[Bug 1229042] New: Enable kernel-default-livepatch-devel for TW since it's already enabled on Leap
https://bugzilla.suse.com/show_bug.cgi?id=1229042 Bug ID: 1229042 Summary: Enable kernel-default-livepatch-devel for TW since it's already enabled on Leap Classification: openSUSE Product: openSUSE Tumbleweed Version: Current Hardware: Other OS: Other Status: NEW Severity: Normal Priority: P5 - None Component: Kernel Assignee: kernel-bugs@opensuse.org Reporter: mpdesouza@suse.com QA Contact: qa-bugs@suse.de Target Milestone: --- Found By: --- Blocker: --- Remove the condition that currently only applies to openSUSE Tumbleweed. -- You are receiving this mail because: You are the assignee for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1229042 https://bugzilla.suse.com/show_bug.cgi?id=1229042#c1 --- Comment #1 from Marcos de Souza <mpdesouza@suse.com> --- Created attachment 876604 --> https://bugzilla.suse.com/attachment.cgi?id=876604&action=edit Enable the livepatch-devel package Tumbleweed -- You are receiving this mail because: You are the assignee for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1229042 https://bugzilla.suse.com/show_bug.cgi?id=1229042#c2 Marcos de Souza <mpdesouza@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |msuchanek@suse.com --- Comment #2 from Marcos de Souza <mpdesouza@suse.com> --- Michal, can you check if this really enabled the package on TW? Thanks! -- You are receiving this mail because: You are the assignee for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1229042 https://bugzilla.suse.com/show_bug.cgi?id=1229042#c3 --- Comment #3 from Michal Suchanek <msuchanek@suse.com> --- We build the livepatching support in KOTD but have a conditional in the spec file that disables livepatching support in openSUSE release projects. This is ineffective in Leap since the Jump change: kernel packages are imported from SLE, including the livepatching support. It is envisioned that with recent tooling improvements users might want to try building their own livepatches. For that they will need the support files created during kernel build. Currently Tumbleweed is the only distribution missing these. -- You are receiving this mail because: You are the assignee for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1229042 https://bugzilla.suse.com/show_bug.cgi?id=1229042#c4 --- Comment #4 from Michal Suchanek <msuchanek@suse.com> --- It cannot be really checked. -- You are receiving this mail because: You are the assignee for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1229042 https://bugzilla.suse.com/show_bug.cgi?id=1229042#c6 Jiri Slaby <jslaby@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |jslaby@suse.com --- Comment #6 from Jiri Slaby <jslaby@suse.com> --- [ 16s] error: syntax error in expression: 01 && ( || 1 ) [ 16s] error: ^ [ 16s] error: unmatched (: 01 && ( || 1 ) [ 16s] error: ^ [ 16s] error: /home/abuild/rpmbuild/SOURCES/kernel-default.spec:137: bad %if condition: 01 && ( || 1 ) I believe:
grep -v [-^PTF | grep -vc openSUSE)-]{+^PTF)+}
-c should have been moved to PTF's grep. -- You are receiving this mail because: You are the assignee for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1229042 https://bugzilla.suse.com/show_bug.cgi?id=1229042#c7 --- Comment #7 from Jiri Slaby <jslaby@suse.com> --- Pushed: commit 4a36fe30341cfe1a8959cd471b93ea0fed3ea794 (origin/users/jslaby/packaging/for-next, packaging) Author: Jiri Slaby <jslaby@suse.cz> Date: Mon Aug 12 07:45:29 2024 +0200 rpm/kernel-binary.spec.in: fix klp_symbols macro -- You are receiving this mail because: You are the assignee for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1229042 https://bugzilla.suse.com/show_bug.cgi?id=1229042#c8 Jiri Slaby <jslaby@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |tiwai@suse.com --- Comment #8 from Jiri Slaby <jslaby@suse.com> --- I see: commit d29edf236b0387d70173d5636bffb78ddb828132 Author: Takashi Iwai <tiwai@suse.de> Date: Sat Aug 10 10:27:04 2024 +0200 rpm/kernel-binary.spec.in: Fix build regression So Takashi fixed this already. -- You are receiving this mail because: You are the assignee for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1229042 https://bugzilla.suse.com/show_bug.cgi?id=1229042#c9 --- Comment #9 from Jiri Slaby <jslaby@suse.com> --- (In reply to Jiri Slaby from comment #8)
I see: commit d29edf236b0387d70173d5636bffb78ddb828132 Author: Takashi Iwai <tiwai@suse.de> Date: Sat Aug 10 10:27:04 2024 +0200
rpm/kernel-binary.spec.in: Fix build regression
So Takashi fixed this already.
in users/tiwai/packaging/for-next -- You are receiving this mail because: You are the assignee for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1229042 https://bugzilla.suse.com/show_bug.cgi?id=1229042#c10 --- Comment #10 from Takashi Iwai <tiwai@suse.com> --- Yep, both fixes are identical, so I don't mind to delete mine and merge Jiri's :) -- You are receiving this mail because: You are the assignee for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1229042 https://bugzilla.suse.com/show_bug.cgi?id=1229042#c12 --- Comment #12 from Jiri Slaby <jslaby@suse.com> --- (In reply to Takashi Iwai from comment #10)
Yep, both fixes are identical, so I don't mind to delete mine and merge Jiri's :)
No, I'd say FCFS. Or merge both :P. -- You are receiving this mail because: You are the assignee for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1229042 https://bugzilla.suse.com/show_bug.cgi?id=1229042#c13 --- Comment #13 from Marcos de Souza <mpdesouza@suse.com> --- Hi Takashi and Jiri, sorry for breaking the build of our kernels, and thanks a lot for fixing it! -- You are receiving this mail because: You are the assignee for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1229042 Maintenance Automation <maint-coord+maintenance-robot@suse.de> changed: What |Removed |Added ---------------------------------------------------------------------------- Status|NEW |IN_PROGRESS -- You are receiving this mail because: You are the assignee for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1229042 https://bugzilla.suse.com/show_bug.cgi?id=1229042#c25 Jiri Slaby <jslaby@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Resolution|--- |FIXED Status|IN_PROGRESS |RESOLVED --- Comment #25 from Jiri Slaby <jslaby@suse.com> --- I think this is done? -- You are receiving this mail because: You are the assignee for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1229042 https://bugzilla.suse.com/show_bug.cgi?id=1229042#c26 --- Comment #26 from Marcos de Souza <mpdesouza@suse.com> --- (In reply to Jiri Slaby from comment #25)
I think this is done?
Indeed, thanks! -- You are receiving this mail because: You are the assignee for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1229042 https://bugzilla.suse.com/show_bug.cgi?id=1229042#c30 --- Comment #30 from Maintenance Automation <maint-coord+maintenance-robot@suse.de> --- SUSE-SU-2024:3194-1: An update that solves 394 vulnerabilities, contains eight features and has 83 security fixes can now be installed. URL: https://www.suse.com/support/update/announcement/2024/suse-su-20243194-1 Category: security (important) Bug References: 1012628, 1193454, 1194869, 1205462, 1208783, 1213123, 1214285, 1215199, 1220066, 1220252, 1220877, 1221326, 1221630, 1221645, 1221652, 1221857, 1222254, 1222335, 1222350, 1222364, 1222372, 1222387, 1222433, 1222434, 1222463, 1222625, 1222633, 1222634, 1222808, 1222967, 1222973, 1223053, 1223074, 1223191, 1223395, 1223635, 1223720, 1223731, 1223742, 1223763, 1223767, 1223777, 1223803, 1224105, 1224415, 1224485, 1224496, 1224510, 1224535, 1224631, 1224636, 1224690, 1224694, 1224700, 1224711, 1225475, 1225582, 1225607, 1225717, 1225718, 1225744, 1225745, 1225751, 1225814, 1225832, 1225838, 1225903, 1226031, 1226127, 1226502, 1226530, 1226588, 1226604, 1226743, 1226751, 1226765, 1226798, 1226801, 1226834, 1226874, 1226885, 1226920, 1227149, 1227182, 1227383, 1227437, 1227492, 1227493, 1227494, 1227618, 1227620, 1227623, 1227627, 1227634, 1227706, 1227722, 1227724, 1227725, 1227728, 1227729, 1227732, 1227733, 1227734, 1227747, 1227750, 1227754, 1227758, 1227760, 1227761, 1227764, 1227766, 1227770, 1227771, 1227772, 1227774, 1227781, 1227784, 1227785, 1227787, 1227790, 1227791, 1227792, 1227796, 1227798, 1227799, 1227802, 1227808, 1227810, 1227811, 1227812, 1227815, 1227816, 1227818, 1227820, 1227823, 1227824, 1227826, 1227828, 1227829, 1227830, 1227832, 1227833, 1227834, 1227839, 1227840, 1227846, 1227849, 1227851, 1227853, 1227863, 1227864, 1227865, 1227867, 1227869, 1227870, 1227883, 1227884, 1227891, 1227893, 1227929, 1227950, 1227957, 1227981, 1228020, 1228021, 1228114, 1228192, 1228195, 1228202, 1228235, 1228236, 1228237, 1228247, 1228321, 1228409, 1228410, 1228426, 1228427, 1228429, 1228446, 1228447, 1228449, 1228450, 1228452, 1228456, 1228457, 1228458, 1228459, 1228460, 1228462, 1228463, 1228466, 1228467, 1228468, 1228469, 1228470, 1228472, 1228479, 1228480, 1228481, 1228482, 1228483, 1228484, 1228485, 1228486, 1228487, 1228489, 1228491, 1228492, 1228493, 1228494, 1228495, 1228496, 1228499, 1228500, 1228501, 1228502, 1228503, 1228505, 1228508, 1228509, 1228510, 1228511, 1228513, 1228515, 1228516, 1228518, 1228520, 1228525, 1228527, 1228530, 1228531, 1228539, 1228561, 1228563, 1228564, 1228565, 1228567, 1228568, 1228572, 1228576, 1228579, 1228580, 1228581, 1228582, 1228584, 1228586, 1228588, 1228590, 1228591, 1228599, 1228615, 1228616, 1228617, 1228625, 1228626, 1228633, 1228635, 1228636, 1228640, 1228643, 1228644, 1228646, 1228649, 1228650, 1228654, 1228655, 1228656, 1228658, 1228660, 1228662, 1228665, 1228666, 1228667, 1228672, 1228673, 1228674, 1228677, 1228680, 1228687, 1228705, 1228706, 1228707, 1228708, 1228709, 1228710, 1228718, 1228720, 1228721, 1228722, 1228723, 1228724, 1228726, 1228727, 1228733, 1228737, 1228743, 1228748, 1228754, 1228756, 1228757, 1228758, 1228764, 1228766, 1228779, 1228801, 1228849, 1228850, 1228857, 1228959, 1228964, 1228966, 1228967, 1228973, 1228977, 1228978, 1228979, 1228986, 1228988, 1228989, 1228991, 1228992, 1229005, 1229024, 1229042, 1229045, 1229046, 1229054, 1229056, 1229086, 1229134, 1229136, 1229154, 1229156, 1229160, 1229167, 1229168, 1229169, 1229170, 1229171, 1229172, 1229173, 1229174, 1229239, 1229240, 1229241, 1229243, 1229244, 1229245, 1229246, 1229247, 1229248, 1229249, 1229250, 1229251, 1229252, 1229253, 1229254, 1229255, 1229256, 1229287, 1229290, 1229291, 1229292, 1229294, 1229296, 1229297, 1229298, 1229299, 1229301, 1229303, 1229304, 1229305, 1229307, 1229309, 1229312, 1229313, 1229314, 1229315, 1229316, 1229317, 1229318, 1229319, 1229320, 1229327, 1229341, 1229342, 1229344, 1229345, 1229346, 1229347, 1229349, 1229350, 1229351, 1229353, 1229354, 1229355, 1229356, 1229357, 1229358, 1229359, 1229360, 1229365, 1229366, 1229369, 1229370, 1229373, 1229374, 1229379, 1229381, 1229382, 1229383, 1229386, 1229388, 1229390, 1229391, 1229392, 1229395, 1229398, 1229399, 1229400, 1229402, 1229403, 1229404, 1229407, 1229409, 1229410, 1229411, 1229413, 1229414, 1229417, 1229444, 1229451, 1229452, 1229455, 1229456, 1229480, 1229481, 1229482, 1229484, 1229485, 1229486, 1229487, 1229488, 1229489, 1229490, 1229493, 1229495, 1229496, 1229497, 1229500, 1229503, 1229707, 1229739, 1229743, 1229746, 1229747, 1229752, 1229754, 1229755, 1229756, 1229759, 1229761, 1229767, 1229781, 1229784, 1229785, 1229787, 1229788, 1229789, 1229792, 1229820, 1229827, 1229830, 1229837, 1229940, 1230056 CVE References: CVE-2023-52489, CVE-2023-52581, CVE-2023-52668, CVE-2023-52688, CVE-2023-52735, CVE-2023-52859, CVE-2023-52885, CVE-2023-52886, CVE-2023-52887, CVE-2023-52889, CVE-2024-26590, CVE-2024-26631, CVE-2024-26637, CVE-2024-26668, CVE-2024-26669, CVE-2024-26677, CVE-2024-26682, CVE-2024-26683, CVE-2024-26691, CVE-2024-26735, CVE-2024-26808, CVE-2024-26809, CVE-2024-26812, CVE-2024-26835, CVE-2024-26837, CVE-2024-26849, CVE-2024-26851, CVE-2024-26889, CVE-2024-26920, CVE-2024-26944, CVE-2024-26976, CVE-2024-27010, CVE-2024-27011, CVE-2024-27024, CVE-2024-27049, CVE-2024-27050, CVE-2024-27079, CVE-2024-27403, CVE-2024-27433, CVE-2024-27437, CVE-2024-31076, CVE-2024-35854, CVE-2024-35855, CVE-2024-35897, CVE-2024-35902, CVE-2024-35913, CVE-2024-35939, CVE-2024-35949, CVE-2024-36270, CVE-2024-36286, CVE-2024-36288, CVE-2024-36489, CVE-2024-36881, CVE-2024-36907, CVE-2024-36909, CVE-2024-36910, CVE-2024-36911, CVE-2024-36929, CVE-2024-36933, CVE-2024-36939, CVE-2024-36970, CVE-2024-36979, CVE-2024-38548, CVE-2024-38563, CVE-2024-38609, CVE-2024-38662, CVE-2024-39476, CVE-2024-39483, CVE-2024-39484, CVE-2024-39486, CVE-2024-39488, CVE-2024-39489, CVE-2024-39491, CVE-2024-39493, CVE-2024-39497, CVE-2024-39499, CVE-2024-39500, CVE-2024-39501, CVE-2024-39505, CVE-2024-39506, CVE-2024-39508, CVE-2024-39509, CVE-2024-39510, CVE-2024-40899, CVE-2024-40900, CVE-2024-40902, CVE-2024-40903, CVE-2024-40904, CVE-2024-40905, CVE-2024-40909, CVE-2024-40910, CVE-2024-40911, CVE-2024-40912, CVE-2024-40913, CVE-2024-40916, CVE-2024-40920, CVE-2024-40921, CVE-2024-40922, CVE-2024-40924, CVE-2024-40926, CVE-2024-40927, CVE-2024-40929, CVE-2024-40930, CVE-2024-40932, CVE-2024-40934, CVE-2024-40936, CVE-2024-40938, CVE-2024-40939, CVE-2024-40941, CVE-2024-40942, CVE-2024-40943, CVE-2024-40944, CVE-2024-40945, CVE-2024-40954, CVE-2024-40956, CVE-2024-40957, CVE-2024-40958, CVE-2024-40959, CVE-2024-40962, CVE-2024-40964, CVE-2024-40967, CVE-2024-40976, CVE-2024-40977, CVE-2024-40978, CVE-2024-40981, CVE-2024-40982, CVE-2024-40984, CVE-2024-40987, CVE-2024-40988, CVE-2024-40989, CVE-2024-40990, CVE-2024-40992, CVE-2024-40994, CVE-2024-40995, CVE-2024-40997, CVE-2024-41000, CVE-2024-41001, CVE-2024-41002, CVE-2024-41004, CVE-2024-41007, CVE-2024-41009, CVE-2024-41010, CVE-2024-41011, CVE-2024-41012, CVE-2024-41015, CVE-2024-41016, CVE-2024-41020, CVE-2024-41022, CVE-2024-41024, CVE-2024-41025, CVE-2024-41028, CVE-2024-41032, CVE-2024-41035, CVE-2024-41036, CVE-2024-41037, CVE-2024-41038, CVE-2024-41039, CVE-2024-41040, CVE-2024-41041, CVE-2024-41044, CVE-2024-41045, CVE-2024-41048, CVE-2024-41049, CVE-2024-41050, CVE-2024-41051, CVE-2024-41056, CVE-2024-41057, CVE-2024-41058, CVE-2024-41059, CVE-2024-41060, CVE-2024-41061, CVE-2024-41062, CVE-2024-41063, CVE-2024-41064, CVE-2024-41065, CVE-2024-41066, CVE-2024-41068, CVE-2024-41069, CVE-2024-41070, CVE-2024-41071, CVE-2024-41072, CVE-2024-41073, CVE-2024-41074, CVE-2024-41075, CVE-2024-41076, CVE-2024-41078, CVE-2024-41079, CVE-2024-41080, CVE-2024-41081, CVE-2024-41084, CVE-2024-41087, CVE-2024-41088, CVE-2024-41089, CVE-2024-41092, CVE-2024-41093, CVE-2024-41094, CVE-2024-41095, CVE-2024-41096, CVE-2024-41097, CVE-2024-41098, CVE-2024-42064, CVE-2024-42069, CVE-2024-42070, CVE-2024-42073, CVE-2024-42074, CVE-2024-42076, CVE-2024-42077, CVE-2024-42079, CVE-2024-42080, CVE-2024-42082, CVE-2024-42085, CVE-2024-42086, CVE-2024-42087, CVE-2024-42089, CVE-2024-42090, CVE-2024-42092, CVE-2024-42093, CVE-2024-42095, CVE-2024-42096, CVE-2024-42097, CVE-2024-42098, CVE-2024-42101, CVE-2024-42104, CVE-2024-42105, CVE-2024-42106, CVE-2024-42107, CVE-2024-42109, CVE-2024-42110, CVE-2024-42113, CVE-2024-42114, CVE-2024-42115, CVE-2024-42117, CVE-2024-42119, CVE-2024-42120, CVE-2024-42121, CVE-2024-42122, CVE-2024-42124, CVE-2024-42125, CVE-2024-42126, CVE-2024-42127, CVE-2024-42130, CVE-2024-42131, CVE-2024-42132, CVE-2024-42133, CVE-2024-42136, CVE-2024-42137, CVE-2024-42138, CVE-2024-42139, CVE-2024-42141, CVE-2024-42142, CVE-2024-42143, CVE-2024-42144, CVE-2024-42145, CVE-2024-42147, CVE-2024-42148, CVE-2024-42152, CVE-2024-42153, CVE-2024-42155, CVE-2024-42156, CVE-2024-42157, CVE-2024-42158, CVE-2024-42159, CVE-2024-42161, CVE-2024-42162, CVE-2024-42223, CVE-2024-42224, CVE-2024-42225, CVE-2024-42226, CVE-2024-42227, CVE-2024-42228, CVE-2024-42229, CVE-2024-42230, CVE-2024-42232, CVE-2024-42236, CVE-2024-42237, CVE-2024-42238, CVE-2024-42239, CVE-2024-42240, CVE-2024-42241, CVE-2024-42244, CVE-2024-42245, CVE-2024-42246, CVE-2024-42247, CVE-2024-42250, CVE-2024-42253, CVE-2024-42259, CVE-2024-42268, CVE-2024-42269, CVE-2024-42270, CVE-2024-42271, CVE-2024-42274, CVE-2024-42276, CVE-2024-42277, CVE-2024-42278, CVE-2024-42279, CVE-2024-42280, CVE-2024-42281, CVE-2024-42283, CVE-2024-42284, CVE-2024-42285, CVE-2024-42286, CVE-2024-42287, CVE-2024-42288, CVE-2024-42289, CVE-2024-42290, CVE-2024-42291, CVE-2024-42292, CVE-2024-42295, CVE-2024-42298, CVE-2024-42301, CVE-2024-42302, CVE-2024-42303, CVE-2024-42308, CVE-2024-42309, CVE-2024-42310, CVE-2024-42311, CVE-2024-42312, CVE-2024-42313, CVE-2024-42314, CVE-2024-42315, CVE-2024-42316, CVE-2024-42318, CVE-2024-42319, CVE-2024-42320, CVE-2024-42322, CVE-2024-43816, CVE-2024-43817, CVE-2024-43818, CVE-2024-43819, CVE-2024-43821, CVE-2024-43823, CVE-2024-43824, CVE-2024-43825, CVE-2024-43826, CVE-2024-43829, CVE-2024-43830, CVE-2024-43831, CVE-2024-43833, CVE-2024-43834, CVE-2024-43837, CVE-2024-43839, CVE-2024-43840, CVE-2024-43841, CVE-2024-43842, CVE-2024-43846, CVE-2024-43847, CVE-2024-43849, CVE-2024-43850, CVE-2024-43851, CVE-2024-43853, CVE-2024-43854, CVE-2024-43855, CVE-2024-43856, CVE-2024-43858, CVE-2024-43860, CVE-2024-43861, CVE-2024-43863, CVE-2024-43864, CVE-2024-43866, CVE-2024-43867, CVE-2024-43871, CVE-2024-43872, CVE-2024-43873, CVE-2024-43874, CVE-2024-43875, CVE-2024-43876, CVE-2024-43877, CVE-2024-43879, CVE-2024-43880, CVE-2024-43881, CVE-2024-43882, CVE-2024-43883, CVE-2024-43884, CVE-2024-43885, CVE-2024-43889, CVE-2024-43892, CVE-2024-43893, CVE-2024-43894, CVE-2024-43895, CVE-2024-43897, CVE-2024-43899, CVE-2024-43900, CVE-2024-43902, CVE-2024-43903, CVE-2024-43905, CVE-2024-43906, CVE-2024-43907, CVE-2024-43908, CVE-2024-43909, CVE-2024-43911, CVE-2024-43912, CVE-2024-44931, CVE-2024-44938, CVE-2024-44939 Jira References: PED-10029, PED-10045, PED-10055, PED-10105, PED-10108, PED-8491, PED-8779, PED-8954 Maintenance Incident: [SUSE:Maintenance:35522](https://smelt.suse.de/incident/35522/) Sources used: openSUSE Leap 15.6 (src): kernel-syms-azure-6.4.0-150600.8.11.1, kernel-source-azure-6.4.0-150600.8.11.1 Public Cloud Module 15-SP6 (src): kernel-syms-azure-6.4.0-150600.8.11.1, kernel-source-azure-6.4.0-150600.8.11.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. -- You are receiving this mail because: You are the assignee for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1229042 https://bugzilla.suse.com/show_bug.cgi?id=1229042#c31 --- Comment #31 from Maintenance Automation <maint-coord+maintenance-robot@suse.de> --- SUSE-SU-2024:3190-1: An update that solves 292 vulnerabilities, contains two features and has 45 security fixes can now be installed. URL: https://www.suse.com/support/update/announcement/2024/suse-su-20243190-1 Category: security (important) Bug References: 1193629, 1194111, 1194765, 1194869, 1196261, 1196516, 1196894, 1198017, 1203329, 1203330, 1203360, 1205462, 1206006, 1206258, 1206843, 1207158, 1208783, 1210644, 1213580, 1213632, 1214285, 1216834, 1220428, 1220877, 1220962, 1221269, 1221326, 1221630, 1221645, 1222335, 1222350, 1222372, 1222387, 1222634, 1222808, 1222967, 1223074, 1223191, 1223508, 1223720, 1223742, 1223777, 1223803, 1223807, 1224105, 1224415, 1224496, 1224510, 1224542, 1224578, 1224639, 1225162, 1225352, 1225428, 1225524, 1225578, 1225582, 1225773, 1225814, 1225827, 1225832, 1225903, 1226168, 1226530, 1226613, 1226742, 1226765, 1226798, 1226801, 1226874, 1226885, 1227079, 1227623, 1227761, 1227830, 1227863, 1227867, 1227929, 1227937, 1227958, 1228020, 1228065, 1228114, 1228410, 1228426, 1228427, 1228429, 1228446, 1228447, 1228449, 1228450, 1228452, 1228456, 1228463, 1228466, 1228467, 1228469, 1228480, 1228481, 1228482, 1228483, 1228484, 1228485, 1228487, 1228489, 1228491, 1228493, 1228494, 1228495, 1228496, 1228501, 1228503, 1228509, 1228513, 1228515, 1228516, 1228526, 1228531, 1228563, 1228564, 1228567, 1228576, 1228579, 1228584, 1228588, 1228590, 1228615, 1228616, 1228635, 1228636, 1228654, 1228656, 1228658, 1228660, 1228662, 1228667, 1228673, 1228677, 1228687, 1228706, 1228708, 1228710, 1228718, 1228720, 1228721, 1228722, 1228724, 1228726, 1228727, 1228733, 1228748, 1228766, 1228779, 1228801, 1228850, 1228857, 1228959, 1228964, 1228966, 1228967, 1228979, 1228988, 1228989, 1228991, 1228992, 1229042, 1229054, 1229086, 1229136, 1229154, 1229187, 1229188, 1229190, 1229287, 1229290, 1229292, 1229296, 1229297, 1229301, 1229303, 1229304, 1229305, 1229307, 1229309, 1229312, 1229314, 1229315, 1229317, 1229318, 1229319, 1229327, 1229341, 1229345, 1229346, 1229347, 1229349, 1229350, 1229351, 1229354, 1229356, 1229357, 1229358, 1229359, 1229360, 1229366, 1229370, 1229373, 1229374, 1229381, 1229382, 1229383, 1229386, 1229388, 1229391, 1229392, 1229395, 1229398, 1229399, 1229400, 1229407, 1229409, 1229410, 1229411, 1229413, 1229414, 1229417, 1229418, 1229444, 1229453, 1229454, 1229481, 1229482, 1229488, 1229489, 1229490, 1229493, 1229495, 1229497, 1229500, 1229503, 1229506, 1229507, 1229508, 1229509, 1229510, 1229512, 1229516, 1229521, 1229522, 1229523, 1229524, 1229525, 1229526, 1229527, 1229528, 1229529, 1229531, 1229533, 1229535, 1229536, 1229537, 1229540, 1229544, 1229545, 1229546, 1229547, 1229548, 1229554, 1229557, 1229558, 1229559, 1229560, 1229562, 1229564, 1229565, 1229566, 1229568, 1229569, 1229572, 1229573, 1229576, 1229581, 1229588, 1229598, 1229603, 1229604, 1229605, 1229608, 1229611, 1229612, 1229613, 1229614, 1229615, 1229616, 1229617, 1229620, 1229622, 1229623, 1229624, 1229625, 1229626, 1229628, 1229629, 1229630, 1229631, 1229632, 1229635, 1229636, 1229637, 1229638, 1229639, 1229641, 1229642, 1229643, 1229645, 1229657, 1229658, 1229662, 1229664, 1229707, 1229739, 1229743, 1229746, 1229754, 1229755, 1229756, 1229759, 1229761, 1229767, 1229768, 1229781, 1229784, 1229787, 1229788, 1229789, 1229792, 1229820 CVE References: CVE-2021-4441, CVE-2021-47106, CVE-2021-47517, CVE-2021-47546, CVE-2022-38457, CVE-2022-40133, CVE-2022-48645, CVE-2022-48706, CVE-2022-48808, CVE-2022-48865, CVE-2022-48868, CVE-2022-48869, CVE-2022-48870, CVE-2022-48871, CVE-2022-48872, CVE-2022-48873, CVE-2022-48875, CVE-2022-48878, CVE-2022-48880, CVE-2022-48881, CVE-2022-48882, CVE-2022-48883, CVE-2022-48884, CVE-2022-48885, CVE-2022-48886, CVE-2022-48887, CVE-2022-48888, CVE-2022-48889, CVE-2022-48890, CVE-2022-48891, CVE-2022-48893, CVE-2022-48896, CVE-2022-48898, CVE-2022-48899, CVE-2022-48903, CVE-2022-48904, CVE-2022-48905, CVE-2022-48906, CVE-2022-48907, CVE-2022-48909, CVE-2022-48910, CVE-2022-48912, CVE-2022-48913, CVE-2022-48914, CVE-2022-48915, CVE-2022-48916, CVE-2022-48917, CVE-2022-48918, CVE-2022-48919, CVE-2022-48920, CVE-2022-48921, CVE-2022-48923, CVE-2022-48924, CVE-2022-48925, CVE-2022-48926, CVE-2022-48927, CVE-2022-48928, CVE-2022-48929, CVE-2022-48930, CVE-2022-48931, CVE-2022-48932, CVE-2022-48934, CVE-2022-48937, CVE-2022-48938, CVE-2022-48939, CVE-2022-48940, CVE-2022-48941, CVE-2022-48942, CVE-2022-48943, CVE-2023-3610, CVE-2023-52458, CVE-2023-52489, CVE-2023-52498, CVE-2023-52581, CVE-2023-52859, CVE-2023-52887, CVE-2023-52889, CVE-2023-52893, CVE-2023-52894, CVE-2023-52896, CVE-2023-52898, CVE-2023-52899, CVE-2023-52900, CVE-2023-52901, CVE-2023-52904, CVE-2023-52905, CVE-2023-52906, CVE-2023-52907, CVE-2023-52908, CVE-2023-52909, CVE-2023-52910, CVE-2023-52911, CVE-2023-52912, CVE-2023-52913, CVE-2024-26631, CVE-2024-26668, CVE-2024-26669, CVE-2024-26677, CVE-2024-26735, CVE-2024-26808, CVE-2024-26812, CVE-2024-26835, CVE-2024-26851, CVE-2024-27010, CVE-2024-27011, CVE-2024-27016, CVE-2024-27024, CVE-2024-27079, CVE-2024-27403, CVE-2024-31076, CVE-2024-35897, CVE-2024-35902, CVE-2024-35945, CVE-2024-35971, CVE-2024-36009, CVE-2024-36013, CVE-2024-36270, CVE-2024-36286, CVE-2024-36489, CVE-2024-36929, CVE-2024-36933, CVE-2024-36936, CVE-2024-36962, CVE-2024-38554, CVE-2024-38602, CVE-2024-38662, CVE-2024-39489, CVE-2024-40905, CVE-2024-40978, CVE-2024-40980, CVE-2024-40995, CVE-2024-41000, CVE-2024-41007, CVE-2024-41009, CVE-2024-41011, CVE-2024-41016, CVE-2024-41020, CVE-2024-41022, CVE-2024-41035, CVE-2024-41036, CVE-2024-41038, CVE-2024-41039, CVE-2024-41042, CVE-2024-41045, CVE-2024-41056, CVE-2024-41060, CVE-2024-41062, CVE-2024-41065, CVE-2024-41068, CVE-2024-41073, CVE-2024-41079, CVE-2024-41080, CVE-2024-41087, CVE-2024-41088, CVE-2024-41089, CVE-2024-41092, CVE-2024-41093, CVE-2024-41095, CVE-2024-41097, CVE-2024-41098, CVE-2024-42069, CVE-2024-42074, CVE-2024-42076, CVE-2024-42077, CVE-2024-42080, CVE-2024-42082, CVE-2024-42085, CVE-2024-42086, CVE-2024-42087, CVE-2024-42089, CVE-2024-42090, CVE-2024-42092, CVE-2024-42095, CVE-2024-42097, CVE-2024-42098, CVE-2024-42101, CVE-2024-42104, CVE-2024-42106, CVE-2024-42107, CVE-2024-42110, CVE-2024-42114, CVE-2024-42115, CVE-2024-42119, CVE-2024-42120, CVE-2024-42121, CVE-2024-42126, CVE-2024-42127, CVE-2024-42130, CVE-2024-42137, CVE-2024-42139, CVE-2024-42142, CVE-2024-42143, CVE-2024-42148, CVE-2024-42152, CVE-2024-42155, CVE-2024-42156, CVE-2024-42157, CVE-2024-42158, CVE-2024-42162, CVE-2024-42223, CVE-2024-42225, CVE-2024-42228, CVE-2024-42229, CVE-2024-42230, CVE-2024-42232, CVE-2024-42236, CVE-2024-42237, CVE-2024-42238, CVE-2024-42239, CVE-2024-42240, CVE-2024-42244, CVE-2024-42246, CVE-2024-42247, CVE-2024-42268, CVE-2024-42271, CVE-2024-42274, CVE-2024-42276, CVE-2024-42277, CVE-2024-42280, CVE-2024-42281, CVE-2024-42283, CVE-2024-42284, CVE-2024-42285, CVE-2024-42286, CVE-2024-42287, CVE-2024-42288, CVE-2024-42289, CVE-2024-42291, CVE-2024-42292, CVE-2024-42295, CVE-2024-42301, CVE-2024-42302, CVE-2024-42308, CVE-2024-42309, CVE-2024-42310, CVE-2024-42311, CVE-2024-42312, CVE-2024-42313, CVE-2024-42315, CVE-2024-42318, CVE-2024-42319, CVE-2024-42320, CVE-2024-42322, CVE-2024-43816, CVE-2024-43818, CVE-2024-43819, CVE-2024-43821, CVE-2024-43823, CVE-2024-43829, CVE-2024-43830, CVE-2024-43831, CVE-2024-43834, CVE-2024-43837, CVE-2024-43839, CVE-2024-43841, CVE-2024-43842, CVE-2024-43846, CVE-2024-43849, CVE-2024-43853, CVE-2024-43854, CVE-2024-43856, CVE-2024-43858, CVE-2024-43860, CVE-2024-43861, CVE-2024-43863, CVE-2024-43866, CVE-2024-43867, CVE-2024-43871, CVE-2024-43872, CVE-2024-43873, CVE-2024-43879, CVE-2024-43880, CVE-2024-43882, CVE-2024-43883, CVE-2024-43884, CVE-2024-43889, CVE-2024-43892, CVE-2024-43893, CVE-2024-43894, CVE-2024-43895, CVE-2024-43899, CVE-2024-43900, CVE-2024-43902, CVE-2024-43903, CVE-2024-43904, CVE-2024-43905, CVE-2024-43907, CVE-2024-43908, CVE-2024-43909, CVE-2024-44938, CVE-2024-44939, CVE-2024-44947 Jira References: PED-8491, PED-8779 Maintenance Incident: [SUSE:Maintenance:35523](https://smelt.suse.de/incident/35523/) Sources used: openSUSE Leap 15.5 (src): kernel-syms-azure-5.14.21-150500.33.66.1, kernel-source-azure-5.14.21-150500.33.66.1 Public Cloud Module 15-SP5 (src): kernel-syms-azure-5.14.21-150500.33.66.1, kernel-source-azure-5.14.21-150500.33.66.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. -- You are receiving this mail because: You are the assignee for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1229042 https://bugzilla.suse.com/show_bug.cgi?id=1229042#c34 --- Comment #34 from Maintenance Automation <maint-coord+maintenance-robot@suse.de> --- SUSE-SU-2024:3195-1: An update that solves 393 vulnerabilities, contains six features and has 84 security fixes can now be installed. URL: https://www.suse.com/support/update/announcement/2024/suse-su-20243195-1 Category: security (important) Bug References: 1012628, 1193454, 1194869, 1205462, 1208783, 1213123, 1214285, 1215199, 1219596, 1220066, 1220252, 1220877, 1221326, 1221630, 1221645, 1221652, 1221857, 1222254, 1222335, 1222350, 1222364, 1222372, 1222387, 1222433, 1222434, 1222625, 1222633, 1222634, 1222777, 1222808, 1222967, 1222973, 1223053, 1223074, 1223191, 1223395, 1223635, 1223720, 1223731, 1223742, 1223763, 1223767, 1223777, 1223803, 1224105, 1224415, 1224485, 1224496, 1224510, 1224535, 1224631, 1224636, 1224690, 1224694, 1224700, 1224711, 1225461, 1225474, 1225475, 1225582, 1225607, 1225718, 1225751, 1225814, 1225832, 1225838, 1225903, 1226031, 1226127, 1226502, 1226530, 1226588, 1226604, 1226743, 1226751, 1226765, 1226798, 1226801, 1226834, 1226874, 1226885, 1226920, 1227149, 1227182, 1227383, 1227437, 1227492, 1227493, 1227494, 1227618, 1227620, 1227623, 1227627, 1227634, 1227706, 1227722, 1227724, 1227725, 1227728, 1227729, 1227732, 1227733, 1227734, 1227747, 1227750, 1227754, 1227758, 1227760, 1227761, 1227764, 1227766, 1227770, 1227771, 1227772, 1227774, 1227781, 1227784, 1227785, 1227787, 1227790, 1227791, 1227792, 1227796, 1227798, 1227799, 1227802, 1227808, 1227810, 1227811, 1227812, 1227815, 1227816, 1227818, 1227820, 1227823, 1227824, 1227826, 1227828, 1227829, 1227830, 1227832, 1227833, 1227834, 1227839, 1227840, 1227846, 1227849, 1227851, 1227853, 1227863, 1227864, 1227865, 1227867, 1227869, 1227870, 1227883, 1227884, 1227891, 1227893, 1227929, 1227950, 1227957, 1227981, 1228020, 1228021, 1228114, 1228192, 1228195, 1228202, 1228235, 1228236, 1228237, 1228247, 1228321, 1228409, 1228410, 1228426, 1228427, 1228429, 1228446, 1228447, 1228449, 1228450, 1228452, 1228456, 1228457, 1228458, 1228459, 1228460, 1228462, 1228463, 1228466, 1228467, 1228468, 1228469, 1228470, 1228472, 1228479, 1228480, 1228481, 1228482, 1228483, 1228484, 1228485, 1228486, 1228487, 1228489, 1228491, 1228492, 1228493, 1228494, 1228495, 1228496, 1228499, 1228500, 1228501, 1228502, 1228503, 1228505, 1228508, 1228509, 1228510, 1228511, 1228513, 1228515, 1228516, 1228518, 1228520, 1228525, 1228527, 1228530, 1228531, 1228539, 1228561, 1228563, 1228564, 1228565, 1228567, 1228568, 1228572, 1228576, 1228579, 1228580, 1228581, 1228582, 1228584, 1228586, 1228588, 1228590, 1228591, 1228599, 1228615, 1228616, 1228617, 1228625, 1228626, 1228633, 1228635, 1228636, 1228640, 1228643, 1228644, 1228646, 1228649, 1228650, 1228654, 1228655, 1228656, 1228658, 1228660, 1228662, 1228665, 1228666, 1228667, 1228672, 1228673, 1228674, 1228677, 1228680, 1228687, 1228705, 1228706, 1228707, 1228708, 1228709, 1228710, 1228718, 1228720, 1228721, 1228722, 1228723, 1228724, 1228726, 1228727, 1228733, 1228737, 1228743, 1228748, 1228754, 1228756, 1228757, 1228758, 1228764, 1228766, 1228779, 1228801, 1228849, 1228850, 1228857, 1228959, 1228964, 1228966, 1228967, 1228973, 1228977, 1228978, 1228979, 1228986, 1228988, 1228989, 1228991, 1228992, 1229005, 1229024, 1229042, 1229045, 1229046, 1229054, 1229056, 1229086, 1229134, 1229136, 1229154, 1229156, 1229160, 1229167, 1229168, 1229169, 1229170, 1229171, 1229172, 1229173, 1229174, 1229239, 1229240, 1229241, 1229243, 1229244, 1229245, 1229246, 1229247, 1229248, 1229249, 1229250, 1229251, 1229252, 1229253, 1229254, 1229255, 1229256, 1229287, 1229290, 1229291, 1229292, 1229294, 1229296, 1229297, 1229298, 1229299, 1229301, 1229303, 1229304, 1229305, 1229307, 1229309, 1229312, 1229313, 1229314, 1229315, 1229316, 1229317, 1229318, 1229319, 1229320, 1229327, 1229341, 1229342, 1229344, 1229345, 1229346, 1229347, 1229349, 1229350, 1229351, 1229353, 1229354, 1229355, 1229356, 1229357, 1229358, 1229359, 1229360, 1229365, 1229366, 1229369, 1229370, 1229373, 1229374, 1229379, 1229381, 1229382, 1229383, 1229386, 1229388, 1229390, 1229391, 1229392, 1229395, 1229398, 1229399, 1229400, 1229402, 1229403, 1229404, 1229407, 1229409, 1229410, 1229411, 1229413, 1229414, 1229417, 1229444, 1229451, 1229452, 1229455, 1229456, 1229480, 1229481, 1229482, 1229484, 1229485, 1229486, 1229487, 1229488, 1229489, 1229490, 1229493, 1229495, 1229496, 1229497, 1229500, 1229503, 1229707, 1229739, 1229743, 1229746, 1229747, 1229752, 1229754, 1229755, 1229756, 1229759, 1229761, 1229767, 1229781, 1229784, 1229785, 1229787, 1229788, 1229789, 1229792, 1229820, 1229827, 1229830, 1229837, 1229940, 1230056 CVE References: CVE-2023-52489, CVE-2023-52581, CVE-2023-52668, CVE-2023-52688, CVE-2023-52756, CVE-2023-52766, CVE-2023-52800, CVE-2023-52802, CVE-2023-52859, CVE-2023-52885, CVE-2023-52886, CVE-2023-52887, CVE-2023-52889, CVE-2024-26590, CVE-2024-26631, CVE-2024-26637, CVE-2024-26668, CVE-2024-26669, CVE-2024-26677, CVE-2024-26682, CVE-2024-26683, CVE-2024-26735, CVE-2024-26758, CVE-2024-26767, CVE-2024-26808, CVE-2024-26809, CVE-2024-26812, CVE-2024-26835, CVE-2024-26837, CVE-2024-26849, CVE-2024-26851, CVE-2024-26889, CVE-2024-26920, CVE-2024-26976, CVE-2024-27010, CVE-2024-27011, CVE-2024-27024, CVE-2024-27049, CVE-2024-27050, CVE-2024-27079, CVE-2024-27403, CVE-2024-27433, CVE-2024-27437, CVE-2024-31076, CVE-2024-35855, CVE-2024-35897, CVE-2024-35902, CVE-2024-35913, CVE-2024-35939, CVE-2024-35949, CVE-2024-36270, CVE-2024-36286, CVE-2024-36288, CVE-2024-36489, CVE-2024-36881, CVE-2024-36907, CVE-2024-36929, CVE-2024-36933, CVE-2024-36939, CVE-2024-36970, CVE-2024-36979, CVE-2024-38548, CVE-2024-38563, CVE-2024-38609, CVE-2024-38662, CVE-2024-39476, CVE-2024-39483, CVE-2024-39484, CVE-2024-39486, CVE-2024-39488, CVE-2024-39489, CVE-2024-39491, CVE-2024-39493, CVE-2024-39497, CVE-2024-39499, CVE-2024-39500, CVE-2024-39501, CVE-2024-39505, CVE-2024-39506, CVE-2024-39508, CVE-2024-39509, CVE-2024-39510, CVE-2024-40899, CVE-2024-40900, CVE-2024-40902, CVE-2024-40903, CVE-2024-40904, CVE-2024-40905, CVE-2024-40909, CVE-2024-40910, CVE-2024-40911, CVE-2024-40912, CVE-2024-40913, CVE-2024-40916, CVE-2024-40920, CVE-2024-40921, CVE-2024-40922, CVE-2024-40924, CVE-2024-40926, CVE-2024-40927, CVE-2024-40929, CVE-2024-40930, CVE-2024-40932, CVE-2024-40934, CVE-2024-40936, CVE-2024-40938, CVE-2024-40939, CVE-2024-40941, CVE-2024-40942, CVE-2024-40943, CVE-2024-40944, CVE-2024-40945, CVE-2024-40954, CVE-2024-40956, CVE-2024-40957, CVE-2024-40958, CVE-2024-40959, CVE-2024-40962, CVE-2024-40964, CVE-2024-40967, CVE-2024-40976, CVE-2024-40977, CVE-2024-40978, CVE-2024-40981, CVE-2024-40982, CVE-2024-40984, CVE-2024-40987, CVE-2024-40988, CVE-2024-40989, CVE-2024-40990, CVE-2024-40992, CVE-2024-40994, CVE-2024-40995, CVE-2024-40997, CVE-2024-41000, CVE-2024-41001, CVE-2024-41002, CVE-2024-41004, CVE-2024-41007, CVE-2024-41009, CVE-2024-41010, CVE-2024-41011, CVE-2024-41012, CVE-2024-41015, CVE-2024-41016, CVE-2024-41020, CVE-2024-41022, CVE-2024-41024, CVE-2024-41025, CVE-2024-41028, CVE-2024-41032, CVE-2024-41035, CVE-2024-41036, CVE-2024-41037, CVE-2024-41038, CVE-2024-41039, CVE-2024-41040, CVE-2024-41041, CVE-2024-41044, CVE-2024-41045, CVE-2024-41048, CVE-2024-41049, CVE-2024-41050, CVE-2024-41051, CVE-2024-41056, CVE-2024-41057, CVE-2024-41058, CVE-2024-41059, CVE-2024-41060, CVE-2024-41061, CVE-2024-41062, CVE-2024-41063, CVE-2024-41064, CVE-2024-41065, CVE-2024-41066, CVE-2024-41068, CVE-2024-41069, CVE-2024-41070, CVE-2024-41071, CVE-2024-41072, CVE-2024-41073, CVE-2024-41074, CVE-2024-41075, CVE-2024-41076, CVE-2024-41078, CVE-2024-41079, CVE-2024-41080, CVE-2024-41081, CVE-2024-41084, CVE-2024-41087, CVE-2024-41088, CVE-2024-41089, CVE-2024-41092, CVE-2024-41093, CVE-2024-41094, CVE-2024-41095, CVE-2024-41096, CVE-2024-41097, CVE-2024-41098, CVE-2024-42064, CVE-2024-42069, CVE-2024-42070, CVE-2024-42073, CVE-2024-42074, CVE-2024-42076, CVE-2024-42077, CVE-2024-42079, CVE-2024-42080, CVE-2024-42082, CVE-2024-42085, CVE-2024-42086, CVE-2024-42087, CVE-2024-42089, CVE-2024-42090, CVE-2024-42092, CVE-2024-42093, CVE-2024-42095, CVE-2024-42096, CVE-2024-42097, CVE-2024-42098, CVE-2024-42101, CVE-2024-42104, CVE-2024-42105, CVE-2024-42106, CVE-2024-42107, CVE-2024-42109, CVE-2024-42110, CVE-2024-42113, CVE-2024-42114, CVE-2024-42115, CVE-2024-42117, CVE-2024-42119, CVE-2024-42120, CVE-2024-42121, CVE-2024-42122, CVE-2024-42124, CVE-2024-42125, CVE-2024-42126, CVE-2024-42127, CVE-2024-42130, CVE-2024-42131, CVE-2024-42132, CVE-2024-42133, CVE-2024-42136, CVE-2024-42137, CVE-2024-42138, CVE-2024-42139, CVE-2024-42141, CVE-2024-42142, CVE-2024-42143, CVE-2024-42144, CVE-2024-42145, CVE-2024-42147, CVE-2024-42148, CVE-2024-42152, CVE-2024-42153, CVE-2024-42155, CVE-2024-42156, CVE-2024-42157, CVE-2024-42158, CVE-2024-42159, CVE-2024-42161, CVE-2024-42162, CVE-2024-42223, CVE-2024-42224, CVE-2024-42225, CVE-2024-42226, CVE-2024-42227, CVE-2024-42228, CVE-2024-42229, CVE-2024-42230, CVE-2024-42232, CVE-2024-42236, CVE-2024-42237, CVE-2024-42238, CVE-2024-42239, CVE-2024-42240, CVE-2024-42241, CVE-2024-42244, CVE-2024-42245, CVE-2024-42246, CVE-2024-42247, CVE-2024-42250, CVE-2024-42253, CVE-2024-42259, CVE-2024-42268, CVE-2024-42269, CVE-2024-42270, CVE-2024-42271, CVE-2024-42274, CVE-2024-42276, CVE-2024-42277, CVE-2024-42278, CVE-2024-42279, CVE-2024-42280, CVE-2024-42281, CVE-2024-42283, CVE-2024-42284, CVE-2024-42285, CVE-2024-42286, CVE-2024-42287, CVE-2024-42288, CVE-2024-42289, CVE-2024-42290, CVE-2024-42291, CVE-2024-42292, CVE-2024-42295, CVE-2024-42298, CVE-2024-42301, CVE-2024-42302, CVE-2024-42303, CVE-2024-42308, CVE-2024-42309, CVE-2024-42310, CVE-2024-42311, CVE-2024-42312, CVE-2024-42313, CVE-2024-42314, CVE-2024-42315, CVE-2024-42316, CVE-2024-42318, CVE-2024-42319, CVE-2024-42320, CVE-2024-42322, CVE-2024-43816, CVE-2024-43817, CVE-2024-43818, CVE-2024-43819, CVE-2024-43821, CVE-2024-43823, CVE-2024-43824, CVE-2024-43825, CVE-2024-43826, CVE-2024-43829, CVE-2024-43830, CVE-2024-43831, CVE-2024-43833, CVE-2024-43834, CVE-2024-43837, CVE-2024-43839, CVE-2024-43840, CVE-2024-43841, CVE-2024-43842, CVE-2024-43846, CVE-2024-43847, CVE-2024-43849, CVE-2024-43850, CVE-2024-43851, CVE-2024-43853, CVE-2024-43854, CVE-2024-43855, CVE-2024-43856, CVE-2024-43858, CVE-2024-43860, CVE-2024-43861, CVE-2024-43863, CVE-2024-43864, CVE-2024-43866, CVE-2024-43867, CVE-2024-43871, CVE-2024-43872, CVE-2024-43873, CVE-2024-43874, CVE-2024-43875, CVE-2024-43876, CVE-2024-43877, CVE-2024-43879, CVE-2024-43880, CVE-2024-43881, CVE-2024-43882, CVE-2024-43883, CVE-2024-43884, CVE-2024-43885, CVE-2024-43889, CVE-2024-43892, CVE-2024-43893, CVE-2024-43894, CVE-2024-43895, CVE-2024-43897, CVE-2024-43899, CVE-2024-43900, CVE-2024-43902, CVE-2024-43903, CVE-2024-43905, CVE-2024-43906, CVE-2024-43907, CVE-2024-43908, CVE-2024-43909, CVE-2024-43911, CVE-2024-43912, CVE-2024-44931, CVE-2024-44938, CVE-2024-44939 Jira References: PED-10029, PED-10045, PED-10055, PED-10105, PED-10108, PED-8779 Maintenance Incident: [SUSE:Maintenance:35570](https://smelt.suse.de/incident/35570/) Sources used: openSUSE Leap 15.6 (src): kernel-source-rt-6.4.0-150600.10.8.3, kernel-syms-rt-6.4.0-150600.10.8.1 SUSE Linux Enterprise Live Patching 15-SP6 (src): kernel-livepatch-SLE15-SP6-RT_Update_2-1-150600.1.3.2 SUSE Real Time Module 15-SP6 (src): kernel-source-rt-6.4.0-150600.10.8.3, kernel-syms-rt-6.4.0-150600.10.8.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. -- You are receiving this mail because: You are the assignee for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1229042 https://bugzilla.suse.com/show_bug.cgi?id=1229042#c35 --- Comment #35 from Maintenance Automation <maint-coord+maintenance-robot@suse.de> --- SUSE-SU-2024:3209-1: An update that solves 292 vulnerabilities, contains two features and has 45 security fixes can now be installed. URL: https://www.suse.com/support/update/announcement/2024/suse-su-20243209-1 Category: security (important) Bug References: 1193629, 1194111, 1194765, 1194869, 1196261, 1196516, 1196894, 1198017, 1203329, 1203330, 1203360, 1205462, 1206006, 1206258, 1206843, 1207158, 1208783, 1210644, 1213580, 1213632, 1214285, 1216834, 1220428, 1220877, 1220962, 1221269, 1221326, 1221630, 1221645, 1222335, 1222350, 1222372, 1222387, 1222634, 1222808, 1222967, 1223074, 1223191, 1223508, 1223720, 1223742, 1223777, 1223803, 1223807, 1224105, 1224415, 1224496, 1224510, 1224542, 1224578, 1224639, 1225162, 1225352, 1225428, 1225524, 1225578, 1225582, 1225773, 1225814, 1225827, 1225832, 1225903, 1226168, 1226530, 1226613, 1226742, 1226765, 1226798, 1226801, 1226874, 1226885, 1227079, 1227623, 1227761, 1227830, 1227863, 1227867, 1227929, 1227937, 1227958, 1228020, 1228065, 1228114, 1228410, 1228426, 1228427, 1228429, 1228446, 1228447, 1228449, 1228450, 1228452, 1228456, 1228463, 1228466, 1228467, 1228469, 1228480, 1228481, 1228482, 1228483, 1228484, 1228485, 1228487, 1228489, 1228491, 1228493, 1228494, 1228495, 1228496, 1228501, 1228503, 1228509, 1228513, 1228515, 1228516, 1228526, 1228531, 1228563, 1228564, 1228567, 1228576, 1228579, 1228584, 1228588, 1228590, 1228615, 1228616, 1228635, 1228636, 1228654, 1228656, 1228658, 1228660, 1228662, 1228667, 1228673, 1228677, 1228687, 1228706, 1228708, 1228710, 1228718, 1228720, 1228721, 1228722, 1228724, 1228726, 1228727, 1228733, 1228748, 1228766, 1228779, 1228801, 1228850, 1228857, 1228959, 1228964, 1228966, 1228967, 1228979, 1228988, 1228989, 1228991, 1228992, 1229042, 1229054, 1229086, 1229136, 1229154, 1229187, 1229188, 1229190, 1229287, 1229290, 1229292, 1229296, 1229297, 1229301, 1229303, 1229304, 1229305, 1229307, 1229309, 1229312, 1229314, 1229315, 1229317, 1229318, 1229319, 1229327, 1229341, 1229345, 1229346, 1229347, 1229349, 1229350, 1229351, 1229354, 1229356, 1229357, 1229358, 1229359, 1229360, 1229366, 1229370, 1229373, 1229374, 1229381, 1229382, 1229383, 1229386, 1229388, 1229391, 1229392, 1229395, 1229398, 1229399, 1229400, 1229407, 1229409, 1229410, 1229411, 1229413, 1229414, 1229417, 1229418, 1229444, 1229453, 1229454, 1229481, 1229482, 1229488, 1229489, 1229490, 1229493, 1229495, 1229497, 1229500, 1229503, 1229506, 1229507, 1229508, 1229509, 1229510, 1229512, 1229516, 1229521, 1229522, 1229523, 1229524, 1229525, 1229526, 1229527, 1229528, 1229529, 1229531, 1229533, 1229535, 1229536, 1229537, 1229540, 1229544, 1229545, 1229546, 1229547, 1229548, 1229554, 1229557, 1229558, 1229559, 1229560, 1229562, 1229564, 1229565, 1229566, 1229568, 1229569, 1229572, 1229573, 1229576, 1229581, 1229588, 1229598, 1229603, 1229604, 1229605, 1229608, 1229611, 1229612, 1229613, 1229614, 1229615, 1229616, 1229617, 1229620, 1229622, 1229623, 1229624, 1229625, 1229626, 1229628, 1229629, 1229630, 1229631, 1229632, 1229635, 1229636, 1229637, 1229638, 1229639, 1229641, 1229642, 1229643, 1229645, 1229657, 1229658, 1229662, 1229664, 1229707, 1229739, 1229743, 1229746, 1229754, 1229755, 1229756, 1229759, 1229761, 1229767, 1229768, 1229781, 1229784, 1229787, 1229788, 1229789, 1229792, 1229820 CVE References: CVE-2021-4441, CVE-2021-47106, CVE-2021-47517, CVE-2021-47546, CVE-2022-38457, CVE-2022-40133, CVE-2022-48645, CVE-2022-48706, CVE-2022-48808, CVE-2022-48865, CVE-2022-48868, CVE-2022-48869, CVE-2022-48870, CVE-2022-48871, CVE-2022-48872, CVE-2022-48873, CVE-2022-48875, CVE-2022-48878, CVE-2022-48880, CVE-2022-48881, CVE-2022-48882, CVE-2022-48883, CVE-2022-48884, CVE-2022-48885, CVE-2022-48886, CVE-2022-48887, CVE-2022-48888, CVE-2022-48889, CVE-2022-48890, CVE-2022-48891, CVE-2022-48893, CVE-2022-48896, CVE-2022-48898, CVE-2022-48899, CVE-2022-48903, CVE-2022-48904, CVE-2022-48905, CVE-2022-48906, CVE-2022-48907, CVE-2022-48909, CVE-2022-48910, CVE-2022-48912, CVE-2022-48913, CVE-2022-48914, CVE-2022-48915, CVE-2022-48916, CVE-2022-48917, CVE-2022-48918, CVE-2022-48919, CVE-2022-48920, CVE-2022-48921, CVE-2022-48923, CVE-2022-48924, CVE-2022-48925, CVE-2022-48926, CVE-2022-48927, CVE-2022-48928, CVE-2022-48929, CVE-2022-48930, CVE-2022-48931, CVE-2022-48932, CVE-2022-48934, CVE-2022-48937, CVE-2022-48938, CVE-2022-48939, CVE-2022-48940, CVE-2022-48941, CVE-2022-48942, CVE-2022-48943, CVE-2023-3610, CVE-2023-52458, CVE-2023-52489, CVE-2023-52498, CVE-2023-52581, CVE-2023-52859, CVE-2023-52887, CVE-2023-52889, CVE-2023-52893, CVE-2023-52894, CVE-2023-52896, CVE-2023-52898, CVE-2023-52899, CVE-2023-52900, CVE-2023-52901, CVE-2023-52904, CVE-2023-52905, CVE-2023-52906, CVE-2023-52907, CVE-2023-52908, CVE-2023-52909, CVE-2023-52910, CVE-2023-52911, CVE-2023-52912, CVE-2023-52913, CVE-2024-26631, CVE-2024-26668, CVE-2024-26669, CVE-2024-26677, CVE-2024-26735, CVE-2024-26808, CVE-2024-26812, CVE-2024-26835, CVE-2024-26851, CVE-2024-27010, CVE-2024-27011, CVE-2024-27016, CVE-2024-27024, CVE-2024-27079, CVE-2024-27403, CVE-2024-31076, CVE-2024-35897, CVE-2024-35902, CVE-2024-35945, CVE-2024-35971, CVE-2024-36009, CVE-2024-36013, CVE-2024-36270, CVE-2024-36286, CVE-2024-36489, CVE-2024-36929, CVE-2024-36933, CVE-2024-36936, CVE-2024-36962, CVE-2024-38554, CVE-2024-38602, CVE-2024-38662, CVE-2024-39489, CVE-2024-40905, CVE-2024-40978, CVE-2024-40980, CVE-2024-40995, CVE-2024-41000, CVE-2024-41007, CVE-2024-41009, CVE-2024-41011, CVE-2024-41016, CVE-2024-41020, CVE-2024-41022, CVE-2024-41035, CVE-2024-41036, CVE-2024-41038, CVE-2024-41039, CVE-2024-41042, CVE-2024-41045, CVE-2024-41056, CVE-2024-41060, CVE-2024-41062, CVE-2024-41065, CVE-2024-41068, CVE-2024-41073, CVE-2024-41079, CVE-2024-41080, CVE-2024-41087, CVE-2024-41088, CVE-2024-41089, CVE-2024-41092, CVE-2024-41093, CVE-2024-41095, CVE-2024-41097, CVE-2024-41098, CVE-2024-42069, CVE-2024-42074, CVE-2024-42076, CVE-2024-42077, CVE-2024-42080, CVE-2024-42082, CVE-2024-42085, CVE-2024-42086, CVE-2024-42087, CVE-2024-42089, CVE-2024-42090, CVE-2024-42092, CVE-2024-42095, CVE-2024-42097, CVE-2024-42098, CVE-2024-42101, CVE-2024-42104, CVE-2024-42106, CVE-2024-42107, CVE-2024-42110, CVE-2024-42114, CVE-2024-42115, CVE-2024-42119, CVE-2024-42120, CVE-2024-42121, CVE-2024-42126, CVE-2024-42127, CVE-2024-42130, CVE-2024-42137, CVE-2024-42139, CVE-2024-42142, CVE-2024-42143, CVE-2024-42148, CVE-2024-42152, CVE-2024-42155, CVE-2024-42156, CVE-2024-42157, CVE-2024-42158, CVE-2024-42162, CVE-2024-42223, CVE-2024-42225, CVE-2024-42228, CVE-2024-42229, CVE-2024-42230, CVE-2024-42232, CVE-2024-42236, CVE-2024-42237, CVE-2024-42238, CVE-2024-42239, CVE-2024-42240, CVE-2024-42244, CVE-2024-42246, CVE-2024-42247, CVE-2024-42268, CVE-2024-42271, CVE-2024-42274, CVE-2024-42276, CVE-2024-42277, CVE-2024-42280, CVE-2024-42281, CVE-2024-42283, CVE-2024-42284, CVE-2024-42285, CVE-2024-42286, CVE-2024-42287, CVE-2024-42288, CVE-2024-42289, CVE-2024-42291, CVE-2024-42292, CVE-2024-42295, CVE-2024-42301, CVE-2024-42302, CVE-2024-42308, CVE-2024-42309, CVE-2024-42310, CVE-2024-42311, CVE-2024-42312, CVE-2024-42313, CVE-2024-42315, CVE-2024-42318, CVE-2024-42319, CVE-2024-42320, CVE-2024-42322, CVE-2024-43816, CVE-2024-43818, CVE-2024-43819, CVE-2024-43821, CVE-2024-43823, CVE-2024-43829, CVE-2024-43830, CVE-2024-43831, CVE-2024-43834, CVE-2024-43837, CVE-2024-43839, CVE-2024-43841, CVE-2024-43842, CVE-2024-43846, CVE-2024-43849, CVE-2024-43853, CVE-2024-43854, CVE-2024-43856, CVE-2024-43858, CVE-2024-43860, CVE-2024-43861, CVE-2024-43863, CVE-2024-43866, CVE-2024-43867, CVE-2024-43871, CVE-2024-43872, CVE-2024-43873, CVE-2024-43879, CVE-2024-43880, CVE-2024-43882, CVE-2024-43883, CVE-2024-43884, CVE-2024-43889, CVE-2024-43892, CVE-2024-43893, CVE-2024-43894, CVE-2024-43895, CVE-2024-43899, CVE-2024-43900, CVE-2024-43902, CVE-2024-43903, CVE-2024-43904, CVE-2024-43905, CVE-2024-43907, CVE-2024-43908, CVE-2024-43909, CVE-2024-44938, CVE-2024-44939, CVE-2024-44947 Jira References: PED-8491, PED-8779 Maintenance Incident: [SUSE:Maintenance:35569](https://smelt.suse.de/incident/35569/) Sources used: SUSE Linux Enterprise Live Patching 15-SP5 (src): kernel-livepatch-SLE15-SP5-RT_Update_19-1-150500.11.3.2 SUSE Real Time Module 15-SP5 (src): kernel-syms-rt-5.14.21-150500.13.67.1, kernel-source-rt-5.14.21-150500.13.67.3 openSUSE Leap 15.5 (src): kernel-livepatch-SLE15-SP5-RT_Update_19-1-150500.11.3.2, kernel-syms-rt-5.14.21-150500.13.67.1, kernel-source-rt-5.14.21-150500.13.67.3 SUSE Linux Enterprise Micro 5.5 (src): kernel-source-rt-5.14.21-150500.13.67.3 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. -- You are receiving this mail because: You are the assignee for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1229042 https://bugzilla.suse.com/show_bug.cgi?id=1229042#c36 --- Comment #36 from Maintenance Automation <maint-coord+maintenance-robot@suse.de> --- SUSE-SU-2024:3227-1: An update that solves 69 vulnerabilities and has 17 security fixes can now be installed. URL: https://www.suse.com/support/update/announcement/2024/suse-su-20243227-1 Category: security (important) Bug References: 1193629, 1194111, 1194765, 1196261, 1196516, 1196894, 1198017, 1203360, 1206006, 1206258, 1207158, 1216834, 1221326, 1221645, 1223191, 1224105, 1227832, 1228020, 1228466, 1228516, 1228576, 1228718, 1228801, 1228959, 1229042, 1229292, 1229400, 1229454, 1229500, 1229503, 1229506, 1229507, 1229508, 1229509, 1229510, 1229512, 1229516, 1229522, 1229526, 1229528, 1229531, 1229533, 1229535, 1229536, 1229537, 1229540, 1229544, 1229554, 1229557, 1229565, 1229566, 1229568, 1229581, 1229598, 1229603, 1229604, 1229608, 1229611, 1229612, 1229613, 1229614, 1229617, 1229619, 1229620, 1229622, 1229623, 1229624, 1229625, 1229626, 1229628, 1229629, 1229630, 1229631, 1229635, 1229636, 1229637, 1229638, 1229639, 1229641, 1229642, 1229643, 1229645, 1229657, 1229664, 1229707, 1229792 CVE References: CVE-2021-4441, CVE-2022-48868, CVE-2022-48869, CVE-2022-48870, CVE-2022-48871, CVE-2022-48872, CVE-2022-48873, CVE-2022-48875, CVE-2022-48878, CVE-2022-48880, CVE-2022-48890, CVE-2022-48891, CVE-2022-48896, CVE-2022-48898, CVE-2022-48899, CVE-2022-48903, CVE-2022-48904, CVE-2022-48905, CVE-2022-48907, CVE-2022-48909, CVE-2022-48912, CVE-2022-48913, CVE-2022-48914, CVE-2022-48915, CVE-2022-48916, CVE-2022-48917, CVE-2022-48918, CVE-2022-48919, CVE-2022-48921, CVE-2022-48924, CVE-2022-48925, CVE-2022-48926, CVE-2022-48927, CVE-2022-48928, CVE-2022-48929, CVE-2022-48930, CVE-2022-48931, CVE-2022-48932, CVE-2022-48934, CVE-2022-48935, CVE-2022-48937, CVE-2022-48938, CVE-2022-48941, CVE-2022-48942, CVE-2022-48943, CVE-2023-52489, CVE-2023-52893, CVE-2023-52894, CVE-2023-52896, CVE-2023-52898, CVE-2023-52900, CVE-2023-52901, CVE-2023-52905, CVE-2023-52907, CVE-2023-52911, CVE-2024-40910, CVE-2024-41009, CVE-2024-41062, CVE-2024-41087, CVE-2024-42077, CVE-2024-42126, CVE-2024-42232, CVE-2024-42271, CVE-2024-43853, CVE-2024-43861, CVE-2024-43882, CVE-2024-43883, CVE-2024-44938, CVE-2024-44947 Maintenance Incident: [SUSE:Maintenance:35567](https://smelt.suse.de/incident/35567/) Sources used: SUSE Linux Enterprise Micro for Rancher 5.3 (src): kernel-source-rt-5.14.21-150400.15.91.3 SUSE Linux Enterprise Micro 5.3 (src): kernel-source-rt-5.14.21-150400.15.91.3 SUSE Linux Enterprise Micro for Rancher 5.4 (src): kernel-source-rt-5.14.21-150400.15.91.3 SUSE Linux Enterprise Micro 5.4 (src): kernel-source-rt-5.14.21-150400.15.91.3 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. -- You are receiving this mail because: You are the assignee for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1229042 https://bugzilla.suse.com/show_bug.cgi?id=1229042#c47 --- Comment #47 from Maintenance Automation <maint-coord+maintenance-robot@suse.de> --- SUSE-SU-2024:3383-1: An update that solves 394 vulnerabilities, contains eight features and has 85 security fixes can now be installed. URL: https://www.suse.com/support/update/announcement/2024/suse-su-20243383-1 Category: security (important) Bug References: 1012628, 1193454, 1194869, 1205462, 1208783, 1213123, 1214285, 1215199, 1220066, 1220252, 1220877, 1221326, 1221630, 1221645, 1221652, 1221857, 1222254, 1222335, 1222350, 1222364, 1222372, 1222387, 1222433, 1222434, 1222463, 1222625, 1222633, 1222634, 1222808, 1222967, 1222973, 1223053, 1223074, 1223191, 1223395, 1223635, 1223720, 1223731, 1223742, 1223763, 1223767, 1223777, 1223803, 1224105, 1224415, 1224485, 1224496, 1224510, 1224535, 1224631, 1224636, 1224690, 1224694, 1224700, 1224711, 1225475, 1225582, 1225607, 1225717, 1225718, 1225744, 1225745, 1225751, 1225814, 1225832, 1225838, 1225903, 1226031, 1226127, 1226502, 1226530, 1226588, 1226604, 1226743, 1226751, 1226765, 1226798, 1226801, 1226834, 1226874, 1226885, 1226920, 1227149, 1227182, 1227383, 1227437, 1227492, 1227493, 1227494, 1227618, 1227620, 1227623, 1227627, 1227634, 1227706, 1227722, 1227724, 1227725, 1227728, 1227729, 1227732, 1227733, 1227734, 1227747, 1227750, 1227754, 1227758, 1227760, 1227761, 1227764, 1227766, 1227770, 1227771, 1227772, 1227774, 1227781, 1227784, 1227785, 1227787, 1227790, 1227791, 1227792, 1227796, 1227798, 1227799, 1227802, 1227808, 1227810, 1227811, 1227812, 1227815, 1227816, 1227818, 1227820, 1227823, 1227824, 1227826, 1227828, 1227829, 1227830, 1227832, 1227833, 1227834, 1227839, 1227840, 1227846, 1227849, 1227851, 1227853, 1227863, 1227864, 1227865, 1227867, 1227869, 1227870, 1227883, 1227884, 1227891, 1227893, 1227929, 1227950, 1227957, 1227981, 1228020, 1228021, 1228114, 1228192, 1228195, 1228202, 1228235, 1228236, 1228237, 1228247, 1228321, 1228409, 1228410, 1228426, 1228427, 1228429, 1228446, 1228447, 1228449, 1228450, 1228452, 1228456, 1228457, 1228458, 1228459, 1228460, 1228462, 1228463, 1228466, 1228467, 1228468, 1228469, 1228470, 1228472, 1228479, 1228480, 1228481, 1228482, 1228483, 1228484, 1228485, 1228486, 1228487, 1228489, 1228491, 1228492, 1228493, 1228494, 1228495, 1228496, 1228499, 1228500, 1228501, 1228502, 1228503, 1228505, 1228508, 1228509, 1228510, 1228511, 1228513, 1228515, 1228516, 1228518, 1228520, 1228525, 1228527, 1228530, 1228531, 1228539, 1228561, 1228563, 1228564, 1228565, 1228567, 1228568, 1228572, 1228576, 1228579, 1228580, 1228581, 1228582, 1228584, 1228586, 1228588, 1228590, 1228591, 1228599, 1228615, 1228616, 1228617, 1228625, 1228626, 1228633, 1228635, 1228636, 1228640, 1228643, 1228644, 1228646, 1228649, 1228650, 1228654, 1228655, 1228656, 1228658, 1228660, 1228662, 1228665, 1228666, 1228667, 1228672, 1228673, 1228674, 1228677, 1228680, 1228687, 1228705, 1228706, 1228707, 1228708, 1228709, 1228710, 1228718, 1228720, 1228721, 1228722, 1228723, 1228724, 1228726, 1228727, 1228733, 1228737, 1228743, 1228748, 1228754, 1228756, 1228757, 1228758, 1228764, 1228766, 1228779, 1228801, 1228849, 1228850, 1228857, 1228959, 1228964, 1228966, 1228967, 1228973, 1228977, 1228978, 1228979, 1228986, 1228988, 1228989, 1228991, 1228992, 1229005, 1229024, 1229042, 1229045, 1229046, 1229054, 1229056, 1229086, 1229134, 1229136, 1229154, 1229156, 1229160, 1229167, 1229168, 1229169, 1229170, 1229171, 1229172, 1229173, 1229174, 1229239, 1229240, 1229241, 1229243, 1229244, 1229245, 1229246, 1229247, 1229248, 1229249, 1229250, 1229251, 1229252, 1229253, 1229254, 1229255, 1229256, 1229287, 1229290, 1229291, 1229292, 1229294, 1229296, 1229297, 1229298, 1229299, 1229301, 1229303, 1229304, 1229305, 1229307, 1229309, 1229312, 1229313, 1229314, 1229315, 1229316, 1229317, 1229318, 1229319, 1229320, 1229327, 1229341, 1229342, 1229344, 1229345, 1229346, 1229347, 1229349, 1229350, 1229351, 1229353, 1229354, 1229355, 1229356, 1229357, 1229358, 1229359, 1229360, 1229365, 1229366, 1229369, 1229370, 1229373, 1229374, 1229379, 1229381, 1229382, 1229383, 1229386, 1229388, 1229390, 1229391, 1229392, 1229395, 1229398, 1229399, 1229400, 1229402, 1229403, 1229404, 1229407, 1229409, 1229410, 1229411, 1229413, 1229414, 1229417, 1229444, 1229451, 1229452, 1229455, 1229456, 1229480, 1229481, 1229482, 1229484, 1229485, 1229486, 1229487, 1229488, 1229489, 1229490, 1229493, 1229495, 1229496, 1229497, 1229500, 1229503, 1229707, 1229739, 1229743, 1229746, 1229747, 1229752, 1229754, 1229755, 1229756, 1229759, 1229761, 1229767, 1229781, 1229784, 1229785, 1229787, 1229788, 1229789, 1229792, 1229820, 1229827, 1229830, 1229837, 1229940, 1230056, 1230350, 1230413 CVE References: CVE-2023-52489, CVE-2023-52581, CVE-2023-52668, CVE-2023-52688, CVE-2023-52735, CVE-2023-52859, CVE-2023-52885, CVE-2023-52886, CVE-2023-52887, CVE-2023-52889, CVE-2024-26590, CVE-2024-26631, CVE-2024-26637, CVE-2024-26668, CVE-2024-26669, CVE-2024-26677, CVE-2024-26682, CVE-2024-26683, CVE-2024-26691, CVE-2024-26735, CVE-2024-26808, CVE-2024-26809, CVE-2024-26812, CVE-2024-26835, CVE-2024-26837, CVE-2024-26849, CVE-2024-26851, CVE-2024-26889, CVE-2024-26920, CVE-2024-26944, CVE-2024-26976, CVE-2024-27010, CVE-2024-27011, CVE-2024-27024, CVE-2024-27049, CVE-2024-27050, CVE-2024-27079, CVE-2024-27403, CVE-2024-27433, CVE-2024-27437, CVE-2024-31076, CVE-2024-35854, CVE-2024-35855, CVE-2024-35897, CVE-2024-35902, CVE-2024-35913, CVE-2024-35939, CVE-2024-35949, CVE-2024-36270, CVE-2024-36286, CVE-2024-36288, CVE-2024-36489, CVE-2024-36881, CVE-2024-36907, CVE-2024-36909, CVE-2024-36910, CVE-2024-36911, CVE-2024-36929, CVE-2024-36933, CVE-2024-36939, CVE-2024-36970, CVE-2024-36979, CVE-2024-38548, CVE-2024-38563, CVE-2024-38609, CVE-2024-38662, CVE-2024-39476, CVE-2024-39483, CVE-2024-39484, CVE-2024-39486, CVE-2024-39488, CVE-2024-39489, CVE-2024-39491, CVE-2024-39493, CVE-2024-39497, CVE-2024-39499, CVE-2024-39500, CVE-2024-39501, CVE-2024-39505, CVE-2024-39506, CVE-2024-39508, CVE-2024-39509, CVE-2024-39510, CVE-2024-40899, CVE-2024-40900, CVE-2024-40902, CVE-2024-40903, CVE-2024-40904, CVE-2024-40905, CVE-2024-40909, CVE-2024-40910, CVE-2024-40911, CVE-2024-40912, CVE-2024-40913, CVE-2024-40916, CVE-2024-40920, CVE-2024-40921, CVE-2024-40922, CVE-2024-40924, CVE-2024-40926, CVE-2024-40927, CVE-2024-40929, CVE-2024-40930, CVE-2024-40932, CVE-2024-40934, CVE-2024-40936, CVE-2024-40938, CVE-2024-40939, CVE-2024-40941, CVE-2024-40942, CVE-2024-40943, CVE-2024-40944, CVE-2024-40945, CVE-2024-40954, CVE-2024-40956, CVE-2024-40957, CVE-2024-40958, CVE-2024-40959, CVE-2024-40962, CVE-2024-40964, CVE-2024-40967, CVE-2024-40976, CVE-2024-40977, CVE-2024-40978, CVE-2024-40981, CVE-2024-40982, CVE-2024-40984, CVE-2024-40987, CVE-2024-40988, CVE-2024-40989, CVE-2024-40990, CVE-2024-40992, CVE-2024-40994, CVE-2024-40995, CVE-2024-40997, CVE-2024-41000, CVE-2024-41001, CVE-2024-41002, CVE-2024-41004, CVE-2024-41007, CVE-2024-41009, CVE-2024-41010, CVE-2024-41011, CVE-2024-41012, CVE-2024-41015, CVE-2024-41016, CVE-2024-41020, CVE-2024-41022, CVE-2024-41024, CVE-2024-41025, CVE-2024-41028, CVE-2024-41032, CVE-2024-41035, CVE-2024-41036, CVE-2024-41037, CVE-2024-41038, CVE-2024-41039, CVE-2024-41040, CVE-2024-41041, CVE-2024-41044, CVE-2024-41045, CVE-2024-41048, CVE-2024-41049, CVE-2024-41050, CVE-2024-41051, CVE-2024-41056, CVE-2024-41057, CVE-2024-41058, CVE-2024-41059, CVE-2024-41060, CVE-2024-41061, CVE-2024-41062, CVE-2024-41063, CVE-2024-41064, CVE-2024-41065, CVE-2024-41066, CVE-2024-41068, CVE-2024-41069, CVE-2024-41070, CVE-2024-41071, CVE-2024-41072, CVE-2024-41073, CVE-2024-41074, CVE-2024-41075, CVE-2024-41076, CVE-2024-41078, CVE-2024-41079, CVE-2024-41080, CVE-2024-41081, CVE-2024-41084, CVE-2024-41087, CVE-2024-41088, CVE-2024-41089, CVE-2024-41092, CVE-2024-41093, CVE-2024-41094, CVE-2024-41095, CVE-2024-41096, CVE-2024-41097, CVE-2024-41098, CVE-2024-42064, CVE-2024-42069, CVE-2024-42070, CVE-2024-42073, CVE-2024-42074, CVE-2024-42076, CVE-2024-42077, CVE-2024-42079, CVE-2024-42080, CVE-2024-42082, CVE-2024-42085, CVE-2024-42086, CVE-2024-42087, CVE-2024-42089, CVE-2024-42090, CVE-2024-42092, CVE-2024-42093, CVE-2024-42095, CVE-2024-42096, CVE-2024-42097, CVE-2024-42098, CVE-2024-42101, CVE-2024-42104, CVE-2024-42105, CVE-2024-42106, CVE-2024-42107, CVE-2024-42109, CVE-2024-42110, CVE-2024-42113, CVE-2024-42114, CVE-2024-42115, CVE-2024-42117, CVE-2024-42119, CVE-2024-42120, CVE-2024-42121, CVE-2024-42122, CVE-2024-42124, CVE-2024-42125, CVE-2024-42126, CVE-2024-42127, CVE-2024-42130, CVE-2024-42131, CVE-2024-42132, CVE-2024-42133, CVE-2024-42136, CVE-2024-42137, CVE-2024-42138, CVE-2024-42139, CVE-2024-42141, CVE-2024-42142, CVE-2024-42143, CVE-2024-42144, CVE-2024-42145, CVE-2024-42147, CVE-2024-42148, CVE-2024-42152, CVE-2024-42153, CVE-2024-42155, CVE-2024-42156, CVE-2024-42157, CVE-2024-42158, CVE-2024-42159, CVE-2024-42161, CVE-2024-42162, CVE-2024-42223, CVE-2024-42224, CVE-2024-42225, CVE-2024-42226, CVE-2024-42227, CVE-2024-42228, CVE-2024-42229, CVE-2024-42230, CVE-2024-42232, CVE-2024-42236, CVE-2024-42237, CVE-2024-42238, CVE-2024-42239, CVE-2024-42240, CVE-2024-42241, CVE-2024-42244, CVE-2024-42245, CVE-2024-42246, CVE-2024-42247, CVE-2024-42250, CVE-2024-42253, CVE-2024-42259, CVE-2024-42268, CVE-2024-42269, CVE-2024-42270, CVE-2024-42271, CVE-2024-42274, CVE-2024-42276, CVE-2024-42277, CVE-2024-42278, CVE-2024-42279, CVE-2024-42280, CVE-2024-42281, CVE-2024-42283, CVE-2024-42284, CVE-2024-42285, CVE-2024-42286, CVE-2024-42287, CVE-2024-42288, CVE-2024-42289, CVE-2024-42290, CVE-2024-42291, CVE-2024-42292, CVE-2024-42295, CVE-2024-42298, CVE-2024-42301, CVE-2024-42302, CVE-2024-42303, CVE-2024-42308, CVE-2024-42309, CVE-2024-42310, CVE-2024-42311, CVE-2024-42312, CVE-2024-42313, CVE-2024-42314, CVE-2024-42315, CVE-2024-42316, CVE-2024-42318, CVE-2024-42319, CVE-2024-42320, CVE-2024-42322, CVE-2024-43816, CVE-2024-43817, CVE-2024-43818, CVE-2024-43819, CVE-2024-43821, CVE-2024-43823, CVE-2024-43824, CVE-2024-43825, CVE-2024-43826, CVE-2024-43829, CVE-2024-43830, CVE-2024-43831, CVE-2024-43833, CVE-2024-43834, CVE-2024-43837, CVE-2024-43839, CVE-2024-43840, CVE-2024-43841, CVE-2024-43842, CVE-2024-43846, CVE-2024-43847, CVE-2024-43849, CVE-2024-43850, CVE-2024-43851, CVE-2024-43853, CVE-2024-43854, CVE-2024-43855, CVE-2024-43856, CVE-2024-43858, CVE-2024-43860, CVE-2024-43861, CVE-2024-43863, CVE-2024-43864, CVE-2024-43866, CVE-2024-43867, CVE-2024-43871, CVE-2024-43872, CVE-2024-43873, CVE-2024-43874, CVE-2024-43875, CVE-2024-43876, CVE-2024-43877, CVE-2024-43879, CVE-2024-43880, CVE-2024-43881, CVE-2024-43882, CVE-2024-43883, CVE-2024-43884, CVE-2024-43885, CVE-2024-43889, CVE-2024-43892, CVE-2024-43893, CVE-2024-43894, CVE-2024-43895, CVE-2024-43897, CVE-2024-43899, CVE-2024-43900, CVE-2024-43902, CVE-2024-43903, CVE-2024-43905, CVE-2024-43906, CVE-2024-43907, CVE-2024-43908, CVE-2024-43909, CVE-2024-43911, CVE-2024-43912, CVE-2024-44931, CVE-2024-44938, CVE-2024-44939 Jira References: PED-10029, PED-10045, PED-10055, PED-10105, PED-10108, PED-8491, PED-8779, PED-8954 Maintenance Incident: [SUSE:Maintenance:35525](https://smelt.suse.de/incident/35525/) Sources used: openSUSE Leap 15.6 (src): kernel-default-base-6.4.0-150600.23.22.1.150600.12.8.3, kernel-livepatch-SLE15-SP6_Update_4-1-150600.13.3.3, kernel-obs-qa-6.4.0-150600.23.22.1, kernel-obs-build-6.4.0-150600.23.22.1, kernel-source-6.4.0-150600.23.22.1, kernel-syms-6.4.0-150600.23.22.1 Basesystem Module 15-SP6 (src): kernel-default-base-6.4.0-150600.23.22.1.150600.12.8.3, kernel-source-6.4.0-150600.23.22.1 Development Tools Module 15-SP6 (src): kernel-obs-build-6.4.0-150600.23.22.1, kernel-source-6.4.0-150600.23.22.1, kernel-syms-6.4.0-150600.23.22.1 SUSE Linux Enterprise Live Patching 15-SP6 (src): kernel-livepatch-SLE15-SP6_Update_4-1-150600.13.3.3 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. -- You are receiving this mail because: You are the assignee for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1229042 https://bugzilla.suse.com/show_bug.cgi?id=1229042#c48 --- Comment #48 from Maintenance Automation <maint-coord+maintenance-robot@suse.de> --- SUSE-SU-2024:3408-1: An update that solves 73 vulnerabilities and has 18 security fixes can now be installed. URL: https://www.suse.com/support/update/announcement/2024/suse-su-20243408-1 Category: security (important) Bug References: 1193629, 1194111, 1194765, 1194869, 1196261, 1196516, 1196894, 1198017, 1203360, 1206006, 1206258, 1207158, 1216834, 1221326, 1221645, 1223191, 1224105, 1227832, 1228020, 1228114, 1228466, 1228489, 1228516, 1228576, 1228718, 1228801, 1228959, 1229042, 1229292, 1229400, 1229454, 1229500, 1229503, 1229506, 1229507, 1229508, 1229509, 1229510, 1229512, 1229516, 1229522, 1229526, 1229528, 1229531, 1229533, 1229535, 1229536, 1229537, 1229540, 1229544, 1229554, 1229557, 1229565, 1229566, 1229568, 1229581, 1229598, 1229603, 1229604, 1229608, 1229611, 1229612, 1229613, 1229614, 1229617, 1229619, 1229620, 1229622, 1229623, 1229624, 1229625, 1229626, 1229628, 1229629, 1229630, 1229631, 1229635, 1229636, 1229637, 1229638, 1229639, 1229641, 1229642, 1229643, 1229645, 1229657, 1229664, 1229707, 1229792, 1230245, 1230413 CVE References: CVE-2021-4441, CVE-2022-4382, CVE-2022-48868, CVE-2022-48869, CVE-2022-48870, CVE-2022-48871, CVE-2022-48872, CVE-2022-48873, CVE-2022-48875, CVE-2022-48878, CVE-2022-48880, CVE-2022-48890, CVE-2022-48891, CVE-2022-48896, CVE-2022-48898, CVE-2022-48899, CVE-2022-48903, CVE-2022-48904, CVE-2022-48905, CVE-2022-48907, CVE-2022-48909, CVE-2022-48912, CVE-2022-48913, CVE-2022-48914, CVE-2022-48915, CVE-2022-48916, CVE-2022-48917, CVE-2022-48918, CVE-2022-48919, CVE-2022-48921, CVE-2022-48924, CVE-2022-48925, CVE-2022-48926, CVE-2022-48927, CVE-2022-48928, CVE-2022-48929, CVE-2022-48930, CVE-2022-48931, CVE-2022-48932, CVE-2022-48934, CVE-2022-48935, CVE-2022-48937, CVE-2022-48938, CVE-2022-48941, CVE-2022-48942, CVE-2022-48943, CVE-2023-52489, CVE-2023-52893, CVE-2023-52894, CVE-2023-52896, CVE-2023-52898, CVE-2023-52900, CVE-2023-52901, CVE-2023-52905, CVE-2023-52907, CVE-2023-52911, CVE-2024-40910, CVE-2024-41009, CVE-2024-41011, CVE-2024-41062, CVE-2024-41087, CVE-2024-42077, CVE-2024-42126, CVE-2024-42230, CVE-2024-42232, CVE-2024-42271, CVE-2024-43853, CVE-2024-43861, CVE-2024-43882, CVE-2024-43883, CVE-2024-44938, CVE-2024-44947, CVE-2024-45003 Maintenance Incident: [SUSE:Maintenance:35534](https://smelt.suse.de/incident/35534/) Sources used: openSUSE Leap 15.4 (src): kernel-default-base-5.14.21-150400.24.133.2.150400.24.64.5, kernel-livepatch-SLE15-SP4_Update_31-1-150400.9.3.2, kernel-syms-5.14.21-150400.24.133.1, kernel-obs-qa-5.14.21-150400.24.133.1, kernel-source-5.14.21-150400.24.133.2, kernel-obs-build-5.14.21-150400.24.133.2 SUSE Linux Enterprise Micro for Rancher 5.3 (src): kernel-default-base-5.14.21-150400.24.133.2.150400.24.64.5 SUSE Linux Enterprise Micro 5.3 (src): kernel-default-base-5.14.21-150400.24.133.2.150400.24.64.5 SUSE Linux Enterprise Micro for Rancher 5.4 (src): kernel-default-base-5.14.21-150400.24.133.2.150400.24.64.5 SUSE Linux Enterprise Micro 5.4 (src): kernel-default-base-5.14.21-150400.24.133.2.150400.24.64.5 SUSE Linux Enterprise Live Patching 15-SP4 (src): kernel-livepatch-SLE15-SP4_Update_31-1-150400.9.3.2 SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (src): kernel-default-base-5.14.21-150400.24.133.2.150400.24.64.5, kernel-source-5.14.21-150400.24.133.2, kernel-syms-5.14.21-150400.24.133.1, kernel-obs-build-5.14.21-150400.24.133.2 SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (src): kernel-default-base-5.14.21-150400.24.133.2.150400.24.64.5, kernel-source-5.14.21-150400.24.133.2, kernel-syms-5.14.21-150400.24.133.1, kernel-obs-build-5.14.21-150400.24.133.2 SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (src): kernel-default-base-5.14.21-150400.24.133.2.150400.24.64.5, kernel-source-5.14.21-150400.24.133.2, kernel-syms-5.14.21-150400.24.133.1, kernel-obs-build-5.14.21-150400.24.133.2 SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (src): kernel-default-base-5.14.21-150400.24.133.2.150400.24.64.5, kernel-source-5.14.21-150400.24.133.2, kernel-syms-5.14.21-150400.24.133.1, kernel-obs-build-5.14.21-150400.24.133.2 SUSE Linux Enterprise Server for SAP Applications 15 SP4 (src): kernel-default-base-5.14.21-150400.24.133.2.150400.24.64.5, kernel-source-5.14.21-150400.24.133.2, kernel-syms-5.14.21-150400.24.133.1, kernel-obs-build-5.14.21-150400.24.133.2 SUSE Manager Proxy 4.3 (src): kernel-default-base-5.14.21-150400.24.133.2.150400.24.64.5, kernel-source-5.14.21-150400.24.133.2, kernel-syms-5.14.21-150400.24.133.1 SUSE Manager Retail Branch Server 4.3 (src): kernel-default-base-5.14.21-150400.24.133.2.150400.24.64.5, kernel-source-5.14.21-150400.24.133.2 SUSE Manager Server 4.3 (src): kernel-default-base-5.14.21-150400.24.133.2.150400.24.64.5, kernel-source-5.14.21-150400.24.133.2, kernel-syms-5.14.21-150400.24.133.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. -- You are receiving this mail because: You are the assignee for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1229042 https://bugzilla.suse.com/show_bug.cgi?id=1229042#c49 --- Comment #49 from Maintenance Automation <maint-coord+maintenance-robot@suse.de> --- SUSE-SU-2024:3483-1: An update that solves 296 vulnerabilities, contains two features and has 42 security fixes can now be installed. URL: https://www.suse.com/support/update/announcement/2024/suse-su-20243483-1 Category: security (important) Bug References: 1193629, 1194111, 1194765, 1194869, 1196261, 1196516, 1196894, 1198017, 1203329, 1203330, 1203360, 1205462, 1206006, 1206258, 1206843, 1207158, 1208783, 1210644, 1213580, 1213632, 1214285, 1216834, 1220428, 1220877, 1220962, 1221269, 1221326, 1221630, 1221645, 1222335, 1222350, 1222372, 1222387, 1222634, 1222808, 1222967, 1223074, 1223191, 1223508, 1223720, 1223742, 1223777, 1223803, 1223807, 1224105, 1224415, 1224496, 1224510, 1224542, 1224578, 1224639, 1225162, 1225352, 1225428, 1225524, 1225578, 1225582, 1225773, 1225814, 1225827, 1225832, 1225903, 1226168, 1226530, 1226613, 1226742, 1226765, 1226798, 1226801, 1226874, 1226885, 1227079, 1227623, 1227761, 1227830, 1227863, 1227867, 1227929, 1227937, 1227958, 1228020, 1228065, 1228114, 1228410, 1228426, 1228427, 1228429, 1228446, 1228447, 1228449, 1228450, 1228452, 1228456, 1228463, 1228466, 1228467, 1228469, 1228480, 1228481, 1228482, 1228483, 1228484, 1228485, 1228487, 1228489, 1228491, 1228493, 1228494, 1228495, 1228496, 1228501, 1228503, 1228509, 1228513, 1228515, 1228516, 1228526, 1228531, 1228563, 1228564, 1228567, 1228576, 1228579, 1228584, 1228588, 1228590, 1228615, 1228616, 1228635, 1228636, 1228654, 1228656, 1228658, 1228660, 1228662, 1228667, 1228673, 1228677, 1228687, 1228706, 1228708, 1228710, 1228718, 1228720, 1228721, 1228722, 1228724, 1228726, 1228727, 1228733, 1228748, 1228766, 1228779, 1228801, 1228850, 1228857, 1228959, 1228964, 1228966, 1228967, 1228979, 1228988, 1228989, 1228991, 1228992, 1229042, 1229054, 1229086, 1229136, 1229154, 1229187, 1229188, 1229190, 1229287, 1229290, 1229292, 1229296, 1229297, 1229301, 1229303, 1229304, 1229305, 1229307, 1229309, 1229312, 1229314, 1229315, 1229317, 1229318, 1229319, 1229327, 1229341, 1229345, 1229346, 1229347, 1229349, 1229350, 1229351, 1229354, 1229356, 1229357, 1229358, 1229359, 1229360, 1229366, 1229370, 1229373, 1229374, 1229381, 1229382, 1229383, 1229386, 1229388, 1229391, 1229392, 1229395, 1229398, 1229399, 1229400, 1229407, 1229409, 1229410, 1229411, 1229413, 1229414, 1229417, 1229418, 1229444, 1229453, 1229454, 1229481, 1229482, 1229488, 1229489, 1229490, 1229493, 1229495, 1229497, 1229500, 1229503, 1229506, 1229507, 1229508, 1229509, 1229510, 1229512, 1229516, 1229521, 1229522, 1229523, 1229524, 1229525, 1229526, 1229527, 1229528, 1229529, 1229531, 1229533, 1229535, 1229536, 1229537, 1229540, 1229544, 1229545, 1229546, 1229547, 1229548, 1229554, 1229557, 1229558, 1229559, 1229560, 1229562, 1229564, 1229565, 1229566, 1229568, 1229569, 1229572, 1229573, 1229576, 1229581, 1229588, 1229598, 1229603, 1229604, 1229605, 1229608, 1229611, 1229612, 1229613, 1229614, 1229615, 1229616, 1229617, 1229620, 1229622, 1229623, 1229624, 1229625, 1229626, 1229628, 1229629, 1229630, 1229631, 1229632, 1229635, 1229636, 1229637, 1229638, 1229639, 1229641, 1229642, 1229643, 1229645, 1229657, 1229658, 1229662, 1229664, 1229707, 1229739, 1229743, 1229746, 1229754, 1229755, 1229756, 1229759, 1229761, 1229767, 1229768, 1229781, 1229784, 1229787, 1229788, 1229789, 1229792, 1229820, 1230413 CVE References: CVE-2021-4204, CVE-2021-4441, CVE-2021-47106, CVE-2021-47517, CVE-2021-47546, CVE-2022-0500, CVE-2022-23222, CVE-2022-38457, CVE-2022-40133, CVE-2022-4382, CVE-2022-48645, CVE-2022-48706, CVE-2022-48808, CVE-2022-48865, CVE-2022-48868, CVE-2022-48869, CVE-2022-48870, CVE-2022-48871, CVE-2022-48872, CVE-2022-48873, CVE-2022-48875, CVE-2022-48878, CVE-2022-48880, CVE-2022-48881, CVE-2022-48882, CVE-2022-48883, CVE-2022-48884, CVE-2022-48885, CVE-2022-48886, CVE-2022-48887, CVE-2022-48888, CVE-2022-48889, CVE-2022-48890, CVE-2022-48891, CVE-2022-48893, CVE-2022-48896, CVE-2022-48898, CVE-2022-48899, CVE-2022-48903, CVE-2022-48904, CVE-2022-48905, CVE-2022-48906, CVE-2022-48907, CVE-2022-48909, CVE-2022-48910, CVE-2022-48912, CVE-2022-48913, CVE-2022-48914, CVE-2022-48915, CVE-2022-48916, CVE-2022-48917, CVE-2022-48918, CVE-2022-48919, CVE-2022-48920, CVE-2022-48921, CVE-2022-48923, CVE-2022-48924, CVE-2022-48925, CVE-2022-48926, CVE-2022-48927, CVE-2022-48928, CVE-2022-48929, CVE-2022-48930, CVE-2022-48931, CVE-2022-48932, CVE-2022-48934, CVE-2022-48937, CVE-2022-48938, CVE-2022-48939, CVE-2022-48940, CVE-2022-48941, CVE-2022-48942, CVE-2022-48943, CVE-2023-3610, CVE-2023-52458, CVE-2023-52489, CVE-2023-52498, CVE-2023-52581, CVE-2023-52859, CVE-2023-52887, CVE-2023-52889, CVE-2023-52893, CVE-2023-52894, CVE-2023-52896, CVE-2023-52898, CVE-2023-52899, CVE-2023-52900, CVE-2023-52901, CVE-2023-52904, CVE-2023-52905, CVE-2023-52906, CVE-2023-52907, CVE-2023-52908, CVE-2023-52909, CVE-2023-52910, CVE-2023-52911, CVE-2023-52912, CVE-2023-52913, CVE-2024-26631, CVE-2024-26668, CVE-2024-26669, CVE-2024-26677, CVE-2024-26735, CVE-2024-26808, CVE-2024-26812, CVE-2024-26835, CVE-2024-26851, CVE-2024-27010, CVE-2024-27011, CVE-2024-27016, CVE-2024-27024, CVE-2024-27079, CVE-2024-27403, CVE-2024-31076, CVE-2024-35897, CVE-2024-35902, CVE-2024-35945, CVE-2024-35971, CVE-2024-36009, CVE-2024-36013, CVE-2024-36270, CVE-2024-36286, CVE-2024-36489, CVE-2024-36929, CVE-2024-36933, CVE-2024-36936, CVE-2024-36962, CVE-2024-38554, CVE-2024-38602, CVE-2024-38662, CVE-2024-39489, CVE-2024-40905, CVE-2024-40978, CVE-2024-40980, CVE-2024-40995, CVE-2024-41000, CVE-2024-41007, CVE-2024-41009, CVE-2024-41011, CVE-2024-41016, CVE-2024-41020, CVE-2024-41022, CVE-2024-41035, CVE-2024-41036, CVE-2024-41038, CVE-2024-41039, CVE-2024-41042, CVE-2024-41045, CVE-2024-41056, CVE-2024-41060, CVE-2024-41062, CVE-2024-41065, CVE-2024-41068, CVE-2024-41073, CVE-2024-41079, CVE-2024-41080, CVE-2024-41087, CVE-2024-41088, CVE-2024-41089, CVE-2024-41092, CVE-2024-41093, CVE-2024-41095, CVE-2024-41097, CVE-2024-41098, CVE-2024-42069, CVE-2024-42074, CVE-2024-42076, CVE-2024-42077, CVE-2024-42080, CVE-2024-42082, CVE-2024-42085, CVE-2024-42086, CVE-2024-42087, CVE-2024-42089, CVE-2024-42090, CVE-2024-42092, CVE-2024-42095, CVE-2024-42097, CVE-2024-42098, CVE-2024-42101, CVE-2024-42104, CVE-2024-42106, CVE-2024-42107, CVE-2024-42110, CVE-2024-42114, CVE-2024-42115, CVE-2024-42119, CVE-2024-42120, CVE-2024-42121, CVE-2024-42126, CVE-2024-42127, CVE-2024-42130, CVE-2024-42137, CVE-2024-42139, CVE-2024-42142, CVE-2024-42143, CVE-2024-42148, CVE-2024-42152, CVE-2024-42155, CVE-2024-42156, CVE-2024-42157, CVE-2024-42158, CVE-2024-42162, CVE-2024-42223, CVE-2024-42225, CVE-2024-42228, CVE-2024-42229, CVE-2024-42230, CVE-2024-42232, CVE-2024-42236, CVE-2024-42237, CVE-2024-42238, CVE-2024-42239, CVE-2024-42240, CVE-2024-42244, CVE-2024-42246, CVE-2024-42247, CVE-2024-42268, CVE-2024-42271, CVE-2024-42274, CVE-2024-42276, CVE-2024-42277, CVE-2024-42280, CVE-2024-42281, CVE-2024-42283, CVE-2024-42284, CVE-2024-42285, CVE-2024-42286, CVE-2024-42287, CVE-2024-42288, CVE-2024-42289, CVE-2024-42291, CVE-2024-42292, CVE-2024-42295, CVE-2024-42301, CVE-2024-42302, CVE-2024-42308, CVE-2024-42309, CVE-2024-42310, CVE-2024-42311, CVE-2024-42312, CVE-2024-42313, CVE-2024-42315, CVE-2024-42318, CVE-2024-42319, CVE-2024-42320, CVE-2024-42322, CVE-2024-43816, CVE-2024-43818, CVE-2024-43819, CVE-2024-43821, CVE-2024-43823, CVE-2024-43829, CVE-2024-43830, CVE-2024-43831, CVE-2024-43834, CVE-2024-43837, CVE-2024-43839, CVE-2024-43841, CVE-2024-43842, CVE-2024-43846, CVE-2024-43849, CVE-2024-43853, CVE-2024-43854, CVE-2024-43856, CVE-2024-43858, CVE-2024-43860, CVE-2024-43861, CVE-2024-43863, CVE-2024-43866, CVE-2024-43867, CVE-2024-43871, CVE-2024-43872, CVE-2024-43873, CVE-2024-43879, CVE-2024-43880, CVE-2024-43882, CVE-2024-43883, CVE-2024-43884, CVE-2024-43889, CVE-2024-43892, CVE-2024-43893, CVE-2024-43894, CVE-2024-43895, CVE-2024-43899, CVE-2024-43900, CVE-2024-43902, CVE-2024-43903, CVE-2024-43904, CVE-2024-43905, CVE-2024-43907, CVE-2024-43908, CVE-2024-43909, CVE-2024-44938, CVE-2024-44939, CVE-2024-44947 Jira References: PED-8491, PED-8779 Maintenance Incident: [SUSE:Maintenance:35521](https://smelt.suse.de/incident/35521/) Sources used: openSUSE Leap 15.5 (src): kernel-obs-build-5.14.21-150500.55.80.1, kernel-syms-5.14.21-150500.55.80.1, kernel-source-5.14.21-150500.55.80.2, kernel-livepatch-SLE15-SP5_Update_19-1-150500.11.3.2, kernel-obs-qa-5.14.21-150500.55.80.1, kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 openSUSE Leap Micro 5.5 (src): kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 SUSE Linux Enterprise Micro 5.5 (src): kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 Basesystem Module 15-SP5 (src): kernel-source-5.14.21-150500.55.80.2, kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 Development Tools Module 15-SP5 (src): kernel-obs-build-5.14.21-150500.55.80.1, kernel-syms-5.14.21-150500.55.80.1, kernel-source-5.14.21-150500.55.80.2 SUSE Linux Enterprise Live Patching 15-SP5 (src): kernel-livepatch-SLE15-SP5_Update_19-1-150500.11.3.2 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. -- You are receiving this mail because: You are the assignee for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1229042 https://bugzilla.suse.com/show_bug.cgi?id=1229042#c59 --- Comment #59 from Maintenance Automation <maint-coord+maintenance-robot@suse.de> --- SUSE-SU-2024:4081-1: An update that solves 50 vulnerabilities and has 11 security fixes can now be installed. URL: https://www.suse.com/support/update/announcement/2024/suse-su-20244081-1 Category: security (important) Bug References: 1195775, 1204171, 1205796, 1209290, 1216223, 1218562, 1219125, 1223384, 1223524, 1223824, 1225189, 1225336, 1225611, 1226145, 1226211, 1226212, 1228743, 1229042, 1229454, 1229456, 1230429, 1230454, 1231073, 1231191, 1231193, 1231195, 1231197, 1231200, 1231203, 1231293, 1231375, 1231502, 1231673, 1231861, 1231887, 1231890, 1231893, 1231895, 1231936, 1231938, 1231942, 1231960, 1231961, 1231979, 1231987, 1231988, 1232033, 1232069, 1232070, 1232097, 1232136, 1232145, 1232262, 1232282, 1232286, 1232304, 1232383, 1232418, 1232424, 1232432, 1232519 CVE References: CVE-2021-47416, CVE-2022-3435, CVE-2022-45934, CVE-2022-48664, CVE-2022-48947, CVE-2022-48956, CVE-2022-48960, CVE-2022-48962, CVE-2022-48967, CVE-2022-48970, CVE-2022-48988, CVE-2022-48991, CVE-2022-48999, CVE-2022-49003, CVE-2022-49014, CVE-2022-49015, CVE-2022-49023, CVE-2022-49025, CVE-2023-28327, CVE-2023-46343, CVE-2023-52881, CVE-2023-52919, CVE-2023-6270, CVE-2024-27043, CVE-2024-36971, CVE-2024-42145, CVE-2024-44947, CVE-2024-45016, CVE-2024-45026, CVE-2024-46813, CVE-2024-46814, CVE-2024-46815, CVE-2024-46816, CVE-2024-46817, CVE-2024-46818, CVE-2024-46849, CVE-2024-47668, CVE-2024-47674, CVE-2024-47684, CVE-2024-47706, CVE-2024-47747, CVE-2024-49860, CVE-2024-49867, CVE-2024-49936, CVE-2024-49969, CVE-2024-49974, CVE-2024-49982, CVE-2024-49991, CVE-2024-49995, CVE-2024-50047 Maintenance Incident: [SUSE:Maintenance:36387](https://smelt.suse.de/incident/36387/) Sources used: SUSE Linux Enterprise Micro 5.1 (src): kernel-source-rt-5.3.18-150300.191.1 SUSE Linux Enterprise Micro 5.2 (src): kernel-source-rt-5.3.18-150300.191.1 SUSE Linux Enterprise Micro for Rancher 5.2 (src): kernel-source-rt-5.3.18-150300.191.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. -- You are receiving this mail because: You are the assignee for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1229042 https://bugzilla.suse.com/show_bug.cgi?id=1229042#c60 --- Comment #60 from Maintenance Automation <maint-coord+maintenance-robot@suse.de> --- SUSE-SU-2024:4103-1: An update that solves 46 vulnerabilities and has 10 security fixes can now be installed. URL: https://www.suse.com/support/update/announcement/2024/suse-su-20244103-1 Category: security (important) Bug References: 1195775, 1204171, 1205796, 1206344, 1209290, 1218562, 1219125, 1223384, 1223524, 1223824, 1225336, 1225611, 1226211, 1226212, 1226557, 1228743, 1229042, 1229454, 1229456, 1230429, 1231073, 1231191, 1231197, 1231200, 1231203, 1231293, 1231375, 1231502, 1231673, 1231861, 1231887, 1231890, 1231893, 1231895, 1231936, 1231938, 1231942, 1231960, 1231961, 1231979, 1231987, 1231988, 1232033, 1232069, 1232070, 1232097, 1232136, 1232145, 1232262, 1232282, 1232286, 1232304, 1232383, 1232418, 1232424, 1232432 CVE References: CVE-2021-47416, CVE-2021-47589, CVE-2022-3435, CVE-2022-45934, CVE-2022-48664, CVE-2022-48947, CVE-2022-48956, CVE-2022-48960, CVE-2022-48962, CVE-2022-48967, CVE-2022-48970, CVE-2022-48988, CVE-2022-48991, CVE-2022-48999, CVE-2022-49003, CVE-2022-49014, CVE-2022-49015, CVE-2022-49023, CVE-2022-49025, CVE-2023-28327, CVE-2023-46343, CVE-2023-52881, CVE-2023-52919, CVE-2023-6270, CVE-2024-27043, CVE-2024-42145, CVE-2024-44947, CVE-2024-45016, CVE-2024-46813, CVE-2024-46816, CVE-2024-46817, CVE-2024-46818, CVE-2024-46849, CVE-2024-47668, CVE-2024-47674, CVE-2024-47684, CVE-2024-47706, CVE-2024-47747, CVE-2024-49860, CVE-2024-49867, CVE-2024-49936, CVE-2024-49974, CVE-2024-49982, CVE-2024-49991, CVE-2024-49995, CVE-2024-50047 Maintenance Incident: [SUSE:Maintenance:36341](https://smelt.suse.de/incident/36341/) Sources used: SUSE Linux Enterprise Live Patching 15-SP2 (src): kernel-livepatch-SLE15-SP2_Update_54-1-150200.5.3.1 SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS (src): kernel-default-base-5.3.18-150200.24.209.1.150200.9.109.1, kernel-source-5.3.18-150200.24.209.1, kernel-syms-5.3.18-150200.24.209.1, kernel-obs-build-5.3.18-150200.24.209.1 SUSE Linux Enterprise Server 15 SP2 LTSS (src): kernel-default-base-5.3.18-150200.24.209.1.150200.9.109.1, kernel-source-5.3.18-150200.24.209.1, kernel-syms-5.3.18-150200.24.209.1, kernel-obs-build-5.3.18-150200.24.209.1 SUSE Linux Enterprise Server for SAP Applications 15 SP2 (src): kernel-default-base-5.3.18-150200.24.209.1.150200.9.109.1, kernel-source-5.3.18-150200.24.209.1, kernel-syms-5.3.18-150200.24.209.1, kernel-obs-build-5.3.18-150200.24.209.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. -- You are receiving this mail because: You are the assignee for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1229042 https://bugzilla.suse.com/show_bug.cgi?id=1229042#c61 --- Comment #61 from Maintenance Automation <maint-coord+maintenance-robot@suse.de> --- SUSE-SU-2024:4100-1: An update that solves 120 vulnerabilities and has 13 security fixes can now be installed. URL: https://www.suse.com/support/update/announcement/2024/suse-su-20244100-1 Category: security (important) Bug References: 1082555, 1176081, 1206344, 1213034, 1218562, 1219125, 1220439, 1221980, 1222629, 1223384, 1223824, 1225189, 1225336, 1225611, 1226585, 1226606, 1227437, 1227885, 1227941, 1227947, 1227952, 1228000, 1228410, 1228564, 1228620, 1228743, 1229005, 1229042, 1229154, 1229568, 1229769, 1229837, 1230179, 1230405, 1230725, 1230802, 1231072, 1231094, 1231096, 1231105, 1231111, 1231115, 1231148, 1231191, 1231197, 1231203, 1231293, 1231375, 1231537, 1231539, 1231540, 1231673, 1231858, 1231859, 1231861, 1231864, 1231888, 1231889, 1231890, 1231893, 1231897, 1231903, 1231914, 1231929, 1231935, 1231938, 1231939, 1231942, 1231954, 1231958, 1231979, 1231987, 1231988, 1231995, 1231996, 1231997, 1231998, 1232006, 1232007, 1232016, 1232025, 1232026, 1232035, 1232037, 1232038, 1232039, 1232047, 1232056, 1232069, 1232070, 1232071, 1232089, 1232097, 1232111, 1232123, 1232126, 1232133, 1232134, 1232135, 1232140, 1232141, 1232142, 1232149, 1232151, 1232152, 1232160, 1232172, 1232175, 1232180, 1232191, 1232199, 1232200, 1232201, 1232217, 1232218, 1232221, 1232236, 1232253, 1232282, 1232285, 1232286, 1232304, 1232305, 1232313, 1232314, 1232339, 1232354, 1232392, 1232394, 1232418, 1232424, 1232432, 1232442 CVE References: CVE-2021-46936, CVE-2021-47163, CVE-2021-47416, CVE-2021-47612, CVE-2022-48788, CVE-2022-48789, CVE-2022-48790, CVE-2022-48809, CVE-2022-48946, CVE-2022-48949, CVE-2022-48951, CVE-2022-48956, CVE-2022-48958, CVE-2022-48960, CVE-2022-48962, CVE-2022-48966, CVE-2022-48967, CVE-2022-48969, CVE-2022-48971, CVE-2022-48972, CVE-2022-48973, CVE-2022-48978, CVE-2022-48985, CVE-2022-48988, CVE-2022-48991, CVE-2022-48992, CVE-2022-48997, CVE-2022-49000, CVE-2022-49002, CVE-2022-49010, CVE-2022-49011, CVE-2022-49014, CVE-2022-49015, CVE-2022-49020, CVE-2022-49021, CVE-2022-49026, CVE-2022-49027, CVE-2022-49028, CVE-2022-49029, CVE-2023-46343, CVE-2023-52881, CVE-2023-52898, CVE-2023-52918, CVE-2023-52919, CVE-2023-6270, CVE-2024-26804, CVE-2024-27043, CVE-2024-38538, CVE-2024-39476, CVE-2024-40965, CVE-2024-41016, CVE-2024-41082, CVE-2024-42114, CVE-2024-42145, CVE-2024-42253, CVE-2024-44931, CVE-2024-44958, CVE-2024-46724, CVE-2024-46755, CVE-2024-46802, CVE-2024-46809, CVE-2024-46813, CVE-2024-46816, CVE-2024-46818, CVE-2024-46826, CVE-2024-46834, CVE-2024-46840, CVE-2024-46841, CVE-2024-46848, CVE-2024-47670, CVE-2024-47672, CVE-2024-47673, CVE-2024-47674, CVE-2024-47684, CVE-2024-47685, CVE-2024-47696, CVE-2024-47697, CVE-2024-47698, CVE-2024-47706, CVE-2024-47707, CVE-2024-47713, CVE-2024-47735, CVE-2024-47737, CVE-2024-47742, CVE-2024-47745, CVE-2024-47749, CVE-2024-49851, CVE-2024-49860, CVE-2024-49877, CVE-2024-49881, CVE-2024-49882, CVE-2024-49883, CVE-2024-49890, CVE-2024-49891, CVE-2024-49894, CVE-2024-49896, CVE-2024-49901, CVE-2024-49920, CVE-2024-49929, CVE-2024-49936, CVE-2024-49949, CVE-2024-49957, CVE-2024-49958, CVE-2024-49959, CVE-2024-49962, CVE-2024-49965, CVE-2024-49966, CVE-2024-49967, CVE-2024-49982, CVE-2024-49991, CVE-2024-49995, CVE-2024-49996, CVE-2024-50006, CVE-2024-50007, CVE-2024-50024, CVE-2024-50033, CVE-2024-50035, CVE-2024-50045, CVE-2024-50047, CVE-2024-50058 Maintenance Incident: [SUSE:Maintenance:36344](https://smelt.suse.de/incident/36344/) Sources used: SUSE Linux Enterprise Live Patching 12-SP5 (src): kgraft-patch-SLE12-SP5_Update_62-1-8.3.1 SUSE Linux Enterprise Server 12 SP5 LTSS (src): kernel-syms-4.12.14-122.234.1, kernel-source-4.12.14-122.234.1 SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (src): kernel-syms-4.12.14-122.234.1, kernel-source-4.12.14-122.234.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. -- You are receiving this mail because: You are the assignee for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1229042 https://bugzilla.suse.com/show_bug.cgi?id=1229042#c62 --- Comment #62 from Maintenance Automation <maint-coord+maintenance-robot@suse.de> --- SUSE-SU-2024:4140-1: An update that solves 49 vulnerabilities and has 13 security fixes can now be installed. URL: https://www.suse.com/support/update/announcement/2024/suse-su-20244140-1 Category: security (important) Bug References: 1195775, 1204171, 1205796, 1206344, 1209290, 1216223, 1218562, 1219125, 1223384, 1223524, 1223824, 1225189, 1225336, 1225611, 1226211, 1226212, 1226557, 1228743, 1229042, 1229454, 1229456, 1230429, 1230454, 1231073, 1231191, 1231193, 1231197, 1231200, 1231203, 1231293, 1231375, 1231502, 1231673, 1231861, 1231887, 1231890, 1231893, 1231895, 1231936, 1231938, 1231942, 1231960, 1231961, 1231979, 1231987, 1231988, 1232033, 1232069, 1232070, 1232097, 1232136, 1232145, 1232262, 1232280, 1232282, 1232286, 1232304, 1232383, 1232418, 1232424, 1232432, 1232519 CVE References: CVE-2021-47416, CVE-2021-47589, CVE-2022-3435, CVE-2022-45934, CVE-2022-48664, CVE-2022-48947, CVE-2022-48956, CVE-2022-48960, CVE-2022-48962, CVE-2022-48967, CVE-2022-48970, CVE-2022-48988, CVE-2022-48991, CVE-2022-48999, CVE-2022-49003, CVE-2022-49014, CVE-2022-49015, CVE-2022-49023, CVE-2022-49025, CVE-2023-28327, CVE-2023-46343, CVE-2023-52881, CVE-2023-52919, CVE-2023-6270, CVE-2024-27043, CVE-2024-42145, CVE-2024-44947, CVE-2024-45016, CVE-2024-45026, CVE-2024-46813, CVE-2024-46814, CVE-2024-46816, CVE-2024-46817, CVE-2024-46818, CVE-2024-46849, CVE-2024-47668, CVE-2024-47674, CVE-2024-47684, CVE-2024-47706, CVE-2024-47747, CVE-2024-49860, CVE-2024-49867, CVE-2024-49936, CVE-2024-49969, CVE-2024-49974, CVE-2024-49982, CVE-2024-49991, CVE-2024-49995, CVE-2024-50047 Maintenance Incident: [SUSE:Maintenance:36348](https://smelt.suse.de/incident/36348/) Sources used: openSUSE Leap 15.3 (src): kernel-source-5.3.18-150300.59.182.1, kernel-livepatch-SLE15-SP3_Update_50-1-150300.7.3.1, kernel-obs-qa-5.3.18-150300.59.182.1, kernel-obs-build-5.3.18-150300.59.182.1, kernel-default-base-5.3.18-150300.59.182.1.150300.18.107.1, kernel-syms-5.3.18-150300.59.182.1 SUSE Linux Enterprise Live Patching 15-SP3 (src): kernel-livepatch-SLE15-SP3_Update_50-1-150300.7.3.1 SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (src): kernel-obs-build-5.3.18-150300.59.182.1, kernel-source-5.3.18-150300.59.182.1, kernel-default-base-5.3.18-150300.59.182.1.150300.18.107.1, kernel-syms-5.3.18-150300.59.182.1 SUSE Linux Enterprise Server 15 SP3 LTSS (src): kernel-obs-build-5.3.18-150300.59.182.1, kernel-source-5.3.18-150300.59.182.1, kernel-default-base-5.3.18-150300.59.182.1.150300.18.107.1, kernel-syms-5.3.18-150300.59.182.1 SUSE Linux Enterprise Server for SAP Applications 15 SP3 (src): kernel-obs-build-5.3.18-150300.59.182.1, kernel-source-5.3.18-150300.59.182.1, kernel-default-base-5.3.18-150300.59.182.1.150300.18.107.1, kernel-syms-5.3.18-150300.59.182.1 SUSE Enterprise Storage 7.1 (src): kernel-obs-build-5.3.18-150300.59.182.1, kernel-source-5.3.18-150300.59.182.1, kernel-default-base-5.3.18-150300.59.182.1.150300.18.107.1, kernel-syms-5.3.18-150300.59.182.1 SUSE Linux Enterprise Micro 5.1 (src): kernel-default-base-5.3.18-150300.59.182.1.150300.18.107.1 SUSE Linux Enterprise Micro 5.2 (src): kernel-default-base-5.3.18-150300.59.182.1.150300.18.107.1 SUSE Linux Enterprise Micro for Rancher 5.2 (src): kernel-default-base-5.3.18-150300.59.182.1.150300.18.107.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. -- You are receiving this mail because: You are the assignee for the bug.
participants (1)
-
bugzilla_noreply@suse.com