SUSE-SU-2024:2929-1: important: Security update for the Linux Kernel

SLE-UPDATES null at suse.de
Thu Aug 15 12:32:59 UTC 2024



# Security update for the Linux Kernel

Announcement ID: SUSE-SU-2024:2929-1  
Rating: important  
References:

  * bsc#1156395
  * bsc#1190336
  * bsc#1191958
  * bsc#1193454
  * bsc#1193554
  * bsc#1193787
  * bsc#1193883
  * bsc#1194324
  * bsc#1194826
  * bsc#1194869
  * bsc#1195065
  * bsc#1195254
  * bsc#1195341
  * bsc#1195349
  * bsc#1195357
  * bsc#1195668
  * bsc#1195927
  * bsc#1195957
  * bsc#1196018
  * bsc#1196746
  * bsc#1196823
  * bsc#1197146
  * bsc#1197246
  * bsc#1197762
  * bsc#1197915
  * bsc#1198014
  * bsc#1199295
  * bsc#1202346
  * bsc#1202686
  * bsc#1202767
  * bsc#1202780
  * bsc#1209636
  * bsc#1213123
  * bsc#1215587
  * bsc#1216834
  * bsc#1218820
  * bsc#1220185
  * bsc#1220186
  * bsc#1220187
  * bsc#1221044
  * bsc#1222011
  * bsc#1222728
  * bsc#1222809
  * bsc#1222810
  * bsc#1223635
  * bsc#1223863
  * bsc#1224488
  * bsc#1224495
  * bsc#1224671
  * bsc#1225573
  * bsc#1225829
  * bsc#1226168
  * bsc#1226226
  * bsc#1226519
  * bsc#1226537
  * bsc#1226539
  * bsc#1226550
  * bsc#1226553
  * bsc#1226554
  * bsc#1226556
  * bsc#1226557
  * bsc#1226558
  * bsc#1226559
  * bsc#1226561
  * bsc#1226562
  * bsc#1226563
  * bsc#1226564
  * bsc#1226567
  * bsc#1226569
  * bsc#1226572
  * bsc#1226574
  * bsc#1226575
  * bsc#1226576
  * bsc#1226577
  * bsc#1226580
  * bsc#1226583
  * bsc#1226585
  * bsc#1226587
  * bsc#1226601
  * bsc#1226602
  * bsc#1226603
  * bsc#1226607
  * bsc#1226614
  * bsc#1226617
  * bsc#1226618
  * bsc#1226619
  * bsc#1226621
  * bsc#1226624
  * bsc#1226626
  * bsc#1226628
  * bsc#1226629
  * bsc#1226643
  * bsc#1226644
  * bsc#1226645
  * bsc#1226650
  * bsc#1226653
  * bsc#1226662
  * bsc#1226669
  * bsc#1226670
  * bsc#1226672
  * bsc#1226673
  * bsc#1226674
  * bsc#1226675
  * bsc#1226679
  * bsc#1226683
  * bsc#1226685
  * bsc#1226686
  * bsc#1226690
  * bsc#1226691
  * bsc#1226692
  * bsc#1226696
  * bsc#1226697
  * bsc#1226698
  * bsc#1226699
  * bsc#1226701
  * bsc#1226702
  * bsc#1226703
  * bsc#1226705
  * bsc#1226708
  * bsc#1226709
  * bsc#1226710
  * bsc#1226711
  * bsc#1226712
  * bsc#1226713
  * bsc#1226715
  * bsc#1226716
  * bsc#1226719
  * bsc#1226720
  * bsc#1226721
  * bsc#1226732
  * bsc#1226758
  * bsc#1226762
  * bsc#1226785
  * bsc#1227090
  * bsc#1227383
  * bsc#1227487
  * bsc#1227549
  * bsc#1227716
  * bsc#1227750
  * bsc#1227764
  * bsc#1227808
  * bsc#1227810
  * bsc#1227823
  * bsc#1227829
  * bsc#1227836
  * bsc#1227917
  * bsc#1227920
  * bsc#1227921
  * bsc#1227922
  * bsc#1227923
  * bsc#1227924
  * bsc#1227925
  * bsc#1227928
  * bsc#1227931
  * bsc#1227932
  * bsc#1227933
  * bsc#1227935
  * bsc#1227938
  * bsc#1227941
  * bsc#1227942
  * bsc#1227944
  * bsc#1227945
  * bsc#1227948
  * bsc#1227949
  * bsc#1227952
  * bsc#1227953
  * bsc#1227954
  * bsc#1227956
  * bsc#1227963
  * bsc#1227964
  * bsc#1227965
  * bsc#1227968
  * bsc#1227969
  * bsc#1227970
  * bsc#1227971
  * bsc#1227972
  * bsc#1227975
  * bsc#1227976
  * bsc#1227981
  * bsc#1227982
  * bsc#1227985
  * bsc#1227986
  * bsc#1227987
  * bsc#1227988
  * bsc#1227989
  * bsc#1227990
  * bsc#1227991
  * bsc#1227993
  * bsc#1227995
  * bsc#1227996
  * bsc#1227997
  * bsc#1228000
  * bsc#1228002
  * bsc#1228004
  * bsc#1228005
  * bsc#1228006
  * bsc#1228007
  * bsc#1228008
  * bsc#1228009
  * bsc#1228010
  * bsc#1228013
  * bsc#1228014
  * bsc#1228015
  * bsc#1228019
  * bsc#1228025
  * bsc#1228028
  * bsc#1228035
  * bsc#1228037
  * bsc#1228038
  * bsc#1228039
  * bsc#1228040
  * bsc#1228045
  * bsc#1228054
  * bsc#1228055
  * bsc#1228056
  * bsc#1228060
  * bsc#1228061
  * bsc#1228062
  * bsc#1228063
  * bsc#1228064
  * bsc#1228066
  * bsc#1228114
  * bsc#1228247
  * bsc#1228328
  * bsc#1228440
  * bsc#1228561
  * bsc#1228644
  * bsc#1228680
  * bsc#1228743
  * bsc#1228801

  
Cross-References:

  * CVE-2021-4439
  * CVE-2021-47534
  * CVE-2021-47576
  * CVE-2021-47578
  * CVE-2021-47580
  * CVE-2021-47582
  * CVE-2021-47583
  * CVE-2021-47584
  * CVE-2021-47585
  * CVE-2021-47586
  * CVE-2021-47587
  * CVE-2021-47589
  * CVE-2021-47592
  * CVE-2021-47596
  * CVE-2021-47597
  * CVE-2021-47598
  * CVE-2021-47600
  * CVE-2021-47601
  * CVE-2021-47602
  * CVE-2021-47603
  * CVE-2021-47607
  * CVE-2021-47608
  * CVE-2021-47609
  * CVE-2021-47611
  * CVE-2021-47612
  * CVE-2021-47614
  * CVE-2021-47615
  * CVE-2021-47616
  * CVE-2021-47617
  * CVE-2021-47618
  * CVE-2021-47619
  * CVE-2021-47620
  * CVE-2021-47622
  * CVE-2021-47624
  * CVE-2022-0854
  * CVE-2022-20368
  * CVE-2022-28748
  * CVE-2022-2964
  * CVE-2022-48711
  * CVE-2022-48712
  * CVE-2022-48713
  * CVE-2022-48715
  * CVE-2022-48717
  * CVE-2022-48720
  * CVE-2022-48721
  * CVE-2022-48722
  * CVE-2022-48723
  * CVE-2022-48724
  * CVE-2022-48725
  * CVE-2022-48726
  * CVE-2022-48727
  * CVE-2022-48728
  * CVE-2022-48729
  * CVE-2022-48730
  * CVE-2022-48732
  * CVE-2022-48734
  * CVE-2022-48735
  * CVE-2022-48736
  * CVE-2022-48737
  * CVE-2022-48738
  * CVE-2022-48739
  * CVE-2022-48740
  * CVE-2022-48743
  * CVE-2022-48744
  * CVE-2022-48745
  * CVE-2022-48746
  * CVE-2022-48747
  * CVE-2022-48749
  * CVE-2022-48751
  * CVE-2022-48752
  * CVE-2022-48754
  * CVE-2022-48756
  * CVE-2022-48758
  * CVE-2022-48759
  * CVE-2022-48760
  * CVE-2022-48761
  * CVE-2022-48763
  * CVE-2022-48765
  * CVE-2022-48767
  * CVE-2022-48768
  * CVE-2022-48769
  * CVE-2022-48771
  * CVE-2022-48773
  * CVE-2022-48774
  * CVE-2022-48775
  * CVE-2022-48776
  * CVE-2022-48777
  * CVE-2022-48778
  * CVE-2022-48780
  * CVE-2022-48783
  * CVE-2022-48784
  * CVE-2022-48786
  * CVE-2022-48787
  * CVE-2022-48788
  * CVE-2022-48789
  * CVE-2022-48790
  * CVE-2022-48791
  * CVE-2022-48792
  * CVE-2022-48793
  * CVE-2022-48794
  * CVE-2022-48796
  * CVE-2022-48797
  * CVE-2022-48798
  * CVE-2022-48799
  * CVE-2022-48800
  * CVE-2022-48801
  * CVE-2022-48802
  * CVE-2022-48803
  * CVE-2022-48804
  * CVE-2022-48805
  * CVE-2022-48806
  * CVE-2022-48807
  * CVE-2022-48811
  * CVE-2022-48812
  * CVE-2022-48813
  * CVE-2022-48814
  * CVE-2022-48815
  * CVE-2022-48816
  * CVE-2022-48817
  * CVE-2022-48818
  * CVE-2022-48820
  * CVE-2022-48821
  * CVE-2022-48822
  * CVE-2022-48823
  * CVE-2022-48824
  * CVE-2022-48825
  * CVE-2022-48826
  * CVE-2022-48827
  * CVE-2022-48828
  * CVE-2022-48829
  * CVE-2022-48830
  * CVE-2022-48831
  * CVE-2022-48834
  * CVE-2022-48835
  * CVE-2022-48836
  * CVE-2022-48837
  * CVE-2022-48838
  * CVE-2022-48839
  * CVE-2022-48840
  * CVE-2022-48841
  * CVE-2022-48842
  * CVE-2022-48843
  * CVE-2022-48847
  * CVE-2022-48849
  * CVE-2022-48851
  * CVE-2022-48853
  * CVE-2022-48856
  * CVE-2022-48857
  * CVE-2022-48858
  * CVE-2022-48859
  * CVE-2022-48860
  * CVE-2022-48861
  * CVE-2022-48862
  * CVE-2022-48863
  * CVE-2022-48866
  * CVE-2023-1582
  * CVE-2023-37453
  * CVE-2023-52591
  * CVE-2023-52762
  * CVE-2023-52766
  * CVE-2023-52800
  * CVE-2023-52885
  * CVE-2023-52886
  * CVE-2024-26583
  * CVE-2024-26584
  * CVE-2024-26585
  * CVE-2024-26800
  * CVE-2024-26813
  * CVE-2024-26814
  * CVE-2024-26976
  * CVE-2024-35878
  * CVE-2024-35901
  * CVE-2024-35905
  * CVE-2024-36926
  * CVE-2024-36974
  * CVE-2024-38541
  * CVE-2024-38555
  * CVE-2024-38559
  * CVE-2024-39463
  * CVE-2024-39494
  * CVE-2024-40902
  * CVE-2024-40937
  * CVE-2024-40954
  * CVE-2024-40956
  * CVE-2024-40989
  * CVE-2024-40994
  * CVE-2024-41011
  * CVE-2024-41012
  * CVE-2024-41059
  * CVE-2024-41069
  * CVE-2024-41090
  * CVE-2024-42093
  * CVE-2024-42145
  * CVE-2024-42230

  
CVSS scores:

  * CVE-2021-4439 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
  * CVE-2021-47534 ( SUSE ):  4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47576 ( SUSE ):  3.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:L
  * CVE-2021-47578 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47580 ( SUSE ):  6.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L
  * CVE-2021-47582 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47583 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47584 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47585 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47586 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47587 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47589 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47592 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47596 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47597 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
  * CVE-2021-47598 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2021-47600 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2021-47601 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47602 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47603 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47607 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
  * CVE-2021-47608 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47609 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47611 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47612 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47614 ( SUSE ):  6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2021-47615 ( SUSE ):  3.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L
  * CVE-2021-47616 ( SUSE ):  6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2021-47617 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47618 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47619 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47620 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
  * CVE-2021-47622 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47624 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2022-0854 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
  * CVE-2022-0854 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
  * CVE-2022-20368 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-20368 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-28748 ( SUSE ):  3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
  * CVE-2022-2964 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-2964 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-48711 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-48712 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
  * CVE-2022-48713 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48715 ( SUSE ):  3.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L
  * CVE-2022-48717 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
  * CVE-2022-48720 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2022-48721 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48722 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48723 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48724 ( SUSE ):  4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48725 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48726 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-48727 ( SUSE ):  4.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
  * CVE-2022-48728 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48729 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48730 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
  * CVE-2022-48732 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48734 ( SUSE ):  4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48735 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-48736 ( SUSE ):  0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
  * CVE-2022-48737 ( SUSE ):  0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
  * CVE-2022-48738 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48739 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
  * CVE-2022-48740 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48743 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48744 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48745 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48746 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48747 ( SUSE ):  5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H
  * CVE-2022-48749 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48751 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48752 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48754 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48756 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48758 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48759 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48760 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48761 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48763 ( SUSE ):  4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48765 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48767 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48768 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48769 ( SUSE ):  4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48771 ( SUSE ):  6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-48773 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48774 ( SUSE ):  5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
  * CVE-2022-48775 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2022-48776 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2022-48777 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48778 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
  * CVE-2022-48780 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48783 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48784 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48786 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
  * CVE-2022-48787 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48787 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-48788 ( SUSE ):  5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H
  * CVE-2022-48788 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-48789 ( SUSE ):  6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-48789 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-48790 ( SUSE ):  6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-48790 ( NVD ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-48791 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-48791 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-48792 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-48792 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-48793 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48793 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48794 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2022-48796 ( SUSE ):  6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-48796 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-48797 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
  * CVE-2022-48798 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48799 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48800 ( SUSE ):  2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2022-48801 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-48802 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48803 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
  * CVE-2022-48804 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
  * CVE-2022-48805 ( SUSE ):  6.6 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-48806 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
  * CVE-2022-48807 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-48811 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48812 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48813 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48814 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48815 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48816 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48817 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48818 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48820 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48821 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-48822 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-48822 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-48823 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2022-48824 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48824 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48825 ( SUSE ):  0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
  * CVE-2022-48826 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48827 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48828 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
  * CVE-2022-48829 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
  * CVE-2022-48830 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48831 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48834 ( SUSE ):  0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
  * CVE-2022-48834 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-48835 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48835 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48836 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48836 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48837 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48837 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-48838 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48838 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48839 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48839 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48840 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48840 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48841 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48841 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48842 ( SUSE ):  4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48842 ( NVD ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48843 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48843 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48847 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48847 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-48849 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48849 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
  * CVE-2022-48851 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48851 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-48853 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48853 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
  * CVE-2022-48856 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48856 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48857 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48857 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48858 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48858 ( NVD ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-48859 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48859 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48860 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48860 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48861 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48861 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48862 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48862 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48863 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
  * CVE-2022-48863 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48866 ( SUSE ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2022-48866 ( NVD ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2023-1582 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-1582 ( NVD ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-37453 ( SUSE ):  4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-37453 ( NVD ):  4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52591 ( SUSE ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2023-52762 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52766 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
  * CVE-2023-52800 ( SUSE ):  6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-52885 ( SUSE ):  8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-52886 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26583 ( SUSE ):  5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26583 ( NVD ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26584 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26584 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26585 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-26585 ( NVD ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26800 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26813 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26814 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26976 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35878 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35901 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35905 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-36926 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36926 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36974 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-38541 ( SUSE ):  6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-38555 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38559 ( SUSE ):  6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-39463 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-39494 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-39494 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-40902 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
  * CVE-2024-40902 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-40937 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-40954 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-40956 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-40989 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-40994 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-41011 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-41012 ( SUSE ):  6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2024-41059 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-41059 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-41069 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-41069 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-41090 ( SUSE ):  7.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
  * CVE-2024-42093 ( SUSE ):  6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L
  * CVE-2024-42145 ( SUSE ):  8.7
    CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-42145 ( SUSE ):  7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-42230 ( SUSE ):  6.7
    CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-42230 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-42230 ( NVD ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H

  
Affected Products:

  * openSUSE Leap 15.4
  * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
  * SUSE Linux Enterprise High Availability Extension 15 SP4
  * SUSE Linux Enterprise High Performance Computing 15 SP4
  * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
  * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
  * SUSE Linux Enterprise Live Patching 15-SP4
  * SUSE Linux Enterprise Micro 5.3
  * SUSE Linux Enterprise Micro 5.4
  * SUSE Linux Enterprise Micro for Rancher 5.3
  * SUSE Linux Enterprise Micro for Rancher 5.4
  * SUSE Linux Enterprise Real Time 15 SP4
  * SUSE Linux Enterprise Server 15 SP4
  * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
  * SUSE Linux Enterprise Server for SAP Applications 15 SP4
  * SUSE Manager Proxy 4.3
  * SUSE Manager Retail Branch Server 4.3
  * SUSE Manager Server 4.3

  
  
An update that solves 194 vulnerabilities and has 36 security fixes can now be
installed.

## Description:

The SUSE Linux Enterprise 15 SP4 kernel was updated to receive various security
bugfixes.

The following security bugs were fixed:

  * CVE-2024-39494: ima: Fix use-after-free on a dentry's dname.name
    (bsc#1227716).
  * CVE-2024-41069: ASoC: topology: Fix route memory corruption (bsc#1228644).
  * CVE-2024-40954: net: do not leave a dangling sk pointer, when socket
    creation fails (bsc#1227808)
  * CVE-2024-42145: IB/core: Implement a limit on UMAD receive List
    (bsc#1228743)
  * CVE-2024-40994: ptp: fix integer overflow in max_vclocks_store
    (bsc#1227829).
  * CVE-2024-41012: filelock: Remove locks reliably when fcntl/close race is
    detected (bsc#1228247).
  * CVE-2024-42093: net/dpaa2: Avoid explicit cpumask var allocation on stack
    (bsc#1228680).
  * CVE-2024-40989: KVM: arm64: Disassociate vcpus from redistributor region on
    teardown (bsc#1227823).
  * CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228561).
  * CVE-2024-40956: dmaengine: idxd: Fix possible Use-After-Free in
    irq_process_work_list (bsc#1227810).
  * CVE-2024-41090: tap: add missing verification for short frame (bsc#1228328).
  * CVE-2024-41011: drm/amdkfd: do not allow mapping the MMIO HDP page with
    large pages (bsc#1228114).
  * CVE-2024-39463: 9p: add missing locking around taking dentry fid list
    (bsc#1227090).
  * CVE-2021-47598: sch_cake: do not call cake_destroy() from cake_init()
    (bsc#1226574).
  * CVE-2024-40937: gve: Clear napi->skb before dev_kfree_skb_any()
    (bsc#1227836).
  * CVE-2024-35901: net: mana: Fix Rx DMA datasize and skb_over_panic
    (bsc#1224495).
  * CVE-2024-42230: powerpc/pseries: Fix scv instruction crash with kexec
    (bsc#1194869).
  * CVE-2024-26585: Fixed race between tx work scheduling and socket close
    (bsc#1220187).
  * CVE-2024-36974: net/sched: taprio: always validate TCA_TAPRIO_ATTR_PRIOMAP
    (bsc#1226519).
  * CVE-2024-38555: net/mlx5: Discard command completions in internal error
    (bsc#1226607).

The following non-security bugs were fixed:

  * NFS: Do not re-read the entire page cache to find the next cookie
    (bsc#1226662).
  * NFS: Reduce use of uncached readdir (bsc#1226662).
  * NFSv4.x: by default serialize open/close operations (bsc#1226226
    bsc#1223863).
  * X.509: Fix the parser of extended key usage for length (bsc#1218820).
  * btrfs: sysfs: update fs features directory asynchronously (bsc#1226168).
  * cgroup/cpuset: Prevent UAF in proc_cpuset_show() (bsc#1228801).
  * jfs: xattr: fix buffer overflow for invalid xattr (bsc#1227383).
  * kABI: rtas: Workaround false positive due to lost definition (bsc#1227487).
  * kernel-binary: vdso: Own module_dir
  * net/dcb: check for detached device before executing callbacks (bsc#1215587).
  * ocfs2: fix DIO failure due to insufficient transaction credits
    (bsc#1216834).
  * powerpc/rtas: Prevent Spectre v1 gadget construction in sys_rtas()
    (bsc#1227487).
  * powerpc/rtas: clean up includes (bsc#1227487).
  * workqueue: Improve scalability of workqueue watchdog touch (bsc#1193454).
  * workqueue: wq_watchdog_touch is always called with valid CPU (bsc#1193454).

## Special Instructions and Notes:

  * Please reboot the system after installing this update.

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".  
Alternatively you can run the command listed for your product:

  * SUSE Linux Enterprise High Availability Extension 15 SP4  
    zypper in -t patch SUSE-SLE-Product-HA-15-SP4-2024-2929=1

  * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4  
    zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2929=1

  * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4  
    zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2929=1

  * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4  
    zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-2929=1

  * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4  
    zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2929=1

  * SUSE Linux Enterprise Server for SAP Applications 15 SP4  
    zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2929=1

  * SUSE Manager Proxy 4.3  
    zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-2929=1

  * SUSE Manager Retail Branch Server 4.3  
    zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-2929=1

  * SUSE Manager Server 4.3  
    zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-2929=1

  * openSUSE Leap 15.4  
    zypper in -t patch SUSE-2024-2929=1

  * SUSE Linux Enterprise Micro for Rancher 5.3  
    zypper in -t patch SUSE-SLE-Micro-5.3-2024-2929=1

  * SUSE Linux Enterprise Micro 5.3  
    zypper in -t patch SUSE-SLE-Micro-5.3-2024-2929=1

  * SUSE Linux Enterprise Micro for Rancher 5.4  
    zypper in -t patch SUSE-SLE-Micro-5.4-2024-2929=1

  * SUSE Linux Enterprise Micro 5.4  
    zypper in -t patch SUSE-SLE-Micro-5.4-2024-2929=1

  * SUSE Linux Enterprise Live Patching 15-SP4  
    zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2024-2929=1  
Please note that this is the initial kernel livepatch without fixes itself, this
package is later updated by separate standalone kernel livepatch updates.

## Package List:

  * SUSE Linux Enterprise High Availability Extension 15 SP4 (aarch64 ppc64le
    s390x x86_64)
    * gfs2-kmp-default-5.14.21-150400.24.128.1
    * cluster-md-kmp-default-debuginfo-5.14.21-150400.24.128.1
    * cluster-md-kmp-default-5.14.21-150400.24.128.1
    * ocfs2-kmp-default-5.14.21-150400.24.128.1
    * gfs2-kmp-default-debuginfo-5.14.21-150400.24.128.1
    * dlm-kmp-default-5.14.21-150400.24.128.1
    * kernel-default-debuginfo-5.14.21-150400.24.128.1
    * kernel-default-debugsource-5.14.21-150400.24.128.1
    * ocfs2-kmp-default-debuginfo-5.14.21-150400.24.128.1
    * dlm-kmp-default-debuginfo-5.14.21-150400.24.128.1
  * SUSE Linux Enterprise High Availability Extension 15 SP4 (nosrc)
    * kernel-default-5.14.21-150400.24.128.1
  * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
    nosrc)
    * kernel-64kb-5.14.21-150400.24.128.1
  * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64)
    * kernel-64kb-devel-debuginfo-5.14.21-150400.24.128.1
    * kernel-64kb-debugsource-5.14.21-150400.24.128.1
    * kernel-64kb-debuginfo-5.14.21-150400.24.128.1
    * kernel-64kb-devel-5.14.21-150400.24.128.1
  * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 nosrc
    x86_64)
    * kernel-default-5.14.21-150400.24.128.1
  * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
    x86_64)
    * kernel-default-devel-debuginfo-5.14.21-150400.24.128.1
    * reiserfs-kmp-default-debuginfo-5.14.21-150400.24.128.1
    * kernel-syms-5.14.21-150400.24.128.1
    * kernel-default-base-5.14.21-150400.24.128.1.150400.24.62.1
    * kernel-obs-build-debugsource-5.14.21-150400.24.128.1
    * kernel-default-debuginfo-5.14.21-150400.24.128.1
    * reiserfs-kmp-default-5.14.21-150400.24.128.1
    * kernel-obs-build-5.14.21-150400.24.128.1
    * kernel-default-debugsource-5.14.21-150400.24.128.1
    * kernel-default-devel-5.14.21-150400.24.128.1
  * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
    * kernel-source-5.14.21-150400.24.128.1
    * kernel-macros-5.14.21-150400.24.128.1
    * kernel-devel-5.14.21-150400.24.128.1
  * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch nosrc)
    * kernel-docs-5.14.21-150400.24.128.1
  * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 nosrc)
    * kernel-64kb-5.14.21-150400.24.128.1
  * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64)
    * kernel-64kb-devel-debuginfo-5.14.21-150400.24.128.1
    * kernel-64kb-debugsource-5.14.21-150400.24.128.1
    * kernel-64kb-debuginfo-5.14.21-150400.24.128.1
    * kernel-64kb-devel-5.14.21-150400.24.128.1
  * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 nosrc
    x86_64)
    * kernel-default-5.14.21-150400.24.128.1
  * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
    x86_64)
    * kernel-default-devel-debuginfo-5.14.21-150400.24.128.1
    * reiserfs-kmp-default-debuginfo-5.14.21-150400.24.128.1
    * kernel-syms-5.14.21-150400.24.128.1
    * kernel-default-base-5.14.21-150400.24.128.1.150400.24.62.1
    * kernel-obs-build-debugsource-5.14.21-150400.24.128.1
    * kernel-default-debuginfo-5.14.21-150400.24.128.1
    * reiserfs-kmp-default-5.14.21-150400.24.128.1
    * kernel-obs-build-5.14.21-150400.24.128.1
    * kernel-default-debugsource-5.14.21-150400.24.128.1
    * kernel-default-devel-5.14.21-150400.24.128.1
  * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
    * kernel-source-5.14.21-150400.24.128.1
    * kernel-macros-5.14.21-150400.24.128.1
    * kernel-devel-5.14.21-150400.24.128.1
  * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch nosrc)
    * kernel-docs-5.14.21-150400.24.128.1
  * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (nosrc x86_64)
    * kernel-default-5.14.21-150400.24.128.1
  * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
    * kernel-default-devel-debuginfo-5.14.21-150400.24.128.1
    * kernel-default-extra-debuginfo-5.14.21-150400.24.128.1
    * kernel-syms-5.14.21-150400.24.128.1
    * kernel-default-extra-5.14.21-150400.24.128.1
    * kernel-default-base-5.14.21-150400.24.128.1.150400.24.62.1
    * kernel-obs-build-debugsource-5.14.21-150400.24.128.1
    * kernel-default-debuginfo-5.14.21-150400.24.128.1
    * kernel-obs-build-5.14.21-150400.24.128.1
    * kernel-default-debugsource-5.14.21-150400.24.128.1
    * kernel-default-devel-5.14.21-150400.24.128.1
  * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch)
    * kernel-source-5.14.21-150400.24.128.1
    * kernel-macros-5.14.21-150400.24.128.1
    * kernel-devel-5.14.21-150400.24.128.1
  * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch nosrc)
    * kernel-docs-5.14.21-150400.24.128.1
  * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 nosrc)
    * kernel-64kb-5.14.21-150400.24.128.1
  * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64)
    * kernel-64kb-devel-debuginfo-5.14.21-150400.24.128.1
    * kernel-64kb-debugsource-5.14.21-150400.24.128.1
    * kernel-64kb-debuginfo-5.14.21-150400.24.128.1
    * kernel-64kb-devel-5.14.21-150400.24.128.1
  * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
    x86_64 nosrc)
    * kernel-default-5.14.21-150400.24.128.1
  * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le x86_64)
    * kernel-default-base-5.14.21-150400.24.128.1.150400.24.62.1
  * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
    x86_64)
    * kernel-default-devel-debuginfo-5.14.21-150400.24.128.1
    * reiserfs-kmp-default-debuginfo-5.14.21-150400.24.128.1
    * kernel-syms-5.14.21-150400.24.128.1
    * kernel-obs-build-debugsource-5.14.21-150400.24.128.1
    * kernel-default-debuginfo-5.14.21-150400.24.128.1
    * reiserfs-kmp-default-5.14.21-150400.24.128.1
    * kernel-obs-build-5.14.21-150400.24.128.1
    * kernel-default-debugsource-5.14.21-150400.24.128.1
    * kernel-default-devel-5.14.21-150400.24.128.1
  * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch)
    * kernel-source-5.14.21-150400.24.128.1
    * kernel-macros-5.14.21-150400.24.128.1
    * kernel-devel-5.14.21-150400.24.128.1
  * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch nosrc)
    * kernel-docs-5.14.21-150400.24.128.1
  * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (nosrc s390x)
    * kernel-zfcpdump-5.14.21-150400.24.128.1
  * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (s390x)
    * kernel-zfcpdump-debugsource-5.14.21-150400.24.128.1
    * kernel-zfcpdump-debuginfo-5.14.21-150400.24.128.1
  * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (nosrc ppc64le
    x86_64)
    * kernel-default-5.14.21-150400.24.128.1
  * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
    * kernel-default-devel-debuginfo-5.14.21-150400.24.128.1
    * reiserfs-kmp-default-debuginfo-5.14.21-150400.24.128.1
    * kernel-syms-5.14.21-150400.24.128.1
    * kernel-default-base-5.14.21-150400.24.128.1.150400.24.62.1
    * kernel-obs-build-debugsource-5.14.21-150400.24.128.1
    * kernel-default-debuginfo-5.14.21-150400.24.128.1
    * reiserfs-kmp-default-5.14.21-150400.24.128.1
    * kernel-obs-build-5.14.21-150400.24.128.1
    * kernel-default-debugsource-5.14.21-150400.24.128.1
    * kernel-default-devel-5.14.21-150400.24.128.1
  * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
    * kernel-source-5.14.21-150400.24.128.1
    * kernel-macros-5.14.21-150400.24.128.1
    * kernel-devel-5.14.21-150400.24.128.1
  * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch nosrc)
    * kernel-docs-5.14.21-150400.24.128.1
  * SUSE Manager Proxy 4.3 (nosrc x86_64)
    * kernel-default-5.14.21-150400.24.128.1
  * SUSE Manager Proxy 4.3 (x86_64)
    * kernel-default-devel-debuginfo-5.14.21-150400.24.128.1
    * kernel-syms-5.14.21-150400.24.128.1
    * kernel-default-base-5.14.21-150400.24.128.1.150400.24.62.1
    * kernel-default-debuginfo-5.14.21-150400.24.128.1
    * kernel-default-debugsource-5.14.21-150400.24.128.1
    * kernel-default-devel-5.14.21-150400.24.128.1
  * SUSE Manager Proxy 4.3 (noarch)
    * kernel-source-5.14.21-150400.24.128.1
    * kernel-macros-5.14.21-150400.24.128.1
    * kernel-devel-5.14.21-150400.24.128.1
  * SUSE Manager Retail Branch Server 4.3 (nosrc x86_64)
    * kernel-default-5.14.21-150400.24.128.1
  * SUSE Manager Retail Branch Server 4.3 (x86_64)
    * kernel-default-devel-debuginfo-5.14.21-150400.24.128.1
    * kernel-default-base-5.14.21-150400.24.128.1.150400.24.62.1
    * kernel-default-debuginfo-5.14.21-150400.24.128.1
    * kernel-default-debugsource-5.14.21-150400.24.128.1
    * kernel-default-devel-5.14.21-150400.24.128.1
  * SUSE Manager Retail Branch Server 4.3 (noarch)
    * kernel-macros-5.14.21-150400.24.128.1
    * kernel-devel-5.14.21-150400.24.128.1
  * SUSE Manager Server 4.3 (nosrc ppc64le s390x x86_64)
    * kernel-default-5.14.21-150400.24.128.1
  * SUSE Manager Server 4.3 (ppc64le x86_64)
    * kernel-default-base-5.14.21-150400.24.128.1.150400.24.62.1
  * SUSE Manager Server 4.3 (ppc64le s390x x86_64)
    * kernel-default-devel-debuginfo-5.14.21-150400.24.128.1
    * kernel-syms-5.14.21-150400.24.128.1
    * kernel-default-debuginfo-5.14.21-150400.24.128.1
    * kernel-default-debugsource-5.14.21-150400.24.128.1
    * kernel-default-devel-5.14.21-150400.24.128.1
  * SUSE Manager Server 4.3 (noarch)
    * kernel-source-5.14.21-150400.24.128.1
    * kernel-macros-5.14.21-150400.24.128.1
    * kernel-devel-5.14.21-150400.24.128.1
  * SUSE Manager Server 4.3 (nosrc s390x)
    * kernel-zfcpdump-5.14.21-150400.24.128.1
  * SUSE Manager Server 4.3 (s390x)
    * kernel-zfcpdump-debugsource-5.14.21-150400.24.128.1
    * kernel-zfcpdump-debuginfo-5.14.21-150400.24.128.1
  * openSUSE Leap 15.4 (noarch nosrc)
    * kernel-docs-5.14.21-150400.24.128.1
  * openSUSE Leap 15.4 (noarch)
    * kernel-source-5.14.21-150400.24.128.1
    * kernel-devel-5.14.21-150400.24.128.1
    * kernel-source-vanilla-5.14.21-150400.24.128.1
    * kernel-macros-5.14.21-150400.24.128.1
    * kernel-docs-html-5.14.21-150400.24.128.1
  * openSUSE Leap 15.4 (nosrc ppc64le x86_64)
    * kernel-debug-5.14.21-150400.24.128.1
  * openSUSE Leap 15.4 (ppc64le x86_64)
    * kernel-debug-debuginfo-5.14.21-150400.24.128.1
    * kernel-debug-livepatch-devel-5.14.21-150400.24.128.1
    * kernel-debug-debugsource-5.14.21-150400.24.128.1
    * kernel-debug-devel-debuginfo-5.14.21-150400.24.128.1
    * kernel-debug-devel-5.14.21-150400.24.128.1
  * openSUSE Leap 15.4 (aarch64 ppc64le x86_64)
    * kernel-kvmsmall-debuginfo-5.14.21-150400.24.128.1
    * kernel-kvmsmall-devel-5.14.21-150400.24.128.1
    * kernel-kvmsmall-devel-debuginfo-5.14.21-150400.24.128.1
    * kernel-default-base-5.14.21-150400.24.128.1.150400.24.62.1
    * kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.128.1
    * kernel-default-base-rebuild-5.14.21-150400.24.128.1.150400.24.62.1
    * kernel-kvmsmall-debugsource-5.14.21-150400.24.128.1
  * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64)
    * reiserfs-kmp-default-debuginfo-5.14.21-150400.24.128.1
    * cluster-md-kmp-default-debuginfo-5.14.21-150400.24.128.1
    * kselftests-kmp-default-5.14.21-150400.24.128.1
    * kernel-syms-5.14.21-150400.24.128.1
    * cluster-md-kmp-default-5.14.21-150400.24.128.1
    * dlm-kmp-default-5.14.21-150400.24.128.1
    * kernel-obs-build-debugsource-5.14.21-150400.24.128.1
    * kernel-default-livepatch-5.14.21-150400.24.128.1
    * kselftests-kmp-default-debuginfo-5.14.21-150400.24.128.1
    * kernel-default-devel-5.14.21-150400.24.128.1
    * kernel-default-extra-5.14.21-150400.24.128.1
    * kernel-default-debugsource-5.14.21-150400.24.128.1
    * ocfs2-kmp-default-debuginfo-5.14.21-150400.24.128.1
    * kernel-default-devel-debuginfo-5.14.21-150400.24.128.1
    * gfs2-kmp-default-5.14.21-150400.24.128.1
    * kernel-default-extra-debuginfo-5.14.21-150400.24.128.1
    * kernel-default-optional-5.14.21-150400.24.128.1
    * kernel-default-optional-debuginfo-5.14.21-150400.24.128.1
    * ocfs2-kmp-default-5.14.21-150400.24.128.1
    * gfs2-kmp-default-debuginfo-5.14.21-150400.24.128.1
    * kernel-default-debuginfo-5.14.21-150400.24.128.1
    * kernel-obs-build-5.14.21-150400.24.128.1
    * kernel-default-livepatch-devel-5.14.21-150400.24.128.1
    * kernel-obs-qa-5.14.21-150400.24.128.1
    * reiserfs-kmp-default-5.14.21-150400.24.128.1
    * dlm-kmp-default-debuginfo-5.14.21-150400.24.128.1
  * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 nosrc)
    * kernel-default-5.14.21-150400.24.128.1
  * openSUSE Leap 15.4 (aarch64 nosrc ppc64le x86_64)
    * kernel-kvmsmall-5.14.21-150400.24.128.1
  * openSUSE Leap 15.4 (ppc64le s390x x86_64)
    * kernel-livepatch-5_14_21-150400_24_128-default-debuginfo-1-150400.9.3.1
    * kernel-livepatch-SLE15-SP4_Update_29-debugsource-1-150400.9.3.1
    * kernel-livepatch-5_14_21-150400_24_128-default-1-150400.9.3.1
  * openSUSE Leap 15.4 (nosrc s390x)
    * kernel-zfcpdump-5.14.21-150400.24.128.1
  * openSUSE Leap 15.4 (s390x)
    * kernel-zfcpdump-debugsource-5.14.21-150400.24.128.1
    * kernel-zfcpdump-debuginfo-5.14.21-150400.24.128.1
  * openSUSE Leap 15.4 (nosrc)
    * dtb-aarch64-5.14.21-150400.24.128.1
  * openSUSE Leap 15.4 (aarch64)
    * dtb-lg-5.14.21-150400.24.128.1
    * kernel-64kb-devel-debuginfo-5.14.21-150400.24.128.1
    * dtb-amd-5.14.21-150400.24.128.1
    * ocfs2-kmp-64kb-5.14.21-150400.24.128.1
    * gfs2-kmp-64kb-debuginfo-5.14.21-150400.24.128.1
    * kselftests-kmp-64kb-debuginfo-5.14.21-150400.24.128.1
    * ocfs2-kmp-64kb-debuginfo-5.14.21-150400.24.128.1
    * dtb-exynos-5.14.21-150400.24.128.1
    * dtb-apple-5.14.21-150400.24.128.1
    * reiserfs-kmp-64kb-debuginfo-5.14.21-150400.24.128.1
    * dtb-cavium-5.14.21-150400.24.128.1
    * kernel-64kb-debugsource-5.14.21-150400.24.128.1
    * kernel-64kb-devel-5.14.21-150400.24.128.1
    * kernel-64kb-extra-debuginfo-5.14.21-150400.24.128.1
    * dtb-allwinner-5.14.21-150400.24.128.1
    * kernel-64kb-optional-5.14.21-150400.24.128.1
    * dlm-kmp-64kb-debuginfo-5.14.21-150400.24.128.1
    * reiserfs-kmp-64kb-5.14.21-150400.24.128.1
    * dtb-freescale-5.14.21-150400.24.128.1
    * kernel-64kb-extra-5.14.21-150400.24.128.1
    * dtb-altera-5.14.21-150400.24.128.1
    * dtb-mediatek-5.14.21-150400.24.128.1
    * dtb-arm-5.14.21-150400.24.128.1
    * cluster-md-kmp-64kb-debuginfo-5.14.21-150400.24.128.1
    * dtb-amlogic-5.14.21-150400.24.128.1
    * dtb-renesas-5.14.21-150400.24.128.1
    * dtb-hisilicon-5.14.21-150400.24.128.1
    * cluster-md-kmp-64kb-5.14.21-150400.24.128.1
    * kselftests-kmp-64kb-5.14.21-150400.24.128.1
    * dtb-apm-5.14.21-150400.24.128.1
    * kernel-64kb-optional-debuginfo-5.14.21-150400.24.128.1
    * dtb-rockchip-5.14.21-150400.24.128.1
    * gfs2-kmp-64kb-5.14.21-150400.24.128.1
    * dlm-kmp-64kb-5.14.21-150400.24.128.1
    * dtb-broadcom-5.14.21-150400.24.128.1
    * dtb-marvell-5.14.21-150400.24.128.1
    * dtb-sprd-5.14.21-150400.24.128.1
    * dtb-qcom-5.14.21-150400.24.128.1
    * kernel-64kb-livepatch-devel-5.14.21-150400.24.128.1
    * kernel-64kb-debuginfo-5.14.21-150400.24.128.1
    * dtb-nvidia-5.14.21-150400.24.128.1
    * dtb-xilinx-5.14.21-150400.24.128.1
    * dtb-socionext-5.14.21-150400.24.128.1
    * dtb-amazon-5.14.21-150400.24.128.1
  * openSUSE Leap 15.4 (aarch64 nosrc)
    * kernel-64kb-5.14.21-150400.24.128.1
  * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 nosrc s390x x86_64)
    * kernel-default-5.14.21-150400.24.128.1
  * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 x86_64)
    * kernel-default-base-5.14.21-150400.24.128.1.150400.24.62.1
  * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
    * kernel-default-debugsource-5.14.21-150400.24.128.1
    * kernel-default-debuginfo-5.14.21-150400.24.128.1
  * SUSE Linux Enterprise Micro 5.3 (aarch64 nosrc s390x x86_64)
    * kernel-default-5.14.21-150400.24.128.1
  * SUSE Linux Enterprise Micro 5.3 (aarch64 x86_64)
    * kernel-default-base-5.14.21-150400.24.128.1.150400.24.62.1
  * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
    * kernel-default-debugsource-5.14.21-150400.24.128.1
    * kernel-default-debuginfo-5.14.21-150400.24.128.1
  * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 nosrc s390x x86_64)
    * kernel-default-5.14.21-150400.24.128.1
  * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 x86_64)
    * kernel-default-base-5.14.21-150400.24.128.1.150400.24.62.1
  * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
    * kernel-default-debugsource-5.14.21-150400.24.128.1
    * kernel-default-debuginfo-5.14.21-150400.24.128.1
  * SUSE Linux Enterprise Micro 5.4 (aarch64 nosrc s390x x86_64)
    * kernel-default-5.14.21-150400.24.128.1
  * SUSE Linux Enterprise Micro 5.4 (aarch64 x86_64)
    * kernel-default-base-5.14.21-150400.24.128.1.150400.24.62.1
  * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
    * kernel-default-debugsource-5.14.21-150400.24.128.1
    * kernel-default-debuginfo-5.14.21-150400.24.128.1
  * SUSE Linux Enterprise Live Patching 15-SP4 (nosrc)
    * kernel-default-5.14.21-150400.24.128.1
  * SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64)
    * kernel-livepatch-SLE15-SP4_Update_29-debugsource-1-150400.9.3.1
    * kernel-livepatch-5_14_21-150400_24_128-default-1-150400.9.3.1
    * kernel-default-livepatch-devel-5.14.21-150400.24.128.1
    * kernel-livepatch-5_14_21-150400_24_128-default-debuginfo-1-150400.9.3.1
    * kernel-default-livepatch-5.14.21-150400.24.128.1
    * kernel-default-debuginfo-5.14.21-150400.24.128.1
    * kernel-default-debugsource-5.14.21-150400.24.128.1

## References:

  * https://www.suse.com/security/cve/CVE-2021-4439.html
  * https://www.suse.com/security/cve/CVE-2021-47534.html
  * https://www.suse.com/security/cve/CVE-2021-47576.html
  * https://www.suse.com/security/cve/CVE-2021-47578.html
  * https://www.suse.com/security/cve/CVE-2021-47580.html
  * https://www.suse.com/security/cve/CVE-2021-47582.html
  * https://www.suse.com/security/cve/CVE-2021-47583.html
  * https://www.suse.com/security/cve/CVE-2021-47584.html
  * https://www.suse.com/security/cve/CVE-2021-47585.html
  * https://www.suse.com/security/cve/CVE-2021-47586.html
  * https://www.suse.com/security/cve/CVE-2021-47587.html
  * https://www.suse.com/security/cve/CVE-2021-47589.html
  * https://www.suse.com/security/cve/CVE-2021-47592.html
  * https://www.suse.com/security/cve/CVE-2021-47596.html
  * https://www.suse.com/security/cve/CVE-2021-47597.html
  * https://www.suse.com/security/cve/CVE-2021-47598.html
  * https://www.suse.com/security/cve/CVE-2021-47600.html
  * https://www.suse.com/security/cve/CVE-2021-47601.html
  * https://www.suse.com/security/cve/CVE-2021-47602.html
  * https://www.suse.com/security/cve/CVE-2021-47603.html
  * https://www.suse.com/security/cve/CVE-2021-47607.html
  * https://www.suse.com/security/cve/CVE-2021-47608.html
  * https://www.suse.com/security/cve/CVE-2021-47609.html
  * https://www.suse.com/security/cve/CVE-2021-47611.html
  * https://www.suse.com/security/cve/CVE-2021-47612.html
  * https://www.suse.com/security/cve/CVE-2021-47614.html
  * https://www.suse.com/security/cve/CVE-2021-47615.html
  * https://www.suse.com/security/cve/CVE-2021-47616.html
  * https://www.suse.com/security/cve/CVE-2021-47617.html
  * https://www.suse.com/security/cve/CVE-2021-47618.html
  * https://www.suse.com/security/cve/CVE-2021-47619.html
  * https://www.suse.com/security/cve/CVE-2021-47620.html
  * https://www.suse.com/security/cve/CVE-2021-47622.html
  * https://www.suse.com/security/cve/CVE-2021-47624.html
  * https://www.suse.com/security/cve/CVE-2022-0854.html
  * https://www.suse.com/security/cve/CVE-2022-20368.html
  * https://www.suse.com/security/cve/CVE-2022-28748.html
  * https://www.suse.com/security/cve/CVE-2022-2964.html
  * https://www.suse.com/security/cve/CVE-2022-48711.html
  * https://www.suse.com/security/cve/CVE-2022-48712.html
  * https://www.suse.com/security/cve/CVE-2022-48713.html
  * https://www.suse.com/security/cve/CVE-2022-48715.html
  * https://www.suse.com/security/cve/CVE-2022-48717.html
  * https://www.suse.com/security/cve/CVE-2022-48720.html
  * https://www.suse.com/security/cve/CVE-2022-48721.html
  * https://www.suse.com/security/cve/CVE-2022-48722.html
  * https://www.suse.com/security/cve/CVE-2022-48723.html
  * https://www.suse.com/security/cve/CVE-2022-48724.html
  * https://www.suse.com/security/cve/CVE-2022-48725.html
  * https://www.suse.com/security/cve/CVE-2022-48726.html
  * https://www.suse.com/security/cve/CVE-2022-48727.html
  * https://www.suse.com/security/cve/CVE-2022-48728.html
  * https://www.suse.com/security/cve/CVE-2022-48729.html
  * https://www.suse.com/security/cve/CVE-2022-48730.html
  * https://www.suse.com/security/cve/CVE-2022-48732.html
  * https://www.suse.com/security/cve/CVE-2022-48734.html
  * https://www.suse.com/security/cve/CVE-2022-48735.html
  * https://www.suse.com/security/cve/CVE-2022-48736.html
  * https://www.suse.com/security/cve/CVE-2022-48737.html
  * https://www.suse.com/security/cve/CVE-2022-48738.html
  * https://www.suse.com/security/cve/CVE-2022-48739.html
  * https://www.suse.com/security/cve/CVE-2022-48740.html
  * https://www.suse.com/security/cve/CVE-2022-48743.html
  * https://www.suse.com/security/cve/CVE-2022-48744.html
  * https://www.suse.com/security/cve/CVE-2022-48745.html
  * https://www.suse.com/security/cve/CVE-2022-48746.html
  * https://www.suse.com/security/cve/CVE-2022-48747.html
  * https://www.suse.com/security/cve/CVE-2022-48749.html
  * https://www.suse.com/security/cve/CVE-2022-48751.html
  * https://www.suse.com/security/cve/CVE-2022-48752.html
  * https://www.suse.com/security/cve/CVE-2022-48754.html
  * https://www.suse.com/security/cve/CVE-2022-48756.html
  * https://www.suse.com/security/cve/CVE-2022-48758.html
  * https://www.suse.com/security/cve/CVE-2022-48759.html
  * https://www.suse.com/security/cve/CVE-2022-48760.html
  * https://www.suse.com/security/cve/CVE-2022-48761.html
  * https://www.suse.com/security/cve/CVE-2022-48763.html
  * https://www.suse.com/security/cve/CVE-2022-48765.html
  * https://www.suse.com/security/cve/CVE-2022-48767.html
  * https://www.suse.com/security/cve/CVE-2022-48768.html
  * https://www.suse.com/security/cve/CVE-2022-48769.html
  * https://www.suse.com/security/cve/CVE-2022-48771.html
  * https://www.suse.com/security/cve/CVE-2022-48773.html
  * https://www.suse.com/security/cve/CVE-2022-48774.html
  * https://www.suse.com/security/cve/CVE-2022-48775.html
  * https://www.suse.com/security/cve/CVE-2022-48776.html
  * https://www.suse.com/security/cve/CVE-2022-48777.html
  * https://www.suse.com/security/cve/CVE-2022-48778.html
  * https://www.suse.com/security/cve/CVE-2022-48780.html
  * https://www.suse.com/security/cve/CVE-2022-48783.html
  * https://www.suse.com/security/cve/CVE-2022-48784.html
  * https://www.suse.com/security/cve/CVE-2022-48786.html
  * https://www.suse.com/security/cve/CVE-2022-48787.html
  * https://www.suse.com/security/cve/CVE-2022-48788.html
  * https://www.suse.com/security/cve/CVE-2022-48789.html
  * https://www.suse.com/security/cve/CVE-2022-48790.html
  * https://www.suse.com/security/cve/CVE-2022-48791.html
  * https://www.suse.com/security/cve/CVE-2022-48792.html
  * https://www.suse.com/security/cve/CVE-2022-48793.html
  * https://www.suse.com/security/cve/CVE-2022-48794.html
  * https://www.suse.com/security/cve/CVE-2022-48796.html
  * https://www.suse.com/security/cve/CVE-2022-48797.html
  * https://www.suse.com/security/cve/CVE-2022-48798.html
  * https://www.suse.com/security/cve/CVE-2022-48799.html
  * https://www.suse.com/security/cve/CVE-2022-48800.html
  * https://www.suse.com/security/cve/CVE-2022-48801.html
  * https://www.suse.com/security/cve/CVE-2022-48802.html
  * https://www.suse.com/security/cve/CVE-2022-48803.html
  * https://www.suse.com/security/cve/CVE-2022-48804.html
  * https://www.suse.com/security/cve/CVE-2022-48805.html
  * https://www.suse.com/security/cve/CVE-2022-48806.html
  * https://www.suse.com/security/cve/CVE-2022-48807.html
  * https://www.suse.com/security/cve/CVE-2022-48811.html
  * https://www.suse.com/security/cve/CVE-2022-48812.html
  * https://www.suse.com/security/cve/CVE-2022-48813.html
  * https://www.suse.com/security/cve/CVE-2022-48814.html
  * https://www.suse.com/security/cve/CVE-2022-48815.html
  * https://www.suse.com/security/cve/CVE-2022-48816.html
  * https://www.suse.com/security/cve/CVE-2022-48817.html
  * https://www.suse.com/security/cve/CVE-2022-48818.html
  * https://www.suse.com/security/cve/CVE-2022-48820.html
  * https://www.suse.com/security/cve/CVE-2022-48821.html
  * https://www.suse.com/security/cve/CVE-2022-48822.html
  * https://www.suse.com/security/cve/CVE-2022-48823.html
  * https://www.suse.com/security/cve/CVE-2022-48824.html
  * https://www.suse.com/security/cve/CVE-2022-48825.html
  * https://www.suse.com/security/cve/CVE-2022-48826.html
  * https://www.suse.com/security/cve/CVE-2022-48827.html
  * https://www.suse.com/security/cve/CVE-2022-48828.html
  * https://www.suse.com/security/cve/CVE-2022-48829.html
  * https://www.suse.com/security/cve/CVE-2022-48830.html
  * https://www.suse.com/security/cve/CVE-2022-48831.html
  * https://www.suse.com/security/cve/CVE-2022-48834.html
  * https://www.suse.com/security/cve/CVE-2022-48835.html
  * https://www.suse.com/security/cve/CVE-2022-48836.html
  * https://www.suse.com/security/cve/CVE-2022-48837.html
  * https://www.suse.com/security/cve/CVE-2022-48838.html
  * https://www.suse.com/security/cve/CVE-2022-48839.html
  * https://www.suse.com/security/cve/CVE-2022-48840.html
  * https://www.suse.com/security/cve/CVE-2022-48841.html
  * https://www.suse.com/security/cve/CVE-2022-48842.html
  * https://www.suse.com/security/cve/CVE-2022-48843.html
  * https://www.suse.com/security/cve/CVE-2022-48847.html
  * https://www.suse.com/security/cve/CVE-2022-48849.html
  * https://www.suse.com/security/cve/CVE-2022-48851.html
  * https://www.suse.com/security/cve/CVE-2022-48853.html
  * https://www.suse.com/security/cve/CVE-2022-48856.html
  * https://www.suse.com/security/cve/CVE-2022-48857.html
  * https://www.suse.com/security/cve/CVE-2022-48858.html
  * https://www.suse.com/security/cve/CVE-2022-48859.html
  * https://www.suse.com/security/cve/CVE-2022-48860.html
  * https://www.suse.com/security/cve/CVE-2022-48861.html
  * https://www.suse.com/security/cve/CVE-2022-48862.html
  * https://www.suse.com/security/cve/CVE-2022-48863.html
  * https://www.suse.com/security/cve/CVE-2022-48866.html
  * https://www.suse.com/security/cve/CVE-2023-1582.html
  * https://www.suse.com/security/cve/CVE-2023-37453.html
  * https://www.suse.com/security/cve/CVE-2023-52591.html
  * https://www.suse.com/security/cve/CVE-2023-52762.html
  * https://www.suse.com/security/cve/CVE-2023-52766.html
  * https://www.suse.com/security/cve/CVE-2023-52800.html
  * https://www.suse.com/security/cve/CVE-2023-52885.html
  * https://www.suse.com/security/cve/CVE-2023-52886.html
  * https://www.suse.com/security/cve/CVE-2024-26583.html
  * https://www.suse.com/security/cve/CVE-2024-26584.html
  * https://www.suse.com/security/cve/CVE-2024-26585.html
  * https://www.suse.com/security/cve/CVE-2024-26800.html
  * https://www.suse.com/security/cve/CVE-2024-26813.html
  * https://www.suse.com/security/cve/CVE-2024-26814.html
  * https://www.suse.com/security/cve/CVE-2024-26976.html
  * https://www.suse.com/security/cve/CVE-2024-35878.html
  * https://www.suse.com/security/cve/CVE-2024-35901.html
  * https://www.suse.com/security/cve/CVE-2024-35905.html
  * https://www.suse.com/security/cve/CVE-2024-36926.html
  * https://www.suse.com/security/cve/CVE-2024-36974.html
  * https://www.suse.com/security/cve/CVE-2024-38541.html
  * https://www.suse.com/security/cve/CVE-2024-38555.html
  * https://www.suse.com/security/cve/CVE-2024-38559.html
  * https://www.suse.com/security/cve/CVE-2024-39463.html
  * https://www.suse.com/security/cve/CVE-2024-39494.html
  * https://www.suse.com/security/cve/CVE-2024-40902.html
  * https://www.suse.com/security/cve/CVE-2024-40937.html
  * https://www.suse.com/security/cve/CVE-2024-40954.html
  * https://www.suse.com/security/cve/CVE-2024-40956.html
  * https://www.suse.com/security/cve/CVE-2024-40989.html
  * https://www.suse.com/security/cve/CVE-2024-40994.html
  * https://www.suse.com/security/cve/CVE-2024-41011.html
  * https://www.suse.com/security/cve/CVE-2024-41012.html
  * https://www.suse.com/security/cve/CVE-2024-41059.html
  * https://www.suse.com/security/cve/CVE-2024-41069.html
  * https://www.suse.com/security/cve/CVE-2024-41090.html
  * https://www.suse.com/security/cve/CVE-2024-42093.html
  * https://www.suse.com/security/cve/CVE-2024-42145.html
  * https://www.suse.com/security/cve/CVE-2024-42230.html
  * https://bugzilla.suse.com/show_bug.cgi?id=1156395
  * https://bugzilla.suse.com/show_bug.cgi?id=1190336
  * https://bugzilla.suse.com/show_bug.cgi?id=1191958
  * https://bugzilla.suse.com/show_bug.cgi?id=1193454
  * https://bugzilla.suse.com/show_bug.cgi?id=1193554
  * https://bugzilla.suse.com/show_bug.cgi?id=1193787
  * https://bugzilla.suse.com/show_bug.cgi?id=1193883
  * https://bugzilla.suse.com/show_bug.cgi?id=1194324
  * https://bugzilla.suse.com/show_bug.cgi?id=1194826
  * https://bugzilla.suse.com/show_bug.cgi?id=1194869
  * https://bugzilla.suse.com/show_bug.cgi?id=1195065
  * https://bugzilla.suse.com/show_bug.cgi?id=1195254
  * https://bugzilla.suse.com/show_bug.cgi?id=1195341
  * https://bugzilla.suse.com/show_bug.cgi?id=1195349
  * https://bugzilla.suse.com/show_bug.cgi?id=1195357
  * https://bugzilla.suse.com/show_bug.cgi?id=1195668
  * https://bugzilla.suse.com/show_bug.cgi?id=1195927
  * https://bugzilla.suse.com/show_bug.cgi?id=1195957
  * https://bugzilla.suse.com/show_bug.cgi?id=1196018
  * https://bugzilla.suse.com/show_bug.cgi?id=1196746
  * https://bugzilla.suse.com/show_bug.cgi?id=1196823
  * https://bugzilla.suse.com/show_bug.cgi?id=1197146
  * https://bugzilla.suse.com/show_bug.cgi?id=1197246
  * https://bugzilla.suse.com/show_bug.cgi?id=1197762
  * https://bugzilla.suse.com/show_bug.cgi?id=1197915
  * https://bugzilla.suse.com/show_bug.cgi?id=1198014
  * https://bugzilla.suse.com/show_bug.cgi?id=1199295
  * https://bugzilla.suse.com/show_bug.cgi?id=1202346
  * https://bugzilla.suse.com/show_bug.cgi?id=1202686
  * https://bugzilla.suse.com/show_bug.cgi?id=1202767
  * https://bugzilla.suse.com/show_bug.cgi?id=1202780
  * https://bugzilla.suse.com/show_bug.cgi?id=1209636
  * https://bugzilla.suse.com/show_bug.cgi?id=1213123
  * https://bugzilla.suse.com/show_bug.cgi?id=1215587
  * https://bugzilla.suse.com/show_bug.cgi?id=1216834
  * https://bugzilla.suse.com/show_bug.cgi?id=1218820
  * https://bugzilla.suse.com/show_bug.cgi?id=1220185
  * https://bugzilla.suse.com/show_bug.cgi?id=1220186
  * https://bugzilla.suse.com/show_bug.cgi?id=1220187
  * https://bugzilla.suse.com/show_bug.cgi?id=1221044
  * https://bugzilla.suse.com/show_bug.cgi?id=1222011
  * https://bugzilla.suse.com/show_bug.cgi?id=1222728
  * https://bugzilla.suse.com/show_bug.cgi?id=1222809
  * https://bugzilla.suse.com/show_bug.cgi?id=1222810
  * https://bugzilla.suse.com/show_bug.cgi?id=1223635
  * https://bugzilla.suse.com/show_bug.cgi?id=1223863
  * https://bugzilla.suse.com/show_bug.cgi?id=1224488
  * https://bugzilla.suse.com/show_bug.cgi?id=1224495
  * https://bugzilla.suse.com/show_bug.cgi?id=1224671
  * https://bugzilla.suse.com/show_bug.cgi?id=1225573
  * https://bugzilla.suse.com/show_bug.cgi?id=1225829
  * https://bugzilla.suse.com/show_bug.cgi?id=1226168
  * https://bugzilla.suse.com/show_bug.cgi?id=1226226
  * https://bugzilla.suse.com/show_bug.cgi?id=1226519
  * https://bugzilla.suse.com/show_bug.cgi?id=1226537
  * https://bugzilla.suse.com/show_bug.cgi?id=1226539
  * https://bugzilla.suse.com/show_bug.cgi?id=1226550
  * https://bugzilla.suse.com/show_bug.cgi?id=1226553
  * https://bugzilla.suse.com/show_bug.cgi?id=1226554
  * https://bugzilla.suse.com/show_bug.cgi?id=1226556
  * https://bugzilla.suse.com/show_bug.cgi?id=1226557
  * https://bugzilla.suse.com/show_bug.cgi?id=1226558
  * https://bugzilla.suse.com/show_bug.cgi?id=1226559
  * https://bugzilla.suse.com/show_bug.cgi?id=1226561
  * https://bugzilla.suse.com/show_bug.cgi?id=1226562
  * https://bugzilla.suse.com/show_bug.cgi?id=1226563
  * https://bugzilla.suse.com/show_bug.cgi?id=1226564
  * https://bugzilla.suse.com/show_bug.cgi?id=1226567
  * https://bugzilla.suse.com/show_bug.cgi?id=1226569
  * https://bugzilla.suse.com/show_bug.cgi?id=1226572
  * https://bugzilla.suse.com/show_bug.cgi?id=1226574
  * https://bugzilla.suse.com/show_bug.cgi?id=1226575
  * https://bugzilla.suse.com/show_bug.cgi?id=1226576
  * https://bugzilla.suse.com/show_bug.cgi?id=1226577
  * https://bugzilla.suse.com/show_bug.cgi?id=1226580
  * https://bugzilla.suse.com/show_bug.cgi?id=1226583
  * https://bugzilla.suse.com/show_bug.cgi?id=1226585
  * https://bugzilla.suse.com/show_bug.cgi?id=1226587
  * https://bugzilla.suse.com/show_bug.cgi?id=1226601
  * https://bugzilla.suse.com/show_bug.cgi?id=1226602
  * https://bugzilla.suse.com/show_bug.cgi?id=1226603
  * https://bugzilla.suse.com/show_bug.cgi?id=1226607
  * https://bugzilla.suse.com/show_bug.cgi?id=1226614
  * https://bugzilla.suse.com/show_bug.cgi?id=1226617
  * https://bugzilla.suse.com/show_bug.cgi?id=1226618
  * https://bugzilla.suse.com/show_bug.cgi?id=1226619
  * https://bugzilla.suse.com/show_bug.cgi?id=1226621
  * https://bugzilla.suse.com/show_bug.cgi?id=1226624
  * https://bugzilla.suse.com/show_bug.cgi?id=1226626
  * https://bugzilla.suse.com/show_bug.cgi?id=1226628
  * https://bugzilla.suse.com/show_bug.cgi?id=1226629
  * https://bugzilla.suse.com/show_bug.cgi?id=1226643
  * https://bugzilla.suse.com/show_bug.cgi?id=1226644
  * https://bugzilla.suse.com/show_bug.cgi?id=1226645
  * https://bugzilla.suse.com/show_bug.cgi?id=1226650
  * https://bugzilla.suse.com/show_bug.cgi?id=1226653
  * https://bugzilla.suse.com/show_bug.cgi?id=1226662
  * https://bugzilla.suse.com/show_bug.cgi?id=1226669
  * https://bugzilla.suse.com/show_bug.cgi?id=1226670
  * https://bugzilla.suse.com/show_bug.cgi?id=1226672
  * https://bugzilla.suse.com/show_bug.cgi?id=1226673
  * https://bugzilla.suse.com/show_bug.cgi?id=1226674
  * https://bugzilla.suse.com/show_bug.cgi?id=1226675
  * https://bugzilla.suse.com/show_bug.cgi?id=1226679
  * https://bugzilla.suse.com/show_bug.cgi?id=1226683
  * https://bugzilla.suse.com/show_bug.cgi?id=1226685
  * https://bugzilla.suse.com/show_bug.cgi?id=1226686
  * https://bugzilla.suse.com/show_bug.cgi?id=1226690
  * https://bugzilla.suse.com/show_bug.cgi?id=1226691
  * https://bugzilla.suse.com/show_bug.cgi?id=1226692
  * https://bugzilla.suse.com/show_bug.cgi?id=1226696
  * https://bugzilla.suse.com/show_bug.cgi?id=1226697
  * https://bugzilla.suse.com/show_bug.cgi?id=1226698
  * https://bugzilla.suse.com/show_bug.cgi?id=1226699
  * https://bugzilla.suse.com/show_bug.cgi?id=1226701
  * https://bugzilla.suse.com/show_bug.cgi?id=1226702
  * https://bugzilla.suse.com/show_bug.cgi?id=1226703
  * https://bugzilla.suse.com/show_bug.cgi?id=1226705
  * https://bugzilla.suse.com/show_bug.cgi?id=1226708
  * https://bugzilla.suse.com/show_bug.cgi?id=1226709
  * https://bugzilla.suse.com/show_bug.cgi?id=1226710
  * https://bugzilla.suse.com/show_bug.cgi?id=1226711
  * https://bugzilla.suse.com/show_bug.cgi?id=1226712
  * https://bugzilla.suse.com/show_bug.cgi?id=1226713
  * https://bugzilla.suse.com/show_bug.cgi?id=1226715
  * https://bugzilla.suse.com/show_bug.cgi?id=1226716
  * https://bugzilla.suse.com/show_bug.cgi?id=1226719
  * https://bugzilla.suse.com/show_bug.cgi?id=1226720
  * https://bugzilla.suse.com/show_bug.cgi?id=1226721
  * https://bugzilla.suse.com/show_bug.cgi?id=1226732
  * https://bugzilla.suse.com/show_bug.cgi?id=1226758
  * https://bugzilla.suse.com/show_bug.cgi?id=1226762
  * https://bugzilla.suse.com/show_bug.cgi?id=1226785
  * https://bugzilla.suse.com/show_bug.cgi?id=1227090
  * https://bugzilla.suse.com/show_bug.cgi?id=1227383
  * https://bugzilla.suse.com/show_bug.cgi?id=1227487
  * https://bugzilla.suse.com/show_bug.cgi?id=1227549
  * https://bugzilla.suse.com/show_bug.cgi?id=1227716
  * https://bugzilla.suse.com/show_bug.cgi?id=1227750
  * https://bugzilla.suse.com/show_bug.cgi?id=1227764
  * https://bugzilla.suse.com/show_bug.cgi?id=1227808
  * https://bugzilla.suse.com/show_bug.cgi?id=1227810
  * https://bugzilla.suse.com/show_bug.cgi?id=1227823
  * https://bugzilla.suse.com/show_bug.cgi?id=1227829
  * https://bugzilla.suse.com/show_bug.cgi?id=1227836
  * https://bugzilla.suse.com/show_bug.cgi?id=1227917
  * https://bugzilla.suse.com/show_bug.cgi?id=1227920
  * https://bugzilla.suse.com/show_bug.cgi?id=1227921
  * https://bugzilla.suse.com/show_bug.cgi?id=1227922
  * https://bugzilla.suse.com/show_bug.cgi?id=1227923
  * https://bugzilla.suse.com/show_bug.cgi?id=1227924
  * https://bugzilla.suse.com/show_bug.cgi?id=1227925
  * https://bugzilla.suse.com/show_bug.cgi?id=1227928
  * https://bugzilla.suse.com/show_bug.cgi?id=1227931
  * https://bugzilla.suse.com/show_bug.cgi?id=1227932
  * https://bugzilla.suse.com/show_bug.cgi?id=1227933
  * https://bugzilla.suse.com/show_bug.cgi?id=1227935
  * https://bugzilla.suse.com/show_bug.cgi?id=1227938
  * https://bugzilla.suse.com/show_bug.cgi?id=1227941
  * https://bugzilla.suse.com/show_bug.cgi?id=1227942
  * https://bugzilla.suse.com/show_bug.cgi?id=1227944
  * https://bugzilla.suse.com/show_bug.cgi?id=1227945
  * https://bugzilla.suse.com/show_bug.cgi?id=1227948
  * https://bugzilla.suse.com/show_bug.cgi?id=1227949
  * https://bugzilla.suse.com/show_bug.cgi?id=1227952
  * https://bugzilla.suse.com/show_bug.cgi?id=1227953
  * https://bugzilla.suse.com/show_bug.cgi?id=1227954
  * https://bugzilla.suse.com/show_bug.cgi?id=1227956
  * https://bugzilla.suse.com/show_bug.cgi?id=1227963
  * https://bugzilla.suse.com/show_bug.cgi?id=1227964
  * https://bugzilla.suse.com/show_bug.cgi?id=1227965
  * https://bugzilla.suse.com/show_bug.cgi?id=1227968
  * https://bugzilla.suse.com/show_bug.cgi?id=1227969
  * https://bugzilla.suse.com/show_bug.cgi?id=1227970
  * https://bugzilla.suse.com/show_bug.cgi?id=1227971
  * https://bugzilla.suse.com/show_bug.cgi?id=1227972
  * https://bugzilla.suse.com/show_bug.cgi?id=1227975
  * https://bugzilla.suse.com/show_bug.cgi?id=1227976
  * https://bugzilla.suse.com/show_bug.cgi?id=1227981
  * https://bugzilla.suse.com/show_bug.cgi?id=1227982
  * https://bugzilla.suse.com/show_bug.cgi?id=1227985
  * https://bugzilla.suse.com/show_bug.cgi?id=1227986
  * https://bugzilla.suse.com/show_bug.cgi?id=1227987
  * https://bugzilla.suse.com/show_bug.cgi?id=1227988
  * https://bugzilla.suse.com/show_bug.cgi?id=1227989
  * https://bugzilla.suse.com/show_bug.cgi?id=1227990
  * https://bugzilla.suse.com/show_bug.cgi?id=1227991
  * https://bugzilla.suse.com/show_bug.cgi?id=1227993
  * https://bugzilla.suse.com/show_bug.cgi?id=1227995
  * https://bugzilla.suse.com/show_bug.cgi?id=1227996
  * https://bugzilla.suse.com/show_bug.cgi?id=1227997
  * https://bugzilla.suse.com/show_bug.cgi?id=1228000
  * https://bugzilla.suse.com/show_bug.cgi?id=1228002
  * https://bugzilla.suse.com/show_bug.cgi?id=1228004
  * https://bugzilla.suse.com/show_bug.cgi?id=1228005
  * https://bugzilla.suse.com/show_bug.cgi?id=1228006
  * https://bugzilla.suse.com/show_bug.cgi?id=1228007
  * https://bugzilla.suse.com/show_bug.cgi?id=1228008
  * https://bugzilla.suse.com/show_bug.cgi?id=1228009
  * https://bugzilla.suse.com/show_bug.cgi?id=1228010
  * https://bugzilla.suse.com/show_bug.cgi?id=1228013
  * https://bugzilla.suse.com/show_bug.cgi?id=1228014
  * https://bugzilla.suse.com/show_bug.cgi?id=1228015
  * https://bugzilla.suse.com/show_bug.cgi?id=1228019
  * https://bugzilla.suse.com/show_bug.cgi?id=1228025
  * https://bugzilla.suse.com/show_bug.cgi?id=1228028
  * https://bugzilla.suse.com/show_bug.cgi?id=1228035
  * https://bugzilla.suse.com/show_bug.cgi?id=1228037
  * https://bugzilla.suse.com/show_bug.cgi?id=1228038
  * https://bugzilla.suse.com/show_bug.cgi?id=1228039
  * https://bugzilla.suse.com/show_bug.cgi?id=1228040
  * https://bugzilla.suse.com/show_bug.cgi?id=1228045
  * https://bugzilla.suse.com/show_bug.cgi?id=1228054
  * https://bugzilla.suse.com/show_bug.cgi?id=1228055
  * https://bugzilla.suse.com/show_bug.cgi?id=1228056
  * https://bugzilla.suse.com/show_bug.cgi?id=1228060
  * https://bugzilla.suse.com/show_bug.cgi?id=1228061
  * https://bugzilla.suse.com/show_bug.cgi?id=1228062
  * https://bugzilla.suse.com/show_bug.cgi?id=1228063
  * https://bugzilla.suse.com/show_bug.cgi?id=1228064
  * https://bugzilla.suse.com/show_bug.cgi?id=1228066
  * https://bugzilla.suse.com/show_bug.cgi?id=1228114
  * https://bugzilla.suse.com/show_bug.cgi?id=1228247
  * https://bugzilla.suse.com/show_bug.cgi?id=1228328
  * https://bugzilla.suse.com/show_bug.cgi?id=1228440
  * https://bugzilla.suse.com/show_bug.cgi?id=1228561
  * https://bugzilla.suse.com/show_bug.cgi?id=1228644
  * https://bugzilla.suse.com/show_bug.cgi?id=1228680
  * https://bugzilla.suse.com/show_bug.cgi?id=1228743
  * https://bugzilla.suse.com/show_bug.cgi?id=1228801

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.suse.com/pipermail/sle-updates/attachments/20240815/a835e063/attachment.htm>


More information about the sle-updates mailing list