SUSE-SU-2023:0749-2

Vulnerability from csaf_suse - Published: 2023-03-20 13:27 - Updated: 2023-03-20 13:27
Summary
Security update for the Linux Kernel
Severity
Important
Notes
Title of the patch: Security update for the Linux Kernel
Description of the patch: The SUSE Linux Enterprise 15 SP4 RT kernel was updated to receive various security and bugfixes. - CVE-2022-3523: Fixed use after free related to device private page handling (bsc#1204363). - CVE-2022-38096: Fixed NULL-ptr deref in vmw_cmd_dx_define_query() (bsc#1203331). - CVE-2023-0461: Fixed use-after-free in icsk_ulp_data (bsc#1208787). - CVE-2023-0597: Fixed lack of randomization of per-cpu entry area in x86/mm (bsc#1207845). - CVE-2023-1118: Fixed a use-after-free bugs caused by ene_tx_irqsim() in media/rc (bsc#1208837). - CVE-2023-22995: Fixed lacks of certain platform_device_put and kfree in drivers/usb/dwc3/dwc3-qcom.c (bsc#1208741). - CVE-2023-22998: Fixed misinterpretation of the irtio_gpu_object_shmem_init() return value (bsc#1208776). - CVE-2023-23000: Fixed return value of tegra_xusb_find_port_node function phy/tegra (bsc#1208816). - CVE-2023-23004: Fixed misinterpretation of the get_sg_table return value in arm/malidp_planes.c (bsc#1208843). - CVE-2023-23559: Fixed integer overflow in rndis_wlan that leads to a buffer overflow (bsc#1207051). - CVE-2023-25012: Fixed a use-After-Free in bigben_set_led() in hid (bsc#1207560). - CVE-2023-26545: Fixed double free in net/mpls/af_mpls.c upon an allocation failure (bsc#1208700). The following non-security bugs were fixed: - [xen] fix 'direction' argument of iov_iter_kvec() (git-fixes). - acpi: NFIT: fix a potential deadlock during NFIT teardown (git-fixes). - acpi: battery: Fix missing NUL-termination with large strings (git-fixes). - acpica: Drop port I/O validation for some regions (git-fixes). - acpica: nsrepair: handle cases without a return value correctly (git-fixes). - alsa: hda/ca0132: minor fix for allocation size (git-fixes). - alsa: hda/conexant: add a new hda codec SN6180 (git-fixes). - alsa: hda/realtek - fixed wrong gpio assigned (git-fixes). - alsa: hda: Do not unset preset when cleaning up codec (git-fixes). - alsa: ice1712: Delete unreachable code in aureon_add_controls() (git-fixes). - alsa: ice1712: Do not left ice->gpio_mutex locked in aureon_add_controls() (git-fixes). - applicom: Fix PCI device refcount leak in applicom_init() (git-fixes). - arm64: dts: amlogic: meson-sm1-odroid-hc4: fix active fan thermal trip (git-fixes). - arm64: dts: imx8m: Align SoC unique ID node unit address (git-fixes). - arm64: dts: mediatek: mt7622: Add missing pwm-cells to pwm node (git-fixes). - arm64: dts: mediatek: mt8183: Fix systimer 13 MHz clock description (git-fixes). - arm64: dts: meson-g12a: Fix internal Ethernet PHY unit name (git-fixes). - arm64: dts: meson-gx: Fix Ethernet MAC address unit name (git-fixes). - arm64: dts: meson-gx: Fix the SCPI DVFS node name and unit address (git-fixes). - arm64: dts: meson: bananapi-m5: switch VDDIO_C pin to OPEN_DRAIN (git-fixes). - arm64: dts: meson: remove CPU opps below 1GHz for G12A boards (git-fixes). - arm64: dts: mt8192: Fix CPU map for single-cluster SoC (git-fixes). - arm64: dts: qcom: ipq8074: correct Gen2 PCIe ranges (git-fixes). - arm64: dts: qcom: ipq8074: correct USB3 QMP PHY-s clock output names (git-fixes). - arm64: dts: qcom: ipq8074: fix Gen3 PCIe node (git-fixes). - arm64: dts: qcom: qcs404: use symbol names for PCIe resets (git-fixes). - arm64: dts: qcom: sc7180: correct SPMI bus address cells (git-fixes). - arm64: dts: qcom: sc7280: correct SPMI bus address cells (git-fixes). - arm64: dts: qcom: sdm845-db845c: fix audio codec interrupt pin name (git-fixes). - arm64: dts: qcom: sm8150-kumano: Panel framebuffer is 2.5k instead of 4k (git-fixes). - arm64: dts: renesas: beacon-renesom: Fix gpio expander reference (git-fixes). - arm64: dts: rockchip: drop unused LED mode property from rk3328-roc-cc (git-fixes). - arm64: dts: ti: k3-j7200: Fix wakeup pinmux range (git-fixes). - arm64: efi: Make efi_rt_lock a raw_spinlock (git-fixes). - arm: OMAP1: call platform_device_put() in error case in omap1_dm_timer_init() (git-fixes). - arm: OMAP2+: Fix memory leak in realtime_counter_init() (git-fixes). - arm: bcm2835_defconfig: Enable the framebuffer (git-fixes). - arm: dts: am5748: keep usb4_tm disabled (git-fixes) - arm: dts: exynos: correct HDMI phy compatible in Exynos4 (git-fixes). - arm: dts: exynos: correct TMU phandle in Exynos4 (git-fixes). - arm: dts: exynos: correct TMU phandle in Exynos4210 (git-fixes). - arm: dts: exynos: correct TMU phandle in Exynos5250 (git-fixes). - arm: dts: exynos: correct TMU phandle in Odroid HC1 (git-fixes). - arm: dts: exynos: correct TMU phandle in Odroid XU (git-fixes). - arm: dts: exynos: correct TMU phandle in Odroid XU3 family (git-fixes). - arm: dts: exynos: correct wr-active property in Exynos3250 Rinato (git-fixes). - arm: dts: imx7-colibri-eval-v3: correct can controller comment (git-fixes) - arm: dts: imx7s: correct iomuxc gpr mux controller cells (git-fixes). - arm: dts: qcom: msm8974: add required ranges to OCMEM (git-fixes) - arm: dts: qcom: sdx55: Add Qcom SMMU-500 as the fallback for IOMMU node (git-fixes). - arm: dts: rockchip: add power-domains property to dp node on rk3288 (git-fixes). - arm: dts: spear320-hmi: correct STMPE GPIO compatible (git-fixes). - arm: dts: stm32: add missing usbh clock and fix clk order on (git-fixes) - arm: dts: stm32: use usbphyc ck_usbo_48m as USBH OHCI clock on (git-fixes) - arm: dts: sun8i: nanopi-duo2: Fix regulator GPIO reference (git-fixes). - arm: imx: Call ida_simple_remove() for ida_simple_get (git-fixes). - arm: imx: rename DEBUG_IMX21_IMX27_UART to DEBUG_IMX27_UART (git-fixes) - arm: omap: remove debug-leds driver (git-fixes) - arm: remove some dead code (git-fixes) - arm: renumber bits related to _TIF_WORK_MASK (git-fixes) - arm: s3c: fix s3c64xx_set_timer_source prototype (git-fixes). - arm: shmobile: rcar-gen2: Add missing of_node_put() (git-fixes) - arm: zynq: Fix refcount leak in zynq_early_slcr_init (git-fixes). - ascpi / x86: Add support for LPS0 callback handler (git-fixes). - asoc: Intel: sof_cs42l42: always set dpcm_capture for amplifiers (git-fixes). - asoc: Intel: sof_rt5682: always set dpcm_capture for amplifiers (git-fixes). - asoc: adau7118: do not disable regulators on device unbind (git-fixes). - asoc: cs42l56: fix DT probe (git-fixes). - asoc: dt-bindings: meson: fix gx-card codec node regex (git-fixes). - asoc: mchp-spdifrx: Fix uninitialized use of mr in mchp_spdifrx_hw_params() (git-fixes). - asoc: mchp-spdifrx: disable all interrupts in mchp_spdifrx_dai_remove() (git-fixes). - asoc: mchp-spdifrx: fix controls which rely on rsr register (git-fixes). - asoc: rsnd: Remove unnecessary rsnd_dbg_dai_call() (git-fixes). - asoc: rsnd: fixup #endif position (git-fixes). - asoc: rt715-sdca: fix clock stop prepare timeout issue (git-fixes). - asoc: soc-compress.c: fixup private_data on snd_soc_new_compress() (git-fixes). - asoc: soc-dapm.h: fixup warning struct snd_pcm_substream not declared (git-fixes). - asoc: tlv320adcx140: fix 'ti,gpio-config' DT property init (git-fixes). - auxdisplay: hd44780: Fix potential memory leak in hd44780_remove() (git-fixes). - avoid deadlock for recursive I/O on dm-thin when used as swap (bsc#1177529). - backlight: backlight: Fix doc for backlight_device_get_by_name (git-fixes). - block: bio-integrity: Copy flags when bio_integrity_payload is cloned (bsc#1208541). - bluetooth: L2CAP: Fix potential user-after-free (git-fixes). - bluetooth: hci_qca: get wakeup status from serdev device handle (git-fixes). - cifs: Check the lease context if we actually got a lease (bsc#1193629). - cifs: Convert struct fealist away from 1-element array (bsc#1193629). - cifs: Fix lost destroy smbd connection when MR allocate failed (git-fixes). - cifs: Fix oops due to uncleared server->smbd_conn in reconnect (git-fixes). - cifs: Fix uninitialized memory read in smb3_qfs_tcon() (bsc#1193629). - cifs: Fix uninitialized memory reads for oparms.mode (bsc#1193629). - cifs: Fix use-after-free in rdata->read_into_pages() (git-fixes). - cifs: Fix warning and UAF when destroy the MR list (git-fixes). - cifs: Get rid of unneeded conditional in the smb2_get_aead_req() (bsc#1193629). - cifs: Replace remaining 1-element arrays (bsc#1193629). - cifs: Replace zero-length arrays with flexible-array members (bsc#1193629). - cifs: Use kstrtobool() instead of strtobool() (bsc#1193629). - cifs: do not try to use rdma offload on encrypted connections (bsc#1193629). - cifs: fix mount on old smb servers (boo#1206935). - cifs: get rid of dns resolve worker (bsc#1193629). - cifs: get rid of unneeded conditional in cifs_get_num_sgs() (bsc#1193629). - cifs: improve checking of DFS links over STATUS_OBJECT_NAME_INVALID (git-fixes). - cifs: introduce cifs_io_parms in smb2_async_writev() (bsc#1193629). - cifs: match even the scope id for ipv6 addresses (bsc#1193629). - cifs: prevent data race in cifs_reconnect_tcon() (bsc#1193629). - cifs: prevent data race in smb2_reconnect() (bsc#1193629). - cifs: print last update time for interface list (bsc#1193629). - cifs: remove unneeded 2bytes of padding from smb2 tree connect (bsc#1193629). - cifs: return a single-use cfid if we did not get a lease (bsc#1193629). - cifs: reuse cifs_match_ipaddr for comparison of dstaddr too (bsc#1193629). - cifs: split out smb3_use_rdma_offload() helper (bsc#1193629). - cifs: update ip_addr for ses only for primary chan setup (bsc#1193629). - cifs: use tcon allocation functions even for dummy tcon (git-fixes). - cifs: use the least loaded channel for sending requests (bsc#1193629). - clk: Honor CLK_OPS_PARENT_ENABLE in clk_core_is_enabled() (git-fixes). - clk: imx: avoid memory leak (git-fixes). - clk: mxl: Add option to override gate clks (git-fixes). - clk: mxl: Fix a clk entry by adding relevant flags (git-fixes). - clk: mxl: Remove redundant spinlocks (git-fixes). - clk: mxl: Switch from direct readl/writel based IO to regmap based IO (git-fixes). - clk: mxl: syscon_node_to_regmap() returns error pointers (git-fixes). - clk: qcom: gcc-qcs404: disable gpll[04]_out_aux parents (git-fixes). - clk: qcom: gcc-qcs404: fix names of the DSI clocks used as parents (git-fixes). - clk: ralink: fix 'mt7621_gate_is_enabled()' function (git-fixes). - clk: renesas: cpg-mssr: Fix use after free if cpg_mssr_common_init() failed (git-fixes). - clk: renesas: cpg-mssr: Remove superfluous check in resume code (git-fixes). - comedi: use menuconfig for main Comedi menu (git-fixes). - crypto: ccp - Avoid page allocation failure warning for SEV_GET_ID2 (git-fixes). - crypto: ccp - Failure on re-initialization due to duplicate sysfs filename (git-fixes). - crypto: crypto4xx - Call dma_unmap_page when done (git-fixes). - crypto: essiv - Handle EBUSY correctly (git-fixes). - crypto: qat - fix out-of-bounds read (git-fixes). - crypto: rsa-pkcs1pad - Use akcipher_request_complete (git-fixes). - crypto: seqiv - Handle EBUSY correctly (git-fixes). - crypto: x86/ghash - fix unaligned access in ghash_setkey() (git-fixes). - crypto: xts - Handle EBUSY correctly (git-fixes). - dmaengine: dw-axi-dmac: Do not dereference NULL structure (git-fixes). - dmaengine: dw-edma: Do not permit non-inc interleaved xfers (git-fixes). - dmaengine: dw-edma: Drop chancnt initialization (git-fixes). - dmaengine: dw-edma: Fix invalid interleaved xfers semantics (git-fixes). - dmaengine: dw-edma: Fix missing src/dst address of interleaved xfers (git-fixes). - dmaengine: dw-edma: Fix readq_ch() return value truncation (git-fixes). - dmaengine: idxd: Set traffic class values in GRPCFG on DSA 2.0 (git-fixes). - dmaengine: ptdma: check for null desc before calling pt_cmd_callback (git-fixes). - docs: ftrace: fix a issue with duplicated subtitle number (git-fixes). - docs: gdbmacros: print newest record (git-fixes). - documentation: simplify and clarify DCO contribution example language (git-fixes). - driver core: fix potential null-ptr-deref in device_add() (git-fixes). - driver core: fix resource leak in device_add() (git-fixes). - driver core: fw_devlink: Add DL_FLAG_CYCLE support to device links (git-fixes). - drivers: base: transport_class: fix possible memory leak (git-fixes). - drivers: base: transport_class: fix resource leak when transport_add_device() fails (git-fixes). - drm/amd/display: Properly handle additional cases where DCN is not supported (git-fixes). - drm/amd/display: reduce else-if to else in dcn10_blank_pixel_data() (git-fixes). - drm/amdgpu: fix enum odm_combine_mode mismatch (git-fixes). - drm/bridge: lt8912b: Add hot plug detection (git-fixes). - drm/bridge: lt9611: fix HPD reenablement (git-fixes). - drm/bridge: lt9611: fix clock calculation (git-fixes). - drm/bridge: lt9611: fix polarity programming (git-fixes). - drm/bridge: lt9611: fix programming of video modes (git-fixes). - drm/bridge: lt9611: fix sleep mode setup (git-fixes). - drm/bridge: lt9611: pass a pointer to the of node (git-fixes). - drm/bridge: megachips: Fix error handling in i2c_register_driver() (git-fixes). - drm/fourcc: Add missing big-endian XRGB1555 and RGB565 formats (git-fixes). - drm/hyperv : Removing the restruction of VRAM allocation with PCI bar size (git-fixes). - drm/hyperv: Fix an error handling path in hyperv_vmbus_probe() (git-fixes). - drm/i915/gen11: Moving WAs to icl_gt_workarounds_init() (git-fixes). - drm/i915/gen11: Wa_1408615072/Wa_1407596294 should be on GT list (git-fixes). - drm/i915: Do not use BAR mappings for ring buffers with LLC (git-fixes). - drm/mediatek: Clean dangling pointer on bind error path (git-fixes). - drm/mediatek: Drop unbalanced obj unref (git-fixes). - drm/mediatek: Use NULL instead of 0 for NULL pointer (git-fixes). - drm/mediatek: dsi: Reduce the time of dsi from LP11 to sending cmd (git-fixes). - drm/mediatek: mtk_drm_crtc: Add checks for devm_kcalloc (git-fixes). - drm/mipi-dsi: Fix byte order of 16-bit DCS set/get brightness (git-fixes). - drm/msm/adreno: Fix null ptr access in adreno_gpu_cleanup() (git-fixes). - drm/msm/dpu: Add check for cstate (git-fixes). - drm/msm/dpu: Add check for pstates (git-fixes). - drm/msm/dpu: Disallow unallocated resources to be returned (git-fixes). - drm/msm/dpu: drop stale comment from struct dpu_mdp_cfg doc (git-fixes). - drm/msm/dpu: set pdpu->is_rt_pipe early in dpu_plane_sspp_atomic_update() (git-fixes). - drm/msm/gem: Add check for kmalloc (git-fixes). - drm/msm/hdmi: Add missing check for alloc_ordered_workqueue (git-fixes). - drm/msm/mdp5: Add check for kzalloc (git-fixes). - drm/msm: clean event_thread->worker in case of an error (git-fixes). - drm/msm: use strscpy instead of strncpy (git-fixes). - drm/nouveau/devinit/tu102-: wait for GFW_BOOT_PROGRESS == COMPLETED (git-fixes). - drm/omapdrm: Remove unused struct csc_coef_rgb2yuv (git-fixes). - drm/vc4: hdmi: Correct interlaced timings again (git-fixes). - drm/vc4: hvs: Fix colour order for xRGB1555 on HVS5 (git-fixes). - drm/vc4: hvs: Set AXI panic modes (git-fixes). - drm/vc4: vec: Use pm_runtime_resume_and_get() in vc4_vec_encoder_enable() (git-fixes). - drm/vkms: Fix memory leak in vkms_init() (git-fixes). - drm/vkms: Fix null-ptr-deref in vkms_release() (git-fixes). - drm: Fix potential null-ptr-deref due to drmm_mode_config_init() (git-fixes). - drm: mxsfb: DRM_MXSFB should depend on ARCH_MXS || ARCH_MXC (git-fixes). - drm: tidss: Fix pixel format definition (git-fixes). - dt-bindings: arm: fsl: Fix bindings for APF28Dev board (git-fixes). - dt-bindings: hwlock: sun6i: Add missing #hwlock-cells (git-fixes). - dt-bindings: input: iqs626a: Redefine trackpad property types (git-fixes). - dt-bindings: msm: dsi-controller-main: Add vdd* descriptions back in (git-fixes). - dt-bindings: net: snps,dwmac: Fix snps,reset-delays-us dependency (git-fixes). - dt-bindings: power: supply: pm8941-coincell: Do not require charging properties (git-fixes). - dt-bindings: usb: amlogic,meson-g12a-usb-ctrl: make G12A usb3-phy0 optional (git-fixes). - eeprom: idt_89hpesx: Fix error handling in idt_init() (git-fixes). - firmware: coreboot: Remove GOOGLE_COREBOOT_TABLE_ACPI/OF Kconfig entries (git-fixes). - firmware: dmi-sysfs: Fix null-ptr-deref in dmi_sysfs_register_handle (git-fixes). - firmware: stratix10-svc: add missing gen_pool_destroy() in stratix10_svc_drv_probe() (git-fixes). - fuse: add inode/permission checks to fileattr_get/fileattr_set (bsc#1208759). - gpio: tegra186: remove unneeded loop in tegra186_gpio_init_route_mapping() (git-fixes). - gpio: vf610: connect GPIO label to dev name (git-fixes). - gpu: host1x: Do not skip assigning syncpoints to channels (git-fixes). - gpu: ipu-v3: common: Add of_node_put() for reference returned by of_graph_get_port_by_id() (git-fixes). - hid: asus: use spinlock to protect concurrent accesses (git-fixes). - hid: asus: use spinlock to safely schedule workers (git-fixes). - hid: bigben: use spinlock to protect concurrent accesses (git-fixes). - hid: bigben: use spinlock to safely schedule workers (git-fixes). - hid: bigben_probe(): validate report count (git-fixes). - hid: bigben_worker() remove unneeded check on report_field (git-fixes). - hid: core: Fix deadloop in hid_apply_multiplier (git-fixes). - hid: elecom: add support for TrackBall 056E:011C (git-fixes). - hv: fix comment typo in vmbus_channel/low_latency (git-fixes). - hv_netvsc: Allocate memory in netvsc_dma_map() with GFP_ATOMIC (git-fixes). - hv_netvsc: Check status in SEND_RNDIS_PKT completion message (git-fixes). - hwmon: (ftsteutates) Fix scaling of measurements (git-fixes). - hwmon: (ltc2945) Handle error case in ltc2945_value_store (git-fixes). - hwmon: (mlxreg-fan) Return zero speed for broken fan (git-fixes). - i2c: designware: fix i2c_dw_clk_rate() return size to be u32 (git-fixes). - iio: light: tsl2563: Do not hardcode interrupt trigger type (git-fixes). - input: ads7846 - always set last command to PWRDOWN (git-fixes). - input: ads7846 - do not check penirq immediately for 7845 (git-fixes). - input: ads7846 - do not report pressure for ads7845 (git-fixes). - input: iqs269a - configure device with a single block write (git-fixes). - input: iqs269a - drop unused device node references (git-fixes). - input: iqs269a - increase interrupt handler return delay (git-fixes). - input: iqs626a - drop unused device node references (git-fixes). - iommu/hyper-v: Allow hyperv irq remapping without x2apic (git-fixes). - irqchip/gic-v3: Refactor ISB + EOIR at ack time (git-fixes) - kabi fix for: nfs: Further optimisations for 'ls -l' (git-fixes). - kabi fix for: nfsd: Have legacy NFSD WRITE decoders use xdr_stream_subsegment() (git-fixes). - kabi fix for: nfsv3: handle out-of-order write replies (bsc#1205544). - kabi fix for: nfsv4.1 query for fs_location attr on a new file system (Never, kabi). - kmap_local: do not assume kmap PTEs are linear arrays in memory (git-fixes) Update config/armv7hl/default too. - leds: led-class: Add missing put_device() to led_put() (git-fixes). - leds: led-core: Fix refcount leak in of_led_get() (git-fixes). - lib/mpi: Fix buffer overrun when SG is too long (git-fixes). - lib/zlib: remove redundation assignement of avail_in dfltcc_gdht() (git-fixes). - locking/rwsem: Allow slowpath writer to ignore handoff bit if not set by first waiter (bsc#1207270). - locking/rwsem: Always try to wake waiters in out_nolock path (bsc#1207270). - locking/rwsem: Conditionally wake waiters in reader/writer slowpaths (bsc#1207270). - locking/rwsem: Disable preemption in all down_read*() and up_read() code paths (bsc#1207270). - locking/rwsem: Disable preemption in all down_write*() and up_write() code paths (bsc#1207270). - locking/rwsem: Disable preemption while trying for rwsem lock (bsc#1207270). - locking/rwsem: Make handoff bit handling more consistent (bsc#1207270). - locking/rwsem: No need to check for handoff bit if wait queue empty (bsc#1207270). - locking/rwsem: Prevent non-first waiter from spinning in down_write() slowpath (bsc#1207270). - locking: Add missing __sched attributes (bsc#1207270). - media: coda: Add check for dcoda_iram_alloc (git-fixes). - media: coda: Add check for kmalloc (git-fixes). - media: i2c: ov7670: 0 instead of -EINVAL was returned (git-fixes). - media: i2c: ov772x: Fix memleak in ov772x_probe() (git-fixes). - media: imx: imx7-media-csi: fix missing clk_disable_unprepare() in imx7_csi_init() (git-fixes). - media: ipu3-cio2: Fix PM runtime usage_count in driver unbind (git-fixes). - media: max9286: Fix memleak in max9286_v4l2_register() (git-fixes). - media: ov2740: Fix memleak in ov2740_init_controls() (git-fixes). - media: ov5675: Fix memleak in ov5675_init_controls() (git-fixes). - media: platform: ti: Add missing check for devm_regulator_get (git-fixes). - media: rc: Fix use-after-free bugs caused by ene_tx_irqsim() (git-fixes). - media: saa7134: Use video_unregister_device for radio_dev (git-fixes). - media: ti: cal: fix possible memory leak in cal_ctx_create() (git-fixes). - media: usb: siano: Fix use after free bugs caused by do_submit_urb (git-fixes). - media: uvcvideo: Fix race condition with usb_kill_urb (git-fixes). - media: v4l2-jpeg: correct the skip count in jpeg_parse_app14_data (git-fixes). - media: v4l2-jpeg: ignore the unknown APP14 marker (git-fixes). - mfd: cs5535: Do not build on UML (git-fixes). - mfd: pcf50633-adc: Fix potential memleak in pcf50633_adc_async_read() (git-fixes). - misc/mei/hdcp: Use correct macros to initialize uuid_le (git-fixes). - misc: enclosure: Fix doc for enclosure_find() (git-fixes). - mmc: jz4740: Work around bug on JZ4760(B) (git-fixes). - mmc: mmc_spi: fix error handling in mmc_spi_probe() (git-fixes). - mmc: sdio: fix possible resource leaks in some error paths (git-fixes). - move upstreamed i915 and media fixes into sorted section - mtd: dataflash: remove duplicate SPI ID table (git-fixes). - mtd: rawnand: fsl_elbc: Propagate HW ECC settings to HW (git-fixes). - mtd: rawnand: sunxi: Clean up chips after failed init (git-fixes). - mtd: rawnand: sunxi: Fix the size of the last OOB region (git-fixes). - mtd: spi-nor: Fix shift-out-of-bounds in spi_nor_set_erase_type (git-fixes). - mtd: spi-nor: core: fix implicit declaration warning (git-fixes). - mtd: spi-nor: sfdp: Fix index value for SCCR dwords (git-fixes). - mtd: spi-nor: spansion: Consider reserved bits in CFR5 register (git-fixes). - net/rose: Fix to not accept on connected socket (git-fixes). - net/sunrpc: fix reference count leaks in rpc_sysfs_xprt_state_change (git-fixes). - nfc: fix memory leak of se_io context in nfc_genl_se_io (git-fixes). - nfs: Always initialise fattr->label in nfs_fattr_alloc() (git-fixes). - nfs: Create a new nfs_alloc_fattr_with_label() function (git-fixes). - nfs: Do not allocate nfs_fattr on the stack in __nfs42_ssc_open() (git-fixes). - nfs: Further optimisations for 'ls -l' (git-fixes). - nfs: nfs4clinet: check the return value of kstrdup() (git-fixes). - nfsd: COMMIT operations must not return NFS?ERR_INVAL (git-fixes). - nfsd: De-duplicate net_generic(nf->nf_net, nfsd_net_id) (git-fixes). - nfsd: Fix nfsd_breaker_owns_lease() return values (git-fixes). - nfsd: Have legacy NFSD WRITE decoders use xdr_stream_subsegment() (git-fixes). - nfsv3: handle out-of-order write replies (bsc#1205544). - nfsv4 expose nfs_parse_server_name function (git-fixes). - nfsv4 handle port presence in fs_location server string (git-fixes). - nfsv4 only print the label when its queried (git-fixes). - nfsv4 remove zero number of fs_locations entries error check (git-fixes). - nfsv4 store server support for fs_location attribute (git-fixes). - nfsv4.1 query for fs_location attr on a new file system (git-fixes). - nfsv4.1: Fix uninitialised variable in devicenotify (git-fixes). - nfsv4.2: fix reference count leaks in _nfs42_proc_copy_notify() (git-fixes). - nfsv4: Protect the state recovery thread against direct reclaim (git-fixes). - nvme-auth: check chap ctrl_key once constructed (bsc#1202633). - nvme-auth: clear sensitive info right after authentication completes (bsc#1202633). - nvme-auth: convert dhchap_auth_list to an array (bsc#1202633). - nvme-auth: do not ignore key generation failures when initializing ctrl keys (bsc#1202633). - nvme-auth: do not keep long lived 4k dhchap buffer (bsc#1202633). - nvme-auth: do not override ctrl keys before validation (bsc#1202633). - nvme-auth: do not re-authenticate if the controller is not LIVE (bsc#1202633). - nvme-auth: do not use NVMe status codes (bsc#1202633). - nvme-auth: fix an error code in nvme_auth_process_dhchap_challenge() (bsc#1202633). - nvme-auth: fix smatch warning complaints (bsc#1202633). - nvme-auth: guarantee dhchap buffers under memory pressure (bsc#1202633). - nvme-auth: have dhchap_auth_work wait for queues auth to complete (bsc#1202633). - nvme-auth: mark nvme_auth_wq static (bsc#1202633). - nvme-auth: no need to reset chap contexts on re-authentication (bsc#1202633). - nvme-auth: remove redundant auth_work flush (bsc#1202633). - nvme-auth: remove redundant buffer deallocations (bsc#1202633). - nvme-auth: remove redundant deallocations (bsc#1202633). - nvme-auth: remove redundant if statement (bsc#1202633). - nvme-auth: remove symbol export from nvme_auth_reset (bsc#1202633). - nvme-auth: rename __nvme_auth_[reset|free] to nvme_auth[reset|free]_dhchap (bsc#1202633). - nvme-auth: rename authentication work elements (bsc#1202633). - nvme-auth: use workqueue dedicated to authentication (bsc#1202633). - nvme-fabrics: show well known discovery name (bsc#1200054). - ocfs2: Fix data corruption after failed write (bsc#1208542). - pci/ioc: Enlarge virtfn sysfs name buffer (git-fixes). - pci/pm: Observe reset delay irrespective of bridge_d3 (git-fixes). - pci: Fix dropping valid root bus resources with .end = zero (git-fixes). - pci: hotplug: Allow marking devices as disconnected during bind/unbind (git-fixes). - pci: hv: update comment in x86 specific hv_arch_irq_unmask (git-fixes). - pci: switchtec: Return -EFAULT for copy_to_user() errors (git-fixes). - phy: rockchip-typec: fix tcphy_get_mode error case (git-fixes). - pinctrl: mediatek: Initialize variable *buf to zero (git-fixes). - pinctrl: qcom: pinctrl-msm8976: Correct function names for wcss pins (git-fixes). - pinctrl: rockchip: Fix refcount leak in rockchip_pinctrl_parse_groups (git-fixes). - pinctrl: stm32: Fix refcount leak in stm32_pctrl_get_irq_domain (git-fixes). - platform/x86: ISST: PUNIT device mapping with Sub-NUMA clustering (bsc#1208420). - platform/x86: amd-pmc: Correct usage of SMU version (git-fixes). - platform/x86: amd-pmc: Export Idlemask values based on the APU (git-fixes). - platform/x86: amd-pmc: Fix compilation when CONFIG_DEBUGFS is disabled (git-fixes). - platform/x86: touchscreen_dmi: Add Chuwi Vi8 (CWI501) DMI match (git-fixes). - platform: x86: MLX_PLATFORM: select REGMAP instead of depending on it (git-fixes). - powercap: fix possible name leak in powercap_register_zone() (git-fixes). - powerpc/eeh: Set channel state after notifying the drivers (bsc#1208784 ltc#201612). - printf: fix errname.c list (git-fixes). - qede: avoid uninitialized entries in coal_entry array (bsc#1205846). - qede: fix interrupt coalescing configuration (bsc#1205846). - refresh patches.suse/ice-clear-stale-Tx-queue-settings-before-configuring.patch. Fix bug introduced by broken backport (bsc#1208628). - remoteproc/mtk_scp: Move clk ops outside send_lock (git-fixes). - remoteproc: qcom_q6v5_mss: Use a carveout to authenticate modem headers (git-fixes). - revert 'char: pcmcia: cm4000_cs: Replace mdelay with usleep_range in set_protocol' (git-fixes). - revert 'crypto: rsa-pkcs1pad - Replace GFP_ATOMIC with GFP_KERNEL in pkcs1pad_encrypt_sign_complete' (git-fixes). - revert 'hid: logitech-hidpp: add a module parameter to keep firmware gestures' (git-fixes). - revert 'usb: dwc3: qcom: Keep power domain on to retain controller status' (git-fixes). - rtc: allow rtc_read_alarm without read_alarm callback (git-fixes). - rtc: pm8xxx: fix set-alarm race (git-fixes). - rtc: sun6i: Always export the internal oscillator (git-fixes). - s390/dasd: Fix potential memleak in dasd_eckd_init() (git-fixes). - scsi: lpfc: Copyright updates for 14.2.0.10 patches (bsc#1208607). - scsi: lpfc: Exit PRLI completion handling early if ndlp not in PRLI_ISSUE state (bsc#1208607). - scsi: lpfc: Fix space indentation in lpfc_xcvr_data_show() (bsc#1208607). - scsi: lpfc: Fix use-after-free KFENCE violation during sysfs firmware write (bsc#1208607). - scsi: lpfc: Introduce new attention types for lpfc_sli4_async_fc_evt() handler (bsc#1208607). - scsi: lpfc: Reinitialize internal VMID data structures after FLOGI completion (bsc#1208607). - scsi: lpfc: Remove duplicate ndlp kref decrement in lpfc_cleanup_rpis() (bsc#1208607 bsc#1208534). - scsi: lpfc: Remove redundant clean up code in disable_vport() (bsc#1208607). - scsi: lpfc: Replace outdated strncpy() with strscpy() (bsc#1208607). - scsi: lpfc: Resolve miscellaneous variable set but not used compiler warnings (bsc#1208607). - scsi: lpfc: Set max DMA segment size to HBA supported SGE length (bsc#1208607). - scsi: lpfc: Update lpfc version to 14.2.0.10 (bsc#1208607). - scsi: qla2xxx: Add option to disable FC2 Target support (bsc#1198438 bsc#1206103). - scsi: qla2xxx: Check if port is online before sending ELS (bsc#1208570). - scsi: qla2xxx: Fix DMA-API call trace on NVMe LS requests (bsc#1208570). - scsi: qla2xxx: Fix IOCB resource check warning (bsc#1208570). - scsi: qla2xxx: Fix erroneous link down (bsc#1208570). - scsi: qla2xxx: Fix exchange oversubscription (bsc#1208570). - scsi: qla2xxx: Fix exchange oversubscription for management commands (bsc#1208570). - scsi: qla2xxx: Fix link failure in NPIV environment (bsc#1208570). - scsi: qla2xxx: Fix printk() format string (bsc#1208570). - scsi: qla2xxx: Fix stalled login (bsc#1208570). - scsi: qla2xxx: Make qla_trim_buf() and __qla_adjust_buf() static (bsc#1208570). - scsi: qla2xxx: Relocate/rename vp map (bsc#1208570). - scsi: qla2xxx: Remove dead code (GNN ID) (bsc#1208570). - scsi: qla2xxx: Remove dead code (GPNID) (bsc#1208570). - scsi: qla2xxx: Remove dead code (bsc#1208570). - scsi: qla2xxx: Remove increment of interface err cnt (bsc#1208570). - scsi: qla2xxx: Remove the unused variable wwn (bsc#1208570). - scsi: qla2xxx: Remove unintended flag clearing (bsc#1208570). - scsi: qla2xxx: Select qpair depending on which CPU post_cmd() gets called (bsc#1208570). - scsi: qla2xxx: Simplify if condition evaluation (bsc#1208570). - scsi: qla2xxx: Update version to 10.02.08.100-k (bsc#1208570). - scsi: qla2xxx: Update version to 10.02.08.200-k (bsc#1208570). - scsi: qla2xxx: Use a variable for repeated mem_size computation (bsc#1208570). - scsi: qla2xxx: edif: Fix clang warning (bsc#1208570). - scsi: qla2xxx: edif: Fix performance dip due to lock contention (bsc#1208570). - scsi: qla2xxx: edif: Fix stall session after app start (bsc#1208570). - scsi: qla2xxx: edif: Reduce memory usage during low I/O (bsc#1208570). - sefltests: netdevsim: wait for devlink instance after netns removal (git-fixes). - selftest/lkdtm: Skip stack-entropy test if lkdtm is not available (git-fixes). - selftests/ftrace: Add check for ping command for trigger tests (bsc#1204993 ltc#200103). - selftests/ftrace: Convert tracer tests to use 'requires' to specify program dependency (bsc#1204993 ltc#200103). - selftests/powerpc: Account for offline cpus in perf-hwbreak test (bsc#1206232). - selftests/powerpc: Bump up rlimit for perf-hwbreak test (bsc#1206232). - selftests/powerpc: Move perror closer to its use (bsc#1206232). - serial: fsl_lpuart: fix RS485 RTS polariy inverse issue (git-fixes). - serial: tegra: Add missing clk_disable_unprepare() in tegra_uart_hw_init() (git-fixes). - smb3: Replace smb2pdu 1-element arrays with flex-arrays (bsc#1193629). - soundwire: cadence: Do not overflow the command FIFOs (git-fixes). - spi: bcm63xx-hsspi: Endianness fix for ARM based SoC (git-fixes). - spi: synquacer: Fix timeout handling in synquacer_spi_transfer_one() (git-fixes). - spi: tegra210-quad: Fix validate combined sequence (git-fixes). - staging: mt7621-dts: change palmbus address to lower case (git-fixes). - struct uvc_device move flush_status new member to end (git-fixes). - sunrpc allow for unspecified transport time in rpc_clnt_add_xprt (git-fixes). - sunrpc: Fix potential race conditions in rpc_sysfs_xprt_state_change() (git-fixes). - sunrpc: Fix socket waits for write buffer space (git-fixes). - thermal/drivers/hisi: Drop second sensor hi3660 (git-fixes). - thermal/drivers/tsens: Drop msm8976-specific defines (git-fixes). - thermal/drivers/tsens: Sort out msm8976 vs msm8956 data (git-fixes). - thermal/drivers/tsens: fix slope values for msm8939 (git-fixes). - thermal/drivers/tsens: limit num_sensors to 9 for msm8939 (git-fixes). - thermal: intel: BXT_PMIC: select REGMAP instead of depending on it (git-fixes). - thermal: intel: powerclamp: Fix cur_state for multi package system (git-fixes). - thermal: intel: quark_dts: fix error pointer dereference (git-fixes). - tty: serial: fsl_lpuart: Fix the wrong RXWATER setting for rx dma case (git-fixes). - tty: serial: fsl_lpuart: clear LPUART Status Register in lpuart32_shutdown() (git-fixes). - tty: serial: fsl_lpuart: disable Rx/Tx DMA in lpuart32_shutdown() (git-fixes). - tty: serial: qcom-geni-serial: stop operations in progress at shutdown (git-fixes). - update internal module version number for cifs.ko (bsc#1193629). - usb: core: Do not hold device lock while reading the 'descriptors' sysfs file (git-fixes). - usb: dwc3: core: Host wake up support from system suspend (git-fixes). - usb: dwc3: pci: add support for the Intel Meteor Lake-M (git-fixes). - usb: dwc3: qcom: Configure wakeup interrupts during suspend (git-fixes). - usb: dwc3: qcom: Fix memory leak in dwc3_qcom_interconnect_init (git-fixes). - usb: dwc3: qcom: Keep power domain on to retain controller status (git-fixes). - usb: dwc3: qcom: clean up icc init (git-fixes). - usb: dwc3: qcom: clean up suspend callbacks (git-fixes). - usb: dwc3: qcom: fix gadget-only builds (git-fixes). - usb: dwc3: qcom: fix peripheral and OTG suspend (git-fixes). - usb: dwc3: qcom: fix wakeup implementation (git-fixes). - usb: dwc3: qcom: only parse 'maximum-speed' once (git-fixes). - usb: dwc3: qcom: suppress unused-variable warning (git-fixes). - usb: early: xhci-dbc: Fix a potential out-of-bound memory access (git-fixes). - usb: gadget: fusb300_udc: free irq on the error path in fusb300_probe() (git-fixes). - usb: gadget: u_serial: Add null pointer check in gserial_resume (git-fixes). - usb: max-3421: Fix setting of I/O pins (git-fixes). - usb: musb: Add and use inline function musb_otg_state_string (git-fixes). - usb: musb: Add and use inline functions musb_{get,set}_state (git-fixes). - usb: musb: mediatek: do not unregister something that wasn't registered (git-fixes). - usb: musb: remove schedule work called after flush (git-fixes). - usb: serial: option: add support for VW/Skoda 'Carstick LTE' (git-fixes). - vc_screen: do not clobber return value in vcs_read (git-fixes). - vc_screen: modify vcs_size() handling in vcs_read() (git-fixes). - vdpa_sim: not reset state in vdpasim_queue_ready (git-fixes). - vfs: filename_create(): fix incorrect intent (bsc#1197534). - virt/sev-guest: Add a MODULE_ALIAS (bsc#1208449). - virt/sev-guest: Prevent IV reuse in the SNP guest driver (bsc#1208449). - virt/sev-guest: Remove unnecessary free in init_crypto() (bsc#1208449). - virt: sev-guest: Pass the appropriate argument type to iounmap() (bsc#1208449). - virt: sevguest: Change driver name to reflect generic SEV support (bsc#1208449). - virt: sevguest: Rename the sevguest dir and files to sev-guest (bsc#1208449). - vmci: check context->notify_page after call to get_user_pages_fast() to avoid GPF (git-fixes). - vmxnet3: move rss code block under eop descriptor (bsc#1208212). - watchdog: Fix kmemleak in watchdog_cdev_register (git-fixes). - watchdog: at91sam9_wdt: use devm_request_irq to avoid missing free_irq() in error path (git-fixes). - watchdog: pcwd_usb: Fix attempting to access uninitialized memory (git-fixes). - watchdog: sbsa_wdog: Make sure the timeout programming is within the limits (git-fixes). - wifi: ath11k: Fix memory leak in ath11k_peer_rx_frag_setup (git-fixes). - wifi: ath11k: allow system suspend to survive ath11k (git-fixes). - wifi: ath9k: Fix potential stack-out-of-bounds write in ath9k_wmi_rsp_callback() (git-fixes). - wifi: ath9k: htc_hst: free skb in ath9k_htc_rx_msg() if there is no callback function (git-fixes). - wifi: brcmfmac: fix potential memory leak in brcmf_netdev_start_xmit() (git-fixes). - wifi: brcmfmac: unmap dma buffer in brcmf_msgbuf_alloc_pktid() (git-fixes). - wifi: cfg80211: Fix extended KCK key length check in nl80211_set_rekey_data() (git-fixes). - wifi: cfg80211: Fix use after free for wext (git-fixes). - wifi: ipw2200: fix memory leak in ipw_wdev_init() (git-fixes). - wifi: ipw2x00: do not call dev_kfree_skb() under spin_lock_irqsave() (git-fixes). - wifi: iwl3945: Add missing check for create_singlethread_workqueue (git-fixes). - wifi: iwl4965: Add missing check for create_singlethread_workqueue() (git-fixes). - wifi: iwlegacy: common: do not call dev_kfree_skb() under spin_lock_irqsave() (git-fixes). - wifi: libertas: cmdresp: do not call kfree_skb() under spin_lock_irqsave() (git-fixes). - wifi: libertas: fix memory leak in lbs_init_adapter() (git-fixes). - wifi: libertas: if_usb: do not call kfree_skb() under spin_lock_irqsave() (git-fixes). - wifi: libertas: main: do not call kfree_skb() under spin_lock_irqsave() (git-fixes). - wifi: libertas_tf: do not call kfree_skb() under spin_lock_irqsave() (git-fixes). - wifi: mac80211: make rate u32 in sta_set_rate_info_rx() (git-fixes). - wifi: mwifiex: Add missing compatible string for SD8787 (git-fixes). - wifi: mwifiex: fix loop iterator in mwifiex_update_ampdu_txwinsize() (git-fixes). - wifi: orinoco: check return value of hermes_write_wordrec() (git-fixes). - wifi: rsi: Fix memory leak in rsi_coex_attach() (git-fixes). - wifi: rtl8xxxu: Fix memory leaks with RTL8723BU, RTL8192EU (git-fixes). - wifi: rtl8xxxu: do not call dev_kfree_skb() under spin_lock_irqsave() (git-fixes). - wifi: rtlwifi: Fix global-out-of-bounds bug in _rtl8812ae_phy_set_txpower_limit() (git-fixes). - wifi: rtlwifi: rtl8188ee: do not call kfree_skb() under spin_lock_irqsave() (git-fixes). - wifi: rtlwifi: rtl8723be: do not call kfree_skb() under spin_lock_irqsave() (git-fixes). - wifi: rtlwifi: rtl8821ae: do not call kfree_skb() under spin_lock_irqsave() (git-fixes). - wifi: rtw89: Add missing check for alloc_workqueue (git-fixes). - wifi: wilc1000: fix potential memory leak in wilc_mac_xmit() (git-fixes). - wifi: wl3501_cs: do not call kfree_skb() under spin_lock_irqsave() (git-fixes). - x86/hyperv: Introduce HV_MAX_SPARSE_VCPU_BANKS/HV_VCPUS_PER_SPARSE_BANK constants (git-fixes). - x86/xen: Fix memory leak in xen_init_lock_cpu() (git-fixes). - x86/xen: Fix memory leak in xen_smp_intr_init{_pv}() (git-fixes). - xen-netfront: Fix NULL sring after live migration (git-fixes). - xen-pciback: Allow setting PCI_MSIX_FLAGS_MASKALL too (git-fixes). - xen/arm: Fix race in RB-tree based P2M accounting (git-fixes) - xen/netback: do some code cleanup (git-fixes). - xen/netback: fix build warning (git-fixes). - xen/netfront: destroy queues before real_num_tx_queues is zeroed (git-fixes). - xen/platform-pci: add missing free_irq() in error path (git-fixes). - xen/privcmd: Fix a possible warning in privcmd_ioctl_mmap_resource() (git-fixes).
Patchnames: SUSE-2023-749,SUSE-SLE-Micro-5.3-2023-749,SUSE-SLE-Module-Live-Patching-15-SP4-2023-749,SUSE-SLE-Module-RT-15-SP4-2023-749,openSUSE-Leap-Micro-5.3-2023-749,openSUSE-SLE-15.4-2023-749
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
References
https://www.suse.com/support/security/rating/ external
https://ftp.suse.com/pub/projects/security/csaf/s… self
https://www.suse.com/support/update/announcement/… self
https://lists.suse.com/pipermail/sle-security-upd… self
https://bugzilla.suse.com/1177529 self
https://bugzilla.suse.com/1193629 self
https://bugzilla.suse.com/1197534 self
https://bugzilla.suse.com/1198438 self
https://bugzilla.suse.com/1200054 self
https://bugzilla.suse.com/1202633 self
https://bugzilla.suse.com/1203331 self
https://bugzilla.suse.com/1204363 self
https://bugzilla.suse.com/1204993 self
https://bugzilla.suse.com/1205544 self
https://bugzilla.suse.com/1205846 self
https://bugzilla.suse.com/1206103 self
https://bugzilla.suse.com/1206232 self
https://bugzilla.suse.com/1206935 self
https://bugzilla.suse.com/1207051 self
https://bugzilla.suse.com/1207270 self
https://bugzilla.suse.com/1207560 self
https://bugzilla.suse.com/1207845 self
https://bugzilla.suse.com/1207846 self
https://bugzilla.suse.com/1208212 self
https://bugzilla.suse.com/1208420 self
https://bugzilla.suse.com/1208449 self
https://bugzilla.suse.com/1208534 self
https://bugzilla.suse.com/1208541 self
https://bugzilla.suse.com/1208542 self
https://bugzilla.suse.com/1208570 self
https://bugzilla.suse.com/1208607 self
https://bugzilla.suse.com/1208628 self
https://bugzilla.suse.com/1208700 self
https://bugzilla.suse.com/1208741 self
https://bugzilla.suse.com/1208759 self
https://bugzilla.suse.com/1208776 self
https://bugzilla.suse.com/1208784 self
https://bugzilla.suse.com/1208787 self
https://bugzilla.suse.com/1208816 self
https://bugzilla.suse.com/1208837 self
https://bugzilla.suse.com/1208843 self
https://www.suse.com/security/cve/CVE-2022-3523/ self
https://www.suse.com/security/cve/CVE-2022-38096/ self
https://www.suse.com/security/cve/CVE-2023-0461/ self
https://www.suse.com/security/cve/CVE-2023-0597/ self
https://www.suse.com/security/cve/CVE-2023-1118/ self
https://www.suse.com/security/cve/CVE-2023-22995/ self
https://www.suse.com/security/cve/CVE-2023-22998/ self
https://www.suse.com/security/cve/CVE-2023-23000/ self
https://www.suse.com/security/cve/CVE-2023-23004/ self
https://www.suse.com/security/cve/CVE-2023-23559/ self
https://www.suse.com/security/cve/CVE-2023-25012/ self
https://www.suse.com/security/cve/CVE-2023-26545/ self
https://www.suse.com/security/cve/CVE-2022-3523 external
https://bugzilla.suse.com/1204363 external
https://www.suse.com/security/cve/CVE-2022-38096 external
https://bugzilla.suse.com/1203331 external
https://www.suse.com/security/cve/CVE-2023-0461 external
https://bugzilla.suse.com/1208787 external
https://bugzilla.suse.com/1208911 external
https://bugzilla.suse.com/1211833 external
https://bugzilla.suse.com/1217079 external
https://bugzilla.suse.com/1218514 external
https://www.suse.com/security/cve/CVE-2023-0597 external
https://bugzilla.suse.com/1207845 external
https://bugzilla.suse.com/1212395 external
https://bugzilla.suse.com/1213271 external
https://www.suse.com/security/cve/CVE-2023-1118 external
https://bugzilla.suse.com/1208837 external
https://bugzilla.suse.com/1208910 external
https://bugzilla.suse.com/1210423 external
https://bugzilla.suse.com/1211495 external
https://bugzilla.suse.com/1213841 external
https://bugzilla.suse.com/1213842 external
https://www.suse.com/security/cve/CVE-2023-22995 external
https://bugzilla.suse.com/1208741 external
https://www.suse.com/security/cve/CVE-2023-22998 external
https://bugzilla.suse.com/1208776 external
https://www.suse.com/security/cve/CVE-2023-23000 external
https://bugzilla.suse.com/1208816 external
https://www.suse.com/security/cve/CVE-2023-23004 external
https://bugzilla.suse.com/1208843 external
https://www.suse.com/security/cve/CVE-2023-23559 external
https://bugzilla.suse.com/1207051 external
https://www.suse.com/security/cve/CVE-2023-25012 external
https://bugzilla.suse.com/1207560 external
https://bugzilla.suse.com/1207846 external
https://www.suse.com/security/cve/CVE-2023-26545 external
https://bugzilla.suse.com/1208700 external
https://bugzilla.suse.com/1208909 external
https://bugzilla.suse.com/1210423 external

{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for the Linux Kernel",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "\nThe SUSE Linux Enterprise 15 SP4 RT kernel was updated to receive various security and bugfixes.\n\n- CVE-2022-3523: Fixed use after free related to device private page handling (bsc#1204363).\n- CVE-2022-38096: Fixed NULL-ptr deref in vmw_cmd_dx_define_query() (bsc#1203331).\n- CVE-2023-0461: Fixed use-after-free in icsk_ulp_data (bsc#1208787).\n- CVE-2023-0597: Fixed lack of randomization of  per-cpu entry area in x86/mm (bsc#1207845).\n- CVE-2023-1118: Fixed a use-after-free bugs caused by ene_tx_irqsim() in media/rc (bsc#1208837).\n- CVE-2023-22995: Fixed lacks of certain platform_device_put and kfree in drivers/usb/dwc3/dwc3-qcom.c (bsc#1208741).\n- CVE-2023-22998: Fixed misinterpretation of the irtio_gpu_object_shmem_init() return value (bsc#1208776).\n- CVE-2023-23000: Fixed return value of tegra_xusb_find_port_node function phy/tegra (bsc#1208816).\n- CVE-2023-23004: Fixed misinterpretation of the get_sg_table return value in arm/malidp_planes.c (bsc#1208843).\n- CVE-2023-23559: Fixed integer overflow in rndis_wlan that leads to a buffer overflow (bsc#1207051).\n- CVE-2023-25012: Fixed a use-After-Free in bigben_set_led() in hid (bsc#1207560).\n- CVE-2023-26545: Fixed double free in net/mpls/af_mpls.c upon an allocation failure (bsc#1208700).\n\nThe following non-security bugs were fixed:\n\n- [xen] fix \u0027direction\u0027 argument of iov_iter_kvec() (git-fixes).\n- acpi: NFIT: fix a potential deadlock during NFIT teardown (git-fixes).\n- acpi: battery: Fix missing NUL-termination with large strings (git-fixes).\n- acpica: Drop port I/O validation for some regions (git-fixes).\n- acpica: nsrepair: handle cases without a return value correctly (git-fixes).\n- alsa: hda/ca0132: minor fix for allocation size (git-fixes).\n- alsa: hda/conexant: add a new hda codec SN6180 (git-fixes).\n- alsa: hda/realtek - fixed wrong gpio assigned (git-fixes).\n- alsa: hda: Do not unset preset when cleaning up codec (git-fixes).\n- alsa: ice1712: Delete unreachable code in aureon_add_controls() (git-fixes).\n- alsa: ice1712: Do not left ice-\u003egpio_mutex locked in aureon_add_controls() (git-fixes).\n- applicom: Fix PCI device refcount leak in applicom_init() (git-fixes).\n- arm64: dts: amlogic: meson-sm1-odroid-hc4: fix active fan thermal trip (git-fixes).\n- arm64: dts: imx8m: Align SoC unique ID node unit address (git-fixes).\n- arm64: dts: mediatek: mt7622: Add missing pwm-cells to pwm node (git-fixes).\n- arm64: dts: mediatek: mt8183: Fix systimer 13 MHz clock description (git-fixes).\n- arm64: dts: meson-g12a: Fix internal Ethernet PHY unit name (git-fixes).\n- arm64: dts: meson-gx: Fix Ethernet MAC address unit name (git-fixes).\n- arm64: dts: meson-gx: Fix the SCPI DVFS node name and unit address (git-fixes).\n- arm64: dts: meson: bananapi-m5: switch VDDIO_C pin to OPEN_DRAIN (git-fixes).\n- arm64: dts: meson: remove CPU opps below 1GHz for G12A boards (git-fixes).\n- arm64: dts: mt8192: Fix CPU map for single-cluster SoC (git-fixes).\n- arm64: dts: qcom: ipq8074: correct Gen2 PCIe ranges (git-fixes).\n- arm64: dts: qcom: ipq8074: correct USB3 QMP PHY-s clock output names (git-fixes).\n- arm64: dts: qcom: ipq8074: fix Gen3 PCIe node (git-fixes).\n- arm64: dts: qcom: qcs404: use symbol names for PCIe resets (git-fixes).\n- arm64: dts: qcom: sc7180: correct SPMI bus address cells (git-fixes).\n- arm64: dts: qcom: sc7280: correct SPMI bus address cells (git-fixes).\n- arm64: dts: qcom: sdm845-db845c: fix audio codec interrupt pin name (git-fixes).\n- arm64: dts: qcom: sm8150-kumano: Panel framebuffer is 2.5k instead of 4k (git-fixes).\n- arm64: dts: renesas: beacon-renesom: Fix gpio expander reference (git-fixes).\n- arm64: dts: rockchip: drop unused LED mode property from rk3328-roc-cc (git-fixes).\n- arm64: dts: ti: k3-j7200: Fix wakeup pinmux range (git-fixes).\n- arm64: efi: Make efi_rt_lock a raw_spinlock (git-fixes).\n- arm: OMAP1: call platform_device_put() in error case in omap1_dm_timer_init() (git-fixes).\n- arm: OMAP2+: Fix memory leak in realtime_counter_init() (git-fixes).\n- arm: bcm2835_defconfig: Enable the framebuffer (git-fixes).\n- arm: dts: am5748: keep usb4_tm disabled (git-fixes)\n- arm: dts: exynos: correct HDMI phy compatible in Exynos4 (git-fixes).\n- arm: dts: exynos: correct TMU phandle in Exynos4 (git-fixes).\n- arm: dts: exynos: correct TMU phandle in Exynos4210 (git-fixes).\n- arm: dts: exynos: correct TMU phandle in Exynos5250 (git-fixes).\n- arm: dts: exynos: correct TMU phandle in Odroid HC1 (git-fixes).\n- arm: dts: exynos: correct TMU phandle in Odroid XU (git-fixes).\n- arm: dts: exynos: correct TMU phandle in Odroid XU3 family (git-fixes).\n- arm: dts: exynos: correct wr-active property in Exynos3250 Rinato (git-fixes).\n- arm: dts: imx7-colibri-eval-v3: correct can controller comment (git-fixes)\n- arm: dts: imx7s: correct iomuxc gpr mux controller cells (git-fixes).\n- arm: dts: qcom: msm8974: add required ranges to OCMEM (git-fixes)\n- arm: dts: qcom: sdx55: Add Qcom SMMU-500 as the fallback for IOMMU node (git-fixes).\n- arm: dts: rockchip: add power-domains property to dp node on rk3288 (git-fixes).\n- arm: dts: spear320-hmi: correct STMPE GPIO compatible (git-fixes).\n- arm: dts: stm32: add missing usbh clock and fix clk order on (git-fixes)\n- arm: dts: stm32: use usbphyc ck_usbo_48m as USBH OHCI clock on (git-fixes)\n- arm: dts: sun8i: nanopi-duo2: Fix regulator GPIO reference (git-fixes).\n- arm: imx: Call ida_simple_remove() for ida_simple_get (git-fixes).\n- arm: imx: rename DEBUG_IMX21_IMX27_UART to DEBUG_IMX27_UART (git-fixes)\n- arm: omap: remove debug-leds driver (git-fixes)\n- arm: remove some dead code (git-fixes)\n- arm: renumber bits related to _TIF_WORK_MASK (git-fixes)\n- arm: s3c: fix s3c64xx_set_timer_source prototype (git-fixes).\n- arm: shmobile: rcar-gen2: Add missing of_node_put() (git-fixes)\n- arm: zynq: Fix refcount leak in zynq_early_slcr_init (git-fixes).\n- ascpi / x86: Add support for LPS0 callback handler (git-fixes).\n- asoc: Intel: sof_cs42l42: always set dpcm_capture for amplifiers (git-fixes).\n- asoc: Intel: sof_rt5682: always set dpcm_capture for amplifiers (git-fixes).\n- asoc: adau7118: do not disable regulators on device unbind (git-fixes).\n- asoc: cs42l56: fix DT probe (git-fixes).\n- asoc: dt-bindings: meson: fix gx-card codec node regex (git-fixes).\n- asoc: mchp-spdifrx: Fix uninitialized use of mr in mchp_spdifrx_hw_params() (git-fixes).\n- asoc: mchp-spdifrx: disable all interrupts in mchp_spdifrx_dai_remove() (git-fixes).\n- asoc: mchp-spdifrx: fix controls which rely on rsr register (git-fixes).\n- asoc: rsnd: Remove unnecessary rsnd_dbg_dai_call() (git-fixes).\n- asoc: rsnd: fixup #endif position (git-fixes).\n- asoc: rt715-sdca: fix clock stop prepare timeout issue (git-fixes).\n- asoc: soc-compress.c: fixup private_data on snd_soc_new_compress() (git-fixes).\n- asoc: soc-dapm.h: fixup warning struct snd_pcm_substream not declared (git-fixes).\n- asoc: tlv320adcx140: fix \u0027ti,gpio-config\u0027 DT property init (git-fixes).\n- auxdisplay: hd44780: Fix potential memory leak in hd44780_remove() (git-fixes).\n- avoid deadlock for recursive I/O on dm-thin when used as swap (bsc#1177529).\n- backlight: backlight: Fix doc for backlight_device_get_by_name (git-fixes).\n- block: bio-integrity: Copy flags when bio_integrity_payload is cloned (bsc#1208541).\n- bluetooth: L2CAP: Fix potential user-after-free (git-fixes).\n- bluetooth: hci_qca: get wakeup status from serdev device handle (git-fixes).\n- cifs: Check the lease context if we actually got a lease (bsc#1193629).\n- cifs: Convert struct fealist away from 1-element array (bsc#1193629).\n- cifs: Fix lost destroy smbd connection when MR allocate failed (git-fixes).\n- cifs: Fix oops due to uncleared server-\u003esmbd_conn in reconnect (git-fixes).\n- cifs: Fix uninitialized memory read in smb3_qfs_tcon() (bsc#1193629).\n- cifs: Fix uninitialized memory reads for oparms.mode (bsc#1193629).\n- cifs: Fix use-after-free in rdata-\u003eread_into_pages() (git-fixes).\n- cifs: Fix warning and UAF when destroy the MR list (git-fixes).\n- cifs: Get rid of unneeded conditional in the smb2_get_aead_req() (bsc#1193629).\n- cifs: Replace remaining 1-element arrays (bsc#1193629).\n- cifs: Replace zero-length arrays with flexible-array members (bsc#1193629).\n- cifs: Use kstrtobool() instead of strtobool() (bsc#1193629).\n- cifs: do not try to use rdma offload on encrypted connections (bsc#1193629).\n- cifs: fix mount on old smb servers (boo#1206935).\n- cifs: get rid of dns resolve worker (bsc#1193629).\n- cifs: get rid of unneeded conditional in cifs_get_num_sgs() (bsc#1193629).\n- cifs: improve checking of DFS links over STATUS_OBJECT_NAME_INVALID (git-fixes).\n- cifs: introduce cifs_io_parms in smb2_async_writev() (bsc#1193629).\n- cifs: match even the scope id for ipv6 addresses (bsc#1193629).\n- cifs: prevent data race in cifs_reconnect_tcon() (bsc#1193629).\n- cifs: prevent data race in smb2_reconnect() (bsc#1193629).\n- cifs: print last update time for interface list (bsc#1193629).\n- cifs: remove unneeded 2bytes of padding from smb2 tree connect (bsc#1193629).\n- cifs: return a single-use cfid if we did not get a lease (bsc#1193629).\n- cifs: reuse cifs_match_ipaddr for comparison of dstaddr too (bsc#1193629).\n- cifs: split out smb3_use_rdma_offload() helper (bsc#1193629).\n- cifs: update ip_addr for ses only for primary chan setup (bsc#1193629).\n- cifs: use tcon allocation functions even for dummy tcon (git-fixes).\n- cifs: use the least loaded channel for sending requests (bsc#1193629).\n- clk: Honor CLK_OPS_PARENT_ENABLE in clk_core_is_enabled() (git-fixes).\n- clk: imx: avoid memory leak (git-fixes).\n- clk: mxl: Add option to override gate clks (git-fixes).\n- clk: mxl: Fix a clk entry by adding relevant flags (git-fixes).\n- clk: mxl: Remove redundant spinlocks (git-fixes).\n- clk: mxl: Switch from direct readl/writel based IO to regmap based IO (git-fixes).\n- clk: mxl: syscon_node_to_regmap() returns error pointers (git-fixes).\n- clk: qcom: gcc-qcs404: disable gpll[04]_out_aux parents (git-fixes).\n- clk: qcom: gcc-qcs404: fix names of the DSI clocks used as parents (git-fixes).\n- clk: ralink: fix \u0027mt7621_gate_is_enabled()\u0027 function (git-fixes).\n- clk: renesas: cpg-mssr: Fix use after free if cpg_mssr_common_init() failed (git-fixes).\n- clk: renesas: cpg-mssr: Remove superfluous check in resume code (git-fixes).\n- comedi: use menuconfig for main Comedi menu (git-fixes).\n- crypto: ccp - Avoid page allocation failure warning for SEV_GET_ID2 (git-fixes).\n- crypto: ccp - Failure on re-initialization due to duplicate sysfs filename (git-fixes).\n- crypto: crypto4xx - Call dma_unmap_page when done (git-fixes).\n- crypto: essiv - Handle EBUSY correctly (git-fixes).\n- crypto: qat - fix out-of-bounds read (git-fixes).\n- crypto: rsa-pkcs1pad - Use akcipher_request_complete (git-fixes).\n- crypto: seqiv - Handle EBUSY correctly (git-fixes).\n- crypto: x86/ghash - fix unaligned access in ghash_setkey() (git-fixes).\n- crypto: xts - Handle EBUSY correctly (git-fixes).\n- dmaengine: dw-axi-dmac: Do not dereference NULL structure (git-fixes).\n- dmaengine: dw-edma: Do not permit non-inc interleaved xfers (git-fixes).\n- dmaengine: dw-edma: Drop chancnt initialization (git-fixes).\n- dmaengine: dw-edma: Fix invalid interleaved xfers semantics (git-fixes).\n- dmaengine: dw-edma: Fix missing src/dst address of interleaved xfers (git-fixes).\n- dmaengine: dw-edma: Fix readq_ch() return value truncation (git-fixes).\n- dmaengine: idxd: Set traffic class values in GRPCFG on DSA 2.0 (git-fixes).\n- dmaengine: ptdma: check for null desc before calling pt_cmd_callback (git-fixes).\n- docs: ftrace: fix a issue with duplicated subtitle number (git-fixes).\n- docs: gdbmacros: print newest record (git-fixes).\n- documentation: simplify and clarify DCO contribution example language (git-fixes).\n- driver core: fix potential null-ptr-deref in device_add() (git-fixes).\n- driver core: fix resource leak in device_add() (git-fixes).\n- driver core: fw_devlink: Add DL_FLAG_CYCLE support to device links (git-fixes).\n- drivers: base: transport_class: fix possible memory leak (git-fixes).\n- drivers: base: transport_class: fix resource leak when transport_add_device() fails (git-fixes).\n- drm/amd/display: Properly handle additional cases where DCN is not supported (git-fixes).\n- drm/amd/display: reduce else-if to else in dcn10_blank_pixel_data() (git-fixes).\n- drm/amdgpu: fix enum odm_combine_mode mismatch (git-fixes).\n- drm/bridge: lt8912b: Add hot plug detection (git-fixes).\n- drm/bridge: lt9611: fix HPD reenablement (git-fixes).\n- drm/bridge: lt9611: fix clock calculation (git-fixes).\n- drm/bridge: lt9611: fix polarity programming (git-fixes).\n- drm/bridge: lt9611: fix programming of video modes (git-fixes).\n- drm/bridge: lt9611: fix sleep mode setup (git-fixes).\n- drm/bridge: lt9611: pass a pointer to the of node (git-fixes).\n- drm/bridge: megachips: Fix error handling in i2c_register_driver() (git-fixes).\n- drm/fourcc: Add missing big-endian XRGB1555 and RGB565 formats (git-fixes).\n- drm/hyperv : Removing the restruction of VRAM allocation with PCI bar size (git-fixes).\n- drm/hyperv: Fix an error handling path in hyperv_vmbus_probe() (git-fixes).\n- drm/i915/gen11: Moving WAs to icl_gt_workarounds_init() (git-fixes).\n- drm/i915/gen11: Wa_1408615072/Wa_1407596294 should be on GT list (git-fixes).\n- drm/i915: Do not use BAR mappings for ring buffers with LLC (git-fixes).\n- drm/mediatek: Clean dangling pointer on bind error path (git-fixes).\n- drm/mediatek: Drop unbalanced obj unref (git-fixes).\n- drm/mediatek: Use NULL instead of 0 for NULL pointer (git-fixes).\n- drm/mediatek: dsi: Reduce the time of dsi from LP11 to sending cmd (git-fixes).\n- drm/mediatek: mtk_drm_crtc: Add checks for devm_kcalloc (git-fixes).\n- drm/mipi-dsi: Fix byte order of 16-bit DCS set/get brightness (git-fixes).\n- drm/msm/adreno: Fix null ptr access in adreno_gpu_cleanup() (git-fixes).\n- drm/msm/dpu: Add check for cstate (git-fixes).\n- drm/msm/dpu: Add check for pstates (git-fixes).\n- drm/msm/dpu: Disallow unallocated resources to be returned (git-fixes).\n- drm/msm/dpu: drop stale comment from struct dpu_mdp_cfg doc (git-fixes).\n- drm/msm/dpu: set pdpu-\u003eis_rt_pipe early in dpu_plane_sspp_atomic_update() (git-fixes).\n- drm/msm/gem: Add check for kmalloc (git-fixes).\n- drm/msm/hdmi: Add missing check for alloc_ordered_workqueue (git-fixes).\n- drm/msm/mdp5: Add check for kzalloc (git-fixes).\n- drm/msm: clean event_thread-\u003eworker in case of an error (git-fixes).\n- drm/msm: use strscpy instead of strncpy (git-fixes).\n- drm/nouveau/devinit/tu102-: wait for GFW_BOOT_PROGRESS == COMPLETED (git-fixes).\n- drm/omapdrm: Remove unused struct csc_coef_rgb2yuv (git-fixes).\n- drm/vc4: hdmi: Correct interlaced timings again (git-fixes).\n- drm/vc4: hvs: Fix colour order for xRGB1555 on HVS5 (git-fixes).\n- drm/vc4: hvs: Set AXI panic modes (git-fixes).\n- drm/vc4: vec: Use pm_runtime_resume_and_get() in vc4_vec_encoder_enable() (git-fixes).\n- drm/vkms: Fix memory leak in vkms_init() (git-fixes).\n- drm/vkms: Fix null-ptr-deref in vkms_release() (git-fixes).\n- drm: Fix potential null-ptr-deref due to drmm_mode_config_init() (git-fixes).\n- drm: mxsfb: DRM_MXSFB should depend on ARCH_MXS || ARCH_MXC (git-fixes).\n- drm: tidss: Fix pixel format definition (git-fixes).\n- dt-bindings: arm: fsl: Fix bindings for APF28Dev board (git-fixes).\n- dt-bindings: hwlock: sun6i: Add missing #hwlock-cells (git-fixes).\n- dt-bindings: input: iqs626a: Redefine trackpad property types (git-fixes).\n- dt-bindings: msm: dsi-controller-main: Add vdd* descriptions back in (git-fixes).\n- dt-bindings: net: snps,dwmac: Fix snps,reset-delays-us dependency (git-fixes).\n- dt-bindings: power: supply: pm8941-coincell: Do not require charging properties (git-fixes).\n- dt-bindings: usb: amlogic,meson-g12a-usb-ctrl: make G12A usb3-phy0 optional (git-fixes).\n- eeprom: idt_89hpesx: Fix error handling in idt_init() (git-fixes).\n- firmware: coreboot: Remove GOOGLE_COREBOOT_TABLE_ACPI/OF Kconfig entries (git-fixes).\n- firmware: dmi-sysfs: Fix null-ptr-deref in dmi_sysfs_register_handle (git-fixes).\n- firmware: stratix10-svc: add missing gen_pool_destroy() in stratix10_svc_drv_probe() (git-fixes).\n- fuse: add inode/permission checks to fileattr_get/fileattr_set (bsc#1208759).\n- gpio: tegra186: remove unneeded loop in tegra186_gpio_init_route_mapping() (git-fixes).\n- gpio: vf610: connect GPIO label to dev name (git-fixes).\n- gpu: host1x: Do not skip assigning syncpoints to channels (git-fixes).\n- gpu: ipu-v3: common: Add of_node_put() for reference returned by of_graph_get_port_by_id() (git-fixes).\n- hid: asus: use spinlock to protect concurrent accesses (git-fixes).\n- hid: asus: use spinlock to safely schedule workers (git-fixes).\n- hid: bigben: use spinlock to protect concurrent accesses (git-fixes).\n- hid: bigben: use spinlock to safely schedule workers (git-fixes).\n- hid: bigben_probe(): validate report count (git-fixes).\n- hid: bigben_worker() remove unneeded check on report_field (git-fixes).\n- hid: core: Fix deadloop in hid_apply_multiplier (git-fixes).\n- hid: elecom: add support for TrackBall 056E:011C (git-fixes).\n- hv: fix comment typo in vmbus_channel/low_latency (git-fixes).\n- hv_netvsc: Allocate memory in netvsc_dma_map() with GFP_ATOMIC (git-fixes).\n- hv_netvsc: Check status in SEND_RNDIS_PKT completion message (git-fixes).\n- hwmon: (ftsteutates) Fix scaling of measurements (git-fixes).\n- hwmon: (ltc2945) Handle error case in ltc2945_value_store (git-fixes).\n- hwmon: (mlxreg-fan) Return zero speed for broken fan (git-fixes).\n- i2c: designware: fix i2c_dw_clk_rate() return size to be u32 (git-fixes).\n- iio: light: tsl2563: Do not hardcode interrupt trigger type (git-fixes).\n- input: ads7846 - always set last command to PWRDOWN (git-fixes).\n- input: ads7846 - do not check penirq immediately for 7845 (git-fixes).\n- input: ads7846 - do not report pressure for ads7845 (git-fixes).\n- input: iqs269a - configure device with a single block write (git-fixes).\n- input: iqs269a - drop unused device node references (git-fixes).\n- input: iqs269a - increase interrupt handler return delay (git-fixes).\n- input: iqs626a - drop unused device node references (git-fixes).\n- iommu/hyper-v: Allow hyperv irq remapping without x2apic (git-fixes).\n- irqchip/gic-v3: Refactor ISB + EOIR at ack time (git-fixes)\n- kabi fix for: nfs: Further optimisations for \u0027ls -l\u0027 (git-fixes).\n- kabi fix for: nfsd: Have legacy NFSD WRITE decoders use xdr_stream_subsegment() (git-fixes).\n- kabi fix for: nfsv3: handle out-of-order write replies (bsc#1205544).\n- kabi fix for: nfsv4.1 query for fs_location attr on a new file system (Never, kabi).\n- kmap_local: do not assume kmap PTEs are linear arrays in memory (git-fixes) Update config/armv7hl/default too.\n- leds: led-class: Add missing put_device() to led_put() (git-fixes).\n- leds: led-core: Fix refcount leak in of_led_get() (git-fixes).\n- lib/mpi: Fix buffer overrun when SG is too long (git-fixes).\n- lib/zlib: remove redundation assignement of avail_in dfltcc_gdht() (git-fixes).\n- locking/rwsem: Allow slowpath writer to ignore handoff bit if not set by first waiter (bsc#1207270).\n- locking/rwsem: Always try to wake waiters in out_nolock path (bsc#1207270).\n- locking/rwsem: Conditionally wake waiters in reader/writer slowpaths (bsc#1207270).\n- locking/rwsem: Disable preemption in all down_read*() and up_read() code paths (bsc#1207270).\n- locking/rwsem: Disable preemption in all down_write*() and up_write() code paths (bsc#1207270).\n- locking/rwsem: Disable preemption while trying for rwsem lock (bsc#1207270).\n- locking/rwsem: Make handoff bit handling more consistent (bsc#1207270).\n- locking/rwsem: No need to check for handoff bit if wait queue empty (bsc#1207270).\n- locking/rwsem: Prevent non-first waiter from spinning in down_write() slowpath (bsc#1207270).\n- locking: Add missing __sched attributes (bsc#1207270).\n- media: coda: Add check for dcoda_iram_alloc (git-fixes).\n- media: coda: Add check for kmalloc (git-fixes).\n- media: i2c: ov7670: 0 instead of -EINVAL was returned (git-fixes).\n- media: i2c: ov772x: Fix memleak in ov772x_probe() (git-fixes).\n- media: imx: imx7-media-csi: fix missing clk_disable_unprepare() in imx7_csi_init() (git-fixes).\n- media: ipu3-cio2: Fix PM runtime usage_count in driver unbind (git-fixes).\n- media: max9286: Fix memleak in max9286_v4l2_register() (git-fixes).\n- media: ov2740: Fix memleak in ov2740_init_controls() (git-fixes).\n- media: ov5675: Fix memleak in ov5675_init_controls() (git-fixes).\n- media: platform: ti: Add missing check for devm_regulator_get (git-fixes).\n- media: rc: Fix use-after-free bugs caused by ene_tx_irqsim() (git-fixes).\n- media: saa7134: Use video_unregister_device for radio_dev (git-fixes).\n- media: ti: cal: fix possible memory leak in cal_ctx_create() (git-fixes).\n- media: usb: siano: Fix use after free bugs caused by do_submit_urb (git-fixes).\n- media: uvcvideo: Fix race condition with usb_kill_urb (git-fixes).\n- media: v4l2-jpeg: correct the skip count in jpeg_parse_app14_data (git-fixes).\n- media: v4l2-jpeg: ignore the unknown APP14 marker (git-fixes).\n- mfd: cs5535: Do not build on UML (git-fixes).\n- mfd: pcf50633-adc: Fix potential memleak in pcf50633_adc_async_read() (git-fixes).\n- misc/mei/hdcp: Use correct macros to initialize uuid_le (git-fixes).\n- misc: enclosure: Fix doc for enclosure_find() (git-fixes).\n- mmc: jz4740: Work around bug on JZ4760(B) (git-fixes).\n- mmc: mmc_spi: fix error handling in mmc_spi_probe() (git-fixes).\n- mmc: sdio: fix possible resource leaks in some error paths (git-fixes).\n- move upstreamed i915 and media fixes into sorted section\n- mtd: dataflash: remove duplicate SPI ID table (git-fixes).\n- mtd: rawnand: fsl_elbc: Propagate HW ECC settings to HW (git-fixes).\n- mtd: rawnand: sunxi: Clean up chips after failed init (git-fixes).\n- mtd: rawnand: sunxi: Fix the size of the last OOB region (git-fixes).