https://bugzilla.suse.com/show_bug.cgi?id=1219653
https://bugzilla.suse.com/show_bug.cgi?id=1219653#c23
--- Comment #23 from Maintenance Automation ---
SUSE-SU-2024:0857-1: An update that solves 67 vulnerabilities and has four
security fixes can now be installed.
Category: security (important)
Bug References: 1200599, 1207653, 1212514, 1213456, 1216223, 1218195, 1218689,
1218915, 1219127, 1219128, 1219146, 1219295, 1219653, 1219827, 1219835,
1219915, 1220009, 1220140, 1220187, 1220238, 1220240, 1220241, 1220243,
1220250, 1220253, 1220255, 1220328, 1220330, 1220344, 1220398, 1220409,
1220416, 1220418, 1220421, 1220436, 1220444, 1220459, 1220469, 1220482,
1220526, 1220538, 1220570, 1220572, 1220599, 1220627, 1220641, 1220649,
1220660, 1220689, 1220700, 1220735, 1220736, 1220737, 1220742, 1220745,
1220767, 1220796, 1220825, 1220826, 1220831, 1220845, 1220860, 1220863,
1220870, 1220917, 1220918, 1220930, 1220931, 1220932, 1221039, 1221040
CVE References: CVE-2019-25162, CVE-2020-36777, CVE-2020-36784, CVE-2021-46904,
CVE-2021-46905, CVE-2021-46906, CVE-2021-46915, CVE-2021-46924, CVE-2021-46929,
CVE-2021-46932, CVE-2021-46934, CVE-2021-46953, CVE-2021-46964, CVE-2021-46966,
CVE-2021-46968, CVE-2021-46974, CVE-2021-46989, CVE-2021-47005, CVE-2021-47012,
CVE-2021-47013, CVE-2021-47054, CVE-2021-47060, CVE-2021-47061, CVE-2021-47069,
CVE-2021-47076, CVE-2021-47078, CVE-2021-47083, CVE-2022-20154, CVE-2022-48627,
CVE-2023-28746, CVE-2023-35827, CVE-2023-46343, CVE-2023-51042, CVE-2023-52340,
CVE-2023-52429, CVE-2023-52439, CVE-2023-52443, CVE-2023-52445, CVE-2023-52448,
CVE-2023-52449, CVE-2023-52451, CVE-2023-52463, CVE-2023-52475, CVE-2023-52478,
CVE-2023-52482, CVE-2023-52502, CVE-2023-52530, CVE-2023-52531, CVE-2023-52532,
CVE-2023-52569, CVE-2023-52574, CVE-2023-52597, CVE-2023-52605, CVE-2023-6817,
CVE-2024-0340, CVE-2024-0607, CVE-2024-1151, CVE-2024-23849, CVE-2024-23851,
CVE-2024-26585, CVE-2024-26586, CVE-2024-26589, CVE-2024-26593, CVE-2024-26595,
CVE-2024-26602, CVE-2024-26607, CVE-2024-26622
Sources used:
openSUSE Leap 15.3 (src): kernel-obs-qa-5.3.18-150300.59.153.1,
kernel-livepatch-SLE15-SP3_Update_42-1-150300.7.3.2,
kernel-syms-5.3.18-150300.59.153.1,
kernel-default-base-5.3.18-150300.59.153.2.150300.18.90.2,
kernel-source-5.3.18-150300.59.153.2, kernel-obs-build-5.3.18-150300.59.153.2
SUSE Linux Enterprise Live Patching 15-SP3 (src):
kernel-livepatch-SLE15-SP3_Update_42-1-150300.7.3.2
SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (src):
kernel-default-base-5.3.18-150300.59.153.2.150300.18.90.2,
kernel-source-5.3.18-150300.59.153.2, kernel-syms-5.3.18-150300.59.153.1,
kernel-obs-build-5.3.18-150300.59.153.2
SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (src):
kernel-default-base-5.3.18-150300.59.153.2.150300.18.90.2,
kernel-source-5.3.18-150300.59.153.2, kernel-syms-5.3.18-150300.59.153.1,
kernel-obs-build-5.3.18-150300.59.153.2
SUSE Linux Enterprise Server for SAP Applications 15 SP3 (src):
kernel-default-base-5.3.18-150300.59.153.2.150300.18.90.2,
kernel-source-5.3.18-150300.59.153.2, kernel-syms-5.3.18-150300.59.153.1,
kernel-obs-build-5.3.18-150300.59.153.2
SUSE Enterprise Storage 7.1 (src):
kernel-default-base-5.3.18-150300.59.153.2.150300.18.90.2,
kernel-source-5.3.18-150300.59.153.2, kernel-syms-5.3.18-150300.59.153.1,
kernel-obs-build-5.3.18-150300.59.153.2
SUSE Linux Enterprise Micro 5.1 (src):
kernel-default-base-5.3.18-150300.59.153.2.150300.18.90.2
SUSE Linux Enterprise Micro 5.2 (src):
kernel-default-base-5.3.18-150300.59.153.2.150300.18.90.2
SUSE Linux Enterprise Micro for Rancher 5.2 (src):
kernel-default-base-5.3.18-150300.59.153.2.150300.18.90.2
NOTE: This line indicates an update has been released for the listed
product(s). At times this might be only a partial fix. If you have questions
please reach out to maintenance coordination.
--
You are receiving this mail because:
You are the assignee for the bug.