File _patchinfo of Package patchinfo.41485
<patchinfo incident="41485"> <issue tracker="bnc" id="1065729">[trackerbug] 4.12 powerpc base kernel fixes</issue> <issue tracker="bnc" id="1199304">defragfs.ocfs2 triggered kernel crash</issue> <issue tracker="bnc" id="1205128">VUL-0: CVE-2022-43945: kernel-source-azure,kernel-source,kernel-source-rt: nfsd: buffer overflow due to incorrect calculation of send buffer size</issue> <issue tracker="bnc" id="1206893">[PATCH] ext4: fix uninititialized value in 'ext4_evict_inode'</issue> <issue tracker="bnc" id="1210124">SLES 15 SP3 NFS Server rsize bug upon update to kernel 5.3.18-150300.59.106.1</issue> <issue tracker="bnc" id="1247317">VUL-0: CVE-2025-38476: kernel: rpl: Fix use-after-free in rpl_do_srh_inline().</issue> <issue tracker="bnc" id="1249186">Relax KABI checks on archs/flavors without KABI</issue> <issue tracker="bnc" id="1249857">VUL-0: CVE-2022-50334: kernel: hugetlbfs: fix null-ptr-deref in hugetlbfs_parse_param()</issue> <issue tracker="bnc" id="1249859">VUL-0: CVE-2022-50327: kernel: ACPI: processor: idle: Check acpi_fetch_acpi_dev() return value</issue> <issue tracker="bnc" id="1249988">VUL-0: CVE-2023-53365: kernel: ip6mr: Fix skb_under_panic in ip6mr_cache_report()</issue> <issue tracker="bnc" id="1250293">VUL-0: CVE-2022-50388: kernel: nvme: fix multipath crash caused by flush request when blktrace is enabled</issue> <issue tracker="bnc" id="1250311">VUL-0: CVE-2023-53282: kernel: scsi: lpfc: Fix use-after-free KFENCE violation during sysfs firmware write</issue> <issue tracker="bnc" id="1250358">VUL-0: CVE-2023-53395: kernel: ACPICA: Add AML_NO_OPERAND_RESOLVE flag to Timer</issue> <issue tracker="bnc" id="1250742">VUL-0: CVE-2025-39898: kernel: e1000e: fix heap overflow in e1000_set_eeprom</issue> <issue tracker="bnc" id="1250784">VUL-0: CVE-2022-50423: kernel: ACPICA: Fix use-after-free in acpi_ut_copy_ipackage_to_ipackage()</issue> <issue tracker="bnc" id="1250816">VUL-0: CVE-2023-53500: kernel: xfrm: fix slab-use-after-free in decode_session6</issue> <issue tracker="bnc" id="1250851">VUL-0: CVE-2022-50432: kernel: kernfs: fix use-after-free in __kernfs_remove</issue> <issue tracker="bnc" id="1250946">kernel-source 6.17.0 does not build without debug</issue> <issue tracker="bnc" id="1251040">VUL-0: CVE-2023-53566: kernel: netfilter: nft_set_rbtree: fix null deref on element insertion</issue> <issue tracker="bnc" id="1251047">VUL-0: CVE-2022-50480: kernel: memory: pl353-smc: Fix refcount leak bug in pl353_smc_probe()</issue> <issue tracker="bnc" id="1251052">VUL-0: CVE-2023-53559: kernel: ip_vti: fix potential slab-use-after-free in decode_session6</issue> <issue tracker="bnc" id="1251072">VUL-0: CVE-2023-53564: kernel: ocfs2: fix defrag path triggering jbd2 ASSERT</issue> <issue tracker="bnc" id="1251088">VUL-0: CVE-2022-50493: kernel: scsi: qla2xxx: Fix crash when I/O abort times out</issue> <issue tracker="bnc" id="1251091">VUL-0: CVE-2022-50496: kernel: dm cache: Fix UAF in destroy()</issue> <issue tracker="bnc" id="1251115">VUL-0: CVE-2022-50484: kernel: ALSA: usb-audio: Fix potential memory leaks</issue> <issue tracker="bnc" id="1251169">VUL-0: CVE-2022-50489: kernel: drm/mipi-dsi: Detach devices when removing the host</issue> <issue tracker="bnc" id="1251173">VUL-0: CVE-2022-50494: kernel: thermal: intel_powerclamp: Use get_cpu() instead of smp_processor_id() to avoid crash</issue> <issue tracker="bnc" id="1251182">VUL-0: CVE-2022-50504: kernel: powerpc/rtas: avoid scheduling in rtas_os_term()</issue> <issue tracker="bnc" id="1251201">VUL-0: CVE-2022-50488: kernel: block, bfq: fix possible uaf for 'bfqq->bic'</issue> <issue tracker="bnc" id="1251202">VUL-0: CVE-2022-50470: kernel: xhci: Remove device endpoints from bandwidth list when freeing the device</issue> <issue tracker="bnc" id="1251208">VUL-0: CVE-2022-50487: kernel: NFSD: Protect against send buffer overflow in NFSv3 READDIR</issue> <issue tracker="bnc" id="1251222">VUL-0: CVE-2023-53574: kernel: wifi: rtw88: delete timer and free skb queue when unloading</issue> <issue tracker="bnc" id="1251292">VUL-0: CVE-2022-50534: kernel: dm thin: Use last transaction's pmd->root when commit failed</issue> <issue tracker="bnc" id="1251300">VUL-0: CVE-2022-50532: kernel: scsi: mpt3sas: Fix possible resource leaks in mpt3sas_transport_port_add()</issue> <issue tracker="bnc" id="1251550">VUL-0: CVE-2022-50549: kernel: dm thin: Fix ABBA deadlock between shrink_slab and dm_pool_abort_metadata</issue> <issue tracker="bnc" id="1251723">VUL-0: CVE-2022-50546: kernel: ext4: fix uninititialized value in 'ext4_evict_inode'</issue> <issue tracker="bnc" id="1251725">VUL-0: CVE-2022-50544: kernel: usb: host: xhci: Fix potential memory leak in xhci_alloc_stream_info()</issue> <issue tracker="bnc" id="1251730">VUL-0: CVE-2022-50513: kernel: staging: rtl8723bs: fix a potential memory leak in rtw_init_cmd_priv()</issue> <issue tracker="bnc" id="1251741">VUL-0: CVE-2022-50516: kernel: fs: dlm: fix invalid derefence of sb_lvbptr</issue> <issue tracker="bnc" id="1251743">VUL-0: CVE-2023-53619: kernel: netfilter: conntrack: Avoid nf_ct_helper_hash uses after free</issue> <issue tracker="bnc" id="1251747">Drop non-x86 architectures on SLE15 SP2</issue> <issue tracker="bnc" id="1251763">VUL-0: CVE-2023-53673: kernel: Bluetooth: hci_event: call disconnect callback before deleting conn</issue> <issue tracker="bnc" id="1251930">kernel-default-base fails to load after patch with SUSE-SLE-Product-SLES-15-SP2-LTSS-TERADATA-2025-41034</issue> <issue tracker="bnc" id="1252035">VUL-0: CVE-2025-39973: kernel: i40e: add validation for ring_len param</issue> <issue tracker="bnc" id="1252047">VUL-0: CVE-2025-39968: kernel: i40e: add max boundary check for VF filters</issue> <issue tracker="bnc" id="1252480">VUL-0: CVE-2022-50563: kernel: dm thin: Fix UAF in run_timer_softirq()</issue> <issue tracker="bnc" id="1252499">VUL-0: CVE-2023-53722: kernel: md: raid1: fix potential OOB in raid1_remove_disk()</issue> <issue tracker="bnc" id="1252516">VUL-0: CVE-2022-50574: kernel: drm/omap: dss: Fix refcount leak bugs</issue> <issue tracker="bnc" id="1252554">VUL-0: CVE-2023-53705: kernel: ipv6: Fix out-of-bounds access in ipv6_find_tlv()</issue> <issue tracker="bnc" id="1252688">VUL-0: CVE-2025-40018: kernel: ipvs: Defer ip_vs_ftp unregister during netns cleanup</issue> <issue tracker="bnc" id="1252775">VUL-0: CVE-2025-40082: kernel: hfsplus: fix slab-out-of-bounds read in hfsplus_uni2asc()</issue> <issue tracker="cve" id="2022-43945"/> <issue tracker="cve" id="2022-50327"/> <issue tracker="cve" id="2022-50334"/> <issue tracker="cve" id="2022-50388"/> <issue tracker="cve" id="2022-50423"/> <issue tracker="cve" id="2022-50432"/> <issue tracker="cve" id="2022-50470"/> <issue tracker="cve" id="2022-50480"/> <issue tracker="cve" id="2022-50484"/> <issue tracker="cve" id="2022-50487"/> <issue tracker="cve" id="2022-50488"/> <issue tracker="cve" id="2022-50489"/> <issue tracker="cve" id="2022-50493"/> <issue tracker="cve" id="2022-50494"/> <issue tracker="cve" id="2022-50496"/> <issue tracker="cve" id="2022-50504"/> <issue tracker="cve" id="2022-50513"/> <issue tracker="cve" id="2022-50516"/> <issue tracker="cve" id="2022-50532"/> <issue tracker="cve" id="2022-50534"/> <issue tracker="cve" id="2022-50544"/> <issue tracker="cve" id="2022-50546"/> <issue tracker="cve" id="2022-50549"/> <issue tracker="cve" id="2022-50563"/> <issue tracker="cve" id="2022-50574"/> <issue tracker="cve" id="2023-53282"/> <issue tracker="cve" id="2023-53365"/> <issue tracker="cve" id="2023-53395"/> <issue tracker="cve" id="2023-53500"/> <issue tracker="cve" id="2023-53559"/> <issue tracker="cve" id="2023-53564"/> <issue tracker="cve" id="2023-53566"/> <issue tracker="cve" id="2023-53574"/> <issue tracker="cve" id="2023-53619"/> <issue tracker="cve" id="2023-53673"/> <issue tracker="cve" id="2023-53705"/> <issue tracker="cve" id="2023-53722"/> <issue tracker="cve" id="2025-38476"/> <issue tracker="cve" id="2025-39968"/> <issue tracker="cve" id="2025-39973"/> <issue tracker="cve" id="2025-40018"/> <issue tracker="cve" id="2025-40082"/> <issue tracker="jsc" id="PED-4593"/> <issue tracker="jsc" id="PED-568"/> <category>security</category> <rating>important</rating> <packager>alix82</packager> <reboot_needed/> <!-- inserted by gitlab@gitlab.suse.de:security/tools.git//home/securitybot/src/sectools/auto_maintenance.pl --> <releasetarget project="SUSE:Updates:Storage:7.1:x86_64"/> <releasetarget project="SUSE:Updates:Storage:7.1:aarch64"/> <releasetarget project="SUSE:Updates:SUSE-MicroOS:5.2:x86_64"/> <releasetarget project="SUSE:Updates:SUSE-MicroOS:5.2:s390x"/> <releasetarget project="SUSE:Updates:SUSE-MicroOS:5.2:aarch64"/> <releasetarget project="SUSE:Updates:SLE-Product-SLES_SAP:15-SP3:x86_64"/> <releasetarget project="SUSE:Updates:SLE-Product-SLES_SAP:15-SP3:ppc64le"/> <releasetarget project="SUSE:Updates:SLE-Product-SLES:15-SP3-LTSS:x86_64"/> <releasetarget project="SUSE:Updates:SLE-Product-SLES:15-SP3-LTSS:s390x"/> <releasetarget project="SUSE:Updates:SLE-Product-SLES:15-SP3-LTSS:ppc64le"/> <releasetarget project="SUSE:Updates:SLE-Product-SLES:15-SP3-LTSS:aarch64"/> <releasetarget project="SUSE:Updates:SLE-Product-HPC:15-SP3-LTSS:x86_64"/> <releasetarget project="SUSE:Updates:SLE-Product-HPC:15-SP3-LTSS:aarch64"/> <releasetarget project="SUSE:Updates:SLE-Product-HA:15-SP3:x86_64"/> <releasetarget project="SUSE:Updates:SLE-Product-HA:15-SP3:s390x"/> <releasetarget project="SUSE:Updates:SLE-Product-HA:15-SP3:ppc64le"/> <releasetarget project="SUSE:Updates:SLE-Product-HA:15-SP3:aarch64"/> <releasetarget project="SUSE:Updates:SLE-Module-Development-Tools-OBS:15-SP6:x86_64"/> <releasetarget project="SUSE:Updates:SLE-Module-Development-Tools-OBS:15-SP6:aarch64"/> <releasetarget project="SUSE:SLE-15-SP3:Update"/> <summary>Security update for the Linux Kernel</summary> <description> The SUSE Linux Enterprise 15 SP3 kernel was updated to fix various security issues The following security issues were fixed: - CVE-2022-50327: ACPI: processor: idle: Check acpi_fetch_acpi_dev() return value (bsc#1249859). - CVE-2022-50334: hugetlbfs: fix null-ptr-deref in hugetlbfs_parse_param() (bsc#1249857). - CVE-2022-50388: nvme: fix multipath crash caused by flush request when blktrace is enabled (bsc#1250293). - CVE-2022-50423: ACPICA: Fix use-after-free in acpi_ut_copy_ipackage_to_ipackage() (bsc#1250784). - CVE-2022-50432: kernfs: fix use-after-free in __kernfs_remove (bsc#1250851). - CVE-2022-50488: block, bfq: fix possible uaf for 'bfqq->bic' (bsc#1251201). - CVE-2022-50516: fs: dlm: fix invalid derefence of sb_lvbptr (bsc#1251741). - CVE-2023-53282: scsi: lpfc: Fix use-after-free KFENCE violation during sysfs firmware write (bsc#1250311). - CVE-2023-53365: ip6mr: Fix skb_under_panic in ip6mr_cache_report() (bsc#1249988). - CVE-2023-53395: ACPICA: Add AML_NO_OPERAND_RESOLVE flag to Timer (bsc#1250358). - CVE-2023-53500: xfrm: fix slab-use-after-free in decode_session6 (bsc#1250816). - CVE-2023-53559: ip_vti: fix potential slab-use-after-free in decode_session6 (bsc#1251052). - CVE-2023-53574: wifi: rtw88: delete timer and free skb queue when unloading (bsc#1251222). - CVE-2023-53619: netfilter: conntrack: Avoid nf_ct_helper_hash uses after free (bsc#1251743). - CVE-2023-53673: Bluetooth: hci_event: call disconnect callback before deleting conn (bsc#1251763). - CVE-2023-53705: ipv6: Fix out-of-bounds access in ipv6_find_tlv() (bsc#1252554). - CVE-2023-53722: md: raid1: fix potential OOB in raid1_remove_disk() (bsc#1252499). - CVE-2025-38476: rpl: Fix use-after-free in rpl_do_srh_inline() (bsc#1247317). - CVE-2025-39968: i40e: add max boundary check for VF filters (bsc#1252047). - CVE-2025-39973: i40e: add validation for ring_len param (bsc#1252035). - CVE-2025-40018: ipvs: Defer ip_vs_ftp unregister during netns cleanup (bsc#1252688). </description> </patchinfo>