Beschreibung: | Summary: The remote host is missing an update for the 'the Linux Kernel' package(s) announced via the SUSE-SU-2024:2802-1 advisory.
Vulnerability Insight: The SUSE Linux Enterprise 15 SP6 kernel was updated to receive various security bugfixes.
The following security bugs were fixed:
- CVE-2023-47210: wifi: iwlwifi: bump FW API to 90 for BZ/SC devices (bsc#1225601, bsc#1225600). - CVE-2023-52435: net: prevent mss overflow in skb_segment() (bsc#1220138). - CVE-2023-52751: smb: client: fix use-after-free in smb2_query_info_compound() (bsc#1225489). - CVE-2023-52775: net/smc: avoid data corruption caused by decline (bsc#1225088). - CVE-2024-26615: net/smc: fix illegal rmb_desc access in SMC-D connection dump (bsc#1220942). - CVE-2024-26623: pds_core: Prevent race issues involving the adminq (bsc#1221057). - CVE-2024-26633: ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim() (bsc#1221647). - CVE-2024-26635: llc: Drop support for ETH_P_TR_802_2 (bsc#1221656). - CVE-2024-26636: llc: make llc_ui_sendmsg() more robust against bonding changes (bsc#1221659). - CVE-2024-26641: ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv() (bsc#1221654). - CVE-2024-26663: tipc: Check the bearer type before calling tipc_udp_nl_bearer_add() (bsc#1222326). - CVE-2024-26665: tunnels: fix out of bounds access when building IPv6 PMTU error (bsc#1222328). - CVE-2024-26691: KVM: arm64: Fix circular locking dependency (bsc#1222463). - CVE-2024-26734: devlink: fix possible use-after-free and memory leaks in devlink_init() (bsc#1222438). - CVE-2024-26785: iommufd: Fix protection fault in iommufd_test_syz_conv_iova (bsc#1222779). - CVE-2024-26826: mptcp: fix data re-injection from stale subflow (bsc#1223010). - CVE-2024-26863: hsr: Fix uninit-value access in hsr_get_node() (bsc#1223021). - CVE-2024-26944: btrfs: zoned: fix lock ordering in btrfs_zone_activate() (bsc#1223731). - CVE-2024-27012: netfilter: nf_tables: restore set elements when delete set fails (bsc#1223804). - CVE-2024-27015: netfilter: flowtable: incorrect pppoe tuple (bsc#1223806). - CVE-2024-27016: netfilter: flowtable: validate pppoe header (bsc#1223807). - CVE-2024-27019: netfilter: nf_tables: Fix potential data-race in __nft_obj_type_get() (bsc#1223813) - CVE-2024-27020: netfilter: nf_tables: Fix potential data-race in __nft_expr_type_get() (bsc#1223815) - CVE-2024-27025: nbd: null check for nla_nest_start (bsc#1223778) - CVE-2024-27064: netfilter: nf_tables: Fix a memory leak in nf_tables_updchain (bsc#1223740). - CVE-2024-27065: netfilter: nf_tables: do not compare internal table flags on updates (bsc#1223836). - CVE-2024-27402: phonet/pep: fix racy skb_queue_empty() use (bsc#1224414). - CVE-2024-27404: mptcp: fix data races on remote_id (bsc#1224422) - CVE-2024-35805: dm snapshot: fix lockup in dm_exception_table_exit (bsc#1224743). - CVE-2024-35853: mlxsw: spectrum_acl_tcam: Fix memory leak during rehash (bsc#1224604). - CVE-2024-35854: Fixed possible use-after-free during rehash (bsc#1224636). - CVE-2024-35890: gro: fix ownership transfer ... [Please see the references for more information on the vulnerabilities]
Affected Software/OS: 'the Linux Kernel' package(s) on openSUSE Leap 15.6.
Solution: Please install the updated package(s).
CVSS Score: 6.8
CVSS Vector: AV:L/AC:L/Au:S/C:C/I:C/A:C
|