File _patchinfo of Package patchinfo.42279
<patchinfo incident="42279"> <issue tracker="bnc" id="1248400">VUL-0: CVE-2025-38572: kernel live patch: ipv6: reject malicious packets in ipv6_gso_segment()</issue> <issue tracker="bnc" id="1249242">VUL-0: CVE-2022-50233: kernel live patch: bluetooth: device name can cause reading kernel memory by not supplying terminal \0</issue> <issue tracker="bnc" id="1250665">VUL-0: CVE-2022-50409: kernel live patch: net: If sock is dead don't access sock's sk_wq in sk_stream_wait_memory</issue> <issue tracker="bnc" id="1251165">VUL-0: CVE-2022-50490: kernel live patch: bpf: Propagate error from htab_lock_bucket() to userspace</issue> <issue tracker="bnc" id="1251203">VUL-0: CVE-2025-38476: kernel live patch: rpl: Fix use-after-free in rpl_do_srh_inline().</issue> <issue tracker="bnc" id="1251787">VUL-0: CVE-2023-53676: kernel live patch: scsi: target: iscsi: Fix buffer overflow in lio_target_nacl_info_show()</issue> <issue tracker="bnc" id="1253437">VUL-0: CVE-2025-40204: kernel live patch: sctp: Fix MAC comparison to be constant-time</issue> <issue tracker="bnc" id="1254451">VUL-0: CVE-2022-50327: kernel live patch: ACPI: processor: idle: Check acpi_fetch_acpi_dev() return value</issue> <issue tracker="cve" id="2022-50233"/> <issue tracker="cve" id="2022-50327"/> <issue tracker="cve" id="2022-50409"/> <issue tracker="cve" id="2022-50490"/> <issue tracker="cve" id="2023-53676"/> <issue tracker="cve" id="2025-38476"/> <issue tracker="cve" id="2025-38572"/> <issue tracker="cve" id="2025-40204"/> <category>security</category> <rating>important</rating> <packager>nstange</packager> <summary>Security update for the Linux Kernel (Live Patch 44 for SUSE Linux Enterprise 15 SP4)</summary> <description> This update for the SUSE Linux Enterprise kernel 5.14.21-150400.24.176 fixes various security issues The following security issues were fixed: - CVE-2022-50233: bluetooth: device name can cause reading kernel memory by not supplying terminal \0 (bsc#1249242). - CVE-2022-50327: ACPI: processor: idle: Check acpi_fetch_acpi_dev() return value (bsc#1254451). - CVE-2022-50409: net: If sock is dead don't access sock's sk_wq in sk_stream_wait_memory (bsc#1250665). - CVE-2022-50490: bpf: Propagate error from htab_lock_bucket() to userspace (bsc#1251165). - CVE-2023-53676: scsi: target: iscsi: Fix buffer overflow in lio_target_nacl_info_show() (bsc#1251787). - CVE-2025-38476: rpl: Fix use-after-free in rpl_do_srh_inline() (bsc#1251203). - CVE-2025-38572: ipv6: reject malicious packets in ipv6_gso_segment() (bsc#1248400). - CVE-2025-40204: sctp: Fix MAC comparison to be constant-time (bsc#1253437). </description> </patchinfo>