File _patchinfo of Package patchinfo.41485

<patchinfo incident="41485">
  <issue tracker="bnc" id="1065729">[trackerbug] 4.12 powerpc base kernel fixes</issue>
  <issue tracker="bnc" id="1199304">defragfs.ocfs2 triggered kernel crash</issue>
  <issue tracker="bnc" id="1205128">VUL-0: CVE-2022-43945: kernel-source-azure,kernel-source,kernel-source-rt: nfsd: buffer overflow due to incorrect calculation of send buffer size</issue>
  <issue tracker="bnc" id="1206893">[PATCH] ext4: fix uninititialized value in 'ext4_evict_inode'</issue>
  <issue tracker="bnc" id="1210124">SLES 15 SP3 NFS Server rsize bug upon update to kernel 5.3.18-150300.59.106.1</issue>
  <issue tracker="bnc" id="1247317">VUL-0: CVE-2025-38476: kernel: rpl: Fix use-after-free in rpl_do_srh_inline().</issue>
  <issue tracker="bnc" id="1249186">Relax KABI checks on archs/flavors without KABI</issue>
  <issue tracker="bnc" id="1249857">VUL-0: CVE-2022-50334: kernel: hugetlbfs: fix null-ptr-deref in hugetlbfs_parse_param()</issue>
  <issue tracker="bnc" id="1249859">VUL-0: CVE-2022-50327: kernel: ACPI: processor: idle: Check acpi_fetch_acpi_dev() return value</issue>
  <issue tracker="bnc" id="1249988">VUL-0: CVE-2023-53365: kernel: ip6mr: Fix skb_under_panic in ip6mr_cache_report()</issue>
  <issue tracker="bnc" id="1250293">VUL-0: CVE-2022-50388: kernel: nvme: fix multipath crash caused by flush request when blktrace is enabled</issue>
  <issue tracker="bnc" id="1250311">VUL-0: CVE-2023-53282: kernel: scsi: lpfc: Fix use-after-free KFENCE violation during sysfs firmware write</issue>
  <issue tracker="bnc" id="1250358">VUL-0: CVE-2023-53395: kernel: ACPICA: Add AML_NO_OPERAND_RESOLVE flag to Timer</issue>
  <issue tracker="bnc" id="1250742">VUL-0: CVE-2025-39898: kernel: e1000e: fix heap overflow in e1000_set_eeprom</issue>
  <issue tracker="bnc" id="1250784">VUL-0: CVE-2022-50423: kernel: ACPICA: Fix use-after-free in acpi_ut_copy_ipackage_to_ipackage()</issue>
  <issue tracker="bnc" id="1250816">VUL-0: CVE-2023-53500: kernel: xfrm: fix slab-use-after-free in decode_session6</issue>
  <issue tracker="bnc" id="1250851">VUL-0: CVE-2022-50432: kernel: kernfs: fix use-after-free in __kernfs_remove</issue>
  <issue tracker="bnc" id="1250946">kernel-source 6.17.0 does not build without debug</issue>
  <issue tracker="bnc" id="1251040">VUL-0: CVE-2023-53566: kernel: netfilter: nft_set_rbtree: fix null deref on element insertion</issue>
  <issue tracker="bnc" id="1251047">VUL-0: CVE-2022-50480: kernel: memory: pl353-smc: Fix refcount leak bug in pl353_smc_probe()</issue>
  <issue tracker="bnc" id="1251052">VUL-0: CVE-2023-53559: kernel: ip_vti: fix potential slab-use-after-free in decode_session6</issue>
  <issue tracker="bnc" id="1251072">VUL-0: CVE-2023-53564: kernel: ocfs2: fix defrag path triggering jbd2 ASSERT</issue>
  <issue tracker="bnc" id="1251088">VUL-0: CVE-2022-50493: kernel: scsi: qla2xxx: Fix crash when I/O abort times out</issue>
  <issue tracker="bnc" id="1251091">VUL-0: CVE-2022-50496: kernel: dm cache: Fix UAF in destroy()</issue>
