# Security update for the Linux Kernel

Announcement ID: SUSE-SU-2024:0857-1  
Rating: important  
References:

  * bsc#1200599
  * bsc#1207653
  * bsc#1212514
  * bsc#1213456
  * bsc#1216223
  * bsc#1218195
  * bsc#1218689
  * bsc#1218915
  * bsc#1219127
  * bsc#1219128
  * bsc#1219146
  * bsc#1219295
  * bsc#1219653
  * bsc#1219827
  * bsc#1219835
  * bsc#1219915
  * bsc#1220009
  * bsc#1220140
  * bsc#1220187
  * bsc#1220238
  * bsc#1220240
  * bsc#1220241
  * bsc#1220243
  * bsc#1220250
  * bsc#1220253
  * bsc#1220255
  * bsc#1220328
  * bsc#1220330
  * bsc#1220344
  * bsc#1220398
  * bsc#1220409
  * bsc#1220416
  * bsc#1220418
  * bsc#1220421
  * bsc#1220436
  * bsc#1220444
  * bsc#1220459
  * bsc#1220469
  * bsc#1220482
  * bsc#1220526
  * bsc#1220538
  * bsc#1220570
  * bsc#1220572
  * bsc#1220599
  * bsc#1220627
  * bsc#1220641
  * bsc#1220649
  * bsc#1220660
  * bsc#1220689
  * bsc#1220700
  * bsc#1220735
  * bsc#1220736
  * bsc#1220737
  * bsc#1220742
  * bsc#1220745
  * bsc#1220767
  * bsc#1220796
  * bsc#1220825
  * bsc#1220826
  * bsc#1220831
  * bsc#1220845
  * bsc#1220860
  * bsc#1220863
  * bsc#1220870
  * bsc#1220917
  * bsc#1220918
  * bsc#1220930
  * bsc#1220931
  * bsc#1220932
  * bsc#1221039
  * bsc#1221040

  
Cross-References:

  * CVE-2019-25162
  * CVE-2020-36777
  * CVE-2020-36784
  * CVE-2021-46904
  * CVE-2021-46905
  * CVE-2021-46906
  * CVE-2021-46915
  * CVE-2021-46924
  * CVE-2021-46929
  * CVE-2021-46932
  * CVE-2021-46934
  * CVE-2021-46953
  * CVE-2021-46964
  * CVE-2021-46966
  * CVE-2021-46968
  * CVE-2021-46974
  * CVE-2021-46989
  * CVE-2021-47005
  * CVE-2021-47012
  * CVE-2021-47013
  * CVE-2021-47054
  * CVE-2021-47060
  * CVE-2021-47061
  * CVE-2021-47069
  * CVE-2021-47076
  * CVE-2021-47078
  * CVE-2021-47083
  * CVE-2022-20154
  * CVE-2022-48627
  * CVE-2023-28746
  * CVE-2023-35827
  * CVE-2023-46343
  * CVE-2023-51042
  * CVE-2023-52340
  * CVE-2023-52429
  * CVE-2023-52439
  * CVE-2023-52443
  * CVE-2023-52445
  * CVE-2023-52448
  * CVE-2023-52449
  * CVE-2023-52451
  * CVE-2023-52463
  * CVE-2023-52475
  * CVE-2023-52478
  * CVE-2023-52482
  * CVE-2023-52502
  * CVE-2023-52530
  * CVE-2023-52531
  * CVE-2023-52532
  * CVE-2023-52569
  * CVE-2023-52574
  * CVE-2023-52597
  * CVE-2023-52605
  * CVE-2023-6817
  * CVE-2024-0340
  * CVE-2024-0607
  * CVE-2024-1151
  * CVE-2024-23849
  * CVE-2024-23851
  * CVE-2024-26585
  * CVE-2024-26586
  * CVE-2024-26589
  * CVE-2024-26593
  * CVE-2024-26595
  * CVE-2024-26602
  * CVE-2024-26607
  * CVE-2024-26622

  
CVSS scores:

  * CVE-2019-25162 ( SUSE ):  6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2020-36777 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
  * CVE-2020-36784 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
  * CVE-2021-46904 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-46905 ( SUSE ):  4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
  * CVE-2021-46906 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
  * CVE-2021-46915 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-46924 ( SUSE ):  4.3 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
  * CVE-2021-46929 ( SUSE ):  7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
  * CVE-2021-46932 ( SUSE ):  2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2021-46934 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
  * CVE-2021-46953 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-46968 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
  * CVE-2021-46974 ( SUSE ):  5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
  * CVE-2021-47005 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47012 ( SUSE ):  6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2021-47013 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47060 ( SUSE ):  6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2021-47061 ( SUSE ):  6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2021-47069 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47076 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47078 ( SUSE ):  5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
  * CVE-2021-47083 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L
  * CVE-2022-20154 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-20154 ( NVD ):  6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-48627 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
  * CVE-2023-28746 ( SUSE ):  6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
  * CVE-2023-35827 ( NVD ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-46343 ( SUSE ):  6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-46343 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-51042 ( SUSE ):  6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-51042 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-52340 ( SUSE ):  7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52429 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52429 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52439 ( SUSE ):  6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-52443 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52445 ( SUSE ):  6.3 CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-52448 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52449 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52451 ( SUSE ):  5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H
  * CVE-2023-52463 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52475 ( SUSE ):  6.3 CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-52478 ( SUSE ):  5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2023-52482 ( SUSE ):  5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
  * CVE-2023-52502 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-52530 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52531 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52532 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52569 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52574 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52597 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H
  * CVE-2023-52605 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-6817 ( SUSE ):  6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-6817 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-0340 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
  * CVE-2024-0340 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
  * CVE-2024-0607 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L
  * CVE-2024-0607 ( NVD ):  6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2024-1151 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-23849 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
  * CVE-2024-23849 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-23851 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-23851 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26585 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-26586 ( SUSE ):  6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-26589 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
  * CVE-2024-26593 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
  * CVE-2024-26595 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26602 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
  * CVE-2024-26607 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26622 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

  
Affected Products:

  * openSUSE Leap 15.3
  * SUSE Enterprise Storage 7.1
  * SUSE Linux Enterprise High Availability Extension 15 SP3
  * SUSE Linux Enterprise High Performance Computing 15 SP3
  * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
  * SUSE Linux Enterprise Live Patching 15-SP3
  * SUSE Linux Enterprise Micro 5.1
  * SUSE Linux Enterprise Micro 5.2
  * SUSE Linux Enterprise Micro for Rancher 5.2
  * SUSE Linux Enterprise Server 15 SP3
  * SUSE Linux Enterprise Server 15 SP3 Business Critical Linux 15-SP3
  * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
  * SUSE Linux Enterprise Server for SAP Applications 15 SP3
  * SUSE Manager Proxy 4.2
  * SUSE Manager Retail Branch Server 4.2
  * SUSE Manager Server 4.2

  
  
An update that solves 67 vulnerabilities and has four security fixes can now be
installed.

## Description:

The SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security
bugfixes.

The following security bugs were fixed:

  * CVE-2023-28746: Fixed Register File Data Sampling (bsc#1213456).
  * CVE-2023-52502: Fixed a race condition in nfc_llcp_sock_get() and
    nfc_llcp_sock_get_sn() (bsc#1220831).
  * CVE-2024-26589: Fixed out of bounds read due to variable offset alu on
    PTR_TO_FLOW_KEYS (bsc#1220255).
  * CVE-2024-26585: Fixed race between tx work scheduling and socket close
    (bsc#1220187).
  * CVE-2023-52340: Fixed ICMPv6 “Packet Too Big” packets force a DoS of the
    Linux kernel by forcing 100% CPU (bsc#1219295).
  * CVE-2024-0607: Fixed 64-bit load issue in nft_byteorder_eval()
    (bsc#1218915).
  * CVE-2023-6817: Fixed use-after-free in nft_pipapo_walk (bsc#1218195).
  * CVE-2024-26622: Fixed UAF write bug in tomoyo_write_control() (bsc#1220825).
  * CVE-2023-52451: Fixed access beyond end of drmem array (bsc#1220250).
  * CVE-2021-46932: Fixed missing work initialization before device registration
    (bsc#1220444)
  * CVE-2023-52463: Fixed null pointer dereference in efivarfs (bsc#1220328).
  * CVE-2023-52449: Fixed gluebi NULL pointer dereference caused by ftl notifier
    (bsc#1220238).
  * CVE-2023-52475: Fixed use-after-free in powermate_config_complete
    (bsc#1220649)
  * CVE-2023-52478: Fixed kernel crash on receiver USB disconnect (bsc#1220796)
  * CVE-2021-46915: Fixed a bug to avoid possible divide error in nft_limit_init
    (bsc#1220436).
  * CVE-2021-46924: Fixed fix memory leak in device probe and remove
    (bsc#1220459)
  * CVE-2019-25162: Fixed a potential use after free (bsc#1220409).
  * CVE-2020-36784: Fixed reference leak when pm_runtime_get_sync fails
    (bsc#1220570).
  * CVE-2023-52445: Fixed use after free on context disconnection (bsc#1220241).
  * CVE-2023-46343: Fixed a NULL pointer dereference in send_acknowledge()
    (CVE-2023-46343).
  * CVE-2023-52439: Fixed use-after-free in uio_open (bsc#1220140).
  * CVE-2023-52443: Fixed crash when parsed profile name is empty (bsc#1220240).
  * CVE-2024-26602: Fixed overall slowdowns with sys_membarrier (bsc1220398).
  * CVE-2024-26593: Fixed block process call transactions (bsc#1220009).
  * CVE-2021-47013: Fixed a use after free in emac_mac_tx_buf_send
    (bsc#1220641).
  * CVE-2024-26586: Fixed stack corruption (bsc#1220243).
  * CVE-2024-26595: Fixed NULL pointer dereference in error path (bsc#1220344).
  * CVE-2023-52448: Fixed kernel NULL pointer dereference in gfs2_rgrp_dump
    (bsc#1220253).
  * CVE-2024-1151: Fixed unlimited number of recursions from action sets
    (bsc#1219835).
  * CVE-2024-23849: Fixed array-index-out-of-bounds in rds_cmsg_recv
    (bsc#1219127).
  * CVE-2024-0340: Fixed information disclosure in vhost/vhost.c:vhost_new_msg()
    (bsc#1218689).
  * CVE-2023-51042: Fixed use-after-free in amdgpu_cs_wait_all_fences in
    drivers/gpu/drm/amd/amdgpu/amdgpu_cs.c (bsc#1219128).
  * CVE-2021-47078: Fixed a bug by clearing all QP fields if creation failed
    (bsc#1220863)
  * CVE-2021-47076: Fixed a bug by returning CQE error if invalid lkey was
    supplied (bsc#1220860)
  * CVE-2023-52605: Fixed a NULL pointer dereference check (bsc#1221039)
  * CVE-2023-52569: Fixed a bug in btrfs by remoning BUG() after failure to
    insert delayed dir index item (bsc#1220918).
  * CVE-2023-52482: Fixex a bug by adding SRSO mitigation for Hygon processors
    (bsc#1220735).
  * CVE-2023-52597: Fixed a setting of fpc register in KVM (bsc#1221040).
  * CVE-2022-48627: Fixed a memory overlapping when deleting chars in the buffer
    (bsc#1220845).
  * CVE-2023-52574: Fixed a bug by hiding new member header_ops (bsc#1220870).
  * CVE-2021-46934: Fixed a bug by validating user data in compat ioctl
    (bsc#1220469).
  * CVE-2023-35827: Fixed a use-after-free issue in ravb_tx_timeout_work()
    (bsc#1212514).
  * CVE-2023-52532: Fixed a bug in TX CQE error handling (bsc#1220932).
  * CVE-2023-52530: Fixed a potential key use-after-free in wifi mac80211
    (bsc#1220930).
  * CVE-2023-52531: Fixed a memory corruption issue in iwlwifi (bsc#1220931).
  * CVE-2021-47083: Fixed a global-out-of-bounds issue in mediatek:
    (bsc#1220917).
  * CVE-2024-26607: Fixed a probing race issue in sii902x: (bsc#1220736).
  * CVE-2021-47005: Fixed a NULL pointer dereference for ->get_features()
    (bsc#1220660).
  * CVE-2021-47060: Fixed a bug in KVM by stop looking for coalesced MMIO zones
    if the bus is destroyed (bsc#1220742).
  * CVE-2021-47012: Fixed a use after free in siw_alloc_mr (bsc#1220627).
  * CVE-2021-46989: Fixed a bug by preventing corruption in shrinking truncate
    in hfsplus (bsc#1220737).
  * CVE-2021-47061: Fixed a bug in KVM by destroy I/O bus devices on unregister
    failure _after_ sync'ing SRCU (bsc#1220745).

The following non-security bugs were fixed:

  * EDAC/thunderx: Fix possible out-of-bounds string access (bsc#1220330)
  * ext4: fix deadlock due to mbcache entry corruption (bsc#1207653
    bsc#1219915).
  * ibmvfc: make 'max_sectors' a module option (bsc#1216223).
  * KVM: Destroy target device if coalesced MMIO unregistration fails (git-
    fixes).
  * KVM: mmio: Fix use-after-free Read in kvm_vm_ioctl_unregister_coalesced_mmio
    (git-fixes).
  * KVM: VMX: Move VERW closer to VMentry for MDS mitigation (git-fixes).
  * KVM: VMX: Use BT+JNC, i.e. EFLAGS.CF to select VMRESUME vs. VMLAUNCH (git-
    fixes).
  * KVM: x86: add support for CPUID leaf 0x80000021 (git-fixes).
  * KVM: x86: Move open-coded CPUID leaf 0x80000021 EAX bit propagation code
    (git-fixes).
  * KVM: x86: synthesize CPUID leaf 0x80000021h if useful (git-fixes).
  * KVM: x86: work around QEMU issue with synthetic CPUID leaves (git-fixes).
  * mbcache: Fixup kABI of mb_cache_entry (bsc#1207653 bsc#1219915).
  * scsi: Update max_hw_sectors on rescan (bsc#1216223).
  * x86/asm: Add _ASM_RIP() macro for x86-64 (%rip) suffix (git-fixes).
  * x86/bugs: Add asm helpers for executing VERW (git-fixes).
  * x86/bugs: Use ALTERNATIVE() instead of mds_user_clear static key (git-
    fixes). Also add the removed mds_user_clear symbol to kABI severities as it
    is exposed just for KVM module and is generally a core kernel component so
    removing it is low risk.
  * x86/cpu, kvm: Move X86_FEATURE_LFENCE_RDTSC to its native leaf (git-fixes).
  * x86/entry_32: Add VERW just before userspace transition (git-fixes).
  * x86/entry_64: Add VERW just before userspace transition (git-fixes).

## Special Instructions and Notes:

  * Please reboot the system after installing this update.

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".  
Alternatively you can run the command listed for your product:

  * openSUSE Leap 15.3  
    zypper in -t patch SUSE-2024-857=1

  * SUSE Linux Enterprise Live Patching 15-SP3  
    zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP3-2024-857=1

  * SUSE Linux Enterprise High Availability Extension 15 SP3  
    zypper in -t patch SUSE-SLE-Product-HA-15-SP3-2024-857=1

  * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3  
    zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-857=1

  * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3  
    zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-857=1

  * SUSE Linux Enterprise Server for SAP Applications 15 SP3  
    zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-857=1

  * SUSE Enterprise Storage 7.1  
    zypper in -t patch SUSE-Storage-7.1-2024-857=1

  * SUSE Linux Enterprise Micro 5.1  
    zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-857=1

  * SUSE Linux Enterprise Micro 5.2  
    zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-857=1

  * SUSE Linux Enterprise Micro for Rancher 5.2  
    zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-857=1

## Package List:

  * openSUSE Leap 15.3 (noarch nosrc)
    * kernel-docs-5.3.18-150300.59.153.2
  * openSUSE Leap 15.3 (noarch)
    * kernel-devel-5.3.18-150300.59.153.2
    * kernel-docs-html-5.3.18-150300.59.153.2
    * kernel-macros-5.3.18-150300.59.153.2
    * kernel-source-5.3.18-150300.59.153.2
    * kernel-source-vanilla-5.3.18-150300.59.153.2
  * openSUSE Leap 15.3 (nosrc ppc64le x86_64)
    * kernel-kvmsmall-5.3.18-150300.59.153.2
    * kernel-debug-5.3.18-150300.59.153.2
  * openSUSE Leap 15.3 (ppc64le x86_64)
    * kernel-debug-devel-debuginfo-5.3.18-150300.59.153.2
    * kernel-debug-debuginfo-5.3.18-150300.59.153.2
    * kernel-kvmsmall-devel-5.3.18-150300.59.153.2
    * kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.153.2
    * kernel-kvmsmall-debuginfo-5.3.18-150300.59.153.2
    * kernel-kvmsmall-debugsource-5.3.18-150300.59.153.2
    * kernel-debug-livepatch-devel-5.3.18-150300.59.153.2
    * kernel-debug-devel-5.3.18-150300.59.153.2
    * kernel-kvmsmall-devel-debuginfo-5.3.18-150300.59.153.2
    * kernel-debug-debugsource-5.3.18-150300.59.153.2
  * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64)
    * dlm-kmp-default-debuginfo-5.3.18-150300.59.153.2
    * kernel-default-livepatch-devel-5.3.18-150300.59.153.2
    * gfs2-kmp-default-debuginfo-5.3.18-150300.59.153.2
    * kernel-default-devel-debuginfo-5.3.18-150300.59.153.2
    * reiserfs-kmp-default-5.3.18-150300.59.153.2
    * ocfs2-kmp-default-debuginfo-5.3.18-150300.59.153.2
    * kernel-default-extra-debuginfo-5.3.18-150300.59.153.2
    * kernel-obs-build-5.3.18-150300.59.153.2
    * kernel-obs-qa-5.3.18-150300.59.153.1
    * kernel-default-optional-5.3.18-150300.59.153.2
    * kernel-obs-build-debugsource-5.3.18-150300.59.153.2
    * kselftests-kmp-default-5.3.18-150300.59.153.2
    * cluster-md-kmp-default-debuginfo-5.3.18-150300.59.153.2
    * cluster-md-kmp-default-5.3.18-150300.59.153.2
    * kernel-default-devel-5.3.18-150300.59.153.2
    * kernel-default-extra-5.3.18-150300.59.153.2
    * dlm-kmp-default-5.3.18-150300.59.153.2
    * kernel-default-base-5.3.18-150300.59.153.2.150300.18.90.2
    * kernel-default-livepatch-5.3.18-150300.59.153.2
    * kernel-syms-5.3.18-150300.59.153.1
    * kernel-default-debugsource-5.3.18-150300.59.153.2
    * reiserfs-kmp-default-debuginfo-5.3.18-150300.59.153.2
    * kselftests-kmp-default-debuginfo-5.3.18-150300.59.153.2
    * kernel-default-debuginfo-5.3.18-150300.59.153.2
    * gfs2-kmp-default-5.3.18-150300.59.153.2
    * kernel-default-optional-debuginfo-5.3.18-150300.59.153.2
    * ocfs2-kmp-default-5.3.18-150300.59.153.2
    * kernel-default-base-rebuild-5.3.18-150300.59.153.2.150300.18.90.2
  * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 nosrc)
    * kernel-default-5.3.18-150300.59.153.2
  * openSUSE Leap 15.3 (ppc64le s390x x86_64)
    * kernel-livepatch-5_3_18-150300_59_153-default-debuginfo-1-150300.7.3.2
    * kernel-livepatch-5_3_18-150300_59_153-default-1-150300.7.3.2
    * kernel-livepatch-SLE15-SP3_Update_42-debugsource-1-150300.7.3.2
  * openSUSE Leap 15.3 (x86_64)
    * kernel-livepatch-5_3_18-150300_59_153-preempt-1-150300.7.3.2
    * kernel-livepatch-5_3_18-150300_59_153-preempt-debuginfo-1-150300.7.3.2
  * openSUSE Leap 15.3 (aarch64 x86_64)
    * kselftests-kmp-preempt-5.3.18-150300.59.153.2
    * cluster-md-kmp-preempt-debuginfo-5.3.18-150300.59.153.2
    * kernel-preempt-devel-5.3.18-150300.59.153.2
    * kernel-preempt-optional-5.3.18-150300.59.153.2
    * dlm-kmp-preempt-5.3.18-150300.59.153.2
    * ocfs2-kmp-preempt-5.3.18-150300.59.153.2
    * dlm-kmp-preempt-debuginfo-5.3.18-150300.59.153.2
    * kernel-preempt-debugsource-5.3.18-150300.59.153.2
    * kernel-preempt-devel-debuginfo-5.3.18-150300.59.153.2
    * kernel-preempt-extra-5.3.18-150300.59.153.2
    * reiserfs-kmp-preempt-debuginfo-5.3.18-150300.59.153.2
    * kernel-preempt-debuginfo-5.3.18-150300.59.153.2
    * kernel-preempt-optional-debuginfo-5.3.18-150300.59.153.2
    * kernel-preempt-extra-debuginfo-5.3.18-150300.59.153.2
    * gfs2-kmp-preempt-5.3.18-150300.59.153.2
    * gfs2-kmp-preempt-debuginfo-5.3.18-150300.59.153.2
    * kselftests-kmp-preempt-debuginfo-5.3.18-150300.59.153.2
    * reiserfs-kmp-preempt-5.3.18-150300.59.153.2
    * cluster-md-kmp-preempt-5.3.18-150300.59.153.2
    * kernel-preempt-livepatch-devel-5.3.18-150300.59.153.2
    * ocfs2-kmp-preempt-debuginfo-5.3.18-150300.59.153.2
  * openSUSE Leap 15.3 (aarch64 nosrc x86_64)
    * kernel-preempt-5.3.18-150300.59.153.2
  * openSUSE Leap 15.3 (nosrc s390x)
    * kernel-zfcpdump-5.3.18-150300.59.153.2
  * openSUSE Leap 15.3 (s390x)
    * kernel-zfcpdump-debugsource-5.3.18-150300.59.153.2
    * kernel-zfcpdump-debuginfo-5.3.18-150300.59.153.2
  * openSUSE Leap 15.3 (nosrc)
    * dtb-aarch64-5.3.18-150300.59.153.1
  * openSUSE Leap 15.3 (aarch64)
    * kernel-64kb-debuginfo-5.3.18-150300.59.153.2
    * gfs2-kmp-64kb-debuginfo-5.3.18-150300.59.153.2
    * dtb-sprd-5.3.18-150300.59.153.1
    * dtb-exynos-5.3.18-150300.59.153.1
    * dtb-zte-5.3.18-150300.59.153.1
    * dtb-broadcom-5.3.18-150300.59.153.1
    * gfs2-kmp-64kb-5.3.18-150300.59.153.2
    * reiserfs-kmp-64kb-5.3.18-150300.59.153.2
    * kernel-64kb-extra-5.3.18-150300.59.153.2
    * ocfs2-kmp-64kb-5.3.18-150300.59.153.2
    * kselftests-kmp-64kb-5.3.18-150300.59.153.2
    * dtb-cavium-5.3.18-150300.59.153.1
    * dtb-socionext-5.3.18-150300.59.153.1
    * kernel-64kb-extra-debuginfo-5.3.18-150300.59.153.2
    * dlm-kmp-64kb-debuginfo-5.3.18-150300.59.153.2
    * ocfs2-kmp-64kb-debuginfo-5.3.18-150300.59.153.2
    * dtb-rockchip-5.3.18-150300.59.153.1
    * cluster-md-kmp-64kb-5.3.18-150300.59.153.2
    * reiserfs-kmp-64kb-debuginfo-5.3.18-150300.59.153.2
    * dtb-allwinner-5.3.18-150300.59.153.1
    * dtb-hisilicon-5.3.18-150300.59.153.1
    * dtb-amlogic-5.3.18-150300.59.153.1
    * cluster-md-kmp-64kb-debuginfo-5.3.18-150300.59.153.2
    * dlm-kmp-64kb-5.3.18-150300.59.153.2
    * kernel-64kb-devel-debuginfo-5.3.18-150300.59.153.2
    * kselftests-kmp-64kb-debuginfo-5.3.18-150300.59.153.2
    * dtb-nvidia-5.3.18-150300.59.153.1
    * kernel-64kb-livepatch-devel-5.3.18-150300.59.153.2
    * dtb-qcom-5.3.18-150300.59.153.1
    * kernel-64kb-optional-debuginfo-5.3.18-150300.59.153.2
    * dtb-mediatek-5.3.18-150300.59.153.1
    * dtb-arm-5.3.18-150300.59.153.1
    * dtb-apm-5.3.18-150300.59.153.1
    * kernel-64kb-debugsource-5.3.18-150300.59.153.2
    * kernel-64kb-optional-5.3.18-150300.59.153.2
    * dtb-altera-5.3.18-150300.59.153.1
    * dtb-renesas-5.3.18-150300.59.153.1
    * dtb-marvell-5.3.18-150300.59.153.1
    * kernel-64kb-devel-5.3.18-150300.59.153.2
    * dtb-xilinx-5.3.18-150300.59.153.1
    * dtb-lg-5.3.18-150300.59.153.1
    * dtb-al-5.3.18-150300.59.153.1
    * dtb-freescale-5.3.18-150300.59.153.1
    * dtb-amd-5.3.18-150300.59.153.1
  * openSUSE Leap 15.3 (aarch64 nosrc)
    * kernel-64kb-5.3.18-150300.59.153.2
  * SUSE Linux Enterprise Live Patching 15-SP3 (nosrc)
    * kernel-default-5.3.18-150300.59.153.2
  * SUSE Linux Enterprise Live Patching 15-SP3 (ppc64le s390x x86_64)
    * kernel-default-livepatch-devel-5.3.18-150300.59.153.2
    * kernel-default-livepatch-5.3.18-150300.59.153.2
    * kernel-default-debugsource-5.3.18-150300.59.153.2
    * kernel-livepatch-5_3_18-150300_59_153-default-1-150300.7.3.2
    * kernel-default-debuginfo-5.3.18-150300.59.153.2
  * SUSE Linux Enterprise High Availability Extension 15 SP3 (aarch64 ppc64le
    s390x x86_64)
    * dlm-kmp-default-debuginfo-5.3.18-150300.59.153.2
    * gfs2-kmp-default-debuginfo-5.3.18-150300.59.153.2
    * kernel-default-debugsource-5.3.18-150300.59.153.2
    * cluster-md-kmp-default-debuginfo-5.3.18-150300.59.153.2
    * cluster-md-kmp-default-5.3.18-150300.59.153.2
    * gfs2-kmp-default-5.3.18-150300.59.153.2
    * kernel-default-debuginfo-5.3.18-150300.59.153.2
    * ocfs2-kmp-default-debuginfo-5.3.18-150300.59.153.2
    * dlm-kmp-default-5.3.18-150300.59.153.2
    * ocfs2-kmp-default-5.3.18-150300.59.153.2
  * SUSE Linux Enterprise High Availability Extension 15 SP3 (nosrc)
    * kernel-default-5.3.18-150300.59.153.2
  * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 nosrc)
    * kernel-64kb-5.3.18-150300.59.153.2
  * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64)
    * kernel-64kb-debugsource-5.3.18-150300.59.153.2
    * kernel-64kb-devel-5.3.18-150300.59.153.2
    * kernel-64kb-debuginfo-5.3.18-150300.59.153.2
    * kernel-64kb-devel-debuginfo-5.3.18-150300.59.153.2
  * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 nosrc
    x86_64)
    * kernel-preempt-5.3.18-150300.59.153.2
    * kernel-default-5.3.18-150300.59.153.2
  * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
    x86_64)
    * kernel-preempt-debuginfo-5.3.18-150300.59.153.2
    * kernel-syms-5.3.18-150300.59.153.1
    * kernel-obs-build-debugsource-5.3.18-150300.59.153.2
    * kernel-preempt-devel-5.3.18-150300.59.153.2
    * kernel-preempt-debugsource-5.3.18-150300.59.153.2
    * kernel-default-devel-debuginfo-5.3.18-150300.59.153.2
    * reiserfs-kmp-default-5.3.18-150300.59.153.2
    * kernel-default-debugsource-5.3.18-150300.59.153.2
    * kernel-preempt-devel-debuginfo-5.3.18-150300.59.153.2
    * reiserfs-kmp-default-debuginfo-5.3.18-150300.59.153.2
    * kernel-default-devel-5.3.18-150300.59.153.2
    * kernel-default-debuginfo-5.3.18-150300.59.153.2
    * kernel-default-base-5.3.18-150300.59.153.2.150300.18.90.2
    * kernel-obs-build-5.3.18-150300.59.153.2
  * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch)
    * kernel-source-5.3.18-150300.59.153.2
    * kernel-macros-5.3.18-150300.59.153.2
    * kernel-devel-5.3.18-150300.59.153.2
  * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch nosrc)
    * kernel-docs-5.3.18-150300.59.153.2
  * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 nosrc)
    * kernel-64kb-5.3.18-150300.59.153.2
  * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64)
    * kernel-64kb-debugsource-5.3.18-150300.59.153.2
    * kernel-64kb-devel-5.3.18-150300.59.153.2
    * kernel-64kb-debuginfo-5.3.18-150300.59.153.2
    * kernel-64kb-devel-debuginfo-5.3.18-150300.59.153.2
  * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x
    x86_64 nosrc)
    * kernel-default-5.3.18-150300.59.153.2
  * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x
    x86_64)
    * kernel-syms-5.3.18-150300.59.153.1
    * kernel-obs-build-debugsource-5.3.18-150300.59.153.2
    * kernel-default-devel-debuginfo-5.3.18-150300.59.153.2
    * reiserfs-kmp-default-5.3.18-150300.59.153.2
    * kernel-default-debugsource-5.3.18-150300.59.153.2
    * reiserfs-kmp-default-debuginfo-5.3.18-150300.59.153.2
    * kernel-default-devel-5.3.18-150300.59.153.2
    * kernel-default-debuginfo-5.3.18-150300.59.153.2
    * kernel-default-base-5.3.18-150300.59.153.2.150300.18.90.2
    * kernel-obs-build-5.3.18-150300.59.153.2
  * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch)
    * kernel-source-5.3.18-150300.59.153.2
    * kernel-macros-5.3.18-150300.59.153.2
    * kernel-devel-5.3.18-150300.59.153.2
  * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch nosrc)
    * kernel-docs-5.3.18-150300.59.153.2
  * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 nosrc x86_64)
    * kernel-preempt-5.3.18-150300.59.153.2
  * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 x86_64)
    * kernel-preempt-debuginfo-5.3.18-150300.59.153.2
    * kernel-preempt-devel-5.3.18-150300.59.153.2
    * kernel-preempt-debugsource-5.3.18-150300.59.153.2
    * kernel-preempt-devel-debuginfo-5.3.18-150300.59.153.2
  * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (nosrc s390x)
    * kernel-zfcpdump-5.3.18-150300.59.153.2
  * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (s390x)
    * kernel-zfcpdump-debugsource-5.3.18-150300.59.153.2
    * kernel-zfcpdump-debuginfo-5.3.18-150300.59.153.2
  * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (nosrc ppc64le
    x86_64)
    * kernel-default-5.3.18-150300.59.153.2
  * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
    * kernel-syms-5.3.18-150300.59.153.1
    * kernel-obs-build-debugsource-5.3.18-150300.59.153.2
    * kernel-default-devel-debuginfo-5.3.18-150300.59.153.2
    * reiserfs-kmp-default-5.3.18-150300.59.153.2
    * kernel-default-debugsource-5.3.18-150300.59.153.2
    * reiserfs-kmp-default-debuginfo-5.3.18-150300.59.153.2
    * kernel-default-devel-5.3.18-150300.59.153.2
    * kernel-default-debuginfo-5.3.18-150300.59.153.2
    * kernel-default-base-5.3.18-150300.59.153.2.150300.18.90.2
    * kernel-obs-build-5.3.18-150300.59.153.2
  * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch)
    * kernel-source-5.3.18-150300.59.153.2
    * kernel-macros-5.3.18-150300.59.153.2
    * kernel-devel-5.3.18-150300.59.153.2
  * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch nosrc)
    * kernel-docs-5.3.18-150300.59.153.2
  * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (nosrc x86_64)
    * kernel-preempt-5.3.18-150300.59.153.2
  * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (x86_64)
    * kernel-preempt-debuginfo-5.3.18-150300.59.153.2
    * kernel-preempt-devel-5.3.18-150300.59.153.2
    * kernel-preempt-debugsource-5.3.18-150300.59.153.2
    * kernel-preempt-devel-debuginfo-5.3.18-150300.59.153.2
  * SUSE Enterprise Storage 7.1 (aarch64 nosrc)
    * kernel-64kb-5.3.18-150300.59.153.2
  * SUSE Enterprise Storage 7.1 (aarch64)
    * kernel-64kb-debugsource-5.3.18-150300.59.153.2
    * kernel-64kb-devel-5.3.18-150300.59.153.2
    * kernel-64kb-debuginfo-5.3.18-150300.59.153.2
    * kernel-64kb-devel-debuginfo-5.3.18-150300.59.153.2
  * SUSE Enterprise Storage 7.1 (aarch64 nosrc x86_64)
    * kernel-preempt-5.3.18-150300.59.153.2
    * kernel-default-5.3.18-150300.59.153.2
  * SUSE Enterprise Storage 7.1 (aarch64 x86_64)
    * kernel-preempt-debuginfo-5.3.18-150300.59.153.2
    * kernel-syms-5.3.18-150300.59.153.1
    * kernel-obs-build-debugsource-5.3.18-150300.59.153.2
    * kernel-preempt-devel-5.3.18-150300.59.153.2
    * kernel-preempt-debugsource-5.3.18-150300.59.153.2
    * kernel-default-devel-debuginfo-5.3.18-150300.59.153.2
    * reiserfs-kmp-default-5.3.18-150300.59.153.2
    * kernel-default-debugsource-5.3.18-150300.59.153.2
    * kernel-preempt-devel-debuginfo-5.3.18-150300.59.153.2
    * reiserfs-kmp-default-debuginfo-5.3.18-150300.59.153.2
    * kernel-default-devel-5.3.18-150300.59.153.2
    * kernel-default-debuginfo-5.3.18-150300.59.153.2
    * kernel-default-base-5.3.18-150300.59.153.2.150300.18.90.2
    * kernel-obs-build-5.3.18-150300.59.153.2
  * SUSE Enterprise Storage 7.1 (noarch)
    * kernel-source-5.3.18-150300.59.153.2
    * kernel-macros-5.3.18-150300.59.153.2
    * kernel-devel-5.3.18-150300.59.153.2
  * SUSE Enterprise Storage 7.1 (noarch nosrc)
    * kernel-docs-5.3.18-150300.59.153.2
  * SUSE Linux Enterprise Micro 5.1 (aarch64 nosrc s390x x86_64)
    * kernel-default-5.3.18-150300.59.153.2
  * SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64)
    * kernel-default-base-5.3.18-150300.59.153.2.150300.18.90.2
    * kernel-default-debuginfo-5.3.18-150300.59.153.2
    * kernel-default-debugsource-5.3.18-150300.59.153.2
  * SUSE Linux Enterprise Micro 5.2 (aarch64 nosrc s390x x86_64)
    * kernel-default-5.3.18-150300.59.153.2
  * SUSE Linux Enterprise Micro 5.2 (aarch64 x86_64)
    * kernel-default-base-5.3.18-150300.59.153.2.150300.18.90.2
  * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64)
    * kernel-default-debuginfo-5.3.18-150300.59.153.2
    * kernel-default-debugsource-5.3.18-150300.59.153.2
  * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 nosrc s390x x86_64)
    * kernel-default-5.3.18-150300.59.153.2
  * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 x86_64)
    * kernel-default-base-5.3.18-150300.59.153.2.150300.18.90.2
  * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64)
    * kernel-default-debuginfo-5.3.18-150300.59.153.2
    * kernel-default-debugsource-5.3.18-150300.59.153.2

## References:

  * https://www.suse.com/security/cve/CVE-2019-25162.html
  * https://www.suse.com/security/cve/CVE-2020-36777.html
  * https://www.suse.com/security/cve/CVE-2020-36784.html
  * https://www.suse.com/security/cve/CVE-2021-46904.html
  * https://www.suse.com/security/cve/CVE-2021-46905.html
  * https://www.suse.com/security/cve/CVE-2021-46906.html
  * https://www.suse.com/security/cve/CVE-2021-46915.html
  * https://www.suse.com/security/cve/CVE-2021-46924.html
  * https://www.suse.com/security/cve/CVE-2021-46929.html
  * https://www.suse.com/security/cve/CVE-2021-46932.html
  * https://www.suse.com/security/cve/CVE-2021-46934.html
  * https://www.suse.com/security/cve/CVE-2021-46953.html
  * https://www.suse.com/security/cve/CVE-2021-46964.html
  * https://www.suse.com/security/cve/CVE-2021-46966.html
  * https://www.suse.com/security/cve/CVE-2021-46968.html
  * https://www.suse.com/security/cve/CVE-2021-46974.html
  * https://www.suse.com/security/cve/CVE-2021-46989.html
  * https://www.suse.com/security/cve/CVE-2021-47005.html
  * https://www.suse.com/security/cve/CVE-2021-47012.html
  * https://www.suse.com/security/cve/CVE-2021-47013.html
  * https://www.suse.com/security/cve/CVE-2021-47054.html
  * https://www.suse.com/security/cve/CVE-2021-47060.html
  * https://www.suse.com/security/cve/CVE-2021-47061.html
  * https://www.suse.com/security/cve/CVE-2021-47069.html
  * https://www.suse.com/security/cve/CVE-2021-47076.html
  * https://www.suse.com/security/cve/CVE-2021-47078.html
  * https://www.suse.com/security/cve/CVE-2021-47083.html
  * https://www.suse.com/security/cve/CVE-2022-20154.html
  * https://www.suse.com/security/cve/CVE-2022-48627.html
  * https://www.suse.com/security/cve/CVE-2023-28746.html
  * https://www.suse.com/security/cve/CVE-2023-35827.html
  * https://www.suse.com/security/cve/CVE-2023-46343.html
  * https://www.suse.com/security/cve/CVE-2023-51042.html
  * https://www.suse.com/security/cve/CVE-2023-52340.html
  * https://www.suse.com/security/cve/CVE-2023-52429.html
  * https://www.suse.com/security/cve/CVE-2023-52439.html
  * https://www.suse.com/security/cve/CVE-2023-52443.html
  * https://www.suse.com/security/cve/CVE-2023-52445.html
  * https://www.suse.com/security/cve/CVE-2023-52448.html
  * https://www.suse.com/security/cve/CVE-2023-52449.html
  * https://www.suse.com/security/cve/CVE-2023-52451.html
  * https://www.suse.com/security/cve/CVE-2023-52463.html
  * https://www.suse.com/security/cve/CVE-2023-52475.html
  * https://www.suse.com/security/cve/CVE-2023-52478.html
  * https://www.suse.com/security/cve/CVE-2023-52482.html
  * https://www.suse.com/security/cve/CVE-2023-52502.html
  * https://www.suse.com/security/cve/CVE-2023-52530.html
  * https://www.suse.com/security/cve/CVE-2023-52531.html
  * https://www.suse.com/security/cve/CVE-2023-52532.html
  * https://www.suse.com/security/cve/CVE-2023-52569.html
  * https://www.suse.com/security/cve/CVE-2023-52574.html
  * https://www.suse.com/security/cve/CVE-2023-52597.html
  * https://www.suse.com/security/cve/CVE-2023-52605.html
  * https://www.suse.com/security/cve/CVE-2023-6817.html
  * https://www.suse.com/security/cve/CVE-2024-0340.html
  * https://www.suse.com/security/cve/CVE-2024-0607.html
  * https://www.suse.com/security/cve/CVE-2024-1151.html
  * https://www.suse.com/security/cve/CVE-2024-23849.html
  * https://www.suse.com/security/cve/CVE-2024-23851.html
  * https://www.suse.com/security/cve/CVE-2024-26585.html
  * https://www.suse.com/security/cve/CVE-2024-26586.html
  * https://www.suse.com/security/cve/CVE-2024-26589.html
  * https://www.suse.com/security/cve/CVE-2024-26593.html
  * https://www.suse.com/security/cve/CVE-2024-26595.html
  * https://www.suse.com/security/cve/CVE-2024-26602.html
  * https://www.suse.com/security/cve/CVE-2024-26607.html
  * https://www.suse.com/security/cve/CVE-2024-26622.html
  * https://bugzilla.suse.com/show_bug.cgi?id=1200599
  * https://bugzilla.suse.com/show_bug.cgi?id=1207653
  * https://bugzilla.suse.com/show_bug.cgi?id=1212514
  * https://bugzilla.suse.com/show_bug.cgi?id=1213456
  * https://bugzilla.suse.com/show_bug.cgi?id=1216223
  * https://bugzilla.suse.com/show_bug.cgi?id=1218195
  * https://bugzilla.suse.com/show_bug.cgi?id=1218689
  * https://bugzilla.suse.com/show_bug.cgi?id=1218915
  * https://bugzilla.suse.com/show_bug.cgi?id=1219127
  * https://bugzilla.suse.com/show_bug.cgi?id=1219128
  * https://bugzilla.suse.com/show_bug.cgi?id=1219146
  * https://bugzilla.suse.com/show_bug.cgi?id=1219295
  * https://bugzilla.suse.com/show_bug.cgi?id=1219653
  * https://bugzilla.suse.com/show_bug.cgi?id=1219827
  * https://bugzilla.suse.com/show_bug.cgi?id=1219835
  * https://bugzilla.suse.com/show_bug.cgi?id=1219915
  * https://bugzilla.suse.com/show_bug.cgi?id=1220009
  * https://bugzilla.suse.com/show_bug.cgi?id=1220140
  * https://bugzilla.suse.com/show_bug.cgi?id=1220187
  * https://bugzilla.suse.com/show_bug.cgi?id=1220238
  * https://bugzilla.suse.com/show_bug.cgi?id=1220240
  * https://bugzilla.suse.com/show_bug.cgi?id=1220241
  * https://bugzilla.suse.com/show_bug.cgi?id=1220243
  * https://bugzilla.suse.com/show_bug.cgi?id=1220250
  * https://bugzilla.suse.com/show_bug.cgi?id=1220253
  * https://bugzilla.suse.com/show_bug.cgi?id=1220255
  * https://bugzilla.suse.com/show_bug.cgi?id=1220328
  * https://bugzilla.suse.com/show_bug.cgi?id=1220330
  * https://bugzilla.suse.com/show_bug.cgi?id=1220344
  * https://bugzilla.suse.com/show_bug.cgi?id=1220398
  * https://bugzilla.suse.com/show_bug.cgi?id=1220409
  * https://bugzilla.suse.com/show_bug.cgi?id=1220416
  * https://bugzilla.suse.com/show_bug.cgi?id=1220418
  * https://bugzilla.suse.com/show_bug.cgi?id=1220421
  * https://bugzilla.suse.com/show_bug.cgi?id=1220436
  * https://bugzilla.suse.com/show_bug.cgi?id=1220444
  * https://bugzilla.suse.com/show_bug.cgi?id=1220459
  * https://bugzilla.suse.com/show_bug.cgi?id=1220469
  * https://bugzilla.suse.com/show_bug.cgi?id=1220482
  * https://bugzilla.suse.com/show_bug.cgi?id=1220526
  * https://bugzilla.suse.com/show_bug.cgi?id=1220538
  * https://bugzilla.suse.com/show_bug.cgi?id=1220570
  * https://bugzilla.suse.com/show_bug.cgi?id=1220572
  * https://bugzilla.suse.com/show_bug.cgi?id=1220599
  * https://bugzilla.suse.com/show_bug.cgi?id=1220627
  * https://bugzilla.suse.com/show_bug.cgi?id=1220641
  * https://bugzilla.suse.com/show_bug.cgi?id=1220649
  * https://bugzilla.suse.com/show_bug.cgi?id=1220660
  * https://bugzilla.suse.com/show_bug.cgi?id=1220689
  * https://bugzilla.suse.com/show_bug.cgi?id=1220700
  * https://bugzilla.suse.com/show_bug.cgi?id=1220735
  * https://bugzilla.suse.com/show_bug.cgi?id=1220736
  * https://bugzilla.suse.com/show_bug.cgi?id=1220737
  * https://bugzilla.suse.com/show_bug.cgi?id=1220742
  * https://bugzilla.suse.com/show_bug.cgi?id=1220745
  * https://bugzilla.suse.com/show_bug.cgi?id=1220767
  * https://bugzilla.suse.com/show_bug.cgi?id=1220796
  * https://bugzilla.suse.com/show_bug.cgi?id=1220825
  * https://bugzilla.suse.com/show_bug.cgi?id=1220826
  * https://bugzilla.suse.com/show_bug.cgi?id=1220831
  * https://bugzilla.suse.com/show_bug.cgi?id=1220845
  * https://bugzilla.suse.com/show_bug.cgi?id=1220860
  * https://bugzilla.suse.com/show_bug.cgi?id=1220863
  * https://bugzilla.suse.com/show_bug.cgi?id=1220870
  * https://bugzilla.suse.com/show_bug.cgi?id=1220917
  * https://bugzilla.suse.com/show_bug.cgi?id=1220918
  * https://bugzilla.suse.com/show_bug.cgi?id=1220930
  * https://bugzilla.suse.com/show_bug.cgi?id=1220931
  * https://bugzilla.suse.com/show_bug.cgi?id=1220932
  * https://bugzilla.suse.com/show_bug.cgi?id=1221039
  * https://bugzilla.suse.com/show_bug.cgi?id=1221040

openSUSE: 2024:0857-1: important: the Linux Kernel Security Advisory Update

March 13, 2024
The SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security bugfixes

Description

The SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2023-28746: Fixed Register File Data Sampling (bsc#1213456). * CVE-2023-52502: Fixed a race condition in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn() (bsc#1220831). * CVE-2024-26589: Fixed out of bounds read due to variable offset alu on PTR_TO_FLOW_KEYS (bsc#1220255). * CVE-2024-26585: Fixed race between tx work scheduling and socket close (bsc#1220187). * CVE-2023-52340: Fixed ICMPv6 “Packet Too Big” packets force a DoS of the Linux kernel by forcing 100% CPU (bsc#1219295). * CVE-2024-0607: Fixed 64-bit load issue in nft_byteorder_eval() (bsc#1218915). * CVE-2023-6817: Fixed use-after-free in nft_pipapo_walk (bsc#1218195). * CVE-2024-26622: Fixed UAF write bug in tomoyo_write_control() (bsc#1220825). * CVE-2023-52451: Fixed access beyond end of drmem array (bsc#1220250). * CVE-2021-46932: Fixed missing work initialization before device registration (bsc#1220444) * CVE-2023-52463: Fixed null pointer dereference in efivarfs (bsc#1220328). * CVE-2023-52449: Fixed gluebi NULL pointer dereference caused by ftl notifier (bsc#1220238). * CVE-2023-52475: Fixed use-after-free in powermate_config_complete (bsc#1220649) * CVE-2023-52478: Fixed kernel crash on receiver USB disconnect (bsc#1220796) * CVE-2021-46915: Fixed a bug to avoid possible divide error in nft_limit_init (bsc#1220436). * CVE-2021-46924: Fixed fix memory leak in device probe and remove (bsc#1220459) * CVE-2019-25162: Fixed a potential use after free (bsc#1220409). * CVE-2020-36784: Fixed reference leak when pm_runtime_get_sync fails (bsc#1220570). * CVE-2023-52445: Fixed use after free on context disconnection (bsc#1220241). * CVE-2023-46343: Fixed a NULL pointer dereference in send_acknowledge() (CVE-2023-46343). * CVE-2023-52439: Fixed use-after-free in uio_open (bsc#1220140). * CVE-2023-52443: Fixed crash when parsed profile name is empty (bsc#1220240). * CVE-2024-26602: Fixed overall slowdowns with sys_membarrier (bsc1220398). * CVE-2024-26593: Fixed block process call transactions (bsc#1220009). * CVE-2021-47013: Fixed a use after free in emac_mac_tx_buf_send (bsc#1220641). * CVE-2024-26586: Fixed stack corruption (bsc#1220243). * CVE-2024-26595: Fixed NULL pointer dereference in error path (bsc#1220344). * CVE-2023-52448: Fixed kernel NULL pointer dereference in gfs2_rgrp_dump (bsc#1220253). * CVE-2024-1151: Fixed unlimited number of recursions from action sets (bsc#1219835). * CVE-2024-23849: Fixed array-index-out-of-bounds in rds_cmsg_recv (bsc#1219127). * CVE-2024-0340: Fixed information disclosure in vhost/vhost.c:vhost_new_msg() (bsc#1218689). * CVE-2023-51042: Fixed use-after-free in amdgpu_cs_wait_all_fences in drivers/gpu/drm/amd/amdgpu/amdgpu_cs.c (bsc#1219128). * CVE-2021-47078: Fixed a bug by clearing all QP fields if creation failed (bsc#1220863) * CVE-2021-47076: Fixed a bug by returning CQE error if invalid lkey was supplied (bsc#1220860) * CVE-2023-52605: Fixed a NULL pointer dereference check (bsc#1221039) * CVE-2023-52569: Fixed a bug in btrfs by remoning BUG() after failure to insert delayed dir index item (bsc#1220918). * CVE-2023-52482: Fixex a bug by adding SRSO mitigation for Hygon processors (bsc#1220735). * CVE-2023-52597: Fixed a setting of fpc register in KVM (bsc#1221040). * CVE-2022-48627: Fixed a memory overlapping when deleting chars in the buffer (bsc#1220845). * CVE-2023-52574: Fixed a bug by hiding new member header_ops (bsc#1220870). * CVE-2021-46934: Fixed a bug by validating user data in compat ioctl (bsc#1220469). * CVE-2023-35827: Fixed a use-after-free issue in ravb_tx_timeout_work() (bsc#1212514). * CVE-2023-52532: Fixed a bug in TX CQE error handling (bsc#1220932). * CVE-2023-52530: Fixed a potential key use-after-free in wifi mac80211 (bsc#1220930). * CVE-2023-52531: Fixed a memory corruption issue in iwlwifi (bsc#1220931). * CVE-2021-47083: Fixed a global-out-of-bounds issue in mediatek: (bsc#1220917). * CVE-2024-26607: Fixed a probing race issue in sii902x: (bsc#1220736). * CVE-2021-47005: Fixed a NULL pointer dereference for ->get_features() (bsc#1220660). * CVE-2021-47060: Fixed a bug in KVM by stop looking for coalesced MMIO zones if the bus is destroyed (bsc#1220742). * CVE-2021-47012: Fixed a use after free in siw_alloc_mr (bsc#1220627). * CVE-2021-46989: Fixed a bug by preventing corruption in shrinking truncate in hfsplus (bsc#1220737). * CVE-2021-47061: Fixed a bug in KVM by destroy I/O bus devices on unregister failure _after_ sync'ing SRCU (bsc#1220745). The following non-security bugs were fixed: * EDAC/thunderx: Fix possible out-of-bounds string access (bsc#1220330) * ext4: fix deadlock due to mbcache entry corruption (bsc#1207653 bsc#1219915). * ibmvfc: make 'max_sectors' a module option (bsc#1216223). * KVM: Destroy target device if coalesced MMIO unregistration fails (git- fixes). * KVM: mmio: Fix use-after-free Read in kvm_vm_ioctl_unregister_coalesced_mmio (git-fixes). * KVM: VMX: Move VERW closer to VMentry for MDS mitigation (git-fixes). * KVM: VMX: Use BT+JNC, i.e. EFLAGS.CF to select VMRESUME vs. VMLAUNCH (git- fixes). * KVM: x86: add support for CPUID leaf 0x80000021 (git-fixes). * KVM: x86: Move open-coded CPUID leaf 0x80000021 EAX bit propagation code (git-fixes). * KVM: x86: synthesize CPUID leaf 0x80000021h if useful (git-fixes). * KVM: x86: work around QEMU issue with synthetic CPUID leaves (git-fixes). * mbcache: Fixup kABI of mb_cache_entry (bsc#1207653 bsc#1219915). * scsi: Update max_hw_sectors on rescan (bsc#1216223). * x86/asm: Add _ASM_RIP() macro for x86-64 (%rip) suffix (git-fixes). * x86/bugs: Add asm helpers for executing VERW (git-fixes). * x86/bugs: Use ALTERNATIVE() instead of mds_user_clear static key (git- fixes). Also add the removed mds_user_clear symbol to kABI severities as it is exposed just for KVM module and is generally a core kernel component so removing it is low risk. * x86/cpu, kvm: Move X86_FEATURE_LFENCE_RDTSC to its native leaf (git-fixes). * x86/entry_32: Add VERW just before userspace transition (git-fixes). * x86/entry_64: Add VERW just before userspace transition (git-fixes). ## Special Instructions and Notes: * Please reboot the system after installing this update.

 

Patch

## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2024-857=1 * SUSE Linux Enterprise Live Patching 15-SP3 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP3-2024-857=1 * SUSE Linux Enterprise High Availability Extension 15 SP3 zypper in -t patch SUSE-SLE-Product-HA-15-SP3-2024-857=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-857=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-857=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-857=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-857=1 * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-857=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-857=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-857=1


Package List

* openSUSE Leap 15.3 (noarch nosrc) * kernel-docs-5.3.18-150300.59.153.2 * openSUSE Leap 15.3 (noarch) * kernel-devel-5.3.18-150300.59.153.2 * kernel-docs-html-5.3.18-150300.59.153.2 * kernel-macros-5.3.18-150300.59.153.2 * kernel-source-5.3.18-150300.59.153.2 * kernel-source-vanilla-5.3.18-150300.59.153.2 * openSUSE Leap 15.3 (nosrc ppc64le x86_64) * kernel-kvmsmall-5.3.18-150300.59.153.2 * kernel-debug-5.3.18-150300.59.153.2 * openSUSE Leap 15.3 (ppc64le x86_64) * kernel-debug-devel-debuginfo-5.3.18-150300.59.153.2 * kernel-debug-debuginfo-5.3.18-150300.59.153.2 * kernel-kvmsmall-devel-5.3.18-150300.59.153.2 * kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.153.2 * kernel-kvmsmall-debuginfo-5.3.18-150300.59.153.2 * kernel-kvmsmall-debugsource-5.3.18-150300.59.153.2 * kernel-debug-livepatch-devel-5.3.18-150300.59.153.2 * kernel-debug-devel-5.3.18-150300.59.153.2 * kernel-kvmsmall-devel-debuginfo-5.3.18-150300.59.153.2 * kernel-debug-debugsource-5.3.18-150300.59.153.2 * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64) * dlm-kmp-default-debuginfo-5.3.18-150300.59.153.2 * kernel-default-livepatch-devel-5.3.18-150300.59.153.2 * gfs2-kmp-default-debuginfo-5.3.18-150300.59.153.2 * kernel-default-devel-debuginfo-5.3.18-150300.59.153.2 * reiserfs-kmp-default-5.3.18-150300.59.153.2 * ocfs2-kmp-default-debuginfo-5.3.18-150300.59.153.2 * kernel-default-extra-debuginfo-5.3.18-150300.59.153.2 * kernel-obs-build-5.3.18-150300.59.153.2 * kernel-obs-qa-5.3.18-150300.59.153.1 * kernel-default-optional-5.3.18-150300.59.153.2 * kernel-obs-build-debugsource-5.3.18-150300.59.153.2 * kselftests-kmp-default-5.3.18-150300.59.153.2 * cluster-md-kmp-default-debuginfo-5.3.18-150300.59.153.2 * cluster-md-kmp-default-5.3.18-150300.59.153.2 * kernel-default-devel-5.3.18-150300.59.153.2 * kernel-default-extra-5.3.18-150300.59.153.2 * dlm-kmp-default-5.3.18-150300.59.153.2 * kernel-default-base-5.3.18-150300.59.153.2.150300.18.90.2 * kernel-default-livepatch-5.3.18-150300.59.153.2 * kernel-syms-5.3.18-150300.59.153.1 * kernel-default-debugsource-5.3.18-150300.59.153.2 * reiserfs-kmp-default-debuginfo-5.3.18-150300.59.153.2 * kselftests-kmp-default-debuginfo-5.3.18-150300.59.153.2 * kernel-default-debuginfo-5.3.18-150300.59.153.2 * gfs2-kmp-default-5.3.18-150300.59.153.2 * kernel-default-optional-debuginfo-5.3.18-150300.59.153.2 * ocfs2-kmp-default-5.3.18-150300.59.153.2 * kernel-default-base-rebuild-5.3.18-150300.59.153.2.150300.18.90.2 * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-5.3.18-150300.59.153.2 * openSUSE Leap 15.3 (ppc64le s390x x86_64) * kernel-livepatch-5_3_18-150300_59_153-default-debuginfo-1-150300.7.3.2 * kernel-livepatch-5_3_18-150300_59_153-default-1-150300.7.3.2 * kernel-livepatch-SLE15-SP3_Update_42-debugsource-1-150300.7.3.2 * openSUSE Leap 15.3 (x86_64) * kernel-livepatch-5_3_18-150300_59_153-preempt-1-150300.7.3.2 * kernel-livepatch-5_3_18-150300_59_153-preempt-debuginfo-1-150300.7.3.2 * openSUSE Leap 15.3 (aarch64 x86_64) * kselftests-kmp-preempt-5.3.18-150300.59.153.2 * cluster-md-kmp-preempt-debuginfo-5.3.18-150300.59.153.2 * kernel-preempt-devel-5.3.18-150300.59.153.2 * kernel-preempt-optional-5.3.18-150300.59.153.2 * dlm-kmp-preempt-5.3.18-150300.59.153.2 * ocfs2-kmp-preempt-5.3.18-150300.59.153.2 * dlm-kmp-preempt-debuginfo-5.3.18-150300.59.153.2 * kernel-preempt-debugsource-5.3.18-150300.59.153.2 * kernel-preempt-devel-debuginfo-5.3.18-150300.59.153.2 * kernel-preempt-extra-5.3.18-150300.59.153.2 * reiserfs-kmp-preempt-debuginfo-5.3.18-150300.59.153.2 * kernel-preempt-debuginfo-5.3.18-150300.59.153.2 * kernel-preempt-optional-debuginfo-5.3.18-150300.59.153.2 * kernel-preempt-extra-debuginfo-5.3.18-150300.59.153.2 * gfs2-kmp-preempt-5.3.18-150300.59.153.2 * gfs2-kmp-preempt-debuginfo-5.3.18-150300.59.153.2 * kselftests-kmp-preempt-debuginfo-5.3.18-150300.59.153.2 * reiserfs-kmp-preempt-5.3.18-150300.59.153.2 * cluster-md-kmp-preempt-5.3.18-150300.59.153.2 * kernel-preempt-livepatch-devel-5.3.18-150300.59.153.2 * ocfs2-kmp-preempt-debuginfo-5.3.18-150300.59.153.2 * openSUSE Leap 15.3 (aarch64 nosrc x86_64) * kernel-preempt-5.3.18-150300.59.153.2 * openSUSE Leap 15.3 (nosrc s390x) * kernel-zfcpdump-5.3.18-150300.59.153.2 * openSUSE Leap 15.3 (s390x) * kernel-zfcpdump-debugsource-5.3.18-150300.59.153.2 * kernel-zfcpdump-debuginfo-5.3.18-150300.59.153.2 * openSUSE Leap 15.3 (nosrc) * dtb-aarch64-5.3.18-150300.59.153.1 * openSUSE Leap 15.3 (aarch64) * kernel-64kb-debuginfo-5.3.18-150300.59.153.2 * gfs2-kmp-64kb-debuginfo-5.3.18-150300.59.153.2 * dtb-sprd-5.3.18-150300.59.153.1 * dtb-exynos-5.3.18-150300.59.153.1 * dtb-zte-5.3.18-150300.59.153.1 * dtb-broadcom-5.3.18-150300.59.153.1 * gfs2-kmp-64kb-5.3.18-150300.59.153.2 * reiserfs-kmp-64kb-5.3.18-150300.59.153.2 * kernel-64kb-extra-5.3.18-150300.59.153.2 * ocfs2-kmp-64kb-5.3.18-150300.59.153.2 * kselftests-kmp-64kb-5.3.18-150300.59.153.2 * dtb-cavium-5.3.18-150300.59.153.1 * dtb-socionext-5.3.18-150300.59.153.1 * kernel-64kb-extra-debuginfo-5.3.18-150300.59.153.2 * dlm-kmp-64kb-debuginfo-5.3.18-150300.59.153.2 * ocfs2-kmp-64kb-debuginfo-5.3.18-150300.59.153.2 * dtb-rockchip-5.3.18-150300.59.153.1 * cluster-md-kmp-64kb-5.3.18-150300.59.153.2 * reiserfs-kmp-64kb-debuginfo-5.3.18-150300.59.153.2 * dtb-allwinner-5.3.18-150300.59.153.1 * dtb-hisilicon-5.3.18-150300.59.153.1 * dtb-amlogic-5.3.18-150300.59.153.1 * cluster-md-kmp-64kb-debuginfo-5.3.18-150300.59.153.2 * dlm-kmp-64kb-5.3.18-150300.59.153.2 * kernel-64kb-devel-debuginfo-5.3.18-150300.59.153.2 * kselftests-kmp-64kb-debuginfo-5.3.18-150300.59.153.2 * dtb-nvidia-5.3.18-150300.59.153.1 * kernel-64kb-livepatch-devel-5.3.18-150300.59.153.2 * dtb-qcom-5.3.18-150300.59.153.1 * kernel-64kb-optional-debuginfo-5.3.18-150300.59.153.2 * dtb-mediatek-5.3.18-150300.59.153.1 * dtb-arm-5.3.18-150300.59.153.1 * dtb-apm-5.3.18-150300.59.153.1 * kernel-64kb-debugsource-5.3.18-150300.59.153.2 * kernel-64kb-optional-5.3.18-150300.59.153.2 * dtb-altera-5.3.18-150300.59.153.1 * dtb-renesas-5.3.18-150300.59.153.1 * dtb-marvell-5.3.18-150300.59.153.1 * kernel-64kb-devel-5.3.18-150300.59.153.2 * dtb-xilinx-5.3.18-150300.59.153.1 * dtb-lg-5.3.18-150300.59.153.1 * dtb-al-5.3.18-150300.59.153.1 * dtb-freescale-5.3.18-150300.59.153.1 * dtb-amd-5.3.18-150300.59.153.1 * openSUSE Leap 15.3 (aarch64 nosrc) * kernel-64kb-5.3.18-150300.59.153.2 * SUSE Linux Enterprise Live Patching 15-SP3 (nosrc) * kernel-default-5.3.18-150300.59.153.2 * SUSE Linux Enterprise Live Patching 15-SP3 (ppc64le s390x x86_64) * kernel-default-livepatch-devel-5.3.18-150300.59.153.2 * kernel-default-livepatch-5.3.18-150300.59.153.2 * kernel-default-debugsource-5.3.18-150300.59.153.2 * kernel-livepatch-5_3_18-150300_59_153-default-1-150300.7.3.2 * kernel-default-debuginfo-5.3.18-150300.59.153.2 * SUSE Linux Enterprise High Availability Extension 15 SP3 (aarch64 ppc64le s390x x86_64) * dlm-kmp-default-debuginfo-5.3.18-150300.59.153.2 * gfs2-kmp-default-debuginfo-5.3.18-150300.59.153.2 * kernel-default-debugsource-5.3.18-150300.59.153.2 * cluster-md-kmp-default-debuginfo-5.3.18-150300.59.153.2 * cluster-md-kmp-default-5.3.18-150300.59.153.2 * gfs2-kmp-default-5.3.18-150300.59.153.2 * kernel-default-debuginfo-5.3.18-150300.59.153.2 * ocfs2-kmp-default-debuginfo-5.3.18-150300.59.153.2 * dlm-kmp-default-5.3.18-150300.59.153.2 * ocfs2-kmp-default-5.3.18-150300.59.153.2 * SUSE Linux Enterprise High Availability Extension 15 SP3 (nosrc) * kernel-default-5.3.18-150300.59.153.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 nosrc) * kernel-64kb-5.3.18-150300.59.153.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64) * kernel-64kb-debugsource-5.3.18-150300.59.153.2 * kernel-64kb-devel-5.3.18-150300.59.153.2 * kernel-64kb-debuginfo-5.3.18-150300.59.153.2 * kernel-64kb-devel-debuginfo-5.3.18-150300.59.153.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 nosrc x86_64) * kernel-preempt-5.3.18-150300.59.153.2 * kernel-default-5.3.18-150300.59.153.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * kernel-preempt-debuginfo-5.3.18-150300.59.153.2 * kernel-syms-5.3.18-150300.59.153.1 * kernel-obs-build-debugsource-5.3.18-150300.59.153.2 * kernel-preempt-devel-5.3.18-150300.59.153.2 * kernel-preempt-debugsource-5.3.18-150300.59.153.2 * kernel-default-devel-debuginfo-5.3.18-150300.59.153.2 * reiserfs-kmp-default-5.3.18-150300.59.153.2 * kernel-default-debugsource-5.3.18-150300.59.153.2 * kernel-preempt-devel-debuginfo-5.3.18-150300.59.153.2 * reiserfs-kmp-default-debuginfo-5.3.18-150300.59.153.2 * kernel-default-devel-5.3.18-150300.59.153.2 * kernel-default-debuginfo-5.3.18-150300.59.153.2 * kernel-default-base-5.3.18-150300.59.153.2.150300.18.90.2 * kernel-obs-build-5.3.18-150300.59.153.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * kernel-source-5.3.18-150300.59.153.2 * kernel-macros-5.3.18-150300.59.153.2 * kernel-devel-5.3.18-150300.59.153.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch nosrc) * kernel-docs-5.3.18-150300.59.153.2 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 nosrc) * kernel-64kb-5.3.18-150300.59.153.2 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64) * kernel-64kb-debugsource-5.3.18-150300.59.153.2 * kernel-64kb-devel-5.3.18-150300.59.153.2 * kernel-64kb-debuginfo-5.3.18-150300.59.153.2 * kernel-64kb-devel-debuginfo-5.3.18-150300.59.153.2 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-5.3.18-150300.59.153.2 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * kernel-syms-5.3.18-150300.59.153.1 * kernel-obs-build-debugsource-5.3.18-150300.59.153.2 * kernel-default-devel-debuginfo-5.3.18-150300.59.153.2 * reiserfs-kmp-default-5.3.18-150300.59.153.2 * kernel-default-debugsource-5.3.18-150300.59.153.2 * reiserfs-kmp-default-debuginfo-5.3.18-150300.59.153.2 * kernel-default-devel-5.3.18-150300.59.153.2 * kernel-default-debuginfo-5.3.18-150300.59.153.2 * kernel-default-base-5.3.18-150300.59.153.2.150300.18.90.2 * kernel-obs-build-5.3.18-150300.59.153.2 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch) * kernel-source-5.3.18-150300.59.153.2 * kernel-macros-5.3.18-150300.59.153.2 * kernel-devel-5.3.18-150300.59.153.2 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch nosrc) * kernel-docs-5.3.18-150300.59.153.2 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 nosrc x86_64) * kernel-preempt-5.3.18-150300.59.153.2 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 x86_64) * kernel-preempt-debuginfo-5.3.18-150300.59.153.2 * kernel-preempt-devel-5.3.18-150300.59.153.2 * kernel-preempt-debugsource-5.3.18-150300.59.153.2 * kernel-preempt-devel-debuginfo-5.3.18-150300.59.153.2 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (nosrc s390x) * kernel-zfcpdump-5.3.18-150300.59.153.2 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (s390x) * kernel-zfcpdump-debugsource-5.3.18-150300.59.153.2 * kernel-zfcpdump-debuginfo-5.3.18-150300.59.153.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (nosrc ppc64le x86_64) * kernel-default-5.3.18-150300.59.153.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * kernel-syms-5.3.18-150300.59.153.1 * kernel-obs-build-debugsource-5.3.18-150300.59.153.2 * kernel-default-devel-debuginfo-5.3.18-150300.59.153.2 * reiserfs-kmp-default-5.3.18-150300.59.153.2 * kernel-default-debugsource-5.3.18-150300.59.153.2 * reiserfs-kmp-default-debuginfo-5.3.18-150300.59.153.2 * kernel-default-devel-5.3.18-150300.59.153.2 * kernel-default-debuginfo-5.3.18-150300.59.153.2 * kernel-default-base-5.3.18-150300.59.153.2.150300.18.90.2 * kernel-obs-build-5.3.18-150300.59.153.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * kernel-source-5.3.18-150300.59.153.2 * kernel-macros-5.3.18-150300.59.153.2 * kernel-devel-5.3.18-150300.59.153.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch nosrc) * kernel-docs-5.3.18-150300.59.153.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (nosrc x86_64) * kernel-preempt-5.3.18-150300.59.153.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (x86_64) * kernel-preempt-debuginfo-5.3.18-150300.59.153.2 * kernel-preempt-devel-5.3.18-150300.59.153.2 * kernel-preempt-debugsource-5.3.18-150300.59.153.2 * kernel-preempt-devel-debuginfo-5.3.18-150300.59.153.2 * SUSE Enterprise Storage 7.1 (aarch64 nosrc) * kernel-64kb-5.3.18-150300.59.153.2 * SUSE Enterprise Storage 7.1 (aarch64) * kernel-64kb-debugsource-5.3.18-150300.59.153.2 * kernel-64kb-devel-5.3.18-150300.59.153.2 * kernel-64kb-debuginfo-5.3.18-150300.59.153.2 * kernel-64kb-devel-debuginfo-5.3.18-150300.59.153.2 * SUSE Enterprise Storage 7.1 (aarch64 nosrc x86_64) * kernel-preempt-5.3.18-150300.59.153.2 * kernel-default-5.3.18-150300.59.153.2 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * kernel-preempt-debuginfo-5.3.18-150300.59.153.2 * kernel-syms-5.3.18-150300.59.153.1 * kernel-obs-build-debugsource-5.3.18-150300.59.153.2 * kernel-preempt-devel-5.3.18-150300.59.153.2 * kernel-preempt-debugsource-5.3.18-150300.59.153.2 * kernel-default-devel-debuginfo-5.3.18-150300.59.153.2 * reiserfs-kmp-default-5.3.18-150300.59.153.2 * kernel-default-debugsource-5.3.18-150300.59.153.2 * kernel-preempt-devel-debuginfo-5.3.18-150300.59.153.2 * reiserfs-kmp-default-debuginfo-5.3.18-150300.59.153.2 * kernel-default-devel-5.3.18-150300.59.153.2 * kernel-default-debuginfo-5.3.18-150300.59.153.2 * kernel-default-base-5.3.18-150300.59.153.2.150300.18.90.2 * kernel-obs-build-5.3.18-150300.59.153.2 * SUSE Enterprise Storage 7.1 (noarch) * kernel-source-5.3.18-150300.59.153.2 * kernel-macros-5.3.18-150300.59.153.2 * kernel-devel-5.3.18-150300.59.153.2 * SUSE Enterprise Storage 7.1 (noarch nosrc) * kernel-docs-5.3.18-150300.59.153.2 * SUSE Linux Enterprise Micro 5.1 (aarch64 nosrc s390x x86_64) * kernel-default-5.3.18-150300.59.153.2 * SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64) * kernel-default-base-5.3.18-150300.59.153.2.150300.18.90.2 * kernel-default-debuginfo-5.3.18-150300.59.153.2 * kernel-default-debugsource-5.3.18-150300.59.153.2 * SUSE Linux Enterprise Micro 5.2 (aarch64 nosrc s390x x86_64) * kernel-default-5.3.18-150300.59.153.2 * SUSE Linux Enterprise Micro 5.2 (aarch64 x86_64) * kernel-default-base-5.3.18-150300.59.153.2.150300.18.90.2 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * kernel-default-debuginfo-5.3.18-150300.59.153.2 * kernel-default-debugsource-5.3.18-150300.59.153.2 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 nosrc s390x x86_64) * kernel-default-5.3.18-150300.59.153.2 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 x86_64) * kernel-default-base-5.3.18-150300.59.153.2.150300.18.90.2 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * kernel-default-debuginfo-5.3.18-150300.59.153.2 * kernel-default-debugsource-5.3.18-150300.59.153.2


References

* bsc#1200599 * bsc#1207653 * bsc#1212514 * bsc#1213456 * bsc#1216223 * bsc#1218195 * bsc#1218689 * bsc#1218915 * bsc#1219127 * bsc#1219128 * bsc#1219146 * bsc#1219295 * bsc#1219653 * bsc#1219827 * bsc#1219835 * bsc#1219915 * bsc#1220009 * bsc#1220140 * bsc#1220187 * bsc#1220238 * bsc#1220240 * bsc#1220241 * bsc#1220243 * bsc#1220250 * bsc#1220253 * bsc#1220255 * bsc#1220328 * bsc#1220330 * bsc#1220344 * bsc#1220398 * bsc#1220409 * bsc#1220416 * bsc#1220418 * bsc#1220421 * bsc#1220436 * bsc#1220444 * bsc#1220459 * bsc#1220469 * bsc#1220482 * bsc#1220526 * bsc#1220538 * bsc#1220570 * bsc#1220572 * bsc#1220599 * bsc#1220627 * bsc#1220641 * bsc#1220649 * bsc#1220660 * bsc#1220689 * bsc#1220700 * bsc#1220735 * bsc#1220736 * bsc#1220737 * bsc#1220742 * bsc#1220745 * bsc#1220767 * bsc#1220796 * bsc#1220825 * bsc#1220826 * bsc#1220831 * bsc#1220845 * bsc#1220860 * bsc#1220863 * bsc#1220870 * bsc#1220917 * bsc#1220918 * bsc#1220930 * bsc#1220931 * bsc#1220932 * bsc#1221039 * bsc#1221040 ## References: * https://www.suse.com/security/cve/CVE-2019-25162.html * https://www.suse.com/security/cve/CVE-2020-36777.html * https://www.suse.com/security/cve/CVE-2020-36784.html * https://www.suse.com/security/cve/CVE-2021-46904.html * https://www.suse.com/security/cve/CVE-2021-46905.html * https://www.suse.com/security/cve/CVE-2021-46906.html * https://www.suse.com/security/cve/CVE-2021-46915.html * https://www.suse.com/security/cve/CVE-2021-46924.html * https://www.suse.com/security/cve/CVE-2021-46929.html * https://www.suse.com/security/cve/CVE-2021-46932.html * https://www.suse.com/security/cve/CVE-2021-46934.html * https://www.suse.com/security/cve/CVE-2021-46953.html * https://www.suse.com/security/cve/CVE-2021-46964.html * https://www.suse.com/security/cve/CVE-2021-46966.html * https://www.suse.com/security/cve/CVE-2021-46968.html * https://www.suse.com/security/cve/CVE-2021-46974.html * https://www.suse.com/security/cve/CVE-2021-46989.html * https://www.suse.com/security/cve/CVE-2021-47005.html * https://www.suse.com/security/cve/CVE-2021-47012.html * https://www.suse.com/security/cve/CVE-2021-47013.html * https://www.suse.com/security/cve/CVE-2021-47054.html * https://www.suse.com/security/cve/CVE-2021-47060.html * https://www.suse.com/security/cve/CVE-2021-47061.html * https://www.suse.com/security/cve/CVE-2021-47069.html * https://www.suse.com/security/cve/CVE-2021-47076.html * https://www.suse.com/security/cve/CVE-2021-47078.html * https://www.suse.com/security/cve/CVE-2021-47083.html * https://www.suse.com/security/cve/CVE-2022-20154.html * https://www.suse.com/security/cve/CVE-2022-48627.html * https://www.suse.com/security/cve/CVE-2023-28746.html * https://www.suse.com/security/cve/CVE-2023-35827.html * https://www.suse.com/security/cve/CVE-2023-46343.html * https://www.suse.com/security/cve/CVE-2023-51042.html * https://www.suse.com/security/cve/CVE-2023-52340.html * https://www.suse.com/security/cve/CVE-2023-52429.html * https://www.suse.com/security/cve/CVE-2023-52439.html * https://www.suse.com/security/cve/CVE-2023-52443.html * https://www.suse.com/security/cve/CVE-2023-52445.html * https://www.suse.com/security/cve/CVE-2023-52448.html * https://www.suse.com/security/cve/CVE-2023-52449.html * https://www.suse.com/security/cve/CVE-2023-52451.html * https://www.suse.com/security/cve/CVE-2023-52463.html * https://www.suse.com/security/cve/CVE-2023-52475.html * https://www.suse.com/security/cve/CVE-2023-52478.html * https://www.suse.com/security/cve/CVE-2023-52482.html * https://www.suse.com/security/cve/CVE-2023-52502.html * https://www.suse.com/security/cve/CVE-2023-52530.html * https://www.suse.com/security/cve/CVE-2023-52531.html * https://www.suse.com/security/cve/CVE-2023-52532.html * https://www.suse.com/security/cve/CVE-2023-52569.html * https://www.suse.com/security/cve/CVE-2023-52574.html * https://www.suse.com/security/cve/CVE-2023-52597.html * https://www.suse.com/security/cve/CVE-2023-52605.html * https://www.suse.com/security/cve/CVE-2023-6817.html * https://www.suse.com/security/cve/CVE-2024-0340.html * https://www.suse.com/security/cve/CVE-2024-0607.html * https://www.suse.com/security/cve/CVE-2024-1151.html * https://www.suse.com/security/cve/CVE-2024-23849.html * https://www.suse.com/security/cve/CVE-2024-23851.html * https://www.suse.com/security/cve/CVE-2024-26585.html * https://www.suse.com/security/cve/CVE-2024-26586.html * https://www.suse.com/security/cve/CVE-2024-26589.html * https://www.suse.com/security/cve/CVE-2024-26593.html * https://www.suse.com/security/cve/CVE-2024-26595.html * https://www.suse.com/security/cve/CVE-2024-26602.html * https://www.suse.com/security/cve/CVE-2024-26607.html * https://www.suse.com/security/cve/CVE-2024-26622.html * https://bugzilla.suse.com/show_bug.cgi?id=1200599 * https://bugzilla.suse.com/show_bug.cgi?id=1207653 * https://bugzilla.suse.com/show_bug.cgi?id=1212514 * https://bugzilla.suse.com/show_bug.cgi?id=1213456 * https://bugzilla.suse.com/show_bug.cgi?id=1216223 * https://bugzilla.suse.com/show_bug.cgi?id=1218195 * https://bugzilla.suse.com/show_bug.cgi?id=1218689 * https://bugzilla.suse.com/show_bug.cgi?id=1218915 * https://bugzilla.suse.com/show_bug.cgi?id=1219127 * https://bugzilla.suse.com/show_bug.cgi?id=1219128 * https://bugzilla.suse.com/show_bug.cgi?id=1219146 * https://bugzilla.suse.com/show_bug.cgi?id=1219295 * https://bugzilla.suse.com/show_bug.cgi?id=1219653 * https://bugzilla.suse.com/show_bug.cgi?id=1219827 * https://bugzilla.suse.com/show_bug.cgi?id=1219835 * https://bugzilla.suse.com/show_bug.cgi?id=1219915 * https://bugzilla.suse.com/show_bug.cgi?id=1220009 * https://bugzilla.suse.com/show_bug.cgi?id=1220140 * https://bugzilla.suse.com/show_bug.cgi?id=1220187 * https://bugzilla.suse.com/show_bug.cgi?id=1220238 * https://bugzilla.suse.com/show_bug.cgi?id=1220240 * https://bugzilla.suse.com/show_bug.cgi?id=1220241 * https://bugzilla.suse.com/show_bug.cgi?id=1220243 * https://bugzilla.suse.com/show_bug.cgi?id=1220250 * https://bugzilla.suse.com/show_bug.cgi?id=1220253 * https://bugzilla.suse.com/show_bug.cgi?id=1220255 * https://bugzilla.suse.com/show_bug.cgi?id=1220328 * https://bugzilla.suse.com/show_bug.cgi?id=1220330 * https://bugzilla.suse.com/show_bug.cgi?id=1220344 * https://bugzilla.suse.com/show_bug.cgi?id=1220398 * https://bugzilla.suse.com/show_bug.cgi?id=1220409 * https://bugzilla.suse.com/show_bug.cgi?id=1220416 * https://bugzilla.suse.com/show_bug.cgi?id=1220418 * https://bugzilla.suse.com/show_bug.cgi?id=1220421 * https://bugzilla.suse.com/show_bug.cgi?id=1220436 * https://bugzilla.suse.com/show_bug.cgi?id=1220444 * https://bugzilla.suse.com/show_bug.cgi?id=1220459 * https://bugzilla.suse.com/show_bug.cgi?id=1220469 * https://bugzilla.suse.com/show_bug.cgi?id=1220482 * https://bugzilla.suse.com/show_bug.cgi?id=1220526 * https://bugzilla.suse.com/show_bug.cgi?id=1220538 * https://bugzilla.suse.com/show_bug.cgi?id=1220570 * https://bugzilla.suse.com/show_bug.cgi?id=1220572 * https://bugzilla.suse.com/show_bug.cgi?id=1220599 * https://bugzilla.suse.com/show_bug.cgi?id=1220627 * https://bugzilla.suse.com/show_bug.cgi?id=1220641 * https://bugzilla.suse.com/show_bug.cgi?id=1220649 * https://bugzilla.suse.com/show_bug.cgi?id=1220660 * https://bugzilla.suse.com/show_bug.cgi?id=1220689 * https://bugzilla.suse.com/show_bug.cgi?id=1220700 * https://bugzilla.suse.com/show_bug.cgi?id=1220735 * https://bugzilla.suse.com/show_bug.cgi?id=1220736 * https://bugzilla.suse.com/show_bug.cgi?id=1220737 * https://bugzilla.suse.com/show_bug.cgi?id=1220742 * https://bugzilla.suse.com/show_bug.cgi?id=1220745 * https://bugzilla.suse.com/show_bug.cgi?id=1220767 * https://bugzilla.suse.com/show_bug.cgi?id=1220796 * https://bugzilla.suse.com/show_bug.cgi?id=1220825 * https://bugzilla.suse.com/show_bug.cgi?id=1220826 * https://bugzilla.suse.com/show_bug.cgi?id=1220831 * https://bugzilla.suse.com/show_bug.cgi?id=1220845 * https://bugzilla.suse.com/show_bug.cgi?id=1220860 * https://bugzilla.suse.com/show_bug.cgi?id=1220863 * https://bugzilla.suse.com/show_bug.cgi?id=1220870 * https://bugzilla.suse.com/show_bug.cgi?id=1220917 * https://bugzilla.suse.com/show_bug.cgi?id=1220918 * https://bugzilla.suse.com/show_bug.cgi?id=1220930 * https://bugzilla.suse.com/show_bug.cgi?id=1220931 * https://bugzilla.suse.com/show_bug.cgi?id=1220932 * https://bugzilla.suse.com/show_bug.cgi?id=1221039 * https://bugzilla.suse.com/show_bug.cgi?id=1221040


Severity
Announcement ID: SUSE-SU-2024:0857-1
Rating: important

Related News