Security update for the Linux Kernel

Announcement ID: SUSE-SU-2024:2185-1
Rating: important
References:
Cross-References:
CVSS scores:
  • CVE-2020-36788 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
  • CVE-2021-3743 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  • CVE-2021-3743 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  • CVE-2021-39698 ( SUSE ): 7.4 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
  • CVE-2021-39698 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2021-43056 ( SUSE ): 6.8 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
  • CVE-2021-43056 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2021-47104 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
  • CVE-2021-47200 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2021-47220 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2021-47227 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2021-47228 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
  • CVE-2021-47229 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2021-47230 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2021-47231 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2021-47235 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2021-47236 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2021-47237 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  • CVE-2021-47239 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2021-47240 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2021-47241 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2021-47246 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  • CVE-2021-47252 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
  • CVE-2021-47253 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  • CVE-2021-47254 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2021-47255 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2021-47258 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  • CVE-2021-47259 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2021-47260 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2021-47261 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2021-47263 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
  • CVE-2021-47265 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2021-47267 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2021-47269 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2021-47270 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2021-47274 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2021-47275 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2021-47276 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2021-47280 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2021-47281 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2021-47284 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2021-47285 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2021-47288 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
  • CVE-2021-47289 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2021-47296 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2021-47301 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  • CVE-2021-47302 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  • CVE-2021-47305 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2021-47307 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2021-47308 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2021-47314 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  • CVE-2021-47315 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  • CVE-2021-47320 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
  • CVE-2021-47321 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  • CVE-2021-47323 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2021-47324 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2021-47329 ( SUSE ): 1.9 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
  • CVE-2021-47330 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  • CVE-2021-47332 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2021-47333 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2021-47334 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
  • CVE-2021-47337 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2021-47338 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H
  • CVE-2021-47340 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2021-47341 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
  • CVE-2021-47343 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
  • CVE-2021-47344 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
  • CVE-2021-47347 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2021-47348 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
  • CVE-2021-47350 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2021-47353 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2021-47354 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N
  • CVE-2021-47356 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
  • CVE-2021-47369 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2021-47375 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2021-47378 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2021-47381 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2021-47382 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2021-47383 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2021-47387 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2021-47388 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  • CVE-2021-47391 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2021-47392 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2021-47393 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2021-47395 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2021-47396 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2021-47399 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2021-47402 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2021-47404 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H
  • CVE-2021-47405 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2021-47409 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2021-47413 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2021-47416 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  • CVE-2021-47422 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2021-47423 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  • CVE-2021-47424 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2021-47425 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2021-47426 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  • CVE-2021-47428 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2021-47431 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  • CVE-2021-47434 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2021-47435 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2021-47441 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2021-47442 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2021-47443 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2021-47445 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2021-47451 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2021-47456 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2021-47458 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2021-47464 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2021-47465 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
  • CVE-2021-47468 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2021-47473 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  • CVE-2021-47478 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
  • CVE-2021-47480 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2021-47482 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  • CVE-2021-47483 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2021-47485 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
  • CVE-2021-47493 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2021-47494 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2021-47495 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  • CVE-2021-47496 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2021-47497 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2021-47498 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2021-47499 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
  • CVE-2021-47500 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2021-47501 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2021-47502 ( SUSE ): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
  • CVE-2021-47503 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2021-47505 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2021-47506 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2021-47507 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2021-47509 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2021-47511 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2021-47512 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2021-47516 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  • CVE-2021-47516 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2021-47518 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2021-47518 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2021-47521 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2021-47521 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2021-47522 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2021-47522 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2021-47523 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  • CVE-2021-47535 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
  • CVE-2021-47536 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
  • CVE-2021-47538 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  • CVE-2021-47540 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  • CVE-2021-47540 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2021-47541 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2021-47541 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2021-47542 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2021-47542 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2021-47549 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2021-47557 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2021-47562 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2021-47563 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2021-47565 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2022-1195 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2022-1195 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2022-20132 ( SUSE ): 4.9 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L
  • CVE-2022-20132 ( NVD ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
  • CVE-2022-48636 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2022-48673 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2022-48673 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2022-48704 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2022-48710 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2023-0160 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2023-0160 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2023-1829 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2023-1829 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2023-2176 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2023-2176 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2023-4244 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2023-4244 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2023-47233 ( SUSE ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2023-47233 ( NVD ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2023-52433 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  • CVE-2023-52581 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2023-52591 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  • CVE-2023-52654 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2023-52686 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2023-52840 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  • CVE-2023-52871 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
  • CVE-2023-52880 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • CVE-2023-6531 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2023-6531 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2024-26581 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-26581 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2024-26643 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-26828 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H
  • CVE-2024-26921 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2024-26925 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2024-26929 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2024-26929 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2024-26930 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2024-26930 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2024-27398 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2024-27413 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2024-35811 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-35895 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-35914 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Affected Products:
  • openSUSE Leap 15.3
  • SUSE Enterprise Storage 7.1
  • SUSE Linux Enterprise High Availability Extension 15 SP3
  • SUSE Linux Enterprise High Performance Computing 15 SP3
  • SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
  • SUSE Linux Enterprise Live Patching 15-SP3
  • SUSE Linux Enterprise Micro 5.1
  • SUSE Linux Enterprise Micro 5.2
  • SUSE Linux Enterprise Micro for Rancher 5.2
  • SUSE Linux Enterprise Server 15 SP3
  • SUSE Linux Enterprise Server 15 SP3 Business Critical Linux 15-SP3
  • SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
  • SUSE Linux Enterprise Server for SAP Applications 15 SP3
  • SUSE Manager Proxy 4.2
  • SUSE Manager Retail Branch Server 4.2
  • SUSE Manager Server 4.2

An update that solves 187 vulnerabilities and has 26 security fixes can now be installed.

Description:

The SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security bugfixes.

The following security bugs were fixed:

  • CVE-2021-47378: Destroy cm id before destroy qp to avoid use after free (bsc#1225201).
  • CVE-2021-47496: Fix flipped sign in tls_err_abort() calls (bsc#1225354)
  • CVE-2021-47402: Protect fl_walk() with rcu (bsc#1225301)
  • CVE-2022-48673: kABI workarounds for struct smc_link (bsc#1223934).
  • CVE-2023-52871: Handle a second device without data corruption (bsc#1225534)
  • CVE-2024-26828: Fix underflow in parse_server_interfaces() (bsc#1223084).
  • CVE-2021-47497: Fixed shift-out-of-bound (UBSAN) with byte size cells (bsc#1225355).
  • CVE-2021-47500: Fixed trigger reference couting (bsc#1225360).
  • CVE-2024-27413: Fix incorrect allocation size (bsc#1224438).
  • CVE-2021-47383: Fiedx out-of-bound vmalloc access in imageblit (bsc#1225208).
  • CVE-2021-47511: Fixed negative period/buffer sizes (bsc#1225411).
  • CVE-2023-52840: Fix use after free in rmi_unregister_function() (bsc#1224928).
  • CVE-2021-47261: Fix initializing CQ fragments buffer (bsc#1224954)
  • CVE-2021-47254: Fix use-after-free in gfs2_glock_shrink_scan (bsc#1224888).
  • CVE-2024-27398: Fixed use-after-free bugs caused by sco_sock_timeout (bsc#1224174).
  • CVE-2024-26921: Preserve kabi for sk_buff (bsc#1223138).
  • CVE-2023-52655: Check packet for fixup for true limit (bsc#1217169).
  • CVE-2023-4244: Fixed a use-after-free in the nf_tables component, which could be exploited to achieve local privilege escalation (bsc#1215420).
  • CVE-2023-4244: Fixed a use-after-free in the nf_tables component, which could be exploited to achieve local privilege escalation (bsc#1215420).
  • CVE-2023-1829: Fixed a use-after-free vulnerability in the control index filter (tcindex) (bsc#1210335).
  • CVE-2023-52686: Fix a null pointer in opal_event_init() (bsc#1065729).

The following non-security bugs were fixed:

  • af_unix: annote lockless accesses to unix_tot_inflight & gc_in_progress (bsc#1223384).
  • af_unix: Do not use atomic ops for unix_sk(sk)->inflight (bsc#1223384).
  • af_unix: Replace BUG_ON() with WARN_ON_ONCE() (bsc#1223384).
  • btrfs: do not start relocation until in progress drops are done (bsc#1222251).
  • btrfs: do not start relocation until in progress drops are done (bsc#1222251).
  • cifs: add missing spinlock around tcon refcount (bsc#1213476).
  • cifs: avoid dup prefix path in dfs_get_automount_devname() (bsc#1213476).
  • cifs: avoid race conditions with parallel reconnects (bsc#1213476).
  • cifs: avoid re-lookups in dfs_cache_find() (bsc#1213476).
  • cifs: avoid use of global locks for high contention data (bsc#1213476).
  • cifs: check only tcon status on tcon related functions (bsc#1213476).
  • cifs: do all necessary checks for credits within or before locking (bsc#1213476).
  • cifs: do not block in dfs_cache_noreq_update_tgthint() (bsc#1213476).
  • cifs: do not refresh cached referrals from unactive mounts (bsc#1213476).
  • cifs: do not take exclusive lock for updating target hints (bsc#1213476).
  • cifs: fix confusing debug message (bsc#1213476).
  • cifs: fix missing unload_nls() in smb2_reconnect() (bsc#1213476).
  • cifs: fix potential deadlock in cache_refresh_path() (bsc#1213476).
  • cifs: fix refresh of cached referrals (bsc#1213476).
  • cifs: fix return of uninitialized rc in dfs_cache_update_tgthint() (bsc#1213476).
  • cifs: fix source pathname comparison of dfs supers (bsc#1213476).
  • cifs: fix status checks in cifs_tree_connect (bsc#1213476).
  • cifs: fix use-after-free bug in refresh_cache_worker() (bsc#1213476).
  • cifs: get rid of dns resolve worker (bsc#1213476).
  • cifs: get rid of mount options string parsing (bsc#1213476).
  • cifs: handle cache lookup errors different than -ENOENT (bsc#1213476).
  • cifs: ignore ipc reconnect failures during dfs failover (bsc#1213476).
  • cifs: match even the scope id for ipv6 addresses (bsc#1213476).
  • cifs: optimize reconnect of nested links (bsc#1213476).
  • cifs: prevent data race in smb2_reconnect() (bsc#1213476).
  • cifs: refresh root referrals (bsc#1213476).
  • cifs: remove duplicate code in __refresh_tcon() (bsc#1213476).
  • cifs: remove unused function (bsc#1213476).
  • cifs: remove unused smb3_fs_context::mount_options (bsc#1213476).
  • cifs: return DFS root session id in DebugData (bsc#1213476).
  • cifs: reuse cifs_match_ipaddr for comparison of dstaddr too (bsc#1213476).
  • cifs: set correct ipc status after initial tree connect (bsc#1213476).
  • cifs: set correct status of tcon ipc when reconnecting (bsc#1213476).
  • cifs: set correct tcon status after initial tree connect (bsc#1213476).
  • cifs: set DFS root session in cifs_get_smb_ses() (bsc#1213476).
  • cifs: set resolved ip in sockaddr (bsc#1213476).
  • cifs: share dfs connections and supers (bsc#1213476).
  • cifs: split out ses and tcon retrieval from mount_get_conns() (bsc#1213476).
  • cifs: use fs_context for automounts (bsc#1213476).
  • cifs: use origin fullpath for automounts (bsc#1213476).
  • cifs: use tcon allocation functions even for dummy tcon (bsc#1213476).
  • netfilter: nf_tables: defer gc run if previous batch is still pending (git-fixes).
  • netfilter: nf_tables: fix GC transaction races with netns and netlink event exit path (git-fixes).
  • netfilter: nf_tables: fix kdoc warnings after gc rework (git-fixes).
  • netfilter: nf_tables: fix memleak when more than 255 elements expired (git-fixes).
  • netfilter: nf_tables: GC transaction race with abort path (git-fixes).
  • netfilter: nf_tables: GC transaction race with netns dismantle (git-fixes).
  • netfilter: nf_tables: mark newset as dead on transaction abort (git-fixes).
  • netfilter: nf_tables: mark set as dead when unbinding anonymous set with timeout (git-fixes).
  • netfilter: nf_tables: nft_set_rbtree: fix spurious insertion failure (git-fixes).
  • netfilter: nf_tables: release mutex after nft_gc_seq_end from abort path (git-fixes).
  • netfilter: nf_tables: skip dead set elements in netlink dump (git-fixes).
  • netfilter: nf_tables: use correct lock to protect gc_list (git-fixes).
  • netfilter: nft_set_hash: try later when GC hits EAGAIN on iteration (git-fixes).
  • netfilter: nft_set_rbtree: Add missing expired checks (git-fixes).
  • netfilter: nft_set_rbtree: bogus lookup/get on consecutive elements in named sets (git-fixes).
  • netfilter: nft_set_rbtree: Detect partial overlap with start endpoint match (git-fixes).
  • netfilter: nft_set_rbtree: Detect partial overlaps on insertion (git-fixes).
  • netfilter: nft_set_rbtree: Do not account for expired elements on insertion (git-fixes).
  • netfilter: nft_set_rbtree: Drop spurious condition for overlap detection on insertion (git-fixes).
  • netfilter: nft_set_rbtree: fix null deref on element insertion (git-fixes).
  • netfilter: nft_set_rbtree: fix overlap expiration walk (git-fixes).
  • netfilter: nft_set_rbtree: Handle outcomes of tree rotations in overlap detection (git-fixes).
  • netfilter: nft_set_rbtree: Introduce and use nft_rbtree_interval_start() (git-fixes).
  • netfilter: nft_set_rbtree: overlap detection with element re-addition after deletion (git-fixes).
  • netfilter: nft_set_rbtree: skip elements in transaction from garbage collection (git-fixes).
  • netfilter: nft_set_rbtree: skip end interval element from gc (git-fixes).
  • netfilter: nft_set_rbtree: skip sync GC for new elements in this transaction (git-fixes).
  • netfilter: nft_set_rbtree: Switch to node list walk for overlap detection (git-fixes).
  • netfilter: nft_set_rbtree: use read spinlock to avoid datapath contention (git-fixes).
  • NFC: nxp: add NXP1002 (bsc#1185589).
  • PCI: rpaphp: Add MODULE_DESCRIPTION (bsc#1176869 ltc#188243).
  • smb: client: fix dfs link mount against w2k8 (git-fixes).
  • smb: client: fix null auth (bsc#1213476).
  • smb: client: set correct id, uid and cruid for multiuser automounts (git-fixes).
  • x86/xen: Drop USERGS_SYSRET64 paravirt call (git-fixes).

Special Instructions and Notes:

  • Please reboot the system after installing this update.

Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  • openSUSE Leap 15.3
    zypper in -t patch SUSE-2024-2185=1
  • SUSE Linux Enterprise Live Patching 15-SP3
    zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP3-2024-2185=1
  • SUSE Linux Enterprise High Availability Extension 15 SP3
    zypper in -t patch SUSE-SLE-Product-HA-15-SP3-2024-2185=1
  • SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
    zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-2185=1
  • SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
    zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-2185=1
  • SUSE Linux Enterprise Server for SAP Applications 15 SP3
    zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-2185=1
  • SUSE Enterprise Storage 7.1
    zypper in -t patch SUSE-Storage-7.1-2024-2185=1
  • SUSE Linux Enterprise Micro 5.1
    zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-2185=1
  • SUSE Linux Enterprise Micro 5.2
    zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-2185=1
  • SUSE Linux Enterprise Micro for Rancher 5.2
    zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-2185=1

Package List:

  • openSUSE Leap 15.3 (noarch nosrc)
    • kernel-docs-5.3.18-150300.59.164.1
  • openSUSE Leap 15.3 (noarch)
    • kernel-macros-5.3.18-150300.59.164.1
    • kernel-source-5.3.18-150300.59.164.1
    • kernel-source-vanilla-5.3.18-150300.59.164.1
    • kernel-devel-5.3.18-150300.59.164.1
    • kernel-docs-html-5.3.18-150300.59.164.1
  • openSUSE Leap 15.3 (nosrc ppc64le x86_64)
    • kernel-kvmsmall-5.3.18-150300.59.164.1
    • kernel-debug-5.3.18-150300.59.164.1
  • openSUSE Leap 15.3 (ppc64le x86_64)
    • kernel-kvmsmall-devel-5.3.18-150300.59.164.1
    • kernel-debug-devel-5.3.18-150300.59.164.1
    • kernel-debug-livepatch-devel-5.3.18-150300.59.164.1
    • kernel-kvmsmall-debugsource-5.3.18-150300.59.164.1
    • kernel-debug-debugsource-5.3.18-150300.59.164.1
    • kernel-debug-debuginfo-5.3.18-150300.59.164.1
    • kernel-debug-devel-debuginfo-5.3.18-150300.59.164.1
    • kernel-kvmsmall-devel-debuginfo-5.3.18-150300.59.164.1
    • kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.164.1
    • kernel-kvmsmall-debuginfo-5.3.18-150300.59.164.1
  • openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64)
    • cluster-md-kmp-default-debuginfo-5.3.18-150300.59.164.1
    • kernel-obs-build-5.3.18-150300.59.164.1
    • dlm-kmp-default-debuginfo-5.3.18-150300.59.164.1
    • kernel-default-debugsource-5.3.18-150300.59.164.1
    • cluster-md-kmp-default-5.3.18-150300.59.164.1
    • ocfs2-kmp-default-5.3.18-150300.59.164.1
    • ocfs2-kmp-default-debuginfo-5.3.18-150300.59.164.1
    • gfs2-kmp-default-debuginfo-5.3.18-150300.59.164.1
    • kernel-obs-build-debugsource-5.3.18-150300.59.164.1
    • kernel-default-debuginfo-5.3.18-150300.59.164.1
    • kernel-default-livepatch-devel-5.3.18-150300.59.164.1
    • kernel-default-devel-debuginfo-5.3.18-150300.59.164.1
    • kernel-default-base-5.3.18-150300.59.164.1.150300.18.96.1
    • dlm-kmp-default-5.3.18-150300.59.164.1
    • kernel-default-livepatch-5.3.18-150300.59.164.1
    • kernel-default-extra-5.3.18-150300.59.164.1
    • kernel-default-optional-5.3.18-150300.59.164.1
    • kernel-syms-5.3.18-150300.59.164.1
    • kselftests-kmp-default-5.3.18-150300.59.164.1
    • gfs2-kmp-default-5.3.18-150300.59.164.1
    • kernel-default-optional-debuginfo-5.3.18-150300.59.164.1
    • kselftests-kmp-default-debuginfo-5.3.18-150300.59.164.1
    • reiserfs-kmp-default-5.3.18-150300.59.164.1
    • kernel-default-devel-5.3.18-150300.59.164.1
    • kernel-default-base-rebuild-5.3.18-150300.59.164.1.150300.18.96.1
    • reiserfs-kmp-default-debuginfo-5.3.18-150300.59.164.1
    • kernel-default-extra-debuginfo-5.3.18-150300.59.164.1
    • kernel-obs-qa-5.3.18-150300.59.164.1
  • openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 nosrc)
    • kernel-default-5.3.18-150300.59.164.1
  • openSUSE Leap 15.3 (ppc64le s390x x86_64)
    • kernel-livepatch-SLE15-SP3_Update_45-debugsource-1-150300.7.3.1
    • kernel-livepatch-5_3_18-150300_59_164-default-1-150300.7.3.1
    • kernel-livepatch-5_3_18-150300_59_164-default-debuginfo-1-150300.7.3.1
  • openSUSE Leap 15.3 (x86_64)
    • kernel-livepatch-5_3_18-150300_59_164-preempt-debuginfo-1-150300.7.3.1
    • kernel-livepatch-5_3_18-150300_59_164-preempt-1-150300.7.3.1
  • openSUSE Leap 15.3 (aarch64 x86_64)
    • cluster-md-kmp-preempt-5.3.18-150300.59.164.1
    • gfs2-kmp-preempt-debuginfo-5.3.18-150300.59.164.1
    • ocfs2-kmp-preempt-5.3.18-150300.59.164.1
    • kselftests-kmp-preempt-debuginfo-5.3.18-150300.59.164.1
    • kernel-preempt-debugsource-5.3.18-150300.59.164.1
    • gfs2-kmp-preempt-5.3.18-150300.59.164.1
    • kselftests-kmp-preempt-5.3.18-150300.59.164.1
    • cluster-md-kmp-preempt-debuginfo-5.3.18-150300.59.164.1
    • kernel-preempt-debuginfo-5.3.18-150300.59.164.1
    • reiserfs-kmp-preempt-debuginfo-5.3.18-150300.59.164.1
    • kernel-preempt-optional-5.3.18-150300.59.164.1
    • kernel-preempt-extra-5.3.18-150300.59.164.1
    • dlm-kmp-preempt-5.3.18-150300.59.164.1
    • kernel-preempt-devel-debuginfo-5.3.18-150300.59.164.1
    • kernel-preempt-optional-debuginfo-5.3.18-150300.59.164.1
    • kernel-preempt-devel-5.3.18-150300.59.164.1
    • kernel-preempt-livepatch-devel-5.3.18-150300.59.164.1
    • reiserfs-kmp-preempt-5.3.18-150300.59.164.1
    • ocfs2-kmp-preempt-debuginfo-5.3.18-150300.59.164.1
    • dlm-kmp-preempt-debuginfo-5.3.18-150300.59.164.1
    • kernel-preempt-extra-debuginfo-5.3.18-150300.59.164.1
  • openSUSE Leap 15.3 (aarch64 nosrc x86_64)
    • kernel-preempt-5.3.18-150300.59.164.1
  • openSUSE Leap 15.3 (nosrc s390x)
    • kernel-zfcpdump-5.3.18-150300.59.164.1
  • openSUSE Leap 15.3 (s390x)
    • kernel-zfcpdump-debugsource-5.3.18-150300.59.164.1
    • kernel-zfcpdump-debuginfo-5.3.18-150300.59.164.1
  • openSUSE Leap 15.3 (nosrc)
    • dtb-aarch64-5.3.18-150300.59.164.1
  • openSUSE Leap 15.3 (aarch64)
    • dtb-rockchip-5.3.18-150300.59.164.1
    • dtb-sprd-5.3.18-150300.59.164.1
    • dtb-hisilicon-5.3.18-150300.59.164.1
    • dtb-arm-5.3.18-150300.59.164.1
    • kernel-64kb-debugsource-5.3.18-150300.59.164.1
    • kernel-64kb-livepatch-devel-5.3.18-150300.59.164.1
