Security update for the Linux Kernel

Announcement ID: SUSE-SU-2024:2929-1
Rating: important
References:
Cross-References:
CVSS scores:
  • CVE-2021-4439 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
  • CVE-2021-47534 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
  • CVE-2021-47576 ( SUSE ): 3.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:L
  • CVE-2021-47578 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  • CVE-2021-47580 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L
  • CVE-2021-47582 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2021-47583 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2021-47584 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2021-47585 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2021-47586 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2021-47587 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2021-47589 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2021-47592 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2021-47596 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2021-47597 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
  • CVE-2021-47598 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2021-47600 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2021-47601 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2021-47602 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2021-47603 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2021-47607 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
  • CVE-2021-47608 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2021-47609 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2021-47611 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2021-47612 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2021-47614 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
  • CVE-2021-47615 ( SUSE ): 3.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L
  • CVE-2021-47616 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
  • CVE-2021-47617 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2021-47618 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2021-47619 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2021-47620 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
  • CVE-2021-47622 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2021-47624 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  • CVE-2022-0854 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
  • CVE-2022-0854 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
  • CVE-2022-20368 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2022-20368 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2022-28748 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
  • CVE-2022-2964 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2022-2964 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2022-48711 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2022-48712 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
  • CVE-2022-48713 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  • CVE-2022-48715 ( SUSE ): 3.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L
  • CVE-2022-48717 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
  • CVE-2022-48720 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  • CVE-2022-48721 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2022-48722 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2022-48723 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2022-48724 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
  • CVE-2022-48725 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2022-48726 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2022-48727 ( SUSE ): 4.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
  • CVE-2022-48728 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2022-48729 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2022-48730 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
  • CVE-2022-48732 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2022-48734 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
  • CVE-2022-48735 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2022-48736 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
  • CVE-2022-48737 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
  • CVE-2022-48738 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2022-48739 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
  • CVE-2022-48740 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2022-48743 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2022-48744 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2022-48745 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2022-48746 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2022-48747 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H
  • CVE-2022-48749 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2022-48751 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2022-48752 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2022-48754 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2022-48756 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2022-48758 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2022-48759 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2022-48760 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2022-48761 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2022-48763 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
  • CVE-2022-48765 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2022-48767 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2022-48768 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2022-48769 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
  • CVE-2022-48771 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
  • CVE-2022-48773 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2022-48774 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
  • CVE-2022-48775 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  • CVE-2022-48776 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  • CVE-2022-48777 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2022-48778 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
  • CVE-2022-48780 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2022-48783 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2022-48784 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2022-48786 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
  • CVE-2022-48787 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2022-48787 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2022-48788 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H
  • CVE-2022-48788 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2022-48789 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  • CVE-2022-48789 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2022-48790 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  • CVE-2022-48790 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2022-48791 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2022-48791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2022-48792 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2022-48792 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2022-48793 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2022-48793 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2022-48794 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  • CVE-2022-48796 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  • CVE-2022-48796 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2022-48797 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
  • CVE-2022-48798 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2022-48799 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  • CVE-2022-48800 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
  • CVE-2022-48801 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2022-48802 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2022-48803 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
  • CVE-2022-48804 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
  • CVE-2022-48805 ( SUSE ): 6.6 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2022-48806 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
  • CVE-2022-48807 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2022-48811 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2022-48812 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2022-48813 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2022-48814 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  • CVE-2022-48815 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2022-48816 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2022-48817 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2022-48818 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2022-48820 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2022-48821 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2022-48822 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2022-48822 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2022-48823 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  • CVE-2022-48824 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2022-48824 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2022-48825 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
  • CVE-2022-48826 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2022-48827 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2022-48828 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
  • CVE-2022-48829 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
  • CVE-2022-48830 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2022-48831 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2022-48834 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
  • CVE-2022-48834 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2022-48835 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2022-48835 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2022-48836 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2022-48836 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2022-48837 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2022-48837 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2022-48838 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2022-48838 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2022-48839 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2022-48839 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2022-48840 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2022-48840 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2022-48841 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2022-48841 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2022-48842 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
  • CVE-2022-48842 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2022-48843 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  • CVE-2022-48843 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2022-48847 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2022-48847 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2022-48849 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2022-48849 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
  • CVE-2022-48851 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2022-48851 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2022-48853 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2022-48853 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
  • CVE-2022-48856 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2022-48856 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2022-48857 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2022-48857 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2022-48858 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2022-48858 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2022-48859 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2022-48859 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2022-48860 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2022-48860 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2022-48861 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2022-48861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2022-48862 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2022-48862 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2022-48863 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
  • CVE-2022-48863 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2022-48866 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  • CVE-2022-48866 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  • CVE-2023-1582 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2023-1582 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2023-37453 ( SUSE ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  • CVE-2023-37453 ( NVD ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  • CVE-2023-52591 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  • CVE-2023-52762 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2023-52766 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
  • CVE-2023-52800 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  • CVE-2023-52885 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
  • CVE-2023-52886 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-26583 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-26583 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-26584 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-26584 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-26585 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2024-26585 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-26800 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-26813 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-26814 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-26976 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-35878 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-35901 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-35905 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2024-36926 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-36926 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-36974 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2024-38541 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
  • CVE-2024-38555 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-38559 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
  • CVE-2024-39463 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2024-39494 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2024-39494 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2024-40902 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
  • CVE-2024-40902 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2024-40937 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2024-40954 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2024-40956 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2024-40989 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2024-40994 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2024-41011 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2024-41012 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H
  • CVE-2024-41059 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  • CVE-2024-41059 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2024-41069 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  • CVE-2024-41069 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2024-41090 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
  • CVE-2024-42093 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L
  • CVE-2024-42145 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2024-42145 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-42230 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2024-42230 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  • CVE-2024-42230 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
Affected Products:
  • openSUSE Leap 15.4
  • SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
  • SUSE Linux Enterprise High Availability Extension 15 SP4
  • SUSE Linux Enterprise High Performance Computing 15 SP4
  • SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
  • SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
  • SUSE Linux Enterprise Live Patching 15-SP4
  • SUSE Linux Enterprise Micro 5.3
  • SUSE Linux Enterprise Micro 5.4
  • SUSE Linux Enterprise Micro for Rancher 5.3
  • SUSE Linux Enterprise Micro for Rancher 5.4
  • SUSE Linux Enterprise Real Time 15 SP4
  • SUSE Linux Enterprise Server 15 SP4
  • SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
  • SUSE Linux Enterprise Server for SAP Applications 15 SP4
  • SUSE Manager Proxy 4.3
  • SUSE Manager Retail Branch Server 4.3
  • SUSE Manager Server 4.3

An update that solves 194 vulnerabilities and has 36 security fixes can now be installed.

Description:

The SUSE Linux Enterprise 15 SP4 kernel was updated to receive various security bugfixes.

The following security bugs were fixed:

  • CVE-2024-39494: ima: Fix use-after-free on a dentry's dname.name (bsc#1227716).
  • CVE-2024-41069: ASoC: topology: Fix route memory corruption (bsc#1228644).
  • CVE-2024-40954: net: do not leave a dangling sk pointer, when socket creation fails (bsc#1227808)
  • CVE-2024-42145: IB/core: Implement a limit on UMAD receive List (bsc#1228743)
  • CVE-2024-40994: ptp: fix integer overflow in max_vclocks_store (bsc#1227829).
  • CVE-2024-41012: filelock: Remove locks reliably when fcntl/close race is detected (bsc#1228247).
  • CVE-2024-42093: net/dpaa2: Avoid explicit cpumask var allocation on stack (bsc#1228680).
  • CVE-2024-40989: KVM: arm64: Disassociate vcpus from redistributor region on teardown (bsc#1227823).
  • CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228561).
  • CVE-2024-40956: dmaengine: idxd: Fix possible Use-After-Free in irq_process_work_list (bsc#1227810).
  • CVE-2024-41090: tap: add missing verification for short frame (bsc#1228328).
  • CVE-2024-41011: drm/amdkfd: do not allow mapping the MMIO HDP page with large pages (bsc#1228114).
  • CVE-2024-39463: 9p: add missing locking around taking dentry fid list (bsc#1227090).
  • CVE-2021-47598: sch_cake: do not call cake_destroy() from cake_init() (bsc#1226574).
  • CVE-2024-40937: gve: Clear napi->skb before dev_kfree_skb_any() (bsc#1227836).
  • CVE-2024-35901: net: mana: Fix Rx DMA datasize and skb_over_panic (bsc#1224495).
  • CVE-2024-42230: powerpc/pseries: Fix scv instruction crash with kexec (bsc#1194869).
  • CVE-2024-26585: Fixed race between tx work scheduling and socket close (bsc#1220187).
  • CVE-2024-36974: net/sched: taprio: always validate TCA_TAPRIO_ATTR_PRIOMAP (bsc#1226519).
  • CVE-2024-38555: net/mlx5: Discard command completions in internal error (bsc#1226607).

The following non-security bugs were fixed:

  • NFS: Do not re-read the entire page cache to find the next cookie (bsc#1226662).
  • NFS: Reduce use of uncached readdir (bsc#1226662).
  • NFSv4.x: by default serialize open/close operations (bsc#1226226 bsc#1223863).
  • X.509: Fix the parser of extended key usage for length (bsc#1218820).
  • btrfs: sysfs: update fs features directory asynchronously (bsc#1226168).
  • cgroup/cpuset: Prevent UAF in proc_cpuset_show() (bsc#1228801).
  • jfs: xattr: fix buffer overflow for invalid xattr (bsc#1227383).
  • kABI: rtas: Workaround false positive due to lost definition (bsc#1227487).
  • kernel-binary: vdso: Own module_dir
  • net/dcb: check for detached device before executing callbacks (bsc#1215587).
  • ocfs2: fix DIO failure due to insufficient transaction credits (bsc#1216834).
  • powerpc/rtas: Prevent Spectre v1 gadget construction in sys_rtas() (bsc#1227487).
  • powerpc/rtas: clean up includes (bsc#1227487).
  • workqueue: Improve scalability of workqueue watchdog touch (bsc#1193454).
  • workqueue: wq_watchdog_touch is always called with valid CPU (bsc#1193454).

Special Instructions and Notes:

  • Please reboot the system after installing this update.

Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  • SUSE Linux Enterprise High Availability Extension 15 SP4
    zypper in -t patch SUSE-SLE-Product-HA-15-SP4-2024-2929=1
  • SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
    zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2929=1
  • SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
    zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2929=1
  • SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
    zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-2929=1
  • SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
    zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2929=1
  • SUSE Linux Enterprise Server for SAP Applications 15 SP4
    zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2929=1
  • SUSE Manager Proxy 4.3
    zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-2929=1
  • SUSE Manager Retail Branch Server 4.3
    zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.3-2024-2929=1
  • SUSE Manager Server 4.3
    zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-2929=1
  • openSUSE Leap 15.4
    zypper in -t patch SUSE-2024-2929=1
  • SUSE Linux Enterprise Micro for Rancher 5.3
    zypper in -t patch SUSE-SLE-Micro-5.3-2024-2929=1
  • SUSE Linux Enterprise Micro 5.3
    zypper in -t patch SUSE-SLE-Micro-5.3-2024-2929=1
  • SUSE Linux Enterprise Micro for Rancher 5.4
    zypper in -t patch SUSE-SLE-Micro-5.4-2024-2929=1
  • SUSE Linux Enterprise Micro 5.4
    zypper in -t patch SUSE-SLE-Micro-5.4-2024-2929=1
  • SUSE Linux Enterprise Live Patching 15-SP4
    zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2024-2929=1
    Please note that this is the initial kernel livepatch without fixes itself, this package is later updated by separate standalone kernel livepatch updates.

Package List:

  • SUSE Linux Enterprise High Availability Extension 15 SP4 (aarch64 ppc64le s390x x86_64)
    • gfs2-kmp-default-5.14.21-150400.24.128.1
    • cluster-md-kmp-default-debuginfo-5.14.21-150400.24.128.1
    • cluster-md-kmp-default-5.14.21-150400.24.128.1
    • ocfs2-kmp-default-5.14.21-150400.24.128.1
    • gfs2-kmp-default-debuginfo-5.14.21-150400.24.128.1
    • dlm-kmp-default-5.14.21-150400.24.128.1
    • kernel-default-debuginfo-5.14.21-150400.24.128.1
    • kernel-default-debugsource-5.14.21-150400.24.128.1
    • ocfs2-kmp-default-debuginfo-5.14.21-150400.24.128.1
    • dlm-kmp-default-debuginfo-5.14.21-150400.24.128.1
  • SUSE Linux Enterprise High Availability Extension 15 SP4 (nosrc)
    • kernel-default-5.14.21-150400.24.128.1
  • SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 nosrc)
    • kernel-64kb-5.14.21-150400.24.128.1
  • SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64)
    • kernel-64kb-devel-debuginfo-5.14.21-150400.24.128.1
    • kernel-64kb-debugsource-5.14.21-150400.24.128.1
    • kernel-64kb-debuginfo-5.14.21-150400.24.128.1
    • kernel-64kb-devel-5.14.21-150400.24.128.1
  • SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 nosrc x86_64)
    • kernel-default-5.14.21-150400.24.128.1
  • SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64)
    • kernel-default-devel-debuginfo-5.14.21-150400.24.128.1
    • reiserfs-kmp-default-debuginfo-5.14.21-150400.24.128.1
    • kernel-syms-5.14.21-150400.24.128.1
    • kernel-default-base-5.14.21-150400.24.128.1.150400.24.62.1
    • kernel-obs-build-debugsource-5.14.21-150400.24.128.1
    • kernel-default-debuginfo-5.14.21-150400.24.128.1
    • reiserfs-kmp-default-5.14.21-150400.24.128.1
    • kernel-obs-build-5.14.21-150400.24.128.1
    • kernel-default-debugsource-5.14.21-150400.24.128.1
    • kernel-default-devel-5.14.21-150400.24.128.1
  • SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
    • kernel-source-5.14.21-150400.24.128.1
    • kernel-macros-5.14.21-150400.24.128.1
    • kernel-devel-5.14.21-150400.24.128.1
  • SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch nosrc)
    • kernel-docs-5.14.21-150400.24.128.1
  • SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 nosrc)
    • kernel-64kb-5.14.21-150400.24.128.1
  • SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64)
    • kernel-64kb-devel-debuginfo-5.14.21-150400.24.128.1
    • kernel-64kb-debugsource-5.14.21-150400.24.128.1
    • kernel-64kb-debuginfo-5.14.21-150400.24.128.1
    • kernel-64kb-devel-5.14.21-150400.24.128.1
  • SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 nosrc x86_64)
    • kernel-default-5.14.21-150400.24.128.1
  • SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64)
    • kernel-default-devel-debuginfo-5.14.21-150400.24.128.1
    • reiserfs-kmp-default-debuginfo-5.14.21-150400.24.128.1
    • kernel-syms-5.14.21-150400.24.128.1
    • kernel-default-base-5.14.21-150400.24.128.1.150400.24.62.1
    • kernel-obs-build-debugsource-5.14.21-150400.24.128.1
    • kernel-default-debuginfo-5.14.21-150400.24.128.1
    • reiserfs-kmp-default-5.14.21-150400.24.128.1
    • kernel-obs-build-5.14.21-150400.24.128.1
    • kernel-default-debugsource-5.14.21-150400.24.128.1
    • kernel-default-devel-5.14.21-150400.24.128.1
  • SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
    • kernel-source-5.14.21-150400.24.128.1
    • kernel-macros-5.14.21-150400.24.128.1
    • kernel-devel-5.14.21-150400.24.128.1
  • SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch nosrc)
    • kernel-docs-5.14.21-150400.24.128.1
  • SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (nosrc x86_64)
    • kernel-default-5.14.21-150400.24.128.1
  • SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
    • kernel-default-devel-debuginfo-5.14.21-150400.24.128.1
    • kernel-default-extra-debuginfo-5.14.21-150400.24.128.1
    • kernel-syms-5.14.21-150400.24.128.1
    • kernel-default-extra-5.14.21-150400.24.128.1
    • kernel-default-base-5.14.21-150400.24.128.1.150400.24.62.1
    • kernel-obs-build-debugsource-5.14.21-150400.24.128.1
    • kernel-default-debuginfo-5.14.21-150400.24.128.1
    • kernel-obs-build-5.14.21-150400.24.128.1
    • kernel-default-debugsource-5.14.21-150400.24.128.1
    • kernel-default-devel-5.14.21-150400.24.128.1
  • SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch)
    • kernel-source-5.14.21-150400.24.128.1
    • kernel-macros-5.14.21-150400.24.128.1
    • kernel-devel-5.14.21-150400.24.128.1
  • SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch nosrc)
    • kernel-docs-5.14.21-150400.24.128.1
  • SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 nosrc)
    • kernel-64kb-5.14.21-150400.24.128.1
  • SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64)
    • kernel-64kb-devel-debuginfo-5.14.21-150400.24.128.1
    • kernel-64kb-debugsource-5.14.21-150400.24.128.1
    • kernel-64kb-debuginfo-5.14.21-150400.24.128.1
    • kernel-64kb-devel-5.14.21-150400.24.128.1
  • SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64 nosrc)
    • kernel-default-5.14.21-150400.24.128.1
  • SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le x86_64)
    • kernel-default-base-5.14.21-150400.24.128.1.150400.24.62.1
  • SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64)
    • kernel-default-devel-debuginfo-5.14.21-150400.24.128.1
    • reiserfs-kmp-default-debuginfo-5.14.21-150400.24.128.1
    • kernel-syms-5.14.21-150400.24.128.1
    • kernel-obs-build-debugsource-5.14.21-150400.24.128.1
    • kernel-default-debuginfo-5.14.21-150400.24.128.1
    • reiserfs-kmp-default-5.14.21-150400.24.128.1
    • kernel-obs-build-5.14.21-150400.24.128.1
    • kernel-default-debugsource-5.14.21-150400.24.128.1
    • kernel-default-devel-5.14.21-150400.24.128.1
  • SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch)
    • kernel-source-5.14.21-150400.24.128.1
    • kernel-macros-5.14.21-150400.24.128.1
    • kernel-devel-5.14.21-150400.24.128.1
  • SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch nosrc)
    • kernel-docs-5.14.21-150400.24.128.1
  • SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (nosrc s390x)
    • kernel-zfcpdump-5.14.21-150400.24.128.1
  • SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (s390x)
    • kernel-zfcpdump-debugsource-5.14.21-150400.24.128.1
    • kernel-zfcpdump-debuginfo-5.14.21-150400.24.128.1
  • SUSE Linux Enterprise Server for SAP Applications 15 SP4 (nosrc ppc64le x86_64)
    • kernel-default-5.14.21-150400.24.128.1
  • SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
    • kernel-default-devel-debuginfo-5.14.21-150400.24.128.1
    • reiserfs-kmp-default-debuginfo-5.14.21-150400.24.128.1
    • kernel-syms-5.14.21-150400.24.128.1
    • kernel-default-base-5.14.21-150400.24.128.1.150400.24.62.1
    • kernel-obs-build-debugsource-5.14.21-150400.24.128.1
    • kernel-default-debuginfo-5.14.21-150400.24.128.1
    • reiserfs-kmp-default-5.14.21-150400.24.128.1
    • kernel-obs-build-5.14.21-150400.24.128.1
    • kernel-default-debugsource-5.14.21-150400.24.128.1
    • kernel-default-devel-5.14.21-150400.24.128.1
  • SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
    • kernel-source-5.14.21-150400.24.128.1
    • kernel-macros-5.14.21-150400.24.128.1
    • kernel-devel-5.14.21-150400.24.128.1
  • SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch nosrc)
    • kernel-docs-5.14.21-150400.24.128.1
  • SUSE Manager Proxy 4.3 (nosrc x86_64)
    • kernel-default-5.14.21-150400.24.128.1
  • SUSE Manager Proxy 4.3 (x86_64)
    • kernel-default-devel-debuginfo-5.14.21-150400.24.128.1
    • kernel-syms-5.14.21-150400.24.128.1
    • kernel-default-base-5.14.21-150400.24.128.1.150400.24.62.1
    • kernel-default-debuginfo-5.14.21-150400.24.128.1
    • kernel-default-debugsource-5.14.21-150400.24.128.1
    • kernel-default-devel-5.14.21-150400.24.128.1
  • SUSE Manager Proxy 4.3 (noarch)
    • kernel-source-5.14.21-150400.24.128.1
    • kernel-macros-5.14.21-150400.24.128.1
    • kernel-devel-5.14.21-150400.24.128.1
  • SUSE Manager Retail Branch Server 4.3 (nosrc x86_64)
    • kernel-default-5.14.21-150400.24.128.1
  • SUSE Manager Retail Branch Server 4.3 (x86_64)
    • kernel-default-devel-debuginfo-5.14.21-150400.24.128.1
    • kernel-default-base-5.14.21-150400.24.128.1.150400.24.62.1
    • kernel-default-debuginfo-5.14.21-150400.24.128.1
    • kernel-default-debugsource-5.14.21-150400.24.128.1
    • kernel-default-devel-5.14.21-150400.24.128.1
  • SUSE Manager Retail Branch Server 4.3 (noarch)
    • kernel-macros-5.14.21-150400.24.128.1
    • kernel-devel-5.14.21-150400.24.128.1
  • SUSE Manager Server 4.3 (nosrc ppc64le s390x x86_64)
    • kernel-default-5.14.21-150400.24.128.1
  • SUSE Manager Server 4.3 (ppc64le x86_64)
    • kernel-default-base-5.14.21-150400.24.128.1.150400.24.62.1
  • SUSE Manager Server 4.3 (ppc64le s390x x86_64)
    • kernel-default-devel-debuginfo-5.14.21-150400.24.128.1
    • kernel-syms-5.14.21-150400.24.128.1
    • kernel-default-debuginfo-5.14.21-150400.24.128.1
    • kernel-default-debugsource-5.14.21-150400.24.128.1
    • kernel-default-devel-5.14.21-150400.24.128.1
  • SUSE Manager Server 4.3 (noarch)
    • kernel-source-5.14.21-150400.24.128.1
    • kernel-macros-5.14.21-150400.24.128.1
    • kernel-devel-5.14.21-150400.24.128.1
  • SUSE Manager Server 4.3 (nosrc s390x)
    • kernel-zfcpdump-5.14.21-150400.24.128.1
  • SUSE Manager Server 4.3 (s390x)
    • kernel-zfcpdump-debugsource-5.14.21-150400.24.128.1
    • kernel-zfcpdump-debuginfo-5.14.21-150400.24.128.1
  • openSUSE Leap 15.4 (noarch nosrc)
    • kernel-docs-5.14.21-150400.24.128.1
  • openSUSE Leap 15.4 (noarch)
    • kernel-source-5.14.21-150400.24.128.1
    • kernel-devel-5.14.21-150400.24.128.1
    • kernel-source-vanilla-5.14.21-150400.24.128.1
    • kernel-macros-5.14.21-150400.24.128.1
    • kernel-docs-html-5.14.21-150400.24.128.1
  • openSUSE Leap 15.4 (nosrc ppc64le x86_64)
    • kernel-debug-5.14.21-150400.24.128.1
  • openSUSE Leap 15.4 (ppc64le x86_64)
    • kernel-debug-debuginfo-5.14.21-150400.24.128.1
    • kernel-debug-livepatch-devel-5.14.21-150400.24.128.1
    • kernel-debug-debugsource-5.14.21-150400.24.128.1
    • kernel-debug-devel-debuginfo-5.14.21-150400.24.128.1
    • kernel-debug-devel-5.14.21-150400.24.128.1
  • openSUSE Leap 15.4 (aarch64 ppc64le x86_64)
    • kernel-kvmsmall-debuginfo-5.14.21-150400.24.128.1
    • kernel-kvmsmall-devel-5.14.21-150400.24.128.1
    • kernel-kvmsmall-devel-debuginfo-5.14.21-150400.24.128.1
    • kernel-default-base-5.14.21-150400.24.128.1.150400.24.62.1
    • kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.128.1
    • kernel-default-base-rebuild-5.14.21-150400.24.128.1.150400.24.62.1
    • kernel-kvmsmall-debugsource-5.14.21-150400.24.128.1
  • openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64)
    • reiserfs-kmp-default-debuginfo-5.14.21-150400.24.128.1
    • cluster-md-kmp-default-debuginfo-5.14.21-150400.24.128.1
    • kselftests-kmp-default-5.14.21-150400.24.128.1
    • kernel-syms-5.14.21-150400.24.128.1
    • cluster-md-kmp-default-5.14.21-150400.24.128.1
    • dlm-kmp-default-5.14.21-150400.24.128.1
    • kernel-obs-build-debugsource-5.14.21-150400.24.128.1
    • kernel-default-livepatch-5.14.21-150400.24.128.1
    • kselftests-kmp-default-debuginfo-5.14.21-150400.24.128.1
    • kernel-default-devel-5.14.21-150400.24.128.1
    • kernel-default-extra-5.14.21-150400.24.128.1
    • kernel-default-debugsource-5.14.21-150400.24.128.1
    • ocfs2-kmp-default-debuginfo-5.14.21-150400.24.128.1
    • kernel-default-devel-debuginfo-5.14.21-150400.24.128.1
    • gfs2-kmp-default-5.14.21-150400.24.128.1
    • kernel-default-extra-debuginfo-5.14.21-150400.24.128.1
    • kernel-default-optional-5.14.21-150400.24.128.1
    • kernel-default-optional-debuginfo-5.14.21-150400.24.128.1
    • ocfs2-kmp-default-5.14.21-150400.24.128.1
    • gfs2-kmp-default-debuginfo-5.14.21-150400.24.128.1
    • kernel-default-debuginfo-5.14.21-150400.24.128.1
    • kernel-obs-build-5.14.21-150400.24.128.1
    • kernel-default-livepatch-devel-5.14.21-150400.24.128.1
    • kernel-obs-qa-5.14.21-150400.24.128.1
    • reiserfs-kmp-default-5.14.21-150400.24.128.1
    • dlm-kmp-default-debuginfo-5.14.21-150400.24.128.1
  • openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 nosrc)
    • kernel-default-5.14.21-150400.24.128.1
  • openSUSE Leap 15.4 (aarch64 nosrc ppc64le x86_64)
    • kernel-kvmsmall-5.14.21-150400.24.128.1
  • openSUSE Leap 15.4 (ppc64le s390x x86_64)
    • kernel-livepatch-5_14_21-150400_24_128-default-debuginfo-1-150400.9.3.1
    • kernel-livepatch-SLE15-SP4_Update_29-debugsource-1-150400.9.3.1
    • kernel-livepatch-5_14_21-150400_24_128-default-1-150400.9.3.1
  • openSUSE Leap 15.4 (nosrc s390x)
    • kernel-zfcpdump-5.14.21-150400.24.128.1
  • openSUSE Leap 15.4 (s390x)
    • kernel-zfcpdump-debugsource-5.14.21-150400.24.128.1
    • kernel-zfcpdump-debuginfo-5.14.21-150400.24.128.1
  • openSUSE Leap 15.4 (nosrc)
    • dtb-aarch64-5.14.21-150400.24.128.1
  • openSUSE Leap 15.4 (aarch64)
    • dtb-lg-5.14.21-150400.24.128.1
    • kernel-64kb-devel-debuginfo-5.14.21-150400.24.128.1
    • dtb-amd-5.14.21-150400.24.128.1
    • ocfs2-kmp-64kb-5.14.21-150400.24.128.1
    • gfs2-kmp-64kb-debuginfo-5.14.21-150400.24.128.1
    • kselftests-kmp-64kb-debuginfo-5.14.21-150400.24.128.1
    • ocfs2-kmp-64kb-debuginfo-5.14.21-150400.24.128.1
    • dtb-exynos-5.14.21-150400.24.128.1
    • dtb-apple-5.14.21-150400.24.128.1
    • reiserfs-kmp-64kb-debuginfo-5.14.21-150400.24.128.1
    • dtb-cavium-5.14.21-150400.24.128.1
    • kernel-64kb-debugsource-5.14.21-150400.24.128.1
    • kernel-64kb-devel-5.14.21-150400.24.128.1
    • kernel-64kb-extra-debuginfo-5.14.21-150400.24.128.1
    • dtb-allwinner-5.14.21-150400.24.128.1
    • kernel-64kb-optional-5.14.21-150400.24.128.1
    • dlm-kmp-64kb-debuginfo-5.14.21-150400.24.128.1
    • reiserfs-kmp-64kb-5.14.21-150400.24.128.1
    • dtb-freescale-5.14.21-150400.24.128.1
    • kernel-64kb-extra-5.14.21-150400.24.128.1
    • dtb-altera-5.14.21-150400.24.128.1
    • dtb-mediatek-5.14.21-150400.24.128.1
    • dtb-arm-5.14.21-150400.24.128.1
    • cluster-md-kmp-64kb-debuginfo-5.14.21-150400.24.128.1
    • dtb-amlogic-5.14.21-150400.24.128.1
    • dtb-renesas-5.14.21-150400.24.128.1
    • dtb-hisilicon-5.14.21-150400.24.128.1
    • cluster-md-kmp-64kb-5.14.21-150400.24.128.1
    • kselftests-kmp-64kb-5.14.21-150400.24.128.1
    • dtb-apm-5.14.21-150400.24.128.1
    • kernel-64kb-optional-debuginfo-5.14.21-150400.24.128.1
    • dtb-rockchip-5.14.21-150400.24.128.1
    • gfs2-kmp-64kb-5.14.21-150400.24.128.1
    • dlm-kmp-64kb-5.14.21-150400.24.128.1
    • dtb-broadcom-5.14.21-150400.24.128.1
    • dtb-marvell-5.14.21-150400.24.128.1
    • dtb-sprd-5.14.21-150400.24.128.1
    • dtb-qcom-5.14.21-150400.24.128.1
    • kernel-64kb-livepatch-devel-5.14.21-150400.24.128.1
    • kernel-64kb-debuginfo-5.14.21-150400.24.128.1
    • dtb-nvidia-5.14.21-150400.24.128.1
    • dtb-xilinx-5.14.21-150400.24.128.1
    • dtb-socionext-5.14.21-150400.24.128.1
    • dtb-amazon-5.14.21-150400.24.128.1
  • openSUSE Leap 15.4 (aarch64 nosrc)
    • kernel-64kb-5.14.21-150400.24.128.1
  • SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 nosrc s390x x86_64)
    • kernel-default-5.14.21-150400.24.128.1
  • SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 x86_64)
    • kernel-default-base-5.14.21-150400.24.128.1.150400.24.62.1
  • SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
    • kernel-default-debugsource-5.14.21-150400.24.128.1
    • kernel-default-debuginfo-5.14.21-150400.24.128.1
  • SUSE Linux Enterprise Micro 5.3 (aarch64 nosrc s390x x86_64)
    • kernel-default-5.14.21-150400.24.128.1
  • SUSE Linux Enterprise Micro 5.3 (aarch64 x86_64)
    • kernel-default-base-5.14.21-150400.24.128.1.150400.24.62.1
  • SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
    • kernel-default-debugsource-5.14.21-150400.24.128.1
    • kernel-default-debuginfo-5.14.21-150400.24.128.1
  • SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 nosrc s390x x86_64)
    • kernel-default-5.14.21-150400.24.128.1
  • SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 x86_64)
    • kernel-default-base-5.14.21-150400.24.128.1.150400.24.62.1
  • SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
    • kernel-default-debugsource-5.14.21-150400.24.128.1
    • kernel-default-debuginfo-5.14.21-150400.24.128.1
  • SUSE Linux Enterprise Micro 5.4 (aarch64 nosrc s390x x86_64)
    • kernel-default-5.14.21-150400.24.128.1
  • SUSE Linux Enterprise Micro 5.4 (aarch64 x86_64)
    • kernel-default-base-5.14.21-150400.24.128.1.150400.24.62.1
  • SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
    • kernel-default-debugsource-5.14.21-150400.24.128.1
    • kernel-default-debuginfo-5.14.21-150400.24.128.1
  • SUSE Linux Enterprise Live Patching 15-SP4 (nosrc)
    • kernel-default-5.14.21-150400.24.128.1
  • SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64)
    • kernel-livepatch-SLE15-SP4_Update_29-debugsource-1-150400.9.3.1
    • kernel-livepatch-5_14_21-150400_24_128-default-1-150400.9.3.1
    • kernel-default-livepatch-devel-5.14.21-150400.24.128.1
    • kernel-livepatch-5_14_21-150400_24_128-default-debuginfo-1-150400.9.3.1
    • kernel-default-livepatch-5.14.21-150400.24.128.1
    • kernel-default-debuginfo-5.14.21-150400.24.128.1
    • kernel-default-debugsource-5.14.21-150400.24.128.1

References: