Comment # 59 on bug 1221077 from Maintenance Automation
SUSE-SU-2024:1465-1: An update that solves 145 vulnerabilities, contains five
features and has five security fixes can now be installed.

Category: security (important)
Bug References: 1192145, 1209657, 1218336, 1218447, 1218479, 1218562, 1219170,
1219264, 1220320, 1220340, 1220366, 1220400, 1220411, 1220413, 1220414,
1220425, 1220426, 1220429, 1220432, 1220442, 1220445, 1220465, 1220468,
1220475, 1220484, 1220486, 1220487, 1220516, 1220521, 1220528, 1220529,
1220532, 1220536, 1220554, 1220556, 1220557, 1220560, 1220561, 1220566,
1220575, 1220580, 1220583, 1220611, 1220615, 1220621, 1220625, 1220630,
1220631, 1220638, 1220639, 1220640, 1220662, 1220663, 1220669, 1220670,
1220677, 1220678, 1220685, 1220687, 1220688, 1220692, 1220697, 1220703,
1220706, 1220733, 1220734, 1220739, 1220743, 1220749, 1220751, 1220753,
1220758, 1220759, 1220764, 1220768, 1220769, 1220777, 1220779, 1220785,
1220790, 1220794, 1220824, 1220829, 1220836, 1220846, 1220850, 1220861,
1220871, 1220883, 1220946, 1220954, 1220969, 1220979, 1220982, 1220985,
1220987, 1221015, 1221044, 1221058, 1221061, 1221077, 1221088, 1221276,
1221293, 1221532, 1221534, 1221541, 1221548, 1221552, 1221575, 1221605,
1221606, 1221608, 1221830, 1221931, 1221932, 1221934, 1221935, 1221949,
1221952, 1221965, 1221966, 1221969, 1221973, 1221974, 1221978, 1221989,
1221990, 1221991, 1221992, 1221993, 1221994, 1221996, 1221997, 1221998,
1221999, 1222000, 1222001, 1222002, 1222003, 1222004, 1222117, 1222422,
1222585, 1222619, 1222660, 1222664, 1222669, 1222706, 1222878
CVE References: CVE-2020-36780, CVE-2020-36781, CVE-2020-36782, CVE-2020-36783,
CVE-2021-46908, CVE-2021-46909, CVE-2021-46911, CVE-2021-46914, CVE-2021-46917,
CVE-2021-46918, CVE-2021-46919, CVE-2021-46920, CVE-2021-46921, CVE-2021-46922,
CVE-2021-46930, CVE-2021-46931, CVE-2021-46933, CVE-2021-46938, CVE-2021-46939,
CVE-2021-46943, CVE-2021-46944, CVE-2021-46950, CVE-2021-46951, CVE-2021-46956,
CVE-2021-46958, CVE-2021-46959, CVE-2021-46960, CVE-2021-46961, CVE-2021-46962,
CVE-2021-46963, CVE-2021-46971, CVE-2021-46976, CVE-2021-46980, CVE-2021-46981,
CVE-2021-46983, CVE-2021-46984, CVE-2021-46988, CVE-2021-46990, CVE-2021-46991,
CVE-2021-46992, CVE-2021-46998, CVE-2021-47000, CVE-2021-47001, CVE-2021-47003,
CVE-2021-47006, CVE-2021-47009, CVE-2021-47014, CVE-2021-47015, CVE-2021-47017,
CVE-2021-47020, CVE-2021-47026, CVE-2021-47034, CVE-2021-47035, CVE-2021-47038,
CVE-2021-47044, CVE-2021-47045, CVE-2021-47046, CVE-2021-47049, CVE-2021-47051,
CVE-2021-47055, CVE-2021-47056, CVE-2021-47058, CVE-2021-47063, CVE-2021-47065,
CVE-2021-47068, CVE-2021-47070, CVE-2021-47071, CVE-2021-47073, CVE-2021-47077,
CVE-2021-47082, CVE-2021-47087, CVE-2021-47095, CVE-2021-47097, CVE-2021-47100,
CVE-2021-47101, CVE-2021-47109, CVE-2021-47110, CVE-2021-47112, CVE-2021-47114,
CVE-2021-47117, CVE-2021-47118, CVE-2021-47119, CVE-2021-47120, CVE-2021-47130,
CVE-2021-47136, CVE-2021-47137, CVE-2021-47138, CVE-2021-47139, CVE-2021-47141,
CVE-2021-47142, CVE-2021-47144, CVE-2021-47150, CVE-2021-47153, CVE-2021-47160,
CVE-2021-47161, CVE-2021-47164, CVE-2021-47165, CVE-2021-47166, CVE-2021-47167,
CVE-2021-47168, CVE-2021-47169, CVE-2021-47170, CVE-2021-47171, CVE-2021-47172,
CVE-2021-47173, CVE-2021-47174, CVE-2021-47175, CVE-2021-47176, CVE-2021-47177,
CVE-2021-47179, CVE-2021-47180, CVE-2021-47181, CVE-2021-47183, CVE-2021-47185,
CVE-2021-47189, CVE-2021-47202, CVE-2022-48626, CVE-2023-0160, CVE-2023-52454,
CVE-2023-52469, CVE-2023-52470, CVE-2023-52474, CVE-2023-52476, CVE-2023-52477,
CVE-2023-52492, CVE-2023-52500, CVE-2023-52508, CVE-2023-52509, CVE-2023-52572,
CVE-2023-52575, CVE-2023-52583, CVE-2023-52590, CVE-2023-52591, CVE-2023-52607,
CVE-2023-52628, CVE-2023-6270, CVE-2023-6531, CVE-2023-7042, CVE-2023-7192,
CVE-2024-22099, CVE-2024-26600, CVE-2024-26614, CVE-2024-26642, CVE-2024-26704,
CVE-2024-26733
Jira References: PED-5759, SLE-13706, SLE-15131, SLE-15172, SLE-15176
Maintenance Incident:
[SUSE:Maintenance:33363](https://smelt.suse.de/incident/33363/)
Sources used:
SUSE Linux Enterprise Micro 5.1 (src):
 kernel-source-rt-5.3.18-150300.166.1
SUSE Linux Enterprise Micro 5.2 (src):
 kernel-source-rt-5.3.18-150300.166.1
SUSE Linux Enterprise Micro for Rancher 5.2 (src):
 kernel-source-rt-5.3.18-150300.166.1

NOTE: This line indicates an update has been released for the listed
product(s). At times this might be only a partial fix. If you have questions
please reach out to maintenance coordination.


You are receiving this mail because: