{"document":{"aggregate_severity":{"namespace":"https://www.suse.com/support/security/rating/","text":"important"},"category":"csaf_security_advisory","csaf_version":"2.0","distribution":{"text":"Copyright 2024 SUSE LLC. All rights reserved.","tlp":{"label":"WHITE","url":"https://www.first.org/tlp/"}},"lang":"en","notes":[{"category":"summary","text":"Security update for the Linux Kernel","title":"Title of the patch"},{"category":"description","text":"\n\nThe SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2021-47104: Fixed memory leak in qib_user_sdma_queue_pkts() (bsc#1220960).\n- CVE-2021-47321: Fixed possible use-after-free by calling  del_timer_sync() (bsc#1225060).\n- CVE-2021-47324: Fixed possible use-after-free in wdt_startup()  (bsc#1225030).\n- CVE-2021-47323: Fixed possible use-after-free in  wdt_turnoff() (bsc#1225026).\n- CVE-2021-47383: Fiedx out-of-bound vmalloc access in imageblit (bsc#1225208).\n- CVE-2021-47511: Fixed negative period/buffer sizes (bsc#1225411).\n- CVE-2021-47391: Ensure rdma_addr_cancel() happens before issuing more requests (bsc#1225318)\n- CVE-2021-47347: Fixed possible buffer overflow in wl1251_cmd_scan  (bsc#1225177).\n\n","title":"Description of the patch"},{"category":"details","text":"SUSE-2024-1978,SUSE-SLE-SERVER-11-SP4-LTSS-EXTREME-CORE-2024-1978","title":"Patchnames"},{"category":"legal_disclaimer","text":"CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).","title":"Terms of use"}],"publisher":{"category":"vendor","contact_details":"https://www.suse.com/support/security/contact/","name":"SUSE Product Security Team","namespace":"https://www.suse.com/"},"references":[{"category":"external","summary":"SUSE ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"self","summary":"URL of this CSAF notice","url":"https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_1978-1.json"},{"category":"self","summary":"URL for SUSE-SU-2024:1978-1","url":"https://www.suse.com/support/update/announcement/2024/suse-su-20241978-1/"},{"category":"self","summary":"E-Mail link for SUSE-SU-2024:1978-1","url":"https://lists.suse.com/pipermail/sle-updates/2024-June/035537.html"},{"category":"self","summary":"SUSE Bug 1220960","url":"https://bugzilla.suse.com/1220960"},{"category":"self","summary":"SUSE Bug 1222619","url":"https://bugzilla.suse.com/1222619"},{"category":"self","summary":"SUSE Bug 1224904","url":"https://bugzilla.suse.com/1224904"},{"category":"self","summary":"SUSE Bug 1225026","url":"https://bugzilla.suse.com/1225026"},{"category":"self","summary":"SUSE Bug 1225030","url":"https://bugzilla.suse.com/1225030"},{"category":"self","summary":"SUSE Bug 1225060","url":"https://bugzilla.suse.com/1225060"},{"category":"self","summary":"SUSE Bug 1225177","url":"https://bugzilla.suse.com/1225177"},{"category":"self","summary":"SUSE Bug 1225208","url":"https://bugzilla.suse.com/1225208"},{"category":"self","summary":"SUSE Bug 1225318","url":"https://bugzilla.suse.com/1225318"},{"category":"self","summary":"SUSE Bug 1225411","url":"https://bugzilla.suse.com/1225411"},{"category":"self","summary":"SUSE CVE CVE-2021-47104 page","url":"https://www.suse.com/security/cve/CVE-2021-47104/"},{"category":"self","summary":"SUSE CVE CVE-2021-47321 page","url":"https://www.suse.com/security/cve/CVE-2021-47321/"},{"category":"self","summary":"SUSE CVE CVE-2021-47323 page","url":"https://www.suse.com/security/cve/CVE-2021-47323/"},{"category":"self","summary":"SUSE CVE CVE-2021-47324 page","url":"https://www.suse.com/security/cve/CVE-2021-47324/"},{"category":"self","summary":"SUSE CVE CVE-2021-47347 page","url":"https://www.suse.com/security/cve/CVE-2021-47347/"},{"category":"self","summary":"SUSE CVE CVE-2021-47383 page","url":"https://www.suse.com/security/cve/CVE-2021-47383/"},{"category":"self","summary":"SUSE CVE CVE-2021-47391 page","url":"https://www.suse.com/security/cve/CVE-2021-47391/"},{"category":"self","summary":"SUSE CVE CVE-2021-47485 page","url":"https://www.suse.com/security/cve/CVE-2021-47485/"},{"category":"self","summary":"SUSE CVE CVE-2021-47511 page","url":"https://www.suse.com/security/cve/CVE-2021-47511/"},{"category":"self","summary":"SUSE CVE CVE-2023-52880 page","url":"https://www.suse.com/security/cve/CVE-2023-52880/"},{"category":"self","summary":"SUSE CVE CVE-2024-26929 page","url":"https://www.suse.com/security/cve/CVE-2024-26929/"},{"category":"self","summary":"SUSE CVE CVE-2024-26930 page","url":"https://www.suse.com/security/cve/CVE-2024-26930/"}],"title":"Security update for the Linux Kernel","tracking":{"current_release_date":"2024-06-11T07:41:23Z","generator":{"date":"2024-06-11T07:41:23Z","engine":{"name":"cve-database.git:bin/generate-csaf.pl","version":"1"}},"id":"SUSE-SU-2024:1978-1","initial_release_date":"2024-06-11T07:41:23Z","revision_history":[{"date":"2024-06-11T07:41:23Z","number":"1","summary":"Current version"}],"status":"final","version":"1"}},"product_tree":{"branches":[{"branches":[{"branches":[{"category":"product_version","name":"kernel-debug-3.0.101-108.156.1.i586","product":{"name":"kernel-debug-3.0.101-108.156.1.i586","product_id":"kernel-debug-3.0.101-108.156.1.i586"}},{"category":"product_version","name":"kernel-debug-base-3.0.101-108.156.1.i586","product":{"name":"kernel-debug-base-3.0.101-108.156.1.i586","product_id":"kernel-debug-base-3.0.101-108.156.1.i586"}},{"category":"product_version","name":"kernel-debug-devel-3.0.101-108.156.1.i586","product":{"name":"kernel-debug-devel-3.0.101-108.156.1.i586","product_id":"kernel-debug-devel-3.0.101-108.156.1.i586"}},{"category":"product_version","name":"kernel-debug-extra-3.0.101-108.156.1.i586","product":{"name":"kernel-debug-extra-3.0.101-108.156.1.i586","product_id":"kernel-debug-extra-3.0.101-108.156.1.i586"}},{"category":"product_version","name":"kernel-debug-hmac-3.0.101-108.156.1.i586","product":{"name":"kernel-debug-hmac-3.0.101-108.156.1.i586","product_id":"kernel-debug-hmac-3.0.101-108.156.1.i586"}},{"category":"product_version","name":"kernel-default-3.0.101-108.156.1.i586","product":{"name":"kernel-default-3.0.101-108.156.1.i586","product_id":"kernel-default-3.0.101-108.156.1.i586"}},{"category":"product_version","name":"kernel-default-base-3.0.101-108.156.1.i586","product":{"name":"kernel-default-base-3.0.101-108.156.1.i586","product_id":"kernel-default-base-3.0.101-108.156.1.i586"}},{"category":"product_version","name":"kernel-default-devel-3.0.101-108.156.1.i586","product":{"name":"kernel-default-devel-3.0.101-108.156.1.i586","product_id":"kernel-default-devel-3.0.101-108.156.1.i586"}},{"category":"product_version","name":"kernel-default-extra-3.0.101-108.156.1.i586","product":{"name":"kernel-default-extra-3.0.101-108.156.1.i586","product_id":"kernel-default-extra-3.0.101-108.156.1.i586"}},{"category":"product_version","name":"kernel-default-hmac-3.0.101-108.156.1.i586","product":{"name":"kernel-default-hmac-3.0.101-108.156.1.i586","product_id":"kernel-default-hmac-3.0.101-108.156.1.i586"}},{"category":"product_version","name":"kernel-ec2-3.0.101-108.156.1.i586","product":{"name":"kernel-ec2-3.0.101-108.156.1.i586","product_id":"kernel-ec2-3.0.101-108.156.1.i586"}},{"category":"product_version","name":"kernel-ec2-base-3.0.101-108.156.1.i586","product":{"name":"kernel-ec2-base-3.0.101-108.156.1.i586","product_id":"kernel-ec2-base-3.0.101-108.156.1.i586"}},{"category":"product_version","name":"kernel-ec2-devel-3.0.101-108.156.1.i586","product":{"name":"kernel-ec2-devel-3.0.101-108.156.1.i586","product_id":"kernel-ec2-devel-3.0.101-108.156.1.i586"}},{"category":"product_version","name":"kernel-ec2-extra-3.0.101-108.156.1.i586","product":{"name":"kernel-ec2-extra-3.0.101-108.156.1.i586","product_id":"kernel-ec2-extra-3.0.101-108.156.1.i586"}},{"category":"product_version","name":"kernel-ec2-hmac-3.0.101-108.156.1.i586","product":{"name":"kernel-ec2-hmac-3.0.101-108.156.1.i586","product_id":"kernel-ec2-hmac-3.0.101-108.156.1.i586"}},{"category":"product_version","name":"kernel-pae-3.0.101-108.156.1.i586","product":{"name":"kernel-pae-3.0.101-108.156.1.i586","product_id":"kernel-pae-3.0.101-108.156.1.i586"}},{"category":"product_version","name":"kernel-pae-base-3.0.101-108.156.1.i586","product":{"name":"kernel-pae-base-3.0.101-108.156.1.i586","product_id":"kernel-pae-base-3.0.101-108.156.1.i586"}},{"category":"product_version","name":"kernel-pae-devel-3.0.101-108.156.1.i586","product":{"name":"kernel-pae-devel-3.0.101-108.156.1.i586","product_id":"kernel-pae-devel-3.0.101-108.156.1.i586"}},{"category":"product_version","name":"kernel-pae-extra-3.0.101-108.156.1.i586","product":{"name":"kernel-pae-extra-3.0.101-108.156.1.i586","product_id":"kernel-pae-extra-3.0.101-108.156.1.i586"}},{"category":"product_version","name":"kernel-pae-hmac-3.0.101-108.156.1.i586","product":{"name":"kernel-pae-hmac-3.0.101-108.156.1.i586","product_id":"kernel-pae-hmac-3.0.101-108.156.1.i586"}},{"category":"product_version","name":"kernel-source-3.0.101-108.156.1.i586","product":{"name":"kernel-source-3.0.101-108.156.1.i586","product_id":"kernel-source-3.0.101-108.156.1.i586"}},{"category":"product_version","name":"kernel-source-vanilla-3.0.101-108.156.1.i586","product":{"name":"kernel-source-vanilla-3.0.101-108.156.1.i586","product_id":"kernel-source-vanilla-3.0.101-108.156.1.i586"}},{"category":"product_version","name":"kernel-syms-3.0.101-108.156.1.i586","product":{"name":"kernel-syms-3.0.101-108.156.1.i586","product_id":"kernel-syms-3.0.101-108.156.1.i586"}},{"category":"product_version","name":"kernel-trace-3.0.101-108.156.1.i586","product":{"name":"kernel-trace-3.0.101-108.156.1.i586","product_id":"kernel-trace-3.0.101-108.156.1.i586"}},{"category":"product_version","name":"kernel-trace-base-3.0.101-108.156.1.i586","product":{"name":"kernel-trace-base-3.0.101-108.156.1.i586","product_id":"kernel-trace-base-3.0.101-108.156.1.i586"}},{"category":"product_version","name":"kernel-trace-devel-3.0.101-108.156.1.i586","product":{"name":"kernel-trace-devel-3.0.101-108.156.1.i586","product_id":"kernel-trace-devel-3.0.101-108.156.1.i586"}},{"category":"product_version","name":"kernel-trace-extra-3.0.101-108.156.1.i586","product":{"name":"kernel-trace-extra-3.0.101-108.156.1.i586","product_id":"kernel-trace-extra-3.0.101-108.156.1.i586"}},{"category":"product_version","name":"kernel-trace-hmac-3.0.101-108.156.1.i586","product":{"name":"kernel-trace-hmac-3.0.101-108.156.1.i586","product_id":"kernel-trace-hmac-3.0.101-108.156.1.i586"}},{"category":"product_version","name":"kernel-vanilla-3.0.101-108.156.1.i586","product":{"name":"kernel-vanilla-3.0.101-108.156.1.i586","product_id":"kernel-vanilla-3.0.101-108.156.1.i586"}},{"category":"product_version","name":"kernel-vanilla-base-3.0.101-108.156.1.i586","product":{"name":"kernel-vanilla-base-3.0.101-108.156.1.i586","product_id":"kernel-vanilla-base-3.0.101-108.156.1.i586"}},{"category":"product_version","name":"kernel-vanilla-devel-3.0.101-108.156.1.i586","product":{"name":"kernel-vanilla-devel-3.0.101-108.156.1.i586","product_id":"kernel-vanilla-devel-3.0.101-108.156.1.i586"}},{"category":"product_version","name":"kernel-vanilla-hmac-3.0.101-108.156.1.i586","product