<div class="container">
    <h1>Security update for the Linux Kernel</h1>

    <table class="table table-striped table-bordered">
        <tbody>
        <tr>
            <th>Announcement ID:</th>
            <td>SUSE-SU-2023:3376-1</td>
        </tr>
        
        <tr>
            <th>Rating:</th>
            <td>important</td>
        </tr>
        <tr>
            <th>References:</th>
            <td>
                <ul>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1206418">#1206418</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1207129">#1207129</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1207948">#1207948</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1210627">#1210627</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1210780">#1210780</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1210825">#1210825</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1211131">#1211131</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1211738">#1211738</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1211811">#1211811</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1212445">#1212445</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1212502">#1212502</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1212604">#1212604</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1212766">#1212766</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1212901">#1212901</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1213167">#1213167</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1213272">#1213272</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1213287">#1213287</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1213304">#1213304</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1213417">#1213417</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1213578">#1213578</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1213585">#1213585</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1213586">#1213586</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1213588">#1213588</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1213601">#1213601</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1213620">#1213620</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1213632">#1213632</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1213653">#1213653</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1213713">#1213713</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1213715">#1213715</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1213747">#1213747</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1213756">#1213756</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1213759">#1213759</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1213777">#1213777</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1213810">#1213810</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1213812">#1213812</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1213856">#1213856</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1213857">#1213857</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1213863">#1213863</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1213867">#1213867</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1213870">#1213870</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1213871">#1213871</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1213872">#1213872</a>
                        </li>
                    
                    
                </ul>
            </td>
        </tr>
        
            <tr>
                <th>
                    Cross-References:
                </th>
                <td>
                    <ul>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2022-40982.html">CVE-2022-40982</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-0459.html">CVE-2023-0459</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-20569.html">CVE-2023-20569</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-21400.html">CVE-2023-21400</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-2156.html">CVE-2023-2156</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-2166.html">CVE-2023-2166</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-31083.html">CVE-2023-31083</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-3268.html">CVE-2023-3268</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-3567.html">CVE-2023-3567</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-3609.html">CVE-2023-3609</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-3611.html">CVE-2023-3611</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-3776.html">CVE-2023-3776</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-38409.html">CVE-2023-38409</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-3863.html">CVE-2023-3863</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-4004.html">CVE-2023-4004</a>
                        </li>
                    
                    </ul>
                </td>
            </tr>
            <tr>
                <th>CVSS scores:</th>
                <td>
                    <ul class="list-group">
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2022-40982</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">6.2</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2022-40982</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">6.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-0459</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">4.7</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-0459</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">6.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-20569</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.6</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-20569</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-21400</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">6.7</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-21400</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">6.7</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-2156</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-2156</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-2166</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-2166</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-31083</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-31083</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">4.7</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-3268</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">6.1</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-3268</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.1</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-3567</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.8</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-3567</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">6.7</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-3609</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.0</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-3609</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.8</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-3611</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">6.7</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-3611</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.8</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-3776</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">6.7</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-3776</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.8</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-38409</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">2.9</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-38409</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-3863</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.4</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-3863</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">6.4</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-4004</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.8</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-4004</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.8</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                    </ul>
                </td>
            </tr>
        
        <tr>
            <th>Affected Products:</th>
            <td>
                <ul class="list-group">
                    
                        <li class="list-group-item">openSUSE Leap 15.5</li>
                    
                        <li class="list-group-item">Public Cloud Module 15-SP5</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise High Performance Computing 15 SP5</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Server 15 SP5</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Server for SAP Applications 15 SP5</li>
                    
                </ul>
            </td>
        </tr>
        </tbody>
    </table>

    <p>An update that solves 15 vulnerabilities and has 27 fixes can now be installed.</p>

    <h2>Description:</h2>
    <p>The SUSE Linux Enterprise 15 SP5 Azure kernel was updated to receive various security and bugfixes.</p>
<p>The following security bugs were fixed:</p>
<ul>
<li>CVE-2023-20569: Fixed side channel attack â€˜Inception’ or â€˜RAS Poisoning’ (bsc#1213287).</li>
<li>CVE-2023-3268: Fixed an out of bounds memory access flaw in relay_file_read_start_pos in the relayfs (bsc#1212502).</li>
<li>CVE-2023-2166: Fixed NULL pointer dereference in can_rcv_filter (bsc#1210627).</li>
<li>CVE-2023-0459: Fixed information leak in __uaccess_begin_nospec (bsc#1211738).</li>
<li>CVE-2023-4004: Fixed improper element removal netfilter nft_set_pipapo (bsc#1213812).</li>
<li>CVE-2023-2156: Fixed a flaw in the networking subsystem within the handling of the RPL protocol (bsc#1211131).</li>
<li>CVE-2023-21400: Fixed several memory corruptions due to improper locking in io_uring (bsc#1213272).</li>
<li>CVE-2023-3776: Fixed improper refcount update in  cls_fw leads to use-after-free (bsc#1213588).</li>
<li>CVE-2023-3863: Fixed a use-after-free flaw in nfc_llcp_find_local in net/nfc/llcp_core.c in NFC. This flaw allowed a local user with special privileges to impact a kernel information leak issue (bsc#1213601).</li>
<li>CVE-2023-3567: Fixed a use-after-free in vcs_read in drivers/tty/vt/vc_screen.c (bsc#1213167).</li>
<li>CVE-2023-31083: Fixed race condition in hci_uart_tty_ioctl (bsc#1210780).</li>
<li>CVE-2023-3609: Fixed reference counter leak leading to  overflow in net/sched (bsc#1213586).</li>
<li>CVE-2023-3611: Fixed an out-of-bounds write in net/sched sch_qfq(bsc#1213585).</li>
<li>CVE-2023-38409: Fixed an issue in set_con2fb_map in drivers/video/fbdev/core/fbcon.c. Because an assignment occurs only for the first vc, the fbcon_registered_fb and fbcon_display arrays can be desynchronized in fbcon_mode_deleted (the con2fb_map points at the old fb_info) (bsc#1213417).</li>
<li>CVE-2022-40982: Fixed transient execution attack called "Gather Data Sampling" (bsc#1206418).</li>
</ul>
<p>The following non-security bugs were fixed:</p>
<ul>
<li>ACPI: CPPC: Add ACPI disabled check to acpi_cpc_valid() (bsc#1212445).</li>
<li>ACPI: CPPC: Add definition for undefined FADT preferred PM profile value (bsc#1212445).</li>
<li>ACPI: utils: Fix acpi_evaluate_dsm_typed() redefinition error (git-fixes).</li>
<li>ACPI/IORT: Remove erroneous id_count check in iort_node_get_rmr_info() (git-fixes).</li>
<li>afs: Adjust ACK interpretation to try and cope with NAT (git-fixes).</li>
<li>afs: Fix access after dec in put functions (git-fixes).</li>
<li>afs: Fix afs_getattr() to refetch file status if callback break occurred (git-fixes).</li>
<li>afs: Fix dynamic root getattr (git-fixes).</li>
<li>afs: Fix fileserver probe RTT handling (git-fixes).</li>
<li>afs: Fix infinite loop found by xfstest generic/676 (git-fixes).</li>
<li>afs: Fix lost servers_outstanding count (git-fixes).</li>
<li>afs: Fix server->active leak in afs_put_server (git-fixes).</li>
<li>afs: Fix setting of mtime when creating a file/dir/symlink (git-fixes).</li>
<li>afs: Fix updating of i_size with dv jump from server (git-fixes).</li>
<li>afs: Fix vlserver probe RTT handling (git-fixes).</li>
<li>afs: Return -EAGAIN, not -EREMOTEIO, when a file already locked (git-fixes).</li>
<li>afs: Use refcount_t rather than atomic_t (git-fixes).</li>
<li>afs: Use the operation issue time instead of the reply time for callbacks (git-fixes).</li>
<li>ALSA: emu10k1: roll up loops in DSP setup code for Audigy (git-fixes).</li>
<li>ALSA: hda/realtek - remove 3k pull low procedure (git-fixes).</li>
<li>ALSA: hda/realtek: Add quirk for Clevo NS70AU (git-fixes).</li>
<li>ALSA: hda/realtek: Add support for DELL Oasis 13/14/16 laptops (git-fixes).</li>
<li>ALSA: hda/realtek: Enable Mute LED on HP Laptop 15s-eq2xxx (git-fixes).</li>
<li>ALSA: hda/realtek: Fix generic fixup definition for cs35l41 amp (git-fixes).</li>
<li>ALSA: hda/realtek: Support ASUS G713PV laptop (git-fixes).</li>
<li>ALSA: hda/relatek: Enable Mute LED on HP 250 G8 (git-fixes).</li>
<li>ALSA: usb-audio: Add FIXED_RATE quirk for JBL Quantum610 Wireless (git-fixes).</li>
<li>ALSA: usb-audio: Add new quirk FIXED_RATE for JBL Quantum810 Wireless (git-fixes).</li>
<li>ALSA: usb-audio: Add quirk for Microsoft Modern Wireless Headset (bsc#1207129).</li>
<li>ALSA: usb-audio: Add quirk for Tascam Model 12 (git-fixes).</li>
<li>ALSA: usb-audio: Always initialize fixed_rate in snd_usb_find_implicit_fb_sync_format() (git-fixes).</li>
<li>ALSA: usb-audio: Apply mutex around snd_usb_endpoint_set_params() (git-fixes).</li>
<li>ALSA: usb-audio: Avoid superfluous endpoint setup (git-fixes).</li>
<li>ALSA: usb-audio: Avoid unnecessary interface change at EP close (git-fixes).</li>
<li>ALSA: usb-audio: Clear fixed clock rate at closing EP (git-fixes).</li>
<li>ALSA: usb-audio: Correct the return code from snd_usb_endpoint_set_params() (git-fixes).</li>
<li>ALSA: usb-audio: Drop superfluous interface setup at parsing (git-fixes).</li>
<li>ALSA: usb-audio: Fix possible NULL pointer dereference in snd_usb_pcm_has_fixed_rate() (git-fixes).</li>
<li>ALSA: usb-audio: Fix wrong kfree issue in snd_usb_endpoint_free_all (git-fixes).</li>
<li>ALSA: usb-audio: More refactoring of hw constraint rules (git-fixes).</li>
<li>ALSA: usb-audio: Properly refcounting clock rate (git-fixes).</li>
<li>ALSA: usb-audio: Rate limit usb_set_interface error reporting (git-fixes).</li>
<li>ALSA: usb-audio: Refcount multiple accesses on the single clock (git-fixes).</li>
<li>ALSA: usb-audio: Split endpoint setups for hw_params and prepare (take#2) (git-fixes).</li>
<li>ALSA: usb-audio: Update for native DSD support quirks (git-fixes).</li>
<li>ALSA: usb-audio: Use atomic_try_cmpxchg in ep_state_update (git-fixes).</li>
<li>ALSA: usb-audio: Workaround for XRUN at prepare (git-fixes).</li>
<li>amd-pstate: Fix amd_pstate mode switch (git-fixes).</li>
<li>ASoC: amd: acp: fix for invalid dai id handling in acp_get_byte_count() (git-fixes).</li>
<li>ASoC: atmel: Fix the 8K sample parameter in I2SC master (git-fixes).</li>
<li>ASoc: codecs: ES8316: Fix DMIC config (git-fixes).</li>
<li>ASoC: codecs: wcd-mbhc-v2: fix resource leaks on component remove (git-fixes).</li>
<li>ASoC: codecs: wcd934x: fix resource leaks on component remove (git-fixes).</li>
<li>ASoC: codecs: wcd938x: fix codec initialisation race (git-fixes).</li>
<li>ASoC: codecs: wcd938x: fix dB range for HPHL and HPHR (git-fixes).</li>
<li>ASoC: codecs: wcd938x: fix missing clsh ctrl error handling (git-fixes).</li>
<li>ASoC: codecs: wcd938x: fix soundwire initialisation race (git-fixes).</li>
<li>ASoC: da7219: Check for failure reading AAD IRQ events (git-fixes).</li>
<li>ASoC: da7219: Flush pending AAD IRQ when suspending (git-fixes).</li>
<li>ASoC: fsl_sai: Disable bit clock with transmitter (git-fixes).</li>
<li>ASoC: fsl_spdif: Silence output on stop (git-fixes).</li>
<li>ASoC: rt5640: Fix sleep in atomic context (git-fixes).</li>
<li>ASoC: rt5682-sdw: fix for JD event handling in ClockStop Mode0 (git-fixes).</li>
<li>ASoC: rt711-sdca: fix for JD event handling in ClockStop Mode0 (git-fixes).</li>
<li>ASoC: rt711: fix for JD event handling in ClockStop Mode0 (git-fixes).</li>
<li>ASoC: SOF: ipc3-dtrace: uninitialized data in dfsentry_trace_filter_write() (git-fixes).</li>
<li>ASoC: tegra: Fix ADX byte map (git-fixes).</li>
<li>ASoC: tegra: Fix AMX byte map (git-fixes).</li>
<li>ASoC: wm8904: Fill the cache for WM8904_ADC_TEST_0 register (git-fixes).</li>
<li>ata: pata_ns87415: mark ns87560_tf_read static (git-fixes).</li>
<li>block, bfq: Fix division by zero error on zero wsum (bsc#1213653).</li>
<li>block: Fix a source code comment in include/uapi/linux/blkzoned.h (git-fixes).</li>
<li>Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO (bsc#1210780 CVE-2023-31083).</li>
<li>bpf: add missing header file include (bsc#1211738 CVE-2023-0459).</li>
<li>bus: mhi: add new interfaces to handle MHI channels directly (bsc#1207948).</li>
<li>bus: mhi: host: add destroy_device argument to mhi_power_down() (bsc#1207948).</li>
<li>can: af_can: fix NULL pointer dereference in can_rcv_filter (bsc#1210627 CVE-2023-2166).</li>
<li>can: af_can: fix NULL pointer dereference in can_rcv_filter (bsc#1210627 CVE-2023-2166).</li>
<li>can: gs_usb: gs_can_close(): add missing set of CAN state to CAN_STATE_STOPPED (git-fixes).</li>
<li>ceph: do not let check_caps skip sending responses for revoke msgs (bsc#1213856).</li>
<li>coda: Avoid partial allocation of sig_inputArgs (git-fixes).</li>
<li>cpufreq: amd_pstate: fix wrong lowest perf fetch (bsc#1212445).</li>
<li>cpufreq: amd_pstate: map desired perf into pstate scope for powersave governor (bsc#1212445).</li>
<li>cpufreq: amd-pstate: Add ->fast_switch() callback (bsc#1212445).</li>
<li>cpufreq: amd-pstate: Add AMD P-State frequencies attributes (bsc#1212445).</li>
<li>cpufreq: amd-pstate: Add AMD P-State performance attributes (bsc#1212445).</li>
<li>cpufreq: amd-pstate: add amd-pstate driver parameter for mode selection (bsc#1212445).</li>
<li>cpufreq: amd-pstate: Add boost mode support for AMD P-State (bsc#1212445).</li>
<li>cpufreq: amd-pstate: add driver working mode switch support (bsc#1212445).</li>
<li>cpufreq: amd-pstate: Add fast switch function for AMD P-State (bsc#1212445).</li>
<li>cpufreq: amd-pstate: Add guided autonomous mode (bsc#1212445).</li>
<li>cpufreq: amd-pstate: Add guided mode control support via sysfs (bsc#1212445).</li>
<li>cpufreq: amd-pstate: Add more tracepoint for AMD P-State module (bsc#1212445).</li>
<li>cpufreq: amd-pstate: Add resume and suspend callbacks (bsc#1212445).</li>
<li>cpufreq: amd-pstate: Add trace for AMD P-State module (bsc#1212445).</li>
<li>cpufreq: amd-pstate: avoid uninitialized variable use (bsc#1212445).</li>
<li>cpufreq: amd-pstate: change amd-pstate driver to be built-in type (bsc#1212445).</li>
<li>cpufreq: amd-pstate: convert sprintf with sysfs_emit() (bsc#1212445).</li>
<li>cpufreq: amd-pstate: cpufreq: amd-pstate: reset MSR_AMD_PERF_CTL register at init (bsc#1212445).</li>
<li>cpufreq: amd-pstate: Expose struct amd_cpudata (bsc#1212445).</li>
<li>cpufreq: amd-pstate: Fix initial highest_perf value (bsc#1212445).</li>
<li>cpufreq: amd-pstate: Fix invalid write to MSR_AMD_CPPC_REQ (bsc#1212445).</li>
<li>cpufreq: amd-pstate: Fix Kconfig dependencies for AMD P-State (bsc#1212445).</li>
<li>cpufreq: amd-pstate: fix kernel hang issue while amd-pstate unregistering (bsc#1212445).</li>
<li>cpufreq: amd-pstate: Fix struct amd_cpudata kernel-doc comment (bsc#1212445).</li>
<li>cpufreq: amd-pstate: fix white-space (bsc#1212445).</li>
<li>cpufreq: amd-pstate: implement amd pstate cpu online and offline callback (bsc#1212445).</li>
<li>cpufreq: amd-pstate: implement Pstate EPP support for the AMD processors (bsc#1212445).</li>
<li>cpufreq: amd-pstate: implement suspend and resume callbacks (bsc#1212445).</li>
<li>cpufreq: amd-pstate: Introduce a new AMD P-State driver to support future processors (bsc#1212445).</li>
<li>cpufreq: amd-pstate: Introduce the support for the processors with shared memory solution (bsc#1212445).</li>
<li>cpufreq: amd-pstate: Let user know amd-pstate is disabled (bsc#1212445).</li>
<li>cpufreq: amd-pstate: Make amd-pstate EPP driver name hyphenated (bsc#1212445).</li>
<li>cpufreq: amd-pstate: Make varaiable mode_state_machine static (bsc#1212445).</li>
<li>cpufreq: amd-pstate: optimize driver working mode selection in amd_pstate_param() (bsc#1212445).</li>
<li>cpufreq: amd-pstate: Remove fast_switch_possible flag from active driver (bsc#1212445).</li>
<li>cpufreq: amd-pstate: remove MODULE_LICENSE in non-modules (bsc#1212445).</li>
<li>cpufreq: amd-pstate: Set a fallback policy based on preferred_profile (bsc#1212445).</li>
<li>cpufreq: amd-pstate: simplify cpudata pointer assignment (bsc#1212445).</li>
<li>cpufreq: amd-pstate: Update policy->cur in amd_pstate_adjust_perf() (bsc#1212445).</li>
<li>cpufreq: amd-pstate: update pstate frequency transition delay time (bsc#1212445).</li>
<li>cpufreq: amd-pstate: Write CPPC enable bit per-socket (bsc#1212445).</li>
<li>crypto: kpp - Add helper to set reqsize (git-fixes).</li>
<li>crypto: qat - Use helper to set reqsize (git-fixes).</li>
<li>dlm: fix missing lkb refcount handling (git-fixes).</li>
<li>dlm: fix plock invalid read (git-fixes).</li>
<li>Documentation: cpufreq: amd-pstate: Move amd_pstate param to alphabetical order (bsc#1212445).</li>
<li>Documentation: devices.txt: reconcile serial/ucc_uart minor numers (git-fixes).</li>
<li>drm/amd: Fix an error handling mistake in psp_sw_init() (git-fixes).</li>
<li>drm/amd/display: Add monitor specific edid quirk (git-fixes).</li>
<li>drm/amd/display: Add polling method to handle MST reply packet (bsc#1213578).</li>
<li>drm/amd/display: check TG is non-null before checking if enabled (git-fixes).</li>
<li>drm/amd/display: Correct <code>DMUB_FW_VERSION</code> macro (git-fixes).</li>
<li>drm/amd/display: Disable MPC split by default on special asic (git-fixes).</li>
<li>drm/amd/display: fix access hdcp_workqueue assert (git-fixes).</li>
<li>drm/amd/display: fix seamless odm transitions (git-fixes).</li>
<li>drm/amd/display: Keep PHY active for DP displays on DCN31 (git-fixes).</li>
<li>drm/amd/display: only accept async flips for fast updates (git-fixes).</li>
<li>drm/amd/display: Only update link settings after successful MST link train (git-fixes).</li>
<li>drm/amd/display: phase3 mst hdcp for multiple displays (git-fixes).</li>
<li>drm/amd/display: Remove Phantom Pipe Check When Calculating K1 and K2 (git-fixes).</li>
<li>drm/amd/display: save restore hdcp state when display is unplugged from mst hub (git-fixes).</li>
<li>drm/amd/display: Unlock on error path in dm_handle_mst_sideband_msg_ready_event() (git-fixes).</li>
<li>drm/amd/pm: add abnormal fan detection for smu 13.0.0 (git-fixes).</li>
<li>drm/amd/pm: conditionally disable pcie lane/speed switching for SMU13 (git-fixes).</li>
<li>drm/amd/pm: re-enable the gfx imu when smu resume (git-fixes).</li>
<li>drm/amd/pm: share the code around SMU13 pcie parameters update (git-fixes).</li>
<li>drm/amdgpu: add the fan abnormal detection feature (git-fixes).</li>
<li>drm/amdgpu: avoid restore process run into dead loop (git-fixes).</li>
<li>drm/amdgpu: fix clearing mappings for BOs that are always valid in VM (git-fixes).</li>
<li>drm/amdgpu: Fix minmax warning (git-fixes).</li>
<li>drm/atomic: Allow vblank-enabled + self-refresh "disable" (git-fixes).</li>
<li>drm/atomic: Fix potential use-after-free in nonblocking commits (git-fixes).</li>
<li>drm/bridge: tc358768: Add atomic_get_input_bus_fmts() implementation (git-fixes).</li>
<li>drm/bridge: tc358768: fix TCLK_TRAILCNT computation (git-fixes).</li>
<li>drm/bridge: tc358768: fix THS_TRAILCNT computation (git-fixes).</li>
<li>drm/bridge: tc358768: fix THS_ZEROCNT computation (git-fixes).</li>
<li>drm/bridge: ti-sn65dsi86: Fix auxiliary bus lifetime (git-fixes).</li>
<li>drm/client: Fix memory leak in drm_client_modeset_probe (git-fixes).</li>
<li>drm/dp_mst: Clear MSG_RDY flag before sending new message (bsc#1213578).</li>
<li>drm/i915: Do not preserve dpll_hw_state for slave crtc in Bigjoiner (git-fixes).</li>
<li>drm/i915: Fix an error handling path in igt_write_huge() (git-fixes).</li>
<li>drm/i915/dpt: Use shmem for dpt objects (git-fixes).</li>
<li>drm/i915/tc: Fix system resume MST mode restore for DP-alt sinks (git-fixes).</li>
<li>drm/msm: Fix IS_ERR_OR_NULL() vs NULL check in a5xx_submit_in_rb() (git-fixes).</li>
<li>drm/msm/adreno: Fix snapshot BINDLESS_DATA size (git-fixes).</li>
<li>drm/msm/disp/dpu: get timing engine status from intf status register (git-fixes).</li>
<li>drm/msm/dpu: drop enum dpu_core_perf_data_bus_id (git-fixes).</li>
<li>drm/msm/dpu: Set DPU_DATA_HCTL_EN for in INTF_SC7180_MASK (git-fixes).</li>
<li>drm/radeon: Fix integer overflow in radeon_cs_parser_init (git-fixes).</li>
<li>drm/ttm: fix bulk_move corruption when adding a entry (git-fixes).</li>
<li>drm/ttm: fix warning that we shouldn&#x27;t mix (git-fixes).</li>
<li>drm/vmwgfx: Fix Legacy Display Unit atomic drm support (bsc#1213632).</li>
<li>drm/vmwgfx: Remove explicit and broken vblank handling (bsc#1213632).</li>
<li>drm/vmwgfx: Remove rcu locks from user resources (bsc#1213632).</li>
<li>fbdev: au1200fb: Fix missing IRQ check in au1200fb_drv_probe (git-fixes).</li>
<li>fbdev: imxfb: Removed unneeded release_mem_region (git-fixes).</li>
<li>fbdev: imxfb: warn about invalid left/right margin (git-fixes).</li>
<li>file: always lock position for FMODE_ATOMIC_POS (bsc#1213759).</li>
<li>fs: dlm: add midcomms init/start functions (git-fixes).</li>
<li>fs: dlm: do not set stop rx flag after node reset (git-fixes).</li>
<li>fs: dlm: filter user dlm messages for kernel locks (git-fixes).</li>
<li>fs: dlm: fix log of lowcomms vs midcomms (git-fixes).</li>
<li>fs: dlm: fix race between test_bit() and queue_work() (git-fixes).</li>
<li>fs: dlm: fix race in lowcomms (git-fixes).</li>
<li>fs: dlm: handle -EBUSY first in lock arg validation (git-fixes).</li>
<li>fs: dlm: move sending fin message into state change handling (git-fixes).</li>
<li>fs: dlm: retry accept() until -EAGAIN or error returns (git-fixes).</li>
<li>fs: dlm: return positive pid value for F_GETLK (git-fixes).</li>
<li>fs: dlm: start midcomms before scand (git-fixes).</li>
<li>fs: hfsplus: remove WARN_ON() from hfsplus_cat_{read,write}_inode() (git-fixes).</li>
<li>FS: JFS: Check for read-only mounted filesystem in txBegin (git-fixes).</li>
<li>FS: JFS: Fix null-ptr-deref Read in txBegin (git-fixes).</li>
<li>fs: jfs: Fix UBSAN: array-index-out-of-bounds in dbAllocDmapLev (git-fixes).</li>
<li>gve: Set default duplex configuration to full (git-fixes).</li>
<li>gve: unify driver name usage (git-fixes).</li>
<li>hwmon: (adm1275) Allow setting sample averaging (git-fixes).</li>
<li>hwmon: (k10temp) Enable AMD3255 Proc to show negative temperature (git-fixes).</li>
<li>hwmon: (nct7802) Fix for temp6 (PECI1) processed even if PECI1 disabled (git-fixes).</li>
<li>hwmon: (pmbus/adm1275) Fix problems with temperature monitoring on ADM1272 (git-fixes).</li>
<li>i2c: xiic: Defer xiic_wakeup() and __xiic_start_xfer() in xiic_process() (git-fixes).</li>
<li>i2c: xiic: Do not try to handle more interrupt events after error (git-fixes).</li>
<li>iavf: check for removal state before IAVF_FLAG_PF_COMMS_FAILED (git-fixes).</li>
<li>iavf: fix a deadlock caused by rtnl and driver&#x27;s lock circular dependencies (git-fixes).</li>
<li>iavf: Fix out-of-bounds when setting channels on remove (git-fixes).</li>
<li>iavf: fix potential deadlock on allocation failure (git-fixes).</li>
<li>iavf: fix reset task race with iavf_remove() (git-fixes).</li>
<li>iavf: Fix use-after-free in free_netdev (git-fixes).</li>
<li>iavf: Move netdev_update_features() into watchdog task (git-fixes).</li>
<li>iavf: use internal state to free traffic IRQs (git-fixes).</li>
<li>iavf: Wait for reset in callbacks which trigger it (git-fixes).</li>
<li>IB/hfi1: Use bitmap_zalloc() when applicable (git-fixes)</li>
<li>ice: Fix max_rate check while configuring TX rate limits (git-fixes).</li>
<li>ice: Fix memory management in ice_ethtool_fdir.c (git-fixes).</li>
<li>ice: handle extts in the miscellaneous interrupt thread (git-fixes).</li>
<li>igc: Check if hardware TX timestamping is enabled earlier (git-fixes).</li>
<li>igc: Enable and fix RX hash usage by netstack (git-fixes).</li>
<li>igc: Fix inserting of empty frame for launchtime (git-fixes).</li>
<li>igc: Fix Kernel Panic during ndo_tx_timeout callback (git-fixes).</li>
<li>igc: Fix launchtime before start of cycle (git-fixes).</li>
<li>igc: Fix race condition in PTP tx code (git-fixes).</li>
<li>igc: Handle PPS start time programming for past time values (git-fixes).</li>
<li>igc: Prevent garbled TX queue with XDP ZEROCOPY (git-fixes).</li>
<li>igc: Remove delay during TX ring configuration (git-fixes).</li>
<li>igc: set TP bit in &#x27;supported&#x27; and &#x27;advertising&#x27; fields of ethtool_link_ksettings (git-fixes).</li>
<li>igc: Work around HW bug causing missing timestamps (git-fixes).</li>
<li>Input: i8042 - add Clevo PCX0DX to i8042 quirk table (git-fixes).</li>
<li>Input: iqs269a - do not poll during ATI (git-fixes).</li>
<li>Input: iqs269a - do not poll during suspend or resume (git-fixes).</li>
<li>io_uring: ensure IOPOLL locks around deferred work (bsc#1213272 CVE-2023-21400).</li>
<li>ipv6: rpl: Fix Route of Death (CVE-2023-2156 bsc#1211131).</li>
<li>jffs2: fix memory leak in jffs2_do_fill_super (git-fixes).</li>
<li>jffs2: fix memory leak in jffs2_do_mount_fs (git-fixes).</li>
<li>jffs2: fix memory leak in jffs2_scan_medium (git-fixes).</li>
<li>jffs2: fix use-after-free in jffs2_clear_xattr_subsystem (git-fixes).</li>
<li>jffs2: GC deadlock reading a page that is used in jffs2_write_begin() (git-fixes).</li>
<li>jffs2: reduce stack usage in jffs2_build_xattr_subsystem() (git-fixes).</li>
<li>jfs: jfs_dmap: Validate db_l2nbperpage while mounting (git-fixes).</li>
<li>kabi/severities: relax kABI for ath11k local symbols (bsc#1207948)</li>
<li>kselftest: vDSO: Fix accumulation of uninitialized ret when CLOCK_REALTIME is undefined (git-fixes).</li>
<li>KVM: Add GDS_NO support to KVM (bsc#1206418, CVE-2022-40982).</li>
<li>KVM: arm64: Do not read a HW interrupt pending state in user context (git-fixes)</li>
<li>KVM: arm64: Warn if accessing timer pending state outside of vcpu (bsc#1213620)</li>
<li>KVM: Do not null dereference ops->destroy (git-fixes)</li>
<li>KVM: downgrade two BUG_ONs to WARN_ON_ONCE (git-fixes)</li>
<li>KVM: Initialize debugfs_dentry when a VM is created to avoid NULL (git-fixes)</li>
<li>KVM: s390: pv: fix index value of replaced ASCE (git-fixes bsc#1213867).</li>
<li>KVM: VMX: Inject #GP on ENCLS if vCPU has paging disabled (CR0.PG==0) (git-fixes).</li>
<li>KVM: VMX: Inject #GP, not #UD, if SGX2 ENCLS leafs are unsupported (git-fixes).</li>
<li>KVM: VMX: restore vmx_vmexit alignment (git-fixes).</li>
<li>KVM: x86: Account fastpath-only VM-Exits in vCPU stats (git-fixes).</li>
<li>leds: trigger: netdev: Recheck NETDEV_LED_MODE_LINKUP on dev rename (git-fixes).</li>
<li>libceph: harden msgr2.1 frame segment length checks (bsc#1213857).</li>
<li>md: add error_handlers for raid0 and linear (bsc#1212766).</li>
<li>media: staging: atomisp: select V4L2_FWNODE (git-fixes).</li>
<li>mhi_power_down() kABI workaround (bsc#1207948).</li>
<li>mmc: core: disable TRIM on Kingston EMMC04G-M627 (git-fixes).</li>
<li>mmc: sdhci: fix DMA configure compatibility issue when 64bit DMA mode is used (git-fixes).</li>
<li>net: ena: fix shift-out-of-bounds in exponential backoff (git-fixes).</li>
<li>net: mana: Batch ringing RX queue doorbell on receiving packets (bsc#1212901).</li>
<li>net: mana: Use the correct WQE count for ringing RQ doorbell (bsc#1212901).</li>
<li>net: nfc: Fix use-after-free caused by nfc_llcp_find_local (bsc#1213601 CVE-2023-3863).</li>
<li>net: phy: marvell10g: fix 88x3310 power up (git-fixes).</li>
<li>net/mlx5: DR, Support SW created encap actions for FW table (git-fixes).</li>
<li>net/mlx5e: Check for NOT_READY flag state after locking (git-fixes).</li>
<li>net/mlx5e: fix double free in mlx5e_destroy_flow_table (git-fixes).</li>
<li>net/mlx5e: fix memory leak in mlx5e_fs_tt_redirect_any_create (git-fixes).</li>
<li>net/mlx5e: fix memory leak in mlx5e_ptp_open (git-fixes).</li>
<li>net/mlx5e: XDP, Allow growing tail for XDP multi buffer (git-fixes).</li>
<li>net/mlx5e: xsk: Set napi_id to support busy polling on XSK RQ (git-fixes).</li>
<li>net/sched: cls_fw: Fix improper refcount update leads to use-after-free (CVE-2023-3776 bsc#1213588).</li>
<li>net/sched: cls_u32: Fix reference counter leak leading to overflow (CVE-2023-3609 bsc#1213586).</li>
<li>net/sched: sch_qfq: account for stab overhead in qfq_enqueue (CVE-2023-3611 bsc#1213585).</li>
<li>net/sched: sch_qfq: refactor parsing of netlink parameters (bsc#1213585).</li>
<li>net/sched: sch_qfq: reintroduce lmax bound check for MTU (bsc#1213585).</li>
<li>netfilter: nft_set_pipapo: fix improper element removal (bsc#1213812 CVE-2023-4004).</li>
<li>nfc: llcp: simplify llcp_sock_connect() error paths (bsc#1213601 CVE-2023-3863).</li>
<li>nfsd: add encoding of op_recall flag for write delegation (git-fixes).</li>
<li>nfsd: fix double fget() bug in __write_ports_addfd() (git-fixes).</li>
<li>nfsd: Fix sparse warning (git-fixes).</li>
<li>nfsd: Remove open coding of string copy (git-fixes).</li>
<li>NFSv4.1: Always send a RECLAIM_COMPLETE after establishing lease (git-fixes).</li>
<li>NFSv4.1: freeze the session table upon receiving NFS4ERR_BADSESSION (git-fixes).</li>
<li>nvme-pci: fix DMA direction of unmapping integrity data (git-fixes).</li>
<li>nvme-pci: remove nvme_queue from nvme_iod (git-fixes).</li>
<li>nvme: do not reject probe due to duplicate IDs for single-ported PCIe devices (git-fixes).</li>
<li>nvme: fix the NVME_ID_NS_NVM_STS_MASK definition (git-fixes).</li>
<li>octeontx-af: fix hardware timestamp configuration (git-fixes).</li>
<li>octeontx2-af: Move validation of ptp pointer before its usage (git-fixes).</li>
<li>octeontx2-pf: Add additional check for MCAM rules (git-fixes).</li>
<li>PCI: Add function 1 DMA alias quirk for Marvell 88SE9235 (git-fixes).</li>
<li>PCI/PM: Avoid putting EloPOS E2/S2/H2 PCIe Ports in D3cold (git-fixes).</li>
<li>phy: hisilicon: Fix an out of bounds check in hisi_inno_phy_probe() (git-fixes).</li>
<li>pinctrl: amd: Detect internal GPIO0 debounce handling (git-fixes).</li>
<li>pinctrl: amd: Do not show Invalid config param errors (git-fixes).</li>
<li>pinctrl: amd: Fix mistake in handling clearing pins at startup (git-fixes).</li>
<li>pinctrl: amd: Only use special debounce behavior for GPIO 0 (git-fixes).</li>
<li>pinctrl: amd: Use amd_pinconf_set() for all config options (git-fixes).</li>
<li>platform/x86: msi-laptop: Fix rfkill out-of-sync on MSI Wind U100 (git-fixes).</li>
<li>RDMA/bnxt_re: Fix hang during driver unload (git-fixes)</li>
<li>RDMA/bnxt_re: Prevent handling any completions after qp destroy (git-fixes)</li>
<li>RDMA/core: Update CMA destination address on rdma_resolve_addr (git-fixes)</li>
<li>RDMA/irdma: Add missing read barriers (git-fixes)</li>
<li>RDMA/irdma: Fix data race on CQP completion stats (git-fixes)</li>
<li>RDMA/irdma: Fix data race on CQP request done (git-fixes)</li>
<li>RDMA/irdma: Fix op_type reporting in CQEs (git-fixes)</li>
<li>RDMA/irdma: Report correct WC error (git-fixes)</li>
<li>RDMA/mlx4: Make check for invalid flags stricter (git-fixes)</li>
<li>RDMA/mthca: Fix crash when polling CQ for shared QPs (git-fixes)</li>
<li>regmap: Account for register length in SMBus I/O limits (git-fixes).</li>
<li>regmap: Drop initial version of maximum transfer length fixes (git-fixes).</li>
<li>relayfs: fix out-of-bounds access in relay_file_read (bsc#1212502 CVE-2023-3268).</li>
<li>rxrpc, afs: Fix selection of abort codes (git-fixes).</li>
<li>s390: introduce nospec_uses_trampoline() (git-fixes bsc#1213870).</li>
<li>s390/bpf: Add expoline to tail calls (git-fixes bsc#1213870).</li>
<li>s390/dasd: fix hanging device after quiesce/resume (git-fixes bsc#1213810).</li>
<li>s390/dasd: print copy pair message only for the correct error (git-fixes bsc#1213872).</li>
<li>s390/decompressor: specify __decompress() buf len to avoid overflow (git-fixes bsc#1213863).</li>
<li>s390/ipl: add missing intersection check to ipl_report handling (git-fixes bsc#1213871).</li>
<li>s390/qeth: Fix vipa deletion (git-fixes bsc#1213713).</li>
<li>s390/vmem: fix empty page tables cleanup under KASAN (git-fixes bsc#1213715).</li>
<li>scftorture: Count reschedule IPIs (git-fixes).</li>
<li>scsi: lpfc: Abort outstanding ELS cmds when mailbox timeout error is detected (bsc#1213756).</li>
<li>scsi: lpfc: Avoid -Wstringop-overflow warning (bsc#1213756).</li>
<li>scsi: lpfc: Clean up SLI-4 sysfs resource reporting (bsc#1213756).</li>
<li>scsi: lpfc: Copyright updates for 14.2.0.14 patches (bsc#1213756).</li>
<li>scsi: lpfc: Fix a possible data race in lpfc_unregister_fcf_rescan() (bsc#1213756).</li>
<li>scsi: lpfc: Fix incorrect big endian type assignment in bsg loopback path (bsc#1213756).</li>
<li>scsi: lpfc: Fix incorrect big endian type assignments in FDMI and VMID paths (bsc#1213756).</li>
<li>scsi: lpfc: Fix lpfc_name struct packing (bsc#1213756).</li>
<li>scsi: lpfc: Make fabric zone discovery more robust when handling unsolicited LOGO (bsc#1213756).</li>
<li>scsi: lpfc: Pull out fw diagnostic dump log message from driver&#x27;s trace buffer (bsc#1213756).</li>
<li>scsi: lpfc: Qualify ndlp discovery state when processing RSCN (bsc#1213756).</li>
<li>scsi: lpfc: Refactor cpu affinity assignment paths (bsc#1213756).</li>
<li>scsi: lpfc: Remove extra ndlp kref decrement in FLOGI cmpl for loop topology (bsc#1213756).</li>
<li>scsi: lpfc: Replace all non-returning strlcpy() with strscpy() (bsc#1213756).</li>
<li>scsi: lpfc: Replace one-element array with flexible-array member (bsc#1213756).</li>
<li>scsi: lpfc: Revise ndlp kref handling for dev_loss_tmo_callbk and lpfc_drop_node (bsc#1213756).</li>
<li>scsi: lpfc: Set Establish Image Pair service parameter only for Target Functions (bsc#1213756).</li>
<li>scsi: lpfc: Simplify fcp_abort transport callback log message (bsc#1213756).</li>
<li>scsi: lpfc: Update lpfc version to 14.2.0.14 (bsc#1213756).</li>
<li>scsi: lpfc: Use struct_size() helper (bsc#1213756).</li>
<li>scsi: qla2xxx: Adjust IOCB resource on qpair create (bsc#1213747).</li>
<li>scsi: qla2xxx: Array index may go out of bound (bsc#1213747).</li>
<li>scsi: qla2xxx: Avoid fcport pointer dereference (bsc#1213747).</li>
<li>scsi: qla2xxx: Check valid rport returned by fc_bsg_to_rport() (bsc#1213747).</li>
<li>scsi: qla2xxx: Correct the index of array (bsc#1213747).</li>
<li>scsi: qla2xxx: Drop useless LIST_HEAD (bsc#1213747).</li>
<li>scsi: qla2xxx: Fix buffer overrun (bsc#1213747).</li>
<li>scsi: qla2xxx: Fix command flush during TMF (bsc#1213747).</li>
<li>scsi: qla2xxx: Fix deletion race condition (bsc#1213747).</li>
<li>scsi: qla2xxx: Fix end of loop test (bsc#1213747).</li>
<li>scsi: qla2xxx: Fix erroneous link up failure (bsc#1213747).</li>
<li>scsi: qla2xxx: Fix error code in qla2x00_start_sp() (bsc#1213747).</li>
<li>scsi: qla2xxx: fix inconsistent TMF timeout (bsc#1213747).</li>
<li>scsi: qla2xxx: Fix NULL pointer dereference in target mode (bsc#1213747).</li>
<li>scsi: qla2xxx: Fix potential NULL pointer dereference (bsc#1213747).</li>
<li>scsi: qla2xxx: Fix session hang in gnl (bsc#1213747).</li>
<li>scsi: qla2xxx: Fix TMF leak through (bsc#1213747).</li>
<li>scsi: qla2xxx: Limit TMF to 8 per function (bsc#1213747).</li>
<li>scsi: qla2xxx: Pointer may be dereferenced (bsc#1213747).</li>
<li>scsi: qla2xxx: Remove unused nvme_ls_waitq wait queue (bsc#1213747).</li>
<li>scsi: qla2xxx: Replace one-element array with DECLARE_FLEX_ARRAY() helper (bsc#1213747).</li>
<li>scsi: qla2xxx: Silence a static checker warning (bsc#1213747).</li>
<li>scsi: qla2xxx: Turn off noisy message log (bsc#1213747).</li>
<li>scsi: qla2xxx: Update version to 10.02.08.400-k (bsc#1213747).</li>
<li>scsi: qla2xxx: Update version to 10.02.08.500-k (bsc#1213747).</li>
<li>scsi: qla2xxx: Use vmalloc_array() and vcalloc() (bsc#1213747).</li>
<li>selftests: rtnetlink: remove netdevsim device after ipsec offload test (git-fixes).</li>
<li>serial: qcom-geni: drop bogus runtime pm state update (git-fixes).</li>
<li>serial: sifive: Fix sifive_serial_console_setup() section (git-fixes).</li>
<li>sfc: fix crash when reading stats while NIC is resetting (git-fixes).</li>
<li>sfc: fix XDP queues mode with legacy IRQ (git-fixes).</li>
