<div class="container">
<h1>Security update for the Linux Kernel</h1>
<table class="table table-striped table-bordered">
<tbody>
<tr>
<th>Announcement ID:</th>
<td>SUSE-SU-2023:1992-1</td>
</tr>
<tr>
<th>Rating:</th>
<td>important</td>
</tr>
<tr>
<th>References:</th>
<td>
<ul>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1065729">#1065729</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1109158">#1109158</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1189998">#1189998</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1193629">#1193629</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1194869">#1194869</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1198400">#1198400</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1203200">#1203200</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1206552">#1206552</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1207168">#1207168</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1207185">#1207185</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1207574">#1207574</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1208602">#1208602</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1208815">#1208815</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1208829">#1208829</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1208902">#1208902</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1209052">#1209052</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1209118">#1209118</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1209256">#1209256</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1209290">#1209290</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1209292">#1209292</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1209366">#1209366</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1209532">#1209532</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1209547">#1209547</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1209556">#1209556</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1209572">#1209572</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1209600">#1209600</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1209634">#1209634</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1209635">#1209635</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1209636">#1209636</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1209681">#1209681</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1209684">#1209684</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1209687">#1209687</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1209779">#1209779</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1209788">#1209788</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1209798">#1209798</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1209799">#1209799</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1209804">#1209804</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1209805">#1209805</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1210050">#1210050</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1210203">#1210203</a>
</li>
</ul>
</td>
</tr>
<tr>
<th>
Cross-References:
</th>
<td>
<ul>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2017-5753.html">CVE-2017-5753</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-4744.html">CVE-2022-4744</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-0394.html">CVE-2023-0394</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-1281.html">CVE-2023-1281</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-1513.html">CVE-2023-1513</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-1582.html">CVE-2023-1582</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-1611.html">CVE-2023-1611</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-1637.html">CVE-2023-1637</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-1652.html">CVE-2023-1652</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-1838.html">CVE-2023-1838</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-23001.html">CVE-2023-23001</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-28327.html">CVE-2023-28327</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-28464.html">CVE-2023-28464</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-28466.html">CVE-2023-28466</a>
</li>
</ul>
</td>
</tr>
<tr>
<th>CVSS scores:</th>
<td>
<ul class="list-group">
<li class="list-group-item">
<span class="cvss-reference">CVE-2017-5753</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">7.1</span>
<span class="cvss-vector">CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2017-5753</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.6</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2017-5753</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.6</span>
<span class="cvss-vector">CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2022-4744</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2022-4744</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-0394</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.5</span>
<span class="cvss-vector">CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-0394</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-1281</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-1281</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-1513</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">3.3</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-1513</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">3.3</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-1582</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.7</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-1582</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">4.7</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-1611</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.7</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-1611</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">6.3</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-1637</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-1637</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-1652</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">7.0</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-1652</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.1</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-1838</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-1838</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.1</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-23001</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">2.9</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-23001</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-28327</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-28464</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.8</span>
<span class="cvss-vector">CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-28464</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-28466</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-28466</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.0</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
</ul>
</td>
</tr>
<tr>
<th>Affected Products:</th>
<td>
<ul class="list-group">
<li class="list-group-item">openSUSE Leap 15.4</li>
<li class="list-group-item">openSUSE Leap Micro 5.3</li>
<li class="list-group-item">SUSE Linux Enterprise High Performance Computing 15 SP4</li>
<li class="list-group-item">SUSE Linux Enterprise Live Patching 15-SP4</li>
<li class="list-group-item">SUSE Linux Enterprise Micro 5.3</li>
<li class="list-group-item">SUSE Linux Enterprise Micro 5.4</li>
<li class="list-group-item">SUSE Linux Enterprise Micro for Rancher 5.3</li>
<li class="list-group-item">SUSE Linux Enterprise Micro for Rancher 5.4</li>
<li class="list-group-item">SUSE Linux Enterprise Real Time 15 SP4</li>
<li class="list-group-item">SUSE Linux Enterprise Server 15 SP4</li>
<li class="list-group-item">SUSE Linux Enterprise Server for SAP Applications 15 SP4</li>
<li class="list-group-item">SUSE Real Time Module 15-SP4</li>
</ul>
</td>
</tr>
</tbody>
</table>
<p>An update that solves 14 vulnerabilities and has 26 fixes can now be installed.</p>
<h2>Description:</h2>
<p>The SUSE Linux Enterprise 15 SP4 RT kernel was updated to receive various security and bugfixes.</p>
<p>The following security bugs were fixed:</p>
<ul>
<li>CVE-2017-5753: Fixed spectre V1 vulnerability on netlink (bsc#1209547).</li>
<li>CVE-2017-5753: Fixed spectre vulnerability in prlimit (bsc#1209256).</li>
<li>CVE-2022-4744: Fixed double-free that could lead to DoS or privilege escalation in TUN/TAP device driver functionality (bsc#1209635).</li>
<li>CVE-2023-0394: Fixed a null pointer dereference flaw in the network subcomponent in the Linux kernel which could lead to system crash (bsc#1207168).</li>
<li>CVE-2023-1281: Fixed use after free that could lead to privilege escalation in tcindex (bsc#1209634).</li>
<li>CVE-2023-1513: Fixed an uninitialized portions of the kvm_debugregs structure that could be copied to userspace, causing an information leak (bsc#1209532).</li>
<li>CVE-2023-1582: Fixed soft lockup in __page_mapcount (bsc#1209636).</li>
<li>CVE-2023-1611: Fixed an use-after-free flaw in btrfs_search_slot (bsc#1209687).</li>
<li>CVE-2023-1637: Fixed vulnerability that could lead to unauthorized access to CPU memory after resuming CPU from suspend-to-RAM (bsc#1209779, bsc#1198400).</li>
<li>CVE-2023-1652: Fixed use-after-free that could lead to DoS and information leak in nfsd4_ssc_setup_dul in fs/nfsd/nfs4proc.c (bsc#1209788).</li>
<li>CVE-2023-1838: Fixed an use-after-free flaw in virtio network subcomponent. This flaw could allow a local attacker to crash the system and lead to a kernel information leak problem. (bsc#1210203).</li>
<li>CVE-2023-23001: Fixed misinterpretation of regulator_get return value in drivers/scsi/ufs/ufs-mediatek.c (bsc#1208829).</li>
<li>CVE-2023-28327: Fixed DoS in in_skb in unix_diag_get_exact() (bsc#1209290).</li>
<li>CVE-2023-28464: Fixed user-after-free that could lead to privilege escalation in hci_conn_cleanup in net/bluetooth/hci_conn.c (bsc#1209052).</li>
<li>CVE-2023-28466: Fixed race condition that could lead to use-after-free or NULL pointer dereference in do_tls_getsockopt in net/tls/tls_main.c (bsc#1209366).</li>
</ul>
<p>The following non-security bugs were fixed:</p>
<ul>
<li>ACPI: x86: utils: Add Cezanne to the list for forcing StorageD3Enable (git-fixes).</li>
<li>ALSA: asihpi: check pao in control_message() (git-fixes).</li>
<li>ALSA: hda/ca0132: fixup buffer overrun at tuning_ctl_set() (git-fixes).</li>
<li>ALSA: hda/conexant: Partial revert of a quirk for Lenovo (git-fixes).</li>
<li>ALSA: hda/realtek: Add quirk for Clevo X370SNW (git-fixes).</li>
<li>ALSA: hda/realtek: Add quirk for Lenovo ZhaoYang CF4620Z (git-fixes).</li>
<li>ALSA: hda/realtek: Add quirks for some Clevo laptops (git-fixes).</li>
<li>ALSA: hda/realtek: Fix support for Dell Precision 3260 (git-fixes).</li>
<li>ALSA: hda/realtek: Fix the speaker output on Samsung Galaxy Book2 Pro (git-fixes).</li>
<li>ALSA: hda/realtek: fix mute/micmute LEDs do not work for a HP platform (git-fixes).</li>
<li>ALSA: hda/realtek: fix mute/micmute LEDs for a HP ProBook (git-fixes).</li>
<li>ALSA: hda: intel-dsp-config: add MTL PCI id (git-fixes).</li>
<li>ALSA: usb-audio: Fix recursive locking at XRUN during syncing (git-fixes).</li>
<li>ALSA: usb-audio: Fix regression on detection of Roland VS-100 (git-fixes).</li>
<li>ALSA: ymfpci: Fix BUG_ON in probe function (git-fixes).</li>
<li>ARM: dts: imx6sl: tolino-shine2hd: fix usbotg1 pinctrl (git-fixes).</li>
<li>ARM: dts: imx6sll: e60k02: fix usbotg1 pinctrl (git-fixes).</li>
<li>ASoC: codecs: tx-macro: Fix for KASAN: slab-out-of-bounds (git-fixes).</li>
<li>Bluetooth: L2CAP: Fix responding with wrong PDU type (git-fixes).</li>
<li>Bluetooth: btqcomsmd: Fix command timeout after setting BD address (git-fixes).</li>
<li>Bluetooth: btsdio: fix use after free bug in btsdio_remove due to unfinished work (git-fixes).</li>
<li>Fix error path in pci-hyperv to unlock the mutex state_lock</li>
<li>HID: cp2112: Fix driver not registering GPIO IRQ chip as threaded (git-fixes).</li>
<li>HID: intel-ish-hid: ipc: Fix potential use-after-free in work function (git-fixes).</li>
<li>Input: alps - fix compatibility with -funsigned-char (bsc#1209805).</li>
<li>Input: focaltech - use explicitly signed char type (git-fixes).</li>
<li>Input: goodix - add Lenovo Yoga Book X90F to nine_bytes_report DMI table (git-fixes).</li>
<li>KABI FIX FOR: NFSv4: keep state manager thread active if swap is enabled (Never, kabi).</li>
<li>KVM: x86: fix sending PV IPI (git-fixes).</li>
<li>NFS: Fix an Oops in nfs_d_automount() (git-fixes).</li>
<li>NFS: fix disabling of swap (git-fixes).</li>
<li>NFSD: Protect against filesystem freezing (git-fixes).</li>
<li>NFSD: fix leaked reference count of nfsd4_ssc_umount_item (git-fixes).</li>
<li>NFSD: fix problems with cleanup on errors in nfsd4_copy (git-fixes).</li>
<li>NFSD: fix use-after-free in nfsd4_ssc_setup_dul() (git-fixes).</li>
<li>NFSd: fix handling of readdir in v4root vs. mount upcall timeout (git-fixes).</li>
<li>NFSd: fix race to check ls_layouts (git-fixes).</li>
<li>NFSd: shut down the NFSv4 state objects before the filecache (git-fixes).</li>
<li>NFSd: under NFSv4.1, fix double svc_xprt_put on rpc_create failure (git-fixes).</li>
<li>NFSd: zero out pointers after putting nfsd_files on COPY setup error (git-fixes).</li>
<li>NFSv4.1 provide mount option to toggle trunking discovery (git-fixes).</li>
<li>NFSv4.2: Fix initialisation of struct nfs4_label (git-fixes).</li>
<li>NFSv4.x: Fail client initialisation if state manager thread can't run (git-fixes).</li>
<li>NFSv4: Fix a credential leak in _nfs4_discover_trunking() (git-fixes).</li>
<li>NFSv4: Fix a deadlock between nfs4_open_recover_helper() and delegreturn (git-fixes).</li>
<li>NFSv4: Fix hangs when recovering open state after a server reboot (git-fixes).</li>
<li>NFSv4: fix state manager flag printing (git-fixes).</li>
<li>NFSv4: keep state manager thread active if swap is enabled (git-fixes).</li>
<li>PCI/DPC: Await readiness of secondary bus after reset (git-fixes).</li>
<li>PCI: hv: Add a per-bus mutex state_lock (bsc#1207185).</li>
<li>PCI: hv: Fix a race condition in hv_irq_unmask() that can cause panic (bsc#1207185).</li>
<li>PCI: hv: Remove the useless hv_pcichild_state from struct hv_pci_dev (bsc#1207185).</li>
<li>PCI: hv: Use async probing to reduce boot time (bsc#1207185).</li>
<li>PCI: hv: fix a race condition bug in hv_pci_query_relations() (bsc#1207185).</li>
<li>SUNRPC: Fix a server shutdown leak (git-fixes).</li>
<li>SUNRPC: Fix missing release socket in rpc_sockname() (git-fixes).</li>
<li>SUNRPC: ensure the matching upcall is in-flight upon downcall (git-fixes).</li>
<li>USB: cdns3: Fix issue with using incorrect PCI device function (git-fixes).</li>
<li>USB: cdnsp: Fixes error: uninitialized symbol 'len' (git-fixes).</li>
<li>USB: cdnsp: Fixes issue with redundant Status Stage (git-fixes).</li>
<li>USB: cdnsp: changes PCI Device ID to fix conflict with CNDS3 driver (git-fixes).</li>
<li>USB: chipdea: core: fix return -EINVAL if request role is the same with current role (git-fixes).</li>
<li>USB: chipidea: fix memory leak with using debugfs_lookup() (git-fixes).</li>
<li>USB: dwc2: fix a devres leak in hw_enable upon suspend resume (git-fixes).</li>
<li>USB: dwc3: Fix a typo in field name (git-fixes).</li>
<li>USB: dwc3: fix memory leak with using debugfs_lookup() (git-fixes).</li>
<li>USB: dwc3: gadget: Add 1ms delay after end transfer command without IOC (git-fixes).</li>
<li>USB: fix memory leak with using debugfs_lookup() (git-fixes).</li>
<li>USB: fotg210: fix memory leak with using debugfs_lookup() (git-fixes).</li>
<li>USB: gadget: bcm63xx_udc: fix memory leak with using debugfs_lookup() (git-fixes).</li>
<li>USB: gadget: gr_udc: fix memory leak with using debugfs_lookup() (git-fixes).</li>
<li>USB: gadget: lpc32xx_udc: fix memory leak with using debugfs_lookup() (git-fixes).</li>
<li>USB: gadget: pxa25x_udc: fix memory leak with using debugfs_lookup() (git-fixes).</li>
<li>USB: gadget: pxa27x_udc: fix memory leak with using debugfs_lookup() (git-fixes).</li>
<li>USB: gadget: u_audio: do not let userspace block driver unbind (git-fixes).</li>
<li>USB: isp116x: fix memory leak with using debugfs_lookup() (git-fixes).</li>
<li>USB: isp1362: fix memory leak with using debugfs_lookup() (git-fixes).</li>
<li>USB: sl811: fix memory leak with using debugfs_lookup() (git-fixes).</li>
<li>USB: typec: altmodes/displayport: Fix configure initial pin assignment (git-fixes).</li>
<li>USB: typec: tcpm: fix warning when handle discover_identity message (git-fixes).</li>
<li>USB: ucsi: Fix NULL pointer deref in ucsi_connector_change() (git-fixes).</li>
<li>USB: ucsi: Fix ucsi->connector race (git-fixes).</li>
<li>USB: uhci: fix memory leak with using debugfs_lookup() (git-fixes).</li>
<li>USB: xhci: tegra: fix sleep in atomic call (git-fixes).</li>
<li>alarmtimer: Prevent starvation by small intervals and SIG_IGN (git-fixes)</li>
<li>arch: fix broken BuildID for arm64 and riscv (bsc#1209798).</li>
<li>arm64/cpufeature: Fix field sign for DIT hwcap detection (git-fixes)</li>
<li>arm64: dts: freescale: Fix pca954x i2c-mux node names (git-fixes)</li>
<li>arm64: dts: imx8mm-nitrogen-r2: fix WM8960 clock name (git-fixes).</li>
<li>arm64: dts: imx8mn: specify #sound-dai-cells for SAI nodes (git-fixes).</li>
<li>arm64: dts: imx8mp-phycore-som: Remove invalid PMIC property (git-fixes)</li>
<li>arm64: dts: imx8mp: correct usb clocks (git-fixes)</li>
<li>arm64: dts: imx8mq: add mipi csi phy and csi bridge descriptions (git-fixes)</li>
<li>arm64: dts: imx8mq: fix mipi_csi bidirectional port numbers (git-fixes)</li>
<li>arm64: dts: qcom: sm8350: Mark UFS controller as cache coherent (git-fixes).</li>
<li>atm: idt77252: fix kmemleak when rmmod idt77252 (git-fixes).</li>
<li>ca8210: Fix unsigned mac_len comparison with zero in ca8210_skb_tx() (git-fixes).</li>
<li>ca8210: fix mac_len negative array access (git-fixes).</li>
<li>can: bcm: bcm_tx_setup(): fix KMSAN uninit-value in vfs_write (git-fixes).</li>
<li>can: isotp: isotp_ops: fix poll() to not report false EPOLLOUT events (git-fixes).</li>
<li>can: j1939: j1939_tp_tx_dat_new(): fix out-of-bounds memory access (git-fixes).</li>
<li>cifs: Fix smb2_set_path_size() (git-fixes).</li>
<li>cifs: Move the in_send statistic to __smb_send_rqst() (git-fixes).</li>
<li>cifs: append path to open_enter trace event (bsc#1193629).</li>
<li>cifs: avoid race conditions with parallel reconnects (bsc#1193629).</li>
<li>cifs: avoid races in parallel reconnects in smb1 (bsc#1193629).</li>
<li>cifs: check only tcon status on tcon related functions (bsc#1193629).</li>
<li>cifs: do not poll server interfaces too regularly (bsc#1193629).</li>
<li>cifs: double lock in cifs_reconnect_tcon() (git-fixes).</li>
<li>cifs: dump pending mids for all channels in DebugData (bsc#1193629).</li>
<li>cifs: empty interface list when server does not support query interfaces (bsc#1193629).</li>
<li>cifs: fix DFS traversal oops without CONFIG_CIFS_DFS_UPCALL (bsc#1193629).</li>
<li>cifs: fix dentry lookups in directory handle cache (bsc#1193629).</li>
<li>cifs: fix missing unload_nls() in smb2_reconnect() (bsc#1193629).</li>
<li>cifs: fix use-after-free bug in refresh_cache_worker() (bsc#1193629).</li>
<li>cifs: generate signkey for the channel that's reconnecting (bsc#1193629).</li>
<li>cifs: get rid of dead check in smb2_reconnect() (bsc#1193629).</li>
<li>cifs: lock chan_lock outside match_session (bsc#1193629).</li>
<li>cifs: prevent infinite recursion in CIFSGetDFSRefer() (bsc#1193629).</li>
<li>cifs: print session id while listing open files (bsc#1193629).</li>
<li>cifs: return DFS root session id in DebugData (bsc#1193629).</li>
<li>cifs: set DFS root session in cifs_get_smb_ses() (bsc#1193629).</li>
<li>cifs: use DFS root session instead of tcon ses (bsc#1193629).</li>
<li>clocksource/drivers/mediatek: Optimize systimer irq clear flow on shutdown (git-fixes).</li>
<li>debugfs: add debugfs_lookup_and_remove() (git-fixes).</li>
<li>drivers/base: Fix unsigned comparison to -1 in CPUMAP_FILE_MAX_BYTES (bsc#1208815).</li>
<li>drivers/base: fix userspace break from using bin_attributes for cpumap and cpulist (bsc#1208815).</li>
<li>drm/amd/display: Add DSC Support for Synaptics Cascaded MST Hub (git-fixes).</li>
<li>drm/amd/display: fix shift-out-of-bounds in CalculateVMAndRowBytes (git-fixes).</li>
<li>drm/amdkfd: Fix an illegal memory access (git-fixes).</li>
<li>drm/bridge: lt8912b: return EPROBE_DEFER if bridge is not found (git-fixes).</li>
<li>drm/etnaviv: fix reference leak when mmaping imported buffer (git-fixes).</li>
<li>drm/i915/active: Fix missing debug object activation (git-fixes).</li>
<li>drm/i915/active: Fix misuse of non-idle barriers as fence trackers (git-fixes).</li>
<li>drm/i915/display/psr: Handle plane and pipe restrictions at every page flip (git-fixes).</li>
<li>drm/i915/display/psr: Use drm damage helpers to calculate plane damaged area (git-fixes).</li>
<li>drm/i915/display: Workaround cursor left overs with PSR2 selective fetch enabled (git-fixes).</li>
<li>drm/i915/display: clean up comments (git-fixes).</li>
<li>drm/i915/gt: perform uc late init after probe error injection (git-fixes).</li>
<li>drm/i915/psr: Use calculated io and fast wake lines (git-fixes).</li>
<li>drm/i915/tc: Fix the ICL PHY ownership check in TC-cold state (git-fixes).</li>
<li>drm/i915: Do not use BAR mappings for ring buffers with LLC (git-fixes).</li>
<li>drm/i915: Do not use stolen memory for ring buffers with LLC (git-fixes).</li>
<li>drm/i915: Preserve crtc_state->inherited during state clearing (git-fixes).</li>
<li>drm/i915: Remove unused bits of i915_vma/active api (git-fixes).</li>
<li>drm/panfrost: Fix the panfrost_mmu_map_fault_addr() error path (git-fixes).</li>
<li>dt-bindings: serial: renesas,scif: Fix 4th IRQ for 4-IRQ SCIFs (git-fixes).</li>
<li>efi: sysfb_efi: Fix DMI quirks not working for simpledrm (git-fixes).</li>
<li>fbdev: au1200fb: Fix potential divide by zero (git-fixes).</li>
<li>fbdev: intelfb: Fix potential divide by zero (git-fixes).</li>
<li>fbdev: lxfb: Fix potential divide by zero (git-fixes).</li>
<li>fbdev: nvidia: Fix potential divide by zero (git-fixes).</li>
<li>fbdev: stifb: Provide valid pixelclock and add fb_check_var() checks (git-fixes).</li>
<li>fbdev: tgafb: Fix potential divide by zero (git-fixes).</li>
<li>firmware: arm_scmi: Fix device node validation for mailbox transport (git-fixes).</li>
<li>fotg210-udc: Add missing completion handler (git-fixes).</li>
<li>ftrace: Fix invalid address access in lookup_rec() when index is 0 (git-fixes).</li>
<li>ftrace: Fix issue that 'direct->addr' not restored in modify_ftrace_direct() (git-fixes).</li>
<li>ftrace: Mark get_lock_parent_ip() __always_inline (git-fixes).</li>
<li>gpio: GPIO_REGMAP: select REGMAP instead of depending on it (git-fixes).</li>
<li>gpio: davinci: Add irq chip flag to skip set wake (git-fixes).</li>
<li>hwmon: fix potential sensor registration fail if of_node is missing (git-fixes).</li>
<li>i2c: hisi: Only use the completion interrupt to finish the transfer (git-fixes).</li>
<li>i2c: imx-lpi2c: check only for enabled interrupt flags (git-fixes).</li>
<li>i2c: xgene-slimpro: Fix out-of-bounds bug in xgene_slimpro_i2c_xfer() (git-fixes).</li>
<li>iio: adc: ad7791: fix IRQ flags (git-fixes).</li>
<li>iio: adc: ti-ads7950: Set <code>can_sleep</code> flag for GPIO chip (git-fixes).</li>
<li>iio: adis16480: select CONFIG_CRC32 (git-fixes).</li>
<li>iio: dac: cio-dac: Fix max DAC write value check for 12-bit (git-fixes).</li>
<li>iio: light: cm32181: Unregister second I2C client if present (git-fixes).</li>
<li>kABI workaround for xhci (git-fixes).</li>
<li>kABI: x86/msr: Remove .fixup usage (kabi).</li>
<li>kconfig: Update config changed flag before calling callback (git-fixes).</li>
<li>keys: Do not cache key in task struct if key is requested from kernel thread (git-fixes).</li>
<li>lan78xx: Add missing return code checks (git-fixes).</li>
<li>lan78xx: Fix exception on link speed change (git-fixes).</li>
<li>lan78xx: Fix memory allocation bug (git-fixes).</li>
<li>lan78xx: Fix partial packet errors on suspend/resume (git-fixes).</li>
<li>lan78xx: Fix race condition in disconnect handling (git-fixes).</li>
<li>lan78xx: Fix race conditions in suspend/resume handling (git-fixes).</li>
<li>lan78xx: Fix white space and style issues (git-fixes).</li>
<li>lan78xx: Remove unused pause frame queue (git-fixes).</li>
<li>lan78xx: Remove unused timer (git-fixes).</li>
<li>lan78xx: Set flow control threshold to prevent packet loss (git-fixes).</li>
<li>lockd: set file_lock start and end when decoding nlm4 testargs (git-fixes).</li>
<li>locking/rwbase: Mitigate indefinite writer starvation (bsc#1189998 (PREEMPT_RT prerequisite backports), bsc#1206552).</li>
<li>mm: memcg: fix swapcached stat accounting (bsc#1209804).</li>
<li>mm: mmap: remove newline at the end of the trace (git-fixes).</li>
<li>mmc: atmel-mci: fix race between stop command and start of next command (git-fixes).</li>
<li>mtd: rawnand: meson: fix bitmask for length in command word (git-fixes).</li>
<li>mtd: rawnand: meson: invalidate cache on polling ECC bit (git-fixes).</li>
<li>mtd: rawnand: stm32_fmc2: remove unsupported EDO mode (git-fixes).</li>
<li>mtd: rawnand: stm32_fmc2: use timings.mode instead of checking tRC_min (git-fixes).</li>
<li>mtdblock: tolerate corrected bit-flips (git-fixes).</li>
<li>net: asix: fix modprobe "sysfs: cannot create duplicate filename" (git-fixes).</li>
<li>net: mdio: thunder: Add missing fwnode_handle_put() (git-fixes).</li>
<li>net: phy: Ensure state transitions are processed from phy_stop() (git-fixes).</li>
<li>net: phy: dp83869: fix default value for tx-/rx-internal-delay (git-fixes).</li>