    • reiserfs-kmp-64kb-5.3.18-150300.59.164.1
    • dtb-freescale-5.3.18-150300.59.164.1
    • kernel-64kb-optional-5.3.18-150300.59.164.1
    • ocfs2-kmp-64kb-debuginfo-5.3.18-150300.59.164.1
    • dtb-apm-5.3.18-150300.59.164.1
    • dtb-exynos-5.3.18-150300.59.164.1
    • dtb-socionext-5.3.18-150300.59.164.1
    • kernel-64kb-optional-debuginfo-5.3.18-150300.59.164.1
    • kernel-64kb-devel-debuginfo-5.3.18-150300.59.164.1
    • dtb-amd-5.3.18-150300.59.164.1
    • dlm-kmp-64kb-debuginfo-5.3.18-150300.59.164.1
    • dtb-qcom-5.3.18-150300.59.164.1
    • dtb-marvell-5.3.18-150300.59.164.1
    • dtb-mediatek-5.3.18-150300.59.164.1
    • dtb-altera-5.3.18-150300.59.164.1
    • dtb-broadcom-5.3.18-150300.59.164.1
    • dtb-zte-5.3.18-150300.59.164.1
    • kernel-64kb-debuginfo-5.3.18-150300.59.164.1
    • ocfs2-kmp-64kb-5.3.18-150300.59.164.1
    • kselftests-kmp-64kb-5.3.18-150300.59.164.1
    • dlm-kmp-64kb-5.3.18-150300.59.164.1
    • gfs2-kmp-64kb-5.3.18-150300.59.164.1
    • kernel-64kb-devel-5.3.18-150300.59.164.1
    • dtb-cavium-5.3.18-150300.59.164.1
    • kselftests-kmp-64kb-debuginfo-5.3.18-150300.59.164.1
    • dtb-renesas-5.3.18-150300.59.164.1
    • dtb-xilinx-5.3.18-150300.59.164.1
    • reiserfs-kmp-64kb-debuginfo-5.3.18-150300.59.164.1
    • cluster-md-kmp-64kb-5.3.18-150300.59.164.1
    • kernel-64kb-extra-5.3.18-150300.59.164.1
    • gfs2-kmp-64kb-debuginfo-5.3.18-150300.59.164.1
    • cluster-md-kmp-64kb-debuginfo-5.3.18-150300.59.164.1
    • dtb-nvidia-5.3.18-150300.59.164.1
    • dtb-amlogic-5.3.18-150300.59.164.1
    • kernel-64kb-extra-debuginfo-5.3.18-150300.59.164.1
    • dtb-al-5.3.18-150300.59.164.1
    • dtb-lg-5.3.18-150300.59.164.1
    • dtb-allwinner-5.3.18-150300.59.164.1
  • openSUSE Leap 15.3 (aarch64 nosrc)
    • kernel-64kb-5.3.18-150300.59.164.1
  • SUSE Linux Enterprise Live Patching 15-SP3 (nosrc)
    • kernel-default-5.3.18-150300.59.164.1
  • SUSE Linux Enterprise Live Patching 15-SP3 (ppc64le s390x x86_64)
    • kernel-default-debuginfo-5.3.18-150300.59.164.1
    • kernel-default-livepatch-devel-5.3.18-150300.59.164.1
    • kernel-default-debugsource-5.3.18-150300.59.164.1
    • kernel-livepatch-5_3_18-150300_59_164-default-1-150300.7.3.1
    • kernel-default-livepatch-5.3.18-150300.59.164.1
  • SUSE Linux Enterprise High Availability Extension 15 SP3 (aarch64 ppc64le s390x x86_64)
    • cluster-md-kmp-default-debuginfo-5.3.18-150300.59.164.1
    • kernel-default-debuginfo-5.3.18-150300.59.164.1
    • dlm-kmp-default-debuginfo-5.3.18-150300.59.164.1
    • dlm-kmp-default-5.3.18-150300.59.164.1
    • kernel-default-debugsource-5.3.18-150300.59.164.1
    • cluster-md-kmp-default-5.3.18-150300.59.164.1
    • gfs2-kmp-default-5.3.18-150300.59.164.1
    • ocfs2-kmp-default-5.3.18-150300.59.164.1
    • ocfs2-kmp-default-debuginfo-5.3.18-150300.59.164.1
    • gfs2-kmp-default-debuginfo-5.3.18-150300.59.164.1
  • SUSE Linux Enterprise High Availability Extension 15 SP3 (nosrc)
    • kernel-default-5.3.18-150300.59.164.1
  • SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 nosrc)
    • kernel-64kb-5.3.18-150300.59.164.1
  • SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64)
    • kernel-64kb-devel-debuginfo-5.3.18-150300.59.164.1
    • kernel-64kb-debuginfo-5.3.18-150300.59.164.1
    • kernel-64kb-debugsource-5.3.18-150300.59.164.1
    • kernel-64kb-devel-5.3.18-150300.59.164.1
  • SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 nosrc x86_64)
    • kernel-preempt-5.3.18-150300.59.164.1
    • kernel-default-5.3.18-150300.59.164.1
  • SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64)
    • kernel-obs-build-5.3.18-150300.59.164.1
