<div class="container">
<h1>Security update for the Linux Kernel</h1>
<table class="table table-striped table-bordered">
<tbody>
<tr>
<th>Announcement ID:</th>
<td>SUSE-SU-2023:0591-1</td>
</tr>
<tr>
<th>Rating:</th>
<td>important</td>
</tr>
<tr>
<th>References:</th>
<td>
<ul>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1065729">#1065729</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1156395">#1156395</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1203740">#1203740</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1204614">#1204614</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1204989">#1204989</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1205496">#1205496</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1205601">#1205601</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1205695">#1205695</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1206073">#1206073</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1206344">#1206344</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1206393">#1206393</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1206399">#1206399</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1206515">#1206515</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1206602">#1206602</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1206634">#1206634</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1206635">#1206635</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1206636">#1206636</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1206637">#1206637</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1206640">#1206640</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1206641">#1206641</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1206642">#1206642</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1206643">#1206643</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1206644">#1206644</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1206645">#1206645</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1206646">#1206646</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1206647">#1206647</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1206648">#1206648</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1206649">#1206649</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1206841">#1206841</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1206854">#1206854</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1206855">#1206855</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1206857">#1206857</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1206858">#1206858</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1206859">#1206859</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1206860">#1206860</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1206873">#1206873</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1206875">#1206875</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1206876">#1206876</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1206877">#1206877</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1206878">#1206878</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1206880">#1206880</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1206881">#1206881</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1206882">#1206882</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1206883">#1206883</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1206884">#1206884</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1206885">#1206885</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1206886">#1206886</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1206887">#1206887</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1206888">#1206888</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1206889">#1206889</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1206890">#1206890</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1206891">#1206891</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1206893">#1206893</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1206896">#1206896</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1206904">#1206904</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1207036">#1207036</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1207125">#1207125</a>
</li>
</ul>
</td>
</tr>
<tr>
<th>
Cross-References:
</th>
<td>
<ul>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-3112.html">CVE-2022-3112</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-3115.html">CVE-2022-3115</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-3564.html">CVE-2022-3564</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-47520.html">CVE-2022-47520</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-23454.html">CVE-2023-23454</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-23455.html">CVE-2023-23455</a>
</li>
</ul>
</td>
</tr>
<tr>
<th>CVSS scores:</th>
<td>
<ul class="list-group">
<li class="list-group-item">
<span class="cvss-reference">CVE-2022-3112</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2022-3112</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2022-3115</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2022-3115</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2022-3564</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">8.0</span>
<span class="cvss-vector">CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2022-3564</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2022-47520</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">8.5</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2022-47520</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.1</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-23454</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-23454</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-23455</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-23455</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
</ul>
</td>
</tr>
<tr>
<th>Affected Products:</th>
<td>
<ul class="list-group">
<li class="list-group-item">SUSE Linux Enterprise Micro 5.1</li>
<li class="list-group-item">SUSE Linux Enterprise Micro 5.2</li>
<li class="list-group-item">SUSE Linux Enterprise Micro for Rancher 5.2</li>
<li class="list-group-item">SUSE Linux Enterprise Real Time 15 SP3</li>
<li class="list-group-item">SUSE Real Time Module 15-SP3</li>
</ul>
</td>
</tr>
</tbody>
</table>
<p>An update that solves six vulnerabilities, contains two features and has 51 fixes can now be installed.</p>
<h2>Description:</h2>
<p>The SUSE Linux Enterprise 15 SP3 RT kernel was updated to receive various security and bugfixes.</p>
<p>The following security bugs were fixed:</p>
<ul>
<li>CVE-2022-3112: Fixed a null pointer dereference caused by lacks check of the return value of kzalloc() in vdec_helpers.c:amvdec_set_canvases (bsc#1206399).</li>
<li>CVE-2022-3115: Fixed a null pointer dereference in malidp_crtc.c caused by a lack of checks of the return value of kzalloc (bsc#1206393).</li>
<li>CVE-2022-3564: Fixed use-after-free in l2cap_core.c of the Bluetooth component (bsc#1206073).</li>
<li>CVE-2022-47520: Fixed a out-of-bounds read when parsing a Robust Security Network (RSN) information element from a Netlink packet in the WILC1000 wireless driver (bsc#1206515).</li>
<li>CVE-2023-23454: Fixed a type-confusion in the CBQ network scheduler (bsc#1207036).</li>
<li>CVE-2023-23455: Fixed a denial of service inside atm_tc_enqueue in net/sched/sch_atm.c because of type confusion (bsc#1207125).</li>
</ul>
<p>The following non-security bugs were fixed:</p>
<ul>
<li>arm64: cpu_errata: Add Hisilicon TSV110 to spectre-v2 safe list (git-fixes)</li>
<li>arm64: dts: allwinner: H5: Add PMU node (git-fixes)</li>
<li>arm64: dts: allwinner: H6: Add PMU mode (git-fixes)</li>
<li>arm64: dts: marvell: Add AP806-dual missing CPU clocks (git-fixes)</li>
<li>arm64: dts: rockchip: Fix NanoPC-T4 cooling maps (git-fixes)</li>
<li>arm64: dts: rockchip: add reg property to brcmf sub-nodes (git-fixes)</li>
<li>arm64: dts: rockchip: fix dwmmc clock name for px30 (git-fixes)</li>
<li>arm64: memory: Add missing brackets to untagged_addr() macro (git-fixes)</li>
<li>arm64: psci: Reduce the waiting time for cpu_psci_cpu_kill() (git-fixes).</li>
<li>arm64: tags: Preserve tags for addresses translated via TTBR1 (git-fixes)</li>
<li>arm64: tegra: Fix 'active-low' warning for Jetson Xavier regulator (git-fixes)</li>
<li>btrfs: Avoid unnecessary lock and leaf splits when up (bsc#1206904).</li>
<li>drbd: destroy workqueue when drbd device was freed (git-fixes).</li>
<li>drbd: remove usage of list iterator variable after loop (git-fixes).</li>
<li>drbd: use after free in drbd_create_device() (git-fixes).</li>
<li>ext4: Detect already used quota file early (bsc#1206873).</li>
<li>ext4: add EXT4_INODE_HAS_XATTR_SPACE macro in xattr.h (bsc#1206878).</li>
<li>ext4: avoid BUG_ON when creating xattrs (bsc#1205496).</li>
<li>ext4: avoid crash when inline data creation follows DIO write (bsc#1206883).</li>
<li>ext4: avoid race conditions when remounting with options that change dax (bsc#1206860).</li>
<li>ext4: avoid resizing to a partial cluster size (bsc#1206880).</li>
<li>ext4: choose hardlimit when softlimit is larger than hardlimit in ext4_statfs_project() (bsc#1206854).</li>
<li>ext4: continue to expand file system when the target size does not reach (bsc#1206882).</li>
<li>ext4: convert BUG_ON's to WARN_ON's in mballoc.c (bsc#1206859).</li>
<li>ext4: correct max_inline_xattr_value_size computing (bsc#1206878).</li>
<li>ext4: correct the error path of ext4_write_inline_data_end() (bsc#1206875).</li>
<li>ext4: correct the misjudgment in ext4_iget_extra_inode (bsc#1206878).</li>
<li>ext4: fix BUG_ON() when directory entry has invalid rec_len (bsc#1206886).</li>
<li>ext4: fix a data race at inode->i_disksize (bsc#1206855).</li>
<li>ext4: fix bug in extents parsing when eh_entries == 0 and eh_depth > 0 (bsc#1206881).</li>
<li>ext4: fix corruption when online resizing a 1K bigalloc fs (bsc#1206891).</li>
<li>ext4: fix extent status tree race in writeback error recovery path (bsc#1206877).</li>
<li>ext4: fix null-ptr-deref in ext4_write_info (bsc#1206884).</li>
<li>ext4: fix undefined behavior in bit shift for ext4_check_flag_values (bsc#1206890).</li>
<li>ext4: fix uninititialized value in 'ext4_evict_inode' (bsc#1206893).</li>
<li>ext4: fix use-after-free in ext4_ext_shift_extents (bsc#1206888).</li>
<li>ext4: fix use-after-free in ext4_xattr_set_entry (bsc#1206878).</li>
<li>ext4: fix warning in 'ext4_da_release_space' (bsc#1206887).</li>
<li>ext4: iomap that extends beyond EOF should be marked dirty (bsc#1206637).</li>
<li>ext4: make ext4_lazyinit_thread freezable (bsc#1206885).</li>
<li>ext4: mark block bitmap corrupted when found instead of BUGON (bsc#1206857).</li>
<li>ext4: silence the warning when evicting inode with dioread_nolock (bsc#1206889).</li>
<li>ext4: update s_overhead_clusters in the superblock during an on-line resize (bsc#1206876).</li>
<li>ext4: use matching invalidatepage in ext4_writepage (bsc#1206858).</li>
<li>fs: nfsd: fix kconfig dependency warning for NFSD_V4 (git-fixes).</li>
<li>ibmveth: Always stop tx queues during close (bsc#1065729).</li>
<li>isofs: joliet: Fix iocharset=utf8 mount option (bsc#1206636).</li>
<li>lib/notifier-error-inject: fix error when writing -errno to debugfs file (bsc#1206634).</li>
<li>libfs: add DEFINE_SIMPLE_ATTRIBUTE_SIGNED for signed value (bsc#1206634).</li>
<li>lockd: lockd server-side shouldn't set fl_ops (git-fixes).</li>
<li>memcg, kmem: further deprecate kmem.limit_in_bytes (bsc#1206896).</li>
<li>memcg: Fix possible use-after-free in memcg_write_event_control() (bsc#1206344).</li>
<li>mm, memcg: do not high throttle allocators based on wraparound</li>
<li>mm, memcg: fix corruption on 64-bit divisor in memory.high throttling</li>
<li>mm, memcg: throttle allocators based on ancestral memory.high</li>
<li>mm/filemap.c: clear page error before actual read (bsc#1206635).</li>
<li>mm: fix race between MADV_FREE reclaim and blkdev direct IO read (bsc#1204989,bsc#1205601).</li>
<li>module: Remove accidental change of module_enable_x() (git-fixes).</li>
<li>module: avoid <em>goto</em>s in module_sig_check() (git-fixes).</li>
<li>module: merge repetitive strings in module_sig_check() (git-fixes).</li>
<li>module: set MODULE_STATE_GOING state when a module fails to load (git-fixes).</li>
<li>modules: lockdep: Suppress suspicious RCU usage warning (git-fixes).</li>
<li>net: sched: atm: dont intepret cls results when asked to drop (bsc#1207036).</li>
<li>net: sched: cbq: dont intepret cls results when asked to drop (bsc#1207036).</li>
<li>net: sunrpc: Fix off-by-one issues in 'rpc_ntop6' (git-fixes).</li>
<li>netfilter: nfnetlink_osf: fix possible bogus match in nf_osf_find() (bsc#1204614).</li>
<li>nfs4: Fix kmemleak when allocate slot failed (git-fixes).</li>
<li>nfs4: Fix oops when copy_file_range is attempted with NFS4.0 source (git-fixes).</li>
<li>nfs: Fix an Oops in nfs_d_automount() (git-fixes).</li>
<li>nfs: Fix memory leaks (git-fixes).</li>
<li>nfs: Fix memory leaks in nfs_pageio_stop_mirroring() (git-fixes).</li>
<li>nfs: Handle missing attributes in OPEN reply (bsc#1203740).</li>
<li>nfs: Zero-stateid SETATTR should first return delegation (git-fixes).</li>
<li>nfs: direct.c: Fix memory leak of dreq when nfs_get_lock_context fails (git-fixes).</li>
<li>nfs: fix PNFS_FLEXFILE_LAYOUT Kconfig default (git-fixes).</li>
<li>nfs: nfs4clinet: check the return value of kstrdup() (git-fixes).</li>
<li>nfs: nfs_find_open_context() may only select open files (git-fixes).</li>
<li>nfs: nfs_xdr_status should record the procedure name (git-fixes).</li>
<li>nfs: we do not support removing system.nfs4_acl (git-fixes).</li>
<li>nfsd: Clone should commit src file metadata too (git-fixes).</li>
<li>nfsd: Fix handling of oversized NFSv4 COMPOUND requests (git-fixes).</li>
<li>nfsd: Fix svc_xprt refcnt leak when setup callback client failed (git-fixes).</li>
<li>nfsd: Keep existing listeners on portlist error (git-fixes).</li>
<li>nfsd: Return nfserr_serverfault if splice_ok but buf->pages have data (git-fixes).</li>
<li>nfsd: do not call nfsd_file_put from client states seqfile display (git-fixes).</li>
<li>nfsd: fix error handling in NFSv4.0 callbacks (git-fixes).</li>
<li>nfsd: safer handling of corrupted c_type (git-fixes).</li>
<li>nfsv4 expose nfs_parse_server_name function (git-fixes).</li>
<li>nfsv4 only print the label when its queried (git-fixes).</li>
<li>nfsv4 remove zero number of fs_locations entries error check (git-fixes).</li>
<li>nfsv4.1 handle ERR_DELAY error reclaiming locking state on delegation recall (git-fixes).</li>
<li>nfsv4.1: Fix uninitialised variable in devicenotify (git-fixes).</li>
<li>nfsv4.1: Handle RECLAIM_COMPLETE trunking errors (git-fixes).</li>
<li>nfsv4.1: We must always send RECLAIM_COMPLETE after a reboot (git-fixes).</li>
<li>nfsv4.2: Clear FATTR4_WORD2_SECURITY_LABEL when done decoding (git-fixes).</li>
<li>nfsv4.2: Fix a memory stomp in decode_attr_security_label (git-fixes).</li>
<li>nfsv4.2: Fix initialisation of struct nfs4_label (git-fixes).</li>
<li>nfsv4.2: Fixup CLONE dest file size for zero-length count (git-fixes).</li>
<li>nfsv4.2: error out when relink swapfile (git-fixes).</li>
<li>nfsv4.x: Fail client initialisation if state manager thread can't run (git-fixes).</li>
<li>nfsv4/pnfs: Always return layout stats on layout return for flexfiles (git-fixes).</li>
<li>nfsv4/pnfs: Fix a use-after-free bug in open (git-fixes).</li>
<li>nfsv4: Do not hold the layoutget locks across multiple RPC calls (git-fixes).</li>
<li>nfsv4: Fix a deadlock between nfs4_open_recover_helper() and delegreturn (git-fixes).</li>
<li>nfsv4: Fix a pNFS layout related use-after-free race when freeing the inode (git-fixes).</li>
<li>nfsv4: Fix races between open and dentry revalidation (git-fixes).</li>
<li>nfsv4: Protect the state recovery thread against direct reclaim (git-fixes).</li>
<li>nfsv4: Retry LOCK on OLD_STATEID during delegation return (git-fixes).</li>
<li>pnfs/nfsv4: Try to return invalid layout in pnfs_layout_process() (git-fixes).</li>
<li>powerpc/64: Init jump labels before parse_early_param() (bsc#1065729).</li>
<li>powerpc/64s/pgtable: fix an undefined behaviour (bsc#1065729).</li>
<li>powerpc/book3s/mm: Update Oops message to print the correct translation in use (bsc#1156395).</li>
<li>powerpc/boot: Fixup device-tree on little endian (bsc#1065729).</li>
<li>powerpc/crashkernel: Take "mem=" option into account (bsc#1065729).</li>
<li>powerpc/eeh: Only dump stack once if an MMIO loop is detected (bsc#1065729).</li>
<li>powerpc/pci: Fix get_phb_number() locking (bsc#1065729).</li>
<li>powerpc/perf: callchain validate kernel stack pointer bounds (bsc#1065729).</li>
<li>powerpc/powernv/iov: Ensure the pdn for VFs always contains a valid PE number (bsc#1065729).</li>
<li>powerpc/powernv/smp: Fix spurious DBG() warning (bsc#1065729).</li>
<li>powerpc/powernv: Avoid re-registration of imc debugfs directory (bsc#1156395).</li>
<li>powerpc/powernv: add missing of_node_put (bsc#1065729).</li>
<li>powerpc/pseries/cmm: Implement release() function for sysfs device (bsc#1065729).</li>
<li>powerpc/pseries/eeh: use correct API for error log size (bsc#1065729).</li>
<li>powerpc/pseries: Stop calling printk in rtas_stop_self() (bsc#1065729).</li>
<li>powerpc/pseries: unregister VPA when hot unplugging a CPU (bsc#1205695 ltc#200603).</li>
<li>powerpc/rtas: avoid device tree lookups in rtas_os_term() (bsc#1065729).</li>
<li>powerpc/rtas: avoid scheduling in rtas_os_term() (bsc#1065729).</li>
<li>powerpc/sriov: Remove VF eeh_dev state when disabling SR-IOV (bsc#1065729).</li>
<li>powerpc/xive/spapr: correct bitmap allocation size (git-fixes).</li>
<li>powerpc/xive: Add a check for memory allocation failure (git-fixes).</li>
<li>powerpc/xive: add missing iounmap() in error path in xive_spapr_populate_irq_data() (git-fixes).</li>
<li>powerpc: Ensure that swiotlb buffer is allocated from low memory (bsc#1156395).</li>
<li>powerpc: Force inlining of cpu_has_feature() to avoid build failure (bsc#1065729).</li>
<li>powerpc: improve handling of unrecoverable system reset (bsc#1065729).</li>
<li>powerpc: sysdev: add missing iounmap() on error in mpic_msgr_probe() (bsc#1065729).</li>
<li>quota: Check next/prev free block number after reading from quota file (bsc#1206640).</li>
<li>rpc: fix NULL dereference on kmalloc failure (git-fixes).</li>
<li>rpc: fix gss_svc_init cleanup on failure (git-fixes).</li>
<li>sbitmap: fix lockup while swapping (bsc#1206602).</li>
<li>sched/psi: Fix sampling error and rare div0 crashes with cgroups and high uptime (bsc#1206841).</li>
<li>scsi: lpfc: Correct bandwidth logging during receipt of congestion sync WCQE (jsc#PED-1445).</li>
<li>scsi: lpfc: Fix MI capability display in cmf_info sysfs attribute (jsc#PED-1445).</li>
<li>scsi: lpfc: Fix WQ|CQ|EQ resource check (jsc#PED-1445).</li>
<li>scsi: lpfc: Fix crash involving race between FLOGI timeout and devloss handler (jsc#PED-1445).</li>
<li>scsi: lpfc: Remove linux/msi.h include (jsc#PED-1445).</li>
<li>scsi: lpfc: Remove redundant pointer 'lp' (jsc#PED-1445).</li>
<li>scsi: lpfc: Update lpfc version to 14.2.0.9 (jsc#PED-1445).</li>
<li>scsi: lpfc: Use memset_startat() helper (jsc#PED-1445).</li>
<li>scsi: qla2xxx: Fix crash when I/O abort times out (jsc#PED-568).</li>
<li>scsi: qla2xxx: Fix set-but-not-used variable warnings (jsc#PED-568).</li>
<li>scsi: qla2xxx: Initialize vha->unknown_atio_[list, work] for NPIV hosts (jsc#PED-568).</li>
<li>scsi: qla2xxx: Remove duplicate of vha->iocb_work initialization (jsc#PED-568).</li>
<li>scsi: qla2xxx: Remove unused variable 'found_devs' (jsc#PED-568).</li>
<li>string.h: Introduce memset_startat() for wiping trailing members and padding (jsc#PED-1445).</li>
<li>sunrpc: Do not leak netobj memory when gss_read_proxy_verf() fails (git-fixes).</li>
<li>sunrpc: Do not start a timer on an already queued rpc task (git-fixes).</li>
