Comment # 30 on bug 1226212 from Maintenance Automation
SUSE-SU-2024:2561-1: An update that solves 176 vulnerabilities and has 17
security fixes can now be installed.

Category: security (important)
Bug References: 1119113, 1171988, 1191958, 1195065, 1195254, 1195775, 1204514,
1215420, 1216062, 1217912, 1218148, 1219224, 1220833, 1221010, 1221647,
1221654, 1221656, 1221659, 1221791, 1221958, 1222005, 1222015, 1222080,
1222364, 1222385, 1222435, 1222792, 1222809, 1222866, 1222879, 1222893,
1223013, 1223018, 1223021, 1223043, 1223188, 1223384, 1223532, 1223641,
1224177, 1224432, 1224504, 1224549, 1224552, 1224572, 1224575, 1224583,
1224588, 1224605, 1224622, 1224627, 1224647, 1224651, 1224660, 1224661,
1224662, 1224664, 1224668, 1224670, 1224672, 1224674, 1224677, 1224678,
1224683, 1224686, 1224703, 1224735, 1224739, 1224743, 1224763, 1224764,
1224765, 1224946, 1224951, 1224965, 1224967, 1224976, 1224977, 1224978,
1224993, 1224997, 1225047, 1225140, 1225184, 1225203, 1225229, 1225232,
1225261, 1225306, 1225337, 1225357, 1225372, 1225431, 1225463, 1225478,
1225484, 1225487, 1225490, 1225505, 1225514, 1225518, 1225530, 1225532,
1225548, 1225555, 1225556, 1225559, 1225569, 1225571, 1225573, 1225577,
1225583, 1225585, 1225593, 1225599, 1225602, 1225611, 1225642, 1225681,
1225704, 1225722, 1225749, 1225758, 1225760, 1225761, 1225767, 1225770,
1225815, 1225835, 1225840, 1225848, 1225866, 1225872, 1225894, 1225895,
1225898, 1226211, 1226212, 1226537, 1226554, 1226557, 1226562, 1226567,
1226575, 1226577, 1226593, 1226595, 1226597, 1226610, 1226614, 1226619,
1226621, 1226634, 1226637, 1226670, 1226672, 1226692, 1226698, 1226699,
1226701, 1226705, 1226708, 1226711, 1226712, 1226716, 1226718, 1226732,
1226735, 1226744, 1226746, 1226747, 1226749, 1226754, 1226757, 1226767,
1226769, 1226857, 1226861, 1226876, 1226883, 1226886, 1226895, 1226948,
1226949, 1226950, 1226962, 1226976, 1226994, 1226996, 1227101, 1227407,
1227435, 1227487
CVE References: CVE-2020-10135, CVE-2021-43389, CVE-2021-4439, CVE-2021-47103,
CVE-2021-47145, CVE-2021-47191, CVE-2021-47193, CVE-2021-47201, CVE-2021-47267,
CVE-2021-47270, CVE-2021-47275, CVE-2021-47293, CVE-2021-47294, CVE-2021-47297,
CVE-2021-47309, CVE-2021-47328, CVE-2021-47354, CVE-2021-47372, CVE-2021-47379,
CVE-2021-47407, CVE-2021-47418, CVE-2021-47434, CVE-2021-47438, CVE-2021-47445,
CVE-2021-47498, CVE-2021-47518, CVE-2021-47520, CVE-2021-47544, CVE-2021-47547,
CVE-2021-47566, CVE-2021-47571, CVE-2021-47576, CVE-2021-47587, CVE-2021-47589,
CVE-2021-47600, CVE-2021-47602, CVE-2021-47603, CVE-2021-47609, CVE-2021-47617,
CVE-2022-0435, CVE-2022-22942, CVE-2022-48711, CVE-2022-48715, CVE-2022-48722,
CVE-2022-48732, CVE-2022-48733, CVE-2022-48740, CVE-2022-48743, CVE-2022-48754,
CVE-2022-48756, CVE-2022-48758, CVE-2022-48759, CVE-2022-48760, CVE-2022-48761,
CVE-2022-48771, CVE-2022-48772, CVE-2023-24023, CVE-2023-4244, CVE-2023-52507,
CVE-2023-52622, CVE-2023-52675, CVE-2023-52683, CVE-2023-52693, CVE-2023-52737,
CVE-2023-52752, CVE-2023-52753, CVE-2023-52754, CVE-2023-52757, CVE-2023-52762,
CVE-2023-52764, CVE-2023-52784, CVE-2023-52808, CVE-2023-52809, CVE-2023-5281,
CVE-2023-52817, CVE-2023-52818, CVE-2023-52819, CVE-2023-52832, CVE-2023-52834,
CVE-2023-52835, CVE-2023-52843, CVE-2023-52845, CVE-2023-52855, CVE-2023-52881,
CVE-2024-26633, CVE-2024-26635, CVE-2024-26636, CVE-2024-26641, CVE-2024-26679,
CVE-2024-26687, CVE-2024-26720, CVE-2024-26813, CVE-2024-26845, CVE-2024-26863,
CVE-2024-26880, CVE-2024-26894, CVE-2024-26923, CVE-2024-26928, CVE-2024-26973,
CVE-2024-27399, CVE-2024-27410, CVE-2024-35247, CVE-2024-35805, CVE-2024-35807,
CVE-2024-35819, CVE-2024-35822, CVE-2024-35828, CVE-2024-35835, CVE-2024-35862,
CVE-2024-35863, CVE-2024-35864, CVE-2024-35865, CVE-2024-35867, CVE-2024-35868,
CVE-2024-35870, CVE-2024-35886, CVE-2024-35896, CVE-2024-35922, CVE-2024-35925,
CVE-2024-35930, CVE-2024-35947, CVE-2024-35950, CVE-2024-35956, CVE-2024-35958,
CVE-2024-35960, CVE-2024-35962, CVE-2024-35976, CVE-2024-35979, CVE-2024-35997,
CVE-2024-35998, CVE-2024-36014, CVE-2024-36016, CVE-2024-36017, CVE-2024-36025,
CVE-2024-36479, CVE-2024-36880, CVE-2024-36894, CVE-2024-36915, CVE-2024-36917,
CVE-2024-36919, CVE-2024-36923, CVE-2024-36934, CVE-2024-36938, CVE-2024-36940,
CVE-2024-36941, CVE-2024-36949, CVE-2024-36950, CVE-2024-36952, CVE-2024-36960,
CVE-2024-36964, CVE-2024-37021, CVE-2024-37354, CVE-2024-38544, CVE-2024-38545,
CVE-2024-38546, CVE-2024-38549, CVE-2024-38552, CVE-2024-38553, CVE-2024-38565,
CVE-2024-38567, CVE-2024-38578, CVE-2024-38579, CVE-2024-38580, CVE-2024-38597,
CVE-2024-38598, CVE-2024-38601, CVE-2024-38608, CVE-2024-38618, CVE-2024-38619,
CVE-2024-38621, CVE-2024-38627, CVE-2024-38659, CVE-2024-38661, CVE-2024-38780,
CVE-2024-39301, CVE-2024-39475
Maintenance Incident:
[SUSE:Maintenance:34719](https://smelt.suse.de/incident/34719/)
Sources used:
SUSE Linux Enterprise Live Patching 12-SP5 (src):
 kgraft-patch-SLE12-SP5_Update_58-1-8.3.1
SUSE Linux Enterprise Software Development Kit 12 SP5 (src):
 kernel-obs-build-4.12.14-122.222.1
SUSE Linux Enterprise High Performance Computing 12 SP5 (src):
 kernel-syms-4.12.14-122.222.1, kernel-source-4.12.14-122.222.1
SUSE Linux Enterprise Server 12 SP5 (src):
 kernel-syms-4.12.14-122.222.1, kernel-source-4.12.14-122.222.1
SUSE Linux Enterprise Server for SAP Applications 12 SP5 (src):
 kernel-syms-4.12.14-122.222.1, kernel-source-4.12.14-122.222.1

NOTE: This line indicates an update has been released for the listed
product(s). At times this might be only a partial fix. If you have questions
please reach out to maintenance coordination.


You are receiving this mail because: