SUSE-SU-2024:2185-1: important: Security update for the Linux Kernel

SLE-SECURITY-UPDATES null at suse.de
Mon Jun 24 20:32:33 UTC 2024



# Security update for the Linux Kernel

Announcement ID: SUSE-SU-2024:2185-1  
Rating: important  
References:

  * bsc#1065729
  * bsc#1151927
  * bsc#1152472
  * bsc#1154353
  * bsc#1156395
  * bsc#1174585
  * bsc#1176447
  * bsc#1176774
  * bsc#1176869
  * bsc#1178134
  * bsc#1181147
  * bsc#1184631
  * bsc#1185570
  * bsc#1185589
  * bsc#1185902
  * bsc#1186885
  * bsc#1187357
  * bsc#1188616
  * bsc#1188772
  * bsc#1189883
  * bsc#1190795
  * bsc#1191452
  * bsc#1192107
  * bsc#1194288
  * bsc#1194591
  * bsc#1196956
  * bsc#1197760
  * bsc#1198029
  * bsc#1199304
  * bsc#1200619
  * bsc#1203389
  * bsc#1206646
  * bsc#1209657
  * bsc#1210335
  * bsc#1210629
  * bsc#1213476
  * bsc#1215420
  * bsc#1216702
  * bsc#1217169
  * bsc#1220137
  * bsc#1220144
  * bsc#1220754
  * bsc#1220877
  * bsc#1220960
  * bsc#1221044
  * bsc#1221113
  * bsc#1221829
  * bsc#1222251
  * bsc#1222619
  * bsc#1222838
  * bsc#1222867
  * bsc#1223084
  * bsc#1223138
  * bsc#1223384
  * bsc#1223390
  * bsc#1223512
  * bsc#1223932
  * bsc#1223934
  * bsc#1224099
  * bsc#1224174
  * bsc#1224438
  * bsc#1224482
  * bsc#1224511
  * bsc#1224592
  * bsc#1224816
  * bsc#1224826
  * bsc#1224830
  * bsc#1224831
  * bsc#1224832
  * bsc#1224834
  * bsc#1224841
  * bsc#1224842
  * bsc#1224843
  * bsc#1224844
  * bsc#1224846
  * bsc#1224849
  * bsc#1224852
  * bsc#1224853
  * bsc#1224854
  * bsc#1224859
  * bsc#1224882
  * bsc#1224886
  * bsc#1224888
  * bsc#1224889
  * bsc#1224891
  * bsc#1224892
  * bsc#1224893
  * bsc#1224899
  * bsc#1224904
  * bsc#1224907
  * bsc#1224909
  * bsc#1224916
  * bsc#1224917
  * bsc#1224922
  * bsc#1224923
  * bsc#1224924
  * bsc#1224926
  * bsc#1224928
  * bsc#1224953
  * bsc#1224954
  * bsc#1224955
  * bsc#1224957
  * bsc#1224961
  * bsc#1224963
  * bsc#1224965
  * bsc#1224966
  * bsc#1224968
  * bsc#1224981
  * bsc#1224982
  * bsc#1224983
  * bsc#1224984
  * bsc#1224987
  * bsc#1224990
  * bsc#1224993
  * bsc#1224996
  * bsc#1224997
  * bsc#1225026
  * bsc#1225030
  * bsc#1225058
  * bsc#1225060
  * bsc#1225083
  * bsc#1225084
  * bsc#1225091
  * bsc#1225112
  * bsc#1225113
  * bsc#1225128
  * bsc#1225140
  * bsc#1225143
  * bsc#1225148
  * bsc#1225155
  * bsc#1225164
  * bsc#1225177
  * bsc#1225178
  * bsc#1225181
  * bsc#1225192
  * bsc#1225193
  * bsc#1225198
  * bsc#1225201
  * bsc#1225206
  * bsc#1225207
  * bsc#1225208
  * bsc#1225214
  * bsc#1225223
  * bsc#1225224
  * bsc#1225230
  * bsc#1225232
  * bsc#1225233
  * bsc#1225237
  * bsc#1225238
  * bsc#1225243
  * bsc#1225244
  * bsc#1225247
  * bsc#1225251
  * bsc#1225252
  * bsc#1225256
  * bsc#1225261
  * bsc#1225262
  * bsc#1225263
  * bsc#1225301
  * bsc#1225303
  * bsc#1225316
  * bsc#1225318
  * bsc#1225320
  * bsc#1225321
  * bsc#1225322
  * bsc#1225326
  * bsc#1225327
  * bsc#1225328
  * bsc#1225330
  * bsc#1225333
  * bsc#1225336
  * bsc#1225341
  * bsc#1225346
  * bsc#1225351
  * bsc#1225354
  * bsc#1225355
  * bsc#1225357
  * bsc#1225358
  * bsc#1225360
  * bsc#1225361
  * bsc#1225366
  * bsc#1225367
  * bsc#1225369
  * bsc#1225370
  * bsc#1225372
  * bsc#1225374
  * bsc#1225384
  * bsc#1225386
  * bsc#1225387
  * bsc#1225390
  * bsc#1225393
  * bsc#1225400
  * bsc#1225404
  * bsc#1225405
  * bsc#1225409
  * bsc#1225411
  * bsc#1225424
  * bsc#1225427
  * bsc#1225435
  * bsc#1225437
  * bsc#1225438
  * bsc#1225439
  * bsc#1225446
  * bsc#1225447
  * bsc#1225448
  * bsc#1225450
  * bsc#1225453
  * bsc#1225455
  * bsc#1225468
  * bsc#1225499
  * bsc#1225500
  * bsc#1225508
  * bsc#1225534

  
Cross-References:

  * CVE-2020-36788
  * CVE-2021-3743
  * CVE-2021-39698
  * CVE-2021-43056
  * CVE-2021-47104
  * CVE-2021-47192
  * CVE-2021-47200
  * CVE-2021-47220
  * CVE-2021-47227
  * CVE-2021-47228
  * CVE-2021-47229
  * CVE-2021-47230
  * CVE-2021-47231
  * CVE-2021-47235
  * CVE-2021-47236
  * CVE-2021-47237
  * CVE-2021-47239
  * CVE-2021-47240
  * CVE-2021-47241
  * CVE-2021-47246
  * CVE-2021-47252
  * CVE-2021-47253
  * CVE-2021-47254
  * CVE-2021-47255
  * CVE-2021-47258
  * CVE-2021-47259
  * CVE-2021-47260
  * CVE-2021-47261
  * CVE-2021-47263
  * CVE-2021-47265
  * CVE-2021-47267
  * CVE-2021-47269
  * CVE-2021-47270
  * CVE-2021-47274
  * CVE-2021-47275
  * CVE-2021-47276
  * CVE-2021-47280
  * CVE-2021-47281
  * CVE-2021-47284
  * CVE-2021-47285
  * CVE-2021-47288
  * CVE-2021-47289
  * CVE-2021-47296
  * CVE-2021-47301
  * CVE-2021-47302
  * CVE-2021-47305
  * CVE-2021-47307
  * CVE-2021-47308
  * CVE-2021-47314
  * CVE-2021-47315
  * CVE-2021-47320
  * CVE-2021-47321
  * CVE-2021-47323
  * CVE-2021-47324
  * CVE-2021-47329
  * CVE-2021-47330
  * CVE-2021-47332
  * CVE-2021-47333
  * CVE-2021-47334
  * CVE-2021-47337
  * CVE-2021-47338
  * CVE-2021-47340
  * CVE-2021-47341
  * CVE-2021-47343
  * CVE-2021-47344
  * CVE-2021-47347
  * CVE-2021-47348
  * CVE-2021-47350
  * CVE-2021-47353
  * CVE-2021-47354
  * CVE-2021-47356
  * CVE-2021-47369
  * CVE-2021-47375
  * CVE-2021-47378
  * CVE-2021-47381
  * CVE-2021-47382
  * CVE-2021-47383
  * CVE-2021-47387
  * CVE-2021-47388
  * CVE-2021-47391
  * CVE-2021-47392
  * CVE-2021-47393
  * CVE-2021-47395
  * CVE-2021-47396
  * CVE-2021-47399
  * CVE-2021-47402
  * CVE-2021-47404
  * CVE-2021-47405
  * CVE-2021-47409
  * CVE-2021-47413
  * CVE-2021-47416
  * CVE-2021-47422
  * CVE-2021-47423
  * CVE-2021-47424
  * CVE-2021-47425
  * CVE-2021-47426
  * CVE-2021-47428
  * CVE-2021-47431
  * CVE-2021-47434
  * CVE-2021-47435
  * CVE-2021-47436
  * CVE-2021-47441
  * CVE-2021-47442
  * CVE-2021-47443
  * CVE-2021-47444
  * CVE-2021-47445
  * CVE-2021-47451
  * CVE-2021-47456
  * CVE-2021-47458
  * CVE-2021-47460
  * CVE-2021-47464
  * CVE-2021-47465
  * CVE-2021-47468
  * CVE-2021-47473
  * CVE-2021-47478
  * CVE-2021-47480
  * CVE-2021-47482
  * CVE-2021-47483
  * CVE-2021-47485
  * CVE-2021-47493
  * CVE-2021-47494
  * CVE-2021-47495
  * CVE-2021-47496
  * CVE-2021-47497
  * CVE-2021-47498
  * CVE-2021-47499
  * CVE-2021-47500
  * CVE-2021-47501
  * CVE-2021-47502
  * CVE-2021-47503
  * CVE-2021-47505
  * CVE-2021-47506
  * CVE-2021-47507
  * CVE-2021-47509
  * CVE-2021-47511
  * CVE-2021-47512
  * CVE-2021-47516
  * CVE-2021-47518
  * CVE-2021-47521
  * CVE-2021-47522
  * CVE-2021-47523
  * CVE-2021-47527
  * CVE-2021-47535
  * CVE-2021-47536
  * CVE-2021-47538
  * CVE-2021-47540
  * CVE-2021-47541
  * CVE-2021-47542
  * CVE-2021-47549
  * CVE-2021-47557
  * CVE-2021-47562
  * CVE-2021-47563
  * CVE-2021-47565
  * CVE-2022-1195
  * CVE-2022-20132
  * CVE-2022-48636
  * CVE-2022-48673
  * CVE-2022-48704
  * CVE-2022-48710
  * CVE-2023-0160
  * CVE-2023-1829
  * CVE-2023-2176
  * CVE-2023-424
  * CVE-2023-4244
  * CVE-2023-47233
  * CVE-2023-52433
  * CVE-2023-52581
  * CVE-2023-52591
  * CVE-2023-52654
  * CVE-2023-52655
  * CVE-2023-52686
  * CVE-2023-52840
  * CVE-2023-52871
  * CVE-2023-52880
  * CVE-2023-6531
  * CVE-2024-26581
  * CVE-2024-26643
  * CVE-2024-26828
  * CVE-2024-26921
  * CVE-2024-26925
  * CVE-2024-26929
  * CVE-2024-26930
  * CVE-2024-27398
  * CVE-2024-27413
  * CVE-2024-35811
  * CVE-2024-35895
  * CVE-2024-35914

  
CVSS scores:

  * CVE-2020-36788 ( SUSE ):  5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2021-3743 ( SUSE ):  6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-3743 ( NVD ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2021-39698 ( SUSE ):  7.4 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
  * CVE-2021-39698 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2021-43056 ( SUSE ):  6.8 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
  * CVE-2021-43056 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47104 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
  * CVE-2021-47200 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47220 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47227 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47228 ( SUSE ):  4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
  * CVE-2021-47229 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47230 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47231 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47235 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47236 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47237 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2021-47239 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47240 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47241 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47246 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2021-47252 ( SUSE ):  0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
  * CVE-2021-47253 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2021-47254 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2021-47255 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47258 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2021-47259 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2021-47260 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47261 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2021-47263 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
  * CVE-2021-47265 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47267 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47269 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47270 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47274 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47275 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47276 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47280 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47281 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47284 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47285 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47288 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
  * CVE-2021-47289 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47296 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47301 ( SUSE ):  6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2021-47302 ( SUSE ):  6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2021-47305 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47307 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47308 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47314 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2021-47315 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2021-47320 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
  * CVE-2021-47321 ( SUSE ):  6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2021-47323 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2021-47324 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2021-47329 ( SUSE ):  1.9 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
  * CVE-2021-47330 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2021-47332 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47333 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47334 ( SUSE ):  6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2021-47337 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47338 ( SUSE ):  5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H
  * CVE-2021-47340 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47341 ( SUSE ):  6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2021-47343 ( SUSE ):  5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
  * CVE-2021-47344 ( SUSE ):  4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47347 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2021-47348 ( SUSE ):  5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
  * CVE-2021-47350 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47353 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47354 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N
  * CVE-2021-47356 ( SUSE ):  5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2021-47369 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2021-47375 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2021-47378 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2021-47381 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47382 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47383 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2021-47387 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47388 ( SUSE ):  6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2021-47391 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2021-47392 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47393 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47395 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47396 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47399 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47402 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2021-47404 ( SUSE ):  6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H
  * CVE-2021-47405 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47409 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47413 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47416 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2021-47422 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47423 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2021-47424 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47425 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47426 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2021-47428 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47431 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2021-47434 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47435 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47441 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47442 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47443 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47445 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47451 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47456 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47458 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47464 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47465 ( SUSE ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
  * CVE-2021-47468 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47473 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2021-47478 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
  * CVE-2021-47480 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47482 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2021-47483 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2021-47485 ( SUSE ):  6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2021-47493 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47494 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47495 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2021-47496 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2021-47497 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2021-47498 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47499 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
  * CVE-2021-47500 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2021-47501 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47502 ( SUSE ):  7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
  * CVE-2021-47503 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47505 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2021-47506 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2021-47507 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47509 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47511 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2021-47512 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47516 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2021-47516 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47518 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47518 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47521 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2021-47521 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2021-47522 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47522 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47523 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2021-47535 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
  * CVE-2021-47536 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
  * CVE-2021-47538 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2021-47540 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47540 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47541 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2021-47541 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2021-47542 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47542 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47549 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2021-47557 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47562 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47563 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2021-47565 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-1195 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-1195 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-20132 ( SUSE ):  4.9 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L
  * CVE-2022-20132 ( NVD ):  4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
  * CVE-2022-48636 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48673 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-48673 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48704 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48710 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-0160 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-0160 ( NVD ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-1829 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-1829 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-2176 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-2176 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-4244 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-4244 ( NVD ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-47233 ( SUSE ):  4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-47233 ( NVD ):  4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52433 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52581 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52591 ( SUSE ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2023-52654 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52686 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52840 ( SUSE ):  6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-52871 ( SUSE ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
  * CVE-2023-52880 ( SUSE ):  8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-6531 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-6531 ( NVD ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-26581 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26581 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-26643 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26828 ( SUSE ):  7.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H
  * CVE-2024-26921 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-26925 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-26929 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-26929 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-26930 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-26930 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-27398 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-27413 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-35811 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35895 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35914 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

  
Affected Products:

  * openSUSE Leap 15.3
  * SUSE Enterprise Storage 7.1
  * SUSE Linux Enterprise High Availability Extension 15 SP3
  * SUSE Linux Enterprise High Performance Computing 15 SP3
  * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
  * SUSE Linux Enterprise Live Patching 15-SP3
  * SUSE Linux Enterprise Micro 5.1
  * SUSE Linux Enterprise Micro 5.2
  * SUSE Linux Enterprise Micro for Rancher 5.2
  * SUSE Linux Enterprise Server 15 SP3
  * SUSE Linux Enterprise Server 15 SP3 Business Critical Linux 15-SP3
  * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
  * SUSE Linux Enterprise Server for SAP Applications 15 SP3
  * SUSE Manager Proxy 4.2
  * SUSE Manager Retail Branch Server 4.2
  * SUSE Manager Server 4.2

  
  
An update that solves 187 vulnerabilities and has 26 security fixes can now be
installed.

## Description:

The SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security
bugfixes.

The following security bugs were fixed:

  * CVE-2021-47378: Destroy cm id before destroy qp to avoid use after free
    (bsc#1225201).
  * CVE-2021-47496: Fix flipped sign in tls_err_abort() calls (bsc#1225354)
  * CVE-2021-47402: Protect fl_walk() with rcu (bsc#1225301)
  * CVE-2022-48673: kABI workarounds for struct smc_link (bsc#1223934).
  * CVE-2023-52871: Handle a second device without data corruption (bsc#1225534)
  * CVE-2024-26828: Fix underflow in parse_server_interfaces() (bsc#1223084).
  * CVE-2021-47497: Fixed shift-out-of-bound (UBSAN) with byte size cells
    (bsc#1225355).
  * CVE-2021-47500: Fixed trigger reference couting (bsc#1225360).
  * CVE-2024-27413: Fix incorrect allocation size (bsc#1224438).
  * CVE-2021-47383: Fiedx out-of-bound vmalloc access in imageblit
    (bsc#1225208).
  * CVE-2021-47511: Fixed negative period/buffer sizes (bsc#1225411).
  * CVE-2023-52840: Fix use after free in rmi_unregister_function()
    (bsc#1224928).
  * CVE-2021-47261: Fix initializing CQ fragments buffer (bsc#1224954)
  * CVE-2021-47254: Fix use-after-free in gfs2_glock_shrink_scan (bsc#1224888).
  * CVE-2024-27398: Fixed use-after-free bugs caused by sco_sock_timeout
    (bsc#1224174).
  * CVE-2024-26921: Preserve kabi for sk_buff (bsc#1223138).
  * CVE-2023-52655: Check packet for fixup for true limit (bsc#1217169).
  * CVE-2023-4244: Fixed a use-after-free in the nf_tables component, which
    could be exploited to achieve local privilege escalation (bsc#1215420).
  * CVE-2023-4244: Fixed a use-after-free in the nf_tables component, which
    could be exploited to achieve local privilege escalation (bsc#1215420).
  * CVE-2023-1829: Fixed a use-after-free vulnerability in the control index
    filter (tcindex) (bsc#1210335).
  * CVE-2023-52686: Fix a null pointer in opal_event_init() (bsc#1065729).

The following non-security bugs were fixed:

  * af_unix: annote lockless accesses to unix_tot_inflight & gc_in_progress
    (bsc#1223384).
  * af_unix: Do not use atomic ops for unix_sk(sk)->inflight (bsc#1223384).
  * af_unix: Replace BUG_ON() with WARN_ON_ONCE() (bsc#1223384).
  * btrfs: do not start relocation until in progress drops are done
    (bsc#1222251).
  * btrfs: do not start relocation until in progress drops are done
    (bsc#1222251).
  * cifs: add missing spinlock around tcon refcount (bsc#1213476).
  * cifs: avoid dup prefix path in dfs_get_automount_devname() (bsc#1213476).
  * cifs: avoid race conditions with parallel reconnects (bsc#1213476).
  * cifs: avoid re-lookups in dfs_cache_find() (bsc#1213476).
  * cifs: avoid use of global locks for high contention data (bsc#1213476).
  * cifs: check only tcon status on tcon related functions (bsc#1213476).
  * cifs: do all necessary checks for credits within or before locking
    (bsc#1213476).
  * cifs: do not block in dfs_cache_noreq_update_tgthint() (bsc#1213476).
  * cifs: do not refresh cached referrals from unactive mounts (bsc#1213476).
  * cifs: do not take exclusive lock for updating target hints (bsc#1213476).
  * cifs: fix confusing debug message (bsc#1213476).
  * cifs: fix missing unload_nls() in smb2_reconnect() (bsc#1213476).
  * cifs: fix potential deadlock in cache_refresh_path() (bsc#1213476).
  * cifs: fix refresh of cached referrals (bsc#1213476).
  * cifs: fix return of uninitialized rc in dfs_cache_update_tgthint()
    (bsc#1213476).
  * cifs: fix source pathname comparison of dfs supers (bsc#1213476).
  * cifs: fix status checks in cifs_tree_connect (bsc#1213476).
  * cifs: fix use-after-free bug in refresh_cache_worker() (bsc#1213476).
  * cifs: get rid of dns resolve worker (bsc#1213476).
  * cifs: get rid of mount options string parsing (bsc#1213476).
  * cifs: handle cache lookup errors different than -ENOENT (bsc#1213476).
  * cifs: ignore ipc reconnect failures during dfs failover (bsc#1213476).
  * cifs: match even the scope id for ipv6 addresses (bsc#1213476).
  * cifs: optimize reconnect of nested links (bsc#1213476).
  * cifs: prevent data race in smb2_reconnect() (bsc#1213476).
  * cifs: refresh root referrals (bsc#1213476).
  * cifs: remove duplicate code in __refresh_tcon() (bsc#1213476).
  * cifs: remove unused function (bsc#1213476).
  * cifs: remove unused smb3_fs_context::mount_options (bsc#1213476).
  * cifs: return DFS root session id in DebugData (bsc#1213476).
  * cifs: reuse cifs_match_ipaddr for comparison of dstaddr too (bsc#1213476).
  * cifs: set correct ipc status after initial tree connect (bsc#1213476).
  * cifs: set correct status of tcon ipc when reconnecting (bsc#1213476).
  * cifs: set correct tcon status after initial tree connect (bsc#1213476).
  * cifs: set DFS root session in cifs_get_smb_ses() (bsc#1213476).
  * cifs: set resolved ip in sockaddr (bsc#1213476).
  * cifs: share dfs connections and supers (bsc#1213476).
  * cifs: split out ses and tcon retrieval from mount_get_conns() (bsc#1213476).
  * cifs: use fs_context for automounts (bsc#1213476).
  * cifs: use origin fullpath for automounts (bsc#1213476).
  * cifs: use tcon allocation functions even for dummy tcon (bsc#1213476).
  * netfilter: nf_tables: defer gc run if previous batch is still pending (git-
    fixes).
  * netfilter: nf_tables: fix GC transaction races with netns and netlink event
    exit path (git-fixes).
  * netfilter: nf_tables: fix kdoc warnings after gc rework (git-fixes).
  * netfilter: nf_tables: fix memleak when more than 255 elements expired (git-
    fixes).
  * netfilter: nf_tables: GC transaction race with abort path (git-fixes).
  * netfilter: nf_tables: GC transaction race with netns dismantle (git-fixes).
  * netfilter: nf_tables: mark newset as dead on transaction abort (git-fixes).
  * netfilter: nf_tables: mark set as dead when unbinding anonymous set with
    timeout (git-fixes).
  * netfilter: nf_tables: nft_set_rbtree: fix spurious insertion failure (git-
    fixes).
  * netfilter: nf_tables: release mutex after nft_gc_seq_end from abort path
    (git-fixes).
  * netfilter: nf_tables: skip dead set elements in netlink dump (git-fixes).
  * netfilter: nf_tables: use correct lock to protect gc_list (git-fixes).
  * netfilter: nft_set_hash: try later when GC hits EAGAIN on iteration (git-
    fixes).
  * netfilter: nft_set_rbtree: Add missing expired checks (git-fixes).
  * netfilter: nft_set_rbtree: bogus lookup/get on consecutive elements in named
    sets (git-fixes).
  * netfilter: nft_set_rbtree: Detect partial overlap with start endpoint match
    (git-fixes).
  * netfilter: nft_set_rbtree: Detect partial overlaps on insertion (git-fixes).
  * netfilter: nft_set_rbtree: Do not account for expired elements on insertion
    (git-fixes).
  * netfilter: nft_set_rbtree: Drop spurious condition for overlap detection on
    insertion (git-fixes).
  * netfilter: nft_set_rbtree: fix null deref on element insertion (git-fixes).
  * netfilter: nft_set_rbtree: fix overlap expiration walk (git-fixes).
  * netfilter: nft_set_rbtree: Handle outcomes of tree rotations in overlap
    detection (git-fixes).
  * netfilter: nft_set_rbtree: Introduce and use nft_rbtree_interval_start()
    (git-fixes).
  * netfilter: nft_set_rbtree: overlap detection with element re-addition after
    deletion (git-fixes).
  * netfilter: nft_set_rbtree: skip elements in transaction from garbage
    collection (git-fixes).
  * netfilter: nft_set_rbtree: skip end interval element from gc (git-fixes).
  * netfilter: nft_set_rbtree: skip sync GC for new elements in this transaction
    (git-fixes).
  * netfilter: nft_set_rbtree: Switch to node list walk for overlap detection
    (git-fixes).
  * netfilter: nft_set_rbtree: use read spinlock to avoid datapath contention
    (git-fixes).
  * NFC: nxp: add NXP1002 (bsc#1185589).
  * PCI: rpaphp: Add MODULE_DESCRIPTION (bsc#1176869 ltc#188243).
  * smb: client: fix dfs link mount against w2k8 (git-fixes).
  * smb: client: fix null auth (bsc#1213476).
  * smb: client: set correct id, uid and cruid for multiuser automounts (git-
    fixes).
  * x86/xen: Drop USERGS_SYSRET64 paravirt call (git-fixes).

## Special Instructions and Notes:

  * Please reboot the system after installing this update.

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".  
Alternatively you can run the command listed for your product:

  * openSUSE Leap 15.3  
    zypper in -t patch SUSE-2024-2185=1

  * SUSE Linux Enterprise Live Patching 15-SP3  
    zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP3-2024-2185=1

  * SUSE Linux Enterprise High Availability Extension 15 SP3  
    zypper in -t patch SUSE-SLE-Product-HA-15-SP3-2024-2185=1

  * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3  
    zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-2185=1

  * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3  
    zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-2185=1

  * SUSE Linux Enterprise Server for SAP Applications 15 SP3  
    zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-2185=1

  * SUSE Enterprise Storage 7.1  
    zypper in -t patch SUSE-Storage-7.1-2024-2185=1

  * SUSE Linux Enterprise Micro 5.1  
    zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-2185=1

  * SUSE Linux Enterprise Micro 5.2  
    zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-2185=1

  * SUSE Linux Enterprise Micro for Rancher 5.2  
    zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-2185=1

## Package List:

  * openSUSE Leap 15.3 (noarch nosrc)
    * kernel-docs-5.3.18-150300.59.164.1
  * openSUSE Leap 15.3 (noarch)
    * kernel-macros-5.3.18-150300.59.164.1
    * kernel-source-5.3.18-150300.59.164.1
    * kernel-source-vanilla-5.3.18-150300.59.164.1
    * kernel-devel-5.3.18-150300.59.164.1
    * kernel-docs-html-5.3.18-150300.59.164.1
  * openSUSE Leap 15.3 (nosrc ppc64le x86_64)
    * kernel-kvmsmall-5.3.18-150300.59.164.1
    * kernel-debug-5.3.18-150300.59.164.1
  * openSUSE Leap 15.3 (ppc64le x86_64)
    * kernel-kvmsmall-devel-5.3.18-150300.59.164.1
    * kernel-debug-devel-5.3.18-150300.59.164.1
    * kernel-debug-livepatch-devel-5.3.18-150300.59.164.1
    * kernel-kvmsmall-debugsource-5.3.18-150300.59.164.1
    * kernel-debug-debugsource-5.3.18-150300.59.164.1
    * kernel-debug-debuginfo-5.3.18-150300.59.164.1
    * kernel-debug-devel-debuginfo-5.3.18-150300.59.164.1
    * kernel-kvmsmall-devel-debuginfo-5.3.18-150300.59.164.1
    * kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.164.1
    * kernel-kvmsmall-debuginfo-5.3.18-150300.59.164.1
  * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64)
    * cluster-md-kmp-default-debuginfo-5.3.18-150300.59.164.1
    * kernel-obs-build-5.3.18-150300.59.164.1
    * dlm-kmp-default-debuginfo-5.3.18-150300.59.164.1
    * kernel-default-debugsource-5.3.18-150300.59.164.1
    * cluster-md-kmp-default-5.3.18-150300.59.164.1
    * ocfs2-kmp-default-5.3.18-150300.59.164.1
    * ocfs2-kmp-default-debuginfo-5.3.18-150300.59.164.1
    * gfs2-kmp-default-debuginfo-5.3.18-150300.59.164.1
    * kernel-obs-build-debugsource-5.3.18-150300.59.164.1
    * kernel-default-debuginfo-5.3.18-150300.59.164.1
    * kernel-default-livepatch-devel-5.3.18-150300.59.164.1
    * kernel-default-devel-debuginfo-5.3.18-150300.59.164.1
    * kernel-default-base-5.3.18-150300.59.164.1.150300.18.96.1
    * dlm-kmp-default-5.3.18-150300.59.164.1
    * kernel-default-livepatch-5.3.18-150300.59.164.1
    * kernel-default-extra-5.3.18-150300.59.164.1
    * kernel-default-optional-5.3.18-150300.59.164.1
    * kernel-syms-5.3.18-150300.59.164.1
    * kselftests-kmp-default-5.3.18-150300.59.164.1
    * gfs2-kmp-default-5.3.18-150300.59.164.1
    * kernel-default-optional-debuginfo-5.3.18-150300.59.164.1
    * kselftests-kmp-default-debuginfo-5.3.18-150300.59.164.1
    * reiserfs-kmp-default-5.3.18-150300.59.164.1
    * kernel-default-devel-5.3.18-150300.59.164.1
    * kernel-default-base-rebuild-5.3.18-150300.59.164.1.150300.18.96.1
    * reiserfs-kmp-default-debuginfo-5.3.18-150300.59.164.1
    * kernel-default-extra-debuginfo-5.3.18-150300.59.164.1
    * kernel-obs-qa-5.3.18-150300.59.164.1
  * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 nosrc)
    * kernel-default-5.3.18-150300.59.164.1
  * openSUSE Leap 15.3 (ppc64le s390x x86_64)
    * kernel-livepatch-SLE15-SP3_Update_45-debugsource-1-150300.7.3.1
    * kernel-livepatch-5_3_18-150300_59_164-default-1-150300.7.3.1
    * kernel-livepatch-5_3_18-150300_59_164-default-debuginfo-1-150300.7.3.1
  * openSUSE Leap 15.3 (x86_64)
    * kernel-livepatch-5_3_18-150300_59_164-preempt-debuginfo-1-150300.7.3.1
    * kernel-livepatch-5_3_18-150300_59_164-preempt-1-150300.7.3.1
  * openSUSE Leap 15.3 (aarch64 x86_64)
    * cluster-md-kmp-preempt-5.3.18-150300.59.164.1
    * gfs2-kmp-preempt-debuginfo-5.3.18-150300.59.164.1
    * ocfs2-kmp-preempt-5.3.18-150300.59.164.1
    * kselftests-kmp-preempt-debuginfo-5.3.18-150300.59.164.1
    * kernel-preempt-debugsource-5.3.18-150300.59.164.1
    * gfs2-kmp-preempt-5.3.18-150300.59.164.1
    * kselftests-kmp-preempt-5.3.18-150300.59.164.1
    * cluster-md-kmp-preempt-debuginfo-5.3.18-150300.59.164.1
    * kernel-preempt-debuginfo-5.3.18-150300.59.164.1
    * reiserfs-kmp-preempt-debuginfo-5.3.18-150300.59.164.1
    * kernel-preempt-optional-5.3.18-150300.59.164.1
    * kernel-preempt-extra-5.3.18-150300.59.164.1
    * dlm-kmp-preempt-5.3.18-150300.59.164.1
    * kernel-preempt-devel-debuginfo-5.3.18-150300.59.164.1
    * kernel-preempt-optional-debuginfo-5.3.18-150300.59.164.1
    * kernel-preempt-devel-5.3.18-150300.59.164.1
    * kernel-preempt-livepatch-devel-5.3.18-150300.59.164.1
    * reiserfs-kmp-preempt-5.3.18-150300.59.164.1
    * ocfs2-kmp-preempt-debuginfo-5.3.18-150300.59.164.1
    * dlm-kmp-preempt-debuginfo-5.3.18-150300.59.164.1
    * kernel-preempt-extra-debuginfo-5.3.18-150300.59.164.1
  * openSUSE Leap 15.3 (aarch64 nosrc x86_64)
    * kernel-preempt-5.3.18-150300.59.164.1
  * openSUSE Leap 15.3 (nosrc s390x)
    * kernel-zfcpdump-5.3.18-150300.59.164.1
  * openSUSE Leap 15.3 (s390x)
    * kernel-zfcpdump-debugsource-5.3.18-150300.59.164.1
    * kernel-zfcpdump-debuginfo-5.3.18-150300.59.164.1
  * openSUSE Leap 15.3 (nosrc)
    * dtb-aarch64-5.3.18-150300.59.164.1
  * openSUSE Leap 15.3 (aarch64)
    * dtb-rockchip-5.3.18-150300.59.164.1
    * dtb-sprd-5.3.18-150300.59.164.1
    * dtb-hisilicon-5.3.18-150300.59.164.1
    * dtb-arm-5.3.18-150300.59.164.1
    * kernel-64kb-debugsource-5.3.18-150300.59.164.1
    * kernel-64kb-livepatch-devel-5.3.18-150300.59.164.1
    * reiserfs-kmp-64kb-5.3.18-150300.59.164.1
    * dtb-freescale-5.3.18-150300.59.164.1
    * kernel-64kb-optional-5.3.18-150300.59.164.1
    * ocfs2-kmp-64kb-debuginfo-5.3.18-150300.59.164.1
    * dtb-apm-5.3.18-150300.59.164.1
    * dtb-exynos-5.3.18-150300.59.164.1
    * dtb-socionext-5.3.18-150300.59.164.1
    * kernel-64kb-optional-debuginfo-5.3.18-150300.59.164.1
    * kernel-64kb-devel-debuginfo-5.3.18-150300.59.164.1
    * dtb-amd-5.3.18-150300.59.164.1
    * dlm-kmp-64kb-debuginfo-5.3.18-150300.59.164.1
    * dtb-qcom-5.3.18-150300.59.164.1
    * dtb-marvell-5.3.18-150300.59.164.1
    * dtb-mediatek-5.3.18-150300.59.164.1
    * dtb-altera-5.3.18-150300.59.164.1
    * dtb-broadcom-5.3.18-150300.59.164.1
    * dtb-zte-5.3.18-150300.59.164.1
    * kernel-64kb-debuginfo-5.3.18-150300.59.164.1
    * ocfs2-kmp-64kb-5.3.18-150300.59.164.1
    * kselftests-kmp-64kb-5.3.18-150300.59.164.1
    * dlm-kmp-64kb-5.3.18-150300.59.164.1
    * gfs2-kmp-64kb-5.3.18-150300.59.164.1
    * kernel-64kb-devel-5.3.18-150300.59.164.1
    * dtb-cavium-5.3.18-150300.59.164.1
    * kselftests-kmp-64kb-debuginfo-5.3.18-150300.59.164.1
    * dtb-renesas-5.3.18-150300.59.164.1
    * dtb-xilinx-5.3.18-150300.59.164.1
    * reiserfs-kmp-64kb-debuginfo-5.3.18-150300.59.164.1
    * cluster-md-kmp-64kb-5.3.18-150300.59.164.1
    * kernel-64kb-extra-5.3.18-150300.59.164.1
    * gfs2-kmp-64kb-debuginfo-5.3.18-150300.59.164.1
    * cluster-md-kmp-64kb-debuginfo-5.3.18-150300.59.164.1
    * dtb-nvidia-5.3.18-150300.59.164.1
    * dtb-amlogic-5.3.18-150300.59.164.1
    * kernel-64kb-extra-debuginfo-5.3.18-150300.59.164.1
    * dtb-al-5.3.18-150300.59.164.1
    * dtb-lg-5.3.18-150300.59.164.1
    * dtb-allwinner-5.3.18-150300.59.164.1
  * openSUSE Leap 15.3 (aarch64 nosrc)
    * kernel-64kb-5.3.18-150300.59.164.1
  * SUSE Linux Enterprise Live Patching 15-SP3 (nosrc)
    * kernel-default-5.3.18-150300.59.164.1
  * SUSE Linux Enterprise Live Patching 15-SP3 (ppc64le s390x x86_64)
    * kernel-default-debuginfo-5.3.18-150300.59.164.1
    * kernel-default-livepatch-devel-5.3.18-150300.59.164.1
    * kernel-default-debugsource-5.3.18-150300.59.164.1
    * kernel-livepatch-5_3_18-150300_59_164-default-1-150300.7.3.1
    * kernel-default-livepatch-5.3.18-150300.59.164.1
  * SUSE Linux Enterprise High Availability Extension 15 SP3 (aarch64 ppc64le
    s390x x86_64)
    * cluster-md-kmp-default-debuginfo-5.3.18-150300.59.164.1
    * kernel-default-debuginfo-5.3.18-150300.59.164.1
    * dlm-kmp-default-debuginfo-5.3.18-150300.59.164.1
    * dlm-kmp-default-5.3.18-150300.59.164.1
    * kernel-default-debugsource-5.3.18-150300.59.164.1
    * cluster-md-kmp-default-5.3.18-150300.59.164.1
    * gfs2-kmp-default-5.3.18-150300.59.164.1
    * ocfs2-kmp-default-5.3.18-150300.59.164.1
    * ocfs2-kmp-default-debuginfo-5.3.18-150300.59.164.1
    * gfs2-kmp-default-debuginfo-5.3.18-150300.59.164.1
  * SUSE Linux Enterprise High Availability Extension 15 SP3 (nosrc)
    * kernel-default-5.3.18-150300.59.164.1
  * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 nosrc)
    * kernel-64kb-5.3.18-150300.59.164.1
  * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64)
    * kernel-64kb-devel-debuginfo-5.3.18-150300.59.164.1
    * kernel-64kb-debuginfo-5.3.18-150300.59.164.1
    * kernel-64kb-debugsource-5.3.18-150300.59.164.1
    * kernel-64kb-devel-5.3.18-150300.59.164.1
  * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 nosrc
    x86_64)
    * kernel-preempt-5.3.18-150300.59.164.1
    * kernel-default-5.3.18-150300.59.164.1
  * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
    x86_64)
    * kernel-obs-build-5.3.18-150300.59.164.1
    * kernel-default-debuginfo-5.3.18-150300.59.164.1
    * kernel-default-devel-debuginfo-5.3.18-150300.59.164.1
    * kernel-default-base-5.3.18-150300.59.164.1.150300.18.96.1
    * kernel-default-debugsource-5.3.18-150300.59.164.1
    * kernel-preempt-debuginfo-5.3.18-150300.59.164.1
    * reiserfs-kmp-default-debuginfo-5.3.18-150300.59.164.1
    * kernel-preempt-devel-5.3.18-150300.59.164.1
    * kernel-syms-5.3.18-150300.59.164.1
    * reiserfs-kmp-default-5.3.18-150300.59.164.1
    * kernel-preempt-devel-debuginfo-5.3.18-150300.59.164.1
    * kernel-default-devel-5.3.18-150300.59.164.1
    * kernel-preempt-debugsource-5.3.18-150300.59.164.1
    * kernel-obs-build-debugsource-5.3.18-150300.59.164.1
  * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch)
    * kernel-source-5.3.18-150300.59.164.1
    * kernel-macros-5.3.18-150300.59.164.1
    * kernel-devel-5.3.18-150300.59.164.1
  * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch nosrc)
    * kernel-docs-5.3.18-150300.59.164.1
  * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 nosrc)
    * kernel-64kb-5.3.18-150300.59.164.1
  * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64)
    * kernel-64kb-devel-debuginfo-5.3.18-150300.59.164.1
    * kernel-64kb-debuginfo-5.3.18-150300.59.164.1
    * kernel-64kb-debugsource-5.3.18-150300.59.164.1
    * kernel-64kb-devel-5.3.18-150300.59.164.1
  * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x
    x86_64 nosrc)
    * kernel-default-5.3.18-150300.59.164.1
  * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x
    x86_64)
    * kernel-obs-build-5.3.18-150300.59.164.1
    * kernel-default-debuginfo-5.3.18-150300.59.164.1
    * kernel-default-devel-debuginfo-5.3.18-150300.59.164.1
    * kernel-default-base-5.3.18-150300.59.164.1.150300.18.96.1
    * kernel-default-debugsource-5.3.18-150300.59.164.1
    * reiserfs-kmp-default-debuginfo-5.3.18-150300.59.164.1
    * kernel-syms-5.3.18-150300.59.164.1
    * reiserfs-kmp-default-5.3.18-150300.59.164.1
    * kernel-default-devel-5.3.18-150300.59.164.1
    * kernel-obs-build-debugsource-5.3.18-150300.59.164.1
  * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch)
    * kernel-source-5.3.18-150300.59.164.1
    * kernel-macros-5.3.18-150300.59.164.1
    * kernel-devel-5.3.18-150300.59.164.1
  * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch nosrc)
    * kernel-docs-5.3.18-150300.59.164.1
  * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 nosrc x86_64)
    * kernel-preempt-5.3.18-150300.59.164.1
  * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 x86_64)
    * kernel-preempt-devel-debuginfo-5.3.18-150300.59.164.1
    * kernel-preempt-debuginfo-5.3.18-150300.59.164.1
    * kernel-preempt-debugsource-5.3.18-150300.59.164.1
    * kernel-preempt-devel-5.3.18-150300.59.164.1
  * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (nosrc s390x)
    * kernel-zfcpdump-5.3.18-150300.59.164.1
  * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (s390x)
    * kernel-zfcpdump-debugsource-5.3.18-150300.59.164.1
    * kernel-zfcpdump-debuginfo-5.3.18-150300.59.164.1
  * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (nosrc ppc64le
    x86_64)
    * kernel-default-5.3.18-150300.59.164.1
  * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
    * kernel-obs-build-5.3.18-150300.59.164.1
    * kernel-default-debuginfo-5.3.18-150300.59.164.1
    * kernel-default-devel-debuginfo-5.3.18-150300.59.164.1
    * kernel-default-base-5.3.18-150300.59.164.1.150300.18.96.1
    * kernel-default-debugsource-5.3.18-150300.59.164.1
    * reiserfs-kmp-default-debuginfo-5.3.18-150300.59.164.1
    * kernel-syms-5.3.18-150300.59.164.1
    * reiserfs-kmp-default-5.3.18-150300.59.164.1
    * kernel-default-devel-5.3.18-150300.59.164.1
    * kernel-obs-build-debugsource-5.3.18-150300.59.164.1
  * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch)
    * kernel-source-5.3.18-150300.59.164.1
    * kernel-macros-5.3.18-150300.59.164.1
    * kernel-devel-5.3.18-150300.59.164.1
  * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch nosrc)
    * kernel-docs-5.3.18-150300.59.164.1
  * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (nosrc x86_64)
    * kernel-preempt-5.3.18-150300.59.164.1
  * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (x86_64)
    * kernel-preempt-devel-debuginfo-5.3.18-150300.59.164.1
    * kernel-preempt-debuginfo-5.3.18-150300.59.164.1
    * kernel-preempt-debugsource-5.3.18-150300.59.164.1
    * kernel-preempt-devel-5.3.18-150300.59.164.1
  * SUSE Enterprise Storage 7.1 (aarch64 nosrc)
    * kernel-64kb-5.3.18-150300.59.164.1
  * SUSE Enterprise Storage 7.1 (aarch64)
    * kernel-64kb-devel-debuginfo-5.3.18-150300.59.164.1
    * kernel-64kb-debuginfo-5.3.18-150300.59.164.1
    * kernel-64kb-debugsource-5.3.18-150300.59.164.1
    * kernel-64kb-devel-5.3.18-150300.59.164.1
  * SUSE Enterprise Storage 7.1 (aarch64 nosrc x86_64)
    * kernel-preempt-5.3.18-150300.59.164.1
    * kernel-default-5.3.18-150300.59.164.1
  * SUSE Enterprise Storage 7.1 (aarch64 x86_64)
    * kernel-obs-build-5.3.18-150300.59.164.1
    * kernel-default-debuginfo-5.3.18-150300.59.164.1
    * kernel-default-devel-debuginfo-5.3.18-150300.59.164.1
    * kernel-default-base-5.3.18-150300.59.164.1.150300.18.96.1
    * kernel-default-debugsource-5.3.18-150300.59.164.1
    * kernel-preempt-debuginfo-5.3.18-150300.59.164.1
    * reiserfs-kmp-default-debuginfo-5.3.18-150300.59.164.1
    * kernel-preempt-devel-5.3.18-150300.59.164.1
    * kernel-syms-5.3.18-150300.59.164.1
    * reiserfs-kmp-default-5.3.18-150300.59.164.1
    * kernel-preempt-devel-debuginfo-5.3.18-150300.59.164.1
    * kernel-default-devel-5.3.18-150300.59.164.1
    * kernel-preempt-debugsource-5.3.18-150300.59.164.1
    * kernel-obs-build-debugsource-5.3.18-150300.59.164.1
  * SUSE Enterprise Storage 7.1 (noarch)
    * kernel-source-5.3.18-150300.59.164.1
    * kernel-macros-5.3.18-150300.59.164.1
    * kernel-devel-5.3.18-150300.59.164.1
  * SUSE Enterprise Storage 7.1 (noarch nosrc)
    * kernel-docs-5.3.18-150300.59.164.1
  * SUSE Linux Enterprise Micro 5.1 (aarch64 nosrc s390x x86_64)
    * kernel-default-5.3.18-150300.59.164.1
  * SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64)
    * kernel-default-debuginfo-5.3.18-150300.59.164.1
    * kernel-default-base-5.3.18-150300.59.164.1.150300.18.96.1
    * kernel-default-debugsource-5.3.18-150300.59.164.1
  * SUSE Linux Enterprise Micro 5.2 (aarch64 nosrc s390x x86_64)
    * kernel-default-5.3.18-150300.59.164.1
  * SUSE Linux Enterprise Micro 5.2 (aarch64 x86_64)
    * kernel-default-base-5.3.18-150300.59.164.1.150300.18.96.1
  * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64)
    * kernel-default-debuginfo-5.3.18-150300.59.164.1
    * kernel-default-debugsource-5.3.18-150300.59.164.1
  * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 nosrc s390x x86_64)
    * kernel-default-5.3.18-150300.59.164.1
  * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 x86_64)
    * kernel-default-base-5.3.18-150300.59.164.1.150300.18.96.1
  * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64)
    * kernel-default-debuginfo-5.3.18-150300.59.164.1
    * kernel-default-debugsource-5.3.18-150300.59.164.1

## References:

  * https://www.suse.com/security/cve/CVE-2020-36788.html
  * https://www.suse.com/security/cve/CVE-2021-3743.html
  * https://www.suse.com/security/cve/CVE-2021-39698.html
  * https://www.suse.com/security/cve/CVE-2021-43056.html
  * https://www.suse.com/security/cve/CVE-2021-47104.html
  * https://www.suse.com/security/cve/CVE-2021-47192.html
  * https://www.suse.com/security/cve/CVE-2021-47200.html
  * https://www.suse.com/security/cve/CVE-2021-47220.html
  * https://www.suse.com/security/cve/CVE-2021-47227.html
  * https://www.suse.com/security/cve/CVE-2021-47228.html
  * https://www.suse.com/security/cve/CVE-2021-47229.html
  * https://www.suse.com/security/cve/CVE-2021-47230.html
  * https://www.suse.com/security/cve/CVE-2021-47231.html
  * https://www.suse.com/security/cve/CVE-2021-47235.html
  * https://www.suse.com/security/cve/CVE-2021-47236.html
  * https://www.suse.com/security/cve/CVE-2021-47237.html
  * https://www.suse.com/security/cve/CVE-2021-47239.html
  * https://www.suse.com/security/cve/CVE-2021-47240.html
  * https://www.suse.com/security/cve/CVE-2021-47241.html
  * https://www.suse.com/security/cve/CVE-2021-47246.html
  * https://www.suse.com/security/cve/CVE-2021-47252.html
  * https://www.suse.com/security/cve/CVE-2021-47253.html
  * https://www.suse.com/security/cve/CVE-2021-47254.html
  * https://www.suse.com/security/cve/CVE-2021-47255.html
  * https://www.suse.com/security/cve/CVE-2021-47258.html
  * https://www.suse.com/security/cve/CVE-2021-47259.html
  * https://www.suse.com/security/cve/CVE-2021-47260.html
  * https://www.suse.com/security/cve/CVE-2021-47261.html
  * https://www.suse.com/security/cve/CVE-2021-47263.html
  * https://www.suse.com/security/cve/CVE-2021-47265.html
  * https://www.suse.com/security/cve/CVE-2021-47267.html
  * https://www.suse.com/security/cve/CVE-2021-47269.html
  * https://www.suse.com/security/cve/CVE-2021-47270.html
  * https://www.suse.com/security/cve/CVE-2021-47274.html
  * https://www.suse.com/security/cve/CVE-2021-47275.html
  * https://www.suse.com/security/cve/CVE-2021-47276.html
  * https://www.suse.com/security/cve/CVE-2021-47280.html
  * https://www.suse.com/security/cve/CVE-2021-47281.html
  * https://www.suse.com/security/cve/CVE-2021-47284.html
  * https://www.suse.com/security/cve/CVE-2021-47285.html
  * https://www.suse.com/security/cve/CVE-2021-47288.html
  * https://www.suse.com/security/cve/CVE-2021-47289.html
  * https://www.suse.com/security/cve/CVE-2021-47296.html
  * https://www.suse.com/security/cve/CVE-2021-47301.html
  * https://www.suse.com/security/cve/CVE-2021-47302.html
  * https://www.suse.com/security/cve/CVE-2021-47305.html
  * https://www.suse.com/security/cve/CVE-2021-47307.html
  * https://www.suse.com/security/cve/CVE-2021-47308.html
  * https://www.suse.com/security/cve/CVE-2021-47314.html
  * https://www.suse.com/security/cve/CVE-2021-47315.html
  * https://www.suse.com/security/cve/CVE-2021-47320.html
  * https://www.suse.com/security/cve/CVE-2021-47321.html
  * https://www.suse.com/security/cve/CVE-2021-47323.html
  * https://www.suse.com/security/cve/CVE-2021-47324.html
  * https://www.suse.com/security/cve/CVE-2021-47329.html
  * https://www.suse.com/security/cve/CVE-2021-47330.html
  * https://www.suse.com/security/cve/CVE-2021-47332.html
  * https://www.suse.com/security/cve/CVE-2021-47333.html
  * https://www.suse.com/security/cve/CVE-2021-47334.html
  * https://www.suse.com/security/cve/CVE-2021-47337.html
  * https://www.suse.com/security/cve/CVE-2021-47338.html
  * https://www.suse.com/security/cve/CVE-2021-47340.html
  * https://www.suse.com/security/cve/CVE-2021-47341.html
  * https://www.suse.com/security/cve/CVE-2021-47343.html
  * https://www.suse.com/security/cve/CVE-2021-47344.html
  * https://www.suse.com/security/cve/CVE-2021-47347.html
  * https://www.suse.com/security/cve/CVE-2021-47348.html
  * https://www.suse.com/security/cve/CVE-2021-47350.html
  * https://www.suse.com/security/cve/CVE-2021-47353.html
  * https://www.suse.com/security/cve/CVE-2021-47354.html
  * https://www.suse.com/security/cve/CVE-2021-47356.html
  * https://www.suse.com/security/cve/CVE-2021-47369.html
  * https://www.suse.com/security/cve/CVE-2021-47375.html
  * https://www.suse.com/security/cve/CVE-2021-47378.html
  * https://www.suse.com/security/cve/CVE-2021-47381.html
  * https://www.suse.com/security/cve/CVE-2021-47382.html
  * https://www.suse.com/security/cve/CVE-2021-47383.html
  * https://www.suse.com/security/cve/CVE-2021-47387.html
  * https://www.suse.com/security/cve/CVE-2021-47388.html
  * https://www.suse.com/security/cve/CVE-2021-47391.html
  * https://www.suse.com/security/cve/CVE-2021-47392.html
  * https://www.suse.com/security/cve/CVE-2021-47393.html
  * https://www.suse.com/security/cve/CVE-2021-47395.html
  * https://www.suse.com/security/cve/CVE-2021-47396.html
  * https://www.suse.com/security/cve/CVE-2021-47399.html
  * https://www.suse.com/security/cve/CVE-2021-47402.html
  * https://www.suse.com/security/cve/CVE-2021-47404.html
  * https://www.suse.com/security/cve/CVE-2021-47405.html
  * https://www.suse.com/security/cve/CVE-2021-47409.html
  * https://www.suse.com/security/cve/CVE-2021-47413.html
  * https://www.suse.com/security/cve/CVE-2021-47416.html
  * https://www.suse.com/security/cve/CVE-2021-47422.html
  * https://www.suse.com/security/cve/CVE-2021-47423.html
  * https://www.suse.com/security/cve/CVE-2021-47424.html
  * https://www.suse.com/security/cve/CVE-2021-47425.html
  * https://www.suse.com/security/cve/CVE-2021-47426.html
  * https://www.suse.com/security/cve/CVE-2021-47428.html
  * https://www.suse.com/security/cve/CVE-2021-47431.html
  * https://www.suse.com/security/cve/CVE-2021-47434.html
  * https://www.suse.com/security/cve/CVE-2021-47435.html
  * https://www.suse.com/security/cve/CVE-2021-47436.html
  * https://www.suse.com/security/cve/CVE-2021-47441.html
  * https://www.suse.com/security/cve/CVE-2021-47442.html
  * https://www.suse.com/security/cve/CVE-2021-47443.html
  * https://www.suse.com/security/cve/CVE-2021-47444.html
  * https://www.suse.com/security/cve/CVE-2021-47445.html
  * https://www.suse.com/security/cve/CVE-2021-47451.html
  * https://www.suse.com/security/cve/CVE-2021-47456.html
  * https://www.suse.com/security/cve/CVE-2021-47458.html
  * https://www.suse.com/security/cve/CVE-2021-47460.html
  * https://www.suse.com/security/cve/CVE-2021-47464.html
  * https://www.suse.com/security/cve/CVE-2021-47465.html
  * https://www.suse.com/security/cve/CVE-2021-47468.html
  * https://www.suse.com/security/cve/CVE-2021-47473.html
  * https://www.suse.com/security/cve/CVE-2021-47478.html
  * https://www.suse.com/security/cve/CVE-2021-47480.html
  * https://www.suse.com/security/cve/CVE-2021-47482.html
  * https://www.suse.com/security/cve/CVE-2021-47483.html
  * https://www.suse.com/security/cve/CVE-2021-47485.html
  * https://www.suse.com/security/cve/CVE-2021-47493.html
  * https://www.suse.com/security/cve/CVE-2021-47494.html
  * https://www.suse.com/security/cve/CVE-2021-47495.html
  * https://www.suse.com/security/cve/CVE-2021-47496.html
  * https://www.suse.com/security/cve/CVE-2021-47497.html
  * https://www.suse.com/security/cve/CVE-2021-47498.html
  * https://www.suse.com/security/cve/CVE-2021-47499.html
  * https://www.suse.com/security/cve/CVE-2021-47500.html
  * https://www.suse.com/security/cve/CVE-2021-47501.html
  * https://www.suse.com/security/cve/CVE-2021-47502.html
  * https://www.suse.com/security/cve/CVE-2021-47503.html
  * https://www.suse.com/security/cve/CVE-2021-47505.html
  * https://www.suse.com/security/cve/CVE-2021-47506.html
  * https://www.suse.com/security/cve/CVE-2021-47507.html
  * https://www.suse.com/security/cve/CVE-2021-47509.html
  * https://www.suse.com/security/cve/CVE-2021-47511.html
  * https://www.suse.com/security/cve/CVE-2021-47512.html
  * https://www.suse.com/security/cve/CVE-2021-47516.html
  * https://www.suse.com/security/cve/CVE-2021-47518.html
  * https://www.suse.com/security/cve/CVE-2021-47521.html
  * https://www.suse.com/security/cve/CVE-2021-47522.html
  * https://www.suse.com/security/cve/CVE-2021-47523.html
  * https://www.suse.com/security/cve/CVE-2021-47527.html
  * https://www.suse.com/security/cve/CVE-2021-47535.html
  * https://www.suse.com/security/cve/CVE-2021-47536.html
  * https://www.suse.com/security/cve/CVE-2021-47538.html
  * https://www.suse.com/security/cve/CVE-2021-47540.html
  * https://www.suse.com/security/cve/CVE-2021-47541.html
  * https://www.suse.com/security/cve/CVE-2021-47542.html
  * https://www.suse.com/security/cve/CVE-2021-47549.html
  * https://www.suse.com/security/cve/CVE-2021-47557.html
  * https://www.suse.com/security/cve/CVE-2021-47562.html
  * https://www.suse.com/security/cve/CVE-2021-47563.html
  * https://www.suse.com/security/cve/CVE-2021-47565.html
  * https://www.suse.com/security/cve/CVE-2022-1195.html
  * https://www.suse.com/security/cve/CVE-2022-20132.html
  * https://www.suse.com/security/cve/CVE-2022-48636.html
  * https://www.suse.com/security/cve/CVE-2022-48673.html
  * https://www.suse.com/security/cve/CVE-2022-48704.html
  * https://www.suse.com/security/cve/CVE-2022-48710.html
  * https://www.suse.com/security/cve/CVE-2023-0160.html
  * https://www.suse.com/security/cve/CVE-2023-1829.html
  * https://www.suse.com/security/cve/CVE-2023-2176.html
  * https://www.suse.com/security/cve/CVE-2023-424.html
  * https://www.suse.com/security/cve/CVE-2023-4244.html
  * https://www.suse.com/security/cve/CVE-2023-47233.html
  * https://www.suse.com/security/cve/CVE-2023-52433.html
  * https://www.suse.com/security/cve/CVE-2023-52581.html
  * https://www.suse.com/security/cve/CVE-2023-52591.html
  * https://www.suse.com/security/cve/CVE-2023-52654.html
  * https://www.suse.com/security/cve/CVE-2023-52655.html
  * https://www.suse.com/security/cve/CVE-2023-52686.html
  * https://www.suse.com/security/cve/CVE-2023-52840.html
  * https://www.suse.com/security/cve/CVE-2023-52871.html
  * https://www.suse.com/security/cve/CVE-2023-52880.html
  * https://www.suse.com/security/cve/CVE-2023-6531.html
  * https://www.suse.com/security/cve/CVE-2024-26581.html
  * https://www.suse.com/security/cve/CVE-2024-26643.html
  * https://www.suse.com/security/cve/CVE-2024-26828.html
  * https://www.suse.com/security/cve/CVE-2024-26921.html
  * https://www.suse.com/security/cve/CVE-2024-26925.html
  * https://www.suse.com/security/cve/CVE-2024-26929.html
  * https://www.suse.com/security/cve/CVE-2024-26930.html
  * https://www.suse.com/security/cve/CVE-2024-27398.html
  * https://www.suse.com/security/cve/CVE-2024-27413.html
  * https://www.suse.com/security/cve/CVE-2024-35811.html
  * https://www.suse.com/security/cve/CVE-2024-35895.html
  * https://www.suse.com/security/cve/CVE-2024-35914.html
  * https://bugzilla.suse.com/show_bug.cgi?id=1065729
  * https://bugzilla.suse.com/show_bug.cgi?id=1151927
  * https://bugzilla.suse.com/show_bug.cgi?id=1152472
  * https://bugzilla.suse.com/show_bug.cgi?id=1154353
  * https://bugzilla.suse.com/show_bug.cgi?id=1156395
  * https://bugzilla.suse.com/show_bug.cgi?id=1174585
  * https://bugzilla.suse.com/show_bug.cgi?id=1176447
  * https://bugzilla.suse.com/show_bug.cgi?id=1176774
  * https://bugzilla.suse.com/show_bug.cgi?id=1176869
  * https://bugzilla.suse.com/show_bug.cgi?id=1178134
  * https://bugzilla.suse.com/show_bug.cgi?id=1181147
  * https://bugzilla.suse.com/show_bug.cgi?id=1184631
  * https://bugzilla.suse.com/show_bug.cgi?id=1185570
  * https://bugzilla.suse.com/show_bug.cgi?id=1185589
  * https://bugzilla.suse.com/show_bug.cgi?id=1185902
  * https://bugzilla.suse.com/show_bug.cgi?id=1186885
  * https://bugzilla.suse.com/show_bug.cgi?id=1187357
  * https://bugzilla.suse.com/show_bug.cgi?id=1188616
  * https://bugzilla.suse.com/show_bug.cgi?id=1188772
  * https://bugzilla.suse.com/show_bug.cgi?id=1189883
  * https://bugzilla.suse.com/show_bug.cgi?id=1190795
  * https://bugzilla.suse.com/show_bug.cgi?id=1191452
  * https://bugzilla.suse.com/show_bug.cgi?id=1192107
  * https://bugzilla.suse.com/show_bug.cgi?id=1194288
  * https://bugzilla.suse.com/show_bug.cgi?id=1194591
  * https://bugzilla.suse.com/show_bug.cgi?id=1196956
  * https://bugzilla.suse.com/show_bug.cgi?id=1197760
  * https://bugzilla.suse.com/show_bug.cgi?id=1198029
  * https://bugzilla.suse.com/show_bug.cgi?id=1199304
  * https://bugzilla.suse.com/show_bug.cgi?id=1200619
  * https://bugzilla.suse.com/show_bug.cgi?id=1203389
  * https://bugzilla.suse.com/show_bug.cgi?id=1206646
  * https://bugzilla.suse.com/show_bug.cgi?id=1209657
  * https://bugzilla.suse.com/show_bug.cgi?id=1210335
  * https://bugzilla.suse.com/show_bug.cgi?id=1210629
  * https://bugzilla.suse.com/show_bug.cgi?id=1213476
  * https://bugzilla.suse.com/show_bug.cgi?id=1215420
  * https://bugzilla.suse.com/show_bug.cgi?id=1216702
  * https://bugzilla.suse.com/show_bug.cgi?id=1217169
  * https://bugzilla.suse.com/show_bug.cgi?id=1220137
  * https://bugzilla.suse.com/show_bug.cgi?id=1220144
  * https://bugzilla.suse.com/show_bug.cgi?id=1220754
  * https://bugzilla.suse.com/show_bug.cgi?id=1220877
  * https://bugzilla.suse.com/show_bug.cgi?id=1220960
  * https://bugzilla.suse.com/show_bug.cgi?id=1221044
  * https://bugzilla.suse.com/show_bug.cgi?id=1221113
  * https://bugzilla.suse.com/show_bug.cgi?id=1221829
  * https://bugzilla.suse.com/show_bug.cgi?id=1222251
  * https://bugzilla.suse.com/show_bug.cgi?id=1222619
  * https://bugzilla.suse.com/show_bug.cgi?id=1222838
  * https://bugzilla.suse.com/show_bug.cgi?id=1222867
  * https://bugzilla.suse.com/show_bug.cgi?id=1223084
  * https://bugzilla.suse.com/show_bug.cgi?id=1223138
  * https://bugzilla.suse.com/show_bug.cgi?id=1223384
  * https://bugzilla.suse.com/show_bug.cgi?id=1223390
  * https://bugzilla.suse.com/show_bug.cgi?id=1223512
  * https://bugzilla.suse.com/show_bug.cgi?id=1223932
  * https://bugzilla.suse.com/show_bug.cgi?id=1223934
  * https://bugzilla.suse.com/show_bug.cgi?id=1224099
  * https://bugzilla.suse.com/show_bug.cgi?id=1224174
  * https://bugzilla.suse.com/show_bug.cgi?id=1224438
  * https://bugzilla.suse.com/show_bug.cgi?id=1224482
  * https://bugzilla.suse.com/show_bug.cgi?id=1224511
  * https://bugzilla.suse.com/show_bug.cgi?id=1224592
  * https://bugzilla.suse.com/show_bug.cgi?id=1224816
  * https://bugzilla.suse.com/show_bug.cgi?id=1224826
  * https://bugzilla.suse.com/show_bug.cgi?id=1224830
  * https://bugzilla.suse.com/show_bug.cgi?id=1224831
  * https://bugzilla.suse.com/show_bug.cgi?id=1224832
  * https://bugzilla.suse.com/show_bug.cgi?id=1224834
  * https://bugzilla.suse.com/show_bug.cgi?id=1224841
  * https://bugzilla.suse.com/show_bug.cgi?id=1224842
  * https://bugzilla.suse.com/show_bug.cgi?id=1224843
  * https://bugzilla.suse.com/show_bug.cgi?id=1224844
  * https://bugzilla.suse.com/show_bug.cgi?id=1224846
  * https://bugzilla.suse.com/show_bug.cgi?id=1224849
  * https://bugzilla.suse.com/show_bug.cgi?id=1224852
  * https://bugzilla.suse.com/show_bug.cgi?id=1224853
