Comment # 96 on bug 1220569 from Maintenance Automation
SUSE-SU-2024:1659-1: An update that solves 218 vulnerabilities, contains two
features and has 29 security fixes can now be installed.

Category: security (important)
Bug References: 1177529, 1192145, 1211592, 1217408, 1218562, 1218917, 1219104,
1219126, 1219169, 1219170, 1219264, 1220342, 1220569, 1220761, 1220901,
1220915, 1220935, 1221042, 1221044, 1221080, 1221084, 1221088, 1221162,
1221299, 1221612, 1221617, 1221645, 1221791, 1221825, 1222011, 1222051,
1222247, 1222266, 1222294, 1222307, 1222357, 1222368, 1222379, 1222416,
1222422, 1222424, 1222427, 1222428, 1222430, 1222431, 1222435, 1222437,
1222445, 1222449, 1222482, 1222503, 1222520, 1222536, 1222549, 1222550,
1222557, 1222559, 1222585, 1222586, 1222596, 1222609, 1222610, 1222613,
1222615, 1222618, 1222624, 1222630, 1222632, 1222660, 1222662, 1222664,
1222666, 1222669, 1222671, 1222677, 1222678, 1222680, 1222703, 1222704,
1222706, 1222709, 1222710, 1222720, 1222721, 1222724, 1222726, 1222727,
1222764, 1222772, 1222773, 1222776, 1222781, 1222784, 1222785, 1222787,
1222790, 1222791, 1222792, 1222796, 1222798, 1222801, 1222812, 1222824,
1222829, 1222832, 1222836, 1222838, 1222866, 1222867, 1222869, 1222876,
1222878, 1222879, 1222881, 1222883, 1222888, 1222894, 1222901, 1222968,
1223012, 1223014, 1223016, 1223024, 1223030, 1223033, 1223034, 1223035,
1223036, 1223037, 1223041, 1223042, 1223051, 1223052, 1223056, 1223057,
1223058, 1223060, 1223061, 1223065, 1223066, 1223067, 1223068, 1223076,
1223078, 1223111, 1223115, 1223118, 1223187, 1223189, 1223190, 1223191,
1223196, 1223197, 1223198, 1223275, 1223323, 1223369, 1223380, 1223473,
1223474, 1223475, 1223477, 1223478, 1223479, 1223481, 1223482, 1223484,
1223487, 1223490, 1223496, 1223498, 1223499, 1223501, 1223502, 1223503,
1223505, 1223509, 1223511, 1223512, 1223513, 1223516, 1223517, 1223518,
1223519, 1223520, 1223522, 1223523, 1223525, 1223539, 1223574, 1223595,
1223598, 1223634, 1223643, 1223644, 1223645, 1223646, 1223648, 1223655,
1223657, 1223660, 1223661, 1223663, 1223664, 1223668, 1223686, 1223693,
1223705, 1223714, 1223735, 1223745, 1223784, 1223785, 1223790, 1223816,
1223821, 1223822, 1223824, 1223827, 1223834, 1223875, 1223876, 1223877,
1223878, 1223879, 1223894, 1223921, 1223922, 1223923, 1223924, 1223929,
1223931, 1223932, 1223934, 1223941, 1223948, 1223949, 1223950, 1223951,
1223952, 1223953, 1223956, 1223957, 1223960, 1223962, 1223963, 1223964
CVE References: CVE-2021-47047, CVE-2021-47181, CVE-2021-47182, CVE-2021-47183,
CVE-2021-47184, CVE-2021-47185, CVE-2021-47187, CVE-2021-47188, CVE-2021-47189,
CVE-2021-47191, CVE-2021-47192, CVE-2021-47193, CVE-2021-47194, CVE-2021-47195,
CVE-2021-47196, CVE-2021-47197, CVE-2021-47198, CVE-2021-47199, CVE-2021-47200,
CVE-2021-47201, CVE-2021-47202, CVE-2021-47203, CVE-2021-47204, CVE-2021-47205,
CVE-2021-47206, CVE-2021-47207, CVE-2021-47209, CVE-2021-47210, CVE-2021-47211,
CVE-2021-47212, CVE-2021-47214, CVE-2021-47215, CVE-2021-47216, CVE-2021-47217,
CVE-2021-47218, CVE-2021-47219, CVE-2022-48631, CVE-2022-48632, CVE-2022-48634,
CVE-2022-48636, CVE-2022-48637, CVE-2022-48638, CVE-2022-48639, CVE-2022-48640,
CVE-2022-48642, CVE-2022-48644, CVE-2022-48646, CVE-2022-48647, CVE-2022-48648,
CVE-2022-48650, CVE-2022-48651, CVE-2022-48652, CVE-2022-48653, CVE-2022-48654,
CVE-2022-48655, CVE-2022-48656, CVE-2022-48657, CVE-2022-48658, CVE-2022-48659,
CVE-2022-48660, CVE-2022-48662, CVE-2022-48663, CVE-2022-48667, CVE-2022-48668,
CVE-2022-48671, CVE-2022-48672, CVE-2022-48673, CVE-2022-48675, CVE-2022-48686,
CVE-2022-48687, CVE-2022-48688, CVE-2022-48690, CVE-2022-48692, CVE-2022-48693,
CVE-2022-48694, CVE-2022-48695, CVE-2022-48697, CVE-2022-48698, CVE-2022-48700,
CVE-2022-48701, CVE-2022-48702, CVE-2022-48703, CVE-2022-48704, CVE-2023-2860,
CVE-2023-52488, CVE-2023-52503, CVE-2023-52561, CVE-2023-52585, CVE-2023-52589,
CVE-2023-52590, CVE-2023-52591, CVE-2023-52593, CVE-2023-52614, CVE-2023-52616,
CVE-2023-52620, CVE-2023-52627, CVE-2023-52635, CVE-2023-52636, CVE-2023-52645,
CVE-2023-52652, CVE-2023-6270, CVE-2024-0639, CVE-2024-0841, CVE-2024-22099,
CVE-2024-23307, CVE-2024-23848, CVE-2024-23850, CVE-2024-26601, CVE-2024-26610,
CVE-2024-26656, CVE-2024-26660, CVE-2024-26671, CVE-2024-26673, CVE-2024-26675,
CVE-2024-26680, CVE-2024-26681, CVE-2024-26684, CVE-2024-26685, CVE-2024-26687,
CVE-2024-26688, CVE-2024-26689, CVE-2024-26696, CVE-2024-26697, CVE-2024-26702,
CVE-2024-26704, CVE-2024-26718, CVE-2024-26722, CVE-2024-26727, CVE-2024-26733,
CVE-2024-26736, CVE-2024-26737, CVE-2024-26739, CVE-2024-26743, CVE-2024-26744,
CVE-2024-26745, CVE-2024-26747, CVE-2024-26749, CVE-2024-26751, CVE-2024-26754,
CVE-2024-26760, CVE-2024-26763, CVE-2024-26764, CVE-2024-26766, CVE-2024-26769,
CVE-2024-26771, CVE-2024-26772, CVE-2024-26773, CVE-2024-26776, CVE-2024-26779,
CVE-2024-26783, CVE-2024-26787, CVE-2024-26790, CVE-2024-26792, CVE-2024-26793,
CVE-2024-26798, CVE-2024-26805, CVE-2024-26807, CVE-2024-26816, CVE-2024-26817,
CVE-2024-26820, CVE-2024-26825, CVE-2024-26830, CVE-2024-26833, CVE-2024-26836,
CVE-2024-26843, CVE-2024-26848, CVE-2024-26852, CVE-2024-26853, CVE-2024-26855,
CVE-2024-26856, CVE-2024-26857, CVE-2024-26861, CVE-2024-26862, CVE-2024-26866,
CVE-2024-26872, CVE-2024-26875, CVE-2024-26878, CVE-2024-26879, CVE-2024-26881,
CVE-2024-26882, CVE-2024-26883, CVE-2024-26884, CVE-2024-26885, CVE-2024-26891,
CVE-2024-26893, CVE-2024-26895, CVE-2024-26896, CVE-2024-26897, CVE-2024-26898,
CVE-2024-26901, CVE-2024-26903, CVE-2024-26917, CVE-2024-26927, CVE-2024-26948,
CVE-2024-26950, CVE-2024-26951, CVE-2024-26955, CVE-2024-26956, CVE-2024-26960,
CVE-2024-26965, CVE-2024-26966, CVE-2024-26969, CVE-2024-26970, CVE-2024-26972,
CVE-2024-26981, CVE-2024-26982, CVE-2024-26993, CVE-2024-27013, CVE-2024-27014,
CVE-2024-27030, CVE-2024-27038, CVE-2024-27039, CVE-2024-27041, CVE-2024-27043,
CVE-2024-27046, CVE-2024-27056, CVE-2024-27062, CVE-2024-27389
Jira References: PED-7167, PED-7619
Maintenance Incident:
[SUSE:Maintenance:33750](https://smelt.suse.de/incident/33750/)
Sources used:
openSUSE Leap 15.5 (src):
 kernel-obs-build-5.14.21-150500.55.62.2,
kernel-livepatch-SLE15-SP5_Update_13-1-150500.11.3.2,
kernel-source-5.14.21-150500.55.62.2, kernel-obs-qa-5.14.21-150500.55.62.1,
kernel-syms-5.14.21-150500.55.62.1,
kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2
SUSE Linux Enterprise Micro 5.5 (src):
 kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2
Basesystem Module 15-SP5 (src):
 kernel-source-5.14.21-150500.55.62.2,
kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2
Development Tools Module 15-SP5 (src):
 kernel-obs-build-5.14.21-150500.55.62.2, kernel-syms-5.14.21-150500.55.62.1,
kernel-source-5.14.21-150500.55.62.2
SUSE Linux Enterprise Live Patching 15-SP5 (src):
 kernel-livepatch-SLE15-SP5_Update_13-1-150500.11.3.2

NOTE: This line indicates an update has been released for the listed
product(s). At times this might be only a partial fix. If you have questions
please reach out to maintenance coordination.


You are receiving this mail because: