SUSE-SU-2025:4111-1: important: Security update for the Linux Kernel

SLE-SECURITY-UPDATES null at suse.de
Mon Nov 17 08:33:08 UTC 2025



# Security update for the Linux Kernel

Announcement ID: SUSE-SU-2025:4111-1  
Release Date: 2025-11-15T18:39:08Z  
Rating: important  
References:

  * bsc#1065729
  * bsc#1205128
  * bsc#1206893
  * bsc#1207612
  * bsc#1207619
  * bsc#1210763
  * bsc#1211162
  * bsc#1211692
  * bsc#1213098
  * bsc#1213114
  * bsc#1213747
  * bsc#1214954
  * bsc#1214992
  * bsc#1215148
  * bsc#1217366
  * bsc#1236104
  * bsc#1249479
  * bsc#1249608
  * bsc#1249857
  * bsc#1249859
  * bsc#1249988
  * bsc#1250742
  * bsc#1250816
  * bsc#1250946
  * bsc#1251027
  * bsc#1251032
  * bsc#1251034
  * bsc#1251035
  * bsc#1251040
  * bsc#1251043
  * bsc#1251045
  * bsc#1251047
  * bsc#1251052
  * bsc#1251057
  * bsc#1251059
  * bsc#1251061
  * bsc#1251063
  * bsc#1251064
  * bsc#1251065
  * bsc#1251066
  * bsc#1251068
  * bsc#1251072
  * bsc#1251080
  * bsc#1251082
  * bsc#1251086
  * bsc#1251087
  * bsc#1251088
  * bsc#1251091
  * bsc#1251092
  * bsc#1251093
  * bsc#1251097
  * bsc#1251099
  * bsc#1251101
  * bsc#1251104
  * bsc#1251110
  * bsc#1251113
  * bsc#1251115
  * bsc#1251123
  * bsc#1251128
  * bsc#1251129
  * bsc#1251133
  * bsc#1251136
  * bsc#1251147
  * bsc#1251149
  * bsc#1251154
  * bsc#1251159
  * bsc#1251164
  * bsc#1251166
  * bsc#1251169
  * bsc#1251170
  * bsc#1251173
  * bsc#1251178
  * bsc#1251180
  * bsc#1251182
  * bsc#1251197
  * bsc#1251200
  * bsc#1251201
  * bsc#1251202
  * bsc#1251208
  * bsc#1251210
  * bsc#1251215
  * bsc#1251218
  * bsc#1251222
  * bsc#1251223
  * bsc#1251230
  * bsc#1251247
  * bsc#1251268
  * bsc#1251281
  * bsc#1251282
  * bsc#1251283
  * bsc#1251285
  * bsc#1251286
  * bsc#1251292
  * bsc#1251294
  * bsc#1251295
  * bsc#1251296
  * bsc#1251298
  * bsc#1251299
  * bsc#1251300
  * bsc#1251302
  * bsc#1251303
  * bsc#1251306
  * bsc#1251310
  * bsc#1251312
  * bsc#1251322
  * bsc#1251324
  * bsc#1251325
  * bsc#1251326
  * bsc#1251327
  * bsc#1251329
  * bsc#1251330
  * bsc#1251331
  * bsc#1251519
  * bsc#1251521
  * bsc#1251522
  * bsc#1251527
  * bsc#1251529
  * bsc#1251550
  * bsc#1251723
  * bsc#1251725
  * bsc#1251728
  * bsc#1251730
  * bsc#1251736
  * bsc#1251737
  * bsc#1251741
  * bsc#1251743
  * bsc#1251750
  * bsc#1251753
  * bsc#1251759
  * bsc#1251761
  * bsc#1251762
  * bsc#1251763
  * bsc#1251764
  * bsc#1251767
  * bsc#1251769
  * bsc#1251772
  * bsc#1251775
  * bsc#1251777
  * bsc#1251785
  * bsc#1251823
  * bsc#1251930
  * bsc#1251967
  * bsc#1252033
  * bsc#1252035
  * bsc#1252047
  * bsc#1252069
  * bsc#1252265
  * bsc#1252474
  * bsc#1252475
  * bsc#1252476
  * bsc#1252480
  * bsc#1252484
  * bsc#1252486
  * bsc#1252489
  * bsc#1252490
  * bsc#1252492
  * bsc#1252495
  * bsc#1252497
  * bsc#1252499
  * bsc#1252501
  * bsc#1252508
  * bsc#1252509
  * bsc#1252513
  * bsc#1252515
  * bsc#1252516
  * bsc#1252519
  * bsc#1252521
  * bsc#1252522
  * bsc#1252523
  * bsc#1252526
  * bsc#1252528
  * bsc#1252529
  * bsc#1252532
  * bsc#1252535
  * bsc#1252536
  * bsc#1252537
  * bsc#1252538
  * bsc#1252539
  * bsc#1252542
  * bsc#1252545
  * bsc#1252549
  * bsc#1252554
  * bsc#1252560
  * bsc#1252564
  * bsc#1252565
  * bsc#1252568
  * bsc#1252634
  * bsc#1252688
  * bsc#1252785
  * bsc#1252893
  * bsc#1252904
  * bsc#1252919
  * jsc#PED-4593
  * jsc#PED-568

  
Cross-References:

  * CVE-2022-43945
  * CVE-2022-50327
  * CVE-2022-50334
  * CVE-2022-50470
  * CVE-2022-50471
  * CVE-2022-50472
  * CVE-2022-50475
  * CVE-2022-50478
  * CVE-2022-50480
  * CVE-2022-50482
  * CVE-2022-50484
  * CVE-2022-50485
  * CVE-2022-50487
  * CVE-2022-50488
  * CVE-2022-50489
  * CVE-2022-50490
  * CVE-2022-50492
  * CVE-2022-50493
  * CVE-2022-50494
  * CVE-2022-50496
  * CVE-2022-50497
  * CVE-2022-50498
  * CVE-2022-50499
  * CVE-2022-50501
  * CVE-2022-50503
  * CVE-2022-50504
  * CVE-2022-50505
  * CVE-2022-50509
  * CVE-2022-50511
  * CVE-2022-50512
  * CVE-2022-50513
  * CVE-2022-50514
  * CVE-2022-50516
  * CVE-2022-50519
  * CVE-2022-50520
  * CVE-2022-50521
  * CVE-2022-50523
  * CVE-2022-50525
  * CVE-2022-50528
  * CVE-2022-50529
  * CVE-2022-50530
  * CVE-2022-50532
  * CVE-2022-50534
  * CVE-2022-50535
  * CVE-2022-50537
  * CVE-2022-50541
  * CVE-2022-50542
  * CVE-2022-50544
  * CVE-2022-50545
  * CVE-2022-50546
  * CVE-2022-50549
  * CVE-2022-50551
  * CVE-2022-50553
  * CVE-2022-50556
  * CVE-2022-50559
  * CVE-2022-50560
  * CVE-2022-50561
  * CVE-2022-50562
  * CVE-2022-50563
  * CVE-2022-50564
  * CVE-2022-50566
  * CVE-2022-50567
  * CVE-2022-50568
  * CVE-2022-50570
  * CVE-2022-50572
  * CVE-2022-50574
  * CVE-2022-50575
  * CVE-2022-50576
  * CVE-2022-50578
  * CVE-2022-50579
  * CVE-2022-50580
  * CVE-2022-50581
  * CVE-2022-50582
  * CVE-2023-52923
  * CVE-2023-53365
  * CVE-2023-53500
  * CVE-2023-53533
  * CVE-2023-53534
  * CVE-2023-53541
  * CVE-2023-53542
  * CVE-2023-53548
  * CVE-2023-53551
  * CVE-2023-53552
  * CVE-2023-53553
  * CVE-2023-53554
  * CVE-2023-53556
  * CVE-2023-53559
  * CVE-2023-53560
  * CVE-2023-53564
  * CVE-2023-53566
  * CVE-2023-53567
  * CVE-2023-53568
  * CVE-2023-53571
  * CVE-2023-53572
  * CVE-2023-53574
  * CVE-2023-53576
  * CVE-2023-53579
  * CVE-2023-53582
  * CVE-2023-53587
  * CVE-2023-53589
  * CVE-2023-53592
  * CVE-2023-53594
  * CVE-2023-53597
  * CVE-2023-53603
  * CVE-2023-53604
  * CVE-2023-53605
  * CVE-2023-53607
  * CVE-2023-53608
  * CVE-2023-53611
  * CVE-2023-53612
  * CVE-2023-53615
  * CVE-2023-53616
  * CVE-2023-53617
  * CVE-2023-53619
  * CVE-2023-53622
  * CVE-2023-53625
  * CVE-2023-53626
  * CVE-2023-53631
  * CVE-2023-53637
  * CVE-2023-53639
  * CVE-2023-53640
  * CVE-2023-53641
  * CVE-2023-53644
  * CVE-2023-53648
  * CVE-2023-53650
  * CVE-2023-53651
  * CVE-2023-53658
  * CVE-2023-53659
  * CVE-2023-53662
  * CVE-2023-53667
  * CVE-2023-53668
  * CVE-2023-53670
  * CVE-2023-53673
  * CVE-2023-53674
  * CVE-2023-53675
  * CVE-2023-53679
  * CVE-2023-53680
  * CVE-2023-53681
  * CVE-2023-53683
  * CVE-2023-53687
  * CVE-2023-53692
  * CVE-2023-53693
  * CVE-2023-53695
  * CVE-2023-53696
  * CVE-2023-53700
  * CVE-2023-53704
  * CVE-2023-53705
  * CVE-2023-53708
  * CVE-2023-53709
  * CVE-2023-53711
  * CVE-2023-53715
  * CVE-2023-53717
  * CVE-2023-53718
  * CVE-2023-53719
  * CVE-2023-53722
  * CVE-2023-53723
  * CVE-2023-53724
  * CVE-2023-53725
  * CVE-2023-53726
  * CVE-2023-53730
  * CVE-2023-7324
  * CVE-2025-39742
  * CVE-2025-39797
  * CVE-2025-39945
  * CVE-2025-39965
  * CVE-2025-39967
  * CVE-2025-39968
  * CVE-2025-39973
  * CVE-2025-39978
  * CVE-2025-40018
  * CVE-2025-40044
  * CVE-2025-40088
  * CVE-2025-40102

  
CVSS scores:

  * CVE-2022-43945 ( SUSE ):  8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-43945 ( NVD ):  7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-43945 ( NVD ):  7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50327 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-50327 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-50334 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-50334 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-50470 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-50470 ( SUSE ):  5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
  * CVE-2022-50471 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-50471 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50472 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-50472 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50475 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-50475 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50478 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-50478 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50480 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2022-50480 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2022-50482 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-50482 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50484 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-50484 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50485 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-50485 ( SUSE ):  6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2022-50487 ( SUSE ):  7.1
    CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-50487 ( SUSE ):  7.1 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H
  * CVE-2022-50488 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-50488 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-50489 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2022-50489 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2022-50490 ( SUSE ):  8.5
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-50490 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-50492 ( SUSE ):  8.4
    CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-50492 ( SUSE ):  6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-50493 ( SUSE ):  6.7
    CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-50493 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50494 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-50494 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50496 ( SUSE ):  7.1
    CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-50496 ( SUSE ):  6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-50497 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-50497 ( SUSE ):  5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2022-50498 ( SUSE ):  6.7
    CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-50498 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50499 ( SUSE ):  8.5
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-50499 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-50501 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50503 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50504 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-50504 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50505 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50509 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50511 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50512 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-50512 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50513 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2022-50513 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2022-50514 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50516 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-50516 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50519 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2022-50519 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
  * CVE-2022-50520 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50521 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50523 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50525 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50528 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50529 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50530 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50532 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50534 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50535 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-50535 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50537 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50541 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
  * CVE-2022-50541 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
  * CVE-2022-50542 ( SUSE ):  5.4
    CVSS:4.0/AV:P/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-50542 ( SUSE ):  6.3 CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-50544 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-50544 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50545 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50546 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50549 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50551 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-50551 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50553 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50556 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-50556 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50559 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-50559 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50560 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-50560 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50561 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-50561 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50562 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50563 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-50563 ( SUSE ):  5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2022-50564 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-50564 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50566 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-50566 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50567 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-50567 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
  * CVE-2022-50568 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50570 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-50570 ( SUSE ):  6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
  * CVE-2022-50572 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50574 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50575 ( SUSE ):  0.0
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
  * CVE-2022-50575 ( SUSE ):  0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
  * CVE-2022-50576 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-50576 ( SUSE ):  5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
  * CVE-2022-50578 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-50578 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50579 ( SUSE ):  5.6
    CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-50579 ( SUSE ):  4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50580 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-50580 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
  * CVE-2022-50581 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-50581 ( SUSE ):  6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2022-50582 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2022-50582 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2023-52923 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-52923 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52923 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53365 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53500 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53533 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53534 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53541 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-53541 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
  * CVE-2023-53542 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-53542 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53548 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-53548 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53551 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53552 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53553 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53554 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53556 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53559 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53560 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53564 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-53564 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53566 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53567 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53568 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53571 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53572 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53574 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-53574 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-53576 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-53576 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53579 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53582 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-53582 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
  * CVE-2023-53587 ( SUSE ):  7.1
    CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-53587 ( SUSE ):  6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-53589 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2023-53589 ( SUSE ):  5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L
  * CVE-2023-53592 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2023-53592 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2023-53594 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53597 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53603 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-53603 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53604 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-53604 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53605 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2023-53605 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2023-53607 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53608 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-53608 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-53611 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53612 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-53612 ( SUSE ):  5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2023-53615 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53616 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-53616 ( SUSE ):  6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2023-53617 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53619 ( SUSE ):  8.4
    CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-53619 ( SUSE ):  6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-53622 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-53622 ( SUSE ):  5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
  * CVE-2023-53625 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-53625 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53626 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-53626 ( SUSE ):  6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
  * CVE-2023-53631 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53637 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-53637 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53639 ( SUSE ):  2.0
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2023-53639 ( SUSE ):  2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2023-53640 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-53640 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-53641 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-53641 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53644 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-53644 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53648 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-53648 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53650 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-53650 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53651 ( SUSE ):  7.1
    CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-53651 ( SUSE ):  6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-53658 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-53658 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53659 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-53659 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-53662 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-53662 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53667 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-53667 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
  * CVE-2023-53668 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N
  * CVE-2023-53668 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
  * CVE-2023-53670 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2023-53670 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2023-53673 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-53673 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-53674 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2023-53674 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2023-53675 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-53675 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53679 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-53679 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53680 ( SUSE ):  5.1
    CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
  * CVE-2023-53680 ( SUSE ):  5.5 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
  * CVE-2023-53681 ( SUSE ):  6.7
    CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-53681 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53683 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2023-53683 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2023-53687 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2023-53687 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2023-53692 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53693 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-53693 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53695 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-53695 ( SUSE ):  6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
  * CVE-2023-53696 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53700 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53704 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2023-53704 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2023-53705 ( SUSE ):  6.9
    CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2023-53705 ( SUSE ):  6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
  * CVE-2023-53708 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2023-53708 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2023-53709 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53711 ( SUSE ):  6.0
    CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
  * CVE-2023-53711 ( SUSE ):  5.3 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N
  * CVE-2023-53715 ( SUSE ):  7.1
    CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
  * CVE-2023-53715 ( SUSE ):  6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
  * CVE-2023-53717 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-53717 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-53718 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-53718 ( SUSE ):  5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
  * CVE-2023-53719 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2023-53719 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2023-53722 ( SUSE ):  8.5
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-53722 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-53723 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2023-53723 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2023-53724 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2023-53724 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2023-53725 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2023-53725 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2023-53726 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
  * CVE-2023-53726 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
  * CVE-2023-53730 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-53730 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-7324 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-7324 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-39742 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-39742 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-39797 ( SUSE ):  8.2
    CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-39797 ( SUSE ):  5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-39945 ( SUSE ):  7.1
    CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-39945 ( SUSE ):  6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-39965 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-39965 ( SUSE ):  6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2025-39967 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-39967 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
  * CVE-2025-39968 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2025-39968 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2025-39973 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-39973 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-39978 ( SUSE ):  8.5
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-39978 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-40018 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40018 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-40044 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40044 ( SUSE ):  6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2025-40088 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40088 ( SUSE ):  5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H
  * CVE-2025-40102 ( SUSE ):  0.0
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
  * CVE-2025-40102 ( SUSE ):  0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N

  
Affected Products:

  * openSUSE Leap 15.4
  * SUSE Linux Enterprise High Availability Extension 15 SP4
  * SUSE Linux Enterprise High Performance Computing 15 SP4
  * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
  * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
  * SUSE Linux Enterprise Live Patching 15-SP4
  * SUSE Linux Enterprise Micro 5.3
  * SUSE Linux Enterprise Micro 5.4
  * SUSE Linux Enterprise Micro for Rancher 5.3
  * SUSE Linux Enterprise Micro for Rancher 5.4
  * SUSE Linux Enterprise Real Time 15 SP4
  * SUSE Linux Enterprise Server 15 SP4
  * SUSE Linux Enterprise Server 15 SP4 LTSS
  * SUSE Linux Enterprise Server for SAP Applications 15 SP4
  * SUSE Manager Proxy 4.3
  * SUSE Manager Proxy 4.3 LTS
  * SUSE Manager Retail Branch Server 4.3
  * SUSE Manager Retail Branch Server 4.3 LTS
  * SUSE Manager Server 4.3
  * SUSE Manager Server 4.3 LTS

  
  
An update that solves 173 vulnerabilities, contains two features and has 19
security fixes can now be installed.

## Description:

The SUSE Linux Enterprise 15 SP4 kernel was updated to fix various security
issues

The following security issues were fixed:

  * CVE-2022-50327: ACPI: processor: idle: Check acpi_fetch_acpi_dev() return
    value (bsc#1249859).
  * CVE-2022-50334: hugetlbfs: fix null-ptr-deref in hugetlbfs_parse_param()
    (bsc#1249857).
  * CVE-2022-50490: bpf: Propagate error from htab_lock_bucket() to userspace
    (bsc#1251164).
  * CVE-2022-50516: fs: dlm: fix invalid derefence of sb_lvbptr (bsc#1251741).
  * CVE-2023-53365: ip6mr: Fix skb_under_panic in ip6mr_cache_report()
    (bsc#1249988).
  * CVE-2023-53500: xfrm: fix slab-use-after-free in decode_session6
    (bsc#1250816).
  * CVE-2023-53559: ip_vti: fix potential slab-use-after-free in decode_session6
    (bsc#1251052).
  * CVE-2023-53574: wifi: rtw88: delete timer and free skb queue when unloading
    (bsc#1251222).
  * CVE-2023-53619: netfilter: conntrack: Avoid nf_ct_helper_hash uses after
    free (bsc#1251743).
  * CVE-2023-53673: Bluetooth: hci_event: call disconnect callback before
    deleting conn (bsc#1251763).
  * CVE-2023-53705: ipv6: Fix out-of-bounds access in ipv6_find_tlv()
    (bsc#1252554).
  * CVE-2025-39742: RDMA: hfi1: fix possible divide-by-zero in
    find_hw_thread_mask() (bsc#1249479).
  * CVE-2025-39945: cnic: Fix use-after-free bugs in cnic_delete_task
    (bsc#1251230).
  * CVE-2025-39967: fbcon: fix integer overflow in fbcon_do_set_font
    (bsc#1252033).
  * CVE-2025-39968: i40e: add max boundary check for VF filters (bsc#1252047).
  * CVE-2025-39973: i40e: add validation for ring_len param (bsc#1252035).
  * CVE-2025-39978: octeontx2-pf: Fix potential use after free in
    otx2_tc_add_flow() (bsc#1252069).
  * CVE-2025-40018: ipvs: Defer ip_vs_ftp unregister during netns cleanup
    (bsc#1252688).
  * CVE-2025-40044: fs: udf: fix OOB read in lengthAllocDescs handling
    (bsc#1252785).
  * CVE-2025-40088: hfsplus: fix slab-out-of-bounds read in hfsplus_strcasecmp()
    (bsc#1252904).
  * CVE-2025-40102: KVM: arm64: Prevent access to vCPU events before init
    (bsc#1252919).

The following non security issues were fixed:

  * fbcon: Fix OOB access in font allocation (bsc#1252033)
  * mm: avoid unnecessary page fault retires on shared memory types
    (bsc#1251823).
  * net: hv_netvsc: fix loss of early receive events from host during channel
    open (bsc#1252265).

## Special Instructions and Notes:

  * Please reboot the system after installing this update.

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".  
Alternatively you can run the command listed for your product:

  * openSUSE Leap 15.4  
    zypper in -t patch SUSE-2025-4111=1

  * SUSE Linux Enterprise Micro for Rancher 5.3  
    zypper in -t patch SUSE-SLE-Micro-5.3-2025-4111=1

  * SUSE Linux Enterprise Micro 5.3  
    zypper in -t patch SUSE-SLE-Micro-5.3-2025-4111=1

  * SUSE Linux Enterprise Micro for Rancher 5.4  
    zypper in -t patch SUSE-SLE-Micro-5.4-2025-4111=1

  * SUSE Linux Enterprise Micro 5.4  
    zypper in -t patch SUSE-SLE-Micro-5.4-2025-4111=1

  * SUSE Linux Enterprise High Availability Extension 15 SP4  
    zypper in -t patch SUSE-SLE-Product-HA-15-SP4-2025-4111=1

  * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4  
    zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-4111=1

  * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4  
    zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-4111=1

  * SUSE Linux Enterprise Server 15 SP4 LTSS  
    zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-4111=1

  * SUSE Linux Enterprise Server for SAP Applications 15 SP4  
    zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-4111=1

  * SUSE Manager Proxy 4.3 LTS  
    zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-LTS-2025-4111=1

  * SUSE Manager Retail Branch Server 4.3 LTS  
    zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-LTS-2025-4111=1

  * SUSE Manager Server 4.3 LTS  
    zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-LTS-2025-4111=1

  * SUSE Linux Enterprise Live Patching 15-SP4  
    zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2025-4111=1  
Please note that this is the initial kernel livepatch without fixes itself, this
package is later updated by separate standalone kernel livepatch updates.

## Package List:

  * openSUSE Leap 15.4 (noarch nosrc)
    * kernel-docs-5.14.21-150400.24.184.1
  * openSUSE Leap 15.4 (noarch)
    * kernel-docs-html-5.14.21-150400.24.184.1
    * kernel-source-vanilla-5.14.21-150400.24.184.1
    * kernel-devel-5.14.21-150400.24.184.1
    * kernel-macros-5.14.21-150400.24.184.1
    * kernel-source-5.14.21-150400.24.184.1
  * openSUSE Leap 15.4 (aarch64 ppc64le x86_64)
    * kernel-kvmsmall-debuginfo-5.14.21-150400.24.184.1
    * kernel-kvmsmall-devel-5.14.21-150400.24.184.1
    * kernel-default-base-rebuild-5.14.21-150400.24.184.1.150400.24.94.2
    * kernel-kvmsmall-debugsource-5.14.21-150400.24.184.1
    * kernel-default-base-5.14.21-150400.24.184.1.150400.24.94.2
    * kernel-kvmsmall-devel-debuginfo-5.14.21-150400.24.184.1
  * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64)
    * dlm-kmp-default-5.14.21-150400.24.184.1
    * cluster-md-kmp-default-5.14.21-150400.24.184.1
    * dlm-kmp-default-debuginfo-5.14.21-150400.24.184.1
    * kselftests-kmp-default-debuginfo-5.14.21-150400.24.184.1
    * kernel-default-livepatch-5.14.21-150400.24.184.1
    * kernel-default-devel-debuginfo-5.14.21-150400.24.184.1
    * kernel-obs-build-debugsource-5.14.21-150400.24.184.1
    * kernel-obs-build-5.14.21-150400.24.184.1
    * ocfs2-kmp-default-5.14.21-150400.24.184.1
    * ocfs2-kmp-default-debuginfo-5.14.21-150400.24.184.1
    * kernel-syms-5.14.21-150400.24.184.1
    * kernel-default-extra-5.14.21-150400.24.184.1
    * cluster-md-kmp-default-debuginfo-5.14.21-150400.24.184.1
    * gfs2-kmp-default-debuginfo-5.14.21-150400.24.184.1
    * kernel-default-optional-5.14.21-150400.24.184.1
    * reiserfs-kmp-default-debuginfo-5.14.21-150400.24.184.1
    * kernel-default-extra-debuginfo-5.14.21-150400.24.184.1
    * kernel-obs-qa-5.14.21-150400.24.184.1
    * kernel-default-debugsource-5.14.21-150400.24.184.1
    * reiserfs-kmp-default-5.14.21-150400.24.184.1
    * kselftests-kmp-default-5.14.21-150400.24.184.1
    * gfs2-kmp-default-5.14.21-150400.24.184.1
    * kernel-default-debuginfo-5.14.21-150400.24.184.1
    * kernel-default-devel-5.14.21-150400.24.184.1
    * kernel-default-optional-debuginfo-5.14.21-150400.24.184.1
  * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 nosrc)
    * kernel-default-5.14.21-150400.24.184.1
  * openSUSE Leap 15.4 (ppc64le s390x x86_64)
    * kernel-livepatch-5_14_21-150400_24_184-default-1-150400.9.5.1
    * kernel-livepatch-5_14_21-150400_24_184-default-debuginfo-1-150400.9.5.1
    * kernel-default-livepatch-devel-5.14.21-150400.24.184.1
    * kernel-livepatch-SLE15-SP4_Update_46-debugsource-1-150400.9.5.1
  * openSUSE Leap 15.4 (aarch64 nosrc ppc64le x86_64)
    * kernel-kvmsmall-5.14.21-150400.24.184.1
  * openSUSE Leap 15.4 (nosrc s390x)
    * kernel-zfcpdump-5.14.21-150400.24.184.1
  * openSUSE Leap 15.4 (s390x)
    * kernel-zfcpdump-debuginfo-5.14.21-150400.24.184.1
    * kernel-zfcpdump-debugsource-5.14.21-150400.24.184.1
  * openSUSE Leap 15.4 (nosrc)
    * dtb-aarch64-5.14.21-150400.24.184.1
  * openSUSE Leap 15.4 (aarch64)
    * dtb-freescale-5.14.21-150400.24.184.1
    * kernel-64kb-extra-5.14.21-150400.24.184.1
    * kernel-64kb-devel-5.14.21-150400.24.184.1
    * dtb-lg-5.14.21-150400.24.184.1
    * dtb-socionext-5.14.21-150400.24.184.1
    * kernel-64kb-optional-debuginfo-5.14.21-150400.24.184.1
    * dlm-kmp-64kb-debuginfo-5.14.21-150400.24.184.1
    * ocfs2-kmp-64kb-5.14.21-150400.24.184.1
    * dtb-exynos-5.14.21-150400.24.184.1
    * gfs2-kmp-64kb-debuginfo-5.14.21-150400.24.184.1
    * kernel-64kb-debuginfo-5.14.21-150400.24.184.1
    * gfs2-kmp-64kb-5.14.21-150400.24.184.1
    * dtb-broadcom-5.14.21-150400.24.184.1
    * dtb-arm-5.14.21-150400.24.184.1
    * dtb-rockchip-5.14.21-150400.24.184.1
    * dtb-mediatek-5.14.21-150400.24.184.1
    * dtb-hisilicon-5.14.21-150400.24.184.1
    * dtb-amazon-5.14.21-150400.24.184.1
    * dtb-xilinx-5.14.21-150400.24.184.1
    * dtb-marvell-5.14.21-150400.24.184.1
    * cluster-md-kmp-64kb-5.14.21-150400.24.184.1
    * kernel-64kb-debugsource-5.14.21-150400.24.184.1
    * reiserfs-kmp-64kb-debuginfo-5.14.21-150400.24.184.1
    * kernel-64kb-optional-5.14.21-150400.24.184.1
    * dtb-apple-5.14.21-150400.24.184.1
    * dtb-cavium-5.14.21-150400.24.184.1
    * kselftests-kmp-64kb-5.14.21-150400.24.184.1
    * cluster-md-kmp-64kb-debuginfo-5.14.21-150400.24.184.1
    * kernel-64kb-extra-debuginfo-5.14.21-150400.24.184.1
    * dlm-kmp-64kb-5.14.21-150400.24.184.1
    * kselftests-kmp-64kb-debuginfo-5.14.21-150400.24.184.1
    * dtb-sprd-5.14.21-150400.24.184.1
    * dtb-allwinner-5.14.21-150400.24.184.1
    * reiserfs-kmp-64kb-5.14.21-150400.24.184.1
    * kernel-64kb-devel-debuginfo-5.14.21-150400.24.184.1
    * dtb-altera-5.14.21-150400.24.184.1
    * dtb-amlogic-5.14.21-150400.24.184.1
    * dtb-qcom-5.14.21-150400.24.184.1
    * dtb-renesas-5.14.21-150400.24.184.1
    * ocfs2-kmp-64kb-debuginfo-5.14.21-150400.24.184.1
    * dtb-nvidia-5.14.21-150400.24.184.1
    * dtb-amd-5.14.21-150400.24.184.1
    * dtb-apm-5.14.21-150400.24.184.1
  * openSUSE Leap 15.4 (aarch64 nosrc)
    * kernel-64kb-5.14.21-150400.24.184.1
  * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 nosrc s390x x86_64)
    * kernel-default-5.14.21-150400.24.184.1
  * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 x86_64)
    * kernel-default-base-5.14.21-150400.24.184.1.150400.24.94.2
  * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
    * kernel-default-debugsource-5.14.21-150400.24.184.1
    * kernel-default-debuginfo-5.14.21-150400.24.184.1
  * SUSE Linux Enterprise Micro 5.3 (aarch64 nosrc s390x x86_64)
    * kernel-default-5.14.21-150400.24.184.1
  * SUSE Linux Enterprise Micro 5.3 (aarch64 x86_64)
    * kernel-default-base-5.14.21-150400.24.184.1.150400.24.94.2
  * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
    * kernel-default-debugsource-5.14.21-150400.24.184.1
    * kernel-default-debuginfo-5.14.21-150400.24.184.1
  * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 nosrc s390x x86_64)
    * kernel-default-5.14.21-150400.24.184.1
  * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 x86_64)
    * kernel-default-base-5.14.21-150400.24.184.1.150400.24.94.2
  * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
    * kernel-default-debugsource-5.14.21-150400.24.184.1
    * kernel-default-debuginfo-5.14.21-150400.24.184.1
  * SUSE Linux Enterprise Micro 5.4 (aarch64 nosrc s390x x86_64)
    * kernel-default-5.14.21-150400.24.184.1
  * SUSE Linux Enterprise Micro 5.4 (aarch64 x86_64)
    * kernel-default-base-5.14.21-150400.24.184.1.150400.24.94.2
  * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
    * kernel-default-debugsource-5.14.21-150400.24.184.1
    * kernel-default-debuginfo-5.14.21-150400.24.184.1
  * SUSE Linux Enterprise High Availability Extension 15 SP4 (aarch64 ppc64le
    s390x x86_64)
    * dlm-kmp-default-5.14.21-150400.24.184.1
    * ocfs2-kmp-default-debuginfo-5.14.21-150400.24.184.1
    * cluster-md-kmp-default-5.14.21-150400.24.184.1
    * dlm-kmp-default-debuginfo-5.14.21-150400.24.184.1
    * gfs2-kmp-default-5.14.21-150400.24.184.1
    * kernel-default-debuginfo-5.14.21-150400.24.184.1
    * kernel-default-debugsource-5.14.21-150400.24.184.1
    * cluster-md-kmp-default-debuginfo-5.14.21-150400.24.184.1
    * gfs2-kmp-default-debuginfo-5.14.21-150400.24.184.1
    * ocfs2-kmp-default-5.14.21-150400.24.184.1
  * SUSE Linux Enterprise High Availability Extension 15 SP4 (nosrc)
    * kernel-default-5.14.21-150400.24.184.1
  * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
    nosrc)
    * kernel-64kb-5.14.21-150400.24.184.1
  * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64)
    * kernel-64kb-debugsource-5.14.21-150400.24.184.1
    * kernel-64kb-devel-debuginfo-5.14.21-150400.24.184.1
    * kernel-64kb-debuginfo-5.14.21-150400.24.184.1
    * kernel-64kb-devel-5.14.21-150400.24.184.1
  * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 nosrc
    x86_64)
    * kernel-default-5.14.21-150400.24.184.1
  * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
    x86_64)
    * reiserfs-kmp-default-debuginfo-5.14.21-150400.24.184.1
    * kernel-syms-5.14.21-150400.24.184.1
    * kernel-default-debugsource-5.14.21-150400.24.184.1
    * kernel-default-debuginfo-5.14.21-150400.24.184.1
    * reiserfs-kmp-default-5.14.21-150400.24.184.1
    * kernel-default-base-5.14.21-150400.24.184.1.150400.24.94.2
    * kernel-obs-build-debugsource-5.14.21-150400.24.184.1
    * kernel-default-devel-debuginfo-5.14.21-150400.24.184.1
    * kernel-obs-build-5.14.21-150400.24.184.1
    * kernel-default-devel-5.14.21-150400.24.184.1
  * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
    * kernel-devel-5.14.21-150400.24.184.1
    * kernel-macros-5.14.21-150400.24.184.1
    * kernel-source-5.14.21-150400.24.184.1
  * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch nosrc)
    * kernel-docs-5.14.21-150400.24.184.1
  * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 nosrc)
    * kernel-64kb-5.14.21-150400.24.184.1
  * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64)
    * kernel-64kb-debugsource-5.14.21-150400.24.184.1
    * kernel-64kb-devel-debuginfo-5.14.21-150400.24.184.1
    * kernel-64kb-debuginfo-5.14.21-150400.24.184.1
    * kernel-64kb-devel-5.14.21-150400.24.184.1
  * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 nosrc
    x86_64)
    * kernel-default-5.14.21-150400.24.184.1
  * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
    x86_64)
    * reiserfs-kmp-default-debuginfo-5.14.21-150400.24.184.1
    * kernel-syms-5.14.21-150400.24.184.1
    * kernel-default-debugsource-5.14.21-150400.24.184.1
    * kernel-default-debuginfo-5.14.21-150400.24.184.1
    * reiserfs-kmp-default-5.14.21-150400.24.184.1
    * kernel-default-base-5.14.21-150400.24.184.1.150400.24.94.2
    * kernel-obs-build-debugsource-5.14.21-150400.24.184.1
    * kernel-default-devel-debuginfo-5.14.21-150400.24.184.1
    * kernel-obs-build-5.14.21-150400.24.184.1
    * kernel-default-devel-5.14.21-150400.24.184.1
  * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
    * kernel-devel-5.14.21-150400.24.184.1
    * kernel-macros-5.14.21-150400.24.184.1
    * kernel-source-5.14.21-150400.24.184.1
  * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch nosrc)
    * kernel-docs-5.14.21-150400.24.184.1
  * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 nosrc)
    * kernel-64kb-5.14.21-150400.24.184.1
  * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64)
    * kernel-64kb-debugsource-5.14.21-150400.24.184.1
    * kernel-64kb-devel-debuginfo-5.14.21-150400.24.184.1
    * kernel-64kb-debuginfo-5.14.21-150400.24.184.1
    * kernel-64kb-devel-5.14.21-150400.24.184.1
  * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64
    nosrc)
    * kernel-default-5.14.21-150400.24.184.1
  * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le x86_64)
    * kernel-default-base-5.14.21-150400.24.184.1.150400.24.94.2
  * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64)
    * reiserfs-kmp-default-debuginfo-5.14.21-150400.24.184.1
    * kernel-syms-5.14.21-150400.24.184.1
    * kernel-default-debugsource-5.14.21-150400.24.184.1
    * kernel-default-debuginfo-5.14.21-150400.24.184.1
    * reiserfs-kmp-default-5.14.21-150400.24.184.1
    * kernel-obs-build-debugsource-5.14.21-150400.24.184.1
    * kernel-default-devel-debuginfo-5.14.21-150400.24.184.1
    * kernel-obs-build-5.14.21-150400.24.184.1
    * kernel-default-devel-5.14.21-150400.24.184.1
  * SUSE Linux Enterprise Server 15 SP4 LTSS (noarch)
    * kernel-devel-5.14.21-150400.24.184.1
    * kernel-macros-5.14.21-150400.24.184.1
    * kernel-source-5.14.21-150400.24.184.1
  * SUSE Linux Enterprise Server 15 SP4 LTSS (noarch nosrc)
    * kernel-docs-5.14.21-150400.24.184.1
  * SUSE Linux Enterprise Server 15 SP4 LTSS (nosrc s390x)
    * kernel-zfcpdump-5.14.21-150400.24.184.1
  * SUSE Linux Enterprise Server 15 SP4 LTSS (s390x)
    * kernel-zfcpdump-debuginfo-5.14.21-150400.24.184.1
    * kernel-zfcpdump-debugsource-5.14.21-150400.24.184.1
  * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (nosrc ppc64le
    x86_64)
    * kernel-default-5.14.21-150400.24.184.1
  * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
    * reiserfs-kmp-default-debuginfo-5.14.21-150400.24.184.1
    * kernel-syms-5.14.21-150400.24.184.1
    * kernel-default-debugsource-5.14.21-150400.24.184.1
    * kernel-default-debuginfo-5.14.21-150400.24.184.1
    * reiserfs-kmp-default-5.14.21-150400.24.184.1
    * kernel-default-base-5.14.21-150400.24.184.1.150400.24.94.2
    * kernel-obs-build-debugsource-5.14.21-150400.24.184.1
    * kernel-default-devel-debuginfo-5.14.21-150400.24.184.1
    * kernel-obs-build-5.14.21-150400.24.184.1
    * kernel-default-devel-5.14.21-150400.24.184.1
  * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
    * kernel-devel-5.14.21-150400.24.184.1
    * kernel-macros-5.14.21-150400.24.184.1
    * kernel-source-5.14.21-150400.24.184.1
  * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch nosrc)
    * kernel-docs-5.14.21-150400.24.184.1
  * SUSE Manager Proxy 4.3 LTS (nosrc x86_64)
    * kernel-default-5.14.21-150400.24.184.1
  * SUSE Manager Proxy 4.3 LTS (x86_64)
    * kernel-syms-5.14.21-150400.24.184.1
    * kernel-default-debugsource-5.14.21-150400.24.184.1
    * kernel-default-debuginfo-5.14.21-150400.24.184.1
    * kernel-default-base-5.14.21-150400.24.184.1.150400.24.94.2
    * kernel-default-devel-debuginfo-5.14.21-150400.24.184.1
    * kernel-default-devel-5.14.21-150400.24.184.1
  * SUSE Manager Proxy 4.3 LTS (noarch)
    * kernel-devel-5.14.21-150400.24.184.1
    * kernel-macros-5.14.21-150400.24.184.1
    * kernel-source-5.14.21-150400.24.184.1
  * SUSE Manager Retail Branch Server 4.3 LTS (nosrc x86_64)
    * kernel-default-5.14.21-150400.24.184.1
  * SUSE Manager Retail Branch Server 4.3 LTS (x86_64)
    * kernel-default-debugsource-5.14.21-150400.24.184.1
    * kernel-default-debuginfo-5.14.21-150400.24.184.1
    * kernel-default-base-5.14.21-150400.24.184.1.150400.24.94.2
    * kernel-default-devel-debuginfo-5.14.21-150400.24.184.1
    * kernel-default-devel-5.14.21-150400.24.184.1
  * SUSE Manager Retail Branch Server 4.3 LTS (noarch)
    * kernel-devel-5.14.21-150400.24.184.1
    * kernel-macros-5.14.21-150400.24.184.1
  * SUSE Manager Server 4.3 LTS (nosrc ppc64le s390x x86_64)
    * kernel-default-5.14.21-150400.24.184.1
  * SUSE Manager Server 4.3 LTS (ppc64le x86_64)
    * kernel-default-base-5.14.21-150400.24.184.1.150400.24.94.2
  * SUSE Manager Server 4.3 LTS (ppc64le s390x x86_64)
    * kernel-syms-5.14.21-150400.24.184.1
    * kernel-default-debugsource-5.14.21-150400.24.184.1
    * kernel-default-debuginfo-5.14.21-150400.24.184.1
    * kernel-default-devel-debuginfo-5.14.21-150400.24.184.1
    * kernel-default-devel-5.14.21-150400.24.184.1
  * SUSE Manager Server 4.3 LTS (noarch)
    * kernel-devel-5.14.21-150400.24.184.1
    * kernel-macros-5.14.21-150400.24.184.1
    * kernel-source-5.14.21-150400.24.184.1
  * SUSE Manager Server 4.3 LTS (nosrc s390x)
    * kernel-zfcpdump-5.14.21-150400.24.184.1
  * SUSE Manager Server 4.3 LTS (s390x)
    * kernel-zfcpdump-debuginfo-5.14.21-150400.24.184.1
    * kernel-zfcpdump-debugsource-5.14.21-150400.24.184.1
  * SUSE Linux Enterprise Live Patching 15-SP4 (nosrc)
    * kernel-default-5.14.21-150400.24.184.1
  * SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64)
    * kernel-livepatch-5_14_21-150400_24_184-default-debuginfo-1-150400.9.5.1
    * kernel-livepatch-SLE15-SP4_Update_46-debugsource-1-150400.9.5.1
    * kernel-default-debugsource-5.14.21-150400.24.184.1
    * kernel-default-debuginfo-5.14.21-150400.24.184.1
    * kernel-livepatch-5_14_21-150400_24_184-default-1-150400.9.5.1
    * kernel-default-livepatch-5.14.21-150400.24.184.1
    * kernel-default-livepatch-devel-5.14.21-150400.24.184.1

## References:

  * https://www.suse.com/security/cve/CVE-2022-43945.html
  * https://www.suse.com/security/cve/CVE-2022-50327.html
  * https://www.suse.com/security/cve/CVE-2022-50334.html
  * https://www.suse.com/security/cve/CVE-2022-50470.html
  * https://www.suse.com/security/cve/CVE-2022-50471.html
  * https://www.suse.com/security/cve/CVE-2022-50472.html
  * https://www.suse.com/security/cve/CVE-2022-50475.html
  * https://www.suse.com/security/cve/CVE-2022-50478.html
  * https://www.suse.com/security/cve/CVE-2022-50480.html
  * https://www.suse.com/security/cve/CVE-2022-50482.html
  * https://www.suse.com/security/cve/CVE-2022-50484.html
  * https://www.suse.com/security/cve/CVE-2022-50485.html
  * https://www.suse.com/security/cve/CVE-2022-50487.html
  * https://www.suse.com/security/cve/CVE-2022-50488.html
  * https://www.suse.com/security/cve/CVE-2022-50489.html
  * https://www.suse.com/security/cve/CVE-2022-50490.html
  * https://www.suse.com/security/cve/CVE-2022-50492.html
  * https://www.suse.com/security/cve/CVE-2022-50493.html
  * https://www.suse.com/security/cve/CVE-2022-50494.html
  * https://www.suse.com/security/cve/CVE-2022-50496.html
  * https://www.suse.com/security/cve/CVE-2022-50497.html
  * https://www.suse.com/security/cve/CVE-2022-50498.html
  * https://www.suse.com/security/cve/CVE-2022-50499.html
  * https://www.suse.com/security/cve/CVE-2022-50501.html
  * https://www.suse.com/security/cve/CVE-2022-50503.html
  * https://www.suse.com/security/cve/CVE-2022-50504.html
  * https://www.suse.com/security/cve/CVE-2022-50505.html
  * https://www.suse.com/security/cve/CVE-2022-50509.html
  * https://www.suse.com/security/cve/CVE-2022-50511.html
  * https://www.suse.com/security/cve/CVE-2022-50512.html
  * https://www.suse.com/security/cve/CVE-2022-50513.html
  * https://www.suse.com/security/cve/CVE-2022-50514.html
  * https://www.suse.com/security/cve/CVE-2022-50516.html
  * https://www.suse.com/security/cve/CVE-2022-50519.html
  * https://www.suse.com/security/cve/CVE-2022-50520.html
  * https://www.suse.com/security/cve/CVE-2022-50521.html
  * https://www.suse.com/security/cve/CVE-2022-50523.html
  * https://www.suse.com/security/cve/CVE-2022-50525.html
  * https://www.suse.com/security/cve/CVE-2022-50528.html
  * https://www.suse.com/security/cve/CVE-2022-50529.html
  * https://www.suse.com/security/cve/CVE-2022-50530.html
  * https://www.suse.com/security/cve/CVE-2022-50532.html
  * https://www.suse.com/security/cve/CVE-2022-50534.html
  * https://www.suse.com/security/cve/CVE-2022-50535.html
  * https://www.suse.com/security/cve/CVE-2022-50537.html
  * https://www.suse.com/security/cve/CVE-2022-50541.html
  * https://www.suse.com/security/cve/CVE-2022-50542.html
  * https://www.suse.com/security/cve/CVE-2022-50544.html
  * https://www.suse.com/security/cve/CVE-2022-50545.html
  * https://www.suse.com/security/cve/CVE-2022-50546.html
  * https://www.suse.com/security/cve/CVE-2022-50549.html
  * https://www.suse.com/security/cve/CVE-2022-50551.html
  * https://www.suse.com/security/cve/CVE-2022-50553.html
  * https://www.suse.com/security/cve/CVE-2022-50556.html
  * https://www.suse.com/security/cve/CVE-2022-50559.html
  * https://www.suse.com/security/cve/CVE-2022-50560.html
  * https://www.suse.com/security/cve/CVE-2022-50561.html
  * https://www.suse.com/security/cve/CVE-2022-50562.html
  * https://www.suse.com/security/cve/CVE-2022-50563.html
  * https://www.suse.com/security/cve/CVE-2022-50564.html
  * https://www.suse.com/security/cve/CVE-2022-50566.html
  * https://www.suse.com/security/cve/CVE-2022-50567.html
  * https://www.suse.com/security/cve/CVE-2022-50568.html
  * https://www.suse.com/security/cve/CVE-2022-50570.html
  * https://www.suse.com/security/cve/CVE-2022-50572.html
  * https://www.suse.com/security/cve/CVE-2022-50574.html
  * https://www.suse.com/security/cve/CVE-2022-50575.html
  * https://www.suse.com/security/cve/CVE-2022-50576.html
  * https://www.suse.com/security/cve/CVE-2022-50578.html
  * https://www.suse.com/security/cve/CVE-2022-50579.html
  * https://www.suse.com/security/cve/CVE-2022-50580.html
  * https://www.suse.com/security/cve/CVE-2022-50581.html
  * https://www.suse.com/security/cve/CVE-2022-50582.html
  * https://www.suse.com/security/cve/CVE-2023-52923.html
  * https://www.suse.com/security/cve/CVE-2023-53365.html
  * https://www.suse.com/security/cve/CVE-2023-53500.html
  * https://www.suse.com/security/cve/CVE-2023-53533.html
  * https://www.suse.com/security/cve/CVE-2023-53534.html
  * https://www.suse.com/security/cve/CVE-2023-53541.html
  * https://www.suse.com/security/cve/CVE-2023-53542.html
  * https://www.suse.com/security/cve/CVE-2023-53548.html
  * https://www.suse.com/security/cve/CVE-2023-53551.html
  * https://www.suse.com/security/cve/CVE-2023-53552.html
  * https://www.suse.com/security/cve/CVE-2023-53553.html
  * https://www.suse.com/security/cve/CVE-2023-53554.html
  * https://www.suse.com/security/cve/CVE-2023-53556.html
  * https://www.suse.com/security/cve/CVE-2023-53559.html
  * https://www.suse.com/security/cve/CVE-2023-53560.html
  * https://www.suse.com/security/cve/CVE-2023-53564.html
  * https://www.suse.com/security/cve/CVE-2023-53566.html
  * https://www.suse.com/security/cve/CVE-2023-53567.html
  * https://www.suse.com/security/cve/CVE-2023-53568.html
  * https://www.suse.com/security/cve/CVE-2023-53571.html
  * https://www.suse.com/security/cve/CVE-2023-53572.html
  * https://www.suse.com/security/cve/CVE-2023-53574.html
  * https://www.suse.com/security/cve/CVE-2023-53576.html
  * https://www.suse.com/security/cve/CVE-2023-53579.html
  * https://www.suse.com/security/cve/CVE-2023-53582.html
  * https://www.suse.com/security/cve/CVE-2023-53587.html
  * https://www.suse.com/security/cve/CVE-2023-53589.html
  * https://www.suse.com/security/cve/CVE-2023-53592.html
  * https://www.suse.com/security/cve/CVE-2023-53594.html
  * https://www.suse.com/security/cve/CVE-2023-53597.html
  * https://www.suse.com/security/cve/CVE-2023-53603.html
  * https://www.suse.com/security/cve/CVE-2023-53604.html
  * https://www.suse.com/security/cve/CVE-2023-53605.html
  * https://www.suse.com/security/cve/CVE-2023-53607.html
  * https://www.suse.com/security/cve/CVE-2023-53608.html
  * https://www.suse.com/security/cve/CVE-2023-53611.html
  * https://www.suse.com/security/cve/CVE-2023-53612.html
  * https://www.suse.com/security/cve/CVE-2023-53615.html
  * https://www.suse.com/security/cve/CVE-2023-53616.html
  * https://www.suse.com/security/cve/CVE-2023-53617.html
  * https://www.suse.com/security/cve/CVE-2023-53619.html
  * https://www.suse.com/security/cve/CVE-2023-53622.html
  * https://www.suse.com/security/cve/CVE-2023-53625.html
  * https://www.suse.com/security/cve/CVE-2023-53626.html
  * https://www.suse.com/security/cve/CVE-2023-53631.html
  * https://www.suse.com/security/cve/CVE-2023-53637.html
  * https://www.suse.com/security/cve/CVE-2023-53639.html
  * https://www.suse.com/security/cve/CVE-2023-53640.html
  * https://www.suse.com/security/cve/CVE-2023-53641.html
  * https://www.suse.com/security/cve/CVE-2023-53644.html
  * https://www.suse.com/security/cve/CVE-2023-53648.html
  * https://www.suse.com/security/cve/CVE-2023-53650.html
  * https://www.suse.com/security/cve/CVE-2023-53651.html
  * https://www.suse.com/security/cve/CVE-2023-53658.html
  * https://www.suse.com/security/cve/CVE-2023-53659.html
  * https://www.suse.com/security/cve/CVE-2023-53662.html
  * https://www.suse.com/security/cve/CVE-2023-53667.html
  * https://www.suse.com/security/cve/CVE-2023-53668.html
  * https://www.suse.com/security/cve/CVE-2023-53670.html
  * https://www.suse.com/security/cve/CVE-2023-53673.html
  * https://www.suse.com/security/cve/CVE-2023-53674.html
  * https://www.suse.com/security/cve/CVE-2023-53675.html
  * https://www.suse.com/security/cve/CVE-2023-53679.html
  * https://www.suse.com/security/cve/CVE-2023-53680.html
  * https://www.suse.com/security/cve/CVE-2023-53681.html
  * https://www.suse.com/security/cve/CVE-2023-53683.html
  * https://www.suse.com/security/cve/CVE-2023-53687.html
  * https://www.suse.com/security/cve/CVE-2023-53692.html
  * https://www.suse.com/security/cve/CVE-2023-53693.html
  * https://www.suse.com/security/cve/CVE-2023-53695.html
  * https://www.suse.com/security/cve/CVE-2023-53696.html
  * https://www.suse.com/security/cve/CVE-2023-53700.html
  * https://www.suse.com/security/cve/CVE-2023-53704.html
  * https://www.suse.com/security/cve/CVE-2023-53705.html
  * https://www.suse.com/security/cve/CVE-2023-53708.html
  * https://www.suse.com/security/cve/CVE-2023-53709.html
  * https://www.suse.com/security/cve/CVE-2023-53711.html
  * https://www.suse.com/security/cve/CVE-2023-53715.html
  * https://www.suse.com/security/cve/CVE-2023-53717.html
  * https://www.suse.com/security/cve/CVE-2023-53718.html
  * https://www.suse.com/security/cve/CVE-2023-53719.html
  * https://www.suse.com/security/cve/CVE-2023-53722.html
  * https://www.suse.com/security/cve/CVE-2023-53723.html
  * https://www.suse.com/security/cve/CVE-2023-53724.html
  * https://www.suse.com/security/cve/CVE-2023-53725.html
  * https://www.suse.com/security/cve/CVE-2023-53726.html
  * https://www.suse.com/security/cve/CVE-2023-53730.html
  * https://www.suse.com/security/cve/CVE-2023-7324.html
  * https://www.suse.com/security/cve/CVE-2025-39742.html
  * https://www.suse.com/security/cve/CVE-2025-39797.html
  * https://www.suse.com/security/cve/CVE-2025-39945.html
  * https://www.suse.com/security/cve/CVE-2025-39965.html
  * https://www.suse.com/security/cve/CVE-2025-39967.html
  * https://www.suse.com/security/cve/CVE-2025-39968.html
  * https://www.suse.com/security/cve/CVE-2025-39973.html
  * https://www.suse.com/security/cve/CVE-2025-39978.html
  * https://www.suse.com/security/cve/CVE-2025-40018.html
  * https://www.suse.com/security/cve/CVE-2025-40044.html
  * https://www.suse.com/security/cve/CVE-2025-40088.html
  * https://www.suse.com/security/cve/CVE-2025-40102.html
  * https://bugzilla.suse.com/show_bug.cgi?id=1065729
  * https://bugzilla.suse.com/show_bug.cgi?id=1205128
  * https://bugzilla.suse.com/show_bug.cgi?id=1206893
  * https://bugzilla.suse.com/show_bug.cgi?id=1207612
  * https://bugzilla.suse.com/show_bug.cgi?id=1207619
  * https://bugzilla.suse.com/show_bug.cgi?id=1210763
  * https://bugzilla.suse.com/show_bug.cgi?id=1211162
  * https://bugzilla.suse.com/show_bug.cgi?id=1211692
  * https://bugzilla.suse.com/show_bug.cgi?id=1213098
  * https://bugzilla.suse.com/show_bug.cgi?id=1213114
  * https://bugzilla.suse.com/show_bug.cgi?id=1213747
  * https://bugzilla.suse.com/show_bug.cgi?id=1214954
  * https://bugzilla.suse.com/show_bug.cgi?id=1214992
  * https://bugzilla.suse.com/show_bug.cgi?id=1215148
  * https://bugzilla.suse.com/show_bug.cgi?id=1217366
  * https://bugzilla.suse.com/show_bug.cgi?id=1236104
  * https://bugzilla.suse.com/show_bug.cgi?id=1249479
  * https://bugzilla.suse.com/show_bug.cgi?id=1249608
  * https://bugzilla.suse.com/show_bug.cgi?id=1249857
  * https://bugzilla.suse.com/show_bug.cgi?id=1249859
  * https://bugzilla.suse.com/show_bug.cgi?id=1249988
  * https://bugzilla.suse.com/show_bug.cgi?id=1250742
  * https://bugzilla.suse.com/show_bug.cgi?id=1250816
  * https://bugzilla.suse.com/show_bug.cgi?id=1250946
  * https://bugzilla.suse.com/show_bug.cgi?id=1251027
  * https://bugzilla.suse.com/show_bug.cgi?id=1251032
  * https://bugzilla.suse.com/show_bug.cgi?id=1251034
  * https://bugzilla.suse.com/show_bug.cgi?id=1251035
  * https://bugzilla.suse.com/show_bug.cgi?id=1251040
  * https://bugzilla.suse.com/show_bug.cgi?id=1251043
  * https://bugzilla.suse.com/show_bug.cgi?id=1251045
  * https://bugzilla.suse.com/show_bug.cgi?id=1251047
  * https://bugzilla.suse.com/show_bug.cgi?id=1251052
  * https://bugzilla.suse.com/show_bug.cgi?id=1251057
  * https://bugzilla.suse.com/show_bug.cgi?id=1251059
  * https://bugzilla.suse.com/show_bug.cgi?id=1251061
  * https://bugzilla.suse.com/show_bug.cgi?id=1251063
  * https://bugzilla.suse.com/show_bug.cgi?id=1251064
  * https://bugzilla.suse.com/show_bug.cgi?id=1251065
  * https://bugzilla.suse.com/show_bug.cgi?id=1251066
  * https://bugzilla.suse.com/show_bug.cgi?id=1251068
  * https://bugzilla.suse.com/show_bug.cgi?id=1251072
  * https://bugzilla.suse.com/show_bug.cgi?id=1251080
  * https://bugzilla.suse.com/show_bug.cgi?id=1251082
  * https://bugzilla.suse.com/show_bug.cgi?id=1251086
  * https://bugzilla.suse.com/show_bug.cgi?id=1251087
  * https://bugzilla.suse.com/show_bug.cgi?id=1251088
  * https://bugzilla.suse.com/show_bug.cgi?id=1251091
  * https://bugzilla.suse.com/show_bug.cgi?id=1251092
  * https://bugzilla.suse.com/show_bug.cgi?id=1251093
  * https://bugzilla.suse.com/show_bug.cgi?id=1251097
  * https://bugzilla.suse.com/show_bug.cgi?id=1251099
  * https://bugzilla.suse.com/show_bug.cgi?id=1251101
  * https://bugzilla.suse.com/show_bug.cgi?id=1251104
  * https://bugzilla.suse.com/show_bug.cgi?id=1251110
  * https://bugzilla.suse.com/show_bug.cgi?id=1251113
  * https://bugzilla.suse.com/show_bug.cgi?id=1251115
  * https://bugzilla.suse.com/show_bug.cgi?id=1251123
  * https://bugzilla.suse.com/show_bug.cgi?id=1251128
  * https://bugzilla.suse.com/show_bug.cgi?id=1251129
  * https://bugzilla.suse.com/show_bug.cgi?id=1251133
  * https://bugzilla.suse.com/show_bug.cgi?id=1251136
  * https://bugzilla.suse.com/show_bug.cgi?id=1251147
  * https://bugzilla.suse.com/show_bug.cgi?id=1251149
  * https://bugzilla.suse.com/show_bug.cgi?id=1251154
  * https://bugzilla.suse.com/show_bug.cgi?id=1251159
  * https://bugzilla.suse.com/show_bug.cgi?id=1251164
  * https://bugzilla.suse.com/show_bug.cgi?id=1251166
  * https://bugzilla.suse.com/show_bug.cgi?id=1251169
  * https://bugzilla.suse.com/show_bug.cgi?id=1251170
  * https://bugzilla.suse.com/show_bug.cgi?id=1251173
  * https://bugzilla.suse.com/show_bug.cgi?id=1251178
  * https://bugzilla.suse.com/show_bug.cgi?id=1251180
  * https://bugzilla.suse.com/show_bug.cgi?id=1251182
  * https://bugzilla.suse.com/show_bug.cgi?id=1251197
  * https://bugzilla.suse.com/show_bug.cgi?id=1251200
  * https://bugzilla.suse.com/show_bug.cgi?id=1251201
  * https://bugzilla.suse.com/show_bug.cgi?id=1251202
  * https://bugzilla.suse.com/show_bug.cgi?id=1251208
  * https://bugzilla.suse.com/show_bug.cgi?id=1251210
  * https://bugzilla.suse.com/show_bug.cgi?id=1251215
  * https://bugzilla.suse.com/show_bug.cgi?id=1251218
  * https://bugzilla.suse.com/show_bug.cgi?id=1251222
  * https://bugzilla.suse.com/show_bug.cgi?id=1251223
  * https://bugzilla.suse.com/show_bug.cgi?id=1251230
  * https://bugzilla.suse.com/show_bug.cgi?id=1251247
  * https://bugzilla.suse.com/show_bug.cgi?id=1251268
  * https://bugzilla.suse.com/show_bug.cgi?id=1251281
  * https://bugzilla.suse.com/show_bug.cgi?id=1251282
  * https://bugzilla.suse.com/show_bug.cgi?id=1251283
  * https://bugzilla.suse.com/show_bug.cgi?id=1251285
  * https://bugzilla.suse.com/show_bug.cgi?id=1251286
  * https://bugzilla.suse.com/show_bug.cgi?id=1251292
  * https://bugzilla.suse.com/show_bug.cgi?id=1251294
  * https://bugzilla.suse.com/show_bug.cgi?id=1251295
  * https://bugzilla.suse.com/show_bug.cgi?id=1251296
  * https://bugzilla.suse.com/show_bug.cgi?id=1251298
  * https://bugzilla.suse.com/show_bug.cgi?id=1251299
  * https://bugzilla.suse.com/show_bug.cgi?id=1251300
  * https://bugzilla.suse.com/show_bug.cgi?id=1251302
  * https://bugzilla.suse.com/show_bug.cgi?id=1251303
  * https://bugzilla.suse.com/show_bug.cgi?id=1251306
  * https://bugzilla.suse.com/show_bug.cgi?id=1251310
  * https://bugzilla.suse.com/show_bug.cgi?id=1251312
  * https://bugzilla.suse.com/show_bug.cgi?id=1251322
  * https://bugzilla.suse.com/show_bug.cgi?id=1251324
  * https://bugzilla.suse.com/show_bug.cgi?id=1251325
  * https://bugzilla.suse.com/show_bug.cgi?id=1251326
  * https://bugzilla.suse.com/show_bug.cgi?id=1251327
  * https://bugzilla.suse.com/show_bug.cgi?id=1251329
  * https://bugzilla.suse.com/show_bug.cgi?id=1251330
  * https://bugzilla.suse.com/show_bug.cgi?id=1251331
  * https://bugzilla.suse.com/show_bug.cgi?id=1251519
  * https://bugzilla.suse.com/show_bug.cgi?id=1251521
  * https://bugzilla.suse.com/show_bug.cgi?id=1251522
  * https://bugzilla.suse.com/show_bug.cgi?id=1251527
  * https://bugzilla.suse.com/show_bug.cgi?id=1251529
  * https://bugzilla.suse.com/show_bug.cgi?id=1251550
  * https://bugzilla.suse.com/show_bug.cgi?id=1251723
  * https://bugzilla.suse.com/show_bug.cgi?id=1251725
  * https://bugzilla.suse.com/show_bug.cgi?id=1251728
  * https://bugzilla.suse.com/show_bug.cgi?id=1251730
  * https://bugzilla.suse.com/show_bug.cgi?id=1251736
  * https://bugzilla.suse.com/show_bug.cgi?id=1251737
  * https://bugzilla.suse.com/show_bug.cgi?id=1251741
  * https://bugzilla.suse.com/show_bug.cgi?id=1251743
  * https://bugzilla.suse.com/show_bug.cgi?id=1251750
  * https://bugzilla.suse.com/show_bug.cgi?id=1251753
  * https://bugzilla.suse.com/show_bug.cgi?id=1251759
  * https://bugzilla.suse.com/show_bug.cgi?id=1251761
  * https://bugzilla.suse.com/show_bug.cgi?id=1251762
  * https://bugzilla.suse.com/show_bug.cgi?id=1251763
  * https://bugzilla.suse.com/show_bug.cgi?id=1251764
  * https://bugzilla.suse.com/show_bug.cgi?id=1251767
  * https://bugzilla.suse.com/show_bug.cgi?id=1251769
  * https://bugzilla.suse.com/show_bug.cgi?id=1251772
  * https://bugzilla.suse.com/show_bug.cgi?id=1251775
  * https://bugzilla.suse.com/show_bug.cgi?id=1251777
  * https://bugzilla.suse.com/show_bug.cgi?id=1251785
  * https://bugzilla.suse.com/show_bug.cgi?id=1251823
  * https://bugzilla.suse.com/show_bug.cgi?id=1251930
  * https://bugzilla.suse.com/show_bug.cgi?id=1251967
  * https://bugzilla.suse.com/show_bug.cgi?id=1252033
  * https://bugzilla.suse.com/show_bug.cgi?id=1252035
  * https://bugzilla.suse.com/show_bug.cgi?id=1252047
  * https://bugzilla.suse.com/show_bug.cgi?id=1252069
  * https://bugzilla.suse.com/show_bug.cgi?id=1252265
  * https://bugzilla.suse.com/show_bug.cgi?id=1252474
  * https://bugzilla.suse.com/show_bug.cgi?id=1252475
  * https://bugzilla.suse.com/show_bug.cgi?id=1252476
  * https://bugzilla.suse.com/show_bug.cgi?id=1252480
  * https://bugzilla.suse.com/show_bug.cgi?id=1252484
  * https://bugzilla.suse.com/show_bug.cgi?id=1252486
  * https://bugzilla.suse.com/show_bug.cgi?id=1252489
  * https://bugzilla.suse.com/show_bug.cgi?id=1252490
  * https://bugzilla.suse.com/show_bug.cgi?id=1252492
  * https://bugzilla.suse.com/show_bug.cgi?id=1252495
  * https://bugzilla.suse.com/show_bug.cgi?id=1252497
  * https://bugzilla.suse.com/show_bug.cgi?id=1252499
  * https://bugzilla.suse.com/show_bug.cgi?id=1252501
  * https://bugzilla.suse.com/show_bug.cgi?id=1252508
  * https://bugzilla.suse.com/show_bug.cgi?id=1252509
  * https://bugzilla.suse.com/show_bug.cgi?id=1252513
  * https://bugzilla.suse.com/show_bug.cgi?id=1252515
  * https://bugzilla.suse.com/show_bug.cgi?id=1252516
  * https://bugzilla.suse.com/show_bug.cgi?id=1252519
  * https://bugzilla.suse.com/show_bug.cgi?id=1252521
  * https://bugzilla.suse.com/show_bug.cgi?id=1252522
  * https://bugzilla.suse.com/show_bug.cgi?id=1252523
  * https://bugzilla.suse.com/show_bug.cgi?id=1252526
  * https://bugzilla.suse.com/show_bug.cgi?id=1252528
  * https://bugzilla.suse.com/show_bug.cgi?id=1252529
  * https://bugzilla.suse.com/show_bug.cgi?id=1252532
  * https://bugzilla.suse.com/show_bug.cgi?id=1252535
  * https://bugzilla.suse.com/show_bug.cgi?id=1252536
  * https://bugzilla.suse.com/show_bug.cgi?id=1252537
  * https://bugzilla.suse.com/show_bug.cgi?id=1252538
  * https://bugzilla.suse.com/show_bug.cgi?id=1252539
  * https://bugzilla.suse.com/show_bug.cgi?id=1252542
  * https://bugzilla.suse.com/show_bug.cgi?id=1252545
  * https://bugzilla.suse.com/show_bug.cgi?id=1252549
  * https://bugzilla.suse.com/show_bug.cgi?id=1252554
  * https://bugzilla.suse.com/show_bug.cgi?id=1252560
  * https://bugzilla.suse.com/show_bug.cgi?id=1252564
  * https://bugzilla.suse.com/show_bug.cgi?id=1252565
  * https://bugzilla.suse.com/show_bug.cgi?id=1252568
  * https://bugzilla.suse.com/show_bug.cgi?id=1252634
  * https://bugzilla.suse.com/show_bug.cgi?id=1252688
  * https://bugzilla.suse.com/show_bug.cgi?id=1252785
  * https://bugzilla.suse.com/show_bug.cgi?id=1252893
  * https://bugzilla.suse.com/show_bug.cgi?id=1252904
  * https://bugzilla.suse.com/show_bug.cgi?id=1252919
  * https://jira.suse.com/browse/PED-4593
  * https://jira.suse.com/browse/PED-568

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.suse.com/pipermail/sle-security-updates/attachments/20251117/f3c35e1c/attachment-0001.htm>


More information about the sle-security-updates mailing list