Description: | Summary: The remote host is missing an update for the 'the Linux Kernel' package(s) announced via the SUSE-SU-2024:4318-1 advisory.
Vulnerability Insight: The SUSE Linux Enterprise 15 SP6 kernel was updated to receive various security bugfixes.
The following security bugs were fixed:
- CVE-2024-53095: smb: client: Fix use-after-free of network namespace (bsc#1233642). - CVE-2023-52778: mptcp: deal with large GSO size (bsc#1224948). - CVE-2023-52920: bpf: support non-r10 register spill/fill to/from stack in precision tracking (bsc#1232823). - CVE-2023-6270: aoe: fix the potential use-after-free problem in more places (bsc#1218562). - CVE-2024-26596: net: dsa: fix netdev_priv() dereference before check on non-DSA netdevice events (bsc#1220355). - CVE-2024-26741: dccp/tcp: Unhash sk from ehash for tb2 alloc failure after check_estalblished() (bsc#1222587). - CVE-2024-26782: mptcp: fix double-free on socket dismantle (bsc#1222590). - CVE-2024-26953: net: esp: fix bad handling of pages from page_pool (bsc#1223656). - CVE-2024-27017: netfilter: nft_set_pipapo: walk over current view on netlink dump (bsc#1223733). - CVE-2024-35888: erspan: make sure erspan_base_hdr is present in skb->head (bsc#1224518). - CVE-2024-36000: mm/hugetlb: fix missing hugetlb_lock for resv uncharge (bsc#1224548). - CVE-2024-36244: net/sched: taprio: extend minimum interval restriction to entire cycle too (bsc#1226797). - CVE-2024-36883: net: fix out-of-bounds access in ops_init (bsc#1225725). - CVE-2024-36886: tipc: fix UAF in error path (bsc#1225730). - CVE-2024-36905: tcp: defer shutdown(SEND_SHUTDOWN) for TCP_SYN_RECV sockets (bsc#1225742). - CVE-2024-36927: ipv4: Fix uninit-value access in __ip_make_skb() (bsc#1225813). - CVE-2024-36954: tipc: fix a possible memleak in tipc_buf_append (bsc#1225764). - CVE-2024-36968: Bluetooth: L2CAP: Fix div-by-zero in l2cap_le_flowctl_init() (bsc#1226130). - CVE-2024-38589: netrom: fix possible dead-lock in nr_rt_ioctl() (bsc#1226748). - CVE-2024-40914: mm/huge_memory: do not unpoison huge_zero_folio (bsc#1227842). - CVE-2024-41023: sched/deadline: Fix task_struct reference leak (bsc#1228430). - CVE-2024-41031: mm/filemap: skip to create PMD-sized page cache if needed (bsc#1228454). - CVE-2024-41082: nvme-fabrics: use reserved tag for reg read/write command (bsc#1228620). - CVE-2024-42102: Revert 'mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again' (bsc#1233132). - CVE-2024-44958: sched/smt: Fix unbalance sched_smt_present dec/inc (bsc#1230179). - CVE-2024-44995: net: hns3: fix a deadlock problem when config TC during resetting (bsc#1230231). - CVE-2024-45016: netem: fix return value if duplicate enqueue fails (bsc#1230429). - CVE-2024-45025: fix bitmap corruption on close_range() with CLOSE_RANGE_UNSHARE (bsc#1230456). - CVE-2024-46678: bonding: change ipsec_lock from spin lock to mutex (bsc#1230550). - CVE-2024-46680: Bluetooth: btnxpuart: Fix random crash seen while removing driver (bsc#1230557). - CVE-2024-46681: pktgen: use cpus_read_lock() in pg_net_init() (bsc#1230558). - ... [Please see the references for more information on the vulnerabilities]
Affected Software/OS: 'the Linux Kernel' package(s) on openSUSE Leap 15.6.
Solution: Please install the updated package(s).
CVSS Score: 9.4
CVSS Vector: AV:N/AC:L/Au:N/C:C/I:N/A:C
|