":{"name":"kernel-vanilla-hmac-3.0.101-108.156.1.i586","product_id":"kernel-vanilla-hmac-3.0.101-108.156.1.i586"}},{"category":"product_version","name":"kernel-xen-3.0.101-108.156.1.i586","product":{"name":"kernel-xen-3.0.101-108.156.1.i586","product_id":"kernel-xen-3.0.101-108.156.1.i586"}},{"category":"product_version","name":"kernel-xen-base-3.0.101-108.156.1.i586","product":{"name":"kernel-xen-base-3.0.101-108.156.1.i586","product_id":"kernel-xen-base-3.0.101-108.156.1.i586"}},{"category":"product_version","name":"kernel-xen-devel-3.0.101-108.156.1.i586","product":{"name":"kernel-xen-devel-3.0.101-108.156.1.i586","product_id":"kernel-xen-devel-3.0.101-108.156.1.i586"}},{"category":"product_version","name":"kernel-xen-extra-3.0.101-108.156.1.i586","product":{"name":"kernel-xen-extra-3.0.101-108.156.1.i586","product_id":"kernel-xen-extra-3.0.101-108.156.1.i586"}},{"category":"product_version","name":"kernel-xen-hmac-3.0.101-108.156.1.i586","product":{"name":"kernel-xen-hmac-3.0.101-108.156.1.i586","product_id":"kernel-xen-hmac-3.0.101-108.156.1.i586"}}],"category":"architecture","name":"i586"},{"branches":[{"category":"product_version","name":"kernel-source-3.0.101-108.156.1.ia64","product":{"name":"kernel-source-3.0.101-108.156.1.ia64","product_id":"kernel-source-3.0.101-108.156.1.ia64"}},{"category":"product_version","name":"kernel-source-vanilla-3.0.101-108.156.1.ia64","product":{"name":"kernel-source-vanilla-3.0.101-108.156.1.ia64","product_id":"kernel-source-vanilla-3.0.101-108.156.1.ia64"}}],"category":"architecture","name":"ia64"},{"branches":[{"category":"product_version","name":"kernel-docs-3.0.101-108.156.1.noarch","product":{"name":"kernel-docs-3.0.101-108.156.1.noarch","product_id":"kernel-docs-3.0.101-108.156.1.noarch"}}],"category":"architecture","name":"noarch"},{"branches":[{"category":"product_version","name":"kernel-source-3.0.101-108.156.1.ppc","product":{"name":"kernel-source-3.0.101-108.156.1.ppc","product_id":"kernel-source-3.0.101-108.156.1.ppc"}},{"category":"product_version","name":"kernel-source-vanilla-3.0.101-108.156.1.ppc","product":{"name":"kernel-source-vanilla-3.0.101-108.156.1.ppc","product_id":"kernel-source-vanilla-3.0.101-108.156.1.ppc"}}],"category":"architecture","name":"ppc"},{"branches":[{"category":"product_version","name":"kernel-source-3.0.101-108.156.1.ppc64","product":{"name":"kernel-source-3.0.101-108.156.1.ppc64","product_id":"kernel-source-3.0.101-108.156.1.ppc64"}},{"category":"product_version","name":"kernel-source-vanilla-3.0.101-108.156.1.ppc64","product":{"name":"kernel-source-vanilla-3.0.101-108.156.1.ppc64","product_id":"kernel-source-vanilla-3.0.101-108.156.1.ppc64"}}],"category":"architecture","name":"ppc64"},{"branches":[{"category":"product_version","name":"kernel-source-3.0.101-108.156.1.s390","product":{"name":"kernel-source-3.0.101-108.156.1.s390","product_id":"kernel-source-3.0.101-108.156.1.s390"}},{"category":"product_version","name":"kernel-source-vanilla-3.0.101-108.156.1.s390","product":{"name":"kernel-source-vanilla-3.0.101-108.156.1.s390","product_id":"kernel-source-vanilla-3.0.101-108.156.1.s390"}}],"category":"architecture","name":"s390"},{"branches":[{"category":"product_version","name":"kernel-source-3.0.101-108.156.1.s390x","product":{"name":"kernel-source-3.0.101-108.156.1.s390x","product_id":"kernel-source-3.0.101-108.156.1.s390x"}},{"category":"product_version","name":"kernel-source-vanilla-3.0.101-108.156.1.s390x","product":{"name":"kernel-source-vanilla-3.0.101-108.156.1.s390x","product_id":"kernel-source-vanilla-3.0.101-108.156.1.s390x"}}],"category":"architecture","name":"s390x"},{"branches":[{"category":"product_version","name":"kernel-debug-3.0.101-108.156.1.x86_64","product":{"name":"kernel-debug-3.0.101-108.156.1.x86_64","product_id":"kernel-debug-3.0.101-108.156.1.x86_64"}},{"category":"product_version","name":"kernel-debug-base-3.0.101-108.156.1.x86_64","product":{"name":"kernel-debug-base-3.0.101-108.156.1.x86_64","product_id":"kernel-debug-base-3.0.101-108.156.1.x86_64"}},{"category":"product_version","name":"kernel-debug-devel-3.0.101-108.156.1.x86_64","product":{"name":"kernel-debug-devel-3.0.101-108.156.1.x86_64","product_id":"kernel-debug-devel-3.0.101-108.156.1.x86_64"}},{"category":"product_version","name":"kernel-debug-extra-3.0.101-108.156.1.x86_64","product":{"name":"kernel-debug-extra-3.0.101-108.156.1.x86_64","product_id":"kernel-debug-extra-3.0.101-108.156.1.x86_64"}},{"category":"product_version","name":"kernel-debug-hmac-3.0.101-108.156.1.x86_64","product":{"name":"kernel-debug-hmac-3.0.101-108.156.1.x86_64","product_id":"kernel-debug-hmac-3.0.101-108.156.1.x86_64"}},{"category":"product_version","name":"kernel-default-3.0.101-108.156.1.x86_64","product":{"name":"kernel-default-3.0.101-108.156.1.x86_64","product_id":"kernel-default-3.0.101-108.156.1.x86_64"}},{"category":"product_version","name":"kernel-default-base-3.0.101-108.156.1.x86_64","product":{"name":"kernel-default-base-3.0.101-108.156.1.x86_64","product_id":"kernel-default-base-3.0.101-108.156.1.x86_64"}},{"category":"product_version","name":"kernel-default-devel-3.0.101-108.156.1.x86_64","product":{"name":"kernel-default-devel-3.0.101-108.156.1.x86_64","product_id":"kernel-default-devel-3.0.101-108.156.1.x86_64"}},{"category":"product_version","name":"kernel-default-extra-3.0.101-108.156.1.x86_64","product":{"name":"kernel-default-extra-3.0.101-108.156.1.x86_64","product_id":"kernel-default-extra-3.0.101-108.156.1.x86_64"}},{"category":"product_version","name":"kernel-default-hmac-3.0.101-108.156.1.x86_64","product":{"name":"kernel-default-hmac-3.0.101-108.156.1.x86_64","product_id":"kernel-default-hmac-3.0.101-108.156.1.x86_64"}},{"category":"product_version","name":"kernel-ec2-3.0.101-108.156.1.x86_64","product":{"name":"kernel-ec2-3.0.101-108.156.1.x86_64","product_id":"kernel-ec2-3.0.101-108.156.1.x86_64"}},{"category":"product_version","name":"kernel-ec2-base-3.0.101-108.156.1.x86_64","product":{"name":"kernel-ec2-base-3.0.101-108.156.1.x86_64","product_id":"kernel-ec2-base-3.0.101-108.156.1.x86_64"}},{"category":"product_version","name":"kernel-ec2-devel-3.0.101-108.156.1.x86_64","product":{"name":"kernel-ec2-devel-3.0.101-108.156.1.x86_64","product_id":"kernel-ec2-devel-3.0.101-108.156.1.x86_64"}},{"category":"product_version","name":"kernel-ec2-extra-3.0.101-108.156.1.x86_64","product":{"name":"kernel-ec2-extra-3.0.101-108.156.1.x86_64","product_id":"kernel-ec2-extra-3.0.101-108.156.1.x86_64"}},{"category":"product_version","name":"kernel-ec2-hmac-3.0.101-108.156.1.x86_64","product":{"name":"kernel-ec2-hmac-3.0.101-108.156.1.x86_64","product_id":"kernel-ec2-hmac-3.0.101-108.156.1.x86_64"}},{"category":"product_version","name":"kernel-source-3.0.101-108.156.1.x86_64","product":{"name":"kernel-source-3.0.101-108.156.1.x86_64","product_id":"kernel-source-3.0.101-108.156.1.x86_64"}},{"category":"product_version","name":"kernel-source-vanilla-3.0.101-108.156.1.x86_64","product":{"name":"kernel-source-vanilla-3.0.101-108.156.1.x86_64","product_id":"kernel-source-vanilla-3.0.101-108.156.1.x86_64"}},{"category":"product_version","name":"kernel-syms-3.0.101-108.156.1.x86_64","product":{"name":"kernel-syms-3.0.101-108.156.1.x86_64","product_id":"kernel-syms-3.0.101-108.156.1.x86_64"}},{"category":"product_version","name":"kernel-trace-3.0.101-108.156.1.x86_64","product":{"name":"kernel-trace-3.0.101-108.156.1.x86_64","product_id":"kernel-trace-3.0.101-108.156.1.x86_64"}},{"category":"product_version","name":"kernel-trace-base-3.0.101-108.156.1.x86_64","product":{"name":"kernel-trace-base-3.0.101-108.156.1.x86_64","product_id":"kernel-trace-base-3.0.101-108.156.1.x86_64"}},{"category":"product_version","name":"kernel-trace-devel-3.0.101-108.156.1.x86_64","product":{"name":"kernel-trace-devel-3.0.101-108.156.1.x86_64","product_id":"kernel-trace-devel-3.0.101-108.156.1.x86_64"}},{"category":"product_version","name":"kernel-trace-extra-3.0.101-108.156.1.x86_64","product":{"name":"kernel-trace-extra-3.0.101-108.156.1.x86_64","product_id":"kernel-trace-extra-3.0.101-108.156.1.x86_64"}},{"category":"product_version","name":"kernel-trace-hmac-3.0.101-108.156.1.x86_64","product":{"name":"kernel-trace-hmac-3.0.101-108.156.1.x86_64","product_id":"kernel-trace-hmac-3.0.101-108.156.1.x86_64"}},{"category":"product_version","name":"kernel-vanilla-3.0.101-108.156.1.x86_64","product":{"name":"kernel-vanilla-3.0.101-108.156.1.x86_64","product_id":"kernel-vanilla-3.0.101-108.156.1.x86_64"}},{"category":"product_version","name":"kernel-vanilla-base-3.0.101-108.156.1.x86_64","product":{"name":"kernel-vanilla-base-3.0.101-108.156.1.x86_64","product_id":"kernel-vanilla-base-3.0.101-108.156.1.x86_64"}},{"category":"product_version","name":"kernel-vanilla-devel-3.0.101-108.156.1.x86_64","product":{"name":"kernel-vanilla-devel-3.0.101-108.156.1.x86_64","product_id":"kernel-vanilla-devel-3.0.101-108.156.1.x86_64"}},{"category":"product_version","name":"kernel-vanilla-hmac-3.0.101-108.156.1.x86_64","product":{"name":"kernel-vanilla-hmac-3.0.101-108.156.1.x86_64","product_id":"kernel-vanilla-hmac-3.0.101-108.156.1.x86_64"}},{"category":"product_version","name":"kernel-xen-3.0.101-108.156.1.x86_64","product":{"name":"kernel-xen-3.0.101-108.156.1.x86_64","product_id":"kernel-xen-3.0.101-108.156.1.x86_64"}},{"category":"product_version","name":"kernel-xen-base-3.0.101-108.156.1.x86_64","product":{"name":"kernel-xen-base-3.0.101-108.156.1.x86_64","product_id":"kernel-xen-base-3.0.101-108.156.1.x86_64"}},{"category":"product_version","name":"kernel-xen-devel-3.0.101-108.156.1.x86_64","product":{"name":"kernel-xen-devel-3.0.101-108.156.1.x86_64","product_id":"kernel-xen-devel-3.0.101-108.156.1.x86_64"}},{"category":"product_version","name":"kernel-xen-extra-3.0.101-108.156.1.x86_64","product":{"name":"kernel-xen-extra-3.0.101-108.156.1.x86_64","product_id":"kernel-xen-extra-3.0.101-108.156.1.x86_64"}},{"category":"product_version","name":"kernel-xen-hmac-3.0.101-108.156.1.x86_64","product":{"name":"kernel-xen-hmac-3.0.101-108.156.1.x86_64","product_id":"kernel-xen-hmac-3.0.101-108.156.1.x86_64"}}],"category":"architecture","name":"x86_64"},{"branches":[{"category":"product_name","name":"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE","product":{"name":"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE","product_id":"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE","product_identification_helper":{"cpe":"cpe:/o:suse:suse_sles_ltss-extreme-core:11:sp4"}}}],"category":"product_family","name":"SUSE Linux Enterprise"}],"category":"vendor","name":"SUSE"}],"relationships":[{"category":"default_component_of","full_product_name":{"name":"kernel-default-3.0.101-108.156.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE","product_id":"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.156.1.x86_64"},"product_reference":"kernel-default-3.0.101-108.156.1.x86_64","relates_to_product_reference":"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE"},{"category":"default_component_of","full_product_name":{"name":"kernel-default-base-3.0.101-108.156.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE","product_id":"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.156.1.x86_64"},"product_reference":"kernel-default-base-3.0.101-108.156.1.x86_64","relates_to_product_reference":"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE"},{"category":"default_component_of","full_product_name":{"name":"kernel-default-devel-3.0.101-108.156.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE","product_id":"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.156.1.x86_64"},"product_reference":"kernel-default-devel-3.0.101-108.156.1.x86_64","relates_to_product_reference":"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE"},{"category":"default_component_of","full_product_name":{"name":"kernel-ec2-3.0.101-108.156.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE","product_id":"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.156.1.x86_64"},"product_reference":"kernel-ec2-3.0.101-108.156.1.x86_64","relates_to_product_reference":"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE"},{"category":"default_component_of","full_product_name":{"name":"kernel-ec2-base-3.0.101-108.156.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE","product_id":"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.156.1.x86_64"},"product_reference":"kernel-ec2-base-3.0.101-108.156.1.x86_64","relates_to_product_reference":"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE"},{"category":"default_component_of","full_product_name":{"name":"kernel-ec2-devel-3.0.101-108.156.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE","product_id":"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.156.1.x86_64"},"product_reference":"kernel-ec2-devel-3.0.101-108.156.1.x86_64","relates_to_product_reference":"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE"},{"category":"default_component_of","full_product_name":{"name":"kernel-source-3.0.101-108.156.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE","product_id":"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.156.1.x86_64"},"product_reference":"kernel-source-3.0.101-108.156.1.x86_64","relates_to_product_reference":"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE"},{"category":"default_component_of","full_product_name":{"name":"kernel-syms-3.0.101-108.156.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE","product_id":"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.156.1.x86_64"},"product_reference":"kernel-syms-3.0.101-108.156.1.x86_64","relates_to_product_reference":"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE"},{"category":"default_component_of","full_product_name":{"name":"kernel-trace-3.0.101-108.156.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE","product_id":"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.156.1.x86_64"},"product_reference":"kernel-trace-3.0.101-108.156.1.x86_64","relates_to_product_reference":"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE"},{"category":"default_component_of","full_product_name":{"name":"kernel-trace-base-3.0.101-108.156.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE","product_id":"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.156.1.x86_64"},"product_reference":"kernel-trace-base-3.0.101-108.156.1.x86_64","relates_to_product_reference":"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE"},{"category":"default_component_of","full_product_name":{"name":"kernel-trace-devel-3.0.101-108.156.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE","product_id":"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.156.1.x86_64"},"product_reference":"kernel-trace-devel-3.0.101-108.156.1.x86_64","relates_to_product_reference":"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE"},{"category":"default_component_of","full_product_name":{"name":"kernel-xen-3.0.101-108.156.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE","product_id":"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.156.1.x86_64"},"product_reference":"kernel-xen-3.0.101-108.156.1.x86_64","relates_to_product_reference":"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE"},{"category":"default_component_of","full_product_name":{"name":"kernel-xen-base-3.0.101-108.156.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE","product_id":"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.156.1.x86_64"},"product_reference":"kernel-xen-base-3.0.101-108.156.1.x86_64","relates_to_product_reference":"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE"},{"category":"default_component_of","full_product_name":{"name":"kernel-xen-devel-3.0.101-108.156.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE","product_id":"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.156.1.x86_64"},"product_reference":"kernel-xen-devel-3.0.101-108.156.1.x86_64","relates_to_product_reference":"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE"}]},"vulnerabilities":[{"cve":"CVE-2021-47104","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2021-47104"}],"notes":[{"category":"general","text":"In the Linux kernel, the following vulnerability has been resolved:\n\nIB/qib: Fix memory leak in qib_user_sdma_queue_pkts()\n\nThe wrong goto label was used for the error case and missed cleanup of the\npkt allocation.\n\nAddresses-Coverity-ID: 1493352 (\"Resource leak\")","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.156.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2021-47104","url":"https://www.suse.com/security/cve/CVE-2021-47104"},{"category":"external","summary":"SUSE Bug 1220960 for CVE-2021-47104","url":"https://bugzilla.suse.com/1220960"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.156.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.5,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","version":"3.1"},"products":["SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.156.1.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-11T07:41:23Z","details":"moderate"}],"title":"CVE-2021-47104"},{"cve":"CVE-2021-47321","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2021-47321"}],"notes":[{"category":"general","text":"In the Linux kernel, the following vulnerability has been resolved:\n\nwatchdog: Fix possible use-after-free by calling del_timer_sync()\n\nThis driver's remove path calls del_timer(). However, that function\ndoes not wait until the timer handler finishes. This means that the\ntimer handler may still be running after the driver's remove function\nhas finished, which would result in a use-after-free.\n\nFix by calling del_timer_sync(), which makes sure the timer handler\nhas finished, and unable to re-schedule itself.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.156.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2021-47321","url":"https://www.suse.com/security/cve/CVE-2021-47321"},{"category":"external","summary":"SUSE Bug 1225060 for CVE-2021-47321","url":"https://bugzilla.suse.com/1225060"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.156.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":6.4,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H","version":"3.1"},"products":["SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.156.1.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-11T07:41:23Z","details":"moderate"}],"title":"CVE-2021-47321"},{"cve":"CVE-2021-47323","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2021-47323"}],"notes":[{"category":"general","text":"In the Linux kernel, the following vulnerability has been resolved:\n\nwatchdog: sc520_wdt: Fix possible use-after-free in wdt_turnoff()\n\nThis module's remove path calls del_timer(). However, that function\ndoes not wait until the timer handler finishes. This means that the\ntimer handler may still be running after the driver's remove function\nhas finished, which would result in a use-after-free.\n\nFix by calling del_timer_sync(), which makes sure the timer handler\nhas finished, and unable to re-schedule itself.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.156.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2021-47323","url":"https://www.suse.com/security/cve/CVE-2021-47323"},{"category":"external","summary":"SUSE Bug 1225026 for CVE-2021-47323","url":"https://bugzilla.suse.com/1225026"},{"category":"external","summary":"SUSE Bug 1227557 for CVE-2021-47323","url":"https://bugzilla.suse.com/1227557"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.156.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":7,"baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H","version":"3.1"},"products":["SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.156.1.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-11T07:41:23Z","details":"important"}],"title":"CVE-2021-47323"},{"cve":"CVE-2021-47324","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2021-47324"}],"notes":[{"category":"general","text":"In the Linux kernel, the following vulnerability has been resolved:\n\nwatchdog: Fix possible use-after-free in wdt_startup()\n\nThis module's remove path calls del_timer(). However, that function\ndoes not wait until the timer handler finishes. This means that the\ntimer handler may still be running after the driver's remove function\nhas finished, which would result in a use-after-free.\n\nFix by calling del_timer_sync(), which makes sure the timer handler\nhas finished, and unable to re-schedule itself.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.156.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2021-47324","url":"https://www.suse.com/security/cve/CVE-2021-47324"},{"category":"external","summary":"SUSE Bug 1225030 for CVE-2021-47324","url":"https://bugzilla.suse.com/1225030"},{"category":"external","summary":"SUSE Bug 1225038 for CVE-2021-47324","url":"https://bugzilla.suse.com/1225038"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.156.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":7,"baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H","version":"3.1"},"products":["SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.156.1.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-11T07:41:23Z","details":"important"}],"title":"CVE-2021-47324"},{"cve":"CVE-2021-47347","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2021-47347"}],"notes":[{"category":"general","text":"In the Linux kernel, the following vulnerability has been resolved:\n\nwl1251: Fix possible buffer overflow in wl1251_cmd_scan\n\nFunction wl1251_cmd_scan calls memcpy without checking the length.\nHarden by checking the length is within the maximum allowed size.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.156.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2021-47347","url":"https://www.suse.com/security/cve/CVE-2021-47347"},{"category":"external","summary":"SUSE Bug 1225177 for CVE-2021-47347","url":"https://bugzilla.suse.com/1225177"},{"category":"external","summary":"SUSE Bug 1225305 for CVE-2021-47347","url":"https://bugzilla.suse.com/1225305"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.156.