<li>net: phy: nxp-c45-tja11xx: fix MII_BASIC_CONFIG_REV bit (git-fixes).</li>
<li>net: phy: smsc: bail out in lan87xx_read_status if genphy_read_status fails (git-fixes).</li>
<li>net: qcom/emac: Fix use after free bug in emac_remove due to race condition (git-fixes).</li>
<li>net: usb: asix: remove redundant assignment to variable reg (git-fixes).</li>
<li>net: usb: cdc_mbim: avoid altsetting toggling for Telit FE990 (git-fixes).</li>
<li>net: usb: lan78xx: Limit packet length to skb->len (git-fixes).</li>
<li>net: usb: qmi_wwan: add Telit 0x1080 composition (git-fixes).</li>
<li>net: usb: smsc75xx: Limit packet length to skb->len (git-fixes).</li>
<li>net: usb: smsc75xx: Move packet length check to prevent kernel panic in skb_pull (git-fixes).</li>
<li>net: usb: smsc95xx: Limit packet length to skb->len (git-fixes).</li>
<li>net: usb: use eth_hw_addr_set() (git-fixes).</li>
<li>nilfs2: fix kernel-infoleak in nilfs_ioctl_wrap_copy() (git-fixes).</li>
<li>nilfs2: fix sysfs interface lifetime (git-fixes).</li>
<li>nvme-tcp: always fail a request when sending it failed (bsc#1208902).</li>
<li>pNFS/filelayout: Fix coalescing test for single DS (git-fixes).</li>
<li>pinctrl: amd: Disable and mask interrupts on resume (git-fixes).</li>
<li>pinctrl: at91-pio4: fix domain name assignment (git-fixes).</li>
<li>pinctrl: ocelot: Fix alt mode for ocelot (git-fixes).</li>
<li>platform/chrome: cros_ec_chardev: fix kernel data leak from ioctl (git-fixes).</li>
<li>platform/x86/intel/pmc: Alder Lake PCH slp_s0_residency fix (git-fixes).</li>
<li>platform/x86: think-lmi: Add possible_values for ThinkStation (git-fixes).</li>
<li>platform/x86: think-lmi: Certificate authentication support (bsc#1210050).</li>
<li>platform/x86: think-lmi: Clean up display of current_value on Thinkstation (git-fixes).</li>
<li>platform/x86: think-lmi: Fix memory leak when showing current settings (git-fixes).</li>
<li>platform/x86: think-lmi: Fix memory leaks when parsing ThinkStation WMI strings (git-fixes).</li>
<li>platform/x86: think-lmi: Move kobject_init() call into tlmi_create_auth() (bsc#1210050).</li>
<li>platform/x86: think-lmi: Opcode support (bsc#1210050).</li>
<li>platform/x86: think-lmi: Prevent underflow in index_store() (bsc#1210050).</li>
<li>platform/x86: think-lmi: Simplify tlmi_analyze() error handling a bit (bsc#1210050).</li>
<li>platform/x86: think-lmi: Use min_t() for comparison and assignment (bsc#1210050).</li>
<li>platform/x86: think-lmi: add debug_cmd (bsc#1210050).</li>
<li>platform/x86: think-lmi: add missing type attribute (git-fixes).</li>
<li>platform/x86: think-lmi: certificate support clean ups (bsc#1210050).</li>
<li>platform/x86: think-lmi: only display possible_values if available (git-fixes).</li>
<li>platform/x86: think-lmi: use correct possible_values delimiters (git-fixes).</li>
<li>platform/x86: thinkpad-acpi: Add support for automatic mode transitions (bsc#1210050).</li>
<li>platform/x86: thinkpad-acpi: Enable AMT by default on supported systems (bsc#1210050).</li>
<li>platform/x86: thinkpad-acpi: profile capabilities as integer (bsc#1210050).</li>
<li>platform/x86: thinkpad_acpi: Accept ibm_init_struct.init() returning -ENODEV (bsc#1210050).</li>
<li>platform/x86: thinkpad_acpi: Add LED_RETAIN_AT_SHUTDOWN to led_class_devs (bsc#1210050).</li>
<li>platform/x86: thinkpad_acpi: Add PSC mode support (bsc#1210050).</li>
<li>platform/x86: thinkpad_acpi: Add a s2idle resume quirk for a number of laptops (bsc#1210050).</li>
<li>platform/x86: thinkpad_acpi: Add dual fan probe (bsc#1210050).</li>
<li>platform/x86: thinkpad_acpi: Add dual-fan quirk for T15g (2nd gen) (bsc#1210050).</li>
<li>platform/x86: thinkpad_acpi: Add hotkey_notify_extended_hotkey() helper (bsc#1210050).</li>
<li>platform/x86: thinkpad_acpi: Add lid_logo_dot to the list of safe LEDs (bsc#1210050).</li>
<li>platform/x86: thinkpad_acpi: Add quirk for ThinkPads without a fan (bsc#1210050).</li>
<li>platform/x86: thinkpad_acpi: Cleanup dytc_profile_available (bsc#1210050).</li>
<li>platform/x86: thinkpad_acpi: Convert btusb DMI list to quirks (bsc#1210050).</li>
<li>platform/x86: thinkpad_acpi: Convert platform driver to use dev_groups (bsc#1210050).</li>
<li>platform/x86: thinkpad_acpi: Correct dual fan probe (bsc#1210050).</li>
<li>platform/x86: thinkpad_acpi: Do not use test_bit on an integer (bsc#1210050).</li>
<li>platform/x86: thinkpad_acpi: Enable s2idle quirk for 21A1 machine type (bsc#1210050).</li>
<li>platform/x86: thinkpad_acpi: Explicitly set to balanced mode on startup (bsc#1210050).</li>
<li>platform/x86: thinkpad_acpi: Fix a memory leak of EFCH MMIO resource (bsc#1210050).</li>
<li>platform/x86: thinkpad_acpi: Fix coccinelle warnings (bsc#1210050).</li>
<li>platform/x86: thinkpad_acpi: Fix compiler warning about uninitialized err variable (bsc#1210050).</li>
<li>platform/x86: thinkpad_acpi: Fix incorrect use of platform profile on AMD platforms (bsc#1210050).</li>
<li>platform/x86: thinkpad_acpi: Fix max_brightness of thinklight (bsc#1210050).</li>
<li>platform/x86: thinkpad_acpi: Fix profile mode display in AMT mode (bsc#1210050).</li>
<li>platform/x86: thinkpad_acpi: Fix profile modes on Intel platforms (bsc#1210050).</li>
<li>platform/x86: thinkpad_acpi: Fix reporting a non present second fan on some models (bsc#1210050).</li>
<li>platform/x86: thinkpad_acpi: Fix the hwmon sysfs-attr showing up in the wrong place (bsc#1210050).</li>
<li>platform/x86: thinkpad_acpi: Fix thermal_temp_input_attr sorting (bsc#1210050).</li>
<li>platform/x86: thinkpad_acpi: Fix thinklight LED brightness returning 255 (bsc#1210050).</li>
<li>platform/x86: thinkpad_acpi: Get privacy-screen / lcdshadow ACPI handles only once (bsc#1210050).</li>
<li>platform/x86: thinkpad_acpi: Make *_init() functions return -ENODEV instead of 1 (bsc#1210050).</li>
<li>platform/x86: thinkpad_acpi: Properly indent code in tpacpi_dytc_profile_init() (bsc#1210050).</li>
<li>platform/x86: thinkpad_acpi: Register tpacpi_pdriver after subdriver init (bsc#1210050).</li>
<li>platform/x86: thinkpad_acpi: Remove "goto err_exit" from hotkey_init() (bsc#1210050).</li>
<li>platform/x86: thinkpad_acpi: Remove unused sensors_pdev_attrs_registered flag (bsc#1210050).</li>
<li>platform/x86: thinkpad_acpi: Restore missing hotkey_tablet_mode and hotkey_radio_sw sysfs-attr (bsc#1210050).</li>
<li>platform/x86: thinkpad_acpi: Simplify dytc_version handling (bsc#1210050).</li>
<li>platform/x86: thinkpad_acpi: Switch to common use of attributes (bsc#1210050).</li>
<li>platform/x86: thinkpad_acpi: Use backlight helper (bsc#1210050).</li>
