Security update for the Linux Kernel
Announcement ID: | SUSE-SU-2025:02321-1 |
---|---|
Release Date: | 2025-07-15T14:31:36Z |
Rating: | important |
References: |
|
Cross-References: |
|
CVSS scores: |
|
Affected Products: |
|
An update that solves 260 vulnerabilities, contains two features and has 39 security fixes can now be installed.
Description:
The SUSE Linux Enterprise 15 SP5 RT kernel was updated to receive various security bugfixes.
The following security bugs were fixed:
- CVE-2021-47557: net/sched: sch_ets: do not peek at classes beyond 'nbands' (bsc#1207361 bsc#1225468).
- CVE-2021-47595: net/sched: sch_ets: do not remove idle classes from the round-robin list (bsc#1207361 bsc#1226552).
- CVE-2023-52924: netfilter: nf_tables: do not skip expired elements during walk (bsc#1236821).
- CVE-2023-52925: netfilter: nf_tables: do not fail inserts if duplicate has expired (bsc#1236822).
- CVE-2024-26808: netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain (bsc#1222634).
- CVE-2024-26924: scsi: lpfc: Release hbalock before calling lpfc_worker_wake_up() (bsc#1225820).
- CVE-2024-27397: kabi: place tstamp needed for nftables set in a hole (bsc#1224095).
- CVE-2024-28956: x86/its: Add support for ITS-safe indirect thunk (bsc#1242006).
- CVE-2024-36978: net: sched: sch_multiq: fix possible OOB write in multiq_tune() (bsc#1226514).
- CVE-2024-46800: sch/netem: fix use after free in netem_dequeue (bsc#1230827).
- CVE-2024-53125: bpf: sync_linked_regs() must preserve subreg_def (bsc#1234156).
- CVE-2024-53141: netfilter: ipset: add missing range check in bitmap_ip_uadt (bsc#1234381).
- CVE-2024-53197: ALSA: usb-audio: Fix potential out-of-bound accesses for Extigy and Mbox devices (bsc#1235464).
- CVE-2024-56770: sch/netem: fix use after free in netem_dequeue (bsc#1235637).
- CVE-2025-21700: net: sched: Disallow replacing of child qdisc from one parent to another (bsc#1237159).
- CVE-2025-21702: pfifo_tail_enqueue: Drop new packet when sch->limit == 0 (bsc#1237312).
- CVE-2025-21703: netem: Update sch->q.qlen before qdisc_tree_reduce_backlog() (bsc#1237313).
- CVE-2025-21756: vsock: Orphan socket after transport release (bsc#1238876).
- CVE-2025-23141: KVM: x86: Acquire SRCU in KVM_GET_MP_STATE to protect guest memory accesses (bsc#1242782).
- CVE-2025-37752: net_sched: sch_sfq: move the limit validation (bsc#1242504).
- CVE-2025-37785: ext4: fix OOB read when checking dotdot dir (bsc#1241640).
- CVE-2025-37823: net_sched: hfsc: Fix a potential UAF in hfsc_dequeue() too (bsc#1242924).
- CVE-2025-37890: net_sched: hfsc: Fix a UAF vulnerability in class with netem as child qdisc (bsc#1243330).
- CVE-2025-37997: netfilter: ipset: fix region locking in hash types (bsc#1243832).
- CVE-2025-38000: sch_hfsc: Fix qlen accounting bug when using peek in hfsc_enqueue() (bsc#1244277).
- CVE-2025-38001: net_sched: hfsc: Address reentrant enqueue adding class to eltree twice (bsc#1244234).
- CVE-2025-38014: dmaengine: idxd: Refactor remove call with idxd_cleanup() helper (bsc#1244732).
- CVE-2025-38060: bpf: abort verification if env->cur_state->loop_entry != NULL (bsc#1245155).
- CVE-2025-38083: net_sched: prio: fix a race in prio_tune() (bsc#1245183).
The following non-security bugs were fixed:
- ALSA: usb-audio: Fix a DMA to stack memory bug (git-fixes).
- Fix conditional for selecting gcc-13 Fixes: 51dacec21eb1 ("Use gcc-13 for build on SLE16 (jsc#PED-10028).")
- Fix reference in "net_sched: sch_sfq: use a temporary work area for validating configuration" (bsc#1242504)
- MyBS: Correctly generate build flags for non-multibuild package limit (bsc# 1244241) Fixes: 0999112774fc ("MyBS: Use buildflags to set which package to build")
- MyBS: Do not build kernel-obs-qa with limit_packages Fixes: 58e3f8c34b2b ("bs-upload-kernel: Pass limit_packages also on multibuild")
- MyBS: Simplify qa_expr generation Start with a 0 which makes the expression valid even if there are no QA repositories (currently does not happen). Then separator is always needed.
- Require zstd in kernel-default-devel when module compression is zstd To use ksym-provides tool modules need to be uncompressed. Without zstd at least kernel-default-base does not have provides. Link: https://github.com/openSUSE/rpm-config-SUSE/pull/82
- Use gcc-13 for build on SLE16 (jsc#PED-10028).
- add nf_tables for iptables non-legacy network handling This is needed for example by docker on the Alpine Linux distribution, but can also be used on openSUSE.
- bs-upload-kernel: Pass limit_packages also on multibuild Fixes: 0999112774fc ("MyBS: Use buildflags to set which package to build") Fixes: 747f601d4156 ("bs-upload-kernel, MyBS, Buildresults: Support multibuild (JSC-SLE#5501, boo#1211226, bsc#1218184)")
- check-for-config-changes: Fix flag name typo
- doc/README.SUSE: Point to the updated version of LKMPG
- hugetlb: unshare some PMDs when splitting VMAs (bsc#1245431).
- kernel-obs-qa: Use srchash for dependency as well
- kernel-source: Also replace bin/env
- kernel-source: Also update the search to match bin/env Fixes: dc2037cd8f94 ("kernel-source: Also replace bin/env"
- kernel-source: Remove log.sh from sources
- mkspec: Exclude rt flavor from kernel-syms dependencies (bsc#1244337).
- mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (bsc#1245431).
- mm/hugetlb: unshare page tables during VMA split, not before (bsc#1245431).
- net_sched: sch_fifo: implement lockless __fifo_dump() (bsc#1237312)
- net_sched: sch_sfq: use a temporary work area for validating configuration (bsc#1232504)
- ovl: fix use inode directly in rcu-walk mode (bsc#1241900).
- packaging: Turn gcc version into config.sh variable Fixes: 51dacec21eb1 ("Use gcc-13 for build on SLE16 (jsc#PED-10028).")
- powerpc/powernv/memtrace: Fix out of bounds issue in memtrace mmap (bsc#1244309 ltc#213790).
- powerpc/vas: Return -EINVAL if the offset is non-zero in mmap() (bsc#1244309 ltc#213790).
- rpm/check-for-config-changes: Add GCC_ASM_FLAG_OUTPUT_BROKEN
- rpm/check-for-config-changes: Add GCC_ASM_FLAG_OUTPUT_BROKEN Both spellings are actually used
- rpm/check-for-config-changes: add LD_CAN_ to IGNORED_CONFIGS_RE
- rpm/check-for-config-changes: add more to IGNORED_CONFIGS_RE Useful when someone tries (needs) to build the kernel with clang.
- rpm/check-for-config-changes: ignore DRM_MSM_VALIDATE_XML This option is dynamically enabled to build-test different configurations. This makes run_oldconfig.sh complain sporadically for arm64.
- rpm/kernel-binary.spec.in: Also order against update-bootloader (boo#1228659, boo#1240785, boo#1241038).
- rpm/kernel-binary.spec.in: Fix missing 20-kernel-default-extra.conf (bsc#1239986) sle_version was obsoleted for SLE16. It has to be combined with suse_version check.
- rpm/kernel-binary.spec.in: Use OrderWithRequires (boo#1228659 boo#1241038). OrderWithRequires was introduced in rpm 4.9 (ie. SLE12+) to allow a package to inform the order of installation of other package without hard requiring that package. This means our kernel-binary packages no longer need to hard require perl-Bootloader or dracut, resolving the long-commented issue there. This is also needed for udev & systemd-boot to ensure those packages are installed before being called by dracut (boo#1228659)
- rpm/kernel-binary.spec.in: fix KMPs build on 6.13+ (bsc#1234454)
- rpm/kernel-docs.spec.in: Workaround for reproducible builds (bsc#1238303)
- rpm/package-descriptions: Add rt and rt_debug descriptions
- rpm/release-projects: Update the ALP projects again (bsc#1231293).
- rpm/split-modules: Fix optional splitting with usrmerge (bsc#1238570)
- rpm: Stop using is_kotd_qa macro
- scsi: storvsc: Do not report the host packet status as the hv status (git-fixes).
- scsi: storvsc: Increase the timeouts to storvsc_timeout (bsc#1245455).
Special Instructions and Notes:
- Please reboot the system after installing this update.
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
openSUSE Leap 15.5
zypper in -t patch SUSE-2025-2321=1
-
SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2025-2321=1
Package List:
-
openSUSE Leap 15.5 (noarch)
- kernel-source-rt-5.14.21-150500.13.100.1
- kernel-devel-rt-5.14.21-150500.13.100.1
-
openSUSE Leap 15.5 (x86_64)
- kernel-rt_debug-debugsource-5.14.21-150500.13.100.2
- dlm-kmp-rt-5.14.21-150500.13.100.2
- kernel-rt-devel-5.14.21-150500.13.100.2
- kernel-rt-optional-debuginfo-5.14.21-150500.13.100.2
- kernel-rt_debug-vdso-debuginfo-5.14.21-150500.13.100.2
- kernel-rt-livepatch-devel-5.14.21-150500.13.100.2
- kselftests-kmp-rt-debuginfo-5.14.21-150500.13.100.2
- kernel-rt-debuginfo-5.14.21-150500.13.100.2
- cluster-md-kmp-rt-5.14.21-150500.13.100.2
- gfs2-kmp-rt-debuginfo-5.14.21-150500.13.100.2
- kernel-rt-vdso-5.14.21-150500.13.100.2
- kernel-rt-debugsource-5.14.21-150500.13.100.2
- reiserfs-kmp-rt-5.14.21-150500.13.100.2
- reiserfs-kmp-rt-debuginfo-5.14.21-150500.13.100.2
- kernel-rt-devel-debuginfo-5.14.21-150500.13.100.2
- kselftests-kmp-rt-5.14.21-150500.13.100.2
- kernel-rt-optional-5.14.21-150500.13.100.2
- kernel-rt-extra-5.14.21-150500.13.100.2
- kernel-rt-livepatch-5.14.21-150500.13.100.2
- ocfs2-kmp-rt-5.14.21-150500.13.100.2
- kernel-rt_debug-vdso-5.14.21-150500.13.100.2
- cluster-md-kmp-rt-debuginfo-5.14.21-150500.13.100.2
- gfs2-kmp-rt-5.14.21-150500.13.100.2
- kernel-rt-vdso-debuginfo-5.14.21-150500.13.100.2
- ocfs2-kmp-rt-debuginfo-5.14.21-150500.13.100.2
- dlm-kmp-rt-debuginfo-5.14.21-150500.13.100.2
- kernel-rt_debug-devel-5.14.21-150500.13.100.2
- kernel-rt_debug-devel-debuginfo-5.14.21-150500.13.100.2
- kernel-rt_debug-debuginfo-5.14.21-150500.13.100.2
- kernel-rt-extra-debuginfo-5.14.21-150500.13.100.2
-
openSUSE Leap 15.5 (nosrc x86_64)
- kernel-rt_debug-5.14.21-150500.13.100.2
- kernel-rt-5.14.21-150500.13.100.2
-
SUSE Linux Enterprise Micro 5.5 (noarch)
- kernel-source-rt-5.14.21-150500.13.100.1
- kernel-devel-rt-5.14.21-150500.13.100.1
-
SUSE Linux Enterprise Micro 5.5 (nosrc x86_64)
- kernel-rt-5.14.21-150500.13.100.2
-
SUSE Linux Enterprise Micro 5.5 (x86_64)
- kernel-rt-debuginfo-5.14.21-150500.13.100.2
- kernel-rt-debugsource-5.14.21-150500.13.100.2
References:
- https://www.suse.com/security/cve/CVE-2021-47557.html
- https://www.suse.com/security/cve/CVE-2021-47595.html
- https://www.suse.com/security/cve/CVE-2022-1679.html
- https://www.suse.com/security/cve/CVE-2022-2585.html
- https://www.suse.com/security/cve/CVE-2022-2586.html
- https://www.suse.com/security/cve/CVE-2022-2905.html
- https://www.suse.com/security/cve/CVE-2022-3903.html
- https://www.suse.com/security/cve/CVE-2022-4095.html
- https://www.suse.com/security/cve/CVE-2022-4662.html
- https://www.suse.com/security/cve/CVE-2022-49934.html
- https://www.suse.com/security/cve/CVE-2022-49935.html
- https://www.suse.com/security/cve/CVE-2022-49936.html
- https://www.suse.com/security/cve/CVE-2022-49937.html
- https://www.suse.com/security/cve/CVE-2022-49938.html
- https://www.suse.com/security/cve/CVE-2022-49940.html
- https://www.suse.com/security/cve/CVE-2022-49942.html
- https://www.suse.com/security/cve/CVE-2022-49943.html
- https://www.suse.com/security/cve/CVE-2022-49944.html
- https://www.suse.com/security/cve/CVE-2022-49945.html
- https://www.suse.com/security/cve/CVE-2022-49946.html
- https://www.suse.com/security/cve/CVE-2022-49948.html
- https://www.suse.com/security/cve/CVE-2022-49949.html
- https://www.suse.com/security/cve/CVE-2022-49950.html
- https://www.suse.com/security/cve/CVE-2022-49951.html
- https://www.suse.com/security/cve/CVE-2022-49952.html
- https://www.suse.com/security/cve/CVE-2022-49954.html
- https://www.suse.com/security/cve/CVE-2022-49956.html
- https://www.suse.com/security/cve/CVE-2022-49957.html
- https://www.suse.com/security/cve/CVE-2022-49958.html
- https://www.suse.com/security/cve/CVE-2022-49960.html
- https://www.suse.com/security/cve/CVE-2022-49962.html
- https://www.suse.com/security/cve/CVE-2022-49963.html
- https://www.suse.com/security/cve/CVE-2022-49964.html
- https://www.suse.com/security/cve/CVE-2022-49965.html
- https://www.suse.com/security/cve/CVE-2022-49966.html
- https://www.suse.com/security/cve/CVE-2022-49968.html
- https://www.suse.com/security/cve/CVE-2022-49969.html
- https://www.suse.com/security/cve/CVE-2022-49971.html
- https://www.suse.com/security/cve/CVE-2022-49972.html
- https://www.suse.com/security/cve/CVE-2022-49977.html
- https://www.suse.com/security/cve/CVE-2022-49978.html
- https://www.suse.com/security/cve/CVE-2022-49980.html
- https://www.suse.com/security/cve/CVE-2022-49981.html
- https://www.suse.com/security/cve/CVE-2022-49982.html
- https://www.suse.com/security/cve/CVE-2022-49983.html
- https://www.suse.com/security/cve/CVE-2022-49984.html
- https://www.suse.com/security/cve/CVE-2022-49985.html
- https://www.suse.com/security/cve/CVE-2022-49986.html
- https://www.suse.com/security/cve/CVE-2022-49987.html
- https://www.suse.com/security/cve/CVE-2022-49989.html
- https://www.suse.com/security/cve/CVE-2022-49990.html
- https://www.suse.com/security/cve/CVE-2022-49993.html
- https://www.suse.com/security/cve/CVE-2022-49995.html
- https://www.suse.com/security/cve/CVE-2022-49999.html
- https://www.suse.com/security/cve/CVE-2022-50002.html
- https://www.suse.com/security/cve/CVE-2022-50003.html
- https://www.suse.com/security/cve/CVE-2022-50005.html
- https://www.suse.com/security/cve/CVE-2022-50006.html
- https://www.suse.com/security/cve/CVE-2022-50008.html
- https://www.suse.com/security/cve/CVE-2022-50010.html
- https://www.suse.com/security/cve/CVE-2022-50011.html
- https://www.suse.com/security/cve/CVE-2022-50012.html
- https://www.suse.com/security/cve/CVE-2022-50015.html
- https://www.suse.com/security/cve/CVE-2022-50016.html
- https://www.suse.com/security/cve/CVE-2022-50019.html
- https://www.suse.com/security/cve/CVE-2022-50020.html
- https://www.suse.com/security/cve/CVE-2022-50021.html
- https://www.suse.com/security/cve/CVE-2022-50022.html
- https://www.suse.com/security/cve/CVE-2022-50023.html
- https://www.suse.com/security/cve/CVE-2022-50024.html
- https://www.suse.com/security/cve/CVE-2022-50026.html
- https://www.suse.com/security/cve/CVE-2022-50027.html
- https://www.suse.com/security/cve/CVE-2022-50028.html
- https://www.suse.com/security/cve/CVE-2022-50029.html
- https://www.suse.com/security/cve/CVE-2022-50030.html
- https://www.suse.com/security/cve/CVE-2022-50031.html
- https://www.suse.com/security/cve/CVE-2022-50032.html
- https://www.suse.com/security/cve/CVE-2022-50033.html
- https://www.suse.com/security/cve/CVE-2022-50034.html
- https://www.suse.com/security/cve/CVE-2022-50035.html
- https://www.suse.com/security/cve/CVE-2022-50036.html
- https://www.suse.com/security/cve/CVE-2022-50037.html
- https://www.suse.com/security/cve/CVE-2022-50038.html
- https://www.suse.com/security/cve/CVE-2022-50039.html
- https://www.suse.com/security/cve/CVE-2022-50040.html
- https://www.suse.com/security/cve/CVE-2022-50041.html
- https://www.suse.com/security/cve/CVE-2022-50044.html
- https://www.suse.com/security/cve/CVE-2022-50045.html
- https://www.suse.com/security/cve/CVE-2022-50046.html
- https://www.suse.com/security/cve/CVE-2022-50047.html
- https://www.suse.com/security/cve/CVE-2022-50049.html
- https://www.suse.com/security/cve/CVE-2022-50050.html
- https://www.suse.com/security/cve/CVE-2022-50051.html
- https://www.suse.com/security/cve/CVE-2022-50052.html
- https://www.suse.com/security/cve/CVE-2022-50053.html
- https://www.suse.com/security/cve/CVE-2022-50054.html