  <issue tracker="bnc" id="1251115">VUL-0: CVE-2022-50484: kernel: ALSA: usb-audio: Fix potential memory leaks</issue>
  <issue tracker="bnc" id="1251169">VUL-0: CVE-2022-50489: kernel: drm/mipi-dsi: Detach devices when removing the host</issue>
  <issue tracker="bnc" id="1251173">VUL-0: CVE-2022-50494: kernel: thermal: intel_powerclamp: Use get_cpu() instead of smp_processor_id() to avoid crash</issue>
  <issue tracker="bnc" id="1251182">VUL-0: CVE-2022-50504: kernel: powerpc/rtas: avoid scheduling in rtas_os_term()</issue>
  <issue tracker="bnc" id="1251201">VUL-0: CVE-2022-50488: kernel: block, bfq: fix possible uaf for 'bfqq-&gt;bic'</issue>
  <issue tracker="bnc" id="1251202">VUL-0: CVE-2022-50470: kernel: xhci: Remove device endpoints from bandwidth list when freeing the device</issue>
  <issue tracker="bnc" id="1251208">VUL-0: CVE-2022-50487: kernel: NFSD: Protect against send buffer overflow in NFSv3 READDIR</issue>
  <issue tracker="bnc" id="1251222">VUL-0: CVE-2023-53574: kernel: wifi: rtw88: delete timer and free skb queue when unloading</issue>
  <issue tracker="bnc" id="1251292">VUL-0: CVE-2022-50534: kernel: dm thin: Use last transaction's pmd-&gt;root when commit failed</issue>
  <issue tracker="bnc" id="1251300">VUL-0: CVE-2022-50532: kernel: scsi: mpt3sas: Fix possible resource leaks in mpt3sas_transport_port_add()</issue>
  <issue tracker="bnc" id="1251550">VUL-0: CVE-2022-50549: kernel: dm thin: Fix ABBA deadlock between shrink_slab and dm_pool_abort_metadata</issue>
  <issue tracker="bnc" id="1251723">VUL-0: CVE-2022-50546: kernel: ext4: fix uninititialized value in 'ext4_evict_inode'</issue>
  <issue tracker="bnc" id="1251725">VUL-0: CVE-2022-50544: kernel: usb: host: xhci: Fix potential memory leak in xhci_alloc_stream_info()</issue>
  <issue tracker="bnc" id="1251730">VUL-0: CVE-2022-50513: kernel: staging: rtl8723bs: fix a potential memory leak in rtw_init_cmd_priv()</issue>
  <issue tracker="bnc" id="1251741">VUL-0: CVE-2022-50516: kernel: fs: dlm: fix invalid derefence of sb_lvbptr</issue>
  <issue tracker="bnc" id="1251743">VUL-0: CVE-2023-53619: kernel: netfilter: conntrack: Avoid nf_ct_helper_hash uses after free</issue>
  <issue tracker="bnc" id="1251747">Drop non-x86 architectures on SLE15 SP2</issue>
  <issue tracker="bnc" id="1251763">VUL-0: CVE-2023-53673: kernel: Bluetooth: hci_event: call disconnect callback before deleting conn</issue>
  <issue tracker="bnc" id="1251930">kernel-default-base fails to load after patch with SUSE-SLE-Product-SLES-15-SP2-LTSS-TERADATA-2025-41034</issue>
  <issue tracker="bnc" id="1252035">VUL-0: CVE-2025-39973: kernel: i40e: add validation for ring_len param</issue>
  <issue tracker="bnc" id="1252047">VUL-0: CVE-2025-39968: kernel: i40e: add max boundary check for VF filters</issue>
  <issue tracker="bnc" id="1252480">VUL-0: CVE-2022-50563: kernel: dm thin: Fix UAF in run_timer_softirq()</issue>
  <issue tracker="bnc" id="1252499">VUL-0: CVE-2023-53722: kernel: md: raid1: fix potential OOB in raid1_remove_disk()</issue>
  <issue tracker="bnc" id="1252516">VUL-0: CVE-2022-50574: kernel: drm/omap: dss: Fix refcount leak bugs</issue>
  <issue tracker="bnc" id="1252554">VUL-0: CVE-2023-53705: kernel: ipv6: Fix out-of-bounds access in ipv6_find_tlv()</issue>
  <issue tracker="bnc" id="1252688">VUL-0: CVE-2025-40018: kernel: ipvs: Defer ip_vs_ftp unregister during netns cleanup</issue>
  <issue tracker="bnc" id="1252775">VUL-0: CVE-2025-40082: kernel: hfsplus: fix slab-out-of-bounds read in hfsplus_uni2asc()</issue>
  <issue tracker="cve" id="2022-43945"/>
  <issue tracker="cve" id="2022-50327"/>
  <issue tracker="cve" id="2022-50334"/>
  <issue tracker="cve" id="2022-50388"/>
  <issue tracker="cve" id="2022-50423"/>
  <issue tracker="cve" id="2022-50432"/>
  <issue tracker="cve" id="2022-50470"/>
  <issue tracker="cve" id="2022-50480"/>
  <issue tracker="cve" id="2022-50484"/>
  <issue tracker="cve" id="2022-50487"/>
  <issue tracker="cve" id="2022-50488"/>
  <issue tracker="cve" id="2022-50489"/>
  <issue tracker="cve" id="2022-50493"/>
  <issue tracker="cve" id="2022-50494"/>
  <issue tracker="cve" id="2022-50496"/>
  <issue tracker="cve" id="2022-50504"/>
  <issue tracker="cve" id="2022-50513"/>
  <issue tracker="cve" id="2022-50516"/>
  <issue tracker="cve" id="2022-50532"/>
  <issue tracker="cve" id="2022-50534"/>
  <issue tracker="cve" id="2022-50544"/>
  <issue tracker="cve" id="2022-50546"/>
  <issue tracker="cve" id="2022-50549"/>
  <issue tracker="cve" id="2022-50563"/>
  <issue tracker="cve" id="2022-50574"/>
  <issue tracker="cve" id="2023-53282"/>
  <issue tracker="cve" id="2023-53365"/>
  <issue tracker="cve" id="2023-53395"/>
  <issue tracker="cve" id="2023-53500"/>
  <issue tracker="cve" id="2023-53559"/>
  <issue tracker="cve" id="2023-53564"/>
  <issue tracker="cve" id="2023-53566"/>
  <issue tracker="cve" id="2023-53574"/>
  <issue tracker="cve" id="2023-53619"/>
  <issue tracker="cve" id="2023-53673"/>
  <issue tracker="cve" id="2023-53705"/>
  <issue tracker="cve" id="2023-53722"/>
  <issue tracker="cve" id="2025-38476"/>
  <issue tracker="cve" id="2025-39968"/>
  <issue tracker="cve" id="2025-39973"/>
  <issue tracker="cve" id="2025-40018"/>
  <issue tracker="cve" id="2025-40082"/>
  <issue tracker="jsc" id="PED-4593"/>
  <issue tracker="jsc" id="PED-568"/>
  <category>security</category>
  <rating>important</rating>
  <packager>alix82</packager>
  <reboot_needed/>
<!-- inserted by gitlab@gitlab.suse.de:security/tools.git//home/securitybot/src/sectools/auto_maintenance.pl -->
<releasetarget project="SUSE:Updates:Storage:7.1:x86_64"/>
<releasetarget project="SUSE:Updates:Storage:7.1:aarch64"/>
<releasetarget project="SUSE:Updates:SUSE-MicroOS:5.2:x86_64"/>
<releasetarget project="SUSE:Updates:SUSE-MicroOS:5.2:s390x"/>
<releasetarget project="SUSE:Updates:SUSE-MicroOS:5.2:aarch64"/>
<releasetarget project="SUSE:Updates:SLE-Product-SLES_SAP:15-SP3:x86_64"/>
<releasetarget project="SUSE:Updates:SLE-Product-SLES_SAP:15-SP3:ppc64le"/>
<releasetarget project="SUSE:Updates:SLE-Product-SLES:15-SP3-LTSS:x86_64"/>
<releasetarget project="SUSE:Updates:SLE-Product-SLES:15-SP3-LTSS:s390x"/>
<releasetarget project="SUSE:Updates:SLE-Product-SLES:15-SP3-LTSS:ppc64le"/>
<releasetarget project="SUSE:Updates:SLE-Product-SLES:15-SP3-LTSS:aarch64"/>
<releasetarget project="SUSE:Updates:SLE-Product-HPC:15-SP3-LTSS:x86_64"/>
<releasetarget project="SUSE:Updates:SLE-Product-HPC:15-SP3-LTSS:aarch64"/>
<releasetarget project="SUSE:Updates:SLE-Product-HA:15-SP3:x86_64"/>
<releasetarget project="SUSE:Updates:SLE-Product-HA:15-SP3:s390x"/>
<releasetarget project="SUSE:Updates:SLE-Product-HA:15-SP3:ppc64le"/>
<releasetarget project="SUSE:Updates:SLE-Product-HA:15-SP3:aarch64"/>
<releasetarget project="SUSE:Updates:SLE-Module-Development-Tools-OBS:15-SP6:x86_64"/>
<releasetarget project="SUSE:Updates:SLE-Module-Development-Tools-OBS:15-SP6:aarch64"/>
<releasetarget project="SUSE:SLE-15-SP3:Update"/>
  <summary>Security update for the Linux Kernel</summary>
  <description>
The SUSE Linux Enterprise 15 SP3 kernel was updated to fix various security issues

The following security issues were fixed:

- CVE-2022-50327: ACPI: processor: idle: Check acpi_fetch_acpi_dev() return value (bsc#1249859).
- CVE-2022-50334: hugetlbfs: fix null-ptr-deref in hugetlbfs_parse_param() (bsc#1249857).
- CVE-2022-50388: nvme: fix multipath crash caused by flush request when blktrace is enabled (bsc#1250293).
- CVE-2022-50423: ACPICA: Fix use-after-free in acpi_ut_copy_ipackage_to_ipackage() (bsc#1250784).
- CVE-2022-50432: kernfs: fix use-after-free in __kernfs_remove (bsc#1250851).
- CVE-2022-50488: block, bfq: fix possible uaf for 'bfqq-&gt;bic' (bsc#1251201).
- CVE-2022-50516: fs: dlm: fix invalid derefence of sb_lvbptr (bsc#1251741).
- CVE-2023-53282: scsi: lpfc: Fix use-after-free KFENCE violation during sysfs firmware write (bsc#1250311).
- CVE-2023-53365: ip6mr: Fix skb_under_panic in ip6mr_cache_report() (bsc#1249988).
- CVE-2023-53395: ACPICA: Add AML_NO_OPERAND_RESOLVE flag to Timer (bsc#1250358).
- CVE-2023-53500: xfrm: fix slab-use-after-free in decode_session6 (bsc#1250816).
- CVE-2023-53559: ip_vti: fix potential slab-use-after-free in decode_session6 (bsc#1251052).
- CVE-2023-53574: wifi: rtw88: delete timer and free skb queue when unloading (bsc#1251222).
- CVE-2023-53619: netfilter: conntrack: Avoid nf_ct_helper_hash uses after free (bsc#1251743).
- CVE-2023-53673: Bluetooth: hci_event: call disconnect callback before deleting conn (bsc#1251763).
- CVE-2023-53705: ipv6: Fix out-of-bounds access in ipv6_find_tlv() (bsc#1252554).
- CVE-2023-53722: md: raid1: fix potential OOB in raid1_remove_disk() (bsc#1252499).
- CVE-2025-38476: rpl: Fix use-after-free in rpl_do_srh_inline() (bsc#1247317).
- CVE-2025-39968: i40e: add max boundary check for VF filters (bsc#1252047).
- CVE-2025-39973: i40e: add validation for ring_len param (bsc#1252035).
- CVE-2025-40018: ipvs: Defer ip_vs_ftp unregister during netns cleanup (bsc#1252688).
</description>
</patchinfo>
openSUSE Build Service is sponsored by