<div class="container">
<h1>Security update 5.1.1 for Multi-Linux Manager Client Tools</h1>
<table class="table table-striped table-bordered">
<tbody>
<tr>
<th>Announcement ID:</th>
<td>SUSE-SU-2025:3819-1</td>
</tr>
<tr>
<th>Release Date:</th>
<td>2025-10-28T07:20:09Z</td>
</tr>
<tr>
<th>Rating:</th>
<td>moderate</td>
</tr>
<tr>
<th>References:</th>
<td>
<ul>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1019074">bsc#1019074</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227577">bsc#1227577</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229825">bsc#1229825</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237495">bsc#1237495</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1243331">bsc#1243331</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1243611">bsc#1243611</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1243704">bsc#1243704</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1244027">bsc#1244027</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1244127">bsc#1244127</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1245099">bsc#1245099</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1245120">bsc#1245120</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1245302">bsc#1245302</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1246068">bsc#1246068</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1246320">bsc#1246320</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1246553">bsc#1246553</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1246586">bsc#1246586</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1246628">bsc#1246628</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1246735">bsc#1246735</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1246736">bsc#1246736</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1246789">bsc#1246789</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1246864">bsc#1246864</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1246882">bsc#1246882</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1246906">bsc#1246906</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1247688">bsc#1247688</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1247748">bsc#1247748</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1247836">bsc#1247836</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1252100">bsc#1252100</a>
</li>
<li style="display: inline;">
<a href="https://jira.suse.com/browse/MSQA-1023">jsc#MSQA-1023</a>
</li>
<li style="display: inline;">
<a href="https://jira.suse.com/browse/PED-13285">jsc#PED-13285</a>
</li>
</ul>
</td>
</tr>
<tr>
<th>
Cross-References:
</th>
<td>
<ul>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-3415.html">CVE-2025-3415</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-47908.html">CVE-2025-47908</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-6023.html">CVE-2025-6023</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-6197.html">CVE-2025-6197</a>
</li>
</ul>
</td>
</tr>
<tr>
<th>CVSS scores:</th>
<td>
<ul class="list-group">
<li class="list-group-item">
<span class="cvss-reference">CVE-2025-3415</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.3</span>
<span class="cvss-vector">CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2025-3415</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.3</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2025-3415</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">4.3</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2025-47908</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.9</span>
<span class="cvss-vector">CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2025-47908</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.3</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2025-47908</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.5</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2025-6023</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">7.2</span>
<span class="cvss-vector">CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:L/VA:L/SC:N/SI:N/SA:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2025-6023</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">7.6</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2025-6023</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.6</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2025-6197</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">2.3</span>
<span class="cvss-vector">CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2025-6197</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.2</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2025-6197</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">4.2</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N</span>
</li>
</ul>
</td>
</tr>
<tr>
<th>Affected Products:</th>
<td>
<ul class="list-group">
<li class="list-group-item">SUSE Multi-Linux Manager Client Tools for SLE 15</li>
<li class="list-group-item">SUSE Multi-Linux Manager Client Tools for SLE Micro 5</li>
</ul>
</td>
</tr>
</tbody>
</table>
<p>An update that solves four vulnerabilities, contains two features and has 23 security fixes can now be installed.</p>
<h2>Description:</h2>
<p>This update fixes the following issues:</p>
<p>dracut-saltboot was updated from version 0.1 to version 1.0.0:</p>
<ul>
<li>
<p>Version 1.0.0 bugs fixed:</p>
</li>
<li>
<p>Reboot on salt key timeout (bsc#1237495)</p>
</li>
<li>Fixed parsing files with space in the name (bsc#1252100)</li>
</ul>
<p>golang-github-prometheus-alertmanager was updated from version 0.26.0 to 0.28.1 to :</p>
<ul>
<li>
<p>Security issues fixed:</p>
</li>
<li>
<p>CVE-2025-47908: Fixed a Denial of Service vulnerability (bsc#1247748)</p>
</li>
<li>
<p>Version 0.28.1 changes and bugs fixed (jsc#PED-13285):</p>
</li>
<li>
<p>Improved performance of inhibition rules when using Equal
labels.</p>
</li>
<li>Improve the documentation on escaping in UTF-8 matchers.</li>
<li>Update alertmanager_config_hash metric help to document the
hash is not cryptographically strong.</li>
<li>Fixed panic in amtool when using --verbose.</li>
<li>Fixed templating of channel field for Rocket.Chat.</li>
<li>Fixed rocketchat_configs written as rocket_configs in docs.</li>
<li>Fixed usage for --enable-feature flag.</li>
<li>Trim whitespace from OpsGenie API Key.</li>
<li>Fixed Jira project template not rendered when searching for
existing issues.</li>
<li>Fixed subtle bug in JSON/YAML encoding of inhibition rules that
would cause Equal labels to be omitted.</li>
<li>Fixed header for slack_configs in docs.</li>
<li>
<p>Fixed weight and wrap of Microsoft Teams notifications.</p>
</li>
<li>
<p>Version 0.28.0 changes and bugs fixed:</p>
</li>
<li>
<p>Templating errors in the SNS integration now return an error.</p>
</li>
<li>Adopt log/slog, drop go-kit/log.</li>
<li>Added a new Microsoft Teams integration based on Flows.</li>
<li>Added a new Rocket.Chat integration.</li>
<li>Added a new Jira integration.</li>
<li>Added support for GOMEMLIMIT, enable it via the feature flag
--enable-feature=auto-gomemlimit.</li>
<li>Added support for GOMAXPROCS, enable it via the feature flag
--enable-feature=auto-gomaxprocs.</li>
<li>Added support for limits of silences including the maximum number
of active and pending silences, and the maximum size per
silence (in bytes). You can use the flags
--silences.max-silences and --silences.max-silence-size-bytes
to set them accordingly.</li>
<li>
<p>Muted alerts now show whether they are suppressed or not in
both the /api/v2/alerts endpoint and the Alertmanager UI.</p>
</li>
<li>
<p>Version 0.27.0 changes and bugs fixed:</p>
</li>
<li>
<p>API: Removal of all api/v1/ endpoints. These endpoints
now log and return a deprecation message and respond with a
status code of 410.</p>
</li>
<li>UTF-8 Support: Introduction of support for any UTF-8
character as part of label names and matchers.</li>
<li>Discord Integration: Enforce max length in message.</li>
<li>Metrics: Introduced the experimental feature flag
--enable-feature=receiver-name-in-metrics to include the
receiver name.</li>
<li>Metrics: Introduced a new gauge named
alertmanager_inhibition_rules that counts the number of
configured inhibition rules.</li>
<li>Metrics: Introduced a new counter named
alertmanager_alerts_supressed_total that tracks muted alerts,
it contains a reason label to indicate the source of the mute.</li>
<li>Discord Integration: Introduced support for webhook_url_file.</li>
<li>Microsoft Teams Integration: Introduced support for
webhook_url_file.</li>
<li>Microsoft Teams Integration: Added support for summary.</li>
<li>Metrics: Notification metrics now support two new values for
the label reason, contextCanceled and contextDeadlineExceeded.</li>
<li>Email Integration: Contents of auth_password_file are now
trimmed of prefixed and suffixed whitespace.</li>
<li>amtool: Fixes the error scheme required for webhook url when
using amtool with --alertmanager.url.</li>
<li>Mixin: Fixed AlertmanagerFailedToSendAlerts,
AlertmanagerClusterFailedToSendAlerts, and
AlertmanagerClusterFailedToSendAlerts to make sure they ignore
the reason label.</li>
</ul>
<p>grafana was updated to from version 11.5.5 to 11.5.7:</p>
<ul>
<li>
<p>Security issues fixed:</p>
</li>
<li>
<p>CVE-2025-6023: Fixed cross-site-scripting via scripted dashboards (bsc#1246735)</p>
</li>
<li>CVE-2025-6197: Fixed open redirect in organization switching (bsc#1246736)</li>
<li>
<p>CVE-2025-3415: Fixed exposure of DingDing alerting integration URL to Viewer level users (bsc#1245302)</p>
</li>
<li>
<p>Other bugs fixed:</p>
</li>
<li>
<p>Azure: Fixed legend formatting.</p>
</li>
<li>Azure: Fixed resource name determination in template variable queries.</li>
</ul>
<p>mgr-push was updated from version 5.1.3 to 5.1.4:</p>
<ul>
<li>Use absolute paths when invoking external commands</li>
</ul>
<p>python-defusedxml:</p>
<ul>
<li>New package implemented at version 0.7.1</li>
</ul>
<p>rhnlib was updated from version 5.1.2 to 5.1.3:</p>
<ul>
<li>Use more secure defusedxml parser (bsc#1227577)</li>
</ul>
<p>spacecmd was updated from version 5.1.8 to 5.1.11:</p>
<ul>
<li>
<p>Version 5.1.11 changes and bugs fixed:</p>
</li>
<li>
<p>Make spacecmd work with Python 3.12 and higher</p>
</li>
<li>
<p>Call print statements properly in Python 3</p>
</li>
<li>
<p>Version 5.1.10 changes and bugs fixed:</p>
</li>
<li>
<p>Fixed use of renamed config parser class where the backward
compatible alias was dropped in latest python version
(bsc#1246586)</p>
</li>
<li>
<p>Version 5.1.9 changes and bugs fixed:</p>
</li>
<li>
<p>Fixed installation of python lib files on Ubuntu 24.04</p>
</li>
</ul>
<p>spacewalk-client-tools was updated from version 5.1.6 to 5.1.7:</p>
<ul>
<li>Fixed syntax error in changelog</li>
</ul>
<p>supportutils-plugin-susemanager-client was updated from version 5.1.3 to 5.1.4:</p>
<ul>
<li>Fixed syntax error in changelog</li>
</ul>
<p>uyuni-tools was updated from version 5.1.15 to 5.1.20:</p>
<ul>
<li>
<p>Version 5.1.20 changes and bugs fixed:</p>
</li>
<li>
<p>Added migration for server monitoring configuration (bsc#1247688)</p>
</li>
<li>
<p>Version 5.1.19 changes and bugs fixed:</p>
</li>
<li>
<p>Added a lowercase version of --logLevel (bsc#1243611)</p>
</li>
<li>Stop executing scripts in temporary folder (bsc#1243704)</li>
<li>support config: collect podman inspect for hub container (bsc#1245099)</li>
<li>Use new dedicated path for Cobbler settings (bsc#1244027)</li>
<li>Migrate custom auto installation snippets (bsc#1246320)</li>
<li>Added SUSE Linux Enterprise 15 SP7 to buildin productmap</li>
<li>Fixed loading product map from mgradm configuration file (bsc#1246068)</li>
<li>Fixed channel override for distro copy</li>
<li>Do not use sudo when running as a root user (bsc#1246882)</li>
<li>Do not require backups to be at the same location for restoring (bsc#1246906)</li>
<li>Fixed recomputing proxy images when installing a PTF or TEST (bsc#1246553)</li>
<li>Added mgradm server rename to change the server FQDN (bsc#1229825)</li>
<li>If no DB SSL CA parameter is given, use the other one (bsc#1245120)</li>
<li>More fault tolerant mgradm stop (bsc#1243331)</li>
<li>Backup systemd dropin directory too and create if missing</li>
<li>Added 3rd party SSL options for upgrade and migration scenarios</li>
<li>Do not consider stderr output of podman as an error (bsc#1247836)</li>
<li>Restore SELinux contexts for restored backup volumes (bsc#1244127)</li>
<li>Automatically get up-to-date systemid file on salt based proxy hosts (bsc#1246789)</li>
<li>
<p>Bump the default image tag to 5.1.1</p>
</li>
<li>
<p>Version 5.1.18 changes and bugs fixed:</p>
</li>
<li>
<p>Updated translation strings</p>
</li>
<li>
<p>Version 5.1.17 changes and bugs fixed:</p>
</li>
<li>
<p>Upgrade of saline should use scale function (bsc#1246864)</p>
</li>
<li>
<p>Version 5.1.16 changes and bugs fixed:</p>
</li>
<li>
<p>Use database backup volume as temporary backup location (bsc#1246628)</p>
</li>
</ul>
<h2>Patch Instructions:</h2>
<p>
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".<br/>
Alternatively you can run the command listed for your product:
</p>
<ul class="list-group">
<li class="list-group-item">
SUSE Multi-Linux Manager Client Tools for SLE 15
<br/>
<code>zypper in -t patch SUSE-MultiLinuxManagerTools-SLE-15-2025-3819=1</code>
</li>
<li class="list-group-item">
SUSE Multi-Linux Manager Client Tools for SLE Micro 5
<br/>
<code>zypper in -t patch SUSE-MultiLinuxManagerTools-SLE-Micro-5-2025-3819=1</code>
</li>
</ul>
<h2>Package List:</h2>
<ul>
<li>
SUSE Multi-Linux Manager Client Tools for SLE 15 (noarch)
<ul>
<li>python3-mgr-push-5.1.4-150002.3.3.3</li>
<li>mgrctl-lang-5.1.20-150002.3.3.3</li>
<li>python3-defusedxml-0.7.1-150002.1.3.2</li>
<li>spacewalk-client-tools-5.1.7-150002.3.3.3</li>
<li>mgrctl-bash-completion-5.1.20-150002.3.3.3</li>
<li>supportutils-plugin-susemanager-client-5.1.4-150002.3.3.2</li>
<li>mgrctl-zsh-completion-5.1.20-150002.3.3.3</li>
<li>python3-rhnlib-5.1.3-150002.3.3.2</li>
<li>spacecmd-5.1.11-150002.3.3.2</li>
<li>python3-spacewalk-client-tools-5.1.7-150002.3.3.3</li>
