<div class="container">
    <h1>Security update for the Linux Kernel</h1>

    <table class="table table-striped table-bordered">
        <tbody>
        <tr>
            <th>Announcement ID:</th>
            <td>SUSE-SU-2023:2231-1</td>
        </tr>
        
        <tr>
            <th>Rating:</th>
            <td>important</td>
        </tr>
        <tr>
            <th>References:</th>
            <td>
                <ul>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1142685">#1142685</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1155798">#1155798</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1174777">#1174777</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1189999">#1189999</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1194869">#1194869</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1203039">#1203039</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1203325">#1203325</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1206649">#1206649</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1206891">#1206891</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1206992">#1206992</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1207088">#1207088</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1208076">#1208076</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1208845">#1208845</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1209615">#1209615</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1209693">#1209693</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1209739">#1209739</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1209871">#1209871</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1209927">#1209927</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1209999">#1209999</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1210034">#1210034</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1210158">#1210158</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1210202">#1210202</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1210206">#1210206</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1210301">#1210301</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1210329">#1210329</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1210336">#1210336</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1210337">#1210337</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1210439">#1210439</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1210453">#1210453</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1210454">#1210454</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1210469">#1210469</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1210506">#1210506</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1210629">#1210629</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1210725">#1210725</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1210762">#1210762</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1210763">#1210763</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1210764">#1210764</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1210765">#1210765</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1210766">#1210766</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1210767">#1210767</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1210768">#1210768</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1210769">#1210769</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1210770">#1210770</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1210771">#1210771</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1210793">#1210793</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1210816">#1210816</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1210817">#1210817</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1210827">#1210827</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1210943">#1210943</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1210953">#1210953</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1210986">#1210986</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1211025">#1211025</a>
                        </li>
                    
                </ul>
            </td>
        </tr>
        
            <tr>
                <th>
                    Cross-References:
                </th>
                <td>
                    <ul>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2022-2196.html">CVE-2022-2196</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-0386.html">CVE-2023-0386</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-1670.html">CVE-2023-1670</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-1855.html">CVE-2023-1855</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-1989.html">CVE-2023-1989</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-1990.html">CVE-2023-1990</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-1998.html">CVE-2023-1998</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-2008.html">CVE-2023-2008</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-2019.html">CVE-2023-2019</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-2176.html">CVE-2023-2176</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-2235.html">CVE-2023-2235</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-23006.html">CVE-2023-23006</a>
                        </li>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2023-30772.html">CVE-2023-30772</a>
                        </li>
                    
                    </ul>
                </td>
            </tr>
            <tr>
                <th>CVSS scores:</th>
                <td>
                    <ul class="list-group">
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2022-2196</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">6.2</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2022-2196</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.8</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:L</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-0386</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.8</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-0386</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.8</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-1670</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">4.4</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-1670</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.8</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-1855</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">6.4</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-1855</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">6.3</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-1989</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.8</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-1989</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.0</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-1990</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.0</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-1990</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">4.7</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-1998</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.6</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-1998</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.6</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-2008</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">6.7</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-2008</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.8</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-2019</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">4.1</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-2019</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">4.4</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-2176</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.8</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-2176</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.8</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-2235</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.8</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-2235</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.8</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-23006</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-23006</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">5.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-30772</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">6.4</span>
                                <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2023-30772</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">6.4</span>
                                <span class="cvss-vector">CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H</span>
                            </li>
                        
                    </ul>
                </td>
            </tr>
        
        <tr>
            <th>Affected Products:</th>
            <td>
                <ul class="list-group">
                    
                        <li class="list-group-item">openSUSE Leap 15.4</li>
                    
                        <li class="list-group-item">openSUSE Leap Micro 5.3</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise High Performance Computing 15 SP4</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Live Patching 15-SP4</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Micro 5.3</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Micro 5.4</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Micro for Rancher 5.3</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Micro for Rancher 5.4</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Real Time 15 SP4</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Server 15 SP4</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Server for SAP Applications 15 SP4</li>
                    
                        <li class="list-group-item">SUSE Real Time Module 15-SP4</li>
                    
                </ul>
            </td>
        </tr>
        </tbody>
    </table>

    <p>An update that solves 13 vulnerabilities, contains two features and has 39 fixes can now be installed.</p>

    <h2>Description:</h2>
    <p>The SUSE Linux Enterprise 15 SP4 RT kernel was updated to receive various security and bugfixes.</p>
<p>The following security bugs were fixed:</p>
<ul>
<li>CVE-2023-2235: A use-after-free vulnerability in the Performance Events system can be exploited to achieve local privilege escalation (bsc#1210986).</li>
<li>CVE-2022-2196: Fixed a regression related to KVM that allowed for speculative execution attacks (bsc#1206992).</li>
<li>CVE-2023-23006: Fixed NULL checking against IS_ERR in dr_domain_init_resources (bsc#1208845).</li>
<li>CVE-2023-1670: Fixed a use after free in the Xircom 16-bit PCMCIA Ethernet driver. A local user could use this flaw to crash the system or potentially escalate their privileges on the system (bsc#1209871).</li>
<li>CVE-2023-2176: A vulnerability was found in compare_netdev_and_ip in drivers/infiniband/core/cma.c in RDMA. The improper cleanup results in out-of-boundary read, where a local user can utilize this problem to crash the system or escalation of privilege (bsc#1210629).</li>
<li>CVE-2023-0386: A flaw was found where unauthorized access to the execution of the setuid file with capabilities was found in the OverlayFS subsystem, when a user copies a capable file from a nosuid mount into another mount. This uid mapping bug allowed a local user to escalate their privileges on the system (bsc#1209615).</li>
<li>CVE-2023-1998: Fixed a use after free during login when accessing the shost ipaddress (bsc#1210506).</li>
<li>CVE-2023-1855: Fixed a use after free in xgene_hwmon_remove (bsc#1210202).</li>
<li>CVE-2023-30772: Fixed a race condition and resultant use-after-free in da9150_charger_remove (bsc#1210329).</li>
<li>CVE-2023-2019: A flaw was found in the netdevsim device driver, more specifically within the scheduling of events. This issue results from the improper management of a reference count and may lead to a denial of service (bsc#1210454).</li>
<li>CVE-2023-2008: A flaw was found in the fault handler of the udmabuf device driver. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code (bsc#1210453).</li>
<li>CVE-2023-1989: Fixed a use after free in btsdio_remove (bsc#1210336).</li>
<li>CVE-2023-1990: Fixed a use after free in ndlc_remove (bsc#1210337).</li>
</ul>
<p>The following non-security bugs were fixed:</p>
<ul>
<li>ACPI: CPPC: Disable FIE if registers in PCC regions (bsc#1210953).</li>
<li>ACPI: VIOT: Initialize the correct IOMMU fwspec (git-fixes).</li>
<li>ACPI: resource: Add Medion S17413 to IRQ override quirk (git-fixes).</li>
<li>ALSA: emu10k1: do not create old pass-through playback device on Audigy (git-fixes).</li>
<li>ALSA: emu10k1: fix capture interrupt handler unlinking (git-fixes).</li>
<li>ALSA: firewire-tascam: add missing unwind goto in snd_tscm_stream_start_duplex() (git-fixes).</li>
<li>ALSA: hda/cirrus: Add extra 10 ms delay to allow PLL settle and lock (git-fixes).</li>
<li>ALSA: hda/realtek: Add quirks for Lenovo Z13/Z16 Gen2 (git-fixes).</li>
<li>ALSA: hda/realtek: Enable mute/micmute LEDs and speaker support for HP Laptops (git-fixes).</li>
<li>ALSA: hda/realtek: Remove specific patch for Dell Precision 3260 (git-fixes).</li>
<li>ALSA: hda/realtek: fix mute/micmute LEDs for a HP ProBook (git-fixes).</li>
<li>ALSA: hda/realtek: fix speaker, mute/micmute LEDs not work on a HP platform (git-fixes).</li>
<li>ALSA: hda/sigmatel: add pin overrides for Intel DP45SG motherboard (git-fixes).</li>
<li>ALSA: hda/sigmatel: fix S/PDIF out on Intel D<em>45</em> motherboards (git-fixes).</li>
<li>ALSA: hda: cs35l41: Enable Amp High Pass Filter (git-fixes).</li>
<li>ALSA: hda: patch_realtek: add quirk for Asus N7601ZM (git-fixes).</li>
<li>ALSA: i2c/cs8427: fix iec958 mixer control deactivation (git-fixes).</li>
<li>ARM: 9290/1: uaccess: Fix KASAN false-positives (git-fixes).</li>
<li>ARM: dts: exynos: fix WM8960 clock name in Itop Elite (git-fixes).</li>
<li>ARM: dts: gta04: fix excess dma channel usage (git-fixes).</li>
<li>ARM: dts: qcom: ipq4019: Fix the PCI I/O port range (git-fixes).</li>
<li>ARM: dts: rockchip: fix a typo error for rk3288 spdif node (git-fixes).</li>
<li>ARM: dts: s5pv210: correct MIPI CSIS clock name (git-fixes).</li>
<li>ASN.1: Fix check for strdup() success (git-fixes).</li>
<li>ASoC: cs35l41: Only disable internal boost (git-fixes).</li>
<li>ASoC: es8316: Handle optional IRQ assignment (git-fixes).</li>
<li>ASoC: fsl_asrc_dma: fix potential null-ptr-deref (git-fixes).</li>
<li>ASoC: fsl_mqs: move of_node_put() to the correct location (git-fixes).</li>
<li>Add 42a11bf5c543 cgroup/cpuset: Make cpuset_fork() handle CLONE_INTO_CGROUP properly</li>
<li>Add eee878537941 cgroup/cpuset: Add cpuset_can_fork() and cpuset_cancel_fork() methods</li>
<li>Bluetooth: Fix race condition in hidp_session_thread (git-fixes).</li>
<li>Bluetooth: L2CAP: Fix use-after-free in l2cap_disconnect_{req,rsp} (git-fixes).</li>
<li>Drivers: vmbus: Check for channel allocation before looking up relids (git-fixes).</li>
<li>IB/mlx5: Add support for 400G_8X lane speed (git-fixes)</li>
<li>Input: hp_sdc_rtc - mark an unused function as __maybe_unused (git-fixes).</li>
<li>Input: raspberrypi-ts - fix refcount leak in rpi_ts_probe (git-fixes).</li>
<li>KEYS: Add missing function documentation (git-fixes).</li>
<li>KEYS: Create static version of public_key_verify_signature (git-fixes).</li>
<li>NFS: Cleanup unused rpc_clnt variable (git-fixes).</li>
<li>NFSD: Avoid calling OPDESC() with ops->opnum == OP_ILLEGAL (git-fixes).</li>
<li>NFSD: callback request does not use correct credential for AUTH_SYS (git-fixes).</li>
<li>PCI/EDR: Clear Device Status after EDR error recovery (git-fixes).</li>
<li>PCI: dwc: Fix PORT_LINK_CONTROL update when CDM check enabled (git-fixes).</li>
<li>PCI: imx6: Install the fault handler only on compatible match (git-fixes).</li>
<li>PCI: loongson: Add more devices that need MRRS quirk (git-fixes).</li>
<li>PCI: loongson: Prevent LS7A MRRS increases (git-fixes).</li>
<li>PCI: pciehp: Fix AB-BA deadlock between reset_lock and device_lock (git-fixes).</li>
<li>PCI: qcom: Fix the incorrect register usage in v2.7.0 config (git-fixes).</li>
<li>RDMA/cma: Allow UD qp_type to join multicast only (git-fixes)</li>
<li>RDMA/core: Fix GID entry ref leak when create_ah fails (git-fixes)</li>
<li>RDMA/irdma: Add ipv4 check to irdma_find_listener() (git-fixes)</li>
<li>RDMA/irdma: Fix memory leak of PBLE objects (git-fixes)</li>
<li>RDMA/irdma: Increase iWARP CM default rexmit count (git-fixes)</li>
<li>Remove obsolete KMP obsoletes (bsc#1210469).</li>
<li>Revert "Bluetooth: btsdio: fix use after free bug in btsdio_remove due to unfinished work" (git-fixes).</li>
<li>Revert "pinctrl: amd: Disable and mask interrupts on resume" (git-fixes).</li>
<li>USB: dwc3: fix runtime pm imbalance on probe errors (git-fixes).</li>
<li>USB: dwc3: fix runtime pm imbalance on unbind (git-fixes).</li>
<li>USB: serial: cp210x: add Silicon Labs IFS-USB-DATACABLE IDs (git-fixes).</li>
<li>USB: serial: option: add Quectel RM500U-CN modem (git-fixes).</li>
<li>USB: serial: option: add Telit FE990 compositions (git-fixes).</li>
<li>USB: serial: option: add UNISOC vendor and TOZED LT70C product (git-fixes).</li>
<li>amdgpu: disable powerpc support for the newer display engine (bsc#1194869).</li>
<li>arm64: dts: imx8mm-evk: correct pmic clock source (git-fixes).</li>
<li>arm64: dts: meson-g12-common: specify full DMC range (git-fixes).</li>
<li>arm64: dts: qcom: ipq8074-hk01: enable QMP device, not the PHY node (git-fixes).</li>
<li>arm64: dts: qcom: ipq8074: Fix the PCI I/O port range (git-fixes).</li>
<li>arm64: dts: qcom: msm8994-kitakami: drop unit address from PMI8994 regulator (git-fixes).</li>
<li>arm64: dts: qcom: msm8994-msft-lumia-octagon: drop unit address from PMI8994 regulator (git-fixes).</li>
<li>arm64: dts: qcom: msm8996: Fix the PCI I/O port range (git-fixes).</li>
<li>arm64: dts: qcom: msm8998: Fix stm-stimulus-base reg name (git-fixes).</li>
<li>arm64: dts: qcom: msm8998: Fix the PCI I/O port range (git-fixes).</li>
<li>arm64: dts: qcom: sc7180-trogdor-lazor: correct trackpad supply (git-fixes).</li>
<li>arm64: dts: qcom: sdm845: Fix the PCI I/O port range (git-fixes).</li>
<li>arm64: dts: qcom: sm8250: Fix the PCI I/O port range (git-fixes).</li>
<li>arm64: dts: renesas: r8a774c0: Remove bogus voltages from OPP table (git-fixes).</li>
<li>arm64: dts: renesas: r8a77990: Remove bogus voltages from OPP table (git-fixes).</li>
<li>arm64: dts: ti: k3-j721e-main: Remove ti,strobe-sel property (git-fixes).</li>
<li>arm64: enable jump-label jump-label was disabled on arm64 by a backport error.</li>
<li>bluetooth: Perform careful capability checks in hci_sock_ioctl() (git-fixes).</li>
<li>cgroup/cpuset: Wake up cpuset_attach_wq tasks in cpuset_cancel_attach() (bsc#1210827).</li>
<li>cifs: fix negotiate context parsing (bsc#1210301).</li>
<li>clk: add missing of_node_put() in "assigned-clocks" property parsing (git-fixes).</li>
<li>clk: at91: clk-sam9x60-pll: fix return value check (git-fixes).</li>
<li>clk: rockchip: rk3399: allow clk_cifout to force clk_cifout_src to reparent (git-fixes).</li>
<li>clk: sprd: set max_register according to mapping range (git-fixes).</li>
<li>clocksource/drivers/davinci: Fix memory leak in davinci_timer_register when init fails (git-fixes).</li>
<li>config: arm64: enable ERRATUM_843419 Config option was incorrectly replaced by the rt-refresh-configs script</li>
<li>cpufreq: CPPC: Fix build error without CONFIG_ACPI_CPPC_CPUFREQ_FIE (bsc#1210953).</li>
<li>cpufreq: CPPC: Fix performance/frequency conversion (git-fixes).</li>
<li>cpumask: fix incorrect cpumask scanning result checks (bsc#1210943).</li>
<li>crypto: caam - Clear some memory in instantiate_rng (git-fixes).</li>
<li>crypto: drbg - Only fail when jent is unavailable in FIPS mode (git-fixes).</li>
<li>crypto: sa2ul - Select CRYPTO_DES (git-fixes).</li>
<li>crypto: safexcel - Cleanup ring IRQ workqueues on load failure (git-fixes).</li>
<li>driver core: Do not require dynamic_debug for initcall_debug probe timing (git-fixes).</li>
<li>drivers: staging: rtl8723bs: Fix locking in _rtw_join_timeout_handler() (git-fixes).</li>
<li>drivers: staging: rtl8723bs: Fix locking in rtw_scan_timeout_handler() (git-fixes).</li>
<li>drm/amd/display/dc/dce60/Makefile: Fix previous attempt to silence known override-init warnings (git-fixes).</li>
<li>drm/amd/display: Fix potential null dereference (git-fixes).</li>
<li>drm/amdgpu: Re-enable DCN for 64-bit powerpc (bsc#1194869).</li>
<li>drm/armada: Fix a potential double free in an error handling path (git-fixes).</li>
<li>drm/bridge: adv7533: Fix adv7533_mode_valid for adv7533 and adv7535 (git-fixes).</li>
<li>drm/bridge: lt8912b: Fix DSI Video Mode (git-fixes).</li>
<li>drm/bridge: lt9611: Fix PLL being unable to lock (git-fixes).</li>
<li>drm/fb-helper: set x/yres_virtual in drm_fb_helper_check_var (git-fixes).</li>
<li>drm/i915/dsi: fix DSS CTL register offsets for TGL+ (git-fixes).</li>
<li>drm/i915: Fix fast wake AUX sync len (git-fixes).</li>
<li>drm/i915: Make intel_get_crtc_new_encoder() less oopsy (git-fixes).</li>
<li>drm/i915: fix race condition UAF in i915_perf_add_config_ioctl (git-fixes).</li>
<li>drm/lima/lima_drv: Add missing unwind goto in lima_pdev_probe() (git-fixes).</li>
<li>drm/msm/adreno: drop bogus pm_runtime_set_active() (git-fixes).</li>
<li>drm/msm/disp/dpu: check for crtc enable rather than crtc active to release shared resources (git-fixes).</li>
<li>drm/msm: fix NULL-deref on snapshot tear down (git-fixes).</li>
<li>drm/nouveau/disp: Support more modes by checking with lower bpc (git-fixes).</li>
<li>drm/panel: otm8009a: Set backlight parent to panel device (git-fixes).</li>
<li>drm/probe-helper: Cancel previous job before starting new one (git-fixes).</li>
<li>drm/rockchip: Drop unbalanced obj unref (git-fixes).</li>
<li>drm/vgem: add missing mutex_destroy (git-fixes).</li>
<li>drm: msm: adreno: Disable preemption on Adreno 510 (git-fixes).</li>
<li>drm: panel-orientation-quirks: Add quirk for Lenovo Yoga Book X90F (git-fixes).</li>
<li>drm: rcar-du: Fix a NULL vs IS_ERR() bug (git-fixes).</li>
<li>dt-bindings: arm: fsl: Fix copy-paste error in comment (git-fixes).</li>
<li>dt-bindings: iio: ti,tmp117: fix documentation link (git-fixes).</li>
<li>dt-bindings: mailbox: qcom,apcs-kpss-global: fix SDX55 &#x27;if&#x27; match (git-fixes).</li>
<li>dt-bindings: nvmem: qcom,spmi-sdam: fix example &#x27;reg&#x27; property (git-fixes).</li>
<li>dt-bindings: remoteproc: stm32-rproc: Typo fix (git-fixes).</li>
<li>dt-bindings: soc: qcom: smd-rpm: re-add missing qcom,rpm-msm8994 (git-fixes).</li>
<li>e1000e: Disable TSO on i219-LM card to increase speed (git-fixes).</li>
<li>efi: sysfb_efi: Add quirk for Lenovo Yoga Book X91F/L (git-fixes).</li>
<li>ext4: Fix deadlock during directory rename (bsc#1210763).</li>
<li>ext4: Fix possible corruption when moving a directory (bsc#1210763).</li>
<li>ext4: fix RENAME_WHITEOUT handling for inline directories (bsc#1210766).</li>
<li>ext4: fix another off-by-one fsmap error on 1k block filesystems (bsc#1210767).</li>
<li>ext4: fix bad checksum after online resize (bsc#1210762 bsc#1208076).</li>
<li>ext4: fix cgroup writeback accounting with fs-layer encryption (bsc#1210765).</li>
<li>ext4: fix corruption when online resizing a 1K bigalloc fs (bsc#1206891).</li>
<li>ext4: fix incorrect options show of original mount_opt and extend mount_opt2 (bsc#1210764).</li>
<li>ext4: fix possible double unlock when moving a directory (bsc#1210763).</li>
<li>ext4: use ext4_journal_start/stop for fast commit transactions (bsc#1210793).</li>
<li>fbmem: Reject FB_ACTIVATE_KD_TEXT from userspace (git-fixes).</li>
<li>firmware: qcom_scm: Clear download bit during reboot (git-fixes).</li>
<li>firmware: stratix10-svc: Fix an NULL vs IS_ERR() bug in probe (git-fixes).</li>
<li>fpga: bridge: fix kernel-doc parameter description (git-fixes).</li>
<li>hwmon: (adt7475) Use device_property APIs when configuring polarity (git-fixes).</li>
<li>hwmon: (k10temp) Check range scale when CUR_TEMP register is read-write (git-fixes).</li>
<li>hwmon: (pmbus/fsp-3y) Fix functionality bitmask in FSP-3Y YM-2151E (git-fixes).</li>
<li>i2c: cadence: cdns_i2c_master_xfer(): Fix runtime PM leak on error path (git-fixes).</li>
<li>i2c: hisi: Avoid redundant interrupts (git-fixes).</li>
<li>i2c: imx-lpi2c: clean rx/tx buffers upon new message (git-fixes).</li>
<li>i2c: ocores: generate stop condition after timeout in polling mode (git-fixes).</li>
<li>i915/perf: Replace DRM_DEBUG with driver specific drm_dbg call (git-fixes).</li>
<li>ice: avoid bonding causing auxiliary plug/unplug under RTNL lock (bsc#1210158).</li>
<li>iio: adc: at91-sama5d2_adc: fix an error code in at91_adc_allocate_trigger() (git-fixes).</li>
<li>iio: light: tsl2772: fix reading proximity-diodes from device tree (git-fixes).</li>
<li>ipmi: fix SSIF not responding under certain cond (git-fixes).</li>
<li>ipmi:ssif: Add send_retries increment (git-fixes).</li>
<li>k-m-s: Drop Linux 2.6 support</li>
<li>kABI: PCI: loongson: Prevent LS7A MRRS increases (kabi).</li>
<li>kABI: x86/msi: Fix msi message data shadow struct (kabi).</li>
<li>kabi/severities: ignore KABI for NVMe target (bsc#1174777) The target code is only for testing and there are no external users.</li>
<li>keys: Fix linking a duplicate key to a keyring&#x27;s assoc_array (bsc#1207088).</li>
<li>locking/rwbase: Mitigate indefinite writer starvation.</li>
<li>media: av7110: prevent underflow in write_ts_to_decoder() (git-fixes).</li>
<li>media: dm1105: Fix use after free bug in dm1105_remove due to race condition (git-fixes).</li>
<li>media: max9286: Free control handler (git-fixes).</li>
<li>media: rc: gpio-ir-recv: Fix support for wake-up (git-fixes).</li>
<li>media: rkvdec: fix use after free bug in rkvdec_remove (git-fixes).</li>
<li>media: saa7134: fix use after free bug in saa7134_finidev due to race condition (git-fixes).</li>
<li>media: venus: dec: Fix handling of the start cmd (git-fixes).</li>
<li>memstick: fix memory leak if card device is never registered (git-fixes).</li>
<li>mm/filemap: fix page end in filemap_get_read_batch (bsc#1210768).</li>
<li>mm: page_alloc: skip regions with hugetlbfs pages when allocating 1G pages (bsc#1210034).</li>
<li>mm: take a page reference when removing device exclusive entries (bsc#1211025).</li>
<li>mmc: sdhci-of-esdhc: fix quirk to ignore command inhibit for data (git-fixes).</li>
<li>mmc: sdhci_am654: Set HIGH_SPEED_ENA for SDR12 and SDR25 (git-fixes).</li>
<li>mtd: core: fix error path for nvmem provider (git-fixes).</li>
<li>mtd: core: fix nvmem error reporting (git-fixes).</li>
<li>mtd: core: provide unique name for nvmem device, take two (git-fixes).</li>
<li>mtd: spi-nor: Fix a trivial typo (git-fixes).</li>
<li>net: phy: nxp-c45-tja11xx: add remove callback (git-fixes).</li>
<li>net: phy: nxp-c45-tja11xx: fix unsigned long multiplication overflow (git-fixes).</li>
<li>nfsd: call op_release, even when op_func returns an error (git-fixes).</li>
<li>nilfs2: fix potential UAF of struct nilfs_sc_info in nilfs_segctor_thread() (git-fixes).</li>
<li>nilfs2: initialize unused bytes in segment summary blocks (git-fixes).</li>
<li>nvme initialize core quirks before calling nvme_init_subsystem (git-fixes).</li>
<li>nvme-auth: uninitialized variable in nvme_auth_transform_key() (git-fixes).</li>
<li>nvme-fcloop: fix "inconsistent {IN-HARDIRQ-W} -> {HARDIRQ-ON-W} usage" (git-fixes).</li>
<li>nvme-hwmon: consistently ignore errors from nvme_hwmon_init (git-fixes).</li>
<li>nvme-hwmon: kmalloc the NVME SMART log buffer (git-fixes).</li>
<li>nvme-multipath: fix possible hang in live ns resize with ANA access (git-fixes).</li>
<li>nvme-pci: fix doorbell buffer value endianness (git-fixes).</li>
<li>nvme-pci: fix mempool alloc size (git-fixes).</li>
<li>nvme-pci: fix page size checks (git-fixes).</li>
<li>nvme-pci: fix timeout request state check (git-fixes).</li>
<li>nvme-rdma: fix possible hang caused during ctrl deletion (git-fixes).</li>
<li>nvme-tcp: fix possible circular locking when deleting a controller under memory pressure (git-fixes).</li>
<li>nvme-tcp: fix possible hang caused during ctrl deletion (git-fixes).</li>
<li>nvme-tcp: fix regression that causes sporadic requests to time out (git-fixes).</li>
<li>nvme: Fix IOC_PR_CLEAR and IOC_PR_RELEASE ioctls for nvme devices (git-fixes).</li>
<li>nvme: add device name to warning in uuid_show() (git-fixes).</li>
<li>nvme: catch -ENODEV from nvme_revalidate_zones again (git-fixes).</li>
<li>nvme: copy firmware_rev on each init (git-fixes).</li>
<li>nvme: define compat_ioctl again to unbreak 32-bit userspace (git-fixes).</li>
<li>nvme: fix async event trace event (git-fixes).</li>
<li>nvme: fix handling single range discard request (git-fixes).</li>
<li>nvme: fix per-namespace chardev deletion (git-fixes).</li>
<li>nvme: fix the NVME_CMD_EFFECTS_CSE_MASK definition (git-fixes).</li>
<li>nvme: fix the read-only state for zoned namespaces with unsupposed features (git-fixes).</li>
<li>nvme: improve the NVME_CONNECT_AUTHREQ* definitions (git-fixes).</li>
<li>nvme: move nvme_multi_css into nvme.h (git-fixes).</li>
<li>nvme: return err on nvme_init_non_mdts_limits fail (git-fixes).</li>
<li>nvme: send Identify with CNS 06h only to I/O controllers (bsc#1209693).</li>
<li>nvme: set dma alignment to dword (git-fixes).</li>
<li>nvme: use command_id instead of req->tag in trace_nvme_complete_rq() (git-fixes).</li>
<li>nvmet-auth: do not try to cancel a non-initialized work_struct (git-fixes).</li>
<li>nvmet-tcp: fix incomplete data digest send (git-fixes).</li>
<li>nvmet-tcp: fix regression in data_digest calculation (git-fixes).</li>
<li>nvmet: add helpers to set the result field for connect commands (git-fixes).</li>
<li>nvmet: avoid potential UAF in nvmet_req_complete() (git-fixes).</li>
<li>nvmet: do not defer passthrough commands with trivial effects to the workqueue (git-fixes).</li>
<li>nvmet: fix I/O Command Set specific Identify Controller (git-fixes).</li>
<li>nvmet: fix Identify Active Namespace ID list handling (git-fixes).</li>
<li>nvmet: fix Identify Controller handling (git-fixes).</li>
<li>nvmet: fix Identify Namespace handling (git-fixes).</li>
<li>nvmet: fix a memory leak (git-fixes).</li>
<li>nvmet: fix a memory leak in nvmet_auth_set_key (git-fixes).</li>
<li>nvmet: fix a use-after-free (git-fixes).</li>
<li>nvmet: fix invalid memory reference in nvmet_subsys_attr_qid_max_show (git-fixes).</li>
<li>nvmet: force reconnect when number of queue changes (git-fixes).</li>
<li>nvmet: looks at the passthrough controller when initializing CAP (git-fixes).</li>
<li>nvmet: only allocate a single slab for bvecs (git-fixes).</li>
<li>nvmet: use IOCB_NOWAIT only if the filesystem supports it (git-fixes).</li>
<li>perf/core: Fix perf_output_begin parameter is incorrectly invoked in perf_event_bpf_output (git fixes).</li>
<li>perf/core: Fix the same task check in perf_event_set_output (git fixes).</li>
<li>perf: Fix check before add_event_to_groups() in perf_group_detach() (git fixes).</li>
<li>perf: fix perf_event_context->time (git fixes).</li>
<li>platform/x86 (gigabyte-wmi): Add support for A320M-S2H V2 (git-fixes).</li>
<li>platform/x86: gigabyte-wmi: add support for X570S AORUS ELITE (git-fixes).</li>
<li>power: supply: cros_usbpd: reclassify "default case!" as debug (git-fixes).</li>
<li>power: supply: generic-adc-battery: fix unit scaling (git-fixes).</li>
<li>powerpc/64: Always build with 128-bit long double (bsc#1194869).</li>
<li>powerpc/64e: Fix amdgpu build on Book3E w/o AltiVec (bsc#1194869).</li>
<li>powerpc/hv-gpci: Fix hv_gpci event list (git fixes).</li>
<li>powerpc/papr_scm: Update the NUMA distance table for the target node (bsc#1209999 ltc#202140 bsc#1142685 ltc#179509 git-fixes).</li>
<li>powerpc/perf/hv-24x7: add missing RTAS retry status handling (git fixes).</li>
<li>powerpc/pseries: Consolidate different NUMA distance update code paths (bsc#1209999 ltc#202140 bsc#1142685 ltc#179509 git-fixes).</li>
<li>powerpc: declare unmodified attribute_group usages const (git-fixes).</li>
<li>regulator: core: Avoid lockdep reports when resolving supplies (git-fixes).</li>
<li>regulator: core: Consistently set mutex_owner when using ww_mutex_lock_slow() (git-fixes).</li>
<li>regulator: core: Shorten off-on-delay-us for always-on/boot-on by time since booted (git-fixes).</li>
<li>regulator: fan53555: Explicitly include bits header (git-fixes).</li>
<li>regulator: fan53555: Fix wrong TCS_SLEW_MASK (git-fixes).</li>
<li>regulator: stm32-pwr: fix of_iomap leak (git-fixes).</li>
<li>remoteproc: Harden rproc_handle_vdev() against integer overflow (git-fixes).</li>
<li>remoteproc: imx_rproc: Call of_node_put() on iteration error (git-fixes).</li>
<li>remoteproc: st: Call of_node_put() on iteration error (git-fixes).</li>
<li>remoteproc: stm32: Call of_node_put() on iteration error (git-fixes).</li>
<li>rtc: meson-vrtc: Use ktime_get_real_ts64() to get the current time (git-fixes).</li>
<li>rtc: omap: include header for omap_rtc_power_off_program prototype (git-fixes).</li>
<li>sched/fair: Fix imbalance overflow (bsc#1155798 (CPU scheduler functional and performance backports)).</li>
<li>sched/fair: Limit sched slice duration (bsc#1189999 (Scheduler functional and performance backports)).</li>
<li>sched/fair: Move calculate of avg_load to a better location (bsc#1155798 (CPU scheduler functional and performance backports)).</li>
<li>sched/fair: Sanitize vruntime of entity being migrated (bsc#1203325).</li>
<li>sched/fair: sanitize vruntime of entity being placed (bsc#1203325).</li>
<li>sched/numa: Stop an exhastive search if an idle core is found (bsc#1189999 (Scheduler functional and performance backports)).</li>
<li>sched_getaffinity: do not assume &#x27;cpumask_size()&#x27; is fully initialized (bsc#1155798 (CPU scheduler functional and performance backports)).</li>
<li>scsi: aic94xx: Add missing check for dma_map_single() (git-fixes).</li>
<li>scsi: core: Add BLIST_NO_VPD_SIZE for some VDASD (git-fixes bsc#1203039) (renamed now that it&#x27;s upstgream)</li>
<li>scsi: core: Add BLIST_SKIP_VPD_PAGES for SKhynix H28U74301AMR (git-fixes).</li>
<li>scsi: core: Fix a procfs host directory removal regression (git-fixes).</li>
<li>scsi: core: Fix a source code comment (git-fixes).</li>
<li>scsi: core: Remove the /proc/scsi/${proc_name} directory earlier (git-fixes).</li>
<li>scsi: hisi_sas: Check devm_add_action() return value (git-fixes).</li>
<li>scsi: hisi_sas: Set a port invalid only if there are no devices attached when refreshing port id (git-fixes).</li>
<li>scsi: ipr: Work around fortify-string warning (git-fixes).</li>
<li>scsi: iscsi_tcp: Check that sock is valid before iscsi_set_param() (git-fixes).</li>
<li>scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress (git-fixes).</li>
<li>scsi: iscsi_tcp: Fix UAF during logout when accessing the shost ipaddress (git-fixes).</li>
<li>scsi: kABI workaround for fc_host_fpin_rcv (git-fixes).</li>
<li>scsi: libsas: Remove useless dev_list delete in sas_ex_discover_end_dev() (git-fixes).</li>
<li>scsi: lpfc: Avoid usage of list iterator variable after loop (git-fixes).</li>
<li>scsi: lpfc: Check kzalloc() in lpfc_sli4_cgn_params_read() (git-fixes).</li>
<li>scsi: lpfc: Copyright updates for 14.2.0.11 patches (bsc#1210943).</li>
<li>scsi: lpfc: Correct used_rpi count when devloss tmo fires with no recovery (bsc#1210943).</li>
<li>scsi: lpfc: Defer issuing new PLOGI if received RSCN before completing REG_LOGIN (bsc#1210943).</li>
<li>scsi: lpfc: Drop redundant pci_enable_pcie_error_reporting() (bsc#1210943).</li>
<li>scsi: lpfc: Fix double word in comments (bsc#1210943).</li>
<li>scsi: lpfc: Fix ioremap issues in lpfc_sli4_pci_mem_setup() (bsc#1210943).</li>
<li>scsi: lpfc: Fix lockdep warning for rx_monitor lock when unloading driver (bsc#1210943).</li>
<li>scsi: lpfc: Prevent lpfc_debugfs_lockstat_write() buffer overflow (bsc#1210943).</li>
<li>scsi: lpfc: Record LOGO state with discovery engine even if aborted (bsc#1210943).</li>
<li>scsi: lpfc: Reorder freeing of various DMA buffers and their list removal (bsc#1210943).</li>
<li>scsi: lpfc: Revise lpfc_error_lost_link() reason code evaluation logic (bsc#1210943).</li>
<li>scsi: lpfc: Silence an incorrect device output (bsc#1210943).</li>
<li>scsi: lpfc: Skip waiting for register ready bits when in unrecoverable state (bsc#1210943).</li>
<li>scsi: lpfc: Update lpfc version to 14.2.0.11 (bsc#1210943).</li>
<li>scsi: megaraid_sas: Fix crash after a double completion (git-fixes).</li>
<li>scsi: megaraid_sas: Update max supported LD IDs to 240 (git-fixes).</li>
<li>scsi: mpt3sas: Do not print sense pool info twice (git-fixes).</li>
<li>scsi: mpt3sas: Fix NULL pointer access in mpt3sas_transport_port_add() (git-fixes).</li>
<li>scsi: mpt3sas: Fix a memory leak (git-fixes).</li>
<li>scsi: qla2xxx: Fix memory leak in qla2x00_probe_one() (git-fixes).</li>
<li>scsi: qla2xxx: Perform lockless command completion in abort path (git-fixes).</li>
<li>scsi: scsi_dh_alua: Fix memleak for &#x27;qdata&#x27; in alua_activate() (git-fixes).</li>
<li>scsi: scsi_transport_fc: Add an additional flag to fc_host_fpin_rcv() (bsc#1210943).</li>
<li>scsi: sd: Fix wrong zone_write_granularity value during revalidate (git-fixes).</li>
<li>scsi: ses: Do not attach if enclosure has no components (git-fixes).</li>
<li>scsi: ses: Fix possible addl_desc_ptr out-of-bounds accesses (git-fixes).</li>
<li>scsi: ses: Fix possible desc_ptr out-of-bounds accesses (git-fixes).</li>
<li>scsi: ses: Fix slab-out-of-bounds in ses_enclosure_data_process() (git-fixes).</li>
<li>scsi: ses: Fix slab-out-of-bounds in ses_intf_remove() (git-fixes).</li>
<li>scsi: snic: Fix memory leak with using debugfs_lookup() (git-fixes).</li>
<li>seccomp: Move copy_seccomp() to no failure path (bsc#1210817).</li>
<li>selftests/kselftest/runner/run_one(): allow running non-executable files (git-fixes).</li>
<li>selftests: sigaltstack: fix -Wuninitialized (git-fixes).</li>
<li>selinux: ensure av_permissions.h is built when needed (git-fixes).</li>
<li>selinux: fix Makefile dependencies of flask.h (git-fixes).</li>
<li>serial: 8250: Add missing wakeup event reporting (git-fixes).</li>
<li>serial: 8250_bcm7271: Fix arbitration handling (git-fixes).</li>
