<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP6)</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2025:1232-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2025-04-14T09:04:21Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2025-04-14T09:04:21Z</InitialReleaseDate>
    <CurrentReleaseDate>2025-04-14T09:04:21Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP6)</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for the Linux Kernel 6.4.0-150600_21 fixes several issues.

The following security issues were fixed:

- CVE-2024-56600: net: inet6: do not leave a dangling sk pointer in inet6_create() (bsc#1235218).
- CVE-2024-41090: tap: add missing verification for short frame (bsc#1228714).
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-2025-1232,SUSE-2025-1233,SUSE-2025-1234,SUSE-2025-1239,SUSE-2025-1243,SUSE-SLE-Module-Live-Patching-15-SP4-2025-1232,SUSE-SLE-Module-Live-Patching-15-SP5-2025-1234,SUSE-SLE-Module-Live-Patching-15-SP6-2025-1239</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20251232-1/</URL>
      <Description>Link for SUSE-SU-2025:1232-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-updates/2025-April/038976.html</URL>
      <Description>E-Mail link for SUSE-SU-2025:1232-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1228714</URL>
      <Description>SUSE Bug 1228714</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1235218</URL>
      <Description>SUSE Bug 1235218</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-41090/</URL>
      <Description>SUSE CVE CVE-2024-41090 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-56600/</URL>
      <Description>SUSE CVE CVE-2024-56600 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Live Patching 15 SP4">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Live Patching 15 SP4">
        <FullProductName ProductID="SUSE Linux Enterprise Live Patching 15 SP4" CPE="cpe:/o:suse:sle-module-live-patching:15:sp4">SUSE Linux Enterprise Live Patching 15 SP4</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Live Patching 15 SP5">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Live Patching 15 SP5">
        <FullProductName ProductID="SUSE Linux Enterprise Live Patching 15 SP5" CPE="cpe:/o:suse:sle-module-live-patching:15:sp5">SUSE Linux Enterprise Live Patching 15 SP5</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Live Patching 15 SP6">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Live Patching 15 SP6">
        <FullProductName ProductID="SUSE Linux Enterprise Live Patching 15 SP6" CPE="cpe:/o:suse:sle-module-live-patching:15:sp6">SUSE Linux Enterprise Live Patching 15 SP6</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="kernel-livepatch-5_14_21-150400_24_125-default-10-150400.2.1">
      <FullProductName ProductID="kernel-livepatch-5_14_21-150400_24_125-default-10-150400.2.1">kernel-livepatch-5_14_21-150400_24_125-default-10-150400.2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-livepatch-5_14_21-150500_55_52-default-16-150500.2.1">
      <FullProductName ProductID="kernel-livepatch-5_14_21-150500_55_52-default-16-150500.2.1">kernel-livepatch-5_14_21-150500_55_52-default-16-150500.2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-livepatch-5_14_21-150500_55_62-default-14-150500.2.1">
      <FullProductName ProductID="kernel-livepatch-5_14_21-150500_55_62-default-14-150500.2.1">kernel-livepatch-5_14_21-150500_55_62-default-14-150500.2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-livepatch-6_4_0-150600_21-default-14-150600.4.34.1">
      <FullProductName ProductID="kernel-livepatch-6_4_0-150600_21-default-14-150600.4.34.1">kernel-livepatch-6_4_0-150600_21-default-14-150600.4.34.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-livepatch-5_14_21-150500_55_65-default-14-150500.2.1">
      <FullProductName ProductID="kernel-livepatch-5_14_21-150500_55_65-default-14-150500.2.1">kernel-livepatch-5_14_21-150500_55_65-default-14-150500.2.1</FullProductName>
    </Branch>
    <Relationship ProductReference="kernel-livepatch-5_14_21-150400_24_125-default-10-150400.2.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Live Patching 15 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_125-default-10-150400.2.1">kernel-livepatch-5_14_21-150400_24_125-default-10-150400.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-livepatch-5_14_21-150500_55_62-default-14-150500.2.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Live Patching 15 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-14-150500.2.1">kernel-livepatch-5_14_21-150500_55_62-default-14-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-livepatch-6_4_0-150600_21-default-14-150600.4.34.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Live Patching 15 SP6">
      <FullProductName ProductID="SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_21-default-14-150600.4.34.1">kernel-livepatch-6_4_0-150600_21-default-14-150600.4.34.1 as a component of SUSE Linux Enterprise Live Patching 15 SP6</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

tap: add missing verification for short frame

The cited commit missed to check against the validity of the frame length
in the tap_get_user_xdp() path, which could cause a corrupted skb to be
sent downstack. Even before the skb is transmitted, the
tap_get_user_xdp()--&gt;skb_set_network_header() may assume the size is more
than ETH_HLEN. Once transmitted, this could either cause out-of-bound
access beyond the actual length, or confuse the underlayer with incorrect
or inconsistent header length in the skb metadata.

In the alternative path, tap_get_user() already prohibits short frame which
has the length less than Ethernet header size from being transmitted.

This is to drop any frame shorter than the Ethernet header size just like
how tap_get_user() does.

CVE: CVE-2024-41090</Note>
    </Notes>
    <CVE>CVE-2024-41090</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_125-default-10-150400.2.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-14-150500.2.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_21-default-14-150600.4.34.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20251232-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-41090.html</URL>
        <Description>CVE-2024-41090</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1228328</URL>
        <Description>SUSE Bug 1228328</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1228714</URL>
        <Description>SUSE Bug 1228714</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

net: inet6: do not leave a dangling sk pointer in inet6_create()

sock_init_data() attaches the allocated sk pointer to the provided sock
object. If inet6_create() fails later, the sk object is released, but the
sock object retains the dangling sk pointer, which may cause use-after-free
later.

Clear the sock sk pointer on error.</Note>
    </Notes>
    <CVE>CVE-2024-56600</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_125-default-10-150400.2.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-14-150500.2.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_21-default-14-150600.4.34.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20251232-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-56600.html</URL>
        <Description>CVE-2024-56600</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1235217</URL>
        <Description>SUSE Bug 1235217</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1235218</URL>
        <Description>SUSE Bug 1235218</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
