{"affected":[{"ecosystem_specific":{"binaries":[{"kernel-default":"3.0.101-108.153.1","kernel-default-base":"3.0.101-108.153.1","kernel-default-devel":"3.0.101-108.153.1","kernel-ec2":"3.0.101-108.153.1","kernel-ec2-base":"3.0.101-108.153.1","kernel-ec2-devel":"3.0.101-108.153.1","kernel-source":"3.0.101-108.153.1","kernel-syms":"3.0.101-108.153.1","kernel-trace":"3.0.101-108.153.1","kernel-trace-base":"3.0.101-108.153.1","kernel-trace-devel":"3.0.101-108.153.1","kernel-xen":"3.0.101-108.153.1","kernel-xen-base":"3.0.101-108.153.1","kernel-xen-devel":"3.0.101-108.153.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 11 SP4 LTSS EXTREME CORE","name":"kernel-default","purl":"pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4%20LTSS%20EXTREME%20CORE"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"3.0.101-108.153.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default":"3.0.101-108.153.1","kernel-default-base":"3.0.101-108.153.1","kernel-default-devel":"3.0.101-108.153.1","kernel-ec2":"3.0.101-108.153.1","kernel-ec2-base":"3.0.101-108.153.1","kernel-ec2-devel":"3.0.101-108.153.1","kernel-source":"3.0.101-108.153.1","kernel-syms":"3.0.101-108.153.1","kernel-trace":"3.0.101-108.153.1","kernel-trace-base":"3.0.101-108.153.1","kernel-trace-devel":"3.0.101-108.153.1","kernel-xen":"3.0.101-108.153.1","kernel-xen-base":"3.0.101-108.153.1","kernel-xen-devel":"3.0.101-108.153.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 11 SP4 LTSS EXTREME CORE","name":"kernel-ec2","purl":"pkg:rpm/suse/kernel-ec2&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4%20LTSS%20EXTREME%20CORE"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"3.0.101-108.153.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default":"3.0.101-108.153.1","kernel-default-base":"3.0.101-108.153.1","kernel-default-devel":"3.0.101-108.153.1","kernel-ec2":"3.0.101-108.153.1","kernel-ec2-base":"3.0.101-108.153.1","kernel-ec2-devel":"3.0.101-108.153.1","kernel-source":"3.0.101-108.153.1","kernel-syms":"3.0.101-108.153.1","kernel-trace":"3.0.101-108.153.1","kernel-trace-base":"3.0.101-108.153.1","kernel-trace-devel":"3.0.101-108.153.1","kernel-xen":"3.0.101-108.153.1","kernel-xen-base":"3.0.101-108.153.1","kernel-xen-devel":"3.0.101-108.153.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 11 SP4 LTSS EXTREME CORE","name":"kernel-source","purl":"pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4%20LTSS%20EXTREME%20CORE"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"3.0.101-108.153.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default":"3.0.101-108.153.1","kernel-default-base":"3.0.101-108.153.1","kernel-default-devel":"3.0.101-108.153.1","kernel-ec2":"3.0.101-108.153.1","kernel-ec2-base":"3.0.101-108.153.1","kernel-ec2-devel":"3.0.101-108.153.1","kernel-source":"3.0.101-108.153.1","kernel-syms":"3.0.101-108.153.1","kernel-trace":"3.0.101-108.153.1","kernel-trace-base":"3.0.101-108.153.1","kernel-trace-devel":"3.0.101-108.153.1","kernel-xen":"3.0.101-108.153.1","kernel-xen-base":"3.0.101-108.153.1","kernel-xen-devel":"3.0.101-108.153.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 11 SP4 LTSS EXTREME CORE","name":"kernel-syms","purl":"pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4%20LTSS%20EXTREME%20CORE"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"3.0.101-108.153.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default":"3.0.101-108.153.1","kernel-default-base":"3.0.101-108.153.1","kernel-default-devel":"3.0.101-108.153.1","kernel-ec2":"3.0.101-108.153.1","kernel-ec2-base":"3.0.101-108.153.1","kernel-ec2-devel":"3.0.101-108.153.1","kernel-source":"3.0.101-108.153.1","kernel-syms":"3.0.101-108.153.1","kernel-trace":"3.0.101-108.153.1","kernel-trace-base":"3.0.101-108.153.1","kernel-trace-devel":"3.0.101-108.153.1","kernel-xen":"3.0.101-108.153.1","kernel-xen-base":"3.0.101-108.153.1","kernel-xen-devel":"3.0.101-108.153.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 11 SP4 LTSS EXTREME CORE","name":"kernel-trace","purl":"pkg:rpm/suse/kernel-trace&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4%20LTSS%20EXTREME%20CORE"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"3.0.101-108.153.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default":"3.0.101-108.153.1","kernel-default-base":"3.0.101-108.153.1","kernel-default-devel":"3.0.101-108.153.1","kernel-ec2":"3.0.101-108.153.1","kernel-ec2-base":"3.0.101-108.153.1","kernel-ec2-devel":"3.0.101-108.153.1","kernel-source":"3.0.101-108.153.1","kernel-syms":"3.0.101-108.153.1","kernel-trace":"3.0.101-108.153.1","kernel-trace-base":"3.0.101-108.153.1","kernel-trace-devel":"3.0.101-108.153.1","kernel-xen":"3.0.101-108.153.1","kernel-xen-base":"3.0.101-108.153.1","kernel-xen-devel":"3.0.101-108.153.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 11 SP4 LTSS EXTREME CORE","name":"kernel-xen","purl":"pkg:rpm/suse/kernel-xen&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4%20LTSS%20EXTREME%20CORE"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"3.0.101-108.153.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2024-27043: Fixed a use-after-free in edia/dvbdev in different places (bsc#1223824).\n- CVE-2024-26733: Fixed an overflow in arp_req_get() in arp (bsc#1222585).\n- CVE-2022-48619: Fixed a denial-of-service issue in drivers/input/input.c (bsc#1218220).\n- CVE-2021-46904: Fixed NULL pointer dereference during tty device unregistration (bsc#1220416).\n- CVE-2023-28746: Fixed Register File Data Sampling (bsc#1213456).\n- CVE-2021-46905: Fixed NULL pointer dereference on disconnect regression (bsc#1220418).\n- CVE-2023-52340: Fixed a denial of service related to ICMPv6 'Packet Too Big' packets (bsc#1219295).\n- CVE-2021-46932: Initialized work before appletouch device registration (bsc#1220444).\n- CVE-2023-52449: Fixed gluebi NULL pointer dereference caused by ftl notifier (bsc#1220238).\n- CVE-2023-52475: Fixed a use-after-free in powermate_config_complete() (bsc#1220649).\n- CVE-2023-52445: Fixed a use-after-free on context disconnection in pvrusb2 (bsc#1220241).\n- CVE-2023-52429: Limited the number of targets and parameter size area for device mapper (bsc#1219146).\n- CVE-2023-51780: Fixed a use-after-free in do_vcc_ioctl() related to a vcc_recvmsg race condition (bsc#1218730).\n- CVE-2023-51782: Fixed a use-after-free in rose_ioctl() related to a rose_accept race condition (bsc#1218757).\n- CVE-2023-31083: Fixed a NULL pointer dereference in hci_uart_tty_ioctl() (bsc#1210780).\n\nThe following non-security bugs were fixed:\n\n- KVM: VMX: Move VERW closer to VMentry for MDS mitigation (git-fixes).\n- KVM: VMX: Use BT+JNC, i.e. EFLAGS.CF to select VMRESUME vs. VMLAUNCH (git-fixes).\n- tty: n_gsm: require CAP_NET_ADMIN to attach N_GSM0710 ldisc (bsc#1222619).\n- x86/asm: Add _ASM_RIP() macro for x86-64 (%rip) suffix (git-fixes).\n- x86/bugs: Add asm helpers for executing VERW (bsc#1213456).\n- x86/bugs: Use ALTERNATIVE() instead of mds_user_clear static key (git-fixes).\n- x86/entry_32: Add VERW just before userspace transition (git-fixes).\n- x86/entry_64: Add VERW just before userspace transition (git-fixes).\n","id":"SUSE-SU-2024:1669-1","modified":"2024-05-16T08:50:07Z","published":"2024-05-16T08:50:07Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2024/suse-su-20241669-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1210780"},{"type":"REPORT","url":"https://bugzilla.suse.com/1213456"},{"type":"REPORT","url":"https://bugzilla.suse.com/1218220"},{"type":"REPORT","url":"https://bugzilla.suse.com/1218562"},{"type":"REPORT","url":"https://bugzilla.suse.com/1218730"},{"type":"REPORT","url":"https://bugzilla.suse.com/1218757"},{"type":"REPORT","url":"https://bugzilla.suse.com/1219146"},{"type":"REPORT","url":"https://bugzilla.suse.com/1219295"},{"type":"REPORT","url":"https://bugzilla.suse.com/1219827"},{"type":"REPORT","url":"https://bugzilla.suse.com/1220191"},{"type":"REPORT","url":"https://bugzilla.suse.com/1220238"},{"type":"REPORT","url":"https://bugzilla.suse.com/1220241"},{"type":"REPORT","url":"https://bugzilla.suse.com/1220416"},{"type":"REPORT","url":"https://bugzilla.suse.com/1220418"},{"type":"REPORT","url":"https://bugzilla.suse.com/1220444"},{"type":"REPORT","url":"https://bugzilla.suse.com/1220649"},{"type":"REPORT","url":"https://bugzilla.suse.com/1221044"},{"type":"REPORT","url":"https://bugzilla.suse.com/1221088"},{"type":"REPORT","url":"https://bugzilla.suse.com/1221578"},{"type":"REPORT","url":"https://bugzilla.suse.com/1221598"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222585"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222619"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223016"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223824"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-46904"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-46905"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-46932"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48619"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-28746"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-31083"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-51780"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-51782"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52340"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52429"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52445"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52449"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52475"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52590"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52591"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-6270"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-23851"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26733"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26898"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-27043"}],"related":["CVE-2021-46904","CVE-2021-46905","CVE-2021-46932","CVE-2022-48619","CVE-2023-28746","CVE-2023-31083","CVE-2023-51780","CVE-2023-51782","CVE-2023-52340","CVE-2023-52429","CVE-2023-52445","CVE-2023-52449","CVE-2023-52475","CVE-2023-52590","CVE-2023-52591","CVE-2023-6270","CVE-2024-23851","CVE-2024-26733","CVE-2024-26898","CVE-2024-27043"],"summary":"Security update for the Linux Kernel","upstream":["CVE-2021-46904","CVE-2021-46905","CVE-2021-46932","CVE-2022-48619","CVE-2023-28746","CVE-2023-31083","CVE-2023-51780","CVE-2023-51782","CVE-2023-52340","CVE-2023-52429","CVE-2023-52445","CVE-2023-52449","CVE-2023-52475","CVE-2023-52590","CVE-2023-52591","CVE-2023-6270","CVE-2024-23851","CVE-2024-26733","CVE-2024-26898","CVE-2024-27043"]}