{"affected":[{"ecosystem_specific":{"binaries":[{"kernel-default":"3.0.101-108.177.1","kernel-default-base":"3.0.101-108.177.1","kernel-default-devel":"3.0.101-108.177.1","kernel-ec2":"3.0.101-108.177.1","kernel-ec2-base":"3.0.101-108.177.1","kernel-ec2-devel":"3.0.101-108.177.1","kernel-source":"3.0.101-108.177.1","kernel-syms":"3.0.101-108.177.1","kernel-trace":"3.0.101-108.177.1","kernel-trace-base":"3.0.101-108.177.1","kernel-trace-devel":"3.0.101-108.177.1","kernel-xen":"3.0.101-108.177.1","kernel-xen-base":"3.0.101-108.177.1","kernel-xen-devel":"3.0.101-108.177.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 11 SP4 LTSS EXTREME CORE","name":"kernel-default","purl":"pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4%20LTSS%20EXTREME%20CORE"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"3.0.101-108.177.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default":"3.0.101-108.177.1","kernel-default-base":"3.0.101-108.177.1","kernel-default-devel":"3.0.101-108.177.1","kernel-ec2":"3.0.101-108.177.1","kernel-ec2-base":"3.0.101-108.177.1","kernel-ec2-devel":"3.0.101-108.177.1","kernel-source":"3.0.101-108.177.1","kernel-syms":"3.0.101-108.177.1","kernel-trace":"3.0.101-108.177.1","kernel-trace-base":"3.0.101-108.177.1","kernel-trace-devel":"3.0.101-108.177.1","kernel-xen":"3.0.101-108.177.1","kernel-xen-base":"3.0.101-108.177.1","kernel-xen-devel":"3.0.101-108.177.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 11 SP4 LTSS EXTREME CORE","name":"kernel-ec2","purl":"pkg:rpm/suse/kernel-ec2&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4%20LTSS%20EXTREME%20CORE"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"3.0.101-108.177.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default":"3.0.101-108.177.1","kernel-default-base":"3.0.101-108.177.1","kernel-default-devel":"3.0.101-108.177.1","kernel-ec2":"3.0.101-108.177.1","kernel-ec2-base":"3.0.101-108.177.1","kernel-ec2-devel":"3.0.101-108.177.1","kernel-source":"3.0.101-108.177.1","kernel-syms":"3.0.101-108.177.1","kernel-trace":"3.0.101-108.177.1","kernel-trace-base":"3.0.101-108.177.1","kernel-trace-devel":"3.0.101-108.177.1","kernel-xen":"3.0.101-108.177.1","kernel-xen-base":"3.0.101-108.177.1","kernel-xen-devel":"3.0.101-108.177.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 11 SP4 LTSS EXTREME CORE","name":"kernel-source","purl":"pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4%20LTSS%20EXTREME%20CORE"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"3.0.101-108.177.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default":"3.0.101-108.177.1","kernel-default-base":"3.0.101-108.177.1","kernel-default-devel":"3.0.101-108.177.1","kernel-ec2":"3.0.101-108.177.1","kernel-ec2-base":"3.0.101-108.177.1","kernel-ec2-devel":"3.0.101-108.177.1","kernel-source":"3.0.101-108.177.1","kernel-syms":"3.0.101-108.177.1","kernel-trace":"3.0.101-108.177.1","kernel-trace-base":"3.0.101-108.177.1","kernel-trace-devel":"3.0.101-108.177.1","kernel-xen":"3.0.101-108.177.1","kernel-xen-base":"3.0.101-108.177.1","kernel-xen-devel":"3.0.101-108.177.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 11 SP4 LTSS EXTREME CORE","name":"kernel-syms","purl":"pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4%20LTSS%20EXTREME%20CORE"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"3.0.101-108.177.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default":"3.0.101-108.177.1","kernel-default-base":"3.0.101-108.177.1","kernel-default-devel":"3.0.101-108.177.1","kernel-ec2":"3.0.101-108.177.1","kernel-ec2-base":"3.0.101-108.177.1","kernel-ec2-devel":"3.0.101-108.177.1","kernel-source":"3.0.101-108.177.1","kernel-syms":"3.0.101-108.177.1","kernel-trace":"3.0.101-108.177.1","kernel-trace-base":"3.0.101-108.177.1","kernel-trace-devel":"3.0.101-108.177.1","kernel-xen":"3.0.101-108.177.1","kernel-xen-base":"3.0.101-108.177.1","kernel-xen-devel":"3.0.101-108.177.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 11 SP4 LTSS EXTREME CORE","name":"kernel-trace","purl":"pkg:rpm/suse/kernel-trace&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4%20LTSS%20EXTREME%20CORE"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"3.0.101-108.177.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default":"3.0.101-108.177.1","kernel-default-base":"3.0.101-108.177.1","kernel-default-devel":"3.0.101-108.177.1","kernel-ec2":"3.0.101-108.177.1","kernel-ec2-base":"3.0.101-108.177.1","kernel-ec2-devel":"3.0.101-108.177.1","kernel-source":"3.0.101-108.177.1","kernel-syms":"3.0.101-108.177.1","kernel-trace":"3.0.101-108.177.1","kernel-trace-base":"3.0.101-108.177.1","kernel-trace-devel":"3.0.101-108.177.1","kernel-xen":"3.0.101-108.177.1","kernel-xen-base":"3.0.101-108.177.1","kernel-xen-devel":"3.0.101-108.177.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 11 SP4 LTSS EXTREME CORE","name":"kernel-xen","purl":"pkg:rpm/suse/kernel-xen&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4%20LTSS%20EXTREME%20CORE"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"3.0.101-108.177.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2024-35863: smb: client: fix potential UAF in is_valid_oplock_break() (bsc#1224763).\n- CVE-2024-53104: media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format (bsc#1234025).\n- CVE-2024-56600: net: inet6: do not leave a dangling sk pointer in inet6_create() (bsc#1235217).\n- CVE-2024-56601: net: inet: do not leave a dangling sk pointer in inet_create() (bsc#1235230).\n- CVE-2024-56650: netfilter: x_tables: fix LED ID check in led_tg_check() (bsc#1235430).\n- CVE-2024-56759: btrfs: fix use-after-free when COWing tree bock and tracing is enabled (bsc#1235645).\n- CVE-2024-57850: jffs2: Prevent rtime decompress memory corruption (bsc#1235812).\n- CVE-2024-57893: ALSA: seq: oss: Fix races at processing SysEx messages (bsc#1235920).\n","id":"SUSE-SU-2025:0603-1","modified":"2025-02-20T10:34:39Z","published":"2025-02-20T10:34:39Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2025/suse-su-20250603-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224763"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234025"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234853"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234891"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234963"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235054"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235061"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235073"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235217"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235230"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235430"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235645"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235812"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235920"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-35863"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53104"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53173"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53239"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56539"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56548"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56600"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56601"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56605"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56650"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56759"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-57850"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-57893"}],"related":["CVE-2024-35863","CVE-2024-53104","CVE-2024-53173","CVE-2024-53239","CVE-2024-56539","CVE-2024-56548","CVE-2024-56600","CVE-2024-56601","CVE-2024-56605","CVE-2024-56650","CVE-2024-56759","CVE-2024-57850","CVE-2024-57893"],"summary":"Security update for the Linux Kernel","upstream":["CVE-2024-35863","CVE-2024-53104","CVE-2024-53173","CVE-2024-53239","CVE-2024-56539","CVE-2024-56548","CVE-2024-56600","CVE-2024-56601","CVE-2024-56605","CVE-2024-56650","CVE-2024-56759","CVE-2024-57850","CVE-2024-57893"]}