Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.1.4.2025.0201.2
Kategorie:SuSE Local Security Checks
Titel:SUSE: Security Advisory (SUSE-SU-2025:0201-2)
Zusammenfassung:The remote host is missing an update for the 'Linux Kernel' package(s) announced via the SUSE-SU-2025:0201-2 advisory.
Beschreibung:Summary:
The remote host is missing an update for the 'Linux Kernel' package(s) announced via the SUSE-SU-2025:0201-2 advisory.

Vulnerability Insight:
The SUSE Linux Enterprise 15 SP5 kernel was updated to receive various security bugfixes.


The following security bugs were fixed:

- CVE-2022-36280: Fixed out-of-bounds memory access vulnerability found in vmwgfx driver (bsc#1203332).
- CVE-2022-48742: rtnetlink: make sure to refresh master_dev/m_ops in __rtnl_newlink() (bsc#1226694).
- CVE-2022-49033: btrfs: qgroup: fix sleep from invalid context bug in btrfs_qgroup_inherit() (bsc#1232045).
- CVE-2023-1382: Fixed denial of service in tipc_conn_close (bsc#1209288).
- CVE-2023-33951: Fixed a race condition that could have led to an information disclosure inside the vmwgfx driver (bsc#1211593).
- CVE-2023-33952: Fixed a double free that could have led to a local privilege escalation inside the vmwgfx driver (bsc#1211595).
- CVE-2023-52920: bpf: support non-r10 register spill/fill to/from stack in precision tracking (bsc#1232823).
- CVE-2024-26886: Bluetooth: af_bluetooth: Fix deadlock (bsc#1223044).
- CVE-2024-26924: scsi: lpfc: Release hbalock before calling lpfc_worker_wake_up() (bsc#1225820).
- CVE-2024-36915: nfc: llcp: fix nfc_llcp_setsockopt() unsafe copies (bsc#1225758).
- CVE-2024-44934: net: bridge: mcast: wait for previous gc cycles when removing port (bsc#1229809).
- CVE-2024-47666: scsi: pm80xx: Set phy->enable_completion only when we wait for it (bsc#1231453).
- CVE-2024-47678: icmp: change the order of rate limits (bsc#1231854).
- CVE-2024-49944: sctp: set sk_state back to CLOSED if autobind fails in sctp_listen_start (bsc#1232166).
- CVE-2024-49952: netfilter: nf_tables: prevent nf_skb_duplicated corruption (bsc#1232157).
- CVE-2024-50018: net: napi: Prevent overflow of napi_defer_hard_irqs (bsc#1232419).
- CVE-2024-50143: udf: fix uninit-value use in udf_get_fileshortad (bsc#1233038).
- CVE-2024-50166: fsl/fman: Fix refcount handling of fman-related devices (bsc#1233050).
- CVE-2024-50181: clk: imx: Remove CLK_SET_PARENT_GATE for DRAM mux for i.MX7D (bsc#1233127).
- CVE-2024-50202: nilfs2: propagate directory read errors from nilfs_find_entry() (bsc#1233324).
- CVE-2024-50211: udf: refactor inode_bmap() to handle error (bsc#1233096).
- CVE-2024-50256: netfilter: nf_reject_ipv6: fix potential crash in nf_send_reset6() (bsc#1233200).
- CVE-2024-50262: bpf: Fix out-of-bounds write in trie_get_next_key() (bsc#1233239).
- CVE-2024-50278, CVE-2024-50280: dm cache: fix flushing uninitialized delayed_work on cache_ctr error (bsc#1233467 bsc#1233469).
- CVE-2024-50278: dm cache: fix potential out-of-bounds access on the first resume (bsc#1233467).
- CVE-2024-50279: dm cache: fix out-of-bounds access to the dirty bitset when resizing (bsc#1233468).
- CVE-2024-50296: net: hns3: fix kernel crash when uninstalling driver (bsc#1233485).
- CVE-2024-53051: drm/i915/hdcp: Add encoder check in intel_hdcp_get_capability (bsc#1233547).
- CVE-2024-53055: wifi: iwlwifi: mvm: fix 6 GHz scan construction (bsc#1233550).
- ... [Please see the references for more information on the vulnerabilities]

Affected Software/OS:
'Linux Kernel' package(s) on SUSE Linux Enterprise Server 15-SP5, SUSE Linux Enterprise Server for SAP Applications 15-SP5.

Solution:
Please install the updated package(s).

CVSS Score:
8.3

CVSS Vector:
AV:A/AC:L/Au:N/C:C/I:C/A:C

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2021-47202
https://git.kernel.org/stable/c/0750f769b95841b34a9fe8c418dd792ff526bf86
https://git.kernel.org/stable/c/6a315471cb6a07f651e1d3adc8962730f4fcccac
https://git.kernel.org/stable/c/828f4c31684da94ecf0b44a2cbd35bbede04f0bd
https://git.kernel.org/stable/c/96cfe05051fd8543cdedd6807ec59a0e6c409195
https://git.kernel.org/stable/c/ef2590a5305e0b8e9342f84c2214aa478ee7f28e
Common Vulnerability Exposure (CVE) ID: CVE-2022-36280
Debian Security Information: DSA-5324 (Google Search)
https://www.debian.org/security/2023/dsa-5324
https://bugzilla.openanolis.cn/show_bug.cgi?id=2071
https://lists.debian.org/debian-lts-announce/2023/03/msg00000.html
https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
Common Vulnerability Exposure (CVE) ID: CVE-2022-48742
https://git.kernel.org/stable/c/2cf180360d66bd657e606c1217e0e668e6faa303
https://git.kernel.org/stable/c/36a9a0aee881940476b254e0352581401b23f210
https://git.kernel.org/stable/c/3bbe2019dd12b8d13671ee6cda055d49637b4c39
https://git.kernel.org/stable/c/7d9211678c0f0624f74cdff36117ab8316697bb8
https://git.kernel.org/stable/c/a01e60a1ec6bef9be471fb7182a33c6d6f124e93
https://git.kernel.org/stable/c/bd43771ee9759dd9dfae946bff190e2c5a120de5
https://git.kernel.org/stable/c/c6f6f2444bdbe0079e41914a35081530d0409963
https://git.kernel.org/stable/c/def5e7070079b2a214b3b1a2fbec623e6fbfe34a
Common Vulnerability Exposure (CVE) ID: CVE-2022-49033
Common Vulnerability Exposure (CVE) ID: CVE-2022-49035
Common Vulnerability Exposure (CVE) ID: CVE-2023-1382
https://lore.kernel.org/netdev/bc7bd3183f1c275c820690fc65b708238fe9e38e.1668807842.git.lucien.xin@gmail.com/T/#u
Common Vulnerability Exposure (CVE) ID: CVE-2023-33951
RHBZ#2218195
https://bugzilla.redhat.com/show_bug.cgi?id=2218195
RHSA-2023:6583
https://access.redhat.com/errata/RHSA-2023:6583
RHSA-2023:6901
https://access.redhat.com/errata/RHSA-2023:6901
RHSA-2023:7077
https://access.redhat.com/errata/RHSA-2023:7077
RHSA-2024:1404
https://access.redhat.com/errata/RHSA-2024:1404
https://access.redhat.com/security/cve/CVE-2023-33951
https://www.zerodayinitiative.com/advisories/ZDI-CAN-20110/
Common Vulnerability Exposure (CVE) ID: CVE-2023-33952
RHBZ#2218212
https://bugzilla.redhat.com/show_bug.cgi?id=2218212
https://access.redhat.com/security/cve/CVE-2023-33952
https://www.zerodayinitiative.com/advisories/ZDI-CAN-20292
Common Vulnerability Exposure (CVE) ID: CVE-2023-52920
Common Vulnerability Exposure (CVE) ID: CVE-2024-24860
https://bugzilla.openanolis.cn/show_bug.cgi?id=8151
Common Vulnerability Exposure (CVE) ID: CVE-2024-26886
https://git.kernel.org/stable/c/2c9e2df022ef8b9d7fac58a04a2ef4ed25288955
https://git.kernel.org/stable/c/64be3c6154886200708da0dfe259705fb992416c
https://git.kernel.org/stable/c/817e8138ce86001b2fa5c63d6ede756e205a01f7
https://git.kernel.org/stable/c/cb8adca52f306563d958a863bb0cbae9c184d1ae
https://git.kernel.org/stable/c/f7b94bdc1ec107c92262716b073b3e816d4784fb
Common Vulnerability Exposure (CVE) ID: CVE-2024-26924
https://git.kernel.org/stable/c/14b001ba221136c15f894577253e8db535b99487
https://git.kernel.org/stable/c/3cfc9ec039af60dbd8965ae085b2c2ccdcfbe1cc
https://git.kernel.org/stable/c/41d8fdf3afaff312e17466e4ab732937738d5644
https://git.kernel.org/stable/c/7a1679e2d9bfa3b5f8755c2c7113e54b7d42bd46
https://git.kernel.org/stable/c/e3b887a9c11caf8357a821260e095f2a694a34f2
https://git.kernel.org/stable/c/ebf7c9746f073035ee26209e38c3a1170f7b349a
Common Vulnerability Exposure (CVE) ID: CVE-2024-36915
https://git.kernel.org/stable/c/29dc0ea979d433dd3c26abc8fa971550bdc05107
https://git.kernel.org/stable/c/7a87441c9651ba37842f4809224aca13a554a26f
Common Vulnerability Exposure (CVE) ID: CVE-2024-42232
Common Vulnerability Exposure (CVE) ID: CVE-2024-44934
Common Vulnerability Exposure (CVE) ID: CVE-2024-47666
Common Vulnerability Exposure (CVE) ID: CVE-2024-47678
Common Vulnerability Exposure (CVE) ID: CVE-2024-49944
Common Vulnerability Exposure (CVE) ID: CVE-2024-49952
Common Vulnerability Exposure (CVE) ID: CVE-2024-50018
Common Vulnerability Exposure (CVE) ID: CVE-2024-50143
Common Vulnerability Exposure (CVE) ID: CVE-2024-50154
Common Vulnerability Exposure (CVE) ID: CVE-2024-50166
Common Vulnerability Exposure (CVE) ID: CVE-2024-50181
Common Vulnerability Exposure (CVE) ID: CVE-2024-50202
Common Vulnerability Exposure (CVE) ID: CVE-2024-50211
Common Vulnerability Exposure (CVE) ID: CVE-2024-50256
Common Vulnerability Exposure (CVE) ID: CVE-2024-50262
Common Vulnerability Exposure (CVE) ID: CVE-2024-50278
Common Vulnerability Exposure (CVE) ID: CVE-2024-50279
Common Vulnerability Exposure (CVE) ID: CVE-2024-50280
Common Vulnerability Exposure (CVE) ID: CVE-2024-50296
Common Vulnerability Exposure (CVE) ID: CVE-2024-53051
Common Vulnerability Exposure (CVE) ID: CVE-2024-53055
Common Vulnerability Exposure (CVE) ID: CVE-2024-53056
Common Vulnerability Exposure (CVE) ID: CVE-2024-53064
Common Vulnerability Exposure (CVE) ID: CVE-2024-53072
Common Vulnerability Exposure (CVE) ID: CVE-2024-53090
Common Vulnerability Exposure (CVE) ID: CVE-2024-53095
Common Vulnerability Exposure (CVE) ID: CVE-2024-53101
Common Vulnerability Exposure (CVE) ID: CVE-2024-53113
Common Vulnerability Exposure (CVE) ID: CVE-2024-53114
Common Vulnerability Exposure (CVE) ID: CVE-2024-53119
Common Vulnerability Exposure (CVE) ID: CVE-2024-53120
Common Vulnerability Exposure (CVE) ID: CVE-2024-53122
Common Vulnerability Exposure (CVE) ID: CVE-2024-53125
Common Vulnerability Exposure (CVE) ID: CVE-2024-53130
Common Vulnerability Exposure (CVE) ID: CVE-2024-53131
Common Vulnerability Exposure (CVE) ID: CVE-2024-53142
Common Vulnerability Exposure (CVE) ID: CVE-2024-53146
Common Vulnerability Exposure (CVE) ID: CVE-2024-53150
Common Vulnerability Exposure (CVE) ID: CVE-2024-53156
Common Vulnerability Exposure (CVE) ID: CVE-2024-53157
Common Vulnerability Exposure (CVE) ID: CVE-2024-53158
Common Vulnerability Exposure (CVE) ID: CVE-2024-53161
Common Vulnerability Exposure (CVE) ID: CVE-2024-53162
Common Vulnerability Exposure (CVE) ID: CVE-2024-53173
Common Vulnerability Exposure (CVE) ID: CVE-2024-53179
Common Vulnerability Exposure (CVE) ID: CVE-2024-53206
Common Vulnerability Exposure (CVE) ID: CVE-2024-53210
Common Vulnerability Exposure (CVE) ID: CVE-2024-53213
Common Vulnerability Exposure (CVE) ID: CVE-2024-53214
Common Vulnerability Exposure (CVE) ID: CVE-2024-53239
Common Vulnerability Exposure (CVE) ID: CVE-2024-53240
Common Vulnerability Exposure (CVE) ID: CVE-2024-53241
Common Vulnerability Exposure (CVE) ID: CVE-2024-56539
Common Vulnerability Exposure (CVE) ID: CVE-2024-56548
Common Vulnerability Exposure (CVE) ID: CVE-2024-56549
Common Vulnerability Exposure (CVE) ID: CVE-2024-56570
Common Vulnerability Exposure (CVE) ID: CVE-2024-56571
Common Vulnerability Exposure (CVE) ID: CVE-2024-56575
Common Vulnerability Exposure (CVE) ID: CVE-2024-56598
Common Vulnerability Exposure (CVE) ID: CVE-2024-56604
Common Vulnerability Exposure (CVE) ID: CVE-2024-56605
Common Vulnerability Exposure (CVE) ID: CVE-2024-56619
Common Vulnerability Exposure (CVE) ID: CVE-2024-56755
Common Vulnerability Exposure (CVE) ID: CVE-2024-8805
CopyrightCopyright (C) 2025 Greenbone AG

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.