Security update for the Linux Kernel
| Announcement ID: | SUSE-SU-2025:4111-1 |
|---|---|
| Release Date: | 2025-11-15T18:39:08Z |
| Rating: | important |
| References: |
|
| Cross-References: |
|
| CVSS scores: |
|
| Affected Products: |
|
An update that solves 173 vulnerabilities, contains two features and has 19 security fixes can now be installed.
Description:
The SUSE Linux Enterprise 15 SP4 kernel was updated to fix various security issues
The following security issues were fixed:
- CVE-2022-50327: ACPI: processor: idle: Check acpi_fetch_acpi_dev() return value (bsc#1249859).
- CVE-2022-50334: hugetlbfs: fix null-ptr-deref in hugetlbfs_parse_param() (bsc#1249857).
- CVE-2022-50490: bpf: Propagate error from htab_lock_bucket() to userspace (bsc#1251164).
- CVE-2022-50516: fs: dlm: fix invalid derefence of sb_lvbptr (bsc#1251741).
- CVE-2023-53365: ip6mr: Fix skb_under_panic in ip6mr_cache_report() (bsc#1249988).
- CVE-2023-53500: xfrm: fix slab-use-after-free in decode_session6 (bsc#1250816).
- CVE-2023-53559: ip_vti: fix potential slab-use-after-free in decode_session6 (bsc#1251052).
- CVE-2023-53574: wifi: rtw88: delete timer and free skb queue when unloading (bsc#1251222).
- CVE-2023-53619: netfilter: conntrack: Avoid nf_ct_helper_hash uses after free (bsc#1251743).
- CVE-2023-53673: Bluetooth: hci_event: call disconnect callback before deleting conn (bsc#1251763).
- CVE-2023-53705: ipv6: Fix out-of-bounds access in ipv6_find_tlv() (bsc#1252554).
- CVE-2025-39742: RDMA: hfi1: fix possible divide-by-zero in find_hw_thread_mask() (bsc#1249479).
- CVE-2025-39945: cnic: Fix use-after-free bugs in cnic_delete_task (bsc#1251230).
- CVE-2025-39967: fbcon: fix integer overflow in fbcon_do_set_font (bsc#1252033).
- CVE-2025-39968: i40e: add max boundary check for VF filters (bsc#1252047).
- CVE-2025-39973: i40e: add validation for ring_len param (bsc#1252035).
- CVE-2025-39978: octeontx2-pf: Fix potential use after free in otx2_tc_add_flow() (bsc#1252069).
- CVE-2025-40018: ipvs: Defer ip_vs_ftp unregister during netns cleanup (bsc#1252688).
- CVE-2025-40044: fs: udf: fix OOB read in lengthAllocDescs handling (bsc#1252785).
- CVE-2025-40088: hfsplus: fix slab-out-of-bounds read in hfsplus_strcasecmp() (bsc#1252904).
- CVE-2025-40102: KVM: arm64: Prevent access to vCPU events before init (bsc#1252919).
The following non security issues were fixed:
- fbcon: Fix OOB access in font allocation (bsc#1252033)
- mm: avoid unnecessary page fault retires on shared memory types (bsc#1251823).
- net: hv_netvsc: fix loss of early receive events from host during channel open (bsc#1252265).
Special Instructions and Notes:
- Please reboot the system after installing this update.
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
openSUSE Leap 15.4
zypper in -t patch SUSE-2025-4111=1 -
SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2025-4111=1 -
SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2025-4111=1 -
SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2025-4111=1 -
SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2025-4111=1 -
SUSE Linux Enterprise High Availability Extension 15 SP4
zypper in -t patch SUSE-SLE-Product-HA-15-SP4-2025-4111=1 -
SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-4111=1 -
SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-4111=1 -
SUSE Linux Enterprise Server 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-4111=1 -
SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-4111=1 -
SUSE Manager Proxy 4.3 LTS
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-LTS-2025-4111=1 -
SUSE Manager Retail Branch Server 4.3 LTS
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.3-LTS-2025-4111=1 -
SUSE Manager Server 4.3 LTS
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-LTS-2025-4111=1 -
SUSE Linux Enterprise Live Patching 15-SP4
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2025-4111=1
Please note that this is the initial kernel livepatch without fixes itself, this package is later updated by separate standalone kernel livepatch updates.
Package List:
-
openSUSE Leap 15.4 (noarch nosrc)
- kernel-docs-5.14.21-150400.24.184.1
-
openSUSE Leap 15.4 (noarch)
- kernel-docs-html-5.14.21-150400.24.184.1
- kernel-source-vanilla-5.14.21-150400.24.184.1
- kernel-devel-5.14.21-150400.24.184.1
- kernel-macros-5.14.21-150400.24.184.1
- kernel-source-5.14.21-150400.24.184.1
-
openSUSE Leap 15.4 (aarch64 ppc64le x86_64)
- kernel-kvmsmall-debuginfo-5.14.21-150400.24.184.1
- kernel-kvmsmall-devel-5.14.21-150400.24.184.1
- kernel-default-base-rebuild-5.14.21-150400.24.184.1.150400.24.94.2
- kernel-kvmsmall-debugsource-5.14.21-150400.24.184.1
- kernel-default-base-5.14.21-150400.24.184.1.150400.24.94.2
- kernel-kvmsmall-devel-debuginfo-5.14.21-150400.24.184.1
-
openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64)
- dlm-kmp-default-5.14.21-150400.24.184.1
- cluster-md-kmp-default-5.14.21-150400.24.184.1
- dlm-kmp-default-debuginfo-5.14.21-150400.24.184.1
- kselftests-kmp-default-debuginfo-5.14.21-150400.24.184.1
- kernel-default-livepatch-5.14.21-150400.24.184.1
- kernel-default-devel-debuginfo-5.14.21-150400.24.184.1
- kernel-obs-build-debugsource-5.14.21-150400.24.184.1
- kernel-obs-build-5.14.21-150400.24.184.1
- ocfs2-kmp-default-5.14.21-150400.24.184.1
- ocfs2-kmp-default-debuginfo-5.14.21-150400.24.184.1
- kernel-syms-5.14.21-150400.24.184.1
- kernel-default-extra-5.14.21-150400.24.184.1
- cluster-md-kmp-default-debuginfo-5.14.21-150400.24.184.1
- gfs2-kmp-default-debuginfo-5.14.21-150400.24.184.1
- kernel-default-optional-5.14.21-150400.24.184.1
- reiserfs-kmp-default-debuginfo-5.14.21-150400.24.184.1
- kernel-default-extra-debuginfo-5.14.21-150400.24.184.1
- kernel-obs-qa-5.14.21-150400.24.184.1
- kernel-default-debugsource-5.14.21-150400.24.184.1
- reiserfs-kmp-default-5.14.21-150400.24.184.1
- kselftests-kmp-default-5.14.21-150400.24.184.1
- gfs2-kmp-default-5.14.21-150400.24.184.1
- kernel-default-debuginfo-5.14.21-150400.24.184.1
- kernel-default-devel-5.14.21-150400.24.184.1
- kernel-default-optional-debuginfo-5.14.21-150400.24.184.1
-
openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 nosrc)
- kernel-default-5.14.21-150400.24.184.1
-
openSUSE Leap 15.4 (ppc64le s390x x86_64)
- kernel-livepatch-5_14_21-150400_24_184-default-1-150400.9.5.1
- kernel-livepatch-5_14_21-150400_24_184-default-debuginfo-1-150400.9.5.1
- kernel-default-livepatch-devel-5.14.21-150400.24.184.1
- kernel-livepatch-SLE15-SP4_Update_46-debugsource-1-150400.9.5.1
-
openSUSE Leap 15.4 (aarch64 nosrc ppc64le x86_64)
- kernel-kvmsmall-5.14.21-150400.24.184.1
-
openSUSE Leap 15.4 (nosrc s390x)
- kernel-zfcpdump-5.14.21-150400.24.184.1
-
openSUSE Leap 15.4 (s390x)
- kernel-zfcpdump-debuginfo-5.14.21-150400.24.184.1
- kernel-zfcpdump-debugsource-5.14.21-150400.24.184.1
-
openSUSE Leap 15.4 (nosrc)
- dtb-aarch64-5.14.21-150400.24.184.1
-
openSUSE Leap 15.4 (aarch64)
- dtb-freescale-5.14.21-150400.24.184.1
- kernel-64kb-extra-5.14.21-150400.24.184.1
- kernel-64kb-devel-5.14.21-150400.24.184.1
- dtb-lg-5.14.21-150400.24.184.1
- dtb-socionext-5.14.21-150400.24.184.1
- kernel-64kb-optional-debuginfo-5.14.21-150400.24.184.1
- dlm-kmp-64kb-debuginfo-5.14.21-150400.24.184.1
- ocfs2-kmp-64kb-5.14.21-150400.24.184.1
- dtb-exynos-5.14.21-150400.24.184.1
- gfs2-kmp-64kb-debuginfo-5.14.21-150400.24.184.1
- kernel-64kb-debuginfo-5.14.21-150400.24.184.1
- gfs2-kmp-64kb-5.14.21-150400.24.184.1
- dtb-broadcom-5.14.21-150400.24.184.1
- dtb-arm-5.14.21-150400.24.184.1
- dtb-rockchip-5.14.21-150400.24.184.1
- dtb-mediatek-5.14.21-150400.24.184.1
- dtb-hisilicon-5.14.21-150400.24.184.1
- dtb-amazon-5.14.21-150400.24.184.1
- dtb-xilinx-5.14.21-150400.24.184.1
- dtb-marvell-5.14.21-150400.24.184.1
- cluster-md-kmp-64kb-5.14.21-150400.24.184.1
- kernel-64kb-debugsource-5.14.21-150400.24.184.1
- reiserfs-kmp-64kb-debuginfo-5.14.21-150400.24.184.1
- kernel-64kb-optional-5.14.21-150400.24.184.1
- dtb-apple-5.14.21-150400.24.184.1
- dtb-cavium-5.14.21-150400.24.184.1
- kselftests-kmp-64kb-5.14.21-150400.24.184.1
- cluster-md-kmp-64kb-debuginfo-5.14.21-150400.24.184.1
- kernel-64kb-extra-debuginfo-5.14.21-150400.24.184.1
- dlm-kmp-64kb-5.14.21-150400.24.184.1
- kselftests-kmp-64kb-debuginfo-5.14.21-150400.24.184.1
- dtb-sprd-5.14.21-150400.24.184.1
- dtb-allwinner-5.14.21-150400.24.184.1
- reiserfs-kmp-64kb-5.14.21-150400.24.184.1
- kernel-64kb-devel-debuginfo-5.14.21-150400.24.184.1
- dtb-altera-5.14.21-150400.24.184.1
- dtb-amlogic-5.14.21-150400.24.184.1
- dtb-qcom-5.14.21-150400.24.184.1
- dtb-renesas-5.14.21-150400.24.184.1
- ocfs2-kmp-64kb-debuginfo-5.14.21-150400.24.184.1
- dtb-nvidia-5.14.21-150400.24.184.1
- dtb-amd-5.14.21-150400.24.184.1
- dtb-apm-5.14.21-150400.24.184.1
-
openSUSE Leap 15.4 (aarch64 nosrc)
- kernel-64kb-5.14.21-150400.24.184.1
-
SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 nosrc s390x x86_64)
- kernel-default-5.14.21-150400.24.184.1
-
SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 x86_64)
- kernel-default-base-5.14.21-150400.24.184.1.150400.24.94.2
-
SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
- kernel-default-debugsource-5.14.21-150400.24.184.1
- kernel-default-debuginfo-5.14.21-150400.24.184.1
-
SUSE Linux Enterprise Micro 5.3 (aarch64 nosrc s390x x86_64)
- kernel-default-5.14.21-150400.24.184.1
-
SUSE Linux Enterprise Micro 5.3 (aarch64 x86_64)
- kernel-default-base-5.14.21-150400.24.184.1.150400.24.94.2
-
SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
- kernel-default-debugsource-5.14.21-150400.24.184.1
- kernel-default-debuginfo-5.14.21-150400.24.184.1
-
SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 nosrc s390x x86_64)
- kernel-default-5.14.21-150400.24.184.1
-
SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 x86_64)
- kernel-default-base-5.14.21-150400.24.184.1.150400.24.94.2
-
SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
- kernel-default-debugsource-5.14.21-150400.24.184.1
- kernel-default-debuginfo-5.14.21-150400.24.184.1
-
SUSE Linux Enterprise Micro 5.4 (aarch64 nosrc s390x x86_64)
- kernel-default-5.14.21-150400.24.184.1
-
SUSE Linux Enterprise Micro 5.4 (aarch64 x86_64)
- kernel-default-base-5.14.21-150400.24.184.1.150400.24.94.2
-
SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
- kernel-default-debugsource-5.14.21-150400.24.184.1
- kernel-default-debuginfo-5.14.21-150400.24.184.1
-
SUSE Linux Enterprise High Availability Extension 15 SP4 (aarch64 ppc64le s390x x86_64)
- dlm-kmp-default-5.14.21-150400.24.184.1
- ocfs2-kmp-default-debuginfo-5.14.21-150400.24.184.1
- cluster-md-kmp-default-5.14.21-150400.24.184.1
- dlm-kmp-default-debuginfo-5.14.21-150400.24.184.1
- gfs2-kmp-default-5.14.21-150400.24.184.1
- kernel-default-debuginfo-5.14.21-150400.24.184.1
- kernel-default-debugsource-5.14.21-150400.24.184.1
- cluster-md-kmp-default-debuginfo-5.14.21-150400.24.184.1
- gfs2-kmp-default-debuginfo-5.14.21-150400.24.184.1
- ocfs2-kmp-default-5.14.21-150400.24.184.1
-
SUSE Linux Enterprise High Availability Extension 15 SP4 (nosrc)
- kernel-default-5.14.21-150400.24.184.1
-
SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 nosrc)
- kernel-64kb-5.14.21-150400.24.184.1
-
SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64)
- kernel-64kb-debugsource-5.14.21-150400.24.184.1
- kernel-64kb-devel-debuginfo-5.14.21-150400.24.184.1
- kernel-64kb-debuginfo-5.14.21-150400.24.184.1
- kernel-64kb-devel-5.14.21-150400.24.184.1
-
SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 nosrc x86_64)
- kernel-default-5.14.21-150400.24.184.1
-
SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64)
- reiserfs-kmp-default-debuginfo-5.14.21-150400.24.184.1
- kernel-syms-5.14.21-150400.24.184.1
- kernel-default-debugsource-5.14.21-150400.24.184.1
- kernel-default-debuginfo-5.14.21-150400.24.184.1
- reiserfs-kmp-default-5.14.21-150400.24.184.1
- kernel-default-base-5.14.21-150400.24.184.1.150400.24.94.2
- kernel-obs-build-debugsource-5.14.21-150400.24.184.1
- kernel-default-devel-debuginfo-5.14.21-150400.24.184.1
- kernel-obs-build-5.14.21-150400.24.184.1
- kernel-default-devel-5.14.21-150400.24.184.1
-
SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
- kernel-devel-5.14.21-150400.24.184.1
- kernel-macros-5.14.21-150400.24.184.1
- kernel-source-5.14.21-150400.24.184.1
-
SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch nosrc)
- kernel-docs-5.14.21-150400.24.184.1
-
SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 nosrc)
- kernel-64kb-5.14.21-150400.24.184.1
-
SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64)
- kernel-64kb-debugsource-5.14.21-150400.24.184.1
- kernel-64kb-devel-debuginfo-5.14.21-150400.24.184.1
- kernel-64kb-debuginfo-5.14.21-150400.24.184.1
- kernel-64kb-devel-5.14.21-150400.24.184.1
-
SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 nosrc x86_64)
- kernel-default-5.14.21-150400.24.184.1
-
SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64)
- reiserfs-kmp-default-debuginfo-5.14.21-150400.24.184.1
- kernel-syms-5.14.21-150400.24.184.1
- kernel-default-debugsource-5.14.21-150400.24.184.1
- kernel-default-debuginfo-5.14.21-150400.24.184.1
- reiserfs-kmp-default-5.14.21-150400.24.184.1
- kernel-default-base-5.14.21-150400.24.184.1.150400.24.94.2
- kernel-obs-build-debugsource-5.14.21-150400.24.184.1
- kernel-default-devel-debuginfo-5.14.21-150400.24.184.1
- kernel-obs-build-5.14.21-150400.24.184.1
- kernel-default-devel-5.14.21-150400.24.184.1
-
SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
- kernel-devel-5.14.21-150400.24.184.1
- kernel-macros-5.14.21-150400.24.184.1
- kernel-source-5.14.21-150400.24.184.1
-
SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch nosrc)
- kernel-docs-5.14.21-150400.24.184.1
-
SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 nosrc)
- kernel-64kb-5.14.21-150400.24.184.1
-
SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64)
- kernel-64kb-debugsource-5.14.21-150400.24.184.1
- kernel-64kb-devel-debuginfo-5.14.21-150400.24.184.1
- kernel-64kb-debuginfo-5.14.21-150400.24.184.1
- kernel-64kb-devel-5.14.21-150400.24.184.1
-
SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64 nosrc)
- kernel-default-5.14.21-150400.24.184.1
-
SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le x86_64)
- kernel-default-base-5.14.21-150400.24.184.1.150400.24.94.2
-
SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64)
- reiserfs-kmp-default-debuginfo-5.14.21-150400.24.184.1
- kernel-syms-5.14.21-150400.24.184.1
- kernel-default-debugsource-5.14.21-150400.24.184.1
- kernel-default-debuginfo-5.14.21-150400.24.184.1
- reiserfs-kmp-default-5.14.21-150400.24.184.1
- kernel-obs-build-debugsource-5.14.21-150400.24.184.1
- kernel-default-devel-debuginfo-5.14.21-150400.24.184.1
- kernel-obs-build-5.14.21-150400.24.184.1
- kernel-default-devel-5.14.21-150400.24.184.1
-
SUSE Linux Enterprise Server 15 SP4 LTSS (noarch)
- kernel-devel-5.14.21-150400.24.184.1
- kernel-macros-5.14.21-150400.24.184.1
- kernel-source-5.14.21-150400.24.184.1
-
SUSE Linux Enterprise Server 15 SP4 LTSS (noarch nosrc)
- kernel-docs-5.14.21-150400.24.184.1
-
SUSE Linux Enterprise Server 15 SP4 LTSS (nosrc s390x)
- kernel-zfcpdump-5.14.21-150400.24.184.1
-
SUSE Linux Enterprise Server 15 SP4 LTSS (s390x)
- kernel-zfcpdump-debuginfo-5.14.21-150400.24.184.1
- kernel-zfcpdump-debugsource-5.14.21-150400.24.184.1
-
SUSE Linux Enterprise Server for SAP Applications 15 SP4 (nosrc ppc64le x86_64)
- kernel-default-5.14.21-150400.24.184.1
-
SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
- reiserfs-kmp-default-debuginfo-5.14.21-150400.24.184.1
- kernel-syms-5.14.21-150400.24.184.1
- kernel-default-debugsource-5.14.21-150400.24.184.1
- kernel-default-debuginfo-5.14.21-150400.24.184.1
- reiserfs-kmp-default-5.14.21-150400.24.184.1
- kernel-default-base-5.14.21-150400.24.184.1.150400.24.94.2
- kernel-obs-build-debugsource-5.14.21-150400.24.184.1
- kernel-default-devel-debuginfo-5.14.21-150400.24.184.1
- kernel-obs-build-5.14.21-150400.24.184.1
- kernel-default-devel-5.14.21-150400.24.184.1
-
SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
- kernel-devel-5.14.21-150400.24.184.1
- kernel-macros-5.14.21-150400.24.184.1
- kernel-source-5.14.21-150400.24.184.1
-
SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch nosrc)
- kernel-docs-5.14.21-150400.24.184.1
-
SUSE Manager Proxy 4.3 LTS (nosrc x86_64)
- kernel-default-5.14.21-150400.24.184.1
-
SUSE Manager Proxy 4.3 LTS (x86_64)
- kernel-syms-5.14.21-150400.24.184.1
- kernel-default-debugsource-5.14.21-150400.24.184.1
- kernel-default-debuginfo-5.14.21-150400.24.184.1
- kernel-default-base-5.14.21-150400.24.184.1.150400.24.94.2
- kernel-default-devel-debuginfo-5.14.21-150400.24.184.1
- kernel-default-devel-5.14.21-150400.24.184.1
-
SUSE Manager Proxy 4.3 LTS (noarch)
- kernel-devel-5.14.21-150400.24.184.1
- kernel-macros-5.14.21-150400.24.184.1
- kernel-source-5.14.21-150400.24.184.1
-
SUSE Manager Retail Branch Server 4.3 LTS (nosrc x86_64)
- kernel-default-5.14.21-150400.24.184.1
-
SUSE Manager Retail Branch Server 4.3 LTS (x86_64)
- kernel-default-debugsource-5.14.21-150400.24.184.1
- kernel-default-debuginfo-5.14.21-150400.24.184.1
- kernel-default-base-5.14.21-150400.24.184.1.150400.24.94.2
- kernel-default-devel-debuginfo-5.14.21-150400.24.184.1
- kernel-default-devel-5.14.21-150400.24.184.1
-
SUSE Manager Retail Branch Server 4.3 LTS (noarch)
- kernel-devel-5.14.21-150400.24.184.1
- kernel-macros-5.14.21-150400.24.184.1
-
SUSE Manager Server 4.3 LTS (nosrc ppc64le s390x x86_64)
- kernel-default-5.14.21-150400.24.184.1
-
SUSE Manager Server 4.3 LTS (ppc64le x86_64)
- kernel-default-base-5.14.21-150400.24.184.1.150400.24.94.2
-
SUSE Manager Server 4.3 LTS (ppc64le s390x x86_64)
- kernel-syms-5.14.21-150400.24.184.1
- kernel-default-debugsource-5.14.21-150400.24.184.1
- kernel-default-debuginfo-5.14.21-150400.24.184.1
- kernel-default-devel-debuginfo-5.14.21-150400.24.184.1
- kernel-default-devel-5.14.21-150400.24.184.1
-
SUSE Manager Server 4.3 LTS (noarch)
- kernel-devel-5.14.21-150400.24.184.1
- kernel-macros-5.14.21-150400.24.184.1
- kernel-source-5.14.21-150400.24.184.1
-
SUSE Manager Server 4.3 LTS (nosrc s390x)
- kernel-zfcpdump-5.14.21-150400.24.184.1
-
SUSE Manager Server 4.3 LTS (s390x)
- kernel-zfcpdump-debuginfo-5.14.21-150400.24.184.1
- kernel-zfcpdump-debugsource-5.14.21-150400.24.184.1
-
SUSE Linux Enterprise Live Patching 15-SP4 (nosrc)
- kernel-default-5.14.21-150400.24.184.1
-
SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64)
- kernel-livepatch-5_14_21-150400_24_184-default-debuginfo-1-150400.9.5.1
- kernel-livepatch-SLE15-SP4_Update_46-debugsource-1-150400.9.5.1
- kernel-default-debugsource-5.14.21-150400.24.184.1
- kernel-default-debuginfo-5.14.21-150400.24.184.1
- kernel-livepatch-5_14_21-150400_24_184-default-1-150400.9.5.1
- kernel-default-livepatch-5.14.21-150400.24.184.1
- kernel-default-livepatch-devel-5.14.21-150400.24.184.1
References:
- https://www.suse.com/security/cve/CVE-2022-43945.html
- https://www.suse.com/security/cve/CVE-2022-50327.html
- https://www.suse.com/security/cve/CVE-2022-50334.html
- https://www.suse.com/security/cve/CVE-2022-50470.html
- https://www.suse.com/security/cve/CVE-2022-50471.html
- https://www.suse.com/security/cve/CVE-2022-50472.html
- https://www.suse.com/security/cve/CVE-2022-50475.html
- https://www.suse.com/security/cve/CVE-2022-50478.html
- https://www.suse.com/security/cve/CVE-2022-50480.html
- https://www.suse.com/security/cve/CVE-2022-50482.html
- https://www.suse.com/security/cve/CVE-2022-50484.html
- https://www.suse.com/security/cve/CVE-2022-50485.html
- https://www.suse.com/security/cve/CVE-2022-50487.html
- https://www.suse.com/security/cve/CVE-2022-50488.html
- https://www.suse.com/security/cve/CVE-2022-50489.html
- https://www.suse.com/security/cve/CVE-2022-50490.html
- https://www.suse.com/security/cve/CVE-2022-50492.html
- https://www.suse.com/security/cve/CVE-2022-50493.html
- https://www.suse.com/security/cve/CVE-2022-50494.html
- https://www.suse.com/security/cve/CVE-2022-50496.html
- https://www.suse.com/security/cve/CVE-2022-50497.html
- https://www.suse.com/security/cve/CVE-2022-50498.html
- https://www.suse.com/security/cve/CVE-2022-50499.html
- https://www.suse.com/security/cve/CVE-2022-50501.html
- https://www.suse.com/security/cve/CVE-2022-50503.html
- https://www.suse.com/security/cve/CVE-2022-50504.html
- https://www.suse.com/security/cve/CVE-2022-50505.html
- https://www.suse.com/security/cve/CVE-2022-50509.html
- https://www.suse.com/security/cve/CVE-2022-50511.html
- https://www.suse.com/security/cve/CVE-2022-50512.html
- https://www.suse.com/security/cve/CVE-2022-50513.html
- https://www.suse.com/security/cve/CVE-2022-50514.html
- https://www.suse.com/security/cve/CVE-2022-50516.html
- https://www.suse.com/security/cve/CVE-2022-50519.html
- https://www.suse.com/security/cve/CVE-2022-50520.html
- https://www.suse.com/security/cve/CVE-2022-50521.html
- https://www.suse.com/security/cve/CVE-2022-50523.html
- https://www.suse.com/security/cve/CVE-2022-50525.html
- https://www.suse.com/security/cve/CVE-2022-50528.html
- https://www.suse.com/security/cve/CVE-2022-50529.html
- https://www.suse.com/security/cve/CVE-2022-50530.html
- https://www.suse.com/security/cve/CVE-2022-50532.html
- https://www.suse.com/security/cve/CVE-2022-50534.html
- https://www.suse.com/security/cve/CVE-2022-50535.html
- https://www.suse.com/security/cve/CVE-2022-50537.html
- https://www.suse.com/security/cve/CVE-2022-50541.html
- https://www.suse.com/security/cve/CVE-2022-50542.html
- https://www.suse.com/security/cve/CVE-2022-50544.html
- https://www.suse.com/security/cve/CVE-2022-50545.html
- https://www.suse.com/security/cve/CVE-2022-50546.html
- https://www.suse.com/security/cve/CVE-2022-50549.html
- https://www.suse.com/security/cve/CVE-2022-50551.html
- https://www.suse.com/security/cve/CVE-2022-50553.html
- https://www.suse.com/security/cve/CVE-2022-50556.html
- https://www.suse.com/security/cve/CVE-2022-50559.html
- https://www.suse.com/security/cve/CVE-2022-50560.html
- https://www.suse.com/security/cve/CVE-2022-50561.html
- https://www.suse.com/security/cve/CVE-2022-50562.html
- https://www.suse.com/security/cve/CVE-2022-50563.html
- https://www.suse.com/security/cve/CVE-2022-50564.html
- https://www.suse.com/security/cve/CVE-2022-50566.html
- https://www.suse.com/security/cve/CVE-2022-50567.html
- https://www.suse.com/security/cve/CVE-2022-50568.html
- https://www.suse.com/security/cve/CVE-2022-50570.html
- https://www.suse.com/security/cve/CVE-2022-50572.html
- https://www.suse.com/security/cve/CVE-2022-50574.html
- https://www.suse.com/security/cve/CVE-2022-50575.html
- https://www.suse.com/security/cve/CVE-2022-50576.html
- https://www.suse.com/security/cve/CVE-2022-50578.html
- https://www.suse.com/security/cve/CVE-2022-50579.html
- https://www.suse.com/security/cve/CVE-2022-50580.html
- https://www.suse.com/security/cve/CVE-2022-50581.html
- https://www.suse.com/security/cve/CVE-2022-50582.html
- https://www.suse.com/security/cve/CVE-2023-52923.html
- https://www.suse.com/security/cve/CVE-2023-53365.html
- https://www.suse.com/security/cve/CVE-2023-53500.html
- https://www.suse.com/security/cve/CVE-2023-53533.html
- https://www.suse.com/security/cve/CVE-2023-53534.html
- https://www.suse.com/security/cve/CVE-2023-53541.html
- https://www.suse.com/security/cve/CVE-2023-53542.html
- https://www.suse.com/security/cve/CVE-2023-53548.html
- https://www.suse.com/security/cve/CVE-2023-53551.html
- https://www.suse.com/security/cve/CVE-2023-53552.html
- https://www.suse.com/security/cve/CVE-2023-53553.html
- https://www.suse.com/security/cve/CVE-2023-53554.html
- https://www.suse.com/security/cve/CVE-2023-53556.html
- https://www.suse.com/security/cve/CVE-2023-53559.html
- https://www.suse.com/security/cve/CVE-2023-53560.html
- https://www.suse.com/security/cve/CVE-2023-53564.html
- https://www.suse.com/security/cve/CVE-2023-53566.html
- https://www.suse.com/security/cve/CVE-2023-53567.html
- https://www.suse.com/security/cve/CVE-2023-53568.html
- https://www.suse.com/security/cve/CVE-2023-53571.html
- https://www.suse.com/security/cve/CVE-2023-53572.html
- https://www.suse.com/security/cve/CVE-2023-53574.html
- https://www.suse.com/security/cve/CVE-2023-53576.html
- https://www.suse.com/security/cve/CVE-2023-53579.html
- https://www.suse.com/security/cve/CVE-2023-53582.html
- https://www.suse.com/security/cve/CVE-2023-53587.html
- https://www.suse.com/security/cve/CVE-2023-53589.html
- https://www.suse.com/security/cve/CVE-2023-53592.html
- https://www.suse.com/security/cve/CVE-2023-53594.html
- https://www.suse.com/security/cve/CVE-2023-53597.html
- https://www.suse.com/security/cve/CVE-2023-53603.html
- https://www.suse.com/security/cve/CVE-2023-53604.html
- https://www.suse.com/security/cve/CVE-2023-53605.html
- https://www.suse.com/security/cve/CVE-2023-53607.html
- https://www.suse.com/security/cve/CVE-2023-53608.html
- https://www.suse.com/security/cve/CVE-2023-53611.html
- https://www.suse.com/security/cve/CVE-2023-53612.html
- https://www.suse.com/security/cve/CVE-2023-53615.html
- https://www.suse.com/security/cve/CVE-2023-53616.html
- https://www.suse.com/security/cve/CVE-2023-53617.html
- https://www.suse.com/security/cve/CVE-2023-53619.html
- https://www.suse.com/security/cve/CVE-2023-53622.html
- https://www.suse.com/security/cve/CVE-2023-53625.html
- https://www.suse.com/security/cve/CVE-2023-53626.html
- https://www.suse.com/security/cve/CVE-2023-53631.html
- https://www.suse.com/security/cve/CVE-2023-53637.html
- https://www.suse.com/security/cve/CVE-2023-53639.html
- https://www.suse.com/security/cve/CVE-2023-53640.html
- https://www.suse.com/security/cve/CVE-2023-53641.html
- https://www.suse.com/security/cve/CVE-2023-53644.html
- https://www.suse.com/security/cve/CVE-2023-53648.html
- https://www.suse.com/security/cve/CVE-2023-53650.html
- https://www.suse.com/security/cve/CVE-2023-53651.html
- https://www.suse.com/security/cve/CVE-2023-53658.html
- https://www.suse.com/security/cve/CVE-2023-53659.html
- https://www.suse.com/security/cve/CVE-2023-53662.html
- https://www.suse.com/security/cve/CVE-2023-53667.html
- https://www.suse.com/security/cve/CVE-2023-53668.html
- https://www.suse.com/security/cve/CVE-2023-53670.html
- https://www.suse.com/security/cve/CVE-2023-53673.html
- https://www.suse.com/security/cve/CVE-2023-53674.html
- https://www.suse.com/security/cve/CVE-2023-53675.html
- https://www.suse.com/security/cve/CVE-2023-53679.html
- https://www.suse.com/security/cve/CVE-2023-53680.html
- https://www.suse.com/security/cve/CVE-2023-53681.html
- https://www.suse.com/security/cve/CVE-2023-53683.html
- https://www.suse.com/security/cve/CVE-2023-53687.html
- https://www.suse.com/security/cve/CVE-2023-53692.html
- https://www.suse.com/security/cve/CVE-2023-53693.html
- https://www.suse.com/security/cve/CVE-2023-53695.html
- https://www.suse.com/security/cve/CVE-2023-53696.html
- https://www.suse.com/security/cve/CVE-2023-53700.html
- https://www.suse.com/security/cve/CVE-2023-53704.html
- https://www.suse.com/security/cve/CVE-2023-53705.html
- https://www.suse.com/security/cve/CVE-2023-53708.html
- https://www.suse.com/security/cve/CVE-2023-53709.html
- https://www.suse.com/security/cve/CVE-2023-53711.html
- https://www.suse.com/security/cve/CVE-2023-53715.html
- https://www.suse.com/security/cve/CVE-2023-53717.html
- https://www.suse.com/security/cve/CVE-2023-53718.html
- https://www.suse.com/security/cve/CVE-2023-53719.html
- https://www.suse.com/security/cve/CVE-2023-53722.html
- https://www.suse.com/security/cve/CVE-2023-53723.html
- https://www.suse.com/security/cve/CVE-2023-53724.html
- https://www.suse.com/security/cve/CVE-2023-53725.html
- https://www.suse.com/security/cve/CVE-2023-53726.html
- https://www.suse.com/security/cve/CVE-2023-53730.html
- https://www.suse.com/security/cve/CVE-2023-7324.html
- https://www.suse.com/security/cve/CVE-2025-39742.html
- https://www.suse.com/security/cve/CVE-2025-39797.html
- https://www.suse.com/security/cve/CVE-2025-39945.html
- https://www.suse.com/security/cve/CVE-2025-39965.html
- https://www.suse.com/security/cve/CVE-2025-39967.html
- https://www.suse.com/security/cve/CVE-2025-39968.html
- https://www.suse.com/security/cve/CVE-2025-39973.html
- https://www.suse.com/security/cve/CVE-2025-39978.html
- https://www.suse.com/security/cve/CVE-2025-40018.html
- https://www.suse.com/security/cve/CVE-2025-40044.html
- https://www.suse.com/security/cve/CVE-2025-40088.html
- https://www.suse.com/security/cve/CVE-2025-40102.html
- https://bugzilla.suse.com/show_bug.cgi?id=1065729
- https://bugzilla.suse.com/show_bug.cgi?id=1205128
- https://bugzilla.suse.com/show_bug.cgi?id=1206893
- https://bugzilla.suse.com/show_bug.cgi?id=1207612
- https://bugzilla.suse.com/show_bug.cgi?id=1207619
- https://bugzilla.suse.com/show_bug.cgi?id=1210763
- https://bugzilla.suse.com/show_bug.cgi?id=1211162
- https://bugzilla.suse.com/show_bug.cgi?id=1211692
- https://bugzilla.suse.com/show_bug.cgi?id=1213098
- https://bugzilla.suse.com/show_bug.cgi?id=1213114
- https://bugzilla.suse.com/show_bug.cgi?id=1213747
- https://bugzilla.suse.com/show_bug.cgi?id=1214954
- https://bugzilla.suse.com/show_bug.cgi?id=1214992
- https://bugzilla.suse.com/show_bug.cgi?id=1215148
- https://bugzilla.suse.com/show_bug.cgi?id=1217366
- https://bugzilla.suse.com/show_bug.cgi?id=1236104
- https://bugzilla.suse.com/show_bug.cgi?id=1249479
- https://bugzilla.suse.com/show_bug.cgi?id=1249608
- https://bugzilla.suse.com/show_bug.cgi?id=1249857
- https://bugzilla.suse.com/show_bug.cgi?id=1249859
- https://bugzilla.suse.com/show_bug.cgi?id=1249988
- https://bugzilla.suse.com/show_bug.cgi?id=1250742
- https://bugzilla.suse.com/show_bug.cgi?id=1250816
- https://bugzilla.suse.com/show_bug.cgi?id=1250946
- https://bugzilla.suse.com/show_bug.cgi?id=1251027
- https://bugzilla.suse.com/show_bug.cgi?id=1251032
- https://bugzilla.suse.com/show_bug.cgi?id=1251034
- https://bugzilla.suse.com/show_bug.cgi?id=1251035
- https://bugzilla.suse.com/show_bug.cgi?id=1251040
- https://bugzilla.suse.com/show_bug.cgi?id=1251043
- https://bugzilla.suse.com/show_bug.cgi?id=1251045
- https://bugzilla.suse.com/show_bug.cgi?id=1251047
- https://bugzilla.suse.com/show_bug.cgi?id=1251052
- https://bugzilla.suse.com/show_bug.cgi?id=1251057
- https://bugzilla.suse.com/show_bug.cgi?id=1251059
- https://bugzilla.suse.com/show_bug.cgi?id=1251061
- https://bugzilla.suse.com/show_bug.cgi?id=1251063
- https://bugzilla.suse.com/show_bug.cgi?id=1251064
- https://bugzilla.suse.com/show_bug.cgi?id=1251065
- https://bugzilla.suse.com/show_bug.cgi?id=1251066
- https://bugzilla.suse.com/show_bug.cgi?id=1251068
- https://bugzilla.suse.com/show_bug.cgi?id=1251072
- https://bugzilla.suse.com/show_bug.cgi?id=1251080
- https://bugzilla.suse.com/show_bug.cgi?id=1251082
- https://bugzilla.suse.com/show_bug.cgi?id=1251086
- https://bugzilla.suse.com/show_bug.cgi?id=1251087
- https://bugzilla.suse.com/show_bug.cgi?id=1251088
- https://bugzilla.suse.com/show_bug.cgi?id=1251091
- https://bugzilla.suse.com/show_bug.cgi?id=1251092
- https://bugzilla.suse.com/show_bug.cgi?id=1251093
- https://bugzilla.suse.com/show_bug.cgi?id=1251097
- https://bugzilla.suse.com/show_bug.cgi?id=1251099
- https://bugzilla.suse.com/show_bug.cgi?id=1251101
- https://bugzilla.suse.com/show_bug.cgi?id=1251104
- https://bugzilla.suse.com/show_bug.cgi?id=1251110
- https://bugzilla.suse.com/show_bug.cgi?id=1251113
- https://bugzilla.suse.com/show_bug.cgi?id=1251115
- https://bugzilla.suse.com/show_bug.cgi?id=1251123
- https://bugzilla.suse.com/show_bug.cgi?id=1251128
- https://bugzilla.suse.com/show_bug.cgi?id=1251129
- https://bugzilla.suse.com/show_bug.cgi?id=1251133
- https://bugzilla.suse.com/show_bug.cgi?id=1251136
- https://bugzilla.suse.com/show_bug.cgi?id=1251147
- https://bugzilla.suse.com/show_bug.cgi?id=1251149
- https://bugzilla.suse.com/show_bug.cgi?id=1251154
- https://bugzilla.suse.com/show_bug.cgi?id=1251159
- https://bugzilla.suse.com/show_bug.cgi?id=1251164
- https://bugzilla.suse.com/show_bug.cgi?id=1251166
- https://bugzilla.suse.com/show_bug.cgi?id=1251169
- https://bugzilla.suse.com/show_bug.cgi?id=1251170
- https://bugzilla.suse.com/show_bug.cgi?id=1251173
- https://bugzilla.suse.com/show_bug.cgi?id=1251178
- https://bugzilla.suse.com/show_bug.cgi?id=1251180
- https://bugzilla.suse.com/show_bug.cgi?id=1251182
- https://bugzilla.suse.com/show_bug.cgi?id=1251197
- https://bugzilla.suse.com/show_bug.cgi?id=1251200
- https://bugzilla.suse.com/show_bug.cgi?id=1251201
- https://bugzilla.suse.com/show_bug.cgi?id=1251202
- https://bugzilla.suse.com/show_bug.cgi?id=1251208
- https://bugzilla.suse.com/show_bug.cgi?id=1251210
- https://bugzilla.suse.com/show_bug.cgi?id=1251215
- https://bugzilla.suse.com/show_bug.cgi?id=1251218
- https://bugzilla.suse.com/show_bug.cgi?id=1251222
- https://bugzilla.suse.com/show_bug.cgi?id=1251223
- https://bugzilla.suse.com/show_bug.cgi?id=1251230
- https://bugzilla.suse.com/show_bug.cgi?id=1251247
- https://bugzilla.suse.com/show_bug.cgi?id=1251268
- https://bugzilla.suse.com/show_bug.cgi?id=1251281
- https://bugzilla.suse.com/show_bug.cgi?id=1251282
- https://bugzilla.suse.com/show_bug.cgi?id=1251283
- https://bugzilla.suse.com/show_bug.cgi?id=1251285
- https://bugzilla.suse.com/show_bug.cgi?id=1251286
- https://bugzilla.suse.com/show_bug.cgi?id=1251292
- https://bugzilla.suse.com/show_bug.cgi?id=1251294
- https://bugzilla.suse.com/show_bug.cgi?id=1251295
- https://bugzilla.suse.com/show_bug.cgi?id=1251296
- https://bugzilla.suse.com/show_bug.cgi?id=1251298
- https://bugzilla.suse.com/show_bug.cgi?id=1251299
- https://bugzilla.suse.com/show_bug.cgi?id=1251300
- https://bugzilla.suse.com/show_bug.cgi?id=1251302
- https://bugzilla.suse.com/show_bug.cgi?id=1251303