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":7.8,"baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","version":"3.1"},"products":["SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.156.1.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-11T07:41:23Z","details":"important"}],"title":"CVE-2021-47347"},{"cve":"CVE-2021-47383","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2021-47383"}],"notes":[{"category":"general","text":"In the Linux kernel, the following vulnerability has been resolved:\n\ntty: Fix out-of-bound vmalloc access in imageblit\n\nThis issue happens when a userspace program does an ioctl\nFBIOPUT_VSCREENINFO passing the fb_var_screeninfo struct\ncontaining only the fields xres, yres, and bits_per_pixel\nwith values.\n\nIf this struct is the same as the previous ioctl, the\nvc_resize() detects it and doesn't call the resize_screen(),\nleaving the fb_var_screeninfo incomplete. And this leads to\nthe updatescrollmode() calculates a wrong value to\nfbcon_display->vrows, which makes the real_y() return a\nwrong value of y, and that value, eventually, causes\nthe imageblit to access an out-of-bound address value.\n\nTo solve this issue I made the resize_screen() be called\neven if the screen does not need any resizing, so it will\n\"fix and fill\" the fb_var_screeninfo independently.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.156.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2021-47383","url":"https://www.suse.com/security/cve/CVE-2021-47383"},{"category":"external","summary":"SUSE Bug 1225208 for CVE-2021-47383","url":"https://bugzilla.suse.com/1225208"},{"category":"external","summary":"SUSE Bug 1225211 for CVE-2021-47383","url":"https://bugzilla.suse.com/1225211"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.156.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":7.8,"baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","version":"3.1"},"products":["SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.156.1.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-11T07:41:23Z","details":"important"}],"title":"CVE-2021-47383"},{"cve":"CVE-2021-47391","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2021-47391"}],"notes":[{"category":"general","text":"In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/cma: Ensure rdma_addr_cancel() happens before issuing more requests\n\nThe FSM can run in a circle allowing rdma_resolve_ip() to be called twice\non the same id_priv. While this cannot happen without going through the\nwork, it violates the invariant that the same address resolution\nbackground request cannot be active twice.\n\n       CPU 1                                  CPU 2\n\nrdma_resolve_addr():\n  RDMA_CM_IDLE -> RDMA_CM_ADDR_QUERY\n  rdma_resolve_ip(addr_handler)  #1\n\n\t\t\t process_one_req(): for #1\n                          addr_handler():\n                            RDMA_CM_ADDR_QUERY -> RDMA_CM_ADDR_BOUND\n                            mutex_unlock(&id_priv->handler_mutex);\n                            [.. handler still running ..]\n\nrdma_resolve_addr():\n  RDMA_CM_ADDR_BOUND -> RDMA_CM_ADDR_QUERY\n  rdma_resolve_ip(addr_handler)\n    !! two requests are now on the req_list\n\nrdma_destroy_id():\n destroy_id_handler_unlock():\n  _destroy_id():\n   cma_cancel_operation():\n    rdma_addr_cancel()\n\n                          // process_one_req() self removes it\n\t\t          spin_lock_bh(&lock);\n                           cancel_delayed_work(&req->work);\n\t                   if (!list_empty(&req->list)) == true\n\n      ! rdma_addr_cancel() returns after process_on_req #1 is done\n\n   kfree(id_priv)\n\n\t\t\t process_one_req(): for #2\n                          addr_handler():\n\t                    mutex_lock(&id_priv->handler_mutex);\n                            !! Use after free on id_priv\n\nrdma_addr_cancel() expects there to be one req on the list and only\ncancels the first one. The self-removal behavior of the work only happens\nafter the handler has returned. This yields a situations where the\nreq_list can have two reqs for the same \"handle\" but rdma_addr_cancel()\nonly cancels the first one.\n\nThe second req remains active beyond rdma_destroy_id() and will\nuse-after-free id_priv once it inevitably triggers.\n\nFix this by remembering if the id_priv has called rdma_resolve_ip() and\nalways cancel before calling it again. This ensures the req_list never\ngets more than one item in it and doesn't cost anything in the normal flow\nthat never uses this strange error path.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.156.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2021-47391","url":"https://www.suse.com/security/cve/CVE-2021-47391"},{"category":"external","summary":"SUSE Bug 1225318 for CVE-2021-47391","url":"https://bugzilla.suse.com/1225318"},{"category":"external","summary":"SUSE Bug 1225319 for CVE-2021-47391","url":"https://bugzilla.suse.com/1225319"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.156.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":7.8,"baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","version":"3.1"},"products":["SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.156.1.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-11T07:41:23Z","details":"important"}],"title":"CVE-2021-47391"},{"cve":"CVE-2021-47485","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2021-47485"}],"notes":[{"category":"general","text":"In the Linux kernel, the following vulnerability has been resolved:\n\nIB/qib: Protect from buffer overflow in struct qib_user_sdma_pkt fields\n\nOverflowing either addrlimit or bytes_togo can allow userspace to trigger\na buffer overflow of kernel memory. Check for overflows in all the places\ndoing math on user controlled buffers.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.156.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2021-47485","url":"https://www.suse.com/security/cve/CVE-2021-47485"},{"category":"external","summary":"SUSE Bug 1224904 for CVE-2021-47485","url":"https://bugzilla.suse.com/1224904"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.156.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":6.7,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","version":"3.1"},"products":["SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.156.1.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-11T07:41:23Z","details":"moderate"}],"title":"CVE-2021-47485"},{"cve":"CVE-2021-47511","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2021-47511"}],"notes":[{"category":"general","text":"In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: pcm: oss: Fix negative period/buffer sizes\n\nThe period size calculation in OSS layer may receive a negative value\nas an error, but the code there assumes only the positive values and\nhandle them with size_t.  Due to that, a too big value may be passed\nto the lower layers.\n\nThis patch changes the code to handle with ssize_t and adds the proper\nerror checks appropriately.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.156.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2021-47511","url":"https://www.suse.com/security/cve/CVE-2021-47511"},{"category":"external","summary":"SUSE Bug 1225411 for CVE-2021-47511","url":"https://bugzilla.suse.com/1225411"},{"category":"external","summary":"SUSE Bug 1227700 for CVE-2021-47511","url":"https://bugzilla.suse.com/1227700"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.156.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":7.8,"baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","version":"3.1"},"products":["SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.156.1.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-11T07:41:23Z","details":"important"}],"title":"CVE-2021-47511"},{"cve":"CVE-2023-52880","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2023-52880"}],"notes":[{"category":"general","text":"In the Linux kernel, the following vulnerability has been resolved:\n\ntty: n_gsm: require CAP_NET_ADMIN to attach N_GSM0710 ldisc\n\nAny unprivileged user can attach N_GSM0710 ldisc, but it requires\nCAP_NET_ADMIN to create a GSM network anyway.\n\nRequire initial namespace CAP_NET_ADMIN to do that.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.156.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2023-52880","url":"https://www.suse.com/security/cve/CVE-2023-52880"},{"category":"external","summary":"SUSE Bug 1222619 for CVE-2023-52880","url":"https://bugzilla.suse.com/1222619"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.156.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":8.4,"baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","version":"3.1"},"products":["SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.156.1.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-11T07:41:23Z","details":"important"}],"title":"CVE-2023-52880"},{"cve":"CVE-2024-26929","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2024-26929"}],"notes":[{"category":"general","text":"This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.156.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2024-26929","url":"https://www.suse.com/security/cve/CVE-2024-26929"},{"category":"external","summary":"SUSE Bug 1223715 for CVE-2024-26929","url":"https://bugzilla.suse.com/1223715"},{"category":"external","summary":"SUSE Bug 1223716 for CVE-2024-26929","url":"https://bugzilla.suse.com/1223716"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.156.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":7.8,"baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","version":"3.1"},"products":["SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.156.1.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-11T07:41:23Z","details":"important"}],"title":"CVE-2024-26929"},{"cve":"CVE-2024-26930","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2024-26930"}],"notes":[{"category":"general","text":"In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qla2xxx: Fix double free of the ha->vp_map pointer\n\nCoverity scan reported potential risk of double free of the pointer\nha->vp_map.  ha->vp_map was freed in qla2x00_mem_alloc(), and again freed\nin function qla2x00_mem_free(ha).\n\nAssign NULL to vp_map and kfree take care of NULL.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.156.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2024-26930","url":"https://www.suse.com/security/cve/CVE-2024-26930"},{"category":"external","summary":"SUSE Bug 1223626 for CVE-2024-26930","url":"https://bugzilla.suse.com/1223626"},{"category":"external","summary":"SUSE Bug 1223681 for CVE-2024-26930","url":"https://bugzilla.suse.com/1223681"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.156.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":7.8,"baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","version":"3.1"},"products":["SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.156.1.x86_64","SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.156.1.x86_64"]}],"threats":[{"category":"impact","date":"2024-06-11T07:41:23Z","details":"important"}],"title":"CVE-2024-26930"}]}