# Security update for the Linux Kernel Announcement ID: SUSE-SU-2024:2185-1 Rating: important References: * bsc#1065729 * bsc#1151927 * bsc#1152472 * bsc#1154353 * bsc#1156395 * bsc#1174585 * bsc#1176447 * bsc#1176774 * bsc#1176869 * bsc#1178134 * bsc#1181147 * bsc#1184631 * bsc#1185570 * bsc#1185589 * bsc#1185902 * bsc#1186885 * bsc#1187357 * bsc#1188616 * bsc#1188772 * bsc#1189883 * bsc#1190795 * bsc#1191452 * bsc#1192107 * bsc#1194288 * bsc#1194591 * bsc#1196956 * bsc#1197760 * bsc#1198029 * bsc#1199304 * bsc#1200619 * bsc#1203389 * bsc#1206646 * bsc#1209657 * bsc#1210335 * bsc#1210629 * bsc#1213476 * bsc#1215420 * bsc#1216702 * bsc#1217169 * bsc#1220137 * bsc#1220144 * bsc#1220754 * bsc#1220877 * bsc#1220960 * bsc#1221044 * bsc#1221113 * bsc#1221829 * bsc#1222251 * bsc#1222619 * bsc#1222838 * bsc#1222867 * bsc#1223084 * bsc#1223138 * bsc#1223384 * bsc#1223390 * bsc#1223512 * bsc#1223932 * bsc#1223934 * bsc#1224099 * bsc#1224174 * bsc#1224438 * bsc#1224482 * bsc#1224511 * bsc#1224592 * bsc#1224816 * bsc#1224826 * bsc#1224830 * bsc#1224831 * bsc#1224832 * bsc#1224834 * bsc#1224841 * bsc#1224842 * bsc#1224843 * bsc#1224844 * bsc#1224846 * bsc#1224849 * bsc#1224852 * bsc#1224853 * bsc#1224854 * bsc#1224859 * bsc#1224882 * bsc#1224886 * bsc#1224888 * bsc#1224889 * bsc#1224891 * bsc#1224892 * bsc#1224893 * bsc#1224899 * bsc#1224904 * bsc#1224907 * bsc#1224909 * bsc#1224916 * bsc#1224917 * bsc#1224922 * bsc#1224923 * bsc#1224924 * bsc#1224926 * bsc#1224928 * bsc#1224953 * bsc#1224954 * bsc#1224955 * bsc#1224957 * bsc#1224961 * bsc#1224963 * bsc#1224965 * bsc#1224966 * bsc#1224968 * bsc#1224981 * bsc#1224982 * bsc#1224983 * bsc#1224984 * bsc#1224987 * bsc#1224990 * bsc#1224993 * bsc#1224996 * bsc#1224997 * bsc#1225026 * bsc#1225030 * bsc#1225058 * bsc#1225060 * bsc#1225083 * bsc#1225084 * bsc#1225091 * bsc#1225112 * bsc#1225113 * bsc#1225128 * bsc#1225140 * bsc#1225143 * bsc#1225148 * bsc#1225155 * bsc#1225164 * bsc#1225177 * bsc#1225178 * bsc#1225181 * bsc#1225192 * bsc#1225193 * bsc#1225198 * bsc#1225201 * bsc#1225206 * bsc#1225207 * bsc#1225208 * bsc#1225214 * bsc#1225223 * bsc#1225224 * bsc#1225230 * bsc#1225232 * bsc#1225233 * bsc#1225237 * bsc#1225238 * bsc#1225243 * bsc#1225244 * bsc#1225247 * bsc#1225251 * bsc#1225252 * bsc#1225256 * bsc#1225261 * bsc#1225262 * bsc#1225263 * bsc#1225301 * bsc#1225303 * bsc#1225316 * bsc#1225318 * bsc#1225320 * bsc#1225321 * bsc#1225322 * bsc#1225326 * bsc#1225327 * bsc#1225328 * bsc#1225330 * bsc#1225333 * bsc#1225336 * bsc#1225341 * bsc#1225346 * bsc#1225351 * bsc#1225354 * bsc#1225355 * bsc#1225357 * bsc#1225358 * bsc#1225360 * bsc#1225361 * bsc#1225366 * bsc#1225367 * bsc#1225369 * bsc#1225370 * bsc#1225372 * bsc#1225374 * bsc#1225384 * bsc#1225386 * bsc#1225387 * bsc#1225390 * bsc#1225393 * bsc#1225400 * bsc#1225404 * bsc#1225405 * bsc#1225409 * bsc#1225411 * bsc#1225424 * bsc#1225427 * bsc#1225435 * bsc#1225437 * bsc#1225438 * bsc#1225439 * bsc#1225446 * bsc#1225447 * bsc#1225448 * bsc#1225450 * bsc#1225453 * bsc#1225455 * bsc#1225468 * bsc#1225499 * bsc#1225500 * bsc#1225508 * bsc#1225534 Cross-References: * CVE-2020-36788 * CVE-2021-3743 * CVE-2021-39698 * CVE-2021-43056 * CVE-2021-47104 * CVE-2021-47192 * CVE-2021-47200 * CVE-2021-47220 * CVE-2021-47227 * CVE-2021-47228 * CVE-2021-47229 * CVE-2021-47230 * CVE-2021-47231 * CVE-2021-47235 * CVE-2021-47236 * CVE-2021-47237 * CVE-2021-47239 * CVE-2021-47240 * CVE-2021-47241 * CVE-2021-47246 * CVE-2021-47252 * CVE-2021-47253 * CVE-2021-47254 * CVE-2021-47255 * CVE-2021-47258 * CVE-2021-47259 * CVE-2021-47260 * CVE-2021-47261 * CVE-2021-47263 * CVE-2021-47265 * CVE-2021-47267 * CVE-2021-47269 * CVE-2021-47270 * CVE-2021-47274 * CVE-2021-47275 * CVE-2021-47276 * CVE-2021-47280 * CVE-2021-47281 * CVE-2021-47284 * CVE-2021-47285 * CVE-2021-47288 * CVE-2021-47289 * CVE-2021-47296 * CVE-2021-47301 * CVE-2021-47302 * CVE-2021-47305 * CVE-2021-47307 * CVE-2021-47308 * CVE-2021-47314 * CVE-2021-47315 * CVE-2021-47320 * CVE-2021-47321 * CVE-2021-47323 * CVE-2021-47324 * CVE-2021-47329 * CVE-2021-47330 * CVE-2021-47332 * CVE-2021-47333 * CVE-2021-47334 * CVE-2021-47337 * CVE-2021-47338 * CVE-2021-47340 * CVE-2021-47341 * CVE-2021-47343 * CVE-2021-47344 * CVE-2021-47347 * CVE-2021-47348 * CVE-2021-47350 * CVE-2021-47353 * CVE-2021-47354 * CVE-2021-47356 * CVE-2021-47369 * CVE-2021-47375 * CVE-2021-47378 * CVE-2021-47381 * CVE-2021-47382 * CVE-2021-47383 * CVE-2021-47387 * CVE-2021-47388 * CVE-2021-47391 * CVE-2021-47392 * CVE-2021-47393 * CVE-2021-47395 * CVE-2021-47396 * CVE-2021-47399 * CVE-2021-47402 * CVE-2021-47404 * CVE-2021-47405 * CVE-2021-47409 * CVE-2021-47413 * CVE-2021-47416 * CVE-2021-47422 * CVE-2021-47423 * CVE-2021-47424 * CVE-2021-47425 * CVE-2021-47426 * CVE-2021-47428 * CVE-2021-47431 * CVE-2021-47434 * CVE-2021-47435 * CVE-2021-47436 * CVE-2021-47441 * CVE-2021-47442 * CVE-2021-47443 * CVE-2021-47444 * CVE-2021-47445 * CVE-2021-47451 * CVE-2021-47456 * CVE-2021-47458 * CVE-2021-47460 * CVE-2021-47464 * CVE-2021-47465 * CVE-2021-47468 * CVE-2021-47473 * CVE-2021-47478 * CVE-2021-47480 * CVE-2021-47482 * CVE-2021-47483 * CVE-2021-47485 * CVE-2021-47493 * CVE-2021-47494 * CVE-2021-47495 * CVE-2021-47496 * CVE-2021-47497 * CVE-2021-47498 * CVE-2021-47499 * CVE-2021-47500 * CVE-2021-47501 * CVE-2021-47502 * CVE-2021-47503 * CVE-2021-47505 * CVE-2021-47506 * CVE-2021-47507 * CVE-2021-47509 * CVE-2021-47511 * CVE-2021-47512 * CVE-2021-47516 * CVE-2021-47518 * CVE-2021-47521 * CVE-2021-47522 * CVE-2021-47523 * CVE-2021-47527 * CVE-2021-47535 * CVE-2021-47536 * CVE-2021-47538 * CVE-2021-47540 * CVE-2021-47541 * CVE-2021-47542 * CVE-2021-47549 * CVE-2021-47557 * CVE-2021-47562 * CVE-2021-47563 * CVE-2021-47565 * CVE-2022-1195 * CVE-2022-20132 * CVE-2022-48636 * CVE-2022-48673 * CVE-2022-48704 * CVE-2022-48710 * CVE-2023-0160 * CVE-2023-1829 * CVE-2023-2176 * CVE-2023-424 * CVE-2023-4244 * CVE-2023-47233 * CVE-2023-52433 * CVE-2023-52581 * CVE-2023-52591 * CVE-2023-52654 * CVE-2023-52655 * CVE-2023-52686 * CVE-2023-52840 * CVE-2023-52871 * CVE-2023-52880 * CVE-2023-6531 * CVE-2024-26581 * CVE-2024-26643 * CVE-2024-26828 * CVE-2024-26921 * CVE-2024-26925 * CVE-2024-26929 * CVE-2024-26930 * CVE-2024-27398 * CVE-2024-27413 * CVE-2024-35811 * CVE-2024-35895 * CVE-2024-35914 CVSS scores: * CVE-2020-36788 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2021-3743 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2021-3743 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2021-39698 ( SUSE ): 7.4 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2021-39698 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-43056 ( SUSE ): 6.8 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H * CVE-2021-43056 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47104 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2021-47200 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47220 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47227 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47228 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47229 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47230 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47231 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47235 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47236 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47237 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47239 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47240 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47241 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47246 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47252 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2021-47253 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47254 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47255 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47258 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47259 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47260 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47261 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47263 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2021-47265 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47267 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47269 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47270 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47274 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47275 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47276 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47280 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47281 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47284 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47285 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47288 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2021-47289 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47296 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47301 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47302 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47305 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47307 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47308 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47314 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47315 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47320 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2021-47321 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47323 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47324 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47329 ( SUSE ): 1.9 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47330 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47332 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47333 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47334 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2021-47337 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47338 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H * CVE-2021-47340 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47341 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47343 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2021-47344 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47347 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47348 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2021-47350 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47353 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47354 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2021-47356 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2021-47369 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47375 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47378 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47381 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47382 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47383 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47387 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47388 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47391 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47392 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47393 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47395 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47396 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47399 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47402 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47404 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H * CVE-2021-47405 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47409 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47413 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47416 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47422 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47423 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47424 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47425 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47426 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47428 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47431 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47434 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47435 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47441 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47442 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47443 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47445 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47451 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47456 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47458 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47464 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47465 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2021-47468 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47473 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47478 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2021-47480 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47482 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47483 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47485 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47493 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47494 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47495 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47496 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47497 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47498 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47499 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2021-47500 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47501 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47502 ( SUSE ): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H * CVE-2021-47503 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47505 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47506 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47507 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47509 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47511 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47512 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47516 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47516 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47518 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47518 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47521 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47521 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47522 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47522 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47523 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47535 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2021-47536 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2021-47538 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47540 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47540 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47541 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47541 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47542 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47542 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47549 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47557 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47562 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47563 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47565 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-1195 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-1195 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-20132 ( SUSE ): 4.9 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L * CVE-2022-20132 ( NVD ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2022-48636 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48673 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48673 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48704 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48710 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-0160 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-0160 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-1829 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-1829 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-2176 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-2176 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-4244 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-4244 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-47233 ( SUSE ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-47233 ( NVD ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52433 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52581 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52591 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-52654 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52686 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52840 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52871 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2023-52880 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6531 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6531 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26581 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26581 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26643 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26828 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H * CVE-2024-26921 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26925 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26929 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26929 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26930 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26930 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27398 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27413 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35811 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35895 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35914 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.3 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Availability Extension 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Live Patching 15-SP3 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 Business Critical Linux 15-SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Manager Proxy 4.2 * SUSE Manager Retail Branch Server 4.2 * SUSE Manager Server 4.2 An update that solves 187 vulnerabilities and has 26 security fixes can now be installed. ## Description: The SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2021-47378: Destroy cm id before destroy qp to avoid use after free (bsc#1225201). * CVE-2021-47496: Fix flipped sign in tls_err_abort() calls (bsc#1225354) * CVE-2021-47402: Protect fl_walk() with rcu (bsc#1225301) * CVE-2022-48673: kABI workarounds for struct smc_link (bsc#1223934). * CVE-2023-52871: Handle a second device without data corruption (bsc#1225534) * CVE-2024-26828: Fix underflow in parse_server_interfaces() (bsc#1223084). * CVE-2021-47497: Fixed shift-out-of-bound (UBSAN) with byte size cells (bsc#1225355). * CVE-2021-47500: Fixed trigger reference couting (bsc#1225360). * CVE-2024-27413: Fix incorrect allocation size (bsc#1224438). * CVE-2021-47383: Fiedx out-of-bound vmalloc access in imageblit (bsc#1225208). * CVE-2021-47511: Fixed negative period/buffer sizes (bsc#1225411). * CVE-2023-52840: Fix use after free in rmi_unregister_function() (bsc#1224928). * CVE-2021-47261: Fix initializing CQ fragments buffer (bsc#1224954) * CVE-2021-47254: Fix use-after-free in gfs2_glock_shrink_scan (bsc#1224888). * CVE-2024-27398: Fixed use-after-free bugs caused by sco_sock_timeout (bsc#1224174). * CVE-2024-26921: Preserve kabi for sk_buff (bsc#1223138). * CVE-2023-52655: Check packet for fixup for true limit (bsc#1217169). * CVE-2023-4244: Fixed a use-after-free in the nf_tables component, which could be exploited to achieve local privilege escalation (bsc#1215420). * CVE-2023-4244: Fixed a use-after-free in the nf_tables component, which could be exploited to achieve local privilege escalation (bsc#1215420). * CVE-2023-1829: Fixed a use-after-free vulnerability in the control index filter (tcindex) (bsc#1210335). * CVE-2023-52686: Fix a null pointer in opal_event_init() (bsc#1065729). The following non-security bugs were fixed: * af_unix: annote lockless accesses to unix_tot_inflight & gc_in_progress (bsc#1223384). * af_unix: Do not use atomic ops for unix_sk(sk)->inflight (bsc#1223384). * af_unix: Replace BUG_ON() with WARN_ON_ONCE() (bsc#1223384). * btrfs: do not start relocation until in progress drops are done (bsc#1222251). * btrfs: do not start relocation until in progress drops are done (bsc#1222251). * cifs: add missing spinlock around tcon refcount (bsc#1213476). * cifs: avoid dup prefix path in dfs_get_automount_devname() (bsc#1213476). * cifs: avoid race conditions with parallel reconnects (bsc#1213476). * cifs: avoid re-lookups in dfs_cache_find() (bsc#1213476). * cifs: avoid use of global locks for high contention data (bsc#1213476). * cifs: check only tcon status on tcon related functions (bsc#1213476). * cifs: do all necessary checks for credits within or before locking (bsc#1213476). * cifs: do not block in dfs_cache_noreq_update_tgthint() (bsc#1213476). * cifs: do not refresh cached referrals from unactive mounts (bsc#1213476). * cifs: do not take exclusive lock for updating target hints (bsc#1213476). * cifs: fix confusing debug message (bsc#1213476). * cifs: fix missing unload_nls() in smb2_reconnect() (bsc#1213476). * cifs: fix potential deadlock in cache_refresh_path() (bsc#1213476). * cifs: fix refresh of cached referrals (bsc#1213476). * cifs: fix return of uninitialized rc in dfs_cache_update_tgthint() (bsc#1213476). * cifs: fix source pathname comparison of dfs supers (bsc#1213476). * cifs: fix status checks in cifs_tree_connect (bsc#1213476). * cifs: fix use-after-free bug in refresh_cache_worker() (bsc#1213476). * cifs: get rid of dns resolve worker (bsc#1213476). * cifs: get rid of mount options string parsing (bsc#1213476). * cifs: handle cache lookup errors different than -ENOENT (bsc#1213476). * cifs: ignore ipc reconnect failures during dfs failover (bsc#1213476). * cifs: match even the scope id for ipv6 addresses (bsc#1213476). * cifs: optimize reconnect of nested links (bsc#1213476). * cifs: prevent data race in smb2_reconnect() (bsc#1213476). * cifs: refresh root referrals (bsc#1213476). * cifs: remove duplicate code in __refresh_tcon() (bsc#1213476). * cifs: remove unused function (bsc#1213476). * cifs: remove unused smb3_fs_context::mount_options (bsc#1213476). * cifs: return DFS root session id in DebugData (bsc#1213476). * cifs: reuse cifs_match_ipaddr for comparison of dstaddr too (bsc#1213476). * cifs: set correct ipc status after initial tree connect (bsc#1213476). * cifs: set correct status of tcon ipc when reconnecting (bsc#1213476). * cifs: set correct tcon status after initial tree connect (bsc#1213476). * cifs: set DFS root session in cifs_get_smb_ses() (bsc#1213476). * cifs: set resolved ip in sockaddr (bsc#1213476). * cifs: share dfs connections and supers (bsc#1213476). * cifs: split out ses and tcon retrieval from mount_get_conns() (bsc#1213476). * cifs: use fs_context for automounts (bsc#1213476). * cifs: use origin fullpath for automounts (bsc#1213476). * cifs: use tcon allocation functions even for dummy tcon (bsc#1213476). * netfilter: nf_tables: defer gc run if previous batch is still pending (git- fixes). * netfilter: nf_tables: fix GC transaction races with netns and netlink event exit path (git-fixes). * netfilter: nf_tables: fix kdoc warnings after gc rework (git-fixes). * netfilter: nf_tables: fix memleak when more than 255 elements expired (git- fixes). * netfilter: nf_tables: GC transaction race with abort path (git-fixes). * netfilter: nf_tables: GC transaction race with netns dismantle (git-fixes). * netfilter: nf_tables: mark newset as dead on transaction abort (git-fixes). * netfilter: nf_tables: mark set as dead when unbinding anonymous set with timeout (git-fixes). * netfilter: nf_tables: nft_set_rbtree: fix spurious insertion failure (git- fixes). * netfilter: nf_tables: release mutex after nft_gc_seq_end from abort path (git-fixes). * netfilter: nf_tables: skip dead set elements in netlink dump (git-fixes). * netfilter: nf_tables: use correct lock to protect gc_list (git-fixes). * netfilter: nft_set_hash: try later when GC hits EAGAIN on iteration (git- fixes). * netfilter: nft_set_rbtree: Add missing expired checks (git-fixes). * netfilter: nft_set_rbtree: bogus lookup/get on consecutive elements in named sets (git-fixes). * netfilter: nft_set_rbtree: Detect partial overlap with start endpoint match (git-fixes). * netfilter: nft_set_rbtree: Detect partial overlaps on insertion (git-fixes). * netfilter: nft_set_rbtree: Do not account for expired elements on insertion (git-fixes). * netfilter: nft_set_rbtree: Drop spurious condition for overlap detection on insertion (git-fixes). * netfilter: nft_set_rbtree: fix null deref on element insertion (git-fixes). * netfilter: nft_set_rbtree: fix overlap expiration walk (git-fixes). * netfilter: nft_set_rbtree: Handle outcomes of tree rotations in overlap detection (git-fixes). * netfilter: nft_set_rbtree: Introduce and use nft_rbtree_interval_start() (git-fixes). * netfilter: nft_set_rbtree: overlap detection with element re-addition after deletion (git-fixes). * netfilter: nft_set_rbtree: skip elements in transaction from garbage collection (git-fixes). * netfilter: nft_set_rbtree: skip end interval element from gc (git-fixes). * netfilter: nft_set_rbtree: skip sync GC for new elements in this transaction (git-fixes). * netfilter: nft_set_rbtree: Switch to node list walk for overlap detection (git-fixes). * netfilter: nft_set_rbtree: use read spinlock to avoid datapath contention (git-fixes). * NFC: nxp: add NXP1002 (bsc#1185589). * PCI: rpaphp: Add MODULE_DESCRIPTION (bsc#1176869 ltc#188243). * smb: client: fix dfs link mount against w2k8 (git-fixes). * smb: client: fix null auth (bsc#1213476). * smb: client: set correct id, uid and cruid for multiuser automounts (git- fixes). * x86/xen: Drop USERGS_SYSRET64 paravirt call (git-fixes). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2024-2185=1 * SUSE Linux Enterprise Live Patching 15-SP3 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP3-2024-2185=1 * SUSE Linux Enterprise High Availability Extension 15 SP3 zypper in -t patch SUSE-SLE-Product-HA-15-SP3-2024-2185=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-2185=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-2185=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-2185=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-2185=1 * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-2185=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-2185=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-2185=1 ## Package List: * openSUSE Leap 15.3 (noarch nosrc) * kernel-docs-5.3.18-150300.59.164.1 * openSUSE Leap 15.3 (noarch) * kernel-macros-5.3.18-150300.59.164.1 * kernel-source-5.3.18-150300.59.164.1 * kernel-source-vanilla-5.3.18-150300.59.164.1 * kernel-devel-5.3.18-150300.59.164.1 * kernel-docs-html-5.3.18-150300.59.164.1 * openSUSE Leap 15.3 (nosrc ppc64le x86_64) * kernel-kvmsmall-5.3.18-150300.59.164.1 * kernel-debug-5.3.18-150300.59.164.1 * openSUSE Leap 15.3 (ppc64le x86_64) * kernel-kvmsmall-devel-5.3.18-150300.59.164.1 * kernel-debug-devel-5.3.18-150300.59.164.1 * kernel-debug-livepatch-devel-5.3.18-150300.59.164.1 * kernel-kvmsmall-debugsource-5.3.18-150300.59.164.1 * kernel-debug-debugsource-5.3.18-150300.59.164.1 * kernel-debug-debuginfo-5.3.18-150300.59.164.1 * kernel-debug-devel-debuginfo-5.3.18-150300.59.164.1 * kernel-kvmsmall-devel-debuginfo-5.3.18-150300.59.164.1 * kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.164.1 * kernel-kvmsmall-debuginfo-5.3.18-150300.59.164.1 * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64) * cluster-md-kmp-default-debuginfo-5.3.18-150300.59.164.1 * kernel-obs-build-5.3.18-150300.59.164.1 * dlm-kmp-default-debuginfo-5.3.18-150300.59.164.1 * kernel-default-debugsource-5.3.18-150300.59.164.1 * cluster-md-kmp-default-5.3.18-150300.59.164.1 * ocfs2-kmp-default-5.3.18-150300.59.164.1 * ocfs2-kmp-default-debuginfo-5.3.18-150300.59.164.1 * gfs2-kmp-default-debuginfo-5.3.18-150300.59.164.1 * kernel-obs-build-debugsource-5.3.18-150300.59.164.1 * kernel-default-debuginfo-5.3.18-150300.59.164.1 * kernel-default-livepatch-devel-5.3.18-150300.59.164.1 * kernel-default-devel-debuginfo-5.3.18-150300.59.164.1 * kernel-default-base-5.3.18-150300.59.164.1.150300.18.96.1 * dlm-kmp-default-5.3.18-150300.59.164.1 * kernel-default-livepatch-5.3.18-150300.59.164.1 * kernel-default-extra-5.3.18-150300.59.164.1 * kernel-default-optional-5.3.18-150300.59.164.1 * kernel-syms-5.3.18-150300.59.164.1 * kselftests-kmp-default-5.3.18-150300.59.164.1 * gfs2-kmp-default-5.3.18-150300.59.164.1 * kernel-default-optional-debuginfo-5.3.18-150300.59.164.1 * kselftests-kmp-default-debuginfo-5.3.18-150300.59.164.1 * reiserfs-kmp-default-5.3.18-150300.59.164.1 * kernel-default-devel-5.3.18-150300.59.164.1 * kernel-default-base-rebuild-5.3.18-150300.59.164.1.150300.18.96.1 * reiserfs-kmp-default-debuginfo-5.3.18-150300.59.164.1 * kernel-default-extra-debuginfo-5.3.18-150300.59.164.1 * kernel-obs-qa-5.3.18-150300.59.164.1 * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-5.3.18-150300.59.164.1 * openSUSE Leap 15.3 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP3_Update_45-debugsource-1-150300.7.3.1 * kernel-livepatch-5_3_18-150300_59_164-default-1-150300.7.3.1 * kernel-livepatch-5_3_18-150300_59_164-default-debuginfo-1-150300.7.3.1 * openSUSE Leap 15.3 (x86_64) * kernel-livepatch-5_3_18-150300_59_164-preempt-debuginfo-1-150300.7.3.1 * kernel-livepatch-5_3_18-150300_59_164-preempt-1-150300.7.3.1 * openSUSE Leap 15.3 (aarch64 x86_64) * cluster-md-kmp-preempt-5.3.18-150300.59.164.1 * gfs2-kmp-preempt-debuginfo-5.3.18-150300.59.164.1 * ocfs2-kmp-preempt-5.3.18-150300.59.164.1 * kselftests-kmp-preempt-debuginfo-5.3.18-150300.59.164.1 * kernel-preempt-debugsource-5.3.18-150300.59.164.1 * gfs2-kmp-preempt-5.3.18-150300.59.164.1 * kselftests-kmp-preempt-5.3.18-150300.59.164.1 * cluster-md-kmp-preempt-debuginfo-5.3.18-150300.59.164.1 * kernel-preempt-debuginfo-5.3.18-150300.59.164.1 * reiserfs-kmp-preempt-debuginfo-5.3.18-150300.59.164.1 * kernel-preempt-optional-5.3.18-150300.59.164.1 * kernel-preempt-extra-5.3.18-150300.59.164.1 * dlm-kmp-preempt-5.3.18-150300.59.164.1 * kernel-preempt-devel-debuginfo-5.3.18-150300.59.164.1 * kernel-preempt-optional-debuginfo-5.3.18-150300.59.164.1 * kernel-preempt-devel-5.3.18-150300.59.164.1 * kernel-preempt-livepatch-devel-5.3.18-150300.59.164.1 * reiserfs-kmp-preempt-5.3.18-150300.59.164.1 * ocfs2-kmp-preempt-debuginfo-5.3.18-150300.59.164.1 * dlm-kmp-preempt-debuginfo-5.3.18-150300.59.164.1 * kernel-preempt-extra-debuginfo-5.3.18-150300.59.164.1 * openSUSE Leap 15.3 (aarch64 nosrc x86_64) * kernel-preempt-5.3.18-150300.59.164.1 * openSUSE Leap 15.3 (nosrc s390x) * kernel-zfcpdump-5.3.18-150300.59.164.1 * openSUSE Leap 15.3 (s390x) * kernel-zfcpdump-debugsource-5.3.18-150300.59.164.1 * kernel-zfcpdump-debuginfo-5.3.18-150300.59.164.1 * openSUSE Leap 15.3 (nosrc) * dtb-aarch64-5.3.18-150300.59.164.1 * openSUSE Leap 15.3 (aarch64) * dtb-rockchip-5.3.18-150300.59.164.1 * dtb-sprd-5.3.18-150300.59.164.1 * dtb-hisilicon-5.3.18-150300.59.164.1 * dtb-arm-5.3.18-150300.59.164.1 * kernel-64kb-debugsource-5.3.18-150300.59.164.1 * kernel-64kb-livepatch-devel-5.3.18-150300.59.164.1 * reiserfs-kmp-64kb-5.3.18-150300.59.164.1 * dtb-freescale-5.3.18-150300.59.164.1 * kernel-64kb-optional-5.3.18-150300.59.164.1 * ocfs2-kmp-64kb-debuginfo-5.3.18-150300.59.164.1 * dtb-apm-5.3.18-150300.59.164.1 * dtb-exynos-5.3.18-150300.59.164.1 * dtb-socionext-5.3.18-150300.59.164.1 * kernel-64kb-optional-debuginfo-5.3.18-150300.59.164.1 * kernel-64kb-devel-debuginfo-5.3.18-150300.59.164.1 * dtb-amd-5.3.18-150300.59.164.1 * dlm-kmp-64kb-debuginfo-5.3.18-150300.59.164.1 * dtb-qcom-5.3.18-150300.59.164.1 * dtb-marvell-5.3.18-150300.59.164.1 * dtb-mediatek-5.3.18-150300.59.164.1 * dtb-altera-5.3.18-150300.59.164.1 * dtb-broadcom-5.3.18-150300.59.164.1 * dtb-zte-5.3.18-150300.59.164.1 * kernel-64kb-debuginfo-5.3.18-150300.59.164.1 * ocfs2-kmp-64kb-5.3.18-150300.59.164.1 * kselftests-kmp-64kb-5.3.18-150300.59.164.1 * dlm-kmp-64kb-5.3.18-150300.59.164.1 * gfs2-kmp-64kb-5.3.18-150300.59.164.1 * kernel-64kb-devel-5.3.18-150300.59.164.1 * dtb-cavium-5.3.18-150300.59.164.1 * kselftests-kmp-64kb-debuginfo-5.3.18-150300.59.164.1 * dtb-renesas-5.3.18-150300.59.164.1 * dtb-xilinx-5.3.18-150300.59.164.1 * reiserfs-kmp-64kb-debuginfo-5.3.18-150300.59.164.1 * cluster-md-kmp-64kb-5.3.18-150300.59.164.1 * kernel-64kb-extra-5.3.18-150300.59.164.1 * gfs2-kmp-64kb-debuginfo-5.3.18-150300.59.164.1 * cluster-md-kmp-64kb-debuginfo-5.3.18-150300.59.164.1 * dtb-nvidia-5.3.18-150300.59.164.1 * dtb-amlogic-5.3.18-150300.59.164.1 * kernel-64kb-extra-debuginfo-5.3.18-150300.59.164.1 * dtb-al-5.3.18-150300.59.164.1 * dtb-lg-5.3.18-150300.59.164.1 * dtb-allwinner-5.3.18-150300.59.164.1 * openSUSE Leap 15.3 (aarch64 nosrc) * kernel-64kb-5.3.18-150300.59.164.1 * SUSE Linux Enterprise Live Patching 15-SP3 (nosrc) * kernel-default-5.3.18-150300.59.164.1 * SUSE Linux Enterprise Live Patching 15-SP3 (ppc64le s390x x86_64) * kernel-default-debuginfo-5.3.18-150300.59.164.1 * kernel-default-livepatch-devel-5.3.18-150300.59.164.1 * kernel-default-debugsource-5.3.18-150300.59.164.1 * kernel-livepatch-5_3_18-150300_59_164-default-1-150300.7.3.1 * kernel-default-livepatch-5.3.18-150300.59.164.1 * SUSE Linux Enterprise High Availability Extension 15 SP3 (aarch64 ppc64le s390x x86_64) * cluster-md-kmp-default-debuginfo-5.3.18-150300.59.164.1 * kernel-default-debuginfo-5.3.18-150300.59.164.1 * dlm-kmp-default-debuginfo-5.3.18-150300.59.164.1 * dlm-kmp-default-5.3.18-150300.59.164.1 * kernel-default-debugsource-5.3.18-150300.59.164.1 * cluster-md-kmp-default-5.3.18-150300.59.164.1 * gfs2-kmp-default-5.3.18-150300.59.164.1 * ocfs2-kmp-default-5.3.18-150300.59.164.1 * ocfs2-kmp-default-debuginfo-5.3.18-150300.59.164.1 * gfs2-kmp-default-debuginfo-5.3.18-150300.59.164.1 * SUSE Linux Enterprise High Availability Extension 15 SP3 (nosrc) * kernel-default-5.3.18-150300.59.164.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 nosrc) * kernel-64kb-5.3.18-150300.59.164.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64) * kernel-64kb-devel-debuginfo-5.3.18-150300.59.164.1 * kernel-64kb-debuginfo-5.3.18-150300.59.164.1 * kernel-64kb-debugsource-5.3.18-150300.59.164.1 * kernel-64kb-devel-5.3.18-150300.59.164.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 nosrc x86_64) * kernel-preempt-5.3.18-150300.59.164.1 * kernel-default-5.3.18-150300.59.164.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * kernel-obs-build-5.3.18-150300.59.164.1 * kernel-default-debuginfo-5.3.18-150300.59.164.1 * kernel-default-devel-debuginfo-5.3.18-150300.59.164.1 * kernel-default-base-5.3.18-150300.59.164.1.150300.18.96.1 * kernel-default-debugsource-5.3.18-150300.59.164.1 * kernel-preempt-debuginfo-5.3.18-150300.59.164.1 * reiserfs-kmp-default-debuginfo-5.3.18-150300.59.164.1 * kernel-preempt-devel-5.3.18-150300.59.164.1 * kernel-syms-5.3.18-150300.59.164.1 * reiserfs-kmp-default-5.3.18-150300.59.164.1 * kernel-preempt-devel-debuginfo-5.3.18-150300.59.164.1 * kernel-default-devel-5.3.18-150300.59.164.1 * kernel-preempt-debugsource-5.3.18-150300.59.164.1 * kernel-obs-build-debugsource-5.3.18-150300.59.164.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * kernel-source-5.3.18-150300.59.164.1 * kernel-macros-5.3.18-150300.59.164.1 * kernel-devel-5.3.18-150300.59.164.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch nosrc) * kernel-docs-5.3.18-150300.59.164.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 nosrc) * kernel-64kb-5.3.18-150300.59.164.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64) * kernel-64kb-devel-debuginfo-5.3.18-150300.59.164.1 * kernel-64kb-debuginfo-5.3.18-150300.59.164.1 * kernel-64kb-debugsource-5.3.18-150300.59.164.1 * kernel-64kb-devel-5.3.18-150300.59.164.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-5.3.18-150300.59.164.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * kernel-obs-build-5.3.18-150300.59.164.1 * kernel-default-debuginfo-5.3.18-150300.59.164.1 * kernel-default-devel-debuginfo-5.3.18-150300.59.164.1 * kernel-default-base-5.3.18-150300.59.164.1.150300.18.96.1 * kernel-default-debugsource-5.3.18-150300.59.164.1 * reiserfs-kmp-default-debuginfo-5.3.18-150300.59.164.1 * kernel-syms-5.3.18-150300.59.164.1 * reiserfs-kmp-default-5.3.18-150300.59.164.1 * kernel-default-devel-5.3.18-150300.59.164.1 * kernel-obs-build-debugsource-5.3.18-150300.59.164.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch) * kernel-source-5.3.18-150300.59.164.1 * kernel-macros-5.3.18-150300.59.164.1 * kernel-devel-5.3.18-150300.59.164.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch nosrc) * kernel-docs-5.3.18-150300.59.164.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 nosrc x86_64) * kernel-preempt-5.3.18-150300.59.164.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 x86_64) * kernel-preempt-devel-debuginfo-5.3.18-150300.59.164.1 * kernel-preempt-debuginfo-5.3.18-150300.59.164.1 * kernel-preempt-debugsource-5.3.18-150300.59.164.1 * kernel-preempt-devel-5.3.18-150300.59.164.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (nosrc s390x) * kernel-zfcpdump-5.3.18-150300.59.164.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (s390x) * kernel-zfcpdump-debugsource-5.3.18-150300.59.164.1 * kernel-zfcpdump-debuginfo-5.3.18-150300.59.164.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (nosrc ppc64le x86_64) * kernel-default-5.3.18-150300.59.164.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * kernel-obs-build-5.3.18-150300.59.164.1 * kernel-default-debuginfo-5.3.18-150300.59.164.1 * kernel-default-devel-debuginfo-5.3.18-150300.59.164.1 * kernel-default-base-5.3.18-150300.59.164.1.150300.18.96.1 * kernel-default-debugsource-5.3.18-150300.59.164.1 * reiserfs-kmp-default-debuginfo-5.3.18-150300.59.164.1 * kernel-syms-5.3.18-150300.59.164.1 * reiserfs-kmp-default-5.3.18-150300.59.164.1 * kernel-default-devel-5.3.18-150300.59.164.1 * kernel-obs-build-debugsource-5.3.18-150300.59.164.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * kernel-source-5.3.18-150300.59.164.1 * kernel-macros-5.3.18-150300.59.164.1 * kernel-devel-5.3.18-150300.59.164.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch nosrc) * kernel-docs-5.3.18-150300.59.164.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (nosrc x86_64) * kernel-preempt-5.3.18-150300.59.164.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (x86_64) * kernel-preempt-devel-debuginfo-5.3.18-150300.59.164.1 * kernel-preempt-debuginfo-5.3.18-150300.59.164.1 * kernel-preempt-debugsource-5.3.18-150300.59.164.1 * kernel-preempt-devel-5.3.18-150300.59.164.1 * SUSE Enterprise Storage 7.1 (aarch64 nosrc) * kernel-64kb-5.3.18-150300.59.164.1 * SUSE Enterprise Storage 7.1 (aarch64) * kernel-64kb-devel-debuginfo-5.3.18-150300.59.164.1 * kernel-64kb-debuginfo-5.3.18-150300.59.164.1 * kernel-64kb-debugsource-5.3.18-150300.59.164.1 * kernel-64kb-devel-5.3.18-150300.59.164.1 * SUSE Enterprise Storage 7.1 (aarch64 nosrc x86_64) * kernel-preempt-5.3.18-150300.59.164.1 * kernel-default-5.3.18-150300.59.164.