<li>sfc: use budget for TX completions (git-fixes).</li>
<li>soundwire: qcom: update status correctly with mask (git-fixes).</li>
<li>staging: ks7010: potential buffer overflow in ks_wlan_set_encode_ext() (git-fixes).</li>
<li>staging: r8712: Fix memory leak in _r8712_init_xmit_priv() (git-fixes).</li>
<li>SUNRPC: always free ctxt when freeing deferred request (git-fixes).</li>
<li>SUNRPC: double free xprt_ctxt while still in use (git-fixes).</li>
<li>SUNRPC: Fix trace_svc_register() call site (git-fixes).</li>
<li>SUNRPC: Fix UAF in svc_tcp_listen_data_ready() (git-fixes).</li>
<li>SUNRPC: Remove dead code in svc_tcp_release_rqst() (git-fixes).</li>
<li>SUNRPC: remove the maximum number of retries in call_bind_status (git-fixes).</li>
<li>svcrdma: Prevent page release when nothing was received (git-fixes).</li>
<li>tpm_tis: Explicitly check for error code (git-fixes).</li>
<li>tty: n_gsm: fix UAF in gsm_cleanup_mux (git-fixes).</li>
<li>tty: serial: fsl_lpuart: add earlycon for imx8ulp platform (git-fixes).</li>
<li>uaccess: Add speculation barrier to copy_from_user() (bsc#1211738 CVE-2023-0459).</li>
<li>ubifs: Add missing iput if do_tmpfile() failed in rename whiteout (git-fixes).</li>
<li>ubifs: do_rename: Fix wrong space budget when target inode&#x27;s nlink > 1 (git-fixes).</li>
<li>ubifs: Error path in ubifs_remount_rw() seems to wrongly free write buffers (git-fixes).</li>
<li>ubifs: Fix &#x27;ui->dirty&#x27; race between do_tmpfile() and writeback work (git-fixes).</li>
<li>ubifs: Fix AA deadlock when setting xattr for encrypted file (git-fixes).</li>
<li>ubifs: Fix build errors as symbol undefined (git-fixes).</li>
<li>ubifs: Fix deadlock in concurrent rename whiteout and inode writeback (git-fixes).</li>
<li>ubifs: Fix memory leak in alloc_wbufs() (git-fixes).</li>
<li>ubifs: Fix memory leak in do_rename (git-fixes).</li>
<li>ubifs: Fix read out-of-bounds in ubifs_wbuf_write_nolock() (git-fixes).</li>
<li>ubifs: Fix to add refcount once page is set private (git-fixes).</li>
<li>ubifs: Fix wrong dirty space budget for dirty inode (git-fixes).</li>
<li>ubifs: Free memory for tmpfile name (git-fixes).</li>
<li>ubifs: Re-statistic cleaned znode count if commit failed (git-fixes).</li>
<li>ubifs: Rectify space amount budget for mkdir/tmpfile operations (git-fixes).</li>
<li>ubifs: Rectify space budget for ubifs_symlink() if symlink is encrypted (git-fixes).</li>
<li>ubifs: Rectify space budget for ubifs_xrename() (git-fixes).</li>
<li>ubifs: Rename whiteout atomically (git-fixes).</li>
<li>ubifs: rename_whiteout: correct old_dir size computing (git-fixes).</li>
<li>ubifs: rename_whiteout: Fix double free for whiteout_ui->data (git-fixes).</li>
<li>ubifs: Reserve one leb for each journal head while doing budget (git-fixes).</li>
<li>ubifs: setflags: Make dirtied_ino_d 8 bytes aligned (git-fixes).</li>
<li>ubifs: ubifs_writepage: Mark page dirty after writing inode failed (git-fixes).</li>
<li>usb: dwc2: platform: Improve error reporting for problems during .remove() (git-fixes).</li>
<li>usb: dwc3: do not reset device side if dwc3 was configured as host-only (git-fixes).</li>
<li>usb: dwc3: pci: skip BYT GPIO lookup table for hardwired phy (git-fixes).</li>
<li>usb: gadget: core: remove unbalanced mutex_unlock in usb_gadget_activate (git-fixes).</li>
<li>USB: serial: option: add LARA-R6 01B PIDs (git-fixes).</li>
<li>usb: typec: Iterate pds array when showing the pd list (git-fixes).</li>
<li>usb: typec: Set port->pd before adding device for typec_port (git-fixes).</li>
<li>usb: typec: Use sysfs_emit_at when concatenating the string (git-fixes).</li>
<li>usb: xhci-mtk: set the dma max_seg_size (git-fixes).</li>
<li>vhost_net: revert upend_idx only on retriable error (git-fixes).</li>
<li>vhost: support PACKED when setting-getting vring_base (git-fixes).</li>
<li>virtio_net: Fix error unwinding of XDP initialization (git-fixes).</li>
<li>virtio-net: Maintain reverse cleanup order (git-fixes).</li>
<li>wifi: ath11k: add support for suspend in power down state (bsc#1207948).</li>
<li>wifi: ath11k: handle irq enable/disable in several code path (bsc#1207948).</li>
<li>wifi: ath11k: handle thermal device registeration together with MAC (bsc#1207948).</li>
<li>wifi: ath11k: remove MHI LOOPBACK channels (bsc#1207948).</li>
<li>wifi: ray_cs: Drop useless status variable in parse_addr() (git-fixes).</li>
<li>wifi: ray_cs: Utilize strnlen() in parse_addr() (git-fixes).</li>
<li>wl3501_cs: use eth_hw_addr_set() (git-fixes).</li>
<li>x86/PVH: obtain VGA console info in Dom0 (git-fixes).</li>
<li>x86/speculation: Add Kconfig option for GDS (bsc#1206418, CVE-2022-40982).</li>
<li>x86/srso: Add IBPB on VMEXIT (bsc#1213287, CVE-2023-20569).</li>
<li>x86/srso: Tie SBPB bit setting to microcode patch detection (bsc#1213287, CVE-2023-20569).</li>
<li>xen/blkfront: Only check REQ_FUA for writes (git-fixes).</li>
<li>xen/pvcalls-back: fix double frees with pvcalls_new_active_socket() (git-fixes).</li>
<li>xfs: AIL needs asynchronous CIL forcing (bsc#1211811).</li>
<li>xfs: async CIL flushes need pending pushes to be made stable (bsc#1211811).</li>
<li>xfs: attach iclog callbacks in xlog_cil_set_ctx_write_state() (bsc#1211811).</li>
<li>xfs: CIL work is serialised, not pipelined (bsc#1211811).</li>
<li>xfs: do not run shutdown callbacks on active iclogs (bsc#1211811).</li>
<li>xfs: drop async cache flushes from CIL commits (bsc#1211811).</li>
<li>xfs: factor out log write ordering from xlog_cil_push_work() (bsc#1211811).</li>
<li>xfs: move the CIL workqueue to the CIL (bsc#1211811).</li>
<li>xfs: move xlog_commit_record to xfs_log_cil.c (bsc#1211811).</li>
<li>xfs: order CIL checkpoint start records (bsc#1211811).</li>
<li>xfs: pass a CIL context to xlog_write() (bsc#1211811).</li>
<li>xfs: rework xlog_state_do_callback() (bsc#1211811).</li>
<li>xfs: run callbacks before waking waiters in xlog_state_shutdown_callbacks (bsc#1211811).</li>
<li>xfs: separate out log shutdown callback processing (bsc#1211811).</li>
<li>xfs: wait iclog complete before tearing down AIL (bsc#1211811).</li>
<li>xfs: XLOG_STATE_IOERROR must die (bsc#1211811).</li>
<li>xhci: Fix resume issue of some ZHAOXIN hosts (git-fixes).</li>
<li>xhci: Fix TRB prefetch issue of ZHAOXIN hosts (git-fixes).</li>
<li>xhci: Show ZHAOXIN xHCI root hub speed correctly (git-fixes).</li>
</ul>

    
        <h2>Special Instructions and Notes:</h2>
        <ul>
            
            
                <li>Please reboot the system after installing this update.</li>
            
            
        </ul>
    

    <h2>Patch Instructions:</h2>
    <p>
        To install this SUSE Important update use the SUSE recommended
        installation methods like YaST online_update or "zypper patch".<br/>

        Alternatively you can run the command listed for your product:
    </p>
    <ul class="list-group">
        
            <li class="list-group-item">
                openSUSE Leap 15.5
                
                    
                        <br/>
                        <code>zypper in -t patch SUSE-2023-3376=1 openSUSE-SLE-15.5-2023-3376=1</code>
                    
                    
                
            </li>
        
            <li class="list-group-item">
                Public Cloud Module 15-SP5
                
                    
                        <br/>
                        <code>zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP5-2023-3376=1</code>
                    
                    
                
            </li>
        
    </ul>

    <h2>Package List:</h2>
    <ul>
        
            
                <li>
                    openSUSE Leap 15.5 (aarch64 x86_64)
                    <ul>
                        
                            <li>kernel-syms-azure-5.14.21-150500.33.14.1</li>
                        
                            <li>kselftests-kmp-azure-5.14.21-150500.33.14.1</li>
                        
                            <li>kernel-azure-debuginfo-5.14.21-150500.33.14.1</li>
                        
                            <li>cluster-md-kmp-azure-5.14.21-150500.33.14.1</li>
                        
                            <li>kernel-azure-extra-5.14.21-150500.33.14.1</li>
                        
                            <li>reiserfs-kmp-azure-debuginfo-5.14.21-150500.33.14.1</li>
                        
                            <li>reiserfs-kmp-azure-5.14.21-150500.33.14.1</li>
                        
                            <li>gfs2-kmp-azure-5.14.21-150500.33.14.1</li>
                        
                            <li>kernel-azure-devel-5.14.21-150500.33.14.1</li>
                        
                            <li>kernel-azure-extra-debuginfo-5.14.21-150500.33.14.1</li>
                        
                            <li>kernel-azure-optional-debuginfo-5.14.21-150500.33.14.1</li>
                        
                            <li>ocfs2-kmp-azure-debuginfo-5.14.21-150500.33.14.1</li>
                        
                            <li>kernel-azure-debugsource-5.14.21-150500.33.14.1</li>
                        
                            <li>cluster-md-kmp-azure-debuginfo-5.14.21-150500.33.14.1</li>
                        
                            <li>kernel-azure-devel-debuginfo-5.14.21-150500.33.14.1</li>
                        
                            <li>kselftests-kmp-azure-debuginfo-5.14.21-150500.33.14.1</li>
                        
                            <li>kernel-azure-livepatch-devel-5.14.21-150500.33.14.1</li>
                        
                            <li>dlm-kmp-azure-debuginfo-5.14.21-150500.33.14.1</li>
                        
                            <li>ocfs2-kmp-azure-5.14.21-150500.33.14.1</li>
                        
                            <li>dlm-kmp-azure-5.14.21-150500.33.14.1</li>
                        
                            <li>kernel-azure-optional-5.14.21-150500.33.14.1</li>
                        
                            <li>gfs2-kmp-azure-debuginfo-5.14.21-150500.33.14.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    openSUSE Leap 15.5 (aarch64 nosrc x86_64)
                    <ul>
                        
                            <li>kernel-azure-5.14.21-150500.33.14.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    openSUSE Leap 15.5 (x86_64)
                    <ul>
                        
                            <li>kernel-azure-vdso-debuginfo-5.14.21-150500.33.14.1</li>
                        
                            <li>kernel-azure-vdso-5.14.21-150500.33.14.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    openSUSE Leap 15.5 (noarch)
                    <ul>
                        
                            <li>kernel-source-azure-5.14.21-150500.33.14.1</li>
                        
                            <li>kernel-devel-azure-5.14.21-150500.33.14.1</li>
                        
                    </ul>
                </li>
            
        
            
                <li>
                    Public Cloud Module 15-SP5 (aarch64 nosrc x86_64)
                    <ul>
                        
                            <li>kernel-azure-5.14.21-150500.33.14.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    Public Cloud Module 15-SP5 (aarch64 x86_64)
                    <ul>
                        
                            <li>kernel-syms-azure-5.14.21-150500.33.14.1</li>
                        
                            <li>kernel-azure-debuginfo-5.14.21-150500.33.14.1</li>
                        
                            <li>kernel-azure-debugsource-5.14.21-150500.33.14.1</li>
                        
                            <li>kernel-azure-devel-debuginfo-5.14.21-150500.33.14.1</li>
                        
                            <li>kernel-azure-devel-5.14.21-150500.33.14.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    Public Cloud Module 15-SP5 (noarch)
                    <ul>
                        
                            <li>kernel-source-azure-5.14.21-150500.33.14.1</li>
                        
                            <li>kernel-devel-azure-5.14.21-150500.33.14.1</li>
                        
                    </ul>
                </li>
            
        
    </ul>

    
        <h2>References:</h2>
        <ul>
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2022-40982.html">https://www.suse.com/security/cve/CVE-2022-40982.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-0459.html">https://www.suse.com/security/cve/CVE-2023-0459.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-20569.html">https://www.suse.com/security/cve/CVE-2023-20569.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-21400.html">https://www.suse.com/security/cve/CVE-2023-21400.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-2156.html">https://www.suse.com/security/cve/CVE-2023-2156.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-2166.html">https://www.suse.com/security/cve/CVE-2023-2166.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-31083.html">https://www.suse.com/security/cve/CVE-2023-31083.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-3268.html">https://www.suse.com/security/cve/CVE-2023-3268.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-3567.html">https://www.suse.com/security/cve/CVE-2023-3567.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-3609.html">https://www.suse.com/security/cve/CVE-2023-3609.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-3611.html">https://www.suse.com/security/cve/CVE-2023-3611.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-3776.html">https://www.suse.com/security/cve/CVE-2023-3776.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-38409.html">https://www.suse.com/security/cve/CVE-2023-38409.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-3863.html">https://www.suse.com/security/cve/CVE-2023-3863.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-4004.html">https://www.suse.com/security/cve/CVE-2023-4004.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1206418">https://bugzilla.suse.com/show_bug.cgi?id=1206418</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1207129">https://bugzilla.suse.com/show_bug.cgi?id=1207129</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1207948">https://bugzilla.suse.com/show_bug.cgi?id=1207948</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1210627">https://bugzilla.suse.com/show_bug.cgi?id=1210627</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1210780">https://bugzilla.suse.com/show_bug.cgi?id=1210780</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1210825">https://bugzilla.suse.com/show_bug.cgi?id=1210825</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1211131">https://bugzilla.suse.com/show_bug.cgi?id=1211131</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1211738">https://bugzilla.suse.com/show_bug.cgi?id=1211738</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1211811">https://bugzilla.suse.com/show_bug.cgi?id=1211811</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1212445">https://bugzilla.suse.com/show_bug.cgi?id=1212445</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1212502">https://bugzilla.suse.com/show_bug.cgi?id=1212502</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1212604">https://bugzilla.suse.com/show_bug.cgi?id=1212604</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1212766">https://bugzilla.suse.com/show_bug.cgi?id=1212766</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1212901">https://bugzilla.suse.com/show_bug.cgi?id=1212901</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1213167">https://bugzilla.suse.com/show_bug.cgi?id=1213167</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1213272">https://bugzilla.suse.com/show_bug.cgi?id=1213272</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1213287">https://bugzilla.suse.com/show_bug.cgi?id=1213287</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1213304">https://bugzilla.suse.com/show_bug.cgi?id=1213304</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1213417">https://bugzilla.suse.com/show_bug.cgi?id=1213417</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1213578">https://bugzilla.suse.com/show_bug.cgi?id=1213578</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1213585">https://bugzilla.suse.com/show_bug.cgi?id=1213585</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1213586">https://bugzilla.suse.com/show_bug.cgi?id=1213586</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1213588">https://bugzilla.suse.com/show_bug.cgi?id=1213588</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1213601">https://bugzilla.suse.com/show_bug.cgi?id=1213601</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1213620">https://bugzilla.suse.com/show_bug.cgi?id=1213620</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1213632">https://bugzilla.suse.com/show_bug.cgi?id=1213632</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1213653">https://bugzilla.suse.com/show_bug.cgi?id=1213653</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1213713">https://bugzilla.suse.com/show_bug.cgi?id=1213713</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1213715">https://bugzilla.suse.com/show_bug.cgi?id=1213715</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1213747">https://bugzilla.suse.com/show_bug.cgi?id=1213747</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1213756">https://bugzilla.suse.com/show_bug.cgi?id=1213756</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1213759">https://bugzilla.suse.com/show_bug.cgi?id=1213759</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1213777">https://bugzilla.suse.com/show_bug.cgi?id=1213777</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1213810">https://bugzilla.suse.com/show_bug.cgi?id=1213810</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1213812">https://bugzilla.suse.com/show_bug.cgi?id=1213812</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1213856">https://bugzilla.suse.com/show_bug.cgi?id=1213856</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1213857">https://bugzilla.suse.com/show_bug.cgi?id=1213857</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1213863">https://bugzilla.suse.com/show_bug.cgi?id=1213863</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1213867">https://bugzilla.suse.com/show_bug.cgi?id=1213867</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1213870">https://bugzilla.suse.com/show_bug.cgi?id=1213870</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1213871">https://bugzilla.suse.com/show_bug.cgi?id=1213871</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1213872">https://bugzilla.suse.com/show_bug.cgi?id=1213872</a>
                    </li>
                
            
        </ul>
    
</div>