{"affected":[{"ecosystem_specific":{"binaries":[{"kernel-default":"3.0.101-108.174.1","kernel-default-base":"3.0.101-108.174.1","kernel-default-devel":"3.0.101-108.174.1","kernel-ec2":"3.0.101-108.174.1","kernel-ec2-base":"3.0.101-108.174.1","kernel-ec2-devel":"3.0.101-108.174.1","kernel-source":"3.0.101-108.174.1","kernel-syms":"3.0.101-108.174.1","kernel-trace":"3.0.101-108.174.1","kernel-trace-base":"3.0.101-108.174.1","kernel-trace-devel":"3.0.101-108.174.1","kernel-xen":"3.0.101-108.174.1","kernel-xen-base":"3.0.101-108.174.1","kernel-xen-devel":"3.0.101-108.174.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 11 SP4 LTSS EXTREME CORE","name":"kernel-default","purl":"pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4%20LTSS%20EXTREME%20CORE"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"3.0.101-108.174.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default":"3.0.101-108.174.1","kernel-default-base":"3.0.101-108.174.1","kernel-default-devel":"3.0.101-108.174.1","kernel-ec2":"3.0.101-108.174.1","kernel-ec2-base":"3.0.101-108.174.1","kernel-ec2-devel":"3.0.101-108.174.1","kernel-source":"3.0.101-108.174.1","kernel-syms":"3.0.101-108.174.1","kernel-trace":"3.0.101-108.174.1","kernel-trace-base":"3.0.101-108.174.1","kernel-trace-devel":"3.0.101-108.174.1","kernel-xen":"3.0.101-108.174.1","kernel-xen-base":"3.0.101-108.174.1","kernel-xen-devel":"3.0.101-108.174.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 11 SP4 LTSS EXTREME CORE","name":"kernel-ec2","purl":"pkg:rpm/suse/kernel-ec2&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4%20LTSS%20EXTREME%20CORE"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"3.0.101-108.174.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default":"3.0.101-108.174.1","kernel-default-base":"3.0.101-108.174.1","kernel-default-devel":"3.0.101-108.174.1","kernel-ec2":"3.0.101-108.174.1","kernel-ec2-base":"3.0.101-108.174.1","kernel-ec2-devel":"3.0.101-108.174.1","kernel-source":"3.0.101-108.174.1","kernel-syms":"3.0.101-108.174.1","kernel-trace":"3.0.101-108.174.1","kernel-trace-base":"3.0.101-108.174.1","kernel-trace-devel":"3.0.101-108.174.1","kernel-xen":"3.0.101-108.174.1","kernel-xen-base":"3.0.101-108.174.1","kernel-xen-devel":"3.0.101-108.174.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 11 SP4 LTSS EXTREME CORE","name":"kernel-source","purl":"pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4%20LTSS%20EXTREME%20CORE"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"3.0.101-108.174.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default":"3.0.101-108.174.1","kernel-default-base":"3.0.101-108.174.1","kernel-default-devel":"3.0.101-108.174.1","kernel-ec2":"3.0.101-108.174.1","kernel-ec2-base":"3.0.101-108.174.1","kernel-ec2-devel":"3.0.101-108.174.1","kernel-source":"3.0.101-108.174.1","kernel-syms":"3.0.101-108.174.1","kernel-trace":"3.0.101-108.174.1","kernel-trace-base":"3.0.101-108.174.1","kernel-trace-devel":"3.0.101-108.174.1","kernel-xen":"3.0.101-108.174.1","kernel-xen-base":"3.0.101-108.174.1","kernel-xen-devel":"3.0.101-108.174.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 11 SP4 LTSS EXTREME CORE","name":"kernel-syms","purl":"pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4%20LTSS%20EXTREME%20CORE"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"3.0.101-108.174.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default":"3.0.101-108.174.1","kernel-default-base":"3.0.101-108.174.1","kernel-default-devel":"3.0.101-108.174.1","kernel-ec2":"3.0.101-108.174.1","kernel-ec2-base":"3.0.101-108.174.1","kernel-ec2-devel":"3.0.101-108.174.1","kernel-source":"3.0.101-108.174.1","kernel-syms":"3.0.101-108.174.1","kernel-trace":"3.0.101-108.174.1","kernel-trace-base":"3.0.101-108.174.1","kernel-trace-devel":"3.0.101-108.174.1","kernel-xen":"3.0.101-108.174.1","kernel-xen-base":"3.0.101-108.174.1","kernel-xen-devel":"3.0.101-108.174.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 11 SP4 LTSS EXTREME CORE","name":"kernel-trace","purl":"pkg:rpm/suse/kernel-trace&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4%20LTSS%20EXTREME%20CORE"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"3.0.101-108.174.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default":"3.0.101-108.174.1","kernel-default-base":"3.0.101-108.174.1","kernel-default-devel":"3.0.101-108.174.1","kernel-ec2":"3.0.101-108.174.1","kernel-ec2-base":"3.0.101-108.174.1","kernel-ec2-devel":"3.0.101-108.174.1","kernel-source":"3.0.101-108.174.1","kernel-syms":"3.0.101-108.174.1","kernel-trace":"3.0.101-108.174.1","kernel-trace-base":"3.0.101-108.174.1","kernel-trace-devel":"3.0.101-108.174.1","kernel-xen":"3.0.101-108.174.1","kernel-xen-base":"3.0.101-108.174.1","kernel-xen-devel":"3.0.101-108.174.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 11 SP4 LTSS EXTREME CORE","name":"kernel-xen","purl":"pkg:rpm/suse/kernel-xen&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4%20LTSS%20EXTREME%20CORE"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"3.0.101-108.174.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"\nThe SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2017-14051: scsi/qla2xxx: Fix an integer overflow in sysfs code. (bsc#1056588)\n- CVE-2024-53146: NFSD: Prevent a potential integer overflow (bsc#1234853).\n- CVE-2024-53156: wifi: ath9k: add range check for conn_rsp_epid in htc_connect_service() (bsc#1234846).\n- CVE-2024-53173: NFSv4.0: Fix a use-after-free problem in the asynchronous open() (bsc#1234891).\n- CVE-2024-53239: ALSA: 6fire: Release resources at card release (bsc#1235054).\n- CVE-2024-56539: wifi: mwifiex: Fix memcpy() field-spanning write warning in mwifiex_config_scan() (bsc#1234963).\n- CVE-2024-56548: hfsplus: do not query the device logical block size multiple times (bsc#1235073).\n- CVE-2024-56598: jfs: array-index-out-of-bounds fix in dtReadFirst (bsc#1235220).\n- CVE-2024-56604: Bluetooth: RFCOMM: avoid leaving dangling sk pointer in rfcomm_sock_alloc() (bsc#1235056).\n- CVE-2024-56605: Bluetooth: L2CAP: do not leave dangling sk pointer on error in l2cap_sock_create() (bsc#1235061).\n- CVE-2024-56619: nilfs2: fix potential out-of-bounds memory access in nilfs_find_entry() (bsc#1235224).\n\nThe following non-security bugs were fixed:\n\n- Enable CONFIG_FIRMWARE_SIG ()\n- r8169: check ALDPS bit and disable it if enabled for the 8168g (bnc#845352).\n- rpm/kernel-binary.spec.in: Remove obsolete ext4-writeable. Needs to be handled differently. (bnc#830822)\n","id":"SUSE-SU-2025:0152-1","modified":"2025-01-17T09:13:58Z","published":"2025-01-17T09:13:58Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2025/suse-su-20250152-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1027565"},{"type":"REPORT","url":"https://bugzilla.suse.com/1056588"},{"type":"REPORT","url":"https://bugzilla.suse.com/1059525"},{"type":"REPORT","url":"https://bugzilla.suse.com/1202346"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227985"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234846"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234853"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234891"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234963"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235054"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235056"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235061"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235073"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235220"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235224"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-1000253"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-14051"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-2636"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-20368"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48839"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53146"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53156"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53173"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53239"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56539"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56548"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56598"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56604"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56605"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56619"}],"related":["CVE-2017-1000253","CVE-2017-14051","CVE-2017-2636","CVE-2022-20368","CVE-2022-48839","CVE-2024-53146","CVE-2024-53156","CVE-2024-53173","CVE-2024-53239","CVE-2024-56539","CVE-2024-56548","CVE-2024-56598","CVE-2024-56604","CVE-2024-56605","CVE-2024-56619"],"summary":"Security update for the Linux Kernel","upstream":["CVE-2017-1000253","CVE-2017-14051","CVE-2017-2636","CVE-2022-20368","CVE-2022-48839","CVE-2024-53146","CVE-2024-53156","CVE-2024-53173","CVE-2024-53239","CVE-2024-56539","CVE-2024-56548","CVE-2024-56598","CVE-2024-56604","CVE-2024-56605","CVE-2024-56619"]}