https://bugzilla.suse.com/show_bug.cgi?id=1229042 https://bugzilla.suse.com/show_bug.cgi?id=1229042#c62 --- Comment #62 from Maintenance Automation <maint-coord+maintenance-robot@suse.de> --- SUSE-SU-2024:4140-1: An update that solves 49 vulnerabilities and has 13 security fixes can now be installed. URL: https://www.suse.com/support/update/announcement/2024/suse-su-20244140-1 Category: security (important) Bug References: 1195775, 1204171, 1205796, 1206344, 1209290, 1216223, 1218562, 1219125, 1223384, 1223524, 1223824, 1225189, 1225336, 1225611, 1226211, 1226212, 1226557, 1228743, 1229042, 1229454, 1229456, 1230429, 1230454, 1231073, 1231191, 1231193, 1231197, 1231200, 1231203, 1231293, 1231375, 1231502, 1231673, 1231861, 1231887, 1231890, 1231893, 1231895, 1231936, 1231938, 1231942, 1231960, 1231961, 1231979, 1231987, 1231988, 1232033, 1232069, 1232070, 1232097, 1232136, 1232145, 1232262, 1232280, 1232282, 1232286, 1232304, 1232383, 1232418, 1232424, 1232432, 1232519 CVE References: CVE-2021-47416, CVE-2021-47589, CVE-2022-3435, CVE-2022-45934, CVE-2022-48664, CVE-2022-48947, CVE-2022-48956, CVE-2022-48960, CVE-2022-48962, CVE-2022-48967, CVE-2022-48970, CVE-2022-48988, CVE-2022-48991, CVE-2022-48999, CVE-2022-49003, CVE-2022-49014, CVE-2022-49015, CVE-2022-49023, CVE-2022-49025, CVE-2023-28327, CVE-2023-46343, CVE-2023-52881, CVE-2023-52919, CVE-2023-6270, CVE-2024-27043, CVE-2024-42145, CVE-2024-44947, CVE-2024-45016, CVE-2024-45026, CVE-2024-46813, CVE-2024-46814, CVE-2024-46816, CVE-2024-46817, CVE-2024-46818, CVE-2024-46849, CVE-2024-47668, CVE-2024-47674, CVE-2024-47684, CVE-2024-47706, CVE-2024-47747, CVE-2024-49860, CVE-2024-49867, CVE-2024-49936, CVE-2024-49969, CVE-2024-49974, CVE-2024-49982, CVE-2024-49991, CVE-2024-49995, CVE-2024-50047 Maintenance Incident: [SUSE:Maintenance:36348](https://smelt.suse.de/incident/36348/) Sources used: openSUSE Leap 15.3 (src): kernel-source-5.3.18-150300.59.182.1, kernel-livepatch-SLE15-SP3_Update_50-1-150300.7.3.1, kernel-obs-qa-5.3.18-150300.59.182.1, kernel-obs-build-5.3.18-150300.59.182.1, kernel-default-base-5.3.18-150300.59.182.1.150300.18.107.1, kernel-syms-5.3.18-150300.59.182.1 SUSE Linux Enterprise Live Patching 15-SP3 (src): kernel-livepatch-SLE15-SP3_Update_50-1-150300.7.3.1 SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (src): kernel-obs-build-5.3.18-150300.59.182.1, kernel-source-5.3.18-150300.59.182.1, kernel-default-base-5.3.18-150300.59.182.1.150300.18.107.1, kernel-syms-5.3.18-150300.59.182.1 SUSE Linux Enterprise Server 15 SP3 LTSS (src): kernel-obs-build-5.3.18-150300.59.182.1, kernel-source-5.3.18-150300.59.182.1, kernel-default-base-5.3.18-150300.59.182.1.150300.18.107.1, kernel-syms-5.3.18-150300.59.182.1 SUSE Linux Enterprise Server for SAP Applications 15 SP3 (src): kernel-obs-build-5.3.18-150300.59.182.1, kernel-source-5.3.18-150300.59.182.1, kernel-default-base-5.3.18-150300.59.182.1.150300.18.107.1, kernel-syms-5.3.18-150300.59.182.1 SUSE Enterprise Storage 7.1 (src): kernel-obs-build-5.3.18-150300.59.182.1, kernel-source-5.3.18-150300.59.182.1, kernel-default-base-5.3.18-150300.59.182.1.150300.18.107.1, kernel-syms-5.3.18-150300.59.182.1 SUSE Linux Enterprise Micro 5.1 (src): kernel-default-base-5.3.18-150300.59.182.1.150300.18.107.1 SUSE Linux Enterprise Micro 5.2 (src): kernel-default-base-5.3.18-150300.59.182.1.150300.18.107.1 SUSE Linux Enterprise Micro for Rancher 5.2 (src): kernel-default-base-5.3.18-150300.59.182.1.150300.18.107.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. -- You are receiving this mail because: You are on the CC list for the bug.