SUSE-SU-2023:3349-1: important: Security update for the Linux Kernel

sle-security-updates at lists.suse.com sle-security-updates at lists.suse.com
Thu Aug 17 16:30:21 UTC 2023



# Security update for the Linux Kernel

Announcement ID: SUSE-SU-2023:3349-1  
Rating: important  
References:

  * #1087082
  * #1150305
  * #1173438
  * #1188885
  * #1202670
  * #1202716
  * #1205496
  * #1206418
  * #1207526
  * #1207528
  * #1207561
  * #1207617
  * #1207620
  * #1207629
  * #1207630
  * #1207633
  * #1207634
  * #1207653
  * #1208788
  * #1210584
  * #1210765
  * #1210766
  * #1210771
  * #1211738
  * #1211867
  * #1212266
  * #1212301
  * #1212657
  * #1212741
  * #1212835
  * #1212871
  * #1212905
  * #1212986
  * #1212987
  * #1212988
  * #1212989
  * #1212990
  * #1213010
  * #1213011
  * #1213012
  * #1213013
  * #1213014
  * #1213015
  * #1213017
  * #1213018
  * #1213019
  * #1213020
  * #1213021
  * #1213022
  * #1213023
  * #1213024
  * #1213025
  * #1213032
  * #1213033
  * #1213034
  * #1213035
  * #1213036
  * #1213037
  * #1213038
  * #1213039
  * #1213040
  * #1213041
  * #1213042
  * #1213059
  * #1213133
  * #1213167
  * #1213215
  * #1213218
  * #1213221
  * #1213286
  * #1213287
  * #1213344
  * #1213346
  * #1213350
  * #1213525
  * #1213585
  * #1213586
  * #1213588
  * #1213705
  * #1213747
  * #1213766
  * #1213819
  * #1213823
  * #1213825
  * #1213827

  
Cross-References:

  * CVE-2018-3639
  * CVE-2022-40982
  * CVE-2023-0459
  * CVE-2023-20569
  * CVE-2023-20593
  * CVE-2023-2985
  * CVE-2023-35001
  * CVE-2023-3567
  * CVE-2023-3609
  * CVE-2023-3611
  * CVE-2023-3776

  
CVSS scores:

  * CVE-2018-3639 ( SUSE ):  4.3 CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N
  * CVE-2018-3639 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
  * CVE-2018-3639 ( NVD ):  5.5 CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
  * CVE-2022-40982 ( SUSE ):  6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
  * CVE-2022-40982 ( NVD ):  6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
  * CVE-2023-0459 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
  * CVE-2023-0459 ( NVD ):  6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
  * CVE-2023-20569 ( SUSE ):  5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
  * CVE-2023-20593 ( SUSE ):  6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
  * CVE-2023-20593 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
  * CVE-2023-2985 ( SUSE ):  6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-2985 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-35001 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-35001 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-3567 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-3567 ( NVD ):  6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-3609 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-3609 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-3611 ( SUSE ):  6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-3611 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-3776 ( SUSE ):  6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-3776 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

  
Affected Products:

  * SUSE Linux Enterprise High Performance Computing 12 SP5
  * SUSE Linux Enterprise Server 12 SP5
  * SUSE Linux Enterprise Server for SAP Applications 12 SP5

  
  
An update that solves 11 vulnerabilities and has 74 fixes can now be installed.

## Description:

The SUSE Linux Enterprise 12 SP5 Azure kernel was updated to receive various
security and bugfixes.

The following security bugs were fixed:

  * CVE-2023-3609: Fixed reference counter leak leading to overflow in net/sched
    (bsc#1213586).
  * CVE-2023-3611: Fixed an out-of-bounds write in net/sched
    sch_qfq(bsc#1213585).
  * CVE-2023-3567: Fixed a use-after-free in vcs_read in
    drivers/tty/vt/vc_screen.c (bsc#1213167).
  * CVE-2023-0459: Fixed information leak in __uaccess_begin_nospec
    (bsc#1211738).
  * CVE-2022-40982: Fixed transient execution attack called "Gather Data
    Sampling" (bsc#1206418).
  * CVE-2023-20593: Fixed a ZenBleed issue in "Zen 2" CPUs that could allow an
    attacker to potentially access sensitive information (bsc#1213286).
  * CVE-2023-2985: Fixed an use-after-free vulnerability in hfsplus_put_super in
    fs/hfsplus/super.c that could allow a local user to cause a denial of
    service (bsc#1211867).
  * CVE-2023-35001: Fixed an out-of-bounds memory access flaw in nft_byteorder
    that could allow a local attacker to escalate their privilege (bsc#1213059).
  * CVE-2023-20569: Fixed side channel attack ‘Inception’ or ‘RAS Poisoning’
    (bsc#1213287).

The following non-security bugs were fixed:

  * Get module prefix from kmod (bsc#1212835).
  * USB: add NO_LPM quirk for Realforce 87U Keyboard (git-fixes).
  * USB: core: add quirk for Alcor Link AK9563 smartcard reader (git-fixes).
  * USB: core: hub: Disable autosuspend for Cypress CY7C65632 (git-fixes).
  * USB: hcd-pci: Fully suspend across freeze/thaw cycle (git-fixes).
  * USB: hub: Add delay for SuperSpeed hub resume to let links transit to U0
    (git-fixes).
  * USB: serial: option: add Fibocom FM160 0x0111 composition (git-fixes).
  * USB: serial: option: add Quectel EM05-G (GR) modem (git-fixes).
  * USB: serial: option: add Quectel EM05-G (RS) modem (git-fixes).
  * USB: serial: option: add Sierra Wireless EM9191 (git-fixes).
  * USB: serial: option: add u-blox LARA-R6 00B modem (git-fixes).
  * blkcg, writeback: dead memcgs shouldn't contribute to writeback ownership
    arbitration (bsc#1213022).
  * btrfs: fix resolving backrefs for inline extent followed by prealloc
    (bsc#1213133).
  * delete suse/memcg-drop-kmem-limit_in_bytes. drop the patch in order to fix
    bsc#1213705.
  * dlm: Delete an unnecessary variable initialisation in dlm_ls_start() (git-
    fixes).
  * dlm: NULL check before kmem_cache_destroy is not needed (git-fixes).
  * dlm: fix invalid cluster name warning (git-fixes).
  * dlm: fix missing idr_destroy for recover_idr (git-fixes).
  * dlm: fix missing lkb refcount handling (git-fixes).
  * dlm: fix plock invalid read (git-fixes).
  * dlm: fix possible call to kfree() for non-initialized pointer (git-fixes).
  * ext4: Fix reusing stale buffer heads from last failed mounting
    (bsc#1213020).
  * ext4: add inode table check in __ext4_get_inode_loc to aovid possible
    infinite loop (bsc#1207617).
  * ext4: avoid BUG_ON when creating xattrs (bsc#1205496).
  * ext4: avoid unaccounted block allocation when expanding inode (bsc#1207634).
  * ext4: bail out of ext4_xattr_ibody_get() fails for any reason (bsc#1213018).
  * ext4: fail ext4_iget if special inode unallocated (bsc#1213010).
  * ext4: fix RENAME_WHITEOUT handling for inline directories (bsc#1210766).
  * ext4: fix WARNING in ext4_update_inline_data (bsc#1213012).
  * ext4: fix bug_on in __es_tree_search caused by bad boot loader inode
    (bsc#1207620).
  * ext4: fix cgroup writeback accounting with fs-layer encryption
    (bsc#1210765).
  * ext4: fix deadlock due to mbcache entry corruption (bsc#1207653).
  * ext4: fix error code return to user-space in ext4_get_branch()
    (bsc#1207630).
  * ext4: fix i_disksize exceeding i_size problem in paritally written case
    (bsc#1213015).
  * ext4: fix to check return value of freeze_bdev() in ext4_shutdown()
    (bsc#1213021).
  * ext4: improve error recovery code paths in __ext4_remount() (bsc#1213017).
  * ext4: init quota for 'old.inode' in 'ext4_rename' (bsc#1207629).
  * ext4: initialize quota before expanding inode in setproject ioctl
    (bsc#1207633).
  * ext4: move where set the MAY_INLINE_DATA flag is set (bsc#1213011).
  * ext4: only update i_reserved_data_blocks on successful block allocation
    (bsc#1213019).
  * ext4: zero i_disksize when initializing the bootloader inode (bsc#1213013).
  * fs: dlm: cancel work sync othercon (git-fixes).
  * fs: dlm: filter user dlm messages for kernel locks (git-fixes).
  * fs: dlm: fix configfs memory leak (git-fixes).
  * fs: dlm: fix debugfs dump (git-fixes).
  * fs: dlm: fix memory leak when fenced (git-fixes).
  * fs: dlm: fix race between test_bit() and queue_work() (git-fixes).
  * fs: dlm: handle -EBUSY first in lock arg validation (git-fixes).
  * fs: fix guard_bio_eod to check for real EOD errors (bsc#1213042).
  * fs: prevent BUG_ON in submit_bh_wbc() (bsc#1212990).
  * fuse: revalidate: do not invalidate if interrupted (bsc#1213525).
  * igb: revert rtnl_lock() that causes deadlock (git-fixes).
  * include/trace/events/writeback.h: fix -Wstringop-truncation warnings
    (bsc#1213023).
  * inotify: Avoid reporting event with invalid wd (bsc#1213025).
  * jbd2: Fix statistics for the number of logged blocks (bsc#1212988).
  * jbd2: abort journal if free a async write error metadata buffer
    (bsc#1212989).
  * jbd2: fix assertion 'jh->b_frozen_data == NULL' failure when journal aborted
    (bsc#1202716).
  * jbd2: fix data races at struct journal_head (bsc#1173438).
  * jbd2: fix invalid descriptor block checksum (bsc#1212987).
  * jbd2: fix race when writing superblock (bsc#1212986).
  * jdb2: Do not refuse invalidation of already invalidated buffers
    (bsc#1213014).
  * kernel-docs: Add buildrequires on python3-base when using python3 The
    python3 binary is provided by python3-base.
  * kernel-docs: Use python3 together with python3-Sphinx (bsc#1212741).
  * lib/string: Add strscpy_pad() function (bsc#1213023).
  * mbcache: Fixup kABI of mb_cache_entry (bsc#1207653).
  * memcg: drop kmem.limit_in_bytes (bsc#1208788, bsc#1212905).
  * memcg: fix a crash in wb_workfn when a device disappears (bsc#1213023).
  * net: mana: Add support for vlan tagging (bsc#1212301).
  * ocfs2: check new file size on fallocate call (git-fixes).
  * ocfs2: fix use-after-free when unmounting read-only filesystem (git-fixes).
  * powerpc/64: update speculation_store_bypass in /proc/<pid>/status
    (bsc#1188885 ltc#193722 git-fixes).
  * powerpc/mm/dax: Fix the condition when checking if altmap vmemap can cross-
    boundary (bsc#1150305 ltc#176097 git-fixes).
  * rpm/check-for-config-changes: ignore also PAHOLE_HAS_* We now also have
    options like CONFIG_PAHOLE_HAS_LANG_EXCLUDE.
  * s390/cio: check the subchannel validity for dev_busid (bsc#1207526).
  * s390/cpum_sf: adjust sampling interval to avoid hitting sample limits (git-
    fixes bsc#1213827).
  * s390/dasd: fix memleak in path handling error case (git-fixes bsc#1213221).
  * s390/maccess: add no dat mode to kernel_write (git-fixes bsc#1213825).
  * s390/numa: move initial setup of node_to_cpumask_map (git-fixes
    bsc#1213766).
  * s390/perf: Change CPUM_CF return code in event init function (git-fixes
    bsc#1213344).
  * s390/perf: Return error when debug_register fails (git-fixes bsc#1212657).
  * s390: limit brk randomization to 32MB (git-fixes bsc#1213346).
  * scsi: qla2xxx: update version to 10.02.08.400-k (bsc#1213747).
  * uas: add no-uas quirk for Hiksemi usb_disk (git-fixes).
  * uas: ignore UAS for Thinkplus chips (git-fixes).
  * ubi: Fix failure attaching when vid_hdr offset equals to (sub)page size
    (bsc#1210584).
  * ubi: ensure that VID header offset + VID header size <= alloc, size
    (bsc#1210584).
  * udf: Avoid double brelse() in udf_rename() (bsc#1213032).
  * udf: Check consistency of Space Bitmap Descriptor (bsc#1210771).
  * udf: Define EFSCORRUPTED error code (bsc#1213038).
  * udf: Discard preallocation before extending file with a hole (bsc#1213036).
  * udf: Do not bother looking for prealloc extents if i_lenExtents matches
    i_size (bsc#1213035).
  * udf: Do not bother merging very long extents (bsc#1213040).
  * udf: Do not update file length for failed writes to inline files
    (bsc#1213041).
  * udf: Drop unused arguments of udf_delete_aext() (bsc#1213033).
  * udf: Fix extending file within last block (bsc#1213037).
  * udf: Fix preallocation discarding at indirect extent boundary (bsc#1213034).
  * udf: Truncate added extents on failed expansion (bsc#1213039).
  * update suse/s390-dasd-fix-no-record-found-for-raw_track_access (git-fixes
    bsc#1212266 bsc#1207528).
  * update suse/scsi-zfcp-fix-missing-auto-port-scan-and-thus-missing-target-
    ports (git-fixes bsc#1202670).
  * usb-storage: Add Hiksemi USB3-FW to IGNORE_UAS (git-fixes).
  * usrmerge: Adjust module path in the kernel sources (bsc#1212835).
  * vfio-ccw: Do not call flush_workqueue while holding the spinlock (git-fixes
    bsc#1213218).
  * vfio-ccw: fence off transport mode (git-fixes bsc#1213215).
  * vfio-ccw: prevent quiesce function going into an infinite loop (git-fixes
    bsc#1213819).
  * vfio-ccw: release any channel program when releasing/removing vfio-ccw mdev
    (git-fixes bsc#1213823).
  * writeback: fix call of incorrect macro (bsc#1213024).
  * x86/bugs: Enable STIBP for JMP2RET (git-fixes).
  * x86/bugs: Remove apostrophe typo (git-fixes).
  * x86/bugs: Warn when "ibrs" mitigation is selected on Enhanced IBRS parts
    (git-fixes).
  * x86/cpu: Load microcode during restore_processor_state() (git-fixes).
  * x86/delay: Fix the wrong asm constraint in delay_loop() (git-fixes).
  * x86/speculation/mmio: Print SMT warning (git-fixes).
  * x86: Fix return value of __setup handlers (git-fixes).

