CVE-2024-8805: BlueZ HID over GATT Profile Improper Access Control Remote Code Execution Vulnerability (bsc#1240840).
CVE-2025-21702: pfifotailenqueue: Drop new packet when sch->limit == 0 (bsc#1245797).
CVE-2025-21772: partitions: mac: fix handling of bogus partition table (bsc#1238912).
CVE-2025-21791: vrf: use RCU protection in l3mdevl3out() (bsc#1240744).
CVE-2025-21971: netsched: Prevent creation of classes with TCH_ROOT (bsc#1245794).
CVE-2025-37752: netsched: schsfq: move the limit validation (bsc#1245776).
CVE-2025-37797: net_sched: hfsc: Fix a UAF vulnerability in class handling (bsc#1245793).
CVE-2025-38000: schhfsc: Fix qlen accounting bug when using peek in hfscenqueue() (bsc#1245775).
CVE-2025-38079: crypto: algifhash - fix double free in hashaccept (bsc#1245218).
CVE-2025-38083: netsched: prio: fix a race in priotune() (bsc#1245350).
CVE-2025-38177: kernel: schhfsc: make hfscqlen_notify() idempotent (bsc#1246356).
CVE-2025-38181: calipso: fix null-ptr-deref in calipsoreq{set,del}attr() (bsc#1246001).
CVE-2025-38212: ipc: fix to protect IPCS lookups using RCU (bsc#1246030).
CVE-2025-38477: net/sched: schqfq: Fix race condition on qfqaggregate (bsc#1247315).
CVE-2025-38494: HID: core: do not bypass hidhwraw_request (bsc#1247350).
CVE-2025-38495: HID: core: ensure the allocated report buffer can contain the reserved report ID (bsc#1247351).
CVE-2025-38498: dochangetype(): refuse to operate on unmounted/not ours mounts (bsc#1247499).
CVE-2025-38499: cloneprivatemnt(): make sure that caller has CAPSYSADMIN in the right userns (bsc#1248673).
CVE-2025-38617: net/packet: fix a race in packetsetring() and packet_notifier() (bsc#1249208).
CVE-2025-38618: vsock: Do not allow binding to VMADDRPORTANY (bsc#1249207).
CVE-2025-38644: wifi: mac80211: reject TDLS operations when station is not associated (bsc#1248749).
The following non security issues were fixed:
Add the git commit and branch to the package description (bsc#920633)
Fix description in rpm spec file Spec file description mentions initial kGraft patch which is only true for real initial patch. Make it more neutral. (bsc#930408)
Mark the module as supported (bsc#904970)
Provide common kallsyms wrapper API With bsc#1103203, the need for disambiguating between a multiply defined symbol arose. This is something the kallsymslookupname() based code snippet we used to copy&paste to every individual CVE fix can't handle. Implement a proper wrapper API for doing the kallsyms lookups.
Require exact kernel version in the patch (bsc#920615)
Revert 'Require exact kernel version in the patch' This needs to be done differently, so that modprobe --force works as expected. (bsc#920615) This reverts commit c62c11aecd4e3f8822e1b835fea403acc3148c5a.
Set immediate flag for the initial patch Setting immediate to true will simplify installation of the initial patch and possibly also of the further updates. (bsc#907150)
The stubs' signatures have changed: each argument used to get mapped to either long or long long, but on x8664, the stubs are now receiving a single struct ptregs only -- it's their responsibility to extract the arguments as appropriate. In order to not require each and every live patch touching syscalls to include an insane amount of ifdeffery, provide a set of #defines hiding it: 1.) KLPSYSCALLSYM(name) expands to the syscall stub name for 64 bits as defined by SYSCALLDEFINEx(x, name, ...). 2.) If the architeture requires 32bit specific stubs for syscalls sharing a common implementation between 32 and 64bits, the KLPARCHHASSYSCALLCOMPATSTUBS macro is defined. 3.) If KLPARCHHASSYSCALLCOMPATSTUBS is defined, then KLPSYSCALLCOMPATSTUBSYM(name) expands to the syscall stub name for 32 bits as defined by _SYSCALLDEFINEx(x, name, ...). 4.) For syscalls not sharing a common implementation between 32 and 64 bits, i.e. those defined by COMPATSYSCALLDEFINEx(), the macro KLPCOMPATSYSCALLSYM(name) expands to the stub name defined as defined by COMPATSYSCALLDEFINEx(x, name, ...). 5.) Finally, for hiding differences between the signatures, provide the macro KLPSYSCALLDECLx(x, sym, ...) which expands to a declaration of sym, with the x arguments either mapped to long resp. long long each, or collapsed to a single struct ptregs argument as appropriate for the architecture. Note that these macros are defined as appropriate on kernels before and after 4.17, so that live patch code can be shared. (bsc#1149841)
bsc#1249208: fix livepatching target module name (bsc#1252946)
unamepatch: convert to the syscall stub wrapper macros from klpsyscalls.h In order to make the live patch to the newuname() syscall work on kernels >= 4.17 again, convert it to the KLPSYSCALL*() wrapper macros provided by klp_syscalls.h. (bsc#1149841)