Security update for the Linux Kernel
Announcement ID: | SUSE-SU-2024:3408-1 |
---|---|
Rating: | important |
References: |
|
Cross-References: |
|
CVSS scores: |
|
Affected Products: |
|
An update that solves 73 vulnerabilities and has 18 security fixes can now be installed.
Description:
The SUSE Linux Enterprise 15 SP4 kernel was updated to receive various security bugfixes.
The following security bugs were fixed:
- CVE-2024-41062: Sync sock recv cb and release (bsc#1228576).
- CVE-2024-44947: Initialize beyond-EOF page contents before setting uptodate (bsc#1229454).
- CVE-2024-43883: Do not drop references before new references are gained (bsc#1229707).
- CVE-2024-43861: Fix memory leak for not ip packets (bsc#1229500).
- CVE-2023-52489: Fix race in accessing memory_section->usage (bsc#1221326).
- CVE-2024-44938: Fix shift-out-of-bounds in dbDiscardAG (bsc#1229792).
- CVE-2024-41087: Fix double free on error (CVE-2024-41087,bsc#1228466).
- CVE-2024-43882: Fixed ToCToU between perm check and set-uid/gid usage. (bsc#1229503)
- CVE-2022-48935: Fixed an unregister flowtable hooks on netns exit (bsc#1229619)
- CVE-2022-48912: Fix use-after-free in __nf_register_net_hook() (bsc#1229641)
- CVE-2024-42271: Fixed a use after free in iucv_sock_close(). (bsc#1229400)
- CVE-2024-42232: Fixed a race between delayed_work() and ceph_monc_stop(). (bsc#1228959)
- CVE-2024-40910: Fix refcount imbalance on inbound connections (bsc#1227832).
- CVE-2024-41009: Fix overrunning reservations in ringbuf (bsc#1228020).
- CVE-2024-45003: Don't evict inode under the inode lru traversing context (bsc#1230245).
The following non-security bugs were fixed:
- Bluetooth: L2CAP: Fix deadlock (git-fixes).
- mm, kmsan: fix infinite recursion due to RCU critical section (git-fixes).
- mm: prevent derefencing NULL ptr in pfn_section_valid() (git-fixes).
- Revert "mm: prevent derefencing NULL ptr in pfn_section_valid()" (bsc#1230413).
- Revert "mm, kmsan: fix infinite recursion due to RCU critical section" (bsc#1230413).
- Revert "mm/sparsemem: fix race in accessing memory_section->usage" (bsc#1230413).
- nvme_core: scan namespaces asynchronously (bsc#1224105).
Special Instructions and Notes:
- Please reboot the system after installing this update.
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
openSUSE Leap 15.4
zypper in -t patch SUSE-2024-3408=1
-
SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-3408=1
-
SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-3408=1
-
SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-3408=1
-
SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-3408=1
-
SUSE Linux Enterprise Live Patching 15-SP4
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2024-3408=1
Please note that this is the initial kernel livepatch without fixes itself, this package is later updated by separate standalone kernel livepatch updates. -
SUSE Linux Enterprise High Availability Extension 15 SP4
zypper in -t patch SUSE-SLE-Product-HA-15-SP4-2024-3408=1
-
SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3408=1
-
SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3408=1
-
SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3408=1
-
SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3408=1
-
SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3408=1
-
SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-3408=1
-
SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.3-2024-3408=1
-
SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-3408=1
Package List:
-
openSUSE Leap 15.4 (noarch nosrc)
- kernel-docs-5.14.21-150400.24.133.1
-
openSUSE Leap 15.4 (noarch)
- kernel-macros-5.14.21-150400.24.133.2
- kernel-source-vanilla-5.14.21-150400.24.133.2
- kernel-devel-5.14.21-150400.24.133.2
- kernel-source-5.14.21-150400.24.133.2
- kernel-docs-html-5.14.21-150400.24.133.1
-
openSUSE Leap 15.4 (nosrc ppc64le x86_64)
- kernel-debug-5.14.21-150400.24.133.2
-
openSUSE Leap 15.4 (ppc64le x86_64)
- kernel-debug-devel-5.14.21-150400.24.133.2
- kernel-debug-devel-debuginfo-5.14.21-150400.24.133.2
- kernel-debug-debugsource-5.14.21-150400.24.133.2
- kernel-debug-debuginfo-5.14.21-150400.24.133.2
- kernel-debug-livepatch-devel-5.14.21-150400.24.133.2
-
openSUSE Leap 15.4 (aarch64 ppc64le x86_64)
- kernel-default-base-5.14.21-150400.24.133.2.150400.24.64.5
- kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.133.2
- kernel-kvmsmall-devel-5.14.21-150400.24.133.2
- kernel-kvmsmall-debugsource-5.14.21-150400.24.133.2
- kernel-kvmsmall-debuginfo-5.14.21-150400.24.133.2
- kernel-default-base-rebuild-5.14.21-150400.24.133.2.150400.24.64.5
- kernel-kvmsmall-devel-debuginfo-5.14.21-150400.24.133.2
-
openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64)
- kernel-default-optional-5.14.21-150400.24.133.2
- ocfs2-kmp-default-5.14.21-150400.24.133.2
- kselftests-kmp-default-5.14.21-150400.24.133.2
- kernel-obs-build-debugsource-5.14.21-150400.24.133.2
- kernel-obs-qa-5.14.21-150400.24.133.1
- kselftests-kmp-default-debuginfo-5.14.21-150400.24.133.2
- reiserfs-kmp-default-5.14.21-150400.24.133.2
- gfs2-kmp-default-5.14.21-150400.24.133.2
- dlm-kmp-default-5.14.21-150400.24.133.2
- ocfs2-kmp-default-debuginfo-5.14.21-150400.24.133.2
- kernel-obs-build-5.14.21-150400.24.133.2
- kernel-default-optional-debuginfo-5.14.21-150400.24.133.2
- kernel-syms-5.14.21-150400.24.133.1
- kernel-default-extra-debuginfo-5.14.21-150400.24.133.2
- kernel-default-debuginfo-5.14.21-150400.24.133.2
- cluster-md-kmp-default-5.14.21-150400.24.133.2
- kernel-default-extra-5.14.21-150400.24.133.2
- cluster-md-kmp-default-debuginfo-5.14.21-150400.24.133.2
- kernel-default-livepatch-5.14.21-150400.24.133.2
- dlm-kmp-default-debuginfo-5.14.21-150400.24.133.2
- gfs2-kmp-default-debuginfo-5.14.21-150400.24.133.2
- kernel-default-livepatch-devel-5.14.21-150400.24.133.2
- kernel-default-debugsource-5.14.21-150400.24.133.2
- kernel-default-devel-debuginfo-5.14.21-150400.24.133.2
- kernel-default-devel-5.14.21-150400.24.133.2
- reiserfs-kmp-default-debuginfo-5.14.21-150400.24.133.2
-
openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 nosrc)
- kernel-default-5.14.21-150400.24.133.2
-
openSUSE Leap 15.4 (aarch64 nosrc ppc64le x86_64)
- kernel-kvmsmall-5.14.21-150400.24.133.2
-
openSUSE Leap 15.4 (ppc64le s390x x86_64)
- kernel-livepatch-5_14_21-150400_24_133-default-debuginfo-1-150400.9.3.2
- kernel-livepatch-5_14_21-150400_24_133-default-1-150400.9.3.2
- kernel-livepatch-SLE15-SP4_Update_31-debugsource-1-150400.9.3.2
-
openSUSE Leap 15.4 (nosrc s390x)
- kernel-zfcpdump-5.14.21-150400.24.133.2
-
openSUSE Leap 15.4 (s390x)
- kernel-zfcpdump-debuginfo-5.14.21-150400.24.133.2
- kernel-zfcpdump-debugsource-5.14.21-150400.24.133.2
-
openSUSE Leap 15.4 (nosrc)
- dtb-aarch64-5.14.21-150400.24.133.1
-
openSUSE Leap 15.4 (aarch64)
- dtb-amd-5.14.21-150400.24.133.1
- dtb-freescale-5.14.21-150400.24.133.1
- dtb-renesas-5.14.21-150400.24.133.1
- dtb-nvidia-5.14.21-150400.24.133.1
- dtb-xilinx-5.14.21-150400.24.133.1
- kernel-64kb-devel-debuginfo-5.14.21-150400.24.133.2
- dtb-allwinner-5.14.21-150400.24.133.1
- gfs2-kmp-64kb-debuginfo-5.14.21-150400.24.133.2
- kernel-64kb-optional-5.14.21-150400.24.133.2
- kselftests-kmp-64kb-5.14.21-150400.24.133.2
- dlm-kmp-64kb-debuginfo-5.14.21-150400.24.133.2
- dtb-altera-5.14.21-150400.24.133.1
- cluster-md-kmp-64kb-5.14.21-150400.24.133.2
- cluster-md-kmp-64kb-debuginfo-5.14.21-150400.24.133.2
- dtb-lg-5.14.21-150400.24.133.1
- kernel-64kb-devel-5.14.21-150400.24.133.2
- dtb-exynos-5.14.21-150400.24.133.1
- dtb-marvell-5.14.21-150400.24.133.1
- ocfs2-kmp-64kb-5.14.21-150400.24.133.2
- kernel-64kb-optional-debuginfo-5.14.21-150400.24.133.2
- reiserfs-kmp-64kb-5.14.21-150400.24.133.2
- kernel-64kb-debuginfo-5.14.21-150400.24.133.2
- dtb-socionext-5.14.21-150400.24.133.1
- dtb-cavium-5.14.21-150400.24.133.1
- kernel-64kb-extra-debuginfo-5.14.21-150400.24.133.2
- dtb-sprd-5.14.21-150400.24.133.1
- dtb-amlogic-5.14.21-150400.24.133.1
- dtb-mediatek-5.14.21-150400.24.133.1
- dtb-hisilicon-5.14.21-150400.24.133.1
- gfs2-kmp-64kb-5.14.21-150400.24.133.2
- dtb-qcom-5.14.21-150400.24.133.1
- reiserfs-kmp-64kb-debuginfo-5.14.21-150400.24.133.2
- dlm-kmp-64kb-5.14.21-150400.24.133.2
- dtb-apple-5.14.21-150400.24.133.1
- ocfs2-kmp-64kb-debuginfo-5.14.21-150400.24.133.2
- dtb-apm-5.14.21-150400.24.133.1
- kernel-64kb-debugsource-5.14.21-150400.24.133.2
- dtb-amazon-5.14.21-150400.24.133.1
- kernel-64kb-extra-5.14.21-150400.24.133.2
- kernel-64kb-livepatch-devel-5.14.21-150400.24.133.2
- kselftests-kmp-64kb-debuginfo-5.14.21-150400.24.133.2
- dtb-broadcom-5.14.21-150400.24.133.1
- dtb-rockchip-5.14.21-150400.24.133.1
- dtb-arm-5.14.21-150400.24.133.1
-
openSUSE Leap 15.4 (aarch64 nosrc)
- kernel-64kb-5.14.21-150400.24.133.2
-
SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 nosrc s390x x86_64)
- kernel-default-5.14.21-150400.24.133.2
-
SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 x86_64)
- kernel-default-base-5.14.21-150400.24.133.2.150400.24.64.5
-
SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
- kernel-default-debugsource-5.14.21-150400.24.133.2
- kernel-default-debuginfo-5.14.21-150400.24.133.2
-
SUSE Linux Enterprise Micro 5.3 (aarch64 nosrc s390x x86_64)
- kernel-default-5.14.21-150400.24.133.2
-
SUSE Linux Enterprise Micro 5.3 (aarch64 x86_64)
- kernel-default-base-5.14.21-150400.24.133.2.150400.24.64.5
-
SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
- kernel-default-debugsource-5.14.21-150400.24.133.2
- kernel-default-debuginfo-5.14.21-150400.24.133.2
-
SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 nosrc s390x x86_64)
- kernel-default-5.14.21-150400.24.133.2
-
SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 x86_64)
- kernel-default-base-5.14.21-150400.24.133.2.150400.24.64.5
-
SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
- kernel-default-debugsource-5.14.21-150400.24.133.2
- kernel-default-debuginfo-5.14.21-150400.24.133.2
-
SUSE Linux Enterprise Micro 5.4 (aarch64 nosrc s390x x86_64)
- kernel-default-5.14.21-150400.24.133.2
-
SUSE Linux Enterprise Micro 5.4 (aarch64 x86_64)
- kernel-default-base-5.14.21-150400.24.133.2.150400.24.64.5
-
SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
- kernel-default-debugsource-5.14.21-150400.24.133.2
- kernel-default-debuginfo-5.14.21-150400.24.133.2
-
SUSE Linux Enterprise Live Patching 15-SP4 (nosrc)
- kernel-default-5.14.21-150400.24.133.2
-
SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64)
- kernel-livepatch-5_14_21-150400_24_133-default-1-150400.9.3.2
- kernel-default-livepatch-devel-5.14.21-150400.24.133.2
- kernel-default-livepatch-5.14.21-150400.24.133.2
- kernel-default-debugsource-5.14.21-150400.24.133.2
- kernel-livepatch-SLE15-SP4_Update_31-debugsource-1-150400.9.3.2
- kernel-livepatch-5_14_21-150400_24_133-default-debuginfo-1-150400.9.3.2
- kernel-default-debuginfo-5.14.21-150400.24.133.2
-
SUSE Linux Enterprise High Availability Extension 15 SP4 (aarch64 ppc64le s390x x86_64)
- cluster-md-kmp-default-5.14.21-150400.24.133.2
- gfs2-kmp-default-debuginfo-5.14.21-150400.24.133.2
- ocfs2-kmp-default-5.14.21-150400.24.133.2
- cluster-md-kmp-default-debuginfo-5.14.21-150400.24.133.2
- ocfs2-kmp-default-debuginfo-5.14.21-150400.24.133.2
- kernel-default-debuginfo-5.14.21-150400.24.133.2
- kernel-default-debugsource-5.14.21-150400.24.133.2
- dlm-kmp-default-debuginfo-5.14.21-150400.24.133.2
- gfs2-kmp-default-5.14.21-150400.24.133.2
- dlm-kmp-default-5.14.21-150400.24.133.2
-
SUSE Linux Enterprise High Availability Extension 15 SP4 (nosrc)
- kernel-default-5.14.21-150400.24.133.2
-
SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 nosrc)
- kernel-64kb-5.14.21-150400.24.133.2
-
SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64)
- kernel-64kb-devel-5.14.21-150400.24.133.2
- kernel-64kb-debugsource-5.14.21-150400.24.133.2
- kernel-64kb-devel-debuginfo-5.14.21-150400.24.133.2
- kernel-64kb-debuginfo-5.14.21-150400.24.133.2
-
SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 nosrc x86_64)
- kernel-default-5.14.21-150400.24.133.2
-
SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64)
- kernel-default-base-5.14.21-150400.24.133.2.150400.24.64.5
- kernel-obs-build-debugsource-5.14.21-150400.24.133.2
- kernel-obs-build-5.14.21-150400.24.133.2
- reiserfs-kmp-default-5.14.21-150400.24.133.2
- kernel-default-debugsource-5.14.21-150400.24.133.2
- kernel-syms-5.14.21-150400.24.133.1
- kernel-default-devel-debuginfo-5.14.21-150400.24.133.2
- kernel-default-devel-5.14.21-150400.24.133.2
- kernel-default-debuginfo-5.14.21-150400.24.133.2
- reiserfs-kmp-default-debuginfo-5.14.21-150400.24.133.2
-
SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
- kernel-macros-5.14.21-150400.24.133.2
- kernel-devel-5.14.21-150400.24.133.2
- kernel-source-5.14.21-150400.24.133.2
-
SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch nosrc)
- kernel-docs-5.14.21-150400.24.133.1
-
SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 nosrc)
- kernel-64kb-5.14.21-150400.24.133.2
-
SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64)
- kernel-64kb-devel-5.14.21-150400.24.133.2
- kernel-64kb-debugsource-5.14.21-150400.24.133.2
- kernel-64kb-devel-debuginfo-5.14.21-150400.24.133.2
- kernel-64kb-debuginfo-5.14.21-150400.24.133.2
-
SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 nosrc x86_64)
- kernel-default-5.14.21-150400.24.133.2
-
SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64)
- kernel-default-base-5.14.21-150400.24.133.2.150400.24.64.5
- kernel-obs-build-debugsource-5.14.21-150400.24.133.2
- kernel-obs-build-5.14.21-150400.24.133.2
- reiserfs-kmp-default-5.14.21-150400.24.133.2
- kernel-default-debugsource-5.14.21-150400.24.133.2
- kernel-syms-5.14.21-150400.24.133.1
- kernel-default-devel-debuginfo-5.14.21-150400.24.133.2
- kernel-default-devel-5.14.21-150400.24.133.2
- kernel-default-debuginfo-5.14.21-150400.24.133.2
- reiserfs-kmp-default-debuginfo-5.14.21-150400.24.133.2
-
SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
- kernel-macros-5.14.21-150400.24.133.2
- kernel-devel-5.14.21-150400.24.133.2
- kernel-source-5.14.21-150400.24.133.2
-
SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch nosrc)
- kernel-docs-5.14.21-150400.24.133.1
-
SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (nosrc x86_64)
- kernel-default-5.14.21-150400.24.133.2
-
SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
- kernel-default-base-5.14.21-150400.24.133.2.150400.24.64.5
- kernel-default-extra-5.14.21-150400.24.133.2
- kernel-obs-build-debugsource-5.14.21-150400.24.133.2
- kernel-obs-build-5.14.21-150400.24.133.2
- kernel-default-debugsource-5.14.21-150400.24.133.2
- kernel-syms-5.14.21-150400.24.133.1
- kernel-default-devel-debuginfo-5.14.21-150400.24.133.2
- kernel-default-extra-debuginfo-5.14.21-150400.24.133.2
- kernel-default-devel-5.14.21-150400.24.133.2
- kernel-default-debuginfo-5.14.21-150400.24.133.2
-
SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch)
- kernel-macros-5.14.21-150400.24.133.2
- kernel-devel-5.14.21-150400.24.133.2
- kernel-source-5.14.21-150400.24.133.2
-
SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch nosrc)
- kernel-docs-5.14.21-150400.24.133.1
-
SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 nosrc)
- kernel-64kb-5.14.21-150400.24.133.2
-
SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64)
- kernel-64kb-devel-5.14.21-150400.24.133.2
- kernel-64kb-debugsource-5.14.21-150400.24.133.2
- kernel-64kb-devel-debuginfo-5.14.21-150400.24.133.2
- kernel-64kb-debuginfo-5.14.21-150400.24.133.2
-
SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64 nosrc)
- kernel-default-5.14.21-150400.24.133.2
-
SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le x86_64)
- kernel-default-base-5.14.21-150400.24.133.2.150400.24.64.5
-
SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64)
- kernel-obs-build-debugsource-5.14.21-150400.24.133.2
- kernel-obs-build-5.14.21-150400.24.133.2
- reiserfs-kmp-default-5.14.21-150400.24.133.2
- kernel-default-debugsource-5.14.21-150400.24.133.2
- kernel-syms-5.14.21-150400.24.133.1
- kernel-default-devel-debuginfo-5.14.21-150400.24.133.2
- kernel-default-devel-5.14.21-150400.24.133.2
- kernel-default-debuginfo-5.14.21-150400.24.133.2
- reiserfs-kmp-default-debuginfo-5.14.21-150400.24.133.2
-
SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch)
- kernel-macros-5.14.21-150400.24.133.2
- kernel-devel-5.14.21-150400.24.133.2
- kernel-source-5.14.21-150400.24.133.2
-
SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch nosrc)
- kernel-docs-5.14.21-150400.24.133.1
-
SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (nosrc s390x)
- kernel-zfcpdump-5.14.21-150400.24.133.2
-
SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (s390x)
- kernel-zfcpdump-debuginfo-5.14.21-150400.24.133.2
- kernel-zfcpdump-debugsource-5.14.21-150400.24.133.2
-
SUSE Linux Enterprise Server for SAP Applications 15 SP4 (nosrc ppc64le x86_64)
- kernel-default-5.14.21-150400.24.133.2
-
SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
- kernel-default-base-5.14.21-150400.24.133.2.150400.24.64.5
- kernel-obs-build-debugsource-5.14.21-150400.24.133.2
- kernel-obs-build-5.14.21-150400.24.133.2
- reiserfs-kmp-default-5.14.21-150400.24.133.2
- kernel-default-debugsource-5.14.21-150400.24.133.2
- kernel-syms-5.14.21-150400.24.133.1
- kernel-default-devel-debuginfo-5.14.21-150400.24.133.2
- kernel-default-devel-5.14.21-150400.24.133.2
- kernel-default-debuginfo-5.14.21-150400.24.133.2
- reiserfs-kmp-default-debuginfo-5.14.21-150400.24.133.2
-
SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
- kernel-macros-5.14.21-150400.24.133.2
- kernel-devel-5.14.21-150400.24.133.2
- kernel-source-5.14.21-150400.24.133.2
-
SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch nosrc)
- kernel-docs-5.14.21-150400.24.133.1
-
SUSE Manager Proxy 4.3 (nosrc x86_64)
- kernel-default-5.14.21-150400.24.133.2
