<div class="container">
    <h1>Security update for the Linux Kernel</h1>

    <table class="table table-striped table-bordered">
        <tbody>
        <tr>
            <th>Announcement ID:</th>
            <td>SUSE-SU-2023:2803-1</td>
        </tr>
        
        <tr>
            <th>Rating:</th>
            <td>important</td>
        </tr>
        <tr>
            <th>References:</th>
            <td>
                <ul>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1187829">#1187829</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1194869">#1194869</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1210335">#1210335</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1212051">#1212051</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1212265">#1212265</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1212603">#1212603</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1212605">#1212605</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1212606">#1212606</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1212619">#1212619</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1212701">#1212701</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1212741">#1212741</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1212835">#1212835</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1212838">#1212838</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1212842">#1212842</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1212861">#1212861</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1212869">#1212869</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1212892">#1212892</a>
                        </li>
                    
                </ul>
            </td>
        </tr>
        
            <tr>
                <th>
                    Cross-References:
                </th>
                <td>
                    <ul>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-1829.html">CVE-2023-1829</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-3090.html">CVE-2023-3090</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-3111.html">CVE-2023-3111</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-3212.html">CVE-2023-3212</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-3357.html">CVE-2023-3357</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-3358.html">CVE-2023-3358</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-3389.html">CVE-2023-3389</a>
                        </li>
                    
                    </ul>
                </td>
            </tr>
            <tr>
                <th>CVSS scores:</th>
                <td>
                    <ul class="list-group">
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-1829</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.8</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-1829</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.8</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-3090</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.8</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-3090</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.8</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-3111</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">6.7</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-3111</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.8</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-3212</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">4.3</span>
                                <span class="cvss-vector">CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-3212</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">4.4</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-3357</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">4.7</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-3357</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-3358</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">4.7</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-3358</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-3389</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-3389</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
                            </li>
                        
                    </ul>
                </td>
            </tr>
        
        <tr>
            <th>Affected Products:</th>
            <td>
                <ul class="list-group">
                    
                        <li class="list-group-item">openSUSE Leap 15.4</li>
                    
                        <li class="list-group-item">openSUSE Leap Micro 5.3</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise High Performance Computing 15 SP4</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Live Patching 15-SP4</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Micro 5.3</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Micro 5.4</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Micro for Rancher 5.3</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Micro for Rancher 5.4</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Real Time 15 SP4</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Server 15 SP4</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Server for SAP Applications 15 SP4</li>
                    
                        <li class="list-group-item">SUSE Real Time Module 15-SP4</li>
                    
                </ul>
            </td>
        </tr>
        </tbody>
    </table>

    <p>An update that solves seven vulnerabilities, contains one feature and has 10 fixes can now be installed.</p>

    <h2>Description:</h2>
    <p>The SUSE Linux Enterprise 15 SP4 RT kernel was updated to receive various security and bugfixes.</p>
<p>The following security bugs were fixed:</p>
<ul>
<li>CVE-2023-1829: Fixed a use-after-free vulnerability in the control index filter (tcindex) (bsc#1210335).</li>
<li>CVE-2023-3389: Fixed a use-after-free vulnerability in the io_uring subsystem (bsc#1212838).</li>
<li>CVE-2023-3090: Fixed a heap out-of-bounds write in the ipvlan network driver (bsc#1212842).</li>
<li>CVE-2023-3111: Fixed a use-after-free vulnerability in prepare_to_relocate in fs/btrfs/relocation.c (bsc#1212051).</li>
<li>CVE-2023-3212: Fixed a NULL pointer dereference flaw in the gfs2 file system (bsc#1212265).</li>
<li>CVE-2023-3358: Fixed a NULL pointer dereference flaw in the Integrated Sensor Hub (ISH) driver (bsc#1212606).</li>
<li>CVE-2023-3357: Fixed a NULL pointer dereference flaw in the AMD Sensor Fusion Hub driver (bsc#1212605).</li>
</ul>
<p>The following non-security bugs were fixed:</p>
<ul>
<li>Get module prefix from kmod (bsc#1212835).</li>
<li>Revert "mtd: rawnand: arasan: Prevent an unsupported configuration" (git-fixes).</li>
<li>Revert "net: phy: dp83867: perform soft reset and retain established link" (git-fixes).</li>
<li>alsa: ac97: Fix possible NULL dereference in snd_ac97_mixer (git-fixes).</li>
<li>alsa: hda/realtek: Add "Intel Reference board" and "NUC 13" SSID in the ALC256 (git-fixes).</li>
<li>alsa: hda/realtek: Add quirk for ASUS ROG G634Z (git-fixes).</li>
<li>alsa: hda/realtek: Add quirk for ASUS ROG GV601V (git-fixes).</li>
<li>alsa: hda/realtek: Add quirks for ASUS GU604V and GU603V (git-fixes).</li>
<li>alsa: hda/realtek: Add quirks for ROG ALLY CS35l41 audio (git-fixes).</li>
<li>alsa: hda/realtek: Enable mute/micmute LEDs and limit mic boost on EliteBook (git-fixes).</li>
<li>amdgpu: validate offset_in_bo of drm_amdgpu_gem_va (git-fixes).</li>
<li>arm64: Add missing Set/Way CMO encodings (git-fixes).</li>
<li>arm64: dts: Move BCM4908 dts to bcmbca folder (git-fixes)</li>
<li>arm64: dts: broadcom: bcmbca: bcm4908: fix NAND interrupt name (git-fixes)</li>
<li>arm64: dts: broadcom: bcmbca: bcm4908: fix procmon nodename (git-fixes)</li>
<li>arm64: dts: imx8mn-var-som: fix PHY detection bug by adding deassert (git-fixes)</li>
<li>arm: dts: Fix erroneous ADS touchscreen polarities (git-fixes).</li>
<li>asoc: es8316: Do not set rate constraints for unsupported MCLKs (git-fixes).</li>
<li>asoc: es8316: Increment max value for ALC Capture Target Volume control (git-fixes).</li>
<li>asoc: imx-audmix: check return value of devm_kasprintf() (git-fixes).</li>
<li>asoc: mediatek: mt8173: Fix irq error path (git-fixes).</li>
<li>asoc: nau8824: Add quirk to active-high jack-detect (git-fixes).</li>
<li>asoc: simple-card: Add missing of_node_put() in case of error (git-fixes).</li>
<li>bus: fsl-mc: fsl-mc-allocator: Drop a write-only variable (git-fixes).</li>
<li>bus: ti-sysc: Fix dispc quirk masking bool variables (git-fixes).</li>
<li>can: isotp: isotp_sendmsg(): fix return error fix on TX path (git-fixes).</li>
<li>can: kvaser_pciefd: Remove handler for unused KVASER_PCIEFD_PACK_TYPE_EFRAME_ACK (git-fixes).</li>
<li>can: kvaser_pciefd: Remove useless write to interrupt register (git-fixes).</li>
<li>can: length: fix bitstuffing count (git-fixes).</li>
<li>can: length: fix description of the RRS field (git-fixes).</li>
<li>can: length: make header self contained (git-fixes).</li>
<li>clk: Fix memory leak in devm_clk_notifier_register() (git-fixes).</li>
<li>clk: cdce925: check return value of kasprintf() (git-fixes).</li>
<li>clk: imx: clk-imx8mn: fix memory leak in imx8mn_clocks_probe (git-fixes).</li>
<li>clk: imx: clk-imx8mp: improve error handling in imx8mp_clocks_probe() (git-fixes).</li>
<li>clk: imx: scu: use _safe list iterator to avoid a use after free (git-fixes).</li>
<li>clk: keystone: sci-clk: check return value of kasprintf() (git-fixes).</li>
<li>clk: samsung: Add Exynos4212 compatible to CLKOUT driver (git-fixes).</li>
<li>clk: si5341: check return value of {devm_}kasprintf() (git-fixes).</li>
<li>clk: si5341: free unused memory on probe failure (git-fixes).</li>
<li>clk: si5341: return error if one synth clock registration fails (git-fixes).</li>
<li>clk: tegra: tegra124-emc: Fix potential memory leak (git-fixes).</li>
<li>clk: ti: clkctrl: check return value of kasprintf() (git-fixes).</li>
<li>clk: vc5: check memory returned by kasprintf() (git-fixes).</li>
<li>clocksource/drivers/cadence-ttc: Fix memory leak in ttc_timer_probe (git-fixes).</li>
<li>crypto: marvell/cesa - Fix type mismatch warning (git-fixes).</li>
<li>crypto: nx - fix build warnings when DEBUG_FS is not enabled (git-fixes).</li>
<li>drivers: meson: secure-pwrc: always enable DMA domain (git-fixes).</li>
<li>drm/amd/display: Add logging for display MALL refresh setting (git-fixes).</li>
<li>drm/amd/display: Add minimal pipe split transition state (git-fixes).</li>
<li>drm/amd/display: Add wrapper to call planes and stream update (git-fixes).</li>
<li>drm/amd/display: Explicitly specify update type per plane info change (git-fixes).</li>
<li>drm/amd/display: Fix artifacting on eDP panels when engaging freesync video mode (git-fixes).</li>
<li>drm/amd/display: Use dc_update_planes_and_stream (git-fixes).</li>
<li>drm/amd/display: drop redundant memset() in get_available_dsc_slices() (git-fixes).</li>
<li>drm/amd/display: fix the system hang while disable PSR (git-fixes).</li>
<li>drm/amdkfd: Fix potential deallocation of previously deallocated memory (git-fixes).</li>
<li>drm/bridge: tc358768: always enable HS video mode (git-fixes).</li>
<li>drm/bridge: tc358768: fix PLL parameters computation (git-fixes).</li>
<li>drm/bridge: tc358768: fix PLL target frequency (git-fixes).</li>
<li>drm/bridge: tc358768: fix TCLK_ZEROCNT computation (git-fixes).</li>
<li>drm/bridge: tc358768: fix TXTAGOCNT computation (git-fixes).</li>
<li>drm/exynos: fix race condition UAF in exynos_g2d_exec_ioctl (git-fixes).</li>
<li>drm/exynos: vidi: fix a wrong error return (git-fixes).</li>
<li>drm/i915/gvt: remove unused variable gma_bottom in command parser (git-fixes).</li>
<li>drm/msm/adreno: fix sparse warnings in a6xx code (git-fixes).</li>
<li>drm/msm/dp: Free resources after unregistering them (git-fixes).</li>
<li>drm/msm/dpu: correct MERGE_3D length (git-fixes).</li>
<li>drm/msm/dpu: do not enable color-management if DSPPs are not available (git-fixes).</li>
<li>drm/msm/dsi: do not allow enabling 14nm VCO with unprogrammed rate (git-fixes).</li>
<li>drm/panel: sharp-ls043t1le01: adjust mode settings (git-fixes).</li>
<li>drm/panel: simple: fix active size for Ampire AM-480272H3TMQW-T01H (git-fixes).</li>
<li>drm/radeon: fix possible division-by-zero errors (git-fixes).</li>
<li>drm/radeon: fix race condition UAF in radeon_gem_set_domain_ioctl (git-fixes).</li>
<li>drm/rockchip: vop: Leave vblank enabled in self-refresh (git-fixes).</li>
<li>drm/vram-helper: fix function names in vram helper doc (git-fixes).</li>
<li>drm: sun4i_tcon: use devm_clk_get_enabled in <code>sun4i_tcon_init_clocks</code> (git-fixes).</li>
<li>elf: correct note name comment (git-fixes).</li>
<li>extcon: Fix kernel doc of property capability fields to avoid warnings (git-fixes).</li>
<li>extcon: Fix kernel doc of property fields to avoid warnings (git-fixes).</li>
<li>extcon: usbc-tusb320: Add USB TYPE-C support (git-fixes).</li>
<li>extcon: usbc-tusb320: Call the Type-C IRQ handler only if a port is registered (git-fixes).</li>
<li>extcon: usbc-tusb320: Unregister typec port on driver removal (git-fixes).</li>
<li>extcon: usbc-tusb320: Update state on probe even if no IRQ pending (git-fixes).</li>
<li>fbdev: omapfb: lcd_mipid: Fix an error handling path in mipid_spi_probe() (git-fixes).</li>
<li>firmware: stratix10-svc: Fix a potential resource leak in svc_create_memory_pool() (git-fixes).</li>
<li>hid: logitech-hidpp: add HIDPP_QUIRK_DELAYED_INIT for the T651 (git-fixes).</li>
<li>hid: wacom: Add error check to wacom_parse_and_register() (git-fixes).</li>
<li>hwmon: (gsc-hwmon) fix fan pwm temperature scaling (git-fixes).</li>
<li>hwrng: imx-rngc - fix the timeout for init and self check (git-fixes).</li>
<li>hwrng: st - keep clock enabled while hwrng is registered (git-fixes).</li>
<li>i2c: imx-lpi2c: fix type char overflow issue when calculating the clock cycle (git-fixes).</li>
<li>i2c: qup: Add missing unwind goto in qup_i2c_probe() (git-fixes).</li>
<li>ib/hfi1: Fix wrong mmu_node used for user SDMA packet after invalidate (git-fixes)</li>
<li>ib/isert: Fix dead lock in ib_isert (git-fixes)</li>
<li>ib/isert: Fix incorrect release of isert connection (git-fixes)</li>
<li>ib/isert: Fix possible list corruption in CMA handler (git-fixes)</li>
<li>ib/uverbs: Fix to consider event queue closing also upon non-blocking mode (git-fixes)</li>
<li>ibmvnic: Do not reset dql stats on NON_FATAL err (bsc#1212603 ltc#202604).</li>
<li>ice, xsk: Diversify return values from xsk_wakeup call paths (git-fixes).</li>
<li>ice: Do not double unplug aux on peer initiated reset (git-fixes).</li>
<li>ice: Do not use WQ_MEM_RECLAIM flag for workqueue (git-fixes).</li>
<li>ice: Fix DSCP PFC TLV creation (git-fixes).</li>
<li>ice: Fix XDP memory leak when NIC is brought up and down (git-fixes).</li>
<li>ice: Fix ice_xdp_xmit() when XDP TX queue number is not sufficient (git-fixes).</li>
<li>ice: Fix memory corruption in VF driver (git-fixes).</li>
<li>ice: Ignore EEXIST when setting promisc mode (git-fixes).</li>
<li>ice: Prevent set_channel from changing queues while RDMA active (git-fixes).</li>
<li>ice: Reset FDIR counter in FDIR init stage (git-fixes).</li>
<li>ice: add profile conflict check for AVF FDIR (git-fixes).</li>
<li>ice: block LAN in case of VF to VF offload (git-fixes).</li>
<li>ice: config netdev tc before setting queues number (git-fixes).</li>
<li>ice: copy last block omitted in ice_get_module_eeprom() (git-fixes).</li>
<li>ice: ethtool: Prohibit improper channel config for DCB (git-fixes).</li>
<li>ice: ethtool: advertise 1000M speeds properly (git-fixes).</li>
<li>ice: fix invalid check for empty list in ice_sched_assoc_vsi_to_agg() (git-fixes).</li>
<li>ice: fix wrong fallback logic for FDIR (git-fixes).</li>
<li>ice: handle E822 generic device ID in PLDM header (git-fixes).</li>
<li>ice: switch: fix potential memleak in ice_add_adv_recipe() (git-fixes).</li>
<li>ice: use bitmap_free instead of devm_kfree (git-fixes).</li>
<li>ice: xsk: use Rx ring&#x27;s XDP ring when picking NAPI context (git-fixes).</li>
<li>ieee802154: hwsim: Fix possible memory leaks (git-fixes).</li>
<li>ifcvf/vDPA: fix misuse virtio-net device config size for blk dev (jsc#SLE-19253).</li>
<li>iio: accel: fxls8962af: errata bug only applicable for FXLS8962AF (git-fixes).</li>
<li>iio: accel: fxls8962af: fixup buffer scan element type (git-fixes).</li>
<li>iio: adc: ad7192: Fix internal/external clock selection (git-fixes).</li>
<li>iio: adc: ad7192: Fix null ad7192_state pointer access (git-fixes).</li>
<li>input: adxl34x - do not hardcode interrupt trigger type (git-fixes).</li>
<li>input: drv260x - fix typo in register value define (git-fixes).</li>
<li>input: drv260x - remove unused .reg_defaults (git-fixes).</li>
<li>input: drv260x - sleep between polling GO bit (git-fixes).</li>
<li>input: soc_button_array - add invalid acpi_index DMI quirk handling (git-fixes).</li>
<li>integrity: Fix possible multiple allocation in integrity_inode_get() (git-fixes).</li>
<li>irqchip/clps711x: Remove unused clps711x_intc_init() function (git-fixes).</li>
<li>irqchip/ftintc010: Mark all function static (git-fixes).</li>
<li>irqchip/jcore-aic: Fix missing allocation of IRQ descriptors (git-fixes).</li>
<li>kernel-docs: Use python3 together with python3-Sphinx (bsc#1212741).</li>
<li>mailbox: ti-msgmgr: Fill non-message tx data fields with 0x0 (git-fixes).</li>
<li>media: cec: core: do not set last_initiator if tx in progress (git-fixes).</li>
<li>memory: brcmstb_dpfe: fix testing array offset after use (git-fixes).</li>
<li>meson saradc: fix clock divider mask length (git-fixes).</li>
<li>mfd: intel-lpss: Add missing check for platform_get_resource (git-fixes).</li>
<li>mfd: pm8008: Fix module autoloading (git-fixes).</li>
<li>mfd: rt5033: Drop rt5033-battery sub-device (git-fixes).</li>
<li>mfd: stmfx: Fix error path in stmfx_chip_init (git-fixes).</li>
<li>mfd: stmfx: Nullify stmfx->vdd in case of error (git-fixes).</li>
<li>mfd: stmpe: Only disable the regulators if they are enabled (git-fixes).</li>
<li>misc: fastrpc: Create fastrpc scalar with correct buffer count (git-fixes).</li>
<li>misc: pci_endpoint_test: Free IRQs before removing the device (git-fixes).</li>
<li>misc: pci_endpoint_test: Re-init completion for every test (git-fixes).</li>
<li>mlx5: do not use RT_TOS for IPv6 flowlabel (jsc#SLE-19253).</li>
<li>mmc: bcm2835: fix deferred probing (git-fixes).</li>
<li>mmc: meson-gx: remove redundant mmc_request_done() call from irq context (git-fixes).</li>
<li>mmc: mmci: Set PROBE_PREFER_ASYNCHRONOUS (git-fixes).</li>
<li>mmc: mmci: stm32: fix max busy timeout calculation (git-fixes).</li>
<li>mmc: mtk-sd: fix deferred probing (git-fixes).</li>
<li>mmc: mvsdio: fix deferred probing (git-fixes).</li>
<li>mmc: omap: fix deferred probing (git-fixes).</li>
<li>mmc: omap_hsmmc: fix deferred probing (git-fixes).</li>
<li>mmc: owl: fix deferred probing (git-fixes).</li>
<li>mmc: sdhci-acpi: fix deferred probing (git-fixes).</li>
<li>mmc: sdhci-msm: Disable broken 64-bit DMA on MSM8916 (git-fixes).</li>
<li>mmc: sdhci-spear: fix deferred probing (git-fixes).</li>
<li>mmc: sh_mmcif: fix deferred probing (git-fixes).</li>
<li>mmc: sunxi: fix deferred probing (git-fixes).</li>
<li>mmc: usdhi60rol0: fix deferred probing (git-fixes).</li>
<li>mtd: rawnand: meson: fix unaligned DMA buffers handling (git-fixes).</li>
<li>net/mlx5: Add forgotten cleanup calls into mlx5_init_once() error path (jsc#SLE-19253).</li>
<li>net/mlx5: Allow async trigger completion execution on single CPU systems (jsc#SLE-19253).</li>
<li>net/mlx5: Allow future addition of IPsec object modifiers (jsc#SLE-19253).</li>
<li>net/mlx5: Avoid false positive lockdep warning by adding lock_class_key (jsc#SLE-19253).</li>
<li>net/mlx5: Avoid recovery in probe flows (jsc#SLE-19253).</li>
<li>net/mlx5: Bridge, fix ageing of peer FDB entries (jsc#SLE-19253).</li>
<li>net/mlx5: Bridge, verify LAG state when adding bond to bridge (jsc#SLE-19253).</li>
<li>net/mlx5: DR, Check force-loopback RC QP capability independently from RoCE (jsc#SLE-19253).</li>
<li>net/mlx5: DR, Fix crc32 calculation to work on big-endian (BE) CPUs (jsc#SLE-19253).</li>
<li>net/mlx5: DR, Fix missing flow_source when creating multi-destination FW table (jsc#SLE-19253).</li>
<li>net/mlx5: Devcom, fix error flow in mlx5_devcom_register_device (jsc#SLE-19253).</li>
<li>net/mlx5: Do not advertise IPsec netdev support for non-IPsec device (jsc#SLE-19253).</li>
<li>net/mlx5: Do not use already freed action pointer (jsc#SLE-19253).</li>
<li>net/mlx5: E-Switch, Fix an Oops in error handling code (jsc#SLE-19253).</li>
<li>net/mlx5: E-Switch, properly handle ingress tagged packets on VST (jsc#SLE-19253).</li>
<li>net/mlx5: E-switch, Create per vport table based on devlink encap mode (jsc#SLE-19253).</li>
<li>net/mlx5: E-switch, Do not destroy indirect table in split rule (jsc#SLE-19253).</li>
<li>net/mlx5: E-switch, Fix missing set of split_count when forward to ovs internal port (jsc#SLE-19253).</li>
<li>net/mlx5: E-switch, Fix setting of reserved fields on MODIFY_SCHEDULING_ELEMENT (jsc#SLE-19253).</li>
<li>net/mlx5: Enhance debug print in page allocation failure (jsc#SLE-19253).</li>
<li>net/mlx5: Fix FW tracer timestamp calculation (jsc#SLE-19253).</li>
<li>net/mlx5: Fix RoCE setting at HCA level (jsc#SLE-19253).</li>
<li>net/mlx5: Fix crash during sync firmware reset (jsc#SLE-19253).</li>
<li>net/mlx5: Fix error message when failing to allocate device memory (jsc#SLE-19253).</li>
<li>net/mlx5: Fix handling of entry refcount when command is not issued to FW (jsc#SLE-19253).</li>
<li>net/mlx5: Fix possible use-after-free in async command interface (jsc#SLE-19253).</li>
<li>net/mlx5: Fix ptp max frequency adjustment range (jsc#SLE-19253).</li>
<li>net/mlx5: Fix steering rules cleanup (jsc#SLE-19253).</li>
<li>net/mlx5: Fix uninitialized variable bug in outlen_write() (jsc#SLE-19253).</li>
<li>net/mlx5: Geneve, Fix handling of Geneve object id as error code (jsc#SLE-19253).</li>
<li>net/mlx5: Initialize flow steering during driver probe (jsc#SLE-19253).</li>
<li>net/mlx5: Read embedded cpu after init bit cleared (jsc#SLE-19253).</li>
<li>net/mlx5: Read the TC mapping of all priorities on ETS query (jsc#SLE-19253).</li>
<li>net/mlx5: Rearm the FW tracer after each tracer event (jsc#SLE-19253).</li>
<li>net/mlx5: SF, Drain health before removing device (jsc#SLE-19253).</li>
<li>net/mlx5: SF: Fix probing active SFs during driver probe phase (jsc#SLE-19253).</li>
<li>net/mlx5: Serialize module cleanup with reload and remove (jsc#SLE-19253).</li>
<li>net/mlx5: Wait for firmware to enable CRS before pci_restore_state (jsc#SLE-19253).</li>
<li>net/mlx5: add IFC bits for bypassing port select flow table (git-fixes)</li>
<li>net/mlx5: check attr pointer validity before dereferencing it (jsc#SLE-19253).</li>
<li>net/mlx5: correct ECE offset in query qp output (jsc#SLE-19253).</li>
<li>net/mlx5: fix missing mutex_unlock in mlx5_fw_fatal_reporter_err_work() (jsc#SLE-19253).</li>
<li>net/mlx5: fs, fail conflicting actions (jsc#SLE-19253).</li>
<li>net/mlx5: fw_tracer, Clear load bit when freeing string DBs buffers (jsc#SLE-19253).</li>
<li>net/mlx5: fw_tracer, Fix event handling (jsc#SLE-19253).</li>
<li>net/mlx5: fw_tracer, Zero consumer index when reloading the tracer (jsc#SLE-19253).</li>
<li>net/mlx5e: Always clear dest encap in neigh-update-del (jsc#SLE-19253).</li>
<li>net/mlx5e: Avoid false lock dependency warning on tc_ht even more (jsc#SLE-19253).</li>
<li>net/mlx5e: Block entering switchdev mode with ns inconsistency (jsc#SLE-19253).</li>
<li>net/mlx5e: Do not attach netdev profile while handling internal error (jsc#SLE-19253).</li>
<li>net/mlx5e: Do not increment ESN when updating IPsec ESN state (jsc#SLE-19253).</li>
<li>net/mlx5e: Do not support encap rules with gbp option (jsc#SLE-19253).</li>
<li>net/mlx5e: E-Switch, Fix comparing termination table instance (jsc#SLE-19253).</li>
<li>net/mlx5e: Extend SKB room check to include PTP-SQ (jsc#SLE-19253).</li>
<li>net/mlx5e: Fix MPLSoUDP encap to use MPLS action information (jsc#SLE-19253).</li>
<li>net/mlx5e: Fix SQ wake logic in ptp napi_poll context (jsc#SLE-19253).</li>
<li>net/mlx5e: Fix capability check for updating vnic env counters (jsc#SLE-19253).</li>
<li>net/mlx5e: Fix error handling in mlx5e_refresh_tirs (jsc#SLE-19253).</li>
<li>net/mlx5e: Fix hw mtu initializing at XDP SQ allocation (jsc#SLE-19253).</li>
<li>net/mlx5e: Fix the value of MLX5E_MAX_RQ_NUM_MTTS (jsc#SLE-19253).</li>
<li>net/mlx5e: Fix use-after-free when reverting termination table (jsc#SLE-19253).</li>
<li>net/mlx5e: Fix wrong application of the LRO state (jsc#SLE-19253).</li>
<li>net/mlx5e: Fix wrong tc flag used when set hw-tc-offload off (jsc#SLE-19253).</li>
<li>net/mlx5e: IPoIB, Do not allow CQE compression to be turned on by default (jsc#SLE-19253).</li>
<li>net/mlx5e: IPoIB, Show unknown speed instead of error (jsc#SLE-19253).</li>
<li>net/mlx5e: Modify slow path rules to go to slow fdb (jsc#SLE-19253).</li>
<li>net/mlx5e: QoS, Fix wrongfully setting parent_element_id on MODIFY_SCHEDULING_ELEMENT (jsc#SLE-19253).</li>
<li>net/mlx5e: Set uplink rep as NETNS_LOCAL (jsc#SLE-19253).</li>
<li>net/mlx5e: TC, Fix ct_clear overwriting ct action metadata (jsc#SLE-19253).</li>
<li>net/mlx5e: Update rx ring hw mtu upon each rx-fcs flag change (jsc#SLE-19253).</li>
<li>net/mlx5e: Verify flow_source cap before using it (jsc#SLE-19253).</li>
<li>net/mlx5e: do as little as possible in napi poll when budget is 0 (jsc#SLE-19253).</li>
<li>net/mlx5e: kTLS, Fix build time constant test in RX (jsc#SLE-19253).</li>
<li>net/mlx5e: kTLS, Fix build time constant test in TX (jsc#SLE-19253).</li>
<li>net: mlx5: eliminate anonymous module_init & module_exit (jsc#SLE-19253).</li>
<li>nfcsim.c: Fix error checking for debugfs_create_dir (git-fixes).</li>
<li>nilfs2: fix buffer corruption due to concurrent device reads (git-fixes).</li>
<li>nvme-core: fix dev_pm_qos memleak (git-fixes).</li>
<li>nvme-core: fix memory leak in dhchap_ctrl_secret (git-fixes).</li>
<li>nvme-core: fix memory leak in dhchap_secret_store (git-fixes).</li>
<li>nvme-pci: add quirk for missing secondary temperature thresholds (git-fixes).</li>
<li>nvme: double KA polling frequency to avoid KATO with TBKAS on (git-fixes).</li>
<li>ocfs2: fix defrag path triggering jbd2 ASSERT (git-fixes).</li>
<li>ocfs2: fix freeing uninitialized resource on ocfs2_dlm_shutdown (git-fixes).</li>
<li>ocfs2: fix non-auto defrag path not working issue (git-fixes).</li>
<li>pci/aspm: Disable ASPM on MFD function removal to avoid use-after-free (git-fixes).</li>
<li>pci: Add pci_clear_master() stub for non-CONFIG_PCI (git-fixes).</li>
<li>pci: Release resource invalidated by coalescing (git-fixes).</li>
<li>pci: cadence: Fix Gen2 Link Retraining process (git-fixes).</li>
<li>pci: endpoint: Add missing documentation about the MSI/MSI-X range (git-fixes).</li>
<li>pci: ftpci100: Release the clock resources (git-fixes).</li>
<li>pci: pciehp: Cancel bringup sequence if card is not present (git-fixes).</li>
<li>pci: qcom: Disable write access to read only registers for IP v2.3.3 (git-fixes).</li>
<li>pci: rockchip: Add poll and timeout to wait for PHY PLLs to be locked (git-fixes).</li>
<li>pci: rockchip: Assert PCI Configuration Enable bit after probe (git-fixes).</li>
<li>pci: rockchip: Fix legacy IRQ generation for RK3399 PCIe endpoint core (git-fixes).</li>
<li>pci: rockchip: Set address alignment for endpoint mode (git-fixes).</li>
<li>pci: rockchip: Use u32 variable to access 32-bit registers (git-fixes).</li>
<li>pci: rockchip: Write PCI Device ID to correct register (git-fixes).</li>
<li>pci: vmd: Reset VMD config register between soft reboots (git-fixes).</li>
<li>pinctrl: at91-pio4: check return value of devm_kasprintf() (git-fixes).</li>
<li>pinctrl: cherryview: Return correct value if pin in push-pull mode (git-fixes).</li>
<li>pinctrl: microchip-sgpio: check return value of devm_kasprintf() (git-fixes).</li>
<li>platform/x86: think-lmi: Correct NVME password handling (git-fixes).</li>
<li>platform/x86: think-lmi: Correct System password interface (git-fixes).</li>
<li>platform/x86: think-lmi: mutex protection around multiple WMI calls (git-fixes).</li>
<li>platform/x86: thinkpad_acpi: Fix lkp-tests warnings for platform profiles (git-fixes).</li>
<li>pm: domains: fix integer overflow issues in genpd_parse_state() (git-fixes).</li>
<li>powerpc/64s/radix: Fix exit lazy tlb mm switch with irqs enabled (bsc#1194869).</li>
<li>powerpc/iommu: Limit number of TCEs to 512 for H_STUFF_TCE hcall (bsc#1194869 bsc#1212701).</li>
<li>powerpc/set_memory: Avoid spinlock recursion in change_page_attr() (bsc#1194869).</li>
<li>pstore/ram: Add check for kstrdup (git-fixes).</li>
<li>radeon: avoid double free in ci_dpm_init() (git-fixes).</li>
<li>rdma/bnxt_re: Avoid calling wake_up threads from spin_lock context (git-fixes)</li>
<li>rdma/bnxt_re: Disable/kill tasklet only if it is enabled (git-fixes)</li>
<li>rdma/bnxt_re: Fix to remove an unnecessary log (git-fixes)</li>
<li>rdma/bnxt_re: Fix to remove unnecessary return labels (git-fixes)</li>
<li>rdma/bnxt_re: Remove a redundant check inside bnxt_re_update_gid (git-fixes)</li>
<li>rdma/bnxt_re: Remove unnecessary checks (git-fixes)</li>
<li>rdma/bnxt_re: Return directly without goto jumps (git-fixes)</li>
<li>rdma/bnxt_re: Use unique names while registering interrupts (git-fixes)</li>
<li>rdma/bnxt_re: wraparound mbox producer index (git-fixes)</li>
<li>rdma/cma: Always set static rate to 0 for RoCE (git-fixes)</li>
<li>rdma/hns: Fix hns_roce_table_get return value (git-fixes)</li>
<li>rdma/irdma: avoid fortify-string warning in irdma_clr_wqes (git-fixes)</li>
<li>rdma/mlx5: Do not set tx affinity when lag is in hash mode (git-fixes)</li>
<li>rdma/mlx5: Fix affinity assignment (git-fixes)</li>
<li>rdma/mlx5: Initiate dropless RQ for RAW Ethernet functions (git-fixes)</li>
<li>rdma/mlx5: Rely on RoCE fw cap instead of devlink when setting profile (jsc#SLE-19253).</li>
<li>rdma/rtrs: Fix rxe_dealloc_pd warning (git-fixes)</li>
<li>rdma/rtrs: Fix the last iu->buf leak in err path (git-fixes)</li>
<li>rdma/rxe: Fix packet length checks (git-fixes)</li>
<li>rdma/rxe: Fix ref count error in check_rkey() (git-fixes)</li>
<li>rdma/rxe: Fix rxe_cq_post (git-fixes)</li>
<li>rdma/rxe: Fix the use-before-initialization error of resp_pkts (git-fixes)</li>
<li>rdma/rxe: Remove dangling declaration of rxe_cq_disable() (git-fixes)</li>
<li>rdma/rxe: Remove the unused variable obj (git-fixes)</li>
<li>rdma/rxe: Removed unused name from rxe_task struct (git-fixes)</li>
<li>rdma/uverbs: Restrict usage of privileged QKEYs (git-fixes)</li>
<li>rdma/vmw_pvrdma: Remove unnecessary check on wr->opcode (git-fixes)</li>
<li>regulator: core: Fix more error checking for debugfs_create_dir() (git-fixes).</li>
<li>regulator: core: Streamline debugfs operations (git-fixes).</li>
<li>regulator: helper: Document ramp_delay parameter of regulator_set_ramp_delay_regmap() (git-fixes).</li>
<li>rpm/check-for-config-changes: ignore also PAHOLE_HAS_* We now also have options like CONFIG_PAHOLE_HAS_LANG_EXCLUDE.</li>
<li>rtc: st-lpc: Release some resources in st_rtc_probe() in case of error (git-fixes).</li>
<li>s390/gmap: voluntarily schedule during key setting (git-fixes bsc#1212892).</li>
<li>s390/pkey: zeroize key blobs (git-fixes bsc#1212619).</li>
<li>serial: 8250: lock port for UART_IER access in omap8250_irq() (git-fixes).</li>
<li>serial: 8250: lock port for stop_rx() in omap8250_irq() (git-fixes).</li>
<li>serial: 8250: omap: Fix freeing of resources on failed register (git-fixes).</li>
<li>serial: 8250_omap: Use force_suspend and resume for system suspend (git-fixes).</li>
<li>serial: atmel: do not enable IRQs prematurely (git-fixes).</li>
<li>signal/s390: Use force_sigsegv in default_trap_handler (git-fixes bsc#1212861).</li>
<li>soc/fsl/qe: fix usb.c build errors (git-fixes).</li>
<li>soc: samsung: exynos-pmu: Re-introduce Exynos4212 support (git-fixes).</li>
<li>soundwire: dmi-quirks: add new mapping for HP Spectre x360 (git-fixes).</li>
<li>spi: dw: Round of n_bytes to power of 2 (git-fixes).</li>
<li>spi: lpspi: disable lpspi module irq in DMA mode (git-fixes).</li>
<li>spi: spi-geni-qcom: Correct CS_TOGGLE bit in SPI_TRANS_CFG (git-fixes).</li>
<li>test_firmware: return ENOMEM instead of ENOSPC on failed memory allocation (git-fixes).</li>
<li>thermal/drivers/sun8i: Fix some error handling paths in sun8i_ths_probe() (git-fixes).</li>
<li>tracing/timer: Add missing hrtimer modes to decode_hrtimer_mode() (git-fixes).</li>
<li>tty: serial: imx: fix rs485 rx after tx (git-fixes).</li>
<li>tty: serial: samsung_tty: Fix a memory leak in s3c24xx_serial_getclk() in case of error (git-fixes).</li>
<li>tty: serial: samsung_tty: Fix a memory leak in s3c24xx_serial_getclk() when iterating clk (git-fixes).</li>
<li>usb: dwc3-meson-g12a: Fix an error handling path in dwc3_meson_g12a_probe() (git-fixes).</li>
<li>usb: dwc3: gadget: Propagate core init errors to UDC during pullup (git-fixes).</li>
<li>usb: dwc3: qcom: Fix an error handling path in dwc3_qcom_probe() (git-fixes).</li>
<li>usb: dwc3: qcom: Fix potential memory leak (git-fixes).</li>
<li>usb: dwc3: qcom: Release the correct resources in dwc3_qcom_remove() (git-fixes).</li>
<li>usb: gadget: u_serial: Add null pointer check in gserial_suspend (git-fixes).</li>
<li>usb: gadget: udc: fix NULL dereference in remove() (git-fixes).</li>
<li>usb: hide unused usbfs_notify_suspend/resume functions (git-fixes).</li>
<li>usb: phy: phy-tahvo: fix memory leak in tahvo_usb_probe() (git-fixes).</li>
<li>usb: xhci: Remove unused udev from xhci_log_ctx trace event (git-fixes).</li>
<li>usrmerge: Adjust module path in the kernel sources (bsc#1212835). </li>
<li>vdpa/mlx5: Directly assign memory key (jsc#SLE-19253).</li>
<li>vdpa/mlx5: Do not clear mr struct on destroy MR (jsc#SLE-19253).</li>
<li>vdpa/mlx5: Fix wrong configuration of virtio_version_1_0 (jsc#SLE-19253).</li>
<li>vdpa: Fix error logic in vdpa_nl_cmd_dev_get_doit (jsc#SLE-19253).</li>
<li>vhost_vdpa: support PACKED when setting-getting vring_base (jsc#SLE-19253).</li>
<li>w1: fix loop in w1_fini() (git-fixes).</li>
<li>w1: w1_therm: fix locking behavior in convert_t (git-fixes).</li>
<li>wifi: ath9k: Fix possible stall on ath9k_txq_list_has_key() (git-fixes).</li>
<li>wifi: ath9k: avoid referencing uninit memory in ath9k_wmi_ctrl_rx (git-fixes).</li>
<li>wifi: ath9k: convert msecs to jiffies where needed (git-fixes).</li>
<li>wifi: ath9k: do not allow to overwrite ENDPOINT0 attributes (git-fixes).</li>
<li>wifi: ath9k: fix AR9003 mac hardware hang check register offset calculation (git-fixes).</li>
<li>wifi: atmel: Fix an error handling path in atmel_probe() (git-fixes).</li>
<li>wifi: cfg80211: rewrite merging of inherited elements (git-fixes).</li>
<li>wifi: iwlwifi: mvm: indicate HW decrypt for beacon protection (git-fixes).</li>
<li>wifi: iwlwifi: pcie: fix NULL pointer dereference in iwl_pcie_irq_rx_msix_handler() (git-fixes).</li>
<li>wifi: iwlwifi: pull from TXQs with softirqs disabled (git-fixes).</li>
<li>wifi: mwifiex: Fix the size of a memory allocation in mwifiex_ret_802_11_scan() (git-fixes).</li>
<li>wifi: orinoco: Fix an error handling path in orinoco_cs_probe() (git-fixes).</li>
<li>wifi: orinoco: Fix an error handling path in spectrum_cs_probe() (git-fixes).</li>
<li>wifi: rsi: Do not configure WoWlan in shutdown hook if not enabled (git-fixes).</li>
<li>wifi: rsi: Do not set MMC_PM_KEEP_POWER in shutdown (git-fixes).</li>
<li>wifi: wilc1000: fix for absent RSN capabilities WFA testcase (git-fixes).</li>
<li>writeback: fix dereferencing NULL mapping->host on writeback_page_template (git-fixes).</li>
<li>x86/build: Avoid relocation information in final vmlinux (bsc#1187829).</li>
<li>x86/kprobes: Fix arch_check_optimized_kprobe check within optimized_kprobe range (git-fixes).</li>
<li>x86/mm: Fix RESERVE_BRK() for older binutils (git-fixes).</li>
<li>x86/mm: Fix use of uninitialized buffer in sme_enable() (git-fixes).</li>
<li>x86/sgx: Fix race between reclaimer and page fault handler (git-fixes).</li>
<li>x86/sgx: Mark PCMD page as dirty when modifying contents (git-fixes).</li>
<li>x86/xen: fix secondary processor fpu initialization (bsc#1212869).</li>
</ul>

    
        <h2>Special Instructions and Notes:</h2>
        <ul>
            
            
                <li>Please reboot the system after installing this update.</li>
            
            
        </ul>
    

    <h2>Patch Instructions:</h2>
    <p>
        To install this SUSE Important update use the SUSE recommended
        installation methods like YaST online_update or "zypper patch".<br/>

        Alternatively you can run the command listed for your product:
    </p>
    <ul class="list-group">
        
            <li class="list-group-item">
                SUSE Linux Enterprise Micro for Rancher 5.3
                
                    
                        <br/>
                        <code>zypper in -t patch SUSE-SLE-Micro-5.3-2023-2803=1</code>
                    
                    
                
            </li>
        
            <li class="list-group-item">
                SUSE Linux Enterprise Micro 5.3
                
                    
                        <br/>
                        <code>zypper in -t patch SUSE-SLE-Micro-5.3-2023-2803=1</code>
                    
                    
                
            </li>
        
            <li class="list-group-item">
                SUSE Linux Enterprise Micro for Rancher 5.4
                
                    
                        <br/>
                        <code>zypper in -t patch SUSE-SLE-Micro-5.4-2023-2803=1</code>
                    
                    
                
            </li>
        
            <li class="list-group-item">
                SUSE Linux Enterprise Micro 5.4
                
                    
                        <br/>
                        <code>zypper in -t patch SUSE-SLE-Micro-5.4-2023-2803=1</code>
                    
                    
                
            </li>
        
            <li class="list-group-item">
                SUSE Linux Enterprise Live Patching 15-SP4
                
                    
                        <br/>
                        <code>zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2023-2803=1</code>
                    
                    
                
            </li>
        
            <li class="list-group-item">
                SUSE Real Time Module 15-SP4
                
                    
                        <br/>
                        <code>zypper in -t patch SUSE-SLE-Module-RT-15-SP4-2023-2803=1</code>
                    
                    
                
            </li>
        
            <li class="list-group-item">
                openSUSE Leap Micro 5.3
                
                    
                        <br/>
                        <code>zypper in -t patch openSUSE-Leap-Micro-5.3-2023-2803=1</code>
                    
                    
                
            </li>
        
            <li class="list-group-item">
                openSUSE Leap 15.4
                
                    
                        <br/>
                        <code>zypper in -t patch openSUSE-SLE-15.4-2023-2803=1</code>
                    
                    
                
            </li>
        
    </ul>

    <h2>Package List:</h2>
    <ul>
        
            
                <li>
                    SUSE Linux Enterprise Micro for Rancher 5.3 (nosrc x86_64)
                    <ul>
                        
                            <li>kernel-rt-5.14.21-150400.15.40.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    SUSE Linux Enterprise Micro for Rancher 5.3 (x86_64)
                    <ul>
                        
                            <li>kernel-rt-debugsource-5.14.21-150400.15.40.1</li>
                        
                            <li>kernel-rt-debuginfo-5.14.21-150400.15.40.1</li>
                        
                    </ul>
                </li>
            
        
            
                <li>
                    SUSE Linux Enterprise Micro 5.3 (nosrc x86_64)
                    <ul>
                        
                            <li>kernel-rt-5.14.21-150400.15.40.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    SUSE Linux Enterprise Micro 5.3 (x86_64)
                    <ul>
                        
                            <li>kernel-rt-debugsource-5.14.21-150400.15.40.1</li>
                        
                            <li>kernel-rt-debuginfo-5.14.21-150400.15.40.1</li>
                        
                    </ul>
                </li>
            
        
            
                <li>
                    SUSE Linux Enterprise Micro for Rancher 5.4 (nosrc x86_64)
                    <ul>
                        
                            <li>kernel-rt-5.14.21-150400.15.40.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    SUSE Linux Enterprise Micro for Rancher 5.4 (x86_64)
                    <ul>
                        
                            <li>kernel-rt-debugsource-5.14.21-150400.15.40.1</li>
                        
                            <li>kernel-rt-debuginfo-5.14.21-150400.15.40.1</li>
                        
                    </ul>
                </li>
            
        
            
                <li>
                    SUSE Linux Enterprise Micro 5.4 (nosrc x86_64)
                    <ul>
                        
                            <li>kernel-rt-5.14.21-150400.15.40.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    SUSE Linux Enterprise Micro 5.4 (x86_64)
                    <ul>
                        
                            <li>kernel-rt-debugsource-5.14.21-150400.15.40.1</li>
                        
                            <li>kernel-rt-debuginfo-5.14.21-150400.15.40.1</li>
                        
                    </ul>
                </li>
            
        
            
                <li>
                    SUSE Linux Enterprise Live Patching 15-SP4 (x86_64)
                    <ul>
                        
                            <li>kernel-livepatch-5_14_21-150400_15_40-rt-debuginfo-1-150400.1.3.1</li>
                        
                            <li>kernel-livepatch-SLE15-SP4-RT_Update_9-debugsource-1-150400.1.3.1</li>
                        
                            <li>kernel-livepatch-5_14_21-150400_15_40-rt-1-150400.1.3.1</li>
                        
                    </ul>
                </li>
            
        
            
                <li>
                    SUSE Real Time Module 15-SP4 (x86_64)
                    <ul>
                        
                            <li>gfs2-kmp-rt-debuginfo-5.14.21-150400.15.40.1</li>
                        
                            <li>dlm-kmp-rt-5.14.21-150400.15.40.1</li>
                        
                            <li>ocfs2-kmp-rt-5.14.21-150400.15.40.1</li>
                        
                            <li>kernel-rt-devel-debuginfo-5.14.21-150400.15.40.1</li>
                        
                            <li>kernel-rt_debug-debugsource-5.14.21-150400.15.40.1</li>
                        
                            <li>dlm-kmp-rt-debuginfo-5.14.21-150400.15.40.1</li>
                        
                            <li>cluster-md-kmp-rt-5.14.21-150400.15.40.1</li>
                        
                            <li>kernel-rt_debug-debuginfo-5.14.21-150400.15.40.1</li>
                        
                            <li>kernel-rt-debuginfo-5.14.21-150400.15.40.1</li>
                        
                            <li>cluster-md-kmp-rt-debuginfo-5.14.21-150400.15.40.1</li>
                        
                            <li>kernel-syms-rt-5.14.21-150400.15.40.1</li>
                        
                            <li>kernel-rt-debugsource-5.14.21-150400.15.40.1</li>
                        
                            <li>gfs2-kmp-rt-5.14.21-150400.15.40.1</li>
                        
                            <li>ocfs2-kmp-rt-debuginfo-5.14.21-150400.15.40.1</li>
                        
                            <li>kernel-rt-devel-5.14.21-150400.15.40.1</li>
                        
                            <li>kernel-rt_debug-devel-5.14.21-150400.15.40.1</li>
                        
                            <li>kernel-rt_debug-devel-debuginfo-5.14.21-150400.15.40.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    SUSE Real Time Module 15-SP4 (noarch)
                    <ul>
                        
                            <li>kernel-devel-rt-5.14.21-150400.15.40.1</li>
                        
                            <li>kernel-source-rt-5.14.21-150400.15.40.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    SUSE Real Time Module 15-SP4 (nosrc x86_64)
                    <ul>
                        
                            <li>kernel-rt_debug-5.14.21-150400.15.40.1</li>
                        
                            <li>kernel-rt-5.14.21-150400.15.40.1</li>
                        
                    </ul>
                </li>
            
        
            
                <li>
                    openSUSE Leap Micro 5.3 (nosrc x86_64)
                    <ul>
                        
                            <li>kernel-rt-5.14.21-150400.15.40.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    openSUSE Leap Micro 5.3 (x86_64)
                    <ul>
                        
                            <li>kernel-rt-debugsource-5.14.21-150400.15.40.1</li>
                        
                            <li>kernel-rt-debuginfo-5.14.21-150400.15.40.1</li>
                        
                    </ul>
                </li>
            
        
            
                <li>
                    openSUSE Leap 15.4 (x86_64)
                    <ul>
                        
                            <li>gfs2-kmp-rt-debuginfo-5.14.21-150400.15.40.1</li>
                        
                            <li>dlm-kmp-rt-5.14.21-150400.15.40.1</li>
                        
                            <li>ocfs2-kmp-rt-5.14.21-150400.15.40.1</li>
                        
                            <li>kernel-rt-devel-debuginfo-5.14.21-150400.15.40.1</li>
                        
                            <li>kernel-rt_debug-debugsource-5.14.21-150400.15.40.1</li>
                        
                            <li>dlm-kmp-rt-debuginfo-5.14.21-150400.15.40.1</li>
                        
                            <li>cluster-md-kmp-rt-5.14.21-150400.15.40.1</li>
                        
                            <li>kernel-rt_debug-debuginfo-5.14.21-150400.15.40.1</li>
                        
                            <li>kernel-rt-debuginfo-5.14.21-150400.15.40.1</li>
                        
                            <li>cluster-md-kmp-rt-debuginfo-5.14.21-150400.15.40.1</li>
                        
                            <li>kernel-syms-rt-5.14.21-150400.15.40.1</li>
                        
                            <li>kernel-rt-debugsource-5.14.21-150400.15.40.1</li>
                        
                            <li>gfs2-kmp-rt-5.14.21-150400.15.40.1</li>
                        
                            <li>ocfs2-kmp-rt-debuginfo-5.14.21-150400.15.40.1</li>
                        
                            <li>kernel-rt-devel-5.14.21-150400.15.40.1</li>
                        
                            <li>kernel-rt_debug-devel-5.14.21-150400.15.40.1</li>
                        
                            <li>kernel-rt_debug-devel-debuginfo-5.14.21-150400.15.40.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    openSUSE Leap 15.4 (noarch)
                    <ul>
                        
                            <li>kernel-devel-rt-5.14.21-150400.15.40.1</li>
                        
                            <li>kernel-source-rt-5.14.21-150400.15.40.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    openSUSE Leap 15.4 (nosrc x86_64)
                    <ul>
                        
                            <li>kernel-rt_debug-5.14.21-150400.15.40.1</li>
                        
                            <li>kernel-rt-5.14.21-150400.15.40.1</li>
                        
                    </ul>
                </li>
            
        
    </ul>

    
        <h2>References:</h2>
        <ul>
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-1829.html">https://www.suse.com/security/cve/CVE-2023-1829.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-3090.html">https://www.suse.com/security/cve/CVE-2023-3090.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-3111.html">https://www.suse.com/security/cve/CVE-2023-3111.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-3212.html">https://www.suse.com/security/cve/CVE-2023-3212.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-3357.html">https://www.suse.com/security/cve/CVE-2023-3357.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-3358.html">https://www.suse.com/security/cve/CVE-2023-3358.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-3389.html">https://www.suse.com/security/cve/CVE-2023-3389.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1187829">https://bugzilla.suse.com/show_bug.cgi?id=1187829</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1194869">https://bugzilla.suse.com/show_bug.cgi?id=1194869</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1210335">https://bugzilla.suse.com/show_bug.cgi?id=1210335</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1212051">https://bugzilla.suse.com/show_bug.cgi?id=1212051</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1212265">https://bugzilla.suse.com/show_bug.cgi?id=1212265</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1212603">https://bugzilla.suse.com/show_bug.cgi?id=1212603</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1212605">https://bugzilla.suse.com/show_bug.cgi?id=1212605</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1212606">https://bugzilla.suse.com/show_bug.cgi?id=1212606</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1212619">https://bugzilla.suse.com/show_bug.cgi?id=1212619</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1212701">https://bugzilla.suse.com/show_bug.cgi?id=1212701</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1212741">https://bugzilla.suse.com/show_bug.cgi?id=1212741</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1212835">https://bugzilla.suse.com/show_bug.cgi?id=1212835</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1212838">https://bugzilla.suse.com/show_bug.cgi?id=1212838</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1212842">https://bugzilla.suse.com/show_bug.cgi?id=1212842</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1212861">https://bugzilla.suse.com/show_bug.cgi?id=1212861</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1212869">https://bugzilla.suse.com/show_bug.cgi?id=1212869</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1212892">https://bugzilla.suse.com/show_bug.cgi?id=1212892</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://jira.suse.com/browse/SLE-19253">https://jira.suse.com/browse/SLE-19253</a>
                    </li>
                
            
        </ul>
    
</div>