{"affected":[{"ecosystem_specific":{"binaries":[{"kernel-default":"3.0.101-108.156.1","kernel-default-base":"3.0.101-108.156.1","kernel-default-devel":"3.0.101-108.156.1","kernel-ec2":"3.0.101-108.156.1","kernel-ec2-base":"3.0.101-108.156.1","kernel-ec2-devel":"3.0.101-108.156.1","kernel-source":"3.0.101-108.156.1","kernel-syms":"3.0.101-108.156.1","kernel-trace":"3.0.101-108.156.1","kernel-trace-base":"3.0.101-108.156.1","kernel-trace-devel":"3.0.101-108.156.1","kernel-xen":"3.0.101-108.156.1","kernel-xen-base":"3.0.101-108.156.1","kernel-xen-devel":"3.0.101-108.156.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 11 SP4 LTSS EXTREME CORE","name":"kernel-default","purl":"pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4%20LTSS%20EXTREME%20CORE"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"3.0.101-108.156.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default":"3.0.101-108.156.1","kernel-default-base":"3.0.101-108.156.1","kernel-default-devel":"3.0.101-108.156.1","kernel-ec2":"3.0.101-108.156.1","kernel-ec2-base":"3.0.101-108.156.1","kernel-ec2-devel":"3.0.101-108.156.1","kernel-source":"3.0.101-108.156.1","kernel-syms":"3.0.101-108.156.1","kernel-trace":"3.0.101-108.156.1","kernel-trace-base":"3.0.101-108.156.1","kernel-trace-devel":"3.0.101-108.156.1","kernel-xen":"3.0.101-108.156.1","kernel-xen-base":"3.0.101-108.156.1","kernel-xen-devel":"3.0.101-108.156.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 11 SP4 LTSS EXTREME CORE","name":"kernel-ec2","purl":"pkg:rpm/suse/kernel-ec2&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4%20LTSS%20EXTREME%20CORE"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"3.0.101-108.156.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default":"3.0.101-108.156.1","kernel-default-base":"3.0.101-108.156.1","kernel-default-devel":"3.0.101-108.156.1","kernel-ec2":"3.0.101-108.156.1","kernel-ec2-base":"3.0.101-108.156.1","kernel-ec2-devel":"3.0.101-108.156.1","kernel-source":"3.0.101-108.156.1","kernel-syms":"3.0.101-108.156.1","kernel-trace":"3.0.101-108.156.1","kernel-trace-base":"3.0.101-108.156.1","kernel-trace-devel":"3.0.101-108.156.1","kernel-xen":"3.0.101-108.156.1","kernel-xen-base":"3.0.101-108.156.1","kernel-xen-devel":"3.0.101-108.156.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 11 SP4 LTSS EXTREME CORE","name":"kernel-source","purl":"pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4%20LTSS%20EXTREME%20CORE"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"3.0.101-108.156.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default":"3.0.101-108.156.1","kernel-default-base":"3.0.101-108.156.1","kernel-default-devel":"3.0.101-108.156.1","kernel-ec2":"3.0.101-108.156.1","kernel-ec2-base":"3.0.101-108.156.1","kernel-ec2-devel":"3.0.101-108.156.1","kernel-source":"3.0.101-108.156.1","kernel-syms":"3.0.101-108.156.1","kernel-trace":"3.0.101-108.156.1","kernel-trace-base":"3.0.101-108.156.1","kernel-trace-devel":"3.0.101-108.156.1","kernel-xen":"3.0.101-108.156.1","kernel-xen-base":"3.0.101-108.156.1","kernel-xen-devel":"3.0.101-108.156.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 11 SP4 LTSS EXTREME CORE","name":"kernel-syms","purl":"pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4%20LTSS%20EXTREME%20CORE"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"3.0.101-108.156.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default":"3.0.101-108.156.1","kernel-default-base":"3.0.101-108.156.1","kernel-default-devel":"3.0.101-108.156.1","kernel-ec2":"3.0.101-108.156.1","kernel-ec2-base":"3.0.101-108.156.1","kernel-ec2-devel":"3.0.101-108.156.1","kernel-source":"3.0.101-108.156.1","kernel-syms":"3.0.101-108.156.1","kernel-trace":"3.0.101-108.156.1","kernel-trace-base":"3.0.101-108.156.1","kernel-trace-devel":"3.0.101-108.156.1","kernel-xen":"3.0.101-108.156.1","kernel-xen-base":"3.0.101-108.156.1","kernel-xen-devel":"3.0.101-108.156.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 11 SP4 LTSS EXTREME CORE","name":"kernel-trace","purl":"pkg:rpm/suse/kernel-trace&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4%20LTSS%20EXTREME%20CORE"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"3.0.101-108.156.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default":"3.0.101-108.156.1","kernel-default-base":"3.0.101-108.156.1","kernel-default-devel":"3.0.101-108.156.1","kernel-ec2":"3.0.101-108.156.1","kernel-ec2-base":"3.0.101-108.156.1","kernel-ec2-devel":"3.0.101-108.156.1","kernel-source":"3.0.101-108.156.1","kernel-syms":"3.0.101-108.156.1","kernel-trace":"3.0.101-108.156.1","kernel-trace-base":"3.0.101-108.156.1","kernel-trace-devel":"3.0.101-108.156.1","kernel-xen":"3.0.101-108.156.1","kernel-xen-base":"3.0.101-108.156.1","kernel-xen-devel":"3.0.101-108.156.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 11 SP4 LTSS EXTREME CORE","name":"kernel-xen","purl":"pkg:rpm/suse/kernel-xen&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4%20LTSS%20EXTREME%20CORE"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"3.0.101-108.156.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"\n\nThe SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2021-47104: Fixed memory leak in qib_user_sdma_queue_pkts() (bsc#1220960).\n- CVE-2021-47321: Fixed possible use-after-free by calling  del_timer_sync() (bsc#1225060).\n- CVE-2021-47324: Fixed possible use-after-free in wdt_startup()  (bsc#1225030).\n- CVE-2021-47323: Fixed possible use-after-free in  wdt_turnoff() (bsc#1225026).\n- CVE-2021-47383: Fiedx out-of-bound vmalloc access in imageblit (bsc#1225208).\n- CVE-2021-47511: Fixed negative period/buffer sizes (bsc#1225411).\n- CVE-2021-47391: Ensure rdma_addr_cancel() happens before issuing more requests (bsc#1225318)\n- CVE-2021-47347: Fixed possible buffer overflow in wl1251_cmd_scan  (bsc#1225177).\n\n","id":"SUSE-SU-2024:1978-1","modified":"2024-06-11T07:41:23Z","published":"2024-06-11T07:41:23Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2024/suse-su-20241978-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1220960"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222619"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224904"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225026"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225030"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225060"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225177"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225208"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225318"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225411"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47104"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47321"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47323"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47324"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47347"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47383"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47391"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47485"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47511"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52880"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26929"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26930"}],"related":["CVE-2021-47104","CVE-2021-47321","CVE-2021-47323","CVE-2021-47324","CVE-2021-47347","CVE-2021-47383","CVE-2021-47391","CVE-2021-47485","CVE-2021-47511","CVE-2023-52880","CVE-2024-26929","CVE-2024-26930"],"summary":"Security update for the Linux Kernel","upstream":["CVE-2021-47104","CVE-2021-47321","CVE-2021-47323","CVE-2021-47324","CVE-2021-47347","CVE-2021-47383","CVE-2021-47391","CVE-2021-47485","CVE-2021-47511","CVE-2023-52880","CVE-2024-26929","CVE-2024-26930"]}