-
SUSE Manager Proxy 4.3 (x86_64)
- kernel-default-base-5.14.21-150400.24.133.2.150400.24.64.5
- kernel-default-debugsource-5.14.21-150400.24.133.2
- kernel-syms-5.14.21-150400.24.133.1
- kernel-default-devel-debuginfo-5.14.21-150400.24.133.2
- kernel-default-devel-5.14.21-150400.24.133.2
- kernel-default-debuginfo-5.14.21-150400.24.133.2
-
SUSE Manager Proxy 4.3 (noarch)
- kernel-macros-5.14.21-150400.24.133.2
- kernel-devel-5.14.21-150400.24.133.2
- kernel-source-5.14.21-150400.24.133.2
-
SUSE Manager Retail Branch Server 4.3 (nosrc x86_64)
- kernel-default-5.14.21-150400.24.133.2
-
SUSE Manager Retail Branch Server 4.3 (x86_64)
- kernel-default-base-5.14.21-150400.24.133.2.150400.24.64.5
- kernel-default-debugsource-5.14.21-150400.24.133.2
- kernel-default-devel-debuginfo-5.14.21-150400.24.133.2
- kernel-default-devel-5.14.21-150400.24.133.2
- kernel-default-debuginfo-5.14.21-150400.24.133.2
-
SUSE Manager Retail Branch Server 4.3 (noarch)
- kernel-macros-5.14.21-150400.24.133.2
- kernel-devel-5.14.21-150400.24.133.2
-
SUSE Manager Server 4.3 (nosrc ppc64le s390x x86_64)
- kernel-default-5.14.21-150400.24.133.2
-
SUSE Manager Server 4.3 (ppc64le x86_64)
- kernel-default-base-5.14.21-150400.24.133.2.150400.24.64.5
-
SUSE Manager Server 4.3 (ppc64le s390x x86_64)
- kernel-default-debugsource-5.14.21-150400.24.133.2
- kernel-syms-5.14.21-150400.24.133.1
- kernel-default-devel-debuginfo-5.14.21-150400.24.133.2
- kernel-default-devel-5.14.21-150400.24.133.2
- kernel-default-debuginfo-5.14.21-150400.24.133.2
-
SUSE Manager Server 4.3 (noarch)
- kernel-macros-5.14.21-150400.24.133.2
- kernel-devel-5.14.21-150400.24.133.2
- kernel-source-5.14.21-150400.24.133.2
-
SUSE Manager Server 4.3 (nosrc s390x)
- kernel-zfcpdump-5.14.21-150400.24.133.2
-
SUSE Manager Server 4.3 (s390x)
- kernel-zfcpdump-debuginfo-5.14.21-150400.24.133.2
- kernel-zfcpdump-debugsource-5.14.21-150400.24.133.2
References:
- https://www.suse.com/security/cve/CVE-2021-4441.html
- https://www.suse.com/security/cve/CVE-2022-4382.html
- https://www.suse.com/security/cve/CVE-2022-48868.html
- https://www.suse.com/security/cve/CVE-2022-48869.html
- https://www.suse.com/security/cve/CVE-2022-48870.html
- https://www.suse.com/security/cve/CVE-2022-48871.html
- https://www.suse.com/security/cve/CVE-2022-48872.html
- https://www.suse.com/security/cve/CVE-2022-48873.html
- https://www.suse.com/security/cve/CVE-2022-48875.html
- https://www.suse.com/security/cve/CVE-2022-48878.html
- https://www.suse.com/security/cve/CVE-2022-48880.html
- https://www.suse.com/security/cve/CVE-2022-48890.html
- https://www.suse.com/security/cve/CVE-2022-48891.html
- https://www.suse.com/security/cve/CVE-2022-48896.html
- https://www.suse.com/security/cve/CVE-2022-48898.html
- https://www.suse.com/security/cve/CVE-2022-48899.html
- https://www.suse.com/security/cve/CVE-2022-48903.html
- https://www.suse.com/security/cve/CVE-2022-48904.html
- https://www.suse.com/security/cve/CVE-2022-48905.html
- https://www.suse.com/security/cve/CVE-2022-48907.html
- https://www.suse.com/security/cve/CVE-2022-48909.html
- https://www.suse.com/security/cve/CVE-2022-48912.html
- https://www.suse.com/security/cve/CVE-2022-48913.html
- https://www.suse.com/security/cve/CVE-2022-48914.html
- https://www.suse.com/security/cve/CVE-2022-48915.html
- https://www.suse.com/security/cve/CVE-2022-48916.html
- https://www.suse.com/security/cve/CVE-2022-48917.html
- https://www.suse.com/security/cve/CVE-2022-48918.html
- https://www.suse.com/security/cve/CVE-2022-48919.html
- https://www.suse.com/security/cve/CVE-2022-48921.html
- https://www.suse.com/security/cve/CVE-2022-48924.html
- https://www.suse.com/security/cve/CVE-2022-48925.html
- https://www.suse.com/security/cve/CVE-2022-48926.html
- https://www.suse.com/security/cve/CVE-2022-48927.html
- https://www.suse.com/security/cve/CVE-2022-48928.html
- https://www.suse.com/security/cve/CVE-2022-48929.html
- https://www.suse.com/security/cve/CVE-2022-48930.html
- https://www.suse.com/security/cve/CVE-2022-48931.html
- https://www.suse.com/security/cve/CVE-2022-48932.html
- https://www.suse.com/security/cve/CVE-2022-48934.html
- https://www.suse.com/security/cve/CVE-2022-48935.html
- https://www.suse.com/security/cve/CVE-2022-48937.html
- https://www.suse.com/security/cve/CVE-2022-48938.html
- https://www.suse.com/security/cve/CVE-2022-48941.html
- https://www.suse.com/security/cve/CVE-2022-48942.html
- https://www.suse.com/security/cve/CVE-2022-48943.html
- https://www.suse.com/security/cve/CVE-2023-52489.html
- https://www.suse.com/security/cve/CVE-2023-52893.html
- https://www.suse.com/security/cve/CVE-2023-52894.html
- https://www.suse.com/security/cve/CVE-2023-52896.html
- https://www.suse.com/security/cve/CVE-2023-52898.html
- https://www.suse.com/security/cve/CVE-2023-52900.html
- https://www.suse.com/security/cve/CVE-2023-52901.html
- https://www.suse.com/security/cve/CVE-2023-52905.html
- https://www.suse.com/security/cve/CVE-2023-52907.html
- https://www.suse.com/security/cve/CVE-2023-52911.html
- https://www.suse.com/security/cve/CVE-2024-40910.html
- https://www.suse.com/security/cve/CVE-2024-41009.html
- https://www.suse.com/security/cve/CVE-2024-41011.html
- https://www.suse.com/security/cve/CVE-2024-41062.html
- https://www.suse.com/security/cve/CVE-2024-41087.html
- https://www.suse.com/security/cve/CVE-2024-42077.html
- https://www.suse.com/security/cve/CVE-2024-42126.html
- https://www.suse.com/security/cve/CVE-2024-42230.html
- https://www.suse.com/security/cve/CVE-2024-42232.html
- https://www.suse.com/security/cve/CVE-2024-42271.html
- https://www.suse.com/security/cve/CVE-2024-43853.html
- https://www.suse.com/security/cve/CVE-2024-43861.html
- https://www.suse.com/security/cve/CVE-2024-43882.html
- https://www.suse.com/security/cve/CVE-2024-43883.html
- https://www.suse.com/security/cve/CVE-2024-44938.html
- https://www.suse.com/security/cve/CVE-2024-44947.html
- https://www.suse.com/security/cve/CVE-2024-45003.html
- https://bugzilla.suse.com/show_bug.cgi?id=1193629
- https://bugzilla.suse.com/show_bug.cgi?id=1194111
- https://bugzilla.suse.com/show_bug.cgi?id=1194765
- https://bugzilla.suse.com/show_bug.cgi?id=1194869
- https://bugzilla.suse.com/show_bug.cgi?id=1196261
- https://bugzilla.suse.com/show_bug.cgi?id=1196516
- https://bugzilla.suse.com/show_bug.cgi?id=1196894
- https://bugzilla.suse.com/show_bug.cgi?id=1198017
- https://bugzilla.suse.com/show_bug.cgi?id=1203360
- https://bugzilla.suse.com/show_bug.cgi?id=1206006
- https://bugzilla.suse.com/show_bug.cgi?id=1206258
- https://bugzilla.suse.com/show_bug.cgi?id=1207158
- https://bugzilla.suse.com/show_bug.cgi?id=1216834
- https://bugzilla.suse.com/show_bug.cgi?id=1221326
- https://bugzilla.suse.com/show_bug.cgi?id=1221645
- https://bugzilla.suse.com/show_bug.cgi?id=1223191
- https://bugzilla.suse.com/show_bug.cgi?id=1224105
- https://bugzilla.suse.com/show_bug.cgi?id=1227832
- https://bugzilla.suse.com/show_bug.cgi?id=1228020
- https://bugzilla.suse.com/show_bug.cgi?id=1228114
- https://bugzilla.suse.com/show_bug.cgi?id=1228466
- https://bugzilla.suse.com/show_bug.cgi?id=1228489
- https://bugzilla.suse.com/show_bug.cgi?id=1228516
- https://bugzilla.suse.com/show_bug.cgi?id=1228576
- https://bugzilla.suse.com/show_bug.cgi?id=1228718
- https://bugzilla.suse.com/show_bug.cgi?id=1228801
- https://bugzilla.suse.com/show_bug.cgi?id=1228959
- https://bugzilla.suse.com/show_bug.cgi?id=1229042
- https://bugzilla.suse.com/show_bug.cgi?id=1229292
- https://bugzilla.suse.com/show_bug.cgi?id=1229400
- https://bugzilla.suse.com/show_bug.cgi?id=1229454
- https://bugzilla.suse.com/show_bug.cgi?id=1229500
- https://bugzilla.suse.com/show_bug.cgi?id=1229503
- https://bugzilla.suse.com/show_bug.cgi?id=1229506
- https://bugzilla.suse.com/show_bug.cgi?id=1229507
- https://bugzilla.suse.com/show_bug.cgi?id=1229508
- https://bugzilla.suse.com/show_bug.cgi?id=1229509
- https://bugzilla.suse.com/show_bug.cgi?id=1229510
- https://bugzilla.suse.com/show_bug.cgi?id=1229512
- https://bugzilla.suse.com/show_bug.cgi?id=1229516
- https://bugzilla.suse.com/show_bug.cgi?id=1229522
- https://bugzilla.suse.com/show_bug.cgi?id=1229526
- https://bugzilla.suse.com/show_bug.cgi?id=1229528
- https://bugzilla.suse.com/show_bug.cgi?id=1229531
- https://bugzilla.suse.com/show_bug.cgi?id=1229533
- https://bugzilla.suse.com/show_bug.cgi?id=1229535
- https://bugzilla.suse.com/show_bug.cgi?id=1229536
- https://bugzilla.suse.com/show_bug.cgi?id=1229537
- https://bugzilla.suse.com/show_bug.cgi?id=1229540
- https://bugzilla.suse.com/show_bug.cgi?id=1229544
- https://bugzilla.suse.com/show_bug.cgi?id=1229554
- https://bugzilla.suse.com/show_bug.cgi?id=1229557
- https://bugzilla.suse.com/show_bug.cgi?id=1229565
- https://bugzilla.suse.com/show_bug.cgi?id=1229566
- https://bugzilla.suse.com/show_bug.cgi?id=1229568
- https://bugzilla.suse.com/show_bug.cgi?id=1229581
- https://bugzilla.suse.com/show_bug.cgi?id=1229598
- https://bugzilla.suse.com/show_bug.cgi?id=1229603
- https://bugzilla.suse.com/show_bug.cgi?id=1229604
- https://bugzilla.suse.com/show_bug.cgi?id=1229608
- https://bugzilla.suse.com/show_bug.cgi?id=1229611
- https://bugzilla.suse.com/show_bug.cgi?id=1229612
- https://bugzilla.suse.com/show_bug.cgi?id=1229613
- https://bugzilla.suse.com/show_bug.cgi?id=1229614
- https://bugzilla.suse.com/show_bug.cgi?id=1229617
- https://bugzilla.suse.com/show_bug.cgi?id=1229619
- https://bugzilla.suse.com/show_bug.cgi?id=1229620
- https://bugzilla.suse.com/show_bug.cgi?id=1229622
- https://bugzilla.suse.com/show_bug.cgi?id=1229623
- https://bugzilla.suse.com/show_bug.cgi?id=1229624
- https://bugzilla.suse.com/show_bug.cgi?id=1229625
- https://bugzilla.suse.com/show_bug.cgi?id=1229626
- https://bugzilla.suse.com/show_bug.cgi?id=1229628
- https://bugzilla.suse.com/show_bug.cgi?id=1229629
- https://bugzilla.suse.com/show_bug.cgi?id=1229630
- https://bugzilla.suse.com/show_bug.cgi?id=1229631
- https://bugzilla.suse.com/show_bug.cgi?id=1229635
- https://bugzilla.suse.com/show_bug.cgi?id=1229636
- https://bugzilla.suse.com/show_bug.cgi?id=1229637
- https://bugzilla.suse.com/show_bug.cgi?id=1229638
- https://bugzilla.suse.com/show_bug.cgi?id=1229639
- https://bugzilla.suse.com/show_bug.cgi?id=1229641
- https://bugzilla.suse.com/show_bug.cgi?id=1229642
- https://bugzilla.suse.com/show_bug.cgi?id=1229643
- https://bugzilla.suse.com/show_bug.cgi?id=1229645
- https://bugzilla.suse.com/show_bug.cgi?id=1229657
- https://bugzilla.suse.com/show_bug.cgi?id=1229664
- https://bugzilla.suse.com/show_bug.cgi?id=1229707
- https://bugzilla.suse.com/show_bug.cgi?id=1229792
- https://bugzilla.suse.com/show_bug.cgi?id=1230245
- https://bugzilla.suse.com/show_bug.cgi?id=1230413