File _patchinfo of Package patchinfo.42576

<patchinfo incident="42576">
  <issue tracker="bnc" id="1223007">VUL-0: CVE-2024-26832: kernel: mm: zswap: fix missing folio cleanup in writeback race path</issue>
  <issue tracker="bnc" id="1235905">VUL-0: CVE-2024-54031: kernel: netfilter: nft_set_hash: unaligned atomic read on struct nft_set_ext</issue>
  <issue tracker="bnc" id="1236104">VUL-0: CVE-2023-52923: kernel: netfilter: nf_tables: adapt set backend to use GC transaction API</issue>
  <issue tracker="bnc" id="1237885">VUL-0: CVE-2025-21764: kernel: ndisc: use RCU protection in ndisc_alloc_skb()</issue>
  <issue tracker="bnc" id="1237906">VUL-0: CVE-2025-21765: kernel: ipv6: use RCU protection in ip6_default_advmss()</issue>
  <issue tracker="bnc" id="1238414">VUL-0: CVE-2022-49604: kernel: ip: Fix data-races around sysctl_ip_fwd_use_pmtu.</issue>
  <issue tracker="bnc" id="1238754">VUL-0: CVE-2025-21766: kernel: ipv4: use RCU protection in __ip_rt_update_pmtu()</issue>
  <issue tracker="bnc" id="1238763">VUL-0: CVE-2025-21760: kernel: ndisc: extend RCU protection in ndisc_send_skb()</issue>
  <issue tracker="bnc" id="1240284">VUL-0: CVE-2023-52983: kernel: block, bfq: fix uaf for bfqq in bic_set_bfqq()</issue>
  <issue tracker="bnc" id="1244904">VUL-0: CVE-2022-49943: kernel: USB: gadget: fix obscure lockdep violation for udc_mutex</issue>
  <issue tracker="bnc" id="1245110">VUL-0: CVE-2022-49980: kernel: USB: gadget: fix use-after-free Read in usb_udc_uevent()</issue>
  <issue tracker="bnc" id="1245723">VUL-0: CVE-2025-38129: kernel: page_pool: fix use-after-free in page_pool_recycle_in_ring</issue>
  <issue tracker="bnc" id="1248306">VUL-0: CVE-2025-38563: kernel: perf/core: Prevent VMA split of buffer mappings</issue>
  <issue tracker="bnc" id="1248377">VUL-0: CVE-2025-38565: kernel: perf/core: Exit early on perf_mmap() fail</issue>
  <issue tracker="bnc" id="1249699">VUL-0: CVE-2022-50329: kernel: block, bfq: fix uaf for bfqq in bfq_exit_icq_bfqq</issue>
  <issue tracker="bnc" id="1249827">VUL-0: CVE-2023-53178: kernel: mm: fix zswap writeback race condition</issue>
  <issue tracker="bnc" id="1251201">VUL-0: CVE-2022-50488: kernel: block, bfq: fix possible uaf for 'bfqq-&gt;bic'</issue>
  <issue tracker="bnc" id="1253409">VUL-0: CVE-2025-40139: kernel: smc: Use __sk_dst_get() and dst_dev_rcu() in in smc_clc_prfx_set().</issue>
  <issue tracker="bnc" id="1255171">VUL-0: CVE-2025-68312: kernel: usbnet: Prevents free active kevent</issue>
  <issue tracker="bnc" id="1255594">VUL-0: CVE-2022-50697: kernel: mrp: introduce active flags to prevent UAF when applicant uninit</issue>
  <issue tracker="bnc" id="1256612">VUL-0: CVE-2025-71089: kernel: iommu: disable SVA when CONFIG_X86 is set</issue>
  <issue tracker="bnc" id="1256623">VUL-0: CVE-2025-71085: kernel: ipv6: BUG() in pskb_expand_head() as part of calipso_skbuff_setattr()</issue>
  <issue tracker="bnc" id="1256726">VUL-0: CVE-2025-71112: kernel: net: hns3: add VLAN id validation before using</issue>
  <issue tracker="bnc" id="1256792">kbdrate over ssh crashes aarch64 kernel</issue>
  <issue tracker="bnc" id="1257232">VUL-0: CVE-2026-23001: kernel: macvlan: fix possible UAF in macvlan_forward_source()</issue>
  <issue tracker="bnc" id="1257236">VUL-0: CVE-2026-22999: kernel: net/sched: sch_qfq: do not free existing class in qfq_change_class()</issue>
  <issue tracker="cve" id="2022-49604"/>
  <issue tracker="cve" id="2022-49943"/>
  <issue tracker="cve" id="2022-49980"/>
  <issue tracker="cve" id="2022-50329"/>
  <issue tracker="cve" id="2022-50488"/>
  <issue tracker="cve" id="2022-50697"/>
  <issue tracker="cve" id="2023-52923"/>
  <issue tracker="cve" id="2023-52983"/>
  <issue tracker="cve" id="2023-53178"/>
  <issue tracker="cve" id="2024-26832"/>
  <issue tracker="cve" id="2024-54031"/>
  <issue tracker="cve" id="2025-21760"/>
  <issue tracker="cve" id="2025-21764"/>
  <issue tracker="cve" id="2025-21765"/>
  <issue tracker="cve" id="2025-21766"/>
  <issue tracker="cve" id="2025-38129"/>
  <issue tracker="cve" id="2025-38563"/>
  <issue tracker="cve" id="2025-38565"/>
  <issue tracker="cve" id="2025-40139"/>
  <issue tracker="cve" id="2025-68312"/>
  <issue tracker="cve" id="2025-71085"/>
  <issue tracker="cve" id="2025-71089"/>
  <issue tracker="cve" id="2025-71112"/>
  <issue tracker="cve" id="2026-22999"/>
  <issue tracker="cve" id="2026-23001"/>
  <category>security</category>
  <rating>important</rating>
  <packager>alix82</packager>
  <reboot_needed/>
  <summary>Security update for the Linux Kernel</summary>
  <description>
The SUSE Linux Enterprise 15 SP3 kernel was updated to fix various security issues

The following security issues were fixed:

- CVE-2022-50697: mrp: introduce active flags to prevent UAF when applicant uninit (bsc#1255594).
- CVE-2025-38129: page_pool: fix inconsistency for page_pool_ring_lock() (bsc#1245723).
- CVE-2025-40139: net: ipv4: Consolidate ipv4_mtu and ip_dst_mtu_maybe_forward (bsc#1253409).
- CVE-2025-68312: usbnet: Prevents free active kevent (bsc#1255171).
- CVE-2025-71085: ipv6: BUG() in pskb_expand_head() as part of calipso_skbuff_setattr() (bsc#1256623).
- CVE-2025-71089: iommu: disable SVA when CONFIG_X86 is set (bsc#1256612).
- CVE-2025-71112: net: hns3: add VLAN id validation before using (bsc#1256726).
- CVE-2026-22999: net/sched: sch_qfq: do not free existing class in qfq_change_class() (bsc#1257236).
- CVE-2026-23001: macvlan: Use 'hash' iterators to simplify code (bsc#1257232).
</description>
</patchinfo>
openSUSE Build Service is sponsored by