File _patchinfo of Package patchinfo.43262
<patchinfo incident="43262"> <!--generated from request 403945--> <issue tracker="bnc" id="1247240">VUL-0: CVE-2025-38488: kernel live patch: smb: client: fix use-after-free in crypt_message when using async crypto</issue> <issue tracker="bnc" id="1254755">VUL-0: CVE-2023-53781: kernel live patch: smc: Fix use-after-free in tcp_write_timer_handler().</issue> <issue tracker="bnc" id="1255053">VUL-0: CVE-2025-40258: kernel live patch: mptcp: fix race condition in mptcp_schedule_work()</issue> <issue tracker="bnc" id="1255378">VUL-0: CVE-2025-68284: kernel live patch: libceph: prevent potential out-of-bounds writes in handle_auth_session_key()</issue> <issue tracker="bnc" id="1255402">VUL-0: CVE-2025-68285: kernel live patch: libceph: fix potential use-after-free in have_mon_and_osd_map()</issue> <issue tracker="bnc" id="1255595">VUL-0: CVE-2022-50697: kernel live patch: mrp: introduce active flags to prevent UAF when applicant uninit</issue> <issue tracker="bnc" id="1256624">VUL-0: CVE-2025-71085: kernel live patch: ipv6: BUG() in pskb_expand_head() as part of calipso_skbuff_setattr()</issue> <issue tracker="bnc" id="1256644">VUL-0: CVE-2025-68813: kernel live patch: ipvs: fix ipv4 null-ptr-deref in route error path</issue> <issue tracker="bnc" id="1257118">VUL-0: CVE-2025-21738: kernel live patch: ata: libata-sff: ensure that we cannot write outside the allocated buffer</issue> <issue tracker="bnc" id="1257629">VUL-0: CVE-2025-38159: kernel live patch: wifi: rtw88: fix the 'para' buffer size to avoid reading out of bounds</issue> <issue tracker="cve" id="2022-50697"/> <issue tracker="cve" id="2023-53781"/> <issue tracker="cve" id="2025-21738"/> <issue tracker="cve" id="2025-38159"/> <issue tracker="cve" id="2025-38488"/> <issue tracker="cve" id="2025-40258"/> <issue tracker="cve" id="2025-68284"/> <issue tracker="cve" id="2025-68285"/> <issue tracker="cve" id="2025-68813"/> <issue tracker="cve" id="2025-71085"/> <category>security</category> <rating>important</rating> <packager>nstange</packager> <summary>Security update for the Linux Kernel (Live Patch 43 for SUSE Linux Enterprise 15 SP4)</summary> <description> This update for the SUSE Linux Enterprise Kernel 5.14.21-150400.24.173 fixes various security issues The following security issues were fixed: - CVE-2022-50697: mrp: introduce active flags to prevent UAF when applicant uninit (bsc#1255595). - CVE-2023-53781: smc: Fix use-after-free in tcp_write_timer_handler() (bsc#1254755). - CVE-2025-21738: ata: libata-sff: ensure that we cannot write outside the allocated buffer (bsc#1257118). - CVE-2025-38159: wifi: rtw88: fix the 'para' buffer size to avoid reading out of bounds (bsc#1257629). - CVE-2025-38488: smb: client: fix use-after-free in crypt_message when using async crypto (bsc#1247240). - CVE-2025-40258: mptcp: fix race condition in mptcp_schedule_work() (bsc#1255053). - CVE-2025-68284: libceph: prevent potential out-of-bounds writes in handle_auth_session_key() (bsc#1255378). - CVE-2025-68285: libceph: fix potential use-after-free in have_mon_and_osd_map() (bsc#1255402). - CVE-2025-68813: ipvs: fix ipv4 null-ptr-deref in route error path (bsc#1256644). - CVE-2025-71085: ipv6: BUG() in pskb_expand_head() as part of calipso_skbuff_setattr() (bsc#1256624). </description> </patchinfo>