SUSE-SU-2024:2929-1: important: Security update for the Linux Kernel
SUSE-MANAGER-UPDATES
null at suse.de
Thu Aug 15 12:33:02 UTC 2024
# Security update for the Linux Kernel
Announcement ID: SUSE-SU-2024:2929-1
Rating: important
References:
* bsc#1156395
* bsc#1190336
* bsc#1191958
* bsc#1193454
* bsc#1193554
* bsc#1193787
* bsc#1193883
* bsc#1194324
* bsc#1194826
* bsc#1194869
* bsc#1195065
* bsc#1195254
* bsc#1195341
* bsc#1195349
* bsc#1195357
* bsc#1195668
* bsc#1195927
* bsc#1195957
* bsc#1196018
* bsc#1196746
* bsc#1196823
* bsc#1197146
* bsc#1197246
* bsc#1197762
* bsc#1197915
* bsc#1198014
* bsc#1199295
* bsc#1202346
* bsc#1202686
* bsc#1202767
* bsc#1202780
* bsc#1209636
* bsc#1213123
* bsc#1215587
* bsc#1216834
* bsc#1218820
* bsc#1220185
* bsc#1220186
* bsc#1220187
* bsc#1221044
* bsc#1222011
* bsc#1222728
* bsc#1222809
* bsc#1222810
* bsc#1223635
* bsc#1223863
* bsc#1224488
* bsc#1224495
* bsc#1224671
* bsc#1225573
* bsc#1225829
* bsc#1226168
* bsc#1226226
* bsc#1226519
* bsc#1226537
* bsc#1226539
* bsc#1226550
* bsc#1226553
* bsc#1226554
* bsc#1226556
* bsc#1226557
* bsc#1226558
* bsc#1226559
* bsc#1226561
* bsc#1226562
* bsc#1226563
* bsc#1226564
* bsc#1226567
* bsc#1226569
* bsc#1226572
* bsc#1226574
* bsc#1226575
* bsc#1226576
* bsc#1226577
* bsc#1226580
* bsc#1226583
* bsc#1226585
* bsc#1226587
* bsc#1226601
* bsc#1226602
* bsc#1226603
* bsc#1226607
* bsc#1226614
* bsc#1226617
* bsc#1226618
* bsc#1226619
* bsc#1226621
* bsc#1226624
* bsc#1226626
* bsc#1226628
* bsc#1226629
* bsc#1226643
* bsc#1226644
* bsc#1226645
* bsc#1226650
* bsc#1226653
* bsc#1226662
* bsc#1226669
* bsc#1226670
* bsc#1226672
* bsc#1226673
* bsc#1226674
* bsc#1226675
* bsc#1226679
* bsc#1226683
* bsc#1226685
* bsc#1226686
* bsc#1226690
* bsc#1226691
* bsc#1226692
* bsc#1226696
* bsc#1226697
* bsc#1226698
* bsc#1226699
* bsc#1226701
* bsc#1226702
* bsc#1226703
* bsc#1226705
* bsc#1226708
* bsc#1226709
* bsc#1226710
* bsc#1226711
* bsc#1226712
* bsc#1226713
* bsc#1226715
* bsc#1226716
* bsc#1226719
* bsc#1226720
* bsc#1226721
* bsc#1226732
* bsc#1226758
* bsc#1226762
* bsc#1226785
* bsc#1227090
* bsc#1227383
* bsc#1227487
* bsc#1227549
* bsc#1227716
* bsc#1227750
* bsc#1227764
* bsc#1227808
* bsc#1227810
* bsc#1227823
* bsc#1227829
* bsc#1227836
* bsc#1227917
* bsc#1227920
* bsc#1227921
* bsc#1227922
* bsc#1227923
* bsc#1227924
* bsc#1227925
* bsc#1227928
* bsc#1227931
* bsc#1227932
* bsc#1227933
* bsc#1227935
* bsc#1227938
* bsc#1227941
* bsc#1227942
* bsc#1227944
* bsc#1227945
* bsc#1227948
* bsc#1227949
* bsc#1227952
* bsc#1227953
* bsc#1227954
* bsc#1227956
* bsc#1227963
* bsc#1227964
* bsc#1227965
* bsc#1227968
* bsc#1227969
* bsc#1227970
* bsc#1227971
* bsc#1227972
* bsc#1227975
* bsc#1227976
* bsc#1227981
* bsc#1227982
* bsc#1227985
* bsc#1227986
* bsc#1227987
* bsc#1227988
* bsc#1227989
* bsc#1227990
* bsc#1227991
* bsc#1227993
* bsc#1227995
* bsc#1227996
* bsc#1227997
* bsc#1228000
* bsc#1228002
* bsc#1228004
* bsc#1228005
* bsc#1228006
* bsc#1228007
* bsc#1228008
* bsc#1228009
* bsc#1228010
* bsc#1228013
* bsc#1228014
* bsc#1228015
* bsc#1228019
* bsc#1228025
* bsc#1228028
* bsc#1228035
* bsc#1228037
* bsc#1228038
* bsc#1228039
* bsc#1228040
* bsc#1228045
* bsc#1228054
* bsc#1228055
* bsc#1228056
* bsc#1228060
* bsc#1228061
* bsc#1228062
* bsc#1228063
* bsc#1228064
* bsc#1228066
* bsc#1228114
* bsc#1228247
* bsc#1228328
* bsc#1228440
* bsc#1228561
* bsc#1228644
* bsc#1228680
* bsc#1228743
* bsc#1228801
Cross-References:
* CVE-2021-4439
* CVE-2021-47534
* CVE-2021-47576
* CVE-2021-47578
* CVE-2021-47580
* CVE-2021-47582
* CVE-2021-47583
* CVE-2021-47584
* CVE-2021-47585
* CVE-2021-47586
* CVE-2021-47587
* CVE-2021-47589
* CVE-2021-47592
* CVE-2021-47596
* CVE-2021-47597
* CVE-2021-47598
* CVE-2021-47600
* CVE-2021-47601
* CVE-2021-47602
* CVE-2021-47603
* CVE-2021-47607
* CVE-2021-47608
* CVE-2021-47609
* CVE-2021-47611
* CVE-2021-47612
* CVE-2021-47614
* CVE-2021-47615
* CVE-2021-47616
* CVE-2021-47617
* CVE-2021-47618
* CVE-2021-47619
* CVE-2021-47620
* CVE-2021-47622
* CVE-2021-47624
* CVE-2022-0854
* CVE-2022-20368
* CVE-2022-28748
* CVE-2022-2964
* CVE-2022-48711
* CVE-2022-48712
* CVE-2022-48713
* CVE-2022-48715
* CVE-2022-48717
* CVE-2022-48720
* CVE-2022-48721
* CVE-2022-48722
* CVE-2022-48723
* CVE-2022-48724
* CVE-2022-48725
* CVE-2022-48726
* CVE-2022-48727
* CVE-2022-48728
* CVE-2022-48729
* CVE-2022-48730
* CVE-2022-48732
* CVE-2022-48734
* CVE-2022-48735
* CVE-2022-48736
* CVE-2022-48737
* CVE-2022-48738
* CVE-2022-48739
* CVE-2022-48740
* CVE-2022-48743
* CVE-2022-48744
* CVE-2022-48745
* CVE-2022-48746
* CVE-2022-48747
* CVE-2022-48749
* CVE-2022-48751
* CVE-2022-48752
* CVE-2022-48754
* CVE-2022-48756
* CVE-2022-48758
* CVE-2022-48759
* CVE-2022-48760
* CVE-2022-48761
* CVE-2022-48763
* CVE-2022-48765
* CVE-2022-48767
* CVE-2022-48768
* CVE-2022-48769
* CVE-2022-48771
* CVE-2022-48773
* CVE-2022-48774
* CVE-2022-48775
* CVE-2022-48776
* CVE-2022-48777
* CVE-2022-48778
* CVE-2022-48780
* CVE-2022-48783
* CVE-2022-48784
* CVE-2022-48786
* CVE-2022-48787
* CVE-2022-48788
* CVE-2022-48789
* CVE-2022-48790
* CVE-2022-48791
* CVE-2022-48792
* CVE-2022-48793
* CVE-2022-48794
* CVE-2022-48796
* CVE-2022-48797
* CVE-2022-48798
* CVE-2022-48799
* CVE-2022-48800
* CVE-2022-48801
* CVE-2022-48802
* CVE-2022-48803
* CVE-2022-48804
* CVE-2022-48805
* CVE-2022-48806
* CVE-2022-48807
* CVE-2022-48811
* CVE-2022-48812
* CVE-2022-48813
* CVE-2022-48814
* CVE-2022-48815
* CVE-2022-48816
* CVE-2022-48817
* CVE-2022-48818
* CVE-2022-48820
* CVE-2022-48821
* CVE-2022-48822
* CVE-2022-48823
* CVE-2022-48824
* CVE-2022-48825
* CVE-2022-48826
* CVE-2022-48827
* CVE-2022-48828
* CVE-2022-48829
* CVE-2022-48830
* CVE-2022-48831
* CVE-2022-48834
* CVE-2022-48835
* CVE-2022-48836
* CVE-2022-48837
* CVE-2022-48838
* CVE-2022-48839
* CVE-2022-48840
* CVE-2022-48841
* CVE-2022-48842
* CVE-2022-48843
* CVE-2022-48847
* CVE-2022-48849
* CVE-2022-48851
* CVE-2022-48853
* CVE-2022-48856
* CVE-2022-48857
* CVE-2022-48858
* CVE-2022-48859
* CVE-2022-48860
* CVE-2022-48861
* CVE-2022-48862
* CVE-2022-48863
* CVE-2022-48866
* CVE-2023-1582
* CVE-2023-37453
* CVE-2023-52591
* CVE-2023-52762
* CVE-2023-52766
* CVE-2023-52800
* CVE-2023-52885
* CVE-2023-52886
* CVE-2024-26583
* CVE-2024-26584
* CVE-2024-26585
* CVE-2024-26800
* CVE-2024-26813
* CVE-2024-26814
* CVE-2024-26976
* CVE-2024-35878
* CVE-2024-35901
* CVE-2024-35905
* CVE-2024-36926
* CVE-2024-36974
* CVE-2024-38541
* CVE-2024-38555
* CVE-2024-38559
* CVE-2024-39463
* CVE-2024-39494
* CVE-2024-40902
* CVE-2024-40937
* CVE-2024-40954
* CVE-2024-40956
* CVE-2024-40989
* CVE-2024-40994
* CVE-2024-41011
* CVE-2024-41012
* CVE-2024-41059
* CVE-2024-41069
* CVE-2024-41090
* CVE-2024-42093
* CVE-2024-42145
* CVE-2024-42230
CVSS scores:
* CVE-2021-4439 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
* CVE-2021-47534 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47576 ( SUSE ): 3.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:L
* CVE-2021-47578 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47580 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L
* CVE-2021-47582 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47583 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47584 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47585 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47586 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47587 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47589 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47592 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47596 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47597 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2021-47598 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47600 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47601 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47602 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47603 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47607 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2021-47608 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47609 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47611 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47612 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47614 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47615 ( SUSE ): 3.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L
* CVE-2021-47616 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47617 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47618 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47619 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47620 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2021-47622 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47624 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-0854 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2022-0854 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2022-20368 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-20368 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-28748 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
* CVE-2022-2964 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-2964 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48711 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48712 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
* CVE-2022-48713 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48715 ( SUSE ): 3.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L
* CVE-2022-48717 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2022-48720 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-48721 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48722 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48723 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48724 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48725 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48726 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48727 ( SUSE ): 4.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2022-48728 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48729 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48730 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2022-48732 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48734 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48735 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48736 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2022-48737 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2022-48738 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48739 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2022-48740 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48743 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48744 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48745 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48746 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48747 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2022-48749 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48751 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48752 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48754 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48756 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48758 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48759 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48760 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48761 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48763 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48765 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48767 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48768 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48769 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48771 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48773 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48774 