File _patchinfo of Package patchinfo.41165
<patchinfo incident="41165"> <issue id="1232384" tracker="bnc">VUL-0: CVE-2024-49974: kernel live patch: NFSD: limit the number of concurrent async COPY operations</issue> <issue id="1245794" tracker="bnc">VUL-0: CVE-2025-21971: kernel live patch: net_sched: Prevent creation of classes with TC_H_ROOT</issue> <issue id="1246075" tracker="bnc">VUL-0: CVE-2025-38206: kernel live patch: exfat: fix double free in delayed_free</issue> <issue id="1248673" tracker="bnc">VUL-0: CVE-2025-38499: kernel live patch: clone_private_mnt(): make sure that caller has CAP_SYS_ADMIN in the right userns</issue> <issue id="1248749" tracker="bnc">VUL-0: CVE-2025-38644: kernel live patch: wifi: mac80211: reject TDLS operations when station is not associated</issue> <issue id="1249534" tracker="bnc">VUL-0: CVE-2025-38678: kernel live patch: netfilter: nf_tables: reject duplicate device on updates</issue> <issue id="2024-49974" tracker="cve" /> <issue id="2025-21971" tracker="cve" /> <issue id="2025-38206" tracker="cve" /> <issue id="2025-38499" tracker="cve" /> <issue id="2025-38644" tracker="cve" /> <issue id="2025-38678" tracker="cve" /> <category>security</category> <rating>important</rating> <packager>nstange</packager> <description>This update for the Linux Kernel 5.14.21-150400_24_136 fixes several issues. The following security issues were fixed: - CVE-2025-38678: netfilter: nf_tables: reject duplicate device on updates (bsc#1249534). - CVE-2025-38499: clone_private_mnt(): make sure that caller has CAP_SYS_ADMIN in the right userns (bsc#1248673). - CVE-2024-49974: NFSD: Force all NFSv4.2 COPY requests to be synchronous (bsc#1232384). - CVE-2025-21971: net_sched: Prevent creation of classes with TC_H_ROOT (bsc#1245794). - CVE-2025-38644: wifi: mac80211: reject TDLS operations when station is not associated (bsc#1248749). - CVE-2025-38206: exfat: fix double free in delayed_free (bsc#1246075). </description> <summary>Security update for the Linux Kernel (Live Patch 32 for SLE 15 SP4)</summary> </patchinfo>