Security update for the Linux Kernel
| Announcement ID: | SUSE-SU-2026:0316-1 |
|---|---|
| Release Date: | 2026-01-28T14:35:23Z |
| Rating: | important |
| References: |
|
| Cross-References: |
|
| CVSS scores: |
|
| Affected Products: |
|
An update that solves 143 vulnerabilities, contains two features and has 25 security fixes can now be installed.
Description:
The SUSE Linux Enterprise 12 SP5 kernel was updated to fix various security issues
The following security issues were fixed:
- CVE-2022-49604,CVE-2025-40074: ip: Fix data-races around sysctl_ip_fwd_use_pmtu (bsc#1238414 bsc#1252794).
- CVE-2022-50527: drm/amdgpu: Fix size validation for non-exclusive domains (v4) (bsc#1251738).
- CVE-2022-50625: serial: amba-pl011: avoid SBSA UART accessing DMACR register (bsc#1254559).
- CVE-2022-50630: mm: hugetlb: fix UAF in hugetlb_handle_userfault (bsc#1254785).
- CVE-2022-50656: nfc: pn533: Clear nfc_target before being used (bsc#1254745).
- CVE-2022-50678: wifi: brcmfmac: fix invalid address access when enabling SCAN log level (bsc#1254902).
- CVE-2022-50700: wifi: ath10k: Delay the unmapping of the buffer (bsc#1255576).
- CVE-2023-53454: HID: multitouch: Correct devm device reference for hidinput input_dev name (bsc#1250759).
- CVE-2023-53718: ring-buffer: Do not swap cpu_buffer during resize process (bsc#1252564).
- CVE-2023-53748: media: mediatek: vcodec: Fix potential array out-of-bounds in decoder queue_setup (bsc#1254907).
- CVE-2023-53765: dm cache: free background tracker's queued work in btracker_destroy (bsc#1254912).
- CVE-2023-53781: smc: Fix use-after-free in tcp_write_timer_handler() (bsc#1254751).
- CVE-2023-53788: ALSA: hda/ca0132: fixup buffer overrun at tuning_ctl_set() (bsc#1254917).
- CVE-2023-53819: amdgpu: validate offset_in_bo of drm_amdgpu_gem_va (bsc#1254712).
- CVE-2023-53850: iavf: use internal state to free traffic IRQs (bsc#1254677).
- CVE-2023-54120: Bluetooth: Fix race condition in hidp_session_thread (bsc#1256133).
- CVE-2023-54214: Bluetooth: L2CAP: Fix potential user-after-free (bsc#1255954).
- CVE-2023-54236: net/net_failover: fix txq exceeding warning (bsc#1255922).
- CVE-2023-54286: wifi: iwlwifi: dvm: Fix memcpy: detected field-spanning write backtrace (bsc#1255803).
- CVE-2023-54300: wifi: ath9k: avoid referencing uninit memory in ath9k_wmi_ctrl_rx (bsc#1255790).
- CVE-2025-38085: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (bsc#1245431 bsc#1245499).
- CVE-2025-38336: ata: pata_via: Force PIO for ATAPI devices on VT6415/VT6330 (bsc#1246370).
- CVE-2025-38728: smb3: fix for slab out of bounds on mount to ksmbd (bsc#1249256).
- CVE-2025-40006: mm/hugetlb: fix folio is still mapped when deleted (bsc#1252342).
- CVE-2025-40035: Input: uinput - zero-initialize uinput_ff_upload_compat to avoid info leak (bsc#1252866).
- CVE-2025-40053: net: dlink: handle copy_thresh allocation failure (bsc#1252808).
- CVE-2025-40064: smc: Fix use-after-free in __pnet_find_base_ndev() (bsc#1252845).
- CVE-2025-40075: tcp_metrics: use dst_dev_net_rcu() (bsc#1252795).
- CVE-2025-40081: perf: arm_spe: Prevent overflow in PERF_IDX2OFF() (bsc#1252776).
- CVE-2025-40110: drm/vmwgfx: Fix a null-ptr access in the cursor snooper (bsc#1253275).
- CVE-2025-40123: bpf: Enforce expected_attach_type for tailcall compatibility (bsc#1253365).
- CVE-2025-40135: ipv6: use RCU in ip6_xmit() (bsc#1253342).
- CVE-2025-40139: smc: Use __sk_dst_get() and dst_dev_rcu() in in smc_clc_prfx_set() (bsc#1253409).
- CVE-2025-40149: tls: Use __sk_dst_get() and dst_dev_rcu() in get_netdev_for_sock() (bsc#1253355).
- CVE-2025-40153: mm: hugetlb: avoid soft lockup when mprotect to large memory area (bsc#1253408).
- CVE-2025-40158: ipv6: use RCU in ip6_output() (bsc#1253402).
- CVE-2025-40160: xen/events: Cleanup find_virq() return codes (bsc#1253400).
- CVE-2025-40164: usbnet: Fix using smp_processor_id() in preemptible code warnings (bsc#1253407).
- CVE-2025-40167: ext4: detect invalid INLINE_DATA + EXTENTS flag combination (bsc#1253458).
- CVE-2025-40168: smc: Use __sk_dst_get() and dst_dev_rcu() in smc_clc_prfx_match() (bsc#1253427).
- CVE-2025-40170: net: use dst_dev_rcu() in sk_setup_caps() (bsc#1253413).
- CVE-2025-40178: pid: Add a judgment for ns null in pid_nr_ns (bsc#1253463).
- CVE-2025-40198: ext4: avoid potential buffer over-read in parse_apply_sb_mount_options() (bsc#1253453).
- CVE-2025-40200: Squashfs: reject negative file sizes in squashfs_read_inode() (bsc#1253448).
- CVE-2025-40215: kABI: xfrm: delete x->tunnel as we delete x (bsc#1254959).
- CVE-2025-40219: PCI/IOV: Add PCI rescan-remove locking when enabling/disabling SR-IOV (bsc#1254518).
- CVE-2025-40233: ocfs2: clear extent cache after moving/defragmenting extents (bsc#1254813).
- CVE-2025-40240: sctp: avoid NULL dereference when chunk data buffer is missing (bsc#1254869).
- CVE-2025-40244: hfsplus: fix KMSAN uninit-value issue in __hfsplus_ext_cache_extent() (bsc#1255033).
- CVE-2025-40248: vsock: Ignore signal/timeout on connect() if already established (bsc#1254864).
- CVE-2025-40252: net: qlogic/qede: fix potential out-of-bounds read in qede_tpa_cont() and qede_tpa_end() (bsc#1254849).
- CVE-2025-40269: ALSA: usb-audio: Fix potential overflow of PCM transfer buffer (bsc#1255035).
- CVE-2025-40275: ALSA: usb-audio: Fix NULL pointer dereference in snd_usb_mixer_controls_badd (bsc#1254829).
- CVE-2025-40278: net: sched: act_ife: initialize struct tc_ife to fix KMSAN kernel-infoleak (bsc#1254825).
- CVE-2025-40279: net: sched: act_connmark: initialize struct tc_ife to fix kernel leak (bsc#1254846).
- CVE-2025-40283: Bluetooth: btusb: reorder cleanup in btusb_disconnect to avoid UAF (bsc#1254858).
- CVE-2025-40304: fbdev: Add bounds checking in bit_putcs to fix vmalloc-out-of-bounds (bsc#1255034).
- CVE-2025-40308: Bluetooth: bcsp: receive data only if registered (bsc#1255064).
- CVE-2025-40321: wifi: brcmfmac: fix crash while sending Action Frames in standalone AP Mode (bsc#1254795).
- CVE-2025-40322: fbdev: bitblit: bound-check glyph index in bit_putcs* (bsc#1255092).
- CVE-2025-40331: sctp: Prevent TOCTOU out-of-bounds write (bsc#1254615).
- CVE-2025-40337: net: stmmac: Correctly handle Rx checksum offload errors (bsc#1255081).
- CVE-2025-40349: hfs: validate record offset in hfsplus_bmap_alloc (bsc#1255280).
- CVE-2025-40351: hfsplus: fix KMSAN uninit-value issue in hfsplus_delete_cat() (bsc#1255281).
- CVE-2025-68206: netfilter: nft_ct: add seqadj extension for natted connections (bsc#1255142).
- CVE-2025-68340: team: Move team device type change at the end of team_port_add (bsc#1255507).
The following non security issues were fixed:
- HID: multitouch: Add NULL check in mt_input_configured (bsc#1250759).
- Squashfs: add additional inode sanity checking (bsc#1253448).
- drm/amdgpu: Fix potential NULL dereference (bsc#1251238).
Special Instructions and Notes:
- Please reboot the system after installing this update.
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Linux Enterprise Server 12 SP5 LTSS
zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-2026-316=1 -
SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security
zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2026-316=1 -
SUSE Linux Enterprise Live Patching 12-SP5
zypper in -t patch SUSE-SLE-Live-Patching-12-SP5-2026-316=1
Package List:
-
SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le s390x x86_64)
- kernel-default-debugsource-4.12.14-122.290.1
- gfs2-kmp-default-4.12.14-122.290.1
- ocfs2-kmp-default-debuginfo-4.12.14-122.290.1
- cluster-md-kmp-default-debuginfo-4.12.14-122.290.1
- kernel-default-devel-4.12.14-122.290.1
- dlm-kmp-default-debuginfo-4.12.14-122.290.1
- kernel-default-base-4.12.14-122.290.1
- kernel-default-base-debuginfo-4.12.14-122.290.1
- kernel-syms-4.12.14-122.290.1
- kernel-default-debuginfo-4.12.14-122.290.1
- gfs2-kmp-default-debuginfo-4.12.14-122.290.1
- dlm-kmp-default-4.12.14-122.290.1
- cluster-md-kmp-default-4.12.14-122.290.1
- ocfs2-kmp-default-4.12.14-122.290.1
-
SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le s390x x86_64 nosrc)
- kernel-default-4.12.14-122.290.1
-
SUSE Linux Enterprise Server 12 SP5 LTSS (noarch)
- kernel-macros-4.12.14-122.290.1
- kernel-devel-4.12.14-122.290.1
- kernel-source-4.12.14-122.290.1
-
SUSE Linux Enterprise Server 12 SP5 LTSS (s390x)
- kernel-default-man-4.12.14-122.290.1
-
SUSE Linux Enterprise Server 12 SP5 LTSS (x86_64)
- kernel-default-devel-debuginfo-4.12.14-122.290.1
-
SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64)
- kernel-default-debugsource-4.12.14-122.290.1
- gfs2-kmp-default-4.12.14-122.290.1
- ocfs2-kmp-default-debuginfo-4.12.14-122.290.1
- cluster-md-kmp-default-debuginfo-4.12.14-122.290.1
- kernel-default-devel-4.12.14-122.290.1
- dlm-kmp-default-debuginfo-4.12.14-122.290.1
- kernel-default-base-4.12.14-122.290.1
- kernel-default-devel-debuginfo-4.12.14-122.290.1
- kernel-default-base-debuginfo-4.12.14-122.290.1
- kernel-syms-4.12.14-122.290.1
- kernel-default-debuginfo-4.12.14-122.290.1
- gfs2-kmp-default-debuginfo-4.12.14-122.290.1
- dlm-kmp-default-4.12.14-122.290.1
- cluster-md-kmp-default-4.12.14-122.290.1
- ocfs2-kmp-default-4.12.14-122.290.1
-
SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (nosrc x86_64)
- kernel-default-4.12.14-122.290.1
-
SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (noarch)
- kernel-macros-4.12.14-122.290.1
- kernel-devel-4.12.14-122.290.1
- kernel-source-4.12.14-122.290.1
-
SUSE Linux Enterprise Live Patching 12-SP5 (nosrc)
- kernel-default-4.12.14-122.290.1
-
SUSE Linux Enterprise Live Patching 12-SP5 (ppc64le s390x x86_64)
- kernel-default-debugsource-4.12.14-122.290.1
- kernel-default-kgraft-4.12.14-122.290.1
- kgraft-patch-4_12_14-122_290-default-1-8.7.1
- kernel-default-debuginfo-4.12.14-122.290.1
- kernel-default-kgraft-devel-4.12.14-122.290.1
References:
- https://www.suse.com/security/cve/CVE-2022-49546.html
- https://www.suse.com/security/cve/CVE-2022-49604.html
- https://www.suse.com/security/cve/CVE-2022-49975.html
- https://www.suse.com/security/cve/CVE-2022-50527.html
- https://www.suse.com/security/cve/CVE-2022-50615.html
- https://www.suse.com/security/cve/CVE-2022-50625.html
- https://www.suse.com/security/cve/CVE-2022-50630.html
- https://www.suse.com/security/cve/CVE-2022-50636.html
- https://www.suse.com/security/cve/CVE-2022-50638.html
- https://www.suse.com/security/cve/CVE-2022-50640.html
- https://www.suse.com/security/cve/CVE-2022-50643.html
- https://www.suse.com/security/cve/CVE-2022-50646.html
- https://www.suse.com/security/cve/CVE-2022-50656.html
- https://www.suse.com/security/cve/CVE-2022-50668.html
- https://www.suse.com/security/cve/CVE-2022-50677.html
- https://www.suse.com/security/cve/CVE-2022-50678.html
- https://www.suse.com/security/cve/CVE-2022-50700.html
- https://www.suse.com/security/cve/CVE-2022-50706.html
- https://www.suse.com/security/cve/CVE-2022-50715.html
- https://www.suse.com/security/cve/CVE-2022-50728.html
- https://www.suse.com/security/cve/CVE-2022-50730.html
- https://www.suse.com/security/cve/CVE-2022-50733.html
- https://www.suse.com/security/cve/CVE-2022-50747.html
- https://www.suse.com/security/cve/CVE-2022-50755.html
- https://www.suse.com/security/cve/CVE-2022-50761.html
- https://www.suse.com/security/cve/CVE-2022-50779.html
- https://www.suse.com/security/cve/CVE-2022-50821.html
- https://www.suse.com/security/cve/CVE-2022-50824.html
- https://www.suse.com/security/cve/CVE-2022-50840.html
- https://www.suse.com/security/cve/CVE-2022-50849.html
- https://www.suse.com/security/cve/CVE-2022-50850.html
- https://www.suse.com/security/cve/CVE-2022-50859.html
- https://www.suse.com/security/cve/CVE-2022-50870.html
- https://www.suse.com/security/cve/CVE-2022-50879.html
- https://www.suse.com/security/cve/CVE-2023-20569.html
- https://www.suse.com/security/cve/CVE-2023-23559.html
- https://www.suse.com/security/cve/CVE-2023-4132.html
- https://www.suse.com/security/cve/CVE-2023-53020.html
- https://www.suse.com/security/cve/CVE-2023-53176.html
- https://www.suse.com/security/cve/CVE-2023-53454.html
- https://www.suse.com/security/cve/CVE-2023-53718.html
- https://www.suse.com/security/cve/CVE-2023-53746.html
- https://www.suse.com/security/cve/CVE-2023-53748.html
- https://www.suse.com/security/cve/CVE-2023-53754.html
- https://www.suse.com/security/cve/CVE-2023-53765.html
- https://www.suse.com/security/cve/CVE-2023-53781.html
- https://www.suse.com/security/cve/CVE-2023-53786.html
- https://www.suse.com/security/cve/CVE-2023-53788.html
- https://www.suse.com/security/cve/CVE-2023-53803.html
- https://www.suse.com/security/cve/CVE-2023-53809.html
- https://www.suse.com/security/cve/CVE-2023-53819.html
- https://www.suse.com/security/cve/CVE-2023-53832.html
- https://www.suse.com/security/cve/CVE-2023-53840.html
- https://www.suse.com/security/cve/CVE-2023-53847.html
- https://www.suse.com/security/cve/CVE-2023-53850.html
- https://www.suse.com/security/cve/CVE-2023-53862.html
- https://www.suse.com/security/cve/CVE-2023-54014.html
- https://www.suse.com/security/cve/CVE-2023-54017.html
- https://www.suse.com/security/cve/CVE-2023-54021.html
- https://www.suse.com/security/cve/CVE-2023-54032.html
- https://www.suse.com/security/cve/CVE-2023-54045.html
- https://www.suse.com/security/cve/CVE-2023-54051.html
- https://www.suse.com/security/cve/CVE-2023-54070.html
- https://www.suse.com/security/cve/CVE-2023-54091.html
- https://www.suse.com/security/cve/CVE-2023-54095.html
- https://www.suse.com/security/cve/CVE-2023-54108.html
- https://www.suse.com/security/cve/CVE-2023-54110.html
- https://www.suse.com/security/cve/CVE-2023-54119.html
- https://www.suse.com/security/cve/CVE-2023-54120.html
- https://www.suse.com/security/cve/CVE-2023-54123.html
- https://www.suse.com/security/cve/CVE-2023-54130.html
- https://www.suse.com/security/cve/CVE-2023-54146.html
- https://www.suse.com/security/cve/CVE-2023-54168.html
- https://www.suse.com/security/cve/CVE-2023-54170.html
- https://www.suse.com/security/cve/CVE-2023-54177.html
- https://www.suse.com/security/cve/CVE-2023-54179.html
- https://www.suse.com/security/cve/CVE-2023-54186.html
- https://www.suse.com/security/cve/CVE-2023-54197.html
- https://www.suse.com/security/cve/CVE-2023-54211.html
- https://www.suse.com/security/cve/CVE-2023-54213.html
- https://www.suse.com/security/cve/CVE-2023-54214.html
- https://www.suse.com/security/cve/CVE-2023-54220.html
- https://www.suse.com/security/cve/CVE-2023-54224.html
- https://www.suse.com/security/cve/CVE-2023-54226.html
- https://www.suse.com/security/cve/CVE-2023-54236.html
- https://www.suse.com/security/cve/CVE-2023-54260.html
- https://www.suse.com/security/cve/CVE-2023-54264.html
- https://www.suse.com/security/cve/CVE-2023-54266.html
- https://www.suse.com/security/cve/CVE-2023-54270.html
- https://www.suse.com/security/cve/CVE-2023-54271.html
- https://www.suse.com/security/cve/CVE-2023-54286.html
- https://www.suse.com/security/cve/CVE-2023-54289.html
- https://www.suse.com/security/cve/CVE-2023-54294.html
- https://www.suse.com/security/cve/CVE-2023-54300.html
- https://www.suse.com/security/cve/CVE-2023-54309.html
- https://www.suse.com/security/cve/CVE-2023-54317.html
- https://www.suse.com/security/cve/CVE-2025-38085.html
- https://www.suse.com/security/cve/CVE-2025-38336.html
- https://www.suse.com/security/cve/CVE-2025-38728.html
- https://www.suse.com/security/cve/CVE-2025-40006.html
- https://www.suse.com/security/cve/CVE-2025-40035.html
- https://www.suse.com/security/cve/CVE-2025-40053.html
- https://www.suse.com/security/cve/CVE-2025-40064.html
- https://www.suse.com/security/cve/CVE-2025-40075.html
- https://www.suse.com/security/cve/CVE-2025-40081.html
- https://www.suse.com/security/cve/CVE-2025-40110.html
- https://www.suse.com/security/cve/CVE-2025-40123.html
- https://www.suse.com/security/cve/CVE-2025-40135.html
- https://www.suse.com/security/cve/CVE-2025-40139.html
- https://www.suse.com/security/cve/CVE-2025-40149.html
- https://www.suse.com/security/cve/CVE-2025-40153.html
- https://www.suse.com/security/cve/CVE-2025-40158.html
- https://www.suse.com/security/cve/CVE-2025-40160.html
- https://www.suse.com/security/cve/CVE-2025-40164.html
- https://www.suse.com/security/cve/CVE-2025-40167.html
- https://www.suse.com/security/cve/CVE-2025-40168.html
- https://www.suse.com/security/cve/CVE-2025-40170.html
- https://www.suse.com/security/cve/CVE-2025-40178.html
- https://www.suse.com/security/cve/CVE-2025-40198.html
- https://www.suse.com/security/cve/CVE-2025-40200.html
- https://www.suse.com/security/cve/CVE-2025-40215.html
- https://www.suse.com/security/cve/CVE-2025-40219.html
- https://www.suse.com/security/cve/CVE-2025-40233.html
- https://www.suse.com/security/cve/CVE-2025-40240.html
- https://www.suse.com/security/cve/CVE-2025-40244.html
- https://www.suse.com/security/cve/CVE-2025-40248.html
- https://www.suse.com/security/cve/CVE-2025-40252.html
- https://www.suse.com/security/cve/CVE-2025-40256.html
- https://www.suse.com/security/cve/CVE-2025-40269.html
- https://www.suse.com/security/cve/CVE-2025-40275.html
- https://www.suse.com/security/cve/CVE-2025-40278.html
- https://www.suse.com/security/cve/CVE-2025-40279.html
- https://www.suse.com/security/cve/CVE-2025-40283.html
- https://www.suse.com/security/cve/CVE-2025-40304.html
- https://www.suse.com/security/cve/CVE-2025-40308.html
- https://www.suse.com/security/cve/CVE-2025-40321.html
- https://www.suse.com/security/cve/CVE-2025-40322.html
- https://www.suse.com/security/cve/CVE-2025-40331.html
- https://www.suse.com/security/cve/CVE-2025-40337.html
- https://www.suse.com/security/cve/CVE-2025-40349.html
- https://www.suse.com/security/cve/CVE-2025-40351.html
- https://www.suse.com/security/cve/CVE-2025-68206.html
- https://www.suse.com/security/cve/CVE-2025-68340.html
- https://bugzilla.suse.com/show_bug.cgi?id=1065729
- https://bugzilla.suse.com/show_bug.cgi?id=1082555
- https://bugzilla.suse.com/show_bug.cgi?id=1152446
- https://bugzilla.suse.com/show_bug.cgi?id=1190317
- https://bugzilla.suse.com/show_bug.cgi?id=1206889
- https://bugzilla.suse.com/show_bug.cgi?id=1207051
- https://bugzilla.suse.com/show_bug.cgi?id=1207088
- https://bugzilla.suse.com/show_bug.cgi?id=1207620
- https://bugzilla.suse.com/show_bug.cgi?id=1207653
- https://bugzilla.suse.com/show_bug.cgi?id=1208570
- https://bugzilla.suse.com/show_bug.cgi?id=1211439
- https://bugzilla.suse.com/show_bug.cgi?id=1212173
- https://bugzilla.suse.com/show_bug.cgi?id=1213025
- https://bugzilla.suse.com/show_bug.cgi?id=1213032
- https://bugzilla.suse.com/show_bug.cgi?id=1213287
- https://bugzilla.suse.com/show_bug.cgi?id=1213747
- https://bugzilla.suse.com/show_bug.cgi?id=1213969
- https://bugzilla.suse.com/show_bug.cgi?id=1214940
- https://bugzilla.suse.com/show_bug.cgi?id=1214962
- https://bugzilla.suse.com/show_bug.cgi?id=1216062
- https://bugzilla.suse.com/show_bug.cgi?id=1217036
- https://bugzilla.suse.com/show_bug.cgi?id=1225203
- https://bugzilla.suse.com/show_bug.cgi?id=1226846
- https://bugzilla.suse.com/show_bug.cgi?id=1238414
- https://bugzilla.suse.com/show_bug.cgi?id=1238750
- https://bugzilla.suse.com/show_bug.cgi?id=1240224
- https://bugzilla.suse.com/show_bug.cgi?id=1245196
- https://bugzilla.suse.com/show_bug.cgi?id=1245431
- https://bugzilla.suse.com/show_bug.cgi?id=1245499
- https://bugzilla.suse.com/show_bug.cgi?id=1246370
- https://bugzilla.suse.com/show_bug.cgi?id=1249256
- https://bugzilla.suse.com/show_bug.cgi?id=1249991
- https://bugzilla.suse.com/show_bug.cgi?id=1250759
- https://bugzilla.suse.com/show_bug.cgi?id=1251238
- https://bugzilla.suse.com/show_bug.cgi?id=1251738
- https://bugzilla.suse.com/show_bug.cgi?id=1252342
- https://bugzilla.suse.com/show_bug.cgi?id=1252564
- https://bugzilla.suse.com/show_bug.cgi?id=1252776
- https://bugzilla.suse.com/show_bug.cgi?id=1252795
- https://bugzilla.suse.com/show_bug.cgi?id=1252808
- https://bugzilla.suse.com/show_bug.cgi?id=1252845
- https://bugzilla.suse.com/show_bug.cgi?id=1252866
- https://bugzilla.suse.com/show_bug.cgi?id=1253275
- https://bugzilla.suse.com/show_bug.cgi?id=1253342
- https://bugzilla.suse.com/show_bug.cgi?id=1253355
- https://bugzilla.suse.com/show_bug.cgi?id=1253365
- https://bugzilla.suse.com/show_bug.cgi?id=1253400
- https://bugzilla.suse.com/show_bug.cgi?id=1253402
- https://bugzilla.suse.com/show_bug.cgi?id=1253407
- https://bugzilla.suse.com/show_bug.cgi?id=1253408
- https://bugzilla.suse.com/show_bug.cgi?id=1253409
- https://bugzilla.suse.com/show_bug.cgi?id=1253413
- https://bugzilla.suse.com/show_bug.cgi?id=1253427
- https://bugzilla.suse.com/show_bug.cgi?id=1253448
- https://bugzilla.suse.com/show_bug.cgi?id=1253453
- https://bugzilla.suse.com/show_bug.cgi?id=1253458
- https://bugzilla.suse.com/show_bug.cgi?id=1253463
- https://bugzilla.suse.com/show_bug.cgi?id=1254518
- https://bugzilla.suse.com/show_bug.cgi?id=1254559
- https://bugzilla.suse.com/show_bug.cgi?id=1254580
- https://bugzilla.suse.com/show_bug.cgi?id=1254609
- https://bugzilla.suse.com/show_bug.cgi?id=1254615
- https://bugzilla.suse.com/show_bug.cgi?id=1254617
- https://bugzilla.suse.com/show_bug.cgi?id=1254631
- https://bugzilla.suse.com/show_bug.cgi?id=1254634
- https://bugzilla.suse.com/show_bug.cgi?id=1254645
- https://bugzilla.suse.com/show_bug.cgi?id=1254671
- https://bugzilla.suse.com/show_bug.cgi?id=1254677
- https://bugzilla.suse.com/show_bug.cgi?id=1254686
- https://bugzilla.suse.com/show_bug.cgi?id=1254692
- https://bugzilla.suse.com/show_bug.cgi?id=1254698
- https://bugzilla.suse.com/show_bug.cgi?id=1254709
- https://bugzilla.suse.com/show_bug.cgi?id=1254712
- https://bugzilla.suse.com/show_bug.cgi?id=1254722
- https://bugzilla.suse.com/show_bug.cgi?id=1254745
- https://bugzilla.suse.com/show_bug.cgi?id=1254751
- https://bugzilla.suse.com/show_bug.cgi?id=1254763
- https://bugzilla.suse.com/show_bug.cgi?id=1254785
- https://bugzilla.suse.com/show_bug.cgi?id=1254795
- https://bugzilla.suse.com/show_bug.cgi?id=1254813
- https://bugzilla.suse.com/show_bug.cgi?id=1254825
- https://bugzilla.suse.com/show_bug.cgi?id=1254829
- https://bugzilla.suse.com/show_bug.cgi?id=1254846
- https://bugzilla.suse.com/show_bug.cgi?id=1254849
- https://bugzilla.suse.com/show_bug.cgi?id=1254851
- https://bugzilla.suse.com/show_bug.cgi?id=1254858
- https://bugzilla.suse.com/show_bug.cgi?id=1254864
- https://bugzilla.suse.com/show_bug.cgi?id=1254869
- https://bugzilla.suse.com/show_bug.cgi?id=1254902
- https://bugzilla.suse.com/show_bug.cgi?id=1254907
- https://bugzilla.suse.com/show_bug.cgi?id=1254912
- https://bugzilla.suse.com/show_bug.cgi?id=1254916
- https://bugzilla.suse.com/show_bug.cgi?id=1254917
- https://bugzilla.suse.com/show_bug.cgi?id=1254959
- https://bugzilla.suse.com/show_bug.cgi?id=1254994
- https://bugzilla.suse.com/show_bug.cgi?id=1255033
- https://bugzilla.suse.com/show_bug.cgi?id=1255034
- https://bugzilla.suse.com/show_bug.cgi?id=1255035
- https://bugzilla.suse.com/show_bug.cgi?id=1255064
- https://bugzilla.suse.com/show_bug.cgi?id=1255081
- https://bugzilla.suse.com/show_bug.cgi?id=1255092
- https://bugzilla.suse.com/show_bug.cgi?id=1255142
- https://bugzilla.suse.com/show_bug.cgi?id=1255165
- https://bugzilla.suse.com/show_bug.cgi?id=1255280
- https://bugzilla.suse.com/show_bug.cgi?id=1255281
- https://bugzilla.suse.com/show_bug.cgi?id=1255469
- https://bugzilla.suse.com/show_bug.cgi?id=1255507
- https://bugzilla.suse.com/show_bug.cgi?id=1255576
- https://bugzilla.suse.com/show_bug.cgi?id=1255581
- https://bugzilla.suse.com/show_bug.cgi?id=1255600
- https://bugzilla.suse.com/show_bug.cgi?id=1255605
- https://bugzilla.suse.com/show_bug.cgi?id=1255617
- https://bugzilla.suse.com/show_bug.cgi?id=1255749
- https://bugzilla.suse.com/show_bug.cgi?id=1255771
- https://bugzilla.suse.com/show_bug.cgi?id=1255780
- https://bugzilla.suse.com/show_bug.cgi?id=1255790
- https://bugzilla.suse.com/show_bug.cgi?id=1255802
- https://bugzilla.suse.com/show_bug.cgi?id=1255803
- https://bugzilla.suse.com/show_bug.cgi?id=1255806
- https://bugzilla.suse.com/show_bug.cgi?id=1255841
- https://bugzilla.suse.com/show_bug.cgi?id=1255843
- https://bugzilla.suse.com/show_bug.cgi?id=1255872
- https://bugzilla.suse.com/show_bug.cgi?id=1255875
- https://bugzilla.suse.com/show_bug.cgi?id=1255878
- https://bugzilla.suse.com/show_bug.cgi?id=1255901
- https://bugzilla.suse.com/show_bug.cgi?id=1255902
- https://bugzilla.suse.com/show_bug.cgi?id=1255922
- https://bugzilla.suse.com/show_bug.cgi?id=1255949
- https://bugzilla.suse.com/show_bug.cgi?id=1255951
- https://bugzilla.suse.com/show_bug.cgi?id=1255953
- https://bugzilla.suse.com/show_bug.cgi?id=1255954
- https://bugzilla.suse.com/show_bug.cgi?id=1255959
- https://bugzilla.suse.com/show_bug.cgi?id=1255969
- https://bugzilla.suse.com/show_bug.cgi?id=1255985
- https://bugzilla.suse.com/show_bug.cgi?id=1255993
- https://bugzilla.suse.com/show_bug.cgi?id=1255994
- https://bugzilla.suse.com/show_bug.cgi?id=1256045
- https://bugzilla.suse.com/show_bug.cgi?id=1256046
- https://bugzilla.suse.com/show_bug.cgi?id=1256048
- https://bugzilla.suse.com/show_bug.cgi?id=1256053
- https://bugzilla.suse.com/show_bug.cgi?id=1256062
- https://bugzilla.suse.com/show_bug.cgi?id=1256064
- https://bugzilla.suse.com/show_bug.cgi?id=1256091
- https://bugzilla.suse.com/show_bug.cgi?id=1256114
- https://bugzilla.suse.com/show_bug.cgi?id=1256129
- https://bugzilla.suse.com/show_bug.cgi?id=1256133
- https://bugzilla.suse.com/show_bug.cgi?id=1256142
- https://bugzilla.suse.com/show_bug.cgi?id=1256154
- https://bugzilla.suse.com/show_bug.cgi?id=1256172
- https://bugzilla.suse.com/show_bug.cgi?id=1256193
- https://bugzilla.suse.com/show_bug.cgi?id=1256194
- https://bugzilla.suse.com/show_bug.cgi?id=1256199
- https://bugzilla.suse.com/show_bug.cgi?id=1256208
- https://bugzilla.suse.com/show_bug.cgi?id=1256242
- https://bugzilla.suse.com/show_bug.cgi?id=1256271
- https://bugzilla.suse.com/show_bug.cgi?id=1256274
- https://bugzilla.suse.com/show_bug.cgi?id=1256285
- https://bugzilla.suse.com/show_bug.cgi?id=1256300
- https://bugzilla.suse.com/show_bug.cgi?id=1256334
- https://bugzilla.suse.com/show_bug.cgi?id=1256349
- https://bugzilla.suse.com/show_bug.cgi?id=1256353
- https://bugzilla.suse.com/show_bug.cgi?id=1256355
- https://bugzilla.suse.com/show_bug.cgi?id=1256364
- https://bugzilla.suse.com/show_bug.cgi?id=1256394
- https://bugzilla.suse.com/show_bug.cgi?id=1256423
- https://bugzilla.suse.com/show_bug.cgi?id=1256432
- https://bugzilla.suse.com/show_bug.cgi?id=1256516
- https://bugzilla.suse.com/show_bug.cgi?id=1256684
- https://jira.suse.com/browse/PED-14062
- https://jira.suse.com/browse/PED-5023