220685">bsc#1220685</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220687">bsc#1220687</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220688">bsc#1220688</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220692">bsc#1220692</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220697">bsc#1220697</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220703">bsc#1220703</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220706">bsc#1220706</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220733">bsc#1220733</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220734">bsc#1220734</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220739">bsc#1220739</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220743">bsc#1220743</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220745">bsc#1220745</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220749">bsc#1220749</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220751">bsc#1220751</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220753">bsc#1220753</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220758">bsc#1220758</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220759">bsc#1220759</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220764">bsc#1220764</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220768">bsc#1220768</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220769">bsc#1220769</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220777">bsc#1220777</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220779">bsc#1220779</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220785">bsc#1220785</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220790">bsc#1220790</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220794">bsc#1220794</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220824">bsc#1220824</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220826">bsc#1220826</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220829">bsc#1220829</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220836">bsc#1220836</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220846">bsc#1220846</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220850">bsc#1220850</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220861">bsc#1220861</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220871">bsc#1220871</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220883">bsc#1220883</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220946">bsc#1220946</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220954">bsc#1220954</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220969">bsc#1220969</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220979">bsc#1220979</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220982">bsc#1220982</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220985">bsc#1220985</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220987">bsc#1220987</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221015">bsc#1221015</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221044">bsc#1221044</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221058">bsc#1221058</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221061">bsc#1221061</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221077">bsc#1221077</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221088">bsc#1221088</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221276">bsc#1221276</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221293">bsc#1221293</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221532">bsc#1221532</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221534">bsc#1221534</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221541">bsc#1221541</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221548">bsc#1221548</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221552">bsc#1221552</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221575">bsc#1221575</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221605">bsc#1221605</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221606">bsc#1221606</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221608">bsc#1221608</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221830">bsc#1221830</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221931">bsc#1221931</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221932">bsc#1221932</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221934">bsc#1221934</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221935">bsc#1221935</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221949">bsc#1221949</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221952">bsc#1221952</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221965">bsc#1221965</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221966">bsc#1221966</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221969">bsc#1221969</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221973">bsc#1221973</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221974">bsc#1221974</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221978">bsc#1221978</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221989">bsc#1221989</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221990">bsc#1221990</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221991">bsc#1221991</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221992">bsc#1221992</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221993">bsc#1221993</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221994">bsc#1221994</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221996">bsc#1221996</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221997">bsc#1221997</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221998">bsc#1221998</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221999">bsc#1221999</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222000">bsc#1222000</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222001">bsc#1222001</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222002">bsc#1222002</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222003">bsc#1222003</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222004">bsc#1222004</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222117">bsc#1222117</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222422">bsc#1222422</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222585">bsc#1222585</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222619">bsc#1222619</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222660">bsc#1222660</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222664">bsc#1222664</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222669">bsc#1222669</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222706">bsc#1222706</a> </li> <li style="display: inline;"> <a href="https://jira.suse.com/browse/PED-5759">jsc#PED-5759</a> </li> <li style="display: inline;"> <a href="https://jira.suse.com/browse/SLE-13706">jsc#SLE-13706</a> </li> <li style="display: inline;"> <a href="https://jira.suse.com/browse/SLE-15131">jsc#SLE-15131</a> </li> <li style="display: inline;"> <a href="https://jira.suse.com/browse/SLE-15172">jsc#SLE-15172</a> </li> <li style="display: inline;"> <a href="https://jira.suse.com/browse/SLE-15176">jsc#SLE-15176</a> </li> </ul> </td> </tr> <tr> <th> Cross-References: </th> <td> <ul> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2020-36780.html">CVE-2020-36780</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2020-36781.html">CVE-2020-36781</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2020-36782.html">CVE-2020-36782</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2020-36783.html">CVE-2020-36783</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-23134.html">CVE-2021-23134</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-29155.html">CVE-2021-29155</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-46908.html">CVE-2021-46908</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-46909.html">CVE-2021-46909</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-46911.html">CVE-2021-46911</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-46914.html">CVE-2021-46914</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-46917.html">CVE-2021-46917</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-46918.html">CVE-2021-46918</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-46919.html">CVE-2021-46919</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-46920.html">CVE-2021-46920</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-46921.html">CVE-2021-46921</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-46922.html">CVE-2021-46922</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-46930.html">CVE-2021-46930</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-46931.html">CVE-2021-46931</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-46933.html">CVE-2021-46933</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-46938.html">CVE-2021-46938</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-46939.html">CVE-2021-46939</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-46943.html">CVE-2021-46943</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-46944.html">CVE-2021-46944</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-46950.html">CVE-2021-46950</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-46951.html">CVE-2021-46951</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-46956.html">CVE-2021-46956</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-46958.html">CVE-2021-46958</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-46959.html">CVE-2021-46959</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-46960.html">CVE-2021-46960</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-46961.html">CVE-2021-46961</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-46962.html">CVE-2021-46962</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-46963.html">CVE-2021-46963</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-46971.html">CVE-2021-46971</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-46976.html">CVE-2021-46976</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-46980.html">CVE-2021-46980</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-46981.html">CVE-2021-46981</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-46983.html">CVE-2021-46983</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-46984.html">CVE-2021-46984</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-46988.html">CVE-2021-46988</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-46990.html">CVE-2021-46990</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-46991.html">CVE-2021-46991</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-46992.html">CVE-2021-46992</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-46998.html">CVE-2021-46998</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47000.html">CVE-2021-47000</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47001.html">CVE-2021-47001</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47003.html">CVE-2021-47003</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47006.html">CVE-2021-47006</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47009.html">CVE-2021-47009</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47013.html">CVE-2021-47013</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47014.html">CVE-2021-47014</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47015.html">CVE-2021-47015</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47017.html">CVE-2021-47017</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47020.html">CVE-2021-47020</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47026.html">CVE-2021-47026</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47034.html">CVE-2021-47034</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47035.html">CVE-2021-47035</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47038.html">CVE-2021-47038</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47044.html">CVE-2021-47044</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47045.html">CVE-2021-47045</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47046.html">CVE-2021-47046</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47049.html">CVE-2021-47049</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47051.html">CVE-2021-47051</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47055.html">CVE-2021-47055</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47056.html">CVE-2021-47056</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47058.html">CVE-2021-47058</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47061.html">CVE-2021-47061</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47063.html">CVE-2021-47063</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47065.html">CVE-2021-47065</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47068.html">CVE-2021-47068</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47069.html">CVE-2021-47069</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47070.html">CVE-2021-47070</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47071.html">CVE-2021-47071</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47073.html">CVE-2021-47073</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47077.html">CVE-2021-47077</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47082.html">CVE-2021-47082</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47087.html">CVE-2021-47087</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47095.html">CVE-2021-47095</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47097.html">CVE-2021-47097</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47100.html">CVE-2021-47100</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47101.html">CVE-2021-47101</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47109.html">CVE-2021-47109</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47110.html">CVE-2021-47110</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47112.html">CVE-2021-47112</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47114.html">CVE-2021-47114</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47117.html">CVE-2021-47117</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47118.html">CVE-2021-47118</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47119.html">CVE-2021-47119</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47120.html">CVE-2021-47120</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47130.html">CVE-2021-47130</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47136.html">CVE-2021-47136</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47137.html">CVE-2021-47137</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47138.html">CVE-2021-47138</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47139.html">CVE-2021-47139</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47141.html">CVE-2021-47141</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47142.html">CVE-2021-47142</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47144.html">CVE-2021-47144</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47150.html">CVE-2021-47150</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47153.html">CVE-2021-47153</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47160.html">CVE-2021-47160</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47161.html">CVE-2021-47161</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47164.html">CVE-2021-47164</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47165.html">CVE-2021-47165</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47166.html">CVE-2021-47166</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47167.html">CVE-2021-47167</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47168.html">CVE-2021-47168</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47169.html">CVE-2021-47169</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47170.html">CVE-2021-47170</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47171.html">CVE-2021-47171</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47172.html">CVE-2021-47172</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47173.html">CVE-2021-47173</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47174.html">CVE-2021-47174</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47175.html">CVE-2021-47175</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47176.html">CVE-2021-47176</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47177.html">CVE-2021-47177</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47179.html">CVE-2021-47179</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47180.html">CVE-2021-47180</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47181.html">CVE-2021-47181</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47183.html">CVE-2021-47183</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47185.html">CVE-2021-47185</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2021-47189.html">CVE-2021-47189</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2022-0487.html">CVE-2022-0487</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2022-4744.html">CVE-2022-4744</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2022-48626.html">CVE-2022-48626</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-0160.html">CVE-2023-0160</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-1192.html">CVE-2023-1192</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-28746.html">CVE-2023-28746</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-35827.html">CVE-2023-35827</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-52454.html">CVE-2023-52454</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-52469.html">CVE-2023-52469</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-52470.html">CVE-2023-52470</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-52474.html">CVE-2023-52474</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-52476.html">CVE-2023-52476</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-52477.html">CVE-2023-52477</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-52492.html">CVE-2023-52492</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-52500.html">CVE-2023-52500</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-52508.html">CVE-2023-52508</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-52509.html">CVE-2023-52509</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-52572.html">CVE-2023-52572</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-52575.html">CVE-2023-52575</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-52583.html">CVE-2023-52583</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-52590.html">CVE-2023-52590</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-52591.html">CVE-2023-52591</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-52607.html">CVE-2023-52607</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-52628.html">CVE-2023-52628</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-6270.html">CVE-2023-6270</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-6356.html">CVE-2023-6356</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-6531.html">CVE-2023-6531</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-6535.html">CVE-2023-6535</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-6536.html">CVE-2023-6536</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-7042.html">CVE-2023-7042</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-7192.html">CVE-2023-7192</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-22099.html">CVE-2024-22099</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-26600.html">CVE-2024-26600</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-26614.html">CVE-2024-26614</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-26642.html">CVE-2024-26642</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-26704.html">CVE-2024-26704</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-26733.html">CVE-2024-26733</a> </li> </ul> </td> </tr> <tr> <th>CVSS scores:</th> <td> <ul class="list-group"> <li class="list-group-item"> <span class="cvss-reference">CVE-2020-36780</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.7</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2020-36781</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.7</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2020-36782</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.7</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2020-36783</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.7</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-23134</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-23134</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-29155</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.2</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-29155</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-46908</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.1</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-46908</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-46909</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.7</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-46909</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-46911</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.3</span> <span class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-46914</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.3</span> <span class="cvss-vector">CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-46914</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-46917</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">3.4</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-46917</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-46918</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">3.3</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-46918</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-46919</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.4</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-46919</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-46920</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">1.9</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-46920</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-46921</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.4</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-46922</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.4</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-46922</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-46930</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.3</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-46930</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-46931</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.5</span> <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-46931</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-46933</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.4</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-46933</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-46938</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.1</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-46938</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-46939</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-46939</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-46943</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-46943</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-46944</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.7</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-46944</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-46950</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">3.3</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-46950</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-46951</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.1</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-46951</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-46956</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-46958</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-46959</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.7</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-46960</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">2.3</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-46961</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-46962</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.4</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-46963</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-46971</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">3.3</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-46976</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.4</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-46980</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-46981</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-46983</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-46984</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-46988</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-46990</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-46991</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-46992</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.3</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-46998</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.7</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47000</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">3.3</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47001</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.9</span> <span class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47003</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47006</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47009</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.0</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47013</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47014</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.5</span> <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47015</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47017</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.4</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47020</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">3.3</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47026</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.4</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47034</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.4</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47035</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.0</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47038</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.7</span> <span class="cvss-vector">CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47044</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47045</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47046</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.0</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47049</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47051</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.4</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47055</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.4</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47056</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47058</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.1</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47061</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.7</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47063</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.7</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47065</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.3</span> <span class="cvss-vector">CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47068</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47069</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.7</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47070</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47071</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47073</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47077</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47082</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.4</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47087</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.3</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47095</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.1</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47097</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.0</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47100</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.4</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47101</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.0</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47109</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47110</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47112</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">3.3</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47114</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47117</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47118</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47119</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47120</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47130</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47136</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.3</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47137</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.4</span> <span class="cvss-vector">CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47138</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47139</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.7</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47141</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47142</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47144</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47150</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47153</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47160</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47161</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47164</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47164</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47165</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47166</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47167</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47168</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47169</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47170</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47171</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47171</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47172</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47173</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47173</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47174</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47175</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47176</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47177</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47179</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47179</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47180</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47181</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47183</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47185</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2021-47189</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2022-0487</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.0</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2022-0487</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2022-4744</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2022-4744</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2022-48626</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.3</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2022-48626</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-0160</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.7</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-0160</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">4.7</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-1192</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.5</span> <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-1192</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">6.5</span> <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-28746</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-35827</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.4</span> <span class="cvss-vector">CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-35827</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.0</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-52454</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.5</span> <span class="cvss-vector">CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-52454</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-52469</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.3</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-52469</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-52470</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-52470</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-52474</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">3.3</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-52474</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-52476</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.7</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-52477</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-52492</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.2</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-52500</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">3.3</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-52508</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-52509</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.0</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-52572</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">0.0</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-52575</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-52583</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-52590</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.4</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-52591</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.1</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-52607</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-52628</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-6270</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.0</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-6270</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.0</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-6356</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.5</span> <span class="cvss-vector">CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-6356</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.5</span> <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-6531</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.0</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-6531</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.0</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-6535</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.5</span> <span class="cvss-vector">CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-6535</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.5</span> <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-6536</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.5</span> <span class="cvss-vector">CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-6536</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.5</span> <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-7042</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.4</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-7042</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-7192</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.4</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-7192</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">4.4</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-22099</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.3</span> <span class="cvss-vector">CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-22099</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26600</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26600</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26614</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.9</span> <span class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26642</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.7</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26704</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-26733</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> </ul> </td> </tr> <tr> <th>Affected Products:</th> <td> <ul class="list-group"> <li class="list-group-item">openSUSE Leap 15.3</li> <li class="list-group-item">SUSE Enterprise Storage 7.1</li> <li class="list-group-item">SUSE Linux Enterprise High Availability Extension 15 SP3</li> <li class="list-group-item">SUSE Linux Enterprise High Performance Computing 15 SP3</li> <li class="list-group-item">SUSE Linux Enterprise High Performance Computing LTSS 15 SP3</li> <li class="list-group-item">SUSE Linux Enterprise Live Patching 15-SP3</li> <li class="list-group-item">SUSE Linux Enterprise Micro 5.1</li> <li class="list-group-item">SUSE Linux Enterprise Micro 5.2</li> <li class="list-group-item">SUSE Linux Enterprise Micro for Rancher 5.2</li> <li class="list-group-item">SUSE Linux Enterprise Server 15 SP3</li> <li class="list-group-item">SUSE Linux Enterprise Server 15 SP3 Business Critical Linux 15-SP3</li> <li class="list-group-item">SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3</li> <li class="list-group-item">SUSE Linux Enterprise Server for SAP Applications 15 SP3</li> <li class="list-group-item">SUSE Manager Proxy 4.2</li> <li class="list-group-item">SUSE Manager Retail Branch Server 4.2</li> <li class="list-group-item">SUSE Manager Server 4.2</li> </ul> </td> </tr> </tbody> </table>
<p>An update that solves 157 vulnerabilities, contains five features and has four security fixes can now be installed.</p>
<h2>Description:</h2> <p>The SUSE Linux Enterprise 15 SP3 LTSS kernel was updated to receive various security bugfixes.</p> <p>The following security bugs were fixed:</p> <ul> <li>CVE-2020-36781: Fixed reference leak when pm_runtime_get_sync fails in i2c/imx (bsc#1220557).</li> <li>CVE-2021-46911: Fixed kernel panic (bsc#1220400).</li> <li>CVE-2021-46914: Fixed unbalanced device enable/disable in suspend/resume in pci_disable_device() (bsc#1220465).</li> <li>CVE-2021-46917: Fixed wq cleanup of WQCFG registers in idxd (bsc#1220432).</li> <li>CVE-2021-46918: Fixed not clearing MSIX permission entry on shutdown in idxd (bsc#1220429).</li> <li>CVE-2021-46919: Fixed wq size store permission state in idxd (bsc#1220414).</li> <li>CVE-2021-46920: Fixed clobbering of SWERR overflow bit on writeback (bsc#1220426).</li> <li>CVE-2021-46922: Fixed TPM reservation for seal/unseal (bsc#1220475).</li> <li>CVE-2021-46930: Fixed usb/mtu3 list_head check warning (bsc#1220484).</li> <li>CVE-2021-46931: Fixed wrong type casting in mlx5e_tx_reporter_dump_sq() (bsc#1220486).</li> <li>CVE-2021-46933: Fixed possible underflow in ffs_data_clear() (bsc#1220487).</li> <li>CVE-2021-46956: Fixed memory leak in virtio_fs_probe() (bsc#1220516).</li> <li>CVE-2021-46959: Fixed use-after-free with devm_spi_alloc_* (bsc#1220734).</li> <li>CVE-2021-46961: Fixed spurious interrup handling (bsc#1220529).</li> <li>CVE-2021-46971: Fixed unconditional security_locked_down() call (bsc#1220697).</li> <li>CVE-2021-46976: Fixed crash in auto_retire in drm/i915 (bsc#1220621).</li> <li>CVE-2021-46980: Fixed not retrieving all the PDOs instead of just the first 4 in usb/typec/ucsi (bsc#1220663).</li> <li>CVE-2021-46983: Fixed NULL pointer dereference when SEND is completed with error (bsc#1220639).</li> <li>CVE-2021-46988: Fixed release page in error path to avoid BUG_ON (bsc#1220706).</li> <li>CVE-2021-47001: Fixed cwnd update ordering in xprtrdma (bsc#1220670).</li> <li>CVE-2021-47003: Fixed potential null dereference on pointer status in idxd_cmd_exec (bsc#1220677).</li> <li>CVE-2021-47009: Fixed memory leak on object td (bsc#1220733).</li> <li>CVE-2021-47014: Fixed wild memory access when clearing fragments in net/sched/act_ct (bsc#1220630).</li> <li>CVE-2021-47017: Fixed use after free in ath10k_htc_send_bundle (bsc#1220678).</li> <li>CVE-2021-47026: Fixed not destroying sysfs after removing session from active list (bsc#1220685).</li> <li>CVE-2021-47035: Fixed wrong WO permissions on second-level paging entries in iommu/vt-d (bsc#1220688).</li> <li>CVE-2021-47038: Fixed deadlock between hci_dev->lock and socket lock in bluetooth (bsc#1220753).</li> <li>CVE-2021-47044: Fixed shift-out-of-bounds in load_balance() in sched/fair (bsc#1220759).</li> <li>CVE-2021-47046: Fixed off by one in hdmi_14_process_transaction() (bsc#1220758).</li> <li>CVE-2021-47087: Fixed incorrect page free bug in tee/optee (bsc#1220954).</li> <li>CVE-2021-47095: Fixed missing initialization in ipmi/ssif (bsc#1220979).</li> <li>CVE-2021-47097: Fixed stack out of bound access in elantech_change_report_id() (bsc#1220982).</li> <li>CVE-2021-47100: Fixed UAF when uninstall in ipmi (bsc#1220985).</li> <li>CVE-2021-47101: Fixed uninit-value in asix_mdio_read() (bsc#1220987).</li> <li>CVE-2021-47109: Fixed NUD_NOARP entries to be forced GCed (bsc#1221534).</li> <li>CVE-2021-47130: Fixed freeing unallocated p2pmem in nvmet (bsc#1221552).</li> <li>CVE-2021-47137: Fixed memory corruption in RX ring in net/lantiq (bsc#1221932).</li> <li>CVE-2021-47150: Fixed the potential memory leak in fec_enet_init() (bsc#1221973).</li> <li>CVE-2021-47160: Fixed VLAN traffic leaks in dsa: mt7530 (bsc#1221974).</li> <li>CVE-2021-47164: Fixed null pointer dereference accessing lag dev in net/mlx5e (bsc#1221978).</li> <li>CVE-2021-47174: Fixed missing check in irq_fpu_usable() (bsc#1221990).</li> <li>CVE-2021-47175: Fixed OOB access in net/sched/fq_pie (bsc#1222003).</li> <li>CVE-2021-47181: Fixed a null pointer dereference caused by calling platform_get_resource() (bsc#1222660).</li> <li>CVE-2021-47183: Fixed a null pointer dereference during link down processing in scsi lpfc (bsc#1192145, bsc#1222664).</li> <li>CVE-2021-47185: Fixed a softlockup issue in flush_to_ldisc in tty tty_buffer (bsc#1222669).</li> <li>CVE-2021-47189: Fixed denial of service due to memory ordering issues between normal and ordered work functions in btrfs (bsc#1222706).</li> <li>CVE-2023-0160: Fixed deadlock flaw in BPF that could allow a local user to potentially crash the system (bsc#1209657).</li> <li>CVE-2023-28746: Fixed Register File Data Sampling (bsc#1213456).</li> <li>CVE-2023-52469: Fixed a use-after-free in kv_parse_power_table (bsc#1220411).</li> <li>CVE-2023-52470: Fixed null-ptr-deref in radeon_crtc_init() (bsc#1220413).</li> <li>CVE-2023-52474: Fixed a vulnerability with non-PAGE_SIZE-end multi-iovec user SDMA requests (bsc#1220445).</li> <li>CVE-2023-52476: Fixed possible unhandled page fault via perf sampling NMI during vsyscall (bsc#1220703).</li> <li>CVE-2023-52492: Fixed a null-pointer-dereference in channel unregistration function __dma_async_device_channel_register() (bsc#1221276).</li> <li>CVE-2023-52500: Fixed information leaking when processing OPC_INB_SET_CONTROLLER_CONFIG command (bsc#1220883).</li> <li>CVE-2023-52508: Fixed null pointer dereference in nvme_fc_io_getuuid() (bsc#1221015).</li> <li>CVE-2023-52575: Fixed SBPB enablement for spec_rstack_overflow=off (bsc#1220871).</li> <li>CVE-2023-52583: Fixed deadlock or deadcode of misusing dget() inside ceph (bsc#1221058).</li> <li>CVE-2023-52607: Fixed a null-pointer-dereference in pgtable_cache_add kasprintf() (bsc#1221061).</li> <li>CVE-2023-52628: Fixed 4-byte stack OOB write in nftables (bsc#1222117).</li> <li>CVE-2023-6270: Fixed a use-after-free issue in aoecmd_cfg_pkts (bsc#1218562).</li> <li>CVE-2023-6531: Fixed a use-after-free flaw due to a race problem in the unix garbage collector's deletion of SKB races with unix_stream_read_generic()on the socket that the SKB is queued on (bsc#1218447).</li> <li>CVE-2023-7042: Fixed a null-pointer-dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev() (bsc#1218336).</li> <li>CVE-2023-7192: Fixed a memory leak problem in ctnetlink_create_conntrack in net/netfilter/nf_conntrack_netlink.c (bsc#1218479).</li> <li>CVE-2024-22099: Fixed a null-pointer-dereference in rfcomm_check_security (bsc#1219170).</li> <li>CVE-2024-26600: Fixed NULL pointer dereference for SRP in phy-omap-usb2 (bsc#1220340).</li> <li>CVE-2024-26614: Fixed the initialization of accept_queue's spinlocks (bsc#1221293).</li> <li>CVE-2024-26642: Fixed the set of anonymous timeout flag in netfilter nf_tables (bsc#1221830).</li> <li>CVE-2024-26704: Fixed a double-free of blocks due to wrong extents moved_len in ext4 (bsc#1222422).</li> <li>CVE-2024-26733: Fixed an overflow in arp_req_get() in arp (bsc#1222585).</li> </ul> <p>The following non-security bugs were fixed:</p> <ul> <li>fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super (bsc#1219264).</li> <li>tty: n_gsm: require CAP_NET_ADMIN to attach N_GSM0710 ldisc (bsc#1222619).</li> <li>group-source-files.pl: Quote filenames (boo#1221077).</li> <li>kernel-binary: certs: Avoid trailing space</li> <li>mm: fix gup_pud_range (bsc#1220824).</li> </ul>
<h2>Special Instructions and Notes:</h2> <ul> <li>Please reboot the system after installing this update.</li> </ul>
<h2>Patch Instructions:</h2> <p> To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch".<br/>
Alternatively you can run the command listed for your product: </p> <ul class="list-group"> <li class="list-group-item"> SUSE Linux Enterprise Server for SAP Applications 15 SP3 <br/> <code>zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1489=1</code> </li> <li class="list-group-item"> SUSE Enterprise Storage 7.1 <br/> <code>zypper in -t patch SUSE-Storage-7.1-2024-1489=1</code> </li> <li class="list-group-item"> SUSE Linux Enterprise Micro 5.1 <br/> <code>zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-1489=1</code> </li> <li class="list-group-item"> SUSE Linux Enterprise Micro 5.2 <br/> <code>zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-1489=1</code> </li> <li class="list-group-item"> SUSE Linux Enterprise Micro for Rancher 5.2 <br/> <code>zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-1489=1</code> </li> <li class="list-group-item"> openSUSE Leap 15.3 <br/> <code>zypper in -t patch SUSE-2024-1489=1</code> </li> <li class="list-group-item"> SUSE Linux Enterprise Live Patching 15-SP3 <br/> <code>zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP3-2024-1489=1</code> </li> <li class="list-group-item"> SUSE Linux Enterprise High Availability Extension 15 SP3 <br/> <code>zypper in -t patch SUSE-SLE-Product-HA-15-SP3-2024-1489=1</code> </li> <li class="list-group-item"> SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 <br/> <code>zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1489=1</code> </li> <li class="list-group-item"> SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 <br/> <code>zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1489=1</code> </li> </ul>
<h2>Package List:</h2> <ul> <li> SUSE Linux Enterprise Server for SAP Applications 15 SP3 (nosrc ppc64le x86_64) <ul> <li>kernel-default-5.3.18-150300.59.158.1</li> </ul> </li> <li> SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) <ul> <li>kernel-default-devel-5.3.18-150300.59.158.1</li> <li>kernel-syms-5.3.18-150300.59.158.1</li> <li>reiserfs-kmp-default-debuginfo-5.3.18-150300.59.158.1</li> <li>reiserfs-kmp-default-5.3.18-150300.59.158.1</li> <li>kernel-default-debuginfo-5.3.18-150300.59.158.1</li> <li>kernel-obs-build-5.3.18-150300.59.158.1</li> <li>kernel-default-debugsource-5.3.18-150300.59.158.1</li> <li>kernel-default-base-5.3.18-150300.59.158.1.150300.18.92.5</li> <li>kernel-obs-build-debugsource-5.3.18-150300.59.158.1</li> <li>kernel-default-devel-debuginfo-5.3.18-150300.59.158.1</li> </ul> </li> <li> SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) <ul> <li>kernel-source-5.3.18-150300.59.158.1</li> <li>kernel-devel-5.3.18-150300.59.158.1</li> <li>kernel-macros-5.3.18-150300.59.158.1</li> </ul> </li> <li> SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch nosrc) <ul> <li>kernel-docs-5.3.18-150300.59.158.1</li> </ul> </li> <li> SUSE Linux Enterprise Server for SAP Applications 15 SP3 (nosrc x86_64) <ul> <li>kernel-preempt-5.3.18-150300.59.158.1</li> </ul> </li> <li> SUSE Linux Enterprise Server for SAP Applications 15 SP3 (x86_64) <ul> <li>kernel-preempt-devel-debuginfo-5.3.18-150300.59.158.1</li> <li>kernel-preempt-devel-5.3.18-150300.59.158.1</li> <li>kernel-preempt-debuginfo-5.3.18-150300.59.158.1</li> <li>kernel-preempt-debugsource-5.3.18-150300.59.158.1</li> </ul> </li> <li> SUSE Enterprise Storage 7.1 (aarch64 nosrc) <ul> <li>kernel-64kb-5.3.18-150300.59.158.1</li> </ul> </li> <li> SUSE Enterprise Storage 7.1 (aarch64) <ul> <li>kernel-64kb-debugsource-5.3.18-150300.59.158.1</li> <li>kernel-64kb-devel-5.3.18-150300.59.158.1</li> <li>kernel-64kb-devel-debuginfo-5.3.18-150300.59.158.1</li> <li>kernel-64kb-debuginfo-5.3.18-150300.59.158.1</li> </ul> </li> <li> SUSE Enterprise Storage 7.1 (aarch64 nosrc x86_64) <ul> <li>kernel-default-5.3.18-150300.59.158.1</li> <li>kernel-preempt-5.3.18-150300.59.158.1</li> </ul> </li> <li> SUSE Enterprise Storage 7.1 (aarch64 x86_64) <ul> <li>kernel-default-devel-5.3.18-150300.59.158.1</li> <li>kernel-preempt-debugsource-5.3.18-150300.59.158.1</li> <li>kernel-syms-5.3.18-150300.59.158.1</li> <li>kernel-preempt-devel-5.3.18-150300.59.158.1</li> <li>reiserfs-kmp-default-debuginfo-5.3.18-150300.59.158.1</li> <li>kernel-preempt-debuginfo-5.3.18-150300.59.158.1</li> <li>reiserfs-kmp-default-5.3.18-150300.59.158.1</li> <li>kernel-default-debuginfo-5.3.18-150300.59.158.1</li> <li>kernel-obs-build-5.3.18-150300.59.158.1</li> <li>kernel-default-debugsource-5.3.18-150300.59.158.1</li> <li>kernel-default-base-5.3.18-150300.59.158.1.150300.18.92.5</li> <li>kernel-preempt-devel-debuginfo-5.3.18-150300.59.158.1</li> <li>kernel-obs-build-debugsource-5.3.18-150300.59.158.1</li> <li>kernel-default-devel-debuginfo-5.3.18-150300.59.158.1</li> </ul> </li> <li> SUSE Enterprise Storage 7.1 (noarch) <ul> <li>kernel-source-5.3.18-150300.59.158.1</li> <li>kernel-devel-5.3.18-150300.59.158.1</li> <li>kernel-macros-5.3.18-150300.59.158.1</li> </ul> </li> <li> SUSE Enterprise Storage 7.1 (noarch nosrc) <ul> <li>kernel-docs-5.3.18-150300.59.158.1</li> </ul> </li> <li> SUSE Linux Enterprise Micro 5.1 (aarch64 nosrc s390x x86_64) <ul> <li>kernel-default-5.3.18-150300.59.158.1</li> </ul> </li> <li> SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64) <ul> <li>kernel-default-debuginfo-5.3.18-150300.59.158.1</li> <li>kernel-default-debugsource-5.3.18-150300.59.158.1</li> <li>kernel-default-base-5.3.18-150300.59.158.1.150300.18.92.5</li> </ul> </li> <li> SUSE Linux Enterprise Micro 5.2 (aarch64 nosrc s390x x86_64) <ul> <li>kernel-default-5.3.18-150300.59.158.1</li> </ul> </li> <li> SUSE Linux Enterprise Micro 5.2 (aarch64 x86_64) <ul> <li>kernel-default-base-5.3.18-150300.59.158.1.150300.18.92.5</li> </ul> </li> <li> SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) <ul> <li>kernel-default-debuginfo-5.3.18-150300.59.158.1</li> <li>kernel-default-debugsource-5.3.18-150300.59.158.1</li> </ul> </li> <li> SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 nosrc s390x x86_64) <ul> <li>kernel-default-5.3.18-150300.59.158.1</li> </ul> </li> <li> SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 x86_64) <ul> <li>kernel-default-base-5.3.18-150300.59.158.1.150300.18.92.5</li> </ul> </li> <li> SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) <ul> <li>kernel-default-debuginfo-5.3.18-150300.59.158.1</li> <li>kernel-default-debugsource-5.3.18-150300.59.158.1</li> </ul> </li> <li> openSUSE Leap 15.3 (noarch nosrc) <ul> <li>kernel-docs-5.3.18-150300.59.158.1</li> </ul> </li> <li> openSUSE Leap 15.3 (noarch) <ul> <li>kernel-devel-5.3.18-150300.59.158.1</li> <li>kernel-docs-html-5.3.18-150300.59.158.1</li> <li>kernel-source-vanilla-5.3.18-150300.59.158.1</li> <li>kernel-source-5.3.18-150300.59.158.1</li> <li>kernel-macros-5.3.18-150300.59.158.1</li> </ul> </li> <li> openSUSE Leap 15.3 (nosrc ppc64le x86_64) <ul> <li>kernel-kvmsmall-5.3.18-150300.59.158.1</li> <li>kernel-debug-5.3.18-150300.59.158.1</li> </ul> </li> <li> openSUSE Leap 15.3 (ppc64le x86_64) <ul> <li>kernel-kvmsmall-devel-debuginfo-5.3.18-150300.59.158.1</li> <li>kernel-debug-devel-5.3.18-150300.59.158.1</li> <li>kernel-kvmsmall-debugsource-5.3.18-150300.59.158.1</li> <li>kernel-debug-devel-debuginfo-5.3.18-150300.59.158.1</li> <li>kernel-debug-debugsource-5.3.18-150300.59.158.1</li> <li>kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.158.1</li> <li>kernel-kvmsmall-devel-5.3.18-150300.59.158.1</li> <li>kernel-debug-debuginfo-5.3.18-150300.59.158.1</li> <li>kernel-kvmsmall-debuginfo-5.3.18-150300.59.158.1</li> <li>kernel-debug-livepatch-devel-5.3.18-150300.59.158.1</li> </ul> </li> <li> openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64) <ul> <li>kselftests-kmp-default-5.3.18-150300.59.158.1</li> <li>dlm-kmp-default-5.3.18-150300.59.158.1</li> <li>cluster-md-kmp-default-5.3.18-150300.59.158.1</li> <li>kernel-default-base-5.3.18-150300.59.158.1.150300.18.92.5</li> <li>kernel-default-extra-debuginfo-5.3.18-150300.59.158.1</li> <li>kernel-default-livepatch-5.3.18-150300.59.158.1</li> <li>gfs2-kmp-default-debuginfo-5.3.18-150300.59.158.1</li> <li>kernel-obs-qa-5.3.18-150300.59.158.1</li> <li>kernel-default-devel-5.3.18-150300.59.158.1</li> <li>kernel-syms-5.3.18-150300.59.158.1</li> <li>reiserfs-kmp-default-debuginfo-5.3.18-150300.59.158.1</li> <li>kernel-default-debugsource-5.3.18-150300.59.158.1</li> <li>kernel-default-optional-debuginfo-5.3.18-150300.59.158.1</li> <li>cluster-md-kmp-default-debuginfo-5.3.18-150300.59.158.1</li> <li>kernel-obs-build-debugsource-5.3.18-150300.59.158.1</li> <li>gfs2-kmp-default-5.3.18-150300.59.158.1</li> <li>kernel-default-livepatch-devel-5.3.18-150300.59.158.1</li> <li>kernel-default-extra-5.3.18-150300.59.158.1</li> <li>kselftests-kmp-default-debuginfo-5.3.18-150300.59.158.1</li> <li>reiserfs-kmp-default-5.3.18-150300.59.158.1</li> <li>dlm-kmp-default-debuginfo-5.3.18-150300.59.158.1</li> <li>kernel-default-devel-debuginfo-5.3.18-150300.59.158.1</li> <li>ocfs2-kmp-default-5.3.18-150300.59.158.1</li> <li>kernel-default-base-rebuild-5.3.18-150300.59.158.1.150300.18.92.5</li> <li>kernel-default-optional-5.3.18-150300.59.158.1</li> <li>kernel-default-debuginfo-5.3.18-150300.59.158.1</li> <li>kernel-obs-build-5.3.18-150300.59.158.1</li> <li>ocfs2-kmp-default-debuginfo-5.3.18-150300.59.158.1</li> </ul> </li> <li> openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 nosrc) <ul> <li>kernel-default-5.3.18-150300.59.158.1</li> </ul> </li> <li> openSUSE Leap 15.3 (ppc64le s390x x86_64) <ul> <li>kernel-livepatch-SLE15-SP3_Update_43-debugsource-1-150300.7.3.5</li> <li>kernel-livepatch-5_3_18-150300_59_158-default-1-150300.7.3.5</li> <li>kernel-livepatch-5_3_18-150300_59_158-default-debuginfo-1-150300.7.3.5</li> </ul> </li> <li> openSUSE Leap 15.3 (x86_64) <ul> <li>kernel-livepatch-5_3_18-150300_59_158-preempt-1-150300.7.3.5</li> <li>kernel-livepatch-5_3_18-150300_59_158-preempt-debuginfo-1-150300.7.3.5</li> </ul> </li> <li> openSUSE Leap 15.3 (aarch64 x86_64) <ul> <li>reiserfs-kmp-preempt-debuginfo-5.3.18-150300.59.158.1</li> <li>kernel-preempt-livepatch-devel-5.3.18-150300.59.158.1</li> <li>kselftests-kmp-preempt-5.3.18-150300.59.158.1</li> <li>dlm-kmp-preempt-5.3.18-150300.59.158.1</li> <li>kselftests-kmp-preempt-debuginfo-5.3.18-150300.59.158.1</li> <li>kernel-preempt-optional-debuginfo-5.3.18-150300.59.158.1</li> <li>ocfs2-kmp-preempt-debuginfo-5.3.18-150300.59.158.1</li> <li>ocfs2-kmp-preempt-5.3.18-150300.59.158.1</li> <li>kernel-preempt-debugsource-5.3.18-150300.59.158.1</li> <li>kernel-preempt-debuginfo-5.3.18-150300.59.158.1</li> <li>reiserfs-kmp-preempt-5.3.18-150300.59.158.1</li> <li>kernel-preempt-extra-5.3.18-150300.59.158.1</li> <li>gfs2-kmp-preempt-debuginfo-5.3.18-150300.59.158.1</li> <li>cluster-md-kmp-preempt-5.3.18-150300.59.158.1</li> <li>cluster-md-kmp-preempt-debuginfo-5.3.18-150300.59.158.1</li> <li>kernel-preempt-optional-5.3.18-150300.59.158.1</li> <li>kernel-preempt-devel-5.3.18-150300.59.158.1</li> <li>dlm-kmp-preempt-debuginfo-5.3.18-150300.59.158.1</li> <li>kernel-preempt-extra-debuginfo-5.3.18-150300.59.158.1</li> <li>kernel-preempt-devel-debuginfo-5.3.18-150300.59.158.1</li> <li>gfs2-kmp-preempt-5.3.18-150300.59.158.1</li> </ul> </li> <li> openSUSE Leap 15.3 (aarch64 nosrc x86_64) <ul> <li>kernel-preempt-5.3.18-150300.59.158.1</li> </ul> </li> <li> openSUSE Leap 15.3 (nosrc s390x) <ul> <li>kernel-zfcpdump-5.3.18-150300.59.158.1</li> </ul> </li> <li> openSUSE Leap 15.3 (s390x) <ul> <li>kernel-zfcpdump-debugsource-5.3.18-150300.59.158.1</li> <li>kernel-zfcpdump-debuginfo-5.3.18-150300.59.158.1</li> </ul> </li> <li> openSUSE Leap 15.3 (nosrc) <ul> <li>dtb-aarch64-5.3.18-150300.59.158.1</li> </ul> </li> <li> openSUSE Leap 15.3 (aarch64) <ul> <li>gfs2-kmp-64kb-5.3.18-150300.59.158.1</li> <li>dtb-al-5.3.18-150300.59.158.1</li> <li>dtb-xilinx-5.3.18-150300.59.158.1</li> <li>ocfs2-kmp-64kb-5.3.18-150300.59.158.1</li> <li>dtb-marvell-5.3.18-150300.59.158.1</li> <li>kernel-64kb-extra-5.3.18-150300.59.158.1</li> <li>kselftests-kmp-64kb-5.3.18-150300.59.158.1</li> <li>dtb-freescale-5.3.18-150300.59.158.1</li> <li>dtb-exynos-5.3.18-150300.59.158.1</li> <li>dtb-rockchip-5.3.18-150300.59.158.1</li> <li>dtb-broadcom-5.3.18-150300.59.158.1</li> <li>dtb-arm-5.3.18-150300.59.158.1</li> <li>dtb-mediatek-5.3.18-150300.59.158.1</li> <li>dlm-kmp-64kb-debuginfo-5.3.18-150300.59.158.1</li> <li>kernel-64kb-devel-5.3.18-150300.59.158.1</li> <li>kernel-64kb-optional-5.3.18-150300.59.158.1</li> <li>dtb-cavium-5.3.18-150300.59.158.1</li> <li>dtb-renesas-5.3.18-150300.59.158.1</li> <li>dtb-socionext-5.3.18-150300.59.158.1</li> <li>cluster-md-kmp-64kb-5.3.18-150300.59.158.1</li> <li>kselftests-kmp-64kb-debuginfo-5.3.18-150300.59.158.1</li> <li>kernel-64kb-devel-debuginfo-5.3.18-150300.59.158.1</li> <li>reiserfs-kmp-64kb-debuginfo-5.3.18-150300.59.158.1</li> <li>kernel-64kb-debugsource-5.3.18-150300.59.158.1</li> <li>dtb-amlogic-5.3.18-150300.59.158.1</li> <li>dtb-apm-5.3.18-150300.59.158.1</li> <li>dtb-allwinner-5.3.18-150300.59.158.1</li> <li>gfs2-kmp-64kb-debuginfo-5.3.18-150300.59.158.1</li> <li>kernel-64kb-extra-debuginfo-5.3.18-150300.59.158.1</li> <li>dtb-sprd-5.3.18-150300.59.158.1</li> <li>dtb-qcom-5.3.18-150300.59.158.1</li> <li>dtb-lg-5.3.18-150300.59.158.1</li> <li>kernel-64kb-debuginfo-5.3.18-150300.59.158.1</li> <li>reiserfs-kmp-64kb-5.3.18-150300.59.158.1</li> <li>ocfs2-kmp-64kb-debuginfo-5.3.18-150300.59.158.1</li> <li>dtb-altera-5.3.18-150300.59.158.1</li> <li>dtb-nvidia-5.3.18-150300.59.158.1</li> <li>cluster-md-kmp-64kb-debuginfo-5.3.18-150300.59.158.1</li> <li>kernel-64kb-livepatch-devel-5.3.18-150300.59.158.1</li> <li>dtb-hisilicon-5.3.18-150300.59.158.1</li> <li>dtb-zte-5.3.18-150300.59.158.1</li> <li>dlm-kmp-64kb-5.3.18-150300.59.158.1</li> <li>kernel-64kb-optional-debuginfo-5.3.18-150300.59.158.1</li> <li>dtb-amd-5.3.18-150300.59.158.1</li> </ul> </li> <li> openSUSE Leap 15.3 (aarch64 nosrc) <ul> <li>kernel-64kb-5.3.18-150300.59.158.1</li> </ul> </li> <li> SUSE Linux Enterprise Live Patching 15-SP3 (nosrc) <ul> <li>kernel-default-5.3.18-150300.59.158.1</li> </ul> </li> <li> SUSE Linux Enterprise Live Patching 15-SP3 (ppc64le s390x x86_64) <ul> <li>kernel-default-debuginfo-5.3.18-150300.59.158.1</li> <li>kernel-default-debugsource-5.3.18-150300.59.158.1</li> <li>kernel-default-livepatch-5.3.18-150300.59.158.1</li> <li>kernel-livepatch-5_3_18-150300_59_158-default-1-150300.7.3.5</li> <li>kernel-default-livepatch-devel-5.3.18-150300.59.158.1</li> </ul> </li> <li> SUSE Linux Enterprise High Availability Extension 15 SP3 (aarch64 ppc64le s390x x86_64) <ul> <li>ocfs2-kmp-default-5.3.18-150300.59.158.1</li> <li>dlm-kmp-default-debuginfo-5.3.18-150300.59.158.1</li> <li>kernel-default-debuginfo-5.3.18-150300.59.158.1</li> <li>dlm-kmp-default-5.3.18-150300.59.158.1</li> <li>kernel-default-debugsource-5.3.18-150300.59.158.1</li> <li>cluster-md-kmp-default-5.3.18-150300.59.158.1</li> <li>ocfs2-kmp-default-debuginfo-5.3.18-150300.59.158.1</li> <li>cluster-md-kmp-default-debuginfo-5.3.18-150300.59.158.1</li> <li>gfs2-kmp-default-debuginfo-5.3.18-150300.59.158.1</li> <li>gfs2-kmp-default-5.3.18-150300.59.158.1</li> </ul> </li> <li> SUSE Linux Enterprise High Availability Extension 15 SP3 (nosrc) <ul> <li>kernel-default-5.3.18-150300.59.158.1</li> </ul> </li> <li> SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 nosrc) <ul> <li>kernel-64kb-5.3.18-150300.59.158.1</li> </ul> </li> <li> SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64) <ul> <li>kernel-64kb-debugsource-5.3.18-150300.59.158.1</li> <li>kernel-64kb-devel-5.3.18-150300.59.158.1</li> <li>kernel-64kb-devel-debuginfo-5.3.18-150300.59.158.1</li> <li>kernel-64kb-debuginfo-5.3.18-150300.59.158.1</li> </ul> </li> <li> SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 nosrc x86_64) <ul> <li>kernel-default-5.3.18-150300.59.158.1</li> <li>kernel-preempt-5.3.18-150300.59.158.1</li> </ul> </li> <li> SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) <ul> <li>kernel-default-devel-5.3.18-150300.59.158.1</li> <li>kernel-preempt-debugsource-5.3.18-150300.59.158.1</li> <li>kernel-syms-5.3.18-150300.59.158.1</li> <li>kernel-preempt-devel-5.3.18-150300.59.158.1</li> <li>reiserfs-kmp-default-debuginfo-5.3.18-150300.59.158.1</li> <li>kernel-preempt-debuginfo-5.3.18-150300.59.158.1</li> <li>reiserfs-kmp-default-5.3.18-150300.59.158.1</li> <li>kernel-default-debuginfo-5.3.18-150300.59.158.1</li> <li>kernel-obs-build-5.3.18-150300.59.158.1</li> <li>kernel-default-debugsource-5.3.18-150300.59.158.1</li> <li>kernel-default-base-5.3.18-150300.59.158.1.150300.18.92.5</li> <li>kernel-preempt-devel-debuginfo-5.3.18-150300.59.158.1</li> <li>kernel-obs-build-debugsource-5.3.18-150300.59.158.1</li> <li>kernel-default-devel-debuginfo-5.3.18-150300.59.158.1</li> </ul> </li> <li> SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) <ul> <li>kernel-source-5.3.18-150300.59.158.1</li> <li>kernel-devel-5.3.18-150300.59.158.1</li> <li>kernel-macros-5.3.18-150300.59.158.1</li> </ul> </li> <li> SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch nosrc) <ul> <li>kernel-docs-5.3.18-150300.59.158.1</li> </ul> </li> <li> SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 nosrc) <ul> <li>kernel-64kb-5.3.18-150300.59.158.1</li> </ul> </li> <li> SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64) <ul> <li>kernel-64kb-debugsource-5.3.18-150300.59.158.1</li> <li>kernel-64kb-devel-5.3.18-150300.59.158.1</li> <li>kernel-64kb-devel-debuginfo-5.3.18-150300.59.158.1</li> <li>kernel-64kb-debuginfo-5.3.18-150300.59.158.1</li> </ul> </li> <li> SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64 nosrc) <ul> <li>kernel-default-5.3.18-150300.59.158.1</li> </ul> </li> <li> SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) <ul> <li>kernel-default-devel-5.3.18-150300.59.158.1</li> <li>kernel-syms-5.3.18-150300.59.158.1</li> <li>reiserfs-kmp-default-debuginfo-5.3.18-150300.59.158.1</li> <li>reiserfs-kmp-default-5.3.18-150300.59.158.1</li> <li>kernel-default-debuginfo-5.3.18-150300.59.158.1</li> <li>kernel-obs-build-5.3.18-150300.59.158.1</li> <li>kernel-default-debugsource-5.3.18-150300.59.158.1</li> <li>kernel-default-base-5.3.18-150300.59.158.1.150300.18.92.5</li> <li>kernel-obs-build-debugsource-5.3.18-150300.59.158.1</li> <li>kernel-default-devel-debuginfo-5.3.18-150300.59.158.1</li> </ul> </li> <li> SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch) <ul> <li>kernel-source-5.3.18-150300.59.158.1</li> <li>kernel-devel-5.3.18-150300.59.158.1</li> <li>kernel-macros-5.3.18-150300.59.158.1</li> </ul> </li> <li> SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch nosrc) <ul> <li>kernel-docs-5.3.18-150300.59.158.1</li> </ul> </li> <li> SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 nosrc x86_64) <ul> <li>kernel-preempt-5.3.18-150300.59.158.1</li> </ul> </li> <li> SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 x86_64) <ul> <li>kernel-preempt-devel-debuginfo-5.3.18-150300.59.158.1</li> <li>kernel-preempt-devel-5.3.18-150300.59.158.1</li> <li>kernel-preempt-debuginfo-5.3.18-150300.59.158.1</li> <li>kernel-preempt-debugsource-5.3.18-150300.59.158.1</li> </ul> </li> <li> SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (nosrc s390x) <ul> <li>kernel-zfcpdump-5.3.18-150300.59.158.1</li> </ul> </li> <li> SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (s390x) <ul> <li>kernel-zfcpdump-debugsource-5.3.18-150300.59.158.1</li> <li>kernel-zfcpdump-debuginfo-5.3.18-150300.59.158.1</li> </ul> </li> </ul>
<h2>References:</h2> <ul> <li> <a href="https://www.suse.com/security/cve/CVE-2020-36780.html">https://www.suse.com/security/cve/CVE-2020-36780.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2020-36781.html">https://www.suse.com/security/cve/CVE-2020-36781.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2020-36782.html">https://www.suse.com/security/cve/CVE-2020-36782.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2020-36783.html">https://www.suse.com/security/cve/CVE-2020-36783.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-23134.html">https://www.suse.com/security/cve/CVE-2021-23134.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-29155.html">https://www.suse.com/security/cve/CVE-2021-29155.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-46908.html">https://www.suse.com/security/cve/CVE-2021-46908.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-46909.html">https://www.suse.com/security/cve/CVE-2021-46909.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-46911.html">https://www.suse.com/security/cve/CVE-2021-46911.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-46914.html">https://www.suse.com/security/cve/CVE-2021-46914.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-46917.html">https://www.suse.com/security/cve/CVE-2021-46917.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-46918.html">https://www.suse.com/security/cve/CVE-2021-46918.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-46919.html">https://www.suse.com/security/cve/CVE-2021-46919.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-46920.html">https://www.suse.com/security/cve/CVE-2021-46920.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-46921.html">https://www.suse.com/security/cve/CVE-2021-46921.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-46922.html">https://www.suse.com/security/cve/CVE-2021-46922.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-46930.html">https://www.suse.com/security/cve/CVE-2021-46930.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-46931.html">https://www.suse.com/security/cve/CVE-2021-46931.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-46933.html">https://www.suse.com/security/cve/CVE-2021-46933.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-46938.html">https://www.suse.com/security/cve/CVE-2021-46938.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-46939.html">https://www.suse.com/security/cve/CVE-2021-46939.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-46943.html">https://www.suse.com/security/cve/CVE-2021-46943.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-46944.html">https://www.suse.com/security/cve/CVE-2021-46944.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-46950.html">https://www.suse.com/security/cve/CVE-2021-46950.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-46951.html">https://www.suse.com/security/cve/CVE-2021-46951.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-46956.html">https://www.suse.com/security/cve/CVE-2021-46956.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-46958.html">https://www.suse.com/security/cve/CVE-2021-46958.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-46959.html">https://www.suse.com/security/cve/CVE-2021-46959.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-46960.html">https://www.suse.com/security/cve/CVE-2021-46960.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-46961.html">https://www.suse.com/security/cve/CVE-2021-46961.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-46962.html">https://www.suse.com/security/cve/CVE-2021-46962.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-46963.html">https://www.suse.com/security/cve/CVE-2021-46963.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-46971.html">https://www.suse.com/security/cve/CVE-2021-46971.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-46976.html">https://www.suse.com/security/cve/CVE-2021-46976.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-46980.html">https://www.suse.com/security/cve/CVE-2021-46980.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-46981.html">https://www.suse.com/security/cve/CVE-2021-46981.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-46983.html">https://www.suse.com/security/cve/CVE-2021-46983.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-46984.html">https://www.suse.com/security/cve/CVE-2021-46984.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-46988.html">https://www.suse.com/security/cve/CVE-2021-46988.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-46990.html">https://www.suse.com/security/cve/CVE-2021-46990.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-46991.html">https://www.suse.com/security/cve/CVE-2021-46991.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-46992.html">https://www.suse.com/security/cve/CVE-2021-46992.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-46998.html">https://www.suse.com/security/cve/CVE-2021-46998.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47000.html">https://www.suse.com/security/cve/CVE-2021-47000.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47001.html">https://www.suse.com/security/cve/CVE-2021-47001.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47003.html">https://www.suse.com/security/cve/CVE-2021-47003.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47006.html">https://www.suse.com/security/cve/CVE-2021-47006.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47009.html">https://www.suse.com/security/cve/CVE-2021-47009.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47013.html">https://www.suse.com/security/cve/CVE-2021-47013.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47014.html">https://www.suse.com/security/cve/CVE-2021-47014.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47015.html">https://www.suse.com/security/cve/CVE-2021-47015.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47017.html">https://www.suse.com/security/cve/CVE-2021-47017.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47020.html">https://www.suse.com/security/cve/CVE-2021-47020.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47026.html">https://www.suse.com/security/cve/CVE-2021-47026.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47034.html">https://www.suse.com/security/cve/CVE-2021-47034.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47035.html">https://www.suse.com/security/cve/CVE-2021-47035.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47038.html">https://www.suse.com/security/cve/CVE-2021-47038.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47044.html">https://www.suse.com/security/cve/CVE-2021-47044.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47045.html">https://www.suse.com/security/cve/CVE-2021-47045.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47046.html">https://www.suse.com/security/cve/CVE-2021-47046.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47049.html">https://www.suse.com/security/cve/CVE-2021-47049.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47051.html">https://www.suse.com/security/cve/CVE-2021-47051.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47055.html">https://www.suse.com/security/cve/CVE-2021-47055.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47056.html">https://www.suse.com/security/cve/CVE-2021-47056.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47058.html">https://www.suse.com/security/cve/CVE-2021-47058.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47061.html">https://www.suse.com/security/cve/CVE-2021-47061.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47063.html">https://www.suse.com/security/cve/CVE-2021-47063.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47065.html">https://www.suse.com/security/cve/CVE-2021-47065.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47068.html">https://www.suse.com/security/cve/CVE-2021-47068.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47069.html">https://www.suse.com/security/cve/CVE-2021-47069.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47070.html">https://www.suse.com/security/cve/CVE-2021-47070.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47071.html">https://www.suse.com/security/cve/CVE-2021-47071.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47073.html">https://www.suse.com/security/cve/CVE-2021-47073.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47077.html">https://www.suse.com/security/cve/CVE-2021-47077.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47082.html">https://www.suse.com/security/cve/CVE-2021-47082.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47087.html">https://www.suse.com/security/cve/CVE-2021-47087.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47095.html">https://www.suse.com/security/cve/CVE-2021-47095.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47097.html">https://www.suse.com/security/cve/CVE-2021-47097.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47100.html">https://www.suse.com/security/cve/CVE-2021-47100.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47101.html">https://www.suse.com/security/cve/CVE-2021-47101.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47109.html">https://www.suse.com/security/cve/CVE-2021-47109.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47110.html">https://www.suse.com/security/cve/CVE-2021-47110.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47112.html">https://www.suse.com/security/cve/CVE-2021-47112.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47114.html">https://www.suse.com/security/cve/CVE-2021-47114.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47117.html">https://www.suse.com/security/cve/CVE-2021-47117.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47118.html">https://www.suse.com/security/cve/CVE-2021-47118.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47119.html">https://www.suse.com/security/cve/CVE-2021-47119.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47120.html">https://www.suse.com/security/cve/CVE-2021-47120.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47130.html">https://www.suse.com/security/cve/CVE-2021-47130.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47136.html">https://www.suse.com/security/cve/CVE-2021-47136.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47137.html">https://www.suse.com/security/cve/CVE-2021-47137.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47138.html">https://www.suse.com/security/cve/CVE-2021-47138.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47139.html">https://www.suse.com/security/cve/CVE-2021-47139.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47141.html">https://www.suse.com/security/cve/CVE-2021-47141.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47142.html">https://www.suse.com/security/cve/CVE-2021-47142.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47144.html">https://www.suse.com/security/cve/CVE-2021-47144.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47150.html">https://www.suse.com/security/cve/CVE-2021-47150.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47153.html">https://www.suse.com/security/cve/CVE-2021-47153.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47160.html">https://www.suse.com/security/cve/CVE-2021-47160.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47161.html">https://www.suse.com/security/cve/CVE-2021-47161.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47164.html">https://www.suse.com/security/cve/CVE-2021-47164.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47165.html">https://www.suse.com/security/cve/CVE-2021-47165.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47166.html">https://www.suse.com/security/cve/CVE-2021-47166.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47167.html">https://www.suse.com/security/cve/CVE-2021-47167.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47168.html">https://www.suse.com/security/cve/CVE-2021-47168.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47169.html">https://www.suse.com/security/cve/CVE-2021-47169.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47170.html">https://www.suse.com/security/cve/CVE-2021-47170.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47171.html">https://www.suse.com/security/cve/CVE-2021-47171.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47172.html">https://www.suse.com/security/cve/CVE-2021-47172.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47173.html">https://www.suse.com/security/cve/CVE-2021-47173.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47174.html">https://www.suse.com/security/cve/CVE-2021-47174.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47175.html">https://www.suse.com/security/cve/CVE-2021-47175.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47176.html">https://www.suse.com/security/cve/CVE-2021-47176.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47177.html">https://www.suse.com/security/cve/CVE-2021-47177.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47179.html">https://www.suse.com/security/cve/CVE-2021-47179.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47180.html">https://www.suse.com/security/cve/CVE-2021-47180.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47181.html">https://www.suse.com/security/cve/CVE-2021-47181.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47183.html">https://www.suse.com/security/cve/CVE-2021-47183.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47185.html">https://www.suse.com/security/cve/CVE-2021-47185.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2021-47189.html">https://www.suse.com/security/cve/CVE-2021-47189.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2022-0487.html">https://www.suse.com/security/cve/CVE-2022-0487.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2022-4744.html">https://www.suse.com/security/cve/CVE-2022-4744.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2022-48626.html">https://www.suse.com/security/cve/CVE-2022-48626.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-0160.html">https://www.suse.com/security/cve/CVE-2023-0160.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-1192.html">https://www.suse.com/security/cve/CVE-2023-1192.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-28746.html">https://www.suse.com/security/cve/CVE-2023-28746.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-35827.html">https://www.suse.com/security/cve/CVE-2023-35827.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-52454.html">https://www.suse.com/security/cve/CVE-2023-52454.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-52469.html">https://www.suse.com/security/cve/CVE-2023-52469.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-52470.html">https://www.suse.com/security/cve/CVE-2023-52470.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-52474.html">https://www.suse.com/security/cve/CVE-2023-52474.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-52476.html">https://www.suse.com/security/cve/CVE-2023-52476.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-52477.html">https://www.suse.com/security/cve/CVE-2023-52477.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-52492.html">https://www.suse.com/security/cve/CVE-2023-52492.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-52500.html">https://www.suse.com/security/cve/CVE-2023-52500.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-52508.html">https://www.suse.com/security/cve/CVE-2023-52508.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-52509.html">https://www.suse.com/security/cve/CVE-2023-52509.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-52572.html">https://www.suse.com/security/cve/CVE-2023-52572.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-52575.html">https://www.suse.com/security/cve/CVE-2023-52575.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-52583.html">https://www.suse.com/security/cve/CVE-2023-52583.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-52590.html">https://www.suse.com/security/cve/CVE-2023-52590.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-52591.html">https://www.suse.com/security/cve/CVE-2023-52591.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-52607.html">https://www.suse.com/security/cve/CVE-2023-52607.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-52628.html">https://www.suse.com/security/cve/CVE-2023-52628.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-6270.html">https://www.suse.com/security/cve/CVE-2023-6270.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-6356.html">https://www.suse.com/security/cve/CVE-2023-6356.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-6531.html">https://www.suse.com/security/cve/CVE-2023-6531.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-6535.html">https://www.suse.com/security/cve/CVE-2023-6535.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-6536.html">https://www.suse.com/security/cve/CVE-2023-6536.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-7042.html">https://www.suse.com/security/cve/CVE-2023-7042.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-7192.html">https://www.suse.com/security/cve/CVE-2023-7192.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-22099.html">https://www.suse.com/security/cve/CVE-2024-22099.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-26600.html">https://www.suse.com/security/cve/CVE-2024-26600.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-26614.html">https://www.suse.com/security/cve/CVE-2024-26614.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-26642.html">https://www.suse.com/security/cve/CVE-2024-26642.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-26704.html">https://www.suse.com/security/cve/CVE-2024-26704.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-26733.html">https://www.suse.com/security/cve/CVE-2024-26733.html</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1184942">https://bugzilla.suse.com/show_bug.cgi?id=1184942</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1186060">https://bugzilla.suse.com/show_bug.cgi?id=1186060</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1192145">https://bugzilla.suse.com/show_bug.cgi?id=1192145</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1194516">https://bugzilla.suse.com/show_bug.cgi?id=1194516</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1208995">https://bugzilla.suse.com/show_bug.cgi?id=1208995</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1209635">https://bugzilla.suse.com/show_bug.cgi?id=1209635</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1209657">https://bugzilla.suse.com/show_bug.cgi?id=1209657</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1212514">https://bugzilla.suse.com/show_bug.cgi?id=1212514</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1213456">https://bugzilla.suse.com/show_bug.cgi?id=1213456</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1217987">https://bugzilla.suse.com/show_bug.cgi?id=1217987</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1217988">https://bugzilla.suse.com/show_bug.cgi?id=1217988</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1217989">https://bugzilla.suse.com/show_bug.cgi?id=1217989</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1218336">https://bugzilla.suse.com/show_bug.cgi?id=1218336</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1218447">https://bugzilla.suse.com/show_bug.cgi?id=1218447</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1218479">https://bugzilla.suse.com/show_bug.cgi?id=1218479</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1218562">https://bugzilla.suse.com/show_bug.cgi?id=1218562</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1219170">https://bugzilla.suse.com/show_bug.cgi?id=1219170</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1219264">https://bugzilla.suse.com/show_bug.cgi?id=1219264</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220320">https://bugzilla.suse.com/show_bug.cgi?id=1220320</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220340">https://bugzilla.suse.com/show_bug.cgi?id=1220340</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220366">https://bugzilla.suse.com/show_bug.cgi?id=1220366</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220400">https://bugzilla.suse.com/show_bug.cgi?id=1220400</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220411">https://bugzilla.suse.com/show_bug.cgi?id=1220411</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220413">https://bugzilla.suse.com/show_bug.cgi?id=1220413</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220414">https://bugzilla.suse.com/show_bug.cgi?id=1220414</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220425">https://bugzilla.suse.com/show_bug.cgi?id=1220425</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220426">https://bugzilla.suse.com/show_bug.cgi?id=1220426</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220429">https://bugzilla.suse.com/show_bug.cgi?id=1220429</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220432">https://bugzilla.suse.com/show_bug.cgi?id=1220432</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220442">https://bugzilla.suse.com/show_bug.cgi?id=1220442</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220445">https://bugzilla.suse.com/show_bug.cgi?id=1220445</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220465">https://bugzilla.suse.com/show_bug.cgi?id=1220465</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220468">https://bugzilla.suse.com/show_bug.cgi?id=1220468</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220475">https://bugzilla.suse.com/show_bug.cgi?id=1220475</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220484">https://bugzilla.suse.com/show_bug.cgi?id=1220484</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220486">https://bugzilla.suse.com/show_bug.cgi?id=1220486</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220487">https://bugzilla.suse.com/show_bug.cgi?id=1220487</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220516">https://bugzilla.suse.com/show_bug.cgi?id=1220516</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220521">https://bugzilla.suse.com/show_bug.cgi?id=1220521</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220528">https://bugzilla.suse.com/show_bug.cgi?id=1220528</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220529">https://bugzilla.suse.com/show_bug.cgi?id=1220529</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220532">https://bugzilla.suse.com/show_bug.cgi?id=1220532</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220554">https://bugzilla.suse.com/show_bug.cgi?id=1220554</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220556">https://bugzilla.suse.com/show_bug.cgi?id=1220556</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220557">https://bugzilla.suse.com/show_bug.cgi?id=1220557</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220560">https://bugzilla.suse.com/show_bug.cgi?id=1220560</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220561">https://bugzilla.suse.com/show_bug.cgi?id=1220561</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220566">https://bugzilla.suse.com/show_bug.cgi?id=1220566</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220575">https://bugzilla.suse.com/show_bug.cgi?id=1220575</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220580">https://bugzilla.suse.com/show_bug.cgi?id=1220580</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220583">https://bugzilla.suse.com/show_bug.cgi?id=1220583</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220611">https://bugzilla.suse.com/show_bug.cgi?id=1220611</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220615">https://bugzilla.suse.com/show_bug.cgi?id=1220615</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220621">https://bugzilla.suse.com/show_bug.cgi?id=1220621</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220625">https://bugzilla.suse.com/show_bug.cgi?id=1220625</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220630">https://bugzilla.suse.com/show_bug.cgi?id=1220630</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220631">https://bugzilla.suse.com/show_bug.cgi?id=1220631</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220638">https://bugzilla.suse.com/show_bug.cgi?id=1220638</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220639">https://bugzilla.suse.com/show_bug.cgi?id=1220639</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220640">https://bugzilla.suse.com/show_bug.cgi?id=1220640</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220641">https://bugzilla.suse.com/show_bug.cgi?id=1220641</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220662">https://bugzilla.suse.com/show_bug.cgi?id=1220662</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220663">https://bugzilla.suse.com/show_bug.cgi?id=1220663</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220669">https://bugzilla.suse.com/show_bug.cgi?id=1220669</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220670">https://bugzilla.suse.com/show_bug.cgi?id=1220670</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220677">https://bugzilla.suse.com/show_bug.cgi?id=1220677</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220678">https://bugzilla.suse.com/show_bug.cgi?id=1220678</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220685">https://bugzilla.suse.com/show_bug.cgi?id=1220685</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220687">https://bugzilla.suse.com/show_bug.cgi?id=1220687</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220688">https://bugzilla.suse.com/show_bug.cgi?id=1220688</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220692">https://bugzilla.suse.com/show_bug.cgi?id=1220692</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220697">https://bugzilla.suse.com/show_bug.cgi?id=1220697</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220703">https://bugzilla.suse.com/show_bug.cgi?id=1220703</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220706">https://bugzilla.suse.com/show_bug.cgi?id=1220706</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220733">https://bugzilla.suse.com/show_bug.cgi?id=1220733</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220734">https://bugzilla.suse.com/show_bug.cgi?id=1220734</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220739">https://bugzilla.suse.com/show_bug.cgi?id=1220739</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220743">https://bugzilla.suse.com/show_bug.cgi?id=1220743</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220745">https://bugzilla.suse.com/show_bug.cgi?id=1220745</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220749">https://bugzilla.suse.com/show_bug.cgi?id=1220749</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220751">https://bugzilla.suse.com/show_bug.cgi?id=1220751</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220753">https://bugzilla.suse.com/show_bug.cgi?id=1220753</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220758">https://bugzilla.suse.com/show_bug.cgi?id=1220758</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220759">https://bugzilla.suse.com/show_bug.cgi?id=1220759</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220764">https://bugzilla.suse.com/show_bug.cgi?id=1220764</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220768">https://bugzilla.suse.com/show_bug.cgi?id=1220768</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220769">https://bugzilla.suse.com/show_bug.cgi?id=1220769</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220777">https://bugzilla.suse.com/show_bug.cgi?id=1220777</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220779">https://bugzilla.suse.com/show_bug.cgi?id=1220779</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220785">https://bugzilla.suse.com/show_bug.cgi?id=1220785</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220790">https://bugzilla.suse.com/show_bug.cgi?id=1220790</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220794">https://bugzilla.suse.com/show_bug.cgi?id=1220794</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220824">https://bugzilla.suse.com/show_bug.cgi?id=1220824</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220826">https://bugzilla.suse.com/show_bug.cgi?id=1220826</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220829">https://bugzilla.suse.com/show_bug.cgi?id=1220829</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220836">https://bugzilla.suse.com/show_bug.cgi?id=1220836</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220846">https://bugzilla.suse.com/show_bug.cgi?id=1220846</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220850">https://bugzilla.suse.com/show_bug.cgi?id=1220850</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220861">https://bugzilla.suse.com/show_bug.cgi?id=1220861</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220871">https://bugzilla.suse.com/show_bug.cgi?id=1220871</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220883">https://bugzilla.suse.com/show_bug.cgi?id=1220883</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220946">https://bugzilla.suse.com/show_bug.cgi?id=1220946</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220954">https://bugzilla.suse.com/show_bug.cgi?id=1220954</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220969">https://bugzilla.suse.com/show_bug.cgi?id=1220969</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220979">https://bugzilla.suse.com/show_bug.cgi?id=1220979</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220982">https://bugzilla.suse.com/show_bug.cgi?id=1220982</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220985">https://bugzilla.suse.com/show_bug.cgi?id=1220985</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220987">https://bugzilla.suse.com/show_bug.cgi?id=1220987</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221015">https://bugzilla.suse.com/show_bug.cgi?id=1221015</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221044">https://bugzilla.suse.com/show_bug.cgi?id=1221044</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221058">https://bugzilla.suse.com/show_bug.cgi?id=1221058</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221061">https://bugzilla.suse.com/show_bug.cgi?id=1221061</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221077">https://bugzilla.suse.com/show_bug.cgi?id=1221077</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221088">https://bugzilla.suse.com/show_bug.cgi?id=1221088</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221276">https://bugzilla.suse.com/show_bug.cgi?id=1221276</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221293">https://bugzilla.suse.com/show_bug.cgi?id=1221293</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221532">https://bugzilla.suse.com/show_bug.cgi?id=1221532</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221534">https://bugzilla.suse.com/show_bug.cgi?id=1221534</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221541">https://bugzilla.suse.com/show_bug.cgi?id=1221541</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221548">https://bugzilla.suse.com/show_bug.cgi?id=1221548</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221552">https://bugzilla.suse.com/show_bug.cgi?id=1221552</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221575">https://bugzilla.suse.com/show_bug.cgi?id=1221575</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221605">https://bugzilla.suse.com/show_bug.cgi?id=1221605</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221606">https://bugzilla.suse.com/show_bug.cgi?id=1221606</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221608">https://bugzilla.suse.com/show_bug.cgi?id=1221608</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221830">https://bugzilla.suse.com/show_bug.cgi?id=1221830</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221931">https://bugzilla.suse.com/show_bug.cgi?id=1221931</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221932">https://bugzilla.suse.com/show_bug.cgi?id=1221932</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221934">https://bugzilla.suse.com/show_bug.cgi?id=1221934</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221935">https://bugzilla.suse.com/show_bug.cgi?id=1221935</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221949">https://bugzilla.suse.com/show_bug.cgi?id=1221949</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221952">https://bugzilla.suse.com/show_bug.cgi?id=1221952</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221965">https://bugzilla.suse.com/show_bug.cgi?id=1221965</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221966">https://bugzilla.suse.com/show_bug.cgi?id=1221966</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221969">https://bugzilla.suse.com/show_bug.cgi?id=1221969</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221973">https://bugzilla.suse.com/show_bug.cgi?id=1221973</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221974">https://bugzilla.suse.com/show_bug.cgi?id=1221974</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221978">https://bugzilla.suse.com/show_bug.cgi?id=1221978</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221989">https://bugzilla.suse.com/show_bug.cgi?id=1221989</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221990">https://bugzilla.suse.com/show_bug.cgi?id=1221990</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221991">https://bugzilla.suse.com/show_bug.cgi?id=1221991</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221992">https://bugzilla.suse.com/show_bug.cgi?id=1221992</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221993">https://bugzilla.suse.com/show_bug.cgi?id=1221993</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221994">https://bugzilla.suse.com/show_bug.cgi?id=1221994</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221996">https://bugzilla.suse.com/show_bug.cgi?id=1221996</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221997">https://bugzilla.suse.com/show_bug.cgi?id=1221997</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221998">https://bugzilla.suse.com/show_bug.cgi?id=1221998</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1221999">https://bugzilla.suse.com/show_bug.cgi?id=1221999</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222000">https://bugzilla.suse.com/show_bug.cgi?id=1222000</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222001">https://bugzilla.suse.com/show_bug.cgi?id=1222001</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222002">https://bugzilla.suse.com/show_bug.cgi?id=1222002</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222003">https://bugzilla.suse.com/show_bug.cgi?id=1222003</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222004">https://bugzilla.suse.com/show_bug.cgi?id=1222004</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222117">https://bugzilla.suse.com/show_bug.cgi?id=1222117</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222422">https://bugzilla.suse.com/show_bug.cgi?id=1222422</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222585">https://bugzilla.suse.com/show_bug.cgi?id=1222585</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222619">https://bugzilla.suse.com/show_bug.cgi?id=1222619</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222660">https://bugzilla.suse.com/show_bug.cgi?id=1222660</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222664">https://bugzilla.suse.com/show_bug.cgi?id=1222664</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222669">https://bugzilla.suse.com/show_bug.cgi?id=1222669</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1222706">https://bugzilla.suse.com/show_bug.cgi?id=1222706</a> </li> <li> <a href="https://jira.suse.com/browse/PED-5759">https://jira.suse.com/browse/PED-5759</a> </li> <li> <a href="https://jira.suse.com/browse/SLE-13706">https://jira.suse.com/browse/SLE-13706</a> </li> <li> <a href="https://jira.suse.com/browse/SLE-15131">https://jira.suse.com/browse/SLE-15131</a> </li> <li> <a href="https://jira.suse.com/browse/SLE-15172">https://jira.suse.com/browse/SLE-15172</a> </li> <li> <a href="https://jira.suse.com/browse/SLE-15176">https://jira.suse.com/browse/SLE-15176</a> </li> </ul> </div>
--===============3656136079492087187==--
|
|
|
|