    • kernel-default-debuginfo-5.3.18-150300.59.164.1
    • kernel-default-devel-debuginfo-5.3.18-150300.59.164.1
    • kernel-default-base-5.3.18-150300.59.164.1.150300.18.96.1
    • kernel-default-debugsource-5.3.18-150300.59.164.1
    • kernel-preempt-debuginfo-5.3.18-150300.59.164.1
    • reiserfs-kmp-default-debuginfo-5.3.18-150300.59.164.1
    • kernel-preempt-devel-5.3.18-150300.59.164.1
    • kernel-syms-5.3.18-150300.59.164.1
    • reiserfs-kmp-default-5.3.18-150300.59.164.1
    • kernel-preempt-devel-debuginfo-5.3.18-150300.59.164.1
    • kernel-default-devel-5.3.18-150300.59.164.1
    • kernel-preempt-debugsource-5.3.18-150300.59.164.1
    • kernel-obs-build-debugsource-5.3.18-150300.59.164.1
  • SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch)
    • kernel-source-5.3.18-150300.59.164.1
    • kernel-macros-5.3.18-150300.59.164.1
    • kernel-devel-5.3.18-150300.59.164.1
  • SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch nosrc)
    • kernel-docs-5.3.18-150300.59.164.1
  • SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 nosrc)
    • kernel-64kb-5.3.18-150300.59.164.1
  • SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64)
    • kernel-64kb-devel-debuginfo-5.3.18-150300.59.164.1
    • kernel-64kb-debuginfo-5.3.18-150300.59.164.1
    • kernel-64kb-debugsource-5.3.18-150300.59.164.1
    • kernel-64kb-devel-5.3.18-150300.59.164.1
  • SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64 nosrc)
    • kernel-default-5.3.18-150300.59.164.1
  • SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64)
    • kernel-obs-build-5.3.18-150300.59.164.1
    • kernel-default-debuginfo-5.3.18-150300.59.164.1
    • kernel-default-devel-debuginfo-5.3.18-150300.59.164.1
    • kernel-default-base-5.3.18-150300.59.164.1.150300.18.96.1
    • kernel-default-debugsource-5.3.18-150300.59.164.1
    • reiserfs-kmp-default-debuginfo-5.3.18-150300.59.164.1
    • kernel-syms-5.3.18-150300.59.164.1
    • reiserfs-kmp-default-5.3.18-150300.59.164.1
    • kernel-default-devel-5.3.18-150300.59.164.1
    • kernel-obs-build-debugsource-5.3.18-150300.59.164.1
  • SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch)
    • kernel-source-5.3.18-150300.59.164.1
    • kernel-macros-5.3.18-150300.59.164.1
    • kernel-devel-5.3.18-150300.59.164.1
  • SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch nosrc)
    • kernel-docs-5.3.18-150300.59.164.1
  • SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 nosrc x86_64)
    • kernel-preempt-5.3.18-150300.59.164.1
  • SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 x86_64)
    • kernel-preempt-devel-debuginfo-5.3.18-150300.59.164.1
    • kernel-preempt-debuginfo-5.3.18-150300.59.164.1
    • kernel-preempt-debugsource-5.3.18-150300.59.164.1
    • kernel-preempt-devel-5.3.18-150300.59.164.1
  • SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (nosrc s390x)
    • kernel-zfcpdump-5.3.18-150300.59.164.1
  • SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (s390x)
    • kernel-zfcpdump-debugsource-5.3.18-150300.59.164.1
    • kernel-zfcpdump-debuginfo-5.3.18-150300.59.164.1
  • SUSE Linux Enterprise Server for SAP Applications 15 SP3 (nosrc ppc64le x86_64)
    • kernel-default-5.3.18-150300.59.164.1
  • SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
    • kernel-obs-build-5.3.18-150300.59.164.1
    • kernel-default-debuginfo-5.3.18-150300.59.164.1
    • kernel-default-devel-debuginfo-5.3.18-150300.59.164.1
    • kernel-default-base-5.3.18-150300.59.164.1.150300.18.96.1
    • kernel-default-debugsource-5.3.18-150300.59.164.1
    • reiserfs-kmp-default-debuginfo-5.3.18-150300.59.164.1
    • kernel-syms-5.3.18-150300.59.164.1
    • reiserfs-kmp-default-5.3.18-150300.59.164.1
    • kernel-default-devel-5.3.18-150300.59.164.1
    • kernel-obs-build-debugsource-5.3.18-150300.59.164.1
  • SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch)
    • kernel-source-5.3.18-150300.59.164.1
    • kernel-macros-5.3.18-150300.59.164.1
    • kernel-devel-5.3.18-150300.59.164.1
  • SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch nosrc)
    • kernel-docs-5.3.18-150300.59.164.1
  • SUSE Linux Enterprise Server for SAP Applications 15 SP3 (nosrc x86_64)
    • kernel-preempt-5.3.18-150300.59.164.1
  • SUSE Linux Enterprise Server for SAP Applications 15 SP3 (x86_64)
    • kernel-preempt-devel-debuginfo-5.3.18-150300.59.164.1
    • kernel-preempt-debuginfo-5.3.18-150300.59.164.1
    • kernel-preempt-debugsource-5.3.18-150300.59.164.1
    • kernel-preempt-devel-5.3.18-150300.59.164.1
  • SUSE Enterprise Storage 7.1 (aarch64 nosrc)
    • kernel-64kb-5.3.18-150300.59.164.1
  • SUSE Enterprise Storage 7.1 (aarch64)
    • kernel-64kb-devel-debuginfo-5.3.18-150300.59.164.1
    • kernel-64kb-debuginfo-5.3.18-150300.59.164.1
    • kernel-64kb-debugsource-5.3.18-150300.59.164.1
    • kernel-64kb-devel-5.3.18-150300.59.164.1
  • SUSE Enterprise Storage 7.1 (aarch64 nosrc x86_64)
    • kernel-preempt-5.3.18-150300.59.164.1
    • kernel-default-5.3.18-150300.59.164.1
  • SUSE Enterprise Storage 7.1 (aarch64 x86_64)
    • kernel-obs-build-5.3.18-150300.59.164.1
    • kernel-default-debuginfo-5.3.18-150300.59.164.1
    • kernel-default-devel-debuginfo-5.3.18-150300.59.164.1
    • kernel-default-base-5.3.18-150300.59.164.1.150300.18.96.1
    • kernel-default-debugsource-5.3.18-150300.59.164.1
    • kernel-preempt-debuginfo-5.3.18-150300.59.164.1
    • reiserfs-kmp-default-debuginfo-5.3.18-150300.59.164.1
    • kernel-preempt-devel-5.3.18-150300.59.164.1
    • kernel-syms-5.3.18-150300.59.164.1
    • reiserfs-kmp-default-5.3.18-150300.59.164.1
    • kernel-preempt-devel-debuginfo-5.3.18-150300.59.164.1
    • kernel-default-devel-5.3.18-150300.59.164.1
    • kernel-preempt-debugsource-5.3.18-150300.59.164.1
    • kernel-obs-build-debugsource-5.3.18-150300.59.164.1
  • SUSE Enterprise Storage 7.1 (noarch)
    • kernel-source-5.3.18-150300.59.164.1
    • kernel-macros-5.3.18-150300.59.164.1
    • kernel-devel-5.3.18-150300.59.164.1
  • SUSE Enterprise Storage 7.1 (noarch nosrc)
    • kernel-docs-5.3.18-150300.59.164.1
  • SUSE Linux Enterprise Micro 5.1 (aarch64 nosrc s390x x86_64)
    • kernel-default-5.3.18-150300.59.164.1
  • SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64)
    • kernel-default-debuginfo-5.3.18-150300.59.164.1
    • kernel-default-base-5.3.18-150300.59.164.1.150300.18.96.1
    • kernel-default-debugsource-5.3.18-150300.59.164.1
  • SUSE Linux Enterprise Micro 5.2 (aarch64 nosrc s390x x86_64)
    • kernel-default-5.3.18-150300.59.164.1
  • SUSE Linux Enterprise Micro 5.2 (aarch64 x86_64)
    • kernel-default-base-5.3.18-150300.59.164.1.150300.18.96.1
  • SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64)
    • kernel-default-debuginfo-5.3.18-150300.59.164.1
    • kernel-default-debugsource-5.3.18-150300.59.164.1
  • SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 nosrc s390x x86_64)
    • kernel-default-5.3.18-150300.59.164.1
  • SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 x86_64)
    • kernel-default-base-5.3.18-150300.59.164.1.150300.18.96.1
  • SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64)
    • kernel-default-debuginfo-5.3.18-150300.59.164.1
    • kernel-default-debugsource-5.3.18-150300.59.164.1

References: