Security update for the Linux Kernel
Announcement ID: | SUSE-SU-2024:2571-1 |
---|---|
Rating: | important |
References: |
|
Cross-References: |
|
CVSS scores: |
|
Affected Products: |
|
An update that solves 285 vulnerabilities, contains three features and has 25 security fixes can now be installed.
Description:
The SUSE Linux Enterprise 15 SP6 kernel was updated to receive various security bugfixes.
The following security bugs were fixed:
- CVE-2024-39371: io_uring: check for non-NULL file pointer in io_file_can_poll() (bsc#1226990).
- CVE-2023-52846: hsr: Prevent use after free in prp_create_tagged_frame() (bsc#1225098).
- CVE-2024-38610: drivers/virt/acrn: fix PFNMAP PTE checks in acrn_vm_ram_map() (bsc#1226758).
- CVE-2024-37354: btrfs: fix crash on racing fsync and size-extending write into prealloc (bsc#1227101).
- CVE-2024-36919: scsi: bnx2fc: Remove spin_lock_bh while releasing resources after upload (bsc#1225767).
- CVE-2024-38559: scsi: qedf: Ensure the copied buf is NUL terminated (bsc#1226785).
- CVE-2024-38570: gfs2: Fix potential glock use-after-free on unmount (bsc#1226775).
- CVE-2024-36904: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique() (bsc#1225732).
- CVE-2023-52840: Fix use after free in rmi_unregister_function() (bsc#1224928).
- CVE-2024-38545: RDMA/hns: Fix UAF for cq async event (bsc#1226595).
- CVE-2023-52834: atl1c: Work around the DMA RX overflow issue (bsc#1225599).
- CVE-2023-52875: Add check for mtk_alloc_clk_data (bsc#1225096).
- CVE-2023-52865: Add check for mtk_alloc_clk_data (bsc#1225086).
- CVE-2023-52821: Fixed a possible null pointer dereference (bsc#1225022).
- CVE-2023-52867: Fixed possible buffer overflow (bsc#1225009).
- CVE-2024-38578: ecryptfs: Fix buffer size for tag 66 packet (bsc#1226634,).
- CVE-2024-36964: fs/9p: only translate RWX permissions for plain 9P2000 (bsc#1225866).
- CVE-2023-52759: Ignore negated quota changes (bsc#1225560).
- CVE-2023-52796: Add ipvlan_route_v6_outbound() helper (bsc#1224930).
- CVE-2023-52807: Fixed out-of-bounds access may occur when coalesce info is read via debugfs (bsc#1225097).
- CVE-2023-52864: Fixed opening of char device (bsc#1225132).
- CVE-2024-36926: Fixed LPAR panics during boot up with a frozen PE (bsc#1222011).
- CVE-2023-52871: Handle a second device without data corruption (bsc#1225534)
- CVE-2023-52795: Fixed use after free in vhost_vdpa_probe() (bsc#1225085).
- CVE-2023-52881: tcp: do not accept ACK of bytes we never sent (bsc#1225611).
- CVE-2024-37353: virtio: fixed a double free in vp_del_vqs() (bsc#1226875).
- CVE-2024-39301: net/9p: fix uninit-value in p9_client_rpc() (bsc#1226994).
- CVE-2024-35843: iommu/vt-d: Use device rbtree in iopf reporting path (bsc#1224751).
- CVE-2024-37078: nilfs2: fix potential kernel bug due to lack of writeback flag waiting (bsc#1227066).
- CVE-2024-35247: fpga: region: add owner module and take its refcount (bsc#1226948).
- CVE-2024-36479: fpga: bridge: add owner module and take its refcount (bsc#1226949).
- CVE-2024-37021: fpga: manager: add owner module and take its refcount (bsc#1226950).
- CVE-2024-36281: net/mlx5: Use mlx5_ipsec_rx_status_destroy to correctly delete status rules (bsc#1226799).
- CVE-2024-38580: epoll: be better about file lifetimes (bsc#1226610).
- CVE-2024-36478: null_blk: fix null-ptr-dereference while configuring 'power' and 'submit_queues' (bsc#1226841).
- CVE-2024-38636: f2fs: multidev: fix to recognize valid zero block address (bsc#1226879).
- CVE-2024-38661: s390/ap: Fix crash in AP internal function modify_bitmap() (bsc#1226996).
- CVE-2024-38564: bpf: Add BPF_PROG_TYPE_CGROUP_SKB attach type enforcement in BPF_LINK_CREATE (bsc#1226789).
- CVE-2024-38560: scsi: bfa: Ensure the copied buf is NUL terminated (bsc#1226786).
- CVE-2024-36978: net: sched: sch_multiq: fix possible OOB write in multiq_tune() (bsc#1226514).
- CVE-2024-36917: block: fix overflow in blk_ioctl_discard() (bsc#1225770).
- CVE-2024-38627: stm class: Fix a double free in stm_register_device() (bsc#1226857).
- CVE-2024-38603: drivers/perf: hisi: hns3: Actually use devm_add_action_or_reset() (bsc#1226842).
- CVE-2024-38553: net: fec: remove .ndo_poll_controller to avoid deadlock (bsc#1226744).
- CVE-2024-38555: net/mlx5: Discard command completions in internal error (bsc#1226607).
- CVE-2024-38556: net/mlx5: Add a timeout to acquire the command queue semaphore (bsc#1226774).
- CVE-2024-38557: net/mlx5: Reload only IB representors upon lag disable/enable (bsc#1226781).
- CVE-2024-38608: net/mlx5e: Fix netif state handling (bsc#1226746).
- CVE-2024-38597: eth: sungem: remove .ndo_poll_controller to avoid deadlocks (bsc#1226749).
- CVE-2024-38594: net: stmmac: move the EST lock to struct stmmac_priv (bsc#1226734).
- CVE-2024-38569: drivers/perf: hisi_pcie: Fix out-of-bound access when valid event group (bsc#1226772).
- CVE-2024-38568: drivers/perf: hisi: hns3: Fix out-of-bound access when valid event group (bsc#1226771).
- CVE-2024-26814: vfio/fsl-mc: Block calling interrupt handler without trigger (bsc#1222810).
- CVE-2024-26813: vfio/platform: Create persistent IRQ handlers (bsc#1222809).
- CVE-2024-36945: net/smc: fix neighbour and rtable leak in smc_ib_find_route() (bsc#1225823).
- CVE-2024-36923: fs/9p: fix uninitialized values during inode evict (bsc#1225815).
- CVE-2024-36971: net: fix __dst_negative_advice() race (bsc#1226145).
- CVE-2024-27414: rtnetlink: fix error logic of IFLA_BRIDGE_FLAGS writing back (bsc#1224439).
- CVE-2024-35886: ipv6: Fix infinite recursion in fib6_dump_done() (bsc#1224670).
- CVE-2024-36024: drm/amd/display: Disable idle reallow as part of command/gpint execution (bsc#1225702).
- CVE-2024-36903: ipv6: Fix potential uninit-value access in __ip6_make_skb() (bsc#1225741).
- CVE-2024-36899: gpiolib: cdev: Fix use after free in lineinfo_changed_notify (bsc#1225737).
- CVE-2024-35979: raid1: fix use-after-free for original bio in raid1_write_request() (bsc#1224572).
- CVE-2024-35807: ext4: fix corruption during on-line resize (bsc#1224735).
- CVE-2023-52622: ext4: avoid online resizing failures due to oversized flex bg (bsc#1222080).
- CVE-2023-52843: llc: verify mac len before reading mac header (bsc#1224951).
- CVE-2024-35898: netfilter: nf_tables: Fix potential data-race in __nft_flowtable_type_get() (bsc#1224498).
- CVE-2024-36915: nfc: llcp: fix nfc_llcp_setsockopt() unsafe copies (bsc#1225758).
- CVE-2024-36882: mm: use memalloc_nofs_save() in page_cache_ra_order() (bsc#1225723).
- CVE-2024-36916: blk-iocost: avoid out of bounds shift (bsc#1225759).
- CVE-2024-36900: net: hns3: fix kernel crash when devlink reload during initialization (bsc#1225726).
- CVE-2023-52787: blk-mq: make sure active queue usage is held for bio_integrity_prep() (bsc#1225105).
- CVE-2024-35925: block: prevent division by zero in blk_rq_stat_sum() (bsc#1224661).
- CVE-2023-52837: nbd: fix uaf in nbd_open (bsc#1224935).
- CVE-2023-52786: ext4: fix racy may inline data check in dio write (bsc#1224939).
- CVE-2024-36934: bna: ensure the copied buf is NUL terminated (bsc#1225760).
- CVE-2024-36935: ice: ensure the copied buf is NUL terminated (bsc#1225763).
- CVE-2024-36937: xdp: use flags field to disambiguate broadcast redirect (bsc#1225834).
- CVE-2023-52672: pipe: wakeup wr_wait after setting max_usage (bsc#1224614).
- CVE-2023-52845: tipc: Change nla_policy for bearer-related names to NLA_NUL_STRING (bsc#1225585).