<li>sunrpc: Fix missing release socket in rpc_sockname() (git-fixes).</li>
<li>sunrpc: Fix potential leaks in sunrpc_cache_unhash() (git-fixes).</li>
<li>sunrpc: Fix socket waits for write buffer space (git-fixes).</li>
<li>sunrpc: Handle 0 length opaque XDR object data properly (git-fixes).</li>
<li>sunrpc: Mitigate cond_resched() in xprt_transmit() (git-fixes).</li>
<li>sunrpc: Move simple_get_bytes and simple_get_netobj into private header (git-fixes).</li>
<li>sunrpc: check that domain table is empty at module unload (git-fixes).</li>
<li>sunrpc: stop printk reading past end of string (git-fixes).</li>
<li>svcrdma: Fix another Receive buffer leak (git-fixes).</li>
<li>svcrdma: Fix backchannel return code (git-fixes).</li>
<li>tracing: Verify if trace array exists before destroying it (git-fixes).</li>
<li>udf: Avoid accessing uninitialized data on failed inode read (bsc#1206642).</li>
<li>udf: Fix NULL pointer dereference in udf_symlink function (bsc#1206646).</li>
<li>udf: Fix a slab-out-of-bounds write bug in udf_find_entry() (bsc#1206649).</li>
<li>udf: Fix free space reporting for metadata and virtual partitions (bsc#1206641).</li>
<li>udf: Fix iocharset=utf8 mount option (bsc#1206647).</li>
<li>udf: Limit sparing table size (bsc#1206643).</li>
<li>udf: fix silent AED tagLocation corruption (bsc#1206645).</li>
<li>udf: fix the problem that the disc content is not displayed (bsc#1206644).</li>
<li>udf_get_extendedattr() had no boundary checks (bsc#1206648).</li>
<li>xprtrdma: Fix regbuf data not freed in rpcrdma_req_create() (git-fixes).</li>
<li>xprtrdma: treat all calls not a bcall when bc_serv is NULL (git-fixes).</li>
</ul>
<h2>Special Instructions and Notes:</h2>
<ul>
<li>Please reboot the system after installing this update.</li>
</ul>
<h2>Patch Instructions:</h2>
<p>
To install this SUSE Important update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".<br/>
Alternatively you can run the command listed for your product:
</p>
<ul class="list-group">
<li class="list-group-item">
SUSE Real Time Module 15-SP3
<br/>
<code>zypper in -t patch SUSE-SLE-Module-RT-15-SP3-2023-591=1</code>
</li>
<li class="list-group-item">
SUSE Linux Enterprise Micro 5.1
<br/>
<code>zypper in -t patch SUSE-SUSE-MicroOS-5.1-2023-591=1</code>
</li>
<li class="list-group-item">
SUSE Linux Enterprise Micro 5.2
<br/>
<code>zypper in -t patch SUSE-SUSE-MicroOS-5.2-2023-591=1</code>
</li>
<li class="list-group-item">
SUSE Linux Enterprise Micro for Rancher 5.2
<br/>
<code>zypper in -t patch SUSE-SUSE-MicroOS-5.2-2023-591=1</code>
</li>
</ul>
<h2>Package List:</h2>
<ul>
<li>
SUSE Real Time Module 15-SP3 (x86_64)
<ul>
<li>kernel-syms-rt-5.3.18-150300.118.1</li>
<li>kernel-rt_debug-devel-debuginfo-5.3.18-150300.118.1</li>
<li>cluster-md-kmp-rt-5.3.18-150300.118.1</li>
<li>kernel-rt_debug-debugsource-5.3.18-150300.118.1</li>
<li>gfs2-kmp-rt-debuginfo-5.3.18-150300.118.1</li>
<li>kernel-rt-debuginfo-5.3.18-150300.118.1</li>
<li>dlm-kmp-rt-debuginfo-5.3.18-150300.118.1</li>
<li>dlm-kmp-rt-5.3.18-150300.118.1</li>
<li>kernel-rt-devel-debuginfo-5.3.18-150300.118.1</li>
<li>kernel-rt_debug-devel-5.3.18-150300.118.1</li>
<li>gfs2-kmp-rt-5.3.18-150300.118.1</li>
<li>cluster-md-kmp-rt-debuginfo-5.3.18-150300.118.1</li>
<li>kernel-rt-debugsource-5.3.18-150300.118.1</li>
<li>ocfs2-kmp-rt-5.3.18-150300.118.1</li>
<li>kernel-rt_debug-debuginfo-5.3.18-150300.118.1</li>
<li>ocfs2-kmp-rt-debuginfo-5.3.18-150300.118.1</li>
<li>kernel-rt-devel-5.3.18-150300.118.1</li>
</ul>
</li>
<li>
SUSE Real Time Module 15-SP3 (noarch)
<ul>
<li>kernel-devel-rt-5.3.18-150300.118.1</li>
<li>kernel-source-rt-5.3.18-150300.118.1</li>
</ul>
</li>
<li>
SUSE Real Time Module 15-SP3 (nosrc x86_64)
<ul>
<li>kernel-rt-5.3.18-150300.118.1</li>
</ul>
</li>
<li>
SUSE Real Time Module 15-SP3 (nosrc)
<ul>
<li>kernel-rt_debug-5.3.18-150300.118.1</li>
</ul>
</li>
<li>
SUSE Linux Enterprise Micro 5.1 (nosrc x86_64)
<ul>
<li>kernel-rt-5.3.18-150300.118.1</li>
</ul>
</li>
<li>
SUSE Linux Enterprise Micro 5.1 (x86_64)
<ul>
<li>kernel-rt-debuginfo-5.3.18-150300.118.1</li>
<li>kernel-rt-debugsource-5.3.18-150300.118.1</li>
</ul>
</li>
<li>
SUSE Linux Enterprise Micro 5.2 (nosrc x86_64)
<ul>
<li>kernel-rt-5.3.18-150300.118.1</li>
</ul>
</li>
<li>
SUSE Linux Enterprise Micro 5.2 (x86_64)
<ul>
<li>kernel-rt-debuginfo-5.3.18-150300.118.1</li>
<li>kernel-rt-debugsource-5.3.18-150300.118.1</li>
</ul>
</li>
<li>
SUSE Linux Enterprise Micro for Rancher 5.2 (nosrc x86_64)
<ul>
<li>kernel-rt-5.3.18-150300.118.1</li>
</ul>
</li>
<li>
SUSE Linux Enterprise Micro for Rancher 5.2 (x86_64)
<ul>
<li>kernel-rt-debuginfo-5.3.18-150300.118.1</li>
<li>kernel-rt-debugsource-5.3.18-150300.118.1</li>
</ul>
</li>
</ul>
<h2>References:</h2>
<ul>
<li>
<a href="https://www.suse.com/security/cve/CVE-2022-3112.html">https://www.suse.com/security/cve/CVE-2022-3112.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2022-3115.html">https://www.suse.com/security/cve/CVE-2022-3115.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2022-3564.html">https://www.suse.com/security/cve/CVE-2022-3564.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2022-47520.html">https://www.suse.com/security/cve/CVE-2022-47520.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-23454.html">https://www.suse.com/security/cve/CVE-2023-23454.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-23455.html">https://www.suse.com/security/cve/CVE-2023-23455.html</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1065729">https://bugzilla.suse.com/show_bug.cgi?id=1065729</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1156395">https://bugzilla.suse.com/show_bug.cgi?id=1156395</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1203740">https://bugzilla.suse.com/show_bug.cgi?id=1203740</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1204614">https://bugzilla.suse.com/show_bug.cgi?id=1204614</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1204989">https://bugzilla.suse.com/show_bug.cgi?id=1204989</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1205496">https://bugzilla.suse.com/show_bug.cgi?id=1205496</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1205601">https://bugzilla.suse.com/show_bug.cgi?id=1205601</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1205695">https://bugzilla.suse.com/show_bug.cgi?id=1205695</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1206073">https://bugzilla.suse.com/show_bug.cgi?id=1206073</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1206344">https://bugzilla.suse.com/show_bug.cgi?id=1206344</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1206393">https://bugzilla.suse.com/show_bug.cgi?id=1206393</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1206399">https://bugzilla.suse.com/show_bug.cgi?id=1206399</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1206515">https://bugzilla.suse.com/show_bug.cgi?id=1206515</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1206602">https://bugzilla.suse.com/show_bug.cgi?id=1206602</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1206634">https://bugzilla.suse.com/show_bug.cgi?id=1206634</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1206635">https://bugzilla.suse.com/show_bug.cgi?id=1206635</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1206636">https://bugzilla.suse.com/show_bug.cgi?id=1206636</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1206637">https://bugzilla.suse.com/show_bug.cgi?id=1206637</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1206640">https://bugzilla.suse.com/show_bug.cgi?id=1206640</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1206641">https://bugzilla.suse.com/show_bug.cgi?id=1206641</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1206642">https://bugzilla.suse.com/show_bug.cgi?id=1206642</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1206643">https://bugzilla.suse.com/show_bug.cgi?id=1206643</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1206644">https://bugzilla.suse.com/show_bug.cgi?id=1206644</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1206645">https://bugzilla.suse.com/show_bug.cgi?id=1206645</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1206646">https://bugzilla.suse.com/show_bug.cgi?id=1206646</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1206647">https://bugzilla.suse.com/show_bug.cgi?id=1206647</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1206648">https://bugzilla.suse.com/show_bug.cgi?id=1206648</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1206649">https://bugzilla.suse.com/show_bug.cgi?id=1206649</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1206841">https://bugzilla.suse.com/show_bug.cgi?id=1206841</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1206854">https://bugzilla.suse.com/show_bug.cgi?id=1206854</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1206855">https://bugzilla.suse.com/show_bug.cgi?id=1206855</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1206857">https://bugzilla.suse.com/show_bug.cgi?id=1206857</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1206858">https://bugzilla.suse.com/show_bug.cgi?id=1206858</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1206859">https://bugzilla.suse.com/show_bug.cgi?id=1206859</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1206860">https://bugzilla.suse.com/show_bug.cgi?id=1206860</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1206873">https://bugzilla.suse.com/show_bug.cgi?id=1206873</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1206875">https://bugzilla.suse.com/show_bug.cgi?id=1206875</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1206876">https://bugzilla.suse.com/show_bug.cgi?id=1206876</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1206877">https://bugzilla.suse.com/show_bug.cgi?id=1206877</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1206878">https://bugzilla.suse.com/show_bug.cgi?id=1206878</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1206880">https://bugzilla.suse.com/show_bug.cgi?id=1206880</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1206881">https://bugzilla.suse.com/show_bug.cgi?id=1206881</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1206882">https://bugzilla.suse.com/show_bug.cgi?id=1206882</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1206883">https://bugzilla.suse.com/show_bug.cgi?id=1206883</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1206884">https://bugzilla.suse.com/show_bug.cgi?id=1206884</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1206885">https://bugzilla.suse.com/show_bug.cgi?id=1206885</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1206886">https://bugzilla.suse.com/show_bug.cgi?id=1206886</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1206887">https://bugzilla.suse.com/show_bug.cgi?id=1206887</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1206888">https://bugzilla.suse.com/show_bug.cgi?id=1206888</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1206889">https://bugzilla.suse.com/show_bug.cgi?id=1206889</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1206890">https://bugzilla.suse.com/show_bug.cgi?id=1206890</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1206891">https://bugzilla.suse.com/show_bug.cgi?id=1206891</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1206893">https://bugzilla.suse.com/show_bug.cgi?id=1206893</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1206896">https://bugzilla.suse.com/show_bug.cgi?id=1206896</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1206904">https://bugzilla.suse.com/show_bug.cgi?id=1206904</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1207036">https://bugzilla.suse.com/show_bug.cgi?id=1207036</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1207125">https://bugzilla.suse.com/show_bug.cgi?id=1207125</a>
</li>
<li>
<a href="https://jira.suse.com/browse/PED-1445">https://jira.suse.com/browse/PED-1445</a>
</li>
<li>
<a href="https://jira.suse.com/browse/PED-568">https://jira.suse.com/browse/PED-568</a>
</li>
</ul>
</div>