Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.1.4.2025.0201.2
Category:SuSE Local Security Checks
Title:SUSE: Security Advisory (SUSE-SU-2025:0201-2)
Summary:The remote host is missing an update for the 'Linux Kernel' package(s) announced via the SUSE-SU-2025:0201-2 advisory.
Description:Summary:
The remote host is missing an update for the 'Linux Kernel' package(s) announced via the SUSE-SU-2025:0201-2 advisory.

Vulnerability Insight:
The SUSE Linux Enterprise 15 SP5 kernel was updated to receive various security bugfixes.


The following security bugs were fixed:

- CVE-2022-36280: Fixed out-of-bounds memory access vulnerability found in vmwgfx driver (bsc#1203332).
- CVE-2022-48742: rtnetlink: make sure to refresh master_dev/m_ops in __rtnl_newlink() (bsc#1226694).
- CVE-2022-49033: btrfs: qgroup: fix sleep from invalid context bug in btrfs_qgroup_inherit() (bsc#1232045).
- CVE-2023-1382: Fixed denial of service in tipc_conn_close (bsc#1209288).
- CVE-2023-33951: Fixed a race condition that could have led to an information disclosure inside the vmwgfx driver (bsc#1211593).
- CVE-2023-33952: Fixed a double free that could have led to a local privilege escalation inside the vmwgfx driver (bsc#1211595).
- CVE-2023-52920: bpf: support non-r10 register spill/fill to/from stack in precision tracking (bsc#1232823).
- CVE-2024-26886: Bluetooth: af_bluetooth: Fix deadlock (bsc#1223044).
- CVE-2024-26924: scsi: lpfc: Release hbalock before calling lpfc_worker_wake_up() (bsc#1225820).
- CVE-2024-36915: nfc: llcp: fix nfc_llcp_setsockopt() unsafe copies (bsc#1225758).
- CVE-2024-44934: net: bridge: mcast: wait for previous gc cycles when removing port (bsc#1229809).
- CVE-2024-47666: scsi: pm80xx: Set phy->enable_completion only when we wait for it (bsc#1231453).
- CVE-2024-47678: icmp: change the order of rate limits (bsc#1231854).
- CVE-2024-49944: sctp: set sk_state back to CLOSED if autobind fails in sctp_listen_start (bsc#1232166).
- CVE-2024-49952: netfilter: nf_tables: prevent nf_skb_duplicated corruption (bsc#1232157).
- CVE-2024-50018: net: napi: Prevent overflow of napi_defer_hard_irqs (bsc#1232419).
- CVE-2024-50143: udf: fix uninit-value use in udf_get_fileshortad (bsc#1233038).
- CVE-2024-50166: fsl/fman: Fix refcount handling of fman-related devices (bsc#1233050).
- CVE-2024-50181: clk: imx: Remove CLK_SET_PARENT_GATE for DRAM mux for i.MX7D (bsc#1233127).
- CVE-2024-50202: nilfs2: propagate directory read errors from nilfs_find_entry() (bsc#1233324).
- CVE-2024-50211: udf: refactor inode_bmap() to handle error (bsc#1233096).
- CVE-2024-50256: netfilter: nf_reject_ipv6: fix potential crash in nf_send_reset6() (bsc#1233200).
- CVE-2024-50262: bpf: Fix out-of-bounds write in trie_get_next_key() (bsc#1233239).
- CVE-2024-50278, CVE-2024-50280: dm cache: fix flushing uninitialized delayed_work on cache_ctr error (bsc#1233467 bsc#1233469).
- CVE-2024-50278: dm cache: fix potential out-of-bounds access on the first resume (bsc#1233467).
- CVE-2024-50279: dm cache: fix out-of-bounds access to the dirty bitset when resizing (bsc#1233468).
- CVE-2024-50296: net: hns3: fix kernel crash when uninstalling driver (bsc#1233485).
- CVE-2024-53051: drm/i915/hdcp: Add encoder check in intel_hdcp_get_capability (bsc#1233547).
- CVE-2024-53055: wifi: iwlwifi: mvm: fix 6 GHz scan construction (bsc#1233550).
- ... [Please see the references for more information on the vulnerabilities]

Affected Software/OS:
'Linux Kernel' package(s) on SUSE Linux Enterprise Server 15-SP5, SUSE Linux Enterprise Server for SAP Applications 15-SP5.

Solution:
Please install the updated package(s).

CVSS Score:
8.3

CVSS Vector:
AV:A/AC:L/Au:N/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2021-47202
https://git.kernel.org/stable/c/0750f769b95841b34a9fe8c418dd792ff526bf86
https://git.kernel.org/stable/c/6a315471cb6a07f651e1d3adc8962730f4fcccac
https://git.kernel.org/stable/c/828f4c31684da94ecf0b44a2cbd35bbede04f0bd
https://git.kernel.org/stable/c/96cfe05051fd8543cdedd6807ec59a0e6c409195
https://git.kernel.org/stable/c/ef2590a5305e0b8e9342f84c2214aa478ee7f28e
Common Vulnerability Exposure (CVE) ID: CVE-2022-36280
Debian Security Information: DSA-5324 (Google Search)
https://www.debian.org/security/2023/dsa-5324
https://bugzilla.openanolis.cn/show_bug.cgi?id=2071
https://lists.debian.org/debian-lts-announce/2023/03/msg00000.html
https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
Common Vulnerability Exposure (CVE) ID: CVE-2022-48742
https://git.kernel.org/stable/c/2cf180360d66bd657e606c1217e0e668e6faa303
https://git.kernel.org/stable/c/36a9a0aee881940476b254e0352581401b23f210
https://git.kernel.org/stable/c/3bbe2019dd12b8d13671ee6cda055d49637b4c39
https://git.kernel.org/stable/c/7d9211678c0f0624f74cdff36117ab8316697bb8
https://git.kernel.org/stable/c/a01e60a1ec6bef9be471fb7182a33c6d6f124e93
https://git.kernel.org/stable/c/bd43771ee9759dd9dfae946bff190e2c5a120de5
https://git.kernel.org/stable/c/c6f6f2444bdbe0079e41914a35081530d0409963
https://git.kernel.org/stable/c/def5e7070079b2a214b3b1a2fbec623e6fbfe34a
Common Vulnerability Exposure (CVE) ID: CVE-2022-49033
Common Vulnerability Exposure (CVE) ID: CVE-2022-49035
Common Vulnerability Exposure (CVE) ID: CVE-2023-1382
https://lore.kernel.org/netdev/bc7bd3183f1c275c820690fc65b708238fe9e38e.1668807842.git.lucien.xin@gmail.com/T/#u
Common Vulnerability Exposure (CVE) ID: CVE-2023-33951
RHBZ#2218195
https://bugzilla.redhat.com/show_bug.cgi?id=2218195
RHSA-2023:6583
https://access.redhat.com/errata/RHSA-2023:6583
RHSA-2023:6901
https://access.redhat.com/errata/RHSA-2023:6901
RHSA-2023:7077
https://access.redhat.com/errata/RHSA-2023:7077
RHSA-2024:1404
https://access.redhat.com/errata/RHSA-2024:1404
https://access.redhat.com/security/cve/CVE-2023-33951
https://www.zerodayinitiative.com/advisories/ZDI-CAN-20110/
Common Vulnerability Exposure (CVE) ID: CVE-2023-33952
RHBZ#2218212
https://bugzilla.redhat.com/show_bug.cgi?id=2218212
https://access.redhat.com/security/cve/CVE-2023-33952
https://www.zerodayinitiative.com/advisories/ZDI-CAN-20292
Common Vulnerability Exposure (CVE) ID: CVE-2023-52920
Common Vulnerability Exposure (CVE) ID: CVE-2024-24860
https://bugzilla.openanolis.cn/show_bug.cgi?id=8151
Common Vulnerability Exposure (CVE) ID: CVE-2024-26886
https://git.kernel.org/stable/c/2c9e2df022ef8b9d7fac58a04a2ef4ed25288955
https://git.kernel.org/stable/c/64be3c6154886200708da0dfe259705fb992416c
https://git.kernel.org/stable/c/817e8138ce86001b2fa5c63d6ede756e205a01f7
https://git.kernel.org/stable/c/cb8adca52f306563d958a863bb0cbae9c184d1ae
https://git.kernel.org/stable/c/f7b94bdc1ec107c92262716b073b3e816d4784fb
Common Vulnerability Exposure (CVE) ID: CVE-2024-26924
https://git.kernel.org/stable/c/14b001ba221136c15f894577253e8db535b99487
https://git.kernel.org/stable/c/3cfc9ec039af60dbd8965ae085b2c2ccdcfbe1cc
https://git.kernel.org/stable/c/41d8fdf3afaff312e17466e4ab732937738d5644
https://git.kernel.org/stable/c/7a1679e2d9bfa3b5f8755c2c7113e54b7d42bd46
https://git.kernel.org/stable/c/e3b887a9c11caf8357a821260e095f2a694a34f2
https://git.kernel.org/stable/c/ebf7c9746f073035ee26209e38c3a1170f7b349a
Common Vulnerability Exposure (CVE) ID: CVE-2024-36915
https://git.kernel.org/stable/c/29dc0ea979d433dd3c26abc8fa971550bdc05107
https://git.kernel.org/stable/c/7a87441c9651ba37842f4809224aca13a554a26f
Common Vulnerability Exposure (CVE) ID: CVE-2024-42232
Common Vulnerability Exposure (CVE) ID: CVE-2024-44934
Common Vulnerability Exposure (CVE) ID: CVE-2024-47666
Common Vulnerability Exposure (CVE) ID: CVE-2024-47678
Common Vulnerability Exposure (CVE) ID: CVE-2024-49944
Common Vulnerability Exposure (CVE) ID: CVE-2024-49952
Common Vulnerability Exposure (CVE) ID: CVE-2024-50018
Common Vulnerability Exposure (CVE) ID: CVE-2024-50143
Common Vulnerability Exposure (CVE) ID: CVE-2024-50154
Common Vulnerability Exposure (CVE) ID: CVE-2024-50166
Common Vulnerability Exposure (CVE) ID: CVE-2024-50181
Common Vulnerability Exposure (CVE) ID: CVE-2024-50202
Common Vulnerability Exposure (CVE) ID: CVE-2024-50211
Common Vulnerability Exposure (CVE) ID: CVE-2024-50256
Common Vulnerability Exposure (CVE) ID: CVE-2024-50262
Common Vulnerability Exposure (CVE) ID: CVE-2024-50278
Common Vulnerability Exposure (CVE) ID: CVE-2024-50279
Common Vulnerability Exposure (CVE) ID: CVE-2024-50280
Common Vulnerability Exposure (CVE) ID: CVE-2024-50296
Common Vulnerability Exposure (CVE) ID: CVE-2024-53051
Common Vulnerability Exposure (CVE) ID: CVE-2024-53055
Common Vulnerability Exposure (CVE) ID: CVE-2024-53056
Common Vulnerability Exposure (CVE) ID: CVE-2024-53064
Common Vulnerability Exposure (CVE) ID: CVE-2024-53072
Common Vulnerability Exposure (CVE) ID: CVE-2024-53090
Common Vulnerability Exposure (CVE) ID: CVE-2024-53095
Common Vulnerability Exposure (CVE) ID: CVE-2024-53101
Common Vulnerability Exposure (CVE) ID: CVE-2024-53113
Common Vulnerability Exposure (CVE) ID: CVE-2024-53114
Common Vulnerability Exposure (CVE) ID: CVE-2024-53119
Common Vulnerability Exposure (CVE) ID: CVE-2024-53120
Common Vulnerability Exposure (CVE) ID: CVE-2024-53122
Common Vulnerability Exposure (CVE) ID: CVE-2024-53125
Common Vulnerability Exposure (CVE) ID: CVE-2024-53130
Common Vulnerability Exposure (CVE) ID: CVE-2024-53131
Common Vulnerability Exposure (CVE) ID: CVE-2024-53142
Common Vulnerability Exposure (CVE) ID: CVE-2024-53146
Common Vulnerability Exposure (CVE) ID: CVE-2024-53150
Common Vulnerability Exposure (CVE) ID: CVE-2024-53156
Common Vulnerability Exposure (CVE) ID: CVE-2024-53157
Common Vulnerability Exposure (CVE) ID: CVE-2024-53158
Common Vulnerability Exposure (CVE) ID: CVE-2024-53161
Common Vulnerability Exposure (CVE) ID: CVE-2024-53162
Common Vulnerability Exposure (CVE) ID: CVE-2024-53173
Common Vulnerability Exposure (CVE) ID: CVE-2024-53179
Common Vulnerability Exposure (CVE) ID: CVE-2024-53206
Common Vulnerability Exposure (CVE) ID: CVE-2024-53210
Common Vulnerability Exposure (CVE) ID: CVE-2024-53213
Common Vulnerability Exposure (CVE) ID: CVE-2024-53214
Common Vulnerability Exposure (CVE) ID: CVE-2024-53239
Common Vulnerability Exposure (CVE) ID: CVE-2024-53240
Common Vulnerability Exposure (CVE) ID: CVE-2024-53241
Common Vulnerability Exposure (CVE) ID: CVE-2024-56539
Common Vulnerability Exposure (CVE) ID: CVE-2024-56548
Common Vulnerability Exposure (CVE) ID: CVE-2024-56549
Common Vulnerability Exposure (CVE) ID: CVE-2024-56570
Common Vulnerability Exposure (CVE) ID: CVE-2024-56571
Common Vulnerability Exposure (CVE) ID: CVE-2024-56575
Common Vulnerability Exposure (CVE) ID: CVE-2024-56598
Common Vulnerability Exposure (CVE) ID: CVE-2024-56604
Common Vulnerability Exposure (CVE) ID: CVE-2024-56605
Common Vulnerability Exposure (CVE) ID: CVE-2024-56619
Common Vulnerability Exposure (CVE) ID: CVE-2024-56755
Common Vulnerability Exposure (CVE) ID: CVE-2024-8805
CopyrightCopyright (C) 2025 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.