<div class="container">
    <h1>Security update for the Linux Kernel</h1>

    <table class="table table-striped table-bordered">
        <tbody>
        <tr>
            <th>Announcement ID:</th>
            <td>SUSE-SU-2023:4731-1</td>
        </tr>
        
        <tr>
            <th>Rating:</th>
            <td>important</td>
        </tr>
        <tr>
            <th>References:</th>
            <td>
                <ul>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1084909">bsc#1084909</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1189998">bsc#1189998</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1210447">bsc#1210447</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1214286">bsc#1214286</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1214976">bsc#1214976</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1215124">bsc#1215124</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1215292">bsc#1215292</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1215420">bsc#1215420</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1215458">bsc#1215458</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1215710">bsc#1215710</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1216058">bsc#1216058</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1216105">bsc#1216105</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1216259">bsc#1216259</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1216584">bsc#1216584</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1216693">bsc#1216693</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1216759">bsc#1216759</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1216761">bsc#1216761</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1216844">bsc#1216844</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1216861">bsc#1216861</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1216909">bsc#1216909</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1216959">bsc#1216959</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1216965">bsc#1216965</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1216976">bsc#1216976</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1217036">bsc#1217036</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1217068">bsc#1217068</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1217086">bsc#1217086</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1217124">bsc#1217124</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1217140">bsc#1217140</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1217195">bsc#1217195</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1217200">bsc#1217200</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1217205">bsc#1217205</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1217332">bsc#1217332</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1217366">bsc#1217366</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1217515">bsc#1217515</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1217598">bsc#1217598</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1217599">bsc#1217599</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1217609">bsc#1217609</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1217687">bsc#1217687</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1217731">bsc#1217731</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1217780">bsc#1217780</a>
                        </li>
                    
                    
                        <li style="display: inline;">
                            <a href="https://jira.suse.com/browse/PED-3184">jsc#PED-3184</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://jira.suse.com/browse/PED-5021">jsc#PED-5021</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://jira.suse.com/browse/PED-7237">jsc#PED-7237</a>
                        </li>
                    
                </ul>
            </td>
        </tr>
        
            <tr>
                <th>
                    Cross-References:
                </th>
                <td>
                    <ul>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-2006.html">CVE-2023-2006</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-25775.html">CVE-2023-25775</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-39197.html">CVE-2023-39197</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-39198.html">CVE-2023-39198</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-4244.html">CVE-2023-4244</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-45863.html">CVE-2023-45863</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-45871.html">CVE-2023-45871</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-46862.html">CVE-2023-46862</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-5158.html">CVE-2023-5158</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-5717.html">CVE-2023-5717</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-6039.html">CVE-2023-6039</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-6176.html">CVE-2023-6176</a>
                        </li>
                    
                    </ul>
                </td>
            </tr>
            <tr>
                <th>CVSS scores:</th>
                <td>
                    <ul class="list-group">
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-2006</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.8</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-2006</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.0</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-25775</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.6</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-25775</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.6</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-39197</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">4.0</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-39198</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-39198</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">6.4</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-4244</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.0</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-4244</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.8</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-45863</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">6.4</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-45863</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">6.4</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-45871</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.3</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-45871</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">9.8</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-46862</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-46862</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">4.7</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-5158</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">6.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-5158</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">6.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-5717</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.8</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-5717</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.8</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-6039</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">6.3</span>
                                <span class="cvss-vector">CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-6039</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-6176</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.8</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-6176</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.8</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                    </ul>
                </td>
            </tr>
        
        <tr>
            <th>Affected Products:</th>
            <td>
                <ul class="list-group">
                    
                        <li class="list-group-item">openSUSE Leap 15.4</li>
                    
                        <li class="list-group-item">openSUSE Leap Micro 5.3</li>
                    
                        <li class="list-group-item">openSUSE Leap Micro 5.4</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise High Performance Computing 15 SP4</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Live Patching 15-SP4</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Micro 5.3</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Micro 5.4</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Micro for Rancher 5.3</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Micro for Rancher 5.4</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Real Time 15 SP4</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Server 15 SP4</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Server for SAP Applications 15 SP4</li>
                    
                        <li class="list-group-item">SUSE Real Time Module 15-SP4</li>
                    
                </ul>
            </td>
        </tr>
        </tbody>
    </table>

    <p>An update that solves 12 vulnerabilities, contains three features and has 28 security fixes can now be installed.</p>

    


    
        <h2>Description:</h2>
    
    <p>The SUSE Linux Enterprise 15 SP4 RT kernel was updated to receive various security and bugfixes.</p>
<p>The following security bugs were fixed:</p>
<ul>
<li>CVE-2023-6176: Fixed a denial of service in the cryptographic algorithm scatterwalk functionality (bsc#1217332).</li>
<li>CVE-2023-2006: Fixed a race condition in the RxRPC network protocol (bsc#1210447).</li>
<li>CVE-2023-39197: Fixed a out-of-bounds read in nf_conntrack_dccp_packet() (bsc#1216976).</li>
<li>CVE-2023-4244: Fixed a use-after-free in the nf_tables component, which could be exploited to achieve local privilege escalation (bsc#1215420).</li>
<li>CVE-2023-6039: Fixed a use-after-free in lan78xx_disconnect in drivers/net/usb/lan78xx.c (bsc#1217068).</li>
<li>CVE-2023-45863: Fixed a out-of-bounds write in fill_kobj_path() (bsc#1216058).</li>
<li>CVE-2023-5158: Fixed a denial of service in vringh_kiov_advance() in drivers/vhost/vringh.c in the host side of a virtio ring (bsc#1215710).</li>
<li>CVE-2023-45871: Fixed an issue in the IGB driver, where the buffer size may not be adequate for frames larger than the MTU (bsc#1216259).</li>
<li>CVE-2023-5717: Fixed a heap out-of-bounds write vulnerability in the Performance Events component (bsc#1216584).</li>
<li>CVE-2023-39198: Fixed a race condition leading to use-after-free in qxl_mode_dumb_create() (bsc#1216965).</li>
<li>CVE-2023-25775: Fixed improper access control in the Intel Ethernet Controller RDMA driver (bsc#1216959).</li>
<li>CVE-2023-46862: Fixed a NULL pointer dereference in io_uring_show_fdinfo() (bsc#1216693).</li>
</ul>
<p>The following non-security bugs were fixed:</p>
<ul>
<li>ACPI: FPDT: properly handle invalid FPDT subtables (git-fixes).</li>
<li>ACPI: resource: Do IRQ override on TongFang GMxXGxx (git-fixes).</li>
<li>ACPI: resource: Skip IRQ override on ASUS ExpertBook B1402CVA (git-fixes).</li>
<li>ACPI: sysfs: Fix create_pnp_modalias() and create_of_modalias() (git-fixes).</li>
<li>ALSA: hda/realtek - Add Dell ALC295 to pin fall back table (git-fixes).</li>
<li>ALSA: hda/realtek - Enable internal speaker of ASUS K6500ZC (git-fixes).</li>
<li>ALSA: hda/realtek: Add quirks for HP Laptops (git-fixes).</li>
<li>ALSA: hda/realtek: Enable Mute LED on HP 255 G10 (git-fixes).</li>
<li>ALSA: hda/realtek: Enable Mute LED on HP 255 G8 (git-fixes).</li>
<li>ALSA: hda: Disable power-save on KONTRON SinglePC (bsc#1217140).</li>
<li>ALSA: hda: Fix possible null-ptr-deref when assigning a stream (git-fixes).</li>
<li>ALSA: hda: cs35l41: Fix unbalanced pm_runtime_get() (git-fixes).</li>
<li>ALSA: hda: cs35l41: Undo runtime PM changes at driver exit time (git-fixes).</li>
<li>ALSA: hda: intel-dsp-config: Fix JSL Chromebook quirk detection (git-fixes).</li>
<li>ALSA: info: Fix potential deadlock at disconnection (git-fixes).</li>
<li>ARM: 9321/1: memset: cast the constant byte to unsigned char (git-fixes).</li>
<li>ASoC: Intel: Skylake: Fix mem leak when parsing UUIDs fails (git-fixes).</li>
<li>ASoC: ams-delta.c: use component after check (git-fixes).</li>
<li>ASoC: codecs: wsa-macro: fix uninitialized stack variables with name prefix (git-fixes).</li>
<li>ASoC: cs35l41: Undo runtime PM changes at driver exit time (git-fixes).</li>
<li>ASoC: cs35l41: Verify PM runtime resume errors in IRQ handler (git-fixes).</li>
<li>ASoC: fsl: Fix PM disable depth imbalance in fsl_easrc_probe (git-fixes).</li>
<li>ASoC: fsl: mpc5200_dma.c: Fix warning of Function parameter or member not described (git-fixes).</li>
<li>ASoC: hdmi-codec: register hpd callback on component probe (git-fixes).</li>
<li>ASoC: rt5650: fix the wrong result of key button (git-fixes).</li>
<li>ASoC: simple-card: fixup asoc_simple_probe() error handling (git-fixes).</li>
<li>ASoC: ti: omap-mcbsp: Fix runtime PM underflow warnings (git-fixes).</li>
<li>Bluetooth: btusb: Add 0bda:b85b for Fn-Link RTL8852BE (git-fixes).</li>
<li>Bluetooth: btusb: Add RTW8852BE device 13d3:3570 to device tables (git-fixes).</li>
<li>Bluetooth: btusb: Add Realtek RTL8852BE support ID 0x0cb8:0xc559 (git-fixes).</li>
<li>Bluetooth: btusb: Add date->evt_skb is NULL check (git-fixes).</li>
<li>Disable Loongson drivers Loongson is a mips architecture, it does not make sense to build Loongson drivers on other architectures.</li>
<li>Documentation: networking: correct possessive "its" (bsc#1215458).</li>
<li>Drivers: hv: vmbus: Remove unused extern declaration vmbus_ontimer() (git-fixes).</li>
<li>Ensure ia32_emulation is always enabled for kernel-obs-build If ia32_emulation is disabled by default, ensure it is enabled back for OBS kernel to allow building 32bit binaries (jsc#PED-3184) [ms: Always pass the parameter, no need to grep through the config which may not be very reliable]</li>
<li>Fix termination state for idr_for_each_entry_ul() (git-fixes).</li>
<li>HID: Add quirk for Dell Pro Wireless Keyboard and Mouse KM5221W (git-fixes).</li>
<li>HID: hyperv: Replace one-element array with flexible-array member (git-fixes).</li>
<li>HID: hyperv: avoid struct memcpy overrun warning (git-fixes).</li>
<li>HID: hyperv: remove unused struct synthhid_msg (git-fixes).</li>
<li>HID: lenovo: Detect quirk-free fw on cptkbd and stop applying workaround (git-fixes).</li>
<li>HID: logitech-hidpp: Do not restart IO, instead defer hid_connect() only (git-fixes).</li>
<li>HID: logitech-hidpp: Move get_wireless_feature_index() check to hidpp_connect_event() (git-fixes).</li>
<li>HID: logitech-hidpp: Remove HIDPP_QUIRK_NO_HIDINPUT quirk (git-fixes).</li>
<li>HID: logitech-hidpp: Revert "Do not restart communication if not necessary" (git-fixes).</li>
<li>Input: synaptics-rmi4 - fix use after free in rmi_unregister_function() (git-fixes).</li>
<li>Input: synaptics-rmi4 - handle reset delay when using SMBus trsnsport (git-fixes).</li>
<li>Input: xpad - add VID for Turtle Beach controllers (git-fixes).</li>
<li>PCI/ASPM: Fix L1 substate handling in aspm_attr_store_common() (git-fixes).</li>
<li>PCI/sysfs: Protect driver&#x27;s D3cold preference from user space (git-fixes).</li>
<li>PCI: Disable ATS for specific Intel IPU E2000 devices (bsc#1215458).</li>
<li>PCI: Extract ATS disabling to a helper function (bsc#1215458).</li>
<li>PCI: Prevent xHCI driver from claiming AMD VanGogh USB3 DRD device (git-fixes).</li>
<li>PCI: Use FIELD_GET() in Sapphire RX 5600 XT Pulse quirk (git-fixes).</li>
<li>PCI: Use FIELD_GET() to extract Link Width (git-fixes).</li>
<li>PCI: exynos: Do not discard .remove() callback (git-fixes).</li>
<li>PCI: keystone: Do not discard .probe() callback (git-fixes).</li>
<li>PCI: keystone: Do not discard .remove() callback (git-fixes).</li>
<li>PCI: tegra194: Use FIELD_GET()/FIELD_PREP() with Link Width fields (git-fixes).</li>
<li>PM / devfreq: rockchip-dfi: Make pmu regmap mandatory (git-fixes).</li>
<li>PM: hibernate: Use __get_safe_page() rather than touching the list (git-fixes).</li>
<li>USB: dwc2: write HCINT with INTMASK applied (bsc#1214286).</li>
<li>USB: dwc3: qcom: fix ACPI platform device leak (git-fixes).</li>
<li>USB: dwc3: qcom: fix resource leaks on probe deferral (git-fixes).</li>
<li>USB: dwc3: qcom: fix software node leak on probe errors (git-fixes).</li>
<li>USB: dwc3: qcom: fix wakeup after probe deferral (git-fixes).</li>
<li>USB: serial: option: add Fibocom L7xx modules (git-fixes).</li>
<li>USB: serial: option: add Luat Air72*U series products (git-fixes).</li>
<li>USB: serial: option: do not claim interface 4 for ZTE MF290 (git-fixes).</li>
<li>USB: serial: option: fix FM101R-GL defines (git-fixes).</li>
<li>USB: usbip: fix stub_dev hub disconnect (git-fixes).</li>
<li>arm/xen: fix xen_vcpu_info allocation alignment (git-fixes).</li>
<li>arm64: Add Cortex-A520 CPU part definition (git-fixes)</li>
<li>arm64: allow kprobes on EL0 handlers (git-fixes)</li>
<li>arm64: armv8_deprecated move emulation functions (git-fixes)</li>
<li>arm64: armv8_deprecated: fix unused-function error (git-fixes)</li>
<li>arm64: armv8_deprecated: fold ops into insn_emulation (git-fixes)</li>
<li>arm64: armv8_deprecated: move aarch32 helper earlier (git-fixes)</li>
<li>arm64: armv8_deprecated: rework deprected instruction handling (git-fixes)</li>
<li>arm64: consistently pass ESR_ELx to die() (git-fixes)</li>
<li>arm64: die(): pass &#x27;err&#x27; as long (git-fixes)</li>
<li>arm64: factor insn read out of call_undef_hook() (git-fixes)</li>
<li>arm64: factor out EL1 SSBS emulation hook (git-fixes)</li>
<li>arm64: report EL1 UNDEFs better (git-fixes)</li>
<li>arm64: rework BTI exception handling (git-fixes)</li>
<li>arm64: rework EL0 MRS emulation (git-fixes)</li>
<li>arm64: rework FPAC exception handling (git-fixes)</li>
<li>arm64: split EL0/EL1 UNDEF handlers (git-fixes)</li>
<li>ata: pata_isapnp: Add missing error check for devm_ioport_map() (git-fixes).</li>
<li>atl1c: Work around the DMA RX overflow issue (git-fixes).</li>
<li>atm: iphase: Do PCI error checks on own line (git-fixes).</li>
<li>blk-mq: Do not clear driver tags own mapping (bsc#1217366).</li>
<li>blk-mq: fix null pointer dereference in blk_mq_clear_rq_mapping() (bsc#1217366).</li>
<li>bluetooth: Add device 0bda:887b to device tables (git-fixes).</li>
<li>bluetooth: Add device 13d3:3571 to device tables (git-fixes).</li>
<li>can: dev: can_put_echo_skb(): do not crash kernel if can_priv::echo_skb is accessed out of bounds (git-fixes).</li>
<li>can: dev: can_restart(): do not crash kernel if carrier is OK (git-fixes).</li>
<li>can: dev: can_restart(): fix race condition between controller restart and netif_carrier_on() (git-fixes).</li>
<li>can: isotp: add local echo tx processing for consecutive frames (git-fixes).</li>
<li>can: isotp: fix race between isotp_sendsmg() and isotp_release() (git-fixes).</li>
<li>can: isotp: fix tx state handling for echo tx processing (git-fixes).</li>
<li>can: isotp: handle wait_event_interruptible() return values (git-fixes).</li>
<li>can: isotp: isotp_bind(): return -EINVAL on incorrect CAN ID formatting (git-fixes).</li>
<li>can: isotp: isotp_sendmsg(): fix TX state detection and wait behavior (git-fixes).</li>
<li>can: isotp: remove re-binding of bound socket (git-fixes).</li>
<li>can: isotp: sanitize CAN ID checks in isotp_bind() (git-fixes).</li>
<li>can: isotp: set max PDU size to 64 kByte (git-fixes).</li>
<li>can: isotp: split tx timer into transmission and timeout (git-fixes).</li>
<li>can: sja1000: Fix comment (git-fixes).</li>
<li>clk: Sanitize possible_parent_show to Handle Return Value of of_clk_get_parent_name (git-fixes).</li>
<li>clk: imx: Select MXC_CLK for CLK_IMX8QXP (git-fixes).</li>
<li>clk: imx: imx8mq: correct error handling path (git-fixes).</li>
<li>clk: imx: imx8qxp: Fix elcdif_pll clock (git-fixes).</li>
<li>clk: keystone: pll: fix a couple NULL vs IS_ERR() checks (git-fixes).</li>
<li>clk: mediatek: clk-mt2701: Add check for mtk_alloc_clk_data (git-fixes).</li>
<li>clk: mediatek: clk-mt6765: Add check for mtk_alloc_clk_data (git-fixes).</li>
<li>clk: mediatek: clk-mt6779: Add check for mtk_alloc_clk_data (git-fixes).</li>
<li>clk: mediatek: clk-mt6797: Add check for mtk_alloc_clk_data (git-fixes).</li>
<li>clk: mediatek: clk-mt7629-eth: Add check for mtk_alloc_clk_data (git-fixes).</li>
<li>clk: mediatek: clk-mt7629: Add check for mtk_alloc_clk_data (git-fixes).</li>
<li>clk: npcm7xx: Fix incorrect kfree (git-fixes).</li>
<li>clk: qcom: clk-rcg2: Fix clock rate overflow for high parent frequencies (git-fixes).</li>
<li>clk: qcom: config IPQ_APSS_6018 should depend on QCOM_SMEM (git-fixes).</li>
<li>clk: qcom: gcc-sm8150: Fix gcc_sdcc2_apps_clk_src (git-fixes).</li>
<li>clk: qcom: ipq6018: drop the CLK_SET_RATE_PARENT flag from PLL clocks (git-fixes).</li>
<li>clk: qcom: mmcc-msm8998: Do not check halt bit on some branch clks (git-fixes).</li>
<li>clk: qcom: mmcc-msm8998: Fix the SMMU GDSC (git-fixes).</li>
<li>clk: scmi: Free scmi_clk allocated when the clocks with invalid info are skipped (git-fixes).</li>
<li>clk: ti: Add ti_dt_clk_name() helper to use clock-output-names (git-fixes).</li>
<li>clk: ti: Update component clocks to use ti_dt_clk_name() (git-fixes).</li>
<li>clk: ti: Update pll and clockdomain clocks to use ti_dt_clk_name() (git-fixes).</li>
<li>clk: ti: change ti_clk_register<a href="">_omap_hw</a> API (git-fixes).</li>
<li>clk: ti: fix double free in of_ti_divider_clk_setup() (git-fixes).</li>
<li>crypto: caam/jr - fix Chacha20 + Poly1305 self test failure (git-fixes).</li>
<li>crypto: caam/qi2 - fix Chacha20 + Poly1305 self test failure (git-fixes).</li>
<li>crypto: hisilicon/hpre - Fix a erroneous check after snprintf() (git-fixes).</li>
<li>dmaengine: pxa_dma: Remove an erroneous BUG_ON() in pxad_free_desc() (git-fixes).</li>
<li>dmaengine: ste_dma40: Fix PM disable depth imbalance in d40_probe (git-fixes).</li>
<li>dmaengine: stm32-mdma: correct desc prep when channel running (git-fixes).</li>
<li>dmaengine: ti: edma: handle irq_of_parse_and_map() errors (git-fixes).</li>
<li>docs: net: move the probe and open/close sections of driver.rst up (bsc#1215458).</li>
<li>docs: net: reformat driver.rst from a list to sections (bsc#1215458).</li>
<li>docs: net: use C syntax highlight in driver.rst (bsc#1215458).</li>
<li>drm/amd/display: Avoid NULL dereference of timing generator (git-fixes).</li>
<li>drm/amd/display: Change the DMCUB mailbox memory location from FB to inbox (git-fixes).</li>
<li>drm/amd/display: remove useless check in should_enable_fbc() (git-fixes).</li>
<li>drm/amd/display: use full update for clip size increase of large plane source (git-fixes).</li>
<li>drm/amd/pm: Handle non-terminated overdrive commands (git-fixes).</li>
<li>drm/amd: Fix UBSAN array-index-out-of-bounds for Polaris and Tonga (git-fixes).</li>
<li>drm/amd: Fix UBSAN array-index-out-of-bounds for SMU7 (git-fixes).</li>
<li>drm/amdgpu: Fix a null pointer access when the smc_rreg pointer is NULL (git-fixes).</li>
<li>drm/amdgpu: Fix potential null pointer derefernce (git-fixes).</li>
<li>drm/amdgpu: do not use ATRM for external devices (git-fixes).</li>
<li>drm/amdgpu: fix error handling in amdgpu_bo_list_get() (git-fixes).</li>
<li>drm/amdgpu: fix software pci_unplug on some chips (git-fixes).</li>
<li>drm/amdkfd: Fix a race condition of vram buffer unref in svm code (git-fixes).</li>
<li>drm/amdkfd: Fix shift out-of-bounds issue (git-fixes).</li>
<li>drm/amdkfd: fix some race conditions in vram buffer alloc/free of svm code (git-fixes).</li>
<li>drm/bridge: Fix kernel-doc typo in desc of output_bus_cfg in drm_bridge_state (git-fixes).</li>
<li>drm/bridge: lt8912b: Add missing drm_bridge_attach call (git-fixes).</li>
<li>drm/bridge: lt8912b: Fix bridge_detach (git-fixes).</li>
<li>drm/bridge: lt8912b: Fix crash on bridge detach (git-fixes).</li>
<li>drm/bridge: lt8912b: Manually disable HPD only if it was enabled (git-fixes).</li>
<li>drm/bridge: lt8912b: Register and attach our DSI device at probe (git-fixes).</li>
<li>drm/bridge: lt8912b: Switch to devm MIPI-DSI helpers (git-fixes).</li>
<li>drm/bridge: lt9611uxc: Register and attach our DSI device at probe (git-fixes).</li>
<li>drm/bridge: lt9611uxc: Switch to devm MIPI-DSI helpers (git-fixes).</li>
<li>drm/bridge: lt9611uxc: fix the race in the error path (git-fixes).</li>
<li>drm/bridge: tc358768: Disable non-continuous clock mode (git-fixes).</li>
<li>drm/bridge: tc358768: Fix bit updates (git-fixes).</li>
<li>drm/bridge: tc358768: Fix use of uninitialized variable (git-fixes).</li>
<li>drm/gud: Use size_add() in call to struct_size() (git-fixes).</li>
<li>drm/i915/pmu: Check if pmu is closed before stopping event (git-fixes).</li>
<li>drm/i915: Fix potential spectre vulnerability (git-fixes).</li>
<li>drm/komeda: drop all currently held locks if deadlock happens (git-fixes).</li>
<li>drm/mediatek: Fix iommu fault by swapping FBs after updating plane state (git-fixes).</li>
<li>drm/mediatek: Fix iommu fault during crtc enabling (git-fixes).</li>
<li>drm/mipi-dsi: Create devm device attachment (git-fixes).</li>
<li>drm/mipi-dsi: Create devm device registration (git-fixes).</li>
<li>drm/msm/dp: skip validity check for DP CTS EDID checksum (git-fixes).</li>
<li>drm/panel/panel-tpo-tpg110: fix a possible null pointer dereference (git-fixes).</li>
<li>drm/panel: fix a possible null pointer dereference (git-fixes).</li>
<li>drm/panel: simple: Fix Innolux G101ICE-L01 bus flags (git-fixes).</li>
<li>drm/panel: simple: Fix Innolux G101ICE-L01 timings (git-fixes).</li>
<li>drm/panel: st7703: Pick different reset sequence (git-fixes).</li>
<li>drm/qxl: prevent memory leak (git-fixes).</li>
<li>drm/radeon: possible buffer overflow (git-fixes).</li>
<li>drm/rockchip: Fix type promotion bug in rockchip_gem_iommu_map() (git-fixes).</li>
<li>drm/rockchip: cdn-dp: Fix some error handling paths in cdn_dp_probe() (git-fixes).</li>
<li>drm/rockchip: vop: Fix call to crtc reset helper (git-fixes).</li>
<li>drm/rockchip: vop: Fix color for RGB888/BGR888 format on VOP full (git-fixes).</li>
<li>drm/rockchip: vop: Fix reset of state in duplicate state crtc funcs (git-fixes).</li>
<li>drm/syncobj: fix DRM_SYNCOBJ_WAIT_FLAGS_WAIT_AVAILABLE (git-fixes).</li>
<li>drm/vc4: fix typo (git-fixes).</li>
<li>drm: vmwgfx_surface.c: copy user-array safely (git-fixes).</li>
<li>dt-bindings: usb: hcd: add missing phy name to example (git-fixes).</li>
<li>dt-bindings: usb: qcom,dwc3: fix example wakeup interrupt types (git-fixes).</li>
<li>fbdev: fsl-diu-fb: mark wr_reg_wa() static (git-fixes).</li>
<li>fbdev: imsttfb: Fix error path of imsttfb_probe() (git-fixes).</li>
<li>fbdev: imsttfb: Release framebuffer and dealloc cmap on error path (git-fixes).</li>
<li>fbdev: imsttfb: fix a resource leak in probe (git-fixes).</li>
<li>fbdev: imsttfb: fix double free in probe() (git-fixes).</li>
<li>fbdev: omapfb: Drop unused remove function (git-fixes).</li>
<li>firewire: core: fix possible memory leak in create_units() (git-fixes).</li>
<li>firmware/imx-dsp: Fix use_after_free in imx_dsp_setup_channels() (git-fixes).</li>
<li>gpio: mockup: fix kerneldoc (git-fixes).</li>
<li>gpio: mockup: remove unused field (git-fixes).</li>
<li>hid: cp2112: Fix duplicate workqueue initialization (git-fixes).</li>
<li>hv: simplify sysctl registration (git-fixes).</li>
<li>hv_netvsc: Fix race of register_netdevice_notifier and VF register (git-fixes).</li>
<li>hv_netvsc: Mark VF as slave before exposing it to user-mode (git-fixes).</li>
<li>hv_netvsc: fix netvsc_send_completion to avoid multiple message length checks (git-fixes).</li>
<li>hv_netvsc: fix race of netvsc and VF register_netdevice (git-fixes).</li>
<li>hwmon: (coretemp) Fix potentially truncated sysfs attribute name (git-fixes).</li>
<li>i2c: aspeed: Fix i2c bus hang in slave read (git-fixes).</li>
<li>i2c: core: Run atomic i2c xfer when !preemptible (git-fixes).</li>
<li>i2c: designware: Disable TX_EMPTY irq while waiting for block length byte (git-fixes).</li>
<li>i2c: dev: copy userspace array safely (git-fixes).</li>
<li>i2c: i801: fix potential race in i801_block_transaction_byte_by_byte (git-fixes).</li>
<li>i2c: iproc: handle invalid slave state (git-fixes).</li>
<li>i2c: muxes: i2c-demux-pinctrl: Use of_get_i2c_adapter_by_node() (git-fixes).</li>
<li>i2c: muxes: i2c-mux-gpmux: Use of_get_i2c_adapter_by_node() (git-fixes).</li>
<li>i2c: muxes: i2c-mux-pinctrl: Use of_get_i2c_adapter_by_node() (git-fixes).</li>
<li>i2c: stm32f7: Fix PEC handling in case of SMBUS transfers (git-fixes).</li>
<li>i2c: sun6i-p2wi: Prevent potential division by zero (git-fixes).</li>
<li>i3c: Fix potential refcount leak in i3c_master_register_new_i3c_devs (git-fixes).</li>
<li>i3c: master: cdns: Fix reading status register (git-fixes).</li>
<li>i3c: master: mipi-i3c-hci: Fix a kernel panic for accessing DAT_data (git-fixes).</li>
<li>i3c: master: svc: fix SDA keep low when polling IBIWON timeout happen (git-fixes).</li>
<li>i3c: master: svc: fix check wrong status register in irq handler (git-fixes).</li>
<li>i3c: master: svc: fix ibi may not return mandatory data byte (git-fixes).</li>
<li>i3c: master: svc: fix race condition in ibi work thread (git-fixes).</li>
<li>i3c: master: svc: fix wrong data return when IBI happen during start frame (git-fixes).</li>
<li>i3c: mipi-i3c-hci: Fix out of bounds access in hci_dma_irq_handler (git-fixes).</li>
<li>i915/perf: Fix NULL deref bugs with drm_dbg() calls (git-fixes).</li>
<li>idpf: add RX splitq napi poll support (bsc#1215458).</li>
<li>idpf: add SRIOV support and other ndo_ops (bsc#1215458).</li>
<li>idpf: add TX splitq napi poll support (bsc#1215458).</li>
<li>idpf: add controlq init and reset checks (bsc#1215458).</li>
<li>idpf: add core init and interrupt request (bsc#1215458).</li>
<li>idpf: add create vport and netdev configuration (bsc#1215458).</li>
<li>idpf: add ethtool callbacks (bsc#1215458).</li>
<li>idpf: add module register and probe functionality (bsc#1215458).</li>
<li>idpf: add ptypes and MAC filter support (bsc#1215458).</li>
<li>idpf: add singleq start_xmit and napi poll (bsc#1215458).</li>
<li>idpf: add splitq start_xmit (bsc#1215458).</li>
<li>idpf: cancel mailbox work in error path (bsc#1215458).</li>
<li>idpf: configure resources for RX queues (bsc#1215458).</li>
<li>idpf: configure resources for TX queues (bsc#1215458).</li>
<li>idpf: fix potential use-after-free in idpf_tso() (bsc#1215458).</li>
<li>idpf: initialize interrupts and enable vport (bsc#1215458).</li>
<li>idpf: set scheduling mode for completion queue (bsc#1215458).</li>
<li>iio: adc: xilinx-xadc: Correct temperature offset/scale for UltraScale (git-fixes).</li>
<li>iio: adc: xilinx-xadc: Do not clobber preset voltage/temperature thresholds (git-fixes).</li>
<li>iio: exynos-adc: request second interupt only when touchscreen mode is used (git-fixes).</li>
<li>irqchip/stm32-exti: add missing DT IRQ flag translation (git-fixes).</li>
<li>kabi/severities: ignore kabi in rxrpc (bsc#1210447) The rxrpc module is built since SLE15-SP3 but it is not shipped as part of any SLE product, only in Leap (in kernel-*-optional).</li>
<li>kernel-binary: suse-module-tools is also required when installed Requires(pre) adds dependency for the specific sciptlet. However, suse-module-tools also ships modprobe.d files which may be needed at posttrans time or any time the kernel is on the system for generating ramdisk. Add plain Requires as well.</li>
<li>kernel-source: Move provides after sources</li>
<li>kernel/fork: beware of __put_task_struct() calling context (bsc#1189998 (PREEMPT_RT prerequisite backports)).</li>
<li>kernel/fork: beware of __put_task_struct() calling context (bsc#1216761).</li>
<li>leds: pwm: Do not disable the PWM when the LED should be off (git-fixes).</li>
<li>leds: trigger: ledtrig-cpu:: Fix &#x27;output may be truncated&#x27; issue for &#x27;cpu&#x27; (git-fixes).</li>
<li>leds: turris-omnia: Do not use SMBUS calls (git-fixes).</li>
<li>lsm: fix default return value for inode_getsecctx (git-fixes).</li>
<li>lsm: fix default return value for vm_enough_memory (git-fixes).</li>
<li>media: bttv: fix use after free error due to btv->timeout timer (git-fixes).</li>
<li>media: ccs: Correctly initialise try compose rectangle (git-fixes).</li>
<li>media: ccs: Fix driver quirk struct documentation (git-fixes).</li>
<li>media: cedrus: Fix clock/reset sequence (git-fixes).</li>
<li>media: cobalt: Use FIELD_GET() to extract Link Width (git-fixes).</li>
<li>media: gspca: cpia1: shift-out-of-bounds in set_flicker (git-fixes).</li>
<li>media: i2c: max9286: Fix some redundant of_node_put() calls (git-fixes).</li>
<li>media: imon: fix access to invalid resource for the second interface (git-fixes).</li>
<li>media: lirc: drop trailing space from scancode transmit (git-fixes).</li>
<li>media: qcom: camss: Fix VFE-17x vfe_disable_output() (git-fixes).</li>
<li>media: qcom: camss: Fix missing vfe_lite clocks check (git-fixes).</li>
<li>media: qcom: camss: Fix pm_domain_on sequence in probe (git-fixes).</li>
<li>media: qcom: camss: Fix vfe_get() error jump (git-fixes).</li>
<li>media: sharp: fix sharp encoding (git-fixes).</li>
<li>media: siano: Drop unnecessary error check for debugfs_create_dir/file() (git-fixes).</li>
<li>media: venus: hfi: add checks to handle capabilities from firmware (git-fixes).</li>
<li>media: venus: hfi: add checks to perform sanity on queue pointers (git-fixes).</li>
<li>media: venus: hfi: fix the check to handle session buffer requirement (git-fixes).</li>
<li>media: venus: hfi_parser: Add check to keep the number of codecs within range (git-fixes).</li>
<li>media: vidtv: mux: Add check and kfree for kstrdup (git-fixes).</li>
<li>media: vidtv: psi: Add check for kstrdup (git-fixes).</li>
<li>media: vivid: avoid integer overflow (git-fixes).</li>
<li>mfd: arizona-spi: Set pdata.hpdet_channel for ACPI enumerated devs (git-fixes).</li>
<li>mfd: core: Ensure disabled devices are skipped without aborting (git-fixes).</li>
<li>mfd: dln2: Fix double put in dln2_probe (git-fixes).</li>
<li>misc: fastrpc: Clean buffers on remote invocation failures (git-fixes).</li>
<li>misc: pci_endpoint_test: Add Device ID for R-Car S4-8 PCIe controller (git-fixes).</li>
<li>mm/hmm: fault non-owner device private entries (bsc#1216844, jsc#PED-7237, git-fixes).</li>
<li>mmc: block: Be sure to wait while busy in CQE error recovery (git-fixes).</li>
<li>mmc: block: Do not lose cache flush during CQE error recovery (git-fixes).</li>
<li>mmc: block: Retry commands in CQE error recovery (git-fixes).</li>
<li>mmc: cqhci: Fix task clearing in CQE error recovery (git-fixes).</li>
<li>mmc: cqhci: Increase recovery halt timeout (git-fixes).</li>
<li>mmc: cqhci: Warn of halt or task clear failure (git-fixes).</li>
<li>mmc: meson-gx: Remove setting of CMD_CFG_ERROR (git-fixes).</li>
<li>mmc: sdhci-pci-gli: A workaround to allow GL9750 to enter ASPM L1.2 (git-fixes).</li>
<li>mmc: sdhci-pci-gli: GL9750: Mask the replay timer timeout of AER (git-fixes).</li>
<li>mmc: sdhci_am654: fix start loop index for TAP value parsing (git-fixes).</li>
<li>mmc: vub300: fix an error code (git-fixes).</li>
<li>modpost: fix tee MODULE_DEVICE_TABLE built on big-endian host (git-fixes).</li>
<li>mt76: dma: use kzalloc instead of devm_kzalloc for txwi (git-fixes).</li>
<li>mtd: cfi_cmdset_0001: Byte swap OTP info (git-fixes).</li>
<li>mtd: rawnand: arasan: Include ECC syndrome along with in-band data while checking for ECC failure (git-fixes).</li>
<li>net-memcg: Fix scope of sockmem pressure indicators (bsc#1216759).</li>
<li>net: Avoid address overwrite in kernel_connect (bsc#1216861).</li>
<li>net: add macro netif_subqueue_completed_wake (bsc#1215458).</li>
<li>net: fix use-after-free in tw_timer_handler (bsc#1217195).</li>
<li>net: ieee802154: adf7242: Fix some potential buffer overflow in adf7242_stats_show() (git-fixes).</li>
<li>net: mana: Fix return type of mana_start_xmit() (git-fixes).</li>
<li>net: piggy back on the memory barrier in bql when waking queues (bsc#1215458).</li>
<li>net: provide macros for commonly copied lockless queue stop/wake code (bsc#1215458).</li>
<li>net: usb: ax88179_178a: fix failed operations during ax88179_reset (git-fixes).</li>
<li>net: usb: smsc95xx: Fix uninit-value access in smsc95xx_read_reg (git-fixes).</li>
<li>nvme: update firmware version after commit (bsc#1215292).</li>
<li>pcmcia: cs: fix possible hung task and memory leak pccardd() (git-fixes).</li>
<li>pcmcia: ds: fix possible name leak in error path in pcmcia_device_add() (git-fixes).</li>
<li>pcmcia: ds: fix refcount leak in pcmcia_device_add() (git-fixes).</li>
<li>pinctrl: avoid reload of p state in list iteration (git-fixes).</li>
<li>platform/x86: thinkpad_acpi: Add battery quirk for Thinkpad X120e (git-fixes).</li>
<li>platform/x86: wmi: Fix opening of char device (git-fixes).</li>
<li>platform/x86: wmi: Fix probe failure when failing to register WMI devices (git-fixes).</li>
<li>platform/x86: wmi: remove unnecessary initializations (git-fixes).</li>
<li>powerpc: Do not clobber f0/vs0 during fp|altivec register save (bsc#1217780).</li>
<li>pwm: Fix double shift bug (git-fixes).</li>
<li>pwm: brcmstb: Utilize appropriate clock APIs in suspend/resume (git-fixes).</li>
<li>pwm: sti: Reduce number of allocations and drop usage of chip_data (git-fixes).</li>
<li>r8152: Cancel hw_phy_work if we have an error in probe (git-fixes).</li>
<li>r8152: Check for unplug in r8153b_ups_en() / r8153c_ups_en() (git-fixes).</li>
<li>r8152: Check for unplug in rtl_phy_patch_request() (git-fixes).</li>
<li>r8152: Increase USB control msg timeout to 5000ms as per spec (git-fixes).</li>
<li>r8152: Release firmware if we have an error in probe (git-fixes).</li>
<li>r8152: Run the unload routine if we have errors during probe (git-fixes).</li>
<li>regmap: Ensure range selector registers are updated after cache sync (git-fixes).</li>
<li>regmap: debugfs: Fix a erroneous check after snprintf() (git-fixes).</li>
<li>regmap: prevent noinc writes from clobbering cache (git-fixes).</li>
<li>s390/ap: fix AP bus crash on early config change callback invocation (git-fixes bsc#1217687).</li>
<li>s390/cio: unregister device when the only path is gone (git-fixes bsc#1217609).</li>
<li>s390/cmma: fix detection of DAT pages (LTC#203997 bsc#1217086).</li>
<li>s390/cmma: fix handling of swapper_pg_dir and invalid_pg_dir (LTC#203997 bsc#1217086).</li>
<li>s390/cmma: fix initial kernel address space page table walk (LTC#203997 bsc#1217086).</li>
<li>s390/crashdump: fix TOD programmable field size (git-fixes bsc#1217205).</li>
<li>s390/dasd: fix hanging device after request requeue (git-fixes LTC#203629 bsc#1215124).</li>
<li>s390/dasd: protect device queue against concurrent access (git-fixes bsc#1217515).</li>
<li>s390/dasd: use correct number of retries for ERP requests (git-fixes bsc#1217598).</li>
<li>s390/ipl: add missing secure/has_secure file to ipl type &#x27;unknown&#x27; (bsc#1214976 git-fixes).</li>
<li>s390/mm: add missing arch_set_page_dat() call to gmap allocations (LTC#203997 bsc#1217086).</li>
<li>s390/mm: add missing arch_set_page_dat() call to vmem_crst_alloc() (LTC#203997 bsc#1217086).</li>
<li>s390/pkey: fix/harmonize internal keyblob headers (git-fixes bsc#1217200).</li>
<li>s390/ptrace: fix PTRACE_GET_LAST_BREAK error handling (git-fixes bsc#1217599).</li>
<li>sbsa_gwdt: Calculate timeout with 64-bit math (git-fixes).</li>
<li>scsi: lpfc: Copyright updates for 14.2.0.16 patches (bsc#1217731).</li>
<li>scsi: lpfc: Correct maximum PCI function value for RAS fw logging (bsc#1217731).</li>
<li>scsi: lpfc: Eliminate unnecessary relocking in lpfc_check_nlp_post_devloss() (bsc#1217731).</li>
<li>scsi: lpfc: Enhance driver logging for selected discovery events (bsc#1217731).</li>
<li>scsi: lpfc: Fix list_entry null check warning in lpfc_cmpl_els_plogi() (bsc#1217731).</li>
<li>scsi: lpfc: Fix possible file string name overflow when updating firmware (bsc#1217731).</li>
<li>scsi: lpfc: Introduce LOG_NODE_VERBOSE messaging flag (bsc#1217124).</li>
<li>scsi: lpfc: Refactor and clean up mailbox command memory free (bsc#1217731).</li>
<li>scsi: lpfc: Reject received PRLIs with only initiator fcn role for NPIV ports (bsc#1217124).</li>
<li>scsi: lpfc: Remove unnecessary zero return code assignment in lpfc_sli4_hba_setup (bsc#1217124).</li>
<li>scsi: lpfc: Return early in lpfc_poll_eratt() when the driver is unloading (bsc#1217731).</li>
<li>scsi: lpfc: Treat IOERR_SLI_DOWN I/O completion status the same as pci offline (bsc#1217124).</li>
<li>scsi: lpfc: Update lpfc version to 14.2.0.15 (bsc#1217124).</li>
<li>scsi: lpfc: Update lpfc version to 14.2.0.16 (bsc#1217731).</li>
<li>scsi: lpfc: Validate ELS LS_ACC completion payload (bsc#1217124).</li>
<li>scsi: qla2xxx: Fix double free of dsd_list during driver load (git-fixes).</li>
<li>scsi: qla2xxx: Use FIELD_GET() to extract PCIe capability fields (git-fixes).</li>
<li>selftests/efivarfs: create-read: fix a resource leak (git-fixes).</li>
<li>selftests/pidfd: Fix ksft print formats (git-fixes).</li>
<li>selftests/resctrl: Ensure the benchmark commands fits to its array (git-fixes).</li>
<li>selftests/resctrl: Reduce failures due to outliers in MBA/MBM tests (git-fixes).</li>
<li>selftests/resctrl: Remove duplicate feature check from CMT test (git-fixes).</li>
<li>seq_buf: fix a misleading comment (git-fixes).</li>
<li>serial: exar: Revert "serial: exar: Add support for Sealevel 7xxxC serial cards" (git-fixes).</li>
<li>serial: meson: Use platform_get_irq() to get the interrupt (git-fixes).</li>
<li>soc: qcom: llcc: Handle a second device without data corruption (git-fixes).</li>
<li>spi: nxp-fspi: use the correct ioremap function (git-fixes).</li>
<li>spi: spi-zynq-qspi: add spi-mem to driver kconfig dependencies (git-fixes).</li>
<li>spi: tegra: Fix missing IRQ check in tegra_slink_probe() (git-fixes).</li>
<li>staging: media: ipu3: remove ftrace-like logging (git-fixes).</li>
<li>string.h: add array-wrappers for (v)memdup_user() (git-fixes).</li>
<li>supported.conf: marked idpf supported</li>
<li>thermal: core: prevent potential string overflow (git-fixes).</li>
<li>treewide: Spelling fix in comment (git-fixes).</li>
<li>tty/sysrq: replace smp_processor_id() with get_cpu() (git-fixes).</li>
<li>tty: 8250: Add Brainboxes Oxford Semiconductor-based quirks (git-fixes).</li>
<li>tty: 8250: Add support for Brainboxes UP cards (git-fixes).</li>
<li>tty: 8250: Add support for Intashield IS-100 (git-fixes).</li>
<li>tty: 8250: Add support for Intashield IX cards (git-fixes).</li>
<li>tty: 8250: Add support for additional Brainboxes PX cards (git-fixes).</li>
<li>tty: 8250: Add support for additional Brainboxes UC cards (git-fixes).</li>
<li>tty: 8250: Fix port count of PX-257 (git-fixes).</li>
<li>tty: 8250: Fix up PX-803/PX-857 (git-fixes).</li>
<li>tty: 8250: Remove UC-257 and UC-431 (git-fixes).</li>
<li>tty: Fix uninit-value access in ppp_sync_receive() (git-fixes).</li>
<li>tty: n_gsm: fix race condition in status line change on dead connections (git-fixes).</li>
<li>tty: serial: meson: fix hard LOCKUP on crtscts mode (git-fixes).</li>
<li>tty: tty_jobctrl: fix pid memleak in disassociate_ctty() (git-fixes).</li>
<li>tty: vcc: Add check for kstrdup() in vcc_probe() (git-fixes).</li>
<li>usb: cdnsp: Fix deadlock issue during using NCM gadget (git-fixes).</li>
<li>usb: chipidea: Fix DMA overwrite for Tegra (git-fixes).</li>
<li>usb: chipidea: Simplify Tegra DMA alignment code (git-fixes).</li>
<li>usb: dwc2: fix possible NULL pointer dereference caused by driver concurrency (git-fixes).</li>
<li>usb: dwc3: Fix default mode initialization (git-fixes).</li>
<li>usb: dwc3: set the dma max_seg_size (git-fixes).</li>
<li>usb: gadget: f_ncm: Always set current gadget in ncm_bind() (git-fixes).</li>
<li>usb: raw-gadget: properly handle interrupted requests (git-fixes).</li>
<li>usb: storage: set 1.50 as the lower bcdDevice for older "Super Top" compatibility (git-fixes).</li>
<li>usb: typec: tcpm: Fix NULL pointer dereference in tcpm_pd_svdm() (git-fixes).</li>
<li>usb: typec: tcpm: Skip hard reset when in error recovery (git-fixes).</li>
<li>virtchnl: add virtchnl version 2 ops (bsc#1215458).</li>
<li>wifi: ath10k: Do not touch the CE interrupt registers after power up (git-fixes).</li>
<li>wifi: ath10k: fix clang-specific fortify warning (git-fixes).</li>
<li>wifi: ath11k: debugfs: fix to work with multiple PCI devices (git-fixes).</li>
<li>wifi: ath11k: fix dfs radar event locking (git-fixes).</li>
<li>wifi: ath11k: fix htt pktlog locking (git-fixes).</li>
<li>wifi: ath11k: fix temperature event locking (git-fixes).</li>
<li>wifi: ath9k: fix clang-specific fortify warnings (git-fixes).</li>
<li>wifi: iwlwifi: Use FW rate for non-data frames (git-fixes).</li>
<li>wifi: iwlwifi: call napi_synchronize() before freeing rx/tx queues (git-fixes).</li>
<li>wifi: iwlwifi: empty overflow queue during flush (git-fixes).</li>
<li>wifi: iwlwifi: honor the enable_ini value (git-fixes).</li>
<li>wifi: iwlwifi: pcie: synchronize IRQs before NAPI (git-fixes).</li>
<li>wifi: mac80211: do not return unset power in ieee80211_get_tx_power() (git-fixes).</li>
<li>wifi: mac80211: fix # of MSDU in A-MSDU calculation (git-fixes).</li>
<li>wifi: mt76: mt7603: rework/fix rx pse hang check (git-fixes).</li>
<li>wifi: rtlwifi: fix EDCA limit set by BT coexistence (git-fixes).</li>
<li>wifi: rtw88: debug: Fix the NULL vs IS_ERR() bug for debugfs_create_file() (git-fixes).</li>
<li>x86/alternative: Add a __alt_reloc_selftest() prototype (git-fixes).</li>
<li>x86/cpu: Fix AMD erratum #1485 on Zen4-based CPUs (git-fixes).</li>
<li>x86/fpu: Set X86_FEATURE_OSXSAVE feature after enabling OSXSAVE in CR4 (git-fixes).</li>
<li>x86/hyperv: Add HV_EXPOSE_INVARIANT_TSC define (git-fixes).</li>
<li>x86/hyperv: Improve code for referencing hyperv_pcpu_input_arg (git-fixes).</li>
<li>x86/hyperv: Make hv_get_nmi_reason public (git-fixes).</li>
<li>x86/hyperv: fix a warning in mshyperv.h (git-fixes).</li>
<li>x86/sev: Do not try to parse for the CC blob on non-AMD hardware (git-fixes).</li>
<li>x86/sev: Fix calculation of end address based on number of pages (git-fixes).</li>
<li>x86/sev: Use the GHCB protocol when available for SNP CPUID requests (git-fixes).</li>
<li>x86: Move gds_ucode_mitigated() declaration to header (git-fixes).</li>
<li>xfs: add attr state machine tracepoints (git-fixes).</li>
<li>xfs: can&#x27;t use kmem_zalloc() for attribute buffers (bsc#1216909).</li>
<li>xfs: constify btree function parameters that are not modified (git-fixes).</li>
<li>xfs: convert AGF log flags to unsigned (git-fixes).</li>
<li>xfs: convert AGI log flags to unsigned (git-fixes).</li>
<li>xfs: convert attr type flags to unsigned (git-fixes).</li>
<li>xfs: convert bmap extent type flags to unsigned (git-fixes).</li>
<li>xfs: convert bmapi flags to unsigned (git-fixes).</li>
<li>xfs: convert btree buffer log flags to unsigned (git-fixes).</li>
<li>xfs: convert buffer flags to unsigned (git-fixes).</li>
<li>xfs: convert buffer log item flags to unsigned (git-fixes).</li>
<li>xfs: convert da btree operations flags to unsigned (git-fixes).</li>
<li>xfs: convert dquot flags to unsigned (git-fixes).</li>
<li>xfs: convert inode lock flags to unsigned (git-fixes).</li>
<li>xfs: convert log item tracepoint flags to unsigned (git-fixes).</li>
<li>xfs: convert log ticket and iclog flags to unsigned (git-fixes).</li>
<li>xfs: convert quota options flags to unsigned (git-fixes).</li>
<li>xfs: convert scrub type flags to unsigned (git-fixes).</li>
<li>xfs: disambiguate units for ftrace fields tagged "blkno", "block", or "bno" (git-fixes).</li>
<li>xfs: disambiguate units for ftrace fields tagged "count" (git-fixes).</li>
<li>xfs: disambiguate units for ftrace fields tagged "len" (git-fixes).</li>
<li>xfs: disambiguate units for ftrace fields tagged "offset" (git-fixes).</li>
<li>xfs: make the key parameters to all btree key comparison functions const (git-fixes).</li>
<li>xfs: make the key parameters to all btree query range functions const (git-fixes).</li>
<li>xfs: make the keys and records passed to btree inorder functions const (git-fixes).</li>
<li>xfs: make the pointer passed to btree set_root functions const (git-fixes).</li>
<li>xfs: make the start pointer passed to btree alloc_block functions const (git-fixes).</li>
<li>xfs: make the start pointer passed to btree update_lastrec functions const (git-fixes).</li>
<li>xfs: mark the record passed into btree init_key functions as const (git-fixes).</li>
<li>xfs: mark the record passed into xchk_btree functions as const (git-fixes).</li>
<li>xfs: remove xfs_btree_cur_t typedef (git-fixes).</li>
<li>xfs: rename i_disk_size fields in ftrace output (git-fixes).</li>
<li>xfs: resolve fork names in trace output (git-fixes).</li>
<li>xfs: standardize AG block number formatting in ftrace output (git-fixes).</li>
<li>xfs: standardize AG number formatting in ftrace output (git-fixes).</li>
<li>xfs: standardize daddr formatting in ftrace output (git-fixes).</li>
<li>xfs: standardize inode generation formatting in ftrace output (git-fixes).</li>
<li>xfs: standardize inode number formatting in ftrace output (git-fixes).</li>
<li>xfs: standardize remaining xfs_buf length tracepoints (git-fixes).</li>
<li>xfs: standardize rmap owner number formatting in ftrace output (git-fixes).</li>
<li>xhci: Enable RPM on controllers that support low-power states (git-fixes).</li>
<li>xhci: Loosen RPM as default policy to cover for AMD xHC 1.1 (git-fixes).</li>
</ul>



    
        <h2>Special Instructions and Notes:</h2>
        <ul>
            
            
                <li>Please reboot the system after installing this update.</li>
            
            
        </ul>
    

    <h2>Patch Instructions:</h2>
    <p>
        To install this SUSE  update use the SUSE recommended
        installation methods like YaST online_update or "zypper patch".<br/>

        Alternatively you can run the command listed for your product:
    </p>
    <ul class="list-group">
        
            <li class="list-group-item">
                openSUSE Leap Micro 5.3
                
                    
                        <br/>
                        <code>zypper in -t patch openSUSE-Leap-Micro-5.3-2023-4731=1</code>
                    
                    
                
            </li>
        
            <li class="list-group-item">
                openSUSE Leap Micro 5.4
                
                    
                        <br/>
                        <code>zypper in -t patch openSUSE-Leap-Micro-5.4-2023-4731=1</code>
                    
                    
                
            </li>
        
            <li class="list-group-item">
                openSUSE Leap 15.4
                
                    
                        <br/>
                        <code>zypper in -t patch openSUSE-SLE-15.4-2023-4731=1</code>
                    
                    
                
            </li>
        
            <li class="list-group-item">
                SUSE Linux Enterprise Micro for Rancher 5.3
                
                    
                        <br/>
                        <code>zypper in -t patch SUSE-SLE-Micro-5.3-2023-4731=1</code>
                    
                    
                
            </li>
        
            <li class="list-group-item">
                SUSE Linux Enterprise Micro 5.3
                
                    
                        <br/>
                        <code>zypper in -t patch SUSE-SLE-Micro-5.3-2023-4731=1</code>
                    
                    
                
            </li>
        
            <li class="list-group-item">
                SUSE Linux Enterprise Micro for Rancher 5.4
                
                    
                        <br/>
                        <code>zypper in -t patch SUSE-SLE-Micro-5.4-2023-4731=1</code>
                    
                    
                
            </li>
        
            <li class="list-group-item">
                SUSE Linux Enterprise Micro 5.4
                
                    
                        <br/>
                        <code>zypper in -t patch SUSE-SLE-Micro-5.4-2023-4731=1</code>
                    
                    
                
            </li>
        
            <li class="list-group-item">
                SUSE Linux Enterprise Live Patching 15-SP4
                
                    
                        <br/>
                        <code>zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2023-4731=1</code>
                    
                    
                
            </li>
        
            <li class="list-group-item">
                SUSE Real Time Module 15-SP4
                
                    
                        <br/>
                        <code>zypper in -t patch SUSE-SLE-Module-RT-15-SP4-2023-4731=1</code>
                    
                    
                
            </li>
        
    </ul>

    <h2>Package List:</h2>
    <ul>
        
            
                <li>
                    openSUSE Leap Micro 5.3 (nosrc x86_64)
                    <ul>
                        
                            <li>kernel-rt-5.14.21-150400.15.62.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    openSUSE Leap Micro 5.3 (x86_64)
                    <ul>
                        
                            <li>kernel-rt-debuginfo-5.14.21-150400.15.62.1</li>
                        
                            <li>kernel-rt-debugsource-5.14.21-150400.15.62.1</li>
                        
                    </ul>
                </li>
            
        
            
                <li>
                    openSUSE Leap Micro 5.4 (nosrc x86_64)
                    <ul>
                        
                            <li>kernel-rt-5.14.21-150400.15.62.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    openSUSE Leap Micro 5.4 (x86_64)
                    <ul>
                        
                            <li>kernel-rt-debuginfo-5.14.21-150400.15.62.1</li>
                        
                            <li>kernel-rt-debugsource-5.14.21-150400.15.62.1</li>
                        
                    </ul>
                </li>
            
        
            
                <li>
                    openSUSE Leap 15.4 (x86_64)
                    <ul>
                        
                            <li>cluster-md-kmp-rt-5.14.21-150400.15.62.1</li>
                        
                            <li>dlm-kmp-rt-debuginfo-5.14.21-150400.15.62.1</li>
                        
                            <li>kernel-rt-debuginfo-5.14.21-150400.15.62.1</li>
                        
                            <li>ocfs2-kmp-rt-5.14.21-150400.15.62.1</li>
                        
                            <li>kernel-rt_debug-debuginfo-5.14.21-150400.15.62.1</li>
                        
                            <li>kernel-rt-debugsource-5.14.21-150400.15.62.1</li>
                        
                            <li>kernel-syms-rt-5.14.21-150400.15.62.1</li>
                        
                            <li>kernel-rt_debug-devel-debuginfo-5.14.21-150400.15.62.1</li>
                        
                            <li>cluster-md-kmp-rt-debuginfo-5.14.21-150400.15.62.1</li>
                        
                            <li>gfs2-kmp-rt-5.14.21-150400.15.62.1</li>
                        
                            <li>kernel-rt_debug-debugsource-5.14.21-150400.15.62.1</li>
                        
                            <li>kernel-rt-devel-5.14.21-150400.15.62.1</li>
                        
                            <li>kernel-rt_debug-devel-5.14.21-150400.15.62.1</li>
                        
                            <li>ocfs2-kmp-rt-debuginfo-5.14.21-150400.15.62.1</li>
                        
                            <li>kernel-rt-devel-debuginfo-5.14.21-150400.15.62.1</li>
                        
                            <li>dlm-kmp-rt-5.14.21-150400.15.62.1</li>
                        
                            <li>gfs2-kmp-rt-debuginfo-5.14.21-150400.15.62.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    openSUSE Leap 15.4 (noarch)
                    <ul>
                        
                            <li>kernel-source-rt-5.14.21-150400.15.62.1</li>
                        
                            <li>kernel-devel-rt-5.14.21-150400.15.62.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    openSUSE Leap 15.4 (nosrc x86_64)
                    <ul>
                        
                            <li>kernel-rt_debug-5.14.21-150400.15.62.1</li>
                        
                            <li>kernel-rt-5.14.21-150400.15.62.1</li>
                        
                    </ul>
                </li>
            
        
            
                <li>
                    SUSE Linux Enterprise Micro for Rancher 5.3 (nosrc x86_64)
                    <ul>
                        
                            <li>kernel-rt-5.14.21-150400.15.62.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    SUSE Linux Enterprise Micro for Rancher 5.3 (x86_64)
                    <ul>
                        
                            <li>kernel-rt-debuginfo-5.14.21-150400.15.62.1</li>
                        
                            <li>kernel-rt-debugsource-5.14.21-150400.15.62.1</li>
                        
                    </ul>
                </li>
            
        
            
                <li>
                    SUSE Linux Enterprise Micro 5.3 (nosrc x86_64)
                    <ul>
                        
                            <li>kernel-rt-5.14.21-150400.15.62.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    SUSE Linux Enterprise Micro 5.3 (x86_64)
                    <ul>
                        