<li>platform/x86: thinkpad_acpi: clean up dytc profile convert (bsc#1210050).</li>
<li>platform/x86: thinkpad_acpi: consistently check fan_get_status return (bsc#1210050).</li>
<li>platform/x86: thinkpad_acpi: do not use PSC mode on Intel platforms (bsc#1210050).</li>
<li>platform/x86: thinkpad_acpi: tpacpi_attr_group contains driver attributes not device attrs (bsc#1210050).</li>
<li>platform/x86: thinkpad_acpi: use strstarts() (bsc#1210050).</li>
<li>power: supply: da9150: Fix use after free bug in da9150_charger_remove due to race condition (git-fixes).</li>
<li>powerpc/64s/interrupt: Fix interrupt exit race with security mitigation switch (bsc#1194869).</li>
<li>powerpc/btext: add missing of_node_put (bsc#1065729).</li>
<li>powerpc/ioda/iommu/debugfs: Generate unique debugfs entries (bsc#1194869).</li>
<li>powerpc/iommu: Add missing of_node_put in iommu_init_early_dart (bsc#1194869).</li>
<li>powerpc/iommu: fix memory leak with using debugfs_lookup() (bsc#1194869).</li>
<li>powerpc/kcsan: Exclude udelay to prevent recursive instrumentation (bsc#1194869).</li>
<li>powerpc/kexec_file: fix implicit decl error (bsc#1194869).</li>
<li>powerpc/powernv/ioda: Skip unallocated resources when mapping to PE (bsc#1065729).</li>
<li>powerpc/powernv: fix missing of_node_put in uv_init() (bsc#1194869).</li>
<li>powerpc/pseries/lpar: add missing RTAS retry status handling (bsc#1109158 ltc#169177 git-fixes).</li>
<li>powerpc/pseries/lparcfg: add missing RTAS retry status handling (bsc#1065729).</li>
<li>powerpc/rtas: ensure 4KB alignment for rtas_data_buf (bsc#1065729).</li>
<li>powerpc/vmlinux.lds: Define RUNTIME_DISCARD_EXIT (bsc#1194869).</li>
<li>powerpc/vmlinux.lds: Do not discard .comment (bsc#1194869).</li>
<li>powerpc/vmlinux.lds: Do not discard .rela* for relocatable builds (bsc#1194869).</li>
<li>powerpc/xmon: Fix -Wswitch-unreachable warning in bpt_cmds (bsc#1194869).</li>
<li>powerpc: Remove linker flag from KBUILD_AFLAGS (bsc#1194869).</li>
<li>ppc64le: HWPOISON_INJECT=m (bsc#1209572).</li>
<li>pwm: cros-ec: Explicitly set .polarity in .get_state() (git-fixes).</li>
<li>pwm: sprd: Explicitly set .polarity in .get_state() (git-fixes).</li>
<li>r8169: fix RTL8168H and RTL8107E rx crc error (git-fixes).</li>
<li>rcu: Fix rcu_torture_read ftrace event (git-fixes).</li>
<li>ring-buffer: Fix race while reader and writer are on the same page (git-fixes).</li>
<li>ring-buffer: Handle race between rb_move_tail and rb_check_pages (git-fixes).</li>
<li>ring-buffer: remove obsolete comment for free_buffer_page() (git-fixes).</li>
<li>s390/boot: simplify and fix kernel memory layout setup (bsc#1209600).</li>
<li>s390/dasd: fix no record found for raw_track_access (bsc#1207574).</li>
<li>s390/vfio-ap: fix memory leak in vfio_ap device driver (git-fixes).</li>
<li>sbitmap: Avoid lockups when waker gets preempted (bsc#1209118).</li>
<li>sched/psi: Fix use-after-free in ep_remove_wait_queue() (bsc#1209799).</li>
<li>scsi: qla2xxx: Synchronize the IOCB count to be in order (bsc#1209292 bsc#1209684 bsc#1209556).</li>
<li>sctp: sctp_sock_filter(): avoid list_entry() on possibly empty list (bsc#1208602, git-fixes).</li>
<li>serial: 8250: ASPEED_VUART: select REGMAP instead of depending on it (git-fixes).</li>
<li>serial: 8250: SERIAL_8250_ASPEED_VUART should depend on ARCH_ASPEED (git-fixes).</li>
<li>serial: fsl_lpuart: Fix comment typo (git-fixes).</li>
<li>smb3: fix unusable share after force unmount failure (bsc#1193629).</li>
<li>smb3: lower default deferred close timeout to address perf regression (bsc#1193629).</li>
<li>struct dwc3: mask new member (git-fixes).</li>
<li>thunderbolt: Add missing UNSET_INBOUND_SBTX for retimer access (git-fixes).</li>
<li>thunderbolt: Call tb_check_quirks() after initializing adapters (git-fixes).</li>
<li>thunderbolt: Disable interrupt auto clear for rings (git-fixes).</li>
<li>thunderbolt: Rename shadowed variables bit to interrupt_bit and auto_clear_bit (git-fixes).</li>
<li>thunderbolt: Use const qualifier for <code>ring_interrupt_index</code> (git-fixes).</li>
<li>thunderbolt: Use scale field when allocating USB3 bandwidth (git-fixes).</li>
<li>timers: Prevent union confusion from unexpected (git-fixes)</li>
<li>trace/hwlat: Do not start per-cpu thread if it is already running (git-fixes).</li>
<li>trace/hwlat: Do not wipe the contents of per-cpu thread data (git-fixes).</li>
<li>trace/hwlat: make use of the helper function kthread_run_on_cpu() (git-fixes).</li>
<li>tracing: Add trace_array_puts() to write into instance (git-fixes).</li>
<li>tracing: Fix wrong return in kprobe_event_gen_test.c (git-fixes).</li>
<li>tracing: Free error logs of tracing instances (git-fixes).</li>
<li>tracing: Have tracing_snapshot_instance_cond() write errors to the appropriate instance (git-fixes).</li>
<li>tty: serial: fsl_lpuart: avoid checking for transfer complete when UARTCTRL_SBK is asserted in lpuart32_tx_empty (git-fixes).</li>
<li>tty: serial: fsl_lpuart: skip waiting for transmission complete when UARTCTRL_SBK is asserted (git-fixes).</li>
<li>tty: serial: sh-sci: Fix Rx on RZ/G2L SCI (git-fixes).</li>
<li>tty: serial: sh-sci: Fix transmit end interrupt handler (git-fixes).</li>
<li>uas: Add US_FL_NO_REPORT_OPCODES for JMicron JMS583Gen 2 (git-fixes).</li>
<li>vdpa_sim: set last_used_idx as last_avail_idx in vdpasim_queue_ready (git-fixes).</li>
<li>wifi: mac80211: fix invalid drv_sta_pre_rcu_remove calls for non-uploaded sta (git-fixes).</li>
<li>wifi: mac80211: fix qos on mesh interfaces (git-fixes).</li>
<li>wireguard: ratelimiter: use hrtimer in selftest (git-fixes)</li>
<li>x86/bug: Merge annotate_reachable() into _BUG_FLAGS() asm (git-fixes).</li>
<li>x86/fpu/xsave: Handle compacted offsets correctly with supervisor states (git-fixes).</li>
<li>x86/fpu/xstate: Fix the ARCH_REQ_XCOMP_PERM implementation (git-fixes).</li>
<li>x86/fpu: Cache xfeature flags from CPUID (git-fixes).</li>
<li>x86/fpu: Remove unused supervisor only offsets (git-fixes).</li>
<li>x86/kvm: Do not use pv tlb/ipi/sched_yield if on 1 vCPU (git-fixes).</li>
<li>x86/mce/inject: Avoid out-of-bounds write when setting flags (git-fixes).</li>
<li>x86/mce: Allow instrumentation during task work queueing (git-fixes).</li>
<li>x86/mce: Mark mce_end() noinstr (git-fixes).</li>
<li>x86/mce: Mark mce_panic() noinstr (git-fixes).</li>
<li>x86/mce: Mark mce_read_aux() noinstr (git-fixes).</li>
<li>x86/mm: Flush global TLB when switching to trampoline page-table (git-fixes).</li>
<li>x86/msr: Remove .fixup usage (git-fixes).</li>
<li>x86/sgx: Free backing memory after faulting the enclave page (git-fixes).</li>
<li>x86/sgx: Silence softlockup detection when releasing large enclaves (git-fixes).</li>
<li>x86/uaccess: Move variable into switch case statement (git-fixes).</li>
<li>x86: Annotate call_on_stack() (git-fixes).</li>
<li>x86: link vdso and boot with -z noexecstack --no-warn-rwx-segments (bsc#1203200).</li>
<li>xfs: convert ptag flags to unsigned (git-fixes).</li>
<li>xfs: do not assert fail on perag references on teardown (git-fixes).</li>
<li>xfs: do not leak btree cursor when insrec fails after a split (git-fixes).</li>
<li>xfs: pass the correct cursor to xfs_iomap_prealloc_size (git-fixes).</li>
<li>xfs: remove xfs_setattr_time() declaration (git-fixes).</li>
<li>xfs: zero inode fork buffer at allocation (git-fixes).</li>
<li>xhci: Free the command allocated for setting LPM if we return early (git-fixes).</li>
<li>xhci: also avoid the XHCI_ZERO_64B_REGS quirk with a passthrough iommu (git-fixes).</li>
<li>xirc2ps_cs: Fix use after free bug in xirc2ps_detach (git-fixes).</li>
<li>xprtrdma: Fix regbuf data not freed in rpcrdma_req_create() (git-fixes).</li>
</ul>
<h2>Special Instructions and Notes:</h2>
<ul>
<li>Please reboot the system after installing this update.</li>
</ul>
<h2>Patch Instructions:</h2>
<p>
To install this SUSE Important update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".<br/>
Alternatively you can run the command listed for your product:
</p>
<ul class="list-group">
<li class="list-group-item">
openSUSE Leap Micro 5.3
<br/>
<code>zypper in -t patch openSUSE-Leap-Micro-5.3-2023-1992=1</code>
</li>
<li class="list-group-item">
openSUSE Leap 15.4
<br/>
<code>zypper in -t patch openSUSE-SLE-15.4-2023-1992=1</code>
</li>
<li class="list-group-item">
SUSE Linux Enterprise Micro for Rancher 5.3
<br/>
<code>zypper in -t patch SUSE-SLE-Micro-5.3-2023-1992=1</code>
</li>
<li class="list-group-item">
SUSE Linux Enterprise Micro 5.3
<br/>
<code>zypper in -t patch SUSE-SLE-Micro-5.3-2023-1992=1</code>
</li>
<li class="list-group-item">
SUSE Linux Enterprise Micro for Rancher 5.4
<br/>
<code>zypper in -t patch SUSE-SLE-Micro-5.4-2023-1992=1</code>
</li>
<li class="list-group-item">
SUSE Linux Enterprise Micro 5.4
<br/>
<code>zypper in -t patch SUSE-SLE-Micro-5.4-2023-1992=1</code>
</li>
<li class="list-group-item">
SUSE Linux Enterprise Live Patching 15-SP4
<br/>
<code>zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2023-1992=1</code>
</li>
<li class="list-group-item">
SUSE Real Time Module 15-SP4
<br/>
<code>zypper in -t patch SUSE-SLE-Module-RT-15-SP4-2023-1992=1</code>
</li>
</ul>
<h2>Package List:</h2>
<ul>
<li>
openSUSE Leap Micro 5.3 (nosrc x86_64)
<ul>
<li>kernel-rt-5.14.21-150400.15.23.1</li>
</ul>
</li>
<li>
openSUSE Leap Micro 5.3 (x86_64)
<ul>
<li>kernel-rt-debugsource-5.14.21-150400.15.23.1</li>
<li>kernel-rt-debuginfo-5.14.21-150400.15.23.1</li>
</ul>
</li>
<li>
openSUSE Leap 15.4 (x86_64)
<ul>
<li>kernel-rt_debug-debuginfo-5.14.21-150400.15.23.1</li>
<li>cluster-md-kmp-rt-debuginfo-5.14.21-150400.15.23.1</li>
<li>dlm-kmp-rt-debuginfo-5.14.21-150400.15.23.1</li>
<li>kernel-rt-devel-5.14.21-150400.15.23.1</li>
<li>cluster-md-kmp-rt-5.14.21-150400.15.23.1</li>
<li>ocfs2-kmp-rt-5.14.21-150400.15.23.1</li>
<li>ocfs2-kmp-rt-debuginfo-5.14.21-150400.15.23.1</li>
<li>dlm-kmp-rt-5.14.21-150400.15.23.1</li>
<li>kernel-rt-debugsource-5.14.21-150400.15.23.1</li>
<li>kernel-syms-rt-5.14.21-150400.15.23.1</li>
<li>gfs2-kmp-rt-debuginfo-5.14.21-150400.15.23.1</li>
<li>kernel-rt_debug-debugsource-5.14.21-150400.15.23.1</li>
<li>kernel-rt-debuginfo-5.14.21-150400.15.23.1</li>
<li>kernel-rt_debug-devel-debuginfo-5.14.21-150400.15.23.1</li>
<li>gfs2-kmp-rt-5.14.21-150400.15.23.1</li>
<li>kernel-rt-devel-debuginfo-5.14.21-150400.15.23.1</li>
<li>kernel-rt_debug-devel-5.14.21-150400.15.23.1</li>
</ul>
</li>
<li>
openSUSE Leap 15.4 (noarch)
<ul>
<li>kernel-devel-rt-5.14.21-150400.15.23.1</li>
<li>kernel-source-rt-5.14.21-150400.15.23.1</li>
</ul>
</li>
<li>
openSUSE Leap 15.4 (nosrc x86_64)
<ul>
<li>kernel-rt_debug-5.14.21-150400.15.23.1</li>
<li>kernel-rt-5.14.21-150400.15.23.1</li>
</ul>
</li>
<li>
SUSE Linux Enterprise Micro for Rancher 5.3 (nosrc x86_64)
<ul>
<li>kernel-rt-5.14.21-150400.15.23.1</li>
</ul>
</li>
<li>
SUSE Linux Enterprise Micro for Rancher 5.3 (x86_64)
<ul>
<li>kernel-rt-debugsource-5.14.21-150400.15.23.1</li>
<li>kernel-rt-debuginfo-5.14.21-150400.15.23.1</li>
</ul>
</li>
<li>
SUSE Linux Enterprise Micro 5.3 (nosrc x86_64)
<ul>
<li>kernel-rt-5.14.21-150400.15.23.1</li>
</ul>
</li>
<li>
SUSE Linux Enterprise Micro 5.3 (x86_64)
<ul>
<li>kernel-rt-debugsource-5.14.21-150400.15.23.1</li>
<li>kernel-rt-debuginfo-5.14.21-150400.15.23.1</li>
</ul>
</li>
<li>
SUSE Linux Enterprise Micro for Rancher 5.4 (nosrc x86_64)
<ul>
<li>kernel-rt-5.14.21-150400.15.23.1</li>
</ul>
</li>
<li>
SUSE Linux Enterprise Micro for Rancher 5.4 (x86_64)
<ul>
<li>kernel-rt-debugsource-5.14.21-150400.15.23.1</li>
<li>kernel-rt-debuginfo-5.14.21-150400.15.23.1</li>
</ul>
</li>
<li>
SUSE Linux Enterprise Micro 5.4 (nosrc x86_64)
<ul>
<li>kernel-rt-5.14.21-150400.15.23.1</li>
</ul>
</li>
<li>
SUSE Linux Enterprise Micro 5.4 (x86_64)
<ul>
<li>kernel-rt-debugsource-5.14.21-150400.15.23.1</li>
<li>kernel-rt-debuginfo-5.14.21-150400.15.23.1</li>
</ul>
</li>
<li>
SUSE Linux Enterprise Live Patching 15-SP4 (x86_64)
<ul>
<li>kernel-livepatch-5_14_21-150400_15_23-rt-1-150400.1.3.3</li>
<li>kernel-livepatch-5_14_21-150400_15_23-rt-debuginfo-1-150400.1.3.3</li>
<li>kernel-livepatch-SLE15-SP4-RT_Update_6-debugsource-1-150400.1.3.3</li>
</ul>
</li>
<li>
SUSE Real Time Module 15-SP4 (x86_64)
<ul>
<li>kernel-rt_debug-debuginfo-5.14.21-150400.15.23.1</li>
<li>cluster-md-kmp-rt-debuginfo-5.14.21-150400.15.23.1</li>
<li>dlm-kmp-rt-debuginfo-5.14.21-150400.15.23.1</li>
<li>kernel-rt-devel-5.14.21-150400.15.23.1</li>
<li>cluster-md-kmp-rt-5.14.21-150400.15.23.1</li>
<li>ocfs2-kmp-rt-5.14.21-150400.15.23.1</li>
<li>ocfs2-kmp-rt-debuginfo-5.14.21-150400.15.23.1</li>
<li>dlm-kmp-rt-5.14.21-150400.15.23.1</li>
<li>kernel-rt-debugsource-5.14.21-150400.15.23.1</li>
<li>kernel-syms-rt-5.14.21-150400.15.23.1</li>
<li>gfs2-kmp-rt-debuginfo-5.14.21-150400.15.23.1</li>
<li>kernel-rt_debug-debugsource-5.14.21-150400.15.23.1</li>
<li>kernel-rt-debuginfo-5.14.21-150400.15.23.1</li>
<li>kernel-rt_debug-devel-debuginfo-5.14.21-150400.15.23.1</li>
<li>gfs2-kmp-rt-5.14.21-150400.15.23.1</li>
<li>kernel-rt-devel-debuginfo-5.14.21-150400.15.23.1</li>
<li>kernel-rt_debug-devel-5.14.21-150400.15.23.1</li>
</ul>
</li>
<li>
SUSE Real Time Module 15-SP4 (noarch)
<ul>
<li>kernel-devel-rt-5.14.21-150400.15.23.1</li>
<li>kernel-source-rt-5.14.21-150400.15.23.1</li>
</ul>
</li>
<li>
SUSE Real Time Module 15-SP4 (nosrc x86_64)
<ul>
<li>kernel-rt_debug-5.14.21-150400.15.23.1</li>
<li>kernel-rt-5.14.21-150400.15.23.1</li>
</ul>
</li>
</ul>
<h2>References:</h2>
<ul>
<li>
<a href="https://www.suse.com/security/cve/CVE-2017-5753.html">https://www.suse.com/security/cve/CVE-2017-5753.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2022-4744.html">https://www.suse.com/security/cve/CVE-2022-4744.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-0394.html">https://www.suse.com/security/cve/CVE-2023-0394.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-1281.html">https://www.suse.com/security/cve/CVE-2023-1281.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-1513.html">https://www.suse.com/security/cve/CVE-2023-1513.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-1582.html">https://www.suse.com/security/cve/CVE-2023-1582.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-1611.html">https://www.suse.com/security/cve/CVE-2023-1611.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-1637.html">https://www.suse.com/security/cve/CVE-2023-1637.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-1652.html">https://www.suse.com/security/cve/CVE-2023-1652.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-1838.html">https://www.suse.com/security/cve/CVE-2023-1838.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-23001.html">https://www.suse.com/security/cve/CVE-2023-23001.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-28327.html">https://www.suse.com/security/cve/CVE-2023-28327.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-28464.html">https://www.suse.com/security/cve/CVE-2023-28464.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-28466.html">https://www.suse.com/security/cve/CVE-2023-28466.html</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1065729">https://bugzilla.suse.com/show_bug.cgi?id=1065729</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1109158">https://bugzilla.suse.com/show_bug.cgi?id=1109158</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1189998">https://bugzilla.suse.com/show_bug.cgi?id=1189998</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1193629">https://bugzilla.suse.com/show_bug.cgi?id=1193629</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1194869">https://bugzilla.suse.com/show_bug.cgi?id=1194869</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1198400">https://bugzilla.suse.com/show_bug.cgi?id=1198400</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1203200">https://bugzilla.suse.com/show_bug.cgi?id=1203200</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1206552">https://bugzilla.suse.com/show_bug.cgi?id=1206552</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1207168">https://bugzilla.suse.com/show_bug.cgi?id=1207168</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1207185">https://bugzilla.suse.com/show_bug.cgi?id=1207185</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1207574">https://bugzilla.suse.com/show_bug.cgi?id=1207574</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1208602">https://bugzilla.suse.com/show_bug.cgi?id=1208602</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1208815">https://bugzilla.suse.com/show_bug.cgi?id=1208815</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1208829">https://bugzilla.suse.com/show_bug.cgi?id=1208829</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1208902">https://bugzilla.suse.com/show_bug.cgi?id=1208902</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1209052">https://bugzilla.suse.com/show_bug.cgi?id=1209052</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1209118">https://bugzilla.suse.com/show_bug.cgi?id=1209118</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1209256">https://bugzilla.suse.com/show_bug.cgi?id=1209256</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1209290">https://bugzilla.suse.com/show_bug.cgi?id=1209290</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1209292">https://bugzilla.suse.com/show_bug.cgi?id=1209292</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1209366">https://bugzilla.suse.com/show_bug.cgi?id=1209366</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1209532">https://bugzilla.suse.com/show_bug.cgi?id=1209532</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1209547">https://bugzilla.suse.com/show_bug.cgi?id=1209547</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1209556">https://bugzilla.suse.com/show_bug.cgi?id=1209556</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1209572">https://bugzilla.suse.com/show_bug.cgi?id=1209572</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1209600">https://bugzilla.suse.com/show_bug.cgi?id=1209600</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1209634">https://bugzilla.suse.com/show_bug.cgi?id=1209634</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1209635">https://bugzilla.suse.com/show_bug.cgi?id=1209635</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1209636">https://bugzilla.suse.com/show_bug.cgi?id=1209636</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1209681">https://bugzilla.suse.com/show_bug.cgi?id=1209681</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1209684">https://bugzilla.suse.com/show_bug.cgi?id=1209684</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1209687">https://bugzilla.suse.com/show_bug.cgi?id=1209687</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1209779">https://bugzilla.suse.com/show_bug.cgi?id=1209779</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1209788">https://bugzilla.suse.com/show_bug.cgi?id=1209788</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1209798">https://bugzilla.suse.com/show_bug.cgi?id=1209798</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1209799">https://bugzilla.suse.com/show_bug.cgi?id=1209799</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1209804">https://bugzilla.suse.com/show_bug.cgi?id=1209804</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1209805">https://bugzilla.suse.com/show_bug.cgi?id=1209805</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1210050">https://bugzilla.suse.com/show_bug.cgi?id=1210050</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1210203">https://bugzilla.suse.com/show_bug.cgi?id=1210203</a>
</li>
</ul>
</div>