{"affected":[{"ecosystem_specific":{"binaries":[{"kernel-livepatch-6_4_0-150600_10_5-rt":"21-150600.2.2"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Live Patching 15 SP6","name":"kernel-livepatch-SLE15-SP6-RT_Update_1","purl":"pkg:rpm/suse/kernel-livepatch-SLE15-SP6-RT_Update_1&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015%20SP6"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"21-150600.2.2"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for the Linux Kernel 6.4.0-150600_10_5 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2024-49860: ACPI: sysfs: validate return type of _STR method (bsc#1231862).\n- CVE-2025-38177: sch_hfsc: make hfsc_qlen_notify() idempotent (bsc#1246356).\n- CVE-2025-38109: net/mlx5: fix ECVF vports unload on shutdown flow (bsc#1245685).\n- CVE-2025-38181: calipso: Fix null-ptr-deref in calipso_req_{set,del}attr() (bsc#1246001).\n- CVE-2025-21756: vsock: Keep the binding until socket destruction (bsc#1245795).\n- CVE-2025-21755: vsock: Orphan socket after transport release (bsc#1245795).\n- CVE-2025-38498: do_change_type(): refuse to operate on unmounted/not ours mounts (bsc#1247499).\n- CVE-2025-38555: usb: gadget : fix use-after-free in composite_dev_cleanup() (bsc#1248298).\n- CVE-2024-26808: netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain (bsc#1245772).\n","id":"SUSE-SU-2025:03341-1","modified":"2025-09-24T12:33:28Z","published":"2025-09-24T12:33:28Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2025/suse-su-202503341-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231862"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245685"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245772"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245795"},{"type":"REPORT","url":"https://bugzilla.suse.com/1246001"},{"type":"REPORT","url":"https://bugzilla.suse.com/1246356"},{"type":"REPORT","url":"https://bugzilla.suse.com/1247499"},{"type":"REPORT","url":"https://bugzilla.suse.com/1248298"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26808"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-49860"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21756"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38109"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38177"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38181"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38498"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38555"}],"related":["CVE-2024-26808","CVE-2024-49860","CVE-2025-21756","CVE-2025-38109","CVE-2025-38177","CVE-2025-38181","CVE-2025-38498","CVE-2025-38555"],"summary":"Security update for the Linux Kernel RT (Live Patch 1 for SLE 15 SP6)","upstream":["CVE-2024-26808","CVE-2024-49860","CVE-2025-21756","CVE-2025-38109","CVE-2025-38177","CVE-2025-38181","CVE-2025-38498","CVE-2025-38555"]}