\n- mtd: spi-nor: Fix shift-out-of-bounds in spi_nor_set_erase_type (git-fixes).\n- mtd: spi-nor: core: fix implicit declaration warning (git-fixes).\n- mtd: spi-nor: sfdp: Fix index value for SCCR dwords (git-fixes).\n- mtd: spi-nor: spansion: Consider reserved bits in CFR5 register (git-fixes).\n- net/rose: Fix to not accept on connected socket (git-fixes).\n- net/sunrpc: fix reference count leaks in rpc_sysfs_xprt_state_change (git-fixes).\n- nfc: fix memory leak of se_io context in nfc_genl_se_io (git-fixes).\n- nfs: Always initialise fattr-\u003elabel in nfs_fattr_alloc() (git-fixes).\n- nfs: Create a new nfs_alloc_fattr_with_label() function (git-fixes).\n- nfs: Do not allocate nfs_fattr on the stack in __nfs42_ssc_open() (git-fixes).\n- nfs: Further optimisations for \u0027ls -l\u0027 (git-fixes).\n- nfs: nfs4clinet: check the return value of kstrdup() (git-fixes).\n- nfsd: COMMIT operations must not return NFS?ERR_INVAL (git-fixes).\n- nfsd: De-duplicate net_generic(nf-\u003enf_net, nfsd_net_id) (git-fixes).\n- nfsd: Fix nfsd_breaker_owns_lease() return values (git-fixes).\n- nfsd: Have legacy NFSD WRITE decoders use xdr_stream_subsegment() (git-fixes).\n- nfsv3: handle out-of-order write replies (bsc#1205544).\n- nfsv4 expose nfs_parse_server_name function (git-fixes).\n- nfsv4 handle port presence in fs_location server string (git-fixes).\n- nfsv4 only print the label when its queried (git-fixes).\n- nfsv4 remove zero number of fs_locations entries error check (git-fixes).\n- nfsv4 store server support for fs_location attribute (git-fixes).\n- nfsv4.1 query for fs_location attr on a new file system (git-fixes).\n- nfsv4.1: Fix uninitialised variable in devicenotify (git-fixes).\n- nfsv4.2: fix reference count leaks in _nfs42_proc_copy_notify() (git-fixes).\n- nfsv4: Protect the state recovery thread against direct reclaim (git-fixes).\n- nvme-auth: check chap ctrl_key once constructed (bsc#1202633).\n- nvme-auth: clear sensitive info right after authentication completes (bsc#1202633).\n- nvme-auth: convert dhchap_auth_list to an array (bsc#1202633).\n- nvme-auth: do not ignore key generation failures when initializing ctrl keys (bsc#1202633).\n- nvme-auth: do not keep long lived 4k dhchap buffer (bsc#1202633).\n- nvme-auth: do not override ctrl keys before validation (bsc#1202633).\n- nvme-auth: do not re-authenticate if the controller is not LIVE (bsc#1202633).\n- nvme-auth: do not use NVMe status codes (bsc#1202633).\n- nvme-auth: fix an error code in nvme_auth_process_dhchap_challenge() (bsc#1202633).\n- nvme-auth: fix smatch warning complaints (bsc#1202633).\n- nvme-auth: guarantee dhchap buffers under memory pressure (bsc#1202633).\n- nvme-auth: have dhchap_auth_work wait for queues auth to complete (bsc#1202633).\n- nvme-auth: mark nvme_auth_wq static (bsc#1202633).\n- nvme-auth: no need to reset chap contexts on re-authentication (bsc#1202633).\n- nvme-auth: remove redundant auth_work flush (bsc#1202633).\n- nvme-auth: remove redundant buffer deallocations (bsc#1202633).\n- nvme-auth: remove redundant deallocations (bsc#1202633).\n- nvme-auth: remove redundant if statement (bsc#1202633).\n- nvme-auth: remove symbol export from nvme_auth_reset (bsc#1202633).\n- nvme-auth: rename __nvme_auth_[reset|free] to nvme_auth[reset|free]_dhchap (bsc#1202633).\n- nvme-auth: rename authentication work elements (bsc#1202633).\n- nvme-auth: use workqueue dedicated to authentication (bsc#1202633).\n- nvme-fabrics: show well known discovery name (bsc#1200054).\n- ocfs2: Fix data corruption after failed write (bsc#1208542).\n- pci/ioc: Enlarge virtfn sysfs name buffer (git-fixes).\n- pci/pm: Observe reset delay irrespective of bridge_d3 (git-fixes).\n- pci: Fix dropping valid root bus resources with .end = zero (git-fixes).\n- pci: hotplug: Allow marking devices as disconnected during bind/unbind (git-fixes).\n- pci: hv: update comment in x86 specific hv_arch_irq_unmask (git-fixes).\n- pci: switchtec: Return -EFAULT for copy_to_user() errors (git-fixes).\n- phy: rockchip-typec: fix tcphy_get_mode error case (git-fixes).\n- pinctrl: mediatek: Initialize variable *buf to zero (git-fixes).\n- pinctrl: qcom: pinctrl-msm8976: Correct function names for wcss pins (git-fixes).\n- pinctrl: rockchip: Fix refcount leak in rockchip_pinctrl_parse_groups (git-fixes).\n- pinctrl: stm32: Fix refcount leak in stm32_pctrl_get_irq_domain (git-fixes).\n- platform/x86: ISST: PUNIT device mapping with Sub-NUMA clustering (bsc#1208420).\n- platform/x86: amd-pmc: Correct usage of SMU version (git-fixes).\n- platform/x86: amd-pmc: Export Idlemask values based on the APU (git-fixes).\n- platform/x86: amd-pmc: Fix compilation when CONFIG_DEBUGFS is disabled (git-fixes).\n- platform/x86: touchscreen_dmi: Add Chuwi Vi8 (CWI501) DMI match (git-fixes).\n- platform: x86: MLX_PLATFORM: select REGMAP instead of depending on it (git-fixes).\n- powercap: fix possible name leak in powercap_register_zone() (git-fixes).\n- powerpc/eeh: Set channel state after notifying the drivers (bsc#1208784 ltc#201612).\n- printf: fix errname.c list (git-fixes).\n- qede: avoid uninitialized entries in coal_entry array (bsc#1205846).\n- qede: fix interrupt coalescing configuration (bsc#1205846).\n- refresh patches.suse/ice-clear-stale-Tx-queue-settings-before-configuring.patch. Fix bug introduced by broken backport (bsc#1208628).\n- remoteproc/mtk_scp: Move clk ops outside send_lock (git-fixes).\n- remoteproc: qcom_q6v5_mss: Use a carveout to authenticate modem headers (git-fixes).\n- revert \u0027char: pcmcia: cm4000_cs: Replace mdelay with usleep_range in set_protocol\u0027 (git-fixes).\n- revert \u0027crypto: rsa-pkcs1pad - Replace GFP_ATOMIC with GFP_KERNEL in pkcs1pad_encrypt_sign_complete\u0027 (git-fixes).\n- revert \u0027hid: logitech-hidpp: add a module parameter to keep firmware gestures\u0027 (git-fixes).\n- revert \u0027usb: dwc3: qcom: Keep power domain on to retain controller status\u0027 (git-fixes).\n- rtc: allow rtc_read_alarm without read_alarm callback (git-fixes).\n- rtc: pm8xxx: fix set-alarm race (git-fixes).\n- rtc: sun6i: Always export the internal oscillator (git-fixes).\n- s390/dasd: Fix potential memleak in dasd_eckd_init() (git-fixes).\n- scsi: lpfc: Copyright updates for 14.2.0.10 patches (bsc#1208607).\n- scsi: lpfc: Exit PRLI completion handling early if ndlp not in PRLI_ISSUE state (bsc#1208607).\n- scsi: lpfc: Fix space indentation in lpfc_xcvr_data_show() (bsc#1208607).\n- scsi: lpfc: Fix use-after-free KFENCE violation during sysfs firmware write (bsc#1208607).\n- scsi: lpfc: Introduce new attention types for lpfc_sli4_async_fc_evt() handler (bsc#1208607).\n- scsi: lpfc: Reinitialize internal VMID data structures after FLOGI completion (bsc#1208607).\n- scsi: lpfc: Remove duplicate ndlp kref decrement in lpfc_cleanup_rpis() (bsc#1208607 bsc#1208534).\n- scsi: lpfc: Remove redundant clean up code in disable_vport() (bsc#1208607).\n- scsi: lpfc: Replace outdated strncpy() with strscpy() (bsc#1208607).\n- scsi: lpfc: Resolve miscellaneous variable set but not used compiler warnings (bsc#1208607).\n- scsi: lpfc: Set max DMA segment size to HBA supported SGE length (bsc#1208607).\n- scsi: lpfc: Update lpfc version to 14.2.0.10 (bsc#1208607).\n- scsi: qla2xxx: Add option to disable FC2 Target support (bsc#1198438 bsc#1206103).\n- scsi: qla2xxx: Check if port is online before sending ELS (bsc#1208570).\n- scsi: qla2xxx: Fix DMA-API call trace on NVMe LS requests (bsc#1208570).\n- scsi: qla2xxx: Fix IOCB resource check warning (bsc#1208570).\n- scsi: qla2xxx: Fix erroneous link down (bsc#1208570).\n- scsi: qla2xxx: Fix exchange oversubscription (bsc#1208570).\n- scsi: qla2xxx: Fix exchange oversubscription for management commands (bsc#1208570).\n- scsi: qla2xxx: Fix link failure in NPIV environment (bsc#1208570).\n- scsi: qla2xxx: Fix printk() format string (bsc#1208570).\n- scsi: qla2xxx: Fix stalled login (bsc#1208570).\n- scsi: qla2xxx: Make qla_trim_buf() and __qla_adjust_buf() static (bsc#1208570).\n- scsi: qla2xxx: Relocate/rename vp map (bsc#1208570).\n- scsi: qla2xxx: Remove dead code (GNN ID) (bsc#1208570).\n- scsi: qla2xxx: Remove dead code (GPNID) (bsc#1208570).\n- scsi: qla2xxx: Remove dead code (bsc#1208570).\n- scsi: qla2xxx: Remove increment of interface err cnt (bsc#1208570).\n- scsi: qla2xxx: Remove the unused variable wwn (bsc#1208570).\n- scsi: qla2xxx: Remove unintended flag clearing (bsc#1208570).\n- scsi: qla2xxx: Select qpair depending on which CPU post_cmd() gets called (bsc#1208570).\n- scsi: qla2xxx: Simplify if condition evaluation (bsc#1208570).\n- scsi: qla2xxx: Update version to 10.02.08.100-k (bsc#1208570).\n- scsi: qla2xxx: Update version to 10.02.08.200-k (bsc#1208570).\n- scsi: qla2xxx: Use a variable for repeated mem_size computation (bsc#1208570).\n- scsi: qla2xxx: edif: Fix clang warning (bsc#1208570).\n- scsi: qla2xxx: edif: Fix performance dip due to lock contention (bsc#1208570).\n- scsi: qla2xxx: edif: Fix stall session after app start (bsc#1208570).\n- scsi: qla2xxx: edif: Reduce memory usage during low I/O (bsc#1208570).\n- sefltests: netdevsim: wait for devlink instance after netns removal (git-fixes).\n- selftest/lkdtm: Skip stack-entropy test if lkdtm is not available (git-fixes).\n- selftests/ftrace: Add check for ping command for trigger tests (bsc#1204993 ltc#200103).\n- selftests/ftrace: Convert tracer tests to use \u0027requires\u0027 to specify program dependency (bsc#1204993 ltc#200103).\n- selftests/powerpc: Account for offline cpus in perf-hwbreak test (bsc#1206232).\n- selftests/powerpc: Bump up rlimit for perf-hwbreak test (bsc#1206232).\n- selftests/powerpc: Move perror closer to its use (bsc#1206232).\n- serial: fsl_lpuart: fix RS485 RTS polariy inverse issue (git-fixes).\n- serial: tegra: Add missing clk_disable_unprepare() in tegra_uart_hw_init() (git-fixes).\n- smb3: Replace smb2pdu 1-element arrays with flex-arrays (bsc#1193629).\n- soundwire: cadence: Do not overflow the command FIFOs (git-fixes).\n- spi: bcm63xx-hsspi: Endianness fix for ARM based SoC (git-fixes).\n- spi: synquacer: Fix timeout handling in synquacer_spi_transfer_one() (git-fixes).\n- spi: tegra210-quad: Fix validate combined sequence (git-fixes).\n- staging: mt7621-dts: change palmbus address to lower case (git-fixes).\n- struct uvc_device move flush_status new member to end (git-fixes).\n- sunrpc allow for unspecified transport time in rpc_clnt_add_xprt (git-fixes).\n- sunrpc: Fix potential race conditions in rpc_sysfs_xprt_state_change() (git-fixes).\n- sunrpc: Fix socket waits for write buffer space (git-fixes).\n- thermal/drivers/hisi: Drop second sensor hi3660 (git-fixes).\n- thermal/drivers/tsens: Drop msm8976-specific defines (git-fixes).\n- thermal/drivers/tsens: Sort out msm8976 vs msm8956 data (git-fixes).\n- thermal/drivers/tsens: fix slope values for msm8939 (git-fixes).\n- thermal/drivers/tsens: limit num_sensors to 9 for msm8939 (git-fixes).\n- thermal: intel: BXT_PMIC: select REGMAP instead of depending on it (git-fixes).\n- thermal: intel: powerclamp: Fix cur_state for multi package system (git-fixes).\n- thermal: intel: quark_dts: fix error pointer dereference (git-fixes).\n- tty: serial: fsl_lpuart: Fix the wrong RXWATER setting for rx dma case (git-fixes).\n- tty: serial: fsl_lpuart: clear LPUART Status Register in lpuart32_shutdown() (git-fixes).\n- tty: serial: fsl_lpuart: disable Rx/Tx DMA in lpuart32_shutdown() (git-fixes).\n- tty: serial: qcom-geni-serial: stop operations in progress at shutdown (git-fixes).\n- update internal module version number for cifs.ko (bsc#1193629).\n- usb: core: Do not hold device lock while reading the \u0027descriptors\u0027 sysfs file (git-fixes).\n- usb: dwc3: core: Host wake up support from system suspend (git-fixes).\n- usb: dwc3: pci: add support for the Intel Meteor Lake-M (git-fixes).\n- usb: dwc3: qcom: Configure wakeup interrupts during suspend (git-fixes).\n- usb: dwc3: qcom: Fix memory leak in dwc3_qcom_interconnect_init (git-fixes).\n- usb: dwc3: qcom: Keep power domain on to retain controller status (git-fixes).\n- usb: dwc3: qcom: clean up icc init (git-fixes).\n- usb: dwc3: qcom: clean up suspend callbacks (git-fixes).\n- usb: dwc3: qcom: fix gadget-only builds (git-fixes).\n- usb: dwc3: qcom: fix peripheral and OTG suspend (git-fixes).\n- usb: dwc3: qcom: fix wakeup implementation (git-fixes).\n- usb: dwc3: qcom: only parse \u0027maximum-speed\u0027 once (git-fixes).\n- usb: dwc3: qcom: suppress unused-variable warning (git-fixes).\n- usb: early: xhci-dbc: Fix a potential out-of-bound memory access (git-fixes).\n- usb: gadget: fusb300_udc: free irq on the error path in fusb300_probe() (git-fixes).\n- usb: gadget: u_serial: Add null pointer check in gserial_resume (git-fixes).\n- usb: max-3421: Fix setting of I/O pins (git-fixes).\n- usb: musb: Add and use inline function musb_otg_state_string (git-fixes).\n- usb: musb: Add and use inline functions musb_{get,set}_state (git-fixes).\n- usb: musb: mediatek: do not unregister something that wasn\u0027t registered (git-fixes).\n- usb: musb: remove schedule work called after flush (git-fixes).\n- usb: serial: option: add support for VW/Skoda \u0027Carstick LTE\u0027 (git-fixes).\n- vc_screen: do not clobber return value in vcs_read (git-fixes).\n- vc_screen: modify vcs_size() handling in vcs_read() (git-fixes).\n- vdpa_sim: not reset state in vdpasim_queue_ready (git-fixes).\n- vfs: filename_create(): fix incorrect intent (bsc#1197534).\n- virt/sev-guest: Add a MODULE_ALIAS (bsc#1208449).\n- virt/sev-guest: Prevent IV reuse in the SNP guest driver (bsc#1208449).\n- virt/sev-guest: Remove unnecessary free in init_crypto() (bsc#1208449).\n- virt: sev-guest: Pass the appropriate argument type to iounmap() (bsc#1208449).\n- virt: sevguest: Change driver name to reflect generic SEV support (bsc#1208449).\n- virt: sevguest: Rename the sevguest dir and files to sev-guest (bsc#1208449).\n- vmci: check context-\u003enotify_page after call to get_user_pages_fast() to avoid GPF (git-fixes).\n- vmxnet3: move rss code block under eop descriptor (bsc#1208212).\n- watchdog: Fix kmemleak in watchdog_cdev_register (git-fixes).\n- watchdog: at91sam9_wdt: use devm_request_irq to avoid missing free_irq() in error path (git-fixes).\n- watchdog: pcwd_usb: Fix attempting to access uninitialized memory (git-fixes).\n- watchdog: sbsa_wdog: Make sure the timeout programming is within the limits (git-fixes).\n- wifi: ath11k: Fix memory leak in ath11k_peer_rx_frag_setup (git-fixes).\n- wifi: ath11k: allow system suspend to survive ath11k (git-fixes).\n- wifi: ath9k: Fix potential stack-out-of-bounds write in ath9k_wmi_rsp_callback() (git-fixes).\n- wifi: ath9k: htc_hst: free skb in ath9k_htc_rx_msg() if there is no callback function (git-fixes).\n- wifi: brcmfmac: fix potential memory leak in brcmf_netdev_start_xmit() (git-fixes).\n- wifi: brcmfmac: unmap dma buffer in brcmf_msgbuf_alloc_pktid() (git-fixes).\n- wifi: cfg80211: Fix extended KCK key length check in nl80211_set_rekey_data() (git-fixes).\n- wifi: cfg80211: Fix use after free for wext (git-fixes).\n- wifi: ipw2200: fix memory leak in ipw_wdev_init() (git-fixes).\n- wifi: ipw2x00: do not call dev_kfree_skb() under spin_lock_irqsave() (git-fixes).\n- wifi: iwl3945: Add missing check for create_singlethread_workqueue (git-fixes).\n- wifi: iwl4965: Add missing check for create_singlethread_workqueue() (git-fixes).\n- wifi: iwlegacy: common: do not call dev_kfree_skb() under spin_lock_irqsave() (git-fixes).\n- wifi: libertas: cmdresp: do not call kfree_skb() under spin_lock_irqsave() (git-fixes).\n- wifi: libertas: fix memory leak in lbs_init_adapter() (git-fixes).\n- wifi: libertas: if_usb: do not call kfree_skb() under spin_lock_irqsave() (git-fixes).\n- wifi: libertas: main: do not call kfree_skb() under spin_lock_irqsave() (git-fixes).\n- wifi: libertas_tf: do not call kfree_skb() under spin_lock_irqsave() (git-fixes).\n- wifi: mac80211: make rate u32 in sta_set_rate_info_rx() (git-fixes).\n- wifi: mwifiex: Add missing compatible string for SD8787 (git-fixes).\n- wifi: mwifiex: fix loop iterator in mwifiex_update_ampdu_txwinsize() (git-fixes).\n- wifi: orinoco: check return value of hermes_write_wordrec() (git-fixes).\n- wifi: rsi: Fix memory leak in rsi_coex_attach() (git-fixes).\n- wifi: rtl8xxxu: Fix memory leaks with RTL8723BU, RTL8192EU (git-fixes).\n- wifi: rtl8xxxu: do not call dev_kfree_skb() under spin_lock_irqsave() (git-fixes).\n- wifi: rtlwifi: Fix global-out-of-bounds bug in _rtl8812ae_phy_set_txpower_limit() (git-fixes).\n- wifi: rtlwifi: rtl8188ee: do not call kfree_skb() under spin_lock_irqsave() (git-fixes).\n- wifi: rtlwifi: rtl8723be: do not call kfree_skb() under spin_lock_irqsave() (git-fixes).\n- wifi: rtlwifi: rtl8821ae: do not call kfree_skb() under spin_lock_irqsave() (git-fixes).\n- wifi: rtw89: Add missing check for alloc_workqueue (git-fixes).\n- wifi: wilc1000: fix potential memory leak in wilc_mac_xmit() (git-fixes).\n- wifi: wl3501_cs: do not call kfree_skb() under spin_lock_irqsave() (git-fixes).\n- x86/hyperv: Introduce HV_MAX_SPARSE_VCPU_BANKS/HV_VCPUS_PER_SPARSE_BANK constants (git-fixes).\n- x86/xen: Fix memory leak in xen_init_lock_cpu() (git-fixes).\n- x86/xen: Fix memory leak in xen_smp_intr_init{_pv}() (git-fixes).\n- xen-netfront: Fix NULL sring after live migration (git-fixes).\n- xen-pciback: Allow setting PCI_MSIX_FLAGS_MASKALL too (git-fixes).\n- xen/arm: Fix race in RB-tree based P2M accounting (git-fixes)\n- xen/netback: do some code cleanup (git-fixes).\n- xen/netback: fix build warning (git-fixes).\n- xen/netfront: destroy queues before real_num_tx_queues is zeroed (git-fixes).\n- xen/platform-pci: add missing free_irq() in error path (git-fixes).\n- xen/privcmd: Fix a possible warning in privcmd_ioctl_mmap_resource() (git-fixes).\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "SUSE-2023-749,SUSE-SLE-Micro-5.3-2023-749,SUSE-SLE-Module-Live-Patching-15-SP4-2023-749,SUSE-SLE-Module-RT-15-SP4-2023-749,openSUSE-Leap-Micro-5.3-2023-749,openSUSE-SLE-15.4-2023-749",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_0749-2.json"
      },
      {
        "category": "self",
        "summary": "URL for SUSE-SU-2023:0749-2",
        "url": "https://www.suse.com/support/update/announcement/2023/suse-su-20230749-2/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for SUSE-SU-2023:0749-2",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-June/015093.html"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1177529",
        "url": "https://bugzilla.suse.com/1177529"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1193629",
        "url": "https://bugzilla.suse.com/1193629"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1197534",
        "url": "https://bugzilla.suse.com/1197534"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1198438",
        "url": "https://bugzilla.suse.com/1198438"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1200054",
        "url": "https://bugzilla.suse.com/1200054"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202633",
        "url": "https://bugzilla.suse.com/1202633"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203331",
        "url": "https://bugzilla.suse.com/1203331"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1204363",
        "url": "https://bugzilla.suse.com/1204363"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1204993",
        "url": "https://bugzilla.suse.com/1204993"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1205544",
        "url": "https://bugzilla.suse.com/1205544"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1205846",
        "url": "https://bugzilla.suse.com/1205846"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1206103",
        "url": "https://bugzilla.suse.com/1206103"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1206232",
        "url": "https://bugzilla.suse.com/1206232"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1206935",
        "url": "https://bugzilla.suse.com/1206935"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1207051",
        "url": "https://bugzilla.suse.com/1207051"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1207270",
        "url": "https://bugzilla.suse.com/1207270"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1207560",
        "url": "https://bugzilla.suse.com/1207560"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1207845",
        "url": "https://bugzilla.suse.com/1207845"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1207846",
        "url": "https://bugzilla.suse.com/1207846"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1208212",
        "url": "https://bugzilla.suse.com/1208212"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1208420",
        "url": "https://bugzilla.suse.com/1208420"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1208449",
        "url": "https://bugzilla.suse.com/1208449"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1208534",
        "url": "https://bugzilla.suse.com/1208534"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1208541",
        "url": "https://bugzilla.suse.com/1208541"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1208542",
        "url": "https://bugzilla.suse.com/1208542"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1208570",
        "url": "https://bugzilla.suse.com/1208570"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1208607",
        "url": "https://bugzilla.suse.com/1208607"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1208628",
        "url": "https://bugzilla.suse.com/1208628"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1208700",
        "url": "https://bugzilla.suse.com/1208700"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1208741",
        "url": "https://bugzilla.suse.com/1208741"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1208759",
        "url": "https://bugzilla.suse.com/1208759"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1208776",
        "url": "https://bugzilla.suse.com/1208776"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1208784",
        "url": "https://bugzilla.suse.com/1208784"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1208787",
        "url": "https://bugzilla.suse.com/1208787"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1208816",
        "url": "https://bugzilla.suse.com/1208816"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1208837",
        "url": "https://bugzilla.suse.com/1208837"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1208843",
        "url": "https://bugzilla.suse.com/1208843"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-3523 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-3523/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-38096 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-38096/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-0461 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-0461/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-0597 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-0597/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-1118 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-1118/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-22995 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-22995/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-22998 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-22998/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-23000 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-23000/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-23004 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-23004/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-23559 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-23559/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-25012 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-25012/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-26545 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-26545/"
      }
    ],
    "title": "Security update for the Linux Kernel",
    "tracking": {
      "current_release_date": "2023-03-20T13:27:20Z",
      "generator": {
        "date": "2023-03-20T13:27:20Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "SUSE-SU-2023:0749-2",
      "initial_release_date": "2023-03-20T13:27:20Z",
      "revision_history": [
        {
          "date": "2023-03-20T13:27:20Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-livepatch-5_14_21-150400_15_14-rt-1-150400.1.3.1.x86_64",
                "product": {
                  "name": "kernel-livepatch-5_14_21-150400_15_14-rt-1-150400.1.3.1.x86_64",
                  "product_id": "kernel-livepatch-5_14_21-150400_15_14-rt-1-150400.1.3.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Live Patching 15 SP4",
                "product": {
                  "name": "SUSE Linux Enterprise Live Patching 15 SP4",
                  "product_id": "SUSE Linux Enterprise Live Patching 15 SP4",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp4"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-5_14_21-150400_15_14-rt-1-150400.1.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP4",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_14-rt-1-150400.1.3.1.x86_64"
        },
        "product_reference": "kernel-livepatch-5_14_21-150400_15_14-rt-1-150400.1.3.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP4"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2022-3523",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-3523"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A vulnerability was found in Linux Kernel. It has been classified as problematic. Affected is an unknown function of the file mm/memory.c of the component Driver Handler. The manipulation leads to use after free. It is possible to launch the attack remotely. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211020.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_14-rt-1-150400.1.3.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-3523",
          "url": "https://www.suse.com/security/cve/CVE-2022-3523"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1204363 for CVE-2022-3523",
          "url": "https://bugzilla.suse.com/1204363"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_14-rt-1-150400.1.3.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_14-rt-1-150400.1.3.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2023-03-20T13:27:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-3523"
    },
    {
      "cve": "CVE-2022-38096",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-38096"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A NULL pointer dereference vulnerability was found in vmwgfx driver in drivers/gpu/vmxgfx/vmxgfx_execbuf.c in GPU component of Linux kernel with device file \u0027/dev/dri/renderD128 (or Dxxx)\u0027. This flaw allows a local attacker with a user account on the system to gain privilege, causing a denial of service(DoS).",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_14-rt-1-150400.1.3.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-38096",
          "url": "https://www.suse.com/security/cve/CVE-2022-38096"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1203331 for CVE-2022-38096",
          "url": "https://bugzilla.suse.com/1203331"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_14-rt-1-150400.1.3.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_14-rt-1-150400.1.3.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2023-03-20T13:27:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-38096"
    },
    {
      "cve": "CVE-2023-0461",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-0461"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "There is a use-after-free vulnerability in the Linux Kernel which can be exploited to achieve local privilege escalation. To reach the vulnerability kernel configuration flag CONFIG_TLS  or CONFIG_XFRM_ESPINTCP  has to be configured, but the operation does not require any privilege.\n\nThere is a use-after-free bug of icsk_ulp_data  of a struct inet_connection_sock.\n\nWhen CONFIG_TLS  is enabled, user can install a tls context (struct tls_context) on a connected tcp socket. The context is not cleared if this socket is disconnected and reused as a listener. If a new socket is created from the listener, the context is inherited and vulnerable.\n\nThe setsockopt  TCP_ULP  operation does not require any privilege.\n\nWe recommend upgrading past commit  2c02d41d71f90a5168391b6a5f2954112ba2307c",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_14-rt-1-150400.1.3.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-0461",
          "url": "https://www.suse.com/security/cve/CVE-2023-0461"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1208787 for CVE-2023-0461",
          "url": "https://bugzilla.suse.com/1208787"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1208911 for CVE-2023-0461",
          "url": "https://bugzilla.suse.com/1208911"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1211833 for CVE-2023-0461",
          "url": "https://bugzilla.suse.com/1211833"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1217079 for CVE-2023-0461",
          "url": "https://bugzilla.suse.com/1217079"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1218514 for CVE-2023-0461",
          "url": "https://bugzilla.suse.com/1218514"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_14-rt-1-150400.1.3.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_14-rt-1-150400.1.3.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2023-03-20T13:27:20Z",
          "details": "important"
        }
      ],
      "title": "CVE-2023-0461"
    },
    {
      "cve": "CVE-2023-0597",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-0597"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw possibility of memory leak in the Linux kernel cpu_entry_area mapping of X86 CPU data to memory was found in the way user can guess location of exception stack(s) or other important data. A local user could use this flaw to get access to some important data with expected location in memory.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_14-rt-1-150400.1.3.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-0597",
          "url": "https://www.suse.com/security/cve/CVE-2023-0597"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1207845 for CVE-2023-0597",
          "url": "https://bugzilla.suse.com/1207845"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1212395 for CVE-2023-0597",
          "url": "https://bugzilla.suse.com/1212395"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1213271 for CVE-2023-0597",
          "url": "https://bugzilla.suse.com/1213271"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_14-rt-1-150400.1.3.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_14-rt-1-150400.1.3.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2023-03-20T13:27:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-0597"
    },
    {
      "cve": "CVE-2023-1118",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-1118"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw use after free in the Linux kernel integrated infrared receiver/transceiver driver was found in the way user detaching rc device. A local user could use this flaw to crash the system or potentially escalate their privileges on the system.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_14-rt-1-150400.1.3.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-1118",
          "url": "https://www.suse.com/security/cve/CVE-2023-1118"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1208837 for CVE-2023-1118",
          "url": "https://bugzilla.suse.com/1208837"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1208910 for CVE-2023-1118",
          "url": "https://bugzilla.suse.com/1208910"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1210423 for CVE-2023-1118",
          "url": "https://bugzilla.suse.com/1210423"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1211495 for CVE-2023-1118",
          "url": "https://bugzilla.suse.com/1211495"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1213841 for CVE-2023-1118",
          "url": "https://bugzilla.suse.com/1213841"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1213842 for CVE-2023-1118",
          "url": "https://bugzilla.suse.com/1213842"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_14-rt-1-150400.1.3.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_14-rt-1-150400.1.3.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2023-03-20T13:27:20Z",
          "details": "important"
        }
      ],
      "title": "CVE-2023-1118"
    },
    {
      "cve": "CVE-2023-22995",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-22995"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel before 5.17, an error path in dwc3_qcom_acpi_register_core in drivers/usb/dwc3/dwc3-qcom.c lacks certain platform_device_put and kfree calls.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_14-rt-1-150400.1.3.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-22995",
          "url": "https://www.suse.com/security/cve/CVE-2023-22995"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1208741 for CVE-2023-22995",
          "url": "https://bugzilla.suse.com/1208741"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_14-rt-1-150400.1.3.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_14-rt-1-150400.1.3.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2023-03-20T13:27:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-22995"
    },
    {
      "cve": "CVE-2023-22998",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-22998"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel before 6.0.3, drivers/gpu/drm/virtio/virtgpu_object.c misinterprets the drm_gem_shmem_get_sg_table return value (expects it to be NULL in the error case, whereas it is actually an error pointer).",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_14-rt-1-150400.1.3.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-22998",
          "url": "https://www.suse.com/security/cve/CVE-2023-22998"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1208776 for CVE-2023-22998",
          "url": "https://bugzilla.suse.com/1208776"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_14-rt-1-150400.1.3.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_14-rt-1-150400.1.3.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2023-03-20T13:27:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-22998"
    },
    {
      "cve": "CVE-2023-23000",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-23000"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel before 5.17, drivers/phy/tegra/xusb.c mishandles the tegra_xusb_find_port_node return value. Callers expect NULL in the error case, but an error pointer is used.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_14-rt-1-150400.1.3.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-23000",
          "url": "https://www.suse.com/security/cve/CVE-2023-23000"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1208816 for CVE-2023-23000",
          "url": "https://bugzilla.suse.com/1208816"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_14-rt-1-150400.1.3.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 2.9,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_14-rt-1-150400.1.3.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2023-03-20T13:27:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-23000"
    },
    {
      "cve": "CVE-2023-23004",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-23004"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel before 5.19, drivers/gpu/drm/arm/malidp_planes.c misinterprets the get_sg_table return value (expects it to be NULL in the error case, whereas it is actually an error pointer).",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_14-rt-1-150400.1.3.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-23004",
          "url": "https://www.suse.com/security/cve/CVE-2023-23004"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1208843 for CVE-2023-23004",
          "url": "https://bugzilla.suse.com/1208843"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_14-rt-1-150400.1.3.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_14-rt-1-150400.1.3.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2023-03-20T13:27:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-23004"
    },
    {
      "cve": "CVE-2023-23559",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-23559"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In rndis_query_oid in drivers/net/wireless/rndis_wlan.c in the Linux kernel through 6.1.5, there is an integer overflow in an addition.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_14-rt-1-150400.1.3.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-23559",
          "url": "https://www.suse.com/security/cve/CVE-2023-23559"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1207051 for CVE-2023-23559",
          "url": "https://bugzilla.suse.com/1207051"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_14-rt-1-150400.1.3.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_14-rt-1-150400.1.3.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2023-03-20T13:27:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-23559"
    },
    {
      "cve": "CVE-2023-25012",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-25012"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The Linux kernel through 6.1.9 has a Use-After-Free in bigben_remove in drivers/hid/hid-bigbenff.c via a crafted USB device because the LED controllers remain registered for too long.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_14-rt-1-150400.1.3.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-25012",
          "url": "https://www.suse.com/security/cve/CVE-2023-25012"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1207560 for CVE-2023-25012",
          "url": "https://bugzilla.suse.com/1207560"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1207846 for CVE-2023-25012",
          "url": "https://bugzilla.suse.com/1207846"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_14-rt-1-150400.1.3.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.8,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_14-rt-1-150400.1.3.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2023-03-20T13:27:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-25012"
    },
    {
      "cve": "CVE-2023-26545",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-26545"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel before 6.1.13, there is a double free in net/mpls/af_mpls.c upon an allocation failure (for registering the sysctl table under a new location) during the renaming of a device.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_14-rt-1-150400.1.3.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-26545",
          "url": "https://www.suse.com/security/cve/CVE-2023-26545"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1208700 for CVE-2023-26545",
          "url": "https://bugzilla.suse.com/1208700"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1208909 for CVE-2023-26545",
          "url": "https://bugzilla.suse.com/1208909"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1210423 for CVE-2023-26545",
          "url": "https://bugzilla.suse.com/1210423"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_14-rt-1-150400.1.3.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_15_14-rt-1-150400.1.3.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2023-03-20T13:27:20Z",
          "details": "important"
        }
      ],
      "title": "CVE-2023-26545"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…