- CVE-2024-36005: netfilter: nf_tables: honor table dormant flag from netdev release event path (bsc#1224539).
- CVE-2024-26845: scsi: target: core: Add TMF to tmr_list handling (bsc#1223018).
- CVE-2024-35892: net/sched: fix lockdep splat in qdisc_tree_reduce_backlog() (bsc#1224515).
- CVE-2024-35848: eeprom: at24: fix memory corruption race condition (bsc#1224612).
- CVE-2024-35884: udp: do not accept non-tunnel GSO skbs landing in a tunnel (bsc#1224520).
- CVE-2024-35857: icmp: prevent possible NULL dereferences from icmp_build_probe() (bsc#1224619).
- CVE-2023-52735: bpf, sockmap: Don't let sock_map_{close,destroy,unhash} call itself (bsc#1225475).
- CVE-2024-35926: crypto: iaa - Fix async_disable descriptor leak (bsc#1224655).
- CVE-2024-35976: Validate user input for XDP_{UMEM|COMPLETION}_FILL_RING (bsc#1224575).
- CVE-2024-36938: Fixed NULL pointer dereference in sk_psock_skb_ingress_enqueue (bsc#1225761).
- CVE-2024-36008: ipv4: check for NULL idev in ip_route_use_hint() (bsc#1224540).
- CVE-2024-35998: Fixed lock ordering potential deadlock in cifs_sync_mid_result (bsc#1224549).
- CVE-2023-52757: Fixed potential deadlock when releasing mids (bsc#1225548).
- CVE-2024-27419: Fixed data-races around sysctl_net_busy_read (bsc#1224759)
- CVE-2024-36957: octeontx2-af: avoid off-by-one read from userspace (bsc#1225762).
- CVE-2024-26625: Call sock_orphan() at release time (bsc#1221086)
- CVE-2024-35880: io_uring/kbuf: hold io_buffer_list reference over mmap (bsc#1224523).
- CVE-2024-35831: io_uring: Fix release of pinned pages when __io_uaddr_map fails (bsc#1224698).
- CVE-2024-35827: io_uring/net: fix overflow check in io_recvmsg_mshot_prep() (bsc#1224606).
- CVE-2023-52656: Dropped any code related to SCM_RIGHTS (bsc#1224187).
- CVE-2023-52699: sysv: don't call sb_bread() with pointers_lock held (bsc#1224659).
The following non-security bugs were fixed:
- KVM: arm64: Use local TLBI on permission relaxation (bsc#1219478).
- KVM: x86/pmu: Prioritize VMX interception over #GP on RDPMC due to bad index (bsc#1226158).
- NFS: abort nfs_atomic_open_v23 if name is too long (bsc#1219847).
- NFS: add atomic_open for NFSv3 to handle O_TRUNC correctly (bsc#1219847).
- NFS: avoid infinite loop in pnfs_update_layout (bsc#1219633 bsc#1226226).
- PCI: Clear Secondary Status errors after enumeration (bsc#1226928)
- RAS/AMD/ATL: Fix MI300 bank hash (bsc#1225300).
- RAS/AMD/ATL: Use system settings for MI300 DRAM to normalized address translation (bsc#1225300).
- Revert "build initrd without systemd" (bsc#1195775)"
- arm64: mm: Batch dsb and isb when populating pgtables (jsc#PED-8688).
- arm64: mm: Do not remap pgtables for allocate vs populate (jsc#PED-8688).
- arm64: mm: Do not remap pgtables per-cont(pte|pmd) block (jsc#PED-8688).
- bpf: check bpf_func_state->callback_depth when pruning states (bsc#1225903).
- bpf: correct loop detection for iterators convergence (bsc#1225903).
- bpf: exact states comparison for iterator convergence checks (bsc#1225903).
- bpf: extract __check_reg_arg() utility function (bsc#1225903).
- bpf: extract same_callsites() as utility function (bsc#1225903).
- bpf: extract setup_func_entry() utility function (bsc#1225903).
- bpf: keep track of max number of bpf_loop callback iterations (bsc#1225903).
- bpf: move explored_state() closer to the beginning of verifier.c (bsc#1225903).
- bpf: print full verifier states on infinite loop detection (bsc#1225903).
- bpf: verify callbacks as if they are called unknown number of times (bsc#1225903).
- bpf: widening for callback iterators (bsc#1225903).
- cachefiles: remove requests from xarray during flushing requests (bsc#1226588).
- ceph: add ceph_cap_unlink_work to fire check_caps() immediately (bsc#1226022).
- ceph: always check dir caps asynchronously (bsc#1226022).
- ceph: always queue a writeback when revoking the Fb caps (bsc#1226022).
- ceph: break the check delayed cap loop every 5s (bsc#1226022).
- ceph: switch to use cap_delay_lock for the unlink delay list (bsc#1226022).
- crypto: deflate - Add aliases to deflate (bsc#1227190).
- crypto: iaa - Account for cpu-less numa nodes (bsc#1227190).
- ipvs: Fix checksumming on GSO of SCTP packets (bsc#1221958)
- kABI: bpf: verifier kABI workaround (bsc#1225903).
- net: ena: Fix redundant device NUMA node override (jsc#PED-8688).
- net: mana: Enable MANA driver on ARM64 with 4K page size (jsc#PED-8491).
- nfs: Avoid flushing many pages with NFS_FILE_SYNC (bsc#1218442).
- nfs: Bump default write congestion size (bsc#1218442).
- nfsd: optimise recalculate_deny_mode() for a common case (bsc#1217912).
- nvme-fabrics: short-circuit reconnect retries (bsc#1186716).
- nvme-tcp: Export the nvme_tcp_wq to sysfs (bsc#1224049).
- nvme/tcp: Add wq_unbound modparam for nvme_tcp_wq (bsc#1224049).
- nvme: do not retry authentication failures (bsc#1186716).
- nvme: return kernel error codes for admin queue connect (bsc#1186716).
- nvmet: lock config semaphore when accessing DH-HMAC-CHAP key (bsc#1186716).
- nvmet: return DHCHAP status codes from nvmet_setup_auth() (bsc#1186716).
- ocfs2: adjust enabling place for la window (bsc#1219224).
- ocfs2: fix sparse warnings (bsc#1219224).
- ocfs2: improve write IO performance when fragmentation is high (bsc#1219224).
- ocfs2: speed up chain-list searching (bsc#1219224).
- rpm/kernel-obs-build.spec.in: Add iso9660 (bsc#1226212).
- rpm/kernel-obs-build.spec.in: Add networking modules for docker (bsc#1226211).
- s390/cpacf: Make use of invalid opcode produce a link error (bsc#1227072).
- sched/core: Fix incorrect initialization of the 'burst' parameter in cpu_max_write() (bsc#1226791).
- selftests/bpf: test case for callback_depth states pruning logic (bsc#1225903).
- selftests/bpf: test if state loops are detected in a tricky case (bsc#1225903).
- selftests/bpf: test widening for iterating callbacks (bsc#1225903).
- selftests/bpf: tests for iterating callbacks (bsc#1225903).
- selftests/bpf: tests with delayed read/precision makrs in loop body (bsc#1225903).
- selftests/bpf: track string payload offset as scalar in strobemeta (bsc#1225903).
- selftests/bpf: track tcp payload offset as scalar in xdp_synproxy (bsc#1225903).
- supported.conf: Add APM X-Gene SoC hardware monitoring driver (bsc#1223265 jsc#PED-8570)
- tcp: Dump bound-only sockets in inet_diag (bsc#1204562).
- x86/mce: Dynamically size space for machine check records (bsc#1222241).
- x86/tsc: Trust initial offset in architectural TSC-adjust MSRs (bsc#1222015 bsc#1226962).
Special Instructions and Notes:
- Please reboot the system after installing this update.
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-2571=1 SUSE-2024-2571=1
-
Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-2571=1
-
Development Tools Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2024-2571=1
-
Legacy Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Legacy-15-SP6-2024-2571=1
-
SUSE Linux Enterprise Live Patching 15-SP6
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2024-2571=1
Please note that this is the initial kernel livepatch without fixes itself, this package is later updated by separate standalone kernel livepatch updates. -
SUSE Linux Enterprise High Availability Extension 15 SP6
zypper in -t patch SUSE-SLE-Product-HA-15-SP6-2024-2571=1
-
SUSE Linux Enterprise Workstation Extension 15 SP6
zypper in -t patch SUSE-SLE-Product-WE-15-SP6-2024-2571=1
Package List:
-
openSUSE Leap 15.6 (noarch nosrc)
- kernel-docs-6.4.0-150600.23.14.2
-
openSUSE Leap 15.6 (noarch)
- kernel-source-vanilla-6.4.0-150600.23.14.2
- kernel-devel-6.4.0-150600.23.14.2
- kernel-source-6.4.0-150600.23.14.2
- kernel-docs-html-6.4.0-150600.23.14.2
- kernel-macros-6.4.0-150600.23.14.2
-
openSUSE Leap 15.6 (nosrc ppc64le x86_64)
- kernel-debug-6.4.0-150600.23.14.2
-
openSUSE Leap 15.6 (ppc64le x86_64)
- kernel-debug-debugsource-6.4.0-150600.23.14.2
- kernel-debug-devel-6.4.0-150600.23.14.2
- kernel-debug-livepatch-devel-6.4.0-150600.23.14.2
- kernel-debug-devel-debuginfo-6.4.0-150600.23.14.2
- kernel-debug-debuginfo-6.4.0-150600.23.14.2
-
openSUSE Leap 15.6 (x86_64)
- kernel-debug-vdso-debuginfo-6.4.0-150600.23.14.2
- kernel-debug-vdso-6.4.0-150600.23.14.2
- kernel-kvmsmall-vdso-6.4.0-150600.23.14.2
- kernel-default-vdso-debuginfo-6.4.0-150600.23.14.2
- kernel-default-vdso-6.4.0-150600.23.14.2
- kernel-kvmsmall-vdso-debuginfo-6.4.0-150600.23.14.2
-
openSUSE Leap 15.6 (aarch64 ppc64le x86_64)
- kernel-kvmsmall-debugsource-6.4.0-150600.23.14.2
- kernel-kvmsmall-devel-debuginfo-6.4.0-150600.23.14.2
- kernel-kvmsmall-debuginfo-6.4.0-150600.23.14.2
- kernel-default-base-rebuild-6.4.0-150600.23.14.2.150600.12.4.3
- kernel-default-base-6.4.0-150600.23.14.2.150600.12.4.3
- kernel-kvmsmall-livepatch-devel-6.4.0-150600.23.14.2
- kernel-kvmsmall-devel-6.4.0-150600.23.14.2
-
openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
- kernel-obs-build-debugsource-6.4.0-150600.23.14.2
- ocfs2-kmp-default-debuginfo-6.4.0-150600.23.14.2
- kernel-default-livepatch-6.4.0-150600.23.14.2
- kernel-obs-build-6.4.0-150600.23.14.2
- reiserfs-kmp-default-debuginfo-6.4.0-150600.23.14.2
- kernel-syms-6.4.0-150600.23.14.2
- kernel-default-extra-debuginfo-6.4.0-150600.23.14.2
- ocfs2-kmp-default-6.4.0-150600.23.14.2
- kernel-default-extra-6.4.0-150600.23.14.2
- kernel-default-optional-debuginfo-6.4.0-150600.23.14.2
- kernel-default-optional-6.4.0-150600.23.14.2
- gfs2-kmp-default-6.4.0-150600.23.14.2
- kselftests-kmp-default-debuginfo-6.4.0-150600.23.14.2
- dlm-kmp-default-debuginfo-6.4.0-150600.23.14.2
- kselftests-kmp-default-6.4.0-150600.23.14.2
- reiserfs-kmp-default-6.4.0-150600.23.14.2
- kernel-default-devel-6.4.0-150600.23.14.2
- kernel-default-debuginfo-6.4.0-150600.23.14.2
- kernel-default-devel-debuginfo-6.4.0-150600.23.14.2
- kernel-default-livepatch-devel-6.4.0-150600.23.14.2
- dlm-kmp-default-6.4.0-150600.23.14.2
- kernel-default-debugsource-6.4.0-150600.23.14.2
- gfs2-kmp-default-debuginfo-6.4.0-150600.23.14.2
- cluster-md-kmp-default-debuginfo-6.4.0-150600.23.14.2
- cluster-md-kmp-default-6.4.0-150600.23.14.2
- kernel-obs-qa-6.4.0-150600.23.14.2
-
openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 nosrc)
- kernel-default-6.4.0-150600.23.14.2
-
openSUSE Leap 15.6 (aarch64 nosrc ppc64le x86_64)
- kernel-kvmsmall-6.4.0-150600.23.14.2
-
openSUSE Leap 15.6 (ppc64le s390x x86_64)
- kernel-livepatch-6_4_0-150600_23_14-default-1-150600.13.3.2
- kernel-livepatch-6_4_0-150600_23_14-default-debuginfo-1-150600.13.3.2
- kernel-livepatch-SLE15-SP6_Update_2-debugsource-1-150600.13.3.2
-
openSUSE Leap 15.6 (nosrc s390x)
- kernel-zfcpdump-6.4.0-150600.23.14.2
-
openSUSE Leap 15.6 (s390x)
- kernel-zfcpdump-debuginfo-6.4.0-150600.23.14.2
- kernel-zfcpdump-debugsource-6.4.0-150600.23.14.2
-
openSUSE Leap 15.6 (nosrc)
- dtb-aarch64-6.4.0-150600.23.14.1
-
openSUSE Leap 15.6 (aarch64)
- dlm-kmp-64kb-6.4.0-150600.23.14.1
- kernel-64kb-devel-debuginfo-6.4.0-150600.23.14.1
- dtb-cavium-6.4.0-150600.23.14.1
- dtb-socionext-6.4.0-150600.23.14.1
- dtb-hisilicon-6.4.0-150600.23.14.1
- kernel-64kb-livepatch-devel-6.4.0-150600.23.14.1
- kselftests-kmp-64kb-debuginfo-6.4.0-150600.23.14.1
- dtb-apple-6.4.0-150600.23.14.1
- dlm-kmp-64kb-debuginfo-6.4.0-150600.23.14.1
- kernel-64kb-debuginfo-6.4.0-150600.23.14.1
- dtb-sprd-6.4.0-150600.23.14.1
- dtb-broadcom-6.4.0-150600.23.14.1
- kernel-64kb-devel-6.4.0-150600.23.14.1
- kernel-64kb-extra-6.4.0-150600.23.14.1
- reiserfs-kmp-64kb-debuginfo-6.4.0-150600.23.14.1
- dtb-marvell-6.4.0-150600.23.14.1
- gfs2-kmp-64kb-6.4.0-150600.23.14.1
- ocfs2-kmp-64kb-6.4.0-150600.23.14.1
- dtb-amlogic-6.4.0-150600.23.14.1
- dtb-mediatek-6.4.0-150600.23.14.1
- dtb-apm-6.4.0-150600.23.14.1
- dtb-arm-6.4.0-150600.23.14.1
- gfs2-kmp-64kb-debuginfo-6.4.0-150600.23.14.1
- dtb-freescale-6.4.0-150600.23.14.1
- reiserfs-kmp-64kb-6.4.0-150600.23.14.1
- kselftests-kmp-64kb-6.4.0-150600.23.14.1
- kernel-64kb-debugsource-6.4.0-150600.23.14.1
- dtb-qcom-6.4.0-150600.23.14.1
- dtb-exynos-6.4.0-150600.23.14.1
- dtb-xilinx-6.4.0-150600.23.14.1
- kernel-64kb-optional-6.4.0-150600.23.14.1
- dtb-renesas-6.4.0-150600.23.14.1
- dtb-amazon-6.4.0-150600.23.14.1
- cluster-md-kmp-64kb-debuginfo-6.4.0-150600.23.14.1
- dtb-nvidia-6.4.0-150600.23.14.1
- dtb-lg-6.4.0-150600.23.14.1
- kernel-64kb-optional-debuginfo-6.4.0-150600.23.14.1
- dtb-allwinner-6.4.0-150600.23.14.1
- cluster-md-kmp-64kb-6.4.0-150600.23.14.1
- kernel-64kb-extra-debuginfo-6.4.0-150600.23.14.1
- dtb-altera-6.4.0-150600.23.14.1
- ocfs2-kmp-64kb-debuginfo-6.4.0-150600.23.14.1
- dtb-rockchip-6.4.0-150600.23.14.1
- dtb-amd-6.4.0-150600.23.14.1
-
openSUSE Leap 15.6 (aarch64 nosrc)
- kernel-64kb-6.4.0-150600.23.14.1
-
Basesystem Module 15-SP6 (aarch64 nosrc)
- kernel-64kb-6.4.0-150600.23.14.1
-
Basesystem Module 15-SP6 (aarch64)
- kernel-64kb-devel-debuginfo-6.4.0-150600.23.14.1
- kernel-64kb-debuginfo-6.4.0-150600.23.14.1
- kernel-64kb-devel-6.4.0-150600.23.14.1
- kernel-64kb-debugsource-6.4.0-150600.23.14.1
-
Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64 nosrc)
- kernel-default-6.4.0-150600.23.14.2
-
Basesystem Module 15-SP6 (aarch64 ppc64le x86_64)
- kernel-default-base-6.4.0-150600.23.14.2.150600.12.4.3
-
Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
- kernel-default-debugsource-6.4.0-150600.23.14.2
- kernel-default-devel-6.4.0-150600.23.14.2
- kernel-default-devel-debuginfo-6.4.0-150600.23.14.2
- kernel-default-debuginfo-6.4.0-150600.23.14.2
-
Basesystem Module 15-SP6 (noarch)
- kernel-devel-6.4.0-150600.23.14.2
- kernel-macros-6.4.0-150600.23.14.2
-
Basesystem Module 15-SP6 (nosrc s390x)
- kernel-zfcpdump-6.4.0-150600.23.14.2
-
Basesystem Module 15-SP6 (s390x)
- kernel-zfcpdump-debuginfo-6.4.0-150600.23.14.2
- kernel-zfcpdump-debugsource-6.4.0-150600.23.14.2
-
Development Tools Module 15-SP6 (noarch nosrc)
- kernel-docs-6.4.0-150600.23.14.2
-
Development Tools Module 15-SP6 (aarch64 ppc64le s390x x86_64)
- kernel-obs-build-debugsource-6.4.0-150600.23.14.2
- kernel-syms-6.4.0-150600.23.14.2
- kernel-obs-build-6.4.0-150600.23.14.2
-
Development Tools Module 15-SP6 (noarch)
- kernel-source-6.4.0-150600.23.14.2
-
Legacy Module 15-SP6 (nosrc)
- kernel-default-6.4.0-150600.23.14.2
-
Legacy Module 15-SP6 (aarch64 ppc64le s390x x86_64)
- kernel-default-debugsource-6.4.0-150600.23.14.2
- reiserfs-kmp-default-debuginfo-6.4.0-150600.23.14.2
- reiserfs-kmp-default-6.4.0-150600.23.14.2
- kernel-default-debuginfo-6.4.0-150600.23.14.2
-
SUSE Linux Enterprise Live Patching 15-SP6 (nosrc)
- kernel-default-6.4.0-150600.23.14.2
-
SUSE Linux Enterprise Live Patching 15-SP6 (ppc64le s390x x86_64)
- kernel-livepatch-6_4_0-150600_23_14-default-debuginfo-1-150600.13.3.2
- kernel-livepatch-SLE15-SP6_Update_2-debugsource-1-150600.13.3.2
- kernel-livepatch-6_4_0-150600_23_14-default-1-150600.13.3.2
- kernel-default-debugsource-6.4.0-150600.23.14.2
- kernel-default-livepatch-6.4.0-150600.23.14.2
- kernel-default-debuginfo-6.4.0-150600.23.14.2
- kernel-default-livepatch-devel-6.4.0-150600.23.14.2
-
SUSE Linux Enterprise High Availability Extension 15 SP6 (aarch64 ppc64le s390x x86_64)
- gfs2-kmp-default-6.4.0-150600.23.14.2
- dlm-kmp-default-6.4.0-150600.23.14.2
- ocfs2-kmp-default-debuginfo-6.4.0-150600.23.14.2
- dlm-kmp-default-debuginfo-6.4.0-150600.23.14.2
- ocfs2-kmp-default-6.4.0-150600.23.14.2
- kernel-default-debugsource-6.4.0-150600.23.14.2
- gfs2-kmp-default-debuginfo-6.4.0-150600.23.14.2
- cluster-md-kmp-default-debuginfo-6.4.0-150600.23.14.2
- kernel-default-debuginfo-6.4.0-150600.23.14.2
- cluster-md-kmp-default-6.4.0-150600.23.14.2
-
SUSE Linux Enterprise High Availability Extension 15 SP6 (nosrc)
- kernel-default-6.4.0-150600.23.14.2
-
SUSE Linux Enterprise Workstation Extension 15 SP6 (nosrc)
- kernel-default-6.4.0-150600.23.14.2
-
SUSE Linux Enterprise Workstation Extension 15 SP6 (x86_64)
- kernel-default-extra-6.4.0-150600.23.14.2
- kernel-default-extra-debuginfo-6.4.0-150600.23.14.2
- kernel-default-debugsource-6.4.0-150600.23.14.2
- kernel-default-debuginfo-6.4.0-150600.23.14.2
References:
- https://www.suse.com/security/cve/CVE-2021-47432.html
- https://www.suse.com/security/cve/CVE-2022-48772.html
- https://www.suse.com/security/cve/CVE-2023-52622.html
- https://www.suse.com/security/cve/CVE-2023-52656.html
- https://www.suse.com/security/cve/CVE-2023-52672.html
- https://www.suse.com/security/cve/CVE-2023-52699.html
- https://www.suse.com/security/cve/CVE-2023-52735.html
- https://www.suse.com/security/cve/CVE-2023-52749.html
- https://www.suse.com/security/cve/CVE-2023-52750.html
- https://www.suse.com/security/cve/CVE-2023-52753.html
- https://www.suse.com/security/cve/CVE-2023-52754.html
- https://www.suse.com/security/cve/CVE-2023-52757.html
- https://www.suse.com/security/cve/CVE-2023-52759.html
- https://www.suse.com/security/cve/CVE-2023-52762.html
- https://www.suse.com/security/cve/CVE-2023-52763.html
- https://www.suse.com/security/cve/CVE-2023-52764.html
- https://www.suse.com/security/cve/CVE-2023-52765.html
- https://www.suse.com/security/cve/CVE-2023-52766.html
- https://www.suse.com/security/cve/CVE-2023-52767.html
- https://www.suse.com/security/cve/CVE-2023-52768.html
- https://www.suse.com/security/cve/CVE-2023-52769.html
- https://www.suse.com/security/cve/CVE-2023-52773.html
- https://www.suse.com/security/cve/CVE-2023-52774.html
- https://www.suse.com/security/cve/CVE-2023-52776.html
- https://www.suse.com/security/cve/CVE-2023-52777.html
- https://www.suse.com/security/cve/CVE-2023-52780.html
- https://www.suse.com/security/cve/CVE-2023-52781.html
- https://www.suse.com/security/cve/CVE-2023-52782.html
- https://www.suse.com/security/cve/CVE-2023-52783.html
- https://www.suse.com/security/cve/CVE-2023-52784.html
- https://www.suse.com/security/cve/CVE-2023-52786.html
- https://www.suse.com/security/cve/CVE-2023-52787.html
- https://www.suse.com/security/cve/CVE-2023-52788.html
- https://www.suse.com/security/cve/CVE-2023-52789.html
- https://www.suse.com/security/cve/CVE-2023-52791.html
- https://www.suse.com/security/cve/CVE-2023-52792.html
- https://www.suse.com/security/cve/CVE-2023-52794.html
- https://www.suse.com/security/cve/CVE-2023-52795.html
- https://www.suse.com/security/cve/CVE-2023-52796.html
- https://www.suse.com/security/cve/CVE-2023-52798.html
- https://www.suse.com/security/cve/CVE-2023-52799.html
- https://www.suse.com/security/cve/CVE-2023-52800.html
- https://www.suse.com/security/cve/CVE-2023-52801.html
- https://www.suse.com/security/cve/CVE-2023-52803.html
- https://www.suse.com/security/cve/CVE-2023-52804.html
- https://www.suse.com/security/cve/CVE-2023-52805.html
- https://www.suse.com/security/cve/CVE-2023-52806.html
- https://www.suse.com/security/cve/CVE-2023-52807.html
- https://www.suse.com/security/cve/CVE-2023-52808.html
- https://www.suse.com/security/cve/CVE-2023-52809.html
- https://www.suse.com/security/cve/CVE-2023-52810.html
- https://www.suse.com/security/cve/CVE-2023-52811.html
- https://www.suse.com/security/cve/CVE-2023-52812.html
- https://www.suse.com/security/cve/CVE-2023-52813.html
- https://www.suse.com/security/cve/CVE-2023-52814.html
- https://www.suse.com/security/cve/CVE-2023-52815.html
- https://www.suse.com/security/cve/CVE-2023-52816.html
- https://www.suse.com/security/cve/CVE-2023-52817.html
- https://www.suse.com/security/cve/CVE-2023-52818.html
- https://www.suse.com/security/cve/CVE-2023-52819.html
- https://www.suse.com/security/cve/CVE-2023-52821.html
- https://www.suse.com/security/cve/CVE-2023-52825.html
- https://www.suse.com/security/cve/CVE-2023-52826.html
- https://www.suse.com/security/cve/CVE-2023-52827.html
- https://www.suse.com/security/cve/CVE-2023-52829.html
- https://www.suse.com/security/cve/CVE-2023-52832.html
- https://www.suse.com/security/cve/CVE-2023-52833.html
- https://www.suse.com/security/cve/CVE-2023-52834.html
- https://www.suse.com/security/cve/CVE-2023-52835.html
- https://www.suse.com/security/cve/CVE-2023-52836.html
- https://www.suse.com/security/cve/CVE-2023-52837.html
- https://www.suse.com/security/cve/CVE-2023-52838.html
- https://www.suse.com/security/cve/CVE-2023-52840.html
- https://www.suse.com/security/cve/CVE-2023-52841.html
- https://www.suse.com/security/cve/CVE-2023-52842.html
- https://www.suse.com/security/cve/CVE-2023-52843.html
- https://www.suse.com/security/cve/CVE-2023-52844.html
- https://www.suse.com/security/cve/CVE-2023-52845.html
- https://www.suse.com/security/cve/CVE-2023-52846.html
- https://www.suse.com/security/cve/CVE-2023-52847.html
- https://www.suse.com/security/cve/CVE-2023-52849.html
- https://www.suse.com/security/cve/CVE-2023-52850.html
- https://www.suse.com/security/cve/CVE-2023-52851.html
- https://www.suse.com/security/cve/CVE-2023-52853.html
- https://www.suse.com/security/cve/CVE-2023-52854.html
- https://www.suse.com/security/cve/CVE-2023-52855.html
- https://www.suse.com/security/cve/CVE-2023-52856.html
- https://www.suse.com/security/cve/CVE-2023-52857.html
- https://www.suse.com/security/cve/CVE-2023-52858.html
- https://www.suse.com/security/cve/CVE-2023-52861.html
- https://www.suse.com/security/cve/CVE-2023-52862.html
- https://www.suse.com/security/cve/CVE-2023-52863.html
- https://www.suse.com/security/cve/CVE-2023-52864.html
- https://www.suse.com/security/cve/CVE-2023-52865.html
- https://www.suse.com/security/cve/CVE-2023-52866.html
- https://www.suse.com/security/cve/CVE-2023-52867.html
- https://www.suse.com/security/cve/CVE-2023-52868.html
- https://www.suse.com/security/cve/CVE-2023-52869.html
- https://www.suse.com/security/cve/CVE-2023-52870.html
- https://www.suse.com/security/cve/CVE-2023-52871.html
- https://www.suse.com/security/cve/CVE-2023-52872.html
- https://www.suse.com/security/cve/CVE-2023-52873.html
- https://www.suse.com/security/cve/CVE-2023-52874.html
- https://www.suse.com/security/cve/CVE-2023-52875.html
- https://www.suse.com/security/cve/CVE-2023-52876.html
- https://www.suse.com/security/cve/CVE-2023-52877.html
- https://www.suse.com/security/cve/CVE-2023-52878.html
- https://www.suse.com/security/cve/CVE-2023-52879.html
- https://www.suse.com/security/cve/CVE-2023-52880.html
- https://www.suse.com/security/cve/CVE-2023-52881.html
- https://www.suse.com/security/cve/CVE-2023-52883.html
- https://www.suse.com/security/cve/CVE-2023-52884.html
- https://www.suse.com/security/cve/CVE-2024-26482.html
- https://www.suse.com/security/cve/CVE-2024-26625.html
- https://www.suse.com/security/cve/CVE-2024-26676.html
- https://www.suse.com/security/cve/CVE-2024-26750.html
- https://www.suse.com/security/cve/CVE-2024-26758.html
- https://www.suse.com/security/cve/CVE-2024-26767.html
- https://www.suse.com/security/cve/CVE-2024-26780.html
- https://www.suse.com/security/cve/CVE-2024-26813.html
- https://www.suse.com/security/cve/CVE-2024-26814.html
- https://www.suse.com/security/cve/CVE-2024-26845.html
- https://www.suse.com/security/cve/CVE-2024-26889.html
- https://www.suse.com/security/cve/CVE-2024-26920.html
- https://www.suse.com/security/cve/CVE-2024-27414.html
- https://www.suse.com/security/cve/CVE-2024-27419.html
- https://www.suse.com/security/cve/CVE-2024-33619.html
- https://www.suse.com/security/cve/CVE-2024-34777.html
- https://www.suse.com/security/cve/CVE-2024-35247.html
- https://www.suse.com/security/cve/CVE-2024-35807.html
- https://www.suse.com/security/cve/CVE-2024-35827.html
- https://www.suse.com/security/cve/CVE-2024-35831.html
- https://www.suse.com/security/cve/CVE-2024-35843.html
- https://www.suse.com/security/cve/CVE-2024-35848.html
- https://www.suse.com/security/cve/CVE-2024-35857.html
- https://www.suse.com/security/cve/CVE-2024-35880.html
- https://www.suse.com/security/cve/CVE-2024-35884.html
- https://www.suse.com/security/cve/CVE-2024-35886.html
- https://www.suse.com/security/cve/CVE-2024-35892.html
- https://www.suse.com/security/cve/CVE-2024-35896.html
- https://www.suse.com/security/cve/CVE-2024-35898.html
- https://www.suse.com/security/cve/CVE-2024-35900.html
- https://www.suse.com/security/cve/CVE-2024-35925.html
- https://www.suse.com/security/cve/CVE-2024-35926.html
- https://www.suse.com/security/cve/CVE-2024-35957.html
- https://www.suse.com/security/cve/CVE-2024-35962.html
- https://www.suse.com/security/cve/CVE-2024-35970.html
- https://www.suse.com/security/cve/CVE-2024-35976.html
- https://www.suse.com/security/cve/CVE-2024-35979.html
- https://www.suse.com/security/cve/CVE-2024-35998.html
- https://www.suse.com/security/cve/CVE-2024-36005.html
- https://www.suse.com/security/cve/CVE-2024-36008.html
- https://www.suse.com/security/cve/CVE-2024-36010.html
- https://www.suse.com/security/cve/CVE-2024-36017.html
- https://www.suse.com/security/cve/CVE-2024-36024.html
- https://www.suse.com/security/cve/CVE-2024-36281.html
- https://www.suse.com/security/cve/CVE-2024-36477.html
- https://www.suse.com/security/cve/CVE-2024-36478.html
- https://www.suse.com/security/cve/CVE-2024-36479.html
- https://www.suse.com/security/cve/CVE-2024-36882.html
- https://www.suse.com/security/cve/CVE-2024-36887.html
- https://www.suse.com/security/cve/CVE-2024-36899.html
- https://www.suse.com/security/cve/CVE-2024-36900.html
- https://www.suse.com/security/cve/CVE-2024-36903.html
- https://www.suse.com/security/cve/CVE-2024-36904.html
- https://www.suse.com/security/cve/CVE-2024-36915.html
- https://www.suse.com/security/cve/CVE-2024-36916.html
- https://www.suse.com/security/cve/CVE-2024-36917.html
- https://www.suse.com/security/cve/CVE-2024-36919.html
- https://www.suse.com/security/cve/CVE-2024-36923.html
- https://www.suse.com/security/cve/CVE-2024-36924.html
- https://www.suse.com/security/cve/CVE-2024-36926.html
- https://www.suse.com/security/cve/CVE-2024-36934.html
- https://www.suse.com/security/cve/CVE-2024-36935.html
- https://www.suse.com/security/cve/CVE-2024-36937.html
- https://www.suse.com/security/cve/CVE-2024-36938.html
- https://www.suse.com/security/cve/CVE-2024-36945.html
- https://www.suse.com/security/cve/CVE-2024-36952.html
- https://www.suse.com/security/cve/CVE-2024-36957.html
- https://www.suse.com/security/cve/CVE-2024-36960.html
- https://www.suse.com/security/cve/CVE-2024-36962.html
- https://www.suse.com/security/cve/CVE-2024-36964.html
- https://www.suse.com/security/cve/CVE-2024-36965.html
- https://www.suse.com/security/cve/CVE-2024-36967.html
- https://www.suse.com/security/cve/CVE-2024-36969.html
- https://www.suse.com/security/cve/CVE-2024-36971.html
- https://www.suse.com/security/cve/CVE-2024-36972.html
- https://www.suse.com/security/cve/CVE-2024-36973.html
- https://www.suse.com/security/cve/CVE-2024-36975.html
- https://www.suse.com/security/cve/CVE-2024-36977.html
- https://www.suse.com/security/cve/CVE-2024-36978.html
- https://www.suse.com/security/cve/CVE-2024-37021.html
- https://www.suse.com/security/cve/CVE-2024-37078.html
- https://www.suse.com/security/cve/CVE-2024-37353.html
- https://www.suse.com/security/cve/CVE-2024-37354.html
- https://www.suse.com/security/cve/CVE-2024-38381.html
- https://www.suse.com/security/cve/CVE-2024-38384.html
- https://www.suse.com/security/cve/CVE-2024-38385.html
- https://www.suse.com/security/cve/CVE-2024-38388.html
- https://www.suse.com/security/cve/CVE-2024-38390.html
- https://www.suse.com/security/cve/CVE-2024-38391.html
- https://www.suse.com/security/cve/CVE-2024-38539.html
- https://www.suse.com/security/cve/CVE-2024-38540.html
- https://www.suse.com/security/cve/CVE-2024-38541.html
- https://www.suse.com/security/cve/CVE-2024-38543.html
- https://www.suse.com/security/cve/CVE-2024-38544.html
- https://www.suse.com/security/cve/CVE-2024-38545.html
- https://www.suse.com/security/cve/CVE-2024-38546.html
- https://www.suse.com/security/cve/CVE-2024-38547.html
- https://www.suse.com/security/cve/CVE-2024-38548.html
- https://www.suse.com/security/cve/CVE-2024-38549.html
- https://www.suse.com/security/cve/CVE-2024-38550.html
- https://www.suse.com/security/cve/CVE-2024-38551.html
- https://www.suse.com/security/cve/CVE-2024-38552.html
- https://www.suse.com/security/cve/CVE-2024-38553.html
- https://www.suse.com/security/cve/CVE-2024-38554.html
- https://www.suse.com/security/cve/CVE-2024-38555.html
- https://www.suse.com/security/cve/CVE-2024-38556.html
- https://www.suse.com/security/cve/CVE-2024-38557.html
- https://www.suse.com/security/cve/CVE-2024-38559.html
- https://www.suse.com/security/cve/CVE-2024-38560.html
- https://www.suse.com/security/cve/CVE-2024-38562.html
- https://www.suse.com/security/cve/CVE-2024-38564.html
- https://www.suse.com/security/cve/CVE-2024-38565.html
- https://www.suse.com/security/cve/CVE-2024-38566.html
- https://www.suse.com/security/cve/CVE-2024-38567.html
- https://www.suse.com/security/cve/CVE-2024-38568.html
- https://www.suse.com/security/cve/CVE-2024-38569.html
- https://www.suse.com/security/cve/CVE-2024-38570.html
- https://www.suse.com/security/cve/CVE-2024-38571.html
- https://www.suse.com/security/cve/CVE-2024-38572.html
- https://www.suse.com/security/cve/CVE-2024-38573.html
- https://www.suse.com/security/cve/CVE-2024-38575.html
- https://www.suse.com/security/cve/CVE-2024-38578.html
- https://www.suse.com/security/cve/CVE-2024-38579.html
- https://www.suse.com/security/cve/CVE-2024-38580.html
- https://www.suse.com/security/cve/CVE-2024-38581.html
- https://www.suse.com/security/cve/CVE-2024-38582.html
- https://www.suse.com/security/cve/CVE-2024-38583.html
- https://www.suse.com/security/cve/CVE-2024-38587.html
- https://www.suse.com/security/cve/CVE-2024-38588.html
- https://www.suse.com/security/cve/CVE-2024-38590.html
- https://www.suse.com/security/cve/CVE-2024-38591.html
- https://www.suse.com/security/cve/CVE-2024-38592.html
- https://www.suse.com/security/cve/CVE-2024-38594.html
- https://www.suse.com/security/cve/CVE-2024-38595.html
- https://www.suse.com/security/cve/CVE-2024-38597.html
- https://www.suse.com/security/cve/CVE-2024-38599.html
- https://www.suse.com/security/cve/CVE-2024-38600.html
- https://www.suse.com/security/cve/CVE-2024-38601.html
- https://www.suse.com/security/cve/CVE-2024-38602.html
- https://www.suse.com/security/cve/CVE-2024-38603.html
- https://www.suse.com/security/cve/CVE-2024-38605.html
- https://www.suse.com/security/cve/CVE-2024-38608.html
- https://www.suse.com/security/cve/CVE-2024-38610.html
- https://www.suse.com/security/cve/CVE-2024-38611.html
- https://www.suse.com/security/cve/CVE-2024-38615.html
- https://www.suse.com/security/cve/CVE-2024-38616.html
- https://www.suse.com/security/cve/CVE-2024-38617.html
- https://www.suse.com/security/cve/CVE-2024-38618.html
- https://www.suse.com/security/cve/CVE-2024-38619.html
- https://www.suse.com/security/cve/CVE-2024-38621.html
- https://www.suse.com/security/cve/CVE-2024-38622.html
- https://www.suse.com/security/cve/CVE-2024-38627.html
- https://www.suse.com/security/cve/CVE-2024-38628.html
- https://www.suse.com/security/cve/CVE-2024-38629.html
- https://www.suse.com/security/cve/CVE-2024-38630.html
- https://www.suse.com/security/cve/CVE-2024-38633.html
- https://www.suse.com/security/cve/CVE-2024-38634.html
- https://www.suse.com/security/cve/CVE-2024-38635.html
- https://www.suse.com/security/cve/CVE-2024-38636.html
- https://www.suse.com/security/cve/CVE-2024-38661.html
- https://www.suse.com/security/cve/CVE-2024-38663.html
- https://www.suse.com/security/cve/CVE-2024-38664.html
- https://www.suse.com/security/cve/CVE-2024-38780.html
- https://www.suse.com/security/cve/CVE-2024-39277.html
- https://www.suse.com/security/cve/CVE-2024-39291.html
- https://www.suse.com/security/cve/CVE-2024-39296.html
- https://www.suse.com/security/cve/CVE-2024-39301.html
- https://www.suse.com/security/cve/CVE-2024-39362.html
- https://www.suse.com/security/cve/CVE-2024-39371.html
- https://www.suse.com/security/cve/CVE-2024-39463.html
- https://www.suse.com/security/cve/CVE-2024-39466.html
- https://www.suse.com/security/cve/CVE-2024-39469.html
- https://www.suse.com/security/cve/CVE-2024-39471.html
- https://bugzilla.suse.com/show_bug.cgi?id=1186716
- https://bugzilla.suse.com/show_bug.cgi?id=1195775
- https://bugzilla.suse.com/show_bug.cgi?id=1204562
- https://bugzilla.suse.com/show_bug.cgi?id=1209834
- https://bugzilla.suse.com/show_bug.cgi?id=1217481
- https://bugzilla.suse.com/show_bug.cgi?id=1217912
- https://bugzilla.suse.com/show_bug.cgi?id=1218442
- https://bugzilla.suse.com/show_bug.cgi?id=1219224
- https://bugzilla.suse.com/show_bug.cgi?id=1219478
- https://bugzilla.suse.com/show_bug.cgi?id=1219596
- https://bugzilla.suse.com/show_bug.cgi?id=1219633
- https://bugzilla.suse.com/show_bug.cgi?id=1219847
- https://bugzilla.suse.com/show_bug.cgi?id=1219953
- https://bugzilla.suse.com/show_bug.cgi?id=1221086
- https://bugzilla.suse.com/show_bug.cgi?id=1221777
- https://bugzilla.suse.com/show_bug.cgi?id=1221958
- https://bugzilla.suse.com/show_bug.cgi?id=1222011
- https://bugzilla.suse.com/show_bug.cgi?id=1222015
- https://bugzilla.suse.com/show_bug.cgi?id=1222080
- https://bugzilla.suse.com/show_bug.cgi?id=1222241
- https://bugzilla.suse.com/show_bug.cgi?id=1222380
- https://bugzilla.suse.com/show_bug.cgi?id=1222588
- https://bugzilla.suse.com/show_bug.cgi?id=1222617
- https://bugzilla.suse.com/show_bug.cgi?id=1222619
- https://bugzilla.suse.com/show_bug.cgi?id=1222809
- https://bugzilla.suse.com/show_bug.cgi?id=1222810
- https://bugzilla.suse.com/show_bug.cgi?id=1223018
- https://bugzilla.suse.com/show_bug.cgi?id=1223265
- https://bugzilla.suse.com/show_bug.cgi?id=1224049
- https://bugzilla.suse.com/show_bug.cgi?id=1224187
- https://bugzilla.suse.com/show_bug.cgi?id=1224439
- https://bugzilla.suse.com/show_bug.cgi?id=1224497
- https://bugzilla.suse.com/show_bug.cgi?id=1224498
- https://bugzilla.suse.com/show_bug.cgi?id=1224515
- https://bugzilla.suse.com/show_bug.cgi?id=1224520
- https://bugzilla.suse.com/show_bug.cgi?id=1224523
- https://bugzilla.suse.com/show_bug.cgi?id=1224539
- https://bugzilla.suse.com/show_bug.cgi?id=1224540
- https://bugzilla.suse.com/show_bug.cgi?id=1224549
- https://bugzilla.suse.com/show_bug.cgi?id=1224572
- https://bugzilla.suse.com/show_bug.cgi?id=1224575
- https://bugzilla.suse.com/show_bug.cgi?id=1224583
- https://bugzilla.suse.com/show_bug.cgi?id=1224584
- https://bugzilla.suse.com/show_bug.cgi?id=1224606
- https://bugzilla.suse.com/show_bug.cgi?id=1224612
- https://bugzilla.suse.com/show_bug.cgi?id=1224614
- https://bugzilla.suse.com/show_bug.cgi?id=1224619
- https://bugzilla.suse.com/show_bug.cgi?id=1224655
- https://bugzilla.suse.com/show_bug.cgi?id=1224659
- https://bugzilla.suse.com/show_bug.cgi?id=1224661
- https://bugzilla.suse.com/show_bug.cgi?id=1224662
- https://bugzilla.suse.com/show_bug.cgi?id=1224670
- https://bugzilla.suse.com/show_bug.cgi?id=1224673
- https://bugzilla.suse.com/show_bug.cgi?id=1224698
- https://bugzilla.suse.com/show_bug.cgi?id=1224735
- https://bugzilla.suse.com/show_bug.cgi?id=1224751
- https://bugzilla.suse.com/show_bug.cgi?id=1224759
- https://bugzilla.suse.com/show_bug.cgi?id=1224928
- https://bugzilla.suse.com/show_bug.cgi?id=1224930
- https://bugzilla.suse.com/show_bug.cgi?id=1224932
- https://bugzilla.suse.com/show_bug.cgi?id=1224933
- https://bugzilla.suse.com/show_bug.cgi?id=1224935
- https://bugzilla.suse.com/show_bug.cgi?id=1224937
- https://bugzilla.suse.com/show_bug.cgi?id=1224939
- https://bugzilla.suse.com/show_bug.cgi?id=1224941
- https://bugzilla.suse.com/show_bug.cgi?id=1224944
- https://bugzilla.suse.com/show_bug.cgi?id=1224946
- https://bugzilla.suse.com/show_bug.cgi?id=1224947
- https://bugzilla.suse.com/show_bug.cgi?id=1224949
- https://bugzilla.suse.com/show_bug.cgi?id=1224951
- https://bugzilla.suse.com/show_bug.cgi?id=1224988
- https://bugzilla.suse.com/show_bug.cgi?id=1224992
- https://bugzilla.suse.com/show_bug.cgi?id=1224998
- https://bugzilla.suse.com/show_bug.cgi?id=1225000
- https://bugzilla.suse.com/show_bug.cgi?id=1225001
- https://bugzilla.suse.com/show_bug.cgi?id=1225004
- https://bugzilla.suse.com/show_bug.cgi?id=1225006
- https://bugzilla.suse.com/show_bug.cgi?id=1225008
- https://bugzilla.suse.com/show_bug.cgi?id=1225009
- https://bugzilla.suse.com/show_bug.cgi?id=1225014
- https://bugzilla.suse.com/show_bug.cgi?id=1225015
- https://bugzilla.suse.com/show_bug.cgi?id=1225022
- https://bugzilla.suse.com/show_bug.cgi?id=1225025
- https://bugzilla.suse.com/show_bug.cgi?id=1225028
- https://bugzilla.suse.com/show_bug.cgi?id=1225029
- https://bugzilla.suse.com/show_bug.cgi?id=1225031
- https://bugzilla.suse.com/show_bug.cgi?id=1225036
- https://bugzilla.suse.com/show_bug.cgi?id=1225041
- https://bugzilla.suse.com/show_bug.cgi?id=1225044
- https://bugzilla.suse.com/show_bug.cgi?id=1225049
- https://bugzilla.suse.com/show_bug.cgi?id=1225050
- https://bugzilla.suse.com/show_bug.cgi?id=1225076
- https://bugzilla.suse.com/show_bug.cgi?id=1225077
- https://bugzilla.suse.com/show_bug.cgi?id=1225078
- https://bugzilla.suse.com/show_bug.cgi?id=1225081
- https://bugzilla.suse.com/show_bug.cgi?id=1225085
- https://bugzilla.suse.com/show_bug.cgi?id=1225086
- https://bugzilla.suse.com/show_bug.cgi?id=1225090
- https://bugzilla.suse.com/show_bug.cgi?id=1225092
- https://bugzilla.suse.com/show_bug.cgi?id=1225096
- https://bugzilla.suse.com/show_bug.cgi?id=1225097
- https://bugzilla.suse.com/show_bug.cgi?id=1225098
- https://bugzilla.suse.com/show_bug.cgi?id=1225101
- https://bugzilla.suse.com/show_bug.cgi?id=1225103
- https://bugzilla.suse.com/show_bug.cgi?id=1225104
- https://bugzilla.suse.com/show_bug.cgi?id=1225105
- https://bugzilla.suse.com/show_bug.cgi?id=1225106
- https://bugzilla.suse.com/show_bug.cgi?id=1225108
- https://bugzilla.suse.com/show_bug.cgi?id=1225120
- https://bugzilla.suse.com/show_bug.cgi?id=1225132
- https://bugzilla.suse.com/show_bug.cgi?id=1225180
- https://bugzilla.suse.com/show_bug.cgi?id=1225300
- https://bugzilla.suse.com/show_bug.cgi?id=1225391
- https://bugzilla.suse.com/show_bug.cgi?id=1225472
- https://bugzilla.suse.com/show_bug.cgi?id=1225475
- https://bugzilla.suse.com/show_bug.cgi?id=1225476
- https://bugzilla.suse.com/show_bug.cgi?id=1225477
- https://bugzilla.suse.com/show_bug.cgi?id=1225478
- https://bugzilla.suse.com/show_bug.cgi?id=1225485
- https://bugzilla.suse.com/show_bug.cgi?id=1225490
- https://bugzilla.suse.com/show_bug.cgi?id=1225527
- https://bugzilla.suse.com/show_bug.cgi?id=1225529
- https://bugzilla.suse.com/show_bug.cgi?id=1225530
- https://bugzilla.suse.com/show_bug.cgi?id=1225532
- https://bugzilla.suse.com/show_bug.cgi?id=1225534
- https://bugzilla.suse.com/show_bug.cgi?id=1225548
- https://bugzilla.suse.com/show_bug.cgi?id=1225550
- https://bugzilla.suse.com/show_bug.cgi?id=1225553
- https://bugzilla.suse.com/show_bug.cgi?id=1225554
- https://bugzilla.suse.com/show_bug.cgi?id=1225555
- https://bugzilla.suse.com/show_bug.cgi?id=1225556
- https://bugzilla.suse.com/show_bug.cgi?id=1225557
- https://bugzilla.suse.com/show_bug.cgi?id=1225559
- https://bugzilla.suse.com/show_bug.cgi?id=1225560
- https://bugzilla.suse.com/show_bug.cgi?id=1225564
- https://bugzilla.suse.com/show_bug.cgi?id=1225565
- https://bugzilla.suse.com/show_bug.cgi?id=1225566
- https://bugzilla.suse.com/show_bug.cgi?id=1225568
- https://bugzilla.suse.com/show_bug.cgi?id=1225569
- https://bugzilla.suse.com/show_bug.cgi?id=1225570
- https://bugzilla.suse.com/show_bug.cgi?id=1225571
- https://bugzilla.suse.com/show_bug.cgi?id=1225572
- https://bugzilla.suse.com/show_bug.cgi?id=1225573
- https://bugzilla.suse.com/show_bug.cgi?id=1225577
- https://bugzilla.suse.com/show_bug.cgi?id=1225581
- https://bugzilla.suse.com/show_bug.cgi?id=1225583
- https://bugzilla.suse.com/show_bug.cgi?id=1225584
- https://bugzilla.suse.com/show_bug.cgi?id=1225585
- https://bugzilla.suse.com/show_bug.cgi?id=1225586
- https://bugzilla.suse.com/show_bug.cgi?id=1225587
- https://bugzilla.suse.com/show_bug.cgi?id=1225588
- https://bugzilla.suse.com/show_bug.cgi?id=1225589
- https://bugzilla.suse.com/show_bug.cgi?id=1225590
- https://bugzilla.suse.com/show_bug.cgi?id=1225591
- https://bugzilla.suse.com/show_bug.cgi?id=1225592
- https://bugzilla.suse.com/show_bug.cgi?id=1225594
- https://bugzilla.suse.com/show_bug.cgi?id=1225595
- https://bugzilla.suse.com/show_bug.cgi?id=1225599
- https://bugzilla.suse.com/show_bug.cgi?id=1225602
- https://bugzilla.suse.com/show_bug.cgi?id=1225605
- https://bugzilla.suse.com/show_bug.cgi?id=1225609
- https://bugzilla.suse.com/show_bug.cgi?id=1225611
- https://bugzilla.suse.com/show_bug.cgi?id=1225681
- https://bugzilla.suse.com/show_bug.cgi?id=1225702
- https://bugzilla.suse.com/show_bug.cgi?id=1225723
- https://bugzilla.suse.com/show_bug.cgi?id=1225726
- https://bugzilla.suse.com/show_bug.cgi?id=1225731
- https://bugzilla.suse.com/show_bug.cgi?id=1225732
- https://bugzilla.suse.com/show_bug.cgi?id=1225737
- https://bugzilla.suse.com/show_bug.cgi?id=1225741
- https://bugzilla.suse.com/show_bug.cgi?id=1225758
- https://bugzilla.suse.com/show_bug.cgi?id=1225759
- https://bugzilla.suse.com/show_bug.cgi?id=1225760
- https://bugzilla.suse.com/show_bug.cgi?id=1225761
- https://bugzilla.suse.com/show_bug.cgi?id=1225762
- https://bugzilla.suse.com/show_bug.cgi?id=1225763
- https://bugzilla.suse.com/show_bug.cgi?id=1225767
- https://bugzilla.suse.com/show_bug.cgi?id=1225770
- https://bugzilla.suse.com/show_bug.cgi?id=1225815
