Details
-
Task
-
Resolution: Fixed
-
Medium
-
Lustre 2.18.0
-
None
-
3
-
9223372036854775807
Description
The SUSE Linux Enterprise 15 SP7 kernel was updated to fix various security
issues
The following security issues were fixed:
- CVE-2023-54013: interconnect: Fix locking for runpm vs reclaim
(bsc#1256280). - CVE-2025-39880: libceph: fix invalid accesses to ceph_connection_v1_info
(bsc#1250388). - CVE-2025-40238: net/mlx5: Fix IPsec cleanup over MPV device (bsc#1254871).
- CVE-2025-40254: net: openvswitch: remove never-working support for setting
nsh fields (bsc#1254852). - CVE-2025-40257: mptcp: fix a race in mptcp_pm_del_add_timer() (bsc#1254842).
- CVE-2025-40259: scsi: sg: Do not sleep in atomic context (bsc#1254845).
- CVE-2025-40261: nvme: nvme-fc: Ensure ->ioerr_work is cancelled in
nvme_fc_delete_ctrl() (bsc#1254839). - CVE-2025-40264: be2net: pass wrb_params in case of OS2BMC (bsc#1254835).
- CVE-2025-40328: smb: client: fix potential UAF in smb2_close_cached_fid()
(bsc#1254624). - CVE-2025-40350: net/mlx5e: RX, Fix generating skb from non-linear xdp_buff
for striding RQ (bsc#1255260). - CVE-2025-40355: sysfs: check visibility before changing group attribute
ownership (bsc#1255261). - CVE-2025-40363: net: ipv6: fix field-spanning memcpy warning in AH output
(bsc#1255102). - CVE-2025-68171: x86/fpu: Ensure XFD state on signal delivery (bsc#1255255).
- CVE-2025-68174: amd/amdkfd: enhance kfd process check in switch partition
(bsc#1255327). - CVE-2025-68178: blk-cgroup: fix possible deadlock while configuring policy
(bsc#1255266). - CVE-2025-68188: tcp: use dst_dev_rcu() in
tcp_fastopen_active_disable_ofo_check() (bsc#1255269). - CVE-2025-68200: bpf: Add bpf_prog_run_data_pointers() (bsc#1255241).
- CVE-2025-68215: ice: fix PTP cleanup on driver removal in error path
(bsc#1255226). - CVE-2025-68227: mptcp: Fix proto fallback detection with BPF (bsc#1255216).
- CVE-2025-68241: ipv4: route: Prevent rt_bind_exception() from rebinding
stale fnhe (bsc#1255157). - CVE-2025-68245: net: netpoll: fix incorrect refcount handling causing
incorrect cleanup (bsc#1255268). - CVE-2025-68261: ext4: add i_data_sem protection in
ext4_destroy_inline_data_nolock() (bsc#1255164). - CVE-2025-68284: libceph: prevent potential out-of-bounds writes in
handle_auth_session_key() (bsc#1255377). - CVE-2025-68285: libceph: fix potential use-after-free in
have_mon_and_osd_map() (bsc#1255401). - CVE-2025-68296: drm, fbcon, vga_switcheroo: Avoid race condition in fbcon
setup (bsc#1255128). - CVE-2025-68297: ceph: fix crash in process_v2_sparse_read() for encrypted
directories (bsc#1255403). - CVE-2025-68301: net: atlantic: fix fragment overflow handling in RX path
(bsc#1255120). - CVE-2025-68320: lan966x: Fix sleeping in atomic context (bsc#1255172).
- CVE-2025-68325: net/sched: sch_cake: Fix incorrect qlen reduction in
cake_drop (bsc#1255417). - CVE-2025-68327: usb: renesas_usbhs: Fix synchronous external abort on unbind
(bsc#1255488). - CVE-2025-68337: jbd2: avoid bug_on in jbd2_journal_get_create_access() when
file system corrupted (bsc#1255482). - CVE-2025-68349: NFSv4/pNFS: Clear NFS_INO_LAYOUTCOMMIT in
pnfs_mark_layout_stateid_invalid (bsc#1255544). - CVE-2025-68363: bpf: Check skb->transport_header is set in bpf_skb_check_mtu
(bsc#1255552). - CVE-2025-68365: fs/ntfs3: Initialize allocated memory before use
(bsc#1255548). - CVE-2025-68366: nbd: defer config unlock in nbd_genl_connect (bsc#1255622).
- CVE-2025-68367: macintosh/mac_hid: fix race condition in
mac_hid_toggle_emumouse (bsc#1255547). - CVE-2025-68372: nbd: defer config put in recv_work (bsc#1255537).
- CVE-2025-68379: RDMA/rxe: Fix null deref on srq->rq.queue after resize
failure (bsc#1255695). - CVE-2025-68727: ntfs3: Fix uninit buffer allocated by __getname()
(bsc#1255568). - CVE-2025-68728: ntfs3: fix uninit memory after failed mi_read in
mi_format_new (bsc#1255539). - CVE-2025-68733: smack: fix bug: unprivileged task can create labels
(bsc#1255615). - CVE-2025-68764: NFS: Automounted filesystems should inherit
ro,noexec,nodev,sync flags (bsc#1255930). - CVE-2025-68768: inet: frags: add inet_frag_queue_flush() (bsc#1256579).
- CVE-2025-68770: bnxt_en: Fix XDP_TX path (bsc#1256584).
- CVE-2025-68771: ocfs2: fix kernel BUG in ocfs2_find_victim_chain
(bsc#1256582). - CVE-2025-68775: net/handshake: duplicate handshake cancellations leak socket
(bsc#1256665). - CVE-2025-68776: net/hsr: fix NULL pointer dereference in
prp_get_untagged_frame() (bsc#1256659). - CVE-2025-68788: fsnotify: do not generate ACCESS/MODIFY events on child for
special files (bsc#1256638). - CVE-2025-68795: ethtool: Avoid overflowing userspace buffer on stats query
(bsc#1256688). - CVE-2025-68798: perf/x86/amd: Check event before enable to avoid GPF
(bsc#1256689). - CVE-2025-68800: mlxsw: spectrum_mr: Fix use-after-free when updating
multicast route stats (bsc#1256646). - CVE-2025-68801: mlxsw: spectrum_router: Fix neighbour use-after-free
(bsc#1256653). - CVE-2025-68803: nfsd: set security label during create operations
(bsc#1256770). - CVE-2025-68813: ipvs: fix ipv4 null-ptr-deref in route error path
(bsc#1256641). - CVE-2025-68814: io_uring: fix filename leak in __io_openat_prep()
(bsc#1256651). - CVE-2025-68815: net/sched: ets: Remove drr class from the active list if it
changes to strict (bsc#1256680). - CVE-2025-68816: net/mlx5: fw_tracer, Validate format string parameters
(bsc#1256674). - CVE-2025-68820: ext4: xattr: fix null pointer deref in ext4_raw_inode()
(bsc#1256754). - CVE-2025-71064: net: hns3: using the num_tqps in the vf driver to apply for
resources (bsc#1256654). - CVE-2025-71066: net/sched: ets: Always remove class from active list before
deleting in ets_qdisc_change (bsc#1256645). - CVE-2025-71077: tpm: Cap the number of PCR banks (bsc#1256613).
- CVE-2025-71080: ipv6: fix a BUG in rt6_get_pcpu_route() under PREEMPT_RT
(bsc#1256608). - CVE-2025-71084: RDMA/cm: Fix leaking the multicast GID table reference
(bsc#1256622). - CVE-2025-71085: ipv6: BUG() in pskb_expand_head() as part of
calipso_skbuff_setattr() (bsc#1256623). - CVE-2025-71087: iavf: fix off-by-one issues in iavf_config_rss_reg()
(bsc#1256628). - CVE-2025-71088: mptcp: fallback earlier on simult connection (bsc#1256630).
- CVE-2025-71089: iommu: disable SVA when CONFIG_X86 is set (bsc#1256612).
- CVE-2025-71091: team: fix check for port enabled in
team_queue_override_port_prio_changed() (bsc#1256773). - CVE-2025-71093: e1000: fix OOB in e1000_tbi_should_accept() (bsc#1256777).
- CVE-2025-71094: net: usb: asix: ax88772: Increase phy_name size
(bsc#1256597). - CVE-2025-71095: net: stmmac: fix the crash issue for zero copy XDP_TX action
(bsc#1256605). - CVE-2025-71096: RDMA/core: Check for the presence of LS_NLA_TYPE_DGID
correctly (bsc#1256606). - CVE-2025-71097: ipv4: Fix reference count leak when using error routes with
nexthop objects (bsc#1256607). - CVE-2025-71098: ip6_gre: make ip6gre_header() robust (bsc#1256591).
- CVE-2025-71112: net: hns3: add VLAN id validation before using
(bsc#1256726). - CVE-2025-71116: libceph: make decode_pool() more resilient against corrupted
osdmaps (bsc#1256744). - CVE-2025-71120: SUNRPC: svcauth_gss: avoid NULL deref on zero length
gss_token in gss_read_proxy_verf (bsc#1256779). - CVE-2025-71123: ext4: fix string copying in parse_apply_sb_mount_options()
(bsc#1256757). - CVE-2025-71133: RDMA/irdma: avoid invalid read in irdma_net_event
(bsc#1256733). - CVE-2025-71135: md/raid5: fix possible null-pointer dereferences in
raid5_store_group_thread_cnt() (bsc#1256761). - CVE-2025-71137: octeontx2-pf: fix "UBSAN: shift-out-of-bounds error"
(bsc#1256760). - CVE-2025-71149: io_uring/poll: correctly handle io_poll_add() return value
on update (bsc#1257164). - CVE-2025-71156: gve: defer interrupt enabling until NAPI registration
(bsc#1257167). - CVE-2025-71157: RDMA/core: always drop device refcount in
ib_del_sub_device_and_put() (bsc#1257168). - CVE-2026-22976: net/sched: sch_qfq: Fix NULL deref when deactivating
inactive aggregate in qfq_reset (bsc#1257035). - CVE-2026-22977: net: sock: fix hardened usercopy panic in sock_recv_errqueue
(bsc#1257053). - CVE-2026-22984: libceph: prevent potential out-of-bounds reads in
handle_auth_done() (bsc#1257217). - CVE-2026-22990: libceph: replace overzealous BUG_ON in
osdmap_apply_incremental() (bsc#1257221). - CVE-2026-22991: libceph: make free_choose_arg_map() resilient to partial
allocation (bsc#1257220). - CVE-2026-22992: libceph: return the handler error from
mon_handle_auth_done() (bsc#1257218). - CVE-2026-22993: idpf: Fix RSS LUT NULL pointer crash on early ethtool
operations (bsc#1257180). - CVE-2026-22996: net/mlx5e: Don't store mlx5e_priv in mlx5e_dev devlink priv.
- CVE-2026-22999: net/sched: sch_qfq: do not free existing class in
qfq_change_class() (bsc#1257236). - CVE-2026-23000: net/mlx5e: Fix crash on profile change rollback failure
(bsc#1257234). - CVE-2026-23001: macvlan: fix possible UAF in macvlan_forward_source()
(bsc#1257232). - CVE-2026-23005: x86/fpu: Clear XSTATE_BV in guest XSAVE state whenever
XFD[i]=1 (bsc#1257245). - CVE-2026-23011: ipv4: ip_gre: make ipgre_header() robust (bsc#1257207).
The following non security issues were fixed:
https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html