![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.1.4.2025.0855.1 |
Category: | SuSE Local Security Checks |
Title: | SUSE: Security Advisory (SUSE-SU-2025:0855-1) |
Summary: | The remote host is missing an update for the 'Linux Kernel' package(s) announced via the SUSE-SU-2025:0855-1 advisory. |
Description: | Summary: The remote host is missing an update for the 'Linux Kernel' package(s) announced via the SUSE-SU-2025:0855-1 advisory. Vulnerability Insight: The SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security bugfixes. The following security bugs were fixed: - CVE-2021-47633: ath5k: fix OOB in ath5k_eeprom_read_pcal_info_5111 (bsc#1237768). - CVE-2022-49080: mm/mempolicy: fix mpol_new leak in shared_policy_replace (bsc#1238033). - CVE-2024-35949: btrfs: make sure that WRITTEN is set on all metadata blocks (bsc#1224700). - CVE-2025-21690: scsi: storvsc: Ratelimit warning logs to prevent VM denial of service (bsc#1237025). - CVE-2025-21692: net: sched: fix ets qdisc OOB Indexing (bsc#1237028). - CVE-2025-21699: gfs2: Truncate address space when flipping GFS2_DIF_JDATA flag (bsc#1237139). The following non-security bugs were fixed: - net: mana: Add get_link and get_link_ksettings in ethtool (bsc#1236761). - net: netvsc: Update default VMBus channels (bsc#1236757). - scsi: storvsc: Handle SRB status value 0x30 (git-fixes). Affected Software/OS: 'Linux Kernel' package(s) on SUSE Linux Enterprise Server 15-SP3, SUSE Linux Enterprise Server for SAP Applications 15-SP3. Solution: Please install the updated package(s). CVSS Score: 6.8 CVSS Vector: AV:L/AC:L/Au:S/C:C/I:C/A:C |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2021-47633 Common Vulnerability Exposure (CVE) ID: CVE-2022-49080 Common Vulnerability Exposure (CVE) ID: CVE-2023-4244 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3e91b0ebd994635df2346353322ac51ce84ce6d8 https://kernel.dance/3e91b0ebd994635df2346353322ac51ce84ce6d8 https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html Common Vulnerability Exposure (CVE) ID: CVE-2023-52924 Common Vulnerability Exposure (CVE) ID: CVE-2024-35949 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OTB4HWU2PTVW5NEYHHLOCXDKG3PYA534/ https://git.kernel.org/stable/c/e03418abde871314e1a3a550f4c8afb7b89cb273 https://git.kernel.org/stable/c/ef3ba8ce8cf7075b716aa4afcefc3034215878ee Common Vulnerability Exposure (CVE) ID: CVE-2024-50115 Common Vulnerability Exposure (CVE) ID: CVE-2024-53173 Common Vulnerability Exposure (CVE) ID: CVE-2024-53239 Common Vulnerability Exposure (CVE) ID: CVE-2024-56539 Common Vulnerability Exposure (CVE) ID: CVE-2024-56548 Common Vulnerability Exposure (CVE) ID: CVE-2024-56605 Common Vulnerability Exposure (CVE) ID: CVE-2025-21690 Common Vulnerability Exposure (CVE) ID: CVE-2025-21692 Common Vulnerability Exposure (CVE) ID: CVE-2025-21699 |
Copyright | Copyright (C) 2025 Greenbone AG |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |