<div class="container">
<h1>Security update for the Linux Kernel</h1>
<table class="table table-striped table-bordered">
<tbody>
<tr>
<th>Announcement ID:</th>
<td>SUSE-SU-2023:4345-1</td>
</tr>
<tr>
<th>Rating:</th>
<td>important</td>
</tr>
<tr>
<th>References:</th>
<td>
<ul>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1208788">bsc#1208788</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1210778">bsc#1210778</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1211307">bsc#1211307</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1212423">bsc#1212423</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1212649">bsc#1212649</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1213705">bsc#1213705</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1214842">bsc#1214842</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1215095">bsc#1215095</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1215104">bsc#1215104</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1215518">bsc#1215518</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1215745">bsc#1215745</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1215768">bsc#1215768</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1215860">bsc#1215860</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1215955">bsc#1215955</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1215986">bsc#1215986</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1216046">bsc#1216046</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1216051">bsc#1216051</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1216062">bsc#1216062</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1216345">bsc#1216345</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1216510">bsc#1216510</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1216511">bsc#1216511</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1216512">bsc#1216512</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1216621">bsc#1216621</a>
</li>
</ul>
</td>
</tr>
<tr>
<th>
Cross-References:
</th>
<td>
<ul>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-2163.html">CVE-2023-2163</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-31085.html">CVE-2023-31085</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-34324.html">CVE-2023-34324</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-3777.html">CVE-2023-3777</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-39189.html">CVE-2023-39189</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-39193.html">CVE-2023-39193</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-45862.html">CVE-2023-45862</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-46813.html">CVE-2023-46813</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-5178.html">CVE-2023-5178</a>
</li>
</ul>
</td>
</tr>
<tr>
<th>CVSS scores:</th>
<td>
<ul class="list-group">
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-2163</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">7.1</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-2163</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">10.0</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-31085</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-31085</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-34324</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.7</span>
<span class="cvss-vector">CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-3777</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-3777</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-39189</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.4</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-39189</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.1</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-39193</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.1</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-39193</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">6.1</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-45862</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.4</span>
<span class="cvss-vector">CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-45862</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.5</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-46813</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">7.0</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-5178</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">7.2</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-5178</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">8.8</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
</ul>
</td>
</tr>
<tr>
<th>Affected Products:</th>
<td>
<ul class="list-group">
<li class="list-group-item">openSUSE Leap 15.4</li>
<li class="list-group-item">Public Cloud Module 15-SP4</li>
<li class="list-group-item">SUSE Linux Enterprise High Performance Computing 15 SP4</li>
<li class="list-group-item">SUSE Linux Enterprise Server 15 SP4</li>
<li class="list-group-item">SUSE Linux Enterprise Server for SAP Applications 15 SP4</li>
<li class="list-group-item">SUSE Manager Proxy 4.3</li>
<li class="list-group-item">SUSE Manager Retail Branch Server 4.3</li>
<li class="list-group-item">SUSE Manager Server 4.3</li>
</ul>
</td>
</tr>
</tbody>
</table>
<p>An update that solves nine vulnerabilities and has 14 security fixes can now be installed.</p>
<h2>Description:</h2>
<p>The SUSE Linux Enterprise 15 SP4 Azure kernel was updated to receive various security and bugfixes.</p>
<p>The following security bugs were fixed:</p>
<ul>
<li>CVE-2023-3777: Fixed a use-after-free vulnerability in netfilter: nf_tables component can be exploited to achieve local privilege escalation. (bsc#1215095)</li>
<li>CVE-2023-46813: Fixed an incorrect access checking in the VC handler and instruction emulation of the SEV-ES emulation of MMIO accesses that could lead to arbitrary write access to kernel memory. (bsc#1212649)</li>
<li>CVE-2023-31085: Fixed a divide-by-zero error in do_div(sz,mtd->erasesize) that could cause a local DoS. (bsc#1210778)</li>
<li>CVE-2023-45862: Fixed an issue in the ENE UB6250 reader driver whwere an object could potentially extend beyond the end of an allocation causing. (bsc#1216051)</li>
<li>CVE-2023-39193: Fixed an out of bounds read in the xtables subsystem (bsc#1215860).</li>
<li>CVE-2023-5178: Fixed an UAF in queue intialization setup. (bsc#1215768)</li>
<li>CVE-2023-2163: Fixed an incorrect verifier pruning in BPF that could lead to unsafe code paths being incorrectly marked as safe, resulting in arbitrary read/write in kernel memory, lateral privilege escalation, and container escape. (bsc#1215518)</li>
<li>CVE-2023-34324: Fixed a possible deadlock in Linux kernel event handling. (bsc#1215745).</li>
<li>CVE-2023-39189: Fixed a flaw in the Netfilter subsystem that could allow a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or information disclosure. (bsc#1216046)</li>
</ul>
<p>The following non-security bugs were fixed:</p>
<ul>
<li>9p: virtio: make sure 'offs' is initialized in zc_request (git-fixes).</li>
<li>ACPI: irq: Fix incorrect return value in acpi_register_gsi() (git-fixes).</li>
<li>ACPI: resource: Skip IRQ override on ASUS ExpertBook B1402CBA (git-fixes).</li>
<li>ALSA: hda: Disable power save for solving pop issue on Lenovo ThinkCentre M70q (git-fixes).</li>
<li>ALSA: hda/realtek: Change model for Intel RVP board (git-fixes).</li>
<li>ALSA: usb-audio: Fix microphone sound on Opencomm2 Headset (git-fixes).</li>
<li>ASoC: codecs: wcd938x-sdw: fix runtime PM imbalance on probe errors (git-fixes).</li>
<li>ASoC: codecs: wcd938x-sdw: fix use after free on driver unbind (git-fixes).</li>
<li>ASoC: codecs: wcd938x: drop bogus bind error handling (git-fixes).</li>
<li>ASoC: codecs: wcd938x: fix unbind tear down order (git-fixes).</li>
<li>ASoC: fsl: imx-pcm-rpmsg: Add SNDRV_PCM_INFO_BATCH flag (git-fixes).</li>
<li>ASoC: imx-rpmsg: Set ignore_pmdown_time for dai_link (git-fixes).</li>
<li>ASoC: pxa: fix a memory leak in probe() (git-fixes).</li>
<li>ata: libata-core: Do not register PM operations for SAS ports (git-fixes).</li>
<li>ata: libata-core: Fix ata_port_request_pm() locking (git-fixes).</li>
<li>ata: libata-core: Fix port and device removal (git-fixes).</li>
<li>ata: libata-sata: increase PMP SRST timeout to 10s (git-fixes).</li>
<li>ata: libata-scsi: ignore reserved bits for REPORT SUPPORTED OPERATION CODES (git-fixes).</li>
<li>blk-cgroup: Fix NULL deref caused by blkg_policy_data being installed before init (bsc#1216062).</li>
<li>blk-cgroup: support to track if policy is online (bsc#1216062).</li>
<li>Bluetooth: avoid memcmp() out of bounds warning (git-fixes).</li>
<li>Bluetooth: Avoid redundant authentication (git-fixes).</li>
<li>Bluetooth: btusb: add shutdown function for QCA6174 (git-fixes).</li>
<li>Bluetooth: Fix a refcnt underflow problem for hci_conn (git-fixes).</li>
<li>Bluetooth: hci_event: Fix coding style (git-fixes).</li>
<li>Bluetooth: hci_event: Fix using memcmp when comparing keys (git-fixes).</li>
<li>Bluetooth: hci_event: Ignore NULL link key (git-fixes).</li>
<li>Bluetooth: hci_sock: Correctly bounds check and pad HCI_MON_NEW_INDEX name (git-fixes).</li>
<li>Bluetooth: hci_sock: fix slab oob read in create_monitor_event (git-fixes).</li>
<li>Bluetooth: Reject connection with the device which has same BD_ADDR (git-fixes).</li>
<li>Bluetooth: vhci: Fix race when opening vhci device (git-fixes).</li>
<li>bpf: propagate precision in ALU/ALU64 operations (git-fixes).</li>
<li>bus: ti-sysc: Fix missing AM35xx SoC matching (git-fixes).</li>
<li>bus: ti-sysc: Use fsleep() instead of usleep_range() in sysc_reset() (git-fixes).</li>
<li>cgroup: Remove duplicates in cgroup v1 tasks file (bsc#1211307).</li>
<li>cgroup/cpuset: Change references of cpuset_mutex to cpuset_rwsem (bsc#1215955).</li>
<li>clk: tegra: fix error return case for recalc_rate (git-fixes).</li>
<li>counter: microchip-tcb-capture: Fix the use of internal GCLK logic (git-fixes).</li>
<li>crypto: qat - add fw_counters debugfs file (PED-6401).</li>
<li>crypto: qat - add heartbeat counters check (PED-6401).</li>
<li>crypto: qat - add heartbeat feature (PED-6401).</li>
<li>crypto: qat - add internal timer for qat 4xxx (PED-6401).</li>
<li>crypto: qat - add measure clock frequency (PED-6401).</li>
<li>crypto: qat - add missing function declaration in adf_dbgfs.h (PED-6401).</li>
<li>crypto: qat - add qat_zlib_deflate (PED-6401).</li>
<li>crypto: qat - add support for 402xx devices (PED-6401).</li>
<li>crypto: qat - change value of default idle filter (PED-6401).</li>
<li>crypto: qat - delay sysfs initialization (PED-6401).</li>
<li>crypto: qat - do not export adf_init_admin_pm() (PED-6401).</li>
<li>crypto: qat - drop log level of msg in get_instance_node() (PED-6401).</li>
<li>crypto: qat - drop obsolete heartbeat interface (PED-6401).</li>
<li>crypto: qat - drop redundant adf_enable_aer() (PED-6401).</li>
<li>crypto: qat - expose pm_idle_enabled through sysfs (PED-6401).</li>
<li>crypto: qat - extend buffer list logic interface (PED-6401).</li>
<li>crypto: qat - extend configuration for 4xxx (PED-6401).</li>
<li>crypto: qat - fix apply custom thread-service mapping for dc service (PED-6401).</li>
<li>crypto: qat - fix concurrency issue when device state changes (PED-6401).</li>
<li>crypto: qat - fix crypto capability detection for 4xxx (PED-6401).</li>
<li>crypto: qat - fix spelling mistakes from 'bufer' to 'buffer' (PED-6401).</li>
<li>crypto: qat - Include algapi.h for low-level Crypto API (PED-6401).</li>
<li>crypto: qat - make fw images name constant (PED-6401).</li>
<li>crypto: qat - make state machine functions static (PED-6401).</li>
<li>crypto: qat - move dbgfs init to separate file (PED-6401).</li>
<li>crypto: qat - move returns to default case (PED-6401).</li>
<li>crypto: qat - refactor device restart logic (PED-6401).</li>
<li>crypto: qat - refactor fw config logic for 4xxx (PED-6401).</li>
<li>crypto: qat - remove ADF_STATUS_PF_RUNNING flag from probe (PED-6401).</li>
<li>crypto: qat - Remove unused function declarations (PED-6401).</li>
<li>crypto: qat - replace state machine calls (PED-6401).</li>
<li>crypto: qat - replace the if statement with min() (PED-6401).</li>
<li>crypto: qat - set deprecated capabilities as reserved (PED-6401).</li>
<li>crypto: qat - unmap buffer before free for DH (PED-6401).</li>
<li>crypto: qat - unmap buffers before free for RSA (PED-6401).</li>
<li>crypto: qat - update slice mask for 4xxx devices (PED-6401).</li>
<li>crypto: qat - use kfree_sensitive instead of memset/kfree() (PED-6401).</li>
<li>dmaengine: idxd: use spin_lock_irqsave before wait_event_lock_irq (git-fixes).</li>
<li>dmaengine: mediatek: Fix deadlock caused by synchronize_irq() (git-fixes).</li>
<li>dmaengine: stm32-mdma: abort resume if no ongoing transfer (git-fixes).</li>
<li>Documentation: qat: change kernel version (PED-6401).</li>
<li>Documentation: qat: rewrite description (PED-6401).</li>
<li>Drivers: hv: vmbus: Call hv_synic_free() if hv_synic_alloc() fails (git-fixes).</li>
<li>Drivers: hv: vmbus: Fix vmbus_wait_for_unload() to scan present CPUs (git-fixes).</li>
<li>drm: panel-orientation-quirks: Add quirk for One Mix 2S (git-fixes).</li>
<li>drm/amd/display: Do not check registers, if using AUX BL control (git-fixes).</li>
<li>drm/amd/display: Do not set dpms_off for seamless boot (git-fixes).</li>
<li>drm/amdgpu: add missing NULL check (git-fixes).</li>
<li>drm/amdgpu: Handle null atom context in VBIOS info ioctl (git-fixes).</li>
<li>drm/i915: Retry gtt fault when out of fence registers (git-fixes).</li>
<li>drm/msm/dp: do not reinitialize phy unless retry during link training (git-fixes).</li>
<li>drm/msm/dpu: change _dpu_plane_calc_bw() to use u64 to avoid overflow (git-fixes).</li>
<li>drm/msm/dsi: fix irq_of_parse_and_map() error checking (git-fixes).</li>
<li>drm/msm/dsi: skip the wait for video mode done if not applicable (git-fixes).</li>
<li>drm/vmwgfx: fix typo of sizeof argument (git-fixes).</li>
<li>firmware: arm_ffa: Do not set the memory region attributes for MEM_LEND (git-fixes).</li>
<li>firmware: imx-dsp: Fix an error handling path in imx_dsp_setup_channels() (git-fixes).</li>
<li>gpio: aspeed: fix the GPIO number passed to pinctrl_gpio_set_config() (git-fixes).</li>
<li>gpio: pmic-eic-sprd: Add can_sleep flag for PMIC EIC chip (git-fixes).</li>
<li>gpio: pxa: disable pinctrl calls for MMP_GPIO (git-fixes).</li>
<li>gpio: tb10x: Fix an error handling path in tb10x_gpio_probe() (git-fixes).</li>
<li>gpio: timberdale: Fix potential deadlock on &tgpio->lock (git-fixes).</li>
<li>gpio: vf610: set value before the direction to avoid a glitch (git-fixes).</li>
<li>gve: Do not fully free QPL pages on prefill errors (git-fixes).</li>
<li>HID: holtek: fix slab-out-of-bounds Write in holtek_kbd_input_event (git-fixes).</li>
<li>HID: intel-ish-hid: ipc: Disable and reenable ACPI GPE bit (git-fixes).</li>
<li>HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect (git-fixes).</li>
<li>HID: multitouch: Add required quirk for Synaptics 0xcd7e device (git-fixes).</li>
<li>HID: sony: Fix a potential memory leak in sony_probe() (git-fixes).</li>
<li>HID: sony: remove duplicate NULL check before calling usb_free_urb() (git-fixes).</li>
<li>i2c: i801: unregister tco_pdev in i801_probe() error path (git-fixes).</li>
<li>i2c: mux: Avoid potential false error message in i2c_mux_add_adapter (git-fixes).</li>
<li>i2c: mux: demux-pinctrl: check the return value of devm_kstrdup() (git-fixes).</li>
<li>i2c: mux: gpio: Add missing fwnode_handle_put() (git-fixes).</li>
<li>i2c: mux: gpio:Â Replace custom acpi_get_local_address() (git-fixes).</li>
<li>i2c: npcm7xx: Fix callback completion ordering (git-fixes).</li>
<li>IB/mlx4: Fix the size of a buffer in add_port_entries() (git-fixes)</li>
<li>ieee802154: ca8210: Fix a potential UAF in ca8210_probe (git-fixes).</li>
<li>iio: pressure: bmp280: Fix NULL pointer exception (git-fixes).</li>
<li>iio: pressure: dps310: Adjust Timeout Settings (git-fixes).</li>
<li>iio: pressure: ms5611: ms5611_prom_is_valid false negative bug (git-fixes).</li>
<li>Input: goodix - ensure int GPIO is in input for gpio_count == 1 && gpio_int_idx == 0 case (git-fixes).</li>
<li>Input: powermate - fix use-after-free in powermate_config_complete (git-fixes).</li>
<li>Input: psmouse - fix fast_reconnect function for PS/2 mode (git-fixes).</li>
<li>Input: xpad - add PXN V900 support (git-fixes).</li>
<li>iommu/amd: Add map/unmap_pages() iommu_domain_ops callback support (bsc#1212423).</li>
<li>iommu/amd/io-pgtable: Implement map_pages io_pgtable_ops callback (bsc#1212423).</li>
<li>iommu/amd/io-pgtable: Implement unmap_pages io_pgtable_ops callback (bsc#1212423).</li>
<li>kabi: blkcg_policy_data fix KABI (bsc#1216062).</li>
<li>kabi: workaround for enum nft_trans_phase (bsc#1215104).</li>
<li>kprobes: Prohibit probing on CFI preamble symbol (git-fixes).</li>
<li>KVM: s390: fix gisa destroy operation might lead to cpu stalls (git-fixes bsc#1216512).</li>
<li>KVM: SVM: Do not kill SEV guest if SMAP erratum triggers in usermode (git-fixes).</li>
<li>KVM: x86/mmu: Reconstruct shadow page root if the guest PDPTEs is changed (git-fixes).</li>
<li>leds: Drop BUG_ON check for LED_COLOR_ID_MULTI (git-fixes).</li>
<li>mm, memcg: reconsider kmem.limit_in_bytes deprecation (bsc#1208788 bsc#1213705).</li>
<li>mmc: core: Capture correct oemid-bits for eMMC cards (git-fixes).</li>
<li>mmc: core: sdio: hold retuning if sdio in 1-bit mode (git-fixes).</li>
<li>mmc: mtk-sd: Use readl_poll_timeout_atomic in msdc_reset_hw (git-fixes).</li>
<li>mtd: physmap-core: Restore map_rom fallback (git-fixes).</li>
<li>mtd: rawnand: arasan: Ensure program page operations are successful (git-fixes).</li>
<li>mtd: rawnand: marvell: Ensure program page operations are successful (git-fixes).</li>
<li>mtd: rawnand: pl353: Ensure program page operations are successful (git-fixes).</li>
<li>mtd: rawnand: qcom: Unmap the right resource upon probe failure (git-fixes).</li>
<li>mtd: spinand: micron: correct bitmask for ecc status (git-fixes).</li>
<li>net: mana: Fix oversized sge0 for GSO packets (bsc#1215986).</li>
<li>net: mana: Fix TX CQE error handling (bsc#1215986).</li>
<li>net: nfc: llcp: Add lock when modifying device list (git-fixes).</li>
<li>net: rfkill: gpio: prevent value glitch during probe (git-fixes).</li>
<li>net: sched: add barrier to fix packet stuck problem for lockless qdisc (bsc#1216345).</li>
<li>net: sched: fixed barrier to prevent skbuff sticking in qdisc backlog (bsc#1216345).</li>
<li>net: usb: dm9601: fix uninitialized variable use in dm9601_mdio_read (git-fixes).</li>
<li>net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg (git-fixes).</li>
<li>net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg (git-fixes).</li>
<li>net: usb: smsc95xx: Fix an error code in smsc95xx_reset() (git-fixes).</li>
<li>net/sched: fix netdevice reference leaks in attach_default_qdiscs() (git-fixes).</li>
<li>netfilter: nf_tables: add NFT_TRANS_PREPARE_ERROR to deal with bound set/chain (git-fixes).</li>
<li>netfilter: nf_tables: unbind non-anonymous set if rule construction fails (git-fixes).</li>
<li>nfc: nci: assert requested protocol is valid (git-fixes).</li>
<li>nfc: nci: fix possible NULL pointer dereference in send_acknowledge() (git-fixes).</li>
<li>nilfs2: fix potential use after free in nilfs_gccache_submit_read_data() (git-fixes).</li>
<li>nvme-fc: Prevent null pointer dereference in nvme_fc_io_getuuid() (bsc#1214842).</li>
<li>phy: mapphone-mdm6600: Fix pinctrl_pm handling for sleep pins (git-fixes).</li>
<li>phy: mapphone-mdm6600: Fix runtime disable on probe (git-fixes).</li>
<li>phy: mapphone-mdm6600: Fix runtime PM for remove (git-fixes).</li>
<li>pinctrl: avoid unsafe code pattern in find_pinctrl() (git-fixes).</li>
<li>pinctrl: renesas: rzn1: Enable missing PINMUX (git-fixes).</li>
<li>platform/surface: platform_profile: Propagate error if profile registration fails (git-fixes).</li>
<li>platform/x86: asus-wmi: Change ASUS_WMI_BRN_DOWN code from 0x20 to 0x2e (git-fixes).</li>
<li>platform/x86: asus-wmi: Map 0x2a code, Ignore 0x2b and 0x2c events (git-fixes).</li>
<li>platform/x86: think-lmi: Fix reference leak (git-fixes).</li>
<li>platform/x86: touchscreen_dmi: Add info for the Positivo C4128B (git-fixes).</li>
<li>power: supply: ucs1002: fix error code in ucs1002_get_property() (git-fixes).</li>
<li>quota: Fix slow quotaoff (bsc#1216621).</li>
<li>r8152: check budget for r8152_poll() (git-fixes).</li>
<li>RDMA/cma: Fix truncation compilation warning in make_cma_ports (git-fixes)</li>
<li>RDMA/cma: Initialize ib_sa_multicast structure to 0 when join (git-fixes)</li>
<li>RDMA/core: Require admin capabilities to set system parameters (git-fixes)</li>
<li>RDMA/cxgb4: Check skb value for failure to allocate (git-fixes)</li>
<li>RDMA/mlx5: Fix NULL string error (git-fixes)</li>
<li>RDMA/siw: Fix connection failure handling (git-fixes)</li>
<li>RDMA/srp: Do not call scsi_done() from srp_abort() (git-fixes)</li>
<li>RDMA/uverbs: Fix typo of sizeof argument (git-fixes)</li>
<li>regmap: fix NULL deref on lookup (git-fixes).</li>
<li>regmap: rbtree: Fix wrong register marked as in-cache when creating new node (git-fixes).</li>
<li>ring-buffer: Avoid softlockup in ring_buffer_resize() (git-fixes).</li>
<li>ring-buffer: Do not attempt to read past "commit" (git-fixes).</li>
<li>ring-buffer: Fix bytes info in per_cpu buffer stats (git-fixes).</li>
<li>ring-buffer: Update "shortest_full" in polling (git-fixes).</li>
<li>s390/cio: fix a memleak in css_alloc_subchannel (git-fixes bsc#1216510).</li>
<li>s390/pci: fix iommu bitmap allocation (git-fixes bsc#1216511).</li>
<li>sched/cpuset: Bring back cpuset_mutex (bsc#1215955).</li>
<li>sched/deadline,rt: Remove unused parameter from pick_next_[rt|dl]_entity() (git fixes (sched)).</li>
<li>sched/rt: Fix live lock between select_fallback_rq() and RT push (git fixes (sched)).</li>
<li>sched/rt: Fix sysctl_sched_rr_timeslice intial value (git fixes (sched)).</li>
<li>serial: 8250_port: Check IRQ data before use (git-fixes).</li>
<li>soc: imx8m: Enable OCOTP clock for imx8mm before reading registers (git-fixes).</li>
<li>spi: nxp-fspi: reset the FLSHxCR1 registers (git-fixes).</li>
<li>spi: stm32: add a delay before SPI disable (git-fixes).</li>
<li>spi: sun6i: fix race between DMA RX transfer completion and RX FIFO drain (git-fixes).</li>
<li>spi: sun6i: reduce DMA RX transfer width to single byte (git-fixes).</li>
<li>thunderbolt: Check that lane 1 is in CL0 before enabling lane bonding (git-fixes).</li>
<li>thunderbolt: Workaround an IOMMU fault on certain systems with Intel Maple Ridge (git-fixes).</li>
<li>tracing: Have current_trace inc the trace array ref count (git-fixes).</li>
<li>tracing: Have event inject files inc the trace array ref count (git-fixes).</li>
<li>tracing: Have option files inc the trace array ref count (git-fixes).</li>
<li>tracing: Have tracing_max_latency inc the trace array ref count (git-fixes).</li>
<li>tracing: Increase trace array ref count on enable and filter files (git-fixes).</li>
<li>tracing: Make trace_marker{,_raw} stream-like (git-fixes).</li>
<li>usb: cdnsp: Fixes issue with dequeuing not queued requests (git-fixes).</li>
<li>usb: dwc3: Soft reset phy on probe for host (git-fixes).</li>
<li>usb: gadget: ncm: Handle decoding of multiple NTB's in unwrap call (git-fixes).</li>
<li>usb: gadget: udc-xilinx: replace memcpy with memcpy_toio (git-fixes).</li>
<li>usb: musb: Get the musb_qh poniter after musb_giveback (git-fixes).</li>
<li>usb: musb: Modify the "HWVers" register address (git-fixes).</li>
<li>usb: serial: option: add entry for Sierra EM9191 with new firmware (git-fixes).</li>
<li>usb: serial: option: add Fibocom to DELL custom modem FM101R-GL (git-fixes).</li>
<li>usb: serial: option: add Telit LE910C4-WWX 0x1035 composition (git-fixes).</li>
<li>usb: typec: altmodes/displayport: Signal hpd low when exiting mode (git-fixes).</li>
<li>usb: xhci: xhci-ring: Use sysdev for mapping bounce buffer (git-fixes).</li>
<li>vmbus_testing: fix wrong python syntax for integer value comparison (git-fixes).</li>
<li>vringh: do not use vringh_kiov_advance() in vringh_iov_xfer() (git-fixes).</li>
<li>watchdog: iTCO_wdt: No need to stop the timer in probe (git-fixes).</li>
<li>watchdog: iTCO_wdt: Set NO_REBOOT if the watchdog is not already running (git-fixes).</li>
<li>wifi: cfg80211: avoid leaking stack data into trace (git-fixes).</li>
<li>wifi: cfg80211: Fix 6GHz scan configuration (git-fixes).</li>
<li>wifi: iwlwifi: dbg_ini: fix structure packing (git-fixes).</li>
<li>wifi: iwlwifi: Ensure ack flag is properly cleared (git-fixes).</li>
<li>wifi: iwlwifi: mvm: Fix a memory corruption issue (git-fixes).</li>
<li>wifi: mac80211: allow transmitting EAPOL frames with tainted key (git-fixes).</li>
<li>wifi: mt76: mt76x02: fix MT76x0 external LNA gain handling (git-fixes).</li>
<li>wifi: mwifiex: Fix oob check condition in mwifiex_process_rx_packet (git-fixes).</li>
<li>wifi: mwifiex: Fix tlv_buf_left calculation (git-fixes).</li>
<li>wifi: mwifiex: Sanity check tlv_len and tlv_bitmap_len (git-fixes).</li>
<li>x86/sev: Check for user-space IOIO pointing to kernel space (bsc#1212649).</li>
<li>x86/sev: Check IOBM for IOIO exceptions from user-space (bsc#1212649).</li>
<li>x86/sev: Disable MMIO emulation from user mode (bsc#1212649).</li>
<li>xen-netback: use default TX queue size for vifs (git-fixes).</li>
</ul>
<h2>Special Instructions and Notes:</h2>
<ul>
<li>Please reboot the system after installing this update.</li>
</ul>
<h2>Patch Instructions:</h2>
<p>
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".<br/>
Alternatively you can run the command listed for your product:
</p>
<ul class="list-group">
<li class="list-group-item">
openSUSE Leap 15.4
<br/>
<code>zypper in -t patch SUSE-2023-4345=1 openSUSE-SLE-15.4-2023-4345=1</code>
</li>
<li class="list-group-item">
Public Cloud Module 15-SP4
<br/>
<code>zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP4-2023-4345=1</code>
</li>
</ul>
<h2>Package List:</h2>
<ul>
<li>
openSUSE Leap 15.4 (aarch64 x86_64)
<ul>
<li>gfs2-kmp-azure-debuginfo-5.14.21-150400.14.72.1</li>
<li>kernel-azure-extra-5.14.21-150400.14.72.1</li>
<li>kernel-azure-extra-debuginfo-5.14.21-150400.14.72.1</li>
<li>kselftests-kmp-azure-5.14.21-150400.14.72.1</li>
<li>kernel-azure-debuginfo-5.14.21-150400.14.72.1</li>
<li>cluster-md-kmp-azure-debuginfo-5.14.21-150400.14.72.1</li>
<li>kernel-azure-devel-5.14.21-150400.14.72.1</li>
<li>reiserfs-kmp-azure-5.14.21-150400.14.72.1</li>
<li>kernel-azure-optional-debuginfo-5.14.21-150400.14.72.1</li>
<li>dlm-kmp-azure-5.14.21-150400.14.72.1</li>
<li>kernel-azure-livepatch-devel-5.14.21-150400.14.72.1</li>
<li>ocfs2-kmp-azure-5.14.21-150400.14.72.1</li>
<li>kernel-azure-optional-5.14.21-150400.14.72.1</li>
<li>dlm-kmp-azure-debuginfo-5.14.21-150400.14.72.1</li>
<li>ocfs2-kmp-azure-debuginfo-5.14.21-150400.14.72.1</li>
<li>kernel-azure-debugsource-5.14.21-150400.14.72.1</li>
<li>reiserfs-kmp-azure-debuginfo-5.14.21-150400.14.72.1</li>
<li>kselftests-kmp-azure-debuginfo-5.14.21-150400.14.72.1</li>
<li>cluster-md-kmp-azure-5.14.21-150400.14.72.1</li>
<li>kernel-syms-azure-5.14.21-150400.14.72.1</li>
<li>gfs2-kmp-azure-5.14.21-150400.14.72.1</li>
<li>kernel-azure-devel-debuginfo-5.14.21-150400.14.72.1</li>
</ul>
</li>
<li>
openSUSE Leap 15.4 (aarch64 nosrc x86_64)
<ul>
<li>kernel-azure-5.14.21-150400.14.72.1</li>
</ul>
</li>
<li>
openSUSE Leap 15.4 (noarch)
<ul>
<li>kernel-devel-azure-5.14.21-150400.14.72.1</li>
<li>kernel-source-azure-5.14.21-150400.14.72.1</li>
</ul>
</li>
<li>
Public Cloud Module 15-SP4 (aarch64 nosrc x86_64)
<ul>
<li>kernel-azure-5.14.21-150400.14.72.1</li>
</ul>
</li>
<li>
Public Cloud Module 15-SP4 (aarch64 x86_64)
<ul>
<li>kernel-syms-azure-5.14.21-150400.14.72.1</li>
<li>kernel-azure-devel-5.14.21-150400.14.72.1</li>
<li>kernel-azure-debugsource-5.14.21-150400.14.72.1</li>
<li>kernel-azure-debuginfo-5.14.21-150400.14.72.1</li>
<li>kernel-azure-devel-debuginfo-5.14.21-150400.14.72.1</li>
</ul>
</li>
<li>
Public Cloud Module 15-SP4 (noarch)
<ul>
<li>kernel-devel-azure-5.14.21-150400.14.72.1</li>
<li>kernel-source-azure-5.14.21-150400.14.72.1</li>
</ul>
</li>
</ul>
<h2>References:</h2>
<ul>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-2163.html">https://www.suse.com/security/cve/CVE-2023-2163.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-31085.html">https://www.suse.com/security/cve/CVE-2023-31085.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-34324.html">https://www.suse.com/security/cve/CVE-2023-34324.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-3777.html">https://www.suse.com/security/cve/CVE-2023-3777.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-39189.html">https://www.suse.com/security/cve/CVE-2023-39189.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-39193.html">https://www.suse.com/security/cve/CVE-2023-39193.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-45862.html">https://www.suse.com/security/cve/CVE-2023-45862.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-46813.html">https://www.suse.com/security/cve/CVE-2023-46813.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-5178.html">https://www.suse.com/security/cve/CVE-2023-5178.html</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1208788">https://bugzilla.suse.com/show_bug.cgi?id=1208788</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1210778">https://bugzilla.suse.com/show_bug.cgi?id=1210778</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1211307">https://bugzilla.suse.com/show_bug.cgi?id=1211307</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1212423">https://bugzilla.suse.com/show_bug.cgi?id=1212423</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1212649">https://bugzilla.suse.com/show_bug.cgi?id=1212649</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1213705">https://bugzilla.suse.com/show_bug.cgi?id=1213705</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1214842">https://bugzilla.suse.com/show_bug.cgi?id=1214842</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1215095">https://bugzilla.suse.com/show_bug.cgi?id=1215095</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1215104">https://bugzilla.suse.com/show_bug.cgi?id=1215104</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1215518">https://bugzilla.suse.com/show_bug.cgi?id=1215518</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1215745">https://bugzilla.suse.com/show_bug.cgi?id=1215745</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1215768">https://bugzilla.suse.com/show_bug.cgi?id=1215768</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1215860">https://bugzilla.suse.com/show_bug.cgi?id=1215860</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1215955">https://bugzilla.suse.com/show_bug.cgi?id=1215955</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1215986">https://bugzilla.suse.com/show_bug.cgi?id=1215986</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1216046">https://bugzilla.suse.com/show_bug.cgi?id=1216046</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1216051">https://bugzilla.suse.com/show_bug.cgi?id=1216051</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1216062">https://bugzilla.suse.com/show_bug.cgi?id=1216062</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1216345">https://bugzilla.suse.com/show_bug.cgi?id=1216345</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1216510">https://bugzilla.suse.com/show_bug.cgi?id=1216510</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1216511">https://bugzilla.suse.com/show_bug.cgi?id=1216511</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1216512">https://bugzilla.suse.com/show_bug.cgi?id=1216512</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1216621">https://bugzilla.suse.com/show_bug.cgi?id=1216621</a>
</li>
</ul>
</div>