Description: | Summary: The remote host is missing an update for the 'the Linux Kernel' package(s) announced via the SUSE-SU-2024:2894-1 advisory.
Vulnerability Insight: The SUSE Linux Enterprise 15 SP5 RT kernel was updated to receive various security bugfixes.
The following security bugs were fixed:
- CVE-2021-47086: phonet/pep: refuse to enable an unbound pipe (bsc#1220952). - CVE-2021-47103: net: sock: preserve kabi for sock (bsc#1221010). - CVE-2021-47186: tipc: check for null after calling kmemdup (bsc#1222702). - CVE-2021-47546: Kabi fix for ipv6: fix memory leak in fib6_rule_suppress (bsc#1225504). - CVE-2021-47547: net: tulip: de4x5: fix the problem that the array 'lp->phy' may be out of bound (bsc#1225505). - CVE-2021-47588: sit: do not call ipip6_dev_free() from sit_init_net() (bsc#1226568). - CVE-2021-47590: mptcp: fix deadlock in __mptcp_push_pending() (bsc#1226565). - CVE-2021-47591: mptcp: remove tcp ulp setsockopt support (bsc#1226570). - CVE-2021-47593: mptcp: clear 'kern' flag from fallback sockets (bsc#1226551). - CVE-2021-47598: sch_cake: do not call cake_destroy() from cake_init() (bsc#1226574). - CVE-2021-47599: btrfs: use latest_dev in btrfs_show_devname (bsc#1226571) - CVE-2021-47606: net: netlink: af_netlink: Prevent empty skb by adding a check on len (bsc#1226555). - CVE-2021-47623: powerpc/fixmap: Fix VM debug warning on unmap (bsc#1227919). - CVE-2022-48785: ipv6: mcast: use rcu-safe version of ipv6_get_lladdr() (bsc#1227927) - CVE-2022-48810: ipmr,ip6mr: acquire RTNL before calling ip[6]mr_free_table() on failure path (bsc#1227936). - CVE-2022-48850: net-sysfs: add check for netdevice being present to speed_show (bsc#1228071) - CVE-2022-48855: sctp: fix kernel-infoleak for SCTP sockets (bsc#1228003). - CVE-2023-52435: net: prevent mss overflow in skb_segment() (bsc#1220138). - CVE-2023-52573: net: rds: Fix possible NULL-pointer dereference (bsc#1220869) - CVE-2023-52580: net/core: Fix ETH_P_1588 flow dissector (bsc#1220876). - CVE-2023-52751: smb: client: fix use-after-free in smb2_query_info_compound() (bsc#1225489). - CVE-2023-52775: net/smc: avoid data corruption caused by decline (bsc#1225088). - CVE-2023-52812: drm/amd: check num of link levels when update pcie param (bsc#1225564). - CVE-2023-52857: drm/mediatek: Fix coverity issue with unintentional integer overflow (bsc#1225581). - CVE-2023-52863: hwmon: (axi-fan-control) Fix possible NULL pointer dereference (bsc#1225586). - CVE-2024-26585: Fixed race between tx work scheduling and socket close (bsc#1220187). - CVE-2024-26615: net/smc: fix illegal rmb_desc access in SMC-D connection dump (bsc#1220942). - CVE-2024-26633: ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim() (bsc#1221647). - CVE-2024-26635: llc: Drop support for ETH_P_TR_802_2 (bsc#1221656). - CVE-2024-26636: llc: make llc_ui_sendmsg() more robust against bonding changes (bsc#1221659). - CVE-2024-26641: ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv() (bsc#1221654). - CVE-2024-26661: drm/amd/display: Add NULL test for 'timing generator' in ... [Please see the references for more information on the vulnerabilities]
Affected Software/OS: 'the Linux Kernel' package(s) on openSUSE Leap 15.5.
Solution: Please install the updated package(s).
CVSS Score: 6.8
CVSS Vector: AV:L/AC:L/Au:S/C:C/I:C/A:C
|