<div class="container">
<h1>Security update for the Linux Kernel</h1>
<table class="table table-striped table-bordered">
<tbody>
<tr>
<th>Announcement ID:</th>
<td>SUSE-SU-2024:1650-1</td>
</tr>
<tr>
<th>Rating:</th>
<td>important</td>
</tr>
<tr>
<th>References:</th>
<td>
<ul>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1190576">bsc#1190576</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1192145">bsc#1192145</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1204614">bsc#1204614</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1211592">bsc#1211592</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1218562">bsc#1218562</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1218917">bsc#1218917</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1219169">bsc#1219169</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1219170">bsc#1219170</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1219264">bsc#1219264</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220513">bsc#1220513</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220755">bsc#1220755</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220854">bsc#1220854</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221543">bsc#1221543</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221545">bsc#1221545</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222449">bsc#1222449</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222482">bsc#1222482</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222503">bsc#1222503</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222559">bsc#1222559</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222585">bsc#1222585</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222624">bsc#1222624</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222666">bsc#1222666</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222669">bsc#1222669</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222709">bsc#1222709</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222790">bsc#1222790</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222792">bsc#1222792</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222829">bsc#1222829</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222881">bsc#1222881</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222883">bsc#1222883</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222894">bsc#1222894</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222976">bsc#1222976</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223016">bsc#1223016</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223057">bsc#1223057</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223111">bsc#1223111</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223187">bsc#1223187</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223202">bsc#1223202</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223475">bsc#1223475</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223482">bsc#1223482</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223513">bsc#1223513</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223824">bsc#1223824</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223952">bsc#1223952</a>
</li>
</ul>
</td>
</tr>
<tr>
<th>
Cross-References:
</th>
<td>
<ul>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-46955.html">CVE-2021-46955</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47041.html">CVE-2021-47041</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47074.html">CVE-2021-47074</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47113.html">CVE-2021-47113</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47131.html">CVE-2021-47131</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47184.html">CVE-2021-47184</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47185.html">CVE-2021-47185</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47194.html">CVE-2021-47194</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47198.html">CVE-2021-47198</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47201.html">CVE-2021-47201</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47203.html">CVE-2021-47203</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47206.html">CVE-2021-47206</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47207.html">CVE-2021-47207</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47212.html">CVE-2021-47212</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48631.html">CVE-2022-48631</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48651.html">CVE-2022-48651</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48654.html">CVE-2022-48654</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-48687.html">CVE-2022-48687</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-2860.html">CVE-2023-2860</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-6270.html">CVE-2023-6270</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-0639.html">CVE-2024-0639</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-0841.html">CVE-2024-0841</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-22099.html">CVE-2024-22099</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-23307.html">CVE-2024-23307</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26688.html">CVE-2024-26688</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26689.html">CVE-2024-26689</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26733.html">CVE-2024-26733</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26739.html">CVE-2024-26739</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26744.html">CVE-2024-26744</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26816.html">CVE-2024-26816</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26840.html">CVE-2024-26840</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26852.html">CVE-2024-26852</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26862.html">CVE-2024-26862</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26898.html">CVE-2024-26898</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26903.html">CVE-2024-26903</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-26906.html">CVE-2024-26906</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-27043.html">CVE-2024-27043</a>
</li>
</ul>
</td>
</tr>
<tr>
<th>CVSS scores:</th>
<td>
<ul class="list-group">
<li class="list-group-item">
<span class="cvss-reference">CVE-2021-46955</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">7.5</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2021-47041</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2021-47074</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">3.3</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2021-47113</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2021-47131</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2021-47184</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2021-47185</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2021-47194</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2021-47194</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2021-47198</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2021-47198</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2021-47201</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2021-47203</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2021-47206</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2021-47207</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2021-47212</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2022-48631</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2022-48651</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2022-48654</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">3.3</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2022-48687</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">7.1</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-2860</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.4</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-2860</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">4.4</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-6270</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">7.0</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-6270</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.0</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-0639</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.7</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-0639</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-0841</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.4</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-0841</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-22099</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.3</span>
<span class="cvss-vector">CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-22099</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-23307</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-23307</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26688</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26689</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26733</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26739</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26744</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26816</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26840</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">3.3</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26852</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26862</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26898</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26898</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26903</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26903</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-26906</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-27043</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
</ul>
</td>
</tr>
<tr>
<th>Affected Products:</th>
<td>
<ul class="list-group">
<li class="list-group-item">SUSE Linux Enterprise High Availability Extension 15 SP2</li>
<li class="list-group-item">SUSE Linux Enterprise High Performance Computing 15 SP2</li>
<li class="list-group-item">SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2</li>
<li class="list-group-item">SUSE Linux Enterprise Live Patching 15-SP2</li>
<li class="list-group-item">SUSE Linux Enterprise Server 15 SP2</li>
<li class="list-group-item">SUSE Linux Enterprise Server 15 SP2 Business Critical Linux 15-SP2</li>
<li class="list-group-item">SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2</li>
<li class="list-group-item">SUSE Linux Enterprise Server for SAP Applications 15 SP2</li>
<li class="list-group-item">SUSE Manager Proxy 4.1</li>
<li class="list-group-item">SUSE Manager Retail Branch Server 4.1</li>
<li class="list-group-item">SUSE Manager Server 4.1</li>
</ul>
</td>
</tr>
</tbody>
</table>
<p>An update that solves 37 vulnerabilities and has three security fixes can now be installed.</p>
<h2>Description:</h2>
<p>The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security bugfixes.</p>
<p>The following security bugs were fixed:</p>
<ul>
<li>CVE-2024-26840: Fixed a memory leak in cachefiles_add_cache() (bsc#1222976).</li>
<li>CVE-2021-47113: Abort btrfs rename_exchange if we fail to insert the second ref (bsc#1221543).</li>
<li>CVE-2021-47131: Fixed a use-after-free after the TLS device goes down and up (bsc#1221545).</li>
<li>CVE-2024-26852: Fixed net/ipv6 to avoid possible UAF in ip6_route_mpath_notify() (bsc#1223057).</li>
<li>CVE-2021-46955: Fixed an out-of-bounds read with openvswitch, when fragmenting IPv4 packets (bsc#1220513).</li>
<li>CVE-2024-26862: Fixed packet annotate data-races around ignore_outgoing (bsc#1223111).</li>
<li>CVE-2024-0639: Fixed a denial-of-service vulnerability due to a deadlock found in sctp_auto_asconf_init in net/sctp/socket.c (bsc#1218917).</li>
<li>CVE-2024-27043: Fixed a use-after-free in edia/dvbdev in different places (bsc#1223824).</li>
<li>CVE-2022-48631: Fixed a bug in ext4, when parsing extents where eh_entries == 0 and eh_depth > 0 (bsc#1223475).</li>
<li>CVE-2024-23307: Fixed Integer Overflow or Wraparound vulnerability in x86 and ARM md, raid, raid5 modules (bsc#1219169).</li>
<li>CVE-2022-48651: Fixed an out-of-bound bug in ipvlan caused by unset skb->mac_header (bsc#1223513).</li>
<li>CVE-2024-26816: Fixed relocations in .notes section when building with CONFIG_XEN_PV=y by ignoring them (bsc#1222624).</li>
<li>CVE-2024-26906: Disallowed vsyscall page read for copy_from_kernel_nofault() (bsc#1223202).</li>
<li>CVE-2024-26689: Fixed a use-after-free in encode_cap_msg() (bsc#1222503).</li>
<li>CVE-2021-47041: Don't set sk_user_data without write_lock (bsc#1220755).</li>
<li>CVE-2021-47074: Fixed memory leak in nvme_loop_create_ctrl() (bsc#1220854).</li>
<li>CVE-2024-26744: Fixed null pointer dereference in srpt_service_guid parameter in rdma/srpt (bsc#1222449).</li>
</ul>
<p>The following non-security bugs were fixed:</p>
<ul>
<li>net/tls: Remove the context from the list in tls_device_down (bsc#1221545).</li>
<li>tls: Fix context leak on tls_device_down (bsc#1221545).</li>
</ul>
<h2>Special Instructions and Notes:</h2>
<ul>
<li>Please reboot the system after installing this update.</li>
</ul>
<h2>Patch Instructions:</h2>
<p>
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".<br/>
Alternatively you can run the command listed for your product:
</p>
<ul class="list-group">
<li class="list-group-item">
SUSE Linux Enterprise Live Patching 15-SP2
<br/>
<code>zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP2-2024-1650=1</code>
</li>
<li class="list-group-item">
SUSE Linux Enterprise High Availability Extension 15 SP2
<br/>
<code>zypper in -t patch SUSE-SLE-Product-HA-15-SP2-2024-1650=1</code>
</li>
<li class="list-group-item">
SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
<br/>
<code>zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-1650=1</code>
</li>
<li class="list-group-item">
SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
<br/>
<code>zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-1650=1</code>
</li>
<li class="list-group-item">
SUSE Linux Enterprise Server for SAP Applications 15 SP2
<br/>
<code>zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-1650=1</code>
</li>
</ul>
<h2>Package List:</h2>
<ul>
<li>
SUSE Linux Enterprise Live Patching 15-SP2 (nosrc)
<ul>
<li>kernel-default-5.3.18-150200.24.191.1</li>
</ul>
</li>
<li>
SUSE Linux Enterprise Live Patching 15-SP2 (ppc64le s390x x86_64)
<ul>
<li>kernel-livepatch-5_3_18-150200_24_191-default-debuginfo-1-150200.5.3.1</li>
<li>kernel-livepatch-SLE15-SP2_Update_48-debugsource-1-150200.5.3.1</li>
<li>kernel-default-livepatch-5.3.18-150200.24.191.1</li>
<li>kernel-default-debuginfo-5.3.18-150200.24.191.1</li>
<li>kernel-livepatch-5_3_18-150200_24_191-default-1-150200.5.3.1</li>
<li>kernel-default-livepatch-devel-5.3.18-150200.24.191.1</li>
<li>kernel-default-debugsource-5.3.18-150200.24.191.1</li>
</ul>
</li>
<li>
SUSE Linux Enterprise High Availability Extension 15 SP2 (aarch64 ppc64le s390x x86_64)
<ul>
<li>cluster-md-kmp-default-5.3.18-150200.24.191.1</li>
<li>ocfs2-kmp-default-debuginfo-5.3.18-150200.24.191.1</li>
<li>gfs2-kmp-default-5.3.18-150200.24.191.1</li>
<li>cluster-md-kmp-default-debuginfo-5.3.18-150200.24.191.1</li>
<li>gfs2-kmp-default-debuginfo-5.3.18-150200.24.191.1</li>
<li>kernel-default-debuginfo-5.3.18-150200.24.191.1</li>
<li>dlm-kmp-default-5.3.18-150200.24.191.1</li>
<li>ocfs2-kmp-default-5.3.18-150200.24.191.1</li>
<li>dlm-kmp-default-debuginfo-5.3.18-150200.24.191.1</li>
<li>kernel-default-debugsource-5.3.18-150200.24.191.1</li>
</ul>
</li>
<li>
SUSE Linux Enterprise High Availability Extension 15 SP2 (nosrc)
<ul>
<li>kernel-default-5.3.18-150200.24.191.1</li>
</ul>
</li>
<li>
SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64 nosrc x86_64)
<ul>
<li>kernel-default-5.3.18-150200.24.191.1</li>
<li>kernel-preempt-5.3.18-150200.24.191.1</li>
</ul>
</li>
<li>
SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64 x86_64)
<ul>
<li>kernel-default-base-5.3.18-150200.24.191.1.150200.9.97.1</li>
<li>kernel-preempt-devel-debuginfo-5.3.18-150200.24.191.1</li>
<li>kernel-obs-build-5.3.18-150200.24.191.1</li>
<li>kernel-syms-5.3.18-150200.24.191.1</li>
<li>kernel-preempt-debugsource-5.3.18-150200.24.191.1</li>
<li>kernel-obs-build-debugsource-5.3.18-150200.24.191.1</li>
<li>kernel-default-devel-5.3.18-150200.24.191.1</li>
<li>kernel-default-debuginfo-5.3.18-150200.24.191.1</li>
<li>kernel-preempt-debuginfo-5.3.18-150200.24.191.1</li>
<li>kernel-default-devel-debuginfo-5.3.18-150200.24.191.1</li>
<li>kernel-preempt-devel-5.3.18-150200.24.191.1</li>
<li>kernel-default-debugsource-5.3.18-150200.24.191.1</li>
</ul>
</li>
<li>
SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (noarch)
<ul>
<li>kernel-macros-5.3.18-150200.24.191.1</li>
<li>kernel-source-5.3.18-150200.24.191.1</li>
<li>kernel-devel-5.3.18-150200.24.191.1</li>
</ul>
</li>
<li>
SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (noarch nosrc)
<ul>
<li>kernel-docs-5.3.18-150200.24.191.1</li>
</ul>
</li>
<li>
SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x x86_64 nosrc)
<ul>
<li>kernel-default-5.3.18-150200.24.191.1</li>
</ul>
</li>
<li>
SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x x86_64)
<ul>
<li>kernel-default-base-5.3.18-150200.24.191.1.150200.9.97.1</li>
<li>kernel-obs-build-5.3.18-150200.24.191.1</li>
<li>kernel-syms-5.3.18-150200.24.191.1</li>
<li>reiserfs-kmp-default-5.3.18-150200.24.191.1</li>
<li>kernel-obs-build-debugsource-5.3.18-150200.24.191.1</li>
<li>kernel-default-devel-5.3.18-150200.24.191.1</li>
<li>kernel-default-debuginfo-5.3.18-150200.24.191.1</li>
<li>reiserfs-kmp-default-debuginfo-5.3.18-150200.24.191.1</li>
<li>kernel-default-devel-debuginfo-5.3.18-150200.24.191.1</li>
<li>kernel-default-debugsource-5.3.18-150200.24.191.1</li>
</ul>
</li>
<li>
SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (noarch)
<ul>
<li>kernel-macros-5.3.18-150200.24.191.1</li>
<li>kernel-source-5.3.18-150200.24.191.1</li>
<li>kernel-devel-5.3.18-150200.24.191.1</li>
</ul>
</li>
<li>
SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (noarch nosrc)
<ul>
<li>kernel-docs-5.3.18-150200.24.191.1</li>
</ul>
</li>
<li>
SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 nosrc x86_64)
<ul>
<li>kernel-preempt-5.3.18-150200.24.191.1</li>
</ul>
</li>
<li>
SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 x86_64)
<ul>
<li>kernel-preempt-debugsource-5.3.18-150200.24.191.1</li>
<li>kernel-preempt-devel-debuginfo-5.3.18-150200.24.191.1</li>
<li>kernel-preempt-debuginfo-5.3.18-150200.24.191.1</li>
<li>kernel-preempt-devel-5.3.18-150200.24.191.1</li>
</ul>
</li>
<li>
SUSE Linux Enterprise Server for SAP Applications 15 SP2 (nosrc ppc64le x86_64)
<ul>
<li>kernel-default-5.3.18-150200.24.191.1</li>
</ul>
</li>
<li>
SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64)
<ul>
<li>kernel-default-base-5.3.18-150200.24.191.1.150200.9.97.1</li>
<li>kernel-obs-build-5.3.18-150200.24.191.1</li>
<li>kernel-syms-5.3.18-150200.24.191.1</li>
<li>reiserfs-kmp-default-5.3.18-150200.24.191.1</li>
<li>kernel-obs-build-debugsource-5.3.18-150200.24.191.1</li>
<li>kernel-default-devel-5.3.18-150200.24.191.1</li>
<li>kernel-default-debuginfo-5.3.18-150200.24.191.1</li>
<li>reiserfs-kmp-default-debuginfo-5.3.18-150200.24.191.1</li>
<li>kernel-default-devel-debuginfo-5.3.18-150200.24.191.1</li>
<li>kernel-default-debugsource-5.3.18-150200.24.191.1</li>
</ul>
</li>
<li>
SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch)
<ul>
<li>kernel-macros-5.3.18-150200.24.191.1</li>
<li>kernel-source-5.3.18-150200.24.191.1</li>
<li>kernel-devel-5.3.18-150200.24.191.1</li>
</ul>
</li>
<li>
SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch nosrc)
<ul>
<li>kernel-docs-5.3.18-150200.24.191.1</li>
</ul>
</li>
<li>
SUSE Linux Enterprise Server for SAP Applications 15 SP2 (nosrc x86_64)
<ul>
<li>kernel-preempt-5.3.18-150200.24.191.1</li>
</ul>
</li>
<li>
SUSE Linux Enterprise Server for SAP Applications 15 SP2 (x86_64)
<ul>
<li>kernel-preempt-debugsource-5.3.18-150200.24.191.1</li>
<li>kernel-preempt-devel-debuginfo-5.3.18-150200.24.191.1</li>
<li>kernel-preempt-debuginfo-5.3.18-150200.24.191.1</li>
<li>kernel-preempt-devel-5.3.18-150200.24.191.1</li>
</ul>
</li>
</ul>
<h2>References:</h2>
<ul>
<li>
<a href="https://www.suse.com/security/cve/CVE-2021-46955.html">https://www.suse.com/security/cve/CVE-2021-46955.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47041.html">https://www.suse.com/security/cve/CVE-2021-47041.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47074.html">https://www.suse.com/security/cve/CVE-2021-47074.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47113.html">https://www.suse.com/security/cve/CVE-2021-47113.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47131.html">https://www.suse.com/security/cve/CVE-2021-47131.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47184.html">https://www.suse.com/security/cve/CVE-2021-47184.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47185.html">https://www.suse.com/security/cve/CVE-2021-47185.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47194.html">https://www.suse.com/security/cve/CVE-2021-47194.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47198.html">https://www.suse.com/security/cve/CVE-2021-47198.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47201.html">https://www.suse.com/security/cve/CVE-2021-47201.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47203.html">https://www.suse.com/security/cve/CVE-2021-47203.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47206.html">https://www.suse.com/security/cve/CVE-2021-47206.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47207.html">https://www.suse.com/security/cve/CVE-2021-47207.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47212.html">https://www.suse.com/security/cve/CVE-2021-47212.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48631.html">https://www.suse.com/security/cve/CVE-2022-48631.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48651.html">https://www.suse.com/security/cve/CVE-2022-48651.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48654.html">https://www.suse.com/security/cve/CVE-2022-48654.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2022-48687.html">https://www.suse.com/security/cve/CVE-2022-48687.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-2860.html">https://www.suse.com/security/cve/CVE-2023-2860.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-6270.html">https://www.suse.com/security/cve/CVE-2023-6270.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-0639.html">https://www.suse.com/security/cve/CVE-2024-0639.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-0841.html">https://www.suse.com/security/cve/CVE-2024-0841.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-22099.html">https://www.suse.com/security/cve/CVE-2024-22099.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-23307.html">https://www.suse.com/security/cve/CVE-2024-23307.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26688.html">https://www.suse.com/security/cve/CVE-2024-26688.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26689.html">https://www.suse.com/security/cve/CVE-2024-26689.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26733.html">https://www.suse.com/security/cve/CVE-2024-26733.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26739.html">https://www.suse.com/security/cve/CVE-2024-26739.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26744.html">https://www.suse.com/security/cve/CVE-2024-26744.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26816.html">https://www.suse.com/security/cve/CVE-2024-26816.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26840.html">https://www.suse.com/security/cve/CVE-2024-26840.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26852.html">https://www.suse.com/security/cve/CVE-2024-26852.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26862.html">https://www.suse.com/security/cve/CVE-2024-26862.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26898.html">https://www.suse.com/security/cve/CVE-2024-26898.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26903.html">https://www.suse.com/security/cve/CVE-2024-26903.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-26906.html">https://www.suse.com/security/cve/CVE-2024-26906.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-27043.html">https://www.suse.com/security/cve/CVE-2024-27043.html</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1190576">https://bugzilla.suse.com/show_bug.cgi?id=1190576</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1192145">https://bugzilla.suse.com/show_bug.cgi?id=1192145</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1204614">https://bugzilla.suse.com/show_bug.cgi?id=1204614</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1211592">https://bugzilla.suse.com/show_bug.cgi?id=1211592</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1218562">https://bugzilla.suse.com/show_bug.cgi?id=1218562</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1218917">https://bugzilla.suse.com/show_bug.cgi?id=1218917</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1219169">https://bugzilla.suse.com/show_bug.cgi?id=1219169</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1219170">https://bugzilla.suse.com/show_bug.cgi?id=1219170</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1219264">https://bugzilla.suse.com/show_bug.cgi?id=1219264</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220513">https://bugzilla.suse.com/show_bug.cgi?id=1220513</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220755">https://bugzilla.suse.com/show_bug.cgi?id=1220755</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220854">https://bugzilla.suse.com/show_bug.cgi?id=1220854</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221543">https://bugzilla.suse.com/show_bug.cgi?id=1221543</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1221545">https://bugzilla.suse.com/show_bug.cgi?id=1221545</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222449">https://bugzilla.suse.com/show_bug.cgi?id=1222449</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222482">https://bugzilla.suse.com/show_bug.cgi?id=1222482</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222503">https://bugzilla.suse.com/show_bug.cgi?id=1222503</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222559">https://bugzilla.suse.com/show_bug.cgi?id=1222559</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222585">https://bugzilla.suse.com/show_bug.cgi?id=1222585</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222624">https://bugzilla.suse.com/show_bug.cgi?id=1222624</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222666">https://bugzilla.suse.com/show_bug.cgi?id=1222666</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222669">https://bugzilla.suse.com/show_bug.cgi?id=1222669</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222709">https://bugzilla.suse.com/show_bug.cgi?id=1222709</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222790">https://bugzilla.suse.com/show_bug.cgi?id=1222790</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222792">https://bugzilla.suse.com/show_bug.cgi?id=1222792</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222829">https://bugzilla.suse.com/show_bug.cgi?id=1222829</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222881">https://bugzilla.suse.com/show_bug.cgi?id=1222881</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222883">https://bugzilla.suse.com/show_bug.cgi?id=1222883</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222894">https://bugzilla.suse.com/show_bug.cgi?id=1222894</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222976">https://bugzilla.suse.com/show_bug.cgi?id=1222976</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223016">https://bugzilla.suse.com/show_bug.cgi?id=1223016</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223057">https://bugzilla.suse.com/show_bug.cgi?id=1223057</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223111">https://bugzilla.suse.com/show_bug.cgi?id=1223111</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223187">https://bugzilla.suse.com/show_bug.cgi?id=1223187</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223202">https://bugzilla.suse.com/show_bug.cgi?id=1223202</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223475">https://bugzilla.suse.com/show_bug.cgi?id=1223475</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223482">https://bugzilla.suse.com/show_bug.cgi?id=1223482</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223513">https://bugzilla.suse.com/show_bug.cgi?id=1223513</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223824">https://bugzilla.suse.com/show_bug.cgi?id=1223824</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1223952">https://bugzilla.suse.com/show_bug.cgi?id=1223952</a>
</li>
</ul>
</div>