  * https://bugzilla.suse.com/show_bug.cgi?id=1224854
  * https://bugzilla.suse.com/show_bug.cgi?id=1224859
  * https://bugzilla.suse.com/show_bug.cgi?id=1224882
  * https://bugzilla.suse.com/show_bug.cgi?id=1224886
  * https://bugzilla.suse.com/show_bug.cgi?id=1224888
  * https://bugzilla.suse.com/show_bug.cgi?id=1224889
  * https://bugzilla.suse.com/show_bug.cgi?id=1224891
  * https://bugzilla.suse.com/show_bug.cgi?id=1224892
  * https://bugzilla.suse.com/show_bug.cgi?id=1224893
  * https://bugzilla.suse.com/show_bug.cgi?id=1224899
  * https://bugzilla.suse.com/show_bug.cgi?id=1224904
  * https://bugzilla.suse.com/show_bug.cgi?id=1224907
  * https://bugzilla.suse.com/show_bug.cgi?id=1224909
  * https://bugzilla.suse.com/show_bug.cgi?id=1224916
  * https://bugzilla.suse.com/show_bug.cgi?id=1224917
  * https://bugzilla.suse.com/show_bug.cgi?id=1224922
  * https://bugzilla.suse.com/show_bug.cgi?id=1224923
  * https://bugzilla.suse.com/show_bug.cgi?id=1224924
  * https://bugzilla.suse.com/show_bug.cgi?id=1224926
  * https://bugzilla.suse.com/show_bug.cgi?id=1224928
  * https://bugzilla.suse.com/show_bug.cgi?id=1224953
  * https://bugzilla.suse.com/show_bug.cgi?id=1224954
  * https://bugzilla.suse.com/show_bug.cgi?id=1224955
  * https://bugzilla.suse.com/show_bug.cgi?id=1224957
  * https://bugzilla.suse.com/show_bug.cgi?id=1224961
  * https://bugzilla.suse.com/show_bug.cgi?id=1224963
  * https://bugzilla.suse.com/show_bug.cgi?id=1224965
  * https://bugzilla.suse.com/show_bug.cgi?id=1224966
  * https://bugzilla.suse.com/show_bug.cgi?id=1224968
  * https://bugzilla.suse.com/show_bug.cgi?id=1224981
  * https://bugzilla.suse.com/show_bug.cgi?id=1224982
  * https://bugzilla.suse.com/show_bug.cgi?id=1224983
  * https://bugzilla.suse.com/show_bug.cgi?id=1224984
  * https://bugzilla.suse.com/show_bug.cgi?id=1224987
  * https://bugzilla.suse.com/show_bug.cgi?id=1224990
  * https://bugzilla.suse.com/show_bug.cgi?id=1224993
  * https://bugzilla.suse.com/show_bug.cgi?id=1224996
  * https://bugzilla.suse.com/show_bug.cgi?id=1224997
  * https://bugzilla.suse.com/show_bug.cgi?id=1225026
  * https://bugzilla.suse.com/show_bug.cgi?id=1225030
  * https://bugzilla.suse.com/show_bug.cgi?id=1225058
  * https://bugzilla.suse.com/show_bug.cgi?id=1225060
  * https://bugzilla.suse.com/show_bug.cgi?id=1225083
  * https://bugzilla.suse.com/show_bug.cgi?id=1225084
  * https://bugzilla.suse.com/show_bug.cgi?id=1225091
  * https://bugzilla.suse.com/show_bug.cgi?id=1225112
  * https://bugzilla.suse.com/show_bug.cgi?id=1225113
  * https://bugzilla.suse.com/show_bug.cgi?id=1225128
  * https://bugzilla.suse.com/show_bug.cgi?id=1225140
  * https://bugzilla.suse.com/show_bug.cgi?id=1225143
  * https://bugzilla.suse.com/show_bug.cgi?id=1225148
  * https://bugzilla.suse.com/show_bug.cgi?id=1225155
  * https://bugzilla.suse.com/show_bug.cgi?id=1225164
  * https://bugzilla.suse.com/show_bug.cgi?id=1225177
  * https://bugzilla.suse.com/show_bug.cgi?id=1225178
  * https://bugzilla.suse.com/show_bug.cgi?id=1225181
  * https://bugzilla.suse.com/show_bug.cgi?id=1225192
  * https://bugzilla.suse.com/show_bug.cgi?id=1225193
  * https://bugzilla.suse.com/show_bug.cgi?id=1225198
  * https://bugzilla.suse.com/show_bug.cgi?id=1225201
  * https://bugzilla.suse.com/show_bug.cgi?id=1225206
  * https://bugzilla.suse.com/show_bug.cgi?id=1225207
  * https://bugzilla.suse.com/show_bug.cgi?id=1225208
  * https://bugzilla.suse.com/show_bug.cgi?id=1225214
  * https://bugzilla.suse.com/show_bug.cgi?id=1225223
  * https://bugzilla.suse.com/show_bug.cgi?id=1225224
  * https://bugzilla.suse.com/show_bug.cgi?id=1225230
  * https://bugzilla.suse.com/show_bug.cgi?id=1225232
  * https://bugzilla.suse.com/show_bug.cgi?id=1225233
  * https://bugzilla.suse.com/show_bug.cgi?id=1225237
  * https://bugzilla.suse.com/show_bug.cgi?id=1225238
  * https://bugzilla.suse.com/show_bug.cgi?id=1225243
  * https://bugzilla.suse.com/show_bug.cgi?id=1225244
  * https://bugzilla.suse.com/show_bug.cgi?id=1225247
  * https://bugzilla.suse.com/show_bug.cgi?id=1225251
  * https://bugzilla.suse.com/show_bug.cgi?id=1225252
  * https://bugzilla.suse.com/show_bug.cgi?id=1225256
  * https://bugzilla.suse.com/show_bug.cgi?id=1225261
  * https://bugzilla.suse.com/show_bug.cgi?id=1225262
  * https://bugzilla.suse.com/show_bug.cgi?id=1225263
  * https://bugzilla.suse.com/show_bug.cgi?id=1225301
  * https://bugzilla.suse.com/show_bug.cgi?id=1225303
  * https://bugzilla.suse.com/show_bug.cgi?id=1225316
  * https://bugzilla.suse.com/show_bug.cgi?id=1225318
  * https://bugzilla.suse.com/show_bug.cgi?id=1225320
  * https://bugzilla.suse.com/show_bug.cgi?id=1225321
  * https://bugzilla.suse.com/show_bug.cgi?id=1225322
  * https://bugzilla.suse.com/show_bug.cgi?id=1225326
  * https://bugzilla.suse.com/show_bug.cgi?id=1225327
  * https://bugzilla.suse.com/show_bug.cgi?id=1225328
  * https://bugzilla.suse.com/show_bug.cgi?id=1225330
  * https://bugzilla.suse.com/show_bug.cgi?id=1225333
  * https://bugzilla.suse.com/show_bug.cgi?id=1225336
  * https://bugzilla.suse.com/show_bug.cgi?id=1225341
  * https://bugzilla.suse.com/show_bug.cgi?id=1225346
  * https://bugzilla.suse.com/show_bug.cgi?id=1225351
  * https://bugzilla.suse.com/show_bug.cgi?id=1225354
  * https://bugzilla.suse.com/show_bug.cgi?id=1225355
  * https://bugzilla.suse.com/show_bug.cgi?id=1225357
  * https://bugzilla.suse.com/show_bug.cgi?id=1225358
  * https://bugzilla.suse.com/show_bug.cgi?id=1225360
  * https://bugzilla.suse.com/show_bug.cgi?id=1225361
  * https://bugzilla.suse.com/show_bug.cgi?id=1225366
  * https://bugzilla.suse.com/show_bug.cgi?id=1225367
  * https://bugzilla.suse.com/show_bug.cgi?id=1225369
  * https://bugzilla.suse.com/show_bug.cgi?id=1225370
  * https://bugzilla.suse.com/show_bug.cgi?id=1225372
  * https://bugzilla.suse.com/show_bug.cgi?id=1225374
  * https://bugzilla.suse.com/show_bug.cgi?id=1225384
  * https://bugzilla.suse.com/show_bug.cgi?id=1225386
  * https://bugzilla.suse.com/show_bug.cgi?id=1225387
  * https://bugzilla.suse.com/show_bug.cgi?id=1225390
  * https://bugzilla.suse.com/show_bug.cgi?id=1225393
  * https://bugzilla.suse.com/show_bug.cgi?id=1225400
  * https://bugzilla.suse.com/show_bug.cgi?id=1225404
  * https://bugzilla.suse.com/show_bug.cgi?id=1225405
  * https://bugzilla.suse.com/show_bug.cgi?id=1225409
  * https://bugzilla.suse.com/show_bug.cgi?id=1225411
  * https://bugzilla.suse.com/show_bug.cgi?id=1225424
  * https://bugzilla.suse.com/show_bug.cgi?id=1225427
  * https://bugzilla.suse.com/show_bug.cgi?id=1225435
  * https://bugzilla.suse.com/show_bug.cgi?id=1225437
  * https://bugzilla.suse.com/show_bug.cgi?id=1225438
  * https://bugzilla.suse.com/show_bug.cgi?id=1225439
  * https://bugzilla.suse.com/show_bug.cgi?id=1225446
  * https://bugzilla.suse.com/show_bug.cgi?id=1225447
  * https://bugzilla.suse.com/show_bug.cgi?id=1225448
  * https://bugzilla.suse.com/show_bug.cgi?id=1225450
  * https://bugzilla.suse.com/show_bug.cgi?id=1225453
  * https://bugzilla.suse.com/show_bug.cgi?id=1225455
  * https://bugzilla.suse.com/show_bug.cgi?id=1225468
  * https://bugzilla.suse.com/show_bug.cgi?id=1225499
  * https://bugzilla.suse.com/show_bug.cgi?id=1225500
  * https://bugzilla.suse.com/show_bug.cgi?id=1225508
  * https://bugzilla.suse.com/show_bug.cgi?id=1225534

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.suse.com/pipermail/sle-security-updates/attachments/20240624/3cb2ab17/attachment-0001.htm>


More information about the sle-security-updates mailing list