{"affected":[{"ecosystem_specific":{"binaries":[{"kernel-livepatch-5_14_21-150400_24_173-default":"4-150400.2.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Live Patching 15 SP4","name":"kernel-livepatch-SLE15-SP4_Update_43","purl":"pkg:rpm/suse/kernel-livepatch-SLE15-SP4_Update_43&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015%20SP4"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4-150400.2.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"\nThis update for the SUSE Linux Enterprise kernel 5.14.21-150400.24.173 fixes various security issues\n\nThe following security issues were fixed:\n\n- CVE-2022-50252: igb: Do not free q_vector unless new one was allocated (bsc#1249847).\n- CVE-2025-38617: net/packet: fix a race in packet_set_ring() and packet_notifier() (bsc#1249208).\n- CVE-2025-38618: vsock: Do not allow binding to VMADDR_PORT_ANY (bsc#1249207).\n- CVE-2025-38664: ice: Fix a null pointer dereference in ice_copy_and_init_pkg() (bsc#1248631).\n\nThe following non security issue was fixed:\n\n- bsc#1249208: fix livepatching target module name (bsc#1252946)\n","id":"SUSE-SU-2025:4046-1","modified":"2025-11-11T02:33:47Z","published":"2025-11-11T02:33:47Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2025/suse-su-20254046-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1248631"},{"type":"REPORT","url":"https://bugzilla.suse.com/1249207"},{"type":"REPORT","url":"https://bugzilla.suse.com/1249208"},{"type":"REPORT","url":"https://bugzilla.suse.com/1249847"},{"type":"REPORT","url":"https://bugzilla.suse.com/1252946"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50252"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38617"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38618"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38664"}],"related":["CVE-2022-50252","CVE-2025-38617","CVE-2025-38618","CVE-2025-38664"],"summary":"Security update for the Linux Kernel (Live Patch 43 for SUSE Linux Enterprise 15 SP4)","upstream":["CVE-2022-50252","CVE-2025-38617","CVE-2025-38618","CVE-2025-38664"]}