<div class="container">
<h1>Security update for the Linux Kernel</h1>
<table class="table table-striped table-bordered">
<tbody>
<tr>
<th>Announcement ID:</th>
<td>SUSE-SU-2023:4414-1</td>
</tr>
<tr>
<th>Rating:</th>
<td>important</td>
</tr>
<tr>
<th>References:</th>
<td>
<ul>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1208788">bsc#1208788</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1211162">bsc#1211162</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1211307">bsc#1211307</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1212423">bsc#1212423</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1213705">bsc#1213705</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1213772">bsc#1213772</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1214754">bsc#1214754</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1214874">bsc#1214874</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1215104">bsc#1215104</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1215523">bsc#1215523</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1215545">bsc#1215545</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1215921">bsc#1215921</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1215955">bsc#1215955</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1215986">bsc#1215986</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1216062">bsc#1216062</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1216202">bsc#1216202</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1216322">bsc#1216322</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1216323">bsc#1216323</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1216324">bsc#1216324</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1216333">bsc#1216333</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1216345">bsc#1216345</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1216512">bsc#1216512</a>
</li>
</ul>
</td>
</tr>
<tr>
<th>
Cross-References:
</th>
<td>
<ul>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-2163.html">CVE-2023-2163</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-2860.html">CVE-2023-2860</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-31085.html">CVE-2023-31085</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-34324.html">CVE-2023-34324</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-3777.html">CVE-2023-3777</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-39189.html">CVE-2023-39189</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-39191.html">CVE-2023-39191</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-39193.html">CVE-2023-39193</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-45862.html">CVE-2023-45862</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-46813.html">CVE-2023-46813</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-5178.html">CVE-2023-5178</a>
</li>
</ul>
</td>
</tr>
<tr>
<th>CVSS scores:</th>
<td>
<ul class="list-group">
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-2163</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">7.1</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-2163</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">10.0</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-2860</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.4</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-2860</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">4.4</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-31085</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-31085</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.5</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-34324</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.7</span>
<span class="cvss-vector">CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-3777</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-3777</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.8</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-39189</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">4.4</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-39189</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">5.1</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-39191</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">8.2</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-39191</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">8.2</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-39193</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">5.1</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-39193</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">6.1</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-45862</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.4</span>
<span class="cvss-vector">CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-45862</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.5</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-46813</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">7.0</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-46813</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.0</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-5178</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">7.2</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2023-5178</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">8.8</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>
</ul>
</td>
</tr>
<tr>
<th>Affected Products:</th>
<td>
<ul class="list-group">
<li class="list-group-item">openSUSE Leap 15.5</li>
<li class="list-group-item">Public Cloud Module 15-SP5</li>
<li class="list-group-item">SUSE Linux Enterprise High Performance Computing 15 SP5</li>
<li class="list-group-item">SUSE Linux Enterprise Server 15 SP5</li>
<li class="list-group-item">SUSE Linux Enterprise Server for SAP Applications 15 SP5</li>
</ul>
</td>
</tr>
</tbody>
</table>
<p>An update that solves 11 vulnerabilities and has 11 security fixes can now be installed.</p>
<h2>Description:</h2>
<p>The SUSE Linux Enterprise 15 SP5 Azure kernel was updated to receive various security and bugfixes.</p>
<p>The following security bugs were fixed:</p>
<ul>
<li>CVE-2023-3777: Fixed a use-after-free vulnerability in netfilter: nf_tables component can be exploited to achieve local privilege escalation. (bsc#1215095)</li>
<li>CVE-2023-46813: Fixed a local privilege escalation with user-space programs that have access to MMIO regions (bsc#1212649).</li>
<li>CVE-2023-31085: Fixed a divide-by-zero error in do_div(sz,mtd->erasesize) that could cause a local DoS. (bsc#1210778)</li>
<li>CVE-2023-45862: Fixed an issue in the ENE UB6250 reader driver whwere an object could potentially extend beyond the end of an allocation causing. (bsc#1216051)</li>
<li>CVE-2023-39193: Fixed an out of bounds read in the xtables subsystem (bsc#1215860).</li>
<li>CVE-2023-5178: Fixed an UAF in queue intialization setup. (bsc#1215768)</li>
<li>CVE-2023-2163: Fixed an incorrect verifier pruning in BPF that could lead to unsafe code paths being incorrectly marked as safe, resulting in arbitrary read/write in kernel memory, lateral privilege escalation, and container escape. (bsc#1215518)</li>
<li>CVE-2023-34324: Fixed a possible deadlock in Linux kernel event handling. (bsc#1215745).</li>
<li>CVE-2023-39189: Fixed a flaw in the Netfilter subsystem that could allow a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or information disclosure. (bsc#1216046)</li>
<li>CVE-2023-39191: Fixed a lack of validation of dynamic pointers within user-supplied eBPF programs that may have allowed an attacker with CAP_BPF privileges to escalate privileges and execute arbitrary code. (bsc#1215863)</li>
<li>CVE-2023-2860: Fixed an out-of-bounds read vulnerability in the processing of seg6 attributes. This flaw allowed a privileged local user to disclose sensitive information. (bsc#1211592)</li>
</ul>
<p>The following non-security bugs were fixed:</p>
<ul>
<li>9p: virtio: make sure 'offs' is initialized in zc_request (git-fixes).</li>
<li>ACPI: irq: Fix incorrect return value in acpi_register_gsi() (git-fixes).</li>
<li>ACPI: resource: Skip IRQ override on ASUS ExpertBook B1402CBA (git-fixes).</li>
<li>ALSA: hda/realtek - ALC287 I2S speaker platform support (git-fixes).</li>
<li>ALSA: hda/realtek - ALC287 merge RTK codec with CS CS35L41 AMP (git-fixes).</li>
<li>ALSA: hda/realtek - Fixed ASUS platform headset Mic issue (git-fixes).</li>
<li>ALSA: hda/realtek - Fixed two speaker platform (git-fixes).</li>
<li>ALSA: hda/realtek: Add quirk for ASUS ROG GU603ZV (git-fixes).</li>
<li>ALSA: hda/realtek: Change model for Intel RVP board (git-fixes).</li>
<li>ALSA: hda/relatek: Enable Mute LED on HP Laptop 15s-fq5xxx (git-fixes).</li>
<li>ALSA: hda: Disable power save for solving pop issue on Lenovo ThinkCentre M70q (git-fixes).</li>
<li>ALSA: hda: intel-dsp-cfg: add LunarLake support (git-fixes).</li>
<li>ALSA: hda: intel-sdw-acpi: Use u8 type for link index (git-fixes).</li>
<li>ALSA: usb-audio: Fix microphone sound on Nexigo webcam (git-fixes).</li>
<li>ALSA: usb-audio: Fix microphone sound on Opencomm2 Headset (git-fixes).</li>
<li>ASoC: amd: yc: Fix non-functional mic on Lenovo 82YM (git-fixes).</li>
<li>ASoC: codecs: wcd938x-sdw: fix runtime PM imbalance on probe errors (git-fixes).</li>
<li>ASoC: codecs: wcd938x-sdw: fix use after free on driver unbind (git-fixes).</li>
<li>ASoC: codecs: wcd938x: drop bogus bind error handling (git-fixes).</li>
<li>ASoC: codecs: wcd938x: fix unbind tear down order (git-fixes).</li>
<li>ASoC: fsl: imx-pcm-rpmsg: Add SNDRV_PCM_INFO_BATCH flag (git-fixes).</li>
<li>ASoC: imx-rpmsg: Set ignore_pmdown_time for dai_link (git-fixes).</li>
<li>ASoC: pxa: fix a memory leak in probe() (git-fixes).</li>
<li>Bluetooth: Avoid redundant authentication (git-fixes).</li>
<li>Bluetooth: Fix a refcnt underflow problem for hci_conn (git-fixes).</li>
<li>Bluetooth: ISO: Fix handling of listen for unicast (git-fixes).</li>
<li>Bluetooth: Reject connection with the device which has same BD_ADDR (git-fixes).</li>
<li>Bluetooth: avoid memcmp() out of bounds warning (git-fixes).</li>
<li>Bluetooth: btusb: add shutdown function for QCA6174 (git-fixes).</li>
<li>Bluetooth: hci_codec: Fix leaking content of local_codecs (git-fixes).</li>
<li>Bluetooth: hci_event: Fix coding style (git-fixes).</li>
<li>Bluetooth: hci_event: Fix using memcmp when comparing keys (git-fixes).</li>
<li>Bluetooth: hci_event: Ignore NULL link key (git-fixes).</li>
<li>Bluetooth: hci_sock: Correctly bounds check and pad HCI_MON_NEW_INDEX name (git-fixes).</li>
<li>Bluetooth: hci_sock: fix slab oob read in create_monitor_event (git-fixes).</li>
<li>Bluetooth: vhci: Fix race when opening vhci device (git-fixes).</li>
<li>Documentation: qat: change kernel version (PED-6401).</li>
<li>Documentation: qat: rewrite description (PED-6401).</li>
<li>Drivers: hv: vmbus: Call hv_synic_free() if hv_synic_alloc() fails (git-fixes).</li>
<li>Drivers: hv: vmbus: Fix vmbus_wait_for_unload() to scan present CPUs (git-fixes).</li>
<li>Drop amdgpu patch causing spamming (bsc#1215523).</li>
<li>HID: holtek: fix slab-out-of-bounds Write in holtek_kbd_input_event (git-fixes).</li>
<li>HID: intel-ish-hid: ipc: Disable and reenable ACPI GPE bit (git-fixes).</li>
<li>HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect (git-fixes).</li>
<li>HID: multitouch: Add required quirk for Synaptics 0xcd7e device (git-fixes).</li>
<li>HID: sony: Fix a potential memory leak in sony_probe() (git-fixes).</li>
<li>HID: sony: remove duplicate NULL check before calling usb_free_urb() (git-fixes).</li>
<li>IB/mlx4: Fix the size of a buffer in add_port_entries() (git-fixes)</li>
<li>Input: goodix - ensure int GPIO is in input for gpio_count == 1 && gpio_int_idx == 0 case (git-fixes).</li>
<li>Input: powermate - fix use-after-free in powermate_config_complete (git-fixes).</li>
<li>Input: psmouse - fix fast_reconnect function for PS/2 mode (git-fixes).</li>
<li>Input: xpad - add PXN V900 support (git-fixes).</li>
<li>KVM: SVM: Do not kill SEV guest if SMAP erratum triggers in usermode (git-fixes).</li>
<li>KVM: SVM: INTERCEPT_RDTSCP is never intercepted anyway (git-fixes).</li>
<li>KVM: s390: fix gisa destroy operation might lead to cpu stalls (git-fixes bsc#1216512).</li>
<li>KVM: x86/mmu: Reconstruct shadow page root if the guest PDPTEs is changed (git-fixes).</li>
<li>KVM: x86: Fix clang -Wimplicit-fallthrough in do_host_cpuid() (git-fixes).</li>
<li>KVM: x86: Move open-coded CPUID leaf 0x80000021 EAX bit propagation code (bsc#1213772).</li>
<li>KVM: x86: Propagate the AMD Automatic IBRS feature to the guest (bsc#1213772).</li>
<li>KVM: x86: add support for CPUID leaf 0x80000021 (bsc#1213772).</li>
<li>KVM: x86: synthesize CPUID leaf 0x80000021h if useful (bsc#1213772).</li>
<li>KVM: x86: work around QEMU issue with synthetic CPUID leaves (git-fixes).</li>
<li>NFS: Fix O_DIRECT locking issues (bsc#1211162).</li>
<li>NFS: Fix a few more clear_bit() instances that need release semantics (bsc#1211162).</li>
<li>NFS: Fix a potential data corruption (bsc#1211162).</li>
<li>NFS: Fix a use after free in nfs_direct_join_group() (bsc#1211162).</li>
<li>NFS: Fix error handling for O_DIRECT write scheduling (bsc#1211162).</li>
<li>NFS: More O_DIRECT accounting fixes for error paths (bsc#1211162).</li>
<li>NFS: More fixes for nfs_direct_write_reschedule_io() (bsc#1211162).</li>
<li>NFS: Use the correct commit info in nfs_join_page_group() (bsc#1211162).</li>
<li>NFSD: Never call nfsd_file_gc() in foreground paths (bsc#1215545).</li>
<li>RDMA/cma: Fix truncation compilation warning in make_cma_ports (git-fixes)</li>
<li>RDMA/cma: Initialize ib_sa_multicast structure to 0 when join (git-fixes)</li>
<li>RDMA/core: Require admin capabilities to set system parameters (git-fixes)</li>
<li>RDMA/cxgb4: Check skb value for failure to allocate (git-fixes)</li>
<li>RDMA/mlx5: Fix NULL string error (git-fixes)</li>
<li>RDMA/mlx5: Fix mutex unlocking on error flow for steering anchor creation (git-fixes)</li>
<li>RDMA/siw: Fix connection failure handling (git-fixes)</li>
<li>RDMA/srp: Do not call scsi_done() from srp_abort() (git-fixes)</li>
<li>RDMA/uverbs: Fix typo of sizeof argument (git-fixes)</li>
<li>Revert "pinctrl: avoid unsafe code pattern in find_pinctrl()" (git-fixes).</li>
<li>Revert "tty: n_gsm: fix UAF in gsm_cleanup_mux" (git-fixes).</li>
<li>USB: serial: option: add Fibocom to DELL custom modem FM101R-GL (git-fixes).</li>
<li>USB: serial: option: add Telit LE910C4-WWX 0x1035 composition (git-fixes).</li>
<li>USB: serial: option: add entry for Sierra EM9191 with new firmware (git-fixes).</li>
<li>arm64/smmu: use TLBI ASID when invalidating entire range (bsc#1215921)</li>
<li>ata: libata-core: Do not register PM operations for SAS ports (git-fixes).</li>
<li>ata: libata-core: Fix ata_port_request_pm() locking (git-fixes).</li>
<li>ata: libata-core: Fix port and device removal (git-fixes).</li>
<li>ata: libata-sata: increase PMP SRST timeout to 10s (git-fixes).</li>
<li>ata: libata-scsi: ignore reserved bits for REPORT SUPPORTED OPERATION CODES (git-fixes).</li>
<li>blk-cgroup: Fix NULL deref caused by blkg_policy_data being installed before init (bsc#1216062).</li>
<li>blk-cgroup: support to track if policy is online (bsc#1216062).</li>
<li>bonding: Fix extraction of ports from the packet headers (bsc#1214754).</li>
<li>bonding: Return pointer to data after pull on skb (bsc#1214754).</li>
<li>bonding: do not assume skb mac_header is set (bsc#1214754).</li>
<li>bpf: Add copy_map_value_long to copy to remote percpu memory (git-fixes).</li>
<li>bpf: Add missing btf_put to register_btf_id_dtor_kfuncs (git-fixes).</li>
<li>bpf: Add override check to kprobe multi link attach (git-fixes).</li>
<li>bpf: Add zero_map_value to zero map value with special fields (git-fixes).</li>
<li>bpf: Cleanup check_refcount_ok (git-fixes).</li>
<li>bpf: Fix max stack depth check for async callbacks (git-fixes).</li>
<li>bpf: Fix offset calculation error in __copy_map_value and zero_map_value (git-fixes).</li>
<li>bpf: Fix ref_obj_id for dynptr data slices in verifier (git-fixes).</li>
<li>bpf: Fix resetting logic for unreferenced kptrs (git-fixes).</li>
<li>bpf: Fix subprog idx logic in check_max_stack_depth (git-fixes).</li>
<li>bpf: Gate dynptr API behind CAP_BPF (git-fixes).</li>
<li>bpf: Prevent decl_tag from being referenced in func_proto arg (git-fixes).</li>
<li>bpf: Repeat check_max_stack_depth for async callbacks (git-fixes).</li>
<li>bpf: Tighten ptr_to_btf_id checks (git-fixes).</li>
<li>bpf: fix precision propagation verbose logging (git-fixes).</li>
<li>bpf: prevent decl_tag from being referenced in func_proto (git-fixes).</li>
<li>bpf: propagate precision across all frames, not just the last one (git-fixes).</li>
<li>bpf: propagate precision in ALU/ALU64 operations (git-fixes).</li>
<li>btf: Export bpf_dynptr definition (git-fixes).</li>
<li>btrfs: do not start transaction for scrub if the fs is mounted read-only (bsc#1214874).</li>
<li>bus: ti-sysc: Fix missing AM35xx SoC matching (git-fixes).</li>
<li>bus: ti-sysc: Use fsleep() instead of usleep_range() in sysc_reset() (git-fixes).</li>
<li>ceph: add base64 endcoding routines for encrypted names (jsc#SES-1880).</li>
<li>ceph: add encryption support to writepage and writepages (jsc#SES-1880).</li>
<li>ceph: add fscrypt ioctls and ceph.fscrypt.auth vxattr (jsc#SES-1880).</li>