<li>dracut-saltboot-1.0.0-150002.3.3.1</li>
<li>mgr-push-5.1.4-150002.3.3.3</li>
</ul>
</li>
<li>
SUSE Multi-Linux Manager Client Tools for SLE 15 (aarch64 ppc64le s390x x86_64)
<ul>
<li>grafana-debuginfo-11.5.7-150002.4.3.3</li>
<li>mgrctl-5.1.20-150002.3.3.3</li>
<li>golang-github-prometheus-alertmanager-debuginfo-0.28.1-150002.4.3.3</li>
<li>mgrctl-debuginfo-5.1.20-150002.3.3.3</li>
<li>grafana-11.5.7-150002.4.3.3</li>
<li>golang-github-prometheus-alertmanager-0.28.1-150002.4.3.3</li>
</ul>
</li>
<li>
SUSE Multi-Linux Manager Client Tools for SLE Micro 5 (noarch)
<ul>
<li>mgrctl-zsh-completion-5.1.20-150002.3.3.3</li>
<li>mgrctl-bash-completion-5.1.20-150002.3.3.3</li>
<li>dracut-saltboot-1.0.0-150002.3.3.1</li>
<li>mgrctl-lang-5.1.20-150002.3.3.3</li>
</ul>
</li>
<li>
SUSE Multi-Linux Manager Client Tools for SLE Micro 5 (aarch64 ppc64le s390x x86_64)
<ul>
<li>mgrctl-debuginfo-5.1.20-150002.3.3.3</li>
<li>mgrctl-5.1.20-150002.3.3.3</li>
</ul>
</li>
</ul>
<h2>References:</h2>
<ul>
<li>
<a href="https://www.suse.com/security/cve/CVE-2025-3415.html">https://www.suse.com/security/cve/CVE-2025-3415.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2025-47908.html">https://www.suse.com/security/cve/CVE-2025-47908.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2025-6023.html">https://www.suse.com/security/cve/CVE-2025-6023.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2025-6197.html">https://www.suse.com/security/cve/CVE-2025-6197.html</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1019074">https://bugzilla.suse.com/show_bug.cgi?id=1019074</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227577">https://bugzilla.suse.com/show_bug.cgi?id=1227577</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1229825">https://bugzilla.suse.com/show_bug.cgi?id=1229825</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237495">https://bugzilla.suse.com/show_bug.cgi?id=1237495</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1243331">https://bugzilla.suse.com/show_bug.cgi?id=1243331</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1243611">https://bugzilla.suse.com/show_bug.cgi?id=1243611</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1243704">https://bugzilla.suse.com/show_bug.cgi?id=1243704</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1244027">https://bugzilla.suse.com/show_bug.cgi?id=1244027</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1244127">https://bugzilla.suse.com/show_bug.cgi?id=1244127</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1245099">https://bugzilla.suse.com/show_bug.cgi?id=1245099</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1245120">https://bugzilla.suse.com/show_bug.cgi?id=1245120</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1245302">https://bugzilla.suse.com/show_bug.cgi?id=1245302</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1246068">https://bugzilla.suse.com/show_bug.cgi?id=1246068</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1246320">https://bugzilla.suse.com/show_bug.cgi?id=1246320</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1246553">https://bugzilla.suse.com/show_bug.cgi?id=1246553</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1246586">https://bugzilla.suse.com/show_bug.cgi?id=1246586</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1246628">https://bugzilla.suse.com/show_bug.cgi?id=1246628</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1246735">https://bugzilla.suse.com/show_bug.cgi?id=1246735</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1246736">https://bugzilla.suse.com/show_bug.cgi?id=1246736</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1246789">https://bugzilla.suse.com/show_bug.cgi?id=1246789</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1246864">https://bugzilla.suse.com/show_bug.cgi?id=1246864</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1246882">https://bugzilla.suse.com/show_bug.cgi?id=1246882</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1246906">https://bugzilla.suse.com/show_bug.cgi?id=1246906</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1247688">https://bugzilla.suse.com/show_bug.cgi?id=1247688</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1247748">https://bugzilla.suse.com/show_bug.cgi?id=1247748</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1247836">https://bugzilla.suse.com/show_bug.cgi?id=1247836</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1252100">https://bugzilla.suse.com/show_bug.cgi?id=1252100</a>
</li>
<li>
<a href="https://jira.suse.com/browse/MSQA-1023">https://jira.suse.com/browse/MSQA-1023</a>
</li>
<li>
<a href="https://jira.suse.com/browse/PED-13285">https://jira.suse.com/browse/PED-13285</a>
</li>
</ul>
</div>