<li>serial: 8250_exar: derive nr_ports from PCI ID for Acces I/O cards (git-fixes).</li>
<li>serial: exar: Add support for Sealevel 7xxxC serial cards (git-fixes).</li>
<li>signal handling: do not use BUG_ON() for debugging (bsc#1210439).</li>
<li>signal: Add SA_IMMUTABLE to ensure forced siganls do not get changed (bsc#1210816).</li>
<li>signal: Do not always set SA_IMMUTABLE for forced signals (bsc#1210816).</li>
<li>signal: HANDLER_EXIT should clear SIGNAL_UNKILLABLE (bsc#1210816).</li>
<li>soc: ti: pm33xx: Fix refcount leak in am33xx_pm_probe (git-fixes).</li>
<li>spi: cadence-quadspi: fix suspend-resume implementations (git-fixes).</li>
<li>spi: fsl-spi: Fix CPM/QE mode Litte Endian (git-fixes).</li>
<li>spi: qup: Do not skip cleanup in remove&#x27;s error path (git-fixes).</li>
<li>staging: iio: resolver: ads1210: fix config mode (git-fixes).</li>
<li>staging: rtl8192e: Fix W_DISABLE# does not work after stop/start (git-fixes).</li>
<li>stat: fix inconsistency between struct stat and struct compat_stat (git-fixes).</li>
<li>sunrpc: only free unix grouplist after RCU settles (git-fixes).</li>
<li>supported.conf: declaring usb_f_ncm supported as requested in (jsc#PED-3750) Support for the legacy functionality g_ncm is still under discussion (see jsc-PED#3200) For maintainance see (jsc#PED-3759)</li>
<li>supported.conf: support u_ether and libcomposite (jsc-PED#3750) This is necessary for g_ncm (for maintainance see jsc-PED#3759)</li>
<li>tty: Prevent writing chars during tcsetattr TCSADRAIN/FLUSH (git-fixes).</li>
<li>tty: serial: fsl_lpuart: adjust buffer length to the intended size (git-fixes).</li>
<li>udf: Check consistency of Space Bitmap Descriptor (bsc#1210771).</li>
<li>udf: Fix a slab-out-of-bounds write bug in udf_find_entry() (bsc#1206649).</li>
<li>udf: Support splicing to file (bsc#1210770).</li>
<li>usb: chipidea: fix missing goto in <code>ci_hdrc_probe</code> (git-fixes).</li>
<li>usb: chipidea: imx: avoid unnecessary probe defer (git-fixes).</li>
<li>usb: dwc3: gadget: Change condition for processing suspend event (git-fixes).</li>
<li>usb: dwc3: pci: add support for the Intel Meteor Lake-S (git-fixes).</li>
<li>usb: gadget: tegra-xudc: Fix crash in vbus_draw (git-fixes).</li>
<li>usb: gadget: udc: renesas_usb3: Fix use after free bug in renesas_usb3_remove due to race condition (git-fixes).</li>
<li>usb: host: xhci-rcar: remove leftover quirk handling (git-fixes).</li>
<li>virt/coco/sev-guest: Add throttling awareness (bsc#1209927).</li>
<li>virt/coco/sev-guest: Carve out the request issuing logic into a helper (bsc#1209927).</li>
<li>virt/coco/sev-guest: Check SEV_SNP attribute at probe time (bsc#1209927).</li>
<li>virt/coco/sev-guest: Convert the sw_exit_info_2 checking to a switch-case (bsc#1209927).</li>
<li>virt/coco/sev-guest: Do some code style cleanups (bsc#1209927).</li>
<li>virt/coco/sev-guest: Remove the disable_vmpck label in handle_guest_request() (bsc#1209927).</li>
<li>virt/coco/sev-guest: Simplify extended guest request handling (bsc#1209927).</li>
<li>virt/sev-guest: Return -EIO if certificate buffer is not large enough (bsc#1209927).</li>
<li>virtio_ring: do not update event idx on get_buf (git-fixes).</li>
<li>vmci_host: fix a race condition in vmci_host_poll() causing GPF (git-fixes).</li>
<li>vmxnet3: use gro callback when UPT is enabled (bsc#1209739).</li>
<li>wifi: ath5k: fix an off by one check in ath5k_eeprom_read_freq_list() (git-fixes).</li>
<li>wifi: ath6kl: minor fix for allocation size (git-fixes).</li>
<li>wifi: ath6kl: reduce WARN to dev_dbg() in callback (git-fixes).</li>
<li>wifi: ath9k: hif_usb: fix memory leak of remain_skbs (git-fixes).</li>
<li>wifi: brcmfmac: slab-out-of-bounds read in brcmf_get_assoc_ies() (git-fixes).</li>
<li>wifi: brcmfmac: support CQM RSSI notification with older firmware (git-fixes).</li>
<li>wifi: iwlwifi: debug: fix crash in __iwl_err() (git-fixes).</li>
<li>wifi: iwlwifi: fix duplicate entry in iwl_dev_info_table (git-fixes).</li>
<li>wifi: iwlwifi: fw: fix memory leak in debugfs (git-fixes).</li>
<li>wifi: iwlwifi: fw: move memset before early return (git-fixes).</li>
<li>wifi: iwlwifi: make the loop for card preparation effective (git-fixes).</li>
<li>wifi: iwlwifi: mvm: check firmware response size (git-fixes).</li>
<li>wifi: iwlwifi: mvm: do not set CHECKSUM_COMPLETE for unsupported protocols (git-fixes).</li>
<li>wifi: iwlwifi: mvm: fix mvmtxq->stopped handling (git-fixes).</li>
<li>wifi: iwlwifi: mvm: initialize seq variable (git-fixes).</li>
<li>wifi: iwlwifi: trans: do not trigger d3 interrupt twice (git-fixes).</li>
<li>wifi: iwlwifi: yoyo: Fix possible division by zero (git-fixes).</li>
<li>wifi: iwlwifi: yoyo: skip dump correctly on hw error (git-fixes).</li>
<li>wifi: mac80211: adjust scan cancel comment/check (git-fixes).</li>
<li>wifi: mt76: add missing locking to protect against concurrent rx/status calls (git-fixes).</li>
<li>wifi: mt76: fix 6GHz high channel not be scanned (git-fixes).</li>
<li>wifi: mt76: handle failure of vzalloc in mt7615_coredump_work (git-fixes).</li>
<li>wifi: mwifiex: mark OF related data as maybe unused (git-fixes).</li>
<li>wifi: rt2x00: Fix memory leak when handling surveys (git-fixes).</li>
<li>wifi: rtlwifi: fix incorrect error codes in rtl_debugfs_set_write_reg() (git-fixes).</li>
<li>wifi: rtlwifi: fix incorrect error codes in rtl_debugfs_set_write_rfreg() (git-fixes).</li>
<li>wifi: rtw88: mac: Return the original error from rtw_mac_power_switch() (git-fixes).</li>
<li>wifi: rtw88: mac: Return the original error from rtw_pwr_seq_parser() (git-fixes).</li>
<li>wifi: rtw89: fix potential race condition between napi_init and napi_enable (git-fixes).</li>
<li>writeback, cgroup: fix null-ptr-deref write in bdi_split_work_to_wbs (bsc#1210769).</li>
<li>x86/MCE/AMD: Fix memory leak when threshold_create_bank() fails (git-fixes).</li>
<li>x86/PCI: Add quirk for AMD XHCI controller that loses MSI-X state in D3hot (git-fixes).</li>
<li>x86/bug: Prevent shadowing in __WARN_FLAGS (git-fixes).</li>
<li>x86/bugs: Enable STIBP for IBPB mitigated RETBleed (git-fixes).</li>
<li>x86/entry: Avoid very early RET (git-fixes).</li>
<li>x86/entry: Do not call error_entry() for XENPV (git-fixes).</li>
<li>x86/entry: Move CLD to the start of the idtentry macro (git-fixes).</li>
<li>x86/entry: Move PUSH_AND_CLEAR_REGS out of error_entry() (git-fixes).</li>
<li>x86/entry: Switch the stack after error_entry() returns (git-fixes).</li>
<li>x86/fpu: Prevent FPU state corruption (git-fixes).</li>
<li>x86/kvm: Preserve BSP MSR_KVM_POLL_CONTROL across suspend/resume (git-fixes).</li>
<li>x86/msi: Fix msi message data shadow struct (git-fixes).</li>
<li>x86/pci/xen: Disable PCI/MSI masking for XEN_HVM guests (git-fixes).</li>
<li>x86/traps: Use pt_regs directly in fixup_bad_iret() (git-fixes).</li>
<li>x86/tsx: Disable TSX development mode at boot (git-fixes).</li>
<li>x86: __memcpy_flushcache: fix wrong alignment if size > 2^32 (git-fixes).</li>
<li>xhci: fix debugfs register accesses while suspended (git-fixes).</li>
</ul>

    
        <h2>Special Instructions and Notes:</h2>
        <ul>
            
            
                <li>Please reboot the system after installing this update.</li>
            
            
        </ul>
    

    <h2>Patch Instructions:</h2>
    <p>
        To install this SUSE Important update use the SUSE recommended
        installation methods like YaST online_update or "zypper patch".<br/>

        Alternatively you can run the command listed for your product:
    </p>
    <ul class="list-group">
        
            <li class="list-group-item">
                openSUSE Leap Micro 5.3
                
                    
                        <br/>
                        <code>zypper in -t patch openSUSE-Leap-Micro-5.3-2023-2231=1</code>
                    
                    
                
            </li>
        
            <li class="list-group-item">
                openSUSE Leap 15.4
                
                    
                        <br/>
                        <code>zypper in -t patch openSUSE-SLE-15.4-2023-2231=1</code>
                    
                    
                
            </li>
        
            <li class="list-group-item">
                SUSE Linux Enterprise Micro for Rancher 5.3
                
                    
                        <br/>
                        <code>zypper in -t patch SUSE-SLE-Micro-5.3-2023-2231=1</code>
                    
                    
                
            </li>
        
            <li class="list-group-item">
                SUSE Linux Enterprise Micro 5.3
                
                    
                        <br/>
                        <code>zypper in -t patch SUSE-SLE-Micro-5.3-2023-2231=1</code>
                    
                    
                
            </li>
        
            <li class="list-group-item">
                SUSE Linux Enterprise Micro for Rancher 5.4
                
                    
                        <br/>
                        <code>zypper in -t patch SUSE-SLE-Micro-5.4-2023-2231=1</code>
                    
                    
                
            </li>
        
            <li class="list-group-item">
                SUSE Linux Enterprise Micro 5.4
                
                    
                        <br/>
                        <code>zypper in -t patch SUSE-SLE-Micro-5.4-2023-2231=1</code>
                    
                    
                
            </li>
        
            <li class="list-group-item">
                SUSE Linux Enterprise Live Patching 15-SP4
                
                    
                        <br/>
                        <code>zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2023-2231=1</code>
                    
                    
                
            </li>
        
            <li class="list-group-item">
                SUSE Real Time Module 15-SP4
                
                    
                        <br/>
                        <code>zypper in -t patch SUSE-SLE-Module-RT-15-SP4-2023-2231=1</code>
                    
                    
                
            </li>
        
    </ul>

    <h2>Package List:</h2>
    <ul>
        
            
                <li>
                    openSUSE Leap Micro 5.3 (nosrc x86_64)
                    <ul>
                        
                            <li>kernel-rt-5.14.21-150400.15.28.2</li>
                        
                    </ul>
                </li>
            
                <li>
                    openSUSE Leap Micro 5.3 (x86_64)
                    <ul>
                        
                            <li>kernel-rt-debuginfo-5.14.21-150400.15.28.2</li>
                        
                            <li>kernel-rt-debugsource-5.14.21-150400.15.28.2</li>
                        
                    </ul>
                </li>
            
        
            
                <li>
                    openSUSE Leap 15.4 (x86_64)
                    <ul>
                        
                            <li>ocfs2-kmp-rt-debuginfo-5.14.21-150400.15.28.2</li>
                        
                            <li>kernel-rt-debugsource-5.14.21-150400.15.28.2</li>
                        
                            <li>dlm-kmp-rt-5.14.21-150400.15.28.2</li>
                        
                            <li>kernel-rt_debug-debugsource-5.14.21-150400.15.28.2</li>
                        
                            <li>kernel-rt_debug-devel-5.14.21-150400.15.28.2</li>
                        
                            <li>kernel-rt_debug-devel-debuginfo-5.14.21-150400.15.28.2</li>
                        
                            <li>cluster-md-kmp-rt-5.14.21-150400.15.28.2</li>
                        
                            <li>gfs2-kmp-rt-debuginfo-5.14.21-150400.15.28.2</li>
                        
                            <li>gfs2-kmp-rt-5.14.21-150400.15.28.2</li>
                        
                            <li>ocfs2-kmp-rt-5.14.21-150400.15.28.2</li>
                        
                            <li>kernel-rt-debuginfo-5.14.21-150400.15.28.2</li>
                        
                            <li>dlm-kmp-rt-debuginfo-5.14.21-150400.15.28.2</li>
                        
                            <li>kernel-rt-devel-5.14.21-150400.15.28.2</li>
                        
                            <li>cluster-md-kmp-rt-debuginfo-5.14.21-150400.15.28.2</li>
                        
                            <li>kernel-syms-rt-5.14.21-150400.15.28.1</li>
                        
                            <li>kernel-rt-devel-debuginfo-5.14.21-150400.15.28.2</li>
                        
                            <li>kernel-rt_debug-debuginfo-5.14.21-150400.15.28.2</li>
                        
                    </ul>
                </li>
            
                <li>
                    openSUSE Leap 15.4 (noarch)
                    <ul>
                        
                            <li>kernel-source-rt-5.14.21-150400.15.28.1</li>
                        
                            <li>kernel-devel-rt-5.14.21-150400.15.28.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    openSUSE Leap 15.4 (nosrc x86_64)
                    <ul>
                        
                            <li>kernel-rt_debug-5.14.21-150400.15.28.2</li>
                        
                            <li>kernel-rt-5.14.21-150400.15.28.2</li>
                        
                    </ul>
                </li>
            
        
            
                <li>
                    SUSE Linux Enterprise Micro for Rancher 5.3 (nosrc x86_64)
                    <ul>
                        
                            <li>kernel-rt-5.14.21-150400.15.28.2</li>
                        
                    </ul>
                </li>
            
                <li>
                    SUSE Linux Enterprise Micro for Rancher 5.3 (x86_64)
                    <ul>
                        
                            <li>kernel-rt-debuginfo-5.14.21-150400.15.28.2</li>
                        
                            <li>kernel-rt-debugsource-5.14.21-150400.15.28.2</li>
                        
                    </ul>
                </li>
            
        
            
                <li>
                    SUSE Linux Enterprise Micro 5.3 (nosrc x86_64)
                    <ul>
                        
                            <li>kernel-rt-5.14.21-150400.15.28.2</li>
                        
                    </ul>
                </li>
            
                <li>
                    SUSE Linux Enterprise Micro 5.3 (x86_64)
                    <ul>
                        
                            <li>kernel-rt-debuginfo-5.14.21-150400.15.28.2</li>
                        
                            <li>kernel-rt-debugsource-5.14.21-150400.15.28.2</li>
                        
                    </ul>
                </li>
            
        
            
                <li>
                    SUSE Linux Enterprise Micro for Rancher 5.4 (nosrc x86_64)
                    <ul>
                        
                            <li>kernel-rt-5.14.21-150400.15.28.2</li>
                        
                    </ul>
                </li>
            
                <li>
                    SUSE Linux Enterprise Micro for Rancher 5.4 (x86_64)
                    <ul>
                        
                            <li>kernel-rt-debuginfo-5.14.21-150400.15.28.2</li>
                        
                            <li>kernel-rt-debugsource-5.14.21-150400.15.28.2</li>
                        
                    </ul>
                </li>
            
        
            
                <li>
                    SUSE Linux Enterprise Micro 5.4 (nosrc x86_64)
                    <ul>
                        
                            <li>kernel-rt-5.14.21-150400.15.28.2</li>
                        
                    </ul>
                </li>
            
                <li>
                    SUSE Linux Enterprise Micro 5.4 (x86_64)
                    <ul>
                        
                            <li>kernel-rt-debuginfo-5.14.21-150400.15.28.2</li>
                        
                            <li>kernel-rt-debugsource-5.14.21-150400.15.28.2</li>
                        
                    </ul>
                </li>
            
        
            
                <li>
                    SUSE Linux Enterprise Live Patching 15-SP4 (x86_64)
                    <ul>
                        
                            <li>kernel-livepatch-SLE15-SP4-RT_Update_7-debugsource-1-150400.1.5.2</li>
                        
                            <li>kernel-livepatch-5_14_21-150400_15_28-rt-debuginfo-1-150400.1.5.2</li>
                        
                            <li>kernel-livepatch-5_14_21-150400_15_28-rt-1-150400.1.5.2</li>
                        
                    </ul>
                </li>
            
        
            
                <li>
                    SUSE Real Time Module 15-SP4 (x86_64)
                    <ul>
                        
                            <li>ocfs2-kmp-rt-debuginfo-5.14.21-150400.15.28.2</li>
                        
                            <li>kernel-rt-debugsource-5.14.21-150400.15.28.2</li>
                        
                            <li>dlm-kmp-rt-5.14.21-150400.15.28.2</li>
                        
                            <li>kernel-rt_debug-debugsource-5.14.21-150400.15.28.2</li>
                        
                            <li>kernel-rt_debug-devel-5.14.21-150400.15.28.2</li>
                        
                            <li>kernel-rt_debug-devel-debuginfo-5.14.21-150400.15.28.2</li>
                        
                            <li>cluster-md-kmp-rt-5.14.21-150400.15.28.2</li>
                        
                            <li>gfs2-kmp-rt-debuginfo-5.14.21-150400.15.28.2</li>
                        
                            <li>gfs2-kmp-rt-5.14.21-150400.15.28.2</li>
                        
                            <li>ocfs2-kmp-rt-5.14.21-150400.15.28.2</li>
                        
                            <li>kernel-rt-debuginfo-5.14.21-150400.15.28.2</li>
                        
                            <li>dlm-kmp-rt-debuginfo-5.14.21-150400.15.28.2</li>
                        
                            <li>kernel-rt-devel-5.14.21-150400.15.28.2</li>
                        
                            <li>cluster-md-kmp-rt-debuginfo-5.14.21-150400.15.28.2</li>
                        
                            <li>kernel-syms-rt-5.14.21-150400.15.28.1</li>
                        
                            <li>kernel-rt-devel-debuginfo-5.14.21-150400.15.28.2</li>
                        
                            <li>kernel-rt_debug-debuginfo-5.14.21-150400.15.28.2</li>
                        
                    </ul>
                </li>
            
                <li>
                    SUSE Real Time Module 15-SP4 (noarch)
                    <ul>
                        
                            <li>kernel-source-rt-5.14.21-150400.15.28.1</li>
                        
                            <li>kernel-devel-rt-5.14.21-150400.15.28.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    SUSE Real Time Module 15-SP4 (nosrc x86_64)
                    <ul>
                        
                            <li>kernel-rt_debug-5.14.21-150400.15.28.2</li>
                        
                            <li>kernel-rt-5.14.21-150400.15.28.2</li>
                        
                    </ul>
                </li>
            
        
    </ul>

    
        <h2>References:</h2>
        <ul>
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2022-2196.html">https://www.suse.com/security/cve/CVE-2022-2196.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-0386.html">https://www.suse.com/security/cve/CVE-2023-0386.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-1670.html">https://www.suse.com/security/cve/CVE-2023-1670.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-1855.html">https://www.suse.com/security/cve/CVE-2023-1855.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-1989.html">https://www.suse.com/security/cve/CVE-2023-1989.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-1990.html">https://www.suse.com/security/cve/CVE-2023-1990.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-1998.html">https://www.suse.com/security/cve/CVE-2023-1998.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-2008.html">https://www.suse.com/security/cve/CVE-2023-2008.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-2019.html">https://www.suse.com/security/cve/CVE-2023-2019.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-2176.html">https://www.suse.com/security/cve/CVE-2023-2176.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-2235.html">https://www.suse.com/security/cve/CVE-2023-2235.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-23006.html">https://www.suse.com/security/cve/CVE-2023-23006.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2023-30772.html">https://www.suse.com/security/cve/CVE-2023-30772.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1142685">https://bugzilla.suse.com/show_bug.cgi?id=1142685</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1155798">https://bugzilla.suse.com/show_bug.cgi?id=1155798</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1174777">https://bugzilla.suse.com/show_bug.cgi?id=1174777</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1189999">https://bugzilla.suse.com/show_bug.cgi?id=1189999</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1194869">https://bugzilla.suse.com/show_bug.cgi?id=1194869</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1203039">https://bugzilla.suse.com/show_bug.cgi?id=1203039</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1203325">https://bugzilla.suse.com/show_bug.cgi?id=1203325</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1206649">https://bugzilla.suse.com/show_bug.cgi?id=1206649</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1206891">https://bugzilla.suse.com/show_bug.cgi?id=1206891</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1206992">https://bugzilla.suse.com/show_bug.cgi?id=1206992</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1207088">https://bugzilla.suse.com/show_bug.cgi?id=1207088</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1208076">https://bugzilla.suse.com/show_bug.cgi?id=1208076</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1208845">https://bugzilla.suse.com/show_bug.cgi?id=1208845</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1209615">https://bugzilla.suse.com/show_bug.cgi?id=1209615</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1209693">https://bugzilla.suse.com/show_bug.cgi?id=1209693</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1209739">https://bugzilla.suse.com/show_bug.cgi?id=1209739</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1209871">https://bugzilla.suse.com/show_bug.cgi?id=1209871</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1209927">https://bugzilla.suse.com/show_bug.cgi?id=1209927</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1209999">https://bugzilla.suse.com/show_bug.cgi?id=1209999</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1210034">https://bugzilla.suse.com/show_bug.cgi?id=1210034</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1210158">https://bugzilla.suse.com/show_bug.cgi?id=1210158</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1210202">https://bugzilla.suse.com/show_bug.cgi?id=1210202</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1210206">https://bugzilla.suse.com/show_bug.cgi?id=1210206</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1210301">https://bugzilla.suse.com/show_bug.cgi?id=1210301</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1210329">https://bugzilla.suse.com/show_bug.cgi?id=1210329</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1210336">https://bugzilla.suse.com/show_bug.cgi?id=1210336</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1210337">https://bugzilla.suse.com/show_bug.cgi?id=1210337</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1210439">https://bugzilla.suse.com/show_bug.cgi?id=1210439</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1210453">https://bugzilla.suse.com/show_bug.cgi?id=1210453</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1210454">https://bugzilla.suse.com/show_bug.cgi?id=1210454</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1210469">https://bugzilla.suse.com/show_bug.cgi?id=1210469</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1210506">https://bugzilla.suse.com/show_bug.cgi?id=1210506</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1210629">https://bugzilla.suse.com/show_bug.cgi?id=1210629</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1210725">https://bugzilla.suse.com/show_bug.cgi?id=1210725</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1210762">https://bugzilla.suse.com/show_bug.cgi?id=1210762</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1210763">https://bugzilla.suse.com/show_bug.cgi?id=1210763</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1210764">https://bugzilla.suse.com/show_bug.cgi?id=1210764</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1210765">https://bugzilla.suse.com/show_bug.cgi?id=1210765</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1210766">https://bugzilla.suse.com/show_bug.cgi?id=1210766</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1210767">https://bugzilla.suse.com/show_bug.cgi?id=1210767</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1210768">https://bugzilla.suse.com/show_bug.cgi?id=1210768</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1210769">https://bugzilla.suse.com/show_bug.cgi?id=1210769</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1210770">https://bugzilla.suse.com/show_bug.cgi?id=1210770</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1210771">https://bugzilla.suse.com/show_bug.cgi?id=1210771</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1210793">https://bugzilla.suse.com/show_bug.cgi?id=1210793</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1210816">https://bugzilla.suse.com/show_bug.cgi?id=1210816</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1210817">https://bugzilla.suse.com/show_bug.cgi?id=1210817</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1210827">https://bugzilla.suse.com/show_bug.cgi?id=1210827</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1210943">https://bugzilla.suse.com/show_bug.cgi?id=1210943</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1210953">https://bugzilla.suse.com/show_bug.cgi?id=1210953</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1210986">https://bugzilla.suse.com/show_bug.cgi?id=1210986</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1211025">https://bugzilla.suse.com/show_bug.cgi?id=1211025</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://jira.suse.com/browse/PED-3750">https://jira.suse.com/browse/PED-3750</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://jira.suse.com/browse/PED-3759">https://jira.suse.com/browse/PED-3759</a>
                    </li>
                
            
        </ul>
    
</div>