Comment # 36 on bug 1220775 from Maintenance Automation
SUSE-SU-2024:1480-1: An update that solves 150 vulnerabilities, contains four
features and has 32 security fixes can now be installed.

Category: security (important)
Bug References: 1194869, 1200465, 1205316, 1207948, 1209635, 1209657, 1212514,
1213456, 1214852, 1215221, 1215322, 1217339, 1217829, 1217959, 1217987,
1217988, 1217989, 1218321, 1218336, 1218479, 1218562, 1218643, 1218777,
1219169, 1219170, 1219264, 1219443, 1219834, 1220114, 1220176, 1220237,
1220251, 1220320, 1220325, 1220328, 1220337, 1220340, 1220365, 1220366,
1220393, 1220398, 1220411, 1220413, 1220433, 1220439, 1220443, 1220445,
1220466, 1220469, 1220478, 1220482, 1220484, 1220486, 1220487, 1220492,
1220703, 1220735, 1220736, 1220775, 1220790, 1220797, 1220831, 1220833,
1220836, 1220839, 1220840, 1220843, 1220845, 1220848, 1220870, 1220871,
1220872, 1220878, 1220879, 1220883, 1220885, 1220887, 1220898, 1220917,
1220918, 1220920, 1220921, 1220926, 1220927, 1220929, 1220930, 1220931,
1220932, 1220933, 1220937, 1220938, 1220940, 1220954, 1220955, 1220959,
1220960, 1220961, 1220965, 1220969, 1220978, 1220979, 1220981, 1220982,
1220983, 1220985, 1220986, 1220987, 1220989, 1220990, 1221009, 1221012,
1221015, 1221022, 1221039, 1221040, 1221044, 1221045, 1221046, 1221048,
1221055, 1221056, 1221058, 1221060, 1221061, 1221062, 1221066, 1221067,
1221068, 1221069, 1221070, 1221071, 1221077, 1221082, 1221090, 1221097,
1221156, 1221252, 1221273, 1221274, 1221276, 1221277, 1221291, 1221293,
1221298, 1221337, 1221338, 1221375, 1221379, 1221551, 1221553, 1221613,
1221614, 1221616, 1221618, 1221631, 1221633, 1221713, 1221725, 1221777,
1221814, 1221816, 1221830, 1221951, 1222033, 1222056, 1222060, 1222070,
1222073, 1222117, 1222274, 1222291, 1222300, 1222304, 1222317, 1222331,
1222355, 1222356, 1222360, 1222366, 1222373, 1222619, 1222952
CVE References: CVE-2021-46925, CVE-2021-46926, CVE-2021-46927, CVE-2021-46929,
CVE-2021-46930, CVE-2021-46931, CVE-2021-46933, CVE-2021-46934, CVE-2021-46936,
CVE-2021-47082, CVE-2021-47083, CVE-2021-47087, CVE-2021-47091, CVE-2021-47093,
CVE-2021-47094, CVE-2021-47095, CVE-2021-47096, CVE-2021-47097, CVE-2021-47098,
CVE-2021-47099, CVE-2021-47100, CVE-2021-47101, CVE-2021-47102, CVE-2021-47104,
CVE-2021-47105, CVE-2021-47107, CVE-2021-47108, CVE-2022-4744, CVE-2022-48626,
CVE-2022-48627, CVE-2022-48628, CVE-2022-48629, CVE-2022-48630, CVE-2023-0160,
CVE-2023-28746, CVE-2023-35827, CVE-2023-4881, CVE-2023-52447, CVE-2023-52450,
CVE-2023-52453, CVE-2023-52454, CVE-2023-52462, CVE-2023-52463, CVE-2023-52467,
CVE-2023-52469, CVE-2023-52470, CVE-2023-52474, CVE-2023-52476, CVE-2023-52477,
CVE-2023-52481, CVE-2023-52482, CVE-2023-52484, CVE-2023-52486, CVE-2023-52492,
CVE-2023-52493, CVE-2023-52494, CVE-2023-52497, CVE-2023-52500, CVE-2023-52501,
CVE-2023-52502, CVE-2023-52504, CVE-2023-52507, CVE-2023-52508, CVE-2023-52509,
CVE-2023-52510, CVE-2023-52511, CVE-2023-52513, CVE-2023-52515, CVE-2023-52517,
CVE-2023-52518, CVE-2023-52519, CVE-2023-52520, CVE-2023-52523, CVE-2023-52524,
CVE-2023-52525, CVE-2023-52528, CVE-2023-52529, CVE-2023-52530, CVE-2023-52531,
CVE-2023-52532, CVE-2023-52559, CVE-2023-52563, CVE-2023-52564, CVE-2023-52566,
CVE-2023-52567, CVE-2023-52569, CVE-2023-52574, CVE-2023-52575, CVE-2023-52576,
CVE-2023-52582, CVE-2023-52583, CVE-2023-52587, CVE-2023-52591, CVE-2023-52594,
CVE-2023-52595, CVE-2023-52597, CVE-2023-52598, CVE-2023-52599, CVE-2023-52600,
CVE-2023-52601, CVE-2023-52602, CVE-2023-52603, CVE-2023-52604, CVE-2023-52605,
CVE-2023-52606, CVE-2023-52607, CVE-2023-52608, CVE-2023-52612, CVE-2023-52615,
CVE-2023-52617, CVE-2023-52619, CVE-2023-52621, CVE-2023-52623, CVE-2023-52628,
CVE-2023-52632, CVE-2023-52637, CVE-2023-52639, CVE-2023-6270, CVE-2023-6356,
CVE-2023-6535, CVE-2023-6536, CVE-2023-7042, CVE-2023-7192, CVE-2024-0841,
CVE-2024-2201, CVE-2024-22099, CVE-2024-23307, CVE-2024-25739, CVE-2024-25742,
CVE-2024-25743, CVE-2024-26599, CVE-2024-26600, CVE-2024-26602, CVE-2024-26607,
CVE-2024-26612, CVE-2024-26614, CVE-2024-26620, CVE-2024-26627, CVE-2024-26629,
CVE-2024-26642, CVE-2024-26645, CVE-2024-26646, CVE-2024-26651, CVE-2024-26654,
CVE-2024-26659, CVE-2024-26664, CVE-2024-26667, CVE-2024-26670, CVE-2024-26695,
CVE-2024-26717
Jira References: PED-5759, PED-7167, PED-7618, PED-7619
Maintenance Incident:
[SUSE:Maintenance:33310](https://smelt.suse.de/incident/33310/)
Sources used:
openSUSE Leap 15.5 (src):
 kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7,
kernel-livepatch-SLE15-SP5_Update_12-1-150500.11.7.1,
kernel-syms-5.14.21-150500.55.59.1, kernel-obs-qa-5.14.21-150500.55.59.1,
kernel-source-5.14.21-150500.55.59.1, kernel-obs-build-5.14.21-150500.55.59.1
SUSE Linux Enterprise Micro 5.5 (src):
 kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7
Basesystem Module 15-SP5 (src):
 kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7,
kernel-source-5.14.21-150500.55.59.1
Development Tools Module 15-SP5 (src):
 kernel-syms-5.14.21-150500.55.59.1, kernel-source-5.14.21-150500.55.59.1,
kernel-obs-build-5.14.21-150500.55.59.1
SUSE Linux Enterprise Live Patching 15-SP5 (src):
 kernel-livepatch-SLE15-SP5_Update_12-1-150500.11.7.1

NOTE: This line indicates an update has been released for the listed
product(s). At times this might be only a partial fix. If you have questions
please reach out to maintenance coordination.


You are receiving this mail because: