Details
-
Task
-
Resolution: Fixed
-
Medium
-
Lustre 2.17.0
-
3
-
9223372036854775807
Description
The SUSE Linux Enterprise 15 SP6 kernel was updated to fix various security
issues
The following security issues were fixed:
- CVE-2025-38008: mm/page_alloc: fix race condition in unaccepted memory
handling (bsc#1244939). - CVE-2025-38539: trace/fgraph: Fix the warning caused by missing unregister
notifier (bsc#1248211). - CVE-2025-38552: mptcp: plug races between subflow fail and subflow creation
(bsc#1248230). - CVE-2025-38653: proc: use the same treatment to check proc_lseek as ones for
proc_read_iter et.al (bsc#1248630). - CVE-2025-38699: scsi: bfa: Double-free fix (bsc#1249224).
- CVE-2025-38700: scsi: libiscsi: Initialize iscsi_conn->dd_data only if
memory is allocated (bsc#1249182). - CVE-2025-38718: sctp: linearize cloned gso packets in sctp_rcv
(bsc#1249161). - CVE-2025-39673: ppp: fix race conditions in ppp_fill_forward_path
(bsc#1249320). - CVE-2025-39676: scsi: qla4xxx: Prevent a potential error pointer dereference
(bsc#1249302). - CVE-2025-39683: tracing: Limit access to parser->buffer when trace_get_user
failed (bsc#1249286). - CVE-2025-39697: nfs: remove dead code for the old swap over NFS
implementation (bsc#1249319). - CVE-2025-39702: ipv6: sr: Fix MAC comparison to be constant-time
(bsc#1249317). - CVE-2025-39756: fs: Prevent file descriptor table allocations exceeding
INT_MAX (bsc#1249512). - CVE-2025-39794: ARM: tegra: Use I/O memcpy to write to IRAM (bsc#1249595).
- CVE-2025-39812: sctp: initialize more fields in sctp_v6_from_sk()
(bsc#1250202). - CVE-2025-39813: ftrace: Fix potential warning in trace_printk_seq during
ftrace_dump (bsc#1250032). - CVE-2025-39828: atm: atmtcp: Prevent arbitrary write in
atmtcp_recv_control() (bsc#1250205). - CVE-2025-39851: vxlan: Fix NPD when refreshing an FDB entry with a nexthop
object (bsc#1250296). - CVE-2025-39866: fs: writeback: fix use-after-free in __mark_inode_dirty()
(bsc#1250455). - CVE-2025-39876: net: fec: Fix possible NPD in
fec_enet_phy_reset_after_clk_enable() (bsc#1250400). - CVE-2025-39881: kernfs: Fix UAF in polling when open file is released
(bsc#1250379). - CVE-2025-39895: sched: Fix sched_numa_find_nth_cpu() if mask offline
(bsc#1250721). - CVE-2025-39902: mm/slub: avoid accessing metadata when pointer is invalid in
object_err() (bsc#1250702). - CVE-2025-39911: i40e: fix IRQ freeing in i40e_vsi_request_irq_msix error
path (bsc#1250704). - CVE-2025-39945: cnic: Fix use-after-free bugs in cnic_delete_task
(bsc#1251230). - CVE-2025-39946: tls: make sure to abort the stream if headers are bogus
(bsc#1251114). - CVE-2025-39947: net/mlx5e: Harden uplink netdev access against device unbind
(bsc#1251232). - CVE-2025-39948: ice: fix Rx page leak on multi-buffer frames (bsc#1251233).
- CVE-2025-39949: qed: Don't collect too many protection override GRC elements
(bsc#1251177). - CVE-2025-39955: tcp: Clear tcp_sk(sk)->fastopen_rsk in tcp_disconnect()
(bsc#1251804). - CVE-2025-39968: i40e: add max boundary check for VF filters (bsc#1252047).
- CVE-2025-39969: i40e: fix validation of VF state in get resources
(bsc#1252044). - CVE-2025-39970: i40e: fix input validation logic for action_meta
(bsc#1252051). - CVE-2025-39971: i40e: fix idx validation in config queues msg (bsc#1252052).
- CVE-2025-39972: i40e: fix idx validation in i40e_validate_queue_map
(bsc#1252039). - CVE-2025-39973: i40e: add validation for ring_len param (bsc#1252035).
- CVE-2025-39978: octeontx2-pf: Fix potential use after free in
otx2_tc_add_flow() (bsc#1252069). - CVE-2025-40000: wifi: rtw89: fix use-after-free in
rtw89_core_tx_kick_off_and_wait() (bsc#1252062). - CVE-2025-40005: spi: cadence-quadspi: Implement refcount to handle unbind
during busy (bsc#1252349). - CVE-2025-40018: ipvs: Defer ip_vs_ftp unregister during netns cleanup
(bsc#1252688). - CVE-2025-40051: vhost: vringh: Modify the return value check (bsc#1252858).
- CVE-2025-40056: vhost: vringh: Fix copy_to_iter return value check
(bsc#1252826). - CVE-2025-40060: coresight: trbe: Return NULL pointer for allocation failures
(bsc#1252848). - CVE-2025-40078: bpf: Explicitly check accesses to bpf_sock_addr
(bsc#1252789). - CVE-2025-40080: nbd: restrict sockets to TCP and UDP (bsc#1252774).
- CVE-2025-40100: btrfs: do not assert we found block group item when creating
free space tree (bsc#1252918).
The following non security issues were fixed:
https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html