- https://bugzilla.suse.com/show_bug.cgi?id=1251306
- https://bugzilla.suse.com/show_bug.cgi?id=1251310
- https://bugzilla.suse.com/show_bug.cgi?id=1251312
- https://bugzilla.suse.com/show_bug.cgi?id=1251322
- https://bugzilla.suse.com/show_bug.cgi?id=1251324
- https://bugzilla.suse.com/show_bug.cgi?id=1251325
- https://bugzilla.suse.com/show_bug.cgi?id=1251326
- https://bugzilla.suse.com/show_bug.cgi?id=1251327
- https://bugzilla.suse.com/show_bug.cgi?id=1251329
- https://bugzilla.suse.com/show_bug.cgi?id=1251330
- https://bugzilla.suse.com/show_bug.cgi?id=1251331
- https://bugzilla.suse.com/show_bug.cgi?id=1251519
- https://bugzilla.suse.com/show_bug.cgi?id=1251521
- https://bugzilla.suse.com/show_bug.cgi?id=1251522
- https://bugzilla.suse.com/show_bug.cgi?id=1251527
- https://bugzilla.suse.com/show_bug.cgi?id=1251529
- https://bugzilla.suse.com/show_bug.cgi?id=1251550
- https://bugzilla.suse.com/show_bug.cgi?id=1251723
- https://bugzilla.suse.com/show_bug.cgi?id=1251725
- https://bugzilla.suse.com/show_bug.cgi?id=1251728
- https://bugzilla.suse.com/show_bug.cgi?id=1251730
- https://bugzilla.suse.com/show_bug.cgi?id=1251736
- https://bugzilla.suse.com/show_bug.cgi?id=1251737
- https://bugzilla.suse.com/show_bug.cgi?id=1251741
- https://bugzilla.suse.com/show_bug.cgi?id=1251743
- https://bugzilla.suse.com/show_bug.cgi?id=1251750
- https://bugzilla.suse.com/show_bug.cgi?id=1251753
- https://bugzilla.suse.com/show_bug.cgi?id=1251759
- https://bugzilla.suse.com/show_bug.cgi?id=1251761
- https://bugzilla.suse.com/show_bug.cgi?id=1251762
- https://bugzilla.suse.com/show_bug.cgi?id=1251763
- https://bugzilla.suse.com/show_bug.cgi?id=1251764
- https://bugzilla.suse.com/show_bug.cgi?id=1251767
- https://bugzilla.suse.com/show_bug.cgi?id=1251769
- https://bugzilla.suse.com/show_bug.cgi?id=1251772
- https://bugzilla.suse.com/show_bug.cgi?id=1251775
- https://bugzilla.suse.com/show_bug.cgi?id=1251777
- https://bugzilla.suse.com/show_bug.cgi?id=1251785
- https://bugzilla.suse.com/show_bug.cgi?id=1251823
- https://bugzilla.suse.com/show_bug.cgi?id=1251930
- https://bugzilla.suse.com/show_bug.cgi?id=1251967
- https://bugzilla.suse.com/show_bug.cgi?id=1252033
- https://bugzilla.suse.com/show_bug.cgi?id=1252035
- https://bugzilla.suse.com/show_bug.cgi?id=1252047
- https://bugzilla.suse.com/show_bug.cgi?id=1252069
- https://bugzilla.suse.com/show_bug.cgi?id=1252265
- https://bugzilla.suse.com/show_bug.cgi?id=1252474
- https://bugzilla.suse.com/show_bug.cgi?id=1252475
- https://bugzilla.suse.com/show_bug.cgi?id=1252476
- https://bugzilla.suse.com/show_bug.cgi?id=1252480
- https://bugzilla.suse.com/show_bug.cgi?id=1252484
- https://bugzilla.suse.com/show_bug.cgi?id=1252486
- https://bugzilla.suse.com/show_bug.cgi?id=1252489
- https://bugzilla.suse.com/show_bug.cgi?id=1252490
- https://bugzilla.suse.com/show_bug.cgi?id=1252492
- https://bugzilla.suse.com/show_bug.cgi?id=1252495
- https://bugzilla.suse.com/show_bug.cgi?id=1252497
- https://bugzilla.suse.com/show_bug.cgi?id=1252499
- https://bugzilla.suse.com/show_bug.cgi?id=1252501
- https://bugzilla.suse.com/show_bug.cgi?id=1252508
- https://bugzilla.suse.com/show_bug.cgi?id=1252509
- https://bugzilla.suse.com/show_bug.cgi?id=1252513
- https://bugzilla.suse.com/show_bug.cgi?id=1252515
- https://bugzilla.suse.com/show_bug.cgi?id=1252516
- https://bugzilla.suse.com/show_bug.cgi?id=1252519
- https://bugzilla.suse.com/show_bug.cgi?id=1252521
- https://bugzilla.suse.com/show_bug.cgi?id=1252522
- https://bugzilla.suse.com/show_bug.cgi?id=1252523
- https://bugzilla.suse.com/show_bug.cgi?id=1252526
- https://bugzilla.suse.com/show_bug.cgi?id=1252528
- https://bugzilla.suse.com/show_bug.cgi?id=1252529
- https://bugzilla.suse.com/show_bug.cgi?id=1252532
- https://bugzilla.suse.com/show_bug.cgi?id=1252535
- https://bugzilla.suse.com/show_bug.cgi?id=1252536
- https://bugzilla.suse.com/show_bug.cgi?id=1252537
- https://bugzilla.suse.com/show_bug.cgi?id=1252538
- https://bugzilla.suse.com/show_bug.cgi?id=1252539
- https://bugzilla.suse.com/show_bug.cgi?id=1252542
- https://bugzilla.suse.com/show_bug.cgi?id=1252545
- https://bugzilla.suse.com/show_bug.cgi?id=1252549
- https://bugzilla.suse.com/show_bug.cgi?id=1252554
- https://bugzilla.suse.com/show_bug.cgi?id=1252560
- https://bugzilla.suse.com/show_bug.cgi?id=1252564
- https://bugzilla.suse.com/show_bug.cgi?id=1252565
- https://bugzilla.suse.com/show_bug.cgi?id=1252568
- https://bugzilla.suse.com/show_bug.cgi?id=1252634
- https://bugzilla.suse.com/show_bug.cgi?id=1252688
- https://bugzilla.suse.com/show_bug.cgi?id=1252785
- https://bugzilla.suse.com/show_bug.cgi?id=1252893
- https://bugzilla.suse.com/show_bug.cgi?id=1252904
- https://bugzilla.suse.com/show_bug.cgi?id=1252919
- https://jira.suse.com/browse/PED-4593
- https://jira.suse.com/browse/PED-568