## Special Instructions and Notes:

  * Please reboot the system after installing this update.

## Patch Instructions:

To install this SUSE Important update use the SUSE recommended installation
methods like YaST online_update or "zypper patch".  
Alternatively you can run the command listed for your product:

  * SUSE Linux Enterprise Server for SAP Applications 12 SP5  
    zypper in -t patch SUSE-SLE-SERVER-12-SP5-2023-3349=1

  * SUSE Linux Enterprise High Performance Computing 12 SP5  
    zypper in -t patch SUSE-SLE-SERVER-12-SP5-2023-3349=1

  * SUSE Linux Enterprise Server 12 SP5  
    zypper in -t patch SUSE-SLE-SERVER-12-SP5-2023-3349=1

## Package List:

  * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (nosrc x86_64)
    * kernel-azure-4.12.14-16.146.1
  * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (x86_64)
    * kernel-syms-azure-4.12.14-16.146.1
    * kernel-azure-devel-4.12.14-16.146.1
    * kernel-azure-base-debuginfo-4.12.14-16.146.1
    * kernel-azure-base-4.12.14-16.146.1
    * kernel-azure-debuginfo-4.12.14-16.146.1
    * kernel-azure-debugsource-4.12.14-16.146.1
  * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (noarch)
    * kernel-devel-azure-4.12.14-16.146.1
    * kernel-source-azure-4.12.14-16.146.1
  * SUSE Linux Enterprise High Performance Computing 12 SP5 (nosrc x86_64)
    * kernel-azure-4.12.14-16.146.1
  * SUSE Linux Enterprise High Performance Computing 12 SP5 (x86_64)
    * kernel-syms-azure-4.12.14-16.146.1
    * kernel-azure-devel-4.12.14-16.146.1
    * kernel-azure-base-debuginfo-4.12.14-16.146.1
    * kernel-azure-base-4.12.14-16.146.1
    * kernel-azure-debuginfo-4.12.14-16.146.1
    * kernel-azure-debugsource-4.12.14-16.146.1
  * SUSE Linux Enterprise High Performance Computing 12 SP5 (noarch)
    * kernel-devel-azure-4.12.14-16.146.1
    * kernel-source-azure-4.12.14-16.146.1
  * SUSE Linux Enterprise Server 12 SP5 (nosrc x86_64)
    * kernel-azure-4.12.14-16.146.1
  * SUSE Linux Enterprise Server 12 SP5 (x86_64)
    * kernel-syms-azure-4.12.14-16.146.1
    * kernel-azure-devel-4.12.14-16.146.1
    * kernel-azure-base-debuginfo-4.12.14-16.146.1
    * kernel-azure-base-4.12.14-16.146.1
    * kernel-azure-debuginfo-4.12.14-16.146.1
    * kernel-azure-debugsource-4.12.14-16.146.1
  * SUSE Linux Enterprise Server 12 SP5 (noarch)
    * kernel-devel-azure-4.12.14-16.146.1
    * kernel-source-azure-4.12.14-16.146.1

## References:

  * https://www.suse.com/security/cve/CVE-2018-3639.html
  * https://www.suse.com/security/cve/CVE-2022-40982.html
  * https://www.suse.com/security/cve/CVE-2023-0459.html
  * https://www.suse.com/security/cve/CVE-2023-20569.html
  * https://www.suse.com/security/cve/CVE-2023-20593.html
  * https://www.suse.com/security/cve/CVE-2023-2985.html
  * https://www.suse.com/security/cve/CVE-2023-35001.html
  * https://www.suse.com/security/cve/CVE-2023-3567.html
  * https://www.suse.com/security/cve/CVE-2023-3609.html
  * https://www.suse.com/security/cve/CVE-2023-3611.html
  * https://www.suse.com/security/cve/CVE-2023-3776.html
  * https://bugzilla.suse.com/show_bug.cgi?id=1087082
  * https://bugzilla.suse.com/show_bug.cgi?id=1150305
  * https://bugzilla.suse.com/show_bug.cgi?id=1173438
  * https://bugzilla.suse.com/show_bug.cgi?id=1188885
  * https://bugzilla.suse.com/show_bug.cgi?id=1202670
  * https://bugzilla.suse.com/show_bug.cgi?id=1202716
  * https://bugzilla.suse.com/show_bug.cgi?id=1205496
  * https://bugzilla.suse.com/show_bug.cgi?id=1206418
  * https://bugzilla.suse.com/show_bug.cgi?id=1207526
  * https://bugzilla.suse.com/show_bug.cgi?id=1207528
  * https://bugzilla.suse.com/show_bug.cgi?id=1207561
  * https://bugzilla.suse.com/show_bug.cgi?id=1207617
  * https://bugzilla.suse.com/show_bug.cgi?id=1207620
  * https://bugzilla.suse.com/show_bug.cgi?id=1207629
  * https://bugzilla.suse.com/show_bug.cgi?id=1207630
  * https://bugzilla.suse.com/show_bug.cgi?id=1207633
  * https://bugzilla.suse.com/show_bug.cgi?id=1207634
  * https://bugzilla.suse.com/show_bug.cgi?id=1207653
  * https://bugzilla.suse.com/show_bug.cgi?id=1208788
  * https://bugzilla.suse.com/show_bug.cgi?id=1210584
  * https://bugzilla.suse.com/show_bug.cgi?id=1210765
  * https://bugzilla.suse.com/show_bug.cgi?id=1210766
  * https://bugzilla.suse.com/show_bug.cgi?id=1210771
  * https://bugzilla.suse.com/show_bug.cgi?id=1211738
  * https://bugzilla.suse.com/show_bug.cgi?id=1211867
  * https://bugzilla.suse.com/show_bug.cgi?id=1212266
  * https://bugzilla.suse.com/show_bug.cgi?id=1212301
  * https://bugzilla.suse.com/show_bug.cgi?id=1212657
  * https://bugzilla.suse.com/show_bug.cgi?id=1212741
  * https://bugzilla.suse.com/show_bug.cgi?id=1212835
  * https://bugzilla.suse.com/show_bug.cgi?id=1212871
  * https://bugzilla.suse.com/show_bug.cgi?id=1212905
  * https://bugzilla.suse.com/show_bug.cgi?id=1212986
  * https://bugzilla.suse.com/show_bug.cgi?id=1212987
  * https://bugzilla.suse.com/show_bug.cgi?id=1212988
  * https://bugzilla.suse.com/show_bug.cgi?id=1212989
  * https://bugzilla.suse.com/show_bug.cgi?id=1212990
  * https://bugzilla.suse.com/show_bug.cgi?id=1213010
  * https://bugzilla.suse.com/show_bug.cgi?id=1213011
  * https://bugzilla.suse.com/show_bug.cgi?id=1213012
  * https://bugzilla.suse.com/show_bug.cgi?id=1213013
  * https://bugzilla.suse.com/show_bug.cgi?id=1213014
  * https://bugzilla.suse.com/show_bug.cgi?id=1213015
  * https://bugzilla.suse.com/show_bug.cgi?id=1213017
  * https://bugzilla.suse.com/show_bug.cgi?id=1213018
  * https://bugzilla.suse.com/show_bug.cgi?id=1213019
  * https://bugzilla.suse.com/show_bug.cgi?id=1213020
  * https://bugzilla.suse.com/show_bug.cgi?id=1213021
  * https://bugzilla.suse.com/show_bug.cgi?id=1213022
  * https://bugzilla.suse.com/show_bug.cgi?id=1213023
  * https://bugzilla.suse.com/show_bug.cgi?id=1213024
  * https://bugzilla.suse.com/show_bug.cgi?id=1213025
  * https://bugzilla.suse.com/show_bug.cgi?id=1213032
  * https://bugzilla.suse.com/show_bug.cgi?id=1213033
  * https://bugzilla.suse.com/show_bug.cgi?id=1213034
  * https://bugzilla.suse.com/show_bug.cgi?id=1213035
  * https://bugzilla.suse.com/show_bug.cgi?id=1213036
  * https://bugzilla.suse.com/show_bug.cgi?id=1213037
  * https://bugzilla.suse.com/show_bug.cgi?id=1213038
  * https://bugzilla.suse.com/show_bug.cgi?id=1213039
  * https://bugzilla.suse.com/show_bug.cgi?id=1213040
  * https://bugzilla.suse.com/show_bug.cgi?id=1213041
  * https://bugzilla.suse.com/show_bug.cgi?id=1213042
  * https://bugzilla.suse.com/show_bug.cgi?id=1213059
  * https://bugzilla.suse.com/show_bug.cgi?id=1213133
  * https://bugzilla.suse.com/show_bug.cgi?id=1213167
  * https://bugzilla.suse.com/show_bug.cgi?id=1213215
  * https://bugzilla.suse.com/show_bug.cgi?id=1213218
  * https://bugzilla.suse.com/show_bug.cgi?id=1213221
  * https://bugzilla.suse.com/show_bug.cgi?id=1213286
  * https://bugzilla.suse.com/show_bug.cgi?id=1213287
  * https://bugzilla.suse.com/show_bug.cgi?id=1213344
  * https://bugzilla.suse.com/show_bug.cgi?id=1213346
  * https://bugzilla.suse.com/show_bug.cgi?id=1213350
  * https://bugzilla.suse.com/show_bug.cgi?id=1213525
  * https://bugzilla.suse.com/show_bug.cgi?id=1213585
  * https://bugzilla.suse.com/show_bug.cgi?id=1213586
  * https://bugzilla.suse.com/show_bug.cgi?id=1213588
  * https://bugzilla.suse.com/show_bug.cgi?id=1213705
  * https://bugzilla.suse.com/show_bug.cgi?id=1213747
  * https://bugzilla.suse.com/show_bug.cgi?id=1213766
  * https://bugzilla.suse.com/show_bug.cgi?id=1213819
  * https://bugzilla.suse.com/show_bug.cgi?id=1213823
  * https://bugzilla.suse.com/show_bug.cgi?id=1213825
  * https://bugzilla.suse.com/show_bug.cgi?id=1213827

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.suse.com/pipermail/sle-security-updates/attachments/20230817/707dad9e/attachment.htm>


More information about the sle-security-updates mailing list