Comment # 57 on bug 1221077 from Maintenance Automation
SUSE-SU-2024:1454-1: An update that solves 114 vulnerabilities, contains one
feature and has four security fixes can now be installed.

Category: security (important)
Bug References: 1186060, 1192145, 1194516, 1208995, 1209635, 1209657, 1212514,
1213456, 1217987, 1217988, 1217989, 1218336, 1218447, 1218479, 1218562,
1219170, 1219264, 1220320, 1220340, 1220366, 1220411, 1220413, 1220442,
1220445, 1220468, 1220484, 1220521, 1220528, 1220529, 1220532, 1220536,
1220554, 1220556, 1220560, 1220561, 1220566, 1220575, 1220580, 1220583,
1220611, 1220615, 1220625, 1220631, 1220638, 1220640, 1220641, 1220662,
1220669, 1220687, 1220692, 1220697, 1220703, 1220706, 1220739, 1220743,
1220745, 1220749, 1220751, 1220764, 1220768, 1220769, 1220777, 1220779,
1220785, 1220790, 1220794, 1220826, 1220829, 1220836, 1220846, 1220850,
1220861, 1220871, 1220883, 1220946, 1220969, 1221044, 1221058, 1221061,
1221077, 1221088, 1221293, 1221532, 1221534, 1221541, 1221548, 1221575,
1221605, 1221606, 1221608, 1221830, 1221934, 1221935, 1221949, 1221952,
1221965, 1221966, 1221969, 1221989, 1221991, 1221992, 1221993, 1221994,
1221997, 1221998, 1221999, 1222000, 1222001, 1222002, 1222004, 1222117,
1222422, 1222585, 1222619, 1222660, 1222664, 1222669, 1222706
CVE References: CVE-2020-36780, CVE-2020-36782, CVE-2020-36783, CVE-2021-23134,
CVE-2021-46909, CVE-2021-46921, CVE-2021-46930, CVE-2021-46938, CVE-2021-46939,
CVE-2021-46943, CVE-2021-46944, CVE-2021-46950, CVE-2021-46951, CVE-2021-46958,
CVE-2021-46960, CVE-2021-46961, CVE-2021-46962, CVE-2021-46963, CVE-2021-46971,
CVE-2021-46981, CVE-2021-46984, CVE-2021-46988, CVE-2021-46990, CVE-2021-46991,
CVE-2021-46992, CVE-2021-46998, CVE-2021-47000, CVE-2021-47006, CVE-2021-47013,
CVE-2021-47015, CVE-2021-47020, CVE-2021-47034, CVE-2021-47045, CVE-2021-47049,
CVE-2021-47051, CVE-2021-47055, CVE-2021-47056, CVE-2021-47058, CVE-2021-47061,
CVE-2021-47063, CVE-2021-47065, CVE-2021-47068, CVE-2021-47069, CVE-2021-47070,
CVE-2021-47071, CVE-2021-47073, CVE-2021-47077, CVE-2021-47082, CVE-2021-47109,
CVE-2021-47110, CVE-2021-47112, CVE-2021-47114, CVE-2021-47117, CVE-2021-47118,
CVE-2021-47119, CVE-2021-47120, CVE-2021-47138, CVE-2021-47139, CVE-2021-47141,
CVE-2021-47142, CVE-2021-47144, CVE-2021-47153, CVE-2021-47161, CVE-2021-47165,
CVE-2021-47166, CVE-2021-47167, CVE-2021-47168, CVE-2021-47169, CVE-2021-47170,
CVE-2021-47171, CVE-2021-47172, CVE-2021-47173, CVE-2021-47177, CVE-2021-47179,
CVE-2021-47180, CVE-2021-47181, CVE-2021-47183, CVE-2021-47185, CVE-2021-47189,
CVE-2022-0487, CVE-2022-4744, CVE-2022-48626, CVE-2023-0160, CVE-2023-1192,
CVE-2023-28746, CVE-2023-35827, CVE-2023-52454, CVE-2023-52469, CVE-2023-52470,
CVE-2023-52474, CVE-2023-52476, CVE-2023-52477, CVE-2023-52500, CVE-2023-52509,
CVE-2023-52572, CVE-2023-52575, CVE-2023-52583, CVE-2023-52590, CVE-2023-52591,
CVE-2023-52607, CVE-2023-52628, CVE-2023-6270, CVE-2023-6356, CVE-2023-6531,
CVE-2023-6535, CVE-2023-6536, CVE-2023-7042, CVE-2023-7192, CVE-2024-22099,
CVE-2024-26600, CVE-2024-26614, CVE-2024-26642, CVE-2024-26704, CVE-2024-26733
Jira References: PED-5759
Maintenance Incident:
[SUSE:Maintenance:33232](https://smelt.suse.de/incident/33232/)
Sources used:
SUSE Linux Enterprise Live Patching 15-SP2 (src):
 kernel-livepatch-SLE15-SP2_Update_47-1-150200.5.3.3
SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (src):
 kernel-syms-5.3.18-150200.24.188.1, kernel-source-5.3.18-150200.24.188.1,
kernel-default-base-5.3.18-150200.24.188.1.150200.9.95.3,
kernel-obs-build-5.3.18-150200.24.188.1
SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (src):
 kernel-syms-5.3.18-150200.24.188.1, kernel-source-5.3.18-150200.24.188.1,
kernel-default-base-5.3.18-150200.24.188.1.150200.9.95.3,
kernel-obs-build-5.3.18-150200.24.188.1
SUSE Linux Enterprise Server for SAP Applications 15 SP2 (src):
 kernel-syms-5.3.18-150200.24.188.1, kernel-source-5.3.18-150200.24.188.1,
kernel-default-base-5.3.18-150200.24.188.1.150200.9.95.3,
kernel-obs-build-5.3.18-150200.24.188.1

NOTE: This line indicates an update has been released for the listed
product(s). At times this might be only a partial fix. If you have questions
please reach out to maintenance coordination.


You are receiving this mail because: