Security update for the Linux Kernel
| Announcement ID: | SUSE-SU-2024:2185-1 | 
|---|---|
| Rating: | important | 
| References: | 
                
  | 
        
| Cross-References: | 
                    
  | 
            
| CVSS scores: | 
                    
  | 
            
| Affected Products: | 
                
  | 
        
An update that solves 187 vulnerabilities and has 26 security fixes can now be installed.
Description:
The SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security bugfixes.
The following security bugs were fixed:
- CVE-2021-47378: Destroy cm id before destroy qp to avoid use after free (bsc#1225201).
 - CVE-2021-47496: Fix flipped sign in tls_err_abort() calls (bsc#1225354)
 - CVE-2021-47402: Protect fl_walk() with rcu (bsc#1225301)
 - CVE-2022-48673: kABI workarounds for struct smc_link (bsc#1223934).
 - CVE-2023-52871: Handle a second device without data corruption (bsc#1225534)
 - CVE-2024-26828: Fix underflow in parse_server_interfaces() (bsc#1223084).
 - CVE-2021-47497: Fixed shift-out-of-bound (UBSAN) with byte size cells (bsc#1225355).
 - CVE-2021-47500: Fixed trigger reference couting (bsc#1225360).
 - CVE-2024-27413: Fix incorrect allocation size (bsc#1224438).
 - CVE-2021-47383: Fiedx out-of-bound vmalloc access in imageblit (bsc#1225208).
 - CVE-2021-47511: Fixed negative period/buffer sizes (bsc#1225411).
 - CVE-2023-52840: Fix use after free in rmi_unregister_function() (bsc#1224928).
 - CVE-2021-47261: Fix initializing CQ fragments buffer (bsc#1224954)
 - CVE-2021-47254: Fix use-after-free in gfs2_glock_shrink_scan (bsc#1224888).
 - CVE-2024-27398: Fixed use-after-free bugs caused by sco_sock_timeout (bsc#1224174).
 - CVE-2024-26921: Preserve kabi for sk_buff (bsc#1223138).
 - CVE-2023-52655: Check packet for fixup for true limit (bsc#1217169).
 - CVE-2023-4244: Fixed a use-after-free in the nf_tables component, which could be exploited to achieve local privilege escalation (bsc#1215420).
 - CVE-2023-4244: Fixed a use-after-free in the nf_tables component, which could be exploited to achieve local privilege escalation (bsc#1215420).
 - CVE-2023-1829: Fixed a use-after-free vulnerability in the control index filter (tcindex) (bsc#1210335).
 - CVE-2023-52686: Fix a null pointer in opal_event_init() (bsc#1065729).
 
The following non-security bugs were fixed:
- af_unix: annote lockless accesses to unix_tot_inflight & gc_in_progress (bsc#1223384).
 - af_unix: Do not use atomic ops for unix_sk(sk)->inflight (bsc#1223384).
 - af_unix: Replace BUG_ON() with WARN_ON_ONCE() (bsc#1223384).
 - btrfs: do not start relocation until in progress drops are done (bsc#1222251).
 - btrfs: do not start relocation until in progress drops are done (bsc#1222251).
 - cifs: add missing spinlock around tcon refcount (bsc#1213476).
 - cifs: avoid dup prefix path in dfs_get_automount_devname() (bsc#1213476).
 - cifs: avoid race conditions with parallel reconnects (bsc#1213476).
 - cifs: avoid re-lookups in dfs_cache_find() (bsc#1213476).
 - cifs: avoid use of global locks for high contention data (bsc#1213476).
 - cifs: check only tcon status on tcon related functions (bsc#1213476).
 - cifs: do all necessary checks for credits within or before locking (bsc#1213476).
 - cifs: do not block in dfs_cache_noreq_update_tgthint() (bsc#1213476).
 - cifs: do not refresh cached referrals from unactive mounts (bsc#1213476).
 - cifs: do not take exclusive lock for updating target hints (bsc#1213476).
 - cifs: fix confusing debug message (bsc#1213476).
 - cifs: fix missing unload_nls() in smb2_reconnect() (bsc#1213476).
 - cifs: fix potential deadlock in cache_refresh_path() (bsc#1213476).
 - cifs: fix refresh of cached referrals (bsc#1213476).
 - cifs: fix return of uninitialized rc in dfs_cache_update_tgthint() (bsc#1213476).
 - cifs: fix source pathname comparison of dfs supers (bsc#1213476).
 - cifs: fix status checks in cifs_tree_connect (bsc#1213476).
 - cifs: fix use-after-free bug in refresh_cache_worker() (bsc#1213476).
 - cifs: get rid of dns resolve worker (bsc#1213476).
 - cifs: get rid of mount options string parsing (bsc#1213476).
 - cifs: handle cache lookup errors different than -ENOENT (bsc#1213476).
 - cifs: ignore ipc reconnect failures during dfs failover (bsc#1213476).
 - cifs: match even the scope id for ipv6 addresses (bsc#1213476).
 - cifs: optimize reconnect of nested links (bsc#1213476).
 - cifs: prevent data race in smb2_reconnect() (bsc#1213476).
 - cifs: refresh root referrals (bsc#1213476).
 - cifs: remove duplicate code in __refresh_tcon() (bsc#1213476).
 - cifs: remove unused function (bsc#1213476).
 - cifs: remove unused smb3_fs_context::mount_options (bsc#1213476).
 - cifs: return DFS root session id in DebugData (bsc#1213476).
 - cifs: reuse cifs_match_ipaddr for comparison of dstaddr too (bsc#1213476).
 - cifs: set correct ipc status after initial tree connect (bsc#1213476).
 - cifs: set correct status of tcon ipc when reconnecting (bsc#1213476).
 - cifs: set correct tcon status after initial tree connect (bsc#1213476).
 - cifs: set DFS root session in cifs_get_smb_ses() (bsc#1213476).
 - cifs: set resolved ip in sockaddr (bsc#1213476).
 - cifs: share dfs connections and supers (bsc#1213476).
 - cifs: split out ses and tcon retrieval from mount_get_conns() (bsc#1213476).
 - cifs: use fs_context for automounts (bsc#1213476).
 - cifs: use origin fullpath for automounts (bsc#1213476).
 - cifs: use tcon allocation functions even for dummy tcon (bsc#1213476).
 - netfilter: nf_tables: defer gc run if previous batch is still pending (git-fixes).
 - netfilter: nf_tables: fix GC transaction races with netns and netlink event exit path (git-fixes).
 - netfilter: nf_tables: fix kdoc warnings after gc rework (git-fixes).
 - netfilter: nf_tables: fix memleak when more than 255 elements expired (git-fixes).
 - netfilter: nf_tables: GC transaction race with abort path (git-fixes).
 - netfilter: nf_tables: GC transaction race with netns dismantle (git-fixes).
 - netfilter: nf_tables: mark newset as dead on transaction abort (git-fixes).
 - netfilter: nf_tables: mark set as dead when unbinding anonymous set with timeout (git-fixes).
 - netfilter: nf_tables: nft_set_rbtree: fix spurious insertion failure (git-fixes).
 - netfilter: nf_tables: release mutex after nft_gc_seq_end from abort path (git-fixes).
 - netfilter: nf_tables: skip dead set elements in netlink dump (git-fixes).
 - netfilter: nf_tables: use correct lock to protect gc_list (git-fixes).
 - netfilter: nft_set_hash: try later when GC hits EAGAIN on iteration (git-fixes).
 - netfilter: nft_set_rbtree: Add missing expired checks (git-fixes).
 - netfilter: nft_set_rbtree: bogus lookup/get on consecutive elements in named sets (git-fixes).
 - netfilter: nft_set_rbtree: Detect partial overlap with start endpoint match (git-fixes).
 - netfilter: nft_set_rbtree: Detect partial overlaps on insertion (git-fixes).
 - netfilter: nft_set_rbtree: Do not account for expired elements on insertion (git-fixes).
 - netfilter: nft_set_rbtree: Drop spurious condition for overlap detection on insertion (git-fixes).
 - netfilter: nft_set_rbtree: fix null deref on element insertion (git-fixes).
 - netfilter: nft_set_rbtree: fix overlap expiration walk (git-fixes).
 - netfilter: nft_set_rbtree: Handle outcomes of tree rotations in overlap detection (git-fixes).
 - netfilter: nft_set_rbtree: Introduce and use nft_rbtree_interval_start() (git-fixes).
 - netfilter: nft_set_rbtree: overlap detection with element re-addition after deletion (git-fixes).
 - netfilter: nft_set_rbtree: skip elements in transaction from garbage collection (git-fixes).
 - netfilter: nft_set_rbtree: skip end interval element from gc (git-fixes).
 - netfilter: nft_set_rbtree: skip sync GC for new elements in this transaction (git-fixes).
 - netfilter: nft_set_rbtree: Switch to node list walk for overlap detection (git-fixes).
 - netfilter: nft_set_rbtree: use read spinlock to avoid datapath contention (git-fixes).
 - NFC: nxp: add NXP1002 (bsc#1185589).
 - PCI: rpaphp: Add MODULE_DESCRIPTION (bsc#1176869 ltc#188243).
 - smb: client: fix dfs link mount against w2k8 (git-fixes).
 - smb: client: fix null auth (bsc#1213476).
 - smb: client: set correct id, uid and cruid for multiuser automounts (git-fixes).
 - x86/xen: Drop USERGS_SYSRET64 paravirt call (git-fixes).
 
Special Instructions and Notes:
- Please reboot the system after installing this update.
 
Patch Instructions:
        To install this SUSE  update use the SUSE recommended
        installation methods like YaST online_update or "zypper patch".
        Alternatively you can run the command listed for your product:
    
- 
                openSUSE Leap 15.3
                
                    
                        
zypper in -t patch SUSE-2024-2185=1 - 
                SUSE Linux Enterprise Live Patching 15-SP3
                
                    
                        
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP3-2024-2185=1 - 
                SUSE Linux Enterprise High Availability Extension 15 SP3
                
                    
                        
zypper in -t patch SUSE-SLE-Product-HA-15-SP3-2024-2185=1 - 
                SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
                
                    
                        
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-2185=1 - 
                SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
                
                    
                        
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-2185=1 - 
                SUSE Linux Enterprise Server for SAP Applications 15 SP3
                
                    
                        
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-2185=1 - 
                SUSE Enterprise Storage 7.1
                
                    
                        
zypper in -t patch SUSE-Storage-7.1-2024-2185=1 - 
                SUSE Linux Enterprise Micro 5.1
                
                    
                        
zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-2185=1 - 
                SUSE Linux Enterprise Micro 5.2
                
                    
                        
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-2185=1 - 
                SUSE Linux Enterprise Micro for Rancher 5.2
                
                    
                        
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-2185=1 
Package List:
- 
                    openSUSE Leap 15.3 (noarch nosrc)
                    
- kernel-docs-5.3.18-150300.59.164.1
 
 - 
                    openSUSE Leap 15.3 (noarch)
                    
- kernel-macros-5.3.18-150300.59.164.1
 - kernel-source-5.3.18-150300.59.164.1
 - kernel-source-vanilla-5.3.18-150300.59.164.1
 - kernel-devel-5.3.18-150300.59.164.1
 - kernel-docs-html-5.3.18-150300.59.164.1
 
 - 
                    openSUSE Leap 15.3 (nosrc ppc64le x86_64)
                    
- kernel-kvmsmall-5.3.18-150300.59.164.1
 - kernel-debug-5.3.18-150300.59.164.1
 
 - 
                    openSUSE Leap 15.3 (ppc64le x86_64)
                    
- kernel-kvmsmall-devel-5.3.18-150300.59.164.1
 - kernel-debug-devel-5.3.18-150300.59.164.1
 - kernel-debug-livepatch-devel-5.3.18-150300.59.164.1
 - kernel-kvmsmall-debugsource-5.3.18-150300.59.164.1
 - kernel-debug-debugsource-5.3.18-150300.59.164.1
 - kernel-debug-debuginfo-5.3.18-150300.59.164.1
 - kernel-debug-devel-debuginfo-5.3.18-150300.59.164.1
 - kernel-kvmsmall-devel-debuginfo-5.3.18-150300.59.164.1
 - kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.164.1
 - kernel-kvmsmall-debuginfo-5.3.18-150300.59.164.1
 
 - 
                    openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64)
                    
- cluster-md-kmp-default-debuginfo-5.3.18-150300.59.164.1
 - kernel-obs-build-5.3.18-150300.59.164.1
 - dlm-kmp-default-debuginfo-5.3.18-150300.59.164.1
 - kernel-default-debugsource-5.3.18-150300.59.164.1
 - cluster-md-kmp-default-5.3.18-150300.59.164.1
 - ocfs2-kmp-default-5.3.18-150300.59.164.1
 - ocfs2-kmp-default-debuginfo-5.3.18-150300.59.164.1
 - gfs2-kmp-default-debuginfo-5.3.18-150300.59.164.1
 - kernel-obs-build-debugsource-5.3.18-150300.59.164.1
 - kernel-default-debuginfo-5.3.18-150300.59.164.1
 - kernel-default-livepatch-devel-5.3.18-150300.59.164.1
 - kernel-default-devel-debuginfo-5.3.18-150300.59.164.1
 - kernel-default-base-5.3.18-150300.59.164.1.150300.18.96.1
 - dlm-kmp-default-5.3.18-150300.59.164.1
 - kernel-default-livepatch-5.3.18-150300.59.164.1
 - kernel-default-extra-5.3.18-150300.59.164.1
 - kernel-default-optional-5.3.18-150300.59.164.1
 - kernel-syms-5.3.18-150300.59.164.1
 - kselftests-kmp-default-5.3.18-150300.59.164.1
 - gfs2-kmp-default-5.3.18-150300.59.164.1
 - kernel-default-optional-debuginfo-5.3.18-150300.59.164.1
 - kselftests-kmp-default-debuginfo-5.3.18-150300.59.164.1
 - reiserfs-kmp-default-5.3.18-150300.59.164.1
 - kernel-default-devel-5.3.18-150300.59.164.1
 - kernel-default-base-rebuild-5.3.18-150300.59.164.1.150300.18.96.1
 - reiserfs-kmp-default-debuginfo-5.3.18-150300.59.164.1
 - kernel-default-extra-debuginfo-5.3.18-150300.59.164.1
 - kernel-obs-qa-5.3.18-150300.59.164.1
 
 - 
                    openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 nosrc)
                    
- kernel-default-5.3.18-150300.59.164.1
 
 - 
                    openSUSE Leap 15.3 (ppc64le s390x x86_64)
                    
- kernel-livepatch-SLE15-SP3_Update_45-debugsource-1-150300.7.3.1
 - kernel-livepatch-5_3_18-150300_59_164-default-1-150300.7.3.1
 - kernel-livepatch-5_3_18-150300_59_164-default-debuginfo-1-150300.7.3.1
 
 - 
                    openSUSE Leap 15.3 (x86_64)
                    
- kernel-livepatch-5_3_18-150300_59_164-preempt-debuginfo-1-150300.7.3.1
 - kernel-livepatch-5_3_18-150300_59_164-preempt-1-150300.7.3.1
 
 - 
                    openSUSE Leap 15.3 (aarch64 x86_64)
                    
