Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.1.4.2025.0855.1
Category:SuSE Local Security Checks
Title:SUSE: Security Advisory (SUSE-SU-2025:0855-1)
Summary:The remote host is missing an update for the 'Linux Kernel' package(s) announced via the SUSE-SU-2025:0855-1 advisory.
Description:Summary:
The remote host is missing an update for the 'Linux Kernel' package(s) announced via the SUSE-SU-2025:0855-1 advisory.

Vulnerability Insight:
The SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security bugfixes.

The following security bugs were fixed:

- CVE-2021-47633: ath5k: fix OOB in ath5k_eeprom_read_pcal_info_5111 (bsc#1237768).
- CVE-2022-49080: mm/mempolicy: fix mpol_new leak in shared_policy_replace (bsc#1238033).
- CVE-2024-35949: btrfs: make sure that WRITTEN is set on all metadata blocks (bsc#1224700).
- CVE-2025-21690: scsi: storvsc: Ratelimit warning logs to prevent VM denial of service (bsc#1237025).
- CVE-2025-21692: net: sched: fix ets qdisc OOB Indexing (bsc#1237028).
- CVE-2025-21699: gfs2: Truncate address space when flipping GFS2_DIF_JDATA flag (bsc#1237139).

The following non-security bugs were fixed:

- net: mana: Add get_link and get_link_ksettings in ethtool (bsc#1236761).
- net: netvsc: Update default VMBus channels (bsc#1236757).
- scsi: storvsc: Handle SRB status value 0x30 (git-fixes).

Affected Software/OS:
'Linux Kernel' package(s) on SUSE Linux Enterprise Server 15-SP3, SUSE Linux Enterprise Server for SAP Applications 15-SP3.

Solution:
Please install the updated package(s).

CVSS Score:
6.8

CVSS Vector:
AV:L/AC:L/Au:S/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2021-47633
Common Vulnerability Exposure (CVE) ID: CVE-2022-49080
Common Vulnerability Exposure (CVE) ID: CVE-2023-4244
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3e91b0ebd994635df2346353322ac51ce84ce6d8
https://kernel.dance/3e91b0ebd994635df2346353322ac51ce84ce6d8
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
Common Vulnerability Exposure (CVE) ID: CVE-2023-52924
Common Vulnerability Exposure (CVE) ID: CVE-2024-35949
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OTB4HWU2PTVW5NEYHHLOCXDKG3PYA534/
https://git.kernel.org/stable/c/e03418abde871314e1a3a550f4c8afb7b89cb273
https://git.kernel.org/stable/c/ef3ba8ce8cf7075b716aa4afcefc3034215878ee
Common Vulnerability Exposure (CVE) ID: CVE-2024-50115
Common Vulnerability Exposure (CVE) ID: CVE-2024-53173
Common Vulnerability Exposure (CVE) ID: CVE-2024-53239
Common Vulnerability Exposure (CVE) ID: CVE-2024-56539
Common Vulnerability Exposure (CVE) ID: CVE-2024-56548
Common Vulnerability Exposure (CVE) ID: CVE-2024-56605
Common Vulnerability Exposure (CVE) ID: CVE-2025-21690
Common Vulnerability Exposure (CVE) ID: CVE-2025-21692
Common Vulnerability Exposure (CVE) ID: CVE-2025-21699
CopyrightCopyright (C) 2025 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.