Security update for the Linux Kernel
Announcement ID: | SUSE-SU-2024:2190-1 |
---|---|
Rating: | important |
References: |
|
Cross-References: |
|
CVSS scores: |
|
Affected Products: |
|
An update that solves 557 vulnerabilities, contains two features and has 42 security fixes can now be installed.
Description:
The SUSE Linux Enterprise 15 SP5 kernel was updated to receive various security bugfixes.
The following security bugs were fixed:
- CVE-2021-47548: Fixed a possible array out-of=bounds (bsc#1225506)
- CVE-2022-48689: Fixed data-race in lru_add_fn (bsc#1223959)
- CVE-2022-48691: Fixed memory leak in netfilter (bsc#1223961)
- CVE-2023-1829: Fixed a use-after-free vulnerability in the control index filter (tcindex) (bsc#1210335).
- CVE-2023-42755: Check user supplied offsets (bsc#1215702).
- CVE-2023-52586: Fixed mutex lock in control vblank irq (bsc#1221081).
- CVE-2023-52618: Fixed string overflow in block/rnbd-srv (bsc#1221615).
- CVE-2023-52655: Check packet for fixup for true limit (bsc#1217169).
- CVE-2023-52656: Dropped any code related to SCM_RIGHTS (bsc#1224187).
- CVE-2023-52660: Fiedx IRQ handling due to shared interrupts (bsc#1224443).
- CVE-2023-52664: Eliminate double free in error handling logic (bsc#1224747).
- CVE-2023-52671: Fixed hang/underflow when transitioning to ODM4:1 (bsc#1224729).
- CVE-2023-52674: Add clamp() in scarlett2_mixer_ctl_put() (bsc#1224727).
- CVE-2023-52680: Fixed missing error checks to *_ctl_get() (bsc#1224608).
- CVE-2023-52692: Fixed missing error check to scarlett2_usb_set_config() (bsc#1224628).
- CVE-2023-52698: Fixed memory leak in netlbl_calipso_add_pass() (bsc#1224621)
- CVE-2023-52746: Prevent potential spectre v1 gadget in xfrm_xlate32_attr() (bsc#1225114)
- CVE-2023-52757: Fixed potential deadlock when releasing mids (bsc#1225548).
- CVE-2023-52795: Fixed use after free in vhost_vdpa_probe() (bsc#1225085).
- CVE-2023-52796: Add ipvlan_route_v6_outbound() helper (bsc#1224930).
- CVE-2023-52807: Fixed out-of-bounds access may occur when coalesce info is read via debugfs (bsc#1225097).
- CVE-2023-52860: Fixed null pointer dereference in hisi_hns3 (bsc#1224936).
- CVE-2023-6531: Fixed a use-after-free flaw due to a race problem in the unix garbage collector's deletion of SKB races with unix_stream_read_generic()on the socket that the SKB is queued on (bsc#1218447).
- CVE-2024-2201: Fixed information leak in x86/BHI (bsc#1217339).
- CVE-2024-26643: Fixed mark set as dead when unbinding anonymous set with timeout (bsc#1221829).
- CVE-2024-26679: Fixed read sk->sk_family once in inet_recv_error() (bsc#1222385).
- CVE-2024-26692: Fixed regression in writes when non-standard maximum write size negotiated (bsc#1222464).
- CVE-2024-26700: Fixed drm/amd/display: Fix MST Null Ptr for RV (bsc#1222870)
- CVE-2024-26715: Fixed NULL pointer dereference in dwc3_gadget_suspend (bsc#1222561).
- CVE-2024-26742: Fixed disable_managed_interrupts (git-fixes bsc#1222608).
- CVE-2024-26775: Fixed potential deadlock at set_capacity (bsc#1222627).
- CVE-2024-26777: Error out if pixclock equals zero in fbdev/sis (bsc#1222765)
- CVE-2024-26778: Error out if pixclock equals zero in fbdev/savage (bsc#1222770)
- CVE-2024-26791: Fixed properly validate device names in btrfs (bsc#1222793)
- CVE-2024-26822: Set correct id, uid and cruid for multiuser automounts (bsc#1223011).
- CVE-2024-26828: Fixed underflow in parse_server_interfaces() (bsc#1223084).
- CVE-2024-26839: Fixed a memleak in init_credit_return() (bsc#1222975)
- CVE-2024-26876: Fixed crash on irq during probe (bsc#1223119).
- CVE-2024-26900: Fixed kmemleak of rdev->serial (bsc#1223046).
- CVE-2024-26907: Fixed a fortify source warning while accessing Eth segment in mlx5 (bsc#1223203).
- CVE-2024-26915: Reset IH OVERFLOW_CLEAR bit (bsc#1223207)
- CVE-2024-26919: Fixed debugfs directory leak (bsc#1223847).
- CVE-2024-26921: Preserve kabi for sk_buff (bsc#1223138).
- CVE-2024-26925: Release mutex after nft_gc_seq_end from abort path (bsc#1223390).
- CVE-2024-26928: Fixed potential UAF in cifs_debug_files_proc_show() (bsc#1223532).
- CVE-2024-26939: Fixed UAF on destroy against retire race (bsc#1223679).
- CVE-2024-26958: Fixed UAF in direct writes (bsc#1223653).
- CVE-2024-27042: Fixed potential out-of-bounds access in 'amdgpu_discovery_reg_base_init()' (bsc#1223823).
- CVE-2024-27395: Fixed Use-After-Free in ovs_ct_exit (bsc#1224098).
- CVE-2024-27396: Fixed Use-After-Free in gtp_dellink (bsc#1224096).
- CVE-2024-27398: Fixed use-after-free bugs caused by sco_sock_timeout (bsc#1224174).
- CVE-2024-27401: Fixed user_length taken into account when fetching packet contents (bsc#1224181).
- CVE-2024-27413: Fixed incorrect allocation size (bsc#1224438).
- CVE-2024-27417: Fixed potential "struct net" leak in inet6_rtm_getaddr() (bsc#1224721)
- CVE-2024-27419: Fixed data-races around sysctl_net_busy_read (bsc#1224759)
- CVE-2024-27431: Zero-initialise xdp_rxq_info struct before running XDP program (bsc#1224718).
- CVE-2024-35791: Flush pages under kvm->lock to fix UAF in svm_register_enc_region() (bsc#1224725).
- CVE-2024-35799: Prevent crash when disable stream (bsc#1224740).
- CVE-2024-35804: Mark target gfn of emulated atomic instruction as dirty (bsc#1224638).
- CVE-2024-35817: Set gtt bound flag in amdgpu_ttm_gart_bind (bsc#1224736).
- CVE-2024-35852: Fixed memory leak when canceling rehash work (bsc#1224502).
- CVE-2024-35854: Fixed possible use-after-free during rehash (bsc#1224636).
- CVE-2024-35860: Struct bpf_link and bpf_link_ops kABI workaround (bsc#1224531).
- CVE-2024-35861: Fixed potential UAF in cifs_signal_cifsd_for_reconnect() (bsc#1224766).
- CVE-2024-35862: Fixed potential UAF in smb2_is_network_name_deleted() (bsc#1224764).
- CVE-2024-35863: Fixed potential UAF in is_valid_oplock_break() (bsc#1224763).
- CVE-2024-35864: Fixed potential UAF in smb2_is_valid_lease_break() (bsc#1224765,).
- CVE-2024-35865: Fixed potential UAF in smb2_is_valid_oplock_break() (bsc#1224668).
- CVE-2024-35866: Fixed potential UAF in cifs_dump_full_key() (bsc#1224667).
- CVE-2024-35867: Fixed potential UAF in cifs_stats_proc_show() (bsc#1224664).
- CVE-2024-35868: Fixed potential UAF in cifs_stats_proc_write() (bsc#1224678).
- CVE-2024-35869: Guarantee refcounted children from parent session (bsc#1224679).
- CVE-2024-35870: Fixed UAF in smb2_reconnect_server() (bsc#1224020, bsc#1224672).
- CVE-2024-35872: Fixed GUP-fast succeeding on secretmem folios (bsc#1224530).
- CVE-2024-35875: Require seeding RNG with RDRAND on CoCo systems (bsc#1224665).
- CVE-2024-35877: Fixed VM_PAT handling in COW mappings (bsc#1224525).
- CVE-2024-35878: Prevent NULL pointer dereference in vsnprintf() (bsc#1224671).
- CVE-2024-35879: kABI workaround for drivers/of/dynamic.c (bsc#1224524).
- CVE-2024-35885: Stop interface during shutdown (bsc#1224519).
- CVE-2024-35904: Fixed dereference of garbage after mount failure (bsc#1224494).
- CVE-2024-35905: Fixed int overflow for stack access size (bsc#1224488).
- CVE-2024-35907: Call request_irq() after NAPI initialized (bsc#1224492).
- CVE-2024-35924: Limit read size on v1.2 (bsc#1224657).
- CVE-2024-35939: Fixed leak pages on dma_set_decrypted() failure (bsc#1224535).
- CVE-2024-35943: Fixed a null pointer dereference in omap_prm_domain_init (bsc#1224649).
- CVE-2024-35944: Fixed memcpy() run-time warning in dg_dispatch_as_host() (bsc#1224648).
- CVE-2024-35951: Fixed the error path in panfrost_mmu_map_fault_addr() (bsc#1224701).
- CVE-2024-35959: Fixed mlx5e_priv_init() cleanup flow (bsc#1224666).
- CVE-2024-35964: Fixed not validating setsockopt user input (bsc#1224581).
- CVE-2024-35969: Fixed race condition between ipv6_get_ifaddr and ipv6_del_addr (bsc#1224580).
- CVE-2024-35973: Fixed header validation in geneve[6]_xmit_skb (bsc#1224586).
- CVE-2024-35976: Validate user input for XDP_{UMEM|COMPLETION}_FILL_RING (bsc#1224575).
- CVE-2024-35998: Fixed lock ordering potential deadlock in cifs_sync_mid_result (bsc#1224549).
- CVE-2024-35999: Fixed missing lock when picking channel (bsc#1224550).
- CVE-2024-36006: Fixed incorrect list API usage (bsc#1224541).
- CVE-2024-36007: Fixed warning during rehash (bsc#1224543).
- CVE-2024-36938: Fixed NULL pointer dereference in sk_psock_skb_ingress_enqueue (bsc#1225761).
The following non-security bugs were fixed:
- 9p: explicitly deny setlease attempts (git-fixes).
- ACPI: bus: Indicate support for _TFP thru _OSC (git-fixes).
- ACPI: disable -Wstringop-truncation (git-fixes).
- ACPI: Fix Generic Initiator Affinity _OSC bit (git-fixes).
- ACPI: LPSS: Advertise number of chip selects via property (git-fixes).
- admin-guide/hw-vuln/core-scheduling: fix return type of PR_SCHED_CORE_GET (git-fixes).
- af_unix: annote lockless accesses to unix_tot_inflight & gc_in_progress (bsc#1223384).
- af_unix: Do not use atomic ops for unix_sk(sk)->inflight (bsc#1223384).
- af_unix: Replace BUG_ON() with WARN_ON_ONCE() (bsc#1223384).
- ALSA: core: Fix NULL module pointer assignment at card init (git-fixes).
- ALSA: hda/cs_dsp_ctl: Use private_free for control cleanup (git-fixes).
- ALSA: line6: Zero-initialize message buffers (stable-fixes).
- ARM: 9381/1: kasan: clear stale stack poison (git-fixes).
- ASoC: Intel: avs: Fix ASRC module initialization (git-fixes).
- ASoC: Intel: avs: Fix potential integer overflow (git-fixes).
- ASoC: Intel: avs: ssm4567: Do not ignore route checks (git-fixes).
- ASoC: Intel: Disable route checks for Skylake boards (git-fixes).
- ASoC: kirkwood: Fix potential NULL dereference (git-fixes).
- ASoC: mediatek: mt8192: fix register configuration for tdm (git-fixes).
- ASoC: meson: axg-fifo: use FIELD helpers (stable-fixes).
- ASoC: meson: axg-fifo: use threaded irq to check periods (git-fixes).
- ASoC: tas2552: Add TX path for capturing AUDIO-OUT data (git-fixes).
- ASoC: tracing: Export SND_SOC_DAPM_DIR_OUT to its value (git-fixes).
- ata: pata_legacy: make legacy_exit() work again (git-fixes).
- ata: sata_gemini: Check clk_enable() result (stable-fixes).
- autofs: use wake_up() instead of wake_up_interruptible(() (bsc#1224166).
- Bluetooth: Fix use-after-free bugs caused by sco_sock_timeout (git-fixes).
- Bluetooth: hci_sync: Avoid use-after-free in dbg for hci_add_adv_monitor() (git-fixes).
- Bluetooth: hci_sync: Do not double print name in add/remove adv_monitor (bsc#1216358).
- Bluetooth: l2cap: fix null-ptr-deref in l2cap_chan_timeout (git-fixes).
- Bluetooth: msft: fix slab-use-after-free in msft_do_close() (git-fixes).
- Bluetooth: qca: add missing firmware sanity checks (git-fixes).
- Bluetooth: qca: Fix error code in qca_read_fw_build_info() (git-fixes).
- Bluetooth: qca: fix firmware check error path (git-fixes).
- Bluetooth: qca: fix info leak when fetching fw build id (git-fixes).
- Bluetooth: qca: fix NVM configuration parsing (git-fixes).
- bnxt_re: avoid shift undefined behavior in bnxt_qplib_alloc_init_hwq (git-fixes)
- bpf: decouple prune and jump points (bsc#1225756).
- bpf: fix precision backtracking instruction iteration (bsc#1225756).
- bpf: Fix precision tracking for BPF_ALU | BPF_TO_BE | BPF_END (git-fixes).
- bpf: handle ldimm64 properly in check_cfg() (bsc#1225756).
- bpf: mostly decouple jump history management from is_state_visited() (bsc#1225756).
- bpf: remove unnecessary prune and jump points (bsc#1225756).
- btrfs: add error messages to all unrecognized mount options (git-fixes)
- btrfs: add missing mutex_unlock in btrfs_relocate_sys_chunks() (git-fixes)
- btrfs: export: handle invalid inode or root reference in btrfs_get_parent() (git-fixes)
- btrfs: extend locking to all space_info members accesses (git-fixes)
- btrfs: fix btrfs_submit_compressed_write cgroup attribution (git-fixes)
- btrfs: fix information leak in btrfs_ioctl_logical_to_ino() (git-fixes)
- btrfs: fix missing blkdev_put() call in btrfs_scan_one_device() (git-fixes)
- btrfs: fix off-by-one chunk length calculation at contains_pending_extent() (git-fixes)
- btrfs: fix qgroup reserve overflow the qgroup limit (git-fixes)
- btrfs: fix silent failure when deleting root reference (git-fixes)
- btrfs: fix use-after-free after failure to create a snapshot (git-fixes)
- btrfs: free exchange changeset on failures (git-fixes)
- btrfs: handle chunk tree lookup error in btrfs_relocate_sys_chunks() (git-fixes)
- btrfs: make search_csum_tree return 0 if we get -EFBIG (git-fixes)
- btrfs: prevent copying too big compressed lzo segment (git-fixes)
- btrfs: remove BUG_ON(!eie) in find_parent_nodes (git-fixes)
- btrfs: remove BUG_ON() in find_parent_nodes() (git-fixes)
- btrfs: repair super block num_devices automatically (git-fixes)
- btrfs: replace the BUG_ON in btrfs_del_root_ref with proper error handling (git-fixes)
- btrfs: send: ensure send_fd is writable (git-fixes)
- btrfs: send: handle path ref underflow in header iterate_inode_ref() (git-fixes)
- btrfs: send: in case of IO error log it (git-fixes)
- btrfs: send: return EOPNOTSUPP on unknown flags (git-fixes)
- btrfs: tree-checker: check item_size for dev_item (git-fixes)
- btrfs: tree-checker: check item_size for inode_item (git-fixes)
- cifs: account for primary channel in the interface list (bsc#1224020).
- cifs: cifs_chan_is_iface_active should be called with chan_lock held (bsc#1224020).
- cifs: distribute channels across interfaces based on speed (bsc#1224020).
- cifs: do not pass cifs_sb when trying to add channels (bsc#1224020).
- cifs: failure to add channel on iface should bump up weight (git-fixes, bsc#1224020).
- cifs: fix charset issue in reconnection (bsc#1224020).
- cifs: fix leak of iface for primary channel (git-fixes, bsc#1224020).
- cifs: handle cases where a channel is closed (bsc#1224020).
- cifs: handle cases where multiple sessions share connection (bsc#1224020).
- cifs: reconnect work should have reference on server struct (bsc#1224020).
- clk: Do not hold prepare_lock when calling kref_put() (stable-fixes).
- clk: qcom: mmcc-msm8998: fix venus clock issue (git-fixes).
- counter: stm32-lptimer-cnt: Provide defines for clock polarities (git-fixes).
- counter: stm32-timer-cnt: Provide defines for slave mode selection (git-fixes).
- cppc_cpufreq: Fix possible null pointer dereference (git-fixes).
- cpu/hotplug: Remove the 'cpu' member of cpuhp_cpu_state (git-fixes).
- cpumask: Add for_each_cpu_from() (bsc#1225053).
- crypto: bcm - Fix pointer arithmetic (git-fixes).
- crypto: ccp - drop platform ifdef checks (git-fixes).
- crypto: ecdsa - Fix module auto-load on add-key (git-fixes).
- crypto: x86/nh-avx2 - add missing vzeroupper (git-fixes).
- crypto: x86/sha256-avx2 - add missing vzeroupper (git-fixes).
- crypto: x86/sha512-avx2 - add missing vzeroupper (git-fixes).
- dmaengine: axi-dmac: fix possible race in remove() (git-fixes).
- dmaengine: idma64: Add check for dma_set_max_seg_size (git-fixes).
- dm/amd/pm: Fix problems with reboot/shutdown for some SMU 13.0.4/13.0.11 users (git-fixes).
- dm-multipath: dont't attempt SG_IO on non-SCSI-disks (bsc#1223575).
- docs: kernel_include.py: Cope with docutils 0.21 (stable-fixes).
- drivers/nvme: Add quirks for device 126f:2262 (git-fixes).
- drm/amd/display: Atom Integrated System Info v2_2 for DCN35 (stable-fixes).
- drm/amd/display: Fix division by zero in setup_dsc_config (stable-fixes).
- drm/amd/display: Fix potential index out of bounds in color transformation function (git-fixes).
- drm/amd/display: Handle Y carry-over in VCP X.Y calculation (stable-fixes).
- drm/amd: Flush GFXOFF requests in prepare stage (git-fixes).
- drm/amdgpu: Refine IB schedule error logging (stable-fixes).
- drm/amdkfd: do not allow mapping the MMIO HDP page with large pages (git-fixes).
- drm/arm/malidp: fix a possible null pointer dereference (git-fixes).
- drm/bridge: anx7625: Do not log an error when DSI host can't be found (git-fixes).
- drm: bridge: cdns-mhdp8546: Fix possible null pointer dereference (git-fixes).
- drm/bridge: dpc3433: Do not log an error when DSI host can't be found (git-fixes).
- drm/bridge: icn6211: Do not log an error when DSI host can't be found (git-fixes).
- drm/bridge: lt8912b: Do not log an error when DSI host can't be found (git-fixes).
- drm/bridge: lt9611: Do not log an error when DSI host can't be found (git-fixes).
- drm/bridge: tc358775: Do not log an error when DSI host can't be found (git-fixes).
- drm/bridge: tc358775: fix support for jeida-18 and jeida-24 (git-fixes).
- drm/connector: Add \n to message about demoting connector force-probes (git-fixes).
- drm/i915/bios: Fix parsing backlight BDB data (git-fixes).
- drm/lcdif: Do not disable clocks on already suspended hardware (git-fixes).
- drm/mediatek: Add 0 size check to mtk_drm_gem_obj (git-fixes).
- drm/meson: dw-hdmi: add bandgap setting for g12 (git-fixes).
- drm/meson: dw-hdmi: power up phy on device init (git-fixes).
- drm/meson: vclk: fix calculation of 59.94 fractional rates (git-fixes).
- drm/msm/dp: allow voltage swing / pre emphasis of 3 (git-fixes).
- drm/msm/dpu: Always flush the slave INTF on the CTL (git-fixes).
- drm/msm/dsi: Print dual-DSI-adjusted pclk instead of original mode pclk (git-fixes).
- drm/nouveau/dp: Do not probe eDP ports twice harder (stable-fixes).
- drm/panel: atna33xc20: Fix unbalanced regulator in the case HPD does not assert (git-fixes).
- drm/panel: novatek-nt35950: Do not log an error when DSI host can't be found (git-fixes).
- drm/panel: simple: Add missing Innolux G121X1-L03 format, flags, connector (git-fixes).
- drm: vc4: Fix possible null pointer dereference (git-fixes).
- dt-bindings: clock: qcom: Add missing UFS QREF clocks (git-fixes)
- dyndbg: fix old BUG_ON in >control parser (stable-fixes).
- efi: libstub: only free priv.runtime_map when allocated (git-fixes).
- extcon: max8997: select IRQ_DOMAIN instead of depending on it (git-fixes).
- fail_function: fix wrong use of fei_attr_remove().
- fbdev: savage: Handle err return when savagefb_check_var failed (git-fixes).
- fbdev: shmobile: fix snprintf truncation (git-fixes).
- fbdev: sisfb: hide unused variables (git-fixes).
- firewire: ohci: mask bus reset interrupts between ISR and bottom half (stable-fixes).
- firmware: dmi-id: add a release callback function (git-fixes).
- firmware: raspberrypi: Use correct device for DMA mappings (git-fixes).
- fs/9p: drop inodes immediately on non-.L too (git-fixes).
- fs/9p: only translate RWX permissions for plain 9P2000 (git-fixes).
- fs/9p: translate O_TRUNC into OTRUNC (git-fixes).
- gpio: crystalcove: Use -ENOTSUPP consistently (stable-fixes).
- gpio: wcove: Use -ENOTSUPP consistently (stable-fixes).
- gpu: host1x: Do not setup DMA for virtual devices (stable-fixes).
- HID: intel-ish-hid: ipc: Add check for pci_alloc_irq_vectors (git-fixes).
- hwmon: (corsair-cpro) Protect ccp->wait_input_report with a spinlock (git-fixes).
- hwmon: (corsair-cpro) Use a separate buffer for sending commands (git-fixes).
- hwmon: (corsair-cpro) Use complete_all() instead of complete() in ccp_raw_event() (git-fixes).
- hwmon: (lm70) fix links in doc and comments (git-fixes).
- hwmon: (pmbus/ucd9000) Increase delay from 250 to 500us (git-fixes).
- i3c: master: svc: change ENXIO to EAGAIN when IBI occurs during start frame (git-fixes).
- i3c: master: svc: fix invalidate IBI type and miss call client IBI handler (git-fixes).
- IB/mlx5: Use __iowrite64_copy() for write combining stores (git-fixes)
- idpf: extend tx watchdog timeout (bsc#1224137).
- iio: core: Leave private pointer NULL when no private data supplied (git-fixes).
- iio: pressure: dps310: support negative temperature values (git-fixes).
- Input: cyapa - add missing input core locking to suspend/resume functions (git-fixes).
- Input: ims-pcu - fix printf string overflow (git-fixes).
- Input: pm8xxx-vibrator - correct VIB_MAX_LEVELS calculation (git-fixes).
- iomap: Fix inline extent handling in iomap_readpage (git-fixes)
- iomap: iomap: fix memory corruption when recording errors during writeback (git-fixes)
- iomap: Support partial direct I/O on user copy failures (git-fixes)
- iommu/dma: Force swiotlb_max_mapping_size on an untrusted device (bsc#1224331)
- io_uring/unix: drop usage of io_uring socket (git-fixes).
- irqchip/gic-v3-its: Prevent double free on error (git-fixes).
- jffs2: prevent xattr node from overflowing the eraseblock (git-fixes).
- kABI: bpf: struct bpf_insn_aux_data kABI workaround (bsc#1225756).
- kcm: do not sense pfmemalloc status in kcm_sendpage() (git-fixes bsc#1223959)
- KEYS: trusted: Do not use WARN when encode fails (git-fixes).
- KEYS: trusted: Fix memory leak in tpm2_key_encode() (git-fixes).
- KVM: s390: Check kvm pointer when testing KVM_CAP_S390_HPAGE_1M (git-fixes bsc#1224794).
- leds: pwm: Disable PWM when going to suspend (git-fixes).
- libsubcmd: Fix parse-options memory leak (git-fixes).
- locking/atomic: Make test_and_*_bit() ordered on failure (git-fixes).
- media: atomisp: ssh_css: Fix a null-pointer dereference in load_video_binaries (git-fixes).
- media: dt-bindings: ovti,ov2680: Fix the power supply names (git-fixes).
- media: mc: mark the media devnode as registered from the, start (git-fixes).
- media: ngene: Add dvb_ca_en50221_init return value check (git-fixes).
- media: stk1160: fix bounds checking in stk1160_copy_video() (git-fixes).
- mei: me: add lunar lake point M DID (stable-fixes).
- mfd: intel-lpss: Revert "Add missing check for platform_get_resource" (git-fixes).
- mfd: ti_am335x_tscadc: Support the correctly spelled DT property (git-fixes).
- mfd: tqmx86: Specify IO port register range more precisely (git-fixes).
- mlxbf_gige: Enable the GigE port in mlxbf_gige_open (git-fixes).
- mlxbf_gige: Fix intermittent no ip issue (git-fixes).
- mlxbf_gige: stop PHY during open() error paths (git-fixes).
- mmc: sdhci_am654: Add tuning algorithm for delay chain (git-fixes).
- mmc: sdhci_am654: Write ITAPDLY for DDR52 timing (git-fixes).
- Move upstreamed patches into sorted section
- mtd: core: Report error if first mtd_otp_size() call fails in mtd_otp_nvmem_add() (git-fixes).
- mtd: rawnand: hynix: fixed typo (git-fixes).
- net: do not sense pfmemalloc status in skb_append_pagefrags() (git-fixes bsc#1223959)
- netfilter: nf_tables: bail out early if hardware offload is not supported (git-fixes bsc#1223961)
- net: introduce __skb_fill_page_desc_noacc (git-fixes bsc#1223959)
- net: nfc: remove inappropriate attrs check (stable-fixes).
- net: qualcomm: rmnet: fix global oob in rmnet_policy (git-fixes).
- net: usb: ax88179_178a: fix link status when link is set to down/up (git-fixes).
- net:usb:qmi_wwan: support Rolling modules (stable-fixes).
- net: usb: smsc95xx: stop lying about skb->truesize (git-fixes).
- net: usb: sr9700: stop lying about skb->truesize (git-fixes).
- net: vmxnet3: Fix NULL pointer dereference in vmxnet3_rq_rx_complete() (bsc#1223360).
- nfc: nci: Fix handling of zero-length payload packets in nci_rx_work() (git-fixes).
- nfc: nci: Fix uninit-value in nci_rx_work (git-fixes).
- nilfs2: fix out-of-range warning (git-fixes).
- nilfs2: fix unexpected freezing of nilfs_segctor_sync() (git-fixes).
- nilfs2: fix use-after-free of timer for log writer thread (git-fixes).
- nilfs2: make superblock data array index computation sparse friendly (git-fixes).
- nvme: ensure disabling pairs with unquiesce (bsc#1224534).
- nvme: fix miss command type check (git-fixes).
- nvme: fix multipath batched completion accounting (git-fixes).
- nvme-multipath: fix io accounting on failover (git-fixes).
- nvmet: fix ns enable/disable possible hang (git-fixes).
- PCI: dwc: Detect iATU settings after getting "addr_space" resource (git-fixes).
- PCI: dwc: ep: Fix DBI access failure for drivers requiring refclk from host (git-fixes).
- PCI: dwc: Use the bitmap API to allocate bitmaps (git-fixes).
- PCI/EDR: Align EDR_PORT_DPC_ENABLE_DSM with PCI Firmware r3.3 (git-fixes).
- PCI/EDR: Align EDR_PORT_LOCATE_DSM with PCI Firmware r3.3 (git-fixes).
- PCI: rockchip-ep: Remove wrong mask on subsys_vendor_id (git-fixes).
- PCI: tegra194: Fix probe path for Endpoint mode (git-fixes).
- pinctrl: armada-37xx: remove an unused variable (git-fixes).
- pinctrl: core: delete incorrect free in pinctrl_enable() (git-fixes).
- pinctrl: core: handle radix_tree_insert() errors in pinctrl_register_one_pin() (stable-fixes).
- pinctrl: devicetree: fix refcount leak in pinctrl_dt_to_map() (git-fixes).
- pinctrl/meson: fix typo in PDM's pin name (git-fixes).
- pinctrl: pinctrl-aspeed-g6: Fix register offset for pinconf of GPIOR-T (git-fixes).
- platform/x86/intel-uncore-freq: Do not present root domain on error (git-fixes).
- platform/x86: xiaomi-wmi: Fix race condition when reporting key events (git-fixes).
- powerpc/eeh: Permanently disable the removed device (bsc#1223991 ltc#205740).
- powerpc/eeh: Small refactor of eeh_handle_normal_event() (bsc#1223991 ltc#205740).
- powerpc/eeh: Use a goto for recovery failures (bsc#1223991 ltc#205740).
- powerpc/powernv: Add a null pointer check in opal_event_init() (bsc#1065729).
- powerpc/pseries/lparcfg: drop error message from guest name lookup (bsc#1187716 ltc#193451 git-fixes).
- powerpc/pseries/vio: Do not return ENODEV if node or compatible missing (bsc#1220783).
- powerpc/uaccess: Fix build errors seen with GCC 13/14 (bsc#1194869).
- powerpc/uaccess: Use YZ asm constraint for ld (bsc#1194869).
- power: rt9455: hide unused rt9455_boost_voltage_values (git-fixes).
- ppdev: Add an error check in register_device (git-fixes).
- printk: Update @console_may_schedule in console_trylock_spinning() (bsc#1225616).
- qibfs: fix dentry leak (git-fixes)
- RDMA/hns: Add max_ah and cq moderation capacities in query_device() (git-fixes)
- RDMA/hns: Fix deadlock on SRQ async events. (git-fixes)
- RDMA/hns: Fix GMV table pagesize (git-fixes)
- RDMA/hns: Fix return value in hns_roce_map_mr_sg (git-fixes)
- RDMA/hns: Fix UAF for cq async event (git-fixes)
- RDMA/hns: Modify the print level of CQE error (git-fixes)
- RDMA/hns: Use complete parentheses in macros (git-fixes)
- RDMA/IPoIB: Fix format truncation compilation errors (git-fixes)
- RDMA/mlx5: Adding remote atomic access flag to updatable flags (git-fixes)
- RDMA/mlx5: Fix port number for counter query in multi-port configuration (git-fixes)
- RDMA/rxe: Add ibdev_dbg macros for rxe (git-fixes)
- RDMA/rxe: Fix incorrect rxe_put in error path (git-fixes)
- RDMA/rxe: Fix seg fault in rxe_comp_queue_pkt (git-fixes)
- RDMA/rxe: Fix the problem "mutex_destroy missing" (git-fixes)
- RDMA/rxe: Replace pr_xxx by rxe_dbg_xxx in rxe_net.c (git-fixes)
- RDMA/rxe: Split rxe_run_task() into two subroutines (git-fixes)
- regulator: bd71828: Do not overwrite runtime voltages (git-fixes).
- regulator: core: fix debugfs creation regression (git-fixes).
- regulator: mt6360: De-capitalize devicetree regulator subnodes (git-fixes).
- remoteproc: mediatek: Make sure IPI buffer fits in L2TCM (git-fixes).
- Revert "cifs: reconnect work should have reference on server struct" (git-fixes, bsc#1224020).
- Revert "drm/bridge: ti-sn65dsi83: Fix enable error path" (git-fixes).
- ring-buffer: Fix a race between readers and resize checks (git-fixes).
- s390/bpf: Emit a barrier for BPF_FETCH instructions (git-fixes bsc#1224795).
- s390/cio: fix tracepoint subchannel type field (git-fixes bsc#1224796).
- s390/cpum_cf: make crypto counters upward compatible across machine types (bsc#1224346).
- s390/ipl: Fix incorrect initialization of len fields in nvme reipl block (git-fixes bsc#1225139).
- s390/ipl: Fix incorrect initialization of nvme dump block (git-fixes bsc#1225138).
- sched/topology: Optimize topology_span_sane() (bsc#1225053).
- scsi: arcmsr: Support new PCI device IDs 1883 and 1886 (git-fixes).
- scsi: bfa: Fix function pointer type mismatch for hcb_qe->cbfn (git-fixes).
- scsi: core: Consult supported VPD page list prior to fetching page (git-fixes).
- scsi: core: Fix unremoved procfs host directory regression (git-fixes).
- scsi: csiostor: Avoid function pointer casts (git-fixes).
- scsi: libfc: Do not schedule abort twice (git-fixes).
- scsi: libfc: Fix up timeout error in fc_fcp_rec_error() (git-fixes).
- scsi: lpfc: Add support for 32 byte CDBs (bsc#1225842).
- scsi: lpfc: Change default logging level for unsolicited CT MIB commands (bsc#1225842).
- scsi: lpfc: Change lpfc_hba hba_flag member into a bitmask (bsc#1225842).
- scsi: lpfc: Clear deferred RSCN processing flag when driver is unloading (bsc#1225842).
- scsi: lpfc: Copyright updates for 14.4.0.2 patches (bsc#1225842).
- scsi: lpfc: Introduce rrq_list_lock to protect active_rrq_list (bsc#1225842).
- scsi: lpfc: Update logging of protection type for T10 DIF I/O (bsc#1225842).
- scsi: lpfc: Update lpfc version to 14.4.0.2 (bsc#1225842).
- scsi: mpt3sas: Prevent sending diag_reset when the controller is ready (git-fixes).
- scsi: mylex: Fix sysfs buffer lengths (git-fixes).
- scsi: qla2xxx: Fix off by one in qla_edif_app_getstats() (git-fixes).
- scsi: sd: Unregister device if device_add_disk() failed in sd_probe() (git-fixes).
- selftests/pidfd: Fix config for pidfd_setns_test (git-fixes).
- serial: 8250_bcm7271: use default_mux_rate if possible (git-fixes).
- serial: kgdboc: Fix NMI-safety problems from keyboard reset code (stable-fixes).
- serial: max3100: Fix bitwise types (git-fixes).
- serial: max3100: Lock port->lock when calling uart_handle_cts_change() (git-fixes).
- serial: sc16is7xx: add proper sched.h include for sched_set_fifo() (git-fixes).
- serial: sc16is7xx: fix bug in sc16is7xx_set_baud() when using prescaler (git-fixes).
- serial: sh-sci: protect invalidating RXDMA on shutdown (git-fixes).
- smb3: show beginning time for per share stats (bsc#1224020).
- smb: client: ensure to try all targets when finding nested links (bsc#1224020).
- smb: client: fix mount when dns_resolver key is not available (git-fixes, bsc#1224020).
- smb: client: get rid of dfs code dep in namespace.c (bsc#1224020).
- smb: client: get rid of dfs naming in automount code (bsc#1224020).
- smb: client: introduce DFS_CACHE_TGT_LIST() (bsc#1224020).
- smb: client: reduce stack usage in cifs_try_adding_channels() (bsc#1224020).
- smb: client: remove extra @chan_count check in __cifs_put_smb_ses() (bsc#1224020).
- smb: client: rename cifs_dfs_ref.c to namespace.c (bsc#1224020).
- soc: mediatek: cmdq: Fix typo of CMDQ_JUMP_RELATIVE (git-fixes).
- soc: qcom: rpmh-rsc: Enhance check for VRM in-flight request (git-fixes).
- Sort recent BHI patches
- speakup: Fix sizeof() vs ARRAY_SIZE() bug (git-fixes).
- spmi: Add a check for remove callback when removing a SPMI driver (git-fixes).
- spmi: hisi-spmi-controller: Do not override device identifier (git-fixes).
- swiotlb: extend buffer pre-padding to alloc_align_mask if necessary (bsc#1224331).
- swiotlb: Fix alignment checks when both allocation and DMA masks are (bsc#1224331)
- swiotlb: Fix double-allocation of slots due to broken alignment (bsc#1224331)
- swiotlb: Honour dma_alloc_coherent() alignment in swiotlb_alloc() (bsc#1224331)
- sysv: do not call sb_bread() with pointers_lock held (git-fixes).
- thermal/drivers/tsens: Fix null pointer dereference (git-fixes).
- tools/latency-collector: Fix -Wformat-security compile warns (git-fixes).
- tpm_tis_spi: Account for SPI header when allocating TPM SPI xfer (bsc#1225535)
- tpm_tis_spi: Account for SPI header when allocating TPM SPI xfer buffer (git-fixes).
- tracing: Add MODULE_DESCRIPTION() to preemptirq_delay_test (git-fixes).
- tracing: hide unused ftrace_event_id_fops (git-fixes).
- tty: n_gsm: fix missing receive state reset after mode switch (git-fixes).
- tty: n_gsm: fix possible out-of-bounds in gsm0_receive() (git-fixes).
- usb: aqc111: stop lying about skb->truesize (git-fixes).
- USB: core: Add hub_get() and hub_put() routines (git-fixes).
- USB: core: Fix access violation during port device removal (git-fixes).
- USB: core: Fix deadlock in port "disable" sysfs attribute (git-fixes).
- usb: dwc3: core: Prevent phy suspend during init (Git-fixes).
- usb: gadget: u_audio: Clear uac pointer when freed (git-fixes).
- usb: typec: tipd: fix event checking for tps6598x (git-fixes).
- usb: typec: ucsi: displayport: Fix potential deadlock (git-fixes).
- VMCI: Fix an error handling path in vmci_guest_probe_device() (git-fixes).
- VMCI: Fix possible memcpy() run-time warning in vmci_datagram_invoke_guest_handler() (stable-fixes).
- vmci: prevent speculation leaks by sanitizing event in event_deliver() (git-fixes).
- watchdog: cpu5wdt.c: Fix use-after-free bug caused by cpu5wdt_trigger (git-fixes).
- watchdog: ixp4xx: Make sure restart always works (git-fixes).
- watchdog: rti_wdt: Set min_hw_heartbeat_ms to accommodate a safety margin (git-fixes).
- wifi: ar5523: enable proper endpoint verification (git-fixes).
- wifi: ath10k: Fix an error code problem in ath10k_dbg_sta_write_peer_debug_trigger() (git-fixes).
- wifi: ath10k: poll service ready message before failing (git-fixes).
- wifi: ath10k: populate board data for WCN3990 (git-fixes).
- wifi: ath11k: do not force enable power save on non-running vdevs (git-fixes).
- wifi: carl9170: add a proper sanity check for endpoints (git-fixes).
- wifi: carl9170: re-fix fortified-memset warning (git-fixes).
- wifi: cfg80211: fix rdev_dump_mpp() arguments order (stable-fixes).
- wifi: mac80211: fix ieee80211_bss_*_flags kernel-doc (stable-fixes).
- wifi: mwl8k: initialize cmd->addr[] properly (git-fixes).
- x86/boot: Ignore NMIs during very early boot (git-fixes).
- x86/bugs: Cache the value of MSR_IA32_ARCH_CAPABILITIES (git-fixes).
- x86/bugs: Change commas to semicolons in 'spectre_v2' sysfs file (git-fixes).
- x86/bugs: Fix BHI documentation (git-fixes).
- x86/bugs: Fix BHI handling of RRSBA (git-fixes).
- x86/bugs: Fix BHI retpoline check (git-fixes).
- x86/bugs: Fix return type of spectre_bhi_state() (git-fixes).
- x86/bugs: Remove CONFIG_BHI_MITIGATION_AUTO and spectre_bhi=auto (git-fixes).
- x86/bugs: Rename various 'ia32_cap' variables to 'x86_arch_cap_msr' (git-fixes).
- x86/bugs: Replace CONFIG_SPECTRE_BHI_{ON,OFF} with CONFIG_MITIGATION_SPECTRE_BHI (git-fixes).
- x86: Fix CPUIDLE_FLAG_IRQ_ENABLE leaking timer reprogram (git-fixes).
- x86/kvm: Do not try to disable kvmclock if it was not enabled (git-fixes).
- x86/lib: Fix overflow when counting digits (git-fixes).
- x86/mce: Make sure to grab mce_sysfs_mutex in set_bank() (git-fixes).
- x86/nmi: Drop unused declaration of proc_nmi_enabled() (git-fixes).
- x86/retpoline: Do the necessary fixup to the Zen3/4 srso return thunk for !SRSO (git-fixes).
- x86/sev: Check for MWAITX and MONITORX opcodes in the #VC handler (git-fixes).
- x86/sme: Fix memory encryption setting if enabled by default and not overridden (git-fixes).
- x86/tdx: Preserve shared bit on mprotect() (git-fixes).
- xfs: fix exception caused by unexpected illegal bestcount in leaf dir (git-fixes).
- xfs: Fix false ENOSPC when performing direct write on a delalloc extent in cow fork (git-fixes).
- xfs: fix imprecise logic in xchk_btree_check_block_owner (git-fixes).
- xfs: fix inode reservation space for removing transaction (git-fixes).
- xfs: shrink failure needs to hold AGI buffer (git-fixes).
Special Instructions and Notes:
- Please reboot the system after installing this update.
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
Development Tools Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-2190=1
-
Legacy Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Legacy-15-SP5-2024-2190=1
-
SUSE Linux Enterprise Live Patching 15-SP5
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-2190=1
Please note that this is the initial kernel livepatch without fixes itself, this package is later updated by separate standalone kernel livepatch updates. -
SUSE Linux Enterprise High Availability Extension 15 SP5
zypper in -t patch SUSE-SLE-Product-HA-15-SP5-2024-2190=1
-
SUSE Linux Enterprise Workstation Extension 15 SP5
zypper in -t patch SUSE-SLE-Product-WE-15-SP5-2024-2190=1
-
openSUSE Leap 15.5
zypper in -t patch SUSE-2024-2190=1 openSUSE-SLE-15.5-2024-2190=1
-
SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-2190=1
-
Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-2190=1
Package List:
-
Development Tools Module 15-SP5 (noarch nosrc)
- kernel-docs-5.14.21-150500.55.68.1
-
Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64)
- kernel-syms-5.14.21-150500.55.68.1
- kernel-obs-build-5.14.21-150500.55.68.1
- kernel-obs-build-debugsource-5.14.21-150500.55.68.1
-
Development Tools Module 15-SP5 (noarch)
- kernel-source-5.14.21-150500.55.68.1
-
Legacy Module 15-SP5 (nosrc)
- kernel-default-5.14.21-150500.55.68.1
-
Legacy Module 15-SP5 (aarch64 ppc64le s390x x86_64)
- reiserfs-kmp-default-5.14.21-150500.55.68.1
- kernel-default-debugsource-5.14.21-150500.55.68.1
- reiserfs-kmp-default-debuginfo-5.14.21-150500.55.68.1
- kernel-default-debuginfo-5.14.21-150500.55.68.1
-
SUSE Linux Enterprise Live Patching 15-SP5 (nosrc)
- kernel-default-5.14.21-150500.55.68.1
-
SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64)
- kernel-livepatch-SLE15-SP5_Update_15-debugsource-1-150500.11.3.1
- kernel-livepatch-5_14_21-150500_55_68-default-1-150500.11.3.1
- kernel-default-livepatch-devel-5.14.21-150500.55.68.1
- kernel-default-debuginfo-5.14.21-150500.55.68.1
- kernel-livepatch-5_14_21-150500_55_68-default-debuginfo-1-150500.11.3.1
- kernel-default-debugsource-5.14.21-150500.55.68.1
- kernel-default-livepatch-5.14.21-150500.55.68.1
-
SUSE Linux Enterprise High Availability Extension 15 SP5 (aarch64 ppc64le s390x x86_64)
- gfs2-kmp-default-5.14.21-150500.55.68.1
- kernel-default-debuginfo-5.14.21-150500.55.68.1
- cluster-md-kmp-default-5.14.21-150500.55.68.1
- ocfs2-kmp-default-5.14.21-150500.55.68.1
- gfs2-kmp-default-debuginfo-5.14.21-150500.55.68.1
- ocfs2-kmp-default-debuginfo-5.14.21-150500.55.68.1
- dlm-kmp-default-debuginfo-5.14.21-150500.55.68.1
- kernel-default-debugsource-5.14.21-150500.55.68.1
- dlm-kmp-default-5.14.21-150500.55.68.1
- cluster-md-kmp-default-debuginfo-5.14.21-150500.55.68.1
-
SUSE Linux Enterprise High Availability Extension 15 SP5 (nosrc)
- kernel-default-5.14.21-150500.55.68.1
-
SUSE Linux Enterprise Workstation Extension 15 SP5 (nosrc)
- kernel-default-5.14.21-150500.55.68.1
-
SUSE Linux Enterprise Workstation Extension 15 SP5 (x86_64)
- kernel-default-extra-debuginfo-5.14.21-150500.55.68.1
- kernel-default-debugsource-5.14.21-150500.55.68.1
- kernel-default-extra-5.14.21-150500.55.68.1
- kernel-default-debuginfo-5.14.21-150500.55.68.1
-
openSUSE Leap 15.5 (noarch nosrc)
- kernel-docs-5.14.21-150500.55.68.1
-
openSUSE Leap 15.5 (noarch)
- kernel-macros-5.14.21-150500.55.68.1
- kernel-docs-html-5.14.21-150500.55.68.1
- kernel-devel-5.14.21-150500.55.68.1
- kernel-source-5.14.21-150500.55.68.1
- kernel-source-vanilla-5.14.21-150500.55.68.1
-
openSUSE Leap 15.5 (nosrc ppc64le x86_64)
- kernel-debug-5.14.21-150500.55.68.1
-
openSUSE Leap 15.5 (ppc64le x86_64)
- kernel-debug-debugsource-5.14.21-150500.55.68.1
- kernel-debug-devel-5.14.21-150500.55.68.1
- kernel-debug-debuginfo-5.14.21-150500.55.68.1
- kernel-debug-livepatch-devel-5.14.21-150500.55.68.1
- kernel-debug-devel-debuginfo-5.14.21-150500.55.68.1
-
openSUSE Leap 15.5 (x86_64)
- kernel-default-vdso-5.14.21-150500.55.68.1
- kernel-debug-vdso-debuginfo-5.14.21-150500.55.68.1
- kernel-debug-vdso-5.14.21-150500.55.68.1
- kernel-kvmsmall-vdso-debuginfo-5.14.21-150500.55.68.1
- kernel-kvmsmall-vdso-5.14.21-150500.55.68.1
- kernel-default-vdso-debuginfo-5.14.21-150500.55.68.1
-
openSUSE Leap 15.5 (aarch64 ppc64le x86_64)
- kernel-default-base-rebuild-5.14.21-150500.55.68.1.150500.6.31.1
- kernel-kvmsmall-debuginfo-5.14.21-150500.55.68.1
- kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.68.1
- kernel-kvmsmall-debugsource-5.14.21-150500.55.68.1
- kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1
- kernel-kvmsmall-devel-debuginfo-5.14.21-150500.55.68.1
- kernel-kvmsmall-devel-5.14.21-150500.55.68.1
-
openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
- kernel-default-extra-debuginfo-5.14.21-150500.55.68.1
- cluster-md-kmp-default-5.14.21-150500.55.68.1
- kernel-default-devel-5.14.21-150500.55.68.1
- gfs2-kmp-default-debuginfo-5.14.21-150500.55.68.1
- kernel-obs-build-5.14.21-150500.55.68.1
- kernel-default-debugsource-5.14.21-150500.55.68.1
- kernel-default-livepatch-5.14.21-150500.55.68.1
- kernel-syms-5.14.21-150500.55.68.1
- kernel-default-optional-debuginfo-5.14.21-150500.55.68.1
- kernel-default-debuginfo-5.14.21-150500.55.68.1
- kernel-default-extra-5.14.21-150500.55.68.1
- kernel-default-livepatch-devel-5.14.21-150500.55.68.1
- kselftests-kmp-default-debuginfo-5.14.21-150500.55.68.1
- kernel-obs-build-debugsource-5.14.21-150500.55.68.1
- ocfs2-kmp-default-debuginfo-5.14.21-150500.55.68.1
- kernel-default-devel-debuginfo-5.14.21-150500.55.68.1
- dlm-kmp-default-5.14.21-150500.55.68.1
- kselftests-kmp-default-5.14.21-150500.55.68.1
- kernel-default-optional-5.14.21-150500.55.68.1
- ocfs2-kmp-default-5.14.21-150500.55.68.1
- kernel-obs-qa-5.14.21-150500.55.68.1
- reiserfs-kmp-default-5.14.21-150500.55.68.1
- cluster-md-kmp-default-debuginfo-5.14.21-150500.55.68.1
- gfs2-kmp-default-5.14.21-150500.55.68.1
- dlm-kmp-default-debuginfo-5.14.21-150500.55.68.1
- reiserfs-kmp-default-debuginfo-5.14.21-150500.55.68.1
-
openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 nosrc)
- kernel-default-5.14.21-150500.55.68.1
-
openSUSE Leap 15.5 (aarch64 nosrc ppc64le x86_64)
- kernel-kvmsmall-5.14.21-150500.55.68.1
-
openSUSE Leap 15.5 (ppc64le s390x x86_64)
- kernel-livepatch-SLE15-SP5_Update_15-debugsource-1-150500.11.3.1
- kernel-livepatch-5_14_21-150500_55_68-default-debuginfo-1-150500.11.3.1
- kernel-livepatch-5_14_21-150500_55_68-default-1-150500.11.3.1
-
openSUSE Leap 15.5 (nosrc s390x)
- kernel-zfcpdump-5.14.21-150500.55.68.1
-
openSUSE Leap 15.5 (s390x)
- kernel-zfcpdump-debuginfo-5.14.21-150500.55.68.1
- kernel-zfcpdump-debugsource-5.14.21-150500.55.68.1
-
openSUSE Leap 15.5 (nosrc)
- dtb-aarch64-5.14.21-150500.55.68.1
-
openSUSE Leap 15.5 (aarch64)
- kernel-64kb-optional-debuginfo-5.14.21-150500.55.68.1
- reiserfs-kmp-64kb-5.14.21-150500.55.68.1
- kernel-64kb-optional-5.14.21-150500.55.68.1
- dlm-kmp-64kb-5.14.21-150500.55.68.1
- dtb-apple-5.14.21-150500.55.68.1
- dtb-lg-5.14.21-150500.55.68.1
- dtb-broadcom-5.14.21-150500.55.68.1
- dtb-amd-5.14.21-150500.55.68.1
- cluster-md-kmp-64kb-debuginfo-5.14.21-150500.55.68.1
- dtb-nvidia-5.14.21-150500.55.68.1
- kernel-64kb-debuginfo-5.14.21-150500.55.68.1
- dtb-renesas-5.14.21-150500.55.68.1
- kernel-64kb-devel-debuginfo-5.14.21-150500.55.68.1
- dtb-sprd-5.14.21-150500.55.68.1
- dtb-arm-5.14.21-150500.55.68.1
- reiserfs-kmp-64kb-debuginfo-5.14.21-150500.55.68.1
- dtb-xilinx-5.14.21-150500.55.68.1
- dtb-apm-5.14.21-150500.55.68.1
- dtb-hisilicon-5.14.21-150500.55.68.1
- gfs2-kmp-64kb-5.14.21-150500.55.68.1
- dtb-rockchip-5.14.21-150500.55.68.1
- kselftests-kmp-64kb-5.14.21-150500.55.68.1
- dlm-kmp-64kb-debuginfo-5.14.21-150500.55.68.1
- gfs2-kmp-64kb-debuginfo-5.14.21-150500.55.68.1
- kernel-64kb-extra-5.14.21-150500.55.68.1
- cluster-md-kmp-64kb-5.14.21-150500.55.68.1
- ocfs2-kmp-64kb-debuginfo-5.14.21-150500.55.68.1
- dtb-altera-5.14.21-150500.55.68.1
- dtb-qcom-5.14.21-150500.55.68.1
- dtb-socionext-5.14.21-150500.55.68.1
- kernel-64kb-devel-5.14.21-150500.55.68.1
- dtb-mediatek-5.14.21-150500.55.68.1
- dtb-marvell-5.14.21-150500.55.68.1
- kselftests-kmp-64kb-debuginfo-5.14.21-150500.55.68.1
- kernel-64kb-debugsource-5.14.21-150500.55.68.1
- kernel-64kb-livepatch-devel-5.14.21-150500.55.68.1
- dtb-allwinner-5.14.21-150500.55.68.1
- dtb-cavium-5.14.21-150500.55.68.1
- dtb-amlogic-5.14.21-150500.55.68.1
- ocfs2-kmp-64kb-5.14.21-150500.55.68.1
- kernel-64kb-extra-debuginfo-5.14.21-150500.55.68.1
- dtb-amazon-5.14.21-150500.55.68.1
- dtb-freescale-5.14.21-150500.55.68.1
- dtb-exynos-5.14.21-150500.55.68.1
-
openSUSE Leap 15.5 (aarch64 nosrc)
- kernel-64kb-5.14.21-150500.55.68.1
-
SUSE Linux Enterprise Micro 5.5 (aarch64 nosrc s390x x86_64)
- kernel-default-5.14.21-150500.55.68.1
-
SUSE Linux Enterprise Micro 5.5 (aarch64 x86_64)
- kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1
-
SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64)
- kernel-default-debugsource-5.14.21-150500.55.68.1
- kernel-default-debuginfo-5.14.21-150500.55.68.1
-
Basesystem Module 15-SP5 (aarch64 nosrc)
- kernel-64kb-5.14.21-150500.55.68.1
-
Basesystem Module 15-SP5 (aarch64)
- kernel-64kb-debugsource-5.14.21-150500.55.68.1
- kernel-64kb-devel-debuginfo-5.14.21-150500.55.68.1
- kernel-64kb-devel-5.14.21-150500.55.68.1
- kernel-64kb-debuginfo-5.14.21-150500.55.68.1
-
Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64 nosrc)
- kernel-default-5.14.21-150500.55.68.1
-
Basesystem Module 15-SP5 (aarch64 ppc64le x86_64)
- kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1
-
Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
- kernel-default-devel-debuginfo-5.14.21-150500.55.68.1
- kernel-default-debugsource-5.14.21-150500.55.68.1
- kernel-default-devel-5.14.21-150500.55.68.1
- kernel-default-debuginfo-5.14.21-150500.55.68.1
-
Basesystem Module 15-SP5 (noarch)
- kernel-macros-5.14.21-150500.55.68.1
- kernel-devel-5.14.21-150500.55.68.1
-
Basesystem Module 15-SP5 (nosrc s390x)
- kernel-zfcpdump-5.14.21-150500.55.68.1
-
Basesystem Module 15-SP5 (s390x)
- kernel-zfcpdump-debuginfo-5.14.21-150500.55.68.1
- kernel-zfcpdump-debugsource-5.14.21-150500.55.68.1
References:
- https://www.suse.com/security/cve/CVE-2020-36788.html
- https://www.suse.com/security/cve/CVE-2021-4148.html
- https://www.suse.com/security/cve/CVE-2021-47358.html
- https://www.suse.com/security/cve/CVE-2021-47359.html
- https://www.suse.com/security/cve/CVE-2021-47360.html
- https://www.suse.com/security/cve/CVE-2021-47361.html
- https://www.suse.com/security/cve/CVE-2021-47362.html
- https://www.suse.com/security/cve/CVE-2021-47363.html
- https://www.suse.com/security/cve/CVE-2021-47364.html
- https://www.suse.com/security/cve/CVE-2021-47365.html
- https://www.suse.com/security/cve/CVE-2021-47366.html
- https://www.suse.com/security/cve/CVE-2021-47367.html
- https://www.suse.com/security/cve/CVE-2021-47368.html
- https://www.suse.com/security/cve/CVE-2021-47369.html
- https://www.suse.com/security/cve/CVE-2021-47370.html
- https://www.suse.com/security/cve/CVE-2021-47371.html
- https://www.suse.com/security/cve/CVE-2021-47372.html
- https://www.suse.com/security/cve/CVE-2021-47373.html
- https://www.suse.com/security/cve/CVE-2021-47374.html
- https://www.suse.com/security/cve/CVE-2021-47375.html
- https://www.suse.com/security/cve/CVE-2021-47376.html
- https://www.suse.com/security/cve/CVE-2021-47378.html
- https://www.suse.com/security/cve/CVE-2021-47379.html
- https://www.suse.com/security/cve/CVE-2021-47380.html
- https://www.suse.com/security/cve/CVE-2021-47381.html
- https://www.suse.com/security/cve/CVE-2021-47382.html
- https://www.suse.com/security/cve/CVE-2021-47383.html
- https://www.suse.com/security/cve/CVE-2021-47384.html
- https://www.suse.com/security/cve/CVE-2021-47385.html
- https://www.suse.com/security/cve/CVE-2021-47386.html
- https://www.suse.com/security/cve/CVE-2021-47387.html
- https://www.suse.com/security/cve/CVE-2021-47388.html
- https://www.suse.com/security/cve/CVE-2021-47389.html
- https://www.suse.com/security/cve/CVE-2021-47390.html
- https://www.suse.com/security/cve/CVE-2021-47391.html
- https://www.suse.com/security/cve/CVE-2021-47392.html
- https://www.suse.com/security/cve/CVE-2021-47393.html
- https://www.suse.com/security/cve/CVE-2021-47394.html
- https://www.suse.com/security/cve/CVE-2021-47395.html
- https://www.suse.com/security/cve/CVE-2021-47396.html
- https://www.suse.com/security/cve/CVE-2021-47397.html
- https://www.suse.com/security/cve/CVE-2021-47398.html
- https://www.suse.com/security/cve/CVE-2021-47399.html
- https://www.suse.com/security/cve/CVE-2021-47400.html
- https://www.suse.com/security/cve/CVE-2021-47401.html
- https://www.suse.com/security/cve/CVE-2021-47402.html
- https://www.suse.com/security/cve/CVE-2021-47403.html
- https://www.suse.com/security/cve/CVE-2021-47404.html
- https://www.suse.com/security/cve/CVE-2021-47405.html
- https://www.suse.com/security/cve/CVE-2021-47406.html
- https://www.suse.com/security/cve/CVE-2021-47407.html
- https://www.suse.com/security/cve/CVE-2021-47408.html
- https://www.suse.com/security/cve/CVE-2021-47409.html
- https://www.suse.com/security/cve/CVE-2021-47410.html
- https://www.suse.com/security/cve/CVE-2021-47412.html
- https://www.suse.com/security/cve/CVE-2021-47413.html
- https://www.suse.com/security/cve/CVE-2021-47414.html
- https://www.suse.com/security/cve/CVE-2021-47415.html
- https://www.suse.com/security/cve/CVE-2021-47416.html
- https://www.suse.com/security/cve/CVE-2021-47417.html
- https://www.suse.com/security/cve/CVE-2021-47418.html
- https://www.suse.com/security/cve/CVE-2021-47419.html
- https://www.suse.com/security/cve/CVE-2021-47420.html
- https://www.suse.com/security/cve/CVE-2021-47421.html
- https://www.suse.com/security/cve/CVE-2021-47422.html
- https://www.suse.com/security/cve/CVE-2021-47423.html
- https://www.suse.com/security/cve/CVE-2021-47424.html
- https://www.suse.com/security/cve/CVE-2021-47425.html
- https://www.suse.com/security/cve/CVE-2021-47426.html
- https://www.suse.com/security/cve/CVE-2021-47427.html
- https://www.suse.com/security/cve/CVE-2021-47428.html
- https://www.suse.com/security/cve/CVE-2021-47429.html
- https://www.suse.com/security/cve/CVE-2021-47430.html
- https://www.suse.com/security/cve/CVE-2021-47431.html
- https://www.suse.com/security/cve/CVE-2021-47433.html
- https://www.suse.com/security/cve/CVE-2021-47434.html
- https://www.suse.com/security/cve/CVE-2021-47435.html
- https://www.suse.com/security/cve/CVE-2021-47436.html
- https://www.suse.com/security/cve/CVE-2021-47437.html
- https://www.suse.com/security/cve/CVE-2021-47438.html
- https://www.suse.com/security/cve/CVE-2021-47439.html
- https://www.suse.com/security/cve/CVE-2021-47440.html
- https://www.suse.com/security/cve/CVE-2021-47441.html
- https://www.suse.com/security/cve/CVE-2021-47442.html
- https://www.suse.com/security/cve/CVE-2021-47443.html
- https://www.suse.com/security/cve/CVE-2021-47444.html
- https://www.suse.com/security/cve/CVE-2021-47445.html
- https://www.suse.com/security/cve/CVE-2021-47446.html
- https://www.suse.com/security/cve/CVE-2021-47447.html
- https://www.suse.com/security/cve/CVE-2021-47448.html
- https://www.suse.com/security/cve/CVE-2021-47449.html
- https://www.suse.com/security/cve/CVE-2021-47450.html
- https://www.suse.com/security/cve/CVE-2021-47451.html
- https://www.suse.com/security/cve/CVE-2021-47452.html
- https://www.suse.com/security/cve/CVE-2021-47453.html
- https://www.suse.com/security/cve/CVE-2021-47454.html
- https://www.suse.com/security/cve/CVE-2021-47455.html
- https://www.suse.com/security/cve/CVE-2021-47456.html
- https://www.suse.com/security/cve/CVE-2021-47457.html
- https://www.suse.com/security/cve/CVE-2021-47458.html
- https://www.suse.com/security/cve/CVE-2021-47459.html
- https://www.suse.com/security/cve/CVE-2021-47460.html
- https://www.suse.com/security/cve/CVE-2021-47461.html
- https://www.suse.com/security/cve/CVE-2021-47462.html
- https://www.suse.com/security/cve/CVE-2021-47463.html
- https://www.suse.com/security/cve/CVE-2021-47464.html
- https://www.suse.com/security/cve/CVE-2021-47465.html
- https://www.suse.com/security/cve/CVE-2021-47466.html
- https://www.suse.com/security/cve/CVE-2021-47467.html
- https://www.suse.com/security/cve/CVE-2021-47468.html
- https://www.suse.com/security/cve/CVE-2021-47469.html
- https://www.suse.com/security/cve/CVE-2021-47470.html
- https://www.suse.com/security/cve/CVE-2021-47471.html
- https://www.suse.com/security/cve/CVE-2021-47472.html
- https://www.suse.com/security/cve/CVE-2021-47473.html
- https://www.suse.com/security/cve/CVE-2021-47474.html
- https://www.suse.com/security/cve/CVE-2021-47475.html
- https://www.suse.com/security/cve/CVE-2021-47476.html
- https://www.suse.com/security/cve/CVE-2021-47477.html
- https://www.suse.com/security/cve/CVE-2021-47478.html
- https://www.suse.com/security/cve/CVE-2021-47479.html
- https://www.suse.com/security/cve/CVE-2021-47480.html
- https://www.suse.com/security/cve/CVE-2021-47481.html
- https://www.suse.com/security/cve/CVE-2021-47482.html
- https://www.suse.com/security/cve/CVE-2021-47483.html
- https://www.suse.com/security/cve/CVE-2021-47484.html
- https://www.suse.com/security/cve/CVE-2021-47485.html
- https://www.suse.com/security/cve/CVE-2021-47486.html
- https://www.suse.com/security/cve/CVE-2021-47488.html
- https://www.suse.com/security/cve/CVE-2021-47489.html
- https://www.suse.com/security/cve/CVE-2021-47490.html
- https://www.suse.com/security/cve/CVE-2021-47491.html
- https://www.suse.com/security/cve/CVE-2021-47492.html
- https://www.suse.com/security/cve/CVE-2021-47493.html
- https://www.suse.com/security/cve/CVE-2021-47494.html
- https://www.suse.com/security/cve/CVE-2021-47495.html
- https://www.suse.com/security/cve/CVE-2021-47496.html
- https://www.suse.com/security/cve/CVE-2021-47497.html
- https://www.suse.com/security/cve/CVE-2021-47498.html
- https://www.suse.com/security/cve/CVE-2021-47499.html
- https://www.suse.com/security/cve/CVE-2021-47500.html
- https://www.suse.com/security/cve/CVE-2021-47501.html
- https://www.suse.com/security/cve/CVE-2021-47502.html
- https://www.suse.com/security/cve/CVE-2021-47503.html
- https://www.suse.com/security/cve/CVE-2021-47504.html
- https://www.suse.com/security/cve/CVE-2021-47505.html
- https://www.suse.com/security/cve/CVE-2021-47506.html
- https://www.suse.com/security/cve/CVE-2021-47507.html
- https://www.suse.com/security/cve/CVE-2021-47508.html
- https://www.suse.com/security/cve/CVE-2021-47509.html
- https://www.suse.com/security/cve/CVE-2021-47510.html
- https://www.suse.com/security/cve/CVE-2021-47511.html
- https://www.suse.com/security/cve/CVE-2021-47512.html
- https://www.suse.com/security/cve/CVE-2021-47513.html
- https://www.suse.com/security/cve/CVE-2021-47514.html
- https://www.suse.com/security/cve/CVE-2021-47516.html
- https://www.suse.com/security/cve/CVE-2021-47518.html
- https://www.suse.com/security/cve/CVE-2021-47520.html
- https://www.suse.com/security/cve/CVE-2021-47521.html
- https://www.suse.com/security/cve/CVE-2021-47522.html
- https://www.suse.com/security/cve/CVE-2021-47523.html
- https://www.suse.com/security/cve/CVE-2021-47524.html
- https://www.suse.com/security/cve/CVE-2021-47525.html
- https://www.suse.com/security/cve/CVE-2021-47526.html
- https://www.suse.com/security/cve/CVE-2021-47527.html
- https://www.suse.com/security/cve/CVE-2021-47528.html
- https://www.suse.com/security/cve/CVE-2021-47529.html
- https://www.suse.com/security/cve/CVE-2021-47530.html
- https://www.suse.com/security/cve/CVE-2021-47531.html
- https://www.suse.com/security/cve/CVE-2021-47532.html
- https://www.suse.com/security/cve/CVE-2021-47533.html
- https://www.suse.com/security/cve/CVE-2021-47534.html
- https://www.suse.com/security/cve/CVE-2021-47535.html
- https://www.suse.com/security/cve/CVE-2021-47536.html
- https://www.suse.com/security/cve/CVE-2021-47537.html
- https://www.suse.com/security/cve/CVE-2021-47540.html
- https://www.suse.com/security/cve/CVE-2021-47541.html
- https://www.suse.com/security/cve/CVE-2021-47542.html
- https://www.suse.com/security/cve/CVE-2021-47544.html
- https://www.suse.com/security/cve/CVE-2021-47548.html
- https://www.suse.com/security/cve/CVE-2021-47549.html
- https://www.suse.com/security/cve/CVE-2021-47550.html
- https://www.suse.com/security/cve/CVE-2021-47551.html
- https://www.suse.com/security/cve/CVE-2021-47552.html
- https://www.suse.com/security/cve/CVE-2021-47553.html
- https://www.suse.com/security/cve/CVE-2021-47554.html
- https://www.suse.com/security/cve/CVE-2021-47555.html
- https://www.suse.com/security/cve/CVE-2021-47556.html
- https://www.suse.com/security/cve/CVE-2021-47557.html
- https://www.suse.com/security/cve/CVE-2021-47558.html
- https://www.suse.com/security/cve/CVE-2021-47559.html
- https://www.suse.com/security/cve/CVE-2021-47560.html
- https://www.suse.com/security/cve/CVE-2021-47562.html
- https://www.suse.com/security/cve/CVE-2021-47563.html
- https://www.suse.com/security/cve/CVE-2021-47564.html
- https://www.suse.com/security/cve/CVE-2021-47565.html
- https://www.suse.com/security/cve/CVE-2021-47569.html
- https://www.suse.com/security/cve/CVE-2022-48633.html
- https://www.suse.com/security/cve/CVE-2022-48662.html
- https://www.suse.com/security/cve/CVE-2022-48669.html
- https://www.suse.com/security/cve/CVE-2022-48689.html
- https://www.suse.com/security/cve/CVE-2022-48691.html
- https://www.suse.com/security/cve/CVE-2022-48699.html
- https://www.suse.com/security/cve/CVE-2022-48705.html
- https://www.suse.com/security/cve/CVE-2022-48708.html
- https://www.suse.com/security/cve/CVE-2022-48709.html
- https://www.suse.com/security/cve/CVE-2022-48710.html
- https://www.suse.com/security/cve/CVE-2023-0160.html
- https://www.suse.com/security/cve/CVE-2023-1829.html
- https://www.suse.com/security/cve/CVE-2023-42755.html
- https://www.suse.com/security/cve/CVE-2023-47233.html
- https://www.suse.com/security/cve/CVE-2023-52586.html
- https://www.suse.com/security/cve/CVE-2023-52591.html
- https://www.suse.com/security/cve/CVE-2023-52618.html
- https://www.suse.com/security/cve/CVE-2023-52642.html
- https://www.suse.com/security/cve/CVE-2023-52643.html
- https://www.suse.com/security/cve/CVE-2023-52644.html
- https://www.suse.com/security/cve/CVE-2023-52646.html
- https://www.suse.com/security/cve/CVE-2023-52650.html
- https://www.suse.com/security/cve/CVE-2023-52653.html
- https://www.suse.com/security/cve/CVE-2023-52654.html
- https://www.suse.com/security/cve/CVE-2023-52655.html
- https://www.suse.com/security/cve/CVE-2023-52656.html
- https://www.suse.com/security/cve/CVE-2023-52657.html
- https://www.suse.com/security/cve/CVE-2023-52659.html
- https://www.suse.com/security/cve/CVE-2023-52660.html
- https://www.suse.com/security/cve/CVE-2023-52661.html
- https://www.suse.com/security/cve/CVE-2023-52662.html
- https://www.suse.com/security/cve/CVE-2023-52664.html
- https://www.suse.com/security/cve/CVE-2023-52669.html
- https://www.suse.com/security/cve/CVE-2023-52671.html
- https://www.suse.com/security/cve/CVE-2023-52674.html
- https://www.suse.com/security/cve/CVE-2023-52676.html
- https://www.suse.com/security/cve/CVE-2023-52678.html
- https://www.suse.com/security/cve/CVE-2023-52679.html
- https://www.suse.com/security/cve/CVE-2023-52680.html
- https://www.suse.com/security/cve/CVE-2023-52683.html
- https://www.suse.com/security/cve/CVE-2023-52685.html
- https://www.suse.com/security/cve/CVE-2023-52686.html
- https://www.suse.com/security/cve/CVE-2023-52690.html
- https://www.suse.com/security/cve/CVE-2023-52691.html
- https://www.suse.com/security/cve/CVE-2023-52692.html
- https://www.suse.com/security/cve/CVE-2023-52693.html
- https://www.suse.com/security/cve/CVE-2023-52694.html
- https://www.suse.com/security/cve/CVE-2023-52696.html
- https://www.suse.com/security/cve/CVE-2023-52698.html
- https://www.suse.com/security/cve/CVE-2023-52699.html
- https://www.suse.com/security/cve/CVE-2023-52702.html
- https://www.suse.com/security/cve/CVE-2023-52703.html
- https://www.suse.com/security/cve/CVE-2023-52705.html
- https://www.suse.com/security/cve/CVE-2023-52707.html
- https://www.suse.com/security/cve/CVE-2023-52708.html
- https://www.suse.com/security/cve/CVE-2023-52730.html
- https://www.suse.com/security/cve/CVE-2023-52731.html
- https://www.suse.com/security/cve/CVE-2023-52732.html
- https://www.suse.com/security/cve/CVE-2023-52733.html
- https://www.suse.com/security/cve/CVE-2023-52736.html
- https://www.suse.com/security/cve/CVE-2023-52738.html
- https://www.suse.com/security/cve/CVE-2023-52739.html
- https://www.suse.com/security/cve/CVE-2023-52740.html
- https://www.suse.com/security/cve/CVE-2023-52741.html
- https://www.suse.com/security/cve/CVE-2023-52742.html
- https://www.suse.com/security/cve/CVE-2023-52743.html
- https://www.suse.com/security/cve/CVE-2023-52744.html
- https://www.suse.com/security/cve/CVE-2023-52745.html
- https://www.suse.com/security/cve/CVE-2023-52746.html
- https://www.suse.com/security/cve/CVE-2023-52747.html
- https://www.suse.com/security/cve/CVE-2023-52753.html
- https://www.suse.com/security/cve/CVE-2023-52754.html
- https://www.suse.com/security/cve/CVE-2023-52756.html
- https://www.suse.com/security/cve/CVE-2023-52757.html
- https://www.suse.com/security/cve/CVE-2023-52759.html
- https://www.suse.com/security/cve/CVE-2023-52763.html
- https://www.suse.com/security/cve/CVE-2023-52764.html
- https://www.suse.com/security/cve/CVE-2023-52766.html
- https://www.suse.com/security/cve/CVE-2023-52773.html
- https://www.suse.com/security/cve/CVE-2023-52774.html
- https://www.suse.com/security/cve/CVE-2023-52777.html
- https://www.suse.com/security/cve/CVE-2023-52781.html
- https://www.suse.com/security/cve/CVE-2023-52788.html
- https://www.suse.com/security/cve/CVE-2023-52789.html
- https://www.suse.com/security/cve/CVE-2023-52791.html
- https://www.suse.com/security/cve/CVE-2023-52795.html
- https://www.suse.com/security/cve/CVE-2023-52796.html
- https://www.suse.com/security/cve/CVE-2023-52798.html
- https://www.suse.com/security/cve/CVE-2023-52799.html
- https://www.suse.com/security/cve/CVE-2023-52800.html
- https://www.suse.com/security/cve/CVE-2023-52803.html
- https://www.suse.com/security/cve/CVE-2023-52804.html
- https://www.suse.com/security/cve/CVE-2023-52805.html
- https://www.suse.com/security/cve/CVE-2023-52806.html
- https://www.suse.com/security/cve/CVE-2023-52807.html
- https://www.suse.com/security/cve/CVE-2023-52808.html
- https://www.suse.com/security/cve/CVE-2023-52809.html
- https://www.suse.com/security/cve/CVE-2023-52810.html
- https://www.suse.com/security/cve/CVE-2023-52811.html
- https://www.suse.com/security/cve/CVE-2023-52814.html
- https://www.suse.com/security/cve/CVE-2023-52815.html
- https://www.suse.com/security/cve/CVE-2023-52816.html
- https://www.suse.com/security/cve/CVE-2023-52817.html
- https://www.suse.com/security/cve/CVE-2023-52818.html
- https://www.suse.com/security/cve/CVE-2023-52819.html
- https://www.suse.com/security/cve/CVE-2023-52821.html
- https://www.suse.com/security/cve/CVE-2023-52825.html
- https://www.suse.com/security/cve/CVE-2023-52826.html
- https://www.suse.com/security/cve/CVE-2023-52832.html
- https://www.suse.com/security/cve/CVE-2023-52833.html
- https://www.suse.com/security/cve/CVE-2023-52834.html
- https://www.suse.com/security/cve/CVE-2023-52838.html
- https://www.suse.com/security/cve/CVE-2023-52840.html
- https://www.suse.com/security/cve/CVE-2023-52841.html
- https://www.suse.com/security/cve/CVE-2023-52844.html
- https://www.suse.com/security/cve/CVE-2023-52847.html
- https://www.suse.com/security/cve/CVE-2023-52851.html
- https://www.suse.com/security/cve/CVE-2023-52853.html
- https://www.suse.com/security/cve/CVE-2023-52854.html
- https://www.suse.com/security/cve/CVE-2023-52855.html
- https://www.suse.com/security/cve/CVE-2023-52856.html
- https://www.suse.com/security/cve/CVE-2023-52858.html
- https://www.suse.com/security/cve/CVE-2023-52860.html
- https://www.suse.com/security/cve/CVE-2023-52861.html
- https://www.suse.com/security/cve/CVE-2023-52864.html
- https://www.suse.com/security/cve/CVE-2023-52865.html
- https://www.suse.com/security/cve/CVE-2023-52867.html
- https://www.suse.com/security/cve/CVE-2023-52868.html
- https://www.suse.com/security/cve/CVE-2023-52870.html
- https://www.suse.com/security/cve/CVE-2023-52871.html
- https://www.suse.com/security/cve/CVE-2023-52872.html
- https://www.suse.com/security/cve/CVE-2023-52873.html
- https://www.suse.com/security/cve/CVE-2023-52875.html
- https://www.suse.com/security/cve/CVE-2023-52876.html
- https://www.suse.com/security/cve/CVE-2023-52877.html
- https://www.suse.com/security/cve/CVE-2023-52878.html
- https://www.suse.com/security/cve/CVE-2023-52880.html
- https://www.suse.com/security/cve/CVE-2023-6531.html
- https://www.suse.com/security/cve/CVE-2024-2201.html
- https://www.suse.com/security/cve/CVE-2024-26597.html
- https://www.suse.com/security/cve/CVE-2024-26643.html
- https://www.suse.com/security/cve/CVE-2024-26679.html
- https://www.suse.com/security/cve/CVE-2024-26692.html
- https://www.suse.com/security/cve/CVE-2024-26698.html
- https://www.suse.com/security/cve/CVE-2024-26700.html
- https://www.suse.com/security/cve/CVE-2024-26715.html
- https://www.suse.com/security/cve/CVE-2024-26739.html
- https://www.suse.com/security/cve/CVE-2024-26742.html
- https://www.suse.com/security/cve/CVE-2024-26748.html
- https://www.suse.com/security/cve/CVE-2024-26758.html
- https://www.suse.com/security/cve/CVE-2024-26764.html
- https://www.suse.com/security/cve/CVE-2024-26775.html
- https://www.suse.com/security/cve/CVE-2024-26777.html
- https://www.suse.com/security/cve/CVE-2024-26778.html
- https://www.suse.com/security/cve/CVE-2024-26788.html
- https://www.suse.com/security/cve/CVE-2024-26791.html
- https://www.suse.com/security/cve/CVE-2024-26801.html
- https://www.suse.com/security/cve/CVE-2024-26822.html
- https://www.suse.com/security/cve/CVE-2024-26828.html
- https://www.suse.com/security/cve/CVE-2024-26829.html
- https://www.suse.com/security/cve/CVE-2024-26838.html
- https://www.suse.com/security/cve/CVE-2024-26839.html
- https://www.suse.com/security/cve/CVE-2024-26840.html
- https://www.suse.com/security/cve/CVE-2024-26846.html
- https://www.suse.com/security/cve/CVE-2024-26859.html
- https://www.suse.com/security/cve/CVE-2024-26870.html
- https://www.suse.com/security/cve/CVE-2024-26874.html
- https://www.suse.com/security/cve/CVE-2024-26876.html
- https://www.suse.com/security/cve/CVE-2024-26877.html
- https://www.suse.com/security/cve/CVE-2024-26880.html
- https://www.suse.com/security/cve/CVE-2024-26889.html
- https://www.suse.com/security/cve/CVE-2024-26894.html
- https://www.suse.com/security/cve/CVE-2024-26900.html
- https://www.suse.com/security/cve/CVE-2024-26907.html
- https://www.suse.com/security/cve/CVE-2024-26915.html
- https://www.suse.com/security/cve/CVE-2024-26916.html
- https://www.suse.com/security/cve/CVE-2024-26919.html
- https://www.suse.com/security/cve/CVE-2024-26920.html
- https://www.suse.com/security/cve/CVE-2024-26921.html
- https://www.suse.com/security/cve/CVE-2024-26922.html
- https://www.suse.com/security/cve/CVE-2024-26925.html
- https://www.suse.com/security/cve/CVE-2024-26928.html
- https://www.suse.com/security/cve/CVE-2024-26929.html
- https://www.suse.com/security/cve/CVE-2024-26930.html
- https://www.suse.com/security/cve/CVE-2024-26931.html
- https://www.suse.com/security/cve/CVE-2024-26933.html
- https://www.suse.com/security/cve/CVE-2024-26934.html
- https://www.suse.com/security/cve/CVE-2024-26935.html
- https://www.suse.com/security/cve/CVE-2024-26937.html
- https://www.suse.com/security/cve/CVE-2024-26938.html
- https://www.suse.com/security/cve/CVE-2024-26939.html
- https://www.suse.com/security/cve/CVE-2024-26940.html
- https://www.suse.com/security/cve/CVE-2024-26943.html
- https://www.suse.com/security/cve/CVE-2024-26957.html
- https://www.suse.com/security/cve/CVE-2024-26958.html
- https://www.suse.com/security/cve/CVE-2024-26964.html
- https://www.suse.com/security/cve/CVE-2024-26974.html
- https://www.suse.com/security/cve/CVE-2024-26977.html
- https://www.suse.com/security/cve/CVE-2024-26979.html
- https://www.suse.com/security/cve/CVE-2024-26984.html
- https://www.suse.com/security/cve/CVE-2024-26988.html
- https://www.suse.com/security/cve/CVE-2024-26989.html
- https://www.suse.com/security/cve/CVE-2024-26994.html
- https://www.suse.com/security/cve/CVE-2024-26996.html
- https://www.suse.com/security/cve/CVE-2024-26997.html
- https://www.suse.com/security/cve/CVE-2024-26999.html
- https://www.suse.com/security/cve/CVE-2024-27000.html
- https://www.suse.com/security/cve/CVE-2024-27001.html
- https://www.suse.com/security/cve/CVE-2024-27004.html
- https://www.suse.com/security/cve/CVE-2024-27008.html
- https://www.suse.com/security/cve/CVE-2024-27028.html
- https://www.suse.com/security/cve/CVE-2024-27037.html
- https://www.suse.com/security/cve/CVE-2024-27042.html
- https://www.suse.com/security/cve/CVE-2024-27045.html
- https://www.suse.com/security/cve/CVE-2024-27047.html
- https://www.suse.com/security/cve/CVE-2024-27051.html
- https://www.suse.com/security/cve/CVE-2024-27052.html
- https://www.suse.com/security/cve/CVE-2024-27053.html
- https://www.suse.com/security/cve/CVE-2024-27054.html
- https://www.suse.com/security/cve/CVE-2024-27059.html
- https://www.suse.com/security/cve/CVE-2024-27072.html
- https://www.suse.com/security/cve/CVE-2024-27073.html
- https://www.suse.com/security/cve/CVE-2024-27074.html
- https://www.suse.com/security/cve/CVE-2024-27075.html
- https://www.suse.com/security/cve/CVE-2024-27076.html
- https://www.suse.com/security/cve/CVE-2024-27077.html
- https://www.suse.com/security/cve/CVE-2024-27078.html
- https://www.suse.com/security/cve/CVE-2024-27388.html
- https://www.suse.com/security/cve/CVE-2024-27393.html
- https://www.suse.com/security/cve/CVE-2024-27395.html
- https://www.suse.com/security/cve/CVE-2024-27396.html
- https://www.suse.com/security/cve/CVE-2024-27398.html
- https://www.suse.com/security/cve/CVE-2024-27399.html
- https://www.suse.com/security/cve/CVE-2024-27400.html
- https://www.suse.com/security/cve/CVE-2024-27401.html
- https://www.suse.com/security/cve/CVE-2024-27405.html
- https://www.suse.com/security/cve/CVE-2024-27410.html
- https://www.suse.com/security/cve/CVE-2024-27412.html
- https://www.suse.com/security/cve/CVE-2024-27413.html
- https://www.suse.com/security/cve/CVE-2024-27416.html
- https://www.suse.com/security/cve/CVE-2024-27417.html
- https://www.suse.com/security/cve/CVE-2024-27419.html
- https://www.suse.com/security/cve/CVE-2024-27431.html
- https://www.suse.com/security/cve/CVE-2024-27435.html
- https://www.suse.com/security/cve/CVE-2024-27436.html
- https://www.suse.com/security/cve/CVE-2024-35789.html
- https://www.suse.com/security/cve/CVE-2024-35791.html
- https://www.suse.com/security/cve/CVE-2024-35796.html
- https://www.suse.com/security/cve/CVE-2024-35799.html
- https://www.suse.com/security/cve/CVE-2024-35801.html
- https://www.suse.com/security/cve/CVE-2024-35804.html
- https://www.suse.com/security/cve/CVE-2024-35806.html
- https://www.suse.com/security/cve/CVE-2024-35809.html
- https://www.suse.com/security/cve/CVE-2024-35811.html
- https://www.suse.com/security/cve/CVE-2024-35812.html
- https://www.suse.com/security/cve/CVE-2024-35813.html
- https://www.suse.com/security/cve/CVE-2024-35815.html
- https://www.suse.com/security/cve/CVE-2024-35817.html
- https://www.suse.com/security/cve/CVE-2024-35821.html
- https://www.suse.com/security/cve/CVE-2024-35822.html
- https://www.suse.com/security/cve/CVE-2024-35823.html
- https://www.suse.com/security/cve/CVE-2024-35825.html
- https://www.suse.com/security/cve/CVE-2024-35828.html
- https://www.suse.com/security/cve/CVE-2024-35829.html
- https://www.suse.com/security/cve/CVE-2024-35830.html
- https://www.suse.com/security/cve/CVE-2024-35833.html
- https://www.suse.com/security/cve/CVE-2024-35845.html
- https://www.suse.com/security/cve/CVE-2024-35847.html
- https://www.suse.com/security/cve/CVE-2024-35849.html
- https://www.suse.com/security/cve/CVE-2024-35851.html
- https://www.suse.com/security/cve/CVE-2024-35852.html
- https://www.suse.com/security/cve/CVE-2024-35854.html
- https://www.suse.com/security/cve/CVE-2024-35860.html
- https://www.suse.com/security/cve/CVE-2024-35861.html
- https://www.suse.com/security/cve/CVE-2024-35862.html
- https://www.suse.com/security/cve/CVE-2024-35863.html
- https://www.suse.com/security/cve/CVE-2024-35864.html
- https://www.suse.com/security/cve/CVE-2024-35865.html
- https://www.suse.com/security/cve/CVE-2024-35866.html
- https://www.suse.com/security/cve/CVE-2024-35867.html
- https://www.suse.com/security/cve/CVE-2024-35868.html
- https://www.suse.com/security/cve/CVE-2024-35869.html
- https://www.suse.com/security/cve/CVE-2024-35870.html
- https://www.suse.com/security/cve/CVE-2024-35872.html
- https://www.suse.com/security/cve/CVE-2024-35875.html
- https://www.suse.com/security/cve/CVE-2024-35877.html
- https://www.suse.com/security/cve/CVE-2024-35878.html
- https://www.suse.com/security/cve/CVE-2024-35879.html
- https://www.suse.com/security/cve/CVE-2024-35885.html
- https://www.suse.com/security/cve/CVE-2024-35887.html
- https://www.suse.com/security/cve/CVE-2024-35895.html
- https://www.suse.com/security/cve/CVE-2024-35901.html
- https://www.suse.com/security/cve/CVE-2024-35904.html
- https://www.suse.com/security/cve/CVE-2024-35905.html
- https://www.suse.com/security/cve/CVE-2024-35907.html
- https://www.suse.com/security/cve/CVE-2024-35912.html
- https://www.suse.com/security/cve/CVE-2024-35914.html
- https://www.suse.com/security/cve/CVE-2024-35915.html
- https://www.suse.com/security/cve/CVE-2024-35922.html
- https://www.suse.com/security/cve/CVE-2024-35924.html
- https://www.suse.com/security/cve/CVE-2024-35930.html
- https://www.suse.com/security/cve/CVE-2024-35932.html
- https://www.suse.com/security/cve/CVE-2024-35933.html
- https://www.suse.com/security/cve/CVE-2024-35935.html
- https://www.suse.com/security/cve/CVE-2024-35936.html
- https://www.suse.com/security/cve/CVE-2024-35938.html
- https://www.suse.com/security/cve/CVE-2024-35939.html
- https://www.suse.com/security/cve/CVE-2024-35940.html
- https://www.suse.com/security/cve/CVE-2024-35943.html
- https://www.suse.com/security/cve/CVE-2024-35944.html
- https://www.suse.com/security/cve/CVE-2024-35947.html
- https://www.suse.com/security/cve/CVE-2024-35950.html
- https://www.suse.com/security/cve/CVE-2024-35951.html
- https://www.suse.com/security/cve/CVE-2024-35952.html
- https://www.suse.com/security/cve/CVE-2024-35955.html
- https://www.suse.com/security/cve/CVE-2024-35959.html
- https://www.suse.com/security/cve/CVE-2024-35963.html
- https://www.suse.com/security/cve/CVE-2024-35964.html
- https://www.suse.com/security/cve/CVE-2024-35965.html
- https://www.suse.com/security/cve/CVE-2024-35966.html
- https://www.suse.com/security/cve/CVE-2024-35967.html
- https://www.suse.com/security/cve/CVE-2024-35969.html
- https://www.suse.com/security/cve/CVE-2024-35973.html
- https://www.suse.com/security/cve/CVE-2024-35976.html
- https://www.suse.com/security/cve/CVE-2024-35978.html
- https://www.suse.com/security/cve/CVE-2024-35982.html
- https://www.suse.com/security/cve/CVE-2024-35984.html
- https://www.suse.com/security/cve/CVE-2024-35989.html
- https://www.suse.com/security/cve/CVE-2024-35990.html
- https://www.suse.com/security/cve/CVE-2024-35998.html
- https://www.suse.com/security/cve/CVE-2024-35999.html
- https://www.suse.com/security/cve/CVE-2024-36006.html
- https://www.suse.com/security/cve/CVE-2024-36007.html
- https://www.suse.com/security/cve/CVE-2024-36012.html
- https://www.suse.com/security/cve/CVE-2024-36014.html
- https://www.suse.com/security/cve/CVE-2024-36015.html
- https://www.suse.com/security/cve/CVE-2024-36016.html
- https://www.suse.com/security/cve/CVE-2024-36026.html
- https://www.suse.com/security/cve/CVE-2024-36029.html
- https://www.suse.com/security/cve/CVE-2024-36032.html
- https://www.suse.com/security/cve/CVE-2024-36880.html
- https://www.suse.com/security/cve/CVE-2024-36893.html
- https://www.suse.com/security/cve/CVE-2024-36896.html
- https://www.suse.com/security/cve/CVE-2024-36897.html
- https://www.suse.com/security/cve/CVE-2024-36906.html
- https://www.suse.com/security/cve/CVE-2024-36918.html
- https://www.suse.com/security/cve/CVE-2024-36924.html
- https://www.suse.com/security/cve/CVE-2024-36926.html
- https://www.suse.com/security/cve/CVE-2024-36928.html
- https://www.suse.com/security/cve/CVE-2024-36931.html
- https://www.suse.com/security/cve/CVE-2024-36938.html
- https://www.suse.com/security/cve/CVE-2024-36940.html
- https://www.suse.com/security/cve/CVE-2024-36941.html
- https://www.suse.com/security/cve/CVE-2024-36942.html
- https://www.suse.com/security/cve/CVE-2024-36944.html
- https://www.suse.com/security/cve/CVE-2024-36947.html
- https://www.suse.com/security/cve/CVE-2024-36950.html
- https://www.suse.com/security/cve/CVE-2024-36952.html
- https://www.suse.com/security/cve/CVE-2024-36955.html
- https://www.suse.com/security/cve/CVE-2024-36959.html
- https://bugzilla.suse.com/show_bug.cgi?id=1065729
- https://bugzilla.suse.com/show_bug.cgi?id=1141539
- https://bugzilla.suse.com/show_bug.cgi?id=1174585
- https://bugzilla.suse.com/show_bug.cgi?id=1181674
- https://bugzilla.suse.com/show_bug.cgi?id=1187716
- https://bugzilla.suse.com/show_bug.cgi?id=1190569
- https://bugzilla.suse.com/show_bug.cgi?id=1191949
- https://bugzilla.suse.com/show_bug.cgi?id=1192107
- https://bugzilla.suse.com/show_bug.cgi?id=1193983
- https://bugzilla.suse.com/show_bug.cgi?id=1194288
- https://bugzilla.suse.com/show_bug.cgi?id=1194869
- https://bugzilla.suse.com/show_bug.cgi?id=1196956
- https://bugzilla.suse.com/show_bug.cgi?id=1197915
- https://bugzilla.suse.com/show_bug.cgi?id=1200465
- https://bugzilla.suse.com/show_bug.cgi?id=1205205
- https://bugzilla.suse.com/show_bug.cgi?id=1207284
- https://bugzilla.suse.com/show_bug.cgi?id=1207361
- https://bugzilla.suse.com/show_bug.cgi?id=1207948
- https://bugzilla.suse.com/show_bug.cgi?id=1208149
- https://bugzilla.suse.com/show_bug.cgi?id=1209657
- https://bugzilla.suse.com/show_bug.cgi?id=1209799
- https://bugzilla.suse.com/show_bug.cgi?id=1209834
- https://bugzilla.suse.com/show_bug.cgi?id=1209980
- https://bugzilla.suse.com/show_bug.cgi?id=1210335
- https://bugzilla.suse.com/show_bug.cgi?id=1213863
- https://bugzilla.suse.com/show_bug.cgi?id=1214852
- https://bugzilla.suse.com/show_bug.cgi?id=1215322
- https://bugzilla.suse.com/show_bug.cgi?id=1215702
- https://bugzilla.suse.com/show_bug.cgi?id=1216358
- https://bugzilla.suse.com/show_bug.cgi?id=1216702
- https://bugzilla.suse.com/show_bug.cgi?id=1217169
- https://bugzilla.suse.com/show_bug.cgi?id=1217339
- https://bugzilla.suse.com/show_bug.cgi?id=1217515
- https://bugzilla.suse.com/show_bug.cgi?id=1218447
- https://bugzilla.suse.com/show_bug.cgi?id=1220021
- https://bugzilla.suse.com/show_bug.cgi?id=1220267
- https://bugzilla.suse.com/show_bug.cgi?id=1220363
- https://bugzilla.suse.com/show_bug.cgi?id=1220783
- https://bugzilla.suse.com/show_bug.cgi?id=1221044
- https://bugzilla.suse.com/show_bug.cgi?id=1221081
- https://bugzilla.suse.com/show_bug.cgi?id=1221615
- https://bugzilla.suse.com/show_bug.cgi?id=1221777
- https://bugzilla.suse.com/show_bug.cgi?id=1221816
- https://bugzilla.suse.com/show_bug.cgi?id=1221829
- https://bugzilla.suse.com/show_bug.cgi?id=1222011
- https://bugzilla.suse.com/show_bug.cgi?id=1222374
- https://bugzilla.suse.com/show_bug.cgi?id=1222385
- https://bugzilla.suse.com/show_bug.cgi?id=1222413
- https://bugzilla.suse.com/show_bug.cgi?id=1222464
- https://bugzilla.suse.com/show_bug.cgi?id=1222513
- https://bugzilla.suse.com/show_bug.cgi?id=1222559
- https://bugzilla.suse.com/show_bug.cgi?id=1222561
- https://bugzilla.suse.com/show_bug.cgi?id=1222608
- https://bugzilla.suse.com/show_bug.cgi?id=1222619
- https://bugzilla.suse.com/show_bug.cgi?id=1222627
- https://bugzilla.suse.com/show_bug.cgi?id=1222721
- https://bugzilla.suse.com/show_bug.cgi?id=1222765
- https://bugzilla.suse.com/show_bug.cgi?id=1222770
- https://bugzilla.suse.com/show_bug.cgi?id=1222783
- https://bugzilla.suse.com/show_bug.cgi?id=1222793
- https://bugzilla.suse.com/show_bug.cgi?id=1222870
- https://bugzilla.suse.com/show_bug.cgi?id=1222893
- https://bugzilla.suse.com/show_bug.cgi?id=1222960
- https://bugzilla.suse.com/show_bug.cgi?id=1222961
- https://bugzilla.suse.com/show_bug.cgi?id=1222974
- https://bugzilla.suse.com/show_bug.cgi?id=1222975
- https://bugzilla.suse.com/show_bug.cgi?id=1222976
- https://bugzilla.suse.com/show_bug.cgi?id=1223011
- https://bugzilla.suse.com/show_bug.cgi?id=1223023
- https://bugzilla.suse.com/show_bug.cgi?id=1223027
- https://bugzilla.suse.com/show_bug.cgi?id=1223031
- https://bugzilla.suse.com/show_bug.cgi?id=1223043
- https://bugzilla.suse.com/show_bug.cgi?id=1223046
- https://bugzilla.suse.com/show_bug.cgi?id=1223048
- https://bugzilla.suse.com/show_bug.cgi?id=1223049
- https://bugzilla.suse.com/show_bug.cgi?id=1223084
- https://bugzilla.suse.com/show_bug.cgi?id=1223113
- https://bugzilla.suse.com/show_bug.cgi?id=1223119
- https://bugzilla.suse.com/show_bug.cgi?id=1223137
- https://bugzilla.suse.com/show_bug.cgi?id=1223138
- https://bugzilla.suse.com/show_bug.cgi?id=1223140
- https://bugzilla.suse.com/show_bug.cgi?id=1223188
- https://bugzilla.suse.com/show_bug.cgi?id=1223203
- https://bugzilla.suse.com/show_bug.cgi?id=1223207
- https://bugzilla.suse.com/show_bug.cgi?id=1223315
- https://bugzilla.suse.com/show_bug.cgi?id=1223360
- https://bugzilla.suse.com/show_bug.cgi?id=1223384
- https://bugzilla.suse.com/show_bug.cgi?id=1223390
- https://bugzilla.suse.com/show_bug.cgi?id=1223432
- https://bugzilla.suse.com/show_bug.cgi?id=1223489
- https://bugzilla.suse.com/show_bug.cgi?id=1223505
- https://bugzilla.suse.com/show_bug.cgi?id=1223532
- https://bugzilla.suse.com/show_bug.cgi?id=1223575
- https://bugzilla.suse.com/show_bug.cgi?id=1223595
- https://bugzilla.suse.com/show_bug.cgi?id=1223626
- https://bugzilla.suse.com/show_bug.cgi?id=1223627
- https://bugzilla.suse.com/show_bug.cgi?id=1223628
- https://bugzilla.suse.com/show_bug.cgi?id=1223631
- https://bugzilla.suse.com/show_bug.cgi?id=1223633
- https://bugzilla.suse.com/show_bug.cgi?id=1223638
- https://bugzilla.suse.com/show_bug.cgi?id=1223650
- https://bugzilla.suse.com/show_bug.cgi?id=1223653
- https://bugzilla.suse.com/show_bug.cgi?id=1223666
- https://bugzilla.suse.com/show_bug.cgi?id=1223670
- https://bugzilla.suse.com/show_bug.cgi?id=1223671
- https://bugzilla.suse.com/show_bug.cgi?id=1223675
- https://bugzilla.suse.com/show_bug.cgi?id=1223677
- https://bugzilla.suse.com/show_bug.cgi?id=1223678
- https://bugzilla.suse.com/show_bug.cgi?id=1223679
- https://bugzilla.suse.com/show_bug.cgi?id=1223698
- https://bugzilla.suse.com/show_bug.cgi?id=1223712
- https://bugzilla.suse.com/show_bug.cgi?id=1223715
- https://bugzilla.suse.com/show_bug.cgi?id=1223717
- https://bugzilla.suse.com/show_bug.cgi?id=1223718
- https://bugzilla.suse.com/show_bug.cgi?id=1223737
- https://bugzilla.suse.com/show_bug.cgi?id=1223738
- https://bugzilla.suse.com/show_bug.cgi?id=1223741
- https://bugzilla.suse.com/show_bug.cgi?id=1223744
- https://bugzilla.suse.com/show_bug.cgi?id=1223747
- https://bugzilla.suse.com/show_bug.cgi?id=1223748
- https://bugzilla.suse.com/show_bug.cgi?id=1223750
- https://bugzilla.suse.com/show_bug.cgi?id=1223752
- https://bugzilla.suse.com/show_bug.cgi?id=1223754
- https://bugzilla.suse.com/show_bug.cgi?id=1223756
- https://bugzilla.suse.com/show_bug.cgi?id=1223757
- https://bugzilla.suse.com/show_bug.cgi?id=1223762
- https://bugzilla.suse.com/show_bug.cgi?id=1223769
- https://bugzilla.suse.com/show_bug.cgi?id=1223770
- https://bugzilla.suse.com/show_bug.cgi?id=1223779
- https://bugzilla.suse.com/show_bug.cgi?id=1223780
- https://bugzilla.suse.com/show_bug.cgi?id=1223781
- https://bugzilla.suse.com/show_bug.cgi?id=1223788
- https://bugzilla.suse.com/show_bug.cgi?id=1223802
- https://bugzilla.suse.com/show_bug.cgi?id=1223819
- https://bugzilla.suse.com/show_bug.cgi?id=1223823
- https://bugzilla.suse.com/show_bug.cgi?id=1223826
- https://bugzilla.suse.com/show_bug.cgi?id=1223828
- https://bugzilla.suse.com/show_bug.cgi?id=1223829
- https://bugzilla.suse.com/show_bug.cgi?id=1223837
- https://bugzilla.suse.com/show_bug.cgi?id=1223842
- https://bugzilla.suse.com/show_bug.cgi?id=1223843
- https://bugzilla.suse.com/show_bug.cgi?id=1223844
- https://bugzilla.suse.com/show_bug.cgi?id=1223847
- https://bugzilla.suse.com/show_bug.cgi?id=1223858
- https://bugzilla.suse.com/show_bug.cgi?id=1223875
- https://bugzilla.suse.com/show_bug.cgi?id=1223879
- https://bugzilla.suse.com/show_bug.cgi?id=1223895
- https://bugzilla.suse.com/show_bug.cgi?id=1223959
- https://bugzilla.suse.com/show_bug.cgi?id=1223961
- https://bugzilla.suse.com/show_bug.cgi?id=1223991
- https://bugzilla.suse.com/show_bug.cgi?id=1223996
- https://bugzilla.suse.com/show_bug.cgi?id=1224020
- https://bugzilla.suse.com/show_bug.cgi?id=1224076
- https://bugzilla.suse.com/show_bug.cgi?id=1224096
- https://bugzilla.suse.com/show_bug.cgi?id=1224098
- https://bugzilla.suse.com/show_bug.cgi?id=1224099
- https://bugzilla.suse.com/show_bug.cgi?id=1224137
- https://bugzilla.suse.com/show_bug.cgi?id=1224166
- https://bugzilla.suse.com/show_bug.cgi?id=1224174
- https://bugzilla.suse.com/show_bug.cgi?id=1224177
- https://bugzilla.suse.com/show_bug.cgi?id=1224180
- https://bugzilla.suse.com/show_bug.cgi?id=1224181
- https://bugzilla.suse.com/show_bug.cgi?id=1224187
- https://bugzilla.suse.com/show_bug.cgi?id=1224331
- https://bugzilla.suse.com/show_bug.cgi?id=1224346
- https://bugzilla.suse.com/show_bug.cgi?id=1224423
- https://bugzilla.suse.com/show_bug.cgi?id=1224432
- https://bugzilla.suse.com/show_bug.cgi?id=1224437
- https://bugzilla.suse.com/show_bug.cgi?id=1224438
- https://bugzilla.suse.com/show_bug.cgi?id=1224442
- https://bugzilla.suse.com/show_bug.cgi?id=1224443
- https://bugzilla.suse.com/show_bug.cgi?id=1224445
- https://bugzilla.suse.com/show_bug.cgi?id=1224449
- https://bugzilla.suse.com/show_bug.cgi?id=1224479
- https://bugzilla.suse.com/show_bug.cgi?id=1224482
- https://bugzilla.suse.com/show_bug.cgi?id=1224487
- https://bugzilla.suse.com/show_bug.cgi?id=1224488
- https://bugzilla.suse.com/show_bug.cgi?id=1224492
- https://bugzilla.suse.com/show_bug.cgi?id=1224494
- https://bugzilla.suse.com/show_bug.cgi?id=1224495
- https://bugzilla.suse.com/show_bug.cgi?id=1224502
- https://bugzilla.suse.com/show_bug.cgi?id=1224508
- https://bugzilla.suse.com/show_bug.cgi?id=1224509
- https://bugzilla.suse.com/show_bug.cgi?id=1224511
- https://bugzilla.suse.com/show_bug.cgi?id=1224519
- https://bugzilla.suse.com/show_bug.cgi?id=1224524
- https://bugzilla.suse.com/show_bug.cgi?id=1224525
- https://bugzilla.suse.com/show_bug.cgi?id=1224530
- https://bugzilla.suse.com/show_bug.cgi?id=1224531
- https://bugzilla.suse.com/show_bug.cgi?id=1224534
- https://bugzilla.suse.com/show_bug.cgi?id=1224535
- https://bugzilla.suse.com/show_bug.cgi?id=1224537
- https://bugzilla.suse.com/show_bug.cgi?id=1224541
- https://bugzilla.suse.com/show_bug.cgi?id=1224543
- https://bugzilla.suse.com/show_bug.cgi?id=1224549
- https://bugzilla.suse.com/show_bug.cgi?id=1224550
- https://bugzilla.suse.com/show_bug.cgi?id=1224558
- https://bugzilla.suse.com/show_bug.cgi?id=1224559
- https://bugzilla.suse.com/show_bug.cgi?id=1224566
- https://bugzilla.suse.com/show_bug.cgi?id=1224567
- https://bugzilla.suse.com/show_bug.cgi?id=1224571
- https://bugzilla.suse.com/show_bug.cgi?id=1224575
- https://bugzilla.suse.com/show_bug.cgi?id=1224576
- https://bugzilla.suse.com/show_bug.cgi?id=1224579
- https://bugzilla.suse.com/show_bug.cgi?id=1224580
- https://bugzilla.suse.com/show_bug.cgi?id=1224581
- https://bugzilla.suse.com/show_bug.cgi?id=1224582
- https://bugzilla.suse.com/show_bug.cgi?id=1224586
- https://bugzilla.suse.com/show_bug.cgi?id=1224587
- https://bugzilla.suse.com/show_bug.cgi?id=1224592
- https://bugzilla.suse.com/show_bug.cgi?id=1224598
- https://bugzilla.suse.com/show_bug.cgi?id=1224601
- https://bugzilla.suse.com/show_bug.cgi?id=1224607
- https://bugzilla.suse.com/show_bug.cgi?id=1224608
- https://bugzilla.suse.com/show_bug.cgi?id=1224611
- https://bugzilla.suse.com/show_bug.cgi?id=1224615
- https://bugzilla.suse.com/show_bug.cgi?id=1224617
- https://bugzilla.suse.com/show_bug.cgi?id=1224618
- https://bugzilla.suse.com/show_bug.cgi?id=1224621
- https://bugzilla.suse.com/show_bug.cgi?id=1224622
- https://bugzilla.suse.com/show_bug.cgi?id=1224624
- https://bugzilla.suse.com/show_bug.cgi?id=1224627
- https://bugzilla.suse.com/show_bug.cgi?id=1224628
- https://bugzilla.suse.com/show_bug.cgi?id=1224629
- https://bugzilla.suse.com/show_bug.cgi?id=1224632
- https://bugzilla.suse.com/show_bug.cgi?id=1224636
- https://bugzilla.suse.com/show_bug.cgi?id=1224637
- https://bugzilla.suse.com/show_bug.cgi?id=1224638
- https://bugzilla.suse.com/show_bug.cgi?id=1224640
- https://bugzilla.suse.com/show_bug.cgi?id=1224643
- https://bugzilla.suse.com/show_bug.cgi?id=1224644
- https://bugzilla.suse.com/show_bug.cgi?id=1224645
- https://bugzilla.suse.com/show_bug.cgi?id=1224647
- https://bugzilla.suse.com/show_bug.cgi?id=1224648
- https://bugzilla.suse.com/show_bug.cgi?id=1224649
- https://bugzilla.suse.com/show_bug.cgi?id=1224650
- https://bugzilla.suse.com/show_bug.cgi?id=1224651
- https://bugzilla.suse.com/show_bug.cgi?id=1224657
- https://bugzilla.suse.com/show_bug.cgi?id=1224659
- https://bugzilla.suse.com/show_bug.cgi?id=1224660
- https://bugzilla.suse.com/show_bug.cgi?id=1224663
- https://bugzilla.suse.com/show_bug.cgi?id=1224664
- https://bugzilla.suse.com/show_bug.cgi?id=1224665
- https://bugzilla.suse.com/show_bug.cgi?id=1224666
- https://bugzilla.suse.com/show_bug.cgi?id=1224667
- https://bugzilla.suse.com/show_bug.cgi?id=1224668
- https://bugzilla.suse.com/show_bug.cgi?id=1224671
- https://bugzilla.suse.com/show_bug.cgi?id=1224672
- https://bugzilla.suse.com/show_bug.cgi?id=1224676
- https://bugzilla.suse.com/show_bug.cgi?id=1224678
- https://bugzilla.suse.com/show_bug.cgi?id=1224679
- https://bugzilla.suse.com/show_bug.cgi?id=1224680
- https://bugzilla.suse.com/show_bug.cgi?id=1224681
- https://bugzilla.suse.com/show_bug.cgi?id=1224682
- https://bugzilla.suse.com/show_bug.cgi?id=1224685
- https://bugzilla.suse.com/show_bug.cgi?id=1224686
- https://bugzilla.suse.com/show_bug.cgi?id=1224692
- https://bugzilla.suse.com/show_bug.cgi?id=1224697
- https://bugzilla.suse.com/show_bug.cgi?id=1224699
- https://bugzilla.suse.com/show_bug.cgi?id=1224701
- https://bugzilla.suse.com/show_bug.cgi?id=1224703