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2022-48775 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-48776 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-48777 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48778 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2022-48780 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48783 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48784 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48786 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2022-48787 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48787 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48788 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2022-48788 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48789 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48789 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48790 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48790 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48791 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48792 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48792 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48793 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48793 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48794 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-48796 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48796 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48797 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2022-48798 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48799 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48800 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-48801 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48802 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48803 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2022-48804 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2022-48805 ( SUSE ): 6.6 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48806 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2022-48807 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48811 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48812 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48813 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48814 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48815 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48816 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48817 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48818 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48820 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48821 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48822 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48822 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48823 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-48824 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48824 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48825 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2022-48826 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48827 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48828 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2022-48829 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2022-48830 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48831 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48834 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2022-48834 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48835 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48835 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48836 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48836 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48837 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48837 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48838 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48838 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48839 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48839 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48840 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48840 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48841 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48841 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48842 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48842 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48843 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48843 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48847 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48847 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48849 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48849 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2022-48851 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48851 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48853 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48853 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2022-48856 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48856 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48857 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48857 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48858 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48858 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48859 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48859 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48860 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48860 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48861 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48862 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48862 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48863 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2022-48863 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48866 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2022-48866 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2023-1582 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-1582 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-37453 ( SUSE ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-37453 ( NVD ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52591 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2023-52762 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52766 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2023-52800 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52885 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52886 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26583 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26583 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26584 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26584 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26585 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26585 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26800 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26813 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26814 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26976 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35878 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35901 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35905 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-36926 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36926 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36974 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-38541 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-38555 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-38559 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-39463 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-39494 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-39494 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40902 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-40902 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40937 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40954 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40956 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40989 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40994 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41011 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41012 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-41059 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-41059 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41069 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-41069 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41090 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
* CVE-2024-42093 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L
* CVE-2024-42145 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42145 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42230 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42230 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42230 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.4
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise High Availability Extension 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Live Patching 15-SP4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that solves 194 vulnerabilities and has 36 security fixes can now be
installed.
## Description:
The SUSE Linux Enterprise 15 SP4 kernel was updated to receive various security
bugfixes.
The following security bugs were fixed:
* CVE-2024-39494: ima: Fix use-after-free on a dentry's dname.name
(bsc#1227716).
* CVE-2024-41069: ASoC: topology: Fix route memory corruption (bsc#1228644).
* CVE-2024-40954: net: do not leave a dangling sk pointer, when socket
creation fails (bsc#1227808)
* CVE-2024-42145: IB/core: Implement a limit on UMAD receive List
(bsc#1228743)
* CVE-2024-40994: ptp: fix integer overflow in max_vclocks_store
(bsc#1227829).
* CVE-2024-41012: filelock: Remove locks reliably when fcntl/close race is
detected (bsc#1228247).
* CVE-2024-42093: net/dpaa2: Avoid explicit cpumask var allocation on stack
(bsc#1228680).
* CVE-2024-40989: KVM: arm64: Disassociate vcpus from redistributor region on
teardown (bsc#1227823).
* CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228561).
* CVE-2024-40956: dmaengine: idxd: Fix possible Use-After-Free in
irq_process_work_list (bsc#1227810).
* CVE-2024-41090: tap: add missing verification for short frame (bsc#1228328).
* CVE-2024-41011: drm/amdkfd: do not allow mapping the MMIO HDP page with
large pages (bsc#1228114).
* CVE-2024-39463: 9p: add missing locking around taking dentry fid list
(bsc#1227090).
* CVE-2021-47598: sch_cake: do not call cake_destroy() from cake_init()
(bsc#1226574).
* CVE-2024-40937: gve: Clear napi->skb before dev_kfree_skb_any()
(bsc#1227836).
* CVE-2024-35901: net: mana: Fix Rx DMA datasize and skb_over_panic
(bsc#1224495).
* CVE-2024-42230: powerpc/pseries: Fix scv instruction crash with kexec
(bsc#1194869).
* CVE-2024-26585: Fixed race between tx work scheduling and socket close
(bsc#1220187).
* CVE-2024-36974: net/sched: taprio: always validate TCA_TAPRIO_ATTR_PRIOMAP
(bsc#1226519).
* CVE-2024-38555: net/mlx5: Discard command completions in internal error
(bsc#1226607).
The following non-security bugs were fixed:
* NFS: Do not re-read the entire page cache to find the next cookie
(bsc#1226662).
* NFS: Reduce use of uncached readdir (bsc#1226662).
* NFSv4.x: by default serialize open/close operations (bsc#1226226
bsc#1223863).
* X.509: Fix the parser of extended key usage for length (bsc#1218820).
* btrfs: sysfs: update fs features directory asynchronously (bsc#1226168).
* cgroup/cpuset: Prevent UAF in proc_cpuset_show() (bsc#1228801).
* jfs: xattr: fix buffer overflow for invalid xattr (bsc#1227383).
* kABI: rtas: Workaround false positive due to lost definition (bsc#1227487).
* kernel-binary: vdso: Own module_dir
* net/dcb: check for detached device before executing callbacks (bsc#1215587).
* ocfs2: fix DIO failure due to insufficient transaction credits
(bsc#1216834).
* powerpc/rtas: Prevent Spectre v1 gadget construction in sys_rtas()
(bsc#1227487).
* powerpc/rtas: clean up includes (bsc#1227487).
* workqueue: Improve scalability of workqueue watchdog touch (bsc#1193454).
* workqueue: wq_watchdog_touch is always called with valid CPU (bsc#1193454).
## Special Instructions and Notes:
* Please reboot the system after installing this update.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Linux Enterprise High Availability Extension 15 SP4
zypper in -t patch SUSE-SLE-Product-HA-15-SP4-2024-2929=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2929=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2929=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-2929=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2929=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2929=1
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-2929=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-2929=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-2929=1
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-2929=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-2929=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-2929=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-2929=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-2929=1
* SUSE Linux Enterprise Live Patching 15-SP4
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2024-2929=1
Please note that this is the initial kernel livepatch without fixes itself, this
package is later updated by separate standalone kernel livepatch updates.
## Package List:
* SUSE Linux Enterprise High Availability Extension 15 SP4 (aarch64 ppc64le
s390x x86_64)
* gfs2-kmp-default-5.14.21-150400.24.128.1
* cluster-md-kmp-default-debuginfo-5.14.21-150400.24.128.1
* cluster-md-kmp-default-5.14.21-150400.24.128.1
* ocfs2-kmp-default-5.14.21-150400.24.128.1
* gfs2-kmp-default-debuginfo-5.14.21-150400.24.128.1
* dlm-kmp-default-5.14.21-150400.24.128.1
* kernel-default-debuginfo-5.14.21-150400.24.128.1
* kernel-default-debugsource-5.14.21-150400.24.128.1
* ocfs2-kmp-default-debuginfo-5.14.21-150400.24.128.1
* dlm-kmp-default-debuginfo-5.14.21-150400.24.128.1
* SUSE Linux Enterprise High Availability Extension 15 SP4 (nosrc)
* kernel-default-5.14.21-150400.24.128.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
nosrc)
* kernel-64kb-5.14.21-150400.24.128.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64)
* kernel-64kb-devel-debuginfo-5.14.21-150400.24.128.1
* kernel-64kb-debugsource-5.14.21-150400.24.128.1
* kernel-64kb-debuginfo-5.14.21-150400.24.128.1
* kernel-64kb-devel-5.14.21-150400.24.128.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 nosrc
x86_64)
* kernel-default-5.14.21-150400.24.128.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* kernel-default-devel-debuginfo-5.14.21-150400.24.128.1
* reiserfs-kmp-default-debuginfo-5.14.21-150400.24.128.1
* kernel-syms-5.14.21-150400.24.128.1
* kernel-default-base-5.14.21-150400.24.128.1.150400.24.62.1
* kernel-obs-build-debugsource-5.14.21-150400.24.128.1
* kernel-default-debuginfo-5.14.21-150400.24.128.1
* reiserfs-kmp-default-5.14.21-150400.24.128.1
* kernel-obs-build-5.14.21-150400.24.128.1
* kernel-default-debugsource-5.14.21-150400.24.128.1
* kernel-default-devel-5.14.21-150400.24.128.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* kernel-source-5.14.21-150400.24.128.1
* kernel-macros-5.14.21-150400.24.128.1
* kernel-devel-5.14.21-150400.24.128.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch nosrc)
* kernel-docs-5.14.21-150400.24.128.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 nosrc)
* kernel-64kb-5.14.21-150400.24.128.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64)
* kernel-64kb-devel-debuginfo-5.14.21-150400.24.128.1
* kernel-64kb-debugsource-5.14.21-150400.24.128.1
* kernel-64kb-debuginfo-5.14.21-150400.24.128.1
* kernel-64kb-devel-5.14.21-150400.24.128.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 nosrc
x86_64)
* kernel-default-5.14.21-150400.24.128.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* kernel-default-devel-debuginfo-5.14.21-150400.24.128.1
* reiserfs-kmp-default-debuginfo-5.14.21-150400.24.128.1
* kernel-syms-5.14.21-150400.24.128.1
* kernel-default-base-5.14.21-150400.24.128.1.150400.24.62.1
* kernel-obs-build-debugsource-5.14.21-150400.24.128.1
* kernel-default-debuginfo-5.14.21-150400.24.128.1
* reiserfs-kmp-default-5.14.21-150400.24.128.1
* kernel-obs-build-5.14.21-150400.24.128.1
* kernel-default-debugsource-5.14.21-150400.24.128.1
* kernel-default-devel-5.14.21-150400.24.128.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* kernel-source-5.14.21-150400.24.128.1
* kernel-macros-5.14.21-150400.24.128.1
* kernel-devel-5.14.21-150400.24.128.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch nosrc)
* kernel-docs-5.14.21-150400.24.128.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (nosrc x86_64)
* kernel-default-5.14.21-150400.24.128.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* kernel-default-devel-debuginfo-5.14.21-150400.24.128.1
* kernel-default-extra-debuginfo-5.14.21-150400.24.128.1
* kernel-syms-5.14.21-150400.24.128.1
* kernel-default-extra-5.14.21-150400.24.128.1
* kernel-default-base-5.14.21-150400.24.128.1.150400.24.62.1
* kernel-obs-build-debugsource-5.14.21-150400.24.128.1
* kernel-default-debuginfo-5.14.21-150400.24.128.1
* kernel-obs-build-5.14.21-150400.24.128.1
* kernel-default-debugsource-5.14.21-150400.24.128.1
* kernel-default-devel-5.14.21-150400.24.128.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch)
* kernel-source-5.14.21-150400.24.128.1
* kernel-macros-5.14.21-150400.24.128.1
* kernel-devel-5.14.21-150400.24.128.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch nosrc)
* kernel-docs-5.14.21-150400.24.128.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 nosrc)
* kernel-64kb-5.14.21-150400.24.128.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64)
* kernel-64kb-devel-debuginfo-5.14.21-150400.24.128.1
* kernel-64kb-debugsource-5.14.21-150400.24.128.1
* kernel-64kb-debuginfo-5.14.21-150400.24.128.1
* kernel-64kb-devel-5.14.21-150400.24.128.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64 nosrc)
* kernel-default-5.14.21-150400.24.128.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le x86_64)
* kernel-default-base-5.14.21-150400.24.128.1.150400.24.62.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* kernel-default-devel-debuginfo-5.14.21-150400.24.128.1
* reiserfs-kmp-default-debuginfo-5.14.21-150400.24.128.1
* kernel-syms-5.14.21-150400.24.128.1
* kernel-obs-build-debugsource-5.14.21-150400.24.128.1
* kernel-default-debuginfo-5.14.21-150400.24.128.1
* reiserfs-kmp-default-5.14.21-150400.24.128.1
* kernel-obs-build-5.14.21-150400.24.128.1
* kernel-default-debugsource-5.14.21-150400.24.128.1
* kernel-default-devel-5.14.21-150400.24.128.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch)
* kernel-source-5.14.21-150400.24.128.1
* kernel-macros-5.14.21-150400.24.128.1
* kernel-devel-5.14.21-150400.24.128.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch nosrc)
* kernel-docs-5.14.21-150400.24.128.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (nosrc s390x)
* kernel-zfcpdump-5.14.21-150400.24.128.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (s390x)
* kernel-zfcpdump-debugsource-5.14.21-150400.24.128.1
* kernel-zfcpdump-debuginfo-5.14.21-150400.24.128.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (nosrc ppc64le
x86_64)
* kernel-default-5.14.21-150400.24.128.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* kernel-default-devel-debuginfo-5.14.21-150400.24.128.1
* reiserfs-kmp-default-debuginfo-5.14.21-150400.24.128.1
* kernel-syms-5.14.21-150400.24.128.1
* kernel-default-base-5.14.21-150400.24.128.1.150400.24.62.1
* kernel-obs-build-debugsource-5.14.21-150400.24.128.1
* kernel-default-debuginfo-5.14.21-150400.24.128.1
* reiserfs-kmp-default-5.14.21-150400.24.128.1
* kernel-obs-build-5.14.21-150400.24.128.1
* kernel-default-debugsource-5.14.21-150400.24.128.1
* kernel-default-devel-5.14.21-150400.24.128.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* kernel-source-5.14.21-150400.24.128.1
* kernel-macros-5.14.21-150400.24.128.1
* kernel-devel-5.14.21-150400.24.128.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch nosrc)
* kernel-docs-5.14.21-150400.24.128.1
* SUSE Manager Proxy 4.3 (nosrc x86_64)
* kernel-default-5.14.21-150400.24.128.1
* SUSE Manager Proxy 4.3 (x86_64)
* kernel-default-devel-debuginfo-5.14.21-150400.24.128.1
* kernel-syms-5.14.21-150400.24.128.1
* kernel-default-base-5.14.21-150400.24.128.1.150400.24.62.1
* kernel-default-debuginfo-5.14.21-150400.24.128.1
* kernel-default-debugsource-5.14.21-150400.24.128.1
* kernel-default-devel-5.14.21-150400.24.128.1
* SUSE Manager Proxy 4.3 (noarch)
* kernel-source-5.14.21-150400.24.128.1
* kernel-macros-5.14.21-150400.24.128.1
* kernel-devel-5.14.21-150400.24.128.1
* SUSE Manager Retail Branch Server 4.3 (nosrc x86_64)
* kernel-default-5.14.21-150400.24.128.1
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* kernel-default-devel-debuginfo-5.14.21-150400.24.128.1
* kernel-default-base-5.14.21-150400.24.128.1.150400.24.62.1
* kernel-default-debuginfo-5.14.21-150400.24.128.1
* kernel-default-debugsource-5.14.21-150400.24.128.1
* kernel-default-devel-5.14.21-150400.24.128.1
* SUSE Manager Retail Branch Server 4.3 (noarch)
* kernel-macros-5.14.21-150400.24.128.1
* kernel-devel-5.14.21-150400.24.128.1
* SUSE Manager Server 4.3 (nosrc ppc64le s390x x86_64)
* kernel-default-5.14.21-150400.24.128.1
* SUSE Manager Server 4.3 (ppc64le x86_64)
* kernel-default-base-5.14.21-150400.24.128.1.150400.24.62.1
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* kernel-default-devel-debuginfo-5.14.21-150400.24.128.1
* kernel-syms-5.14.21-150400.24.128.1
* kernel-default-debuginfo-5.14.21-150400.24.128.1
* kernel-default-debugsource-5.14.21-150400.24.128.1
* kernel-default-devel-5.14.21-150400.24.128.1
* SUSE Manager Server 4.3 (noarch)
* kernel-source-5.14.21-150400.24.128.1
* kernel-macros-5.14.21-150400.24.128.1
* kernel-devel-5.14.21-150400.24.128.1
* SUSE Manager Server 4.3 (nosrc s390x)
* kernel-zfcpdump-5.14.21-150400.24.128.1
* SUSE Manager Server 4.3 (s390x)
* kernel-zfcpdump-debugsource-5.14.21-150400.24.128.1
* kernel-zfcpdump-debuginfo-5.14.21-150400.24.128.1
* openSUSE Leap 15.4 (noarch nosrc)
* kernel-docs-5.14.21-150400.24.128.1
* openSUSE Leap 15.4 (noarch)
* kernel-source-5.14.21-150400.24.128.1
* kernel-devel-5.14.21-150400.24.128.1
* kernel-source-vanilla-5.14.21-150400.24.128.1
* kernel-macros-5.14.21-150400.24.128.1
* kernel-docs-html-5.14.21-150400.24.128.1
* openSUSE Leap 15.4 (nosrc ppc64le x86_64)
* kernel-debug-5.14.21-150400.24.128.1
* openSUSE Leap 15.4 (ppc64le x86_64)
* kernel-debug-debuginfo-5.14.21-150400.24.128.1
* kernel-debug-livepatch-devel-5.14.21-150400.24.128.1
* kernel-debug-debugsource-5.14.21-150400.24.128.1
* kernel-debug-devel-debuginfo-5.14.21-150400.24.128.1
* kernel-debug-devel-5.14.21-150400.24.128.1
* openSUSE Leap 15.4 (aarch64 ppc64le x86_64)
* kernel-kvmsmall-debuginfo-5.14.21-150400.24.128.1
* kernel-kvmsmall-devel-5.14.21-150400.24.128.1
* kernel-kvmsmall-devel-debuginfo-5.14.21-150400.24.128.1
* kernel-default-base-5.14.21-150400.24.128.1.150400.24.62.1
* kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.128.1
* kernel-default-base-rebuild-5.14.21-150400.24.128.1.150400.24.62.1
* kernel-kvmsmall-debugsource-5.14.21-150400.24.128.1
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64)
* reiserfs-kmp-default-debuginfo-5.14.21-150400.24.128.1
* cluster-md-kmp-default-debuginfo-5.14.21-150400.24.128.1
* kselftests-kmp-default-5.14.21-150400.24.128.1
* kernel-syms-5.14.21-150400.24.128.1
* cluster-md-kmp-default-5.14.21-150400.24.128.1
* dlm-kmp-default-5.14.21-150400.24.128.1
* kernel-obs-build-debugsource-5.14.21-150400.24.128.1
* kernel-default-livepatch-5.14.21-150400.24.128.1
* kselftests-kmp-default-debuginfo-5.14.21-150400.24.128.1
* kernel-default-devel-5.14.21-150400.24.128.1
* kernel-default-extra-5.14.21-150400.24.128.1
* kernel-default-debugsource-5.14.21-150400.24.128.1
* ocfs2-kmp-default-debuginfo-5.14.21-150400.24.128.1
* kernel-default-devel-debuginfo-5.14.21-150400.24.128.1
* gfs2-kmp-default-5.14.21-150400.24.128.1
* kernel-default-extra-debuginfo-5.14.21-150400.24.128.1
* kernel-default-optional-5.14.21-150400.24.128.1
* kernel-default-optional-debuginfo-5.14.21-150400.24.128.1
* ocfs2-kmp-default-5.14.21-150400.24.128.1
* gfs2-kmp-default-debuginfo-5.14.21-150400.24.128.1
* kernel-default-debuginfo-5.14.21-150400.24.128.1
* kernel-obs-build-5.14.21-150400.24.128.1
* kernel-default-livepatch-devel-5.14.21-150400.24.128.1
* kernel-obs-qa-5.14.21-150400.24.128.1
* reiserfs-kmp-default-5.14.21-150400.24.128.1
* dlm-kmp-default-debuginfo-5.14.21-150400.24.128.1
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 nosrc)
* kernel-default-5.14.21-150400.24.128.1
* openSUSE Leap 15.4 (aarch64 nosrc ppc64le x86_64)
* kernel-kvmsmall-5.14.21-150400.24.128.1
* openSUSE Leap 15.4 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150400_24_128-default-debuginfo-1-150400.9.3.1
* kernel-livepatch-SLE15-SP4_Update_29-debugsource-1-150400.9.3.1
* kernel-livepatch-5_14_21-150400_24_128-default-1-150400.9.3.1
* openSUSE Leap 15.4 (nosrc s390x)
* kernel-zfcpdump-5.14.21-150400.24.128.1
* openSUSE Leap 15.4 (s390x)
* kernel-zfcpdump-debugsource-5.14.21-150400.24.128.1
* kernel-zfcpdump-debuginfo-5.14.21-150400.24.128.1
* openSUSE Leap 15.4 (nosrc)
* dtb-aarch64-5.14.21-150400.24.128.1
* openSUSE Leap 15.4 (aarch64)
* dtb-lg-5.14.21-150400.24.128.1
* kernel-64kb-devel-debuginfo-5.14.21-150400.24.128.1
* dtb-amd-5.14.21-150400.24.128.1
* ocfs2-kmp-64kb-5.14.21-150400.24.128.1
* gfs2-kmp-64kb-debuginfo-5.14.21-150400.24.128.1
* kselftests-kmp-64kb-debuginfo-5.14.21-150400.24.128.1
* ocfs2-kmp-64kb-debuginfo-5.14.21-150400.24.128.1
* dtb-exynos-5.14.21-150400.24.128.1
* dtb-apple-5.14.21-150400.24.128.1
* reiserfs-kmp-64kb-debuginfo-5.14.21-150400.24.128.1
* dtb-cavium-5.14.21-150400.24.128.1
* kernel-64kb-debugsource-5.14.21-150400.24.128.1
* kernel-64kb-devel-5.14.21-150400.24.128.1
* kernel-64kb-extra-debuginfo-5.14.21-150400.24.128.1
* dtb-allwinner-5.14.21-150400.24.128.1
* kernel-64kb-optional-5.14.21-150400.24.128.1
* dlm-kmp-64kb-debuginfo-5.14.21-150400.24.128.1
* reiserfs-kmp-64kb-5.14.21-150400.24.128.1
* dtb-freescale-5.14.21-150400.24.128.1
* kernel-64kb-extra-5.14.21-150400.24.128.1
* dtb-altera-5.14.21-150400.24.128.1
* dtb-mediatek-5.14.21-150400.24.128.1
* dtb-arm-5.14.21-150400.24.128.1
* cluster-md-kmp-64kb-debuginfo-5.14.21-150400.24.128.1
* dtb-amlogic-5.14.21-150400.24.128.1
* dtb-renesas-5.14.21-150400.24.128.1
* dtb-hisilicon-5.14.21-150400.24.128.1
* cluster-md-kmp-64kb-5.14.21-150400.24.128.1
* kselftests-kmp-64kb-5.14.21-150400.24.128.1
* dtb-apm-5.14.21-150400.24.128.1
* kernel-64kb-optional-debuginfo-5.14.21-150400.24.128.1
* dtb-rockchip-5.14.21-150400.24.128.1
* gfs2-kmp-64kb-5.14.21-150400.24.128.1
* dlm-kmp-64kb-5.14.21-150400.24.128.1
* dtb-broadcom-5.14.21-150400.24.128.1
* dtb-marvell-5.14.21-150400.24.128.1
* dtb-sprd-5.14.21-150400.24.128.1
* dtb-qcom-5.14.21-150400.24.128.1
* kernel-64kb-livepatch-devel-5.14.21-150400.24.128.1
* kernel-64kb-debuginfo-5.14.21-150400.24.128.1
* dtb-nvidia-5.14.21-150400.24.128.1
* dtb-xilinx-5.14.21-150400.24.128.1
* dtb-socionext-5.14.21-150400.24.128.1
* dtb-amazon-5.14.21-150400.24.128.1
* openSUSE Leap 15.4 (aarch64 nosrc)
* kernel-64kb-5.14.21-150400.24.128.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 nosrc s390x x86_64)
* kernel-default-5.14.21-150400.24.128.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 x86_64)
* kernel-default-base-5.14.21-150400.24.128.1.150400.24.62.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* kernel-default-debugsource-5.14.21-150400.24.128.1
* kernel-default-debuginfo-5.14.21-150400.24.128.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 nosrc s390x x86_64)
* kernel-default-5.14.21-150400.24.128.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 x86_64)
* kernel-default-base-5.14.21-150400.24.128.1.150400.24.62.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* kernel-default-debugsource-5.14.21-150400.24.128.1
* kernel-default-debuginfo-5.14.21-150400.24.128.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 nosrc s390x x86_64)
* kernel-default-5.14.21-150400.24.128.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 x86_64)
* kernel-default-base-5.14.21-150400.24.128.1.150400.24.62.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* kernel-default-debugsource-5.14.21-150400.24.128.1
* kernel-default-debuginfo-5.14.21-150400.24.128.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 nosrc s390x x86_64)
* kernel-default-5.14.21-150400.24.128.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 x86_64)
* kernel-default-base-5.14.21-150400.24.128.1.150400.24.62.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* kernel-default-debugsource-5.14.21-150400.24.128.1
* kernel-default-debuginfo-5.14.21-150400.24.128.1
* SUSE Linux Enterprise Live Patching 15-SP4 (nosrc)
* kernel-default-5.14.21-150400.24.128.1
* SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64)
* kernel-livepatch-SLE15-SP4_Update_29-debugsource-1-150400.9.3.1
* kernel-livepatch-5_14_21-150400_24_128-default-1-150400.9.3.1
* kernel-default-livepatch-devel-5.14.21-150400.24.128.1
* kernel-livepatch-5_14_21-150400_24_128-default-debuginfo-1-150400.9.3.1
* kernel-default-livepatch-5.14.21-150400.24.128.1
* kernel-default-debuginfo-5.14.21-150400.24.128.1
* kernel-default-debugsource-5.14.21-150400.24.128.1
## References:
* https://www.suse.com/security/cve/CVE-2021-4439.html
* https://www.suse.com/security/cve/CVE-2021-47534.html
* https://www.suse.com/security/cve/CVE-2021-47576.html
* https://www.suse.com/security/cve/CVE-2021-47578.html
* https://www.suse.com/security/cve/CVE-2021-47580.html
* https://www.suse.com/security/cve/CVE-2021-47582.html
* https://www.suse.com/security/cve/CVE-2021-47583.html
* https://www.suse.com/security/cve/CVE-2021-47584.html
* https://www.suse.com/security/cve/CVE-2021-47585.html
* https://www.suse.com/security/cve/CVE-2021-47586.html
* https://www.suse.com/security/cve/CVE-2021-47587.html
* https://www.suse.com/security/cve/CVE-2021-47589.html
* https://www.suse.com/security/cve/CVE-2021-47592.html
* https://www.suse.com/security/cve/CVE-2021-47596.html
* https://www.suse.com/security/cve/CVE-2021-47597.html
* https://www.suse.com/security/cve/CVE-2021-47598.html
* https://www.suse.com/security/cve/CVE-2021-47600.html
* https://www.suse.com/security/cve/CVE-2021-47601.html
* https://www.suse.com/security/cve/CVE-2021-47602.html
* https://www.suse.com/security/cve/CVE-2021-47603.html
* https://www.suse.com/security/cve/CVE-2021-47607.html
* https://www.suse.com/security/cve/CVE-2021-47608.html
* https://www.suse.com/security/cve/CVE-2021-47609.html
* https://www.suse.com/security/cve/CVE-2021-47611.html
* https://www.suse.com/security/cve/CVE-2021-47612.html
* https://www.suse.com/security/cve/CVE-2021-47614.html
* https://www.suse.com/security/cve/CVE-2021-47615.html
* https://www.suse.com/security/cve/CVE-2021-47616.html
* https://www.suse.com/security/cve/CVE-2021-47617.html
* https://www.suse.com/security/cve/CVE-2021-47618.html
* https://www.suse.com/security/cve/CVE-2021-47619.html
* https://www.suse.com/security/cve/CVE-2021-47620.html
* https://www.suse.com/security/cve/CVE-2021-47622.html
* https://www.suse.com/security/cve/CVE-2021-47624.html
* https://www.suse.com/security/cve/CVE-2022-0854.html
* https://www.suse.com/security/cve/CVE-2022-20368.html
* https://www.suse.com/security/cve/CVE-2022-28748.html
* https://www.suse.com/security/cve/CVE-2022-2964.html
* https://www.suse.com/security/cve/CVE-2022-48711.html
* https://www.suse.com/security/cve/CVE-2022-48712.html
* https://www.suse.com/security/cve/CVE-2022-48713.html
* https://www.suse.com/security/cve/CVE-2022-48715.html
* https://www.suse.com/security/cve/CVE-2022-48717.html
* https://www.suse.com/security/cve/CVE-2022-48720.html
* https://www.suse.com/security/cve/CVE-2022-48721.html
* https://www.suse.com/security/cve/CVE-2022-48722.html
* https://www.suse.com/security/cve/CVE-2022-48723.html
* https://www.suse.com/security/cve/CVE-2022-48724.html
* https://www.suse.com/security/cve/CVE-2022-48725.html
* https://www.suse.com/security/cve/CVE-2022-48726.html
* https://www.suse.com/security/cve/CVE-2022-48727.html
* https://www.suse.com/security/cve/CVE-2022-48728.html
* https://www.suse.com/security/cve/CVE-2022-48729.html
* https://www.suse.com/security/cve/CVE-2022-48730.html
* https://www.suse.com/security/cve/CVE-2022-48732.html
* https://www.suse.com/security/cve/CVE-2022-48734.html
* https://www.suse.com/security/cve/CVE-2022-48735.html
* https://www.suse.com/security/cve/CVE-2022-48736.html
* https://www.suse.com/security/cve/CVE-2022-48737.html
* https://www.suse.com/security/cve/CVE-2022-48738.html
* https://www.suse.com/security/cve/CVE-2022-48739.html
* https://www.suse.com/security/cve/CVE-2022-48740.html
* https://www.suse.com/security/cve/CVE-2022-48743.html
* https://www.suse.com/security/cve/CVE-2022-48744.html
* https://www.suse.com/security/cve/CVE-2022-48745.html
* https://www.suse.com/security/cve/CVE-2022-48746.html
* https://www.suse.com/security/cve/CVE-2022-48747.html
* https://www.suse.com/security/cve/CVE-2022-48749.html
* https://www.suse.com/security/cve/CVE-2022-48751.html
* https://www.suse.com/security/cve/CVE-2022-48752.html
* https://www.suse.com/security/cve/CVE-2022-48754.html
* https://www.suse.com/security/cve/CVE-2022-48756.html
* https://www.suse.com/security/cve/CVE-2022-48758.html
* https://www.suse.com/security/cve/CVE-2022-48759.html
* https://www.suse.com/security/cve/CVE-2022-48760.html
* https://www.suse.com/security/cve/CVE-2022-48761.html
* https://www.suse.com/security/cve/CVE-2022-48763.html
* https://www.suse.com/security/cve/CVE-2022-48765.html
* https://www.suse.com/security/cve/CVE-2022-48767.html
* https://www.suse.com/security/cve/CVE-2022-48768.html
* https://www.suse.com/security/cve/CVE-2022-48769.html
* https://www.suse.com/security/cve/CVE-2022-48771.html
* https://www.suse.com/security/cve/CVE-2022-48773.html
* https://www.suse.com/security/cve/CVE-2022-48774.html
* https://www.suse.com/security/cve/CVE-2022-48775.html
* https://www.suse.com/security/cve/CVE-2022-48776.html
* https://www.suse.com/security/cve/CVE-2022-48777.html
* https://www.suse.com/security/cve/CVE-2022-48778.html
* https://www.suse.com/security/cve/CVE-2022-48780.html
* https://www.suse.com/security/cve/CVE-2022-48783.html
* https://www.suse.com/security/cve/CVE-2022-48784.html
* https://www.suse.com/security/cve/CVE-2022-48786.html
* https://www.suse.com/security/cve/CVE-2022-48787.html
* https://www.suse.com/security/cve/CVE-2022-48788.html
* https://www.suse.com/security/cve/CVE-2022-48789.html
* https://www.suse.com/security/cve/CVE-2022-48790.html
* https://www.suse.com/security/cve/CVE-2022-48791.html
* https://www.suse.com/security/cve/CVE-2022-48792.html
* https://www.suse.com/security/cve/CVE-2022-48793.html
* https://www.suse.com/security/cve/CVE-2022-48794.html
* https://www.suse.com/security/cve/CVE-2022-48796.html
* https://www.suse.com/security/cve/CVE-2022-48797.html
* https://www.suse.com/security/cve/CVE-2022-48798.html
* https://www.suse.com/security/cve/CVE-2022-48799.html
* https://www.suse.com/security/cve/CVE-2022-48800.html
* https://www.suse.com/security/cve/CVE-2022-48801.html
* https://www.suse.com/security/cve/CVE-2022-48802.html
* https://www.suse.com/security/cve/CVE-2022-48803.html
* https://www.suse.com/security/cve/CVE-2022-48804.html
* https://www.suse.com/security/cve/CVE-2022-48805.html
* https://www.suse.com/security/cve/CVE-2022-48806.html
* https://www.suse.com/security/cve/CVE-2022-48807.html
* https://www.suse.com/security/cve/CVE-2022-48811.html
* https://www.suse.com/security/cve/CVE-2022-48812.html
* https://www.suse.com/security/cve/CVE-2022-48813.html
* https://www.suse.com/security/cve/CVE-2022-48814.html
* https://www.suse.com/security/cve/CVE-2022-48815.html
* https://www.suse.com/security/cve/CVE-2022-48816.html
* https://www.suse.com/security/cve/CVE-2022-48817.html
* https://www.suse.com/security/cve/CVE-2022-48818.html
* https://www.suse.com/security/cve/CVE-2022-48820.html
* https://www.suse.com/security/cve/CVE-2022-48821.html
* https://www.suse.com/security/cve/CVE-2022-48822.html
* https://www.suse.com/security/cve/CVE-2022-48823.html
* https://www.suse.com/security/cve/CVE-2022-48824.html
* https://www.suse.com/security/cve/CVE-2022-48825.html
* https://www.suse.com/security/cve/CVE-2022-48826.html
* https://www.suse.com/security/cve/CVE-2022-48827.html
* https://www.suse.com/security/cve/CVE-2022-48828.html
* https://www.suse.com/security/cve/CVE-2022-48829.html
* https://www.suse.com/security/cve/CVE-2022-48830.html
* https://www.suse.com/security/cve/CVE-2022-48831.html
* https://www.suse.com/security/cve/CVE-2022-48834.html
* https://www.suse.com/security/cve/CVE-2022-48835.html
* https://www.suse.com/security/cve/CVE-2022-48836.html
* https://www.suse.com/security/cve/CVE-2022-48837.html
* https://www.suse.com/security/cve/CVE-2022-48838.html
* https://www.suse.com/security/cve/CVE-2022-48839.html
* https://www.suse.com/security/cve/CVE-2022-48840.html
* https://www.suse.com/security/cve/CVE-2022-48841.html
* https://www.suse.com/security/cve/CVE-2022-48842.html
* https://www.suse.com/security/cve/CVE-2022-48843.html
* https://www.suse.com/security/cve/CVE-2022-48847.html
* https://www.suse.com/security/cve/CVE-2022-48849.html
* https://www.suse.com/security/cve/CVE-2022-48851.html
* https://www.suse.com/security/cve/CVE-2022-48853.html
* https://www.suse.com/security/cve/CVE-2022-48856.html
* https://www.suse.com/security/cve/CVE-2022-48857.html
* https://www.suse.com/security/cve/CVE-2022-48858.html
* https://www.suse.com/security/cve/CVE-2022-48859.html
* https://www.suse.com/security/cve/CVE-2022-48860.html
* https://www.suse.com/security/cve/CVE-2022-48861.html
* https://www.suse.com/security/cve/CVE-2022-48862.html
* https://www.suse.com/security/cve/CVE-2022-48863.html
* https://www.suse.com/security/cve/CVE-2022-48866.html
* https://www.suse.com/security/cve/CVE-2023-1582.html
* https://www.suse.com/security/cve/CVE-2023-37453.html
* https://www.suse.com/security/cve/CVE-2023-52591.html
* https://www.suse.com/security/cve/CVE-2023-52762.html
* https://www.suse.com/security/cve/CVE-2023-52766.html
* https://www.suse.com/security/cve/CVE-2023-52800.html
* https://www.suse.com/security/cve/CVE-2023-52885.html
* https://www.suse.com/security/cve/CVE-2023-52886.html
* https://www.suse.com/security/cve/CVE-2024-26583.html
* https://www.suse.com/security/cve/CVE-2024-26584.html
* https://www.suse.com/security/cve/CVE-2024-26585.html
* https://www.suse.com/security/cve/CVE-2024-26800.html
* https://www.suse.com/security/cve/CVE-2024-26813.html
* https://www.suse.com/security/cve/CVE-2024-26814.html
* https://www.suse.com/security/cve/CVE-2024-26976.html
* https://www.suse.com/security/cve/CVE-2024-35878.html
* https://www.suse.com/security/cve/CVE-2024-35901.html
* https://www.suse.com/security/cve/CVE-2024-35905.html
* https://www.suse.com/security/cve/CVE-2024-36926.html
* https://www.suse.com/security/cve/CVE-2024-36974.html
* https://www.suse.com/security/cve/CVE-2024-38541.html
* https://www.suse.com/security/cve/CVE-2024-38555.html
* https://www.suse.com/security/cve/CVE-2024-38559.html
* https://www.suse.com/security/cve/CVE-2024-39463.html
* https://www.suse.com/security/cve/CVE-2024-39494.html
* https://www.suse.com/security/cve/CVE-2024-40902.html
* https://www.suse.com/security/cve/CVE-2024-40937.html
* https://www.suse.com/security/cve/CVE-2024-40954.html
* https://www.suse.com/security/cve/CVE-2024-40956.html
* https://www.suse.com/security/cve/CVE-2024-40989.html
* https://www.suse.com/security/cve/CVE-2024-40994.html
* https://www.suse.com/security/cve/CVE-2024-41011.html
* https://www.suse.com/security/cve/CVE-2024-41012.html
* https://www.suse.com/security/cve/CVE-2024-41059.html
* https://www.suse.com/security/cve/CVE-2024-41069.html
* https://www.suse.com/security/cve/CVE-2024-41090.html
* https://www.suse.com/security/cve/CVE-2024-42093.html
* https://www.suse.com/security/cve/CVE-2024-42145.html
* https://www.suse.com/security/cve/CVE-2024-42230.html
* https://bugzilla.suse.com/show_bug.cgi?id=1156395
* https://bugzilla.suse.com/show_bug.cgi?id=1190336
* https://bugzilla.suse.com/show_bug.cgi?id=1191958
* https://bugzilla.suse.com/show_bug.cgi?id=1193454
* https://bugzilla.suse.com/show_bug.cgi?id=1193554
* https://bugzilla.suse.com/show_bug.cgi?id=1193787
* https://bugzilla.suse.com/show_bug.cgi?id=1193883
* https://bugzilla.suse.com/show_bug.cgi?id=1194324
* https://bugzilla.suse.com/show_bug.cgi?id=1194826
* https://bugzilla.suse.com/show_bug.cgi?id=1194869
* https://bugzilla.suse.com/show_bug.cgi?id=1195065
* https://bugzilla.suse.com/show_bug.cgi?id=1195254
* https://bugzilla.suse.com/show_bug.cgi?id=1195341
* https://bugzilla.suse.com/show_bug.cgi?id=1195349
* https://bugzilla.suse.com/show_bug.cgi?id=1195357
* https://bugzilla.suse.com/show_bug.cgi?id=1195668
* https://bugzilla.suse.com/show_bug.cgi?id=1195927
* https://bugzilla.suse.com/show_bug.cgi?id=1195957
* https://bugzilla.suse.com/show_bug.cgi?id=1196018
* https://bugzilla.suse.com/show_bug.cgi?id=1196746
* https://bugzilla.suse.com/show_bug.cgi?id=1196823
* https://bugzilla.suse.com/show_bug.cgi?id=1197146
* https://bugzilla.suse.com/show_bug.cgi?id=1197246
* https://bugzilla.suse.com/show_bug.cgi?id=1197762
* https://bugzilla.suse.com/show_bug.cgi?id=1197915
* https://bugzilla.suse.com/show_bug.cgi?id=1198014
* https://bugzilla.suse.com/show_bug.cgi?id=1199295
* https://bugzilla.suse.com/show_bug.cgi?id=1202346
* https://bugzilla.suse.com/show_bug.cgi?id=1202686
* https://bugzilla.suse.com/show_bug.cgi?id=1202767
* https://bugzilla.suse.com/show_bug.cgi?id=1202780
* https://bugzilla.suse.com/show_bug.cgi?id=1209636
* https://bugzilla.suse.com/show_bug.cgi?id=1213123
* https://bugzilla.suse.com/show_bug.cgi?id=1215587
* https://bugzilla.suse.com/show_bug.cgi?id=1216834
* https://bugzilla.suse.com/show_bug.cgi?id=1218820
* https://bugzilla.suse.com/show_bug.cgi?id=1220185
* https://bugzilla.suse.com/show_bug.cgi?id=1220186
* https://bugzilla.suse.com/show_bug.cgi?id=1220187
* https://bugzilla.suse.com/show_bug.cgi?id=1221044
* https://bugzilla.suse.com/show_bug.cgi?id=1222011
* https://bugzilla.suse.com/show_bug.cgi?id=1222728
* https://bugzilla.suse.com/show_bug.cgi?id=1222809
* https://bugzilla.suse.com/show_bug.cgi?id=1222810
* https://bugzilla.suse.com/show_bug.cgi?id=1223635
* https://bugzilla.suse.com/show_bug.cgi?id=1223863
* https://bugzilla.suse.com/show_bug.cgi?id=1224488
* https://bugzilla.suse.com/show_bug.cgi?id=1224495
* https://bugzilla.suse.com/show_bug.cgi?id=1224671
* https://bugzilla.suse.com/show_bug.cgi?id=1225573
* https://bugzilla.suse.com/show_bug.cgi?id=1225829
* https://bugzilla.suse.com/show_bug.cgi?id=1226168
* https://bugzilla.suse.com/show_bug.cgi?id=1226226
* https://bugzilla.suse.com/show_bug.cgi?id=1226519
* https://bugzilla.suse.com/show_bug.cgi?id=1226537
* https://bugzilla.suse.com/show_bug.cgi?id=1226539
* https://bugzilla.suse.com/show_bug.cgi?id=1226550
* https://bugzilla.suse.com/show_bug.cgi?id=1226553
* https://bugzilla.suse.com/show_bug.cgi?id=1226554
* https://bugzilla.suse.com/show_bug.cgi?id=1226556
* https://bugzilla.suse.com/show_bug.cgi?id=1226557
* https://bugzilla.suse.com/show_bug.cgi?id=1226558
* https://bugzilla.suse.com/show_bug.cgi?id=1226559
* https://bugzilla.suse.com/show_bug.cgi?id=1226561
* https://bugzilla.suse.com/show_bug.cgi?id=1226562
* https://bugzilla.suse.com/show_bug.cgi?id=1226563
* https://bugzilla.suse.com/show_bug.cgi?id=1226564
* https://bugzilla.suse.com/show_bug.cgi?id=1226567
* https://bugzilla.suse.com/show_bug.cgi?id=1226569
* https://bugzilla.suse.com/show_bug.cgi?id=1226572
* https://bugzilla.suse.com/show_bug.cgi?id=1226574
* https://bugzilla.suse.com/show_bug.cgi?id=1226575
* https://bugzilla.suse.com/show_bug.cgi?id=1226576
* https://bugzilla.suse.com/show_bug.cgi?id=1226577
* https://bugzilla.suse.com/show_bug.cgi?id=1226580
* https://bugzilla.suse.com/show_bug.cgi?id=1226583
* https://bugzilla.suse.com/show_bug.cgi?id=1226585
* https://bugzilla.suse.com/show_bug.cgi?id=1226587
* https://bugzilla.suse.com/show_bug.cgi?id=1226601
* https://bugzilla.suse.com/show_bug.cgi?id=1226602
* https://bugzilla.suse.com/show_bug.cgi?id=1226603
* https://bugzilla.suse.com/show_bug.cgi?id=1226607
* https://bugzilla.suse.com/show_bug.cgi?id=1226614
* https://bugzilla.suse.com/show_bug.cgi?id=1226617
* https://bugzilla.suse.com/show_bug.cgi?id=1226618
* https://bugzilla.suse.com/show_bug.cgi?id=1226619
* https://bugzilla.suse.com/show_bug.cgi?id=1226621
* https://bugzilla.suse.com/show_bug.cgi?id=1226624
* https://bugzilla.suse.com/show_bug.cgi?id=1226626
* https://bugzilla.suse.com/show_bug.cgi?id=1226628
* https://bugzilla.suse.com/show_bug.cgi?id=1226629
* https://bugzilla.suse.com/show_bug.cgi?id=1226643
* https://bugzilla.suse.com/show_bug.cgi?id=1226644
* https://bugzilla.suse.com/show_bug.cgi?id=1226645
* https://bugzilla.suse.com/show_bug.cgi?id=1226650
* https://bugzilla.suse.com/show_bug.cgi?id=1226653
* https://bugzilla.suse.com/show_bug.cgi?id=1226662
* https://bugzilla.suse.com/show_bug.cgi?id=1226669
* https://bugzilla.suse.com/show_bug.cgi?id=1226670
* https://bugzilla.suse.com/show_bug.cgi?id=1226672
* https://bugzilla.suse.com/show_bug.cgi?id=1226673
* https://bugzilla.suse.com/show_bug.cgi?id=1226674
* https://bugzilla.suse.com/show_bug.cgi?id=1226675
* https://bugzilla.suse.com/show_bug.cgi?id=1226679
* https://bugzilla.suse.com/show_bug.cgi?id=1226683
* https://bugzilla.suse.com/show_bug.cgi?id=1226685
* https://bugzilla.suse.com/show_bug.cgi?id=1226686
* https://bugzilla.suse.com/show_bug.cgi?id=1226690
* https://bugzilla.suse.com/show_bug.cgi?id=1226691
* https://bugzilla.suse.com/show_bug.cgi?id=1226692
* https://bugzilla.suse.com/show_bug.cgi?id=1226696
* https://bugzilla.suse.com/show_bug.cgi?id=1226697
* https://bugzilla.suse.com/show_bug.cgi?id=1226698
* https://bugzilla.suse.com/show_bug.cgi?id=1226699
* https://bugzilla.suse.com/show_bug.cgi?id=1226701
* https://bugzilla.suse.com/show_bug.cgi?id=1226702
* https://bugzilla.suse.com/show_bug.cgi?id=1226703
* https://bugzilla.suse.com/show_bug.cgi?id=1226705
* https://bugzilla.suse.com/show_bug.cgi?id=1226708
* https://bugzilla.suse.com/show_bug.cgi?id=1226709
* https://bugzilla.suse.com/show_bug.cgi?id=1226710
* https://bugzilla.suse.com/show_bug.cgi?id=1226711
* https://bugzilla.suse.com/show_bug.cgi?id=1226712
* https://bugzilla.suse.com/show_bug.cgi?id=1226713
* https://bugzilla.suse.com/show_bug.cgi?id=1226715
* https://bugzilla.suse.com/show_bug.cgi?id=1226716
* https://bugzilla.suse.com/show_bug.cgi?id=1226719
* https://bugzilla.suse.com/show_bug.cgi?id=1226720
* https://bugzilla.suse.com/show_bug.cgi?id=1226721
* https://bugzilla.suse.com/show_bug.cgi?id=1226732
* https://bugzilla.suse.com/show_bug.cgi?id=1226758
* https://bugzilla.suse.com/show_bug.cgi?id=1226762
* https://bugzilla.suse.com/show_bug.cgi?id=1226785
* https://bugzilla.suse.com/show_bug.cgi?id=1227090
* https://bugzilla.suse.com/show_bug.cgi?id=1227383
* https://bugzilla.suse.com/show_bug.cgi?id=1227487
* https://bugzilla.suse.com/show_bug.cgi?id=1227549
* https://bugzilla.suse.com/show_bug.cgi?id=1227716
* https://bugzilla.suse.com/show_bug.cgi?id=1227750
* https://bugzilla.suse.com/show_bug.cgi?id=1227764
* https://bugzilla.suse.com/show_bug.cgi?id=1227808
* https://bugzilla.suse.com/show_bug.cgi?id=1227810
* https://bugzilla.suse.com/show_bug.cgi?id=1227823
* https://bugzilla.suse.com/show_bug.cgi?id=1227829
* https://bugzilla.suse.com/show_bug.cgi?id=1227836
* https://bugzilla.suse.com/show_bug.cgi?id=1227917
* https://bugzilla.suse.com/show_bug.cgi?id=1227920
* https://bugzilla.suse.com/show_bug.cgi?id=1227921
* https://bugzilla.suse.com/show_bug.cgi?id=1227922
* https://bugzilla.suse.com/show_bug.cgi?id=1227923
* https://bugzilla.suse.com/show_bug.cgi?id=1227924
* https://bugzilla.suse.com/show_bug.cgi?id=1227925
* https://bugzilla.suse.com/show_bug.cgi?id=1227928
* https://bugzilla.suse.com/show_bug.cgi?id=1227931
* https://bugzilla.suse.com/show_bug.cgi?id=1227932
* https://bugzilla.suse.com/show_bug.cgi?id=1227933
* https://bugzilla.suse.com/show_bug.cgi?id=1227935
* https://bugzilla.suse.com/show_bug.cgi?id=1227938
* https://bugzilla.suse.com/show_bug.cgi?id=1227941
* https://bugzilla.suse.com/show_bug.cgi?id=1227942
* https://bugzilla.suse.com/show_bug.cgi?id=1227944
* https://bugzilla.suse.com/show_bug.cgi?id=1227945
* https://bugzilla.suse.com/show_bug.cgi?id=1227948
* https://bugzilla.suse.com/show_bug.cgi?id=1227949
* https://bugzilla.suse.com/show_bug.cgi?id=1227952
* https://bugzilla.suse.com/show_bug.cgi?id=1227953
* https://bugzilla.suse.com/show_bug.cgi?id=1227954
* https://bugzilla.suse.com/show_bug.cgi?id=1227956
* https://bugzilla.suse.com/show_bug.cgi?id=1227963
* https://bugzilla.suse.com/show_bug.cgi?id=1227964
* https://bugzilla.suse.com/show_bug.cgi?id=1227965
* https://bugzilla.suse.com/show_bug.cgi?id=1227968
* https://bugzilla.suse.com/show_bug.cgi?id=1227969
* https://bugzilla.suse.com/show_bug.cgi?id=1227970
* https://bugzilla.suse.com/show_bug.cgi?id=1227971
* https://bugzilla.suse.com/show_bug.cgi?id=1227972
* https://bugzilla.suse.com/show_bug.cgi?id=1227975
* https://bugzilla.suse.com/show_bug.cgi?id=1227976
* https://bugzilla.suse.com/show_bug.cgi?id=1227981
* https://bugzilla.suse.com/show_bug.cgi?id=1227982
* https://bugzilla.suse.com/show_bug.cgi?id=1227985
* https://bugzilla.suse.com/show_bug.cgi?id=1227986
* https://bugzilla.suse.com/show_bug.cgi?id=1227987
* https://bugzilla.suse.com/show_bug.cgi?id=1227988
* https://bugzilla.suse.com/show_bug.cgi?id=1227989
* https://bugzilla.suse.com/show_bug.cgi?id=1227990
* https://bugzilla.suse.com/show_bug.cgi?id=1227991
* https://bugzilla.suse.com/show_bug.cgi?id=1227993
* https://bugzilla.suse.com/show_bug.cgi?id=1227995
* https://bugzilla.suse.com/show_bug.cgi?id=1227996
* https://bugzilla.suse.com/show_bug.cgi?id=1227997
* https://bugzilla.suse.com/show_bug.cgi?id=1228000
* https://bugzilla.suse.com/show_bug.cgi?id=1228002
* https://bugzilla.suse.com/show_bug.cgi?id=1228004
* https://bugzilla.suse.com/show_bug.cgi?id=1228005
* https://bugzilla.suse.com/show_bug.cgi?id=1228006
* https://bugzilla.suse.com/show_bug.cgi?id=1228007
* https://bugzilla.suse.com/show_bug.cgi?id=1228008
* https://bugzilla.suse.com/show_bug.cgi?id=1228009
* https://bugzilla.suse.com/show_bug.cgi?id=1228010
* https://bugzilla.suse.com/show_bug.cgi?id=1228013
* https://bugzilla.suse.com/show_bug.cgi?id=1228014
* https://bugzilla.suse.com/show_bug.cgi?id=1228015
* https://bugzilla.suse.com/show_bug.cgi?id=1228019
* https://bugzilla.suse.com/show_bug.cgi?id=1228025
* https://bugzilla.suse.com/show_bug.cgi?id=1228028
* https://bugzilla.suse.com/show_bug.cgi?id=1228035
* https://bugzilla.suse.com/show_bug.cgi?id=1228037
* https://bugzilla.suse.com/show_bug.cgi?id=1228038
* https://bugzilla.suse.com/show_bug.cgi?id=1228039
* https://bugzilla.suse.com/show_bug.cgi?id=1228040
* https://bugzilla.suse.com/show_bug.cgi?id=1228045
* https://bugzilla.suse.com/show_bug.cgi?id=1228054
* https://bugzilla.suse.com/show_bug.cgi?id=1228055
* https://bugzilla.suse.com/show_bug.cgi?id=1228056
* https://bugzilla.suse.com/show_bug.cgi?id=1228060
* https://bugzilla.suse.com/show_bug.cgi?id=1228061
* https://bugzilla.suse.com/show_bug.cgi?id=1228062
* https://bugzilla.suse.com/show_bug.cgi?id=1228063
* https://bugzilla.suse.com/show_bug.cgi?id=1228064
* https://bugzilla.suse.com/show_bug.cgi?id=1228066
* https://bugzilla.suse.com/show_bug.cgi?id=1228114
* https://bugzilla.suse.com/show_bug.cgi?id=1228247
* https://bugzilla.suse.com/show_bug.cgi?id=1228328
* https://bugzilla.suse.com/show_bug.cgi?id=1228440
* https://bugzilla.suse.com/show_bug.cgi?id=1228561
* https://bugzilla.suse.com/show_bug.cgi?id=1228644
* https://bugzilla.suse.com/show_bug.cgi?id=1228680
* https://bugzilla.suse.com/show_bug.cgi?id=1228743
* https://bugzilla.suse.com/show_bug.cgi?id=1228801
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.suse.com/pipermail/suma-updates/attachments/20240815/9d946b55/attachment.htm>
More information about the suma-updates
mailing list