- cluster-md-kmp-preempt-5.3.18-150300.59.164.1
 - gfs2-kmp-preempt-debuginfo-5.3.18-150300.59.164.1
 - ocfs2-kmp-preempt-5.3.18-150300.59.164.1
 - kselftests-kmp-preempt-debuginfo-5.3.18-150300.59.164.1
 - kernel-preempt-debugsource-5.3.18-150300.59.164.1
 - gfs2-kmp-preempt-5.3.18-150300.59.164.1
 - kselftests-kmp-preempt-5.3.18-150300.59.164.1
 - cluster-md-kmp-preempt-debuginfo-5.3.18-150300.59.164.1
 - kernel-preempt-debuginfo-5.3.18-150300.59.164.1
 - reiserfs-kmp-preempt-debuginfo-5.3.18-150300.59.164.1
 - kernel-preempt-optional-5.3.18-150300.59.164.1
 - kernel-preempt-extra-5.3.18-150300.59.164.1
 - dlm-kmp-preempt-5.3.18-150300.59.164.1
 - kernel-preempt-devel-debuginfo-5.3.18-150300.59.164.1
 - kernel-preempt-optional-debuginfo-5.3.18-150300.59.164.1
 - kernel-preempt-devel-5.3.18-150300.59.164.1
 - kernel-preempt-livepatch-devel-5.3.18-150300.59.164.1
 - reiserfs-kmp-preempt-5.3.18-150300.59.164.1
 - ocfs2-kmp-preempt-debuginfo-5.3.18-150300.59.164.1
 - dlm-kmp-preempt-debuginfo-5.3.18-150300.59.164.1
 - kernel-preempt-extra-debuginfo-5.3.18-150300.59.164.1
 
 - 
                    openSUSE Leap 15.3 (aarch64 nosrc x86_64)
                    
- kernel-preempt-5.3.18-150300.59.164.1
 
 - 
                    openSUSE Leap 15.3 (nosrc s390x)
                    
- kernel-zfcpdump-5.3.18-150300.59.164.1
 
 - 
                    openSUSE Leap 15.3 (s390x)
                    
- kernel-zfcpdump-debugsource-5.3.18-150300.59.164.1
 - kernel-zfcpdump-debuginfo-5.3.18-150300.59.164.1
 
 - 
                    openSUSE Leap 15.3 (nosrc)
                    
- dtb-aarch64-5.3.18-150300.59.164.1
 
 - 
                    openSUSE Leap 15.3 (aarch64)
                    
- dtb-rockchip-5.3.18-150300.59.164.1
 - dtb-sprd-5.3.18-150300.59.164.1
 - dtb-hisilicon-5.3.18-150300.59.164.1
 - dtb-arm-5.3.18-150300.59.164.1
 - kernel-64kb-debugsource-5.3.18-150300.59.164.1
 - kernel-64kb-livepatch-devel-5.3.18-150300.59.164.1
 - reiserfs-kmp-64kb-5.3.18-150300.59.164.1
 - dtb-freescale-5.3.18-150300.59.164.1
 - kernel-64kb-optional-5.3.18-150300.59.164.1
 - ocfs2-kmp-64kb-debuginfo-5.3.18-150300.59.164.1
 - dtb-apm-5.3.18-150300.59.164.1
 - dtb-exynos-5.3.18-150300.59.164.1
 - dtb-socionext-5.3.18-150300.59.164.1
 - kernel-64kb-optional-debuginfo-5.3.18-150300.59.164.1
 - kernel-64kb-devel-debuginfo-5.3.18-150300.59.164.1
 - dtb-amd-5.3.18-150300.59.164.1
 - dlm-kmp-64kb-debuginfo-5.3.18-150300.59.164.1
 - dtb-qcom-5.3.18-150300.59.164.1
 - dtb-marvell-5.3.18-150300.59.164.1
 - dtb-mediatek-5.3.18-150300.59.164.1
 - dtb-altera-5.3.18-150300.59.164.1
 - dtb-broadcom-5.3.18-150300.59.164.1
 - dtb-zte-5.3.18-150300.59.164.1
 - kernel-64kb-debuginfo-5.3.18-150300.59.164.1
 - ocfs2-kmp-64kb-5.3.18-150300.59.164.1
 - kselftests-kmp-64kb-5.3.18-150300.59.164.1
 - dlm-kmp-64kb-5.3.18-150300.59.164.1
 - gfs2-kmp-64kb-5.3.18-150300.59.164.1
 - kernel-64kb-devel-5.3.18-150300.59.164.1
 - dtb-cavium-5.3.18-150300.59.164.1
 - kselftests-kmp-64kb-debuginfo-5.3.18-150300.59.164.1
 - dtb-renesas-5.3.18-150300.59.164.1
 - dtb-xilinx-5.3.18-150300.59.164.1
 - reiserfs-kmp-64kb-debuginfo-5.3.18-150300.59.164.1
 - cluster-md-kmp-64kb-5.3.18-150300.59.164.1
 - kernel-64kb-extra-5.3.18-150300.59.164.1
 - gfs2-kmp-64kb-debuginfo-5.3.18-150300.59.164.1
 - cluster-md-kmp-64kb-debuginfo-5.3.18-150300.59.164.1
 - dtb-nvidia-5.3.18-150300.59.164.1
 - dtb-amlogic-5.3.18-150300.59.164.1
 - kernel-64kb-extra-debuginfo-5.3.18-150300.59.164.1
 - dtb-al-5.3.18-150300.59.164.1
 - dtb-lg-5.3.18-150300.59.164.1
 - dtb-allwinner-5.3.18-150300.59.164.1
 
 - 
                    openSUSE Leap 15.3 (aarch64 nosrc)
                    
- kernel-64kb-5.3.18-150300.59.164.1
 
 - 
                    SUSE Linux Enterprise Live Patching 15-SP3 (nosrc)
                    
- kernel-default-5.3.18-150300.59.164.1
 
 - 
                    SUSE Linux Enterprise Live Patching 15-SP3 (ppc64le s390x x86_64)
                    
- kernel-default-debuginfo-5.3.18-150300.59.164.1
 - kernel-default-livepatch-devel-5.3.18-150300.59.164.1
 - kernel-default-debugsource-5.3.18-150300.59.164.1
 - kernel-livepatch-5_3_18-150300_59_164-default-1-150300.7.3.1
 - kernel-default-livepatch-5.3.18-150300.59.164.1
 
 - 
                    SUSE Linux Enterprise High Availability Extension 15 SP3 (aarch64 ppc64le s390x x86_64)
                    
- cluster-md-kmp-default-debuginfo-5.3.18-150300.59.164.1
 - kernel-default-debuginfo-5.3.18-150300.59.164.1
 - dlm-kmp-default-debuginfo-5.3.18-150300.59.164.1
 - dlm-kmp-default-5.3.18-150300.59.164.1
 - kernel-default-debugsource-5.3.18-150300.59.164.1
 - cluster-md-kmp-default-5.3.18-150300.59.164.1
 - gfs2-kmp-default-5.3.18-150300.59.164.1
 - ocfs2-kmp-default-5.3.18-150300.59.164.1
 - ocfs2-kmp-default-debuginfo-5.3.18-150300.59.164.1
 - gfs2-kmp-default-debuginfo-5.3.18-150300.59.164.1
 
 - 
                    SUSE Linux Enterprise High Availability Extension 15 SP3 (nosrc)
                    
- kernel-default-5.3.18-150300.59.164.1
 
 - 
                    SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 nosrc)
                    
- kernel-64kb-5.3.18-150300.59.164.1
 
 - 
                    SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64)
                    
- kernel-64kb-devel-debuginfo-5.3.18-150300.59.164.1
 - kernel-64kb-debuginfo-5.3.18-150300.59.164.1
 - kernel-64kb-debugsource-5.3.18-150300.59.164.1
 - kernel-64kb-devel-5.3.18-150300.59.164.1
 
 - 
                    SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 nosrc x86_64)
                    
- kernel-preempt-5.3.18-150300.59.164.1
 - kernel-default-5.3.18-150300.59.164.1
 
 - 
                    SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64)
                    
- kernel-obs-build-5.3.18-150300.59.164.1
 - kernel-default-debuginfo-5.3.18-150300.59.164.1
 - kernel-default-devel-debuginfo-5.3.18-150300.59.164.1
 - kernel-default-base-5.3.18-150300.59.164.1.150300.18.96.1
 - kernel-default-debugsource-5.3.18-150300.59.164.1
 - kernel-preempt-debuginfo-5.3.18-150300.59.164.1
 - reiserfs-kmp-default-debuginfo-5.3.18-150300.59.164.1
 - kernel-preempt-devel-5.3.18-150300.59.164.1
 - kernel-syms-5.3.18-150300.59.164.1
 - reiserfs-kmp-default-5.3.18-150300.59.164.1
 - kernel-preempt-devel-debuginfo-5.3.18-150300.59.164.1
 - kernel-default-devel-5.3.18-150300.59.164.1
 - kernel-preempt-debugsource-5.3.18-150300.59.164.1
 - kernel-obs-build-debugsource-5.3.18-150300.59.164.1
 
 - 
                    SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch)
                    
- kernel-source-5.3.18-150300.59.164.1
 - kernel-macros-5.3.18-150300.59.164.1
 - kernel-devel-5.3.18-150300.59.164.1
 
 - 
                    SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch nosrc)
                    
- kernel-docs-5.3.18-150300.59.164.1
 
 - 
                    SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 nosrc)
                    
- kernel-64kb-5.3.18-150300.59.164.1
 
 - 
                    SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64)
                    
- kernel-64kb-devel-debuginfo-5.3.18-150300.59.164.1
 - kernel-64kb-debuginfo-5.3.18-150300.59.164.1
 - kernel-64kb-debugsource-5.3.18-150300.59.164.1
 - kernel-64kb-devel-5.3.18-150300.59.164.1
 
 - 
                    SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64 nosrc)
                    
- kernel-default-5.3.18-150300.59.164.1
 
 - 
                    SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64)
                    
- kernel-obs-build-5.3.18-150300.59.164.1
 - kernel-default-debuginfo-5.3.18-150300.59.164.1
 - kernel-default-devel-debuginfo-5.3.18-150300.59.164.1
 - kernel-default-base-5.3.18-150300.59.164.1.150300.18.96.1
 - kernel-default-debugsource-5.3.18-150300.59.164.1
 - reiserfs-kmp-default-debuginfo-5.3.18-150300.59.164.1
 - kernel-syms-5.3.18-150300.59.164.1
 - reiserfs-kmp-default-5.3.18-150300.59.164.1
 - kernel-default-devel-5.3.18-150300.59.164.1
 - kernel-obs-build-debugsource-5.3.18-150300.59.164.1
 
 - 
                    SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch)
                    
- kernel-source-5.3.18-150300.59.164.1
 - kernel-macros-5.3.18-150300.59.164.1
 - kernel-devel-5.3.18-150300.59.164.1
 
 - 
                    SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch nosrc)
                    
- kernel-docs-5.3.18-150300.59.164.1
 
 - 
                    SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 nosrc x86_64)
                    
- kernel-preempt-5.3.18-150300.59.164.1
 
 - 
                    SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 x86_64)
                    
- kernel-preempt-devel-debuginfo-5.3.18-150300.59.164.1
 - kernel-preempt-debuginfo-5.3.18-150300.59.164.1
 - kernel-preempt-debugsource-5.3.18-150300.59.164.1
 - kernel-preempt-devel-5.3.18-150300.59.164.1
 
 - 
                    SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (nosrc s390x)
                    
- kernel-zfcpdump-5.3.18-150300.59.164.1
 
 - 
                    SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (s390x)
                    
- kernel-zfcpdump-debugsource-5.3.18-150300.59.164.1
 - kernel-zfcpdump-debuginfo-5.3.18-150300.59.164.1
 
 - 
                    SUSE Linux Enterprise Server for SAP Applications 15 SP3 (nosrc ppc64le x86_64)
                    
- kernel-default-5.3.18-150300.59.164.1
 
 - 
                    SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
                    
- kernel-obs-build-5.3.18-150300.59.164.1
 - kernel-default-debuginfo-5.3.18-150300.59.164.1
 - kernel-default-devel-debuginfo-5.3.18-150300.59.164.1
 - kernel-default-base-5.3.18-150300.59.164.1.150300.18.96.1
 - kernel-default-debugsource-5.3.18-150300.59.164.1
 - reiserfs-kmp-default-debuginfo-5.3.18-150300.59.164.1
 - kernel-syms-5.3.18-150300.59.164.1
 - reiserfs-kmp-default-5.3.18-150300.59.164.1
 - kernel-default-devel-5.3.18-150300.59.164.1
 - kernel-obs-build-debugsource-5.3.18-150300.59.164.1
 
 - 
                    SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch)
                    
- kernel-source-5.3.18-150300.59.164.1
 - kernel-macros-5.3.18-150300.59.164.1
 - kernel-devel-5.3.18-150300.59.164.1
 
 - 
                    SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch nosrc)
                    
- kernel-docs-5.3.18-150300.59.164.1
 
 - 
                    SUSE Linux Enterprise Server for SAP Applications 15 SP3 (nosrc x86_64)
                    
- kernel-preempt-5.3.18-150300.59.164.1
 
 - 
                    SUSE Linux Enterprise Server for SAP Applications 15 SP3 (x86_64)
                    
- kernel-preempt-devel-debuginfo-5.3.18-150300.59.164.1
 - kernel-preempt-debuginfo-5.3.18-150300.59.164.1
 - kernel-preempt-debugsource-5.3.18-150300.59.164.1
 - kernel-preempt-devel-5.3.18-150300.59.164.1
 
 - 
                    SUSE Enterprise Storage 7.1 (aarch64 nosrc)
                    
- kernel-64kb-5.3.18-150300.59.164.1
 
 - 
                    SUSE Enterprise Storage 7.1 (aarch64)
                    
- kernel-64kb-devel-debuginfo-5.3.18-150300.59.164.1
 - kernel-64kb-debuginfo-5.3.18-150300.59.164.1
 - kernel-64kb-debugsource-5.3.18-150300.59.164.1
 - kernel-64kb-devel-5.3.18-150300.59.164.1
 
 - 
                    SUSE Enterprise Storage 7.1 (aarch64 nosrc x86_64)
                    
- kernel-preempt-5.3.18-150300.59.164.1
 - kernel-default-5.3.18-150300.59.164.1
 
 - 
                    SUSE Enterprise Storage 7.1 (aarch64 x86_64)
                    
- kernel-obs-build-5.3.18-150300.59.164.1
 - kernel-default-debuginfo-5.3.18-150300.59.164.1
 - kernel-default-devel-debuginfo-5.3.18-150300.59.164.1
 - kernel-default-base-5.3.18-150300.59.164.1.150300.18.96.1
 - kernel-default-debugsource-5.3.18-150300.59.164.1
 - kernel-preempt-debuginfo-5.3.18-150300.59.164.1
 - reiserfs-kmp-default-debuginfo-5.3.18-150300.59.164.1
 - kernel-preempt-devel-5.3.18-150300.59.164.1
 - kernel-syms-5.3.18-150300.59.164.1
 - reiserfs-kmp-default-5.3.18-150300.59.164.1
 - kernel-preempt-devel-debuginfo-5.3.18-150300.59.164.1
 - kernel-default-devel-5.3.18-150300.59.164.1
 - kernel-preempt-debugsource-5.3.18-150300.59.164.1
 - kernel-obs-build-debugsource-5.3.18-150300.59.164.1
 
 - 
                    SUSE Enterprise Storage 7.1 (noarch)
                    
- kernel-source-5.3.18-150300.59.164.1
 - kernel-macros-5.3.18-150300.59.164.1
 - kernel-devel-5.3.18-150300.59.164.1
 
 - 
                    SUSE Enterprise Storage 7.1 (noarch nosrc)
                    
- kernel-docs-5.3.18-150300.59.164.1
 
 - 
                    SUSE Linux Enterprise Micro 5.1 (aarch64 nosrc s390x x86_64)
                    
- kernel-default-5.3.18-150300.59.164.1
 
 - 
                    SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64)
                    
- kernel-default-debuginfo-5.3.18-150300.59.164.1
 - kernel-default-base-5.3.18-150300.59.164.1.150300.18.96.1
 - kernel-default-debugsource-5.3.18-150300.59.164.1
 
 - 
                    SUSE Linux Enterprise Micro 5.2 (aarch64 nosrc s390x x86_64)
                    
- kernel-default-5.3.18-150300.59.164.1
 
 - 
                    SUSE Linux Enterprise Micro 5.2 (aarch64 x86_64)
                    
- kernel-default-base-5.3.18-150300.59.164.1.150300.18.96.1
 
 - 
                    SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64)
                    
- kernel-default-debuginfo-5.3.18-150300.59.164.1
 - kernel-default-debugsource-5.3.18-150300.59.164.1
 
 - 
                    SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 nosrc s390x x86_64)
                    
- kernel-default-5.3.18-150300.59.164.1
 
 - 
                    SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 x86_64)
                    
- kernel-default-base-5.3.18-150300.59.164.1.150300.18.96.1
 
 - 
                    SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64)
                    
- kernel-default-debuginfo-5.3.18-150300.59.164.1
 - kernel-default-debugsource-5.3.18-150300.59.164.1
 
 
References:
- https://www.suse.com/security/cve/CVE-2020-36788.html
 - https://www.suse.com/security/cve/CVE-2021-3743.html
 - https://www.suse.com/security/cve/CVE-2021-39698.html
 - https://www.suse.com/security/cve/CVE-2021-43056.html
 - https://www.suse.com/security/cve/CVE-2021-47104.html
 - https://www.suse.com/security/cve/CVE-2021-47192.html
 - https://www.suse.com/security/cve/CVE-2021-47200.html
 - https://www.suse.com/security/cve/CVE-2021-47220.html
 - https://www.suse.com/security/cve/CVE-2021-47227.html
 - https://www.suse.com/security/cve/CVE-2021-47228.html
 - https://www.suse.com/security/cve/CVE-2021-47229.html
 - https://www.suse.com/security/cve/CVE-2021-47230.html
 - https://www.suse.com/security/cve/CVE-2021-47231.html
 - https://www.suse.com/security/cve/CVE-2021-47235.html
 - https://www.suse.com/security/cve/CVE-2021-47236.html
 - https://www.suse.com/security/cve/CVE-2021-47237.html
 - https://www.suse.com/security/cve/CVE-2021-47239.html
 - https://www.suse.com/security/cve/CVE-2021-47240.html
 - https://www.suse.com/security/cve/CVE-2021-47241.html
 - https://www.suse.com/security/cve/CVE-2021-47246.html
 - https://www.suse.com/security/cve/CVE-2021-47252.html
 - https://www.suse.com/security/cve/CVE-2021-47253.html
 - https://www.suse.com/security/cve/CVE-2021-47254.html
 - https://www.suse.com/security/cve/CVE-2021-47255.html
 - https://www.suse.com/security/cve/CVE-2021-47258.html
 - https://www.suse.com/security/cve/CVE-2021-47259.html
 - https://www.suse.com/security/cve/CVE-2021-47260.html
 - https://www.suse.com/security/cve/CVE-2021-47261.html
 - https://www.suse.com/security/cve/CVE-2021-47263.html
 - https://www.suse.com/security/cve/CVE-2021-47265.html
 - https://www.suse.com/security/cve/CVE-2021-47267.html
 - https://www.suse.com/security/cve/CVE-2021-47269.html
 - https://www.suse.com/security/cve/CVE-2021-47270.html
 - https://www.suse.com/security/cve/CVE-2021-47274.html
 - https://www.suse.com/security/cve/CVE-2021-47275.html
 - https://www.suse.com/security/cve/CVE-2021-47276.html
 - https://www.suse.com/security/cve/CVE-2021-47280.html
 - https://www.suse.com/security/cve/CVE-2021-47281.html
 - https://www.suse.com/security/cve/CVE-2021-47284.html
 - https://www.suse.com/security/cve/CVE-2021-47285.html
 - https://www.suse.com/security/cve/CVE-2021-47288.html
 - https://www.suse.com/security/cve/CVE-2021-47289.html
 - https://www.suse.com/security/cve/CVE-2021-47296.html
 - https://www.suse.com/security/cve/CVE-2021-47301.html
 - https://www.suse.com/security/cve/CVE-2021-47302.html
 - https://www.suse.com/security/cve/CVE-2021-47305.html
 - https://www.suse.com/security/cve/CVE-2021-47307.html
 - https://www.suse.com/security/cve/CVE-2021-47308.html
 - https://www.suse.com/security/cve/CVE-2021-47314.html
 - https://www.suse.com/security/cve/CVE-2021-47315.html
 - https://www.suse.com/security/cve/CVE-2021-47320.html
 - https://www.suse.com/security/cve/CVE-2021-47321.html
 - https://www.suse.com/security/cve/CVE-2021-47323.html
 - https://www.suse.com/security/cve/CVE-2021-47324.html
 - https://www.suse.com/security/cve/CVE-2021-47329.html
 - https://www.suse.com/security/cve/CVE-2021-47330.html
 - https://www.suse.com/security/cve/CVE-2021-47332.html
 - https://www.suse.com/security/cve/CVE-2021-47333.html
 - https://www.suse.com/security/cve/CVE-2021-47334.html
 - https://www.suse.com/security/cve/CVE-2021-47337.html
 - https://www.suse.com/security/cve/CVE-2021-47338.html
 - https://www.suse.com/security/cve/CVE-2021-47340.html
 - https://www.suse.com/security/cve/CVE-2021-47341.html
 - https://www.suse.com/security/cve/CVE-2021-47343.html
 - https://www.suse.com/security/cve/CVE-2021-47344.html
 - https://www.suse.com/security/cve/CVE-2021-47347.html
 - https://www.suse.com/security/cve/CVE-2021-47348.html
 - https://www.suse.com/security/cve/CVE-2021-47350.html
 - https://www.suse.com/security/cve/CVE-2021-47353.html
 - https://www.suse.com/security/cve/CVE-2021-47354.html
 - https://www.suse.com/security/cve/CVE-2021-47356.html
 - https://www.suse.com/security/cve/CVE-2021-47369.html
 - https://www.suse.com/security/cve/CVE-2021-47375.html
 - https://www.suse.com/security/cve/CVE-2021-47378.html
 - https://www.suse.com/security/cve/CVE-2021-47381.html
 - https://www.suse.com/security/cve/CVE-2021-47382.html
 - https://www.suse.com/security/cve/CVE-2021-47383.html
 - https://www.suse.com/security/cve/CVE-2021-47387.html
 - https://www.suse.com/security/cve/CVE-2021-47388.html
 - https://www.suse.com/security/cve/CVE-2021-47391.html
 - https://www.suse.com/security/cve/CVE-2021-47392.html
 - https://www.suse.com/security/cve/CVE-2021-47393.html
 - https://www.suse.com/security/cve/CVE-2021-47395.html
 - https://www.suse.com/security/cve/CVE-2021-47396.html
 - https://www.suse.com/security/cve/CVE-2021-47399.html
 - https://www.suse.com/security/cve/CVE-2021-47402.html
 - https://www.suse.com/security/cve/CVE-2021-47404.html
 - https://www.suse.com/security/cve/CVE-2021-47405.html
 - https://www.suse.com/security/cve/CVE-2021-47409.html
 - https://www.suse.com/security/cve/CVE-2021-47413.html
 - https://www.suse.com/security/cve/CVE-2021-47416.html
 - https://www.suse.com/security/cve/CVE-2021-47422.html
 - https://www.suse.com/security/cve/CVE-2021-47423.html
 - https://www.suse.com/security/cve/CVE-2021-47424.html
 - https://www.suse.com/security/cve/CVE-2021-47425.html
 - https://www.suse.com/security/cve/CVE-2021-47426.html
 - https://www.suse.com/security/cve/CVE-2021-47428.html
 - https://www.suse.com/security/cve/CVE-2021-47431.html
 - https://www.suse.com/security/cve/CVE-2021-47434.html
 - https://www.suse.com/security/cve/CVE-2021-47435.html
 - https://www.suse.com/security/cve/CVE-2021-47436.html
 - https://www.suse.com/security/cve/CVE-2021-47441.html
 - https://www.suse.com/security/cve/CVE-2021-47442.html
 - https://www.suse.com/security/cve/CVE-2021-47443.html
 - https://www.suse.com/security/cve/CVE-2021-47444.html
 - https://www.suse.com/security/cve/CVE-2021-47445.html
 - https://www.suse.com/security/cve/CVE-2021-47451.html
 - https://www.suse.com/security/cve/CVE-2021-47456.html
 - https://www.suse.com/security/cve/CVE-2021-47458.html
 - https://www.suse.com/security/cve/CVE-2021-47460.html
 - https://www.suse.com/security/cve/CVE-2021-47464.html
 - https://www.suse.com/security/cve/CVE-2021-47465.html
 - https://www.suse.com/security/cve/CVE-2021-47468.html
 - https://www.suse.com/security/cve/CVE-2021-47473.html
 - https://www.suse.com/security/cve/CVE-2021-47478.html
 - https://www.suse.com/security/cve/CVE-2021-47480.html
 - https://www.suse.com/security/cve/CVE-2021-47482.html
 - https://www.suse.com/security/cve/CVE-2021-47483.html
 - https://www.suse.com/security/cve/CVE-2021-47485.html
 - https://www.suse.com/security/cve/CVE-2021-47493.html
 - https://www.suse.com/security/cve/CVE-2021-47494.html
 - https://www.suse.com/security/cve/CVE-2021-47495.html
 - https://www.suse.com/security/cve/CVE-2021-47496.html
 - https://www.suse.com/security/cve/CVE-2021-47497.html
 - https://www.suse.com/security/cve/CVE-2021-47498.html
 - https://www.suse.com/security/cve/CVE-2021-47499.html
 - https://www.suse.com/security/cve/CVE-2021-47500.html
 - https://www.suse.com/security/cve/CVE-2021-47501.html
 - https://www.suse.com/security/cve/CVE-2021-47502.html
 - https://www.suse.com/security/cve/CVE-2021-47503.html
 - https://www.suse.com/security/cve/CVE-2021-47505.html
 - https://www.suse.com/security/cve/CVE-2021-47506.html
 - https://www.suse.com/security/cve/CVE-2021-47507.html
 - https://www.suse.com/security/cve/CVE-2021-47509.html
 - https://www.suse.com/security/cve/CVE-2021-47511.html
 - https://www.suse.com/security/cve/CVE-2021-47512.html
 - https://www.suse.com/security/cve/CVE-2021-47516.html
 - https://www.suse.com/security/cve/CVE-2021-47518.html
 - https://www.suse.com/security/cve/CVE-2021-47521.html
 - https://www.suse.com/security/cve/CVE-2021-47522.html
 - https://www.suse.com/security/cve/CVE-2021-47523.html
 - https://www.suse.com/security/cve/CVE-2021-47527.html
 - https://www.suse.com/security/cve/CVE-2021-47535.html
 - https://www.suse.com/security/cve/CVE-2021-47536.html
 - https://www.suse.com/security/cve/CVE-2021-47538.html
 - https://www.suse.com/security/cve/CVE-2021-47540.html
 - https://www.suse.com/security/cve/CVE-2021-47541.html
 - https://www.suse.com/security/cve/CVE-2021-47542.html
 - https://www.suse.com/security/cve/CVE-2021-47549.html
 - https://www.suse.com/security/cve/CVE-2021-47557.html
 - https://www.suse.com/security/cve/CVE-2021-47562.html
 - https://www.suse.com/security/cve/CVE-2021-47563.html
 - https://www.suse.com/security/cve/CVE-2021-47565.html
 - https://www.suse.com/security/cve/CVE-2022-1195.html
 - https://www.suse.com/security/cve/CVE-2022-20132.html
 - https://www.suse.com/security/cve/CVE-2022-48636.html
 - https://www.suse.com/security/cve/CVE-2022-48673.html
 - https://www.suse.com/security/cve/CVE-2022-48704.html
 - https://www.suse.com/security/cve/CVE-2022-48710.html
 - https://www.suse.com/security/cve/CVE-2023-0160.html
 - https://www.suse.com/security/cve/CVE-2023-1829.html
 - https://www.suse.com/security/cve/CVE-2023-2176.html
 - https://www.suse.com/security/cve/CVE-2023-424.html
 - https://www.suse.com/security/cve/CVE-2023-4244.html
 - https://www.suse.com/security/cve/CVE-2023-47233.html
 - https://www.suse.com/security/cve/CVE-2023-52433.html
 - https://www.suse.com/security/cve/CVE-2023-52581.html
 - https://www.suse.com/security/cve/CVE-2023-52591.html
 - https://www.suse.com/security/cve/CVE-2023-52654.html
 - https://www.suse.com/security/cve/CVE-2023-52655.html
 - https://www.suse.com/security/cve/CVE-2023-52686.html
 - https://www.suse.com/security/cve/CVE-2023-52840.html
 - https://www.suse.com/security/cve/CVE-2023-52871.html
 - https://www.suse.com/security/cve/CVE-2023-52880.html
 - https://www.suse.com/security/cve/CVE-2023-6531.html
 - https://www.suse.com/security/cve/CVE-2024-26581.html
 - https://www.suse.com/security/cve/CVE-2024-26643.html
 - https://www.suse.com/security/cve/CVE-2024-26828.html
 - https://www.suse.com/security/cve/CVE-2024-26921.html
 - https://www.suse.com/security/cve/CVE-2024-26925.html
 - https://www.suse.com/security/cve/CVE-2024-26929.html
 - https://www.suse.com/security/cve/CVE-2024-26930.html
 - https://www.suse.com/security/cve/CVE-2024-27398.html
 - https://www.suse.com/security/cve/CVE-2024-27413.html
 - https://www.suse.com/security/cve/CVE-2024-35811.html
 - https://www.suse.com/security/cve/CVE-2024-35895.html
 - https://www.suse.com/security/cve/CVE-2024-35914.html
 - https://bugzilla.suse.com/show_bug.cgi?id=1065729
 - https://bugzilla.suse.com/show_bug.cgi?id=1151927
 - https://bugzilla.suse.com/show_bug.cgi?id=1152472
 - https://bugzilla.suse.com/show_bug.cgi?id=1154353
 - https://bugzilla.suse.com/show_bug.cgi?id=1156395
 - https://bugzilla.suse.com/show_bug.cgi?id=1174585
 - https://bugzilla.suse.com/show_bug.cgi?id=1176447
 - https://bugzilla.suse.com/show_bug.cgi?id=1176774
 - https://bugzilla.suse.com/show_bug.cgi?id=1176869
 - https://bugzilla.suse.com/show_bug.cgi?id=1178134
 - https://bugzilla.suse.com/show_bug.cgi?id=1181147
 - https://bugzilla.suse.com/show_bug.cgi?id=1184631
 - https://bugzilla.suse.com/show_bug.cgi?id=1185570
 - https://bugzilla.suse.com/show_bug.cgi?id=1185589
 - https://bugzilla.suse.com/show_bug.cgi?id=1185902
 - https://bugzilla.suse.com/show_bug.cgi?id=1186885
 - https://bugzilla.suse.com/show_bug.cgi?id=1187357
 - https://bugzilla.suse.com/show_bug.cgi?id=1188616
 - https://bugzilla.suse.com/show_bug.cgi?id=1188772
 - https://bugzilla.suse.com/show_bug.cgi?id=1189883
 - https://bugzilla.suse.com/show_bug.cgi?id=1190795
 - https://bugzilla.suse.com/show_bug.cgi?id=1191452
 - https://bugzilla.suse.com/show_bug.cgi?id=1192107
 - https://bugzilla.suse.com/show_bug.cgi?id=1194288
 - https://bugzilla.suse.com/show_bug.cgi?id=1194591
 - https://bugzilla.suse.com/show_bug.cgi?id=1196956
 - https://bugzilla.suse.com/show_bug.cgi?id=1197760
 - https://bugzilla.suse.com/show_bug.cgi?id=1198029
 - https://bugzilla.suse.com/show_bug.cgi?id=1199304
 - https://bugzilla.suse.com/show_bug.cgi?id=1200619
 - https://bugzilla.suse.com/show_bug.cgi?id=1203389
 - https://bugzilla.suse.com/show_bug.cgi?id=1206646
 - https://bugzilla.suse.com/show_bug.cgi?id=1209657
 - https://bugzilla.suse.com/show_bug.cgi?id=1210335
 - https://bugzilla.suse.com/show_bug.cgi?id=1210629
 - https://bugzilla.suse.com/show_bug.cgi?id=1213476
 - https://bugzilla.suse.com/show_bug.cgi?id=1215420
 - https://bugzilla.suse.com/show_bug.cgi?id=1216702
 - https://bugzilla.suse.com/show_bug.cgi?id=1217169
 - https://bugzilla.suse.com/show_bug.cgi?id=1220137
 - https://bugzilla.suse.com/show_bug.cgi?id=1220144
 - https://bugzilla.suse.com/show_bug.cgi?id=1220754
 - https://bugzilla.suse.com/show_bug.cgi?id=1220877
 - https://bugzilla.suse.com/show_bug.cgi?id=1220960
 - https://bugzilla.suse.com/show_bug.cgi?id=1221044
 - https://bugzilla.suse.com/show_bug.cgi?id=1221113
 - https://bugzilla.suse.com/show_bug.cgi?id=1221829
 - https://bugzilla.suse.com/show_bug.cgi?id=1222251
 - https://bugzilla.suse.com/show_bug.cgi?id=1222619
 - https://bugzilla.suse.com/show_bug.cgi?id=1222838
 - https://bugzilla.suse.com/show_bug.cgi?id=1222867
 - https://bugzilla.suse.com/show_bug.cgi?id=1223084
 - https://bugzilla.suse.com/show_bug.cgi?id=1223138
 - https://bugzilla.suse.com/show_bug.cgi?id=1223384
 - https://bugzilla.suse.com/show_bug.cgi?id=1223390
 - https://bugzilla.suse.com/show_bug.cgi?id=1223512
 - https://bugzilla.suse.com/show_bug.cgi?id=1223932
 - https://bugzilla.suse.com/show_bug.cgi?id=1223934
 - https://bugzilla.suse.com/show_bug.cgi?id=1224099
 - https://bugzilla.suse.com/show_bug.cgi?id=1224174
 - https://bugzilla.suse.com/show_bug.cgi?id=1224438
 - https://bugzilla.suse.com/show_bug.cgi?id=1224482
 - https://bugzilla.suse.com/show_bug.cgi?id=1224511
 - https://bugzilla.suse.com/show_bug.cgi?id=1224592
 - https://bugzilla.suse.com/show_bug.cgi?id=1224816
 - https://bugzilla.suse.com/show_bug.cgi?id=1224826
 - https://bugzilla.suse.com/show_bug.cgi?id=1224830
 - https://bugzilla.suse.com/show_bug.cgi?id=1224831
 - https://bugzilla.suse.com/show_bug.cgi?id=1224832
 - https://bugzilla.suse.com/show_bug.cgi?id=1224834
 - https://bugzilla.suse.com/show_bug.cgi?id=1224841
 - https://bugzilla.suse.com/show_bug.cgi?id=1224842
 - https://bugzilla.suse.com/show_bug.cgi?id=1224843
 - https://bugzilla.suse.com/show_bug.cgi?id=1224844
 - https://bugzilla.suse.com/show_bug.cgi?id=1224846
 - https://bugzilla.suse.com/show_bug.cgi?id=1224849
 - https://bugzilla.suse.com/show_bug.cgi?id=1224852
 - https://bugzilla.suse.com/show_bug.cgi?id=1224853
 - https://bugzilla.suse.com/show_bug.cgi?id=1224854
 - https://bugzilla.suse.com/show_bug.cgi?id=1224859
 - https://bugzilla.suse.com/show_bug.cgi?id=1224882
 - https://bugzilla.suse.com/show_bug.cgi?id=1224886
 - https://bugzilla.suse.com/show_bug.cgi?id=1224888
 - https://bugzilla.suse.com/show_bug.cgi?id=1224889
 - https://bugzilla.suse.com/show_bug.cgi?id=1224891
 - https://bugzilla.suse.com/show_bug.cgi?id=1224892
 - https://bugzilla.suse.com/show_bug.cgi?id=1224893
 - https://bugzilla.suse.com/show_bug.cgi?id=1224899
 - https://bugzilla.suse.com/show_bug.cgi?id=1224904
 - https://bugzilla.suse.com/show_bug.cgi?id=1224907
 - https://bugzilla.suse.com/show_bug.cgi?id=1224909
 - https://bugzilla.suse.com/show_bug.cgi?id=1224916
 - https://bugzilla.suse.com/show_bug.cgi?id=1224917
 - https://bugzilla.suse.com/show_bug.cgi?id=1224922
 - https://bugzilla.suse.com/show_bug.cgi?id=1224923
 - https://bugzilla.suse.com/show_bug.cgi?id=1224924
 - https://bugzilla.suse.com/show_bug.cgi?id=1224926
 - https://bugzilla.suse.com/show_bug.cgi?id=1224928
 - https://bugzilla.suse.com/show_bug.cgi?id=1224953
 - https://bugzilla.suse.com/show_bug.cgi?id=1224954
 - https://bugzilla.suse.com/show_bug.cgi?id=1224955
 - https://bugzilla.suse.com/show_bug.cgi?id=1224957
 - https://bugzilla.suse.com/show_bug.cgi?id=1224961
 - https://bugzilla.suse.com/show_bug.cgi?id=1224963
 - https://bugzilla.suse.com/show_bug.cgi?id=1224965
 - https://bugzilla.suse.com/show_bug.cgi?id=1224966
 - https://bugzilla.suse.com/show_bug.cgi?id=1224968
 - https://bugzilla.suse.com/show_bug.cgi?id=1224981
 - https://bugzilla.suse.com/show_bug.cgi?id=1224982
 - https://bugzilla.suse.com/show_bug.cgi?id=1224983
 - https://bugzilla.suse.com/show_bug.cgi?id=1224984
 - https://bugzilla.suse.com/show_bug.cgi?id=1224987
 - https://bugzilla.suse.com/show_bug.cgi?id=1224990
 - https://bugzilla.suse.com/show_bug.cgi?id=1224993
 - https://bugzilla.suse.com/show_bug.cgi?id=1224996
 - https://bugzilla.suse.com/show_bug.cgi?id=1224997
 - https://bugzilla.suse.com/show_bug.cgi?id=1225026
 - https://bugzilla.suse.com/show_bug.cgi?id=1225030
 - https://bugzilla.suse.com/show_bug.cgi?id=1225058
 - https://bugzilla.suse.com/show_bug.cgi?id=1225060
 - https://bugzilla.suse.com/show_bug.cgi?id=1225083
 - https://bugzilla.suse.com/show_bug.cgi?id=1225084
 - https://bugzilla.suse.com/show_bug.cgi?id=1225091
 - https://bugzilla.suse.com/show_bug.cgi?id=1225112
 - https://bugzilla.suse.com/show_bug.cgi?id=1225113
 - https://bugzilla.suse.com/show_bug.cgi?id=1225128
 - https://bugzilla.suse.com/show_bug.cgi?id=1225140
 - https://bugzilla.suse.com/show_bug.cgi?id=1225143
 - https://bugzilla.suse.com/show_bug.cgi?id=1225148
 - https://bugzilla.suse.com/show_bug.cgi?id=1225155
 - https://bugzilla.suse.com/show_bug.cgi?id=1225164
 - https://bugzilla.suse.com/show_bug.cgi?id=1225177
 - https://bugzilla.suse.com/show_bug.cgi?id=1225178
 - https://bugzilla.suse.com/show_bug.cgi?id=1225181
 - https://bugzilla.suse.com/show_bug.cgi?id=1225192
 - https://bugzilla.suse.com/show_bug.cgi?id=1225193
 - https://bugzilla.suse.com/show_bug.cgi?id=1225198
 - https://bugzilla.suse.com/show_bug.cgi?id=1225201
 - https://bugzilla.suse.com/show_bug.cgi?id=1225206
 - https://bugzilla.suse.com/show_bug.cgi?id=1225207
 - https://bugzilla.suse.com/show_bug.cgi?id=1225208
 - https://bugzilla.suse.com/show_bug.cgi?id=1225214
 - https://bugzilla.suse.com/show_bug.cgi?id=1225223
 - https://bugzilla.suse.com/show_bug.cgi?id=1225224
 - https://bugzilla.suse.com/show_bug.cgi?id=1225230
 - https://bugzilla.suse.com/show_bug.cgi?id=1225232
 - https://bugzilla.suse.com/show_bug.cgi?id=1225233
 - https://bugzilla.suse.com/show_bug.cgi?id=1225237
 - https://bugzilla.suse.com/show_bug.cgi?id=1225238
 - https://bugzilla.suse.com/show_bug.cgi?id=1225243
 - https://bugzilla.suse.com/show_bug.cgi?id=1225244
 - https://bugzilla.suse.com/show_bug.cgi?id=1225247
 - https://bugzilla.suse.com/show_bug.cgi?id=1225251
 - https://bugzilla.suse.com/show_bug.cgi?id=1225252
 - https://bugzilla.suse.com/show_bug.cgi?id=1225256
 - https://bugzilla.suse.com/show_bug.cgi?id=1225261
 - https://bugzilla.suse.com/show_bug.cgi?id=1225262
 - https://bugzilla.suse.com/show_bug.cgi?id=1225263
 - https://bugzilla.suse.com/show_bug.cgi?id=1225301
 - https://bugzilla.suse.com/show_bug.cgi?id=1225303
 - https://bugzilla.suse.com/show_bug.cgi?id=1225316
 - https://bugzilla.suse.com/show_bug.cgi?id=1225318
 - https://bugzilla.suse.com/show_bug.cgi?id=1225320
 - https://bugzilla.suse.com/show_bug.cgi?id=1225321
 - https://bugzilla.suse.com/show_bug.cgi?id=1225322
 - https://bugzilla.suse.com/show_bug.cgi?id=1225326
 - https://bugzilla.suse.com/show_bug.cgi?id=1225327
 - https://bugzilla.suse.com/show_bug.cgi?id=1225328
 - https://bugzilla.suse.com/show_bug.cgi?id=1225330
 - https://bugzilla.suse.com/show_bug.cgi?id=1225333
 - https://bugzilla.suse.com/show_bug.cgi?id=1225336
 - https://bugzilla.suse.com/show_bug.cgi?id=1225341
 - https://bugzilla.suse.com/show_bug.cgi?id=1225346
 - https://bugzilla.suse.com/show_bug.cgi?id=1225351
 - https://bugzilla.suse.com/show_bug.cgi?id=1225354
 - https://bugzilla.suse.com/show_bug.cgi?id=1225355
 - https://bugzilla.suse.com/show_bug.cgi?id=1225357
 - https://bugzilla.suse.com/show_bug.cgi?id=1225358
 - https://bugzilla.suse.com/show_bug.cgi?id=1225360
 - https://bugzilla.suse.com/show_bug.cgi?id=1225361
 - https://bugzilla.suse.com/show_bug.cgi?id=1225366
 - https://bugzilla.suse.com/show_bug.cgi?id=1225367
 - https://bugzilla.suse.com/show_bug.cgi?id=1225369
 - https://bugzilla.suse.com/show_bug.cgi?id=1225370
 - https://bugzilla.suse.com/show_bug.cgi?id=1225372
 - https://bugzilla.suse.com/show_bug.cgi?id=1225374
 - https://bugzilla.suse.com/show_bug.cgi?id=1225384
 - https://bugzilla.suse.com/show_bug.cgi?id=1225386
 - https://bugzilla.suse.com/show_bug.cgi?id=1225387
 - https://bugzilla.suse.com/show_bug.cgi?id=1225390
 - https://bugzilla.suse.com/show_bug.cgi?id=1225393
 - https://bugzilla.suse.com/show_bug.cgi?id=1225400
 - https://bugzilla.suse.com/show_bug.cgi?id=1225404
 - https://bugzilla.suse.com/show_bug.cgi?id=1225405
 - https://bugzilla.suse.com/show_bug.cgi?id=1225409
 - https://bugzilla.suse.com/show_bug.cgi?id=1225411
 - https://bugzilla.suse.com/show_bug.cgi?id=1225424
 - https://bugzilla.suse.com/show_bug.cgi?id=1225427
 - https://bugzilla.suse.com/show_bug.cgi?id=1225435
 - https://bugzilla.suse.com/show_bug.cgi?id=1225437
 - https://bugzilla.suse.com/show_bug.cgi?id=1225438
 - https://bugzilla.suse.com/show_bug.cgi?id=1225439
 - https://bugzilla.suse.com/show_bug.cgi?id=1225446
 - https://bugzilla.suse.com/show_bug.cgi?id=1225447
 - https://bugzilla.suse.com/show_bug.cgi?id=1225448
 - https://bugzilla.suse.com/show_bug.cgi?id=1225450
 - https://bugzilla.suse.com/show_bug.cgi?id=1225453
 - https://bugzilla.suse.com/show_bug.cgi?id=1225455
 - https://bugzilla.suse.com/show_bug.cgi?id=1225468
 - https://bugzilla.suse.com/show_bug.cgi?id=1225499
 - https://bugzilla.suse.com/show_bug.cgi?id=1225500
 - https://bugzilla.suse.com/show_bug.cgi?id=1225508
 - https://bugzilla.suse.com/show_bug.cgi?id=1225534