Security update for the Linux Kernel
Announcement ID: | SUSE-SU-2025:0034-1 |
---|---|
Release Date: | 2025-01-08T09:47:32Z |
Rating: | important |
References: |
|
Cross-References: |
|
CVSS scores: |
|
Affected Products: |
|
An update that solves 120 vulnerabilities and has 13 security fixes can now be installed.
Description:
The SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security bugfixes.
The Linux Enterprise 12 SP5 kernel turned LTSS (Extended Security)
The following security bugs were fixed:
- CVE-2021-46936: Fixed use-after-free in tw_timer_handler() (bsc#1220439).
- CVE-2021-47163: kABI fix for tipc: wait and exit until all work queues are done (bsc#1221980).
- CVE-2021-47612: nfc: fix segfault in nfc_genl_dump_devices_done (bsc#1226585).
- CVE-2022-48809: net: fix a memleak when uncloning an skb dst and its metadata (bsc#1227947).
- CVE-2022-48951: ASoC: ops: Correct bounds check for second channel on SX controls (bsc#1231929).
- CVE-2022-48956: ipv6: avoid use-after-free in ip6_fragment() (bsc#1231893).
- CVE-2022-48958: ethernet: aeroflex: fix potential skb leak in greth_init_rings() (bsc#1231889).
- CVE-2022-48960: net: hisilicon: Fix potential use-after-free in hix5hd2_rx() (bsc#1231979).
- CVE-2022-48962: net: hisilicon: Fix potential use-after-free in hisi_femac_rx() (bsc#1232286).
- CVE-2022-48966: net: mvneta: Fix an out of bounds check (bsc#1232191).
- CVE-2022-48967: NFC: nci: Bounds check struct nfc_target arrays (bsc#1232304).
- CVE-2022-48971: Bluetooth: Fix not cleanup led when bt_init fails (bsc#1232037).
- CVE-2022-48972: mac802154: fix missing INIT_LIST_HEAD in ieee802154_if_add() (bsc#1232025).
- CVE-2022-48973: gpio: amd8111: Fix PCI device reference count leak (bsc#1232039).
- CVE-2022-48978: HID: core: fix shift-out-of-bounds in hid_report_raw_event (bsc#1232038).
- CVE-2022-48991: mm/khugepaged: invoke MMU notifiers in shmem/file collapse paths (bsc#1232070).
- CVE-2022-48992: ASoC: soc-pcm: Add NULL check in BE reparenting (bsc#1232071).
- CVE-2022-49000: iommu/vt-d: Fix PCI device refcount leak in has_external_pci() (bsc#1232123).
- CVE-2022-49002: iommu/vt-d: Fix PCI device refcount leak in dmar_dev_scope_init() (bsc#1232133).
- CVE-2022-49010: hwmon: (coretemp) Check for null before removing sysfs attrs (bsc#1232172).
- CVE-2022-49011: hwmon: (coretemp) fix pci device refcount leak in nv1a_ram_new() (bsc#1232006).
- CVE-2022-49014: net: tun: Fix use-after-free in tun_detach() (bsc#1231890).
- CVE-2022-49015: net: hsr: Fix potential use-after-free (bsc#1231938).
- CVE-2022-49020: net/9p: Fix a potential socket leak in p9_socket_open (bsc#1232175).
- CVE-2022-49021: net: phy: fix null-ptr-deref while probe() failed (bsc#1231939).
- CVE-2022-49026: e100: Fix possible use after free in e100_xmit_prepare (bsc#1231997).
- CVE-2022-49027: iavf: Fix error handling in iavf_init_module() (bsc#1232007).
- CVE-2022-49028: ixgbevf: Fix resource leak in ixgbevf_init_module() (bsc#1231996).
- CVE-2022-49029: hwmon: (ibmpex) Fix possible UAF when ibmpex_register_bmc() fails (bsc#1231995).
- CVE-2023-52898: xhci: Fix null pointer dereference when host dies (bsc#1229568).
- CVE-2023-52918: media: pci: cx23885: check cx23885_vdev_init() return (bsc#1232047).
- CVE-2024-26804: net: ip_tunnel: prevent perpetual headroom growth (bsc#1222629).
- CVE-2024-38538: net: bridge: xmit: make sure we have at least eth header len bytes (bsc#1226606).
- CVE-2024-39476: md/raid5: fix deadlock that raid5d() wait for itself to clear MD_SB_CHANGE_PENDING (bsc#1227437).
- CVE-2024-40965: i2c: lpi2c: Avoid calling clk_get_rate during transfer (bsc#1227885).
- CVE-2024-41082: nvme-fabrics: use reserved tag for reg read/write command (bsc#1228620).
- CVE-2024-42114: netlink: extend policy range validation (bsc#1228564 prerequisite).
- CVE-2024-42253: gpio: pca953x: fix pca953x_irq_bus_sync_unlock race (bsc#1229005 stable-fixes).
- CVE-2024-44931: gpio: prevent potential speculation leaks in gpio_device_get_desc() (bsc#1229837 stable-fixes).
- CVE-2024-44958: sched/smt: Fix unbalance sched_smt_present dec/inc (bsc#1230179).
- CVE-2024-46724: drm/amdgpu: Fix out-of-bounds read of df_v1_7_channel_number (bsc#1230725).
- CVE-2024-46755: wifi: mwifiex: Do not return unused priv in mwifiex_get_priv_by_id() (bsc#1230802).
- CVE-2024-46802: drm/amd/display: added NULL check at start of dc_validate_stream (bsc#1231111).
- CVE-2024-46809: drm/amd/display: Check BIOS images before it is used (bsc#1231148).
- CVE-2024-46813: drm/amd/display: Check link_index before accessing dc->links (bsc#1231191).
- CVE-2024-46816: drm/amd/display: Stop amdgpu_dm initialize when link nums greater than max_links (bsc#1231197).
- CVE-2024-46818: drm/amd/display: Check gpio_id before used as array index (bsc#1231203).
- CVE-2024-46826: ELF: fix kernel.randomize_va_space double read (bsc#1231115).
- CVE-2024-46834: ethtool: fail closed if we can't get max channel used in indirection tables (bsc#1231096).
- CVE-2024-46840: btrfs: clean up our handling of refs == 0 in snapshot delete (bsc#1231105).
- CVE-2024-46841: btrfs: do not BUG_ON on ENOMEM from btrfs_lookup_extent_info() in walk_down_proc() (bsc#1231094).
- CVE-2024-46848: perf/x86/intel: Limit the period on Haswell (bsc#1231072).
- CVE-2024-47672: wifi: iwlwifi: mvm: do not wait for tx queues if firmware is dead (bsc#1231540).
- CVE-2024-47673: wifi: iwlwifi: mvm: pause TCM when the firmware is stopped (bsc#1231539).
- CVE-2024-47674: mm: avoid leaving partial pfn mappings around in error case (bsc#1231673).
- CVE-2024-47684: tcp: check skb is non-NULL in tcp_rto_delta_us() (bsc#1231987).
- CVE-2024-47685: netfilter: nf_reject_ipv6: fix nf_reject_ip6_tcphdr_put() (bsc#1231998).
- CVE-2024-47697: drivers: media: dvb-frontends/rtl2830: fix an out-of-bounds write error (bsc#1231858).
- CVE-2024-47698: drivers: media: dvb-frontends/rtl2832: fix an out-of-bounds write error (bsc#1231859).
- CVE-2024-47706: block, bfq: fix possible UAF for bfqq->bic with merge chain (bsc#1231942).
- CVE-2024-47707: ipv6: avoid possible NULL deref in rt6_uncached_list_flush_dev() (bsc#1231935).
- CVE-2024-47713: wifi: mac80211: use two-phase skb reclamation in ieee80211_do_stop() (bsc#1232016).
- CVE-2024-47735: RDMA/hns: Fix spin_unlock_irqrestore() called with IRQs enabled (bsc#1232111).
- CVE-2024-47737: nfsd: call cache_put if xdr_reserve_space returns NULL (bsc#1232056).
- CVE-2024-47742: firmware_loader: Block path traversal (bsc#1232126).
- CVE-2024-47745: mm: split critical region in remap_file_pages() and invoke LSMs in between (bsc#1232135).
- CVE-2024-49851: tpm: Clean up TPM space after command failure (bsc#1232134).
- CVE-2024-49860: ACPI: sysfs: validate return type of _STR method (bsc#1231861).
- CVE-2024-49881: ext4: update orig_path in ext4_find_extent() (bsc#1232201).
- CVE-2024-49882: ext4: fix double brelse() the buffer of the extents path (bsc#1232200).
- CVE-2024-49883: ext4: aovid use-after-free in ext4_ext_insert_extent() (bsc#1232199).
- CVE-2024-49890: drm/amd/pm: ensure the fw_info is not null before using it (bsc#1232217).
- CVE-2024-49891: scsi: lpfc: Validate hdwq pointers before dereferencing in reset/errata paths (bsc#1232218).
- CVE-2024-49894: drm/amd/display: Fix index out of bounds in degamma hardware format translation (bsc#1232354).
- CVE-2024-49896: drm/amd/display: Check stream before comparing them (bsc#1232221).
- CVE-2024-49901: drm/msm/adreno: Assign msm_gpu->pdev earlier to avoid nullptrs (bsc#1232305).
- CVE-2024-49920: drm/amd/display: Check null pointers before multiple uses (bsc#1232313).
- CVE-2024-49929: wifi: iwlwifi: mvm: avoid NULL pointer dereference (bsc#1232253).
- CVE-2024-49936: net/xen-netback: prevent UAF in xenvif_flush_hash() (bsc#1232424).
- CVE-2024-49949: net: avoid potential underflow in qdisc_pkt_len_init() with UFO (bsc#1232160).
- CVE-2024-49958: ocfs2: reserve space for inline xattr before attaching reflink tree (bsc#1232151).
- CVE-2024-49959: jbd2: stop waiting for space when jbd2_cleanup_journal_tail() returns error (bsc#1232149).
- CVE-2024-49962: ACPICA: check null return of ACPI_ALLOCATE_ZEROED() in acpi_db_convert_to_package() (bsc#1232314).
- CVE-2024-49966: ocfs2: cancel dqi_sync_work before freeing oinfo (bsc#1232141).
- CVE-2024-49967: ext4: no need to continue when the number of entries is 1 (bsc#1232140).
- CVE-2024-49991: drm/amdkfd: amdkfd_free_gtt_mem clear the correct pointer (bsc#1232282).
- CVE-2024-49995: tipc: guard against string buffer overrun (bsc#1232432).
- CVE-2024-49996: cifs: Fix buffer overflow when parsing NFS reparse points (bsc#1232089).
- CVE-2024-50006: ext4: fix i_data_sem unlock order in ext4_ind_migrate() (bsc#1232442).
- CVE-2024-50007: ALSA: asihpi: Fix potential OOB array access (bsc#1232394).
- CVE-2024-50024: net: Fix an unsafe loop on the list (bsc#1231954).
- CVE-2024-50033: slip: make slhc_remember() more robust against malicious packets (bsc#1231914).
- CVE-2024-50035: ppp: fix ppp_async_encode() illegal access (bsc#1232392).
- CVE-2024-50045: netfilter: br_netfilter: fix panic with metadata_dst skb (bsc#1231903).
- CVE-2024-50047: smb: client: fix UAF in async decryption (bsc#1232418).
- CVE-2024-50058: serial: protect uart_port_dtr_rts() in uart_shutdown() too (bsc#1232285).
The following non-security bugs were fixed:
- arm64: esr: Define ESR_ELx_EC_* constants as UL (git-fixes)
- arm64: probes: Fix simulate_ldr*_literal() (git-fixes)
- arm64: probes: Fix uprobes for big-endian kernels (git-fixes)
- arm64: probes: Remove broken LDR (literal) uprobe support (git-fixes)
- bpf: Fix pointer-leak due to insufficient speculative store bypass mitigation (bsc#1231375).
- drbd: Add NULL check for net_conf to prevent dereference in state validation (git-fixes).
- drbd: Fix atomicity violation in drbd_uuid_set_bm() (git-fixes).
- ext4: fix slab-use-after-free in ext4_split_extent_at() (bsc#1232201)
- kernel-binary: generate and install compile_commands.json (bsc#1228971)
- net: usb: usbnet: fix name regression (get-fixes).
- nfs: fix memory leak in error path of nfs4_do_reclaim (git-fixes).
- nfsd: fix delegation_blocked() to block correctly for at least 30 seconds (git-fixes).
- x86/kaslr: Expose and use the end of the physical memory address space (bsc#1230405).
Special Instructions and Notes:
- Please reboot the system after installing this update.
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Linux Enterprise Server 12 SP5 LTSS
zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-2025-34=1
-
SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security
zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-34=1
Package List:
-
SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le s390x x86_64)
- gfs2-kmp-default-debuginfo-4.12.14-122.234.1
- kernel-default-base-4.12.14-122.234.1
- kernel-default-debugsource-4.12.14-122.234.1
- dlm-kmp-default-4.12.14-122.234.1
- ocfs2-kmp-default-debuginfo-4.12.14-122.234.1
- cluster-md-kmp-default-debuginfo-4.12.14-122.234.1
- kernel-default-debuginfo-4.12.14-122.234.1
- kernel-default-devel-4.12.14-122.234.1
- cluster-md-kmp-default-4.12.14-122.234.1
- kernel-default-base-debuginfo-4.12.14-122.234.1
- kernel-syms-4.12.14-122.234.1
- ocfs2-kmp-default-4.12.14-122.234.1
- dlm-kmp-default-debuginfo-4.12.14-122.234.1
- gfs2-kmp-default-4.12.14-122.234.1
-
SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le s390x x86_64 nosrc)
- kernel-default-4.12.14-122.234.1
-
SUSE Linux Enterprise Server 12 SP5 LTSS (noarch)
- kernel-devel-4.12.14-122.234.1
- kernel-macros-4.12.14-122.234.1
- kernel-source-4.12.14-122.234.1
-
SUSE Linux Enterprise Server 12 SP5 LTSS (s390x)
- kernel-default-man-4.12.14-122.234.1
-
SUSE Linux Enterprise Server 12 SP5 LTSS (x86_64)
- kernel-default-devel-debuginfo-4.12.14-122.234.1
-
SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64)
- gfs2-kmp-default-debuginfo-4.12.14-122.234.1
- kernel-default-base-4.12.14-122.234.1
- kernel-default-debugsource-4.12.14-122.234.1
- dlm-kmp-default-4.12.14-122.234.1
- ocfs2-kmp-default-debuginfo-4.12.14-122.234.1
- cluster-md-kmp-default-debuginfo-4.12.14-122.234.1
- kernel-default-debuginfo-4.12.14-122.234.1
- kernel-default-devel-4.12.14-122.234.1
- cluster-md-kmp-default-4.12.14-122.234.1
- kernel-default-base-debuginfo-4.12.14-122.234.1
- kernel-syms-4.12.14-122.234.1
- ocfs2-kmp-default-4.12.14-122.234.1
- kernel-default-devel-debuginfo-4.12.14-122.234.1
- dlm-kmp-default-debuginfo-4.12.14-122.234.1
- gfs2-kmp-default-4.12.14-122.234.1
-
SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (nosrc x86_64)
- kernel-default-4.12.14-122.234.1
-
SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (noarch)
- kernel-devel-4.12.14-122.234.1
- kernel-macros-4.12.14-122.234.1
- kernel-source-4.12.14-122.234.1
References:
- https://www.suse.com/security/cve/CVE-2021-46936.html
- https://www.suse.com/security/cve/CVE-2021-47163.html
- https://www.suse.com/security/cve/CVE-2021-47416.html
- https://www.suse.com/security/cve/CVE-2021-47612.html
- https://www.suse.com/security/cve/CVE-2022-48788.html
- https://www.suse.com/security/cve/CVE-2022-48789.html
- https://www.suse.com/security/cve/CVE-2022-48790.html
- https://www.suse.com/security/cve/CVE-2022-48809.html
- https://www.suse.com/security/cve/CVE-2022-48946.html
- https://www.suse.com/security/cve/CVE-2022-48949.html
- https://www.suse.com/security/cve/CVE-2022-48951.html
- https://www.suse.com/security/cve/CVE-2022-48956.html
- https://www.suse.com/security/cve/CVE-2022-48958.html
- https://www.suse.com/security/cve/CVE-2022-48960.html
- https://www.suse.com/security/cve/CVE-2022-48962.html
- https://www.suse.com/security/cve/CVE-2022-48966.html
- https://www.suse.com/security/cve/CVE-2022-48967.html
- https://www.suse.com/security/cve/CVE-2022-48969.html
- https://www.suse.com/security/cve/CVE-2022-48971.html
- https://www.suse.com/security/cve/CVE-2022-48972.html
- https://www.suse.com/security/cve/CVE-2022-48973.html
- https://www.suse.com/security/cve/CVE-2022-48978.html
- https://www.suse.com/security/cve/CVE-2022-48985.html
- https://www.suse.com/security/cve/CVE-2022-48988.html
- https://www.suse.com/security/cve/CVE-2022-48991.html
- https://www.suse.com/security/cve/CVE-2022-48992.html
- https://www.suse.com/security/cve/CVE-2022-48997.html
- https://www.suse.com/security/cve/CVE-2022-49000.html
- https://www.suse.com/security/cve/CVE-2022-49002.html
- https://www.suse.com/security/cve/CVE-2022-49010.html
- https://www.suse.com/security/cve/CVE-2022-49011.html
- https://www.suse.com/security/cve/CVE-2022-49014.html
- https://www.suse.com/security/cve/CVE-2022-49015.html
- https://www.suse.com/security/cve/CVE-2022-49020.html
- https://www.suse.com/security/cve/CVE-2022-49021.html
- https://www.suse.com/security/cve/CVE-2022-49026.html
- https://www.suse.com/security/cve/CVE-2022-49027.html
- https://www.suse.com/security/cve/CVE-2022-49028.html
- https://www.suse.com/security/cve/CVE-2022-49029.html
- https://www.suse.com/security/cve/CVE-2023-46343.html
- https://www.suse.com/security/cve/CVE-2023-52881.html
- https://www.suse.com/security/cve/CVE-2023-52898.html
- https://www.suse.com/security/cve/CVE-2023-52918.html
- https://www.suse.com/security/cve/CVE-2023-52919.html
- https://www.suse.com/security/cve/CVE-2023-6270.html
- https://www.suse.com/security/cve/CVE-2024-26804.html
- https://www.suse.com/security/cve/CVE-2024-27043.html
- https://www.suse.com/security/cve/CVE-2024-38538.html
- https://www.suse.com/security/cve/CVE-2024-39476.html
- https://www.suse.com/security/cve/CVE-2024-40965.html
- https://www.suse.com/security/cve/CVE-2024-41016.html
- https://www.suse.com/security/cve/CVE-2024-41082.html
- https://www.suse.com/security/cve/CVE-2024-42114.html
- https://www.suse.com/security/cve/CVE-2024-42145.html
- https://www.suse.com/security/cve/CVE-2024-42253.html
- https://www.suse.com/security/cve/CVE-2024-44931.html
- https://www.suse.com/security/cve/CVE-2024-44958.html
- https://www.suse.com/security/cve/CVE-2024-46724.html
- https://www.suse.com/security/cve/CVE-2024-46755.html
- https://www.suse.com/security/cve/CVE-2024-46802.html
- https://www.suse.com/security/cve/CVE-2024-46809.html
- https://www.suse.com/security/cve/CVE-2024-46813.html
- https://www.suse.com/security/cve/CVE-2024-46816.html
- https://www.suse.com/security/cve/CVE-2024-46818.html
- https://www.suse.com/security/cve/CVE-2024-46826.html
- https://www.suse.com/security/cve/CVE-2024-46834.html
- https://www.suse.com/security/cve/CVE-2024-46840.html
- https://www.suse.com/security/cve/CVE-2024-46841.html
- https://www.suse.com/security/cve/CVE-2024-46848.html
- https://www.suse.com/security/cve/CVE-2024-47670.html
- https://www.suse.com/security/cve/CVE-2024-47672.html
- https://www.suse.com/security/cve/CVE-2024-47673.html
- https://www.suse.com/security/cve/CVE-2024-47674.html
- https://www.suse.com/security/cve/CVE-2024-47684.html
- https://www.suse.com/security/cve/CVE-2024-47685.html
- https://www.suse.com/security/cve/CVE-2024-47696.html
- https://www.suse.com/security/cve/CVE-2024-47697.html
- https://www.suse.com/security/cve/CVE-2024-47698.html
- https://www.suse.com/security/cve/CVE-2024-47706.html
- https://www.suse.com/security/cve/CVE-2024-47707.html
- https://www.suse.com/security/cve/CVE-2024-47713.html
- https://www.suse.com/security/cve/CVE-2024-47735.html
- https://www.suse.com/security/cve/CVE-2024-47737.html
- https://www.suse.com/security/cve/CVE-2024-47742.html
- https://www.suse.com/security/cve/CVE-2024-47745.html
- https://www.suse.com/security/cve/CVE-2024-47749.html
- https://www.suse.com/security/cve/CVE-2024-49851.html
- https://www.suse.com/security/cve/CVE-2024-49860.html
- https://www.suse.com/security/cve/CVE-2024-49877.html
- https://www.suse.com/security/cve/CVE-2024-49881.html
- https://www.suse.com/security/cve/CVE-2024-49882.html
- https://www.suse.com/security/cve/CVE-2024-49883.html
- https://www.suse.com/security/cve/CVE-2024-49890.html
- https://www.suse.com/security/cve/CVE-2024-49891.html
- https://www.suse.com/security/cve/CVE-2024-49894.html
- https://www.suse.com/security/cve/CVE-2024-49896.html
- https://www.suse.com/security/cve/CVE-2024-49901.html
- https://www.suse.com/security/cve/CVE-2024-49920.html
- https://www.suse.com/security/cve/CVE-2024-49929.html
- https://www.suse.com/security/cve/CVE-2024-49936.html
- https://www.suse.com/security/cve/CVE-2024-49949.html
- https://www.suse.com/security/cve/CVE-2024-49957.html
- https://www.suse.com/security/cve/CVE-2024-49958.html
- https://www.suse.com/security/cve/CVE-2024-49959.html
- https://www.suse.com/security/cve/CVE-2024-49962.html
- https://www.suse.com/security/cve/CVE-2024-49965.html
- https://www.suse.com/security/cve/CVE-2024-49966.html
- https://www.suse.com/security/cve/CVE-2024-49967.html
- https://www.suse.com/security/cve/CVE-2024-49982.html
- https://www.suse.com/security/cve/CVE-2024-49991.html
- https://www.suse.com/security/cve/CVE-2024-49995.html
- https://www.suse.com/security/cve/CVE-2024-49996.html
- https://www.suse.com/security/cve/CVE-2024-50006.html
- https://www.suse.com/security/cve/CVE-2024-50007.html
- https://www.suse.com/security/cve/CVE-2024-50024.html
- https://www.suse.com/security/cve/CVE-2024-50033.html
- https://www.suse.com/security/cve/CVE-2024-50035.html
- https://www.suse.com/security/cve/CVE-2024-50045.html
- https://www.suse.com/security/cve/CVE-2024-50047.html
- https://www.suse.com/security/cve/CVE-2024-50058.html
- https://bugzilla.suse.com/show_bug.cgi?id=1082555
- https://bugzilla.suse.com/show_bug.cgi?id=1176081
- https://bugzilla.suse.com/show_bug.cgi?id=1206344
- https://bugzilla.suse.com/show_bug.cgi?id=1213034
- https://bugzilla.suse.com/show_bug.cgi?id=1218562
- https://bugzilla.suse.com/show_bug.cgi?id=1219125
- https://bugzilla.suse.com/show_bug.cgi?id=1220439
- https://bugzilla.suse.com/show_bug.cgi?id=1221980
- https://bugzilla.suse.com/show_bug.cgi?id=1222629
- https://bugzilla.suse.com/show_bug.cgi?id=1223384
- https://bugzilla.suse.com/show_bug.cgi?id=1223824
- https://bugzilla.suse.com/show_bug.cgi?id=1225189
- https://bugzilla.suse.com/show_bug.cgi?id=1225336
- https://bugzilla.suse.com/show_bug.cgi?id=1225611
- https://bugzilla.suse.com/show_bug.cgi?id=1226585
- https://bugzilla.suse.com/show_bug.cgi?id=1226606
- https://bugzilla.suse.com/show_bug.cgi?id=1227437
- https://bugzilla.suse.com/show_bug.cgi?id=1227885
- https://bugzilla.suse.com/show_bug.cgi?id=1227941
- https://bugzilla.suse.com/show_bug.cgi?id=1227947
- https://bugzilla.suse.com/show_bug.cgi?id=1227952
- https://bugzilla.suse.com/show_bug.cgi?id=1228000
- https://bugzilla.suse.com/show_bug.cgi?id=1228410
- https://bugzilla.suse.com/show_bug.cgi?id=1228564
- https://bugzilla.suse.com/show_bug.cgi?id=1228620
- https://bugzilla.suse.com/show_bug.cgi?id=1228743
- https://bugzilla.suse.com/show_bug.cgi?id=1229005
- https://bugzilla.suse.com/show_bug.cgi?id=1229042
- https://bugzilla.suse.com/show_bug.cgi?id=1229154
- https://bugzilla.suse.com/show_bug.cgi?id=1229568
- https://bugzilla.suse.com/show_bug.cgi?id=1229769
- https://bugzilla.suse.com/show_bug.cgi?id=1229837
- https://bugzilla.suse.com/show_bug.cgi?id=1230179
- https://bugzilla.suse.com/show_bug.cgi?id=1230405
- https://bugzilla.suse.com/show_bug.cgi?id=1230725
- https://bugzilla.suse.com/show_bug.cgi?id=1230802
- https://bugzilla.suse.com/show_bug.cgi?id=1231072
- https://bugzilla.suse.com/show_bug.cgi?id=1231094
- https://bugzilla.suse.com/show_bug.cgi?id=1231096
- https://bugzilla.suse.com/show_bug.cgi?id=1231105
- https://bugzilla.suse.com/show_bug.cgi?id=1231111
- https://bugzilla.suse.com/show_bug.cgi?id=1231115
- https://bugzilla.suse.com/show_bug.cgi?id=1231148
- https://bugzilla.suse.com/show_bug.cgi?id=1231191
- https://bugzilla.suse.com/show_bug.cgi?id=1231197
- https://bugzilla.suse.com/show_bug.cgi?id=1231203
- https://bugzilla.suse.com/show_bug.cgi?id=1231293
- https://bugzilla.suse.com/show_bug.cgi?id=1231375
- https://bugzilla.suse.com/show_bug.cgi?id=1231537
- https://bugzilla.suse.com/show_bug.cgi?id=1231539
- https://bugzilla.suse.com/show_bug.cgi?id=1231540
- https://bugzilla.suse.com/show_bug.cgi?id=1231673
- https://bugzilla.suse.com/show_bug.cgi?id=1231858
- https://bugzilla.suse.com/show_bug.cgi?id=1231859
- https://bugzilla.suse.com/show_bug.cgi?id=1231861
- https://bugzilla.suse.com/show_bug.cgi?id=1231864
- https://bugzilla.suse.com/show_bug.cgi?id=1231888
- https://bugzilla.suse.com/show_bug.cgi?id=1231889
- https://bugzilla.suse.com/show_bug.cgi?id=1231890
- https://bugzilla.suse.com/show_bug.cgi?id=1231893
- https://bugzilla.suse.com/show_bug.cgi?id=1231897
- https://bugzilla.suse.com/show_bug.cgi?id=1231903
- https://bugzilla.suse.com/show_bug.cgi?id=1231914
- https://bugzilla.suse.com/show_bug.cgi?id=1231929
- https://bugzilla.suse.com/show_bug.cgi?id=1231935
- https://bugzilla.suse.com/show_bug.cgi?id=1231938
- https://bugzilla.suse.com/show_bug.cgi?id=1231939
- https://bugzilla.suse.com/show_bug.cgi?id=1231942
- https://bugzilla.suse.com/show_bug.cgi?id=1231954
- https://bugzilla.suse.com/show_bug.cgi?id=1231958
- https://bugzilla.suse.com/show_bug.cgi?id=1231979
- https://bugzilla.suse.com/show_bug.cgi?id=1231987
- https://bugzilla.suse.com/show_bug.cgi?id=1231988
- https://bugzilla.suse.com/show_bug.cgi?id=1231995
- https://bugzilla.suse.com/show_bug.cgi?id=1231996
- https://bugzilla.suse.com/show_bug.cgi?id=1231997
- https://bugzilla.suse.com/show_bug.cgi?id=1231998
- https://bugzilla.suse.com/show_bug.cgi?id=1232006
- https://bugzilla.suse.com/show_bug.cgi?id=1232007
- https://bugzilla.suse.com/show_bug.cgi?id=1232016
- https://bugzilla.suse.com/show_bug.cgi?id=1232025
- https://bugzilla.suse.com/show_bug.cgi?id=1232026
- https://bugzilla.suse.com/show_bug.cgi?id=1232035
- https://bugzilla.suse.com/show_bug.cgi?id=1232037
- https://bugzilla.suse.com/show_bug.cgi?id=1232038
- https://bugzilla.suse.com/show_bug.cgi?id=1232039
- https://bugzilla.suse.com/show_bug.cgi?id=1232047
- https://bugzilla.suse.com/show_bug.cgi?id=1232056
- https://bugzilla.suse.com/show_bug.cgi?id=1232069
- https://bugzilla.suse.com/show_bug.cgi?id=1232070
- https://bugzilla.suse.com/show_bug.cgi?id=1232071
- https://bugzilla.suse.com/show_bug.cgi?id=1232089
- https://bugzilla.suse.com/show_bug.cgi?id=1232097
- https://bugzilla.suse.com/show_bug.cgi?id=1232111
- https://bugzilla.suse.com/show_bug.cgi?id=1232123
- https://bugzilla.suse.com/show_bug.cgi?id=1232126
- https://bugzilla.suse.com/show_bug.cgi?id=1232133
- https://bugzilla.suse.com/show_bug.cgi?id=1232134
- https://bugzilla.suse.com/show_bug.cgi?id=1232135
- https://bugzilla.suse.com/show_bug.cgi?id=1232140
- https://bugzilla.suse.com/show_bug.cgi?id=1232141
- https://bugzilla.suse.com/show_bug.cgi?id=1232142
- https://bugzilla.suse.com/show_bug.cgi?id=1232149
- https://bugzilla.suse.com/show_bug.cgi?id=1232151
- https://bugzilla.suse.com/show_bug.cgi?id=1232152
- https://bugzilla.suse.com/show_bug.cgi?id=1232160
- https://bugzilla.suse.com/show_bug.cgi?id=1232172
- https://bugzilla.suse.com/show_bug.cgi?id=1232175
- https://bugzilla.suse.com/show_bug.cgi?id=1232180
- https://bugzilla.suse.com/show_bug.cgi?id=1232191
- https://bugzilla.suse.com/show_bug.cgi?id=1232199
- https://bugzilla.suse.com/show_bug.cgi?id=1232200
- https://bugzilla.suse.com/show_bug.cgi?id=1232201
- https://bugzilla.suse.com/show_bug.cgi?id=1232217
- https://bugzilla.suse.com/show_bug.cgi?id=1232218
- https://bugzilla.suse.com/show_bug.cgi?id=1232221
- https://bugzilla.suse.com/show_bug.cgi?id=1232236
- https://bugzilla.suse.com/show_bug.cgi?id=1232253
- https://bugzilla.suse.com/show_bug.cgi?id=1232282
- https://bugzilla.suse.com/show_bug.cgi?id=1232285
- https://bugzilla.suse.com/show_bug.cgi?id=1232286
- https://bugzilla.suse.com/show_bug.cgi?id=1232304
- https://bugzilla.suse.com/show_bug.cgi?id=1232305
- https://bugzilla.suse.com/show_bug.cgi?id=1232313
- https://bugzilla.suse.com/show_bug.cgi?id=1232314
- https://bugzilla.suse.com/show_bug.cgi?id=1232339
- https://bugzilla.suse.com/show_bug.cgi?id=1232354
- https://bugzilla.suse.com/show_bug.cgi?id=1232392
- https://bugzilla.suse.com/show_bug.cgi?id=1232394
- https://bugzilla.suse.com/show_bug.cgi?id=1232418
- https://bugzilla.suse.com/show_bug.cgi?id=1232424
- https://bugzilla.suse.com/show_bug.cgi?id=1232432
- https://bugzilla.suse.com/show_bug.cgi?id=1232442