Security update for the Linux Kernel
Announcement ID: | SUSE-SU-2025:0603-1 |
---|---|
Release Date: | 2025-02-20T10:34:39Z |
Rating: | important |
References: | |
Cross-References: | |
CVSS scores: |
|
Affected Products: |
|
An update that solves 13 vulnerabilities and has one security fix can now be installed.
Description:
The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security bugfixes.
The following security bugs were fixed:
- CVE-2024-35863: smb: client: fix potential UAF in is_valid_oplock_break() (bsc#1224763).
- CVE-2024-53104: media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format (bsc#1234025).
- CVE-2024-56600: net: inet6: do not leave a dangling sk pointer in inet6_create() (bsc#1235217).
- CVE-2024-56601: net: inet: do not leave a dangling sk pointer in inet_create() (bsc#1235230).
- CVE-2024-56650: netfilter: x_tables: fix LED ID check in led_tg_check() (bsc#1235430).
- CVE-2024-56759: btrfs: fix use-after-free when COWing tree bock and tracing is enabled (bsc#1235645).
- CVE-2024-57850: jffs2: Prevent rtime decompress memory corruption (bsc#1235812).
- CVE-2024-57893: ALSA: seq: oss: Fix races at processing SysEx messages (bsc#1235920).
Special Instructions and Notes:
- Please reboot the system after installing this update.
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE
zypper in -t patch SUSE-SLE-SERVER-11-SP4-LTSS-EXTREME-CORE-2025-603=1
-
SUSE Linux Enterprise Server 11 SP4
zypper in -t patch SUSE-SLE-SERVER-11-SP4-LTSS-EXTREME-CORE-2025-603=1
Package List:
-
SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE (nosrc x86_64)
- kernel-xen-3.0.101-108.177.1
- kernel-default-3.0.101-108.177.1
- kernel-ec2-3.0.101-108.177.1
- kernel-trace-3.0.101-108.177.1
-
SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE (x86_64)
- kernel-default-devel-3.0.101-108.177.1
- kernel-xen-base-3.0.101-108.177.1
- kernel-syms-3.0.101-108.177.1
- kernel-ec2-devel-3.0.101-108.177.1
- kernel-trace-devel-3.0.101-108.177.1
- kernel-default-base-3.0.101-108.177.1
- kernel-xen-devel-3.0.101-108.177.1
- kernel-source-3.0.101-108.177.1
- kernel-ec2-base-3.0.101-108.177.1
- kernel-trace-base-3.0.101-108.177.1
-
SUSE Linux Enterprise Server 11 SP4 (nosrc x86_64)
- kernel-xen-3.0.101-108.177.1
- kernel-default-3.0.101-108.177.1
- kernel-ec2-3.0.101-108.177.1
- kernel-trace-3.0.101-108.177.1
-
SUSE Linux Enterprise Server 11 SP4 (x86_64)
- kernel-default-devel-3.0.101-108.177.1
- kernel-xen-base-3.0.101-108.177.1
- kernel-syms-3.0.101-108.177.1
- kernel-ec2-devel-3.0.101-108.177.1
- kernel-trace-devel-3.0.101-108.177.1
- kernel-default-base-3.0.101-108.177.1
- kernel-xen-devel-3.0.101-108.177.1
- kernel-source-3.0.101-108.177.1
- kernel-ec2-base-3.0.101-108.177.1
- kernel-trace-base-3.0.101-108.177.1
References:
- https://www.suse.com/security/cve/CVE-2024-35863.html
- https://www.suse.com/security/cve/CVE-2024-53104.html
- https://www.suse.com/security/cve/CVE-2024-53173.html
- https://www.suse.com/security/cve/CVE-2024-53239.html
- https://www.suse.com/security/cve/CVE-2024-56539.html
- https://www.suse.com/security/cve/CVE-2024-56548.html
- https://www.suse.com/security/cve/CVE-2024-56600.html
- https://www.suse.com/security/cve/CVE-2024-56601.html
- https://www.suse.com/security/cve/CVE-2024-56605.html
- https://www.suse.com/security/cve/CVE-2024-56650.html
- https://www.suse.com/security/cve/CVE-2024-56759.html
- https://www.suse.com/security/cve/CVE-2024-57850.html
- https://www.suse.com/security/cve/CVE-2024-57893.html
- https://bugzilla.suse.com/show_bug.cgi?id=1224763
- https://bugzilla.suse.com/show_bug.cgi?id=1234025
- https://bugzilla.suse.com/show_bug.cgi?id=1234853
- https://bugzilla.suse.com/show_bug.cgi?id=1234891
- https://bugzilla.suse.com/show_bug.cgi?id=1234963
- https://bugzilla.suse.com/show_bug.cgi?id=1235054
- https://bugzilla.suse.com/show_bug.cgi?id=1235061
- https://bugzilla.suse.com/show_bug.cgi?id=1235073
- https://bugzilla.suse.com/show_bug.cgi?id=1235217
- https://bugzilla.suse.com/show_bug.cgi?id=1235230
- https://bugzilla.suse.com/show_bug.cgi?id=1235430
- https://bugzilla.suse.com/show_bug.cgi?id=1235645
- https://bugzilla.suse.com/show_bug.cgi?id=1235812
- https://bugzilla.suse.com/show_bug.cgi?id=1235920