- https://www.suse.com/security/cve/CVE-2022-50055.html
- https://www.suse.com/security/cve/CVE-2022-50059.html
- https://www.suse.com/security/cve/CVE-2022-50060.html
- https://www.suse.com/security/cve/CVE-2022-50061.html
- https://www.suse.com/security/cve/CVE-2022-50062.html
- https://www.suse.com/security/cve/CVE-2022-50065.html
- https://www.suse.com/security/cve/CVE-2022-50066.html
- https://www.suse.com/security/cve/CVE-2022-50067.html
- https://www.suse.com/security/cve/CVE-2022-50068.html
- https://www.suse.com/security/cve/CVE-2022-50072.html
- https://www.suse.com/security/cve/CVE-2022-50073.html
- https://www.suse.com/security/cve/CVE-2022-50074.html
- https://www.suse.com/security/cve/CVE-2022-50076.html
- https://www.suse.com/security/cve/CVE-2022-50077.html
- https://www.suse.com/security/cve/CVE-2022-50079.html
- https://www.suse.com/security/cve/CVE-2022-50083.html
- https://www.suse.com/security/cve/CVE-2022-50084.html
- https://www.suse.com/security/cve/CVE-2022-50085.html
- https://www.suse.com/security/cve/CVE-2022-50086.html
- https://www.suse.com/security/cve/CVE-2022-50087.html
- https://www.suse.com/security/cve/CVE-2022-50092.html
- https://www.suse.com/security/cve/CVE-2022-50093.html
- https://www.suse.com/security/cve/CVE-2022-50094.html
- https://www.suse.com/security/cve/CVE-2022-50095.html
- https://www.suse.com/security/cve/CVE-2022-50097.html
- https://www.suse.com/security/cve/CVE-2022-50098.html
- https://www.suse.com/security/cve/CVE-2022-50099.html
- https://www.suse.com/security/cve/CVE-2022-50100.html
- https://www.suse.com/security/cve/CVE-2022-50101.html
- https://www.suse.com/security/cve/CVE-2022-50102.html
- https://www.suse.com/security/cve/CVE-2022-50103.html
- https://www.suse.com/security/cve/CVE-2022-50104.html
- https://www.suse.com/security/cve/CVE-2022-50108.html
- https://www.suse.com/security/cve/CVE-2022-50109.html
- https://www.suse.com/security/cve/CVE-2022-50110.html
- https://www.suse.com/security/cve/CVE-2022-50111.html
- https://www.suse.com/security/cve/CVE-2022-50112.html
- https://www.suse.com/security/cve/CVE-2022-50115.html
- https://www.suse.com/security/cve/CVE-2022-50116.html
- https://www.suse.com/security/cve/CVE-2022-50117.html
- https://www.suse.com/security/cve/CVE-2022-50118.html
- https://www.suse.com/security/cve/CVE-2022-50120.html
- https://www.suse.com/security/cve/CVE-2022-50121.html
- https://www.suse.com/security/cve/CVE-2022-50124.html
- https://www.suse.com/security/cve/CVE-2022-50125.html
- https://www.suse.com/security/cve/CVE-2022-50126.html
- https://www.suse.com/security/cve/CVE-2022-50127.html
- https://www.suse.com/security/cve/CVE-2022-50129.html
- https://www.suse.com/security/cve/CVE-2022-50131.html
- https://www.suse.com/security/cve/CVE-2022-50132.html
- https://www.suse.com/security/cve/CVE-2022-50133.html
- https://www.suse.com/security/cve/CVE-2022-50134.html
- https://www.suse.com/security/cve/CVE-2022-50135.html
- https://www.suse.com/security/cve/CVE-2022-50136.html
- https://www.suse.com/security/cve/CVE-2022-50137.html
- https://www.suse.com/security/cve/CVE-2022-50138.html
- https://www.suse.com/security/cve/CVE-2022-50139.html
- https://www.suse.com/security/cve/CVE-2022-50140.html
- https://www.suse.com/security/cve/CVE-2022-50141.html
- https://www.suse.com/security/cve/CVE-2022-50142.html
- https://www.suse.com/security/cve/CVE-2022-50143.html
- https://www.suse.com/security/cve/CVE-2022-50144.html
- https://www.suse.com/security/cve/CVE-2022-50145.html
- https://www.suse.com/security/cve/CVE-2022-50146.html
- https://www.suse.com/security/cve/CVE-2022-50149.html
- https://www.suse.com/security/cve/CVE-2022-50151.html
- https://www.suse.com/security/cve/CVE-2022-50152.html
- https://www.suse.com/security/cve/CVE-2022-50153.html
- https://www.suse.com/security/cve/CVE-2022-50154.html
- https://www.suse.com/security/cve/CVE-2022-50155.html
- https://www.suse.com/security/cve/CVE-2022-50156.html
- https://www.suse.com/security/cve/CVE-2022-50157.html
- https://www.suse.com/security/cve/CVE-2022-50158.html
- https://www.suse.com/security/cve/CVE-2022-50160.html
- https://www.suse.com/security/cve/CVE-2022-50161.html
- https://www.suse.com/security/cve/CVE-2022-50162.html
- https://www.suse.com/security/cve/CVE-2022-50164.html
- https://www.suse.com/security/cve/CVE-2022-50165.html
- https://www.suse.com/security/cve/CVE-2022-50166.html
- https://www.suse.com/security/cve/CVE-2022-50169.html
- https://www.suse.com/security/cve/CVE-2022-50171.html
- https://www.suse.com/security/cve/CVE-2022-50172.html
- https://www.suse.com/security/cve/CVE-2022-50173.html
- https://www.suse.com/security/cve/CVE-2022-50175.html
- https://www.suse.com/security/cve/CVE-2022-50176.html
- https://www.suse.com/security/cve/CVE-2022-50178.html
- https://www.suse.com/security/cve/CVE-2022-50179.html
- https://www.suse.com/security/cve/CVE-2022-50181.html
- https://www.suse.com/security/cve/CVE-2022-50183.html
- https://www.suse.com/security/cve/CVE-2022-50184.html
- https://www.suse.com/security/cve/CVE-2022-50185.html
- https://www.suse.com/security/cve/CVE-2022-50186.html
- https://www.suse.com/security/cve/CVE-2022-50187.html
- https://www.suse.com/security/cve/CVE-2022-50188.html
- https://www.suse.com/security/cve/CVE-2022-50190.html
- https://www.suse.com/security/cve/CVE-2022-50191.html
- https://www.suse.com/security/cve/CVE-2022-50192.html
- https://www.suse.com/security/cve/CVE-2022-50194.html
- https://www.suse.com/security/cve/CVE-2022-50196.html
- https://www.suse.com/security/cve/CVE-2022-50197.html
- https://www.suse.com/security/cve/CVE-2022-50198.html
- https://www.suse.com/security/cve/CVE-2022-50199.html
- https://www.suse.com/security/cve/CVE-2022-50200.html
- https://www.suse.com/security/cve/CVE-2022-50201.html
- https://www.suse.com/security/cve/CVE-2022-50202.html
- https://www.suse.com/security/cve/CVE-2022-50203.html
- https://www.suse.com/security/cve/CVE-2022-50204.html
- https://www.suse.com/security/cve/CVE-2022-50206.html
- https://www.suse.com/security/cve/CVE-2022-50207.html
- https://www.suse.com/security/cve/CVE-2022-50208.html
- https://www.suse.com/security/cve/CVE-2022-50209.html
- https://www.suse.com/security/cve/CVE-2022-50211.html
- https://www.suse.com/security/cve/CVE-2022-50212.html
- https://www.suse.com/security/cve/CVE-2022-50213.html
- https://www.suse.com/security/cve/CVE-2022-50215.html
- https://www.suse.com/security/cve/CVE-2022-50218.html
- https://www.suse.com/security/cve/CVE-2022-50220.html
- https://www.suse.com/security/cve/CVE-2022-50221.html
- https://www.suse.com/security/cve/CVE-2022-50222.html
- https://www.suse.com/security/cve/CVE-2022-50226.html
- https://www.suse.com/security/cve/CVE-2022-50228.html
- https://www.suse.com/security/cve/CVE-2022-50229.html
- https://www.suse.com/security/cve/CVE-2022-50231.html
- https://www.suse.com/security/cve/CVE-2023-3111.html
- https://www.suse.com/security/cve/CVE-2023-52924.html
- https://www.suse.com/security/cve/CVE-2023-52925.html
- https://www.suse.com/security/cve/CVE-2023-53046.html
- https://www.suse.com/security/cve/CVE-2023-53048.html
- https://www.suse.com/security/cve/CVE-2023-53076.html
- https://www.suse.com/security/cve/CVE-2023-53097.html
- https://www.suse.com/security/cve/CVE-2024-26808.html
- https://www.suse.com/security/cve/CVE-2024-26924.html
- https://www.suse.com/security/cve/CVE-2024-26935.html
- https://www.suse.com/security/cve/CVE-2024-27397.html
- https://www.suse.com/security/cve/CVE-2024-28956.html
- https://www.suse.com/security/cve/CVE-2024-35840.html
- https://www.suse.com/security/cve/CVE-2024-36978.html
- https://www.suse.com/security/cve/CVE-2024-46800.html
- https://www.suse.com/security/cve/CVE-2024-53125.html
- https://www.suse.com/security/cve/CVE-2024-53141.html
- https://www.suse.com/security/cve/CVE-2024-53197.html
- https://www.suse.com/security/cve/CVE-2024-56770.html
- https://www.suse.com/security/cve/CVE-2024-57999.html
- https://www.suse.com/security/cve/CVE-2025-21700.html
- https://www.suse.com/security/cve/CVE-2025-21702.html
- https://www.suse.com/security/cve/CVE-2025-21703.html
- https://www.suse.com/security/cve/CVE-2025-21756.html
- https://www.suse.com/security/cve/CVE-2025-23141.html
- https://www.suse.com/security/cve/CVE-2025-23145.html
- https://www.suse.com/security/cve/CVE-2025-37752.html
- https://www.suse.com/security/cve/CVE-2025-37785.html
- https://www.suse.com/security/cve/CVE-2025-37798.html
- https://www.suse.com/security/cve/CVE-2025-37823.html
- https://www.suse.com/security/cve/CVE-2025-37890.html
- https://www.suse.com/security/cve/CVE-2025-37932.html
- https://www.suse.com/security/cve/CVE-2025-37948.html
- https://www.suse.com/security/cve/CVE-2025-37953.html
- https://www.suse.com/security/cve/CVE-2025-37963.html
- https://www.suse.com/security/cve/CVE-2025-37997.html
- https://www.suse.com/security/cve/CVE-2025-38000.html
- https://www.suse.com/security/cve/CVE-2025-38001.html
- https://www.suse.com/security/cve/CVE-2025-38014.html
- https://www.suse.com/security/cve/CVE-2025-38060.html
- https://www.suse.com/security/cve/CVE-2025-38083.html
- https://bugzilla.suse.com/show_bug.cgi?id=1065729
- https://bugzilla.suse.com/show_bug.cgi?id=1156395
- https://bugzilla.suse.com/show_bug.cgi?id=1193629
- https://bugzilla.suse.com/show_bug.cgi?id=1194869
- https://bugzilla.suse.com/show_bug.cgi?id=1198410
- https://bugzilla.suse.com/show_bug.cgi?id=1199356
- https://bugzilla.suse.com/show_bug.cgi?id=1199487
- https://bugzilla.suse.com/show_bug.cgi?id=1201160
- https://bugzilla.suse.com/show_bug.cgi?id=1201956
- https://bugzilla.suse.com/show_bug.cgi?id=1202094
- https://bugzilla.suse.com/show_bug.cgi?id=1202095
- https://bugzilla.suse.com/show_bug.cgi?id=1202564
- https://bugzilla.suse.com/show_bug.cgi?id=1202716
- https://bugzilla.suse.com/show_bug.cgi?id=1202823
- https://bugzilla.suse.com/show_bug.cgi?id=1202860
