File _patchinfo of Package patchinfo.41204

<patchinfo incident="41204">
  <issue id="1245794" tracker="bnc">VUL-0: CVE-2025-21971: kernel live patch: net_sched: Prevent creation of classes with TC_H_ROOT</issue>
  <issue id="1246075" tracker="bnc">VUL-0: CVE-2025-38206: kernel live patch: exfat: fix double free in delayed_free</issue>
  <issue id="1247158" tracker="bnc">VUL-0: CVE-2025-38396: kernel live patch: fs: export anon_inode_make_secure_inode() and fix secretmem LSM bypass</issue>
  <issue id="1247452" tracker="bnc">VUL-0: CVE-2025-38471: kernel live patch: kernel: tls: always refresh the queue when reading sock</issue>
  <issue id="1248376" tracker="bnc">VUL-0: CVE-2025-38566: kernel live patch: sunrpc: fix handling of server side tls alerts</issue>
  <issue id="1248673" tracker="bnc">VUL-0: CVE-2025-38499: kernel live patch: clone_private_mnt(): make sure that caller has CAP_SYS_ADMIN in the right userns</issue>
  <issue id="1248749" tracker="bnc">VUL-0: CVE-2025-38644: kernel live patch: wifi: mac80211: reject TDLS operations when station is not associated</issue>
  <issue id="1249458" tracker="bnc">VUL-0: CVE-2025-38110: kernel live patch: net/mdiobus: Fix potential out-of-bounds clause 45 read/write access</issue>
  <issue id="1249534" tracker="bnc">VUL-0: CVE-2025-38678: kernel live patch: netfilter: nf_tables: reject duplicate device on updates</issue>
  <issue id="2025-21971" tracker="cve" />
  <issue id="2025-38110" tracker="cve" />
  <issue id="2025-38206" tracker="cve" />
  <issue id="2025-38396" tracker="cve" />
  <issue id="2025-38471" tracker="cve" />
  <issue id="2025-38499" tracker="cve" />
  <issue id="2025-38566" tracker="cve" />
  <issue id="2025-38644" tracker="cve" />
  <issue id="2025-38678" tracker="cve" />
  <category>security</category>
  <rating>important</rating>
  <packager>nstange</packager>
  <description>This update for the Linux Kernel 6.4.0-150600_23_33 fixes several issues.

The following security issues were fixed:

- CVE-2025-38678: netfilter: nf_tables: reject duplicate device on updates (bsc#1249534).
- CVE-2025-38499: clone_private_mnt(): make sure that caller has CAP_SYS_ADMIN in the right userns (bsc#1248673).
- CVE-2025-38396: fs: export anon_inode_make_secure_inode() and fix secretmem LSM bypass (bsc#1247158).
- CVE-2025-38566: sunrpc: fix handling of server side tls alerts (bsc#1248376).
- CVE-2025-21971: net_sched: Prevent creation of classes with TC_H_ROOT (bsc#1245794).
- CVE-2025-38110: net/mdiobus: Fix potential out-of-bounds clause 45 read/write access (bsc#1249458).
- CVE-2025-38644: wifi: mac80211: reject TDLS operations when station is not associated (bsc#1248749).
- CVE-2025-38206: exfat: fix double free in delayed_free (bsc#1246075).
- CVE-2025-38471: tls: always refresh the queue when reading sock (bsc#1247452).
</description>
<summary>Security update for the Linux Kernel (Live Patch 7 for SLE 15 SP6)</summary>
</patchinfo>
openSUSE Build Service is sponsored by