Comment # 62 on bug 1229042 from Maintenance Automation
SUSE-SU-2024:4140-1: An update that solves 49 vulnerabilities and has 13
security fixes can now be installed.

URL: https://www.suse.com/support/update/announcement/2024/suse-su-20244140-1
Category: security (important)
Bug References: 1195775, 1204171, 1205796, 1206344, 1209290, 1216223, 1218562,
1219125, 1223384, 1223524, 1223824, 1225189, 1225336, 1225611, 1226211,
1226212, 1226557, 1228743, 1229042, 1229454, 1229456, 1230429, 1230454,
1231073, 1231191, 1231193, 1231197, 1231200, 1231203, 1231293, 1231375,
1231502, 1231673, 1231861, 1231887, 1231890, 1231893, 1231895, 1231936,
1231938, 1231942, 1231960, 1231961, 1231979, 1231987, 1231988, 1232033,
1232069, 1232070, 1232097, 1232136, 1232145, 1232262, 1232280, 1232282,
1232286, 1232304, 1232383, 1232418, 1232424, 1232432, 1232519
CVE References: CVE-2021-47416, CVE-2021-47589, CVE-2022-3435, CVE-2022-45934,
CVE-2022-48664, CVE-2022-48947, CVE-2022-48956, CVE-2022-48960, CVE-2022-48962,
CVE-2022-48967, CVE-2022-48970, CVE-2022-48988, CVE-2022-48991, CVE-2022-48999,
CVE-2022-49003, CVE-2022-49014, CVE-2022-49015, CVE-2022-49023, CVE-2022-49025,
CVE-2023-28327, CVE-2023-46343, CVE-2023-52881, CVE-2023-52919, CVE-2023-6270,
CVE-2024-27043, CVE-2024-42145, CVE-2024-44947, CVE-2024-45016, CVE-2024-45026,
CVE-2024-46813, CVE-2024-46814, CVE-2024-46816, CVE-2024-46817, CVE-2024-46818,
CVE-2024-46849, CVE-2024-47668, CVE-2024-47674, CVE-2024-47684, CVE-2024-47706,
CVE-2024-47747, CVE-2024-49860, CVE-2024-49867, CVE-2024-49936, CVE-2024-49969,
CVE-2024-49974, CVE-2024-49982, CVE-2024-49991, CVE-2024-49995, CVE-2024-50047
Maintenance Incident:
[SUSE:Maintenance:36348](https://smelt.suse.de/incident/36348/)
Sources used:
openSUSE Leap 15.3 (src):
 kernel-source-5.3.18-150300.59.182.1,
kernel-livepatch-SLE15-SP3_Update_50-1-150300.7.3.1,
kernel-obs-qa-5.3.18-150300.59.182.1, kernel-obs-build-5.3.18-150300.59.182.1,
kernel-default-base-5.3.18-150300.59.182.1.150300.18.107.1,
kernel-syms-5.3.18-150300.59.182.1
SUSE Linux Enterprise Live Patching 15-SP3 (src):
 kernel-livepatch-SLE15-SP3_Update_50-1-150300.7.3.1
SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (src):
 kernel-obs-build-5.3.18-150300.59.182.1, kernel-source-5.3.18-150300.59.182.1,
kernel-default-base-5.3.18-150300.59.182.1.150300.18.107.1,
kernel-syms-5.3.18-150300.59.182.1
SUSE Linux Enterprise Server 15 SP3 LTSS (src):
 kernel-obs-build-5.3.18-150300.59.182.1, kernel-source-5.3.18-150300.59.182.1,
kernel-default-base-5.3.18-150300.59.182.1.150300.18.107.1,
kernel-syms-5.3.18-150300.59.182.1
SUSE Linux Enterprise Server for SAP Applications 15 SP3 (src):
 kernel-obs-build-5.3.18-150300.59.182.1, kernel-source-5.3.18-150300.59.182.1,
kernel-default-base-5.3.18-150300.59.182.1.150300.18.107.1,
kernel-syms-5.3.18-150300.59.182.1
SUSE Enterprise Storage 7.1 (src):
 kernel-obs-build-5.3.18-150300.59.182.1, kernel-source-5.3.18-150300.59.182.1,
kernel-default-base-5.3.18-150300.59.182.1.150300.18.107.1,
kernel-syms-5.3.18-150300.59.182.1
SUSE Linux Enterprise Micro 5.1 (src):
 kernel-default-base-5.3.18-150300.59.182.1.150300.18.107.1
SUSE Linux Enterprise Micro 5.2 (src):
 kernel-default-base-5.3.18-150300.59.182.1.150300.18.107.1
SUSE Linux Enterprise Micro for Rancher 5.2 (src):
 kernel-default-base-5.3.18-150300.59.182.1.150300.18.107.1

NOTE: This line indicates an update has been released for the listed
product(s). At times this might be only a partial fix. If you have questions
please reach out to maintenance coordination.


You are receiving this mail because: