SUSE-SU-2022:4585-1: An update that solves 22 vulnerabilities, contains 7 features and has 52 fixes is now available.
Category: security (important)
Bug References: 1065729,1156395,1164051,1184350,1189297,1190256,1193629,1194869,1202341,1203183,1203391,1203511,1203960,1204228,1204405,1204414,1204631,1204636,1204693,1204780,1204810,1204850,1205007,1205100,1205111,1205113,1205128,1205130,1205149,1205153,1205220,1205264,1205282,1205331,1205332,1205427,1205428,1205473,1205507,1205514,1205521,1205567,1205616,1205617,1205653,1205671,1205679,1205683,1205700,1205705,1205709,1205711,1205744,1205764,1205796,1205882,1205993,1206035,1206036,1206037,1206045,1206046,1206047,1206048,1206049,1206050,1206051,1206056,1206057,1206113,1206114,1206147,1206149,1206207
CVE References: CVE-2022-2602,CVE-2022-3176,CVE-2022-3566,CVE-2022-3567,CVE-2022-3635,CVE-2022-3643,CVE-2022-3707,CVE-2022-3903,CVE-2022-4095,CVE-2022-4129,CVE-2022-4139,CVE-2022-41850,CVE-2022-41858,CVE-2022-42328,CVE-2022-42329,CVE-2022-42895,CVE-2022-42896,CVE-2022-4378,CVE-2022-43945,CVE-2022-45869,CVE-2022-45888,CVE-2022-45934
JIRA References: PED-1573,PED-1706,PED-1936,PED-2684,PED-611,PED-824,PED-849
Sources used:
openSUSE Leap Micro 5.3 (src): kernel-default-5.14.21-150400.24.38.1, kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2
openSUSE Leap 15.4 (src): dtb-aarch64-5.14.21-150400.24.38.1, kernel-64kb-5.14.21-150400.24.38.1, kernel-debug-5.14.21-150400.24.38.1, kernel-default-5.14.21-150400.24.38.1, kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2, kernel-docs-5.14.21-150400.24.38.1, kernel-kvmsmall-5.14.21-150400.24.38.1, kernel-obs-build-5.14.21-150400.24.38.1, kernel-obs-qa-5.14.21-150400.24.38.1, kernel-source-5.14.21-150400.24.38.1, kernel-syms-5.14.21-150400.24.38.1, kernel-zfcpdump-5.14.21-150400.24.38.1
SUSE Linux Enterprise Workstation Extension 15-SP4 (src): kernel-default-5.14.21-150400.24.38.1
SUSE Linux Enterprise Module for Live Patching 15-SP4 (src): kernel-default-5.14.21-150400.24.38.1, kernel-livepatch-SLE15-SP4_Update_6-1-150400.9.3.2
SUSE Linux Enterprise Module for Legacy Software 15-SP4 (src): kernel-default-5.14.21-150400.24.38.1
SUSE Linux Enterprise Module for Development Tools 15-SP4 (src): kernel-docs-5.14.21-150400.24.38.1, kernel-obs-build-5.14.21-150400.24.38.1, kernel-source-5.14.21-150400.24.38.1, kernel-syms-5.14.21-150400.24.38.1
SUSE Linux Enterprise Module for Basesystem 15-SP4 (src): kernel-64kb-5.14.21-150400.24.38.1, kernel-default-5.14.21-150400.24.38.1, kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2, kernel-source-5.14.21-150400.24.38.1, kernel-zfcpdump-5.14.21-150400.24.38.1
SUSE Linux Enterprise Micro 5.3 (src): kernel-default-5.14.21-150400.24.38.1, kernel-default-base-5.14.21-150400.24.38.1.150400.24.13.2
SUSE Linux Enterprise High Availability 15-SP4 (src): kernel-default-5.14.21-150400.24.38.1
NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU- 2022:4585- 1: An update that solves 22 vulnerabilities, contains 7 features and has 52 fixes is now available.
Category: security (important) 1156395, 1164051, 1184350, 1189297, 1190256, 1193629, 1194869, 1202341, 1203183, 1203391, 1203511, 1203960, 1204228, 1204405, 1204414, 1204631, 1204636, 1204693, 1204780, 1204810, 1204850, 1205007, 1205100, 1205111, 1205113, 1205128, 1205130, 1205149, 1205153, 1205220, 1205264, 1205282, 1205331, 1205332, 1205427, 1205428, 1205473, 1205507, 1205514, 1205521, 1205567, 1205616, 1205617, 1205653, 1205671, 1205679, 1205683, 1205700, 1205705, 1205709, 1205711, 1205744, 1205764, 1205796, 1205882, 1205993, 1206035, 1206036, 1206037, 1206045, 1206046, 1206047, 1206048, 1206049, 1206050, 1206051, 1206056, 1206057, 1206113, 1206114, 1206147, 1206149, 1206207 2602,CVE- 2022-3176, CVE-2022- 3566,CVE- 2022-3567, CVE-2022- 3635,CVE- 2022-3643, CVE-2022- 3707,CVE- 2022-3903, CVE-2022- 4095,CVE- 2022-4129, CVE-2022- 4139,CVE- 2022-41850, CVE-2022- 41858,CVE- 2022-42328, CVE-2022- 42329,CVE- 2022-42895, CVE-2022- 42896,CVE- 2022-4378, CVE-2022- 43945,CVE- 2022-45869, CVE-2022- 45888,CVE- 2022-45934 PED-1706, PED-1936, PED-2684, PED-611, PED-824, PED-849 default- 5.14.21- 150400. 24.38.1, kernel- default- base-5. 14.21-150400. 24.38.1. 150400. 24.13.2 5.14.21- 150400. 24.38.1, kernel- 64kb-5. 14.21-150400. 24.38.1, kernel- debug-5. 14.21-150400. 24.38.1, kernel- default- 5.14.21- 150400. 24.38.1, kernel- default- base-5. 14.21-150400. 24.38.1. 150400. 24.13.2, kernel- docs-5. 14.21-150400. 24.38.1, kernel- kvmsmall- 5.14.21- 150400. 24.38.1, kernel- obs-build- 5.14.21- 150400. 24.38.1, kernel- obs-qa- 5.14.21- 150400. 24.38.1, kernel- source- 5.14.21- 150400. 24.38.1, kernel- syms-5. 14.21-150400. 24.38.1, kernel- zfcpdump- 5.14.21- 150400. 24.38.1 default- 5.14.21- 150400. 24.38.1 default- 5.14.21- 150400. 24.38.1, kernel- livepatch- SLE15-SP4_ Update_ 6-1-150400. 9.3.2 default- 5.14.21- 150400. 24.38.1 docs-5. 14.21-150400. 24.38.1, kernel- obs-build- 5.14.21- 150400. 24.38.1, kernel- source- 5.14.21- 150400. 24.38.1, kernel- syms-5. 14.21-150400. 24.38.1 64kb-5. 14.21-150400. 24.38.1, kernel- default- 5.14.21- 150400. 24.38.1, kernel- default- base-5. 14.21-150400. 24.38.1. 150400. 24.13.2, kernel- source- 5.14.21- 150400. 24.38.1, kernel- zfcpdump- 5.14.21- 150400. 24.38.1 default- 5.14.21- 150400. 24.38.1, kernel- default- base-5. 14.21-150400. 24.38.1. 150400. 24.13.2 default- 5.14.21- 150400. 24.38.1
Bug References: 1065729,
CVE References: CVE-2022-
JIRA References: PED-1573,
Sources used:
openSUSE Leap Micro 5.3 (src): kernel-
openSUSE Leap 15.4 (src): dtb-aarch64-
SUSE Linux Enterprise Workstation Extension 15-SP4 (src): kernel-
SUSE Linux Enterprise Module for Live Patching 15-SP4 (src): kernel-
SUSE Linux Enterprise Module for Legacy Software 15-SP4 (src): kernel-
SUSE Linux Enterprise Module for Development Tools 15-SP4 (src): kernel-
SUSE Linux Enterprise Module for Basesystem 15-SP4 (src): kernel-
SUSE Linux Enterprise Micro 5.3 (src): kernel-
SUSE Linux Enterprise High Availability 15-SP4 (src): kernel-
NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.