File _patchinfo of Package patchinfo.38624
<patchinfo incident="38624">
<issue id="1207034" tracker="bnc">VUL-0: CVE-2023-0179: kernel: integer overflow vulnerability within the Netfilter (nftables) subsystem</issue>
<issue id="1207878" tracker="bnc">[ENA] Back port DMA buffer fix in distros</issue>
<issue id="1221980" tracker="bnc">VUL-0: CVE-2021-47163: kernel: tipc: wait and exit until all work queues are done</issue>
<issue id="1234931" tracker="bnc">VUL-0: CVE-2024-56661: kernel: tipc: fix NULL deref in cleanup_bearer()</issue>
<issue id="1235433" tracker="bnc">VUL-0: CVE-2024-56642: kernel: tipc: fix use-after-free of kernel socket in cleanup_bearer().</issue>
<issue id="1237984" tracker="bnc">VUL-0: CVE-2022-49111: kernel: Bluetooth: Fix use after free in hci_send_acl</issue>
<issue id="1238512" tracker="bnc">VUL-0: CVE-2025-21791: kernel: vrf: use RCU protection in l3mdev_l3_out()</issue>
<issue id="1238747" tracker="bnc">VUL-0: CVE-2025-21785: kernel: arm64: cacheinfo: Avoid out-of-bounds write to cacheinfo array</issue>
<issue id="1238865" tracker="bnc">VUL-0: CVE-2025-21726: kernel: padata: avoid UAF for reorder_work</issue>
<issue id="1240210" tracker="bnc">VUL-0: CVE-2023-53033: kernel: netfilter: nft_payload: incorrect arithmetics when fetching VLAN header bits</issue>
<issue id="1240308" tracker="bnc">VUL-0: CVE-2023-53026: kernel: RDMA/core: Fix ib block iterator counter overflow</issue>
<issue id="1240835" tracker="bnc">VUL-0: CVE-2025-22004: kernel: net: atm: fix use after free in lec_send()</issue>
<issue id="1241280" tracker="bnc">VUL-0: CVE-2025-22020: kernel: memstick: rtsx_usb_ms: Fix slab-use-after-free in rtsx_usb_ms_drv_remove</issue>
<issue id="1241371" tracker="bnc">VUL-0: CVE-2025-22055: kernel: net: fix geneve_opt length integer overflow</issue>
<issue id="1241404" tracker="bnc">VUL-0: CVE-2021-47668: kernel: can: dev: can_restart: fix use after free bug</issue>
<issue id="1241405" tracker="bnc">VUL-0: CVE-2021-47669: kernel: can: vxcan: vxcan_xmit: fix use after free bug</issue>
<issue id="1241407" tracker="bnc">VUL-0: CVE-2021-47670: kernel: can: peak_usb: fix use after free bugs</issue>
<issue id="1241408" tracker="bnc">VUL-0: CVE-2020-36789: kernel: can: dev: can_get_echo_skb(): prevent call to kfree_skb() in hard IRQ context</issue>
<issue id="2020-36789" tracker="cve" />
<issue id="2021-47163" tracker="cve" />
<issue id="2021-47668" tracker="cve" />
<issue id="2021-47669" tracker="cve" />
<issue id="2021-47670" tracker="cve" />
<issue id="2022-49111" tracker="cve" />
<issue id="2023-0179" tracker="cve" />
<issue id="2023-53026" tracker="cve" />
<issue id="2023-53033" tracker="cve" />
<issue id="2024-56642" tracker="cve" />
<issue id="2024-56661" tracker="cve" />
<issue id="2025-21726" tracker="cve" />
<issue id="2025-21785" tracker="cve" />
<issue id="2025-21791" tracker="cve" />
<issue id="2025-22004" tracker="cve" />
<issue id="2025-22020" tracker="cve" />
<issue id="2025-22055" tracker="cve" />
<category>security</category>
<rating>important</rating>
<packager>alix82</packager>
<reboot_needed/>
<description>The SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security bugfixes.
The following security bugs were fixed:
- CVE-2022-49111: Bluetooth: Fix use after free in hci_send_acl (bsc#1237984).
- CVE-2025-21726: padata: avoid UAF for reorder_work (bsc#1238865).
- CVE-2025-21785: arm64: cacheinfo: Avoid out-of-bounds write to cacheinfo array (bsc#1238747).
- CVE-2025-21791: vrf: use RCU protection in l3mdev_l3_out() (bsc#1238512).
- CVE-2025-22004: net: atm: fix use after free in lec_send() (bsc#1240835).
- CVE-2025-22020: memstick: rtsx_usb_ms: Fix slab-use-after-free in rtsx_usb_ms_drv_remove (bsc#1241280).
- CVE-2025-22055: net: fix geneve_opt length integer overflow (bsc#1241371).
</description>
<summary>Security update for the Linux Kernel</summary>
</patchinfo>