<div class="container">
    <h1>Security update for the Linux Kernel</h1>

    <table class="table table-striped table-bordered">
        <tbody>
        <tr>
            <th>Announcement ID:</th>
            <td>SUSE-SU-2023:1802-1</td>
        </tr>
        
        <tr>
            <th>Rating:</th>
            <td>important</td>
        </tr>
        <tr>
            <th>References:</th>
            <td>
                <ul>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1065729">#1065729</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1109158">#1109158</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1189998">#1189998</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1193629">#1193629</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1194869">#1194869</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1198400">#1198400</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1203200">#1203200</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1206552">#1206552</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1207168">#1207168</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1207185">#1207185</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1207574">#1207574</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1208602">#1208602</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1208815">#1208815</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1208902">#1208902</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1209052">#1209052</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1209118">#1209118</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1209256">#1209256</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1209290">#1209290</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1209292">#1209292</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1209366">#1209366</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1209532">#1209532</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1209547">#1209547</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1209556">#1209556</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1209600">#1209600</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1209634">#1209634</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1209635">#1209635</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1209636">#1209636</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1209681">#1209681</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1209684">#1209684</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1209779">#1209779</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1209788">#1209788</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1209798">#1209798</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1209799">#1209799</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1209804">#1209804</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1209805">#1209805</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1210050">#1210050</a>
                        </li>
                    
                </ul>
            </td>
        </tr>
        
            <tr>
                <th>
                    Cross-References:
                </th>
                <td>
                    <ul>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2017-5753.html">CVE-2017-5753</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2022-4744.html">CVE-2022-4744</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-0394.html">CVE-2023-0394</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-1281.html">CVE-2023-1281</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-1513.html">CVE-2023-1513</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-1582.html">CVE-2023-1582</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-1637.html">CVE-2023-1637</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-1652.html">CVE-2023-1652</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-28327.html">CVE-2023-28327</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-28464.html">CVE-2023-28464</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-28466.html">CVE-2023-28466</a>
                        </li>
                    
                    </ul>
                </td>
            </tr>
            <tr>
                <th>CVSS scores:</th>
                <td>
                    <ul class="list-group">
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2017-5753</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.1</span>
                                <span class="cvss-vector">CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2017-5753</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.6</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2017-5753</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.6</span>
                                <span class="cvss-vector">CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2022-4744</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.8</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2022-4744</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.8</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-0394</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">6.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-0394</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-1281</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.8</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-1281</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.8</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-1513</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">3.3</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-1513</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">3.3</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-1637</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">4.8</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-1637</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-1652</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.0</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-1652</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.1</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-28327</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-28464</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">4.8</span>
                                <span class="cvss-vector">CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-28464</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.8</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-28466</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.8</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-28466</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.0</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                    </ul>
                </td>
            </tr>
        
        <tr>
            <th>Affected Products:</th>
            <td>
                <ul class="list-group">
                    
                        <li class="list-group-item">openSUSE Leap 15.4</li>
                    
                        <li class="list-group-item">Public Cloud Module 15-SP4</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise High Performance Computing 15 SP4</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Server 15 SP4</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Server for SAP Applications 15 SP4</li>
                    
                        <li class="list-group-item">SUSE Manager Proxy 4.3</li>
                    
                        <li class="list-group-item">SUSE Manager Retail Branch Server 4.3</li>
                    
                        <li class="list-group-item">SUSE Manager Server 4.3</li>
                    
                </ul>
            </td>
        </tr>
        </tbody>
    </table>

    <p>An update that solves 11 vulnerabilities and has 25 fixes can now be installed.</p>

