Security update for the Linux Kernel
Announcement ID: | SUSE-SU-2024:2183-1 |
---|---|
Rating: | important |
References: |
|
Cross-References: |
|
CVSS scores: |
|
Affected Products: |
|
An update that solves 131 vulnerabilities and has 13 security fixes can now be installed.
Description:
The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security bugfixes.
The following security bugs were fixed:
- CVE-2021-47497: Fixed shift-out-of-bound (UBSAN) with byte size cells (bsc#1225355).
- CVE-2021-47500: Fixed trigger reference couting (bsc#1225360).
- CVE-2021-47383: Fiedx out-of-bound vmalloc access in imageblit (bsc#1225208).
- CVE-2021-47511: Fixed negative period/buffer sizes (bsc#1225411).
- CVE-2024-27398: Fixed use-after-free bugs caused by sco_sock_timeout (bsc#1224174).
- CVE-2023-4244: Fixed a use-after-free in the nf_tables component, which could be exploited to achieve local privilege escalation (bsc#1215420).
- CVE-2023-4244: Fixed a use-after-free in the nf_tables component, which could be exploited to achieve local privilege escalation (bsc#1215420).
- CVE-2023-1829: Fixed a use-after-free vulnerability in the control index filter (tcindex) (bsc#1210335).
- CVE-2021-47378: Destroy cm id before destroy qp to avoid use after free (bsc#1225201).
- CVE-2021-47496: Fix flipped sign in tls_err_abort() calls (bsc#1225354)
- CVE-2021-47402: Protect fl_walk() with rcu (bsc#1225301)
- CVE-2022-48673: kABI workarounds for struct smc_link (bsc#1223934).
- CVE-2023-52871: Handle a second device without data corruption (bsc#1225534)
- CVE-2024-26828: Fix underflow in parse_server_interfaces() (bsc#1223084).
- CVE-2024-27413: Fix incorrect allocation size (bsc#1224438).
- CVE-2023-52840: Fix use after free in rmi_unregister_function() (bsc#1224928).
- CVE-2021-47261: Fix initializing CQ fragments buffer (bsc#1224954)
- CVE-2021-47254: Fix use-after-free in gfs2_glock_shrink_scan (bsc#1224888).
- CVE-2023-52655: Check packet for fixup for true limit (bsc#1217169).
- CVE-2023-52686: Fix a null pointer in opal_event_init() (bsc#1065729).
The following non-security bugs were fixed:
- NFC: nxp: add NXP1002 (bsc#1185589).
- PCI: rpaphp: Add MODULE_DESCRIPTION (bsc#1176869 ltc#188243).
- af_unix: Do not use atomic ops for unix_sk(sk)->inflight (bsc#1223384).
- af_unix: Replace BUG_ON() with WARN_ON_ONCE() (bsc#1223384).
- af_unix: annote lockless accesses to unix_tot_inflight & gc_in_progress (bsc#1223384).
- btrfs: do not start relocation until in progress drops are done (bsc#1222251).
- md: Replace snprintf with scnprintf (git-fixes).
- netfilter: nf_tables: GC transaction race with abort path (git-fixes).
- netfilter: nf_tables: GC transaction race with netns dismantle (git-fixes).
- netfilter: nf_tables: defer gc run if previous batch is still pending (git-fixes).
- netfilter: nf_tables: fix GC transaction races with netns and netlink event exit path (git-fixes).
- netfilter: nf_tables: fix kdoc warnings after gc rework (git-fixes).
- netfilter: nf_tables: fix memleak when more than 255 elements expired (git-fixes).
- netfilter: nf_tables: mark newset as dead on transaction abort (git-fixes).
- netfilter: nf_tables: mark set as dead when unbinding anonymous set with timeout (git-fixes).
- netfilter: nf_tables: nft_set_rbtree: fix spurious insertion failure (git-fixes).
- netfilter: nf_tables: release mutex after nft_gc_seq_end from abort path (git-fixes).
- netfilter: nf_tables: skip dead set elements in netlink dump (git-fixes).
- netfilter: nf_tables: use correct lock to protect gc_list (git-fixes).
- netfilter: nft_set_hash: try later when GC hits EAGAIN on iteration (git-fixes).
- netfilter: nft_set_rbtree: Add missing expired checks (git-fixes).
- netfilter: nft_set_rbtree: Detect partial overlap with start endpoint match (git-fixes).
- netfilter: nft_set_rbtree: Detect partial overlaps on insertion (git-fixes).
- netfilter: nft_set_rbtree: Do not account for expired elements on insertion (git-fixes).
- netfilter: nft_set_rbtree: Drop spurious condition for overlap detection on insertion (git-fixes).
- netfilter: nft_set_rbtree: Handle outcomes of tree rotations in overlap detection (git-fixes).
- netfilter: nft_set_rbtree: Introduce and use nft_rbtree_interval_start() (git-fixes).
- netfilter: nft_set_rbtree: Switch to node list walk for overlap detection (git-fixes).
- netfilter: nft_set_rbtree: bogus lookup/get on consecutive elements in named sets (git-fixes).
- netfilter: nft_set_rbtree: fix null deref on element insertion (git-fixes).
- netfilter: nft_set_rbtree: fix overlap expiration walk (git-fixes).
- netfilter: nft_set_rbtree: overlap detection with element re-addition after deletion (git-fixes).
- netfilter: nft_set_rbtree: skip elements in transaction from garbage collection (git-fixes).
- netfilter: nft_set_rbtree: skip end interval element from gc (git-fixes).
- netfilter: nft_set_rbtree: skip sync GC for new elements in this transaction (git-fixes).
- netfilter: nft_set_rbtree: use read spinlock to avoid datapath contention (git-fixes).
- x86/pkeys: Revert a5eff7259790 ("x86/pkeys: Add PKRU value to init_fpstate") (bsc#1215356).
Special Instructions and Notes:
- Please reboot the system after installing this update.
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Linux Enterprise Live Patching 15-SP2
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP2-2024-2183=1
-
SUSE Linux Enterprise High Availability Extension 15 SP2
zypper in -t patch SUSE-SLE-Product-HA-15-SP2-2024-2183=1
-
SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-2183=1
-
SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-2183=1
-
SUSE Linux Enterprise Server for SAP Applications 15 SP2
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-2183=1
Package List:
-
SUSE Linux Enterprise Live Patching 15-SP2 (nosrc)
- kernel-default-5.3.18-150200.24.194.1
-
SUSE Linux Enterprise Live Patching 15-SP2 (ppc64le s390x x86_64)
- kernel-livepatch-SLE15-SP2_Update_49-debugsource-1-150200.5.3.1
- kernel-default-livepatch-5.3.18-150200.24.194.1
- kernel-default-livepatch-devel-5.3.18-150200.24.194.1
- kernel-default-debuginfo-5.3.18-150200.24.194.1
- kernel-livepatch-5_3_18-150200_24_194-default-1-150200.5.3.1
- kernel-default-debugsource-5.3.18-150200.24.194.1
- kernel-livepatch-5_3_18-150200_24_194-default-debuginfo-1-150200.5.3.1
-
SUSE Linux Enterprise High Availability Extension 15 SP2 (aarch64 ppc64le s390x x86_64)
- gfs2-kmp-default-debuginfo-5.3.18-150200.24.194.1
- cluster-md-kmp-default-debuginfo-5.3.18-150200.24.194.1
- dlm-kmp-default-debuginfo-5.3.18-150200.24.194.1
- gfs2-kmp-default-5.3.18-150200.24.194.1
- cluster-md-kmp-default-5.3.18-150200.24.194.1
- ocfs2-kmp-default-debuginfo-5.3.18-150200.24.194.1
- dlm-kmp-default-5.3.18-150200.24.194.1
- kernel-default-debuginfo-5.3.18-150200.24.194.1
- ocfs2-kmp-default-5.3.18-150200.24.194.1
- kernel-default-debugsource-5.3.18-150200.24.194.1
-
SUSE Linux Enterprise High Availability Extension 15 SP2 (nosrc)
- kernel-default-5.3.18-150200.24.194.1
-
SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64 nosrc x86_64)
- kernel-preempt-5.3.18-150200.24.194.1
- kernel-default-5.3.18-150200.24.194.1
-
SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64 x86_64)
- kernel-default-base-5.3.18-150200.24.194.1.150200.9.99.1
- kernel-preempt-debuginfo-5.3.18-150200.24.194.1
- kernel-preempt-devel-5.3.18-150200.24.194.1
- kernel-preempt-devel-debuginfo-5.3.18-150200.24.194.1
- kernel-obs-build-5.3.18-150200.24.194.1
- kernel-default-debuginfo-5.3.18-150200.24.194.1
- kernel-default-devel-debuginfo-5.3.18-150200.24.194.1
- kernel-default-devel-5.3.18-150200.24.194.1
- kernel-preempt-debugsource-5.3.18-150200.24.194.1
- kernel-default-debugsource-5.3.18-150200.24.194.1
- kernel-syms-5.3.18-150200.24.194.1
- kernel-obs-build-debugsource-5.3.18-150200.24.194.1
-
SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (noarch)
- kernel-source-5.3.18-150200.24.194.1
- kernel-devel-5.3.18-150200.24.194.1
- kernel-macros-5.3.18-150200.24.194.1
-
SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (noarch nosrc)
- kernel-docs-5.3.18-150200.24.194.1
-
SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x x86_64 nosrc)
- kernel-default-5.3.18-150200.24.194.1
-
SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x x86_64)
- kernel-default-base-5.3.18-150200.24.194.1.150200.9.99.1
- kernel-obs-build-5.3.18-150200.24.194.1
- reiserfs-kmp-default-debuginfo-5.3.18-150200.24.194.1
- reiserfs-kmp-default-5.3.18-150200.24.194.1
- kernel-default-debuginfo-5.3.18-150200.24.194.1
- kernel-default-devel-debuginfo-5.3.18-150200.24.194.1
- kernel-default-devel-5.3.18-150200.24.194.1
- kernel-default-debugsource-5.3.18-150200.24.194.1
- kernel-syms-5.3.18-150200.24.194.1
- kernel-obs-build-debugsource-5.3.18-150200.24.194.1
-
SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (noarch)
- kernel-source-5.3.18-150200.24.194.1
- kernel-devel-5.3.18-150200.24.194.1
- kernel-macros-5.3.18-150200.24.194.1
-
SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (noarch nosrc)
- kernel-docs-5.3.18-150200.24.194.1
-
SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 nosrc x86_64)
- kernel-preempt-5.3.18-150200.24.194.1
-
SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 x86_64)
- kernel-preempt-debugsource-5.3.18-150200.24.194.1
- kernel-preempt-devel-5.3.18-150200.24.194.1
- kernel-preempt-debuginfo-5.3.18-150200.24.194.1
- kernel-preempt-devel-debuginfo-5.3.18-150200.24.194.1
-
SUSE Linux Enterprise Server for SAP Applications 15 SP2 (nosrc ppc64le x86_64)
- kernel-default-5.3.18-150200.24.194.1
-
SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64)
- kernel-default-base-5.3.18-150200.24.194.1.150200.9.99.1
- kernel-obs-build-5.3.18-150200.24.194.1
- reiserfs-kmp-default-debuginfo-5.3.18-150200.24.194.1
- reiserfs-kmp-default-5.3.18-150200.24.194.1
- kernel-default-debuginfo-5.3.18-150200.24.194.1
- kernel-default-devel-debuginfo-5.3.18-150200.24.194.1
- kernel-default-devel-5.3.18-150200.24.194.1
- kernel-default-debugsource-5.3.18-150200.24.194.1
- kernel-syms-5.3.18-150200.24.194.1
- kernel-obs-build-debugsource-5.3.18-150200.24.194.1
-
SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch)
- kernel-source-5.3.18-150200.24.194.1
- kernel-devel-5.3.18-150200.24.194.1
- kernel-macros-5.3.18-150200.24.194.1
-
SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch nosrc)
- kernel-docs-5.3.18-150200.24.194.1
-
SUSE Linux Enterprise Server for SAP Applications 15 SP2 (nosrc x86_64)
- kernel-preempt-5.3.18-150200.24.194.1
-
SUSE Linux Enterprise Server for SAP Applications 15 SP2 (x86_64)
- kernel-preempt-debugsource-5.3.18-150200.24.194.1
- kernel-preempt-devel-5.3.18-150200.24.194.1
- kernel-preempt-debuginfo-5.3.18-150200.24.194.1
- kernel-preempt-devel-debuginfo-5.3.18-150200.24.194.1
References:
- https://www.suse.com/security/cve/CVE-2021-3743.html
- https://www.suse.com/security/cve/CVE-2021-39698.html
- https://www.suse.com/security/cve/CVE-2021-43056.html
- https://www.suse.com/security/cve/CVE-2021-47104.html
- https://www.suse.com/security/cve/CVE-2021-47220.html
- https://www.suse.com/security/cve/CVE-2021-47229.html
- https://www.suse.com/security/cve/CVE-2021-47231.html
- https://www.suse.com/security/cve/CVE-2021-47236.html
- https://www.suse.com/security/cve/CVE-2021-47239.html
- https://www.suse.com/security/cve/CVE-2021-47240.html
- https://www.suse.com/security/cve/CVE-2021-47246.html
- https://www.suse.com/security/cve/CVE-2021-47252.html
- https://www.suse.com/security/cve/CVE-2021-47254.html
- https://www.suse.com/security/cve/CVE-2021-47255.html
- https://www.suse.com/security/cve/CVE-2021-47259.html
- https://www.suse.com/security/cve/CVE-2021-47260.html
- https://www.suse.com/security/cve/CVE-2021-47261.html
- https://www.suse.com/security/cve/CVE-2021-47267.html
- https://www.suse.com/security/cve/CVE-2021-47269.html
- https://www.suse.com/security/cve/CVE-2021-47270.html
- https://www.suse.com/security/cve/CVE-2021-47274.html
- https://www.suse.com/security/cve/CVE-2021-47275.html
- https://www.suse.com/security/cve/CVE-2021-47276.html
- https://www.suse.com/security/cve/CVE-2021-47280.html
- https://www.suse.com/security/cve/CVE-2021-47284.html
- https://www.suse.com/security/cve/CVE-2021-47285.html
- https://www.suse.com/security/cve/CVE-2021-47288.html
- https://www.suse.com/security/cve/CVE-2021-47289.html
- https://www.suse.com/security/cve/CVE-2021-47296.html
- https://www.suse.com/security/cve/CVE-2021-47301.html
- https://www.suse.com/security/cve/CVE-2021-47302.html
- https://www.suse.com/security/cve/CVE-2021-47305.html
- https://www.suse.com/security/cve/CVE-2021-47307.html
- https://www.suse.com/security/cve/CVE-2021-47308.html
- https://www.suse.com/security/cve/CVE-2021-47314.html
- https://www.suse.com/security/cve/CVE-2021-47315.html
- https://www.suse.com/security/cve/CVE-2021-47320.html
- https://www.suse.com/security/cve/CVE-2021-47321.html
- https://www.suse.com/security/cve/CVE-2021-47323.html
- https://www.suse.com/security/cve/CVE-2021-47324.html
- https://www.suse.com/security/cve/CVE-2021-47330.html
- https://www.suse.com/security/cve/CVE-2021-47332.html
- https://www.suse.com/security/cve/CVE-2021-47333.html
- https://www.suse.com/security/cve/CVE-2021-47334.html
- https://www.suse.com/security/cve/CVE-2021-47338.html
- https://www.suse.com/security/cve/CVE-2021-47341.html
- https://www.suse.com/security/cve/CVE-2021-47344.html
- https://www.suse.com/security/cve/CVE-2021-47347.html
- https://www.suse.com/security/cve/CVE-2021-47350.html
- https://www.suse.com/security/cve/CVE-2021-47354.html
- https://www.suse.com/security/cve/CVE-2021-47356.html
- https://www.suse.com/security/cve/CVE-2021-47369.html
- https://www.suse.com/security/cve/CVE-2021-47375.html
- https://www.suse.com/security/cve/CVE-2021-47378.html
- https://www.suse.com/security/cve/CVE-2021-47381.html
- https://www.suse.com/security/cve/CVE-2021-47382.html
- https://www.suse.com/security/cve/CVE-2021-47383.html
- https://www.suse.com/security/cve/CVE-2021-47388.html
- https://www.suse.com/security/cve/CVE-2021-47391.html
- https://www.suse.com/security/cve/CVE-2021-47393.html
- https://www.suse.com/security/cve/CVE-2021-47395.html
- https://www.suse.com/security/cve/CVE-2021-47396.html
- https://www.suse.com/security/cve/CVE-2021-47399.html
- https://www.suse.com/security/cve/CVE-2021-47402.html
- https://www.suse.com/security/cve/CVE-2021-47404.html
- https://www.suse.com/security/cve/CVE-2021-47405.html
- https://www.suse.com/security/cve/CVE-2021-47416.html
- https://www.suse.com/security/cve/CVE-2021-47423.html
- https://www.suse.com/security/cve/CVE-2021-47424.html
- https://www.suse.com/security/cve/CVE-2021-47425.html
- https://www.suse.com/security/cve/CVE-2021-47431.html
- https://www.suse.com/security/cve/CVE-2021-47434.html
- https://www.suse.com/security/cve/CVE-2021-47436.html
- https://www.suse.com/security/cve/CVE-2021-47441.html
- https://www.suse.com/security/cve/CVE-2021-47442.html
- https://www.suse.com/security/cve/CVE-2021-47443.html
- https://www.suse.com/security/cve/CVE-2021-47445.html
- https://www.suse.com/security/cve/CVE-2021-47456.html
- https://www.suse.com/security/cve/CVE-2021-47460.html
- https://www.suse.com/security/cve/CVE-2021-47464.html
- https://www.suse.com/security/cve/CVE-2021-47465.html
- https://www.suse.com/security/cve/CVE-2021-47468.html
- https://www.suse.com/security/cve/CVE-2021-47473.html
- https://www.suse.com/security/cve/CVE-2021-47482.html
- https://www.suse.com/security/cve/CVE-2021-47483.html
- https://www.suse.com/security/cve/CVE-2021-47485.html
- https://www.suse.com/security/cve/CVE-2021-47495.html
- https://www.suse.com/security/cve/CVE-2021-47496.html
- https://www.suse.com/security/cve/CVE-2021-47497.html
- https://www.suse.com/security/cve/CVE-2021-47500.html
- https://www.suse.com/security/cve/CVE-2021-47505.html
- https://www.suse.com/security/cve/CVE-2021-47506.html
- https://www.suse.com/security/cve/CVE-2021-47511.html
- https://www.suse.com/security/cve/CVE-2021-47516.html
- https://www.suse.com/security/cve/CVE-2021-47522.html
- https://www.suse.com/security/cve/CVE-2021-47527.html
- https://www.suse.com/security/cve/CVE-2021-47538.html
- https://www.suse.com/security/cve/CVE-2021-47541.html
- https://www.suse.com/security/cve/CVE-2021-47542.html
- https://www.suse.com/security/cve/CVE-2021-47562.html
- https://www.suse.com/security/cve/CVE-2021-47563.html
- https://www.suse.com/security/cve/CVE-2021-47565.html
- https://www.suse.com/security/cve/CVE-2022-20132.html
- https://www.suse.com/security/cve/CVE-2022-48673.html
- https://www.suse.com/security/cve/CVE-2023-0160.html
- https://www.suse.com/security/cve/CVE-2023-1829.html
- https://www.suse.com/security/cve/CVE-2023-2176.html
- https://www.suse.com/security/cve/CVE-2023-424.html
- https://www.suse.com/security/cve/CVE-2023-4244.html
- https://www.suse.com/security/cve/CVE-2023-47233.html
- https://www.suse.com/security/cve/CVE-2023-52433.html
- https://www.suse.com/security/cve/CVE-2023-52581.html
- https://www.suse.com/security/cve/CVE-2023-52591.html
- https://www.suse.com/security/cve/CVE-2023-52654.html
- https://www.suse.com/security/cve/CVE-2023-52655.html
- https://www.suse.com/security/cve/CVE-2023-52686.html
- https://www.suse.com/security/cve/CVE-2023-52840.html
- https://www.suse.com/security/cve/CVE-2023-52871.html
- https://www.suse.com/security/cve/CVE-2023-52880.html
- https://www.suse.com/security/cve/CVE-2023-6531.html
- https://www.suse.com/security/cve/CVE-2024-26581.html
- https://www.suse.com/security/cve/CVE-2024-26643.html
- https://www.suse.com/security/cve/CVE-2024-26828.html
- https://www.suse.com/security/cve/CVE-2024-26925.html
- https://www.suse.com/security/cve/CVE-2024-26929.html
- https://www.suse.com/security/cve/CVE-2024-26930.html
- https://www.suse.com/security/cve/CVE-2024-27398.html
- https://www.suse.com/security/cve/CVE-2024-27413.html
- https://www.suse.com/security/cve/CVE-2024-35811.html
- https://www.suse.com/security/cve/CVE-2024-35895.html
- https://www.suse.com/security/cve/CVE-2024-35914.html
- https://bugzilla.suse.com/show_bug.cgi?id=1065729
- https://bugzilla.suse.com/show_bug.cgi?id=1151927
- https://bugzilla.suse.com/show_bug.cgi?id=1154353
- https://bugzilla.suse.com/show_bug.cgi?id=1156395
- https://bugzilla.suse.com/show_bug.cgi?id=1174585
- https://bugzilla.suse.com/show_bug.cgi?id=1176869
- https://bugzilla.suse.com/show_bug.cgi?id=1184631
- https://bugzilla.suse.com/show_bug.cgi?id=1185589
- https://bugzilla.suse.com/show_bug.cgi?id=1185902
- https://bugzilla.suse.com/show_bug.cgi?id=1188616
- https://bugzilla.suse.com/show_bug.cgi?id=1188772
- https://bugzilla.suse.com/show_bug.cgi?id=1189883
- https://bugzilla.suse.com/show_bug.cgi?id=1190795
- https://bugzilla.suse.com/show_bug.cgi?id=1191452
- https://bugzilla.suse.com/show_bug.cgi?id=1192107
- https://bugzilla.suse.com/show_bug.cgi?id=1194288
- https://bugzilla.suse.com/show_bug.cgi?id=1196956
- https://bugzilla.suse.com/show_bug.cgi?id=1200619
- https://bugzilla.suse.com/show_bug.cgi?id=1208813
- https://bugzilla.suse.com/show_bug.cgi?id=1209657
- https://bugzilla.suse.com/show_bug.cgi?id=1210335
- https://bugzilla.suse.com/show_bug.cgi?id=1210629
- https://bugzilla.suse.com/show_bug.cgi?id=1215356
- https://bugzilla.suse.com/show_bug.cgi?id=1215420
- https://bugzilla.suse.com/show_bug.cgi?id=1216702
- https://bugzilla.suse.com/show_bug.cgi?id=1217169
- https://bugzilla.suse.com/show_bug.cgi?id=1220137
- https://bugzilla.suse.com/show_bug.cgi?id=1220144
- https://bugzilla.suse.com/show_bug.cgi?id=1220754
- https://bugzilla.suse.com/show_bug.cgi?id=1220877
- https://bugzilla.suse.com/show_bug.cgi?id=1220960
- https://bugzilla.suse.com/show_bug.cgi?id=1221044
- https://bugzilla.suse.com/show_bug.cgi?id=1221829
- https://bugzilla.suse.com/show_bug.cgi?id=1222251
- https://bugzilla.suse.com/show_bug.cgi?id=1222619
- https://bugzilla.suse.com/show_bug.cgi?id=1223084
- https://bugzilla.suse.com/show_bug.cgi?id=1223384
- https://bugzilla.suse.com/show_bug.cgi?id=1223390
- https://bugzilla.suse.com/show_bug.cgi?id=1223934
- https://bugzilla.suse.com/show_bug.cgi?id=1224099
- https://bugzilla.suse.com/show_bug.cgi?id=1224174
- https://bugzilla.suse.com/show_bug.cgi?id=1224438
- https://bugzilla.suse.com/show_bug.cgi?id=1224482
- https://bugzilla.suse.com/show_bug.cgi?id=1224511
- https://bugzilla.suse.com/show_bug.cgi?id=1224592
- https://bugzilla.suse.com/show_bug.cgi?id=1224831
- https://bugzilla.suse.com/show_bug.cgi?id=1224832
- https://bugzilla.suse.com/show_bug.cgi?id=1224834
- https://bugzilla.suse.com/show_bug.cgi?id=1224841
- https://bugzilla.suse.com/show_bug.cgi?id=1224843
- https://bugzilla.suse.com/show_bug.cgi?id=1224846
- https://bugzilla.suse.com/show_bug.cgi?id=1224849
- https://bugzilla.suse.com/show_bug.cgi?id=1224854
- https://bugzilla.suse.com/show_bug.cgi?id=1224859
- https://bugzilla.suse.com/show_bug.cgi?id=1224882
- https://bugzilla.suse.com/show_bug.cgi?id=1224888
- https://bugzilla.suse.com/show_bug.cgi?id=1224889
- https://bugzilla.suse.com/show_bug.cgi?id=1224891
- https://bugzilla.suse.com/show_bug.cgi?id=1224892
- https://bugzilla.suse.com/show_bug.cgi?id=1224893
- https://bugzilla.suse.com/show_bug.cgi?id=1224904
- https://bugzilla.suse.com/show_bug.cgi?id=1224907
- https://bugzilla.suse.com/show_bug.cgi?id=1224909
- https://bugzilla.suse.com/show_bug.cgi?id=1224916
- https://bugzilla.suse.com/show_bug.cgi?id=1224917
- https://bugzilla.suse.com/show_bug.cgi?id=1224922
- https://bugzilla.suse.com/show_bug.cgi?id=1224923
- https://bugzilla.suse.com/show_bug.cgi?id=1224924
- https://bugzilla.suse.com/show_bug.cgi?id=1224928
- https://bugzilla.suse.com/show_bug.cgi?id=1224953
- https://bugzilla.suse.com/show_bug.cgi?id=1224954
- https://bugzilla.suse.com/show_bug.cgi?id=1224961
- https://bugzilla.suse.com/show_bug.cgi?id=1224963
- https://bugzilla.suse.com/show_bug.cgi?id=1224965
- https://bugzilla.suse.com/show_bug.cgi?id=1224966
- https://bugzilla.suse.com/show_bug.cgi?id=1224968
- https://bugzilla.suse.com/show_bug.cgi?id=1224981
- https://bugzilla.suse.com/show_bug.cgi?id=1224982
- https://bugzilla.suse.com/show_bug.cgi?id=1224984
- https://bugzilla.suse.com/show_bug.cgi?id=1224987
- https://bugzilla.suse.com/show_bug.cgi?id=1224990
- https://bugzilla.suse.com/show_bug.cgi?id=1224993
- https://bugzilla.suse.com/show_bug.cgi?id=1224996
- https://bugzilla.suse.com/show_bug.cgi?id=1224997
- https://bugzilla.suse.com/show_bug.cgi?id=1225026
- https://bugzilla.suse.com/show_bug.cgi?id=1225030
- https://bugzilla.suse.com/show_bug.cgi?id=1225058
- https://bugzilla.suse.com/show_bug.cgi?id=1225060
- https://bugzilla.suse.com/show_bug.cgi?id=1225084
- https://bugzilla.suse.com/show_bug.cgi?id=1225091
- https://bugzilla.suse.com/show_bug.cgi?id=1225112
- https://bugzilla.suse.com/show_bug.cgi?id=1225113
- https://bugzilla.suse.com/show_bug.cgi?id=1225140
- https://bugzilla.suse.com/show_bug.cgi?id=1225143
- https://bugzilla.suse.com/show_bug.cgi?id=1225164
- https://bugzilla.suse.com/show_bug.cgi?id=1225177
- https://bugzilla.suse.com/show_bug.cgi?id=1225181
- https://bugzilla.suse.com/show_bug.cgi?id=1225192
- https://bugzilla.suse.com/show_bug.cgi?id=1225193
- https://bugzilla.suse.com/show_bug.cgi?id=1225201
- https://bugzilla.suse.com/show_bug.cgi?id=1225206
- https://bugzilla.suse.com/show_bug.cgi?id=1225207
- https://bugzilla.suse.com/show_bug.cgi?id=1225208
- https://bugzilla.suse.com/show_bug.cgi?id=1225214
- https://bugzilla.suse.com/show_bug.cgi?id=1225223
- https://bugzilla.suse.com/show_bug.cgi?id=1225224
- https://bugzilla.suse.com/show_bug.cgi?id=1225232
- https://bugzilla.suse.com/show_bug.cgi?id=1225238
- https://bugzilla.suse.com/show_bug.cgi?id=1225244
- https://bugzilla.suse.com/show_bug.cgi?id=1225251
- https://bugzilla.suse.com/show_bug.cgi?id=1225256
- https://bugzilla.suse.com/show_bug.cgi?id=1225261
- https://bugzilla.suse.com/show_bug.cgi?id=1225262
- https://bugzilla.suse.com/show_bug.cgi?id=1225263
- https://bugzilla.suse.com/show_bug.cgi?id=1225301
- https://bugzilla.suse.com/show_bug.cgi?id=1225303
- https://bugzilla.suse.com/show_bug.cgi?id=1225318
- https://bugzilla.suse.com/show_bug.cgi?id=1225321
- https://bugzilla.suse.com/show_bug.cgi?id=1225326
- https://bugzilla.suse.com/show_bug.cgi?id=1225327
- https://bugzilla.suse.com/show_bug.cgi?id=1225328
- https://bugzilla.suse.com/show_bug.cgi?id=1225336
- https://bugzilla.suse.com/show_bug.cgi?id=1225341
- https://bugzilla.suse.com/show_bug.cgi?id=1225346
- https://bugzilla.suse.com/show_bug.cgi?id=1225351
- https://bugzilla.suse.com/show_bug.cgi?id=1225354
- https://bugzilla.suse.com/show_bug.cgi?id=1225355
- https://bugzilla.suse.com/show_bug.cgi?id=1225360
- https://bugzilla.suse.com/show_bug.cgi?id=1225366
- https://bugzilla.suse.com/show_bug.cgi?id=1225367
- https://bugzilla.suse.com/show_bug.cgi?id=1225384
- https://bugzilla.suse.com/show_bug.cgi?id=1225390
- https://bugzilla.suse.com/show_bug.cgi?id=1225393
- https://bugzilla.suse.com/show_bug.cgi?id=1225400
- https://bugzilla.suse.com/show_bug.cgi?id=1225404
- https://bugzilla.suse.com/show_bug.cgi?id=1225411
- https://bugzilla.suse.com/show_bug.cgi?id=1225427
- https://bugzilla.suse.com/show_bug.cgi?id=1225437
- https://bugzilla.suse.com/show_bug.cgi?id=1225448
- https://bugzilla.suse.com/show_bug.cgi?id=1225453
- https://bugzilla.suse.com/show_bug.cgi?id=1225455
- https://bugzilla.suse.com/show_bug.cgi?id=1225499
- https://bugzilla.suse.com/show_bug.cgi?id=1225500
- https://bugzilla.suse.com/show_bug.cgi?id=1225534