- https://bugzilla.suse.com/show_bug.cgi?id=1203197
- https://bugzilla.suse.com/show_bug.cgi?id=1203361
- https://bugzilla.suse.com/show_bug.cgi?id=1205220
- https://bugzilla.suse.com/show_bug.cgi?id=1205514
- https://bugzilla.suse.com/show_bug.cgi?id=1205701
- https://bugzilla.suse.com/show_bug.cgi?id=1206451
- https://bugzilla.suse.com/show_bug.cgi?id=1206664
- https://bugzilla.suse.com/show_bug.cgi?id=1206878
- https://bugzilla.suse.com/show_bug.cgi?id=1206880
- https://bugzilla.suse.com/show_bug.cgi?id=1207361
- https://bugzilla.suse.com/show_bug.cgi?id=1207638
- https://bugzilla.suse.com/show_bug.cgi?id=1211226
- https://bugzilla.suse.com/show_bug.cgi?id=1212051
- https://bugzilla.suse.com/show_bug.cgi?id=1213090
- https://bugzilla.suse.com/show_bug.cgi?id=1218184
- https://bugzilla.suse.com/show_bug.cgi?id=1218234
- https://bugzilla.suse.com/show_bug.cgi?id=1218470
- https://bugzilla.suse.com/show_bug.cgi?id=1222634
- https://bugzilla.suse.com/show_bug.cgi?id=1223675
- https://bugzilla.suse.com/show_bug.cgi?id=1224095
- https://bugzilla.suse.com/show_bug.cgi?id=1224597
- https://bugzilla.suse.com/show_bug.cgi?id=1225468
- https://bugzilla.suse.com/show_bug.cgi?id=1225820
- https://bugzilla.suse.com/show_bug.cgi?id=1226514
- https://bugzilla.suse.com/show_bug.cgi?id=1226552
- https://bugzilla.suse.com/show_bug.cgi?id=1228659
- https://bugzilla.suse.com/show_bug.cgi?id=1230827
- https://bugzilla.suse.com/show_bug.cgi?id=1231293
- https://bugzilla.suse.com/show_bug.cgi?id=1232504
- https://bugzilla.suse.com/show_bug.cgi?id=1234156
- https://bugzilla.suse.com/show_bug.cgi?id=1234381
- https://bugzilla.suse.com/show_bug.cgi?id=1234454
- https://bugzilla.suse.com/show_bug.cgi?id=1235464
- https://bugzilla.suse.com/show_bug.cgi?id=1235637
- https://bugzilla.suse.com/show_bug.cgi?id=1236821
- https://bugzilla.suse.com/show_bug.cgi?id=1236822
- https://bugzilla.suse.com/show_bug.cgi?id=1237159
- https://bugzilla.suse.com/show_bug.cgi?id=1237312
- https://bugzilla.suse.com/show_bug.cgi?id=1237313
- https://bugzilla.suse.com/show_bug.cgi?id=1238303
- https://bugzilla.suse.com/show_bug.cgi?id=1238526
- https://bugzilla.suse.com/show_bug.cgi?id=1238570
- https://bugzilla.suse.com/show_bug.cgi?id=1238876
- https://bugzilla.suse.com/show_bug.cgi?id=1239986
- https://bugzilla.suse.com/show_bug.cgi?id=1240785
- https://bugzilla.suse.com/show_bug.cgi?id=1241038
- https://bugzilla.suse.com/show_bug.cgi?id=1241640
- https://bugzilla.suse.com/show_bug.cgi?id=1241900
- https://bugzilla.suse.com/show_bug.cgi?id=1242006
- https://bugzilla.suse.com/show_bug.cgi?id=1242221
- https://bugzilla.suse.com/show_bug.cgi?id=1242414
- https://bugzilla.suse.com/show_bug.cgi?id=1242504
- https://bugzilla.suse.com/show_bug.cgi?id=1242596
- https://bugzilla.suse.com/show_bug.cgi?id=1242778
- https://bugzilla.suse.com/show_bug.cgi?id=1242782
- https://bugzilla.suse.com/show_bug.cgi?id=1242924
- https://bugzilla.suse.com/show_bug.cgi?id=1243330
- https://bugzilla.suse.com/show_bug.cgi?id=1243543
- https://bugzilla.suse.com/show_bug.cgi?id=1243627
- https://bugzilla.suse.com/show_bug.cgi?id=1243649
- https://bugzilla.suse.com/show_bug.cgi?id=1243660
- https://bugzilla.suse.com/show_bug.cgi?id=1243832
- https://bugzilla.suse.com/show_bug.cgi?id=1244114
- https://bugzilla.suse.com/show_bug.cgi?id=1244179
- https://bugzilla.suse.com/show_bug.cgi?id=1244180
- https://bugzilla.suse.com/show_bug.cgi?id=1244234
- https://bugzilla.suse.com/show_bug.cgi?id=1244241
- https://bugzilla.suse.com/show_bug.cgi?id=1244277
- https://bugzilla.suse.com/show_bug.cgi?id=1244309
- https://bugzilla.suse.com/show_bug.cgi?id=1244337
- https://bugzilla.suse.com/show_bug.cgi?id=1244732
- https://bugzilla.suse.com/show_bug.cgi?id=1244764
- https://bugzilla.suse.com/show_bug.cgi?id=1244765
- https://bugzilla.suse.com/show_bug.cgi?id=1244767
- https://bugzilla.suse.com/show_bug.cgi?id=1244770
- https://bugzilla.suse.com/show_bug.cgi?id=1244771
- https://bugzilla.suse.com/show_bug.cgi?id=1244772
- https://bugzilla.suse.com/show_bug.cgi?id=1244773
- https://bugzilla.suse.com/show_bug.cgi?id=1244774
- https://bugzilla.suse.com/show_bug.cgi?id=1244776
- https://bugzilla.suse.com/show_bug.cgi?id=1244779
- https://bugzilla.suse.com/show_bug.cgi?id=1244780
- https://bugzilla.suse.com/show_bug.cgi?id=1244781
- https://bugzilla.suse.com/show_bug.cgi?id=1244782
- https://bugzilla.suse.com/show_bug.cgi?id=1244783
- https://bugzilla.suse.com/show_bug.cgi?id=1244784
- https://bugzilla.suse.com/show_bug.cgi?id=1244786
- https://bugzilla.suse.com/show_bug.cgi?id=1244787
- https://bugzilla.suse.com/show_bug.cgi?id=1244788
- https://bugzilla.suse.com/show_bug.cgi?id=1244790
- https://bugzilla.suse.com/show_bug.cgi?id=1244791
- https://bugzilla.suse.com/show_bug.cgi?id=1244793
- https://bugzilla.suse.com/show_bug.cgi?id=1244794
- https://bugzilla.suse.com/show_bug.cgi?id=1244796
- https://bugzilla.suse.com/show_bug.cgi?id=1244797
- https://bugzilla.suse.com/show_bug.cgi?id=1244798
- https://bugzilla.suse.com/show_bug.cgi?id=1244800
- https://bugzilla.suse.com/show_bug.cgi?id=1244802
- https://bugzilla.suse.com/show_bug.cgi?id=1244804
- https://bugzilla.suse.com/show_bug.cgi?id=1244805
- https://bugzilla.suse.com/show_bug.cgi?id=1244806
- https://bugzilla.suse.com/show_bug.cgi?id=1244807
- https://bugzilla.suse.com/show_bug.cgi?id=1244808
- https://bugzilla.suse.com/show_bug.cgi?id=1244811
- https://bugzilla.suse.com/show_bug.cgi?id=1244813
- https://bugzilla.suse.com/show_bug.cgi?id=1244814
- https://bugzilla.suse.com/show_bug.cgi?id=1244815
- https://bugzilla.suse.com/show_bug.cgi?id=1244816
- https://bugzilla.suse.com/show_bug.cgi?id=1244819
- https://bugzilla.suse.com/show_bug.cgi?id=1244820
- https://bugzilla.suse.com/show_bug.cgi?id=1244823
- https://bugzilla.suse.com/show_bug.cgi?id=1244824
- https://bugzilla.suse.com/show_bug.cgi?id=1244825
- https://bugzilla.suse.com/show_bug.cgi?id=1244826
- https://bugzilla.suse.com/show_bug.cgi?id=1244827
- https://bugzilla.suse.com/show_bug.cgi?id=1244830
- https://bugzilla.suse.com/show_bug.cgi?id=1244831
- https://bugzilla.suse.com/show_bug.cgi?id=1244832
- https://bugzilla.suse.com/show_bug.cgi?id=1244834
- https://bugzilla.suse.com/show_bug.cgi?id=1244836
- https://bugzilla.suse.com/show_bug.cgi?id=1244838
- https://bugzilla.suse.com/show_bug.cgi?id=1244839
- https://bugzilla.suse.com/show_bug.cgi?id=1244840
- https://bugzilla.suse.com/show_bug.cgi?id=1244841
- https://bugzilla.suse.com/show_bug.cgi?id=1244842
- https://bugzilla.suse.com/show_bug.cgi?id=1244843
- https://bugzilla.suse.com/show_bug.cgi?id=1244845
- https://bugzilla.suse.com/show_bug.cgi?id=1244846
- https://bugzilla.suse.com/show_bug.cgi?id=1244848
- https://bugzilla.suse.com/show_bug.cgi?id=1244849
- https://bugzilla.suse.com/show_bug.cgi?id=1244851
- https://bugzilla.suse.com/show_bug.cgi?id=1244853
- https://bugzilla.suse.com/show_bug.cgi?id=1244854
- https://bugzilla.suse.com/show_bug.cgi?id=1244856
- https://bugzilla.suse.com/show_bug.cgi?id=1244858
- https://bugzilla.suse.com/show_bug.cgi?id=1244860
- https://bugzilla.suse.com/show_bug.cgi?id=1244861
- https://bugzilla.suse.com/show_bug.cgi?id=1244866
- https://bugzilla.suse.com/show_bug.cgi?id=1244867
- https://bugzilla.suse.com/show_bug.cgi?id=1244868
- https://bugzilla.suse.com/show_bug.cgi?id=1244869
- https://bugzilla.suse.com/show_bug.cgi?id=1244870
- https://bugzilla.suse.com/show_bug.cgi?id=1244871
- https://bugzilla.suse.com/show_bug.cgi?id=1244872
- https://bugzilla.suse.com/show_bug.cgi?id=1244873
- https://bugzilla.suse.com/show_bug.cgi?id=1244875
- https://bugzilla.suse.com/show_bug.cgi?id=1244876
- https://bugzilla.suse.com/show_bug.cgi?id=1244878
- https://bugzilla.suse.com/show_bug.cgi?id=1244879
- https://bugzilla.suse.com/show_bug.cgi?id=1244881
- https://bugzilla.suse.com/show_bug.cgi?id=1244883
- https://bugzilla.suse.com/show_bug.cgi?id=1244884
- https://bugzilla.suse.com/show_bug.cgi?id=1244886
- https://bugzilla.suse.com/show_bug.cgi?id=1244887
- https://bugzilla.suse.com/show_bug.cgi?id=1244888
- https://bugzilla.suse.com/show_bug.cgi?id=1244890
- https://bugzilla.suse.com/show_bug.cgi?id=1244892
- https://bugzilla.suse.com/show_bug.cgi?id=1244893
- https://bugzilla.suse.com/show_bug.cgi?id=1244895
- https://bugzilla.suse.com/show_bug.cgi?id=1244898
- https://bugzilla.suse.com/show_bug.cgi?id=1244899
- https://bugzilla.suse.com/show_bug.cgi?id=1244900
- https://bugzilla.suse.com/show_bug.cgi?id=1244901
- https://bugzilla.suse.com/show_bug.cgi?id=1244902
- https://bugzilla.suse.com/show_bug.cgi?id=1244903
- https://bugzilla.suse.com/show_bug.cgi?id=1244904
- https://bugzilla.suse.com/show_bug.cgi?id=1244905
- https://bugzilla.suse.com/show_bug.cgi?id=1244908
- https://bugzilla.suse.com/show_bug.cgi?id=1244911
- https://bugzilla.suse.com/show_bug.cgi?id=1244912
- https://bugzilla.suse.com/show_bug.cgi?id=1244914
- https://bugzilla.suse.com/show_bug.cgi?id=1244915
- https://bugzilla.suse.com/show_bug.cgi?id=1244928
- https://bugzilla.suse.com/show_bug.cgi?id=1244936
- https://bugzilla.suse.com/show_bug.cgi?id=1244940
- https://bugzilla.suse.com/show_bug.cgi?id=1244941
- https://bugzilla.suse.com/show_bug.cgi?id=1244942
- https://bugzilla.suse.com/show_bug.cgi?id=1244943
- https://bugzilla.suse.com/show_bug.cgi?id=1244944
- https://bugzilla.suse.com/show_bug.cgi?id=1244945
- https://bugzilla.suse.com/show_bug.cgi?id=1244948
- https://bugzilla.suse.com/show_bug.cgi?id=1244949
- https://bugzilla.suse.com/show_bug.cgi?id=1244950
- https://bugzilla.suse.com/show_bug.cgi?id=1244953
- https://bugzilla.suse.com/show_bug.cgi?id=1244955
- https://bugzilla.suse.com/show_bug.cgi?id=1244956
- https://bugzilla.suse.com/show_bug.cgi?id=1244957
- https://bugzilla.suse.com/show_bug.cgi?id=1244958
- https://bugzilla.suse.com/show_bug.cgi?id=1244959
- https://bugzilla.suse.com/show_bug.cgi?id=1244960
- https://bugzilla.suse.com/show_bug.cgi?id=1244961
- https://bugzilla.suse.com/show_bug.cgi?id=1244965
- https://bugzilla.suse.com/show_bug.cgi?id=1244966
- https://bugzilla.suse.com/show_bug.cgi?id=1244967
- https://bugzilla.suse.com/show_bug.cgi?id=1244968
- https://bugzilla.suse.com/show_bug.cgi?id=1244969
- https://bugzilla.suse.com/show_bug.cgi?id=1244970
- https://bugzilla.suse.com/show_bug.cgi?id=1244973
- https://bugzilla.suse.com/show_bug.cgi?id=1244974
- https://bugzilla.suse.com/show_bug.cgi?id=1244976
- https://bugzilla.suse.com/show_bug.cgi?id=1244977
- https://bugzilla.suse.com/show_bug.cgi?id=1244978
- https://bugzilla.suse.com/show_bug.cgi?id=1244979
- https://bugzilla.suse.com/show_bug.cgi?id=1244983
- https://bugzilla.suse.com/show_bug.cgi?id=1244984
- https://bugzilla.suse.com/show_bug.cgi?id=1244985
- https://bugzilla.suse.com/show_bug.cgi?id=1244986
- https://bugzilla.suse.com/show_bug.cgi?id=1244987
- https://bugzilla.suse.com/show_bug.cgi?id=1244991
- https://bugzilla.suse.com/show_bug.cgi?id=1244992
- https://bugzilla.suse.com/show_bug.cgi?id=1244993
- https://bugzilla.suse.com/show_bug.cgi?id=1245006
- https://bugzilla.suse.com/show_bug.cgi?id=1245007
- https://bugzilla.suse.com/show_bug.cgi?id=1245009
- https://bugzilla.suse.com/show_bug.cgi?id=1245011
- https://bugzilla.suse.com/show_bug.cgi?id=1245012
- https://bugzilla.suse.com/show_bug.cgi?id=1245015
- https://bugzilla.suse.com/show_bug.cgi?id=1245018
- https://bugzilla.suse.com/show_bug.cgi?id=1245019
- https://bugzilla.suse.com/show_bug.cgi?id=1245023
- https://bugzilla.suse.com/show_bug.cgi?id=1245024
- https://bugzilla.suse.com/show_bug.cgi?id=1245028
- https://bugzilla.suse.com/show_bug.cgi?id=1245031
- https://bugzilla.suse.com/show_bug.cgi?id=1245032
- https://bugzilla.suse.com/show_bug.cgi?id=1245033
- https://bugzilla.suse.com/show_bug.cgi?id=1245038
- https://bugzilla.suse.com/show_bug.cgi?id=1245039
- https://bugzilla.suse.com/show_bug.cgi?id=1245040
- https://bugzilla.suse.com/show_bug.cgi?id=1245041
- https://bugzilla.suse.com/show_bug.cgi?id=1245047
- https://bugzilla.suse.com/show_bug.cgi?id=1245048
- https://bugzilla.suse.com/show_bug.cgi?id=1245051
- https://bugzilla.suse.com/show_bug.cgi?id=1245052
- https://bugzilla.suse.com/show_bug.cgi?id=1245057
- https://bugzilla.suse.com/show_bug.cgi?id=1245058
- https://bugzilla.suse.com/show_bug.cgi?id=1245060
- https://bugzilla.suse.com/show_bug.cgi?id=1245062
- https://bugzilla.suse.com/show_bug.cgi?id=1245063
- https://bugzilla.suse.com/show_bug.cgi?id=1245064
- https://bugzilla.suse.com/show_bug.cgi?id=1245069
- https://bugzilla.suse.com/show_bug.cgi?id=1245070
- https://bugzilla.suse.com/show_bug.cgi?id=1245072
- https://bugzilla.suse.com/show_bug.cgi?id=1245073
- https://bugzilla.suse.com/show_bug.cgi?id=1245088
- https://bugzilla.suse.com/show_bug.cgi?id=1245089
- https://bugzilla.suse.com/show_bug.cgi?id=1245092
- https://bugzilla.suse.com/show_bug.cgi?id=1245093
- https://bugzilla.suse.com/show_bug.cgi?id=1245094
- https://bugzilla.suse.com/show_bug.cgi?id=1245098
- https://bugzilla.suse.com/show_bug.cgi?id=1245103
- https://bugzilla.suse.com/show_bug.cgi?id=1245116
- https://bugzilla.suse.com/show_bug.cgi?id=1245117
- https://bugzilla.suse.com/show_bug.cgi?id=1245118
- https://bugzilla.suse.com/show_bug.cgi?id=1245119
- https://bugzilla.suse.com/show_bug.cgi?id=1245121
- https://bugzilla.suse.com/show_bug.cgi?id=1245122
- https://bugzilla.suse.com/show_bug.cgi?id=1245125
- https://bugzilla.suse.com/show_bug.cgi?id=1245129
- https://bugzilla.suse.com/show_bug.cgi?id=1245131
- https://bugzilla.suse.com/show_bug.cgi?id=1245133
- https://bugzilla.suse.com/show_bug.cgi?id=1245134
- https://bugzilla.suse.com/show_bug.cgi?id=1245135
- https://bugzilla.suse.com/show_bug.cgi?id=1245136
- https://bugzilla.suse.com/show_bug.cgi?id=1245138
- https://bugzilla.suse.com/show_bug.cgi?id=1245139
- https://bugzilla.suse.com/show_bug.cgi?id=1245140
- https://bugzilla.suse.com/show_bug.cgi?id=1245142
- https://bugzilla.suse.com/show_bug.cgi?id=1245146
- https://bugzilla.suse.com/show_bug.cgi?id=1245147
- https://bugzilla.suse.com/show_bug.cgi?id=1245149
- https://bugzilla.suse.com/show_bug.cgi?id=1245152
- https://bugzilla.suse.com/show_bug.cgi?id=1245154
- https://bugzilla.suse.com/show_bug.cgi?id=1245155
- https://bugzilla.suse.com/show_bug.cgi?id=1245180
- https://bugzilla.suse.com/show_bug.cgi?id=1245183
- https://bugzilla.suse.com/show_bug.cgi?id=1245189
- https://bugzilla.suse.com/show_bug.cgi?id=1245191
- https://bugzilla.suse.com/show_bug.cgi?id=1245195
- https://bugzilla.suse.com/show_bug.cgi?id=1245197
- https://bugzilla.suse.com/show_bug.cgi?id=1245265
- https://bugzilla.suse.com/show_bug.cgi?id=1245340
- https://bugzilla.suse.com/show_bug.cgi?id=1245348
- https://bugzilla.suse.com/show_bug.cgi?id=1245431
- https://bugzilla.suse.com/show_bug.cgi?id=1245455
- https://jira.suse.com/browse/PED-10028
- https://jira.suse.com/browse/PED-12251