SUSE-SU-2024:3408-1: An update that solves 73 vulnerabilities and has 18 security fixes can now be installed. URL: https://www.suse.com/support/update/announcement/2024/suse-su-20243408-1 Category: security (important) Bug References: 1193629, 1194111, 1194765, 1194869, 1196261, 1196516, 1196894, 1198017, 1203360, 1206006, 1206258, 1207158, 1216834, 1221326, 1221645, 1223191, 1224105, 1227832, 1228020, 1228114, 1228466, 1228489, 1228516, 1228576, 1228718, 1228801, 1228959, 1229042, 1229292, 1229400, 1229454, 1229500, 1229503, 1229506, 1229507, 1229508, 1229509, 1229510, 1229512, 1229516, 1229522, 1229526, 1229528, 1229531, 1229533, 1229535, 1229536, 1229537, 1229540, 1229544, 1229554, 1229557, 1229565, 1229566, 1229568, 1229581, 1229598, 1229603, 1229604, 1229608, 1229611, 1229612, 1229613, 1229614, 1229617, 1229619, 1229620, 1229622, 1229623, 1229624, 1229625, 1229626, 1229628, 1229629, 1229630, 1229631, 1229635, 1229636, 1229637, 1229638, 1229639, 1229641, 1229642, 1229643, 1229645, 1229657, 1229664, 1229707, 1229792, 1230245, 1230413 CVE References: CVE-2021-4441, CVE-2022-4382, CVE-2022-48868, CVE-2022-48869, CVE-2022-48870, CVE-2022-48871, CVE-2022-48872, CVE-2022-48873, CVE-2022-48875, CVE-2022-48878, CVE-2022-48880, CVE-2022-48890, CVE-2022-48891, CVE-2022-48896, CVE-2022-48898, CVE-2022-48899, CVE-2022-48903, CVE-2022-48904, CVE-2022-48905, CVE-2022-48907, CVE-2022-48909, CVE-2022-48912, CVE-2022-48913, CVE-2022-48914, CVE-2022-48915, CVE-2022-48916, CVE-2022-48917, CVE-2022-48918, CVE-2022-48919, CVE-2022-48921, CVE-2022-48924, CVE-2022-48925, CVE-2022-48926, CVE-2022-48927, CVE-2022-48928, CVE-2022-48929, CVE-2022-48930, CVE-2022-48931, CVE-2022-48932, CVE-2022-48934, CVE-2022-48935, CVE-2022-48937, CVE-2022-48938, CVE-2022-48941, CVE-2022-48942, CVE-2022-48943, CVE-2023-52489, CVE-2023-52893, CVE-2023-52894, CVE-2023-52896, CVE-2023-52898, CVE-2023-52900, CVE-2023-52901, CVE-2023-52905, CVE-2023-52907, CVE-2023-52911, CVE-2024-40910, CVE-2024-41009, CVE-2024-41011, CVE-2024-41062, CVE-2024-41087, CVE-2024-42077, CVE-2024-42126, CVE-2024-42230, CVE-2024-42232, CVE-2024-42271, CVE-2024-43853, CVE-2024-43861, CVE-2024-43882, CVE-2024-43883, CVE-2024-44938, CVE-2024-44947, CVE-2024-45003 Maintenance Incident: [SUSE:Maintenance:35534](https://smelt.suse.de/incident/35534/) Sources used: openSUSE Leap 15.4 (src): kernel-default-base-5.14.21-150400.24.133.2.150400.24.64.5, kernel-livepatch-SLE15-SP4_Update_31-1-150400.9.3.2, kernel-syms-5.14.21-150400.24.133.1, kernel-obs-qa-5.14.21-150400.24.133.1, kernel-source-5.14.21-150400.24.133.2, kernel-obs-build-5.14.21-150400.24.133.2 SUSE Linux Enterprise Micro for Rancher 5.3 (src): kernel-default-base-5.14.21-150400.24.133.2.150400.24.64.5 SUSE Linux Enterprise Micro 5.3 (src): kernel-default-base-5.14.21-150400.24.133.2.150400.24.64.5 SUSE Linux Enterprise Micro for Rancher 5.4 (src): kernel-default-base-5.14.21-150400.24.133.2.150400.24.64.5 SUSE Linux Enterprise Micro 5.4 (src): kernel-default-base-5.14.21-150400.24.133.2.150400.24.64.5 SUSE Linux Enterprise Live Patching 15-SP4 (src): kernel-livepatch-SLE15-SP4_Update_31-1-150400.9.3.2 SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (src): kernel-default-base-5.14.21-150400.24.133.2.150400.24.64.5, kernel-source-5.14.21-150400.24.133.2, kernel-syms-5.14.21-150400.24.133.1, kernel-obs-build-5.14.21-150400.24.133.2 SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (src): kernel-default-base-5.14.21-150400.24.133.2.150400.24.64.5, kernel-source-5.14.21-150400.24.133.2, kernel-syms-5.14.21-150400.24.133.1, kernel-obs-build-5.14.21-150400.24.133.2 SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (src): kernel-default-base-5.14.21-150400.24.133.2.150400.24.64.5, kernel-source-5.14.21-150400.24.133.2, kernel-syms-5.14.21-150400.24.133.1, kernel-obs-build-5.14.21-150400.24.133.2 SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (src): kernel-default-base-5.14.21-150400.24.133.2.150400.24.64.5, kernel-source-5.14.21-150400.24.133.2, kernel-syms-5.14.21-150400.24.133.1, kernel-obs-build-5.14.21-150400.24.133.2 SUSE Linux Enterprise Server for SAP Applications 15 SP4 (src): kernel-default-base-5.14.21-150400.24.133.2.150400.24.64.5, kernel-source-5.14.21-150400.24.133.2, kernel-syms-5.14.21-150400.24.133.1, kernel-obs-build-5.14.21-150400.24.133.2 SUSE Manager Proxy 4.3 (src): kernel-default-base-5.14.21-150400.24.133.2.150400.24.64.5, kernel-source-5.14.21-150400.24.133.2, kernel-syms-5.14.21-150400.24.133.1 SUSE Manager Retail Branch Server 4.3 (src): kernel-default-base-5.14.21-150400.24.133.2.150400.24.64.5, kernel-source-5.14.21-150400.24.133.2 SUSE Manager Server 4.3 (src): kernel-default-base-5.14.21-150400.24.133.2.150400.24.64.5, kernel-source-5.14.21-150400.24.133.2, kernel-syms-5.14.21-150400.24.133.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.