Comment # 43 on bug 1229450 from Maintenance Automation
SUSE-SU-2024:3985-1: An update that solves 211 vulnerabilities and has 41
security fixes can now be installed.

URL: https://www.suse.com/support/update/announcement/2024/suse-su-20243985-1
Category: security (important)
Bug References: 1054914, 1065729, 1194869, 1204171, 1205796, 1206188, 1206344,
1209290, 1210449, 1210627, 1213034, 1216813, 1218562, 1223384, 1223524,
1223824, 1225189, 1225336, 1225611, 1225762, 1226498, 1226631, 1226797,
1227437, 1227885, 1228119, 1228269, 1228709, 1228743, 1228747, 1229005,
1229019, 1229450, 1229454, 1229456, 1229556, 1229769, 1229837, 1229891,
1230055, 1230179, 1230289, 1230405, 1230414, 1230429, 1230456, 1230550,
1230600, 1230620, 1230715, 1230722, 1230763, 1230773, 1230774, 1230801,
1230903, 1230918, 1231016, 1231072, 1231073, 1231084, 1231085, 1231087,
1231094, 1231096, 1231105, 1231114, 1231115, 1231148, 1231179, 1231191,
1231193, 1231195, 1231197, 1231200, 1231203, 1231277, 1231293, 1231327,
1231344, 1231375, 1231383, 1231439, 1231442, 1231496, 1231502, 1231539,
1231540, 1231578, 1231673, 1231857, 1231861, 1231872, 1231883, 1231885,
1231887, 1231888, 1231889, 1231890, 1231892, 1231893, 1231895, 1231896,
1231897, 1231902, 1231903, 1231907, 1231914, 1231929, 1231935, 1231936,
1231937, 1231938, 1231939, 1231940, 1231941, 1231942, 1231944, 1231950,
1231954, 1231958, 1231960, 1231961, 1231962, 1231965, 1231967, 1231968,
1231972, 1231973, 1231976, 1231979, 1231987, 1231988, 1231990, 1231991,
1231992, 1231995, 1231996, 1231997, 1231998, 1232001, 1232004, 1232005,
1232006, 1232007, 1232025, 1232026, 1232033, 1232034, 1232035, 1232036,
1232037, 1232038, 1232039, 1232043, 1232049, 1232067, 1232069, 1232070,
1232071, 1232075, 1232083, 1232084, 1232085, 1232089, 1232097, 1232104,
1232105, 1232108, 1232114, 1232116, 1232119, 1232120, 1232123, 1232124,
1232133, 1232135, 1232136, 1232140, 1232145, 1232149, 1232150, 1232151,
1232154, 1232155, 1232160, 1232163, 1232164, 1232170, 1232172, 1232174,
1232175, 1232191, 1232196, 1232199, 1232200, 1232201, 1232217, 1232220,
1232221, 1232229, 1232233, 1232237, 1232251, 1232253, 1232259, 1232260,
1232262, 1232263, 1232282, 1232285, 1232286, 1232304, 1232305, 1232307,
1232309, 1232310, 1232313, 1232314, 1232316, 1232329, 1232332, 1232335,
1232337, 1232342, 1232345, 1232352, 1232354, 1232355, 1232358, 1232361,
1232366, 1232367, 1232368, 1232369, 1232374, 1232381, 1232383, 1232392,
1232395, 1232418, 1232424, 1232432, 1232435, 1232442, 1232446, 1232501,
1232519, 1232630, 1232631, 1232632, 1232757
CVE References: CVE-2021-47416, CVE-2021-47534, CVE-2022-3435, CVE-2022-45934,
CVE-2022-48664, CVE-2022-48879, CVE-2022-48946, CVE-2022-48947, CVE-2022-48948,
CVE-2022-48949, CVE-2022-48951, CVE-2022-48953, CVE-2022-48954, CVE-2022-48955,
CVE-2022-48956, CVE-2022-48957, CVE-2022-48958, CVE-2022-48959, CVE-2022-48960,
CVE-2022-48961, CVE-2022-48962, CVE-2022-48966, CVE-2022-48967, CVE-2022-48968,
CVE-2022-48969, CVE-2022-48970, CVE-2022-48971, CVE-2022-48972, CVE-2022-48973,
CVE-2022-48975, CVE-2022-48977, CVE-2022-48978, CVE-2022-48980, CVE-2022-48981,
CVE-2022-48985, CVE-2022-48987, CVE-2022-48988, CVE-2022-48991, CVE-2022-48992,
CVE-2022-48994, CVE-2022-48995, CVE-2022-48997, CVE-2022-48999, CVE-2022-49000,
CVE-2022-49002, CVE-2022-49003, CVE-2022-49005, CVE-2022-49006, CVE-2022-49007,
CVE-2022-49010, CVE-2022-49011, CVE-2022-49012, CVE-2022-49014, CVE-2022-49015,
CVE-2022-49016, CVE-2022-49017, CVE-2022-49019, CVE-2022-49020, CVE-2022-49021,
CVE-2022-49022, CVE-2022-49023, CVE-2022-49024, CVE-2022-49025, CVE-2022-49026,
CVE-2022-49027, CVE-2022-49028, CVE-2022-49029, CVE-2022-49031, CVE-2022-49032,
CVE-2023-2166, CVE-2023-28327, CVE-2023-52766, CVE-2023-52800, CVE-2023-52881,
CVE-2023-52919, CVE-2023-6270, CVE-2024-27043, CVE-2024-36244, CVE-2024-36957,
CVE-2024-39476, CVE-2024-40965, CVE-2024-42145, CVE-2024-42226, CVE-2024-42253,
CVE-2024-44931, CVE-2024-44947, CVE-2024-44958, CVE-2024-45016, CVE-2024-45025,
CVE-2024-46678, CVE-2024-46716, CVE-2024-46719, CVE-2024-46754, CVE-2024-46770,
CVE-2024-46775, CVE-2024-46777, CVE-2024-46809, CVE-2024-46811, CVE-2024-46813,
CVE-2024-46814, CVE-2024-46815, CVE-2024-46816, CVE-2024-46817, CVE-2024-46818,
CVE-2024-46826, CVE-2024-46828, CVE-2024-46834, CVE-2024-46840, CVE-2024-46841,
CVE-2024-46848, CVE-2024-46849, CVE-2024-46854, CVE-2024-46855, CVE-2024-46857,
CVE-2024-47660, CVE-2024-47661, CVE-2024-47664, CVE-2024-47668, CVE-2024-47672,
CVE-2024-47673, CVE-2024-47674, CVE-2024-47684, CVE-2024-47685, CVE-2024-47692,
CVE-2024-47704, CVE-2024-47705, CVE-2024-47706, CVE-2024-47707, CVE-2024-47710,
CVE-2024-47720, CVE-2024-47727, CVE-2024-47730, CVE-2024-47738, CVE-2024-47739,
CVE-2024-47745, CVE-2024-47747, CVE-2024-47748, CVE-2024-49858, CVE-2024-49860,
CVE-2024-49866, CVE-2024-49867, CVE-2024-49881, CVE-2024-49882, CVE-2024-49883,
CVE-2024-49886, CVE-2024-49890, CVE-2024-49892, CVE-2024-49894, CVE-2024-49895,
CVE-2024-49896, CVE-2024-49897, CVE-2024-49899, CVE-2024-49901, CVE-2024-49906,
CVE-2024-49908, CVE-2024-49909, CVE-2024-49911, CVE-2024-49912, CVE-2024-49913,
CVE-2024-49914, CVE-2024-49917, CVE-2024-49918, CVE-2024-49919, CVE-2024-49920,
CVE-2024-49922, CVE-2024-49923, CVE-2024-49929, CVE-2024-49930, CVE-2024-49933,
CVE-2024-49936, CVE-2024-49939, CVE-2024-49946, CVE-2024-49949, CVE-2024-49954,
CVE-2024-49955, CVE-2024-49958, CVE-2024-49959, CVE-2024-49960, CVE-2024-49962,
CVE-2024-49967, CVE-2024-49969, CVE-2024-49973, CVE-2024-49974, CVE-2024-49975,
CVE-2024-49982, CVE-2024-49991, CVE-2024-49993, CVE-2024-49995, CVE-2024-49996,
CVE-2024-50000, CVE-2024-50001, CVE-2024-50002, CVE-2024-50006, CVE-2024-50014,
CVE-2024-50019, CVE-2024-50024, CVE-2024-50028, CVE-2024-50033, CVE-2024-50035,
CVE-2024-50041, CVE-2024-50045, CVE-2024-50046, CVE-2024-50047, CVE-2024-50048,
CVE-2024-50049, CVE-2024-50055, CVE-2024-50058, CVE-2024-50059, CVE-2024-50061,
CVE-2024-50063, CVE-2024-50081
Maintenance Incident:
[SUSE:Maintenance:36388](https://smelt.suse.de/incident/36388/)
Sources used:
SUSE Real Time Module 15-SP5 (src):
 kernel-syms-rt-5.14.21-150500.13.76.1, kernel-source-rt-5.14.21-150500.13.76.1
openSUSE Leap 15.5 (src):
 kernel-syms-rt-5.14.21-150500.13.76.1,
kernel-livepatch-SLE15-SP5-RT_Update_22-1-150500.11.3.1,
kernel-source-rt-5.14.21-150500.13.76.1
SUSE Linux Enterprise Micro 5.5 (src):
 kernel-source-rt-5.14.21-150500.13.76.1
SUSE Linux Enterprise Live Patching 15-SP5 (src):
 kernel-livepatch-SLE15-SP5-RT_Update_22-1-150500.11.3.1

NOTE: This line indicates an update has been released for the listed
product(s). At times this might be only a partial fix. If you have questions
please reach out to maintenance coordination.


You are receiving this mail because: