SUSE-SU-2025:02308-1: important: Security update for the Linux Kernel

SLE-UPDATES null at suse.de
Mon Jul 14 16:35:31 UTC 2025



# Security update for the Linux Kernel

Announcement ID: SUSE-SU-2025:02308-1  
Release Date: 2025-07-14T15:56:04Z  
Rating: important  
References:

  * bsc#1065729
  * bsc#1156395
  * bsc#1199487
  * bsc#1201160
  * bsc#1201956
  * bsc#1202095
  * bsc#1202564
  * bsc#1202716
  * bsc#1202810
  * bsc#1202860
  * bsc#1205220
  * bsc#1205514
  * bsc#1206664
  * bsc#1206878
  * bsc#1206880
  * bsc#1211226
  * bsc#1212051
  * bsc#1218184
  * bsc#1224095
  * bsc#1225820
  * bsc#1226514
  * bsc#1228659
  * bsc#1230827
  * bsc#1231293
  * bsc#1232504
  * bsc#1234381
  * bsc#1234454
  * bsc#1235637
  * bsc#1237159
  * bsc#1237312
  * bsc#1237313
  * bsc#1238303
  * bsc#1238471
  * bsc#1238570
  * bsc#1239986
  * bsc#1240785
  * bsc#1241038
  * bsc#1242414
  * bsc#1242504
  * bsc#1242924
  * bsc#1243001
  * bsc#1243330
  * bsc#1243543
  * bsc#1243627
  * bsc#1243832
  * bsc#1244234
  * bsc#1244241
  * bsc#1244277
  * bsc#1244337
  * bsc#1244764
  * bsc#1244767
  * bsc#1244770
  * bsc#1244771
  * bsc#1244773
  * bsc#1244774
  * bsc#1244776
  * bsc#1244779
  * bsc#1244782
  * bsc#1244783
  * bsc#1244786
  * bsc#1244788
  * bsc#1244790
  * bsc#1244793
  * bsc#1244794
  * bsc#1244796
  * bsc#1244797
  * bsc#1244804
  * bsc#1244813
  * bsc#1244815
  * bsc#1244816
  * bsc#1244825
  * bsc#1244834
  * bsc#1244836
  * bsc#1244838
  * bsc#1244839
  * bsc#1244841
  * bsc#1244842
  * bsc#1244845
  * bsc#1244848
  * bsc#1244849
  * bsc#1244851
  * bsc#1244853
  * bsc#1244856
  * bsc#1244861
  * bsc#1244867
  * bsc#1244868
  * bsc#1244869
  * bsc#1244881
  * bsc#1244883
  * bsc#1244884
  * bsc#1244885
  * bsc#1244886
  * bsc#1244887
  * bsc#1244899
  * bsc#1244901
  * bsc#1244902
  * bsc#1244908
  * bsc#1244936
  * bsc#1244941
  * bsc#1244943
  * bsc#1244945
  * bsc#1244948
  * bsc#1244950
  * bsc#1244956
  * bsc#1244958
  * bsc#1244959
  * bsc#1244967
  * bsc#1244968
  * bsc#1244969
  * bsc#1244976
  * bsc#1244979
  * bsc#1244984
  * bsc#1244986
  * bsc#1244992
  * bsc#1245006
  * bsc#1245007
  * bsc#1245024
  * bsc#1245031
  * bsc#1245033
  * bsc#1245041
  * bsc#1245047
  * bsc#1245051
  * bsc#1245057
  * bsc#1245058
  * bsc#1245072
  * bsc#1245073
  * bsc#1245098
  * bsc#1245103
  * bsc#1245117
  * bsc#1245119
  * bsc#1245121
  * bsc#1245122
  * bsc#1245125
  * bsc#1245129
  * bsc#1245131
  * bsc#1245135
  * bsc#1245136
  * bsc#1245138
  * bsc#1245139
  * bsc#1245140
  * bsc#1245146
  * bsc#1245147
  * bsc#1245149
  * bsc#1245183
  * bsc#1245195
  * bsc#1245265
  * bsc#1245348
  * bsc#1245455
  * jsc#PED-10028
  * jsc#PED-12251

  
Cross-References:

  * CVE-2022-1679
  * CVE-2022-2586
  * CVE-2022-2905
  * CVE-2022-3903
  * CVE-2022-4095
  * CVE-2022-4662
  * CVE-2022-49934
  * CVE-2022-49936
  * CVE-2022-49937
  * CVE-2022-49942
  * CVE-2022-49945
  * CVE-2022-49948
  * CVE-2022-49950
  * CVE-2022-49952
  * CVE-2022-49954
  * CVE-2022-49956
  * CVE-2022-49968
  * CVE-2022-49977
  * CVE-2022-49978
  * CVE-2022-49981
  * CVE-2022-49984
  * CVE-2022-49985
  * CVE-2022-49986
  * CVE-2022-49987
  * CVE-2022-49989
  * CVE-2022-49990
  * CVE-2022-49993
  * CVE-2022-50010
  * CVE-2022-50012
  * CVE-2022-50019
  * CVE-2022-50020
  * CVE-2022-50022
  * CVE-2022-50027
  * CVE-2022-50028
  * CVE-2022-50029
  * CVE-2022-50030
  * CVE-2022-50032
  * CVE-2022-50033
  * CVE-2022-50036
  * CVE-2022-50038
  * CVE-2022-50045
  * CVE-2022-50051
  * CVE-2022-50059
  * CVE-2022-50061
  * CVE-2022-50065
  * CVE-2022-50067
  * CVE-2022-50072
  * CVE-2022-50083
  * CVE-2022-50084
  * CVE-2022-50085
  * CVE-2022-50087
  * CVE-2022-50091
  * CVE-2022-50092
  * CVE-2022-50093
  * CVE-2022-50094
  * CVE-2022-50097
  * CVE-2022-50098
  * CVE-2022-50099
  * CVE-2022-50101
  * CVE-2022-50102
  * CVE-2022-50104
  * CVE-2022-50108
  * CVE-2022-50109
  * CVE-2022-50118
  * CVE-2022-50124
  * CVE-2022-50126
  * CVE-2022-50127
  * CVE-2022-50136
  * CVE-2022-50138
  * CVE-2022-50140
  * CVE-2022-50141
  * CVE-2022-50142
  * CVE-2022-50143
  * CVE-2022-50146
  * CVE-2022-50149
  * CVE-2022-50152
  * CVE-2022-50153
  * CVE-2022-50156
  * CVE-2022-50158
  * CVE-2022-50160
  * CVE-2022-50161
  * CVE-2022-50162
  * CVE-2022-50164
  * CVE-2022-50165
  * CVE-2022-50169
  * CVE-2022-50172
  * CVE-2022-50173
  * CVE-2022-50176
  * CVE-2022-50179
  * CVE-2022-50181
  * CVE-2022-50185
  * CVE-2022-50191
  * CVE-2022-50200
  * CVE-2022-50209
  * CVE-2022-50211
  * CVE-2022-50212
  * CVE-2022-50213
  * CVE-2022-50215
  * CVE-2022-50218
  * CVE-2022-50220
  * CVE-2022-50222
  * CVE-2022-50229
  * CVE-2022-50231
  * CVE-2023-3111
  * CVE-2024-26924
  * CVE-2024-27397
  * CVE-2024-36978
  * CVE-2024-46800
  * CVE-2024-53141
  * CVE-2024-56770
  * CVE-2025-21700
  * CVE-2025-21702
  * CVE-2025-21703
  * CVE-2025-37752
  * CVE-2025-37798
  * CVE-2025-37823
  * CVE-2025-37890
  * CVE-2025-37932
  * CVE-2025-37953
  * CVE-2025-37997
  * CVE-2025-38000
  * CVE-2025-38001
  * CVE-2025-38083

  
CVSS scores:

  * CVE-2022-1679 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-1679 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-2586 ( SUSE ):  6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-2586 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-2586 ( NVD ):  5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
  * CVE-2022-2905 ( SUSE ):  6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
  * CVE-2022-2905 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
  * CVE-2022-3903 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-3903 ( NVD ):  4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-3903 ( NVD ):  4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-4095 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-4095 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-4095 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-4662 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-4662 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-4662 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49934 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-49934 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49936 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49937 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2022-49937 ( SUSE ):  4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
  * CVE-2022-49942 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-49942 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49945 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-49945 ( SUSE ):  6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2022-49948 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-49948 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49950 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49952 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49954 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49956 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49968 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49977 ( SUSE ):  6.7
    CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-49977 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49978 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-49978 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49981 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-49981 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49984 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49985 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49986 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49987 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49989 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49990 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49993 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-49993 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50010 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-50010 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50012 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-50012 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50019 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-50019 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50020 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-50020 ( SUSE ):  6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H
  * CVE-2022-50022 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-50022 ( SUSE ):  6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2022-50027 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-50027 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50028 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-50028 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
  * CVE-2022-50029 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-50029 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50030 ( SUSE ):  7.1
    CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-50030 ( SUSE ):  6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-50032 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-50032 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50033 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-50033 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50036 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50038 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50045 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50051 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50059 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50061 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50065 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50067 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50072 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50083 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50084 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-50084 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50085 ( SUSE ):  7.0
    CVSS:4.0/AV:P/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-50085 ( SUSE ):  6.6 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-50087 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-50087 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-50091 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50092 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50093 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50094 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50097 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50098 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50099 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50101 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50102 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50104 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50108 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50109 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50118 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50124 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50126 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50127 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50136 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50138 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50140 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50141 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50142 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50143 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50146 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50149 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50152 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50153 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50156 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50158 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50160 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50161 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50162 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50164 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50165 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50169 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50172 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50173 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50176 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50179 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50181 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50185 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50191 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50200 ( SUSE ):  8.5
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-50200 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-50209 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50211 ( SUSE ):  8.5
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-50211 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-50212 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50213 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50215 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-50215 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
  * CVE-2022-50218 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50220 ( SUSE ):  5.9
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-50220 ( SUSE ):  6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H
  * CVE-2022-50222 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
  * CVE-2022-50222 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
  * CVE-2022-50229 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50231 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-3111 ( SUSE ):  6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-3111 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-3111 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-26924 ( SUSE ):  6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-26924 ( NVD ):  5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-27397 ( SUSE ):  6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-36978 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-36978 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-46800 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-46800 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46800 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-53141 ( SUSE ):  8.5
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-53141 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-53141 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-56770 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-56770 ( SUSE ):  5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
  * CVE-2024-56770 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21700 ( SUSE ):  7.1
    CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-21700 ( SUSE ):  6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-21700 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-21702 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-21703 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-21703 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-37752 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-37798 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-37823 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-37823 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37890 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-37932 ( SUSE ):  0.0
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
  * CVE-2025-37932 ( SUSE ):  0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
  * CVE-2025-37953 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37997 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-37997 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-38000 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38000 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-38001 ( SUSE ):  8.5
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38001 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-38083 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

  
Affected Products:

  * SUSE Enterprise Storage 7.1
  * SUSE Linux Enterprise High Availability Extension 15 SP3
  * SUSE Linux Enterprise High Performance Computing 15 SP3
  * SUSE Linux Enterprise Live Patching 15-SP3
  * SUSE Linux Enterprise Micro 5.1
  * SUSE Linux Enterprise Micro 5.2
  * SUSE Linux Enterprise Micro for Rancher 5.2
  * SUSE Linux Enterprise Server 15 SP3
  * SUSE Linux Enterprise Server 15 SP3 Business Critical Linux
  * SUSE Linux Enterprise Server 15 SP3 LTSS
  * SUSE Linux Enterprise Server for SAP Applications 15 SP3
  * SUSE Manager Proxy 4.2
  * SUSE Manager Retail Branch Server 4.2
  * SUSE Manager Server 4.2

  
  
An update that solves 123 vulnerabilities, contains two features and has 25
security fixes can now be installed.

## Description:

This update provides the initial livepatch for this kernel update. This update
does not contain any fixes and will be updated with livepatches later.

## Special Instructions and Notes:

  * Please reboot the system after installing this update.

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".  
Alternatively you can run the command listed for your product:

  * SUSE Linux Enterprise High Availability Extension 15 SP3  
    zypper in -t patch SUSE-SLE-Product-HA-15-SP3-2025-2308=1

  * SUSE Linux Enterprise Server 15 SP3 LTSS  
    zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-2308=1

  * SUSE Linux Enterprise Server for SAP Applications 15 SP3  
    zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-2308=1

  * SUSE Enterprise Storage 7.1  
    zypper in -t patch SUSE-Storage-7.1-2025-2308=1

  * SUSE Linux Enterprise Micro 5.1  
    zypper in -t patch SUSE-SUSE-MicroOS-5.1-2025-2308=1

  * SUSE Linux Enterprise Micro 5.2  
    zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-2308=1

  * SUSE Linux Enterprise Micro for Rancher 5.2  
    zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-2308=1

  * SUSE Linux Enterprise Live Patching 15-SP3  
    zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP3-2025-2308=1

## Package List:

  * SUSE Linux Enterprise High Availability Extension 15 SP3 (aarch64 ppc64le
    s390x x86_64)
    * dlm-kmp-default-debuginfo-5.3.18-150300.59.211.1
    * kernel-default-debugsource-5.3.18-150300.59.211.1
    * ocfs2-kmp-default-5.3.18-150300.59.211.1
    * cluster-md-kmp-default-debuginfo-5.3.18-150300.59.211.1
    * cluster-md-kmp-default-5.3.18-150300.59.211.1
    * gfs2-kmp-default-debuginfo-5.3.18-150300.59.211.1
    * ocfs2-kmp-default-debuginfo-5.3.18-150300.59.211.1
    * gfs2-kmp-default-5.3.18-150300.59.211.1
    * kernel-default-debuginfo-5.3.18-150300.59.211.1
    * dlm-kmp-default-5.3.18-150300.59.211.1
  * SUSE Linux Enterprise High Availability Extension 15 SP3 (nosrc)
    * kernel-default-5.3.18-150300.59.211.1
  * SUSE Linux Enterprise Server 15 SP3 LTSS (nosrc ppc64le s390x x86_64)
    * kernel-default-5.3.18-150300.59.211.1
  * SUSE Linux Enterprise Server 15 SP3 LTSS (ppc64le s390x x86_64)
    * kernel-default-debugsource-5.3.18-150300.59.211.1
    * kernel-default-devel-5.3.18-150300.59.211.1
    * kernel-syms-5.3.18-150300.59.211.1
    * kernel-obs-build-5.3.18-150300.59.212.1
    * kernel-default-devel-debuginfo-5.3.18-150300.59.211.1
    * kernel-default-debuginfo-5.3.18-150300.59.211.1
    * reiserfs-kmp-default-debuginfo-5.3.18-150300.59.211.1
    * reiserfs-kmp-default-5.3.18-150300.59.211.1
    * kernel-obs-build-debugsource-5.3.18-150300.59.212.1
    * kernel-default-base-5.3.18-150300.59.211.1.150300.18.126.1
  * SUSE Linux Enterprise Server 15 SP3 LTSS (noarch)
    * kernel-source-5.3.18-150300.59.211.1
    * kernel-macros-5.3.18-150300.59.211.1
    * kernel-devel-5.3.18-150300.59.211.1
  * SUSE Linux Enterprise Server 15 SP3 LTSS (noarch nosrc)
    * kernel-docs-5.3.18-150300.59.211.1
  * SUSE Linux Enterprise Server 15 SP3 LTSS (nosrc s390x)
    * kernel-zfcpdump-5.3.18-150300.59.211.1
  * SUSE Linux Enterprise Server 15 SP3 LTSS (s390x)
    * kernel-zfcpdump-debugsource-5.3.18-150300.59.211.1
    * kernel-zfcpdump-debuginfo-5.3.18-150300.59.211.1
  * SUSE Linux Enterprise Server 15 SP3 LTSS (nosrc x86_64)
    * kernel-preempt-5.3.18-150300.59.211.1
  * SUSE Linux Enterprise Server 15 SP3 LTSS (x86_64)
    * kernel-preempt-devel-debuginfo-5.3.18-150300.59.211.1
    * kernel-preempt-debuginfo-5.3.18-150300.59.211.1
    * kernel-preempt-devel-5.3.18-150300.59.211.1
    * kernel-preempt-debugsource-5.3.18-150300.59.211.1
  * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (nosrc ppc64le
    x86_64)
    * kernel-default-5.3.18-150300.59.211.1
  * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
    * kernel-default-debugsource-5.3.18-150300.59.211.1
    * kernel-default-devel-5.3.18-150300.59.211.1
    * kernel-syms-5.3.18-150300.59.211.1
    * kernel-obs-build-5.3.18-150300.59.212.1
    * kernel-default-devel-debuginfo-5.3.18-150300.59.211.1
    * kernel-default-debuginfo-5.3.18-150300.59.211.1
    * reiserfs-kmp-default-debuginfo-5.3.18-150300.59.211.1
    * reiserfs-kmp-default-5.3.18-150300.59.211.1
    * kernel-obs-build-debugsource-5.3.18-150300.59.212.1
    * kernel-default-base-5.3.18-150300.59.211.1.150300.18.126.1
  * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch)
    * kernel-source-5.3.18-150300.59.211.1
    * kernel-macros-5.3.18-150300.59.211.1
    * kernel-devel-5.3.18-150300.59.211.1
  * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch nosrc)
    * kernel-docs-5.3.18-150300.59.211.1
  * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (nosrc x86_64)
    * kernel-preempt-5.3.18-150300.59.211.1
  * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (x86_64)
    * kernel-preempt-devel-debuginfo-5.3.18-150300.59.211.1
    * kernel-preempt-debuginfo-5.3.18-150300.59.211.1
    * kernel-preempt-devel-5.3.18-150300.59.211.1
    * kernel-preempt-debugsource-5.3.18-150300.59.211.1
  * SUSE Enterprise Storage 7.1 (aarch64 nosrc)
    * kernel-64kb-5.3.18-150300.59.211.1
    * kernel-default-5.3.18-150300.59.211.1
    * kernel-preempt-5.3.18-150300.59.211.1
  * SUSE Enterprise Storage 7.1 (aarch64)
    * kernel-default-debugsource-5.3.18-150300.59.211.1
    * kernel-64kb-devel-debuginfo-5.3.18-150300.59.211.1
    * kernel-default-devel-5.3.18-150300.59.211.1
    * kernel-syms-5.3.18-150300.59.211.1
    * kernel-obs-build-5.3.18-150300.59.212.1
    * kernel-default-devel-debuginfo-5.3.18-150300.59.211.1
    * kernel-preempt-debuginfo-5.3.18-150300.59.211.1
    * kernel-preempt-debugsource-5.3.18-150300.59.211.1
    * kernel-default-debuginfo-5.3.18-150300.59.211.1
    * kernel-64kb-debuginfo-5.3.18-150300.59.211.1
    * kernel-preempt-devel-debuginfo-5.3.18-150300.59.211.1
    * reiserfs-kmp-default-debuginfo-5.3.18-150300.59.211.1
    * kernel-64kb-debugsource-5.3.18-150300.59.211.1
    * kernel-64kb-devel-5.3.18-150300.59.211.1
    * kernel-default-base-5.3.18-150300.59.211.1.150300.18.126.1
    * kernel-obs-build-debugsource-5.3.18-150300.59.212.1
    * reiserfs-kmp-default-5.3.18-150300.59.211.1
    * kernel-preempt-devel-5.3.18-150300.59.211.1
  * SUSE Enterprise Storage 7.1 (noarch)
    * kernel-source-5.3.18-150300.59.211.1
    * kernel-macros-5.3.18-150300.59.211.1
    * kernel-devel-5.3.18-150300.59.211.1
  * SUSE Enterprise Storage 7.1 (noarch nosrc)
    * kernel-docs-5.3.18-150300.59.211.1
  * SUSE Linux Enterprise Micro 5.1 (aarch64 nosrc s390x x86_64)
    * kernel-default-5.3.18-150300.59.211.1
  * SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64)
    * kernel-default-debuginfo-5.3.18-150300.59.211.1
    * kernel-default-debugsource-5.3.18-150300.59.211.1
    * kernel-default-base-5.3.18-150300.59.211.1.150300.18.126.1
  * SUSE Linux Enterprise Micro 5.2 (aarch64 nosrc)
    * kernel-default-5.3.18-150300.59.211.1
  * SUSE Linux Enterprise Micro 5.2 (aarch64)
    * kernel-default-debuginfo-5.3.18-150300.59.211.1
    * kernel-default-debugsource-5.3.18-150300.59.211.1
    * kernel-default-base-5.3.18-150300.59.211.1.150300.18.126.1
  * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 nosrc)
    * kernel-default-5.3.18-150300.59.211.1
  * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64)
    * kernel-default-debuginfo-5.3.18-150300.59.211.1
    * kernel-default-debugsource-5.3.18-150300.59.211.1
    * kernel-default-base-5.3.18-150300.59.211.1.150300.18.126.1
  * SUSE Linux Enterprise Live Patching 15-SP3 (nosrc)
    * kernel-default-5.3.18-150300.59.211.1
  * SUSE Linux Enterprise Live Patching 15-SP3 (ppc64le s390x x86_64)
    * kernel-default-debugsource-5.3.18-150300.59.211.1
    * kernel-livepatch-5_3_18-150300_59_211-default-debuginfo-1-150300.7.3.1
    * kernel-default-livepatch-devel-5.3.18-150300.59.211.1
    * kernel-livepatch-SLE15-SP3_Update_59-debugsource-1-150300.7.3.1
    * kernel-livepatch-5_3_18-150300_59_211-default-1-150300.7.3.1
    * kernel-default-debuginfo-5.3.18-150300.59.211.1
    * kernel-default-livepatch-5.3.18-150300.59.211.1

## References:

  * https://www.suse.com/security/cve/CVE-2022-1679.html
  * https://www.suse.com/security/cve/CVE-2022-2586.html
  * https://www.suse.com/security/cve/CVE-2022-2905.html
  * https://www.suse.com/security/cve/CVE-2022-3903.html
  * https://www.suse.com/security/cve/CVE-2022-4095.html
  * https://www.suse.com/security/cve/CVE-2022-4662.html
  * https://www.suse.com/security/cve/CVE-2022-49934.html
  * https://www.suse.com/security/cve/CVE-2022-49936.html
  * https://www.suse.com/security/cve/CVE-2022-49937.html
  * https://www.suse.com/security/cve/CVE-2022-49942.html
  * https://www.suse.com/security/cve/CVE-2022-49945.html
  * https://www.suse.com/security/cve/CVE-2022-49948.html
  * https://www.suse.com/security/cve/CVE-2022-49950.html
  * https://www.suse.com/security/cve/CVE-2022-49952.html
  * https://www.suse.com/security/cve/CVE-2022-49954.html
  * https://www.suse.com/security/cve/CVE-2022-49956.html
  * https://www.suse.com/security/cve/CVE-2022-49968.html
  * https://www.suse.com/security/cve/CVE-2022-49977.html
  * https://www.suse.com/security/cve/CVE-2022-49978.html
  * https://www.suse.com/security/cve/CVE-2022-49981.html
  * https://www.suse.com/security/cve/CVE-2022-49984.html
  * https://www.suse.com/security/cve/CVE-2022-49985.html
  * https://www.suse.com/security/cve/CVE-2022-49986.html
  * https://www.suse.com/security/cve/CVE-2022-49987.html
  * https://www.suse.com/security/cve/CVE-2022-49989.html
  * https://www.suse.com/security/cve/CVE-2022-49990.html
  * https://www.suse.com/security/cve/CVE-2022-49993.html
  * https://www.suse.com/security/cve/CVE-2022-50010.html
  * https://www.suse.com/security/cve/CVE-2022-50012.html
  * https://www.suse.com/security/cve/CVE-2022-50019.html
  * https://www.suse.com/security/cve/CVE-2022-50020.html
  * https://www.suse.com/security/cve/CVE-2022-50022.html
  * https://www.suse.com/security/cve/CVE-2022-50027.html
  * https://www.suse.com/security/cve/CVE-2022-50028.html
  * https://www.suse.com/security/cve/CVE-2022-50029.html
  * https://www.suse.com/security/cve/CVE-2022-50030.html
  * https://www.suse.com/security/cve/CVE-2022-50032.html
  * https://www.suse.com/security/cve/CVE-2022-50033.html
  * https://www.suse.com/security/cve/CVE-2022-50036.html
  * https://www.suse.com/security/cve/CVE-2022-50038.html
  * https://www.suse.com/security/cve/CVE-2022-50045.html
  * https://www.suse.com/security/cve/CVE-2022-50051.html
  * https://www.suse.com/security/cve/CVE-2022-50059.html
  * https://www.suse.com/security/cve/CVE-2022-50061.html
  * https://www.suse.com/security/cve/CVE-2022-50065.html
  * https://www.suse.com/security/cve/CVE-2022-50067.html
  * https://www.suse.com/security/cve/CVE-2022-50072.html
  * https://www.suse.com/security/cve/CVE-2022-50083.html
  * https://www.suse.com/security/cve/CVE-2022-50084.html
  * https://www.suse.com/security/cve/CVE-2022-50085.html
  * https://www.suse.com/security/cve/CVE-2022-50087.html
  * https://www.suse.com/security/cve/CVE-2022-50091.html
  * https://www.suse.com/security/cve/CVE-2022-50092.html
  * https://www.suse.com/security/cve/CVE-2022-50093.html
  * https://www.suse.com/security/cve/CVE-2022-50094.html
  * https://www.suse.com/security/cve/CVE-2022-50097.html
  * https://www.suse.com/security/cve/CVE-2022-50098.html
  * https://www.suse.com/security/cve/CVE-2022-50099.html
  * https://www.suse.com/security/cve/CVE-2022-50101.html
  * https://www.suse.com/security/cve/CVE-2022-50102.html
  * https://www.suse.com/security/cve/CVE-2022-50104.html
  * https://www.suse.com/security/cve/CVE-2022-50108.html
  * https://www.suse.com/security/cve/CVE-2022-50109.html
  * https://www.suse.com/security/cve/CVE-2022-50118.html
  * https://www.suse.com/security/cve/CVE-2022-50124.html
  * https://www.suse.com/security/cve/CVE-2022-50126.html
  * https://www.suse.com/security/cve/CVE-2022-50127.html
  * https://www.suse.com/security/cve/CVE-2022-50136.html
  * https://www.suse.com/security/cve/CVE-2022-50138.html
  * https://www.suse.com/security/cve/CVE-2022-50140.html
  * https://www.suse.com/security/cve/CVE-2022-50141.html
  * https://www.suse.com/security/cve/CVE-2022-50142.html
  * https://www.suse.com/security/cve/CVE-2022-50143.html
  * https://www.suse.com/security/cve/CVE-2022-50146.html
  * https://www.suse.com/security/cve/CVE-2022-50149.html
  * https://www.suse.com/security/cve/CVE-2022-50152.html
  * https://www.suse.com/security/cve/CVE-2022-50153.html
  * https://www.suse.com/security/cve/CVE-2022-50156.html
  * https://www.suse.com/security/cve/CVE-2022-50158.html
  * https://www.suse.com/security/cve/CVE-2022-50160.html
  * https://www.suse.com/security/cve/CVE-2022-50161.html
  * https://www.suse.com/security/cve/CVE-2022-50162.html
  * https://www.suse.com/security/cve/CVE-2022-50164.html
  * https://www.suse.com/security/cve/CVE-2022-50165.html
  * https://www.suse.com/security/cve/CVE-2022-50169.html
  * https://www.suse.com/security/cve/CVE-2022-50172.html
  * https://www.suse.com/security/cve/CVE-2022-50173.html
  * https://www.suse.com/security/cve/CVE-2022-50176.html
  * https://www.suse.com/security/cve/CVE-2022-50179.html
  * https://www.suse.com/security/cve/CVE-2022-50181.html
  * https://www.suse.com/security/cve/CVE-2022-50185.html
  * https://www.suse.com/security/cve/CVE-2022-50191.html
  * https://www.suse.com/security/cve/CVE-2022-50200.html
  * https://www.suse.com/security/cve/CVE-2022-50209.html
  * https://www.suse.com/security/cve/CVE-2022-50211.html
  * https://www.suse.com/security/cve/CVE-2022-50212.html
  * https://www.suse.com/security/cve/CVE-2022-50213.html
  * https://www.suse.com/security/cve/CVE-2022-50215.html
  * https://www.suse.com/security/cve/CVE-2022-50218.html
  * https://www.suse.com/security/cve/CVE-2022-50220.html
  * https://www.suse.com/security/cve/CVE-2022-50222.html
  * https://www.suse.com/security/cve/CVE-2022-50229.html
  * https://www.suse.com/security/cve/CVE-2022-50231.html
  * https://www.suse.com/security/cve/CVE-2023-3111.html
  * https://www.suse.com/security/cve/CVE-2024-26924.html
  * https://www.suse.com/security/cve/CVE-2024-27397.html
  * https://www.suse.com/security/cve/CVE-2024-36978.html
  * https://www.suse.com/security/cve/CVE-2024-46800.html
  * https://www.suse.com/security/cve/CVE-2024-53141.html
  * https://www.suse.com/security/cve/CVE-2024-56770.html
  * https://www.suse.com/security/cve/CVE-2025-21700.html
  * https://www.suse.com/security/cve/CVE-2025-21702.html
  * https://www.suse.com/security/cve/CVE-2025-21703.html
  * https://www.suse.com/security/cve/CVE-2025-37752.html
  * https://www.suse.com/security/cve/CVE-2025-37798.html
  * https://www.suse.com/security/cve/CVE-2025-37823.html
  * https://www.suse.com/security/cve/CVE-2025-37890.html
  * https://www.suse.com/security/cve/CVE-2025-37932.html
  * https://www.suse.com/security/cve/CVE-2025-37953.html
  * https://www.suse.com/security/cve/CVE-2025-37997.html
  * https://www.suse.com/security/cve/CVE-2025-38000.html
  * https://www.suse.com/security/cve/CVE-2025-38001.html
  * https://www.suse.com/security/cve/CVE-2025-38083.html
  * https://bugzilla.suse.com/show_bug.cgi?id=1065729
  * https://bugzilla.suse.com/show_bug.cgi?id=1156395
  * https://bugzilla.suse.com/show_bug.cgi?id=1199487
  * https://bugzilla.suse.com/show_bug.cgi?id=1201160
  * https://bugzilla.suse.com/show_bug.cgi?id=1201956
  * https://bugzilla.suse.com/show_bug.cgi?id=1202095
  * https://bugzilla.suse.com/show_bug.cgi?id=1202564
  * https://bugzilla.suse.com/show_bug.cgi?id=1202716
  * https://bugzilla.suse.com/show_bug.cgi?id=1202810
  * https://bugzilla.suse.com/show_bug.cgi?id=1202860
  * https://bugzilla.suse.com/show_bug.cgi?id=1205220
  * https://bugzilla.suse.com/show_bug.cgi?id=1205514
  * https://bugzilla.suse.com/show_bug.cgi?id=1206664
  * https://bugzilla.suse.com/show_bug.cgi?id=1206878
  * https://bugzilla.suse.com/show_bug.cgi?id=1206880
  * https://bugzilla.suse.com/show_bug.cgi?id=1211226
  * https://bugzilla.suse.com/show_bug.cgi?id=1212051
  * https://bugzilla.suse.com/show_bug.cgi?id=1218184
  * https://bugzilla.suse.com/show_bug.cgi?id=1224095
  * https://bugzilla.suse.com/show_bug.cgi?id=1225820
  * https://bugzilla.suse.com/show_bug.cgi?id=1226514
  * https://bugzilla.suse.com/show_bug.cgi?id=1228659
  * https://bugzilla.suse.com/show_bug.cgi?id=1230827
  * https://bugzilla.suse.com/show_bug.cgi?id=1231293
  * https://bugzilla.suse.com/show_bug.cgi?id=1232504
  * https://bugzilla.suse.com/show_bug.cgi?id=1234381
  * https://bugzilla.suse.com/show_bug.cgi?id=1234454
  * https://bugzilla.suse.com/show_bug.cgi?id=1235637
  * https://bugzilla.suse.com/show_bug.cgi?id=1237159
  * https://bugzilla.suse.com/show_bug.cgi?id=1237312
  * https://bugzilla.suse.com/show_bug.cgi?id=1237313
  * https://bugzilla.suse.com/show_bug.cgi?id=1238303
  * https://bugzilla.suse.com/show_bug.cgi?id=1238471
  * https://bugzilla.suse.com/show_bug.cgi?id=1238570
  * https://bugzilla.suse.com/show_bug.cgi?id=1239986
  * https://bugzilla.suse.com/show_bug.cgi?id=1240785
  * https://bugzilla.suse.com/show_bug.cgi?id=1241038
  * https://bugzilla.suse.com/show_bug.cgi?id=1242414
  * https://bugzilla.suse.com/show_bug.cgi?id=1242504
  * https://bugzilla.suse.com/show_bug.cgi?id=1242924
  * https://bugzilla.suse.com/show_bug.cgi?id=1243001
  * https://bugzilla.suse.com/show_bug.cgi?id=1243330
  * https://bugzilla.suse.com/show_bug.cgi?id=1243543
  * https://bugzilla.suse.com/show_bug.cgi?id=1243627
  * https://bugzilla.suse.com/show_bug.cgi?id=1243832
  * https://bugzilla.suse.com/show_bug.cgi?id=1244234
  * https://bugzilla.suse.com/show_bug.cgi?id=1244241
  * https://bugzilla.suse.com/show_bug.cgi?id=1244277
  * https://bugzilla.suse.com/show_bug.cgi?id=1244337
  * https://bugzilla.suse.com/show_bug.cgi?id=1244764
  * https://bugzilla.suse.com/show_bug.cgi?id=1244767
  * https://bugzilla.suse.com/show_bug.cgi?id=1244770
  * https://bugzilla.suse.com/show_bug.cgi?id=1244771
  * https://bugzilla.suse.com/show_bug.cgi?id=1244773
  * https://bugzilla.suse.com/show_bug.cgi?id=1244774
  * https://bugzilla.suse.com/show_bug.cgi?id=1244776
  * https://bugzilla.suse.com/show_bug.cgi?id=1244779
  * https://bugzilla.suse.com/show_bug.cgi?id=1244782
  * https://bugzilla.suse.com/show_bug.cgi?id=1244783
  * https://bugzilla.suse.com/show_bug.cgi?id=1244786
  * https://bugzilla.suse.com/show_bug.cgi?id=1244788
  * https://bugzilla.suse.com/show_bug.cgi?id=1244790
  * https://bugzilla.suse.com/show_bug.cgi?id=1244793
  * https://bugzilla.suse.com/show_bug.cgi?id=1244794
  * https://bugzilla.suse.com/show_bug.cgi?id=1244796
  * https://bugzilla.suse.com/show_bug.cgi?id=1244797
  * https://bugzilla.suse.com/show_bug.cgi?id=1244804
  * https://bugzilla.suse.com/show_bug.cgi?id=1244813
  * https://bugzilla.suse.com/show_bug.cgi?id=1244815
  * https://bugzilla.suse.com/show_bug.cgi?id=1244816
  * https://bugzilla.suse.com/show_bug.cgi?id=1244825
  * https://bugzilla.suse.com/show_bug.cgi?id=1244834
  * https://bugzilla.suse.com/show_bug.cgi?id=1244836
  * https://bugzilla.suse.com/show_bug.cgi?id=1244838
  * https://bugzilla.suse.com/show_bug.cgi?id=1244839
  * https://bugzilla.suse.com/show_bug.cgi?id=1244841
  * https://bugzilla.suse.com/show_bug.cgi?id=1244842
  * https://bugzilla.suse.com/show_bug.cgi?id=1244845
  * https://bugzilla.suse.com/show_bug.cgi?id=1244848
  * https://bugzilla.suse.com/show_bug.cgi?id=1244849
  * https://bugzilla.suse.com/show_bug.cgi?id=1244851
  * https://bugzilla.suse.com/show_bug.cgi?id=1244853
  * https://bugzilla.suse.com/show_bug.cgi?id=1244856
  * https://bugzilla.suse.com/show_bug.cgi?id=1244861
  * https://bugzilla.suse.com/show_bug.cgi?id=1244867
  * https://bugzilla.suse.com/show_bug.cgi?id=1244868
  * https://bugzilla.suse.com/show_bug.cgi?id=1244869
  * https://bugzilla.suse.com/show_bug.cgi?id=1244881
  * https://bugzilla.suse.com/show_bug.cgi?id=1244883
  * https://bugzilla.suse.com/show_bug.cgi?id=1244884
  * https://bugzilla.suse.com/show_bug.cgi?id=1244885
  * https://bugzilla.suse.com/show_bug.cgi?id=1244886
  * https://bugzilla.suse.com/show_bug.cgi?id=1244887
  * https://bugzilla.suse.com/show_bug.cgi?id=1244899
  * https://bugzilla.suse.com/show_bug.cgi?id=1244901
  * https://bugzilla.suse.com/show_bug.cgi?id=1244902
  * https://bugzilla.suse.com/show_bug.cgi?id=1244908
  * https://bugzilla.suse.com/show_bug.cgi?id=1244936
  * https://bugzilla.suse.com/show_bug.cgi?id=1244941
  * https://bugzilla.suse.com/show_bug.cgi?id=1244943
  * https://bugzilla.suse.com/show_bug.cgi?id=1244945
  * https://bugzilla.suse.com/show_bug.cgi?id=1244948
  * https://bugzilla.suse.com/show_bug.cgi?id=1244950
  * https://bugzilla.suse.com/show_bug.cgi?id=1244956
  * https://bugzilla.suse.com/show_bug.cgi?id=1244958
  * https://bugzilla.suse.com/show_bug.cgi?id=1244959
  * https://bugzilla.suse.com/show_bug.cgi?id=1244967
  * https://bugzilla.suse.com/show_bug.cgi?id=1244968
  * https://bugzilla.suse.com/show_bug.cgi?id=1244969
  * https://bugzilla.suse.com/show_bug.cgi?id=1244976
  * https://bugzilla.suse.com/show_bug.cgi?id=1244979
  * https://bugzilla.suse.com/show_bug.cgi?id=1244984
  * https://bugzilla.suse.com/show_bug.cgi?id=1244986
  * https://bugzilla.suse.com/show_bug.cgi?id=1244992
  * https://bugzilla.suse.com/show_bug.cgi?id=1245006
  * https://bugzilla.suse.com/show_bug.cgi?id=1245007
  * https://bugzilla.suse.com/show_bug.cgi?id=1245024
  * https://bugzilla.suse.com/show_bug.cgi?id=1245031
  * https://bugzilla.suse.com/show_bug.cgi?id=1245033
  * https://bugzilla.suse.com/show_bug.cgi?id=1245041
  * https://bugzilla.suse.com/show_bug.cgi?id=1245047
  * https://bugzilla.suse.com/show_bug.cgi?id=1245051
  * https://bugzilla.suse.com/show_bug.cgi?id=1245057
  * https://bugzilla.suse.com/show_bug.cgi?id=1245058
  * https://bugzilla.suse.com/show_bug.cgi?id=1245072
  * https://bugzilla.suse.com/show_bug.cgi?id=1245073
  * https://bugzilla.suse.com/show_bug.cgi?id=1245098
  * https://bugzilla.suse.com/show_bug.cgi?id=1245103
  * https://bugzilla.suse.com/show_bug.cgi?id=1245117
  * https://bugzilla.suse.com/show_bug.cgi?id=1245119
  * https://bugzilla.suse.com/show_bug.cgi?id=1245121
  * https://bugzilla.suse.com/show_bug.cgi?id=1245122
  * https://bugzilla.suse.com/show_bug.cgi?id=1245125
  * https://bugzilla.suse.com/show_bug.cgi?id=1245129
  * https://bugzilla.suse.com/show_bug.cgi?id=1245131
  * https://bugzilla.suse.com/show_bug.cgi?id=1245135
  * https://bugzilla.suse.com/show_bug.cgi?id=1245136
  * https://bugzilla.suse.com/show_bug.cgi?id=1245138
  * https://bugzilla.suse.com/show_bug.cgi?id=1245139
  * https://bugzilla.suse.com/show_bug.cgi?id=1245140
  * https://bugzilla.suse.com/show_bug.cgi?id=1245146
  * https://bugzilla.suse.com/show_bug.cgi?id=1245147
  * https://bugzilla.suse.com/show_bug.cgi?id=1245149
  * https://bugzilla.suse.com/show_bug.cgi?id=1245183
  * https://bugzilla.suse.com/show_bug.cgi?id=1245195
  * https://bugzilla.suse.com/show_bug.cgi?id=1245265
  * https://bugzilla.suse.com/show_bug.cgi?id=1245348
  * https://bugzilla.suse.com/show_bug.cgi?id=1245455
  * https://jira.suse.com/browse/PED-10028
  * https://jira.suse.com/browse/PED-12251

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.suse.com/pipermail/sle-updates/attachments/20250714/9ae34678/attachment.htm>


More information about the sle-updates mailing list