Comment # 43 on bug 1221077 from Maintenance Automation
SUSE-SU-2024:1321-1: An update that solves 77 vulnerabilities, contains one
feature and has two security fixes can now be installed.

Category: security (important)
Bug References: 1200599, 1209635, 1212514, 1213456, 1217987, 1217988, 1217989,
1220237, 1220251, 1220320, 1220340, 1220366, 1220411, 1220413, 1220439,
1220443, 1220445, 1220466, 1220478, 1220482, 1220484, 1220486, 1220487,
1220790, 1220831, 1220833, 1220836, 1220839, 1220840, 1220843, 1220870,
1220871, 1220872, 1220878, 1220879, 1220885, 1220898, 1220918, 1220920,
1220921, 1220926, 1220927, 1220929, 1220932, 1220938, 1220940, 1220954,
1220955, 1220959, 1220960, 1220961, 1220965, 1220969, 1220978, 1220979,
1220981, 1220982, 1220983, 1220985, 1220986, 1220987, 1220989, 1220990,
1221009, 1221012, 1221015, 1221022, 1221039, 1221040, 1221048, 1221055,
1221058, 1221077, 1221276, 1221551, 1221553, 1221725, 1222073, 1222619
CVE References: CVE-2021-46925, CVE-2021-46926, CVE-2021-46927, CVE-2021-46929,
CVE-2021-46930, CVE-2021-46931, CVE-2021-46933, CVE-2021-46936, CVE-2021-47082,
CVE-2021-47087, CVE-2021-47091, CVE-2021-47093, CVE-2021-47094, CVE-2021-47095,
CVE-2021-47096, CVE-2021-47097, CVE-2021-47098, CVE-2021-47099, CVE-2021-47100,
CVE-2021-47101, CVE-2021-47102, CVE-2021-47104, CVE-2021-47105, CVE-2021-47107,
CVE-2021-47108, CVE-2022-20154, CVE-2022-4744, CVE-2022-48626, CVE-2022-48629,
CVE-2022-48630, CVE-2023-28746, CVE-2023-35827, CVE-2023-52447, CVE-2023-52450,
CVE-2023-52454, CVE-2023-52469, CVE-2023-52470, CVE-2023-52474, CVE-2023-52477,
CVE-2023-52492, CVE-2023-52497, CVE-2023-52501, CVE-2023-52502, CVE-2023-52504,
CVE-2023-52507, CVE-2023-52508, CVE-2023-52509, CVE-2023-52510, CVE-2023-52511,
CVE-2023-52513, CVE-2023-52515, CVE-2023-52517, CVE-2023-52519, CVE-2023-52520,
CVE-2023-52523, CVE-2023-52524, CVE-2023-52525, CVE-2023-52528, CVE-2023-52529,
CVE-2023-52532, CVE-2023-52564, CVE-2023-52566, CVE-2023-52567, CVE-2023-52569,
CVE-2023-52574, CVE-2023-52575, CVE-2023-52576, CVE-2023-52582, CVE-2023-52583,
CVE-2023-52597, CVE-2023-52605, CVE-2023-52621, CVE-2023-6356, CVE-2023-6535,
CVE-2023-6536, CVE-2024-25742, CVE-2024-26600
Jira References: PED-5759
Maintenance Incident:
[SUSE:Maintenance:33231](https://smelt.suse.de/incident/33231/)
Sources used:
openSUSE Leap 15.4 (src):
 kernel-obs-build-5.14.21-150400.24.116.1,
kernel-obs-qa-5.14.21-150400.24.116.1, kernel-syms-5.14.21-150400.24.116.1,
kernel-source-5.14.21-150400.24.116.1,
kernel-livepatch-SLE15-SP4_Update_25-1-150400.9.5.1,
kernel-default-base-5.14.21-150400.24.116.1.150400.24.54.5
openSUSE Leap Micro 5.3 (src):
 kernel-default-base-5.14.21-150400.24.116.1.150400.24.54.5
openSUSE Leap Micro 5.4 (src):
 kernel-default-base-5.14.21-150400.24.116.1.150400.24.54.5
SUSE Linux Enterprise Micro for Rancher 5.3 (src):
 kernel-default-base-5.14.21-150400.24.116.1.150400.24.54.5
SUSE Linux Enterprise Micro 5.3 (src):
 kernel-default-base-5.14.21-150400.24.116.1.150400.24.54.5
SUSE Linux Enterprise Micro for Rancher 5.4 (src):
 kernel-default-base-5.14.21-150400.24.116.1.150400.24.54.5
SUSE Linux Enterprise Micro 5.4 (src):
 kernel-default-base-5.14.21-150400.24.116.1.150400.24.54.5
SUSE Linux Enterprise Live Patching 15-SP4 (src):
 kernel-livepatch-SLE15-SP4_Update_25-1-150400.9.5.1
SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (src):
 kernel-default-base-5.14.21-150400.24.116.1.150400.24.54.5,
kernel-obs-build-5.14.21-150400.24.116.1, kernel-syms-5.14.21-150400.24.116.1,
kernel-source-5.14.21-150400.24.116.1
SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (src):
 kernel-default-base-5.14.21-150400.24.116.1.150400.24.54.5,
kernel-obs-build-5.14.21-150400.24.116.1, kernel-syms-5.14.21-150400.24.116.1,
kernel-source-5.14.21-150400.24.116.1
SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (src):
 kernel-default-base-5.14.21-150400.24.116.1.150400.24.54.5,
kernel-obs-build-5.14.21-150400.24.116.1, kernel-syms-5.14.21-150400.24.116.1,
kernel-source-5.14.21-150400.24.116.1
SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (src):
 kernel-default-base-5.14.21-150400.24.116.1.150400.24.54.5,
kernel-obs-build-5.14.21-150400.24.116.1, kernel-syms-5.14.21-150400.24.116.1,
kernel-source-5.14.21-150400.24.116.1
SUSE Linux Enterprise Server for SAP Applications 15 SP4 (src):
 kernel-default-base-5.14.21-150400.24.116.1.150400.24.54.5,
kernel-obs-build-5.14.21-150400.24.116.1, kernel-syms-5.14.21-150400.24.116.1,
kernel-source-5.14.21-150400.24.116.1
SUSE Manager Proxy 4.3 (src):
 kernel-default-base-5.14.21-150400.24.116.1.150400.24.54.5,
kernel-syms-5.14.21-150400.24.116.1, kernel-source-5.14.21-150400.24.116.1
SUSE Manager Retail Branch Server 4.3 (src):
 kernel-default-base-5.14.21-150400.24.116.1.150400.24.54.5,
kernel-source-5.14.21-150400.24.116.1
SUSE Manager Server 4.3 (src):
 kernel-default-base-5.14.21-150400.24.116.1.150400.24.54.5,
kernel-syms-5.14.21-150400.24.116.1, kernel-source-5.14.21-150400.24.116.1

NOTE: This line indicates an update has been released for the listed
product(s). At times this might be only a partial fix. If you have questions
please reach out to maintenance coordination.


You are receiving this mail because: