{"document":{"aggregate_severity":{"namespace":"https://www.suse.com/support/security/rating/","text":"important"},"category":"csaf_security_advisory","csaf_version":"2.0","distribution":{"text":"Copyright 2024 SUSE LLC. All rights reserved.","tlp":{"label":"WHITE","url":"https://www.first.org/tlp/"}},"lang":"en","notes":[{"category":"summary","text":"Security update for the Linux Kernel (Live Patch 27 for SLE 15 SP4)","title":"Title of the patch"},{"category":"description","text":"This update for the Linux Kernel 5.14.21-150400_24_122 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2022-49080: mm/mempolicy: fix mpol_new leak in shared_policy_replace (bsc#1238324).\n- CVE-2024-57996: net_sched: sch_sfq: do not allow 1 packet limit (bsc#1239077).\n","title":"Description of the patch"},{"category":"details","text":"SUSE-2025-1935,SUSE-2025-1936,SUSE-SLE-Module-Live-Patching-15-SP4-2025-1935","title":"Patchnames"},{"category":"legal_disclaimer","text":"CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).","title":"Terms of use"}],"publisher":{"category":"vendor","contact_details":"https://www.suse.com/support/security/contact/","name":"SUSE Product Security Team","namespace":"https://www.suse.com/"},"references":[{"category":"external","summary":"SUSE ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"self","summary":"URL of this CSAF notice","url":"https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_01935-1.json"},{"category":"self","summary":"URL for SUSE-SU-2025:01935-1","url":"https://www.suse.com/support/update/announcement/2025/suse-su-202501935-1/"},{"category":"self","summary":"E-Mail link for SUSE-SU-2025:01935-1","url":"https://lists.suse.com/pipermail/sle-updates/2025-June/040272.html"},{"category":"self","summary":"SUSE Bug 1238324","url":"https://bugzilla.suse.com/1238324"},{"category":"self","summary":"SUSE Bug 1239077","url":"https://bugzilla.suse.com/1239077"},{"category":"self","summary":"SUSE CVE CVE-2022-49080 page","url":"https://www.suse.com/security/cve/CVE-2022-49080/"},{"category":"self","summary":"SUSE CVE CVE-2024-57996 page","url":"https://www.suse.com/security/cve/CVE-2024-57996/"}],"title":"Security update for the Linux Kernel (Live Patch 27 for SLE 15 SP4)","tracking":{"current_release_date":"2025-06-12T22:33:14Z","generator":{"date":"2025-06-12T22:33:14Z","engine":{"name":"cve-database.git:bin/generate-csaf.pl","version":"1"}},"id":"SUSE-SU-2025:01935-1","initial_release_date":"2025-06-12T22:33:14Z","revision_history":[{"date":"2025-06-12T22:33:14Z","number":"1","summary":"Current version"}],"status":"final","version":"1"}},"product_tree":{"branches":[{"branches":[{"branches":[{"category":"product_version","name":"kernel-livepatch-5_14_21-150400_24_122-default-16-150400.2.2.ppc64le","product":{"name":"kernel-livepatch-5_14_21-150400_24_122-default-16-150400.2.2.ppc64le","product_id":"kernel-livepatch-5_14_21-150400_24_122-default-16-150400.2.2.ppc64le"}},{"category":"product_version","name":"kernel-livepatch-5_14_21-150400_24_141-default-8-150400.2.2.ppc64le","product":{"name":"kernel-livepatch-5_14_21-150400_24_141-default-8-150400.2.2.ppc64le","product_id":"kernel-livepatch-5_14_21-150400_24_141-default-8-150400.2.2.ppc64le"}}],"category":"architecture","name":"ppc64le"},{"branches":[{"category":"product_version","name":"kernel-livepatch-5_14_21-150400_24_122-default-16-150400.2.2.s390x","product":{"name":"kernel-livepatch-5_14_21-150400_24_122-default-16-150400.2.2.s390x","product_id":"kernel-livepatch-5_14_21-150400_24_122-default-16-150400.2.2.s390x"}},{"category":"product_version","name":"kernel-livepatch-5_14_21-150400_24_141-default-8-150400.2.2.s390x","product":{"name":"kernel-livepatch-5_14_21-150400_24_141-default-8-150400.2.2.s390x","product_id":"kernel-livepatch-5_14_21-150400_24_141-default-8-150400.2.2.s390x"}}],"category":"architecture","name":"s390x"},{"branches":[{"category":"product_version","name":"kernel-livepatch-5_14_21-150400_24_122-default-16-150400.2.2.x86_64","product":{"name":"kernel-livepatch-5_14_21-150400_24_122-default-16-150400.2.2.x86_64","product_id":"kernel-livepatch-5_14_21-150400_24_122-default-16-150400.2.2.x86_64"}},{"category":"product_version","name":"kernel-livepatch-5_14_21-150400_24_141-default-8-150400.2.2.x86_64","product":{"name":"kernel-livepatch-5_14_21-150400_24_141-default-8-150400.2.2.x86_64","product_id":"kernel-livepatch-5_14_21-150400_24_141-default-8-150400.2.2.x86_64"}}],"category":"architecture","name":"x86_64"},{"branches":[{"category":"product_name","name":"SUSE Linux Enterprise Live Patching 15 SP4","product":{"name":"SUSE Linux Enterprise Live Patching 15 SP4","product_id":"SUSE Linux Enterprise Live Patching 15 SP4","product_identification_helper":{"cpe":"cpe:/o:suse:sle-module-live-patching:15:sp4"}}}],"category":"product_family","name":"SUSE Linux Enterprise"}],"category":"vendor","name":"SUSE"}],"relationships":[{"category":"default_component_of","full_product_name":{"name":"kernel-livepatch-5_14_21-150400_24_122-default-16-150400.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP4","product_id":"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_122-default-16-150400.2.2.ppc64le"},"product_reference":"kernel-livepatch-5_14_21-150400_24_122-default-16-150400.2.2.ppc64le","relates_to_product_reference":"SUSE Linux Enterprise Live Patching 15 SP4"},{"category":"default_component_of","full_product_name":{"name":"kernel-livepatch-5_14_21-150400_24_122-default-16-150400.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP4","product_id":"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_122-default-16-150400.2.2.s390x"},"product_reference":"kernel-livepatch-5_14_21-150400_24_122-default-16-150400.2.2.s390x","relates_to_product_reference":"SUSE Linux Enterprise Live Patching 15 SP4"},{"category":"default_component_of","full_product_name":{"name":"kernel-livepatch-5_14_21-150400_24_122-default-16-150400.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP4","product_id":"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_122-default-16-150400.2.2.x86_64"},"product_reference":"kernel-livepatch-5_14_21-150400_24_122-default-16-150400.2.2.x86_64","relates_to_product_reference":"SUSE Linux Enterprise Live Patching 15 SP4"}]},"vulnerabilities":[{"cve":"CVE-2022-49080","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2022-49080"}],"notes":[{"category":"general","text":"In the Linux kernel, the following vulnerability has been resolved:\n\nmm/mempolicy: fix mpol_new leak in shared_policy_replace\n\nIf mpol_new is allocated but not used in restart loop, mpol_new will be\nfreed via mpol_put before returning to the caller.  But refcnt is not\ninitialized yet, so mpol_put could not do the right things and might\nleak the unused mpol_new.  This would happen if mempolicy was updated on\nthe shared shmem file while the sp->lock has been dropped during the\nmemory allocation.\n\nThis issue could be triggered easily with the below code snippet if\nthere are many processes doing the below work at the same time:\n\n  shmid = shmget((key_t)5566, 1024 * PAGE_SIZE, 0666|IPC_CREAT);\n  shm = shmat(shmid, 0, 0);\n  loop many times {\n    mbind(shm, 1024 * PAGE_SIZE, MPOL_LOCAL, mask, maxnode, 0);\n    mbind(shm + 128 * PAGE_SIZE, 128 * PAGE_SIZE, MPOL_DEFAULT, mask,\n          maxnode, 0);\n  }","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_122-default-16-150400.2.2.ppc64le","SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_122-default-16-150400.2.2.s390x","SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_122-default-16-150400.2.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2022-49080","url":"https://www.suse.com/security/cve/CVE-2022-49080"},{"category":"external","summary":"SUSE Bug 1238033 for CVE-2022-49080","url":"https://bugzilla.suse.com/1238033"},{"category":"external","summary":"SUSE Bug 1238324 for CVE-2022-49080","url":"https://bugzilla.suse.com/1238324"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_122-default-16-150400.2.2.ppc64le","SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_122-default-16-150400.2.2.s390x","SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_122-default-16-150400.2.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":7.8,"baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","version":"3.1"},"products":["SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_122-default-16-150400.2.2.ppc64le","SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_122-default-16-150400.2.2.s390x","SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_122-default-16-150400.2.2.x86_64"]}],"threats":[{"category":"impact","date":"2025-06-12T22:33:14Z","details":"important"}],"title":"CVE-2022-49080"},{"cve":"CVE-2024-57996","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2024-57996"}],"notes":[{"category":"general","text":"In the Linux kernel, the following vulnerability has been resolved:\n\nnet_sched: sch_sfq: don't allow 1 packet limit\n\nThe current implementation does not work correctly with a limit of\n1. iproute2 actually checks for this and this patch adds the check in\nkernel as well.\n\nThis fixes the following syzkaller reported crash:\n\nUBSAN: array-index-out-of-bounds in net/sched/sch_sfq.c:210:6\nindex 65535 is out of range for type 'struct sfq_head[128]'\nCPU: 0 PID: 2569 Comm: syz-executor101 Not tainted 5.10.0-smp-DEV #1\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024\nCall Trace:\n  __dump_stack lib/dump_stack.c:79 [inline]\n  dump_stack+0x125/0x19f lib/dump_stack.c:120\n  ubsan_epilogue lib/ubsan.c:148 [inline]\n  __ubsan_handle_out_of_bounds+0xed/0x120 lib/ubsan.c:347\n  sfq_link net/sched/sch_sfq.c:210 [inline]\n  sfq_dec+0x528/0x600 net/sched/sch_sfq.c:238\n  sfq_dequeue+0x39b/0x9d0 net/sched/sch_sfq.c:500\n  sfq_reset+0x13/0x50 net/sched/sch_sfq.c:525\n  qdisc_reset+0xfe/0x510 net/sched/sch_generic.c:1026\n  tbf_reset+0x3d/0x100 net/sched/sch_tbf.c:319\n  qdisc_reset+0xfe/0x510 net/sched/sch_generic.c:1026\n  dev_reset_queue+0x8c/0x140 net/sched/sch_generic.c:1296\n  netdev_for_each_tx_queue include/linux/netdevice.h:2350 [inline]\n  dev_deactivate_many+0x6dc/0xc20 net/sched/sch_generic.c:1362\n  __dev_close_many+0x214/0x350 net/core/dev.c:1468\n  dev_close_many+0x207/0x510 net/core/dev.c:1506\n  unregister_netdevice_many+0x40f/0x16b0 net/core/dev.c:10738\n  unregister_netdevice_queue+0x2be/0x310 net/core/dev.c:10695\n  unregister_netdevice include/linux/netdevice.h:2893 [inline]\n  __tun_detach+0x6b6/0x1600 drivers/net/tun.c:689\n  tun_detach drivers/net/tun.c:705 [inline]\n  tun_chr_close+0x104/0x1b0 drivers/net/tun.c:3640\n  __fput+0x203/0x840 fs/file_table.c:280\n  task_work_run+0x129/0x1b0 kernel/task_work.c:185\n  exit_task_work include/linux/task_work.h:33 [inline]\n  do_exit+0x5ce/0x2200 kernel/exit.c:931\n  do_group_exit+0x144/0x310 kernel/exit.c:1046\n  __do_sys_exit_group kernel/exit.c:1057 [inline]\n  __se_sys_exit_group kernel/exit.c:1055 [inline]\n  __x64_sys_exit_group+0x3b/0x40 kernel/exit.c:1055\n do_syscall_64+0x6c/0xd0\n entry_SYSCALL_64_after_hwframe+0x61/0xcb\nRIP: 0033:0x7fe5e7b52479\nCode: Unable to access opcode bytes at RIP 0x7fe5e7b5244f.\nRSP: 002b:00007ffd3c800398 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7\nRAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fe5e7b52479\nRDX: 000000000000003c RSI: 00000000000000e7 RDI: 0000000000000000\nRBP: 00007fe5e7bcd2d0 R08: ffffffffffffffb8 R09: 0000000000000014\nR10: 0000000000000000 R11: 0000000000000246 R12: 00007fe5e7bcd2d0\nR13: 0000000000000000 R14: 00007fe5e7bcdd20 R15: 00007fe5e7b24270\n\nThe crash can be also be reproduced with the following (with a tc\nrecompiled to allow for sfq limits of 1):\n\ntc qdisc add dev dummy0 handle 1: root tbf rate 1Kbit burst 100b lat 1s\n../iproute2-6.9.0/tc/tc qdisc add dev dummy0 handle 2: parent 1:10 sfq limit 1\nifconfig dummy0 up\nping -I dummy0 -f -c2 -W0.1 8.8.8.8\nsleep 1\n\nScenario that triggers the crash:\n\n* the first packet is sent and queued in TBF and SFQ; qdisc qlen is 1\n\n* TBF dequeues: it peeks from SFQ which moves the packet to the\n  gso_skb list and keeps qdisc qlen set to 1. TBF is out of tokens so\n  it schedules itself for later.\n\n* the second packet is sent and TBF tries to queues it to SFQ. qdisc\n  qlen is now 2 and because the SFQ limit is 1 the packet is dropped\n  by SFQ. At this point qlen is 1, and all of the SFQ slots are empty,\n  however q->tail is not NULL.\n\nAt this point, assuming no more packets are queued, when sch_dequeue\nruns again it will decrement the qlen for the current empty slot\ncausing an underflow and the subsequent out of bounds access.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_122-default-16-150400.2.2.ppc64le","SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_122-default-16-150400.2.2.s390x","SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_122-default-16-150400.2.2.x86_64"]},"references":[{"category":"external","summary":"CVE-2024-57996","url":"https://www.suse.com/security/cve/CVE-2024-57996"},{"category":"external","summary":"SUSE Bug 1239076 for CVE-2024-57996","url":"https://bugzilla.suse.com/1239076"},{"category":"external","summary":"SUSE Bug 1239077 for CVE-2024-57996","url":"https://bugzilla.suse.com/1239077"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_122-default-16-150400.2.2.ppc64le","SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_122-default-16-150400.2.2.s390x","SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_122-default-16-150400.2.2.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":7.8,"baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","version":"3.1"},"products":["SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_122-default-16-150400.2.2.ppc64le","SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_122-default-16-150400.2.2.s390x","SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_122-default-16-150400.2.2.x86_64"]}],"threats":[{"category":"impact","date":"2025-06-12T22:33:14Z","details":"important"}],"title":"CVE-2024-57996"}]}