File _patchinfo of Package patchinfo.42276

<patchinfo incident="42276">
  <issue tracker="bnc" id="1248400">VUL-0: CVE-2025-38572: kernel live patch: ipv6: reject malicious packets in ipv6_gso_segment()</issue>
  <issue tracker="bnc" id="1248615">VUL-0: CVE-2024-58239: kernel live patch: tls: stop recv() if initial process_rx_list gave us non-DATA</issue>
  <issue tracker="bnc" id="1248670">VUL-0: CVE-2025-38608: kernel live patch: bpf, ktls: Fix data corruption when using bpf_msg_pop_data() in ktls</issue>
  <issue tracker="bnc" id="1249242">VUL-0: CVE-2022-50233: kernel live patch: bluetooth: device name can cause reading kernel memory by not supplying terminal \0</issue>
  <issue tracker="bnc" id="1250665">VUL-0: CVE-2022-50409: kernel live patch: net: If sock is dead don't access sock's sk_wq in sk_stream_wait_memory</issue>
  <issue tracker="bnc" id="1251165">VUL-0: CVE-2022-50490: kernel live patch: bpf: Propagate error from htab_lock_bucket() to userspace</issue>
  <issue tracker="bnc" id="1251203">VUL-0: CVE-2025-38476: kernel live patch: rpl: Fix use-after-free in rpl_do_srh_inline().</issue>
  <issue tracker="bnc" id="1251787">VUL-0: CVE-2023-53676: kernel live patch: scsi: target: iscsi: Fix buffer overflow in lio_target_nacl_info_show()</issue>
  <issue tracker="bnc" id="1253437">VUL-0: CVE-2025-40204: kernel live patch: sctp: Fix MAC comparison to be constant-time</issue>
  <issue tracker="bnc" id="1254451">VUL-0: CVE-2022-50327: kernel live patch: ACPI: processor: idle: Check acpi_fetch_acpi_dev() return value</issue>
  <issue tracker="cve" id="2022-50233"/>
  <issue tracker="cve" id="2022-50327"/>
  <issue tracker="cve" id="2022-50409"/>
  <issue tracker="cve" id="2022-50490"/>
  <issue tracker="cve" id="2023-53676"/>
  <issue tracker="cve" id="2024-58239"/>
  <issue tracker="cve" id="2025-38476"/>
  <issue tracker="cve" id="2025-38572"/>
  <issue tracker="cve" id="2025-38608"/>
  <issue tracker="cve" id="2025-40204"/>
  <category>security</category>
  <rating>important</rating>
  <packager>nstange</packager>
  <summary>Security update for the Linux Kernel (Live Patch 41 for SUSE Linux Enterprise 15 SP4)</summary>
  <description>
This update for the SUSE Linux Enterprise kernel 5.14.21-150400.24.167 fixes various security issues

The following security issues were fixed:

- CVE-2022-50233: bluetooth: device name can cause reading kernel memory by not supplying terminal \0 (bsc#1249242).
- CVE-2022-50327: ACPI: processor: idle: Check acpi_fetch_acpi_dev() return value (bsc#1254451).
- CVE-2022-50409: net: If sock is dead don't access sock's sk_wq in sk_stream_wait_memory (bsc#1250665).
- CVE-2022-50490: bpf: Propagate error from htab_lock_bucket() to userspace (bsc#1251165).
- CVE-2023-53676: scsi: target: iscsi: Fix buffer overflow in lio_target_nacl_info_show() (bsc#1251787).
- CVE-2024-58239: tls: stop recv() if initial process_rx_list gave us non-DATA (bsc#1248615).
- CVE-2025-38476: rpl: Fix use-after-free in rpl_do_srh_inline() (bsc#1251203).
- CVE-2025-38572: ipv6: reject malicious packets in ipv6_gso_segment() (bsc#1248400).
- CVE-2025-38608: bpf, ktls: Fix data corruption when using bpf_msg_pop_data() in ktls (bsc#1248670).
- CVE-2025-40204: sctp: Fix MAC comparison to be constant-time (bsc#1253437).
</description>
</patchinfo>
openSUSE Build Service is sponsored by