    <h2>Description:</h2>
    <p>The SUSE Linux Enterprise 15 SP4 Azure kernel was updated to receive various security and bugfixes.</p>
<p>The following security bugs were fixed:</p>
<ul>
<li>CVE-2017-5753: Fixed spectre V1 vulnerability on netlink (bsc#1209547).</li>
<li>CVE-2017-5753: Fixed spectre vulnerability in prlimit (bsc#1209256).</li>
<li>CVE-2022-4744: Fixed double-free that could lead to DoS or privilege escalation in TUN/TAP device driver functionality (bsc#1209635).</li>
<li>CVE-2023-0394: Fixed NULL pointer dereference that could lead to a system crash in rawv6_push_pending_frames in net/ipv6/raw.c (bsc#1207168).</li>
<li>CVE-2023-1281: Fixed use after free that could lead to privilege escalation in tcindex (bsc#1209634).</li>
<li>CVE-2023-1513: Fixed an uninitialized portions of the kvm_debugregs structure that could be copied to userspace, causing an information leak (bsc#1209532).</li>
<li>CVE-2023-1582: Fixed soft lockup in __page_mapcount (bsc#1209636).</li>
<li>CVE-2023-1637: Fixed vulnerability that could lead to unauthorized access to CPU memory after resuming CPU from suspend-to-RAM (bsc#1209779).</li>
<li>CVE-2023-1652: Fixed use-after-free that could lead to DoS and information leak in nfsd4_ssc_setup_dul in fs/nfsd/nfs4proc.c (bsc#1209788).</li>
<li>CVE-2023-28327: Fixed DoS in in_skb in unix_diag_get_exact() (bsc#1209290).</li>
<li>CVE-2023-28464: Fixed user-after-free that could lead to privilege escalation in hci_conn_cleanup in net/bluetooth/hci_conn.c (bsc#1209052).</li>
<li>CVE-2023-28466: Fixed race condition that could lead to use-after-free or NULL pointer dereference in do_tls_getsockopt in net/tls/tls_main.c (bsc#1209366).</li>
</ul>
<p>The following non-security bugs were fixed:</p>
<ul>
<li>ACPI: x86: utils: Add Cezanne to the list for forcing StorageD3Enable (git-fixes).</li>
<li>ALSA: hda/conexant: Partial revert of a quirk for Lenovo (git-fixes).</li>
<li>ALSA: hda/realtek: Add quirk for Lenovo ZhaoYang CF4620Z (git-fixes).</li>
<li>ALSA: hda/realtek: Add quirks for some Clevo laptops (git-fixes).</li>
<li>ALSA: hda/realtek: Fix support for Dell Precision 3260 (git-fixes).</li>
<li>ALSA: hda/realtek: Fix the speaker output on Samsung Galaxy Book2 Pro (git-fixes).</li>
<li>ALSA: hda: intel-dsp-config: add MTL PCI id (git-fixes).</li>
<li>ALSA: usb-audio: Fix recursive locking at XRUN during syncing (git-fixes).</li>
<li>ALSA: usb-audio: Fix regression on detection of Roland VS-100 (git-fixes).</li>
<li>ALSA: ymfpci: Fix BUG_ON in probe function (git-fixes).</li>
<li>ARM: dts: imx6sl: tolino-shine2hd: fix usbotg1 pinctrl (git-fixes).</li>
<li>ARM: dts: imx6sll: e60k02: fix usbotg1 pinctrl (git-fixes).</li>
<li>Bluetooth: L2CAP: Fix responding with wrong PDU type (git-fixes).</li>
<li>Bluetooth: btqcomsmd: Fix command timeout after setting BD address (git-fixes).</li>
<li>Bluetooth: btsdio: fix use after free bug in btsdio_remove due to unfinished work (git-fixes).</li>
<li>Fix error path in pci-hyperv to unlock the mutex state_lock</li>
<li>HID: cp2112: Fix driver not registering GPIO IRQ chip as threaded (git-fixes).</li>
<li>HID: intel-ish-hid: ipc: Fix potential use-after-free in work function (git-fixes).</li>
<li>Input: alps - fix compatibility with -funsigned-char (bsc#1209805).</li>
<li>KVM: x86: fix sending PV IPI (git-fixes).</li>
<li>Makefile: link with -z noexecstack --no-warn-rwx-segments (bsc#1203200).</li>
<li>NFSv4: Fix hangs when recovering open state after a server reboot (git-fixes).</li>
<li>PCI/DPC: Await readiness of secondary bus after reset (git-fixes).</li>
<li>PCI: hv: Add a per-bus mutex state_lock (bsc#1207185).</li>
<li>PCI: hv: Fix a race condition in hv_irq_unmask() that can cause panic (bsc#1207185).</li>
<li>PCI: hv: Remove the useless hv_pcichild_state from struct hv_pci_dev (bsc#1207185).</li>
<li>PCI: hv: Use async probing to reduce boot time (bsc#1207185).</li>
<li>PCI: hv: fix a race condition bug in hv_pci_query_relations() (bsc#1207185).</li>
<li>Revert "Makefile: link with -z noexecstack --no-warn-rwx-segments" (bsc#1209798)</li>
<li>Revert "PCI: hv: Fix a timing issue which causes kdump to fail occasionally" (bsc#1207185).</li>
<li>Revert "Revert "Makefile: link with -z noexecstack --no-warn-rwx-segments" (bsc#1209798)"</li>
<li>Revert "Revert "x86: link vdso and boot with -z noexecstack" (bsc#1209798)</li>
<li>Revert "x86: link vdso and boot with -z noexecstack" (bsc#1209798)</li>
<li>USB: cdns3: Fix issue with using incorrect PCI device function (git-fixes).</li>
<li>USB: cdnsp: Fixes issue with redundant Status Stage (git-fixes).</li>
<li>USB: cdnsp: changes PCI Device ID to fix conflict with CNDS3 driver (git-fixes).</li>
<li>USB: chipdea: core: fix return -EINVAL if request role is the same with current role (git-fixes).</li>
<li>USB: chipidea: fix memory leak with using debugfs_lookup() (git-fixes).</li>
<li>USB: dwc2: fix a devres leak in hw_enable upon suspend resume (git-fixes).</li>
<li>USB: dwc3: Fix a typo in field name (git-fixes).</li>
<li>USB: dwc3: gadget: Add 1ms delay after end transfer command without IOC (git-fixes).</li>
<li>USB: fotg210: fix memory leak with using debugfs_lookup() (git-fixes).</li>
<li>USB: gadget: bcm63xx_udc: fix memory leak with using debugfs_lookup() (git-fixes).</li>
<li>USB: gadget: gr_udc: fix memory leak with using debugfs_lookup() (git-fixes).</li>
<li>USB: gadget: lpc32xx_udc: fix memory leak with using debugfs_lookup() (git-fixes).</li>
<li>USB: gadget: pxa25x_udc: fix memory leak with using debugfs_lookup() (git-fixes).</li>
<li>USB: gadget: u_audio: do not let userspace block driver unbind (git-fixes).</li>
<li>USB: isp116x: fix memory leak with using debugfs_lookup() (git-fixes).</li>
<li>USB: isp1362: fix memory leak with using debugfs_lookup() (git-fixes).</li>
<li>USB: sl811: fix memory leak with using debugfs_lookup() (git-fixes).</li>
<li>USB: typec: tcpm: fix warning when handle discover_identity message (git-fixes).</li>
<li>USB: ucsi: Fix NULL pointer deref in ucsi_connector_change() (git-fixes).</li>
<li>USB: uhci: fix memory leak with using debugfs_lookup() (git-fixes).</li>
<li>arch: fix broken BuildID for arm64 and riscv (bsc#1209798).</li>
<li>arm64/cpufeature: Fix field sign for DIT hwcap detection (git-fixes)</li>
<li>arm64: dts: freescale: Fix pca954x i2c-mux node names (git-fixes)</li>
<li>arm64: dts: imx8mm-nitrogen-r2: fix WM8960 clock name (git-fixes).</li>
<li>arm64: dts: imx8mn: specify #sound-dai-cells for SAI nodes (git-fixes).</li>
<li>arm64: dts: imx8mp-phycore-som: Remove invalid PMIC property (git-fixes)</li>
<li>arm64: dts: imx8mp: correct usb clocks (git-fixes)</li>
<li>arm64: dts: imx8mq: add mipi csi phy and csi bridge descriptions (git-fixes)</li>
<li>arm64: dts: imx8mq: fix mipi_csi bidirectional port numbers (git-fixes)</li>
<li>arm64: dts: qcom: sm8350: Mark UFS controller as cache coherent (git-fixes).</li>
<li>atm: idt77252: fix kmemleak when rmmod idt77252 (git-fixes).</li>
<li>ca8210: Fix unsigned mac_len comparison with zero in ca8210_skb_tx() (git-fixes).</li>
<li>ca8210: fix mac_len negative array access (git-fixes).</li>
<li>can: bcm: bcm_tx_setup(): fix KMSAN uninit-value in vfs_write (git-fixes).</li>
<li>cifs: Fix smb2_set_path_size() (git-fixes).</li>
<li>cifs: Move the in_send statistic to __smb_send_rqst() (git-fixes).</li>
<li>cifs: append path to open_enter trace event (bsc#1193629).</li>
<li>cifs: avoid race conditions with parallel reconnects (bsc#1193629).</li>
<li>cifs: avoid races in parallel reconnects in smb1 (bsc#1193629).</li>
<li>cifs: check only tcon status on tcon related functions (bsc#1193629).</li>
<li>cifs: do not poll server interfaces too regularly (bsc#1193629).</li>
<li>cifs: dump pending mids for all channels in DebugData (bsc#1193629).</li>
<li>cifs: empty interface list when server does not support query interfaces (bsc#1193629).</li>
<li>cifs: fix DFS traversal oops without CONFIG_CIFS_DFS_UPCALL (bsc#1193629).</li>
<li>cifs: fix dentry lookups in directory handle cache (bsc#1193629).</li>
<li>cifs: fix missing unload_nls() in smb2_reconnect() (bsc#1193629).</li>
<li>cifs: fix use-after-free bug in refresh_cache_worker() (bsc#1193629).</li>
<li>cifs: generate signkey for the channel that&#x27;s reconnecting (bsc#1193629).</li>
<li>cifs: get rid of dead check in smb2_reconnect() (bsc#1193629).</li>
<li>cifs: lock chan_lock outside match_session (bsc#1193629).</li>
<li>cifs: prevent infinite recursion in CIFSGetDFSRefer() (bsc#1193629).</li>
<li>cifs: print session id while listing open files (bsc#1193629).</li>
<li>cifs: return DFS root session id in DebugData (bsc#1193629).</li>
<li>cifs: set DFS root session in cifs_get_smb_ses() (bsc#1193629).</li>
<li>cifs: use DFS root session instead of tcon ses (bsc#1193629).</li>
<li>drivers/base: Fix unsigned comparison to -1 in CPUMAP_FILE_MAX_BYTES (bsc#1208815).</li>
<li>drivers/base: fix userspace break from using bin_attributes for cpumap and cpulist (bsc#1208815).</li>
<li>drm/amd/display: fix shift-out-of-bounds in CalculateVMAndRowBytes (git-fixes).</li>
<li>drm/amdkfd: Fix an illegal memory access (git-fixes).</li>
<li>drm/bridge: lt8912b: return EPROBE_DEFER if bridge is not found (git-fixes).</li>
<li>drm/i915/active: Fix missing debug object activation (git-fixes).</li>
<li>drm/i915/active: Fix misuse of non-idle barriers as fence trackers (git-fixes).</li>
<li>drm/i915/display/psr: Handle plane and pipe restrictions at every page flip (git-fixes).</li>
<li>drm/i915/display/psr: Use drm damage helpers to calculate plane damaged area (git-fixes).</li>
<li>drm/i915/display: Workaround cursor left overs with PSR2 selective fetch enabled (git-fixes).</li>
<li>drm/i915/display: clean up comments (git-fixes).</li>
<li>drm/i915/gt: perform uc late init after probe error injection (git-fixes).</li>
<li>drm/i915/psr: Use calculated io and fast wake lines (git-fixes).</li>
<li>drm/i915/tc: Fix the ICL PHY ownership check in TC-cold state (git-fixes).</li>
<li>drm/i915: Do not use BAR mappings for ring buffers with LLC (git-fixes).</li>
<li>drm/i915: Do not use stolen memory for ring buffers with LLC (git-fixes).</li>
<li>drm/i915: Preserve crtc_state->inherited during state clearing (git-fixes).</li>
<li>drm/i915: Remove unused bits of i915_vma/active api (git-fixes).</li>
<li>efi: sysfb_efi: Fix DMI quirks not working for simpledrm (git-fixes).</li>
<li>fbdev: stifb: Provide valid pixelclock and add fb_check_var() checks (git-fixes).</li>
<li>firmware: arm_scmi: Fix device node validation for mailbox transport (git-fixes).</li>
<li>hwmon: fix potential sensor registration fail if of_node is missing (git-fixes).</li>
<li>i2c: hisi: Only use the completion interrupt to finish the transfer (git-fixes).</li>
<li>i2c: imx-lpi2c: check only for enabled interrupt flags (git-fixes).</li>
<li>i2c: xgene-slimpro: Fix out-of-bounds bug in xgene_slimpro_i2c_xfer() (git-fixes).</li>
<li>kABI: x86/msr: Remove .fixup usage (kabi).</li>
<li>kconfig: Update config changed flag before calling callback (git-fixes).</li>
<li>lan78xx: Add missing return code checks (git-fixes).</li>
<li>lan78xx: Fix exception on link speed change (git-fixes).</li>
<li>lan78xx: Fix memory allocation bug (git-fixes).</li>
<li>lan78xx: Fix partial packet errors on suspend/resume (git-fixes).</li>
<li>lan78xx: Fix race condition in disconnect handling (git-fixes).</li>
<li>lan78xx: Fix race conditions in suspend/resume handling (git-fixes).</li>
<li>lan78xx: Fix white space and style issues (git-fixes).</li>
<li>lan78xx: Remove unused pause frame queue (git-fixes).</li>
<li>lan78xx: Remove unused timer (git-fixes).</li>
<li>lan78xx: Set flow control threshold to prevent packet loss (git-fixes).</li>
<li>lockd: set file_lock start and end when decoding nlm4 testargs (git-fixes).</li>
<li>locking/rwbase: Mitigate indefinite writer starvation (bsc#1189998 (PREEMPT_RT prerequisite backports), bsc#1206552).</li>
<li>mm: memcg: fix swapcached stat accounting (bsc#1209804).</li>
<li>mmc: atmel-mci: fix race between stop command and start of next command (git-fixes).</li>
<li>mtd: rawnand: meson: invalidate cache on polling ECC bit (git-fixes).</li>
<li>net: asix: fix modprobe "sysfs: cannot create duplicate filename" (git-fixes).</li>
<li>net: mdio: thunder: Add missing fwnode_handle_put() (git-fixes).</li>
<li>net: phy: Ensure state transitions are processed from phy_stop() (git-fixes).</li>
<li>net: phy: dp83869: fix default value for tx-/rx-internal-delay (git-fixes).</li>
<li>net: phy: nxp-c45-tja11xx: fix MII_BASIC_CONFIG_REV bit (git-fixes).</li>
<li>net: phy: smsc: bail out in lan87xx_read_status if genphy_read_status fails (git-fixes).</li>
<li>net: qcom/emac: Fix use after free bug in emac_remove due to race condition (git-fixes).</li>
<li>net: usb: asix: remove redundant assignment to variable reg (git-fixes).</li>
<li>net: usb: cdc_mbim: avoid altsetting toggling for Telit FE990 (git-fixes).</li>
<li>net: usb: lan78xx: Limit packet length to skb->len (git-fixes).</li>
<li>net: usb: qmi_wwan: add Telit 0x1080 composition (git-fixes).</li>
<li>net: usb: smsc95xx: Limit packet length to skb->len (git-fixes).</li>
<li>net: usb: use eth_hw_addr_set() (git-fixes).</li>
<li>nilfs2: fix kernel-infoleak in nilfs_ioctl_wrap_copy() (git-fixes).</li>
<li>nvme-tcp: always fail a request when sending it failed (bsc#1208902).</li>
<li>pinctrl: amd: Disable and mask interrupts on resume (git-fixes).</li>
<li>pinctrl: at91-pio4: fix domain name assignment (git-fixes).</li>
<li>pinctrl: ocelot: Fix alt mode for ocelot (git-fixes).</li>
<li>platform/chrome: cros_ec_chardev: fix kernel data leak from ioctl (git-fixes).</li>
<li>platform/x86/intel/pmc: Alder Lake PCH slp_s0_residency fix (git-fixes).</li>
<li>platform/x86: think-lmi: Add possible_values for ThinkStation (git-fixes).</li>
<li>platform/x86: think-lmi: Certificate authentication support (bsc#1210050).</li>
<li>platform/x86: think-lmi: Move kobject_init() call into tlmi_create_auth() (bsc#1210050).</li>
<li>platform/x86: think-lmi: Opcode support (bsc#1210050).</li>
<li>platform/x86: think-lmi: Prevent underflow in index_store() (bsc#1210050).</li>
<li>platform/x86: think-lmi: Simplify tlmi_analyze() error handling a bit (bsc#1210050).</li>
<li>platform/x86: think-lmi: Use min_t() for comparison and assignment (bsc#1210050).</li>
<li>platform/x86: think-lmi: add debug_cmd (bsc#1210050).</li>
<li>platform/x86: think-lmi: add missing type attribute (git-fixes).</li>
<li>platform/x86: think-lmi: certificate support clean ups (bsc#1210050).</li>
<li>platform/x86: think-lmi: only display possible_values if available (git-fixes).</li>
<li>platform/x86: think-lmi: use correct possible_values delimiters (git-fixes).</li>
<li>platform/x86: thinkpad-acpi: Add support for automatic mode transitions (bsc#1210050).</li>
<li>platform/x86: thinkpad-acpi: Enable AMT by default on supported systems (bsc#1210050).</li>
<li>platform/x86: thinkpad-acpi: profile capabilities as integer (bsc#1210050).</li>
<li>platform/x86: thinkpad_acpi: Accept ibm_init_struct.init() returning -ENODEV (bsc#1210050).</li>
<li>platform/x86: thinkpad_acpi: Add LED_RETAIN_AT_SHUTDOWN to led_class_devs (bsc#1210050).</li>
<li>platform/x86: thinkpad_acpi: Add PSC mode support (bsc#1210050).</li>
<li>platform/x86: thinkpad_acpi: Add a s2idle resume quirk for a number of laptops (bsc#1210050).</li>
<li>platform/x86: thinkpad_acpi: Add dual fan probe (bsc#1210050).</li>
<li>platform/x86: thinkpad_acpi: Add dual-fan quirk for T15g (2nd gen) (bsc#1210050).</li>
<li>platform/x86: thinkpad_acpi: Add hotkey_notify_extended_hotkey() helper (bsc#1210050).</li>
<li>platform/x86: thinkpad_acpi: Add lid_logo_dot to the list of safe LEDs (bsc#1210050).</li>
<li>platform/x86: thinkpad_acpi: Add quirk for ThinkPads without a fan (bsc#1210050).</li>
<li>platform/x86: thinkpad_acpi: Cleanup dytc_profile_available (bsc#1210050).</li>
<li>platform/x86: thinkpad_acpi: Convert btusb DMI list to quirks (bsc#1210050).</li>
<li>platform/x86: thinkpad_acpi: Convert platform driver to use dev_groups (bsc#1210050).</li>
<li>platform/x86: thinkpad_acpi: Correct dual fan probe (bsc#1210050).</li>
<li>platform/x86: thinkpad_acpi: Do not use test_bit on an integer (bsc#1210050).</li>
<li>platform/x86: thinkpad_acpi: Enable s2idle quirk for 21A1 machine type (bsc#1210050).</li>
<li>platform/x86: thinkpad_acpi: Explicitly set to balanced mode on startup (bsc#1210050).</li>
<li>platform/x86: thinkpad_acpi: Fix a memory leak of EFCH MMIO resource (bsc#1210050).</li>
<li>platform/x86: thinkpad_acpi: Fix coccinelle warnings (bsc#1210050).</li>
<li>platform/x86: thinkpad_acpi: Fix compiler warning about uninitialized err variable (bsc#1210050).</li>
<li>platform/x86: thinkpad_acpi: Fix incorrect use of platform profile on AMD platforms (bsc#1210050).</li>
<li>platform/x86: thinkpad_acpi: Fix max_brightness of thinklight (bsc#1210050).</li>
<li>platform/x86: thinkpad_acpi: Fix profile mode display in AMT mode (bsc#1210050).</li>
<li>platform/x86: thinkpad_acpi: Fix profile modes on Intel platforms (bsc#1210050).</li>
<li>platform/x86: thinkpad_acpi: Fix reporting a non present second fan on some models (bsc#1210050).</li>
<li>platform/x86: thinkpad_acpi: Fix the hwmon sysfs-attr showing up in the wrong place (bsc#1210050).</li>
<li>platform/x86: thinkpad_acpi: Fix thermal_temp_input_attr sorting (bsc#1210050).</li>
<li>platform/x86: thinkpad_acpi: Fix thinklight LED brightness returning 255 (bsc#1210050).</li>
<li>platform/x86: thinkpad_acpi: Get privacy-screen / lcdshadow ACPI handles only once (bsc#1210050).</li>
<li>platform/x86: thinkpad_acpi: Make *_init() functions return -ENODEV instead of 1 (bsc#1210050).</li>
<li>platform/x86: thinkpad_acpi: Properly indent code in tpacpi_dytc_profile_init() (bsc#1210050).</li>
<li>platform/x86: thinkpad_acpi: Register tpacpi_pdriver after subdriver init (bsc#1210050).</li>
<li>platform/x86: thinkpad_acpi: Remove "goto err_exit" from hotkey_init() (bsc#1210050).</li>
<li>platform/x86: thinkpad_acpi: Remove unused sensors_pdev_attrs_registered flag (bsc#1210050).</li>
<li>platform/x86: thinkpad_acpi: Restore missing hotkey_tablet_mode and hotkey_radio_sw sysfs-attr (bsc#1210050).</li>
<li>platform/x86: thinkpad_acpi: Simplify dytc_version handling (bsc#1210050).</li>
<li>platform/x86: thinkpad_acpi: Switch to common use of attributes (bsc#1210050).</li>
<li>platform/x86: thinkpad_acpi: Use backlight helper (bsc#1210050).</li>
<li>platform/x86: thinkpad_acpi: clean up dytc profile convert (bsc#1210050).</li>
<li>platform/x86: thinkpad_acpi: consistently check fan_get_status return (bsc#1210050).</li>
<li>platform/x86: thinkpad_acpi: do not use PSC mode on Intel platforms (bsc#1210050).</li>
<li>platform/x86: thinkpad_acpi: tpacpi_attr_group contains driver attributes not device attrs (bsc#1210050).</li>
<li>platform/x86: thinkpad_acpi: use strstarts() (bsc#1210050).</li>
<li>power: supply: da9150: Fix use after free bug in da9150_charger_remove due to race condition (git-fixes).</li>
<li>powerpc/64s/interrupt: Fix interrupt exit race with security mitigation switch (bsc#1194869).</li>
<li>powerpc/btext: add missing of_node_put (bsc#1065729).</li>
<li>powerpc/ioda/iommu/debugfs: Generate unique debugfs entries (bsc#1194869).</li>
<li>powerpc/iommu: Add missing of_node_put in iommu_init_early_dart (bsc#1194869).</li>
<li>powerpc/iommu: fix memory leak with using debugfs_lookup() (bsc#1194869).</li>
<li>powerpc/kcsan: Exclude udelay to prevent recursive instrumentation (bsc#1194869).</li>
<li>powerpc/kexec_file: fix implicit decl error (bsc#1194869).</li>
<li>powerpc/powernv/ioda: Skip unallocated resources when mapping to PE (bsc#1065729).</li>
<li>powerpc/powernv: fix missing of_node_put in uv_init() (bsc#1194869).</li>
<li>powerpc/pseries/lpar: add missing RTAS retry status handling (bsc#1109158 ltc#169177 git-fixes).</li>
<li>powerpc/pseries/lparcfg: add missing RTAS retry status handling (bsc#1065729).</li>
<li>powerpc/rtas: ensure 4KB alignment for rtas_data_buf (bsc#1065729).</li>
<li>powerpc/vmlinux.lds: Define RUNTIME_DISCARD_EXIT (bsc#1194869).</li>
<li>powerpc/vmlinux.lds: Do not discard .comment (bsc#1194869).</li>
<li>powerpc/vmlinux.lds: Do not discard .rela* for relocatable builds (bsc#1194869).</li>
<li>powerpc/xmon: Fix -Wswitch-unreachable warning in bpt_cmds (bsc#1194869).</li>
<li>powerpc: Remove linker flag from KBUILD_AFLAGS (bsc#1194869).</li>
<li>r8169: fix RTL8168H and RTL8107E rx crc error (git-fixes).</li>
<li>regulator: Handle deferred clk (git-fixes).</li>
<li>remove "PCI: hv: Use async probing to reduce boot time" (bsc#1207185).</li>
<li>rpm/config.sh: Disable DT build. This setting has been ignored for non-default variants so far.</li>
<li>rpm/constraints.in: increase the disk size for armv6/7 to 24GB It grows and the build fails recently on SLE15-SP4/5.</li>
<li>s390/boot: simplify and fix kernel memory layout setup (bsc#1209600).</li>
<li>s390/dasd: fix no record found for raw_track_access (bsc#1207574).</li>
<li>s390/vfio-ap: fix memory leak in vfio_ap device driver (git-fixes).</li>
<li>sbitmap: Avoid lockups when waker gets preempted (bsc#1209118).</li>
<li>sched/psi: Fix use-after-free in ep_remove_wait_queue() (bsc#1209799).</li>
<li>scsi: qla2xxx: Synchronize the IOCB count to be in order (bsc#1209292 bsc#1209684 bsc#1209556).</li>
<li>sctp: sctp_sock_filter(): avoid list_entry() on possibly empty list (bsc#1208602, git-fixes).</li>
<li>serial: 8250: ASPEED_VUART: select REGMAP instead of depending on it (git-fixes).</li>
<li>serial: 8250: SERIAL_8250_ASPEED_VUART should depend on ARCH_ASPEED (git-fixes).</li>
<li>serial: fsl_lpuart: Fix comment typo (git-fixes).</li>
<li>smb3: fix unusable share after force unmount failure (bsc#1193629).</li>
<li>smb3: lower default deferred close timeout to address perf regression (bsc#1193629).</li>
<li>thunderbolt: Add missing UNSET_INBOUND_SBTX for retimer access (git-fixes).</li>
<li>thunderbolt: Call tb_check_quirks() after initializing adapters (git-fixes).</li>
<li>thunderbolt: Disable interrupt auto clear for rings (git-fixes).</li>
<li>thunderbolt: Rename shadowed variables bit to interrupt_bit and auto_clear_bit (git-fixes).</li>
<li>thunderbolt: Use const qualifier for <code>ring_interrupt_index</code> (git-fixes).</li>
<li>thunderbolt: Use scale field when allocating USB3 bandwidth (git-fixes).</li>
<li>tty: serial: fsl_lpuart: skip waiting for transmission complete when UARTCTRL_SBK is asserted (git-fixes).</li>
<li>uas: Add US_FL_NO_REPORT_OPCODES for JMicron JMS583Gen 2 (git-fixes).</li>
<li>vdpa_sim: set last_used_idx as last_avail_idx in vdpasim_queue_ready (git-fixes).</li>
<li>wifi: mac80211: fix qos on mesh interfaces (git-fixes).</li>
<li>x86/bug: Merge annotate_reachable() into _BUG_FLAGS() asm (git-fixes).</li>
<li>x86/fpu/xsave: Handle compacted offsets correctly with supervisor states (git-fixes).</li>
<li>x86/fpu/xstate: Fix the ARCH_REQ_XCOMP_PERM implementation (git-fixes).</li>
<li>x86/fpu/xstate: Fix the ARCH_REQ_XCOMP_PERM implementation (git-fixes).</li>
<li>x86/fpu: Cache xfeature flags from CPUID (git-fixes).</li>
<li>x86/fpu: Remove unused supervisor only offsets (git-fixes).</li>
<li>x86/kvm: Do not use pv tlb/ipi/sched_yield if on 1 vCPU (git-fixes).</li>
<li>x86/mce/inject: Avoid out-of-bounds write when setting flags (git-fixes).</li>
<li>x86/mce: Allow instrumentation during task work queueing (git-fixes).</li>
<li>x86/mce: Mark mce_end() noinstr (git-fixes).</li>
<li>x86/mce: Mark mce_panic() noinstr (git-fixes).</li>
<li>x86/mce: Mark mce_read_aux() noinstr (git-fixes).</li>
<li>x86/mm: Flush global TLB when switching to trampoline page-table (git-fixes).</li>
<li>x86/msr: Remove .fixup usage (git-fixes).</li>
<li>x86/sgx: Free backing memory after faulting the enclave page (git-fixes).</li>
<li>x86/sgx: Silence softlockup detection when releasing large enclaves (git-fixes).</li>
<li>x86/uaccess: Move variable into switch case statement (git-fixes).</li>
<li>x86: Annotate call_on_stack() (git-fixes).</li>
<li>x86: link vdso and boot with -z noexecstack --no-warn-rwx-segments (bsc#1203200).</li>
<li>xfs: convert ptag flags to unsigned (git-fixes).</li>
<li>xfs: do not assert fail on perag references on teardown (git-fixes).</li>
<li>xfs: do not leak btree cursor when insrec fails after a split (git-fixes).</li>
<li>xfs: pass the correct cursor to xfs_iomap_prealloc_size (git-fixes).</li>
<li>xfs: remove xfs_setattr_time() declaration (git-fixes).</li>
<li>xfs: zero inode fork buffer at allocation (git-fixes).</li>
<li>xirc2ps_cs: Fix use after free bug in xirc2ps_detach (git-fixes).</li>
</ul>

    
        <h2>Special Instructions and Notes:</h2>
        <ul>
            
            
                <li>Please reboot the system after installing this update.</li>
            
            
        </ul>
    

    <h2>Patch Instructions:</h2>
    <p>
        To install this SUSE Important update use the SUSE recommended
        installation methods like YaST online_update or "zypper patch".<br/>

        Alternatively you can run the command listed for your product:
    </p>
    <ul class="list-group">
        
            <li class="list-group-item">
                openSUSE Leap 15.4
                
                    
                        <br/>
                        <code>zypper in -t patch openSUSE-SLE-15.4-2023-1802=1</code>
                    
                    
                
            </li>
        
            <li class="list-group-item">
                Public Cloud Module 15-SP4
                
                    
                        <br/>
                        <code>zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP4-2023-1802=1</code>
                    
                    
                
            </li>
        
    </ul>

    <h2>Package List:</h2>
    <ul>
        
            
                <li>
                    openSUSE Leap 15.4 (aarch64 x86_64)
                    <ul>
                        
                            <li>ocfs2-kmp-azure-5.14.21-150400.14.43.1</li>
                        
                            <li>kselftests-kmp-azure-5.14.21-150400.14.43.1</li>
                        
                            <li>kernel-azure-optional-debuginfo-5.14.21-150400.14.43.1</li>
                        
                            <li>dlm-kmp-azure-5.14.21-150400.14.43.1</li>
                        
                            <li>kernel-azure-debugsource-5.14.21-150400.14.43.1</li>
                        
                            <li>kernel-azure-devel-5.14.21-150400.14.43.1</li>
                        
                            <li>kernel-azure-livepatch-devel-5.14.21-150400.14.43.1</li>
                        
                            <li>ocfs2-kmp-azure-debuginfo-5.14.21-150400.14.43.1</li>
                        
                            <li>reiserfs-kmp-azure-5.14.21-150400.14.43.1</li>
                        
                            <li>kernel-azure-devel-debuginfo-5.14.21-150400.14.43.1</li>
                        
                            <li>cluster-md-kmp-azure-debuginfo-5.14.21-150400.14.43.1</li>
                        
                            <li>kernel-azure-extra-debuginfo-5.14.21-150400.14.43.1</li>
                        
                            <li>kernel-azure-extra-5.14.21-150400.14.43.1</li>
                        
                            <li>kselftests-kmp-azure-debuginfo-5.14.21-150400.14.43.1</li>
                        
                            <li>kernel-azure-debuginfo-5.14.21-150400.14.43.1</li>
                        
                            <li>kernel-syms-azure-5.14.21-150400.14.43.1</li>
                        
                            <li>reiserfs-kmp-azure-debuginfo-5.14.21-150400.14.43.1</li>
                        
                            <li>gfs2-kmp-azure-debuginfo-5.14.21-150400.14.43.1</li>
                        
                            <li>gfs2-kmp-azure-5.14.21-150400.14.43.1</li>
                        
                            <li>dlm-kmp-azure-debuginfo-5.14.21-150400.14.43.1</li>
                        
                            <li>kernel-azure-optional-5.14.21-150400.14.43.1</li>
                        
                            <li>cluster-md-kmp-azure-5.14.21-150400.14.43.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    openSUSE Leap 15.4 (aarch64 nosrc x86_64)
                    <ul>
                        
                            <li>kernel-azure-5.14.21-150400.14.43.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    openSUSE Leap 15.4 (noarch)
                    <ul>
                        
                            <li>kernel-devel-azure-5.14.21-150400.14.43.1</li>
                        
                            <li>kernel-source-azure-5.14.21-150400.14.43.1</li>
                        
                    </ul>
                </li>
            
        
            
                <li>
                    Public Cloud Module 15-SP4 (aarch64 nosrc x86_64)
                    <ul>
                        
                            <li>kernel-azure-5.14.21-150400.14.43.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    Public Cloud Module 15-SP4 (aarch64 x86_64)
                    <ul>
                        
                            <li>kernel-azure-debuginfo-5.14.21-150400.14.43.1</li>
                        
                            <li>kernel-syms-azure-5.14.21-150400.14.43.1</li>
                        
                            <li>kernel-azure-debugsource-5.14.21-150400.14.43.1</li>
                        
                            <li>kernel-azure-devel-5.14.21-150400.14.43.1</li>
                        
                            <li>kernel-azure-devel-debuginfo-5.14.21-150400.14.43.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    Public Cloud Module 15-SP4 (noarch)
                    <ul>
                        
                            <li>kernel-devel-azure-5.14.21-150400.14.43.1</li>
                        
                            <li>kernel-source-azure-5.14.21-150400.14.43.1</li>
                        
                    </ul>
                </li>
            
        
    </ul>

    
        <h2>References:</h2>
        <ul>
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2017-5753.html">https://www.suse.com/security/cve/CVE-2017-5753.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2022-4744.html">https://www.suse.com/security/cve/CVE-2022-4744.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-0394.html">https://www.suse.com/security/cve/CVE-2023-0394.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-1281.html">https://www.suse.com/security/cve/CVE-2023-1281.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-1513.html">https://www.suse.com/security/cve/CVE-2023-1513.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-1582.html">https://www.suse.com/security/cve/CVE-2023-1582.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-1637.html">https://www.suse.com/security/cve/CVE-2023-1637.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-1652.html">https://www.suse.com/security/cve/CVE-2023-1652.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-28327.html">https://www.suse.com/security/cve/CVE-2023-28327.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-28464.html">https://www.suse.com/security/cve/CVE-2023-28464.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-28466.html">https://www.suse.com/security/cve/CVE-2023-28466.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1065729">https://bugzilla.suse.com/show_bug.cgi?id=1065729</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1109158">https://bugzilla.suse.com/show_bug.cgi?id=1109158</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1189998">https://bugzilla.suse.com/show_bug.cgi?id=1189998</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1193629">https://bugzilla.suse.com/show_bug.cgi?id=1193629</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1194869">https://bugzilla.suse.com/show_bug.cgi?id=1194869</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1198400">https://bugzilla.suse.com/show_bug.cgi?id=1198400</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1203200">https://bugzilla.suse.com/show_bug.cgi?id=1203200</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1206552">https://bugzilla.suse.com/show_bug.cgi?id=1206552</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1207168">https://bugzilla.suse.com/show_bug.cgi?id=1207168</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1207185">https://bugzilla.suse.com/show_bug.cgi?id=1207185</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1207574">https://bugzilla.suse.com/show_bug.cgi?id=1207574</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1208602">https://bugzilla.suse.com/show_bug.cgi?id=1208602</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1208815">https://bugzilla.suse.com/show_bug.cgi?id=1208815</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1208902">https://bugzilla.suse.com/show_bug.cgi?id=1208902</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1209052">https://bugzilla.suse.com/show_bug.cgi?id=1209052</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1209118">https://bugzilla.suse.com/show_bug.cgi?id=1209118</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1209256">https://bugzilla.suse.com/show_bug.cgi?id=1209256</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1209290">https://bugzilla.suse.com/show_bug.cgi?id=1209290</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1209292">https://bugzilla.suse.com/show_bug.cgi?id=1209292</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1209366">https://bugzilla.suse.com/show_bug.cgi?id=1209366</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1209532">https://bugzilla.suse.com/show_bug.cgi?id=1209532</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1209547">https://bugzilla.suse.com/show_bug.cgi?id=1209547</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1209556">https://bugzilla.suse.com/show_bug.cgi?id=1209556</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1209600">https://bugzilla.suse.com/show_bug.cgi?id=1209600</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1209634">https://bugzilla.suse.com/show_bug.cgi?id=1209634</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1209635">https://bugzilla.suse.com/show_bug.cgi?id=1209635</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1209636">https://bugzilla.suse.com/show_bug.cgi?id=1209636</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1209681">https://bugzilla.suse.com/show_bug.cgi?id=1209681</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1209684">https://bugzilla.suse.com/show_bug.cgi?id=1209684</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1209779">https://bugzilla.suse.com/show_bug.cgi?id=1209779</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1209788">https://bugzilla.suse.com/show_bug.cgi?id=1209788</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1209798">https://bugzilla.suse.com/show_bug.cgi?id=1209798</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1209799">https://bugzilla.suse.com/show_bug.cgi?id=1209799</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1209804">https://bugzilla.suse.com/show_bug.cgi?id=1209804</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1209805">https://bugzilla.suse.com/show_bug.cgi?id=1209805</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1210050">https://bugzilla.suse.com/show_bug.cgi?id=1210050</a>
                    </li>
                
            
        </ul>
    
</div>