Security update for the Linux Kernel
| Announcement ID: | SUSE-SU-2024:4367-1 | 
|---|---|
| Release Date: | 2024-12-17T17:59:55Z | 
| Rating: | important | 
| References: | 
                
  | 
        
| Cross-References: | 
                    
  | 
            
| CVSS scores: | 
                    
  | 
            
| Affected Products: | 
                
  | 
        
An update that solves 75 vulnerabilities and has eight security fixes can now be installed.
Description:
The SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security bugfixes.
The following security bugs were fixed:
- CVE-2022-48853: swiotlb: fix info leak with DMA_FROM_DEVICE (bsc#1228015).
 - CVE-2024-26801: Bluetooth: Avoid potential use-after-free in hci_error_reset (bsc#1222413).
 - CVE-2024-26852: Fixed use-after-free in ip6_route_mpath_notify() (bsc#1223057).
 - CVE-2024-26886: Bluetooth: af_bluetooth: Fix deadlock (bsc#1223044).
 - CVE-2024-27051: cpufreq: brcmstb-avs-cpufreq: add check for cpufreq_cpu_get's return value (bsc#1223769).
 - CVE-2024-35937: wifi: cfg80211: check A-MSDU format more carefully (bsc#1224526).
 - CVE-2024-36905: tcp: defer shutdown(SEND_SHUTDOWN) for TCP_SYN_RECV sockets (bsc#1225742).
 - CVE-2024-42098: crypto: ecdh - explicitly zeroize private_key (bsc#1228779).
 - CVE-2024-42229: crypto: aead,cipher - zeroize key buffer after use (bsc#1228708).
 - CVE-2024-44995: net: hns3: fix a deadlock problem when config TC during resetting (bsc#1230231).
 - CVE-2024-45016: netem: fix return value if duplicate enqueue fails (bsc#1230429).
 - CVE-2024-46771: can: bcm: Remove proc entry when dev is unregistered (bsc#1230766).
 - CVE-2024-46777: udf: Avoid excessive partition lengths (bsc#1230773).
 - CVE-2024-46800: sch/netem: fix use after free in netem_dequeue (bsc#1230827).
 - CVE-2024-47660: fsnotify: clear PARENT_WATCHED flags lazily (bsc#1231439).
 - CVE-2024-47679: vfs: fix race between evice_inodes() and find_inode()&iput() (bsc#1231930).
 - CVE-2024-47701: ext4: avoid OOB when system.data xattr changes underneath the filesystem (bsc#1231920).
 - CVE-2024-49858: efistub/tpm: Use ACPI reclaim memory for event log to avoid corruption (bsc#1232251).
 - CVE-2024-49868: btrfs: fix a NULL pointer dereference when failed to start a new trasacntion (bsc#1232272).
 - CVE-2024-49921: drm/amd/display: Check null pointers before used (bsc#1232371).
 - CVE-2024-49925: fbdev: efifb: Register sysfs groups through driver core (bsc#1232224)
 - CVE-2024-49938: wifi: ath9k_htc: Use __skb_set_length() for resetting urb before resubmit (bsc#1232552).
 - CVE-2024-49945: net/ncsi: Disable the ncsi work before freeing the associated structure (bsc#1232165).
 - CVE-2024-49950: Bluetooth: L2CAP: Fix uaf in l2cap_connect (bsc#1232159).
 - CVE-2024-49952: netfilter: nf_tables: prevent nf_skb_duplicated corruption (bsc#1232157).
 - CVE-2024-50044: Bluetooth: RFCOMM: FIX possible deadlock in rfcomm_sk_state_change (bsc#1231904).
 - CVE-2024-50055: driver core: bus: Fix double free in driver API bus_register() (bsc#1232329).
 - CVE-2024-50073: tty: n_gsm: Fix use-after-free in gsm_cleanup_mux (bsc#1232520).
 - CVE-2024-50074: parport: Proper fix for array out-of-bounds access (bsc#1232507).
 - CVE-2024-50095: RDMA/mad: Improve handling of timed out WRs of mad agent (bsc#1232873).
 - CVE-2024-50115: KVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from memory (bsc#1232919).
 - CVE-2024-50117: drm/amd: Guard against bad data for ATIF ACPI method (bsc#1232897).
 - CVE-2024-50125: Bluetooth: SCO: Fix UAF on sco_sock_timeout (bsc#1232928).
 - CVE-2024-50135: nvme-pci: fix race condition between reset and nvme_dev_disable() (bsc#1232888).
 - CVE-2024-50148: Bluetooth: bnep: fix wild-memory-access in proto_unregister (bsc#1233063).
 - CVE-2024-50150: usb: typec: altmode should keep reference to parent (bsc#1233051).
 - CVE-2024-50154: tcp/dccp: Do not use timer_pending() in reqsk_queue_unlink() (bsc#1233070).
 - CVE-2024-50167: be2net: fix potential memory leak in be_xmit() (bsc#1233049).
 - CVE-2024-50171: net: systemport: fix potential memory leak in bcm_sysport_xmit() (bsc#1233057).
 - CVE-2024-50183: scsi: lpfc: Ensure DA_ID handling completion before deleting an NPIV instance (bsc#1233130).
 - CVE-2024-50187: drm/vc4: Stop the active perfmon before being destroyed (bsc#1233108).
 - CVE-2024-50195: posix-clock: Fix missing timespec64 check in pc_clock_settime() (bsc#1233103).
 - CVE-2024-50218: ocfs2: pass u64 to ocfs2_truncate_inline maybe overflow (bsc#1233191).
 - CVE-2024-50234: wifi: iwlegacy: Clear stale interrupts before resuming device (bsc#1233211).
 - CVE-2024-50236: wifi: ath10k: Fix memory leak in management tx (bsc#1233212).
 - CVE-2024-50237: wifi: mac80211: do not pass a stopped vif to the driver in .get_txpower (bsc#1233216).
 - CVE-2024-50264: vsock/virtio: Initialization of the dangling pointer occurring in vsk->trans (bsc#1233453).
 - CVE-2024-50265: ocfs2: remove entry once instead of null-ptr-dereference in ocfs2_xa_remove() (bsc#1233454).
 - CVE-2024-50267: usb: serial: io_edgeport: fix use after free in debug printk (bsc#1233456).
 - CVE-2024-50273: btrfs: reinitialize delayed ref list after deleting it from the list (bsc#1233462).
 - CVE-2024-50278: dm cache: fix potential out-of-bounds access on the first resume (bsc#1233467).
 - CVE-2024-50279: dm cache: fix out-of-bounds access to the dirty bitset when resizing (bsc#1233468).
 - CVE-2024-50289: media: av7110: fix a spectre vulnerability (bsc#1233478).
 - CVE-2024-50290: media: cx24116: prevent overflows on SNR calculus (bsc#1233479).
 - CVE-2024-50296: net: hns3: fix kernel crash when uninstalling driver (bsc#1233485).
 - CVE-2024-50301: security/keys: fix slab-out-of-bounds in key_task_permission (bsc#1233490).
 - CVE-2024-50302: HID: core: zero-initialize the report buffer (bsc#1233491).
 - CVE-2024-53058: net: stmmac: TSO: Fix unbalanced DMA map/unmap for non-paged SKB data (bsc#1233552).
 - CVE-2024-53061: media: s5p-jpeg: prevent buffer overflows (bsc#1233555).
 - CVE-2024-53063: media: dvbdev: prevent the risk of out of memory access (bsc#1233557).
 - CVE-2024-53066: nfs: Fix KMSAN warning in decode_getfattr_attrs() (bsc#1233560).
 - CVE-2024-53085: tpm: Lock TPM chip in tpm_pm_suspend() first (bsc#1082555 bsc#1233577).
 - CVE-2024-53088: i40e: fix race condition by adding filter's intermediate sync state (bsc#1233580).
 - CVE-2024-53104: media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format (bsc#1234025).
 - CVE-2024-53114: x86/CPU/AMD: Clear virtualized VMLOAD/VMSAVE on Zen4 client (bsc#1234072).
 
The following non-security bugs were fixed:
- drm/vc4: Warn if some v3d code is run on BCM2711 (bsc#1233108).
 - initramfs: avoid filename buffer overrun (bsc#1232436).
 - kernel-binary: Enable livepatch package only when livepatch is enabled (bsc#1218644).
 - lpfc: size cpu map by last cpu id set (bsc#1157160).
 - net: relax socket state check at accept time (git-fixes).
 - ocfs2: uncache inode which has failed entering the group (bsc#1234087).
 
Special Instructions and Notes:
- Please reboot the system after installing this update.
 
Patch Instructions:
        To install this SUSE  update use the SUSE recommended
        installation methods like YaST online_update or "zypper patch".
        Alternatively you can run the command listed for your product:
    
- 
                SUSE Linux Enterprise Live Patching 12-SP5
                
                    
                        
zypper in -t patch SUSE-SLE-Live-Patching-12-SP5-2024-4367=1 - 
                SUSE Linux Enterprise Server 12 SP5 LTSS
                
                    
                        
zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-2024-4367=1 - 
                SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security
                
                    
                        
zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2024-4367=1 - 
                SUSE Linux Enterprise Server for SAP Applications 12 SP5
                
                    
                        
zypper in -t patch SUSE-SLE-HA-12-SP5-2024-4367=1 - 
                SUSE Linux Enterprise High Availability Extension 12 SP5
                
                    
                        
zypper in -t patch SUSE-SLE-HA-12-SP5-2024-4367=1 
Package List:
- 
                    SUSE Linux Enterprise Live Patching 12-SP5 (nosrc)
                    
- kernel-default-4.12.14-122.237.1
 
 - 
                    SUSE Linux Enterprise Live Patching 12-SP5 (ppc64le s390x x86_64)
                    
- kernel-default-kgraft-4.12.14-122.237.1
 - kernel-default-debuginfo-4.12.14-122.237.1
 - kernel-default-kgraft-devel-4.12.14-122.237.1
 - kernel-default-debugsource-4.12.14-122.237.1
 - kgraft-patch-4_12_14-122_237-default-1-8.3.1
 
 - 
                    SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le s390x x86_64 nosrc)
                    
- kernel-default-4.12.14-122.237.1
 
 - 
                    SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le s390x x86_64)
                    
- kernel-syms-4.12.14-122.237.1
 - kernel-default-devel-4.12.14-122.237.1
 - kernel-default-base-4.12.14-122.237.1
 - kernel-default-debuginfo-4.12.14-122.237.1
 - kernel-default-debugsource-4.12.14-122.237.1
 - kernel-default-base-debuginfo-4.12.14-122.237.1
 
 - 
                    SUSE Linux Enterprise Server 12 SP5 LTSS (noarch)
                    
- kernel-devel-4.12.14-122.237.1
 - kernel-source-4.12.14-122.237.1
 - kernel-macros-4.12.14-122.237.1
 
 - 
                    SUSE Linux Enterprise Server 12 SP5 LTSS (s390x)
                    
- kernel-default-man-4.12.14-122.237.1
 
 - 
                    SUSE Linux Enterprise Server 12 SP5 LTSS (x86_64)
                    
- kernel-default-devel-debuginfo-4.12.14-122.237.1
 
 - 
                    SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (nosrc x86_64)
                    
- kernel-default-4.12.14-122.237.1
 
 - 
                    SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64)
                    
- kernel-syms-4.12.14-122.237.1
 - kernel-default-devel-debuginfo-4.12.14-122.237.1
 - kernel-default-devel-4.12.14-122.237.1
 - kernel-default-base-4.12.14-122.237.1
 - kernel-default-debuginfo-4.12.14-122.237.1
 - kernel-default-debugsource-4.12.14-122.237.1
 - kernel-default-base-debuginfo-4.12.14-122.237.1
 
 - 
                    SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (noarch)
                    
- kernel-devel-4.12.14-122.237.1
 - kernel-source-4.12.14-122.237.1
 - kernel-macros-4.12.14-122.237.1
 
 - 
                    SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64)
                    
- gfs2-kmp-default-4.12.14-122.237.1
 - ocfs2-kmp-default-4.12.14-122.237.1
 - gfs2-kmp-default-debuginfo-4.12.14-122.237.1
 - cluster-md-kmp-default-debuginfo-4.12.14-122.237.1
 - dlm-kmp-default-4.12.14-122.237.1
 - ocfs2-kmp-default-debuginfo-4.12.14-122.237.1
 - kernel-default-debuginfo-4.12.14-122.237.1
 - dlm-kmp-default-debuginfo-4.12.14-122.237.1
 - cluster-md-kmp-default-4.12.14-122.237.1
 - kernel-default-debugsource-4.12.14-122.237.1
 
 - 
                    SUSE Linux Enterprise Server for SAP Applications 12 SP5 (nosrc)
                    
- kernel-default-4.12.14-122.237.1
 
 - 
                    SUSE Linux Enterprise High Availability Extension 12 SP5 (ppc64le s390x x86_64)
                    
- gfs2-kmp-default-4.12.14-122.237.1
 - ocfs2-kmp-default-4.12.14-122.237.1
 - gfs2-kmp-default-debuginfo-4.12.14-122.237.1
 - cluster-md-kmp-default-debuginfo-4.12.14-122.237.1
 - dlm-kmp-default-4.12.14-122.237.1
 - ocfs2-kmp-default-debuginfo-4.12.14-122.237.1
 - kernel-default-debuginfo-4.12.14-122.237.1
 - dlm-kmp-default-debuginfo-4.12.14-122.237.1
 - cluster-md-kmp-default-4.12.14-122.237.1
 - kernel-default-debugsource-4.12.14-122.237.1
 
 - 
                    SUSE Linux Enterprise High Availability Extension 12 SP5 (nosrc)
                    
- kernel-default-4.12.14-122.237.1
 
 
References:
- https://www.suse.com/security/cve/CVE-2021-47162.html
 - https://www.suse.com/security/cve/CVE-2022-48853.html
 - https://www.suse.com/security/cve/CVE-2024-26801.html
 - https://www.suse.com/security/cve/CVE-2024-26852.html
 - https://www.suse.com/security/cve/CVE-2024-26886.html
 - https://www.suse.com/security/cve/CVE-2024-27051.html
 - https://www.suse.com/security/cve/CVE-2024-35937.html
 - https://www.suse.com/security/cve/CVE-2024-36886.html
 - https://www.suse.com/security/cve/CVE-2024-36905.html
 - https://www.suse.com/security/cve/CVE-2024-36954.html
 - https://www.suse.com/security/cve/CVE-2024-42098.html
 - https://www.suse.com/security/cve/CVE-2024-42131.html
 - https://www.suse.com/security/cve/CVE-2024-42229.html
 - https://www.suse.com/security/cve/CVE-2024-44995.html
 - https://www.suse.com/security/cve/CVE-2024-45016.html
 - https://www.suse.com/security/cve/CVE-2024-46771.html
 - https://www.suse.com/security/cve/CVE-2024-46777.html
 - https://www.suse.com/security/cve/CVE-2024-46800.html
 - https://www.suse.com/security/cve/CVE-2024-47660.html
 - https://www.suse.com/security/cve/CVE-2024-47679.html
 - https://www.suse.com/security/cve/CVE-2024-47701.html
 - https://www.suse.com/security/cve/CVE-2024-49858.html
 - https://www.suse.com/security/cve/CVE-2024-49868.html
 - https://www.suse.com/security/cve/CVE-2024-49884.html
 - https://www.suse.com/security/cve/CVE-2024-49921.html
 - https://www.suse.com/security/cve/CVE-2024-49925.html
 - https://www.suse.com/security/cve/CVE-2024-49938.html
 - https://www.suse.com/security/cve/CVE-2024-49945.html
 - https://www.suse.com/security/cve/CVE-2024-49950.html
 - https://www.suse.com/security/cve/CVE-2024-49952.html
 - https://www.suse.com/security/cve/CVE-2024-50044.html
 - https://www.suse.com/security/cve/CVE-2024-50055.html
 - https://www.suse.com/security/cve/CVE-2024-50073.html
 - https://www.suse.com/security/cve/CVE-2024-50074.html
 - https://www.suse.com/security/cve/CVE-2024-50095.html
 - https://www.suse.com/security/cve/CVE-2024-50099.html
 - https://www.suse.com/security/cve/CVE-2024-50115.html
 - https://www.suse.com/security/cve/CVE-2024-50117.html
 - https://www.suse.com/security/cve/CVE-2024-50125.html
 - https://www.suse.com/security/cve/CVE-2024-50135.html
 - https://www.suse.com/security/cve/CVE-2024-50148.html
 - https://www.suse.com/security/cve/CVE-2024-50150.html
 - https://www.suse.com/security/cve/CVE-2024-50154.html
 - https://www.suse.com/security/cve/CVE-2024-50167.html
 - https://www.suse.com/security/cve/CVE-2024-50171.html
 - https://www.suse.com/security/cve/CVE-2024-50179.html
 - https://www.suse.com/security/cve/CVE-2024-50183.html
 - https://www.suse.com/security/cve/CVE-2024-50187.html
 - https://www.suse.com/security/cve/CVE-2024-50194.html
 - https://www.suse.com/security/cve/CVE-2024-50195.html
 - https://www.suse.com/security/cve/CVE-2024-50210.html
 - https://www.suse.com/security/cve/CVE-2024-50218.html
 - https://www.suse.com/security/cve/CVE-2024-50234.html
 - https://www.suse.com/security/cve/CVE-2024-50236.html
 - https://www.suse.com/security/cve/CVE-2024-50237.html
 - https://www.suse.com/security/cve/CVE-2024-50264.html
 - https://www.suse.com/security/cve/CVE-2024-50265.html
 - https://www.suse.com/security/cve/CVE-2024-50267.html
 - https://www.suse.com/security/cve/CVE-2024-50273.html
 - https://www.suse.com/security/cve/CVE-2024-50278.html
 - https://www.suse.com/security/cve/CVE-2024-50279.html
 - https://www.suse.com/security/cve/CVE-2024-50289.html
 - https://www.suse.com/security/cve/CVE-2024-50290.html
 - https://www.suse.com/security/cve/CVE-2024-50296.html
 - https://www.suse.com/security/cve/CVE-2024-50301.html
 - https://www.suse.com/security/cve/CVE-2024-50302.html
 - https://www.suse.com/security/cve/CVE-2024-53058.html
 - https://www.suse.com/security/cve/CVE-2024-53061.html
 - https://www.suse.com/security/cve/CVE-2024-53063.html
 - https://www.suse.com/security/cve/CVE-2024-53066.html
 - https://www.suse.com/security/cve/CVE-2024-53085.html
 - https://www.suse.com/security/cve/CVE-2024-53088.html
 - https://www.suse.com/security/cve/CVE-2024-53104.html
 - https://www.suse.com/security/cve/CVE-2024-53114.html
 - https://www.suse.com/security/cve/CVE-2024-53142.html
 - https://bugzilla.suse.com/show_bug.cgi?id=1082555
 - https://bugzilla.suse.com/show_bug.cgi?id=1157160
 - https://bugzilla.suse.com/show_bug.cgi?id=1218644
 - https://bugzilla.suse.com/show_bug.cgi?id=1221977
 - https://bugzilla.suse.com/show_bug.cgi?id=1222364
 - https://bugzilla.suse.com/show_bug.cgi?id=1222413
 - https://bugzilla.suse.com/show_bug.cgi?id=1223044
 - https://bugzilla.suse.com/show_bug.cgi?id=1223057
 - https://bugzilla.suse.com/show_bug.cgi?id=1223769
 - https://bugzilla.suse.com/show_bug.cgi?id=1224526
 - https://bugzilla.suse.com/show_bug.cgi?id=1225730
 - https://bugzilla.suse.com/show_bug.cgi?id=1225742
 - https://bugzilla.suse.com/show_bug.cgi?id=1225764
 - https://bugzilla.suse.com/show_bug.cgi?id=1228015
 - https://bugzilla.suse.com/show_bug.cgi?id=1228650
 - https://bugzilla.suse.com/show_bug.cgi?id=1228708
 - https://bugzilla.suse.com/show_bug.cgi?id=1228779
 - https://bugzilla.suse.com/show_bug.cgi?id=1230231
 - https://bugzilla.suse.com/show_bug.cgi?id=1230429
 - https://bugzilla.suse.com/show_bug.cgi?id=1230766
 - https://bugzilla.suse.com/show_bug.cgi?id=1230773
 - https://bugzilla.suse.com/show_bug.cgi?id=1230784
 - https://bugzilla.suse.com/show_bug.cgi?id=1230827
 - https://bugzilla.suse.com/show_bug.cgi?id=1231184
 - https://bugzilla.suse.com/show_bug.cgi?id=1231439
 - https://bugzilla.suse.com/show_bug.cgi?id=1231904
 - https://bugzilla.suse.com/show_bug.cgi?id=1231920
 - https://bugzilla.suse.com/show_bug.cgi?id=1231930
 - https://bugzilla.suse.com/show_bug.cgi?id=1232157
 - https://bugzilla.suse.com/show_bug.cgi?id=1232159
 - https://bugzilla.suse.com/show_bug.cgi?id=1232165
 - https://bugzilla.suse.com/show_bug.cgi?id=1232198
 - https://bugzilla.suse.com/show_bug.cgi?id=1232201
 - https://bugzilla.suse.com/show_bug.cgi?id=1232224
 - https://bugzilla.suse.com/show_bug.cgi?id=1232251
 - https://bugzilla.suse.com/show_bug.cgi?id=1232272
 - https://bugzilla.suse.com/show_bug.cgi?id=1232329
 - https://bugzilla.suse.com/show_bug.cgi?id=1232371
 - https://bugzilla.suse.com/show_bug.cgi?id=1232436
 - https://bugzilla.suse.com/show_bug.cgi?id=1232507
 - https://bugzilla.suse.com/show_bug.cgi?id=1232520
 - https://bugzilla.suse.com/show_bug.cgi?id=1232552
 - https://bugzilla.suse.com/show_bug.cgi?id=1232873
 - https://bugzilla.suse.com/show_bug.cgi?id=1232887
 - https://bugzilla.suse.com/show_bug.cgi?id=1232888
 - https://bugzilla.suse.com/show_bug.cgi?id=1232897
 - https://bugzilla.suse.com/show_bug.cgi?id=1232919
 - https://bugzilla.suse.com/show_bug.cgi?id=1232928
 - https://bugzilla.suse.com/show_bug.cgi?id=1233049
 - https://bugzilla.suse.com/show_bug.cgi?id=1233051
 - https://bugzilla.suse.com/show_bug.cgi?id=1233057
 - https://bugzilla.suse.com/show_bug.cgi?id=1233063
 - https://bugzilla.suse.com/show_bug.cgi?id=1233070
 - https://bugzilla.suse.com/show_bug.cgi?id=1233097
 - https://bugzilla.suse.com/show_bug.cgi?id=1233103
 - https://bugzilla.suse.com/show_bug.cgi?id=1233108
 - https://bugzilla.suse.com/show_bug.cgi?id=1233111
 - https://bugzilla.suse.com/show_bug.cgi?id=1233123
 - https://bugzilla.suse.com/show_bug.cgi?id=1233130
 - https://bugzilla.suse.com/show_bug.cgi?id=1233191
 - https://bugzilla.suse.com/show_bug.cgi?id=1233211
 - https://bugzilla.suse.com/show_bug.cgi?id=1233212
 - https://bugzilla.suse.com/show_bug.cgi?id=1233216
 - https://bugzilla.suse.com/show_bug.cgi?id=1233453
 - https://bugzilla.suse.com/show_bug.cgi?id=1233454
 - https://bugzilla.suse.com/show_bug.cgi?id=1233456
 - https://bugzilla.suse.com/show_bug.cgi?id=1233462
 - https://bugzilla.suse.com/show_bug.cgi?id=1233467
 - https://bugzilla.suse.com/show_bug.cgi?id=1233468
 - https://bugzilla.suse.com/show_bug.cgi?id=1233478
 - https://bugzilla.suse.com/show_bug.cgi?id=1233479
 - https://bugzilla.suse.com/show_bug.cgi?id=1233485
 - https://bugzilla.suse.com/show_bug.cgi?id=1233490
 - https://bugzilla.suse.com/show_bug.cgi?id=1233491
 - https://bugzilla.suse.com/show_bug.cgi?id=1233552
 - https://bugzilla.suse.com/show_bug.cgi?id=1233555
 - https://bugzilla.suse.com/show_bug.cgi?id=1233557
 - https://bugzilla.suse.com/show_bug.cgi?id=1233560
 - https://bugzilla.suse.com/show_bug.cgi?id=1233577
 - https://bugzilla.suse.com/show_bug.cgi?id=1233580
 - https://bugzilla.suse.com/show_bug.cgi?id=1234025
 - https://bugzilla.suse.com/show_bug.cgi?id=1234072
 - https://bugzilla.suse.com/show_bug.cgi?id=1234087