SUSE-SU-2024:2184-1: important: Security update for the Linux Kernel

SLE-UPDATES null at suse.de
Mon Jun 24 20:31:15 UTC 2024



# Security update for the Linux Kernel

Announcement ID: SUSE-SU-2024:2184-1  
Rating: important  
References:

  * bsc#1065729
  * bsc#1101816
  * bsc#1141539
  * bsc#1181674
  * bsc#1185902
  * bsc#1187716
  * bsc#1188616
  * bsc#1190317
  * bsc#1190795
  * bsc#1191452
  * bsc#1194591
  * bsc#1197760
  * bsc#1197894
  * bsc#1203935
  * bsc#1206213
  * bsc#1206646
  * bsc#1207186
  * bsc#1209657
  * bsc#1210335
  * bsc#1215702
  * bsc#1216702
  * bsc#1217169
  * bsc#1217519
  * bsc#1218917
  * bsc#1220487
  * bsc#1220513
  * bsc#1220854
  * bsc#1220928
  * bsc#1221044
  * bsc#1221081
  * bsc#1221086
  * bsc#1221543
  * bsc#1221545
  * bsc#1221816
  * bsc#1221977
  * bsc#1221994
  * bsc#1222559
  * bsc#1222619
  * bsc#1222627
  * bsc#1222667
  * bsc#1222671
  * bsc#1222793
  * bsc#1222893
  * bsc#1222894
  * bsc#1223023
  * bsc#1223046
  * bsc#1223048
  * bsc#1223062
  * bsc#1223084
  * bsc#1223119
  * bsc#1223138
  * bsc#1223207
  * bsc#1223360
  * bsc#1223384
  * bsc#1223432
  * bsc#1223509
  * bsc#1223512
  * bsc#1223539
  * bsc#1223540
  * bsc#1223626
  * bsc#1223627
  * bsc#1223633
  * bsc#1223653
  * bsc#1223666
  * bsc#1223671
  * bsc#1223712
  * bsc#1223715
  * bsc#1223738
  * bsc#1223744
  * bsc#1223752
  * bsc#1223802
  * bsc#1223819
  * bsc#1223834
  * bsc#1223922
  * bsc#1223923
  * bsc#1223931
  * bsc#1223932
  * bsc#1223948
  * bsc#1223969
  * bsc#1224096
  * bsc#1224174
  * bsc#1224181
  * bsc#1224347
  * bsc#1224482
  * bsc#1224511
  * bsc#1224525
  * bsc#1224566
  * bsc#1224580
  * bsc#1224592
  * bsc#1224601
  * bsc#1224607
  * bsc#1224621
  * bsc#1224644
  * bsc#1224645
  * bsc#1224648
  * bsc#1224650
  * bsc#1224663
  * bsc#1224671
  * bsc#1224676
  * bsc#1224680
  * bsc#1224682
  * bsc#1224725
  * bsc#1224728
  * bsc#1224733
  * bsc#1224738
  * bsc#1224747
  * bsc#1224749
  * bsc#1224759
  * bsc#1224803
  * bsc#1224827
  * bsc#1224830
  * bsc#1224831
  * bsc#1224834
  * bsc#1224838
  * bsc#1224841
  * bsc#1224844
  * bsc#1224846
  * bsc#1224847
  * bsc#1224849
  * bsc#1224854
  * bsc#1224859
  * bsc#1224867
  * bsc#1224880
  * bsc#1224882
  * bsc#1224888
  * bsc#1224889
  * bsc#1224892
  * bsc#1224893
  * bsc#1224899
  * bsc#1224904
  * bsc#1224907
  * bsc#1224916
  * bsc#1224917
  * bsc#1224922
  * bsc#1224926
  * bsc#1224930
  * bsc#1224931
  * bsc#1224942
  * bsc#1224954
  * bsc#1224956
  * bsc#1224957
  * bsc#1224959
  * bsc#1224960
  * bsc#1224961
  * bsc#1224963
  * bsc#1224966
  * bsc#1224968
  * bsc#1224981
  * bsc#1224982
  * bsc#1224983
  * bsc#1224987
  * bsc#1224990
  * bsc#1224996
  * bsc#1225008
  * bsc#1225009
  * bsc#1225010
  * bsc#1225022
  * bsc#1225026
  * bsc#1225030
  * bsc#1225054
  * bsc#1225058
  * bsc#1225059
  * bsc#1225060
  * bsc#1225062
  * bsc#1225082
  * bsc#1225084
  * bsc#1225086
  * bsc#1225092
  * bsc#1225096
  * bsc#1225112
  * bsc#1225124
  * bsc#1225128
  * bsc#1225132
  * bsc#1225141
  * bsc#1225143
  * bsc#1225144
  * bsc#1225151
  * bsc#1225153
  * bsc#1225155
  * bsc#1225157
  * bsc#1225164
  * bsc#1225177
  * bsc#1225189
  * bsc#1225192
  * bsc#1225193
  * bsc#1225198
  * bsc#1225201
  * bsc#1225207
  * bsc#1225208
  * bsc#1225222
  * bsc#1225230
  * bsc#1225242
  * bsc#1225244
  * bsc#1225247
  * bsc#1225251
  * bsc#1225252
  * bsc#1225256
  * bsc#1225303
  * bsc#1225318
  * bsc#1225322
  * bsc#1225329
  * bsc#1225330
  * bsc#1225336
  * bsc#1225347
  * bsc#1225351
  * bsc#1225354
  * bsc#1225355
  * bsc#1225360
  * bsc#1225366
  * bsc#1225367
  * bsc#1225384
  * bsc#1225390
  * bsc#1225404
  * bsc#1225409
  * bsc#1225411
  * bsc#1225438
  * bsc#1225453
  * bsc#1225479
  * bsc#1225482
  * bsc#1225506
  * bsc#1225549
  * bsc#1225560
  * bsc#1225572
  * bsc#1225640
  * bsc#1225708
  * bsc#1225764

  
Cross-References:

  * CVE-2021-46933
  * CVE-2021-46955
  * CVE-2021-47074
  * CVE-2021-47113
  * CVE-2021-47131
  * CVE-2021-47162
  * CVE-2021-47171
  * CVE-2021-47188
  * CVE-2021-47206
  * CVE-2021-47220
  * CVE-2021-47229
  * CVE-2021-47231
  * CVE-2021-47235
  * CVE-2021-47236
  * CVE-2021-47237
  * CVE-2021-47238
  * CVE-2021-47239
  * CVE-2021-47245
  * CVE-2021-47246
  * CVE-2021-47248
  * CVE-2021-47249
  * CVE-2021-47250
  * CVE-2021-47252
  * CVE-2021-47254
  * CVE-2021-47258
  * CVE-2021-47260
  * CVE-2021-47261
  * CVE-2021-47265
  * CVE-2021-47269
  * CVE-2021-47274
  * CVE-2021-47276
  * CVE-2021-47277
  * CVE-2021-47280
  * CVE-2021-47281
  * CVE-2021-47284
  * CVE-2021-47285
  * CVE-2021-47288
  * CVE-2021-47301
  * CVE-2021-47302
  * CVE-2021-47305
  * CVE-2021-47307
  * CVE-2021-47308
  * CVE-2021-47310
  * CVE-2021-47311
  * CVE-2021-47314
  * CVE-2021-47315
  * CVE-2021-47319
  * CVE-2021-47320
  * CVE-2021-47321
  * CVE-2021-47323
  * CVE-2021-47324
  * CVE-2021-47330
  * CVE-2021-47334
  * CVE-2021-47337
  * CVE-2021-47343
  * CVE-2021-47344
  * CVE-2021-47345
  * CVE-2021-47347
  * CVE-2021-47352
  * CVE-2021-47353
  * CVE-2021-47355
  * CVE-2021-47356
  * CVE-2021-47357
  * CVE-2021-47361
  * CVE-2021-47362
  * CVE-2021-47369
  * CVE-2021-47375
  * CVE-2021-47378
  * CVE-2021-47382
  * CVE-2021-47383
  * CVE-2021-47391
  * CVE-2021-47397
  * CVE-2021-47400
  * CVE-2021-47401
  * CVE-2021-47404
  * CVE-2021-47409
  * CVE-2021-47416
  * CVE-2021-47423
  * CVE-2021-47424
  * CVE-2021-47431
  * CVE-2021-47435
  * CVE-2021-47436
  * CVE-2021-47456
  * CVE-2021-47458
  * CVE-2021-47460
  * CVE-2021-47469
  * CVE-2021-47472
  * CVE-2021-47473
  * CVE-2021-47478
  * CVE-2021-47480
  * CVE-2021-47483
  * CVE-2021-47485
  * CVE-2021-47495
  * CVE-2021-47496
  * CVE-2021-47497
  * CVE-2021-47500
  * CVE-2021-47506
  * CVE-2021-47509
  * CVE-2021-47511
  * CVE-2021-47523
  * CVE-2021-47541
  * CVE-2021-47548
  * CVE-2021-47565
  * CVE-2022-48636
  * CVE-2022-48650
  * CVE-2022-48672
  * CVE-2022-48686
  * CVE-2022-48697
  * CVE-2022-48702
  * CVE-2022-48704
  * CVE-2022-48708
  * CVE-2022-48710
  * CVE-2023-0160
  * CVE-2023-1829
  * CVE-2023-42755
  * CVE-2023-47233
  * CVE-2023-52527
  * CVE-2023-52586
  * CVE-2023-52591
  * CVE-2023-52646
  * CVE-2023-52653
  * CVE-2023-52655
  * CVE-2023-52664
  * CVE-2023-52685
  * CVE-2023-52686
  * CVE-2023-52691
  * CVE-2023-52696
  * CVE-2023-52698
  * CVE-2023-52703
  * CVE-2023-52730
  * CVE-2023-52732
  * CVE-2023-52741
  * CVE-2023-52742
  * CVE-2023-52747
  * CVE-2023-52759
  * CVE-2023-52774
  * CVE-2023-52781
  * CVE-2023-52796
  * CVE-2023-52803
  * CVE-2023-52821
  * CVE-2023-52864
  * CVE-2023-52865
  * CVE-2023-52867
  * CVE-2023-52875
  * CVE-2023-52880
  * CVE-2024-0639
  * CVE-2024-26625
  * CVE-2024-26739
  * CVE-2024-26752
  * CVE-2024-26775
  * CVE-2024-26791
  * CVE-2024-26828
  * CVE-2024-26846
  * CVE-2024-26874
  * CVE-2024-26876
  * CVE-2024-26900
  * CVE-2024-26915
  * CVE-2024-26920
  * CVE-2024-26921
  * CVE-2024-26929
  * CVE-2024-26930
  * CVE-2024-26931
  * CVE-2024-26934
  * CVE-2024-26957
  * CVE-2024-26958
  * CVE-2024-26984
  * CVE-2024-26996
  * CVE-2024-27008
  * CVE-2024-27054
  * CVE-2024-27059
  * CVE-2024-27062
  * CVE-2024-27388
  * CVE-2024-27396
  * CVE-2024-27398
  * CVE-2024-27401
  * CVE-2024-27419
  * CVE-2024-27436
  * CVE-2024-35789
  * CVE-2024-35791
  * CVE-2024-35809
  * CVE-2024-35811
  * CVE-2024-35830
  * CVE-2024-35849
  * CVE-2024-35877
  * CVE-2024-35878
  * CVE-2024-35887
  * CVE-2024-35895
  * CVE-2024-35914
  * CVE-2024-35932
  * CVE-2024-35935
  * CVE-2024-35936
  * CVE-2024-35944
  * CVE-2024-35955
  * CVE-2024-35969
  * CVE-2024-35982
  * CVE-2024-36015
  * CVE-2024-36029
  * CVE-2024-36954

  
CVSS scores:

  * CVE-2021-46933 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
  * CVE-2021-46933 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-46955 ( SUSE ):  7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
  * CVE-2021-47074 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2021-47113 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47131 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2021-47162 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47171 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47171 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47188 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47206 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47220 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47229 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47231 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47235 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47236 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47237 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2021-47238 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47239 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47245 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47246 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2021-47248 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47249 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2021-47250 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2021-47252 ( SUSE ):  0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
  * CVE-2021-47254 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2021-47258 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2021-47260 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47261 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2021-47265 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47269 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47274 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47276 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47277 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47280 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47281 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47284 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47285 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47288 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
  * CVE-2021-47301 ( SUSE ):  6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2021-47302 ( SUSE ):  6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2021-47305 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47307 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47308 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47310 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47311 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2021-47314 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2021-47315 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2021-47319 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
  * CVE-2021-47320 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
  * CVE-2021-47321 ( SUSE ):  6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2021-47323 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2021-47324 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2021-47330 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2021-47334 ( SUSE ):  6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2021-47337 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47343 ( SUSE ):  5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
  * CVE-2021-47344 ( SUSE ):  4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47345 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2021-47347 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2021-47352 ( SUSE ):  6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
  * CVE-2021-47353 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47355 ( SUSE ):  6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2021-47356 ( SUSE ):  5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2021-47357 ( SUSE ):  6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2021-47361 ( SUSE ):  5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2021-47362 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47369 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2021-47375 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2021-47378 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2021-47382 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47383 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2021-47391 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2021-47397 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47400 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47401 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47404 ( SUSE ):  6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H
  * CVE-2021-47409 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47416 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2021-47423 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2021-47424 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47431 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2021-47435 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47456 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47458 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47469 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47472 ( SUSE ):  2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2021-47473 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2021-47478 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
  * CVE-2021-47480 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47483 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2021-47485 ( SUSE ):  6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2021-47495 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2021-47496 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2021-47497 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2021-47500 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2021-47506 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2021-47509 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47511 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2021-47523 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2021-47541 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2021-47541 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2021-47548 ( SUSE ):  6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L
  * CVE-2021-47565 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48636 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48650 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48672 ( SUSE ):  5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
  * CVE-2022-48672 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-48686 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-48686 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-48697 ( SUSE ):  6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
  * CVE-2022-48702 ( SUSE ):  5.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
  * CVE-2022-48704 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48708 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48710 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-0160 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-0160 ( NVD ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-1829 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-1829 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-42755 ( SUSE ):  6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
  * CVE-2023-42755 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-47233 ( SUSE ):  4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-47233 ( NVD ):  4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52527 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52586 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52591 ( SUSE ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2023-52646 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52653 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2023-52664 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52685 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52686 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52691 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52696 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52698 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52703 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
  * CVE-2023-52730 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52732 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52741 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52742 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52747 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52759 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52774 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52781 ( SUSE ):  4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
  * CVE-2023-52796 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52803 ( SUSE ):  6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-52821 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52821 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52864 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52865 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52867 ( SUSE ):  5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H
  * CVE-2023-52875 ( SUSE ):  4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52880 ( SUSE ):  8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-0639 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-0639 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26625 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26739 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26752 ( SUSE ):  7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
  * CVE-2024-26775 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26791 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26828 ( SUSE ):  7.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H
  * CVE-2024-26846 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26874 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26876 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26900 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26900 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26915 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26921 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-26929 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-26929 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-26930 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-26930 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-26931 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26934 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26934 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-26957 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26958 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26984 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26996 ( SUSE ):  6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-27008 ( SUSE ):  5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
  * CVE-2024-27054 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-27059 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-27062 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-27388 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-27396 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-27398 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-27401 ( SUSE ):  6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2024-27419 ( SUSE ):  2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N
  * CVE-2024-27436 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35789 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-35791 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35809 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35811 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35830 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35849 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
  * CVE-2024-35877 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35878 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35887 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35895 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35914 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35932 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35935 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35936 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35944 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L
  * CVE-2024-35955 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35969 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35982 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35982 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36015 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36029 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36954 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H

  
Affected Products:

  * SUSE Linux Enterprise High Availability Extension 12 SP5
  * SUSE Linux Enterprise High Performance Computing 12 SP5
  * SUSE Linux Enterprise Live Patching 12-SP5
  * SUSE Linux Enterprise Server 12 SP5
  * SUSE Linux Enterprise Server for SAP Applications 12 SP5
  * SUSE Linux Enterprise Software Development Kit 12 SP5
  * SUSE Linux Enterprise Workstation Extension 12 12-SP5

  
  
An update that solves 198 vulnerabilities and has 28 security fixes can now be
installed.

## Description:

The SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security
bugfixes.

The following security bugs were fixed:

  * CVE-2021-46933: Fixed possible underflow in ffs_data_clear() (bsc#1220487).
  * CVE-2021-46955: Fixed an out-of-bounds read with openvswitch, when
    fragmenting IPv4 packets (bsc#1220513).
  * CVE-2021-47074: Fixed memory leak in nvme_loop_create_ctrl() (bsc#1220854).
  * CVE-2021-47113: Abort btrfs rename_exchange if we fail to insert the second
    ref (bsc#1221543).
  * CVE-2021-47131: Fixed a use-after-free after the TLS device goes down and up
    (bsc#1221545).
  * CVE-2021-47206: Check return value after calling platform_get_resource()
    (bsc#1222894).
  * CVE-2021-47238: Fixed memory leak in ip_mc_add1_src (bsc#1224847)
  * CVE-2021-47245: Fixed out of bounds when parsing TCP options (bsc#1224838)
  * CVE-2021-47246: Fixed page reclaim for dead peer hairpin (CVE-2021-47246
    bsc#1224831).
  * CVE-2021-47249: Fixed memory leak in rds_recvmsg (bsc#1224880)
  * CVE-2021-47250: Fixed memory leak in netlbl_cipsov4_add_std (bsc#1224827)
  * CVE-2021-47265: Verify port when creating flow rule (bsc#1224957)
  * CVE-2021-47277: Avoid speculation-based attacks from out-of-range memslot
    accesses (bsc#1224960).
  * CVE-2021-47281: Fixed race of snd_seq_timer_open() (bsc#1224983).
  * CVE-2021-47334: Fixed two use after free in ibmasm_init_one (bsc#1225112).
  * CVE-2021-47352: Add validation for used length (bsc#1225124).
  * CVE-2021-47355: Fixed possible use-after-free in nicstar_cleanup()
    (bsc#1225141).
  * CVE-2021-47357: Fixed possible use-after-free in ia_module_exit()
    (bsc#1225144).
  * CVE-2021-47361: Fixed error handling in mcb_alloc_bus() (bsc#1225151).
  * CVE-2021-47362: Update intermediate power state for SI (bsc#1225153).
  * CVE-2021-47378: Destroy cm id before destroy qp to avoid use after free
    (bsc#1225201).
  * CVE-2021-47383: Fixed out-of-bound vmalloc access in imageblit
    (bsc#1225208).
  * CVE-2021-47397: Break out if skb_header_pointer returns NULL in
    sctp_rcv_ootb (bsc#1225082)
  * CVE-2021-47401: Fixed stack information leak (bsc#1225242).
  * CVE-2021-47423: Fixed file release memory leak (bsc#1225366).
  * CVE-2021-47431: Fixed gart.bo pin_count leak (bsc#1225390).
  * CVE-2021-47469: Add SPI fix commit to be ignored (bsc#1225347)
  * CVE-2021-47483: Fixed possible double-free in regcache_rbtree_exit()
    (bsc#1224907).
  * CVE-2021-47496: Fix flipped sign in tls_err_abort() calls (bsc#1225354)
  * CVE-2021-47497: Fixed shift-out-of-bound (UBSAN) with byte size cells
    (bsc#1225355).
  * CVE-2021-47500: Fixed trigger reference couting (bsc#1225360).
  * CVE-2021-47509: Limit the period size to 16MB (bsc#1225409).
  * CVE-2021-47511: Fixed negative period/buffer sizes (bsc#1225411).
  * CVE-2021-47548: Fixed a possible array out-of=bounds (bsc#1225506)
  * CVE-2022-48672: Fixed off-by-one error in unflatten_dt_nodes()
    (CVE-2022-48672 bsc#1223931).
  * CVE-2022-48686: Fixed UAF when detecting digest errors (bsc#1223948).
  * CVE-2022-48697: Fixed a use-after-free (bsc#1223922).
  * CVE-2022-48702: Fixed out of bounds access in
    snd_emu10k1_pcm_channel_alloc() (bsc#1223923).
  * CVE-2022-48704: Add a force flush to delay work when radeon (bsc#1223932)
  * CVE-2022-48708: Fixed potential NULL dereference (bsc#1224942).
  * CVE-2022-48710: Fixed a possible null pointer dereference (bsc#1225230).
  * CVE-2023-1829: Fixed a use-after-free vulnerability in the control index
    filter (tcindex) (bsc#1210335).
  * CVE-2023-42755: Check user supplied offsets (bsc#1215702).
  * CVE-2023-52586: Fixed mutex lock in control vblank irq (bsc#1221081).
  * CVE-2023-52655: Check packet for fixup for true limit (bsc#1217169).
  * CVE-2023-52664: Eliminate double free in error handling logic (bsc#1224747).
  * CVE-2023-52691: Fixed a double-free in si_dpm_init (bsc#1224607).
  * CVE-2023-52698: Fixed memory leak in netlbl_calipso_add_pass() (bsc#1224621)
  * CVE-2023-52730: Fixed possible resource leaks in some error paths
    (bsc#1224956).
  * CVE-2023-52732: Blocklist the kclient when receiving corrupted snap trace
    (bsc#1225222).
  * CVE-2023-52747: Restore allocated resources on failed copyout (bsc#1224931)
  * CVE-2023-52796: Add ipvlan_route_v6_outbound() helper (bsc#1224930).
  * CVE-2023-52821: Fixed a possible null pointer dereference (bsc#1225022).
  * CVE-2023-52864: Fixed opening of char device (bsc#1225132).
  * CVE-2023-52865: Add check for mtk_alloc_clk_data (bsc#1225086).
  * CVE-2023-52867: Fixed possible buffer overflow (bsc#1225009).
  * CVE-2023-52875: Add check for mtk_alloc_clk_data (bsc#1225096).
  * CVE-2024-0639: Fixed a denial-of-service vulnerability due to a deadlock
    found in sctp_auto_asconf_init in net/sctp/socket.c (bsc#1218917).
  * CVE-2024-26625: Call sock_orphan() at release time (bsc#1221086)
  * CVE-2024-26775: Fixed potential deadlock at set_capacity (bsc#1222627).
  * CVE-2024-26791: Fixed properly validate device names in btrfs (bsc#1222793)
  * CVE-2024-26828: Fixed underflow in parse_server_interfaces() (bsc#1223084).
  * CVE-2024-26846: Do not wait in vain when unloading module (bsc#1223023).
  * CVE-2024-26874: Fixed a null pointer crash in (bsc#1223048)
  * CVE-2024-26876: Fixed crash on irq during probe (bsc#1223119).
  * CVE-2024-26900: Fixed kmemleak of rdev->serial (bsc#1223046).
  * CVE-2024-26915: Reset IH OVERFLOW_CLEAR bit (bsc#1223207)
  * CVE-2024-26921: Preserve kabi for sk_buff (bsc#1223138).
  * CVE-2024-26957: Fixed reference counting on zcrypt card objects
    (bsc#1223666).
  * CVE-2024-26958: Fixed UAF in direct writes (bsc#1223653).
  * CVE-2024-26984: Fixed instmem race condition around ptr stores (bsc#1223633)
  * CVE-2024-26996: Fixed UAF ncm object at re-bind after usb ep transport error
    (bsc#1223752).
  * CVE-2024-27008: Fixed out of bounds access (CVE-2024-27008 bsc#1223802).
  * CVE-2024-27062: Fixed nouveau lock inside client object tree (bsc#1223834).
  * CVE-2024-27396: Fixed Use-After-Free in gtp_dellink (bsc#1224096).
  * CVE-2024-27398: Fixed use-after-free bugs caused by sco_sock_timeout
    (bsc#1224174).
  * CVE-2024-27401: Fixed user_length taken into account when fetching packet
    contents (bsc#1224181).
  * CVE-2024-27419: Fixed data-races around sysctl_net_busy_read (bsc#1224759)
  * CVE-2024-27436: Stop parsing channels bits when all channels are found
    (bsc#1224803).
  * CVE-2024-35789: Check fast rx for non-4addr sta VLAN changes (bsc#1224749).
  * CVE-2024-35791: Flush pages under kvm->lock to fix UAF in
    svm_register_enc_region() (bsc#1224725).
  * CVE-2024-35809: Drain runtime-idle callbacks before driver removal
    (bsc#1224738).
  * CVE-2024-35830: Register v4l2 async device only after successful setup
    (bsc#1224680).
  * CVE-2024-35849: Fixed information leak in btrfs_ioctl_logical_to_ino()
    (bsc#1224733).
  * CVE-2024-35877: Fixed VM_PAT handling in COW mappings (bsc#1224525).
  * CVE-2024-35878: Prevent NULL pointer dereference in vsnprintf()
    (bsc#1224671).
  * CVE-2024-35887: Fixed use-after-free bugs caused by ax25_ds_del_timer
    (bsc#1224663)
  * CVE-2024-35932: Do not check if plane->state->fb == state->fb (bsc#1224650).
  * CVE-2024-35935: Handle path ref underflow in header iterate_inode_ref()
    (bsc#1224645)
  * CVE-2024-35936: Add missing mutex_unlock in btrfs_relocate_sys_chunks()
    (bsc#1224644)
  * CVE-2024-35944: Fixed memcpy() run-time warning in dg_dispatch_as_host()
    (bsc#1224648).
  * CVE-2024-35969: Fixed race condition between ipv6_get_ifaddr and
    ipv6_del_addr (bsc#1224580).
  * CVE-2024-35982: Avoid infinite loop trying to resize local TT (bsc#1224566)
  * CVE-2024-36029: Prevent access to suspended controller (bsc#1225708)

The following non-security bugs were fixed:

  * af_unix: annote lockless accesses to unix_tot_inflight & gc_in_progress
    (bsc#1223384).
  * af_unix: Do not use atomic ops for unix_sk(sk)->inflight (bsc#1223384).
  * af_unix: Replace BUG_ON() with WARN_ON_ONCE() (bsc#1223384).
  * ASoC: tracing: Export SND_SOC_DAPM_DIR_OUT to its value (git-fixes).
  * assoc_array: Fix BUG_ON during garbage collect.
  * autofs: fix a leak in autofs_expire_indirect() (git-fixes)
  * Bluetooth: btusb: Some Qualcomm Bluetooth adapters stop working (git-fixes).
  * btrfs: avoid null pointer dereference on fs_info when calling btrfs_crit
    (git-fixes)
  * btrfs: check if root is readonly while setting security xattr (git-fixes)
  * btrfs: defrag: use btrfs_mod_outstanding_extents in cluster_pages_for_defrag
    (git-fixes)
  * btrfs: do not get an EINTR during drop_snapshot for reloc (git-fixes)
  * btrfs: do not stop integrity writeback too early (git-fixes)
  * btrfs: Explicitly handle btrfs_update_root failure (git-fixes)
  * btrfs: fail mount when sb flag is not in BTRFS_SUPER_FLAG_SUPP (git-fixes)
  * btrfs: fix btrfs_prev_leaf() to not return the same key twice (git-fixes)
  * btrfs: fix deadlock when writing out space cache (git-fixes)
  * Btrfs: fix incorrect {node,sector}size endianness from BTRFS_IOC_FS_INFO
    (git-fixes)
  * btrfs: fix lockdep splat and potential deadlock after failure running
    delayed items (git-fixes)
  * btrfs: fix lost error handling when looking up extended ref on log replay
    (git-fixes)
  * btrfs: Fix NULL pointer exception in find_bio_stripe (git-fixes)
  * btrfs: Fix out of bounds access in btrfs_search_slot (git-fixes)
  * btrfs: fix race when deleting quota root from the dirty cow roots list (git-
    fixes)
  * btrfs: fix range_end calculation in extent_write_locked_range (git-fixes)
  * btrfs: fix return value mixup in btrfs_get_extent (git-fixes)
  * btrfs: fix unaligned access in readdir (git-fixes)
  * btrfs: limit device extents to the device size (git-fixes)
  * btrfs: prevent to set invalid default subvolid (git-fixes)
  * btrfs: record delayed inode root in transaction (git-fixes)
  * btrfs: scrub: reject unsupported scrub flags (git-fixes)
  * btrfs: send: ensure send_fd is writable (git-fixes)
  * btrfs: send: in case of IO error log it (git-fixes)
  * btrfs: send: limit number of clones and allocated memory size (git-fixes)
  * btrfs: sysfs: use NOFS for device creation (git-fixes) Adjustment: add
    #include
  * btrfs: tree-checker: add missing return after error in root_item (git-fixes)
  * btrfs: tree-checker: add missing returns after data_ref alignment checks
    (git-fixes)
  * btrfs: tree-checker: do not error out if extent ref hash does not match
    (git-fixes)
  * btrfs: tree-checker: fix inline ref size in error messages (git-fixes)
  * btrfs: tree-checker: Fix misleading group system information (git-fixes)
  * btrfs: undo writable superblocke when sprouting fails (git-fixes)
  * btrfs: validate qgroup inherit for SNAP_CREATE_V2 ioctl (git-fixes)
  * ecryptfs: fix a memory leak bug in ecryptfs_init_messaging() (git-fixes)
  * ecryptfs: fix a memory leak bug in parse_tag_1_packet() (git-fixes)
  * ecryptfs: fix kernel panic with null dev_name (git-fixes)
  * ecryptfs: Fix typo in message (git-fixes)
  * ep_create_wakeup_source(): dentry name can change under you (git-fixes)
  * exportfs_decode_fh(): negative pinned may become positive without the parent
    locked (git-fixes)
  * fscrypt: clean up some BUG_ON()s in block encryption/decryption (git-fixes)
  * fs/proc/proc_sysctl.c: fix the default values of i_uid/i_gid on /proc/sys
    inodes (git-fixes)
  * ila: do not generate empty messages in ila_xlat_nl_cmd_get_mapping() (git-
    fixes).
  * ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data() (git-
    fixes).
  * kprobes: Fix possible use-after-free issue on kprobe registration (git-
    fixes).
  * KVM: s390: Check kvm pointer when testing KVM_CAP_S390_HPAGE_1M (git-fixes
    bsc#1225059).
  * l2tp: pass correct message length to ip6_append_data (git-fixes).
  * lib/mpi: use kcalloc in mpi_resize (git-fixes).
  * list: fix a data-race around ep->rdllist (git-fixes).
  * livepatch: Fix missing newline character in klp_resolve_symbols()
    (bsc#1223539).
  * mass-cve: Add convenience KBUILD_USER environment variable
  * mass-cve: Always use bash in Makefile Some constrcts are just too convenient
    to leave them in favor of POSIX'd /bin/sh. Switch to explicit bash.
  * mass-cve: Fail early without data files curl >$@ would create/update the
    file even if download fails. Use explicit argument to prevent continuation
    with empty cve2bugzilla file.
  * mass-cve: Fix update detection with packed-refs Per-branch files are thing
    of the past, git may non-deterministically pack the ref files. Therefore use
    the timestamp of the whole packed-ref file (better false positive detection
    of update than breakage or false negative). Add unified approach to read
    packed-refs regardless of KSOURCE_GIT worktree or not.
  * mass-cve: Make BRANCH mandatory
  * mass-cve: Use dedicated worktree for reference updates So that any checkout
    in KSOURCE_GIT is not changed.
  * net: 9p: avoid freeing uninit memory in p9pdu_vreadf (git-fixes).
  * netfilter: nf_queue: augment nfqa_cfg_policy (git-fixes).
  * netfilter: nft_compat: explicitly reject ERROR and standard target (git-
    fixes).
  * netfilter: x_tables: set module owner for icmp(6) matches (git-fixes).
  * net/smc: fix fallback failed while sendmsg with fastopen (git-fixes).
  * net: tcp: fix unexcepted socket die when snd_wnd is 0 (git-fixes).
  * net/tls: Remove the context from the list in tls_device_down (bsc#1221545).
  * net: usb: ax88179_178a: stop lying about skb->truesize (git-fixes).
  * net: usb: smsc95xx: stop lying about skb->truesize (git-fixes).
  * net: usb: sr9700: stop lying about skb->truesize (git-fixes).
  * net: vmxnet3: Fix NULL pointer dereference in vmxnet3_rq_rx_complete()
    (bsc#1223360).
  * nfc: change order inside nfc_se_io error path (git-fixes).
  * powerpc/pseries/lparcfg: drop error message from guest name lookup
    (bsc#1187716 ltc#193451 git-fixes).
  * ppdev: Add an error check in register_device (git-fixes).
  * printk: Disable passing console lock owner completely during panic()
    (bsc#1197894).
  * printk: Update @console_may_schedule in console_trylock_spinning()
    (bsc#1223969).
  * rds: avoid unenecessary cong_update in loop transport (git-fixes).
  * rds: ib: Fix missing call to rds_ib_dev_put in rds_ib_setup_qp (git-fixes).
  * ring-buffer: Clean ring_buffer_poll_wait() error return (git-fixes).
  * ring-buffer: Fix a race between readers and resize checks (bsc#1222893).
  * rxrpc: Do not put crypto buffers on the stack (git-fixes).
  * rxrpc: Fix a memory leak in rxkad_verify_response() (git-fixes).
  * rxrpc: Provide a different lockdep key for call->user_mutex for kernel calls
    (git-fixes).
  * rxrpc: The mutex lock returned by rxrpc_accept_call() needs releasing (git-
    fixes).
  * rxrpc: Work around usercopy check (git-fixes).
  * s390/cpum_cf: make crypto counters upward compatible across machine types
    (bsc#1224347).
  * s390/pci: fix max size calculation in zpci_memcpy_toio() (git-fixes
    bsc#1225062).
  * scripts/check-kernel-fix: add -F parameter
  * scripts/check-kernel-fix: avoid rechecking child branches when parents are
    OK Topological sorted dependency tree allows to optimize check-kernel-fixe
    in cases where parent already has the fix. There is not reason to check
    branches which merge from that branch as they will get the fix eventually.
  * scripts/check-kernel-fix: print a message when no action is needed. Script
    exits without printing anything about the actions necessary in non-verbose
    mode. This can be confusing to a beginner user.
  * scripts/common-functions: for_each_build_branch traverse branches in
    dependency topo sorted list
  * scripts/common-functions: There are cases where Fixes tag is incorrect.
    Example would be bsc1223062 comment 3.
  * scripts/cve_tools: Update README Issue was fixed in ad3235427c3
  * scripts/git_sort/git_sort.py: add rafael/linux-pm.git#linux-next to remotes
  * scripts/log2: Fix References: update detection The following change
    -REferences: git-fixes +REferences: git-fixes bsc#123456 (note the typo in
    E) will not be detected as a reference update and generates a commit message
    like
  * scripts/PMU: Always use 12 digits for abbreviated hash references Kernel
    developers tend to use 12 digits for abbreviated hash references as this is
    mandatory for upstream work. Enforce this count in PMU for consistency.
  * tcp: tcp_make_synack() can be called from process context (git-fixes).
  * tls: Fix context leak on tls_device_down (bsc#1221545).
  * tracing: Fix blocked reader of snapshot buffer (git-fixes).
  * tracing: hide unused ftrace_event_id_fops (git-fixes).
  * tracing: Use .flush() call to wake up readers (git-fixes).
  * tracing: Use strncpy instead of memcpy when copying comm in trace.c (git-
    fixes).
  * tty/sysrq: replace smp_processor_id() with get_cpu() (bsc#1223540).
  * usb: aqc111: stop lying about skb->truesize (git-fixes).
  * wifi: cfg80211: avoid leaking stack data into trace (git-fixes).
  * wifi: radiotap: fix kernel-doc notation warnings (git-fixes).

## Special Instructions and Notes:

  * Please reboot the system after installing this update.

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".  
Alternatively you can run the command listed for your product:

  * SUSE Linux Enterprise Server for SAP Applications 12 SP5  
    zypper in -t patch SUSE-SLE-HA-12-SP5-2024-2184=1 SUSE-SLE-
SERVER-12-SP5-2024-2184=1

  * SUSE Linux Enterprise High Availability Extension 12 SP5  
    zypper in -t patch SUSE-SLE-HA-12-SP5-2024-2184=1

  * SUSE Linux Enterprise Live Patching 12-SP5  
    zypper in -t patch SUSE-SLE-Live-Patching-12-SP5-2024-2184=1

  * SUSE Linux Enterprise Software Development Kit 12 SP5  
    zypper in -t patch SUSE-SLE-SDK-12-SP5-2024-2184=1

  * SUSE Linux Enterprise High Performance Computing 12 SP5  
    zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-2184=1

  * SUSE Linux Enterprise Server 12 SP5  
    zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-2184=1

  * SUSE Linux Enterprise Workstation Extension 12 12-SP5  
    zypper in -t patch SUSE-SLE-WE-12-SP5-2024-2184=1

## Package List:

  * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64)
    * kernel-default-base-debuginfo-4.12.14-122.219.1
    * kernel-default-base-4.12.14-122.219.1
    * ocfs2-kmp-default-4.12.14-122.219.1
    * gfs2-kmp-default-debuginfo-4.12.14-122.219.1
    * dlm-kmp-default-debuginfo-4.12.14-122.219.1
    * kernel-syms-4.12.14-122.219.1
    * cluster-md-kmp-default-4.12.14-122.219.1
    * kernel-default-debugsource-4.12.14-122.219.1
    * dlm-kmp-default-4.12.14-122.219.1
    * kernel-default-devel-4.12.14-122.219.1
    * cluster-md-kmp-default-debuginfo-4.12.14-122.219.1
    * ocfs2-kmp-default-debuginfo-4.12.14-122.219.1
    * kernel-default-debuginfo-4.12.14-122.219.1
    * gfs2-kmp-default-4.12.14-122.219.1
  * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (nosrc ppc64le
    x86_64)
    * kernel-default-4.12.14-122.219.1
  * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (noarch)
    * kernel-macros-4.12.14-122.219.1
    * kernel-source-4.12.14-122.219.1
    * kernel-devel-4.12.14-122.219.1
  * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (x86_64)
    * kernel-default-devel-debuginfo-4.12.14-122.219.1
  * SUSE Linux Enterprise High Availability Extension 12 SP5 (ppc64le s390x
    x86_64)
    * ocfs2-kmp-default-4.12.14-122.219.1
    * gfs2-kmp-default-debuginfo-4.12.14-122.219.1
    * dlm-kmp-default-debuginfo-4.12.14-122.219.1
    * cluster-md-kmp-default-4.12.14-122.219.1
    * kernel-default-debugsource-4.12.14-122.219.1
    * dlm-kmp-default-4.12.14-122.219.1
    * cluster-md-kmp-default-debuginfo-4.12.14-122.219.1
    * ocfs2-kmp-default-debuginfo-4.12.14-122.219.1
    * kernel-default-debuginfo-4.12.14-122.219.1
    * gfs2-kmp-default-4.12.14-122.219.1
  * SUSE Linux Enterprise High Availability Extension 12 SP5 (nosrc)
    * kernel-default-4.12.14-122.219.1
  * SUSE Linux Enterprise Live Patching 12-SP5 (nosrc)
    * kernel-default-4.12.14-122.219.1
  * SUSE Linux Enterprise Live Patching 12-SP5 (ppc64le s390x x86_64)
    * kernel-default-kgraft-4.12.14-122.219.1
    * kernel-default-debugsource-4.12.14-122.219.1
    * kernel-default-kgraft-devel-4.12.14-122.219.1
    * kgraft-patch-4_12_14-122_219-default-1-8.3.1
    * kernel-default-debuginfo-4.12.14-122.219.1
  * SUSE Linux Enterprise Software Development Kit 12 SP5 (noarch nosrc)
    * kernel-docs-4.12.14-122.219.1
  * SUSE Linux Enterprise Software Development Kit 12 SP5 (aarch64 ppc64le s390x
    x86_64)
    * kernel-obs-build-4.12.14-122.219.1
    * kernel-obs-build-debugsource-4.12.14-122.219.1
  * SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64 nosrc
    x86_64)
    * kernel-default-4.12.14-122.219.1
  * SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64 x86_64)
    * kernel-default-base-debuginfo-4.12.14-122.219.1
    * kernel-default-base-4.12.14-122.219.1
    * kernel-syms-4.12.14-122.219.1
    * kernel-default-debugsource-4.12.14-122.219.1
    * kernel-default-devel-4.12.14-122.219.1
    * kernel-default-debuginfo-4.12.14-122.219.1
  * SUSE Linux Enterprise High Performance Computing 12 SP5 (noarch)
    * kernel-macros-4.12.14-122.219.1
    * kernel-source-4.12.14-122.219.1
    * kernel-devel-4.12.14-122.219.1
  * SUSE Linux Enterprise High Performance Computing 12 SP5 (x86_64)
    * kernel-default-devel-debuginfo-4.12.14-122.219.1
  * SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le s390x x86_64 nosrc)
    * kernel-default-4.12.14-122.219.1
  * SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le s390x x86_64)
    * kernel-default-base-debuginfo-4.12.14-122.219.1
    * kernel-default-base-4.12.14-122.219.1
    * kernel-syms-4.12.14-122.219.1
    * kernel-default-debugsource-4.12.14-122.219.1
    * kernel-default-devel-4.12.14-122.219.1
    * kernel-default-debuginfo-4.12.14-122.219.1
  * SUSE Linux Enterprise Server 12 SP5 (noarch)
    * kernel-macros-4.12.14-122.219.1
    * kernel-source-4.12.14-122.219.1
    * kernel-devel-4.12.14-122.219.1
  * SUSE Linux Enterprise Server 12 SP5 (s390x)
    * kernel-default-man-4.12.14-122.219.1
  * SUSE Linux Enterprise Server 12 SP5 (x86_64)
    * kernel-default-devel-debuginfo-4.12.14-122.219.1
  * SUSE Linux Enterprise Workstation Extension 12 12-SP5 (nosrc)
    * kernel-default-4.12.14-122.219.1
  * SUSE Linux Enterprise Workstation Extension 12 12-SP5 (x86_64)
    * kernel-default-extra-debuginfo-4.12.14-122.219.1
    * kernel-default-extra-4.12.14-122.219.1
    * kernel-default-debuginfo-4.12.14-122.219.1
    * kernel-default-debugsource-4.12.14-122.219.1

## References:

  * https://www.suse.com/security/cve/CVE-2021-46933.html
  * https://www.suse.com/security/cve/CVE-2021-46955.html
  * https://www.suse.com/security/cve/CVE-2021-47074.html
  * https://www.suse.com/security/cve/CVE-2021-47113.html
  * https://www.suse.com/security/cve/CVE-2021-47131.html
  * https://www.suse.com/security/cve/CVE-2021-47162.html
  * https://www.suse.com/security/cve/CVE-2021-47171.html
  * https://www.suse.com/security/cve/CVE-2021-47188.html
  * https://www.suse.com/security/cve/CVE-2021-47206.html
  * https://www.suse.com/security/cve/CVE-2021-47220.html
  * https://www.suse.com/security/cve/CVE-2021-47229.html
  * https://www.suse.com/security/cve/CVE-2021-47231.html
  * https://www.suse.com/security/cve/CVE-2021-47235.html
  * https://www.suse.com/security/cve/CVE-2021-47236.html
  * https://www.suse.com/security/cve/CVE-2021-47237.html
  * https://www.suse.com/security/cve/CVE-2021-47238.html
  * https://www.suse.com/security/cve/CVE-2021-47239.html
  * https://www.suse.com/security/cve/CVE-2021-47245.html
  * https://www.suse.com/security/cve/CVE-2021-47246.html
  * https://www.suse.com/security/cve/CVE-2021-47248.html
  * https://www.suse.com/security/cve/CVE-2021-47249.html
  * https://www.suse.com/security/cve/CVE-2021-47250.html
  * https://www.suse.com/security/cve/CVE-2021-47252.html
  * https://www.suse.com/security/cve/CVE-2021-47254.html
  * https://www.suse.com/security/cve/CVE-2021-47258.html
  * https://www.suse.com/security/cve/CVE-2021-47260.html
  * https://www.suse.com/security/cve/CVE-2021-47261.html
  * https://www.suse.com/security/cve/CVE-2021-47265.html
  * https://www.suse.com/security/cve/CVE-2021-47269.html
  * https://www.suse.com/security/cve/CVE-2021-47274.html
  * https://www.suse.com/security/cve/CVE-2021-47276.html
  * https://www.suse.com/security/cve/CVE-2021-47277.html
  * https://www.suse.com/security/cve/CVE-2021-47280.html
  * https://www.suse.com/security/cve/CVE-2021-47281.html
  * https://www.suse.com/security/cve/CVE-2021-47284.html
  * https://www.suse.com/security/cve/CVE-2021-47285.html
  * https://www.suse.com/security/cve/CVE-2021-47288.html
  * https://www.suse.com/security/cve/CVE-2021-47301.html
  * https://www.suse.com/security/cve/CVE-2021-47302.html
  * https://www.suse.com/security/cve/CVE-2021-47305.html
  * https://www.suse.com/security/cve/CVE-2021-47307.html
  * https://www.suse.com/security/cve/CVE-2021-47308.html
  * https://www.suse.com/security/cve/CVE-2021-47310.html
  * https://www.suse.com/security/cve/CVE-2021-47311.html
  * https://www.suse.com/security/cve/CVE-2021-47314.html
  * https://www.suse.com/security/cve/CVE-2021-47315.html
  * https://www.suse.com/security/cve/CVE-2021-47319.html
  * https://www.suse.com/security/cve/CVE-2021-47320.html
  * https://www.suse.com/security/cve/CVE-2021-47321.html
  * https://www.suse.com/security/cve/CVE-2021-47323.html
  * https://www.suse.com/security/cve/CVE-2021-47324.html
  * https://www.suse.com/security/cve/CVE-2021-47330.html
  * https://www.suse.com/security/cve/CVE-2021-47334.html
  * https://www.suse.com/security/cve/CVE-2021-47337.html
  * https://www.suse.com/security/cve/CVE-2021-47343.html
  * https://www.suse.com/security/cve/CVE-2021-47344.html
  * https://www.suse.com/security/cve/CVE-2021-47345.html
  * https://www.suse.com/security/cve/CVE-2021-47347.html
  * https://www.suse.com/security/cve/CVE-2021-47352.html
  * https://www.suse.com/security/cve/CVE-2021-47353.html
  * https://www.suse.com/security/cve/CVE-2021-47355.html
  * https://www.suse.com/security/cve/CVE-2021-47356.html
  * https://www.suse.com/security/cve/CVE-2021-47357.html
  * https://www.suse.com/security/cve/CVE-2021-47361.html
  * https://www.suse.com/security/cve/CVE-2021-47362.html
  * https://www.suse.com/security/cve/CVE-2021-47369.html
  * https://www.suse.com/security/cve/CVE-2021-47375.html
  * https://www.suse.com/security/cve/CVE-2021-47378.html
  * https://www.suse.com/security/cve/CVE-2021-47382.html
  * https://www.suse.com/security/cve/CVE-2021-47383.html
  * https://www.suse.com/security/cve/CVE-2021-47391.html
  * https://www.suse.com/security/cve/CVE-2021-47397.html
  * https://www.suse.com/security/cve/CVE-2021-47400.html
  * https://www.suse.com/security/cve/CVE-2021-47401.html
  * https://www.suse.com/security/cve/CVE-2021-47404.html
  * https://www.suse.com/security/cve/CVE-2021-47409.html
  * https://www.suse.com/security/cve/CVE-2021-47416.html
  * https://www.suse.com/security/cve/CVE-2021-47423.html
  * https://www.suse.com/security/cve/CVE-2021-47424.html
  * https://www.suse.com/security/cve/CVE-2021-47431.html
  * https://www.suse.com/security/cve/CVE-2021-47435.html
  * https://www.suse.com/security/cve/CVE-2021-47436.html
  * https://www.suse.com/security/cve/CVE-2021-47456.html
  * https://www.suse.com/security/cve/CVE-2021-47458.html
  * https://www.suse.com/security/cve/CVE-2021-47460.html
  * https://www.suse.com/security/cve/CVE-2021-47469.html
  * https://www.suse.com/security/cve/CVE-2021-47472.html
  * https://www.suse.com/security/cve/CVE-2021-47473.html
  * https://www.suse.com/security/cve/CVE-2021-47478.html
  * https://www.suse.com/security/cve/CVE-2021-47480.html
  * https://www.suse.com/security/cve/CVE-2021-47483.html
  * https://www.suse.com/security/cve/CVE-2021-47485.html
  * https://www.suse.com/security/cve/CVE-2021-47495.html
  * https://www.suse.com/security/cve/CVE-2021-47496.html
  * https://www.suse.com/security/cve/CVE-2021-47497.html
  * https://www.suse.com/security/cve/CVE-2021-47500.html
  * https://www.suse.com/security/cve/CVE-2021-47506.html
  * https://www.suse.com/security/cve/CVE-2021-47509.html
  * https://www.suse.com/security/cve/CVE-2021-47511.html
  * https://www.suse.com/security/cve/CVE-2021-47523.html
  * https://www.suse.com/security/cve/CVE-2021-47541.html
  * https://www.suse.com/security/cve/CVE-2021-47548.html
  * https://www.suse.com/security/cve/CVE-2021-47565.html
  * https://www.suse.com/security/cve/CVE-2022-48636.html
  * https://www.suse.com/security/cve/CVE-2022-48650.html
  * https://www.suse.com/security/cve/CVE-2022-48672.html
  * https://www.suse.com/security/cve/CVE-2022-48686.html
  * https://www.suse.com/security/cve/CVE-2022-48697.html
  * https://www.suse.com/security/cve/CVE-2022-48702.html
  * https://www.suse.com/security/cve/CVE-2022-48704.html
  * https://www.suse.com/security/cve/CVE-2022-48708.html
  * https://www.suse.com/security/cve/CVE-2022-48710.html
  * https://www.suse.com/security/cve/CVE-2023-0160.html
  * https://www.suse.com/security/cve/CVE-2023-1829.html
  * https://www.suse.com/security/cve/CVE-2023-42755.html
  * https://www.suse.com/security/cve/CVE-2023-47233.html
  * https://www.suse.com/security/cve/CVE-2023-52527.html
  * https://www.suse.com/security/cve/CVE-2023-52586.html
  * https://www.suse.com/security/cve/CVE-2023-52591.html
  * https://www.suse.com/security/cve/CVE-2023-52646.html
  * https://www.suse.com/security/cve/CVE-2023-52653.html
  * https://www.suse.com/security/cve/CVE-2023-52655.html
  * https://www.suse.com/security/cve/CVE-2023-52664.html
  * https://www.suse.com/security/cve/CVE-2023-52685.html
  * https://www.suse.com/security/cve/CVE-2023-52686.html
  * https://www.suse.com/security/cve/CVE-2023-52691.html
  * https://www.suse.com/security/cve/CVE-2023-52696.html
  * https://www.suse.com/security/cve/CVE-2023-52698.html
  * https://www.suse.com/security/cve/CVE-2023-52703.html
  * https://www.suse.com/security/cve/CVE-2023-52730.html
  * https://www.suse.com/security/cve/CVE-2023-52732.html
  * https://www.suse.com/security/cve/CVE-2023-52741.html
  * https://www.suse.com/security/cve/CVE-2023-52742.html
  * https://www.suse.com/security/cve/CVE-2023-52747.html
  * https://www.suse.com/security/cve/CVE-2023-52759.html
  * https://www.suse.com/security/cve/CVE-2023-52774.html
  * https://www.suse.com/security/cve/CVE-2023-52781.html
  * https://www.suse.com/security/cve/CVE-2023-52796.html
  * https://www.suse.com/security/cve/CVE-2023-52803.html
  * https://www.suse.com/security/cve/CVE-2023-52821.html
  * https://www.suse.com/security/cve/CVE-2023-52864.html
  * https://www.suse.com/security/cve/CVE-2023-52865.html
  * https://www.suse.com/security/cve/CVE-2023-52867.html
  * https://www.suse.com/security/cve/CVE-2023-52875.html
  * https://www.suse.com/security/cve/CVE-2023-52880.html
  * https://www.suse.com/security/cve/CVE-2024-0639.html
  * https://www.suse.com/security/cve/CVE-2024-26625.html
  * https://www.suse.com/security/cve/CVE-2024-26739.html
  * https://www.suse.com/security/cve/CVE-2024-26752.html
  * https://www.suse.com/security/cve/CVE-2024-26775.html
  * https://www.suse.com/security/cve/CVE-2024-26791.html
  * https://www.suse.com/security/cve/CVE-2024-26828.html
  * https://www.suse.com/security/cve/CVE-2024-26846.html
  * https://www.suse.com/security/cve/CVE-2024-26874.html
  * https://www.suse.com/security/cve/CVE-2024-26876.html
  * https://www.suse.com/security/cve/CVE-2024-26900.html
  * https://www.suse.com/security/cve/CVE-2024-26915.html
  * https://www.suse.com/security/cve/CVE-2024-26920.html
  * https://www.suse.com/security/cve/CVE-2024-26921.html
  * https://www.suse.com/security/cve/CVE-2024-26929.html
  * https://www.suse.com/security/cve/CVE-2024-26930.html
  * https://www.suse.com/security/cve/CVE-2024-26931.html
  * https://www.suse.com/security/cve/CVE-2024-26934.html
  * https://www.suse.com/security/cve/CVE-2024-26957.html
  * https://www.suse.com/security/cve/CVE-2024-26958.html
  * https://www.suse.com/security/cve/CVE-2024-26984.html
  * https://www.suse.com/security/cve/CVE-2024-26996.html
  * https://www.suse.com/security/cve/CVE-2024-27008.html
  * https://www.suse.com/security/cve/CVE-2024-27054.html
  * https://www.suse.com/security/cve/CVE-2024-27059.html
  * https://www.suse.com/security/cve/CVE-2024-27062.html
  * https://www.suse.com/security/cve/CVE-2024-27388.html
  * https://www.suse.com/security/cve/CVE-2024-27396.html
  * https://www.suse.com/security/cve/CVE-2024-27398.html
  * https://www.suse.com/security/cve/CVE-2024-27401.html
  * https://www.suse.com/security/cve/CVE-2024-27419.html
  * https://www.suse.com/security/cve/CVE-2024-27436.html
  * https://www.suse.com/security/cve/CVE-2024-35789.html
  * https://www.suse.com/security/cve/CVE-2024-35791.html
  * https://www.suse.com/security/cve/CVE-2024-35809.html
  * https://www.suse.com/security/cve/CVE-2024-35811.html
  * https://www.suse.com/security/cve/CVE-2024-35830.html
  * https://www.suse.com/security/cve/CVE-2024-35849.html
  * https://www.suse.com/security/cve/CVE-2024-35877.html
  * https://www.suse.com/security/cve/CVE-2024-35878.html
  * https://www.suse.com/security/cve/CVE-2024-35887.html
  * https://www.suse.com/security/cve/CVE-2024-35895.html
  * https://www.suse.com/security/cve/CVE-2024-35914.html
  * https://www.suse.com/security/cve/CVE-2024-35932.html
  * https://www.suse.com/security/cve/CVE-2024-35935.html
  * https://www.suse.com/security/cve/CVE-2024-35936.html
  * https://www.suse.com/security/cve/CVE-2024-35944.html
  * https://www.suse.com/security/cve/CVE-2024-35955.html
  * https://www.suse.com/security/cve/CVE-2024-35969.html
  * https://www.suse.com/security/cve/CVE-2024-35982.html
  * https://www.suse.com/security/cve/CVE-2024-36015.html
  * https://www.suse.com/security/cve/CVE-2024-36029.html
  * https://www.suse.com/security/cve/CVE-2024-36954.html
  * https://bugzilla.suse.com/show_bug.cgi?id=1065729
  * https://bugzilla.suse.com/show_bug.cgi?id=1101816
  * https://bugzilla.suse.com/show_bug.cgi?id=1141539
  * https://bugzilla.suse.com/show_bug.cgi?id=1181674
  * https://bugzilla.suse.com/show_bug.cgi?id=1185902
  * https://bugzilla.suse.com/show_bug.cgi?id=1187716
  * https://bugzilla.suse.com/show_bug.cgi?id=1188616
  * https://bugzilla.suse.com/show_bug.cgi?id=1190317
  * https://bugzilla.suse.com/show_bug.cgi?id=1190795
  * https://bugzilla.suse.com/show_bug.cgi?id=1191452
  * https://bugzilla.suse.com/show_bug.cgi?id=1194591
  * https://bugzilla.suse.com/show_bug.cgi?id=1197760
  * https://bugzilla.suse.com/show_bug.cgi?id=1197894
  * https://bugzilla.suse.com/show_bug.cgi?id=1203935
  * https://bugzilla.suse.com/show_bug.cgi?id=1206213
  * https://bugzilla.suse.com/show_bug.cgi?id=1206646
  * https://bugzilla.suse.com/show_bug.cgi?id=1207186
  * https://bugzilla.suse.com/show_bug.cgi?id=1209657
  * https://bugzilla.suse.com/show_bug.cgi?id=1210335
  * https://bugzilla.suse.com/show_bug.cgi?id=1215702
  * https://bugzilla.suse.com/show_bug.cgi?id=1216702
  * https://bugzilla.suse.com/show_bug.cgi?id=1217169
  * https://bugzilla.suse.com/show_bug.cgi?id=1217519
  * https://bugzilla.suse.com/show_bug.cgi?id=1218917
  * https://bugzilla.suse.com/show_bug.cgi?id=1220487
  * https://bugzilla.suse.com/show_bug.cgi?id=1220513
  * https://bugzilla.suse.com/show_bug.cgi?id=1220854
  * https://bugzilla.suse.com/show_bug.cgi?id=1220928
  * https://bugzilla.suse.com/show_bug.cgi?id=1221044
  * https://bugzilla.suse.com/show_bug.cgi?id=1221081
  * https://bugzilla.suse.com/show_bug.cgi?id=1221086
  * https://bugzilla.suse.com/show_bug.cgi?id=1221543
  * https://bugzilla.suse.com/show_bug.cgi?id=1221545
  * https://bugzilla.suse.com/show_bug.cgi?id=1221816
  * https://bugzilla.suse.com/show_bug.cgi?id=1221977
  * https://bugzilla.suse.com/show_bug.cgi?id=1221994
  * https://bugzilla.suse.com/show_bug.cgi?id=1222559
  * https://bugzilla.suse.com/show_bug.cgi?id=1222619
  * https://bugzilla.suse.com/show_bug.cgi?id=1222627
  * https://bugzilla.suse.com/show_bug.cgi?id=1222667
  * https://bugzilla.suse.com/show_bug.cgi?id=1222671
  * https://bugzilla.suse.com/show_bug.cgi?id=1222793
  * https://bugzilla.suse.com/show_bug.cgi?id=1222893
  * https://bugzilla.suse.com/show_bug.cgi?id=1222894
  * https://bugzilla.suse.com/show_bug.cgi?id=1223023
  * https://bugzilla.suse.com/show_bug.cgi?id=1223046
  * https://bugzilla.suse.com/show_bug.cgi?id=1223048
  * https://bugzilla.suse.com/show_bug.cgi?id=1223062
  * https://bugzilla.suse.com/show_bug.cgi?id=1223084
  * https://bugzilla.suse.com/show_bug.cgi?id=1223119
  * https://bugzilla.suse.com/show_bug.cgi?id=1223138
  * https://bugzilla.suse.com/show_bug.cgi?id=1223207
  * https://bugzilla.suse.com/show_bug.cgi?id=1223360
  * https://bugzilla.suse.com/show_bug.cgi?id=1223384
  * https://bugzilla.suse.com/show_bug.cgi?id=1223432
  * https://bugzilla.suse.com/show_bug.cgi?id=1223509
  * https://bugzilla.suse.com/show_bug.cgi?id=1223512
  * https://bugzilla.suse.com/show_bug.cgi?id=1223539
  * https://bugzilla.suse.com/show_bug.cgi?id=1223540
  * https://bugzilla.suse.com/show_bug.cgi?id=1223626
  * https://bugzilla.suse.com/show_bug.cgi?id=1223627
  * https://bugzilla.suse.com/show_bug.cgi?id=1223633
  * https://bugzilla.suse.com/show_bug.cgi?id=1223653
  * https://bugzilla.suse.com/show_bug.cgi?id=1223666
  * https://bugzilla.suse.com/show_bug.cgi?id=1223671
  * https://bugzilla.suse.com/show_bug.cgi?id=1223712
  * https://bugzilla.suse.com/show_bug.cgi?id=1223715
  * https://bugzilla.suse.com/show_bug.cgi?id=1223738
  * https://bugzilla.suse.com/show_bug.cgi?id=1223744
  * https://bugzilla.suse.com/show_bug.cgi?id=1223752
  * https://bugzilla.suse.com/show_bug.cgi?id=1223802
  * https://bugzilla.suse.com/show_bug.cgi?id=1223819
  * https://bugzilla.suse.com/show_bug.cgi?id=1223834
  * https://bugzilla.suse.com/show_bug.cgi?id=1223922
  * https://bugzilla.suse.com/show_bug.cgi?id=1223923
  * https://bugzilla.suse.com/show_bug.cgi?id=1223931
  * https://bugzilla.suse.com/show_bug.cgi?id=1223932
  * https://bugzilla.suse.com/show_bug.cgi?id=1223948
  * https://bugzilla.suse.com/show_bug.cgi?id=1223969
  * https://bugzilla.suse.com/show_bug.cgi?id=1224096
  * https://bugzilla.suse.com/show_bug.cgi?id=1224174
  * https://bugzilla.suse.com/show_bug.cgi?id=1224181
  * https://bugzilla.suse.com/show_bug.cgi?id=1224347
  * https://bugzilla.suse.com/show_bug.cgi?id=1224482
  * https://bugzilla.suse.com/show_bug.cgi?id=1224511
  * https://bugzilla.suse.com/show_bug.cgi?id=1224525
  * https://bugzilla.suse.com/show_bug.cgi?id=1224566
  * https://bugzilla.suse.com/show_bug.cgi?id=1224580
  * https://bugzilla.suse.com/show_bug.cgi?id=1224592
  * https://bugzilla.suse.com/show_bug.cgi?id=1224601
  * https://bugzilla.suse.com/show_bug.cgi?id=1224607
  * https://bugzilla.suse.com/show_bug.cgi?id=1224621
  * https://bugzilla.suse.com/show_bug.cgi?id=1224644
  * https://bugzilla.suse.com/show_bug.cgi?id=1224645
  * https://bugzilla.suse.com/show_bug.cgi?id=1224648
  * https://bugzilla.suse.com/show_bug.cgi?id=1224650
  * https://bugzilla.suse.com/show_bug.cgi?id=1224663
  * https://bugzilla.suse.com/show_bug.cgi?id=1224671
  * https://bugzilla.suse.com/show_bug.cgi?id=1224676
  * https://bugzilla.suse.com/show_bug.cgi?id=1224680
  * https://bugzilla.suse.com/show_bug.cgi?id=1224682
  * https://bugzilla.suse.com/show_bug.cgi?id=1224725
  * https://bugzilla.suse.com/show_bug.cgi?id=1224728
  * https://bugzilla.suse.com/show_bug.cgi?id=1224733
  * https://bugzilla.suse.com/show_bug.cgi?id=1224738
  * https://bugzilla.suse.com/show_bug.cgi?id=1224747
  * https://bugzilla.suse.com/show_bug.cgi?id=1224749
  * https://bugzilla.suse.com/show_bug.cgi?id=1224759
  * https://bugzilla.suse.com/show_bug.cgi?id=1224803
  * https://bugzilla.suse.com/show_bug.cgi?id=1224827
  * https://bugzilla.suse.com/show_bug.cgi?id=1224830
  * https://bugzilla.suse.com/show_bug.cgi?id=1224831
  * https://bugzilla.suse.com/show_bug.cgi?id=1224834
  * https://bugzilla.suse.com/show_bug.cgi?id=1224838
  * https://bugzilla.suse.com/show_bug.cgi?id=1224841
  * https://bugzilla.suse.com/show_bug.cgi?id=1224844
  * https://bugzilla.suse.com/show_bug.cgi?id=1224846
  * https://bugzilla.suse.com/show_bug.cgi?id=1224847
  * https://bugzilla.suse.com/show_bug.cgi?id=1224849
  * https://bugzilla.suse.com/show_bug.cgi?id=1224854
  * https://bugzilla.suse.com/show_bug.cgi?id=1224859
  * https://bugzilla.suse.com/show_bug.cgi?id=1224867
  * https://bugzilla.suse.com/show_bug.cgi?id=1224880
  * https://bugzilla.suse.com/show_bug.cgi?id=1224882
  * https://bugzilla.suse.com/show_bug.cgi?id=1224888
  * https://bugzilla.suse.com/show_bug.cgi?id=1224889
  * https://bugzilla.suse.com/show_bug.cgi?id=1224892
  * https://bugzilla.suse.com/show_bug.cgi?id=1224893
  * https://bugzilla.suse.com/show_bug.cgi?id=1224899
  * https://bugzilla.suse.com/show_bug.cgi?id=1224904
  * https://bugzilla.suse.com/show_bug.cgi?id=1224907
  * https://bugzilla.suse.com/show_bug.cgi?id=1224916
  * https://bugzilla.suse.com/show_bug.cgi?id=1224917
  * https://bugzilla.suse.com/show_bug.cgi?id=1224922
  * https://bugzilla.suse.com/show_bug.cgi?id=1224926
  * https://bugzilla.suse.com/show_bug.cgi?id=1224930
  * https://bugzilla.suse.com/show_bug.cgi?id=1224931
  * https://bugzilla.suse.com/show_bug.cgi?id=1224942
  * https://bugzilla.suse.com/show_bug.cgi?id=1224954
  * https://bugzilla.suse.com/show_bug.cgi?id=1224956
  * https://bugzilla.suse.com/show_bug.cgi?id=1224957
  * https://bugzilla.suse.com/show_bug.cgi?id=1224959
  * https://bugzilla.suse.com/show_bug.cgi?id=1224960
  * https://bugzilla.suse.com/show_bug.cgi?id=1224961
  * https://bugzilla.suse.com/show_bug.cgi?id=1224963
  * https://bugzilla.suse.com/show_bug.cgi?id=1224966
  * https://bugzilla.suse.com/show_bug.cgi?id=1224968
  * https://bugzilla.suse.com/show_bug.cgi?id=1224981
  * https://bugzilla.suse.com/show_bug.cgi?id=1224982
  * https://bugzilla.suse.com/show_bug.cgi?id=1224983
  * https://bugzilla.suse.com/show_bug.cgi?id=1224987
  * https://bugzilla.suse.com/show_bug.cgi?id=1224990
  * https://bugzilla.suse.com/show_bug.cgi?id=1224996
  * https://bugzilla.suse.com/show_bug.cgi?id=1225008
  * https://bugzilla.suse.com/show_bug.cgi?id=1225009
  * https://bugzilla.suse.com/show_bug.cgi?id=1225010
  * https://bugzilla.suse.com/show_bug.cgi?id=1225022
  * https://bugzilla.suse.com/show_bug.cgi?id=1225026
  * https://bugzilla.suse.com/show_bug.cgi?id=1225030
  * https://bugzilla.suse.com/show_bug.cgi?id=1225054
  * https://bugzilla.suse.com/show_bug.cgi?id=1225058
  * https://bugzilla.suse.com/show_bug.cgi?id=1225059
  * https://bugzilla.suse.com/show_bug.cgi?id=1225060
  * https://bugzilla.suse.com/show_bug.cgi?id=1225062
  * https://bugzilla.suse.com/show_bug.cgi?id=1225082
  * https://bugzilla.suse.com/show_bug.cgi?id=1225084
  * https://bugzilla.suse.com/show_bug.cgi?id=1225086
  * https://bugzilla.suse.com/show_bug.cgi?id=1225092
  * https://bugzilla.suse.com/show_bug.cgi?id=1225096
  * https://bugzilla.suse.com/show_bug.cgi?id=1225112
  * https://bugzilla.suse.com/show_bug.cgi?id=1225124
  * https://bugzilla.suse.com/show_bug.cgi?id=1225128
  * https://bugzilla.suse.com/show_bug.cgi?id=1225132
  * https://bugzilla.suse.com/show_bug.cgi?id=1225141
  * https://bugzilla.suse.com/show_bug.cgi?id=1225143
  * https://bugzilla.suse.com/show_bug.cgi?id=1225144
  * https://bugzilla.suse.com/show_bug.cgi?id=1225151
  * https://bugzilla.suse.com/show_bug.cgi?id=1225153
  * https://bugzilla.suse.com/show_bug.cgi?id=1225155
  * https://bugzilla.suse.com/show_bug.cgi?id=1225157
  * https://bugzilla.suse.com/show_bug.cgi?id=1225164
  * https://bugzilla.suse.com/show_bug.cgi?id=1225177
  * https://bugzilla.suse.com/show_bug.cgi?id=1225189
  * https://bugzilla.suse.com/show_bug.cgi?id=1225192
  * https://bugzilla.suse.com/show_bug.cgi?id=1225193
  * https://bugzilla.suse.com/show_bug.cgi?id=1225198
  * https://bugzilla.suse.com/show_bug.cgi?id=1225201
  * https://bugzilla.suse.com/show_bug.cgi?id=1225207
  * https://bugzilla.suse.com/show_bug.cgi?id=1225208
  * https://bugzilla.suse.com/show_bug.cgi?id=1225222
  * https://bugzilla.suse.com/show_bug.cgi?id=1225230
  * https://bugzilla.suse.com/show_bug.cgi?id=1225242
  * https://bugzilla.suse.com/show_bug.cgi?id=1225244
  * https://bugzilla.suse.com/show_bug.cgi?id=1225247
  * https://bugzilla.suse.com/show_bug.cgi?id=1225251
  * https://bugzilla.suse.com/show_bug.cgi?id=1225252
  * https://bugzilla.suse.com/show_bug.cgi?id=1225256
  * https://bugzilla.suse.com/show_bug.cgi?id=1225303
  * https://bugzilla.suse.com/show_bug.cgi?id=1225318
  * https://bugzilla.suse.com/show_bug.cgi?id=1225322
  * https://bugzilla.suse.com/show_bug.cgi?id=1225329
  * https://bugzilla.suse.com/show_bug.cgi?id=1225330
  * https://bugzilla.suse.com/show_bug.cgi?id=1225336
  * https://bugzilla.suse.com/show_bug.cgi?id=1225347
  * https://bugzilla.suse.com/show_bug.cgi?id=1225351
  * https://bugzilla.suse.com/show_bug.cgi?id=1225354
  * https://bugzilla.suse.com/show_bug.cgi?id=1225355
  * https://bugzilla.suse.com/show_bug.cgi?id=1225360
  * https://bugzilla.suse.com/show_bug.cgi?id=1225366
  * https://bugzilla.suse.com/show_bug.cgi?id=1225367
  * https://bugzilla.suse.com/show_bug.cgi?id=1225384
  * https://bugzilla.suse.com/show_bug.cgi?id=1225390
  * https://bugzilla.suse.com/show_bug.cgi?id=1225404
  * https://bugzilla.suse.com/show_bug.cgi?id=1225409
  * https://bugzilla.suse.com/show_bug.cgi?id=1225411
  * https://bugzilla.suse.com/show_bug.cgi?id=1225438
  * https://bugzilla.suse.com/show_bug.cgi?id=1225453
  * https://bugzilla.suse.com/show_bug.cgi?id=1225479
  * https://bugzilla.suse.com/show_bug.cgi?id=1225482
  * https://bugzilla.suse.com/show_bug.cgi?id=1225506
  * https://bugzilla.suse.com/show_bug.cgi?id=1225549
  * https://bugzilla.suse.com/show_bug.cgi?id=1225560
  * https://bugzilla.suse.com/show_bug.cgi?id=1225572
  * https://bugzilla.suse.com/show_bug.cgi?id=1225640
  * https://bugzilla.suse.com/show_bug.cgi?id=1225708
  * https://bugzilla.suse.com/show_bug.cgi?id=1225764

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.suse.com/pipermail/sle-updates/attachments/20240624/4f1a3948/attachment.htm>


More information about the sle-updates mailing list