File _patchinfo of Package patchinfo.42576
<patchinfo incident="42576"> <issue tracker="bnc" id="1223007">VUL-0: CVE-2024-26832: kernel: mm: zswap: fix missing folio cleanup in writeback race path</issue> <issue tracker="bnc" id="1235905">VUL-0: CVE-2024-54031: kernel: netfilter: nft_set_hash: unaligned atomic read on struct nft_set_ext</issue> <issue tracker="bnc" id="1236104">VUL-0: CVE-2023-52923: kernel: netfilter: nf_tables: adapt set backend to use GC transaction API</issue> <issue tracker="bnc" id="1237885">VUL-0: CVE-2025-21764: kernel: ndisc: use RCU protection in ndisc_alloc_skb()</issue> <issue tracker="bnc" id="1237906">VUL-0: CVE-2025-21765: kernel: ipv6: use RCU protection in ip6_default_advmss()</issue> <issue tracker="bnc" id="1238414">VUL-0: CVE-2022-49604: kernel: ip: Fix data-races around sysctl_ip_fwd_use_pmtu.</issue> <issue tracker="bnc" id="1238754">VUL-0: CVE-2025-21766: kernel: ipv4: use RCU protection in __ip_rt_update_pmtu()</issue> <issue tracker="bnc" id="1238763">VUL-0: CVE-2025-21760: kernel: ndisc: extend RCU protection in ndisc_send_skb()</issue> <issue tracker="bnc" id="1240284">VUL-0: CVE-2023-52983: kernel: block, bfq: fix uaf for bfqq in bic_set_bfqq()</issue> <issue tracker="bnc" id="1244904">VUL-0: CVE-2022-49943: kernel: USB: gadget: fix obscure lockdep violation for udc_mutex</issue> <issue tracker="bnc" id="1245110">VUL-0: CVE-2022-49980: kernel: USB: gadget: fix use-after-free Read in usb_udc_uevent()</issue> <issue tracker="bnc" id="1245723">VUL-0: CVE-2025-38129: kernel: page_pool: fix use-after-free in page_pool_recycle_in_ring</issue> <issue tracker="bnc" id="1248306">VUL-0: CVE-2025-38563: kernel: perf/core: Prevent VMA split of buffer mappings</issue> <issue tracker="bnc" id="1248377">VUL-0: CVE-2025-38565: kernel: perf/core: Exit early on perf_mmap() fail</issue> <issue tracker="bnc" id="1249699">VUL-0: CVE-2022-50329: kernel: block, bfq: fix uaf for bfqq in bfq_exit_icq_bfqq</issue> <issue tracker="bnc" id="1249827">VUL-0: CVE-2023-53178: kernel: mm: fix zswap writeback race condition</issue> <issue tracker="bnc" id="1251201">VUL-0: CVE-2022-50488: kernel: block, bfq: fix possible uaf for 'bfqq->bic'</issue> <issue tracker="bnc" id="1253409">VUL-0: CVE-2025-40139: kernel: smc: Use __sk_dst_get() and dst_dev_rcu() in in smc_clc_prfx_set().</issue> <issue tracker="bnc" id="1255171">VUL-0: CVE-2025-68312: kernel: usbnet: Prevents free active kevent</issue> <issue tracker="bnc" id="1255594">VUL-0: CVE-2022-50697: kernel: mrp: introduce active flags to prevent UAF when applicant uninit</issue> <issue tracker="bnc" id="1256612">VUL-0: CVE-2025-71089: kernel: iommu: disable SVA when CONFIG_X86 is set</issue> <issue tracker="bnc" id="1256623">VUL-0: CVE-2025-71085: kernel: ipv6: BUG() in pskb_expand_head() as part of calipso_skbuff_setattr()</issue> <issue tracker="bnc" id="1256726">VUL-0: CVE-2025-71112: kernel: net: hns3: add VLAN id validation before using</issue> <issue tracker="bnc" id="1256792">kbdrate over ssh crashes aarch64 kernel</issue> <issue tracker="bnc" id="1257232">VUL-0: CVE-2026-23001: kernel: macvlan: fix possible UAF in macvlan_forward_source()</issue> <issue tracker="bnc" id="1257236">VUL-0: CVE-2026-22999: kernel: net/sched: sch_qfq: do not free existing class in qfq_change_class()</issue> <issue tracker="cve" id="2022-49604"/> <issue tracker="cve" id="2022-49943"/> <issue tracker="cve" id="2022-49980"/> <issue tracker="cve" id="2022-50329"/> <issue tracker="cve" id="2022-50488"/> <issue tracker="cve" id="2022-50697"/> <issue tracker="cve" id="2023-52923"/> <issue tracker="cve" id="2023-52983"/> <issue tracker="cve" id="2023-53178"/> <issue tracker="cve" id="2024-26832"/> <issue tracker="cve" id="2024-54031"/> <issue tracker="cve" id="2025-21760"/> <issue tracker="cve" id="2025-21764"/> <issue tracker="cve" id="2025-21765"/> <issue tracker="cve" id="2025-21766"/> <issue tracker="cve" id="2025-38129"/> <issue tracker="cve" id="2025-38563"/> <issue tracker="cve" id="2025-38565"/> <issue tracker="cve" id="2025-40139"/> <issue tracker="cve" id="2025-68312"/> <issue tracker="cve" id="2025-71085"/> <issue tracker="cve" id="2025-71089"/> <issue tracker="cve" id="2025-71112"/> <issue tracker="cve" id="2026-22999"/> <issue tracker="cve" id="2026-23001"/> <category>security</category> <rating>important</rating> <packager>alix82</packager> <reboot_needed/> <summary>Security update for the Linux Kernel</summary> <description> The SUSE Linux Enterprise 15 SP3 kernel was updated to fix various security issues The following security issues were fixed: - CVE-2022-50697: mrp: introduce active flags to prevent UAF when applicant uninit (bsc#1255594). - CVE-2025-38129: page_pool: fix inconsistency for page_pool_ring_lock() (bsc#1245723). - CVE-2025-40139: net: ipv4: Consolidate ipv4_mtu and ip_dst_mtu_maybe_forward (bsc#1253409). - CVE-2025-68312: usbnet: Prevents free active kevent (bsc#1255171). - CVE-2025-71085: ipv6: BUG() in pskb_expand_head() as part of calipso_skbuff_setattr() (bsc#1256623). - CVE-2025-71089: iommu: disable SVA when CONFIG_X86 is set (bsc#1256612). - CVE-2025-71112: net: hns3: add VLAN id validation before using (bsc#1256726). - CVE-2026-22999: net/sched: sch_qfq: do not free existing class in qfq_change_class() (bsc#1257236). - CVE-2026-23001: macvlan: Use 'hash' iterators to simplify code (bsc#1257232). </description> </patchinfo>