Descripción: | Summary: The remote host is missing an update for the 'Linux Kernel' package(s) announced via the SUSE-SU-2025:0834-1 advisory.
Vulnerability Insight: The SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security bugfixes.
The following security bugs were fixed:
- CVE-2021-22543: Fixed improper handling of VM_IOVM_PFNMAP vmas in KVM (bsc#1186482). - CVE-2021-47634: ubi: Fix race condition between ctrl_cdev_ioctl and ubi_cdev_ioctl (bsc#1237758). - CVE-2021-47644: media: staging: media: zoran: move videodev alloc (bsc#1237766). - CVE-2022-48953: rtc: cmos: fix build on non-ACPI platforms (bsc#1231941). - CVE-2022-48975: gpiolib: fix memory leak in gpiochip_setup_dev() (bsc#1231885). - CVE-2022-49006: tracing: Free buffers when a used dynamic event is removed (bsc#1232163). - CVE-2022-49076: RDMA/hfi1: Fix use-after-free bug for mm struct (bsc#1237738). - CVE-2022-49080: mm/mempolicy: fix mpol_new leak in shared_policy_replace (bsc#1238033). - CVE-2022-49089: IB/rdmavt: add lock to call to rvt_error_qp to prevent a race condition (bsc#1238041). - CVE-2022-49124: x86/mce: Work around an erratum on fast string copy instructions (bsc#1238148). - CVE-2022-49134: mlxsw: spectrum: Guard against invalid local ports (bsc#1237982). - CVE-2022-49135: drm/amd/display: Fix memory leak (bsc#1238006). - CVE-2022-49151: can: mcba_usb: properly check endpoint type (bsc#1237778). - CVE-2022-49178: memstick/mspro_block: fix handling of read-only devices (bsc#1238107). - CVE-2022-49182: net: hns3: add vlan list lock to protect vlan list (bsc#1238260). - CVE-2022-49201: ibmvnic: fix race between xmit and reset (bsc#1238256). - CVE-2022-49247: media: stk1160: If start stream fails, return buffers with VB2_BUF_STATE_QUEUED (bsc#1237783). - CVE-2022-49490: drm/msm/mdp5: Return error code in mdp5_pipe_release when deadlock is (bsc#1238275). - CVE-2022-49626: sfc: fix use after free when disabling sriov (bsc#1238270). - CVE-2022-49661: can: gs_usb: gs_usb_open/close(): fix memory leak (bsc#1237788). - CVE-2023-52572: Fixed UAF in cifs_demultiplex_thread() in cifs (bsc#1220946). - CVE-2023-52853: hid: cp2112: Fix duplicate workqueue initialization (bsc#1224988). - CVE-2023-52924: netfilter: nf_tables: do not skip expired elements during walk (bsc#1236821). - CVE-2023-6606: Fixed an out of bounds read in the SMB client when receiving a malformed length from a server (bsc#1217947). - CVE-2024-23307: Fixed Integer Overflow or Wraparound vulnerability in x86 and ARM md, raid, raid5 modules (bsc#1219169). - CVE-2024-27397: netfilter: nf_tables: use timestamp to check for set element timeout (bsc#1224095). - CVE-2024-49963: mailbox: bcm2835: Fix timeout during suspend mode (bsc#1232147). - CVE-2024-49975: uprobes: fix kernel info leak via '[uprobes]' vma (bsc#1232104). - CVE-2024-50036: net: do not delay dst_entries_add() in dst_release() (bsc#1231912). - CVE-2024-50067: uprobe: avoid out-of-bounds memory access of fetching args (bsc#1232416). - CVE-2024-50251: netfilter: nft_payload: sanitize offset and length before calling ... [Please see the references for more information on the vulnerabilities]
Affected Software/OS: 'Linux Kernel' package(s) on SUSE Linux Enterprise Server 12-SP5.
Solution: Please install the updated package(s).
CVSS Score: 4.6
CVSS Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P
|