File _patchinfo of Package patchinfo.39882
<patchinfo incident="39882">
<issue id="1206051" tracker="bnc">ceph: avoid putting the realm twice when decoding snaps fails</issue>
<issue id="1221829" tracker="bnc">VUL-0: CVE-2024-26643: kernel: netfilter: nf_tables: mark set as dead when unbinding anonymous set with timeout</issue>
<issue id="1233551" tracker="bnc">VUL-0: CVE-2024-53057: kernel: net/sched: stop qdisc_tree_reduce_backlog on TC_H_ROOT</issue>
<issue id="1234480" tracker="bnc">network usb adapters get ethX names instead of usbX</issue>
<issue id="1234863" tracker="bnc">VUL-0: CVE-2024-53164: kernel: net: sched: fix ordering of qlen adjustment</issue>
<issue id="1236104" tracker="bnc">VUL-0: CVE-2023-52923: kernel: netfilter: nf_tables: adapt set backend to use GC transaction API</issue>
<issue id="1236333" tracker="bnc">VUL-0: CVE-2024-57947: kernel: netfilter: nf_set_pipapo: fix initial map fill</issue>
<issue id="1238160" tracker="bnc">VUL-0: CVE-2022-49138: kernel: Bluetooth: hci_event: Ignore multiple conn complete events</issue>
<issue id="1239644" tracker="bnc">VUL-0: CVE-2023-52927: kernel: netfilter: allow exp not to be removed in nf_ct_find_expectation</issue>
<issue id="1242417" tracker="bnc">VUL-0: CVE-2025-37797: kernel: net_sched: hfsc: Fix a UAF vulnerability in class handling</issue>
<issue id="1244523" tracker="bnc">L3: Possible poor network performance on Broadcom NIC BCM57508 NetXtreme-E with 5.14.21-150500.55.103</issue>
<issue id="1245217" tracker="bnc">VUL-0: CVE-2025-38079: kernel: crypto: algif_hash - fix double free in hash_accept</issue>
<issue id="1245431" tracker="bnc">HugeTLB - fix unshare pages</issue>
<issue id="1246000" tracker="bnc">VUL-0: CVE-2025-38181: kernel: calipso: fix null-ptr-deref in calipso_req_{set,del}attr()</issue>
<issue id="1246029" tracker="bnc">VUL-0: CVE-2025-38212: kernel: ipc: fix to protect IPCS lookups using RCU</issue>
<issue id="1246037" tracker="bnc">VUL-0: CVE-2025-38213: kernel: vgacon: add check for vc_origin address range in vgacon_scroll()</issue>
<issue id="1246045" tracker="bnc">VUL-0: CVE-2025-38200: kernel: i40e: fix MMIO write access to an invalid page in i40e_clear_hw</issue>
<issue id="1246073" tracker="bnc">VUL-0: CVE-2025-38206: kernel: exfat: fix double free in delayed_free</issue>
<issue id="1246186" tracker="bnc">VUL-0: CVE-2025-38257: kernel: s390/pkey: prevent overflow in size calculation for memdup_user()</issue>
<issue id="1246287" tracker="bnc">VUL-0: CVE-2025-38289: kernel: scsi: lpfc: Avoid potential ndlp use-after-free in dev_loss_tmo_callbk</issue>
<issue id="1246555" tracker="bnc">L3: On SLES 15 SP5 x86_64, USB NIC claims eth1 at boot, causing Mellanox interface rename and bond failure</issue>
<issue id="2022-49138" tracker="cve" />
<issue id="2022-49770" tracker="cve" />
<issue id="2023-52923" tracker="cve" />
<issue id="2023-52927" tracker="cve" />
<issue id="2024-26643" tracker="cve" />
<issue id="2024-53057" tracker="cve" />
<issue id="2024-53164" tracker="cve" />
<issue id="2024-57947" tracker="cve" />
<issue id="2025-37797" tracker="cve" />
<issue id="2025-38079" tracker="cve" />
<issue id="2025-38181" tracker="cve" />
<issue id="2025-38200" tracker="cve" />
<issue id="2025-38206" tracker="cve" />
<issue id="2025-38212" tracker="cve" />
<issue id="2025-38213" tracker="cve" />
<issue id="2025-38257" tracker="cve" />
<issue id="2025-38289" tracker="cve" />
<category>security</category>
<rating>important</rating>
<packager>tabraham1</packager>
<reboot_needed/>
<description>
The SUSE Linux Enterprise 15 SP5 kernel was updated to receive various security bugfixes.
The following security bugs were fixed:
- CVE-2022-49138: Bluetooth: hci_event: Fix checking conn for le_conn_complete_evt (bsc#1238160).
- CVE-2023-52923: netfilter: nf_tables: split async and sync catchall in two functions (bsc#1236104).
- CVE-2023-52927: netfilter: allow exp not to be removed in nf_ct_find_expectation (bsc#1239644).
- CVE-2024-26643: Fixed mark set as dead when unbinding anonymous set with timeout (bsc#1221829).
- CVE-2024-53057: net/sched: stop qdisc_tree_reduce_backlog on TC_H_ROOT (bsc#1233551).
- CVE-2024-53164: net: sched: fix ordering of qlen adjustment (bsc#1234863).
- CVE-2024-57947: netfilter: nf_set_pipapo: fix initial map fill (bsc#1236333).
- CVE-2025-37797: net_sched: hfsc: Fix a UAF vulnerability in class handling (bsc#1242417).
- CVE-2025-38079: crypto: algif_hash - fix double free in hash_accept (bsc#1245217).
- CVE-2025-38181: calipso: Fix null-ptr-deref in calipso_req_{set,del}attr() (bsc#1246000).
- CVE-2025-38200: i40e: fix MMIO write access to an invalid page in i40e_clear_hw (bsc#1246045).
- CVE-2025-38206: exfat: fix double free in delayed_free (bsc#1246073).
- CVE-2025-38212: ipc: fix to protect IPCS lookups using RCU (bsc#1246029).
- CVE-2025-38213: vgacon: Add check for vc_origin address range in vgacon_scroll() (bsc#1246037).
- CVE-2025-38257: s390/pkey: Prevent overflow in size calculation for memdup_user() (bsc#1246186).
- CVE-2025-38289: scsi: lpfc: Avoid potential ndlp use-after-free in dev_loss_tmo_callbk (bsc#1246287).
The following non-security bugs were fixed:
- Revert "hugetlb: unshare some PMDs when splitting VMAs (bsc#1245431)."
- Revert "mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race"
- Revert "mm/hugetlb: unshare page tables during VMA split, not before"
- bnxt_en: Fix GSO type for HW GRO packets on 5750X chips (bsc#1244523).
- net: usb: usbnet: restore usb%d name exception for local mac addresses (bsc#1234480 bsc#1246555).
</description>
<!-- inserted by gitlab@gitlab.suse.de:security/tools.git//home/securitybot/src/sectools/auto_maintenance.pl -->
<releasetarget project="SUSE:Updates:SLE-Product-SLES_SAP:15-SP5:x86_64"/>
<releasetarget project="SUSE:Updates:SLE-Product-SLES_SAP:15-SP5:ppc64le"/>
<releasetarget project="SUSE:Updates:SLE-Product-SLES:15-SP5-LTSS:x86_64"/>
<releasetarget project="SUSE:Updates:SLE-Product-SLES:15-SP5-LTSS:s390x"/>
<releasetarget project="SUSE:Updates:SLE-Product-SLES:15-SP5-LTSS:ppc64le"/>
<releasetarget project="SUSE:Updates:SLE-Product-SLES:15-SP5-LTSS:aarch64"/>
<releasetarget project="SUSE:Updates:SLE-Product-HPC:15-SP5-LTSS:x86_64"/>
<releasetarget project="SUSE:Updates:SLE-Product-HPC:15-SP5-LTSS:aarch64"/>
<releasetarget project="SUSE:Updates:SLE-Product-HPC:15-SP5-ESPOS:x86_64"/>
<releasetarget project="SUSE:Updates:SLE-Product-HPC:15-SP5-ESPOS:aarch64"/>
<releasetarget project="SUSE:Updates:SLE-Micro:5.5:x86_64"/>
<releasetarget project="SUSE:Updates:SLE-Micro:5.5:s390x"/>
<releasetarget project="SUSE:Updates:SLE-Micro:5.5:ppc64le"/>
<releasetarget project="SUSE:Updates:SLE-Micro:5.5:aarch64"/>
<releasetarget project="SUSE:SLE-15-SP5:Update"/>
<summary>Security update for the Linux Kernel</summary>
</patchinfo>