<div class="container">
    <h1>Security update for the Linux Kernel</h1>

    <table class="table table-striped table-bordered">
        <tbody>
        <tr>
            <th>Announcement ID:</th>
            <td>SUSE-SU-2023:2820-1</td>
        </tr>
        
        <tr>
            <th>Rating:</th>
            <td>important</td>
        </tr>
        <tr>
            <th>References:</th>
            <td>
                <ul>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1065729">#1065729</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1152472">#1152472</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1152489">#1152489</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1160435">#1160435</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1187829">#1187829</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1189998">#1189998</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1194869">#1194869</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1205758">#1205758</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1208410">#1208410</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1208600">#1208600</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1209039">#1209039</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1209367">#1209367</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1210335">#1210335</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1211299">#1211299</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1211346">#1211346</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1211387">#1211387</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1211410">#1211410</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1211449">#1211449</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1211796">#1211796</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1211852">#1211852</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1212051">#1212051</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1212129">#1212129</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1212154">#1212154</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1212155">#1212155</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1212158">#1212158</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1212265">#1212265</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1212350">#1212350</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1212448">#1212448</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1212494">#1212494</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1212495">#1212495</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1212504">#1212504</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1212513">#1212513</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1212540">#1212540</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1212561">#1212561</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1212563">#1212563</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1212564">#1212564</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1212584">#1212584</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1212592">#1212592</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1212603">#1212603</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1212605">#1212605</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1212606">#1212606</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1212619">#1212619</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1212701">#1212701</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1212741">#1212741</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1212835">#1212835</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1212838">#1212838</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1212842">#1212842</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1212861">#1212861</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1212869">#1212869</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1212892">#1212892</a>
                        </li>
                    
                </ul>
            </td>
        </tr>
        
            <tr>
                <th>
                    Cross-References:
                </th>
                <td>
                    <ul>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-1077.html">CVE-2023-1077</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-1249.html">CVE-2023-1249</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-1829.html">CVE-2023-1829</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-21102.html">CVE-2023-21102</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-3090.html">CVE-2023-3090</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-3111.html">CVE-2023-3111</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-3141.html">CVE-2023-3141</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-3161.html">CVE-2023-3161</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-3212.html">CVE-2023-3212</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-3357.html">CVE-2023-3357</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-3358.html">CVE-2023-3358</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-3389.html">CVE-2023-3389</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-35788.html">CVE-2023-35788</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-35823.html">CVE-2023-35823</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-35828.html">CVE-2023-35828</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-35829.html">CVE-2023-35829</a>
                        </li>
                    
                    </ul>
                </td>
            </tr>
            <tr>
                <th>CVSS scores:</th>
                <td>
                    <ul class="list-group">
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-1077</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.0</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-1077</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.0</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-1249</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.3</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-1249</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-1829</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.8</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-1829</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.8</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-21102</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.8</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-21102</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.8</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-3090</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.8</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-3090</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.8</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-3111</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">6.7</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-3111</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.8</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-3141</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">6.1</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-3141</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.1</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-3161</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-3161</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-3212</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">4.3</span>
                                <span class="cvss-vector">CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-3212</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">4.4</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-3357</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">4.7</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-3357</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-3358</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">4.7</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-3358</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-3389</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-3389</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.8</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-35788</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.4</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-35788</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.8</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-35823</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">4.7</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-35823</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.0</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-35828</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">6.7</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-35828</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.0</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-35829</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">6.4</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-35829</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.0</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                    </ul>
                </td>
            </tr>
        
        <tr>
            <th>Affected Products:</th>
            <td>
                <ul class="list-group">
                    
                        <li class="list-group-item">Basesystem Module 15-SP4</li>
                    
                        <li class="list-group-item">Development Tools Module 15-SP4</li>
                    
                        <li class="list-group-item">Legacy Module 15-SP4</li>
                    
                        <li class="list-group-item">openSUSE Leap 15.4</li>
                    
                        <li class="list-group-item">openSUSE Leap Micro 5.3</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Desktop 15 SP4</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise High Availability Extension 15 SP4</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise High Performance Computing 15 SP4</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Live Patching 15-SP4</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Micro 5.3</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Micro 5.4</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Micro for Rancher 5.3</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Micro for Rancher 5.4</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Real Time 15 SP4</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Server 15 SP4</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Server for SAP Applications 15 SP4</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Workstation Extension 15 SP4</li>
                    
                        <li class="list-group-item">SUSE Manager Proxy 4.3</li>
                    
                        <li class="list-group-item">SUSE Manager Retail Branch Server 4.3</li>
                    
                        <li class="list-group-item">SUSE Manager Server 4.3</li>
                    
                </ul>
            </td>
        </tr>
        </tbody>
    </table>

    <p>An update that solves 16 vulnerabilities, contains two features and has 34 fixes can now be installed.</p>