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * kernel-obs-build-5.3.18-150300.59.164.1 * kernel-default-debuginfo-5.3.18-150300.59.164.1 * kernel-default-devel-debuginfo-5.3.18-150300.59.164.1 * kernel-default-base-5.3.18-150300.59.164.1.150300.18.96.1 * kernel-default-debugsource-5.3.18-150300.59.164.1 * kernel-preempt-debuginfo-5.3.18-150300.59.164.1 * reiserfs-kmp-default-debuginfo-5.3.18-150300.59.164.1 * kernel-preempt-devel-5.3.18-150300.59.164.1 * kernel-syms-5.3.18-150300.59.164.1 * reiserfs-kmp-default-5.3.18-150300.59.164.1 * kernel-preempt-devel-debuginfo-5.3.18-150300.59.164.1 * kernel-default-devel-5.3.18-150300.59.164.1 * kernel-preempt-debugsource-5.3.18-150300.59.164.1 * kernel-obs-build-debugsource-5.3.18-150300.59.164.1 * SUSE Enterprise Storage 7.1 (noarch) * kernel-source-5.3.18-150300.59.164.1 * kernel-macros-5.3.18-150300.59.164.1 * kernel-devel-5.3.18-150300.59.164.1 * SUSE Enterprise Storage 7.1 (noarch nosrc) * kernel-docs-5.3.18-150300.59.164.1 * SUSE Linux Enterprise Micro 5.1 (aarch64 nosrc s390x x86_64) * kernel-default-5.3.18-150300.59.164.1 * SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64) * kernel-default-debuginfo-5.3.18-150300.59.164.1 * kernel-default-base-5.3.18-150300.59.164.1.150300.18.96.1 * kernel-default-debugsource-5.3.18-150300.59.164.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 nosrc s390x x86_64) * kernel-default-5.3.18-150300.59.164.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 x86_64) * kernel-default-base-5.3.18-150300.59.164.1.150300.18.96.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * kernel-default-debuginfo-5.3.18-150300.59.164.1 * kernel-default-debugsource-5.3.18-150300.59.164.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 nosrc s390x x86_64) * kernel-default-5.3.18-150300.59.164.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 x86_64) * kernel-default-base-5.3.18-150300.59.164.1.150300.18.96.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * kernel-default-debuginfo-5.3.18-150300.59.164.1 * kernel-default-debugsource-5.3.18-150300.59.164.1 ## References: * https://www.suse.com/security/cve/CVE-2020-36788.html * https://www.suse.com/security/cve/CVE-2021-3743.html * https://www.suse.com/security/cve/CVE-2021-39698.html * https://www.suse.com/security/cve/CVE-2021-43056.html * https://www.suse.com/security/cve/CVE-2021-47104.html * https://www.suse.com/security/cve/CVE-2021-47192.html * https://www.suse.com/security/cve/CVE-2021-47200.html * https://www.suse.com/security/cve/CVE-2021-47220.html * https://www.suse.com/security/cve/CVE-2021-47227.html * https://www.suse.com/security/cve/CVE-2021-47228.html * https://www.suse.com/security/cve/CVE-2021-47229.html * https://www.suse.com/security/cve/CVE-2021-47230.html * https://www.suse.com/security/cve/CVE-2021-47231.html * https://www.suse.com/security/cve/CVE-2021-47235.html * https://www.suse.com/security/cve/CVE-2021-47236.html * https://www.suse.com/security/cve/CVE-2021-47237.html * https://www.suse.com/security/cve/CVE-2021-47239.html * https://www.suse.com/security/cve/CVE-2021-47240.html * https://www.suse.com/security/cve/CVE-2021-47241.html * https://www.suse.com/security/cve/CVE-2021-47246.html * https://www.suse.com/security/cve/CVE-2021-47252.html * https://www.suse.com/security/cve/CVE-2021-47253.html * https://www.suse.com/security/cve/CVE-2021-47254.html * https://www.suse.com/security/cve/CVE-2021-47255.html * https://www.suse.com/security/cve/CVE-2021-47258.html * https://www.suse.com/security/cve/CVE-2021-47259.html * https://www.suse.com/security/cve/CVE-2021-47260.html * https://www.suse.com/security/cve/CVE-2021-47261.html * https://www.suse.com/security/cve/CVE-2021-47263.html * https://www.suse.com/security/cve/CVE-2021-47265.html * https://www.suse.com/security/cve/CVE-2021-47267.html * https://www.suse.com/security/cve/CVE-2021-47269.html * https://www.suse.com/security/cve/CVE-2021-47270.html * https://www.suse.com/security/cve/CVE-2021-47274.html * https://www.suse.com/security/cve/CVE-2021-47275.html * https://www.suse.com/security/cve/CVE-2021-47276.html * https://www.suse.com/security/cve/CVE-2021-47280.html * https://www.suse.com/security/cve/CVE-2021-47281.html * https://www.suse.com/security/cve/CVE-2021-47284.html * https://www.suse.com/security/cve/CVE-2021-47285.html * https://www.suse.com/security/cve/CVE-2021-47288.html * https://www.suse.com/security/cve/CVE-2021-47289.html * https://www.suse.com/security/cve/CVE-2021-47296.html * https://www.suse.com/security/cve/CVE-2021-47301.html * https://www.suse.com/security/cve/CVE-2021-47302.html * https://www.suse.com/security/cve/CVE-2021-47305.html * https://www.suse.com/security/cve/CVE-2021-47307.html * https://www.suse.com/security/cve/CVE-2021-47308.html * https://www.suse.com/security/cve/CVE-2021-47314.html * https://www.suse.com/security/cve/CVE-2021-47315.html * https://www.suse.com/security/cve/CVE-2021-47320.html * https://www.suse.com/security/cve/CVE-2021-47321.html * https://www.suse.com/security/cve/CVE-2021-47323.html * https://www.suse.com/security/cve/CVE-2021-47324.html * https://www.suse.com/security/cve/CVE-2021-47329.html * https://www.suse.com/security/cve/CVE-2021-47330.html * https://www.suse.com/security/cve/CVE-2021-47332.html * https://www.suse.com/security/cve/CVE-2021-47333.html * https://www.suse.com/security/cve/CVE-2021-47334.html * https://www.suse.com/security/cve/CVE-2021-47337.html * https://www.suse.com/security/cve/CVE-2021-47338.html * https://www.suse.com/security/cve/CVE-2021-47340.html * https://www.suse.com/security/cve/CVE-2021-47341.html * https://www.suse.com/security/cve/CVE-2021-47343.html * https://www.suse.com/security/cve/CVE-2021-47344.html * https://www.suse.com/security/cve/CVE-2021-47347.html * https://www.suse.com/security/cve/CVE-2021-47348.html * https://www.suse.com/security/cve/CVE-2021-47350.html * https://www.suse.com/security/cve/CVE-2021-47353.html * https://www.suse.com/security/cve/CVE-2021-47354.html * https://www.suse.com/security/cve/CVE-2021-47356.html * https://www.suse.com/security/cve/CVE-2021-47369.html * https://www.suse.com/security/cve/CVE-2021-47375.html * https://www.suse.com/security/cve/CVE-2021-47378.html * https://www.suse.com/security/cve/CVE-2021-47381.html * https://www.suse.com/security/cve/CVE-2021-47382.html * https://www.suse.com/security/cve/CVE-2021-47383.html * https://www.suse.com/security/cve/CVE-2021-47387.html * https://www.suse.com/security/cve/CVE-2021-47388.html * https://www.suse.com/security/cve/CVE-2021-47391.html * https://www.suse.com/security/cve/CVE-2021-47392.html * https://www.suse.com/security/cve/CVE-2021-47393.html * https://www.suse.com/security/cve/CVE-2021-47395.html * https://www.suse.com/security/cve/CVE-2021-47396.html * https://www.suse.com/security/cve/CVE-2021-47399.html * https://www.suse.com/security/cve/CVE-2021-47402.html * https://www.suse.com/security/cve/CVE-2021-47404.html * https://www.suse.com/security/cve/CVE-2021-47405.html * https://www.suse.com/security/cve/CVE-2021-47409.html * https://www.suse.com/security/cve/CVE-2021-47413.html * https://www.suse.com/security/cve/CVE-2021-47416.html * https://www.suse.com/security/cve/CVE-2021-47422.html * https://www.suse.com/security/cve/CVE-2021-47423.html * https://www.suse.com/security/cve/CVE-2021-47424.html * https://www.suse.com/security/cve/CVE-2021-47425.html * https://www.suse.com/security/cve/CVE-2021-47426.html * https://www.suse.com/security/cve/CVE-2021-47428.html * https://www.suse.com/security/cve/CVE-2021-47431.html * https://www.suse.com/security/cve/CVE-2021-47434.html * https://www.suse.com/security/cve/CVE-2021-47435.html * https://www.suse.com/security/cve/CVE-2021-47436.html * https://www.suse.com/security/cve/CVE-2021-47441.html * https://www.suse.com/security/cve/CVE-2021-47442.html * https://www.suse.com/security/cve/CVE-2021-47443.html * https://www.suse.com/security/cve/CVE-2021-47444.html * https://www.suse.com/security/cve/CVE-2021-47445.html * https://www.suse.com/security/cve/CVE-2021-47451.html * https://www.suse.com/security/cve/CVE-2021-47456.html * https://www.suse.com/security/cve/CVE-2021-47458.html * https://www.suse.com/security/cve/CVE-2021-47460.html * https://www.suse.com/security/cve/CVE-2021-47464.html * https://www.suse.com/security/cve/CVE-2021-47465.html * https://www.suse.com/security/cve/CVE-2021-47468.html * https://www.suse.com/security/cve/CVE-2021-47473.html * https://www.suse.com/security/cve/CVE-2021-47478.html * https://www.suse.com/security/cve/CVE-2021-47480.html * https://www.suse.com/security/cve/CVE-2021-47482.html * https://www.suse.com/security/cve/CVE-2021-47483.html * https://www.suse.com/security/cve/CVE-2021-47485.html * https://www.suse.com/security/cve/CVE-2021-47493.html * https://www.suse.com/security/cve/CVE-2021-47494.html * https://www.suse.com/security/cve/CVE-2021-47495.html * https://www.suse.com/security/cve/CVE-2021-47496.html * https://www.suse.com/security/cve/CVE-2021-47497.html * https://www.suse.com/security/cve/CVE-2021-47498.html * https://www.suse.com/security/cve/CVE-2021-47499.html * https://www.suse.com/security/cve/CVE-2021-47500.html * https://www.suse.com/security/cve/CVE-2021-47501.html * https://www.suse.com/security/cve/CVE-2021-47502.html * https://www.suse.com/security/cve/CVE-2021-47503.html * https://www.suse.com/security/cve/CVE-2021-47505.html * https://www.suse.com/security/cve/CVE-2021-47506.html * https://www.suse.com/security/cve/CVE-2021-47507.html * https://www.suse.com/security/cve/CVE-2021-47509.html * https://www.suse.com/security/cve/CVE-2021-47511.html * https://www.suse.com/security/cve/CVE-2021-47512.html * https://www.suse.com/security/cve/CVE-2021-47516.html * https://www.suse.com/security/cve/CVE-2021-47518.html * https://www.suse.com/security/cve/CVE-2021-47521.html * https://www.suse.com/security/cve/CVE-2021-47522.html * https://www.suse.com/security/cve/CVE-2021-47523.html * https://www.suse.com/security/cve/CVE-2021-47527.html * https://www.suse.com/security/cve/CVE-2021-47535.html * https://www.suse.com/security/cve/CVE-2021-47536.html * https://www.suse.com/security/cve/CVE-2021-47538.html * https://www.suse.com/security/cve/CVE-2021-47540.html * https://www.suse.com/security/cve/CVE-2021-47541.html * https://www.suse.com/security/cve/CVE-2021-47542.html * https://www.suse.com/security/cve/CVE-2021-47549.html * https://www.suse.com/security/cve/CVE-2021-47557.html * https://www.suse.com/security/cve/CVE-2021-47562.html * https://www.suse.com/security/cve/CVE-2021-47563.html * https://www.suse.com/security/cve/CVE-2021-47565.html * https://www.suse.com/security/cve/CVE-2022-1195.html * https://www.suse.com/security/cve/CVE-2022-20132.html * https://www.suse.com/security/cve/CVE-2022-48636.html * https://www.suse.com/security/cve/CVE-2022-48673.html * https://www.suse.com/security/cve/CVE-2022-48704.html * https://www.suse.com/security/cve/CVE-2022-48710.html * https://www.suse.com/security/cve/CVE-2023-0160.html * https://www.suse.com/security/cve/CVE-2023-1829.html * https://www.suse.com/security/cve/CVE-2023-2176.html * https://www.suse.com/security/cve/CVE-2023-424.html * https://www.suse.com/security/cve/CVE-2023-4244.html * https://www.suse.com/security/cve/CVE-2023-47233.html * https://www.suse.com/security/cve/CVE-2023-52433.html * https://www.suse.com/security/cve/CVE-2023-52581.html * https://www.suse.com/security/cve/CVE-2023-52591.html * https://www.suse.com/security/cve/CVE-2023-52654.html * https://www.suse.com/security/cve/CVE-2023-52655.html * https://www.suse.com/security/cve/CVE-2023-52686.html * https://www.suse.com/security/cve/CVE-2023-52840.html * https://www.suse.com/security/cve/CVE-2023-52871.html * https://www.suse.com/security/cve/CVE-2023-52880.html * https://www.suse.com/security/cve/CVE-2023-6531.html * https://www.suse.com/security/cve/CVE-2024-26581.html * https://www.suse.com/security/cve/CVE-2024-26643.html * https://www.suse.com/security/cve/CVE-2024-26828.html * https://www.suse.com/security/cve/CVE-2024-26921.html * https://www.suse.com/security/cve/CVE-2024-26925.html * https://www.suse.com/security/cve/CVE-2024-26929.html * https://www.suse.com/security/cve/CVE-2024-26930.html * https://www.suse.com/security/cve/CVE-2024-27398.html * https://www.suse.com/security/cve/CVE-2024-27413.html * https://www.suse.com/security/cve/CVE-2024-35811.html * https://www.suse.com/security/cve/CVE-2024-35895.html * https://www.suse.com/security/cve/CVE-2024-35914.html * https://bugzilla.suse.com/show_bug.cgi?id=1065729 * https://bugzilla.suse.com/show_bug.cgi?id=1151927 * https://bugzilla.suse.com/show_bug.cgi?id=1152472 * https://bugzilla.suse.com/show_bug.cgi?id=1154353 * https://bugzilla.suse.com/show_bug.cgi?id=1156395 * https://bugzilla.suse.com/show_bug.cgi?id=1174585 * https://bugzilla.suse.com/show_bug.cgi?id=1176447 * https://bugzilla.suse.com/show_bug.cgi?id=1176774 * https://bugzilla.suse.com/show_bug.cgi?id=1176869 * https://bugzilla.suse.com/show_bug.cgi?id=1178134 * https://bugzilla.suse.com/show_bug.cgi?id=1181147 * https://bugzilla.suse.com/show_bug.cgi?id=1184631 * https://bugzilla.suse.com/show_bug.cgi?id=1185570 * https://bugzilla.suse.com/show_bug.cgi?id=1185589 * https://bugzilla.suse.com/show_bug.cgi?id=1185902 * https://bugzilla.suse.com/show_bug.cgi?id=1186885 * https://bugzilla.suse.com/show_bug.cgi?id=1187357 * https://bugzilla.suse.com/show_bug.cgi?id=1188616 * https://bugzilla.suse.com/show_bug.cgi?id=1188772 * https://bugzilla.suse.com/show_bug.cgi?id=1189883 * https://bugzilla.suse.com/show_bug.cgi?id=1190795 * https://bugzilla.suse.com/show_bug.cgi?id=1191452 * https://bugzilla.suse.com/show_bug.cgi?id=1192107 * https://bugzilla.suse.com/show_bug.cgi?id=1194288 * https://bugzilla.suse.com/show_bug.cgi?id=1194591 * https://bugzilla.suse.com/show_bug.cgi?id=1196956 * https://bugzilla.suse.com/show_bug.cgi?id=1197760 * https://bugzilla.suse.com/show_bug.cgi?id=1198029 * https://bugzilla.suse.com/show_bug.cgi?id=1199304 * https://bugzilla.suse.com/show_bug.cgi?id=1200619 * https://bugzilla.suse.com/show_bug.cgi?id=1203389 * https://bugzilla.suse.com/show_bug.cgi?id=1206646 * https://bugzilla.suse.com/show_bug.cgi?id=1209657 * https://bugzilla.suse.com/show_bug.cgi?id=1210335 * https://bugzilla.suse.com/show_bug.cgi?id=1210629 * https://bugzilla.suse.com/show_bug.cgi?id=1213476 * https://bugzilla.suse.com/show_bug.cgi?id=1215420 * https://bugzilla.suse.com/show_bug.cgi?id=1216702 * https://bugzilla.suse.com/show_bug.cgi?id=1217169 * https://bugzilla.suse.com/show_bug.cgi?id=1220137 * https://bugzilla.suse.com/show_bug.cgi?id=1220144 * https://bugzilla.suse.com/show_bug.cgi?id=1220754 * https://bugzilla.suse.com/show_bug.cgi?id=1220877 * https://bugzilla.suse.com/show_bug.cgi?id=1220960 * https://bugzilla.suse.com/show_bug.cgi?id=1221044 * https://bugzilla.suse.com/show_bug.cgi?id=1221113 * https://bugzilla.suse.com/show_bug.cgi?id=1221829 * https://bugzilla.suse.com/show_bug.cgi?id=1222251 * https://bugzilla.suse.com/show_bug.cgi?id=1222619 * https://bugzilla.suse.com/show_bug.cgi?id=1222838 * https://bugzilla.suse.com/show_bug.cgi?id=1222867 * https://bugzilla.suse.com/show_bug.cgi?id=1223084 * https://bugzilla.suse.com/show_bug.cgi?id=1223138 * https://bugzilla.suse.com/show_bug.cgi?id=1223384 * https://bugzilla.suse.com/show_bug.cgi?id=1223390 * https://bugzilla.suse.com/show_bug.cgi?id=1223512 * https://bugzilla.suse.com/show_bug.cgi?id=1223932 * https://bugzilla.suse.com/show_bug.cgi?id=1223934 * https://bugzilla.suse.com/show_bug.cgi?id=1224099 * https://bugzilla.suse.com/show_bug.cgi?id=1224174 * https://bugzilla.suse.com/show_bug.cgi?id=1224438 * https://bugzilla.suse.com/show_bug.cgi?id=1224482 * https://bugzilla.suse.com/show_bug.cgi?id=1224511 * https://bugzilla.suse.com/show_bug.cgi?id=1224592 * https://bugzilla.suse.com/show_bug.cgi?id=1224816 * https://bugzilla.suse.com/show_bug.cgi?id=1224826 * https://bugzilla.suse.com/show_bug.cgi?id=1224830 * https://bugzilla.suse.com/show_bug.cgi?id=1224831 * https://bugzilla.suse.com/show_bug.cgi?id=1224832 * https://bugzilla.suse.com/show_bug.cgi?id=1224834 * https://bugzilla.suse.com/show_bug.cgi?id=1224841 * https://bugzilla.suse.com/show_bug.cgi?id=1224842 * https://bugzilla.suse.com/show_bug.cgi?id=1224843 * https://bugzilla.suse.com/show_bug.cgi?id=1224844 * https://bugzilla.suse.com/show_bug.cgi?id=1224846 * https://bugzilla.suse.com/show_bug.cgi?id=1224849 * https://bugzilla.suse.com/show_bug.cgi?id=1224852 * https://bugzilla.suse.com/show_bug.cgi?id=1224853 * https://bugzilla.suse.com/show_bug.cgi?id=1224854 * https://bugzilla.suse.com/show_bug.cgi?id=1224859 * https://bugzilla.suse.com/show_bug.cgi?id=1224882 * https://bugzilla.suse.com/show_bug.cgi?id=1224886 * https://bugzilla.suse.com/show_bug.cgi?id=1224888 * https://bugzilla.suse.com/show_bug.cgi?id=1224889 * https://bugzilla.suse.com/show_bug.cgi?id=1224891 * https://bugzilla.suse.com/show_bug.cgi?id=1224892 * https://bugzilla.suse.com/show_bug.cgi?id=1224893 * https://bugzilla.suse.com/show_bug.cgi?id=1224899 * https://bugzilla.suse.com/show_bug.cgi?id=1224904 * https://bugzilla.suse.com/show_bug.cgi?id=1224907 * https://bugzilla.suse.com/show_bug.cgi?id=1224909 * https://bugzilla.suse.com/show_bug.cgi?id=1224916 * https://bugzilla.suse.com/show_bug.cgi?id=1224917 * https://bugzilla.suse.com/show_bug.cgi?id=1224922 * https://bugzilla.suse.com/show_bug.cgi?id=1224923 * https://bugzilla.suse.com/show_bug.cgi?id=1224924 * https://bugzilla.suse.com/show_bug.cgi?id=1224926 * https://bugzilla.suse.com/show_bug.cgi?id=1224928 * https://bugzilla.suse.com/show_bug.cgi?id=1224953 * https://bugzilla.suse.com/show_bug.cgi?id=1224954 * https://bugzilla.suse.com/show_bug.cgi?id=1224955 * https://bugzilla.suse.com/show_bug.cgi?id=1224957 * https://bugzilla.suse.com/show_bug.cgi?id=1224961 * https://bugzilla.suse.com/show_bug.cgi?id=1224963 * https://bugzilla.suse.com/show_bug.cgi?id=1224965 * https://bugzilla.suse.com/show_bug.cgi?id=1224966 * https://bugzilla.suse.com/show_bug.cgi?id=1224968 * https://bugzilla.suse.com/show_bug.cgi?id=1224981 * https://bugzilla.suse.com/show_bug.cgi?id=1224982 * https://bugzilla.suse.com/show_bug.cgi?id=1224983 * https://bugzilla.suse.com/show_bug.cgi?id=1224984 * https://bugzilla.suse.com/show_bug.cgi?id=1224987 * https://bugzilla.suse.com/show_bug.cgi?id=1224990 * https://bugzilla.suse.com/show_bug.cgi?id=1224993 * https://bugzilla.suse.com/show_bug.cgi?id=1224996 * https://bugzilla.suse.com/show_bug.cgi?id=1224997 * https://bugzilla.suse.com/show_bug.cgi?id=1225026 * https://bugzilla.suse.com/show_bug.cgi?id=1225030 * https://bugzilla.suse.com/show_bug.cgi?id=1225058 * https://bugzilla.suse.com/show_bug.cgi?id=1225060 * https://bugzilla.suse.com/show_bug.cgi?id=1225083 * https://bugzilla.suse.com/show_bug.cgi?id=1225084 * https://bugzilla.suse.com/show_bug.cgi?id=1225091 * https://bugzilla.suse.com/show_bug.cgi?id=1225112 * https://bugzilla.suse.com/show_bug.cgi?id=1225113 * https://bugzilla.suse.com/show_bug.cgi?id=1225128 * https://bugzilla.suse.com/show_bug.cgi?id=1225140 * https://bugzilla.suse.com/show_bug.cgi?id=1225143 * https://bugzilla.suse.com/show_bug.cgi?id=1225148 * https://bugzilla.suse.com/show_bug.cgi?id=1225155 * https://bugzilla.suse.com/show_bug.cgi?id=1225164 * https://bugzilla.suse.com/show_bug.cgi?id=1225177 * https://bugzilla.suse.com/show_bug.cgi?id=1225178 * https://bugzilla.suse.com/show_bug.cgi?id=1225181 * https://bugzilla.suse.com/show_bug.cgi?id=1225192 * https://bugzilla.suse.com/show_bug.cgi?id=1225193 * https://bugzilla.suse.com/show_bug.cgi?id=1225198 * https://bugzilla.suse.com/show_bug.cgi?id=1225201 * https://bugzilla.suse.com/show_bug.cgi?id=1225206 * https://bugzilla.suse.com/show_bug.cgi?id=1225207 * https://bugzilla.suse.com/show_bug.cgi?id=1225208 * https://bugzilla.suse.com/show_bug.cgi?id=1225214 * https://bugzilla.suse.com/show_bug.cgi?id=1225223 * https://bugzilla.suse.com/show_bug.cgi?id=1225224 * https://bugzilla.suse.com/show_bug.cgi?id=1225230 * https://bugzilla.suse.com/show_bug.cgi?id=1225232 * https://bugzilla.suse.com/show_bug.cgi?id=1225233 * https://bugzilla.suse.com/show_bug.cgi?id=1225237 * https://bugzilla.suse.com/show_bug.cgi?id=1225238 * https://bugzilla.suse.com/show_bug.cgi?id=1225243 * https://bugzilla.suse.com/show_bug.cgi?id=1225244 * https://bugzilla.suse.com/show_bug.cgi?id=1225247 * https://bugzilla.suse.com/show_bug.cgi?id=1225251 * https://bugzilla.suse.com/show_bug.cgi?id=1225252 * https://bugzilla.suse.com/show_bug.cgi?id=1225256 * https://bugzilla.suse.com/show_bug.cgi?id=1225261 * https://bugzilla.suse.com/show_bug.cgi?id=1225262 * https://bugzilla.suse.com/show_bug.cgi?id=1225263 * https://bugzilla.suse.com/show_bug.cgi?id=1225301 * https://bugzilla.suse.com/show_bug.cgi?id=1225303 * https://bugzilla.suse.com/show_bug.cgi?id=1225316 * https://bugzilla.suse.com/show_bug.cgi?id=1225318 * https://bugzilla.suse.com/show_bug.cgi?id=1225320 * https://bugzilla.suse.com/show_bug.cgi?id=1225321 * https://bugzilla.suse.com/show_bug.cgi?id=1225322 * https://bugzilla.suse.com/show_bug.cgi?id=1225326 * https://bugzilla.suse.com/show_bug.cgi?id=1225327 * https://bugzilla.suse.com/show_bug.cgi?id=1225328 * https://bugzilla.suse.com/show_bug.cgi?id=1225330 * https://bugzilla.suse.com/show_bug.cgi?id=1225333 * https://bugzilla.suse.com/show_bug.cgi?id=1225336 * https://bugzilla.suse.com/show_bug.cgi?id=1225341 * https://bugzilla.suse.com/show_bug.cgi?id=1225346 * https://bugzilla.suse.com/show_bug.cgi?id=1225351 * https://bugzilla.suse.com/show_bug.cgi?id=1225354 * https://bugzilla.suse.com/show_bug.cgi?id=1225355 * https://bugzilla.suse.com/show_bug.cgi?id=1225357 * https://bugzilla.suse.com/show_bug.cgi?id=1225358 * https://bugzilla.suse.com/show_bug.cgi?id=1225360 * https://bugzilla.suse.com/show_bug.cgi?id=1225361 * https://bugzilla.suse.com/show_bug.cgi?id=1225366 * https://bugzilla.suse.com/show_bug.cgi?id=1225367 * https://bugzilla.suse.com/show_bug.cgi?id=1225369 * https://bugzilla.suse.com/show_bug.cgi?id=1225370 * https://bugzilla.suse.com/show_bug.cgi?id=1225372 * https://bugzilla.suse.com/show_bug.cgi?id=1225374 * https://bugzilla.suse.com/show_bug.cgi?id=1225384 * https://bugzilla.suse.com/show_bug.cgi?id=1225386 * https://bugzilla.suse.com/show_bug.cgi?id=1225387 * https://bugzilla.suse.com/show_bug.cgi?id=1225390 * https://bugzilla.suse.com/show_bug.cgi?id=1225393 * https://bugzilla.suse.com/show_bug.cgi?id=1225400 * https://bugzilla.suse.com/show_bug.cgi?id=1225404 * https://bugzilla.suse.com/show_bug.cgi?id=1225405 * https://bugzilla.suse.com/show_bug.cgi?id=1225409 * https://bugzilla.suse.com/show_bug.cgi?id=1225411 * https://bugzilla.suse.com/show_bug.cgi?id=1225424 * https://bugzilla.suse.com/show_bug.cgi?id=1225427 * https://bugzilla.suse.com/show_bug.cgi?id=1225435 * https://bugzilla.suse.com/show_bug.cgi?id=1225437 * https://bugzilla.suse.com/show_bug.cgi?id=1225438 * https://bugzilla.suse.com/show_bug.cgi?id=1225439 * https://bugzilla.suse.com/show_bug.cgi?id=1225446 * https://bugzilla.suse.com/show_bug.cgi?id=1225447 * https://bugzilla.suse.com/show_bug.cgi?id=1225448 * https://bugzilla.suse.com/show_bug.cgi?id=1225450 * https://bugzilla.suse.com/show_bug.cgi?id=1225453 * https://bugzilla.suse.com/show_bug.cgi?id=1225455 * https://bugzilla.suse.com/show_bug.cgi?id=1225468 * https://bugzilla.suse.com/show_bug.cgi?id=1225499 * https://bugzilla.suse.com/show_bug.cgi?id=1225500 * https://bugzilla.suse.com/show_bug.cgi?id=1225508 * https://bugzilla.suse.com/show_bug.cgi?id=1225534