File _patchinfo of Package patchinfo.43263

<patchinfo incident="43263">
  <!--generated  from request 403946-->
  <issue tracker="bnc" id="1247240">VUL-0: CVE-2025-38488: kernel live patch: smb: client: fix use-after-free in crypt_message when using async crypto</issue>
  <issue tracker="bnc" id="1254755">VUL-0: CVE-2023-53781: kernel live patch: smc: Fix use-after-free in tcp_write_timer_handler().</issue>
  <issue tracker="bnc" id="1255053">VUL-0: CVE-2025-40258: kernel live patch: mptcp: fix race condition in mptcp_schedule_work()</issue>
  <issue tracker="bnc" id="1255378">VUL-0: CVE-2025-68284: kernel live patch: libceph: prevent potential out-of-bounds writes in handle_auth_session_key()</issue>
  <issue tracker="bnc" id="1255402">VUL-0: CVE-2025-68285: kernel live patch: libceph: fix potential use-after-free in have_mon_and_osd_map()</issue>
  <issue tracker="bnc" id="1255595">VUL-0: CVE-2022-50697: kernel live patch: mrp: introduce active flags to prevent UAF when applicant uninit</issue>
  <issue tracker="bnc" id="1256624">VUL-0: CVE-2025-71085: kernel live patch: ipv6: BUG() in pskb_expand_head() as part of calipso_skbuff_setattr()</issue>
  <issue tracker="bnc" id="1256644">VUL-0: CVE-2025-68813: kernel live patch: ipvs: fix ipv4 null-ptr-deref in route error path</issue>
  <issue tracker="bnc" id="1257118">VUL-0: CVE-2025-21738: kernel live patch: ata: libata-sff: ensure that we cannot write outside the allocated buffer</issue>
  <issue tracker="bnc" id="1257629">VUL-0: CVE-2025-38159: kernel live patch: wifi: rtw88: fix the 'para' buffer size to avoid reading out of bounds</issue>
  <issue tracker="cve" id="2022-50697"/>
  <issue tracker="cve" id="2023-53781"/>
  <issue tracker="cve" id="2025-21738"/>
  <issue tracker="cve" id="2025-38159"/>
  <issue tracker="cve" id="2025-38488"/>
  <issue tracker="cve" id="2025-40258"/>
  <issue tracker="cve" id="2025-68284"/>
  <issue tracker="cve" id="2025-68285"/>
  <issue tracker="cve" id="2025-68813"/>
  <issue tracker="cve" id="2025-71085"/>
  <category>security</category>
  <rating>important</rating>
  <packager>nstange</packager>
  <summary>Security update for the Linux Kernel (Live Patch 44 for SUSE Linux Enterprise 15 SP4)</summary>
  <description>
This update for the SUSE Linux Enterprise Kernel 5.14.21-150400.24.176 fixes various security issues

The following security issues were fixed:

- CVE-2022-50697: mrp: introduce active flags to prevent UAF when applicant uninit (bsc#1255595).
- CVE-2023-53781: smc: Fix use-after-free in tcp_write_timer_handler() (bsc#1254755).
- CVE-2025-21738: ata: libata-sff: ensure that we cannot write outside the allocated buffer (bsc#1257118).
- CVE-2025-38159: wifi: rtw88: fix the 'para' buffer size to avoid reading out of bounds (bsc#1257629).
- CVE-2025-38488: smb: client: fix use-after-free in crypt_message when using async crypto (bsc#1247240).
- CVE-2025-40258: mptcp: fix race condition in mptcp_schedule_work() (bsc#1255053).
- CVE-2025-68284: libceph: prevent potential out-of-bounds writes in handle_auth_session_key() (bsc#1255378).
- CVE-2025-68285: libceph: fix potential use-after-free in have_mon_and_osd_map() (bsc#1255402).
- CVE-2025-68813: ipvs: fix ipv4 null-ptr-deref in route error path (bsc#1256644).
- CVE-2025-71085: ipv6: BUG() in pskb_expand_head() as part of calipso_skbuff_setattr() (bsc#1256624).
</description>
</patchinfo>
openSUSE Build Service is sponsored by