- https://bugzilla.suse.com/show_bug.cgi?id=1225820
- https://bugzilla.suse.com/show_bug.cgi?id=1225823
- https://bugzilla.suse.com/show_bug.cgi?id=1225827
- https://bugzilla.suse.com/show_bug.cgi?id=1225834
- https://bugzilla.suse.com/show_bug.cgi?id=1225866
- https://bugzilla.suse.com/show_bug.cgi?id=1225872
- https://bugzilla.suse.com/show_bug.cgi?id=1225898
- https://bugzilla.suse.com/show_bug.cgi?id=1225903
- https://bugzilla.suse.com/show_bug.cgi?id=1226022
- https://bugzilla.suse.com/show_bug.cgi?id=1226131
- https://bugzilla.suse.com/show_bug.cgi?id=1226145
- https://bugzilla.suse.com/show_bug.cgi?id=1226149
- https://bugzilla.suse.com/show_bug.cgi?id=1226155
- https://bugzilla.suse.com/show_bug.cgi?id=1226158
- https://bugzilla.suse.com/show_bug.cgi?id=1226163
- https://bugzilla.suse.com/show_bug.cgi?id=1226211
- https://bugzilla.suse.com/show_bug.cgi?id=1226212
- https://bugzilla.suse.com/show_bug.cgi?id=1226226
- https://bugzilla.suse.com/show_bug.cgi?id=1226457
- https://bugzilla.suse.com/show_bug.cgi?id=1226503
- https://bugzilla.suse.com/show_bug.cgi?id=1226513
- https://bugzilla.suse.com/show_bug.cgi?id=1226514
- https://bugzilla.suse.com/show_bug.cgi?id=1226520
- https://bugzilla.suse.com/show_bug.cgi?id=1226582
- https://bugzilla.suse.com/show_bug.cgi?id=1226587
- https://bugzilla.suse.com/show_bug.cgi?id=1226588
- https://bugzilla.suse.com/show_bug.cgi?id=1226592
- https://bugzilla.suse.com/show_bug.cgi?id=1226593
- https://bugzilla.suse.com/show_bug.cgi?id=1226594
- https://bugzilla.suse.com/show_bug.cgi?id=1226595
- https://bugzilla.suse.com/show_bug.cgi?id=1226597
- https://bugzilla.suse.com/show_bug.cgi?id=1226607
- https://bugzilla.suse.com/show_bug.cgi?id=1226608
- https://bugzilla.suse.com/show_bug.cgi?id=1226610
- https://bugzilla.suse.com/show_bug.cgi?id=1226612
- https://bugzilla.suse.com/show_bug.cgi?id=1226613
- https://bugzilla.suse.com/show_bug.cgi?id=1226630
- https://bugzilla.suse.com/show_bug.cgi?id=1226632
- https://bugzilla.suse.com/show_bug.cgi?id=1226633
- https://bugzilla.suse.com/show_bug.cgi?id=1226634
- https://bugzilla.suse.com/show_bug.cgi?id=1226637
- https://bugzilla.suse.com/show_bug.cgi?id=1226657
- https://bugzilla.suse.com/show_bug.cgi?id=1226658
- https://bugzilla.suse.com/show_bug.cgi?id=1226734
- https://bugzilla.suse.com/show_bug.cgi?id=1226735
- https://bugzilla.suse.com/show_bug.cgi?id=1226737
- https://bugzilla.suse.com/show_bug.cgi?id=1226738
- https://bugzilla.suse.com/show_bug.cgi?id=1226739
- https://bugzilla.suse.com/show_bug.cgi?id=1226740
- https://bugzilla.suse.com/show_bug.cgi?id=1226741
- https://bugzilla.suse.com/show_bug.cgi?id=1226742
- https://bugzilla.suse.com/show_bug.cgi?id=1226744
- https://bugzilla.suse.com/show_bug.cgi?id=1226746
- https://bugzilla.suse.com/show_bug.cgi?id=1226747
- https://bugzilla.suse.com/show_bug.cgi?id=1226749
- https://bugzilla.suse.com/show_bug.cgi?id=1226754
- https://bugzilla.suse.com/show_bug.cgi?id=1226758
- https://bugzilla.suse.com/show_bug.cgi?id=1226760
- https://bugzilla.suse.com/show_bug.cgi?id=1226761
- https://bugzilla.suse.com/show_bug.cgi?id=1226764
- https://bugzilla.suse.com/show_bug.cgi?id=1226767
- https://bugzilla.suse.com/show_bug.cgi?id=1226768
- https://bugzilla.suse.com/show_bug.cgi?id=1226769
- https://bugzilla.suse.com/show_bug.cgi?id=1226771
- https://bugzilla.suse.com/show_bug.cgi?id=1226772
- https://bugzilla.suse.com/show_bug.cgi?id=1226774
- https://bugzilla.suse.com/show_bug.cgi?id=1226775
- https://bugzilla.suse.com/show_bug.cgi?id=1226776
- https://bugzilla.suse.com/show_bug.cgi?id=1226777
- https://bugzilla.suse.com/show_bug.cgi?id=1226780
- https://bugzilla.suse.com/show_bug.cgi?id=1226781
- https://bugzilla.suse.com/show_bug.cgi?id=1226786
- https://bugzilla.suse.com/show_bug.cgi?id=1226788
- https://bugzilla.suse.com/show_bug.cgi?id=1226789
- https://bugzilla.suse.com/show_bug.cgi?id=1226790
- https://bugzilla.suse.com/show_bug.cgi?id=1226791
- https://bugzilla.suse.com/show_bug.cgi?id=1226796
- https://bugzilla.suse.com/show_bug.cgi?id=1226799
- https://bugzilla.suse.com/show_bug.cgi?id=1226837
- https://bugzilla.suse.com/show_bug.cgi?id=1226839
- https://bugzilla.suse.com/show_bug.cgi?id=1226840
- https://bugzilla.suse.com/show_bug.cgi?id=1226841
- https://bugzilla.suse.com/show_bug.cgi?id=1226842
- https://bugzilla.suse.com/show_bug.cgi?id=1226844
- https://bugzilla.suse.com/show_bug.cgi?id=1226848
- https://bugzilla.suse.com/show_bug.cgi?id=1226852
- https://bugzilla.suse.com/show_bug.cgi?id=1226856
- https://bugzilla.suse.com/show_bug.cgi?id=1226857
- https://bugzilla.suse.com/show_bug.cgi?id=1226859
- https://bugzilla.suse.com/show_bug.cgi?id=1226861
- https://bugzilla.suse.com/show_bug.cgi?id=1226863
- https://bugzilla.suse.com/show_bug.cgi?id=1226864
- https://bugzilla.suse.com/show_bug.cgi?id=1226867
- https://bugzilla.suse.com/show_bug.cgi?id=1226868
- https://bugzilla.suse.com/show_bug.cgi?id=1226875
- https://bugzilla.suse.com/show_bug.cgi?id=1226876
- https://bugzilla.suse.com/show_bug.cgi?id=1226878
- https://bugzilla.suse.com/show_bug.cgi?id=1226879
- https://bugzilla.suse.com/show_bug.cgi?id=1226886
- https://bugzilla.suse.com/show_bug.cgi?id=1226890
- https://bugzilla.suse.com/show_bug.cgi?id=1226891
- https://bugzilla.suse.com/show_bug.cgi?id=1226894
- https://bugzilla.suse.com/show_bug.cgi?id=1226895
- https://bugzilla.suse.com/show_bug.cgi?id=1226905
- https://bugzilla.suse.com/show_bug.cgi?id=1226908
- https://bugzilla.suse.com/show_bug.cgi?id=1226909
- https://bugzilla.suse.com/show_bug.cgi?id=1226911
- https://bugzilla.suse.com/show_bug.cgi?id=1226928
- https://bugzilla.suse.com/show_bug.cgi?id=1226934
- https://bugzilla.suse.com/show_bug.cgi?id=1226938
- https://bugzilla.suse.com/show_bug.cgi?id=1226939
- https://bugzilla.suse.com/show_bug.cgi?id=1226941
- https://bugzilla.suse.com/show_bug.cgi?id=1226948
- https://bugzilla.suse.com/show_bug.cgi?id=1226949
- https://bugzilla.suse.com/show_bug.cgi?id=1226950
- https://bugzilla.suse.com/show_bug.cgi?id=1226962
- https://bugzilla.suse.com/show_bug.cgi?id=1226976
- https://bugzilla.suse.com/show_bug.cgi?id=1226989
- https://bugzilla.suse.com/show_bug.cgi?id=1226990
- https://bugzilla.suse.com/show_bug.cgi?id=1226992
- https://bugzilla.suse.com/show_bug.cgi?id=1226994
- https://bugzilla.suse.com/show_bug.cgi?id=1226995
- https://bugzilla.suse.com/show_bug.cgi?id=1226996
- https://bugzilla.suse.com/show_bug.cgi?id=1227066
- https://bugzilla.suse.com/show_bug.cgi?id=1227072
- https://bugzilla.suse.com/show_bug.cgi?id=1227085
- https://bugzilla.suse.com/show_bug.cgi?id=1227089
- https://bugzilla.suse.com/show_bug.cgi?id=1227090
- https://bugzilla.suse.com/show_bug.cgi?id=1227096
- https://bugzilla.suse.com/show_bug.cgi?id=1227101
- https://bugzilla.suse.com/show_bug.cgi?id=1227190
- https://jira.suse.com/browse/PED-8491
- https://jira.suse.com/browse/PED-8570
- https://jira.suse.com/browse/PED-8688