{"affected":[{"ecosystem_specific":{"binaries":[{"kernel-default":"3.0.101-108.159.1","kernel-default-base":"3.0.101-108.159.1","kernel-default-devel":"3.0.101-108.159.1","kernel-ec2":"3.0.101-108.159.1","kernel-ec2-base":"3.0.101-108.159.1","kernel-ec2-devel":"3.0.101-108.159.1","kernel-source":"3.0.101-108.159.1","kernel-syms":"3.0.101-108.159.1","kernel-trace":"3.0.101-108.159.1","kernel-trace-base":"3.0.101-108.159.1","kernel-trace-devel":"3.0.101-108.159.1","kernel-xen":"3.0.101-108.159.1","kernel-xen-base":"3.0.101-108.159.1","kernel-xen-devel":"3.0.101-108.159.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 11 SP4 LTSS EXTREME CORE","name":"kernel-default","purl":"pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4%20LTSS%20EXTREME%20CORE"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"3.0.101-108.159.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default":"3.0.101-108.159.1","kernel-default-base":"3.0.101-108.159.1","kernel-default-devel":"3.0.101-108.159.1","kernel-ec2":"3.0.101-108.159.1","kernel-ec2-base":"3.0.101-108.159.1","kernel-ec2-devel":"3.0.101-108.159.1","kernel-source":"3.0.101-108.159.1","kernel-syms":"3.0.101-108.159.1","kernel-trace":"3.0.101-108.159.1","kernel-trace-base":"3.0.101-108.159.1","kernel-trace-devel":"3.0.101-108.159.1","kernel-xen":"3.0.101-108.159.1","kernel-xen-base":"3.0.101-108.159.1","kernel-xen-devel":"3.0.101-108.159.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 11 SP4 LTSS EXTREME CORE","name":"kernel-ec2","purl":"pkg:rpm/suse/kernel-ec2&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4%20LTSS%20EXTREME%20CORE"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"3.0.101-108.159.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default":"3.0.101-108.159.1","kernel-default-base":"3.0.101-108.159.1","kernel-default-devel":"3.0.101-108.159.1","kernel-ec2":"3.0.101-108.159.1","kernel-ec2-base":"3.0.101-108.159.1","kernel-ec2-devel":"3.0.101-108.159.1","kernel-source":"3.0.101-108.159.1","kernel-syms":"3.0.101-108.159.1","kernel-trace":"3.0.101-108.159.1","kernel-trace-base":"3.0.101-108.159.1","kernel-trace-devel":"3.0.101-108.159.1","kernel-xen":"3.0.101-108.159.1","kernel-xen-base":"3.0.101-108.159.1","kernel-xen-devel":"3.0.101-108.159.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 11 SP4 LTSS EXTREME CORE","name":"kernel-source","purl":"pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4%20LTSS%20EXTREME%20CORE"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"3.0.101-108.159.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default":"3.0.101-108.159.1","kernel-default-base":"3.0.101-108.159.1","kernel-default-devel":"3.0.101-108.159.1","kernel-ec2":"3.0.101-108.159.1","kernel-ec2-base":"3.0.101-108.159.1","kernel-ec2-devel":"3.0.101-108.159.1","kernel-source":"3.0.101-108.159.1","kernel-syms":"3.0.101-108.159.1","kernel-trace":"3.0.101-108.159.1","kernel-trace-base":"3.0.101-108.159.1","kernel-trace-devel":"3.0.101-108.159.1","kernel-xen":"3.0.101-108.159.1","kernel-xen-base":"3.0.101-108.159.1","kernel-xen-devel":"3.0.101-108.159.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 11 SP4 LTSS EXTREME CORE","name":"kernel-syms","purl":"pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4%20LTSS%20EXTREME%20CORE"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"3.0.101-108.159.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default":"3.0.101-108.159.1","kernel-default-base":"3.0.101-108.159.1","kernel-default-devel":"3.0.101-108.159.1","kernel-ec2":"3.0.101-108.159.1","kernel-ec2-base":"3.0.101-108.159.1","kernel-ec2-devel":"3.0.101-108.159.1","kernel-source":"3.0.101-108.159.1","kernel-syms":"3.0.101-108.159.1","kernel-trace":"3.0.101-108.159.1","kernel-trace-base":"3.0.101-108.159.1","kernel-trace-devel":"3.0.101-108.159.1","kernel-xen":"3.0.101-108.159.1","kernel-xen-base":"3.0.101-108.159.1","kernel-xen-devel":"3.0.101-108.159.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 11 SP4 LTSS EXTREME CORE","name":"kernel-trace","purl":"pkg:rpm/suse/kernel-trace&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4%20LTSS%20EXTREME%20CORE"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"3.0.101-108.159.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default":"3.0.101-108.159.1","kernel-default-base":"3.0.101-108.159.1","kernel-default-devel":"3.0.101-108.159.1","kernel-ec2":"3.0.101-108.159.1","kernel-ec2-base":"3.0.101-108.159.1","kernel-ec2-devel":"3.0.101-108.159.1","kernel-source":"3.0.101-108.159.1","kernel-syms":"3.0.101-108.159.1","kernel-trace":"3.0.101-108.159.1","kernel-trace-base":"3.0.101-108.159.1","kernel-trace-devel":"3.0.101-108.159.1","kernel-xen":"3.0.101-108.159.1","kernel-xen-base":"3.0.101-108.159.1","kernel-xen-devel":"3.0.101-108.159.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 11 SP4 LTSS EXTREME CORE","name":"kernel-xen","purl":"pkg:rpm/suse/kernel-xen&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4%20LTSS%20EXTREME%20CORE"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"3.0.101-108.159.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2024-42145: IB/core: Implement a limit on UMAD receive List (bsc#1228743)\n- CVE-2021-47580: scsi: scsi_debug: Fix type in min_t to avoid stack OOB (bsc#1226550).\n- CVE-2021-47219: scsi: scsi_debug: Fix out-of-bound read in resp_report_tgtpgs() (bsc#1222824).\n- CVE-2021-47520: can: pch_can: pch_can_rx_normal: fix use after free (bsc#1225431).\n- CVE-2021-47600: dm btree remove: fix use after free in rebalance_children() (bsc#1226575).\n- CVE-2023-52881: tcp: do not accept ACK of bytes we never sent (bsc#1225611).\n- CVE-2024-38599: jffs2: prevent xattr node from overflowing the eraseblock (bsc#1226848).\n- CVE-2023-52752: smb: client: fix use-after-free bug in cifs_debug_data_proc_show() (bsc#1225487).\n- CVE-2024-36964: fs/9p: only translate RWX permissions for plain 9P2000 (bsc#1225866).\n- CVE-2024-26923: Fixed false-positive lockdep splat for spin_lock() in __unix_gc() (bsc#1223384).\n\nThe following non-security bugs were fixed:\n\n- af_unix: Do not use atomic ops for unix_sk(sk)->inflight (bsc#1223384).\n- af_unix: Replace BUG_ON() with WARN_ON_ONCE() (bsc#1223384).\n- af_unix: annote lockless accesses to unix_tot_inflight & gc_in_progress (bsc#1223384).\n- kvm: prevent kvm_clock time-warps (bsc#1197439).\n- net: unix: properly re-increment inflight counter of GC discarded candidates (bsc#1223384).\n","id":"SUSE-SU-2024:2895-1","modified":"2024-08-13T14:08:42Z","published":"2024-08-13T14:08:42Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2024/suse-su-20242895-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1191958"},{"type":"REPORT","url":"https://bugzilla.suse.com/1197439"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222824"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223384"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225431"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225487"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225611"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225866"},{"type":"REPORT","url":"https://bugzilla.suse.com/1226550"},{"type":"REPORT","url":"https://bugzilla.suse.com/1226575"},{"type":"REPORT","url":"https://bugzilla.suse.com/1226670"},{"type":"REPORT","url":"https://bugzilla.suse.com/1226848"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227154"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228743"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-20022"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-43389"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-4439"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47219"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47520"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47580"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47600"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52752"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52881"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26923"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-36964"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-38599"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42145"}],"related":["CVE-2016-20022","CVE-2021-43389","CVE-2021-4439","CVE-2021-47219","CVE-2021-47520","CVE-2021-47580","CVE-2021-47600","CVE-2023-52752","CVE-2023-52881","CVE-2024-26923","CVE-2024-36964","CVE-2024-38599","CVE-2024-42145"],"summary":"Security update for the Linux Kernel","upstream":["CVE-2016-20022","CVE-2021-43389","CVE-2021-4439","CVE-2021-47219","CVE-2021-47520","CVE-2021-47580","CVE-2021-47600","CVE-2023-52752","CVE-2023-52881","CVE-2024-26923","CVE-2024-36964","CVE-2024-38599","CVE-2024-42145"]}