    <h2>Description:</h2>
    <p>The SUSE Linux Enterprise 15 SP4 kernel was updated to receive various security and bugfixes.</p>
<p>The following security bugs were fixed:</p>
<ul>
<li>CVE-2023-1829: Fixed a use-after-free vulnerability in the control index filter (tcindex) (bsc#1210335).</li>
<li>CVE-2023-3389: Fixed a use-after-free vulnerability in the io_uring subsystem (bsc#1212838).</li>
<li>CVE-2023-3090: Fixed a heap out-of-bounds write in the ipvlan network driver (bsc#1212842).</li>
<li>CVE-2023-3111: Fixed a use-after-free vulnerability in prepare_to_relocate in fs/btrfs/relocation.c (bsc#1212051).</li>
<li>CVE-2023-3212: Fixed a NULL pointer dereference flaw in the gfs2 file system (bsc#1212265).</li>
<li>CVE-2023-3358: Fixed a NULL pointer dereference flaw in the Integrated Sensor Hub (ISH) driver (bsc#1212606).</li>
<li>CVE-2023-3357: Fixed a NULL pointer dereference flaw in the AMD Sensor Fusion Hub driver (bsc#1212605).</li>
<li>CVE-2023-35828: Fixed a use-after-free flaw in renesas_usb3_remove in drivers/usb/gadget/udc/renesas_usb3.c (bsc#1212513).</li>
<li>CVE-2023-1249: Fixed a use-after-free flaw in the core dump subsystem that allowed a local user to crash the system (bsc#1209039).</li>
<li>CVE-2023-35829: Fixed a use-after-free flaw in rkvdec_remove in drivers/staging/media/rkvdec/rkvdec.c (bsc#1212495).</li>
<li>CVE-2023-35788: Fixed an out-of-bounds write in the flower classifier code via TCA_FLOWER_KEY_ENC_OPTS_GENEVE packets in fl_set_geneve_opt in net/sched/cls_flower.c (bsc#1212504).</li>
<li>CVE-2023-35823: Fixed a use-after-free flaw in saa7134_finidev in drivers/media/pci/saa7134/saa7134-core.c (bsc#1212494).</li>
<li>CVE-2023-3161: Fixed shift-out-of-bounds in fbcon_set_font() (bsc#1212154).</li>
<li>CVE-2023-21102: Fixed possible bypass of shadow stack protection in __efi_rt_asm_wrapper of efi-rt-wrapper.S (bsc#1212155).</li>
<li>CVE-2023-3141: Fixed a use-after-free flaw in r592_remove in drivers/memstick/host/r592.c, that allowed local attackers to crash the system at device disconnect (bsc#1212129).</li>
<li>CVE-2023-1077: Fixed a type confusion in pick_next_rt_entity(), that could cause memory corruption (bsc#1208600).</li>
</ul>
<p>The following non-security bugs were fixed:</p>
<ul>
<li>Drop dvb-core fix patch due to a bug (bsc#1205758).</li>
<li>Enable kernel modules bttv bt878 and snd-bt878 (jsc#PED-3931).</li>
<li>Fix missing top level chapter numbers on SLE12 SP5 (bsc#1212158).</li>
<li>Fix usrmerge error (boo#1211796).</li>
<li>Generalize kernel-doc build requirements.</li>
<li>Get module prefix from kmod (bsc#1212835).</li>
<li>Remove orphaned CONFIG_PRINTK_SAFE_LOG_BUF_SHIFT (bsc#1189998 git-fixes).</li>
<li>Revert "mtd: rawnand: arasan: Prevent an unsupported configuration" (git-fixes).</li>
<li>Revert "net: phy: dp83867: perform soft reset and retain established link" (git-fixes).</li>
<li>Squashfs: fix handling and sanity checking of xattr_ids count (git-fixes).</li>
<li>Update the Mellanox/Nvidia mlx5_core driver (jsc#SLE-19253).</li>
<li>acpi: sleep: Avoid breaking S3 wakeup due to might_sleep() (git-fixes).</li>
<li>affs: initialize fsdata in affs_truncate() (git-fixes).</li>
<li>alsa: ac97: Fix possible NULL dereference in snd_ac97_mixer (git-fixes).</li>
<li>alsa: hda/realtek: Add "Intel Reference board" and "NUC 13" SSID in the ALC256 (git-fixes).</li>
<li>alsa: hda/realtek: Add Lenovo P3 Tower platform (git-fixes).</li>
<li>alsa: hda/realtek: Add a quirk for Compaq N14JP6 (git-fixes).</li>
<li>alsa: hda/realtek: Add a quirk for HP Slim Desktop S01 (git-fixes).</li>
<li>alsa: hda/realtek: Add quirk for ASUS ROG G634Z (git-fixes).</li>
<li>alsa: hda/realtek: Add quirk for ASUS ROG GV601V (git-fixes).</li>
<li>alsa: hda/realtek: Add quirk for Clevo NS50AU (git-fixes).</li>
<li>alsa: hda/realtek: Add quirks for ASUS GU604V and GU603V (git-fixes).</li>
<li>alsa: hda/realtek: Add quirks for Asus ROG 2024 laptops using CS35L41 (git-fixes).</li>
<li>alsa: hda/realtek: Add quirks for ROG ALLY CS35l41 audio (git-fixes).</li>
<li>alsa: hda/realtek: Enable 4 amplifiers instead of 2 on a HP platform (git-fixes).</li>
<li>alsa: hda/realtek: Enable mute/micmute LEDs and limit mic boost on EliteBook (git-fixes).</li>
<li>alsa: hda: Glenfly: add HD Audio PCI IDs and HDMI Codec Vendor IDs (git-fixes).</li>
<li>alsa: oss: avoid missing-prototype warnings (git-fixes).</li>
<li>alsa: usb-audio: Add quirk flag for HEM devices to enable native DSD playback (git-fixes).</li>
<li>alsa: usb-audio: Fix broken resume due to UAC3 power state (git-fixes).</li>
<li>amdgpu: validate offset_in_bo of drm_amdgpu_gem_va (git-fixes).</li>
<li>arm64: Add missing Set/Way CMO encodings (git-fixes).</li>
<li>arm64: Always load shadow stack pointer directly from the task struct (git-fixes)</li>
<li>arm64: Stash shadow stack pointer in the task struct on interrupt (git-fixes)</li>
<li>arm64: dts: Move BCM4908 dts to bcmbca folder (git-fixes)</li>
<li>arm64: dts: broadcom: bcmbca: bcm4908: fix NAND interrupt name (git-fixes)</li>
<li>arm64: dts: broadcom: bcmbca: bcm4908: fix procmon nodename (git-fixes)</li>
<li>arm64: dts: imx8-ss-dma: assign default clock rate for lpuarts (git-fixes).</li>
<li>arm64: dts: imx8mn-beacon: Fix SPI CS pinmux (git-fixes).</li>
<li>arm64: dts: imx8mn-var-som: fix PHY detection bug by adding deassert (git-fixes)</li>
<li>arm64: dts: imx8qm-mek: correct GPIOs for USDHC2 CD and WP signals (git-fixes).</li>
<li>arm64: dts: qcom: sc7180-lite: Fix SDRAM freq for misidentified sc7180-lite boards (git-fixes).</li>
<li>arm: 9295/1: unwind:fix unwind abort for uleb128 case (git-fixes)</li>
<li>arm: cpu: Switch to arch_cpu_finalize_init() (bsc#1212448).</li>
<li>arm: dts: Fix erroneous ADS touchscreen polarities (git-fixes).</li>
<li>arm: dts: vexpress: add missing cache properties (git-fixes).</li>
<li>asoc: codecs: wsa881x: do not set can_multi_write flag (git-fixes).</li>
<li>asoc: dwc: limit the number of overrun messages (git-fixes).</li>
<li>asoc: dwc: move DMA init to snd_soc_dai_driver probe() (git-fixes).</li>
<li>asoc: es8316: Do not set rate constraints for unsupported MCLKs (git-fixes).</li>
<li>asoc: es8316: Increment max value for ALC Capture Target Volume control (git-fixes).</li>
<li>asoc: imx-audmix: check return value of devm_kasprintf() (git-fixes).</li>
<li>asoc: mediatek: mt8173: Fix irq error path (git-fixes).</li>
<li>asoc: nau8824: Add quirk to active-high jack-detect (git-fixes).</li>
<li>asoc: simple-card: Add missing of_node_put() in case of error (git-fixes).</li>
<li>asoc: soc-pcm: test if a BE can be prepared (git-fixes).</li>
<li>asoc: ssm2602: Add workaround for playback distortions (git-fixes).</li>
<li>ath6kl: Use struct_group() to avoid size-mismatched casting (git-fixes).</li>
<li>batman-adv: Broken sync while rescheduling delayed work (git-fixes).</li>
<li>binfmt_elf: Take the mmap lock when walking the VMA list (bsc#1209039 CVE-2023-1249).</li>
<li>bluetooth: Fix l2cap_disconnect_req deadlock (git-fixes).</li>
<li>bluetooth: Fix use-after-free in hci_remove_ltk/hci_remove_irk (git-fixes).</li>
<li>bluetooth: L2CAP: Add missing checks for invalid DCID (git-fixes).</li>
<li>bluetooth: hci_qca: fix debugfs registration (git-fixes).</li>
<li>bnxt_en: Do not issue AP reset during ethtool&#x27;s reset operation (git-fixes).</li>
<li>bnxt_en: Implement .set_port / .unset_port UDP tunnel callbacks (git-fixes).</li>
<li>bnxt_en: Query default VLAN before VNIC setup on a VF (git-fixes).</li>
<li>bnxt_en: Skip firmware fatal error recovery if chip is not accessible (git-fixes).</li>
<li>bpf, arm64: Call build_prologue() first in first JIT pass (git-fixes)</li>
<li>bpf, arm64: Clear prog->jited_len along prog->jited (git-fixes)</li>
<li>bpf, arm64: Feed byte-offset into bpf line info (git-fixes)</li>
<li>bpf, arm64: Use emit_addr_mov_i64() for BPF_PSEUDO_FUNC (git-fixes)</li>
<li>bpf: Add extra path pointer check to d_path helper (git-fixes).</li>
<li>bpf: Fix UAF in task local storage (bsc#1212564).</li>
<li>btrfs: unset reloc control if transaction commit fails in prepare_to_relocate() (bsc#1212051 CVE-2023-3111).</li>
<li>bus: fsl-mc: fsl-mc-allocator: Drop a write-only variable (git-fixes).</li>
<li>bus: ti-sysc: Fix dispc quirk masking bool variables (git-fixes).</li>
<li>can: isotp: isotp_sendmsg(): fix return error fix on TX path (git-fixes).</li>
<li>can: j1939: avoid possible use-after-free when j1939_can_rx_register fails (git-fixes).</li>
<li>can: j1939: change j1939_netdev_lock type to mutex (git-fixes).</li>
<li>can: j1939: j1939_sk_send_loop_abort(): improved error queue handling in J1939 Socket (git-fixes).</li>
<li>can: kvaser_pciefd: Remove handler for unused KVASER_PCIEFD_PACK_TYPE_EFRAME_ACK (git-fixes).</li>
<li>can: kvaser_pciefd: Remove useless write to interrupt register (git-fixes).</li>
<li>can: length: fix bitstuffing count (git-fixes).</li>
<li>can: length: fix description of the RRS field (git-fixes).</li>
<li>can: length: make header self contained (git-fixes).</li>
<li>ceph: fix use-after-free bug for inodes when flushing capsnaps (bsc#1212540).</li>
<li>cgroup: Use cgroup_attach_{lock,unlock}() from cgroup_attach_task_all() (bsc#1212563).</li>
<li>cgroup: always put cset in cgroup_css_set_put_fork (bsc#1212561).</li>
<li>cgroup: fix missing cpus_read_{lock,unlock}() in cgroup_transfer_tasks() (bsc#1212563).</li>
<li>clk: Fix memory leak in devm_clk_notifier_register() (git-fixes).</li>
<li>clk: cdce925: check return value of kasprintf() (git-fixes).</li>
<li>clk: imx: clk-imx8mn: fix memory leak in imx8mn_clocks_probe (git-fixes).</li>
<li>clk: imx: clk-imx8mp: improve error handling in imx8mp_clocks_probe() (git-fixes).</li>
<li>clk: imx: scu: use _safe list iterator to avoid a use after free (git-fixes).</li>
<li>clk: keystone: sci-clk: check return value of kasprintf() (git-fixes).</li>
<li>clk: samsung: Add Exynos4212 compatible to CLKOUT driver (git-fixes).</li>
<li>clk: si5341: check return value of {devm_}kasprintf() (git-fixes).</li>
<li>clk: si5341: free unused memory on probe failure (git-fixes).</li>
<li>clk: si5341: return error if one synth clock registration fails (git-fixes).</li>
<li>clk: tegra: tegra124-emc: Fix potential memory leak (git-fixes).</li>
<li>clk: ti: clkctrl: check return value of kasprintf() (git-fixes).</li>
<li>clk: vc5: check memory returned by kasprintf() (git-fixes).</li>
<li>clocksource/drivers/cadence-ttc: Fix memory leak in ttc_timer_probe (git-fixes).</li>
<li>crypto: marvell/cesa - Fix type mismatch warning (git-fixes).</li>
<li>crypto: nx - fix build warnings when DEBUG_FS is not enabled (git-fixes).</li>
<li>dmaengine: at_xdmac: Move the free desc to the tail of the desc list (git-fixes).</li>
<li>dmaengine: at_xdmac: fix potential Oops in at_xdmac_prep_interleaved() (git-fixes).</li>
<li>dmaengine: pl330: rename _start to prevent build error (git-fixes).</li>
<li>drivers: meson: secure-pwrc: always enable DMA domain (git-fixes).</li>
<li>drm/amd/display: Add logging for display MALL refresh setting (git-fixes).</li>
<li>drm/amd/display: Add minimal pipe split transition state (git-fixes).</li>
<li>drm/amd/display: Add wrapper to call planes and stream update (git-fixes).</li>
<li>drm/amd/display: Explicitly specify update type per plane info change (git-fixes).</li>
<li>drm/amd/display: Fix artifacting on eDP panels when engaging freesync video mode (git-fixes).</li>
<li>drm/amd/display: Use dc_update_planes_and_stream (git-fixes).</li>
<li>drm/amd/display: drop redundant memset() in get_available_dsc_slices() (git-fixes).</li>
<li>drm/amd/display: edp do not add non-edid timings (git-fixes).</li>
<li>drm/amd/display: fix the system hang while disable PSR (git-fixes).</li>
<li>drm/amd/pm: Fix power context allocation in SMU13 (git-fixes).</li>
<li>drm/amd/pm: reverse mclk and fclk clocks levels for renoir (git-fixes).</li>
<li>drm/amd/pm: reverse mclk and fclk clocks levels for vangogh (git-fixes).</li>
<li>drm/amd/pm: reverse mclk and fclk clocks levels for yellow carp (git-fixes).</li>
<li>drm/amdgpu: Use the default reset when loading or reloading the driver (git-fixes).</li>
<li>drm/amdgpu: fix xclk freq on CHIP_STONEY (git-fixes).</li>
<li>drm/amdgpu: release gpu full access after "amdgpu_device_ip_late_init" (git-fixes).</li>
<li>drm/amdgpu: skip disabling fence driver src_irqs when device is unplugged (git-fixes).</li>
<li>drm/amdkfd: Fix potential deallocation of previously deallocated memory (git-fixes).</li>
<li>drm/ast: Fix ARM compatibility (git-fixes).</li>
<li>drm/bridge: tc358768: always enable HS video mode (git-fixes).</li>
<li>drm/bridge: tc358768: fix PLL parameters computation (git-fixes).</li>
<li>drm/bridge: tc358768: fix PLL target frequency (git-fixes).</li>
<li>drm/bridge: tc358768: fix TCLK_ZEROCNT computation (git-fixes).</li>
<li>drm/bridge: tc358768: fix TXTAGOCNT computation (git-fixes).</li>
<li>drm/exynos: fix race condition UAF in exynos_g2d_exec_ioctl (git-fixes).</li>
<li>drm/exynos: vidi: fix a wrong error return (git-fixes).</li>
<li>drm/i915/gt: Use the correct error value when kernel_context() fails (git-fixes).</li>
<li>drm/i915/gvt: remove unused variable gma_bottom in command parser (git-fixes).</li>
<li>drm/i915/selftests: Add some missing error propagation (git-fixes).</li>
<li>drm/i915/selftests: Increase timeout for live_parallel_switch (git-fixes).</li>
<li>drm/i915/selftests: Stop using kthread_stop() (git-fixes).</li>
<li>drm/i915: Explain the magic numbers for AUX SYNC/precharge length (git-fixes).</li>
<li>drm/i915: Use 18 fast wake AUX sync len (git-fixes).</li>
<li>drm/msm/adreno: fix sparse warnings in a6xx code (git-fixes).</li>
<li>drm/msm/dp: Free resources after unregistering them (git-fixes).</li>
<li>drm/msm/dpu: correct MERGE_3D length (git-fixes).</li>
<li>drm/msm/dpu: do not enable color-management if DSPPs are not available (git-fixes).</li>
<li>drm/msm/dsi: do not allow enabling 14nm VCO with unprogrammed rate (git-fixes).</li>
<li>drm/msm: Be more shouty if per-process pgtables are not working (git-fixes).</li>
<li>drm/msm: Set max segment size earlier (git-fixes).</li>
<li>drm/nouveau/dp: check for NULL nv_connector->native_mode (git-fixes).</li>
<li>drm/nouveau: add nv_encoder pointer check for NULL (git-fixes).</li>
<li>drm/nouveau: do not detect DSM for non-NVIDIA device (git-fixes).</li>
<li>drm/panel: sharp-ls043t1le01: adjust mode settings (git-fixes).</li>
<li>drm/panel: simple: fix active size for Ampire AM-480272H3TMQW-T01H (git-fixes).</li>
<li>drm/radeon: fix possible division-by-zero errors (git-fixes).</li>
<li>drm/radeon: fix race condition UAF in radeon_gem_set_domain_ioctl (git-fixes).</li>
<li>drm/rockchip: vop: Leave vblank enabled in self-refresh (git-fixes).</li>
<li>drm/vram-helper: fix function names in vram helper doc (git-fixes).</li>
<li>drm: sun4i_tcon: use devm_clk_get_enabled in <code>sun4i_tcon_init_clocks</code> (git-fixes).</li>
<li>drm:amd:amdgpu: Fix missing buffer object unlock in failure path (git-fixes).</li>
<li>dt-bindings: i3c: silvaco,i3c-master: fix missing schema restriction (git-fixes).</li>
<li>eeprom: at24: also select REGMAP (git-fixes).</li>
<li>elf: correct note name comment (git-fixes).</li>
<li>ext4: unconditionally enable the i_version counter (bsc#1211299).</li>
<li>extcon: Fix kernel doc of property capability fields to avoid warnings (git-fixes).</li>
<li>extcon: Fix kernel doc of property fields to avoid warnings (git-fixes).</li>
<li>extcon: usbc-tusb320: Add USB TYPE-C support (git-fixes).</li>
<li>extcon: usbc-tusb320: Call the Type-C IRQ handler only if a port is registered (git-fixes).</li>
<li>extcon: usbc-tusb320: Unregister typec port on driver removal (git-fixes).</li>
<li>extcon: usbc-tusb320: Update state on probe even if no IRQ pending (git-fixes).</li>
<li>fbcon: Fix null-ptr-deref in soft_cursor (git-fixes).</li>
<li>fbdev: Prevent possible use-after-free in fb_release() (bsc#1152472) Backporting changes:     * replace refcount_read() with atomic_read()</li>
<li>fbdev: fbcon: Destroy mutex on freeing struct fb_info (bsc#1152489)</li>
<li>fbdev: imsttfb: Fix use after free bug in imsttfb_probe (git-fixes bsc#1211387).</li>
<li>fbdev: modedb: Add 1920x1080 at 60 Hz video mode (git-fixes).</li>
<li>fbdev: omapfb: lcd_mipid: Fix an error handling path in mipid_spi_probe() (git-fixes).</li>
<li>fbdev: stifb: Fix info entry in sti_struct on error path (git-fixes).</li>
<li>firmware: arm_ffa: Set handle field to zero in memory descriptor (git-fixes).</li>
<li>firmware: stratix10-svc: Fix a potential resource leak in svc_create_memory_pool() (git-fixes).</li>
<li>fs/jfs: fix shift exponent db_agl2size negative (git-fixes).</li>
<li>fs: hfsplus: fix UAF issue in hfsplus_put_super (git-fixes).</li>
<li>fs: jfs: fix possible NULL pointer dereference in dbFree() (git-fixes).</li>
<li>fs: jfs: fix shift-out-of-bounds in dbAllocAG (git-fixes).</li>
<li>fs: jfs: fix shift-out-of-bounds in dbDiscardAG (git-fixes).</li>
<li>fs: sysv: Fix sysv_nblocks() returns wrong value (git-fixes).</li>
<li>gfs2: Do not deref jdesc in evict (bsc#1212265 CVE-2023-3212).</li>
<li>hfs/hfsplus: avoid WARN_ON() for sanity check, use proper error handling (git-fixes).</li>
<li>hfs/hfsplus: use WARN_ON for sanity check (git-fixes).</li>
<li>hfs: Fix OOB Write in hfs_asc2mac (git-fixes).</li>
<li>hfs: fix OOB Read in __hfs_brec_find (git-fixes).</li>
<li>hfs: fix missing hfs_bnode_get() in __hfs_bnode_create (git-fixes).</li>
<li>hfsplus: fix bug causing custom uid and gid being unable to be assigned with mount (git-fixes).</li>
<li>hid: amd_sfh: Add missing check for dma_alloc_coherent (bsc#1212605 CVE-2023-3357).</li>
<li>hid: google: add jewel USB id (git-fixes).</li>
<li>hid: logitech-hidpp: add HIDPP_QUIRK_DELAYED_INIT for the T651 (git-fixes).</li>
<li>hid: wacom: Add error check to wacom_parse_and_register() (git-fixes).</li>
<li>hwmon: (gsc-hwmon) fix fan pwm temperature scaling (git-fixes).</li>
<li>hwrng: imx-rngc - fix the timeout for init and self check (git-fixes).</li>
<li>hwrng: st - keep clock enabled while hwrng is registered (git-fixes).</li>
<li>i2c: imx-lpi2c: fix type char overflow issue when calculating the clock cycle (git-fixes).</li>
<li>i2c: mv64xxx: Fix reading invalid status value in atomic mode (git-fixes).</li>
<li>i2c: qup: Add missing unwind goto in qup_i2c_probe() (git-fixes).</li>
<li>i2c: sprd: Delete i2c adapter in .remove&#x27;s error path (git-fixes).</li>
<li>iavf: remove mask from iavf_irq_enable_queues() (git-fixes).</li>
<li>ib/hfi1: Fix wrong mmu_node used for user SDMA packet after invalidate (git-fixes)</li>
<li>ib/isert: Fix dead lock in ib_isert (git-fixes)</li>
<li>ib/isert: Fix incorrect release of isert connection (git-fixes)</li>
<li>ib/isert: Fix possible list corruption in CMA handler (git-fixes)</li>
<li>ib/rdmavt: add missing locks in rvt_ruc_loopback (git-fixes)</li>
<li>ib/uverbs: Fix to consider event queue closing also upon non-blocking mode (git-fixes)</li>
<li>ibmvnic: Do not reset dql stats on NON_FATAL err (bsc#1212603 ltc#202604).</li>
<li>ice, xsk: Diversify return values from xsk_wakeup call paths (git-fixes).</li>
<li>ice: Do not double unplug aux on peer initiated reset (git-fixes).</li>
<li>ice: Do not use WQ_MEM_RECLAIM flag for workqueue (git-fixes).</li>
<li>ice: Fix DSCP PFC TLV creation (git-fixes).</li>
<li>ice: Fix XDP memory leak when NIC is brought up and down (git-fixes).</li>
<li>ice: Fix ice_xdp_xmit() when XDP TX queue number is not sufficient (git-fixes).</li>
<li>ice: Fix memory corruption in VF driver (git-fixes).</li>
<li>ice: Ignore EEXIST when setting promisc mode (git-fixes).</li>
<li>ice: Prevent set_channel from changing queues while RDMA active (git-fixes).</li>
<li>ice: Reset FDIR counter in FDIR init stage (git-fixes).</li>
<li>ice: add profile conflict check for AVF FDIR (git-fixes).</li>
<li>ice: block LAN in case of VF to VF offload (git-fixes).</li>
<li>ice: config netdev tc before setting queues number (git-fixes).</li>
<li>ice: copy last block omitted in ice_get_module_eeprom() (git-fixes).</li>
<li>ice: ethtool: Prohibit improper channel config for DCB (git-fixes).</li>
<li>ice: ethtool: advertise 1000M speeds properly (git-fixes).</li>
<li>ice: fix invalid check for empty list in ice_sched_assoc_vsi_to_agg() (git-fixes).</li>
<li>ice: fix wrong fallback logic for FDIR (git-fixes).</li>
<li>ice: handle E822 generic device ID in PLDM header (git-fixes).</li>
<li>ice: switch: fix potential memleak in ice_add_adv_recipe() (git-fixes).</li>
<li>ice: use bitmap_free instead of devm_kfree (git-fixes).</li>
<li>ice: xsk: use Rx ring&#x27;s XDP ring when picking NAPI context (git-fixes).</li>
<li>ieee802154: hwsim: Fix possible memory leaks (git-fixes).</li>
<li>ifcvf/vDPA: fix misuse virtio-net device config size for blk dev (jsc#SLE-19253).</li>
<li>igb: fix bit_shift to be in [1..8] range (git-fixes).</li>
<li>igb: fix nvm.ops.read() error handling (git-fixes).</li>
<li>igc: Clean the TX buffer and TX descriptor ring (git-fixes).</li>
<li>igc: Fix possible system crash when loading module (git-fixes).</li>
<li>iio: accel: fxls8962af: errata bug only applicable for FXLS8962AF (git-fixes).</li>
<li>iio: accel: fxls8962af: fixup buffer scan element type (git-fixes).</li>
<li>iio: adc: ad7192: Fix internal/external clock selection (git-fixes).</li>
<li>iio: adc: ad7192: Fix null ad7192_state pointer access (git-fixes).</li>
<li>init, x86: Move mem_encrypt_init() into arch_cpu_finalize_init() (bsc#1212448).</li>
<li>init: Invoke arch_cpu_finalize_init() earlier (bsc#1212448).</li>
<li>init: Provide arch_cpu_finalize_init() (bsc#1212448).</li>
<li>init: Remove check_bugs() leftovers (bsc#1212448).</li>
<li>input: adxl34x - do not hardcode interrupt trigger type (git-fixes).</li>
<li>input: drv260x - fix typo in register value define (git-fixes).</li>
<li>input: drv260x - remove unused .reg_defaults (git-fixes).</li>
<li>input: drv260x - sleep between polling GO bit (git-fixes).</li>
<li>input: fix open count when closing inhibited device (git-fixes).</li>
<li>input: psmouse - fix OOB access in Elantech protocol (git-fixes).</li>
<li>input: soc_button_array - add invalid acpi_index DMI quirk handling (git-fixes).</li>
<li>input: xpad - delete a Razer DeathAdder mouse VID/PID entry (git-fixes).</li>
<li>integrity: Fix possible multiple allocation in integrity_inode_get() (git-fixes).</li>
<li>io_uring: hold uring mutex around poll removal (bsc#1212838 CVE-2023-3389).</li>
<li>ipvlan:Fix out-of-bounds caused by unclear skb->cb (bsc#1212842 CVE-2023-3090).</li>
<li>irqchip/clps711x: Remove unused clps711x_intc_init() function (git-fixes).</li>
<li>irqchip/ftintc010: Mark all function static (git-fixes).</li>
<li>irqchip/jcore-aic: Fix missing allocation of IRQ descriptors (git-fixes).</li>
<li>jfs: Fix fortify moan in symlink (git-fixes).</li>
<li>kernel-binary: Add back kernel-default-base guarded by option Add configsh option for splitting off kernel-default-base, and for not signing the kernel on non-efi</li>
<li>kernel-docs: Add buildrequires on python3-base when using python3 The python3 binary is provided by python3-base.</li>
<li>kernel-docs: Use python3 together with python3-Sphinx (bsc#1212741).</li>
<li>kprobe: reverse kp->flags when arm_kprobe failed (git-fixes).</li>
<li>kprobes: Fix check for probe enabled in kill_kprobe() (git-fixes).</li>
<li>kprobes: Fix to handle forcibly unoptimized kprobes on freeing_list (git-fixes).</li>
<li>kprobes: Forbid probing on trampoline and BPF code areas (git-fixes).</li>
<li>kprobes: Prohibit probes in gate area (git-fixes).</li>
<li>kprobes: Skip clearing aggrprobe&#x27;s post_handler in kprobe-on-ftrace case (git-fixes).</li>
<li>kprobes: do not call disarm_kprobe() for disabled kprobes (git-fixes).</li>
<li>kvm: arm64: Do not hypercall before EL2 init (git-fixes)</li>
<li>kvm: arm64: Propagate errors from __pkvm_prot_finalize hypercall (git-fixes)</li>
<li>kvm: arm64: Save PSTATE early on exit (git-fixes)</li>
<li>kvm: arm64: vgic: Read HW interrupt pending state from the HW (git-fixes)</li>
<li>lpfc: Account for fabric domain ctlr device loss recovery (bsc#1211346, bsc#1211852).</li>
<li>lpfc: Change firmware upgrade logging to KERN_NOTICE instead of TRACE_EVENT (bsc#1211852).</li>
<li>lpfc: Clean up SLI-4 CQE status handling (bsc#1211852).</li>
<li>lpfc: Clear NLP_IN_DEV_LOSS flag if already in rediscovery (bsc#1211852).</li>
<li>lpfc: Copyright updates for 14.2.0.13 patches (bsc#1211852).</li>
<li>lpfc: Enhance congestion statistics collection (bsc#1211852).</li>
<li>lpfc: Fix use-after-free rport memory access in lpfc_register_remote_port (bsc#1211852, bsc#1208410, bsc#1211346).</li>
<li>lpfc: Revise NPIV ELS unsol rcv cmpl logic to drop ndlp based on nlp_state (bsc#1211852).</li>
<li>lpfc: Update lpfc version to 14.2.0.13 (bsc#1211852).</li>
<li>mailbox: mailbox-test: Fix potential double-free in mbox_test_message_write() (git-fixes).</li>
<li>mailbox: mailbox-test: fix a locking issue in mbox_test_message_write() (git-fixes).</li>
<li>mailbox: ti-msgmgr: Fill non-message tx data fields with 0x0 (git-fixes).</li>
<li>media: cec: core: do not set last_initiator if tx in progress (git-fixes).</li>
<li>media: dvb-usb-v2: ce6230: fix null-ptr-deref in ce6230_i2c_master_xfer() (git-fixes).</li>
<li>media: dvb-usb-v2: ec168: fix null-ptr-deref in ec168_i2c_xfer() (git-fixes).</li>
<li>media: dvb-usb-v2: rtl28xxu: fix null-ptr-deref in rtl28xxu_i2c_xfer (git-fixes).</li>
<li>media: dvb-usb: az6027: fix three null-ptr-deref in az6027_i2c_xfer() (git-fixes).</li>
<li>media: dvb-usb: digitv: fix null-ptr-deref in digitv_i2c_xfer() (git-fixes).</li>
<li>media: dvb-usb: dw2102: fix uninit-value in su3000_read_mac_address (git-fixes).</li>
<li>media: dvb_ca_en50221: fix a size write bug (git-fixes).</li>
<li>media: dvb_demux: fix a bug for the continuity counter (git-fixes).</li>
<li>media: mn88443x: fix !CONFIG_OF error by drop of_match_ptr from ID table (git-fixes).</li>
<li>media: netup_unidvb: fix irq init by register it at the end of probe (git-fixes).</li>
<li>memory: brcmstb_dpfe: fix testing array offset after use (git-fixes).</li>
<li>meson saradc: fix clock divider mask length (git-fixes).</li>
<li>mfd: intel-lpss: Add missing check for platform_get_resource (git-fixes).</li>
<li>mfd: pm8008: Fix module autoloading (git-fixes).</li>
<li>mfd: rt5033: Drop rt5033-battery sub-device (git-fixes).</li>
<li>mfd: stmfx: Fix error path in stmfx_chip_init (git-fixes).</li>
<li>mfd: stmfx: Nullify stmfx->vdd in case of error (git-fixes).</li>
<li>mfd: stmpe: Only disable the regulators if they are enabled (git-fixes).</li>
<li>misc: fastrpc: Create fastrpc scalar with correct buffer count (git-fixes).</li>
<li>misc: pci_endpoint_test: Free IRQs before removing the device (git-fixes).</li>
<li>misc: pci_endpoint_test: Re-init completion for every test (git-fixes).</li>
<li>mlx5: do not use RT_TOS for IPv6 flowlabel (jsc#SLE-19253).</li>
<li>mlxfw: fix null-ptr-deref in mlxfw_mfa2_tlv_next() (git-fixes).</li>
<li>mm/vmalloc: do not output a spurious warning when huge vmalloc() fails (bsc#1211410).</li>
<li>mm: Move mm_cachep initialization to mm_init() (bsc#1212448).</li>
<li>mm: vmalloc: avoid warn_alloc noise caused by fatal signal (bsc#1211410).</li>
<li>mmc: bcm2835: fix deferred probing (git-fixes).</li>
<li>mmc: meson-gx: remove redundant mmc_request_done() call from irq context (git-fixes).</li>
<li>mmc: mmci: Set PROBE_PREFER_ASYNCHRONOUS (git-fixes).</li>
<li>mmc: mmci: stm32: fix max busy timeout calculation (git-fixes).</li>
<li>mmc: mtk-sd: fix deferred probing (git-fixes).</li>
<li>mmc: mvsdio: fix deferred probing (git-fixes).</li>
<li>mmc: omap: fix deferred probing (git-fixes).</li>
<li>mmc: omap_hsmmc: fix deferred probing (git-fixes).</li>
<li>mmc: owl: fix deferred probing (git-fixes).</li>
<li>mmc: sdhci-acpi: fix deferred probing (git-fixes).</li>
<li>mmc: sdhci-msm: Disable broken 64-bit DMA on MSM8916 (git-fixes).</li>
<li>mmc: sdhci-spear: fix deferred probing (git-fixes).</li>
<li>mmc: sh_mmcif: fix deferred probing (git-fixes).</li>
<li>mmc: sunxi: fix deferred probing (git-fixes).</li>
<li>mmc: usdhi60rol0: fix deferred probing (git-fixes).</li>
<li>mtd: rawnand: meson: fix unaligned DMA buffers handling (git-fixes).</li>
<li>net/mlx5: Add forgotten cleanup calls into mlx5_init_once() error path (jsc#SLE-19253).</li>
<li>net/mlx5: Allow async trigger completion execution on single CPU systems (jsc#SLE-19253).</li>
<li>net/mlx5: Allow future addition of IPsec object modifiers (jsc#SLE-19253).</li>
<li>net/mlx5: Avoid false positive lockdep warning by adding lock_class_key (jsc#SLE-19253).</li>
<li>net/mlx5: Avoid recovery in probe flows (jsc#SLE-19253).</li>
<li>net/mlx5: Bridge, fix ageing of peer FDB entries (jsc#SLE-19253).</li>
<li>net/mlx5: Bridge, verify LAG state when adding bond to bridge (jsc#SLE-19253).</li>
<li>net/mlx5: DR, Check force-loopback RC QP capability independently from RoCE (jsc#SLE-19253).</li>
<li>net/mlx5: DR, Fix crc32 calculation to work on big-endian (BE) CPUs (jsc#SLE-19253).</li>
<li>net/mlx5: DR, Fix missing flow_source when creating multi-destination FW table (jsc#SLE-19253).</li>
<li>net/mlx5: Devcom, fix error flow in mlx5_devcom_register_device (jsc#SLE-19253).</li>
<li>net/mlx5: Do not advertise IPsec netdev support for non-IPsec device (jsc#SLE-19253).</li>
<li>net/mlx5: Do not use already freed action pointer (jsc#SLE-19253).</li>
<li>net/mlx5: E-Switch, Fix an Oops in error handling code (jsc#SLE-19253).</li>
<li>net/mlx5: E-Switch, properly handle ingress tagged packets on VST (jsc#SLE-19253).</li>
<li>net/mlx5: E-switch, Create per vport table based on devlink encap mode (jsc#SLE-19253).</li>
<li>net/mlx5: E-switch, Do not destroy indirect table in split rule (jsc#SLE-19253).</li>
<li>net/mlx5: E-switch, Fix missing set of split_count when forward to ovs internal port (jsc#SLE-19253).</li>
<li>net/mlx5: E-switch, Fix setting of reserved fields on MODIFY_SCHEDULING_ELEMENT (jsc#SLE-19253).</li>
<li>net/mlx5: Enhance debug print in page allocation failure (jsc#SLE-19253).</li>
<li>net/mlx5: Fix FW tracer timestamp calculation (jsc#SLE-19253).</li>
<li>net/mlx5: Fix RoCE setting at HCA level (jsc#SLE-19253).</li>
<li>net/mlx5: Fix crash during sync firmware reset (jsc#SLE-19253).</li>
<li>net/mlx5: Fix error message when failing to allocate device memory (jsc#SLE-19253).</li>
<li>net/mlx5: Fix handling of entry refcount when command is not issued to FW (jsc#SLE-19253).</li>
<li>net/mlx5: Fix possible use-after-free in async command interface (jsc#SLE-19253).</li>
<li>net/mlx5: Fix ptp max frequency adjustment range (jsc#SLE-19253).</li>
<li>net/mlx5: Fix steering rules cleanup (jsc#SLE-19253).</li>
<li>net/mlx5: Fix uninitialized variable bug in outlen_write() (jsc#SLE-19253).</li>
<li>net/mlx5: Geneve, Fix handling of Geneve object id as error code (jsc#SLE-19253).</li>
<li>net/mlx5: Initialize flow steering during driver probe (jsc#SLE-19253).</li>
<li>net/mlx5: Read embedded cpu after init bit cleared (jsc#SLE-19253).</li>
<li>net/mlx5: Read the TC mapping of all priorities on ETS query (jsc#SLE-19253).</li>
<li>net/mlx5: Rearm the FW tracer after each tracer event (jsc#SLE-19253).</li>
<li>net/mlx5: SF, Drain health before removing device (jsc#SLE-19253).</li>
<li>net/mlx5: SF: Fix probing active SFs during driver probe phase (jsc#SLE-19253).</li>
<li>net/mlx5: Serialize module cleanup with reload and remove (jsc#SLE-19253).</li>
<li>net/mlx5: Wait for firmware to enable CRS before pci_restore_state (jsc#SLE-19253).</li>
<li>net/mlx5: add IFC bits for bypassing port select flow table (git-fixes)</li>
<li>net/mlx5: check attr pointer validity before dereferencing it (jsc#SLE-19253).</li>
<li>net/mlx5: correct ECE offset in query qp output (jsc#SLE-19253).</li>
<li>net/mlx5: fix missing mutex_unlock in mlx5_fw_fatal_reporter_err_work() (jsc#SLE-19253).</li>
<li>net/mlx5: fs, fail conflicting actions (jsc#SLE-19253).</li>
<li>net/mlx5: fw_tracer, Clear load bit when freeing string DBs buffers (jsc#SLE-19253).</li>
<li>net/mlx5: fw_tracer, Fix event handling (jsc#SLE-19253).</li>
<li>net/mlx5: fw_tracer, Zero consumer index when reloading the tracer (jsc#SLE-19253).</li>
<li>net/mlx5e: Always clear dest encap in neigh-update-del (jsc#SLE-19253).</li>
<li>net/mlx5e: Avoid false lock dependency warning on tc_ht even more (jsc#SLE-19253).</li>
<li>net/mlx5e: Block entering switchdev mode with ns inconsistency (jsc#SLE-19253).</li>
<li>net/mlx5e: Do not attach netdev profile while handling internal error (jsc#SLE-19253).</li>
<li>net/mlx5e: Do not increment ESN when updating IPsec ESN state (jsc#SLE-19253).</li>
<li>net/mlx5e: Do not support encap rules with gbp option (jsc#SLE-19253).</li>
<li>net/mlx5e: E-Switch, Fix comparing termination table instance (jsc#SLE-19253).</li>
<li>net/mlx5e: Extend SKB room check to include PTP-SQ (jsc#SLE-19253).</li>
<li>net/mlx5e: Fix MPLSoUDP encap to use MPLS action information (jsc#SLE-19253).</li>
<li>net/mlx5e: Fix SQ wake logic in ptp napi_poll context (jsc#SLE-19253).</li>
<li>net/mlx5e: Fix capability check for updating vnic env counters (jsc#SLE-19253).</li>
<li>net/mlx5e: Fix error handling in mlx5e_refresh_tirs (jsc#SLE-19253).</li>
<li>net/mlx5e: Fix hw mtu initializing at XDP SQ allocation (jsc#SLE-19253).</li>
<li>net/mlx5e: Fix the value of MLX5E_MAX_RQ_NUM_MTTS (jsc#SLE-19253).</li>
<li>net/mlx5e: Fix use-after-free when reverting termination table (jsc#SLE-19253).</li>
<li>net/mlx5e: Fix wrong application of the LRO state (jsc#SLE-19253).</li>
<li>net/mlx5e: Fix wrong tc flag used when set hw-tc-offload off (jsc#SLE-19253).</li>
<li>net/mlx5e: IPoIB, Do not allow CQE compression to be turned on by default (jsc#SLE-19253).</li>
<li>net/mlx5e: IPoIB, Show unknown speed instead of error (jsc#SLE-19253).</li>
<li>net/mlx5e: Modify slow path rules to go to slow fdb (jsc#SLE-19253).</li>
<li>net/mlx5e: QoS, Fix wrongfully setting parent_element_id on MODIFY_SCHEDULING_ELEMENT (jsc#SLE-19253).</li>
<li>net/mlx5e: Set uplink rep as NETNS_LOCAL (jsc#SLE-19253).</li>
<li>net/mlx5e: TC, Fix ct_clear overwriting ct action metadata (jsc#SLE-19253).</li>
<li>net/mlx5e: Update rx ring hw mtu upon each rx-fcs flag change (jsc#SLE-19253).</li>
<li>net/mlx5e: Verify flow_source cap before using it (jsc#SLE-19253).</li>
<li>net/mlx5e: do as little as possible in napi poll when budget is 0 (jsc#SLE-19253).</li>
<li>net/mlx5e: kTLS, Fix build time constant test in RX (jsc#SLE-19253).</li>
<li>net/mlx5e: kTLS, Fix build time constant test in TX (jsc#SLE-19253).</li>
<li>net/net_failover: fix txq exceeding warning (git-fixes).</li>
<li>net/sched: fix initialization order when updating chain 0 head (git-fixes).</li>
<li>net/sched: flower: fix possible OOB write in fl_set_geneve_opt() (git-fixes).</li>
<li>net/sched: sch_netem: Fix arithmetic in netem_dump() for 32-bit platforms (git-fixes).</li>
<li>net/sched: tcindex: Do not use perfect hashing (bsc#1210335 CVE-2023-1829).</li>
<li>net: ena: Account for the number of processed bytes in XDP (git-fixes).</li>
<li>net: ena: Do not register memory info on XDP exchange (git-fixes).</li>
<li>net: ena: Fix rx_copybreak value update (git-fixes).</li>
<li>net: ena: Fix toeplitz initial hash value (git-fixes).</li>
<li>net: ena: Set default value for RX interrupt moderation (git-fixes).</li>
<li>net: ena: Update NUMA TPH hint register upon NUMA node update (git-fixes).</li>
<li>net: ena: Use bitmask to indicate packet redirection (git-fixes).</li>
<li>net: hns3: add interrupts re-initialization while doing VF FLR (git-fixes).</li>
<li>net: hns3: fix output information incomplete for dumping tx queue info with debugfs (git-fixes).</li>
<li>net: hns3: fix reset delay time to avoid configuration timeout (git-fixes).</li>
<li>net: hns3: fix sending pfc frames after reset issue (git-fixes).</li>
<li>net: hns3: fix tm port shapping of fibre port is incorrect after driver initialization (git-fixes).</li>
<li>net: mlx5: eliminate anonymous module_init & module_exit (jsc#SLE-19253).</li>
<li>net: sched: fix possible refcount leak in tc_chain_tmplt_add() (git-fixes).</li>
<li>net: usb: qmi_wwan: add support for Compal RXM-G1 (git-fixes).</li>
<li>nfcsim.c: Fix error checking for debugfs_create_dir (git-fixes).</li>
<li>nfp: only report pause frame configuration for physical device (git-fixes).</li>
<li>nilfs2: fix buffer corruption due to concurrent device reads (git-fixes).</li>
<li>nilfs2: fix incomplete buffer cleanup in nilfs_btnode_abort_change_key() (git-fixes).</li>
<li>nilfs2: fix possible out-of-bounds segment allocation in resize ioctl (git-fixes).</li>
<li>nouveau: fix client work fence deletion race (git-fixes).</li>
<li>nvme-core: fix dev_pm_qos memleak (git-fixes).</li>
<li>nvme-core: fix memory leak in dhchap_ctrl_secret (git-fixes).</li>
<li>nvme-core: fix memory leak in dhchap_secret_store (git-fixes).</li>
<li>nvme-pci: add quirk for missing secondary temperature thresholds (git-fixes).</li>
<li>nvme: double KA polling frequency to avoid KATO with TBKAS on (git-fixes).</li>
<li>ocfs2: fix defrag path triggering jbd2 ASSERT (git-fixes).</li>
<li>ocfs2: fix freeing uninitialized resource on ocfs2_dlm_shutdown (git-fixes).</li>
<li>ocfs2: fix non-auto defrag path not working issue (git-fixes).</li>
<li>octeontx2-pf: Avoid use of GFP_KERNEL in atomic context (git-fixes).</li>
<li>octeontx2-pf: Fix resource leakage in VF driver unbind (git-fixes).</li>
<li>octeontx2-pf: Fix the use of GFP_KERNEL in atomic context on rt (git-fixes).</li>
<li>octeontx2-pf: Recalculate UDP checksum for ptp 1-step sync packet (git-fixes).</li>
<li>pci/aspm: Disable ASPM on MFD function removal to avoid use-after-free (git-fixes).</li>
<li>pci: Add pci_clear_master() stub for non-CONFIG_PCI (git-fixes).</li>
<li>pci: Release resource invalidated by coalescing (git-fixes).</li>
<li>pci: cadence: Fix Gen2 Link Retraining process (git-fixes).</li>
<li>pci: endpoint: Add missing documentation about the MSI/MSI-X range (git-fixes).</li>
<li>pci: ftpci100: Release the clock resources (git-fixes).</li>
<li>pci: pciehp: Cancel bringup sequence if card is not present (git-fixes).</li>
<li>pci: qcom: Disable write access to read only registers for IP v2.3.3 (git-fixes).</li>
<li>pci: rockchip: Add poll and timeout to wait for PHY PLLs to be locked (git-fixes).</li>
<li>pci: rockchip: Assert PCI Configuration Enable bit after probe (git-fixes).</li>
<li>pci: rockchip: Fix legacy IRQ generation for RK3399 PCIe endpoint core (git-fixes).</li>
<li>pci: rockchip: Set address alignment for endpoint mode (git-fixes).</li>
<li>pci: rockchip: Use u32 variable to access 32-bit registers (git-fixes).</li>
<li>pci: rockchip: Write PCI Device ID to correct register (git-fixes).</li>
<li>pci: vmd: Reset VMD config register between soft reboots (git-fixes).</li>
<li>pinctrl: at91-pio4: check return value of devm_kasprintf() (git-fixes).</li>
<li>pinctrl: cherryview: Return correct value if pin in push-pull mode (git-fixes).</li>
<li>pinctrl: meson-axg: add missing GPIOA_18 gpio group (git-fixes).</li>
<li>pinctrl: microchip-sgpio: check return value of devm_kasprintf() (git-fixes).</li>
<li>platform/surface: aggregator: Allow completion work-items to be executed in parallel (git-fixes).</li>
<li>platform/x86: asus-wmi: Ignore WMI events with codes 0x7B, 0xC0 (git-fixes).</li>
<li>platform/x86: intel_scu_pcidrv: Add back PCI ID for Medfield (git-fixes).</li>
<li>platform/x86: think-lmi: Correct NVME password handling (git-fixes).</li>
<li>platform/x86: think-lmi: Correct System password interface (git-fixes).</li>
<li>platform/x86: think-lmi: mutex protection around multiple WMI calls (git-fixes).</li>
<li>platform/x86: thinkpad_acpi: Fix lkp-tests warnings for platform profiles (git-fixes).</li>
<li>pm: domains: fix integer overflow issues in genpd_parse_state() (git-fixes).</li>
<li>power: supply: Fix logic checking if system is running from battery (git-fixes).</li>
<li>power: supply: Ratelimit no data debug output (git-fixes).</li>
<li>power: supply: ab8500: Fix external_power_changed race (git-fixes).</li>
<li>power: supply: bq27xxx: Use mod_delayed_work() instead of cancel() + schedule() (git-fixes).</li>
<li>power: supply: sc27xx: Fix external_power_changed race (git-fixes).</li>
<li>powerpc/64s/radix: Fix exit lazy tlb mm switch with irqs enabled (bsc#1194869).</li>
<li>powerpc/64s/radix: Fix soft dirty tracking (bsc#1065729).</li>
<li>powerpc/64s: Make POWER10 and later use pause_short in cpu_relax loops (bsc#1209367 ltc#195662).</li>
<li>powerpc/iommu: Limit number of TCEs to 512 for H_STUFF_TCE hcall (bsc#1194869 bsc#1212701).</li>
<li>powerpc/purgatory: remove PGO flags (bsc#1194869).</li>
<li>powerpc/set_memory: Avoid spinlock recursion in change_page_attr() (bsc#1194869).</li>
<li>powerpc: Redefine HMT_xxx macros as empty on PPC32 (bsc#1209367 ltc#195662).</li>
<li>powerpc: add ISA v3.0 / v3.1 wait opcode macro (bsc#1209367 ltc#195662).</li>
<li>pstore/ram: Add check for kstrdup (git-fixes).</li>
<li>qed/qede: Fix scheduling while atomic (git-fixes).</li>
<li>radeon: avoid double free in ci_dpm_init() (git-fixes).</li>
<li>rcu: Fix missing TICK_DEP_MASK_RCU_EXP dependency check (git-fixes).</li>
<li>rdma/bnxt_re: Avoid calling wake_up threads from spin_lock context (git-fixes)</li>
<li>rdma/bnxt_re: Disable/kill tasklet only if it is enabled (git-fixes)</li>
<li>rdma/bnxt_re: Fix to remove an unnecessary log (git-fixes)</li>
<li>rdma/bnxt_re: Fix to remove unnecessary return labels (git-fixes)</li>
<li>rdma/bnxt_re: Remove a redundant check inside bnxt_re_update_gid (git-fixes)</li>
<li>rdma/bnxt_re: Remove unnecessary checks (git-fixes)</li>
<li>rdma/bnxt_re: Return directly without goto jumps (git-fixes)</li>
<li>rdma/bnxt_re: Use unique names while registering interrupts (git-fixes)</li>
<li>rdma/bnxt_re: wraparound mbox producer index (git-fixes)</li>
<li>rdma/cma: Always set static rate to 0 for RoCE (git-fixes)</li>
<li>rdma/hns: Fix hns_roce_table_get return value (git-fixes)</li>
<li>rdma/irdma: avoid fortify-string warning in irdma_clr_wqes (git-fixes)</li>
<li>rdma/mlx5: Do not set tx affinity when lag is in hash mode (git-fixes)</li>
<li>rdma/mlx5: Fix affinity assignment (git-fixes)</li>
<li>rdma/mlx5: Initiate dropless RQ for RAW Ethernet functions (git-fixes)</li>
<li>rdma/mlx5: Rely on RoCE fw cap instead of devlink when setting profile (jsc#SLE-19253).</li>
<li>rdma/rtrs-clt: Replace list_next_or_null_rr_rcu with an inline function (git-fixes)</li>
<li>rdma/rtrs-srv: Pass the correct number of entries for dma mapped SGL (git-fixes)</li>
<li>rdma/rtrs: Fix rxe_dealloc_pd warning (git-fixes)</li>
<li>rdma/rtrs: Fix the last iu->buf leak in err path (git-fixes)</li>
<li>rdma/rxe: Fix packet length checks (git-fixes)</li>
<li>rdma/rxe: Fix ref count error in check_rkey() (git-fixes)</li>
<li>rdma/rxe: Fix rxe_cq_post (git-fixes)</li>
<li>rdma/rxe: Fix the error "trying to register non-static key in rxe_cleanup_task" (git-fixes)</li>
<li>rdma/rxe: Fix the use-before-initialization error of resp_pkts (git-fixes)</li>
<li>rdma/rxe: Remove dangling declaration of rxe_cq_disable() (git-fixes)</li>
<li>rdma/rxe: Remove the unused variable obj (git-fixes)</li>
<li>rdma/rxe: Removed unused name from rxe_task struct (git-fixes)</li>
<li>rdma/uverbs: Restrict usage of privileged QKEYs (git-fixes)</li>
<li>rdma/vmw_pvrdma: Remove unnecessary check on wr->opcode (git-fixes)</li>
<li>regmap: Account for register length when chunking (git-fixes).</li>
<li>regmap: spi-avmm: Fix regmap_bus max_raw_write (git-fixes).</li>
<li>regulator: Fix error checking for debugfs_create_dir (git-fixes).</li>
<li>regulator: core: Fix more error checking for debugfs_create_dir() (git-fixes).</li>
<li>regulator: core: Streamline debugfs operations (git-fixes).</li>
<li>regulator: helper: Document ramp_delay parameter of regulator_set_ramp_delay_regmap() (git-fixes).</li>
<li>regulator: pca9450: Fix LDO3OUT and LDO4OUT MASK (git-fixes).</li>
<li>reiserfs: Add missing calls to reiserfs_security_free() (git-fixes).</li>
<li>reiserfs: Add security prefix to xattr name in reiserfs_security_write() (git-fixes).</li>
<li>revert "squashfs: harden sanity check in squashfs_read_xattr_id_table" (git-fixes).</li>
<li>rpm/check-for-config-changes: ignore also PAHOLE_HAS_* We now also have options like CONFIG_PAHOLE_HAS_LANG_EXCLUDE.</li>
<li>rpm/kernel-binary.spec.in: Fix compatibility wth newer rpm</li>
<li>rpm/kernel-docs.spec.in: pass PYTHON=python3 to fix build error (bsc#1160435)</li>
<li>rtc: st-lpc: Release some resources in st_rtc_probe() in case of error (git-fixes).</li>
<li>s390/dasd: Use correct lock while counting channel queue length (git-fixes bsc#1212592).</li>
<li>s390/gmap: voluntarily schedule during key setting (git-fixes bsc#1212892).</li>
<li>s390/pkey: zeroize key blobs (git-fixes bsc#1212619).</li>
<li>sched/rt: pick_next_rt_entity(): check list_entry (bsc#1208600 CVE-2023-1077)</li>
<li>scsi: core: Decrease scsi_device&#x27;s iorequest_cnt if dispatch failed (git-fixes).</li>
<li>scsi: stex: Fix gcc 13 warnings (git-fixes).</li>
<li>selftests/ptp: Fix timestamp printf format for PTP_SYS_OFFSET (git-fixes).</li>
<li>serial: 8250: lock port for UART_IER access in omap8250_irq() (git-fixes).</li>
<li>serial: 8250: lock port for stop_rx() in omap8250_irq() (git-fixes).</li>
<li>serial: 8250: omap: Fix freeing of resources on failed register (git-fixes).</li>
<li>serial: 8250_omap: Use force_suspend and resume for system suspend (git-fixes).</li>
<li>serial: atmel: do not enable IRQs prematurely (git-fixes).</li>
<li>serial: lantiq: add missing interrupt ack (git-fixes).</li>
<li>sfc: disable RXFCS and RXALL features by default (git-fixes).</li>
<li>signal/s390: Use force_sigsegv in default_trap_handler (git-fixes bsc#1212861).</li>
<li>soc/fsl/qe: fix usb.c build errors (git-fixes).</li>
<li>soc: samsung: exynos-pmu: Re-introduce Exynos4212 support (git-fixes).</li>
<li>soundwire: dmi-quirks: add new mapping for HP Spectre x360 (git-fixes).</li>
<li>spi: dw: Round of n_bytes to power of 2 (git-fixes).</li>
<li>spi: fsl-dspi: avoid SCK glitches with continuous transfers (git-fixes).</li>
<li>spi: lpspi: disable lpspi module irq in DMA mode (git-fixes).</li>
<li>spi: qup: Request DMA before enabling clocks (git-fixes).</li>
<li>spi: spi-geni-qcom: Correct CS_TOGGLE bit in SPI_TRANS_CFG (git-fixes).</li>
<li>spi: tegra210-quad: Fix combined sequence (bsc#1212584)</li>
<li>spi: tegra210-quad: Fix iterator outside loop (git-fixes).</li>
<li>spi: tegra210-quad: Multi-cs support (bsc#1212584)</li>
<li>squashfs: harden sanity check in squashfs_read_xattr_id_table (git-fixes).</li>
<li>staging: octeon: delete my name from TODO contact (git-fixes).</li>
<li>sunrpc: Clean up svc_deferred_class trace events (git-fixes).</li>
<li>supported.conf: Move bt878 and bttv modules to kernel-*-extra (jsc#PED-3931)</li>
<li>test_firmware: Use kstrtobool() instead of strtobool() (git-fixes).</li>
<li>test_firmware: fix the memory leak of the allocated firmware buffer (git-fixes).</li>
<li>test_firmware: prevent race conditions by a correct implementation of locking (git-fixes).</li>
<li>test_firmware: return ENOMEM instead of ENOSPC on failed memory allocation (git-fixes).</li>
<li>thermal/drivers/sun8i: Fix some error handling paths in sun8i_ths_probe() (git-fixes).</li>
<li>thunderbolt: dma_test: Use correct value for absent rings when creating paths (git-fixes).</li>
<li>tls: Skip tls_append_frag on zero copy size (git-fixes).</li>
<li>tools: bpftool: Remove invalid \&#x27; json escape (git-fixes).</li>
<li>tpm, tpm_tis: Request threaded interrupt handler (git-fixes).</li>
<li>tracing/histograms: Allow variables to have some modifiers (git-fixes).</li>
<li>tracing/probe: trace_probe_primary_from_call(): checked list_first_entry (git-fixes).</li>
<li>tracing/timer: Add missing hrtimer modes to decode_hrtimer_mode() (git-fixes).</li>
<li>tracing: Have event format check not flag %p* on __get_dynamic_array() (git-fixes, bsc#1212350).</li>
<li>tracing: Introduce helpers to safely handle dynamic-sized sockaddrs (git-fixes).</li>
<li>tracing: Update print fmt check to handle new __get_sockaddr() macro (git-fixes, bsc#1212350).</li>
<li>tty: serial: imx: fix rs485 rx after tx (git-fixes).</li>
<li>tty: serial: samsung_tty: Fix a memory leak in s3c24xx_serial_getclk() in case of error (git-fixes).</li>
<li>tty: serial: samsung_tty: Fix a memory leak in s3c24xx_serial_getclk() when iterating clk (git-fixes).</li>
<li>usb: cdns3: fix NCM gadget RX speed 20x slow than expection at iMX8QM (git-fixes).</li>
<li>usb: dwc3-meson-g12a: Fix an error handling path in dwc3_meson_g12a_probe() (git-fixes).</li>
<li>usb: dwc3: fix use-after-free on core driver unbind (git-fixes).</li>
<li>usb: dwc3: gadget: Propagate core init errors to UDC during pullup (git-fixes).</li>
<li>usb: dwc3: gadget: Reset num TRBs before giving back the request (git-fixes).</li>
<li>usb: dwc3: qcom: Fix an error handling path in dwc3_qcom_probe() (git-fixes).</li>
<li>usb: dwc3: qcom: Fix potential memory leak (git-fixes).</li>
<li>usb: dwc3: qcom: Release the correct resources in dwc3_qcom_remove() (git-fixes).</li>
<li>usb: dwc3: qcom: fix NULL-deref on suspend (git-fixes).</li>
<li>usb: gadget: u_serial: Add null pointer check in gserial_suspend (git-fixes).</li>
<li>usb: gadget: udc: fix NULL dereference in remove() (git-fixes).</li>
<li>usb: hide unused usbfs_notify_suspend/resume functions (git-fixes).</li>
<li>usb: phy: phy-tahvo: fix memory leak in tahvo_usb_probe() (git-fixes).</li>
<li>usb: serial: option: add Quectel EM061KGL series (git-fixes).</li>
<li>usb: typec: ucsi: Fix command cancellation (git-fixes).</li>
<li>usb: xhci: Remove unused udev from xhci_log_ctx trace event (git-fixes).</li>
<li>usrmerge: Adjust module path in the kernel sources (bsc#1212835).</li>
<li>usrmerge: Compatibility with earlier rpm (boo#1211796)</li>
<li>vdpa/mlx5: Directly assign memory key (jsc#SLE-19253).</li>
<li>vdpa/mlx5: Do not clear mr struct on destroy MR (jsc#SLE-19253).</li>
<li>vdpa/mlx5: Fix wrong configuration of virtio_version_1_0 (jsc#SLE-19253).</li>
<li>vdpa: Fix error logic in vdpa_nl_cmd_dev_get_doit (jsc#SLE-19253).</li>
<li>vhost_vdpa: support PACKED when setting-getting vring_base (jsc#SLE-19253).</li>
<li>w1: fix loop in w1_fini() (git-fixes).</li>
<li>w1: w1_therm: fix locking behavior in convert_t (git-fixes).</li>
<li>watchdog: menz069_wdt: fix watchdog initialisation (git-fixes).</li>
<li>wifi: ath9k: Fix possible stall on ath9k_txq_list_has_key() (git-fixes).</li>
<li>wifi: ath9k: avoid referencing uninit memory in ath9k_wmi_ctrl_rx (git-fixes).</li>
<li>wifi: ath9k: convert msecs to jiffies where needed (git-fixes).</li>
<li>wifi: ath9k: do not allow to overwrite ENDPOINT0 attributes (git-fixes).</li>
<li>wifi: ath9k: fix AR9003 mac hardware hang check register offset calculation (git-fixes).</li>
<li>wifi: atmel: Fix an error handling path in atmel_probe() (git-fixes).</li>
<li>wifi: b43: fix incorrect __packed annotation (git-fixes).</li>
<li>wifi: cfg80211: fix locking in regulatory disconnect (git-fixes).</li>
<li>wifi: cfg80211: fix locking in sched scan stop work (git-fixes).</li>
<li>wifi: cfg80211: rewrite merging of inherited elements (git-fixes).</li>
<li>wifi: iwlwifi: mvm: indicate HW decrypt for beacon protection (git-fixes).</li>
<li>wifi: iwlwifi: pcie: fix NULL pointer dereference in iwl_pcie_irq_rx_msix_handler() (git-fixes).</li>
<li>wifi: iwlwifi: pull from TXQs with softirqs disabled (git-fixes).</li>
<li>wifi: mac80211: simplify chanctx allocation (git-fixes).</li>
<li>wifi: mt76: mt7615: fix possible race in mt7615_mac_sta_poll (git-fixes).</li>
<li>wifi: mwifiex: Fix the size of a memory allocation in mwifiex_ret_802_11_scan() (git-fixes).</li>
<li>wifi: orinoco: Fix an error handling path in orinoco_cs_probe() (git-fixes).</li>
<li>wifi: orinoco: Fix an error handling path in spectrum_cs_probe() (git-fixes).</li>
<li>wifi: rsi: Do not configure WoWlan in shutdown hook if not enabled (git-fixes).</li>
<li>wifi: rsi: Do not set MMC_PM_KEEP_POWER in shutdown (git-fixes).</li>
<li>wifi: rtl8xxxu: fix authentication timeout due to incorrect RCR value (git-fixes).</li>
<li>wifi: wilc1000: fix for absent RSN capabilities WFA testcase (git-fixes).</li>
<li>writeback: fix dereferencing NULL mapping->host on writeback_page_template (git-fixes).</li>
<li>x86/build: Avoid relocation information in final vmlinux (bsc#1187829).</li>
<li>x86/cpu: Switch to arch_cpu_finalize_init() (bsc#1212448).</li>
<li>x86/fpu: Mark init functions __init (bsc#1212448).</li>
<li>x86/fpu: Move FPU initialization into arch_cpu_finalize_init() (bsc#1212448).</li>
<li>x86/fpu: Remove cpuinfo argument from init functions (bsc#1212448).</li>
<li>x86/init: Initialize signal frame size late (bsc#1212448).</li>
<li>x86/kprobes: Fix __recover_optprobed_insn check optimizing logic (git-fixes).</li>
<li>x86/kprobes: Fix arch_check_optimized_kprobe check within optimized_kprobe range (git-fixes).</li>
<li>x86/microcode/amd: Remove load_microcode_amd()&#x27;s bsp parameter (git-fixes).</li>
<li>x86/microcode: Print previous version of microcode after reload (git-fixes).</li>
<li>x86/mm: Fix RESERVE_BRK() for older binutils (git-fixes).</li>
<li>x86/mm: Fix use of uninitialized buffer in sme_enable() (git-fixes).</li>
<li>x86/mm: Initialize text poking earlier (bsc#1212448).</li>
<li>x86/mm: Use mm_alloc() in poking_init() (bsc#1212448).</li>
<li>x86/mm: fix poking_init() for Xen PV guests (git-fixes).</li>
<li>x86/sgx: Fix race between reclaimer and page fault handler (git-fixes).</li>
<li>x86/sgx: Mark PCMD page as dirty when modifying contents (git-fixes).</li>
<li>x86/xen: fix secondary processor fpu initialization (bsc#1212869).</li>
<li>xfs: fix rm_offset flag handling in rmap keys (git-fixes).</li>
<li>xfs: set bnobt/cntbt numrecs correctly when formatting new AGs (git-fixes).</li>
</ul>

    
        <h2>Special Instructions and Notes:</h2>
        <ul>
            
            
                <li>Please reboot the system after installing this update.</li>
            
            
        </ul>
    

    <h2>Patch Instructions:</h2>
    <p>
        To install this SUSE Important update use the SUSE recommended
        installation methods like YaST online_update or "zypper patch".<br/>

        Alternatively you can run the command listed for your product:
    </p>
    <ul class="list-group">
        
            <li class="list-group-item">
                Basesystem Module 15-SP4
                
                    
                        <br/>
                        <code>zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP4-2023-2820=1</code>
                    
                    
                
            </li>
        
            <li class="list-group-item">
                Development Tools Module 15-SP4
                
                    
                        <br/>
                        <code>zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP4-2023-2820=1</code>
                    
                    
                
            </li>
        
            <li class="list-group-item">
                Legacy Module 15-SP4
                
                    
                        <br/>
                        <code>zypper in -t patch SUSE-SLE-Module-Legacy-15-SP4-2023-2820=1</code>
                    
                    
                
            </li>
        
            <li class="list-group-item">
                SUSE Linux Enterprise Live Patching 15-SP4
                
                    
                        <br/>
                        <code>zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2023-2820=1</code>
                    
                    
                        <br/>
                        Please note that this is the initial kernel livepatch without fixes itself,
                        this package is later updated by separate standalone kernel livepatch
                        updates.
                    
                
            </li>
        
            <li class="list-group-item">
                SUSE Linux Enterprise High Availability Extension 15 SP4
                
                    
                        <br/>
                        <code>zypper in -t patch SUSE-SLE-Product-HA-15-SP4-2023-2820=1</code>
                    
                    
                
            </li>
        
            <li class="list-group-item">
                SUSE Linux Enterprise Workstation Extension 15 SP4
                
                    
                        <br/>
                        <code>zypper in -t patch SUSE-SLE-Product-WE-15-SP4-2023-2820=1</code>
                    
                    
                
            </li>
        
            <li class="list-group-item">
                openSUSE Leap Micro 5.3
                
                    
                        <br/>
                        <code>zypper in -t patch openSUSE-Leap-Micro-5.3-2023-2820=1</code>
                    
                    
                
            </li>
        
            <li class="list-group-item">
                openSUSE Leap 15.4
                
                    
                        <br/>
                        <code>zypper in -t patch openSUSE-SLE-15.4-2023-2820=1</code>
                    
                    
                
            </li>
        
            <li class="list-group-item">
                SUSE Linux Enterprise Micro for Rancher 5.3
                
                    
                        <br/>
                        <code>zypper in -t patch SUSE-SLE-Micro-5.3-2023-2820=1</code>
                    
                    
                
            </li>
        
            <li class="list-group-item">
                SUSE Linux Enterprise Micro 5.3
                
                    
                        <br/>
                        <code>zypper in -t patch SUSE-SLE-Micro-5.3-2023-2820=1</code>
                    
                    
                
            </li>
        
            <li class="list-group-item">
                SUSE Linux Enterprise Micro for Rancher 5.4
                
                    
                        <br/>
                        <code>zypper in -t patch SUSE-SLE-Micro-5.4-2023-2820=1</code>
                    
                    
                
            </li>
        
            <li class="list-group-item">
                SUSE Linux Enterprise Micro 5.4
                
                    
                        <br/>
                        <code>zypper in -t patch SUSE-SLE-Micro-5.4-2023-2820=1</code>
                    
                    
                
            </li>
        
    </ul>

    <h2>Package List:</h2>
    <ul>
        
            
                <li>
                    Basesystem Module 15-SP4 (aarch64 nosrc)
                    <ul>
                        
                            <li>kernel-64kb-5.14.21-150400.24.69.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    Basesystem Module 15-SP4 (aarch64)
                    <ul>
                        
                            <li>kernel-64kb-devel-5.14.21-150400.24.69.1</li>
                        
                            <li>kernel-64kb-devel-debuginfo-5.14.21-150400.24.69.1</li>
                        
                            <li>kernel-64kb-debuginfo-5.14.21-150400.24.69.1</li>
                        
                            <li>kernel-64kb-debugsource-5.14.21-150400.24.69.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    Basesystem Module 15-SP4 (aarch64 ppc64le s390x x86_64 nosrc)
                    <ul>
                        
                            <li>kernel-default-5.14.21-150400.24.69.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    Basesystem Module 15-SP4 (aarch64 ppc64le x86_64)
                    <ul>
                        
                            <li>kernel-default-base-5.14.21-150400.24.69.1.150400.24.31.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    Basesystem Module 15-SP4 (aarch64 ppc64le s390x x86_64)
                    <ul>
                        
                            <li>kernel-default-devel-5.14.21-150400.24.69.1</li>
                        
                            <li>kernel-default-debuginfo-5.14.21-150400.24.69.1</li>
                        
                            <li>kernel-default-debugsource-5.14.21-150400.24.69.1</li>
                        
                            <li>kernel-default-devel-debuginfo-5.14.21-150400.24.69.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    Basesystem Module 15-SP4 (noarch)
                    <ul>
                        
                            <li>kernel-macros-5.14.21-150400.24.69.1</li>
                        
                            <li>kernel-devel-5.14.21-150400.24.69.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    Basesystem Module 15-SP4 (nosrc s390x)
                    <ul>
                        
                            <li>kernel-zfcpdump-5.14.21-150400.24.69.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    Basesystem Module 15-SP4 (s390x)
                    <ul>
                        
                            <li>kernel-zfcpdump-debugsource-5.14.21-150400.24.69.1</li>
                        
                            <li>kernel-zfcpdump-debuginfo-5.14.21-150400.24.69.1</li>
                        
                    </ul>
                </li>
            
        
            
                <li>
                    Development Tools Module 15-SP4 (noarch nosrc)
                    <ul>
                        
                            <li>kernel-docs-5.14.21-150400.24.69.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    Development Tools Module 15-SP4 (aarch64 ppc64le s390x x86_64)
                    <ul>
                        
                            <li>kernel-syms-5.14.21-150400.24.69.1</li>
                        
                            <li>kernel-obs-build-5.14.21-150400.24.69.1</li>
                        
                            <li>kernel-obs-build-debugsource-5.14.21-150400.24.69.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    Development Tools Module 15-SP4 (noarch)
                    <ul>
                        
                            <li>kernel-source-5.14.21-150400.24.69.1</li>
                        
                    </ul>
                </li>
            
        
            
                <li>
                    Legacy Module 15-SP4 (nosrc)
                    <ul>
                        
                            <li>kernel-default-5.14.21-150400.24.69.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    Legacy Module 15-SP4 (aarch64 ppc64le s390x x86_64)
                    <ul>
                        
                            <li>kernel-default-debuginfo-5.14.21-150400.24.69.1</li>
                        
                            <li>kernel-default-debugsource-5.14.21-150400.24.69.1</li>
                        
                            <li>reiserfs-kmp-default-debuginfo-5.14.21-150400.24.69.1</li>
                        
                            <li>reiserfs-kmp-default-5.14.21-150400.24.69.1</li>
                        
                    </ul>
                </li>
            
        
            
                <li>
                    SUSE Linux Enterprise Live Patching 15-SP4 (nosrc)
                    <ul>
                        
                            <li>kernel-default-5.14.21-150400.24.69.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64)
                    <ul>
                        
                            <li>kernel-livepatch-5_14_21-150400_24_69-default-1-150400.9.3.1</li>
                        
                            <li>kernel-livepatch-SLE15-SP4_Update_14-debugsource-1-150400.9.3.1</li>
                        
                            <li>kernel-default-debugsource-5.14.21-150400.24.69.1</li>
                        
                            <li>kernel-default-livepatch-5.14.21-150400.24.69.1</li>
                        
                            <li>kernel-default-livepatch-devel-5.14.21-150400.24.69.1</li>
                        
                            <li>kernel-default-debuginfo-5.14.21-150400.24.69.1</li>
                        
                            <li>kernel-livepatch-5_14_21-150400_24_69-default-debuginfo-1-150400.9.3.1</li>
                        
                    </ul>
                </li>
            
        
            
                <li>
                    SUSE Linux Enterprise High Availability Extension 15 SP4 (aarch64 ppc64le s390x x86_64)
                    <ul>
                        
                            <li>cluster-md-kmp-default-debuginfo-5.14.21-150400.24.69.1</li>
                        
                            <li>ocfs2-kmp-default-5.14.21-150400.24.69.1</li>
                        
                            <li>dlm-kmp-default-debuginfo-5.14.21-150400.24.69.1</li>
                        
                            <li>dlm-kmp-default-5.14.21-150400.24.69.1</li>
                        
                            <li>ocfs2-kmp-default-debuginfo-5.14.21-150400.24.69.1</li>
                        
                            <li>kernel-default-debugsource-5.14.21-150400.24.69.1</li>
                        
                            <li>cluster-md-kmp-default-5.14.21-150400.24.69.1</li>
                        
                            <li>gfs2-kmp-default-5.14.21-150400.24.69.1</li>
                        
                            <li>kernel-default-debuginfo-5.14.21-150400.24.69.1</li>
                        
                            <li>gfs2-kmp-default-debuginfo-5.14.21-150400.24.69.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    SUSE Linux Enterprise High Availability Extension 15 SP4 (nosrc)
                    <ul>
                        
                            <li>kernel-default-5.14.21-150400.24.69.1</li>
                        
                    </ul>
                </li>
            
        
            
                <li>
                    SUSE Linux Enterprise Workstation Extension 15 SP4 (nosrc)
                    <ul>
                        
                            <li>kernel-default-5.14.21-150400.24.69.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    SUSE Linux Enterprise Workstation Extension 15 SP4 (x86_64)
                    <ul>
                        
                            <li>kernel-default-extra-debuginfo-5.14.21-150400.24.69.1</li>
                        
                            <li>kernel-default-debuginfo-5.14.21-150400.24.69.1</li>
                        
                            <li>kernel-default-debugsource-5.14.21-150400.24.69.1</li>
                        
                            <li>kernel-default-extra-5.14.21-150400.24.69.1</li>
                        
                    </ul>
                </li>
            
        
            
                <li>
                    openSUSE Leap Micro 5.3 (aarch64 nosrc x86_64)
                    <ul>
                        
                            <li>kernel-default-5.14.21-150400.24.69.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    openSUSE Leap Micro 5.3 (aarch64 x86_64)
                    <ul>
                        
                            <li>kernel-default-base-5.14.21-150400.24.69.1.150400.24.31.1</li>
                        
                            <li>kernel-default-debuginfo-5.14.21-150400.24.69.1</li>
                        
                            <li>kernel-default-debugsource-5.14.21-150400.24.69.1</li>
                        
                    </ul>
                </li>
            
        
            
                <li>
                    openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64)
                    <ul>
                        
                            <li>kselftests-kmp-default-debuginfo-5.14.21-150400.24.69.1</li>
                        
                            <li>kselftests-kmp-default-5.14.21-150400.24.69.1</li>
                        
                            <li>kernel-default-extra-5.14.21-150400.24.69.1</li>
                        
                            <li>kernel-obs-qa-5.14.21-150400.24.69.1</li>
                        
                            <li>reiserfs-kmp-default-5.14.21-150400.24.69.1</li>
                        
                            <li>kernel-default-devel-5.14.21-150400.24.69.1</li>
                        
                            <li>kernel-default-optional-5.14.21-150400.24.69.1</li>
                        
                            <li>dlm-kmp-default-5.14.21-150400.24.69.1</li>
                        
                            <li>kernel-default-debugsource-5.14.21-150400.24.69.1</li>
                        
                            <li>kernel-default-livepatch-5.14.21-150400.24.69.1</li>
                        
                            <li>kernel-default-livepatch-devel-5.14.21-150400.24.69.1</li>
                        
                            <li>kernel-default-debuginfo-5.14.21-150400.24.69.1</li>
                        
                            <li>reiserfs-kmp-default-debuginfo-5.14.21-150400.24.69.1</li>
                        
                            <li>cluster-md-kmp-default-debuginfo-5.14.21-150400.24.69.1</li>
                        
                            <li>ocfs2-kmp-default-5.14.21-150400.24.69.1</li>
                        
                            <li>kernel-syms-5.14.21-150400.24.69.1</li>
                        
                            <li>dlm-kmp-default-debuginfo-5.14.21-150400.24.69.1</li>
                        
                            <li>ocfs2-kmp-default-debuginfo-5.14.21-150400.24.69.1</li>
                        
                            <li>kernel-obs-build-5.14.21-150400.24.69.1</li>
                        
                            <li>kernel-obs-build-debugsource-5.14.21-150400.24.69.1</li>
                        
                            <li>cluster-md-kmp-default-5.14.21-150400.24.69.1</li>
                        
                            <li>kernel-default-devel-debuginfo-5.14.21-150400.24.69.1</li>
                        
                            <li>kernel-default-extra-debuginfo-5.14.21-150400.24.69.1</li>
                        
                            <li>gfs2-kmp-default-debuginfo-5.14.21-150400.24.69.1</li>
                        
                            <li>kernel-default-optional-debuginfo-5.14.21-150400.24.69.1</li>
                        
                            <li>gfs2-kmp-default-5.14.21-150400.24.69.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    openSUSE Leap 15.4 (nosrc ppc64le x86_64)
                    <ul>
                        
                            <li>kernel-debug-5.14.21-150400.24.69.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    openSUSE Leap 15.4 (ppc64le x86_64)
                    <ul>
                        
                            <li>kernel-debug-livepatch-devel-5.14.21-150400.24.69.1</li>
                        
                            <li>kernel-debug-devel-5.14.21-150400.24.69.1</li>
                        
                            <li>kernel-debug-debuginfo-5.14.21-150400.24.69.1</li>
                        
                            <li>kernel-debug-debugsource-5.14.21-150400.24.69.1</li>
                        
                            <li>kernel-debug-devel-debuginfo-5.14.21-150400.24.69.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 nosrc)
                    <ul>
                        
                            <li>kernel-default-5.14.21-150400.24.69.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    openSUSE Leap 15.4 (aarch64 ppc64le x86_64)
                    <ul>
                        
                            <li>kernel-kvmsmall-debugsource-5.14.21-150400.24.69.1</li>
                        
                            <li>kernel-default-base-rebuild-5.14.21-150400.24.69.1.150400.24.31.1</li>
                        
                            <li>kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.69.1</li>
                        
                            <li>kernel-kvmsmall-devel-debuginfo-5.14.21-150400.24.69.1</li>
                        
                            <li>kernel-kvmsmall-devel-5.14.21-150400.24.69.1</li>
                        
                            <li>kernel-default-base-5.14.21-150400.24.69.1.150400.24.31.1</li>
                        
                            <li>kernel-kvmsmall-debuginfo-5.14.21-150400.24.69.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    openSUSE Leap 15.4 (noarch)
                    <ul>
                        
                            <li>kernel-docs-html-5.14.21-150400.24.69.1</li>
                        
                            <li>kernel-source-5.14.21-150400.24.69.1</li>
                        
                            <li>kernel-macros-5.14.21-150400.24.69.1</li>
                        
                            <li>kernel-source-vanilla-5.14.21-150400.24.69.1</li>
                        
                            <li>kernel-devel-5.14.21-150400.24.69.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    openSUSE Leap 15.4 (noarch nosrc)
                    <ul>
                        
                            <li>kernel-docs-5.14.21-150400.24.69.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    openSUSE Leap 15.4 (aarch64 nosrc ppc64le x86_64)
                    <ul>
                        
                            <li>kernel-kvmsmall-5.14.21-150400.24.69.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    openSUSE Leap 15.4 (nosrc s390x)
                    <ul>
                        
                            <li>kernel-zfcpdump-5.14.21-150400.24.69.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    openSUSE Leap 15.4 (s390x)
                    <ul>
                        
                            <li>kernel-zfcpdump-debugsource-5.14.21-150400.24.69.1</li>
                        
                            <li>kernel-zfcpdump-debuginfo-5.14.21-150400.24.69.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    openSUSE Leap 15.4 (aarch64)
                    <ul>
                        
                            <li>ocfs2-kmp-64kb-5.14.21-150400.24.69.1</li>
                        
                            <li>dtb-qcom-5.14.21-150400.24.69.1</li>
                        
                            <li>reiserfs-kmp-64kb-5.14.21-150400.24.69.1</li>
                        
                            <li>dlm-kmp-64kb-5.14.21-150400.24.69.1</li>
                        
                            <li>dtb-mediatek-5.14.21-150400.24.69.1</li>
                        
                            <li>dtb-amazon-5.14.21-150400.24.69.1</li>
                        
                            <li>gfs2-kmp-64kb-5.14.21-150400.24.69.1</li>
                        
                            <li>dtb-arm-5.14.21-150400.24.69.1</li>
                        
                            <li>dtb-apple-5.14.21-150400.24.69.1</li>
                        
                            <li>dtb-socionext-5.14.21-150400.24.69.1</li>
                        
                            <li>dtb-broadcom-5.14.21-150400.24.69.1</li>
                        
                            <li>dtb-freescale-5.14.21-150400.24.69.1</li>
                        
                            <li>dtb-rockchip-5.14.21-150400.24.69.1</li>
                        
                            <li>kernel-64kb-extra-debuginfo-5.14.21-150400.24.69.1</li>
                        
                            <li>kernel-64kb-livepatch-devel-5.14.21-150400.24.69.1</li>
                        
                            <li>kernel-64kb-extra-5.14.21-150400.24.69.1</li>
                        
                            <li>kernel-64kb-optional-debuginfo-5.14.21-150400.24.69.1</li>
                        
                            <li>kernel-64kb-devel-debuginfo-5.14.21-150400.24.69.1</li>
                        
                            <li>dtb-nvidia-5.14.21-150400.24.69.1</li>
                        
                            <li>dtb-renesas-5.14.21-150400.24.69.1</li>
                        
                            <li>dtb-amd-5.14.21-150400.24.69.1</li>
                        
                            <li>kernel-64kb-debuginfo-5.14.21-150400.24.69.1</li>
                        
                            <li>dlm-kmp-64kb-debuginfo-5.14.21-150400.24.69.1</li>
                        
                            <li>dtb-amlogic-5.14.21-150400.24.69.1</li>
                        
                            <li>dtb-cavium-5.14.21-150400.24.69.1</li>
                        
                            <li>dtb-lg-5.14.21-150400.24.69.1</li>
                        
                            <li>dtb-hisilicon-5.14.21-150400.24.69.1</li>
                        
                            <li>kernel-64kb-optional-5.14.21-150400.24.69.1</li>
                        
                            <li>kernel-64kb-debugsource-5.14.21-150400.24.69.1</li>
                        
                            <li>gfs2-kmp-64kb-debuginfo-5.14.21-150400.24.69.1</li>
                        
                            <li>dtb-exynos-5.14.21-150400.24.69.1</li>
                        
                            <li>cluster-md-kmp-64kb-debuginfo-5.14.21-150400.24.69.1</li>
                        
                            <li>dtb-allwinner-5.14.21-150400.24.69.1</li>
                        
                            <li>dtb-marvell-5.14.21-150400.24.69.1</li>
                        
                            <li>ocfs2-kmp-64kb-debuginfo-5.14.21-150400.24.69.1</li>
                        
                            <li>dtb-altera-5.14.21-150400.24.69.1</li>
                        
                            <li>dtb-sprd-5.14.21-150400.24.69.1</li>
                        
                            <li>dtb-xilinx-5.14.21-150400.24.69.1</li>
                        
                            <li>kernel-64kb-devel-5.14.21-150400.24.69.1</li>
                        
                            <li>dtb-apm-5.14.21-150400.24.69.1</li>
                        
                            <li>cluster-md-kmp-64kb-5.14.21-150400.24.69.1</li>
                        
                            <li>reiserfs-kmp-64kb-debuginfo-5.14.21-150400.24.69.1</li>
                        
                            <li>kselftests-kmp-64kb-debuginfo-5.14.21-150400.24.69.1</li>
                        
                            <li>kselftests-kmp-64kb-5.14.21-150400.24.69.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    openSUSE Leap 15.4 (nosrc)
                    <ul>
                        
                            <li>dtb-aarch64-5.14.21-150400.24.69.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    openSUSE Leap 15.4 (aarch64 nosrc)
                    <ul>
                        
                            <li>kernel-64kb-5.14.21-150400.24.69.1</li>
                        
                    </ul>
                </li>
            
        
            
                <li>
                    SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 nosrc s390x x86_64)
                    <ul>
                        
                            <li>kernel-default-5.14.21-150400.24.69.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 x86_64)
                    <ul>
                        
                            <li>kernel-default-base-5.14.21-150400.24.69.1.150400.24.31.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
                    <ul>
                        
                            <li>kernel-default-debuginfo-5.14.21-150400.24.69.1</li>
                        
                            <li>kernel-default-debugsource-5.14.21-150400.24.69.1</li>
                        
                    </ul>
                </li>
            
        
            
                <li>
                    SUSE Linux Enterprise Micro 5.3 (aarch64 nosrc s390x x86_64)
                    <ul>
                        
                            <li>kernel-default-5.14.21-150400.24.69.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    SUSE Linux Enterprise Micro 5.3 (aarch64 x86_64)
                    <ul>
                        
                            <li>kernel-default-base-5.14.21-150400.24.69.1.150400.24.31.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
                    <ul>
                        
                            <li>kernel-default-debuginfo-5.14.21-150400.24.69.1</li>
                        
                            <li>kernel-default-debugsource-5.14.21-150400.24.69.1</li>
                        
                    </ul>
                </li>
            
        
            
                <li>
                    SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 nosrc s390x x86_64)
                    <ul>
                        
                            <li>kernel-default-5.14.21-150400.24.69.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 x86_64)
                    <ul>
                        
                            <li>kernel-default-base-5.14.21-150400.24.69.1.150400.24.31.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
                    <ul>
                        
                            <li>kernel-default-debuginfo-5.14.21-150400.24.69.1</li>
                        
                            <li>kernel-default-debugsource-5.14.21-150400.24.69.1</li>
                        
                    </ul>
                </li>
            
        
            
                <li>
                    SUSE Linux Enterprise Micro 5.4 (aarch64 nosrc s390x x86_64)
                    <ul>
                        
                            <li>kernel-default-5.14.21-150400.24.69.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    SUSE Linux Enterprise Micro 5.4 (aarch64 x86_64)
                    <ul>
                        
                            <li>kernel-default-base-5.14.21-150400.24.69.1.150400.24.31.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
                    <ul>
                        
                            <li>kernel-default-debuginfo-5.14.21-150400.24.69.1</li>
                        
                            <li>kernel-default-debugsource-5.14.21-150400.24.69.1</li>
                        
                    </ul>
                </li>
            
        
    </ul>

    
        <h2>References:</h2>
        <ul>
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-1077.html">https://www.suse.com/security/cve/CVE-2023-1077.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-1249.html">https://www.suse.com/security/cve/CVE-2023-1249.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-1829.html">https://www.suse.com/security/cve/CVE-2023-1829.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-21102.html">https://www.suse.com/security/cve/CVE-2023-21102.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-3090.html">https://www.suse.com/security/cve/CVE-2023-3090.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-3111.html">https://www.suse.com/security/cve/CVE-2023-3111.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-3141.html">https://www.suse.com/security/cve/CVE-2023-3141.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-3161.html">https://www.suse.com/security/cve/CVE-2023-3161.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-3212.html">https://www.suse.com/security/cve/CVE-2023-3212.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-3357.html">https://www.suse.com/security/cve/CVE-2023-3357.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-3358.html">https://www.suse.com/security/cve/CVE-2023-3358.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-3389.html">https://www.suse.com/security/cve/CVE-2023-3389.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-35788.html">https://www.suse.com/security/cve/CVE-2023-35788.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-35823.html">https://www.suse.com/security/cve/CVE-2023-35823.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-35828.html">https://www.suse.com/security/cve/CVE-2023-35828.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-35829.html">https://www.suse.com/security/cve/CVE-2023-35829.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1065729">https://bugzilla.suse.com/show_bug.cgi?id=1065729</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1152472">https://bugzilla.suse.com/show_bug.cgi?id=1152472</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1152489">https://bugzilla.suse.com/show_bug.cgi?id=1152489</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1160435">https://bugzilla.suse.com/show_bug.cgi?id=1160435</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1187829">https://bugzilla.suse.com/show_bug.cgi?id=1187829</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1189998">https://bugzilla.suse.com/show_bug.cgi?id=1189998</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1194869">https://bugzilla.suse.com/show_bug.cgi?id=1194869</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1205758">https://bugzilla.suse.com/show_bug.cgi?id=1205758</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1208410">https://bugzilla.suse.com/show_bug.cgi?id=1208410</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1208600">https://bugzilla.suse.com/show_bug.cgi?id=1208600</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1209039">https://bugzilla.suse.com/show_bug.cgi?id=1209039</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1209367">https://bugzilla.suse.com/show_bug.cgi?id=1209367</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1210335">https://bugzilla.suse.com/show_bug.cgi?id=1210335</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1211299">https://bugzilla.suse.com/show_bug.cgi?id=1211299</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1211346">https://bugzilla.suse.com/show_bug.cgi?id=1211346</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1211387">https://bugzilla.suse.com/show_bug.cgi?id=1211387</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1211410">https://bugzilla.suse.com/show_bug.cgi?id=1211410</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1211449">https://bugzilla.suse.com/show_bug.cgi?id=1211449</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1211796">https://bugzilla.suse.com/show_bug.cgi?id=1211796</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1211852">https://bugzilla.suse.com/show_bug.cgi?id=1211852</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1212051">https://bugzilla.suse.com/show_bug.cgi?id=1212051</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1212129">https://bugzilla.suse.com/show_bug.cgi?id=1212129</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1212154">https://bugzilla.suse.com/show_bug.cgi?id=1212154</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1212155">https://bugzilla.suse.com/show_bug.cgi?id=1212155</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1212158">https://bugzilla.suse.com/show_bug.cgi?id=1212158</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1212265">https://bugzilla.suse.com/show_bug.cgi?id=1212265</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1212350">https://bugzilla.suse.com/show_bug.cgi?id=1212350</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1212448">https://bugzilla.suse.com/show_bug.cgi?id=1212448</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1212494">https://bugzilla.suse.com/show_bug.cgi?id=1212494</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1212495">https://bugzilla.suse.com/show_bug.cgi?id=1212495</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1212504">https://bugzilla.suse.com/show_bug.cgi?id=1212504</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1212513">https://bugzilla.suse.com/show_bug.cgi?id=1212513</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1212540">https://bugzilla.suse.com/show_bug.cgi?id=1212540</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1212561">https://bugzilla.suse.com/show_bug.cgi?id=1212561</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1212563">https://bugzilla.suse.com/show_bug.cgi?id=1212563</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1212564">https://bugzilla.suse.com/show_bug.cgi?id=1212564</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1212584">https://bugzilla.suse.com/show_bug.cgi?id=1212584</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1212592">https://bugzilla.suse.com/show_bug.cgi?id=1212592</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1212603">https://bugzilla.suse.com/show_bug.cgi?id=1212603</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1212605">https://bugzilla.suse.com/show_bug.cgi?id=1212605</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1212606">https://bugzilla.suse.com/show_bug.cgi?id=1212606</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1212619">https://bugzilla.suse.com/show_bug.cgi?id=1212619</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1212701">https://bugzilla.suse.com/show_bug.cgi?id=1212701</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1212741">https://bugzilla.suse.com/show_bug.cgi?id=1212741</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1212835">https://bugzilla.suse.com/show_bug.cgi?id=1212835</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1212838">https://bugzilla.suse.com/show_bug.cgi?id=1212838</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1212842">https://bugzilla.suse.com/show_bug.cgi?id=1212842</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1212861">https://bugzilla.suse.com/show_bug.cgi?id=1212861</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1212869">https://bugzilla.suse.com/show_bug.cgi?id=1212869</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1212892">https://bugzilla.suse.com/show_bug.cgi?id=1212892</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://jira.suse.com/browse/PED-3931">https://jira.suse.com/browse/PED-3931</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://jira.suse.com/browse/SLE-19253">https://jira.suse.com/browse/SLE-19253</a>
                    </li>
                
            
        </ul>
    
</div>