                            <li>kernel-rt-debuginfo-5.14.21-150400.15.62.1</li>
                        
                            <li>kernel-rt-debugsource-5.14.21-150400.15.62.1</li>
                        
                    </ul>
                </li>
            
        
            
                <li>
                    SUSE Linux Enterprise Micro for Rancher 5.4 (nosrc x86_64)
                    <ul>
                        
                            <li>kernel-rt-5.14.21-150400.15.62.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    SUSE Linux Enterprise Micro for Rancher 5.4 (x86_64)
                    <ul>
                        
                            <li>kernel-rt-debuginfo-5.14.21-150400.15.62.1</li>
                        
                            <li>kernel-rt-debugsource-5.14.21-150400.15.62.1</li>
                        
                    </ul>
                </li>
            
        
            
                <li>
                    SUSE Linux Enterprise Micro 5.4 (nosrc x86_64)
                    <ul>
                        
                            <li>kernel-rt-5.14.21-150400.15.62.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    SUSE Linux Enterprise Micro 5.4 (x86_64)
                    <ul>
                        
                            <li>kernel-rt-debuginfo-5.14.21-150400.15.62.1</li>
                        
                            <li>kernel-rt-debugsource-5.14.21-150400.15.62.1</li>
                        
                    </ul>
                </li>
            
        
            
                <li>
                    SUSE Linux Enterprise Live Patching 15-SP4 (x86_64)
                    <ul>
                        
                            <li>kernel-livepatch-5_14_21-150400_15_62-rt-1-150400.1.3.1</li>
                        
                            <li>kernel-livepatch-5_14_21-150400_15_62-rt-debuginfo-1-150400.1.3.1</li>
                        
                            <li>kernel-livepatch-SLE15-SP4-RT_Update_16-debugsource-1-150400.1.3.1</li>
                        
                    </ul>
                </li>
            
        
            
                <li>
                    SUSE Real Time Module 15-SP4 (x86_64)
                    <ul>
                        
                            <li>cluster-md-kmp-rt-5.14.21-150400.15.62.1</li>
                        
                            <li>dlm-kmp-rt-debuginfo-5.14.21-150400.15.62.1</li>
                        
                            <li>kernel-rt-debuginfo-5.14.21-150400.15.62.1</li>
                        
                            <li>ocfs2-kmp-rt-5.14.21-150400.15.62.1</li>
                        
                            <li>kernel-rt_debug-debuginfo-5.14.21-150400.15.62.1</li>
                        
                            <li>kernel-rt-debugsource-5.14.21-150400.15.62.1</li>
                        
                            <li>kernel-syms-rt-5.14.21-150400.15.62.1</li>
                        
                            <li>kernel-rt_debug-devel-debuginfo-5.14.21-150400.15.62.1</li>
                        
                            <li>cluster-md-kmp-rt-debuginfo-5.14.21-150400.15.62.1</li>
                        
                            <li>gfs2-kmp-rt-5.14.21-150400.15.62.1</li>
                        
                            <li>kernel-rt_debug-debugsource-5.14.21-150400.15.62.1</li>
                        
                            <li>kernel-rt-devel-5.14.21-150400.15.62.1</li>
                        
                            <li>kernel-rt_debug-devel-5.14.21-150400.15.62.1</li>
                        
                            <li>ocfs2-kmp-rt-debuginfo-5.14.21-150400.15.62.1</li>
                        
                            <li>kernel-rt-devel-debuginfo-5.14.21-150400.15.62.1</li>
                        
                            <li>dlm-kmp-rt-5.14.21-150400.15.62.1</li>
                        
                            <li>gfs2-kmp-rt-debuginfo-5.14.21-150400.15.62.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    SUSE Real Time Module 15-SP4 (noarch)
                    <ul>
                        
                            <li>kernel-source-rt-5.14.21-150400.15.62.1</li>
                        
                            <li>kernel-devel-rt-5.14.21-150400.15.62.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    SUSE Real Time Module 15-SP4 (nosrc x86_64)
                    <ul>
                        
                            <li>kernel-rt_debug-5.14.21-150400.15.62.1</li>
                        
                            <li>kernel-rt-5.14.21-150400.15.62.1</li>
                        
                    </ul>
                </li>
            
        
    </ul>

    
        <h2>References:</h2>
        <ul>
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-2006.html">https://www.suse.com/security/cve/CVE-2023-2006.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-25775.html">https://www.suse.com/security/cve/CVE-2023-25775.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-39197.html">https://www.suse.com/security/cve/CVE-2023-39197.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-39198.html">https://www.suse.com/security/cve/CVE-2023-39198.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-4244.html">https://www.suse.com/security/cve/CVE-2023-4244.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-45863.html">https://www.suse.com/security/cve/CVE-2023-45863.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-45871.html">https://www.suse.com/security/cve/CVE-2023-45871.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-46862.html">https://www.suse.com/security/cve/CVE-2023-46862.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-5158.html">https://www.suse.com/security/cve/CVE-2023-5158.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-5717.html">https://www.suse.com/security/cve/CVE-2023-5717.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-6039.html">https://www.suse.com/security/cve/CVE-2023-6039.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-6176.html">https://www.suse.com/security/cve/CVE-2023-6176.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1084909">https://bugzilla.suse.com/show_bug.cgi?id=1084909</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1189998">https://bugzilla.suse.com/show_bug.cgi?id=1189998</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1210447">https://bugzilla.suse.com/show_bug.cgi?id=1210447</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1214286">https://bugzilla.suse.com/show_bug.cgi?id=1214286</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1214976">https://bugzilla.suse.com/show_bug.cgi?id=1214976</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1215124">https://bugzilla.suse.com/show_bug.cgi?id=1215124</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1215292">https://bugzilla.suse.com/show_bug.cgi?id=1215292</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1215420">https://bugzilla.suse.com/show_bug.cgi?id=1215420</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1215458">https://bugzilla.suse.com/show_bug.cgi?id=1215458</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1215710">https://bugzilla.suse.com/show_bug.cgi?id=1215710</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1216058">https://bugzilla.suse.com/show_bug.cgi?id=1216058</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1216105">https://bugzilla.suse.com/show_bug.cgi?id=1216105</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1216259">https://bugzilla.suse.com/show_bug.cgi?id=1216259</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1216584">https://bugzilla.suse.com/show_bug.cgi?id=1216584</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1216693">https://bugzilla.suse.com/show_bug.cgi?id=1216693</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1216759">https://bugzilla.suse.com/show_bug.cgi?id=1216759</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1216761">https://bugzilla.suse.com/show_bug.cgi?id=1216761</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1216844">https://bugzilla.suse.com/show_bug.cgi?id=1216844</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1216861">https://bugzilla.suse.com/show_bug.cgi?id=1216861</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1216909">https://bugzilla.suse.com/show_bug.cgi?id=1216909</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1216959">https://bugzilla.suse.com/show_bug.cgi?id=1216959</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1216965">https://bugzilla.suse.com/show_bug.cgi?id=1216965</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1216976">https://bugzilla.suse.com/show_bug.cgi?id=1216976</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1217036">https://bugzilla.suse.com/show_bug.cgi?id=1217036</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1217068">https://bugzilla.suse.com/show_bug.cgi?id=1217068</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1217086">https://bugzilla.suse.com/show_bug.cgi?id=1217086</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1217124">https://bugzilla.suse.com/show_bug.cgi?id=1217124</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1217140">https://bugzilla.suse.com/show_bug.cgi?id=1217140</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1217195">https://bugzilla.suse.com/show_bug.cgi?id=1217195</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1217200">https://bugzilla.suse.com/show_bug.cgi?id=1217200</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1217205">https://bugzilla.suse.com/show_bug.cgi?id=1217205</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1217332">https://bugzilla.suse.com/show_bug.cgi?id=1217332</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1217366">https://bugzilla.suse.com/show_bug.cgi?id=1217366</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1217515">https://bugzilla.suse.com/show_bug.cgi?id=1217515</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1217598">https://bugzilla.suse.com/show_bug.cgi?id=1217598</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1217599">https://bugzilla.suse.com/show_bug.cgi?id=1217599</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1217609">https://bugzilla.suse.com/show_bug.cgi?id=1217609</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1217687">https://bugzilla.suse.com/show_bug.cgi?id=1217687</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1217731">https://bugzilla.suse.com/show_bug.cgi?id=1217731</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1217780">https://bugzilla.suse.com/show_bug.cgi?id=1217780</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://jira.suse.com/browse/PED-3184">https://jira.suse.com/browse/PED-3184</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://jira.suse.com/browse/PED-5021">https://jira.suse.com/browse/PED-5021</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://jira.suse.com/browse/PED-7237">https://jira.suse.com/browse/PED-7237</a>
                    </li>
                
            
        </ul>
    
</div>