<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for the Linux Kernel (Live Patch 22 for SLE 15 SP4)</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2025:0250-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2025-01-27T12:04:12Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2025-01-27T12:04:12Z</InitialReleaseDate>
    <CurrentReleaseDate>2025-01-27T12:04:12Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for the Linux Kernel (Live Patch 22 for SLE 15 SP4)</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for the Linux Kernel 5.14.21-150400_24_103 fixes one issue.

The following security issue was fixed:

- CVE-2024-36971: Fixed __dst_negative_advice() race (bsc#1226324).
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-2025-247,SUSE-2025-250,SUSE-SLE-Module-Live-Patching-15-SP3-2025-250,SUSE-SLE-Module-Live-Patching-15-SP4-2025-247</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250250-1/</URL>
      <Description>Link for SUSE-SU-2025:0250-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2025-January/020219.html</URL>
      <Description>E-Mail link for SUSE-SU-2025:0250-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226324</URL>
      <Description>SUSE Bug 1226324</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-36971/</URL>
      <Description>SUSE CVE CVE-2024-36971 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Live Patching 15 SP3">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Live Patching 15 SP3">
        <FullProductName ProductID="SUSE Linux Enterprise Live Patching 15 SP3" CPE="cpe:/o:suse:sle-module-live-patching:15:sp3">SUSE Linux Enterprise Live Patching 15 SP3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Live Patching 15 SP4">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Live Patching 15 SP4">
        <FullProductName ProductID="SUSE Linux Enterprise Live Patching 15 SP4" CPE="cpe:/o:suse:sle-module-live-patching:15:sp4">SUSE Linux Enterprise Live Patching 15 SP4</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="kernel-livepatch-5_14_21-150400_24_103-default-14-150400.2.1">
      <FullProductName ProductID="kernel-livepatch-5_14_21-150400_24_103-default-14-150400.2.1">kernel-livepatch-5_14_21-150400_24_103-default-14-150400.2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-livepatch-5_3_18-150300_59_147-default-16-150300.2.1">
      <FullProductName ProductID="kernel-livepatch-5_3_18-150300_59_147-default-16-150300.2.1">kernel-livepatch-5_3_18-150300_59_147-default-16-150300.2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-livepatch-5_3_18-150300_59_147-preempt-16-150300.2.1">
      <FullProductName ProductID="kernel-livepatch-5_3_18-150300_59_147-preempt-16-150300.2.1">kernel-livepatch-5_3_18-150300_59_147-preempt-16-150300.2.1</FullProductName>
    </Branch>
    <Relationship ProductReference="kernel-livepatch-5_3_18-150300_59_147-default-16-150300.2.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Live Patching 15 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_147-default-16-150300.2.1">kernel-livepatch-5_3_18-150300_59_147-default-16-150300.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-livepatch-5_14_21-150400_24_103-default-14-150400.2.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Live Patching 15 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_103-default-14-150400.2.1">kernel-livepatch-5_14_21-150400_24_103-default-14-150400.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net: fix __dst_negative_advice() race

__dst_negative_advice() does not enforce proper RCU rules when
sk-&gt;dst_cache must be cleared, leading to possible UAF.

RCU rules are that we must first clear sk-&gt;sk_dst_cache,
then call dst_release(old_dst).

Note that sk_dst_reset(sk) is implementing this protocol correctly,
while __dst_negative_advice() uses the wrong order.

Given that ip6_negative_advice() has special logic
against RTF_CACHE, this means each of the three -&gt;negative_advice()
existing methods must perform the sk_dst_reset() themselves.

Note the check against NULL dst is centralized in
__dst_negative_advice(), there is no need to duplicate
it in various callbacks.

Many thanks to Clement Lecigne for tracking this issue.

This old bug became visible after the blamed commit, using UDP sockets.</Note>
    </Notes>
    <CVE>CVE-2024-36971</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_147-default-16-150300.2.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_103-default-14-150400.2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250250-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-36971.html</URL>
        <Description>CVE-2024-36971</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226145</URL>
        <Description>SUSE Bug 1226145</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226324</URL>
        <Description>SUSE Bug 1226324</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
