{"affected":[{"ecosystem_specific":{"binaries":[{"kernel-livepatch-5_14_21-150400_24_167-default":"2-150400.2.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Live Patching 15 SP4","name":"kernel-livepatch-SLE15-SP4_Update_41","purl":"pkg:rpm/suse/kernel-livepatch-SLE15-SP4_Update_41&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015%20SP4"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2-150400.2.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for the Linux Kernel 5.14.21-150400_24_167 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2025-37797: net_sched: hfsc: Fix a UAF vulnerability in class handling (bsc#1245793).\n- CVE-2025-37752: net_sched: sch_sfq: move the limit validation (bsc#1245776).\n- CVE-2024-53125: bpf: sync_linked_regs() must preserve subreg_def (bsc#1245804).\n- CVE-2025-21702: pfifo_tail_enqueue: Drop new packet when sch->limit == 0 (bsc#1245797).\n","id":"SUSE-SU-2025:02708-1","modified":"2025-08-05T11:34:16Z","published":"2025-08-05T11:34:16Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2025/suse-su-202502708-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245776"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245793"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245797"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245804"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53125"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21702"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-37752"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-37797"}],"related":["CVE-2024-53125","CVE-2025-21702","CVE-2025-37752","CVE-2025-37797"],"summary":"Security update for the Linux Kernel (Live Patch 41 for SLE 15 SP4)","upstream":["CVE-2024-53125","CVE-2025-21702","CVE-2025-37752","CVE-2025-37797"]}