Description: | Summary: The remote host is missing an update for the 'the Linux Kernel' package(s) announced via the SUSE-SU-2024:4314-1 advisory.
Vulnerability Insight: The SUSE Linux Enterprise 15 SP6 RT kernel was updated to receive various security bugfixes.
The following security bugs were fixed:
- CVE-2023-52778: mptcp: deal with large GSO size (bsc#1224948). - CVE-2023-52920: bpf: support non-r10 register spill/fill to/from stack in precision tracking (bsc#1232823). - CVE-2024-26596: net: dsa: fix netdev_priv() dereference before check on non-DSA netdevice events (bsc#1220355). - CVE-2024-26741: dccp/tcp: Unhash sk from ehash for tb2 alloc failure after check_estalblished() (bsc#1222587). - CVE-2024-26782: mptcp: fix double-free on socket dismantle (bsc#1222590). - CVE-2024-26953: net: esp: fix bad handling of pages from page_pool (bsc#1223656). - CVE-2024-27017: netfilter: nft_set_pipapo: walk over current view on netlink dump (bsc#1223733). - CVE-2024-35888: erspan: make sure erspan_base_hdr is present in skb->head (bsc#1224518). - CVE-2024-36000: mm/hugetlb: fix missing hugetlb_lock for resv uncharge (bsc#1224548). - CVE-2024-36883: net: fix out-of-bounds access in ops_init (bsc#1225725). - CVE-2024-36886: tipc: fix UAF in error path (bsc#1225730). - CVE-2024-36905: tcp: defer shutdown(SEND_SHUTDOWN) for TCP_SYN_RECV sockets (bsc#1225742). - CVE-2024-36927: ipv4: Fix uninit-value access in __ip_make_skb() (bsc#1225813). - CVE-2024-36954: tipc: fix a possible memleak in tipc_buf_append (bsc#1225764). - CVE-2024-36968: Bluetooth: L2CAP: Fix div-by-zero in l2cap_le_flowctl_init() (bsc#1226130). - CVE-2024-38589: netrom: fix possible dead-lock in nr_rt_ioctl() (bsc#1226748). - CVE-2024-40914: mm/huge_memory: do not unpoison huge_zero_folio (bsc#1227842). - CVE-2024-41023: sched/deadline: Fix task_struct reference leak (bsc#1228430). - CVE-2024-42102: Revert 'mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again' (bsc#1233132). - CVE-2024-44995: net: hns3: fix a deadlock problem when config TC during resetting (bsc#1230231). - CVE-2024-46680: Bluetooth: btnxpuart: Fix random crash seen while removing driver (bsc#1230557). - CVE-2024-46681: pktgen: use cpus_read_lock() in pg_net_init() (bsc#1230558). - CVE-2024-46765: ice: protect XDP configuration with a mutex (bsc#1230807). - CVE-2024-46800: sch/netem: fix use after free in netem_dequeue (bsc#1230827). - CVE-2024-47679: vfs: fix race between evice_inodes() and find_inode()&iput() (bsc#1231930). - CVE-2024-47701: ext4: avoid OOB when system.data xattr changes underneath the filesystem (bsc#1231920). - CVE-2024-47703: bpf, lsm: add check for BPF LSM return value (bsc#1231946). - CVE-2024-49852: scsi: elx: libefc: Fix potential use after free in efc_nport_vport_del() (bsc#1232819). - CVE-2024-49868: btrfs: fix a NULL pointer dereference when failed to start a new trasacntion (bsc#1232272). - CVE-2024-49881: ext4: update orig_path in ext4_find_extent() (bsc#1232201). - CVE-2024-49883: ext4: aovid use-after-free in ext4_ext_insert_extent() (bsc#1232199). - ... [Please see the references for more information on the vulnerabilities]
Affected Software/OS: 'the Linux Kernel' package(s) on openSUSE Leap 15.6.
Solution: Please install the updated package(s).
CVSS Score: 6.8
CVSS Vector: AV:L/AC:L/Au:S/C:C/I:C/A:C
|