<li>ceph: add helpers for converting names for userland presentation (jsc#SES-1880).</li>
<li>ceph: add infrastructure for file encryption and decryption (jsc#SES-1880).</li>
<li>ceph: add new mount option to enable sparse reads (jsc#SES-1880).</li>
<li>ceph: add object version support for sync read (jsc#SES-1880).</li>
<li>ceph: add read/modify/write to ceph_sync_write (jsc#SES-1880).</li>
<li>ceph: add some fscrypt guardrails (jsc#SES-1880).</li>
<li>ceph: add support for encrypted snapshot names (jsc#SES-1880).</li>
<li>ceph: add support to readdir for encrypted names (jsc#SES-1880).</li>
<li>ceph: add truncate size handling support for fscrypt (jsc#SES-1880).</li>
<li>ceph: align data in pages in ceph_sync_write (jsc#SES-1880).</li>
<li>ceph: allow encrypting a directory while not having Ax caps (jsc#SES-1880).</li>
<li>ceph: create symlinks with encrypted and base64-encoded targets (jsc#SES-1880).</li>
<li>ceph: decode alternate_name in lease info (jsc#SES-1880).</li>
<li>ceph: do not use special DIO path for encrypted inodes (jsc#SES-1880).</li>
<li>ceph: drop messages from MDS when unmounting (jsc#SES-1880).</li>
<li>ceph: encode encrypted name in ceph_mdsc_build_path and dentry release (jsc#SES-1880).</li>
<li>ceph: fix incorrect revoked caps assert in ceph_fill_file_size() (bsc#1216322).</li>
<li>ceph: fix type promotion bug on 32bit systems (bsc#1216324).</li>
<li>ceph: fix updating i_truncate_pagecache_size for fscrypt (jsc#SES-1880).</li>
<li>ceph: fscrypt_auth handling for ceph (jsc#SES-1880).</li>
<li>ceph: handle fscrypt fields in cap messages from MDS (jsc#SES-1880).</li>
<li>ceph: implement -o test_dummy_encryption mount option (jsc#SES-1880).</li>
<li>ceph: invalidate pages when doing direct/sync writes (jsc#SES-1880).</li>
<li>ceph: make ceph_fill_trace and ceph_get_name decrypt names (jsc#SES-1880).</li>
<li>ceph: make ceph_msdc_build_path use ref-walk (jsc#SES-1880).</li>
<li>ceph: make d_revalidate call fscrypt revalidator for encrypted dentries (jsc#SES-1880).</li>
<li>ceph: make ioctl cmds more readable in debug log (jsc#SES-1880).</li>
<li>ceph: make num_fwd and num_retry to __u32 (jsc#SES-1880).</li>
<li>ceph: mark directory as non-complete after loading key (jsc#SES-1880).</li>
<li>ceph: pass the request to parse_reply_info_readdir() (jsc#SES-1880).</li>
<li>ceph: plumb in decryption during reads (jsc#SES-1880).</li>
<li>ceph: preallocate inode for ops that may create one (jsc#SES-1880).</li>
<li>ceph: prevent snapshot creation in encrypted locked directories (jsc#SES-1880).</li>
<li>ceph: remove unnecessary check for NULL in parse_longname() (bsc#1216333).</li>
<li>ceph: send alternate_name in MClientRequest (jsc#SES-1880).</li>
<li>ceph: set DCACHE_NOKEY_NAME flag in ceph_lookup/atomic_open() (jsc#SES-1880).</li>
<li>ceph: size handling in MClientRequest, cap updates and inode traces (jsc#SES-1880).</li>
<li>ceph: switch ceph_lookup/atomic_open() to use new fscrypt helper (jsc#SES-1880).</li>
<li>ceph: use osd_req_op_extent_osd_iter for netfs reads (jsc#SES-1880).</li>
<li>ceph: voluntarily drop Xx caps for requests those touch parent mtime (jsc#SES-1880).</li>
<li>ceph: wait for OSD requests' callbacks to finish when unmounting (jsc#SES-1880).</li>
<li>cgroup/cpuset: Change references of cpuset_mutex to cpuset_rwsem (bsc#1215955).</li>
<li>cgroup: Remove duplicates in cgroup v1 tasks file (bsc#1211307).</li>
<li>clk: tegra: fix error return case for recalc_rate (git-fixes).</li>
<li>counter: microchip-tcb-capture: Fix the use of internal GCLK logic (git-fixes).</li>
<li>crypto: qat - Include algapi.h for low-level Crypto API (PED-6401).</li>
<li>crypto: qat - Remove unused function declarations (PED-6401).</li>
<li>crypto: qat - add fw_counters debugfs file (PED-6401).</li>
<li>crypto: qat - add heartbeat counters check (PED-6401).</li>
<li>crypto: qat - add heartbeat feature (PED-6401).</li>
<li>crypto: qat - add internal timer for qat 4xxx (PED-6401).</li>
<li>crypto: qat - add measure clock frequency (PED-6401).</li>
<li>crypto: qat - add missing function declaration in adf_dbgfs.h (PED-6401).</li>
<li>crypto: qat - add qat_zlib_deflate (PED-6401).</li>
<li>crypto: qat - add support for 402xx devices (PED-6401).</li>
<li>crypto: qat - change value of default idle filter (PED-6401).</li>
<li>crypto: qat - delay sysfs initialization (PED-6401).</li>
<li>crypto: qat - do not export adf_init_admin_pm() (PED-6401).</li>
<li>crypto: qat - drop log level of msg in get_instance_node() (PED-6401).</li>
<li>crypto: qat - drop obsolete heartbeat interface (PED-6401).</li>
<li>crypto: qat - drop redundant adf_enable_aer() (PED-6401).</li>
<li>crypto: qat - expose pm_idle_enabled through sysfs (PED-6401).</li>
<li>crypto: qat - extend buffer list logic interface (PED-6401).</li>
<li>crypto: qat - extend configuration for 4xxx (PED-6401).</li>
<li>crypto: qat - fix apply custom thread-service mapping for dc service (PED-6401).</li>
<li>crypto: qat - fix concurrency issue when device state changes (PED-6401).</li>
<li>crypto: qat - fix crypto capability detection for 4xxx (PED-6401).</li>
<li>crypto: qat - fix spelling mistakes from 'bufer' to 'buffer' (PED-6401).</li>
<li>crypto: qat - make fw images name constant (PED-6401).</li>
<li>crypto: qat - make state machine functions static (PED-6401).</li>
<li>crypto: qat - move dbgfs init to separate file (PED-6401).</li>
<li>crypto: qat - move returns to default case (PED-6401).</li>
<li>crypto: qat - refactor device restart logic (PED-6401).</li>
<li>crypto: qat - refactor fw config logic for 4xxx (PED-6401).</li>
<li>crypto: qat - remove ADF_STATUS_PF_RUNNING flag from probe (PED-6401).</li>
<li>crypto: qat - replace state machine calls (PED-6401).</li>
<li>crypto: qat - replace the if statement with min() (PED-6401).</li>
<li>crypto: qat - set deprecated capabilities as reserved (PED-6401).</li>
<li>crypto: qat - unmap buffer before free for DH (PED-6401).</li>
<li>crypto: qat - unmap buffers before free for RSA (PED-6401).</li>
<li>crypto: qat - update slice mask for 4xxx devices (PED-6401).</li>
<li>crypto: qat - use kfree_sensitive instead of memset/kfree() (PED-6401).</li>
<li>dmaengine: idxd: use spin_lock_irqsave before wait_event_lock_irq (git-fixes).</li>
<li>dmaengine: mediatek: Fix deadlock caused by synchronize_irq() (git-fixes).</li>
<li>dmaengine: stm32-mdma: abort resume if no ongoing transfer (git-fixes).</li>
<li>drm/amd/display: Do not check registers, if using AUX BL control (git-fixes).</li>
<li>drm/amd/display: Do not set dpms_off for seamless boot (git-fixes).</li>
<li>drm/amd/pm: add unique_id for gc 11.0.3 (git-fixes).</li>
<li>drm/amd: Fix detection of _PR3 on the PCIe root port (git-fixes).</li>
<li>drm/amdgpu/nbio4.3: set proper rmmio_remap.reg_offset for SR-IOV (git-fixes).</li>
<li>drm/amdgpu/soc21: do not remap HDP registers for SR-IOV (git-fixes).</li>
<li>drm/amdgpu: Handle null atom context in VBIOS info ioctl (git-fixes).</li>
<li>drm/amdgpu: add missing NULL check (git-fixes).</li>
<li>drm/amdkfd: Flush TLB after unmapping for GFX v9.4.3 (git-fixes).</li>
<li>drm/amdkfd: Insert missing TLB flush on GFX10 and later (git-fixes).</li>
<li>drm/amdkfd: Use gpu_offset for user queue's wptr (git-fixes).</li>
<li>drm/atomic-helper: relax unregistered connector check (git-fixes).</li>
<li>drm/bridge: ti-sn65dsi83: Do not generate HFP/HBP/HSA and EOT packet (git-fixes).</li>
<li>drm/i915/gt: Fix reservation address in ggtt_reserve_guc_top (git-fixes).</li>
<li>drm/i915: Retry gtt fault when out of fence registers (git-fixes).</li>
<li>drm/mediatek: Correctly free sg_table in gem prime vmap (git-fixes).</li>
<li>drm/msm/dp: do not reinitialize phy unless retry during link training (git-fixes).</li>
<li>drm/msm/dpu: change _dpu_plane_calc_bw() to use u64 to avoid overflow (git-fixes).</li>
<li>drm/msm/dsi: fix irq_of_parse_and_map() error checking (git-fixes).</li>
<li>drm/msm/dsi: skip the wait for video mode done if not applicable (git-fixes).</li>
<li>drm/vmwgfx: fix typo of sizeof argument (git-fixes).</li>
<li>drm: panel-orientation-quirks: Add quirk for One Mix 2S (git-fixes).</li>
<li>firmware: arm_ffa: Do not set the memory region attributes for MEM_LEND (git-fixes).</li>
<li>firmware: imx-dsp: Fix an error handling path in imx_dsp_setup_channels() (git-fixes).</li>
<li>fprobe: Ensure running fprobe_exit_handler() finished before calling rethook_free() (git-fixes).</li>
<li>fscrypt: new helper function - fscrypt_prepare_lookup_partial() (jsc#SES-1880).</li>
<li>gpio: aspeed: fix the GPIO number passed to pinctrl_gpio_set_config() (git-fixes).</li>
<li>gpio: pmic-eic-sprd: Add can_sleep flag for PMIC EIC chip (git-fixes).</li>
<li>gpio: pxa: disable pinctrl calls for MMP_GPIO (git-fixes).</li>
<li>gpio: tb10x: Fix an error handling path in tb10x_gpio_probe() (git-fixes).</li>
<li>gpio: timberdale: Fix potential deadlock on &tgpio->lock (git-fixes).</li>
<li>gpio: vf610: set value before the direction to avoid a glitch (git-fixes).</li>
<li>gve: Do not fully free QPL pages on prefill errors (git-fixes).</li>
<li>i2c: i801: unregister tco_pdev in i801_probe() error path (git-fixes).</li>
<li>i2c: mux: Avoid potential false error message in i2c_mux_add_adapter (git-fixes).</li>
<li>i2c: mux: demux-pinctrl: check the return value of devm_kstrdup() (git-fixes).</li>
<li>i2c: mux: gpio: Add missing fwnode_handle_put() (git-fixes).</li>
<li>i2c: mux: gpio: Replace custom acpi_get_local_address() (git-fixes).</li>
<li>i2c: npcm7xx: Fix callback completion ordering (git-fixes).</li>
<li>ieee802154: ca8210: Fix a potential UAF in ca8210_probe (git-fixes).</li>
<li>iio: pressure: bmp280: Fix NULL pointer exception (git-fixes).</li>
<li>iio: pressure: dps310: Adjust Timeout Settings (git-fixes).</li>
<li>iio: pressure: ms5611: ms5611_prom_is_valid false negative bug (git-fixes).</li>
<li>intel x86 platform vsec kABI workaround (bsc#1216202).</li>
<li>io_uring/fs: remove sqe->rw_flags checking from LINKAT (git-fixes).</li>
<li>io_uring/rw: defer fsnotify calls to task context (git-fixes).</li>
<li>io_uring/rw: ensure kiocb_end_write() is always called (git-fixes).</li>
<li>io_uring/rw: remove leftover debug statement (git-fixes).</li>
<li>io_uring: Replace 0-length array with flexible array (git-fixes).</li>
<li>io_uring: ensure REQ_F_ISREG is set async offload (git-fixes).</li>
<li>io_uring: fix fdinfo sqe offsets calculation (git-fixes).</li>
<li>io_uring: fix memory leak when removing provided buffers (git-fixes).</li>
<li>iommu/amd/io-pgtable: Implement map_pages io_pgtable_ops callback (bsc#1212423).</li>
<li>iommu/amd/io-pgtable: Implement unmap_pages io_pgtable_ops callback (bsc#1212423).</li>
<li>iommu/amd: Add map/unmap_pages() iommu_domain_ops callback support (bsc#1212423).</li>
<li>iommu/arm-smmu-v3: Fix soft lockup triggered by (bsc#1215921)</li>
<li>kABI: fix bpf Tighten-ptr_to_btf_id checks (git-fixes).</li>
<li>kabi: blkcg_policy_data fix KABI (bsc#1216062).</li>
<li>kabi: workaround for enum nft_trans_phase (bsc#1215104).</li>
<li>kprobes: Prohibit probing on CFI preamble symbol (git-fixes).</li>
<li>leds: Drop BUG_ON check for LED_COLOR_ID_MULTI (git-fixes).</li>
<li>libceph: add CEPH_OSD_OP_ASSERT_VER support (jsc#SES-1880).</li>
<li>libceph: add new iov_iter-based ceph_msg_data_type and ceph_osd_data_type (jsc#SES-1880).</li>
<li>libceph: add sparse read support to OSD client (jsc#SES-1880).</li>
<li>libceph: add sparse read support to msgr1 (jsc#SES-1880).</li>
<li>libceph: add spinlock around osd->o_requests (jsc#SES-1880).</li>
<li>libceph: allow ceph_osdc_new_request to accept a multi-op read (jsc#SES-1880).</li>
<li>libceph: define struct ceph_sparse_extent and add some helpers (jsc#SES-1880).</li>
<li>libceph: new sparse_read op, support sparse reads on msgr2 crc codepath (jsc#SES-1880).</li>
<li>libceph: support sparse reads on msgr2 secure codepath (jsc#SES-1880).</li>
<li>libceph: use kernel_connect() (bsc#1216323).</li>
<li>mm, memcg: reconsider kmem.limit_in_bytes deprecation (bsc#1208788 bsc#1213705).</li>
<li>mmc: core: Capture correct oemid-bits for eMMC cards (git-fixes).</li>
<li>mmc: core: sdio: hold retuning if sdio in 1-bit mode (git-fixes).</li>
<li>mmc: mtk-sd: Use readl_poll_timeout_atomic in msdc_reset_hw (git-fixes).</li>
<li>mtd: physmap-core: Restore map_rom fallback (git-fixes).</li>
<li>mtd: rawnand: arasan: Ensure program page operations are successful (git-fixes).</li>
<li>mtd: rawnand: marvell: Ensure program page operations are successful (git-fixes).</li>
<li>mtd: rawnand: pl353: Ensure program page operations are successful (git-fixes).</li>
<li>mtd: rawnand: qcom: Unmap the right resource upon probe failure (git-fixes).</li>
<li>mtd: spinand: micron: correct bitmask for ecc status (git-fixes).</li>
<li>net/sched: fix netdevice reference leaks in attach_default_qdiscs() (git-fixes).</li>
<li>net: mana: Fix TX CQE error handling (bsc#1215986).</li>
<li>net: mana: Fix oversized sge0 for GSO packets (bsc#1215986).</li>
<li>net: nfc: llcp: Add lock when modifying device list (git-fixes).</li>
<li>net: rfkill: gpio: prevent value glitch during probe (git-fixes).</li>
<li>net: sched: add barrier to fix packet stuck problem for lockless qdisc (bsc#1216345).</li>
<li>net: sched: fixed barrier to prevent skbuff sticking in qdisc backlog (bsc#1216345).</li>
<li>net: usb: dm9601: fix uninitialized variable use in dm9601_mdio_read (git-fixes).</li>
<li>net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg (git-fixes).</li>
<li>net: usb: smsc95xx: Fix an error code in smsc95xx_reset() (git-fixes).</li>
<li>net: use sk_is_tcp() in more places (git-fixes).</li>
<li>netfilter: nf_tables: add NFT_TRANS_PREPARE_ERROR to deal with bound set/chain (git-fixes).</li>
<li>netfilter: nf_tables: unbind non-anonymous set if rule construction fails (git-fixes).</li>
<li>nfc: nci: assert requested protocol is valid (git-fixes).</li>
<li>nfc: nci: fix possible NULL pointer dereference in send_acknowledge() (git-fixes).</li>
<li>nfs: only issue commit in DIO codepath if we have uncommitted data (bsc#1211162).</li>
<li>nilfs2: fix potential use after free in nilfs_gccache_submit_read_data() (git-fixes).</li>
<li>nvme-fc: Prevent null pointer dereference in nvme_fc_io_getuuid() (bsc#1214842).</li>
<li>phy: mapphone-mdm6600: Fix pinctrl_pm handling for sleep pins (git-fixes).</li>
<li>phy: mapphone-mdm6600: Fix runtime PM for remove (git-fixes).</li>
<li>phy: mapphone-mdm6600: Fix runtime disable on probe (git-fixes).</li>
<li>pinctrl: avoid unsafe code pattern in find_pinctrl() (git-fixes).</li>
<li>pinctrl: renesas: rzn1: Enable missing PINMUX (git-fixes).</li>
<li>platform/surface: platform_profile: Propagate error if profile registration fails (git-fixes).</li>
<li>platform/x86/intel/pmt: Ignore uninitialized entries (bsc#1216202).</li>
<li>platform/x86/intel/pmt: telemetry: Fix fixed region handling (bsc#1216202).</li>
<li>platform/x86/intel/vsec: Rework early hardware code (bsc#1216202).</li>
<li>platform/x86/intel: Fix 'rmmod pmt_telemetry' panic (bsc#1216202).</li>
<li>platform/x86/intel: Fix pmt_crashlog array reference (bsc#1216202).</li>
<li>platform/x86: asus-wmi: Change ASUS_WMI_BRN_DOWN code from 0x20 to 0x2e (git-fixes).</li>
<li>platform/x86: asus-wmi: Map 0x2a code, Ignore 0x2b and 0x2c events (git-fixes).</li>
<li>platform/x86: think-lmi: Fix reference leak (git-fixes).</li>
<li>platform/x86: touchscreen_dmi: Add info for the Positivo C4128B (git-fixes).</li>
<li>power: supply: ucs1002: fix error code in ucs1002_get_property() (git-fixes).</li>
<li>quota: Fix slow quotaoff (bsc#1216621).</li>
<li>r8152: check budget for r8152_poll() (git-fixes).</li>
<li>regmap: fix NULL deref on lookup (git-fixes).</li>
<li>regmap: rbtree: Fix wrong register marked as in-cache when creating new node (git-fixes).</li>
<li>remove unnecessary WARN_ON_ONCE() (bsc#1214823).</li>
<li>ring-buffer: Avoid softlockup in ring_buffer_resize() (git-fixes).</li>
<li>ring-buffer: Do not attempt to read past "commit" (git-fixes).</li>
<li>ring-buffer: Fix bytes info in per_cpu buffer stats (git-fixes).</li>
<li>ring-buffer: Update "shortest_full" in polling (git-fixes).</li>
<li>s390/cio: fix a memleak in css_alloc_subchannel (git-fixes bsc#1216510).</li>
<li>s390/pci: fix iommu bitmap allocation (git-fixes bsc#1216511).</li>
<li>sched/cpuset: Bring back cpuset_mutex (bsc#1215955).</li>
<li>sched/deadline,rt: Remove unused parameter from pick_next_[rt|dl]_entity() (git fixes (sched)).</li>
<li>sched/rt: Fix live lock between select_fallback_rq() and RT push (git fixes (sched)).</li>
<li>sched/rt: Fix sysctl_sched_rr_timeslice intial value (git fixes (sched)).</li>
<li>scsi: be2iscsi: Add length check when parsing nlattrs (git-fixes).</li>
<li>scsi: fcoe: Fix potential deadlock on &fip->ctlr_lock (git-fixes).</li>
<li>scsi: iscsi: Add length check for nlattr payload (git-fixes).</li>
<li>scsi: iscsi: Add strlen() check in iscsi_if_set{_host}_param() (git-fixes).</li>
<li>scsi: iscsi_tcp: restrict to TCP sockets (git-fixes).</li>
<li>scsi: mpi3mr: Propagate sense data for admin queue SCSI I/O (git-fixes).</li>
<li>scsi: mpt3sas: Perform additional retries if doorbell read returns 0 (git-fixes).</li>
<li>scsi: pm8001: Setup IRQs on resume (git-fixes).</li>
<li>scsi: qedf: Do not touch __user pointer in qedf_dbg_debug_cmd_read() directly (git-fixes).</li>
<li>scsi: qedf: Do not touch __user pointer in qedf_dbg_fp_int_cmd_read() directly (git-fixes).</li>
<li>scsi: qedf: Do not touch __user pointer in qedf_dbg_stop_io_on_error_cmd_read() directly (git-fixes).</li>
<li>scsi: qedi: Fix potential deadlock on &qedi_percpu->p_work_lock (git-fixes).</li>
<li>scsi: qla4xxx: Add length check when parsing nlattrs (git-fixes).</li>
<li>selftests/bpf: Add more tests for check_max_stack_depth bug (git-fixes).</li>
<li>selftests/bpf: Add reproducer for decl_tag in func_proto argument (git-fixes).</li>
<li>selftests/bpf: Add reproducer for decl_tag in func_proto return type (git-fixes).</li>
<li>selftests/bpf: Add selftest for check_stack_max_depth bug (git-fixes).</li>
<li>selftests/bpf: Clean up sys_nanosleep uses (git-fixes).</li>
<li>serial: 8250_port: Check IRQ data before use (git-fixes).</li>
<li>soc: imx8m: Enable OCOTP clock for imx8mm before reading registers (git-fixes).</li>
<li>spi: nxp-fspi: reset the FLSHxCR1 registers (git-fixes).</li>
<li>spi: stm32: add a delay before SPI disable (git-fixes).</li>
<li>spi: sun6i: fix race between DMA RX transfer completion and RX FIFO drain (git-fixes).</li>
<li>spi: sun6i: reduce DMA RX transfer width to single byte (git-fixes).</li>
<li>thunderbolt: Check that lane 1 is in CL0 before enabling lane bonding (git-fixes).</li>
<li>thunderbolt: Restart XDomain discovery handshake after failure (git-fixes).</li>
<li>thunderbolt: Workaround an IOMMU fault on certain systems with Intel Maple Ridge (git-fixes).</li>
<li>tracing: Have current_trace inc the trace array ref count (git-fixes).</li>
<li>tracing: Have event inject files inc the trace array ref count (git-fixes).</li>
<li>tracing: Have option files inc the trace array ref count (git-fixes).</li>
<li>tracing: Have tracing_max_latency inc the trace array ref count (git-fixes).</li>
<li>tracing: Increase trace array ref count on enable and filter files (git-fixes).</li>
<li>tracing: Make trace_marker{,_raw} stream-like (git-fixes).</li>
<li>usb: cdnsp: Fixes issue with dequeuing not queued requests (git-fixes).</li>
<li>usb: dwc3: Soft reset phy on probe for host (git-fixes).</li>
<li>usb: gadget: ncm: Handle decoding of multiple NTB's in unwrap call (git-fixes).</li>
<li>usb: gadget: udc-xilinx: replace memcpy with memcpy_toio (git-fixes).</li>
<li>usb: hub: Guard against accesses to uninitialized BOS descriptors (git-fixes).</li>
<li>usb: musb: Get the musb_qh poniter after musb_giveback (git-fixes).</li>
<li>usb: musb: Modify the "HWVers" register address (git-fixes).</li>
<li>usb: typec: altmodes/displayport: Signal hpd low when exiting mode (git-fixes).</li>
<li>usb: typec: ucsi: Clear EVENT_PENDING bit if ucsi_send_command fails (git-fixes).</li>
<li>usb: xhci: xhci-ring: Use sysdev for mapping bounce buffer (git-fixes).</li>
<li>vmbus_testing: fix wrong python syntax for integer value comparison (git-fixes).</li>
<li>vringh: do not use vringh_kiov_advance() in vringh_iov_xfer() (git-fixes).</li>
<li>watchdog: iTCO_wdt: No need to stop the timer in probe (git-fixes).</li>
<li>watchdog: iTCO_wdt: Set NO_REBOOT if the watchdog is not already running (git-fixes).</li>
<li>wifi: cfg80211: Fix 6GHz scan configuration (git-fixes).</li>
<li>wifi: cfg80211: avoid leaking stack data into trace (git-fixes).</li>
<li>wifi: iwlwifi: Ensure ack flag is properly cleared (git-fixes).</li>
<li>wifi: iwlwifi: dbg_ini: fix structure packing (git-fixes).</li>
<li>wifi: iwlwifi: mvm: Fix a memory corruption issue (git-fixes).</li>
<li>wifi: mac80211: allow transmitting EAPOL frames with tainted key (git-fixes).</li>
<li>wifi: mt76: mt76x02: fix MT76x0 external LNA gain handling (git-fixes).</li>
<li>wifi: mwifiex: Fix oob check condition in mwifiex_process_rx_packet (git-fixes).</li>
<li>wifi: mwifiex: Fix tlv_buf_left calculation (git-fixes).</li>
<li>wifi: mwifiex: Sanity check tlv_len and tlv_bitmap_len (git-fixes).</li>
<li>x86/cpu, kvm: Add the NO_NESTED_DATA_BP feature (bsc#1213772).</li>
<li>x86/cpu, kvm: Add the Null Selector Clears Base feature (bsc#1213772).</li>
<li>x86/cpu, kvm: Add the SMM_CTL MSR not present feature (bsc#1213772).</li>
<li>x86/cpu, kvm: Move X86_FEATURE_LFENCE_RDTSC to its native leaf (bsc#1213772).</li>
<li>x86/cpu: Enable STIBP on AMD if Automatic IBRS is enabled (bsc#1213772).</li>
<li>x86/cpu: Support AMD Automatic IBRS (bsc#1213772).</li>
<li>x86/mm: Print the encryption features correctly when a paravisor is present (bsc#1206453).</li>
<li>x86/platform/uv: Use alternate source for socket to node data (bsc#1215696).</li>
<li>x86/sev: Check IOBM for IOIO exceptions from user-space (bsc#1212649).</li>
<li>x86/sev: Check for user-space IOIO pointing to kernel space (bsc#1212649).</li>
<li>x86/sev: Disable MMIO emulation from user mode (bsc#1212649).</li>
<li>x86/sev: Make enc_dec_hypercall() accept a size instead of npages (bsc#1214635).</li>
<li>xen-netback: use default TX queue size for vifs (git-fixes).</li>
<li>xhci: Keep interrupt disabled in initialization until host is running (git-fixes).</li>
</ul>
<h2>Special Instructions and Notes:</h2>
<ul>
<li>Please reboot the system after installing this update.</li>
</ul>
<h2>Patch Instructions:</h2>
<p>
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".<br/>
Alternatively you can run the command listed for your product:
</p>
<ul class="list-group">
<li class="list-group-item">
openSUSE Leap 15.5
<br/>
<code>zypper in -t patch SUSE-2023-4414=1 openSUSE-SLE-15.5-2023-4414=1</code>
</li>
<li class="list-group-item">
Public Cloud Module 15-SP5
<br/>
<code>zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP5-2023-4414=1</code>
</li>
</ul>
<h2>Package List:</h2>
<ul>
<li>
openSUSE Leap 15.5 (aarch64 x86_64)
<ul>
<li>dlm-kmp-azure-5.14.21-150500.33.23.1</li>
<li>kernel-azure-debugsource-5.14.21-150500.33.23.1</li>
<li>reiserfs-kmp-azure-5.14.21-150500.33.23.1</li>
<li>kselftests-kmp-azure-debuginfo-5.14.21-150500.33.23.1</li>
<li>gfs2-kmp-azure-5.14.21-150500.33.23.1</li>
<li>kernel-azure-debuginfo-5.14.21-150500.33.23.1</li>
<li>cluster-md-kmp-azure-5.14.21-150500.33.23.1</li>
<li>kernel-azure-optional-debuginfo-5.14.21-150500.33.23.1</li>
<li>kernel-syms-azure-5.14.21-150500.33.23.1</li>
<li>cluster-md-kmp-azure-debuginfo-5.14.21-150500.33.23.1</li>
<li>ocfs2-kmp-azure-5.14.21-150500.33.23.1</li>
<li>kernel-azure-livepatch-devel-5.14.21-150500.33.23.1</li>
<li>kernel-azure-devel-5.14.21-150500.33.23.1</li>
<li>reiserfs-kmp-azure-debuginfo-5.14.21-150500.33.23.1</li>
<li>kernel-azure-extra-debuginfo-5.14.21-150500.33.23.1</li>
<li>gfs2-kmp-azure-debuginfo-5.14.21-150500.33.23.1</li>
<li>kernel-azure-optional-5.14.21-150500.33.23.1</li>
<li>ocfs2-kmp-azure-debuginfo-5.14.21-150500.33.23.1</li>
<li>dlm-kmp-azure-debuginfo-5.14.21-150500.33.23.1</li>
<li>kernel-azure-extra-5.14.21-150500.33.23.1</li>
<li>kselftests-kmp-azure-5.14.21-150500.33.23.1</li>
<li>kernel-azure-devel-debuginfo-5.14.21-150500.33.23.1</li>
</ul>
</li>
<li>
openSUSE Leap 15.5 (aarch64 nosrc x86_64)
<ul>
<li>kernel-azure-5.14.21-150500.33.23.1</li>
</ul>
</li>
<li>
openSUSE Leap 15.5 (x86_64)
<ul>
<li>kernel-azure-vdso-debuginfo-5.14.21-150500.33.23.1</li>
<li>kernel-azure-vdso-5.14.21-150500.33.23.1</li>
</ul>
</li>
<li>
openSUSE Leap 15.5 (noarch)
<ul>
<li>kernel-source-azure-5.14.21-150500.33.23.1</li>
<li>kernel-devel-azure-5.14.21-150500.33.23.1</li>
</ul>
</li>
<li>
Public Cloud Module 15-SP5 (aarch64 nosrc x86_64)
<ul>
<li>kernel-azure-5.14.21-150500.33.23.1</li>
</ul>
</li>
<li>
Public Cloud Module 15-SP5 (aarch64 x86_64)
<ul>
<li>kernel-azure-debugsource-5.14.21-150500.33.23.1</li>
<li>kernel-azure-devel-5.14.21-150500.33.23.1</li>
<li>kernel-syms-azure-5.14.21-150500.33.23.1</li>
<li>kernel-azure-debuginfo-5.14.21-150500.33.23.1</li>
<li>kernel-azure-devel-debuginfo-5.14.21-150500.33.23.1</li>
</ul>
</li>
<li>
Public Cloud Module 15-SP5 (noarch)
<ul>
<li>kernel-source-azure-5.14.21-150500.33.23.1</li>
<li>kernel-devel-azure-5.14.21-150500.33.23.1</li>
</ul>
</li>
</ul>
<h2>References:</h2>
<ul>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-2163.html">https://www.suse.com/security/cve/CVE-2023-2163.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-2860.html">https://www.suse.com/security/cve/CVE-2023-2860.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-31085.html">https://www.suse.com/security/cve/CVE-2023-31085.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-34324.html">https://www.suse.com/security/cve/CVE-2023-34324.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-3777.html">https://www.suse.com/security/cve/CVE-2023-3777.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-39189.html">https://www.suse.com/security/cve/CVE-2023-39189.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-39191.html">https://www.suse.com/security/cve/CVE-2023-39191.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-39193.html">https://www.suse.com/security/cve/CVE-2023-39193.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-45862.html">https://www.suse.com/security/cve/CVE-2023-45862.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-46813.html">https://www.suse.com/security/cve/CVE-2023-46813.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2023-5178.html">https://www.suse.com/security/cve/CVE-2023-5178.html</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1208788">https://bugzilla.suse.com/show_bug.cgi?id=1208788</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1211162">https://bugzilla.suse.com/show_bug.cgi?id=1211162</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1211307">https://bugzilla.suse.com/show_bug.cgi?id=1211307</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1212423">https://bugzilla.suse.com/show_bug.cgi?id=1212423</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1213705">https://bugzilla.suse.com/show_bug.cgi?id=1213705</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1213772">https://bugzilla.suse.com/show_bug.cgi?id=1213772</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1214754">https://bugzilla.suse.com/show_bug.cgi?id=1214754</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1214874">https://bugzilla.suse.com/show_bug.cgi?id=1214874</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1215104">https://bugzilla.suse.com/show_bug.cgi?id=1215104</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1215523">https://bugzilla.suse.com/show_bug.cgi?id=1215523</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1215545">https://bugzilla.suse.com/show_bug.cgi?id=1215545</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1215921">https://bugzilla.suse.com/show_bug.cgi?id=1215921</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1215955">https://bugzilla.suse.com/show_bug.cgi?id=1215955</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1215986">https://bugzilla.suse.com/show_bug.cgi?id=1215986</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1216062">https://bugzilla.suse.com/show_bug.cgi?id=1216062</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1216202">https://bugzilla.suse.com/show_bug.cgi?id=1216202</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1216322">https://bugzilla.suse.com/show_bug.cgi?id=1216322</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1216323">https://bugzilla.suse.com/show_bug.cgi?id=1216323</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1216324">https://bugzilla.suse.com/show_bug.cgi?id=1216324</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1216333">https://bugzilla.suse.com/show_bug.cgi?id=1216333</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1216345">https://bugzilla.suse.com/show_bug.cgi?id=1216345</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1216512">https://bugzilla.suse.com/show_bug.cgi?id=1216512</a>
</li>
</ul>
</div>