https://bugzilla.suse.com/show_bug.cgi?id=1229042 https://bugzilla.suse.com/show_bug.cgi?id=1229042#c61 --- Comment #61 from Maintenance Automation <maint-coord+maintenance-robot@suse.de> --- SUSE-SU-2024:4100-1: An update that solves 120 vulnerabilities and has 13 security fixes can now be installed. URL: https://www.suse.com/support/update/announcement/2024/suse-su-20244100-1 Category: security (important) Bug References: 1082555, 1176081, 1206344, 1213034, 1218562, 1219125, 1220439, 1221980, 1222629, 1223384, 1223824, 1225189, 1225336, 1225611, 1226585, 1226606, 1227437, 1227885, 1227941, 1227947, 1227952, 1228000, 1228410, 1228564, 1228620, 1228743, 1229005, 1229042, 1229154, 1229568, 1229769, 1229837, 1230179, 1230405, 1230725, 1230802, 1231072, 1231094, 1231096, 1231105, 1231111, 1231115, 1231148, 1231191, 1231197, 1231203, 1231293, 1231375, 1231537, 1231539, 1231540, 1231673, 1231858, 1231859, 1231861, 1231864, 1231888, 1231889, 1231890, 1231893, 1231897, 1231903, 1231914, 1231929, 1231935, 1231938, 1231939, 1231942, 1231954, 1231958, 1231979, 1231987, 1231988, 1231995, 1231996, 1231997, 1231998, 1232006, 1232007, 1232016, 1232025, 1232026, 1232035, 1232037, 1232038, 1232039, 1232047, 1232056, 1232069, 1232070, 1232071, 1232089, 1232097, 1232111, 1232123, 1232126, 1232133, 1232134, 1232135, 1232140, 1232141, 1232142, 1232149, 1232151, 1232152, 1232160, 1232172, 1232175, 1232180, 1232191, 1232199, 1232200, 1232201, 1232217, 1232218, 1232221, 1232236, 1232253, 1232282, 1232285, 1232286, 1232304, 1232305, 1232313, 1232314, 1232339, 1232354, 1232392, 1232394, 1232418, 1232424, 1232432, 1232442 CVE References: CVE-2021-46936, CVE-2021-47163, CVE-2021-47416, CVE-2021-47612, CVE-2022-48788, CVE-2022-48789, CVE-2022-48790, CVE-2022-48809, CVE-2022-48946, CVE-2022-48949, CVE-2022-48951, CVE-2022-48956, CVE-2022-48958, CVE-2022-48960, CVE-2022-48962, CVE-2022-48966, CVE-2022-48967, CVE-2022-48969, CVE-2022-48971, CVE-2022-48972, CVE-2022-48973, CVE-2022-48978, CVE-2022-48985, CVE-2022-48988, CVE-2022-48991, CVE-2022-48992, CVE-2022-48997, CVE-2022-49000, CVE-2022-49002, CVE-2022-49010, CVE-2022-49011, CVE-2022-49014, CVE-2022-49015, CVE-2022-49020, CVE-2022-49021, CVE-2022-49026, CVE-2022-49027, CVE-2022-49028, CVE-2022-49029, CVE-2023-46343, CVE-2023-52881, CVE-2023-52898, CVE-2023-52918, CVE-2023-52919, CVE-2023-6270, CVE-2024-26804, CVE-2024-27043, CVE-2024-38538, CVE-2024-39476, CVE-2024-40965, CVE-2024-41016, CVE-2024-41082, CVE-2024-42114, CVE-2024-42145, CVE-2024-42253, CVE-2024-44931, CVE-2024-44958, CVE-2024-46724, CVE-2024-46755, CVE-2024-46802, CVE-2024-46809, CVE-2024-46813, CVE-2024-46816, CVE-2024-46818, CVE-2024-46826, CVE-2024-46834, CVE-2024-46840, CVE-2024-46841, CVE-2024-46848, CVE-2024-47670, CVE-2024-47672, CVE-2024-47673, CVE-2024-47674, CVE-2024-47684, CVE-2024-47685, CVE-2024-47696, CVE-2024-47697, CVE-2024-47698, CVE-2024-47706, CVE-2024-47707, CVE-2024-47713, CVE-2024-47735, CVE-2024-47737, CVE-2024-47742, CVE-2024-47745, CVE-2024-47749, CVE-2024-49851, CVE-2024-49860, CVE-2024-49877, CVE-2024-49881, CVE-2024-49882, CVE-2024-49883, CVE-2024-49890, CVE-2024-49891, CVE-2024-49894, CVE-2024-49896, CVE-2024-49901, CVE-2024-49920, CVE-2024-49929, CVE-2024-49936, CVE-2024-49949, CVE-2024-49957, CVE-2024-49958, CVE-2024-49959, CVE-2024-49962, CVE-2024-49965, CVE-2024-49966, CVE-2024-49967, CVE-2024-49982, CVE-2024-49991, CVE-2024-49995, CVE-2024-49996, CVE-2024-50006, CVE-2024-50007, CVE-2024-50024, CVE-2024-50033, CVE-2024-50035, CVE-2024-50045, CVE-2024-50047, CVE-2024-50058 Maintenance Incident: [SUSE:Maintenance:36344](https://smelt.suse.de/incident/36344/) Sources used: SUSE Linux Enterprise Live Patching 12-SP5 (src): kgraft-patch-SLE12-SP5_Update_62-1-8.3.1 SUSE Linux Enterprise Server 12 SP5 LTSS (src): kernel-syms-4.12.14-122.234.1, kernel-source-4.12.14-122.234.1 SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (src): kernel-syms-4.12.14-122.234.1, kernel-source-4.12.14-122.234.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. -- You are receiving this mail because: You are the assignee for the bug.