SUSE-SU-2024:1320-1: An update that solves 70 vulnerabilities, contains one feature and has two security fixes can now be installed. Category: security (important) Bug References: 1212514, 1220237, 1220320, 1220340, 1220366, 1220411, 1220413, 1220439, 1220443, 1220445, 1220466, 1220478, 1220482, 1220484, 1220486, 1220487, 1220790, 1220831, 1220833, 1220836, 1220839, 1220840, 1220843, 1220870, 1220871, 1220872, 1220878, 1220879, 1220885, 1220898, 1220918, 1220920, 1220921, 1220926, 1220927, 1220929, 1220932, 1220938, 1220940, 1220954, 1220955, 1220959, 1220960, 1220961, 1220965, 1220969, 1220978, 1220979, 1220981, 1220982, 1220983, 1220985, 1220986, 1220987, 1220989, 1220990, 1221009, 1221012, 1221015, 1221022, 1221039, 1221040, 1221048, 1221055, 1221058, 1221077, 1221276, 1221551, 1221553, 1221725, 1222073, 1222619 CVE References: CVE-2021-46925, CVE-2021-46926, CVE-2021-46927, CVE-2021-46929, CVE-2021-46930, CVE-2021-46931, CVE-2021-46933, CVE-2021-46936, CVE-2021-47082, CVE-2021-47087, CVE-2021-47091, CVE-2021-47093, CVE-2021-47094, CVE-2021-47095, CVE-2021-47096, CVE-2021-47097, CVE-2021-47098, CVE-2021-47099, CVE-2021-47100, CVE-2021-47101, CVE-2021-47102, CVE-2021-47104, CVE-2021-47105, CVE-2021-47107, CVE-2021-47108, CVE-2022-48626, CVE-2022-48629, CVE-2022-48630, CVE-2023-35827, CVE-2023-52450, CVE-2023-52454, CVE-2023-52469, CVE-2023-52470, CVE-2023-52474, CVE-2023-52477, CVE-2023-52492, CVE-2023-52497, CVE-2023-52501, CVE-2023-52502, CVE-2023-52504, CVE-2023-52507, CVE-2023-52508, CVE-2023-52509, CVE-2023-52510, CVE-2023-52511, CVE-2023-52513, CVE-2023-52515, CVE-2023-52517, CVE-2023-52519, CVE-2023-52520, CVE-2023-52523, CVE-2023-52524, CVE-2023-52525, CVE-2023-52528, CVE-2023-52529, CVE-2023-52532, CVE-2023-52564, CVE-2023-52566, CVE-2023-52567, CVE-2023-52569, CVE-2023-52574, CVE-2023-52575, CVE-2023-52576, CVE-2023-52582, CVE-2023-52583, CVE-2023-52597, CVE-2023-52605, CVE-2023-52621, CVE-2024-25742, CVE-2024-26600 Jira References: PED-5759 Maintenance Incident: [SUSE:Maintenance:33364](https://smelt.suse.de/incident/33364/) Sources used: SUSE Linux Enterprise Micro for Rancher 5.3 (src): kernel-source-rt-5.14.21-150400.15.76.1 SUSE Linux Enterprise Micro 5.3 (src): kernel-source-rt-5.14.21-150400.15.76.1 SUSE Linux Enterprise Micro for Rancher 5.4 (src): kernel-source-rt-5.14.21-150400.15.76.1 SUSE Linux Enterprise Micro 5.4 (src): kernel-source-rt-5.14.21-150400.15.76.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.