SUSE SLED15 / SLES15 / openSUSE 15 Security Update : kernel (SUSE-SU-2025:01614-1)

medium Nessus Plugin ID 237088

Synopsis

The remote SUSE host is missing one or more security updates.

Description

The remote SUSE Linux SLED15 / SLED_SAP15 / SLES15 / SLES_SAP15 / openSUSE 15 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2025:01614-1 advisory.

The SUSE Linux Enterprise 15 SP6 kernel was updated to receive various security bugfixes.


The following security bugs were fixed:

- CVE-2024-28956: x86/ibt: Keep IBT disabled during alternative patching (bsc#1242006).
- CVE-2024-35840: mptcp: use OPTION_MPTCP_MPJ_SYNACK in subflow_finish_connect() (bsc#1224597).
- CVE-2024-50038: netfilter: xtables: fix typo causing some targets not to load on IPv6 (bsc#1231910).
- CVE-2024-50162: bpf: selftests: send packet to devmap redirect XDP (bsc#1233075).
- CVE-2024-50163: bpf: Make sure internal and UAPI bpf_redirect flags do not overlap (bsc#1233098).
- CVE-2024-53124: net: fix data-races around sk->sk_forward_alloc (bsc#1234074).
- CVE-2024-53139: sctp: fix possible UAF in sctp_v6_available() (bsc#1234157).
- CVE-2024-57924: fs: relax assertions on failure to encode file handles (bsc#1236086).
- CVE-2024-58018: nvkm: correctly calculate the available space of the GSP cmdq buffer (bsc#1238990).
- CVE-2024-58068: OPP: fix dev_pm_opp_find_bw_*() when bandwidth table not initialized (bsc#1238961).
- CVE-2024-58070: bpf: bpf_local_storage: Always use bpf_mem_alloc in PREEMPT_RT (bsc#1238983).
- CVE-2024-58071: team: prevent adding a device which is already a team device lower (bsc#1238970).
- CVE-2024-58088: bpf: Fix deadlock when freeing cgroup storage (bsc#1239510).
- CVE-2025-21683: bpf: Fix bpf_sk_select_reuseport() memory leak (bsc#1236704).
- CVE-2025-21696: mm: clear uffd-wp PTE/PMD state on mremap() (bsc#1237111).
- CVE-2025-21707: mptcp: consolidate suboption status (bsc#1238862).
- CVE-2025-21729: wifi: rtw89: fix race between cancel_hw_scan and hw_scan completion (bsc#1237874).
- CVE-2025-21755: vsock: Orphan socket after transport release (bsc#1237882).
- CVE-2025-21758: ipv6: mcast: add RCU protection to mld_newpack() (bsc#1238737).
- CVE-2025-21768: net: ipv6: fix dst ref loops in rpl, seg6 and ioam6 lwtunnels (bsc#1238714).
- CVE-2025-21792: ax25: Fix refcount leak caused by setting SO_BINDTODEVICE sockopt (bsc#1238745).
- CVE-2025-21806: net: let net.core.dev_weight always be non-zero (bsc#1238746).
- CVE-2025-21808: net: xdp: Disallow attaching device-bound programs in generic mode (bsc#1238742).
- CVE-2025-21812: ax25: rcu protect dev->ax25_ptr (bsc#1238471).
- CVE-2025-21833: iommu/vt-d: Avoid use of NULL after WARN_ON_ONCE (bsc#1239108).
- CVE-2025-21836: io_uring/kbuf: reallocate buf lists on upgrade (bsc#1239066).
- CVE-2025-21854: selftest/bpf: Add vsock test for sockmap rejecting unconnected (bsc#1239470).
- CVE-2025-21863: io_uring: prevent opcode speculation (bsc#1239475).
- CVE-2025-21867: bpf, test_run: Fix use-after-free issue in eth_skb_pkt_type() (bsc#1240181).
- CVE-2025-21873: scsi: ufs: core: bsg: Fix crash when arpmb command fails (bsc#1240184).
- CVE-2025-21875: mptcp: always handle address removal under msk socket lock (bsc#1240168).
- CVE-2025-21881: uprobes: Reject the shared zeropage in uprobe_write_opcode() (bsc#1240185).
- CVE-2025-21884: net: better track kernel sockets lifetime (bsc#1240171).
- CVE-2025-21887: ovl: fix UAF in ovl_dentry_update_reval by moving dput() in ovl_link_up (bsc#1240176).
- CVE-2025-21889: perf/core: Add RCU read lock protection to perf_iterate_ctx() (bsc#1240167).
- CVE-2025-21894: net: enetc: VFs do not support HWTSTAMP_TX_ONESTEP_SYNC (bsc#1240581).
- CVE-2025-21895: perf/core: Order the PMU list to fix warning about unordered pmu_ctx_list (bsc#1240585).
- CVE-2025-21904: caif_virtio: fix wrong pointer check in cfv_probe() (bsc#1240576).
- CVE-2025-21906: wifi: iwlwifi: mvm: clean up ROC on failure (bsc#1240587).
- CVE-2025-21908: NFS: fix nfs_release_folio() to not deadlock via kcompactd writeback (bsc#1240600).
- CVE-2025-21913: x86/amd_nb: Use rdmsr_safe() in amd_get_mmconfig_range() (bsc#1240591).
- CVE-2025-21922: ppp: Fix KMSAN uninit-value warning with bpf (bsc#1240639).
- CVE-2025-21924: net: hns3: make sure ptp clock is unregister and freed if hclge_ptp_get_cycle returns an error (bsc#1240720).
- CVE-2025-21925: llc: do not use skb_get() before dev_queue_xmit() (bsc#1240713).
- CVE-2025-21926: net: gso: fix ownership in __udp_gso_segment (bsc#1240712).
- CVE-2025-21931: hwpoison, memory_hotplug: lock folio before unmap hwpoisoned folio (bsc#1240709).
- CVE-2025-21957: scsi: qla1280: Fix kernel oops when debug level > 2 (bsc#1240742).
- CVE-2025-21960: eth: bnxt: do not update checksum in bnxt_xdp_build_skb() (bsc#1240815).
- CVE-2025-21961: eth: bnxt: fix truesize for mb-xdp-pass case (bsc#1240816).
- CVE-2025-21962: cifs: Fix integer overflow while processing closetimeo mount option (bsc#1240655).
- CVE-2025-21963: cifs: Fix integer overflow while processing acdirmax mount option (bsc#1240717).
- CVE-2025-21964: cifs: Fix integer overflow while processing acregmax mount option (bsc#1240740).
- CVE-2025-21969: kABI workaround for l2cap_conn changes (bsc#1240784).
- CVE-2025-21970: net/mlx5: Bridge, fix the crash caused by LAG state check (bsc#1240819).
- CVE-2025-21972: net: mctp: unshare packets when reassembling (bsc#1240813).
- CVE-2025-21975: net/mlx5: handle errors in mlx5_chains_create_table() (bsc#1240812).
- CVE-2025-21980: sched: address a potential NULL pointer dereference in the GRED scheduler (bsc#1240809).
- CVE-2025-21981: ice: fix memory leak in aRFS after reset (bsc#1240612).
- CVE-2025-21985: drm/amd/display: Fix out-of-bound accesses (bsc#1240811).
- CVE-2025-21991: x86/microcode/AMD: Fix out-of-bounds on systems with CPU-less NUMA nodes (bsc#1240795).
- CVE-2025-21993: iscsi_ibft: Fix UBSAN shift-out-of-bounds warning in ibft_attr_show_nic() (bsc#1240797).
- CVE-2025-21999: proc: fix UAF in proc_get_inode() (bsc#1240802).
- CVE-2025-22004: net: atm: fix use after free in lec_send() (bsc#1240835).
- CVE-2025-22015: mm/migrate: fix shmem xarray update during migration (bsc#1240944).
- CVE-2025-22016: dpll: fix xa_alloc_cyclic() error handling (bsc#1240934).
- CVE-2025-22017: devlink: fix xa_alloc_cyclic() error handling (bsc#1240936).
- CVE-2025-22018: atm: Fix NULL pointer dereference (bsc#1241266).
- CVE-2025-22029: exec: fix the racy usage of fs_struct->in_exec (bsc#1241378).
- CVE-2025-22036: exfat: fix random stack corruption after get_block (bsc#1241426).
- CVE-2025-22045: x86/mm: Fix flush_tlb_range() when used for zapping normal PMDs (bsc#1241433).
- CVE-2025-22053: net: ibmveth: make veth_pool_store stop hanging (bsc#1241373).
- CVE-2025-22055: net: fix geneve_opt length integer overflow (bsc#1241371).
- CVE-2025-22058: udp: Fix memory accounting leak (bsc#1241332).
- CVE-2025-22060: net: mvpp2: Prevent parser TCAM memory corruption (bsc#1241526).
- CVE-2025-22064: netfilter: nf_tables: do not unregister hook when table is dormant (bsc#1241413).
- CVE-2025-22080: fs/ntfs3: Prevent integer overflow in hdr_first_de() (bsc#1241416).
- CVE-2025-22090: mm: (un)track_pfn_copy() fix + doc improvements (bsc#1241537).
- CVE-2025-22102: Bluetooth: btnxpuart: Fix kernel panic during FW release (bsc#1241456).
- CVE-2025-22104: ibmvnic: Use kernel helpers for hex dumps (bsc#1241550).
- CVE-2025-22105, CVE-2025-37860: Add missing bugzilla references (bsc#1241452 bsc#1241548).
- CVE-2025-22107: net: dsa: sja1105: fix kasan out-of-bounds warning in sja1105_table_delete_entry() (bsc#1241575).
- CVE-2025-22109: ax25: Remove broken autobind (bsc#1241573).
- CVE-2025-22115: btrfs: fix block group refcount race in btrfs_create_pending_block_groups() (bsc#1241578).
- CVE-2025-22121: ext4: fix out-of-bound read in ext4_xattr_inode_dec_ref_all() (bsc#1241593).
- CVE-2025-2312: CIFS: New mount option for cifs.upcall namespace resolution (bsc#1239684).
- CVE-2025-23133: wifi: ath11k: update channel list in reg notifier instead reg worker (bsc#1241451).
- CVE-2025-23138: watch_queue: fix pipe accounting mismatch (bsc#1241648).
- CVE-2025-23145: mptcp: fix NULL pointer in can_accept_new_subflow (bsc#1242596).
- CVE-2025-37785: ext4: fix OOB read when checking dotdot dir (bsc#1241640).
- CVE-2025-37798: codel: remove sch->q.qlen check before qdisc_tree_reduce_backlog() (bsc#1242414).
- CVE-2025-37799: vmxnet3: Fix malformed packet sizing in vmxnet3_process_xdp (bsc#1242283).
- CVE-2025-39728: clk: samsung: Fix UBSAN panic in samsung_clk_init() (bsc#1241626).


Tenable has extracted the preceding description block directly from the SUSE security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://bugzilla.suse.com/1215199

https://bugzilla.suse.com/1235550

https://bugzilla.suse.com/1235526

https://www.suse.com/security/cve/CVE-2024-56641

https://bugzilla.suse.com/1235501

https://bugzilla.suse.com/1235870

https://bugzilla.suse.com/1238212

https://www.suse.com/security/cve/CVE-2024-56702

https://bugzilla.suse.com/1234074

https://www.suse.com/security/cve/CVE-2024-53124

https://bugzilla.suse.com/1238970

https://bugzilla.suse.com/1240582

https://bugzilla.suse.com/1240639

https://bugzilla.suse.com/1240700

https://bugzilla.suse.com/1240708

https://bugzilla.suse.com/1240784

https://bugzilla.suse.com/1240797

https://bugzilla.suse.com/1240801

https://www.suse.com/security/cve/CVE-2024-58071

https://www.suse.com/security/cve/CVE-2025-21916

https://www.suse.com/security/cve/CVE-2025-21922

https://www.suse.com/security/cve/CVE-2025-21934

https://www.suse.com/security/cve/CVE-2025-21935

https://www.suse.com/security/cve/CVE-2025-21969

https://www.suse.com/security/cve/CVE-2025-21993

https://www.suse.com/security/cve/CVE-2025-21996

https://www.suse.com/security/cve/CVE-2025-22007

https://www.suse.com/security/cve/CVE-2025-2312

https://bugzilla.suse.com/1230764

https://bugzilla.suse.com/1231103

https://bugzilla.suse.com/1231910

https://bugzilla.suse.com/1236086

https://bugzilla.suse.com/1238714

https://bugzilla.suse.com/1238737

https://bugzilla.suse.com/1238746

https://bugzilla.suse.com/1240185

https://bugzilla.suse.com/1240583

https://bugzilla.suse.com/1240590

https://bugzilla.suse.com/1240701

https://bugzilla.suse.com/1240703

https://bugzilla.suse.com/1240709

https://bugzilla.suse.com/1240712

https://bugzilla.suse.com/1240714

https://bugzilla.suse.com/1240717

https://bugzilla.suse.com/1240739

https://bugzilla.suse.com/1240740

https://bugzilla.suse.com/1240742

https://bugzilla.suse.com/1240835

https://bugzilla.suse.com/1240942

https://bugzilla.suse.com/1240943

https://bugzilla.suse.com/1241266

https://bugzilla.suse.com/1241347

https://bugzilla.suse.com/1241371

https://bugzilla.suse.com/1241373

https://bugzilla.suse.com/1241458

https://bugzilla.suse.com/1241526

https://bugzilla.suse.com/1241601

https://bugzilla.suse.com/1241640

https://bugzilla.suse.com/1242778

https://www.suse.com/security/cve/CVE-2024-46763

https://www.suse.com/security/cve/CVE-2024-46865

https://www.suse.com/security/cve/CVE-2024-50038

https://www.suse.com/security/cve/CVE-2024-57924

https://www.suse.com/security/cve/CVE-2024-58093

https://www.suse.com/security/cve/CVE-2025-21758

https://www.suse.com/security/cve/CVE-2025-21768

https://www.suse.com/security/cve/CVE-2025-21806

https://www.suse.com/security/cve/CVE-2025-21881

https://www.suse.com/security/cve/CVE-2025-21909

https://www.suse.com/security/cve/CVE-2025-21910

https://www.suse.com/security/cve/CVE-2025-21926

https://www.suse.com/security/cve/CVE-2025-21927

https://www.suse.com/security/cve/CVE-2025-21931

https://www.suse.com/security/cve/CVE-2025-21941

https://www.suse.com/security/cve/CVE-2025-21948

https://www.suse.com/security/cve/CVE-2025-21956

https://www.suse.com/security/cve/CVE-2025-21957

https://www.suse.com/security/cve/CVE-2025-21963

https://www.suse.com/security/cve/CVE-2025-21964

https://www.suse.com/security/cve/CVE-2025-22004

https://www.suse.com/security/cve/CVE-2025-22008

https://www.suse.com/security/cve/CVE-2025-22010

https://www.suse.com/security/cve/CVE-2025-22018

https://www.suse.com/security/cve/CVE-2025-22053

https://www.suse.com/security/cve/CVE-2025-22055

https://www.suse.com/security/cve/CVE-2025-22060

https://www.suse.com/security/cve/CVE-2025-22086

https://www.suse.com/security/cve/CVE-2025-23131

https://www.suse.com/security/cve/CVE-2025-37785

https://bugzilla.suse.com/1223809

https://bugzilla.suse.com/1224013

https://bugzilla.suse.com/1224597

https://bugzilla.suse.com/1224757

https://bugzilla.suse.com/1228659

https://bugzilla.suse.com/1232493

https://bugzilla.suse.com/1233075

https://bugzilla.suse.com/1233098

https://bugzilla.suse.com/1234157

https://bugzilla.suse.com/1234698

https://bugzilla.suse.com/1236704

https://bugzilla.suse.com/1237111

https://bugzilla.suse.com/1237874

https://bugzilla.suse.com/1237882

https://bugzilla.suse.com/1238052

https://bugzilla.suse.com/1238471

https://bugzilla.suse.com/1238527

https://bugzilla.suse.com/1238565

https://bugzilla.suse.com/1238742

https://bugzilla.suse.com/1238745

https://bugzilla.suse.com/1238862

https://bugzilla.suse.com/1238961

https://bugzilla.suse.com/1238983

https://bugzilla.suse.com/1238990

https://bugzilla.suse.com/1239066

https://bugzilla.suse.com/1239079

https://bugzilla.suse.com/1239108

https://bugzilla.suse.com/1239470

https://bugzilla.suse.com/1239475

https://bugzilla.suse.com/1239476

https://bugzilla.suse.com/1239487

https://bugzilla.suse.com/1239510

https://bugzilla.suse.com/1239684

https://bugzilla.suse.com/1239906

https://bugzilla.suse.com/1239925

https://bugzilla.suse.com/1239997

https://bugzilla.suse.com/1240167

https://bugzilla.suse.com/1240168

https://bugzilla.suse.com/1240171

https://bugzilla.suse.com/1240176

https://bugzilla.suse.com/1240181

https://bugzilla.suse.com/1240184

https://bugzilla.suse.com/1240375

https://bugzilla.suse.com/1240557

https://bugzilla.suse.com/1240575

https://bugzilla.suse.com/1240576

https://bugzilla.suse.com/1240581

https://bugzilla.suse.com/1240584

https://bugzilla.suse.com/1240585

https://bugzilla.suse.com/1240587

https://bugzilla.suse.com/1240591

https://bugzilla.suse.com/1240592

https://bugzilla.suse.com/1240594

https://bugzilla.suse.com/1240595

https://bugzilla.suse.com/1240596

https://bugzilla.suse.com/1240600

https://bugzilla.suse.com/1240612

https://bugzilla.suse.com/1240616

https://bugzilla.suse.com/1240643

https://bugzilla.suse.com/1240647

https://bugzilla.suse.com/1240655

https://bugzilla.suse.com/1240691

https://bugzilla.suse.com/1240713

https://bugzilla.suse.com/1240715

https://bugzilla.suse.com/1240716

https://bugzilla.suse.com/1240718

https://bugzilla.suse.com/1240719

https://bugzilla.suse.com/1240720

https://bugzilla.suse.com/1240722

https://bugzilla.suse.com/1240727

https://bugzilla.suse.com/1240779

https://bugzilla.suse.com/1240783

https://bugzilla.suse.com/1240785

https://bugzilla.suse.com/1240795

https://bugzilla.suse.com/1240796

https://bugzilla.suse.com/1240799

https://bugzilla.suse.com/1240802

https://bugzilla.suse.com/1240806

https://bugzilla.suse.com/1240808

https://bugzilla.suse.com/1240809

https://bugzilla.suse.com/1240811

https://bugzilla.suse.com/1240812

https://bugzilla.suse.com/1240813

https://bugzilla.suse.com/1240815

https://bugzilla.suse.com/1240816

https://bugzilla.suse.com/1240819

https://bugzilla.suse.com/1240821

https://bugzilla.suse.com/1240825

https://bugzilla.suse.com/1240829

https://bugzilla.suse.com/1240873

https://bugzilla.suse.com/1240934

https://bugzilla.suse.com/1240936

https://bugzilla.suse.com/1240937

https://bugzilla.suse.com/1240938

https://bugzilla.suse.com/1240940

https://bugzilla.suse.com/1240944

https://bugzilla.suse.com/1240978

https://bugzilla.suse.com/1240979

https://bugzilla.suse.com/1241010

https://bugzilla.suse.com/1241038

https://bugzilla.suse.com/1241051

https://bugzilla.suse.com/1241123

https://bugzilla.suse.com/1241151

https://bugzilla.suse.com/1241167

https://bugzilla.suse.com/1241175

https://bugzilla.suse.com/1241204

https://bugzilla.suse.com/1241250

https://bugzilla.suse.com/1241265

https://bugzilla.suse.com/1241280

https://bugzilla.suse.com/1241332

https://bugzilla.suse.com/1241333

https://bugzilla.suse.com/1241341

https://bugzilla.suse.com/1241343

https://bugzilla.suse.com/1241344

https://bugzilla.suse.com/1241357

https://bugzilla.suse.com/1241361

https://bugzilla.suse.com/1241369

https://bugzilla.suse.com/1241378

https://bugzilla.suse.com/1241394

https://bugzilla.suse.com/1241402

https://bugzilla.suse.com/1241412

https://bugzilla.suse.com/1241413

https://bugzilla.suse.com/1241416

https://bugzilla.suse.com/1241424

https://bugzilla.suse.com/1241426

https://bugzilla.suse.com/1241433

https://bugzilla.suse.com/1241436

https://bugzilla.suse.com/1241441

https://bugzilla.suse.com/1241442

https://bugzilla.suse.com/1241443

https://bugzilla.suse.com/1241451

https://bugzilla.suse.com/1241452

https://bugzilla.suse.com/1241456

https://bugzilla.suse.com/1241459

https://bugzilla.suse.com/1241528

https://bugzilla.suse.com/1241537

https://bugzilla.suse.com/1241541

https://bugzilla.suse.com/1241545

https://bugzilla.suse.com/1241547

https://bugzilla.suse.com/1241548

https://bugzilla.suse.com/1241550

https://bugzilla.suse.com/1241573

https://bugzilla.suse.com/1241574

https://bugzilla.suse.com/1241575

https://bugzilla.suse.com/1241578

https://bugzilla.suse.com/1241590

https://bugzilla.suse.com/1241593

https://bugzilla.suse.com/1241598

https://bugzilla.suse.com/1241599

https://bugzilla.suse.com/1241626

https://bugzilla.suse.com/1241648

https://bugzilla.suse.com/1242006

https://bugzilla.suse.com/1242044

https://bugzilla.suse.com/1242172

https://bugzilla.suse.com/1242283

https://bugzilla.suse.com/1242307

https://bugzilla.suse.com/1242313

https://bugzilla.suse.com/1242314

https://bugzilla.suse.com/1242315

https://bugzilla.suse.com/1242321

https://bugzilla.suse.com/1242326

https://bugzilla.suse.com/1242327

https://bugzilla.suse.com/1242328

https://bugzilla.suse.com/1242332

https://bugzilla.suse.com/1242333

https://bugzilla.suse.com/1242335

https://bugzilla.suse.com/1242336

https://bugzilla.suse.com/1242342

https://bugzilla.suse.com/1242343

https://bugzilla.suse.com/1242344

https://bugzilla.suse.com/1242345

https://bugzilla.suse.com/1242346

https://bugzilla.suse.com/1242347

https://bugzilla.suse.com/1242348

https://bugzilla.suse.com/1242414

https://bugzilla.suse.com/1242526

https://bugzilla.suse.com/1242528

https://bugzilla.suse.com/1242534

https://bugzilla.suse.com/1242535

https://bugzilla.suse.com/1242536

https://bugzilla.suse.com/1242537

https://bugzilla.suse.com/1242538

https://bugzilla.suse.com/1242539

https://bugzilla.suse.com/1242540

https://bugzilla.suse.com/1242546

https://bugzilla.suse.com/1242556

https://bugzilla.suse.com/1242596

https://bugzilla.suse.com/1242710

https://bugzilla.suse.com/1242831

https://bugzilla.suse.com/1242985

https://lists.suse.com/pipermail/sle-updates/2025-May/039292.html

https://www.suse.com/security/cve/CVE-2023-53034

https://www.suse.com/security/cve/CVE-2024-27018

https://www.suse.com/security/cve/CVE-2024-27415

https://www.suse.com/security/cve/CVE-2024-28956

https://www.suse.com/security/cve/CVE-2024-35840

https://www.suse.com/security/cve/CVE-2024-50083

https://www.suse.com/security/cve/CVE-2024-50162

https://www.suse.com/security/cve/CVE-2024-50163

https://www.suse.com/security/cve/CVE-2024-53139

https://www.suse.com/security/cve/CVE-2024-57998

https://www.suse.com/security/cve/CVE-2024-58001

https://www.suse.com/security/cve/CVE-2024-58018

https://www.suse.com/security/cve/CVE-2024-58068

https://www.suse.com/security/cve/CVE-2024-58070

https://www.suse.com/security/cve/CVE-2024-58088

https://www.suse.com/security/cve/CVE-2024-58094

https://www.suse.com/security/cve/CVE-2024-58095

https://www.suse.com/security/cve/CVE-2024-58096

https://www.suse.com/security/cve/CVE-2024-58097

https://www.suse.com/security/cve/CVE-2025-21683

https://www.suse.com/security/cve/CVE-2025-21696

https://www.suse.com/security/cve/CVE-2025-21707

https://www.suse.com/security/cve/CVE-2025-21729

https://www.suse.com/security/cve/CVE-2025-21755

https://www.suse.com/security/cve/CVE-2025-21792

https://www.suse.com/security/cve/CVE-2025-21808

https://www.suse.com/security/cve/CVE-2025-21812

https://www.suse.com/security/cve/CVE-2025-21833

https://www.suse.com/security/cve/CVE-2025-21836

https://www.suse.com/security/cve/CVE-2025-21852

https://www.suse.com/security/cve/CVE-2025-21853

https://www.suse.com/security/cve/CVE-2025-21854

https://www.suse.com/security/cve/CVE-2025-21863

https://www.suse.com/security/cve/CVE-2025-21867

https://www.suse.com/security/cve/CVE-2025-21873

https://www.suse.com/security/cve/CVE-2025-21875

https://www.suse.com/security/cve/CVE-2025-21884

https://www.suse.com/security/cve/CVE-2025-21887

https://www.suse.com/security/cve/CVE-2025-21889

https://www.suse.com/security/cve/CVE-2025-21894

https://www.suse.com/security/cve/CVE-2025-21895

https://www.suse.com/security/cve/CVE-2025-21904

https://www.suse.com/security/cve/CVE-2025-21905

https://www.suse.com/security/cve/CVE-2025-21906

https://www.suse.com/security/cve/CVE-2025-21908

https://www.suse.com/security/cve/CVE-2025-21912

https://www.suse.com/security/cve/CVE-2025-21913

https://www.suse.com/security/cve/CVE-2025-21914

https://www.suse.com/security/cve/CVE-2025-21915

https://www.suse.com/security/cve/CVE-2025-21917

https://www.suse.com/security/cve/CVE-2025-21918

https://www.suse.com/security/cve/CVE-2025-21923

https://www.suse.com/security/cve/CVE-2025-21924

https://www.suse.com/security/cve/CVE-2025-21925

https://www.suse.com/security/cve/CVE-2025-21928

https://www.suse.com/security/cve/CVE-2025-21930

https://www.suse.com/security/cve/CVE-2025-21936

https://www.suse.com/security/cve/CVE-2025-21937

https://www.suse.com/security/cve/CVE-2025-21943

https://www.suse.com/security/cve/CVE-2025-21950

https://www.suse.com/security/cve/CVE-2025-21951

https://www.suse.com/security/cve/CVE-2025-21953

https://www.suse.com/security/cve/CVE-2025-21960

https://www.suse.com/security/cve/CVE-2025-21961

https://www.suse.com/security/cve/CVE-2025-21962

https://www.suse.com/security/cve/CVE-2025-21966

https://www.suse.com/security/cve/CVE-2025-21968

https://www.suse.com/security/cve/CVE-2025-21970

https://www.suse.com/security/cve/CVE-2025-21971

https://www.suse.com/security/cve/CVE-2025-21972

https://www.suse.com/security/cve/CVE-2025-21975

https://www.suse.com/security/cve/CVE-2025-21978

https://www.suse.com/security/cve/CVE-2025-21979

https://www.suse.com/security/cve/CVE-2025-21980

https://www.suse.com/security/cve/CVE-2025-21981

https://www.suse.com/security/cve/CVE-2025-21985

https://www.suse.com/security/cve/CVE-2025-21991

https://www.suse.com/security/cve/CVE-2025-21992

https://www.suse.com/security/cve/CVE-2025-21995

https://www.suse.com/security/cve/CVE-2025-21999

https://www.suse.com/security/cve/CVE-2025-22001

https://www.suse.com/security/cve/CVE-2025-22003

https://www.suse.com/security/cve/CVE-2025-22009

https://www.suse.com/security/cve/CVE-2025-22013

https://www.suse.com/security/cve/CVE-2025-22014

https://www.suse.com/security/cve/CVE-2025-22015

https://www.suse.com/security/cve/CVE-2025-22016

https://www.suse.com/security/cve/CVE-2025-22017

https://www.suse.com/security/cve/CVE-2025-22020

https://www.suse.com/security/cve/CVE-2025-22025

https://www.suse.com/security/cve/CVE-2025-22027

https://www.suse.com/security/cve/CVE-2025-22029

https://www.suse.com/security/cve/CVE-2025-22033

https://www.suse.com/security/cve/CVE-2025-22036

https://www.suse.com/security/cve/CVE-2025-22044

https://www.suse.com/security/cve/CVE-2025-22045

https://www.suse.com/security/cve/CVE-2025-22050

https://www.suse.com/security/cve/CVE-2025-22058

https://www.suse.com/security/cve/CVE-2025-22062

https://www.suse.com/security/cve/CVE-2025-22064

https://www.suse.com/security/cve/CVE-2025-22065

https://www.suse.com/security/cve/CVE-2025-22075

https://www.suse.com/security/cve/CVE-2025-22080

https://www.suse.com/security/cve/CVE-2025-22088

https://www.suse.com/security/cve/CVE-2025-22090

https://www.suse.com/security/cve/CVE-2025-22093

https://www.suse.com/security/cve/CVE-2025-22097

https://www.suse.com/security/cve/CVE-2025-22102

https://www.suse.com/security/cve/CVE-2025-22104

https://www.suse.com/security/cve/CVE-2025-22105

https://www.suse.com/security/cve/CVE-2025-22106

https://www.suse.com/security/cve/CVE-2025-22107

https://www.suse.com/security/cve/CVE-2025-22108

https://www.suse.com/security/cve/CVE-2025-22109

https://www.suse.com/security/cve/CVE-2025-22115

https://www.suse.com/security/cve/CVE-2025-22116

https://www.suse.com/security/cve/CVE-2025-22121

https://www.suse.com/security/cve/CVE-2025-22128

https://www.suse.com/security/cve/CVE-2025-23129

https://www.suse.com/security/cve/CVE-2025-23133

https://www.suse.com/security/cve/CVE-2025-23136

https://www.suse.com/security/cve/CVE-2025-23138

https://www.suse.com/security/cve/CVE-2025-23145

https://www.suse.com/security/cve/CVE-2025-37798

https://www.suse.com/security/cve/CVE-2025-37799

https://www.suse.com/security/cve/CVE-2025-37860

https://www.suse.com/security/cve/CVE-2025-39728

Plugin Details

Severity: Medium

ID: 237088

File Name: suse_SU-2025-01614-1.nasl

Version: 1.1

Type: local

Agent: unix

Published: 5/22/2025

Updated: 5/22/2025

Supported Sensors: Nessus Agent, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5

Vector: CVSS2#AV:L/AC:L/Au:S/C:C/I:C/A:C

CVSS Score Source: CVE-2025-22020

CVSS v3

Risk Factor: High

Base Score: 7.8

Temporal Score: 6.8

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

CVSS v4

Risk Factor: Medium

Base Score: 5.7

Threat Score: 1.9

Threat Vector: CVSS:4.0/E:U

Vector: CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

CVSS Score Source: CVE-2024-28956

Vulnerability Information

CPE: cpe:/o:novell:suse_linux:15, p-cpe:/a:novell:suse_linux:kernel-default, p-cpe:/a:novell:suse_linux:kernel-source, p-cpe:/a:novell:suse_linux:kernel-syms, p-cpe:/a:novell:suse_linux:kernel-default-base, p-cpe:/a:novell:suse_linux:kernel-default-devel, p-cpe:/a:novell:suse_linux:kernel-default-extra, p-cpe:/a:novell:suse_linux:kernel-obs-build, p-cpe:/a:novell:suse_linux:reiserfs-kmp-default, p-cpe:/a:novell:suse_linux:kernel-zfcpdump, p-cpe:/a:novell:suse_linux:kernel-default-livepatch, p-cpe:/a:novell:suse_linux:cluster-md-kmp-default, p-cpe:/a:novell:suse_linux:dlm-kmp-default, p-cpe:/a:novell:suse_linux:gfs2-kmp-default, p-cpe:/a:novell:suse_linux:kernel-devel, p-cpe:/a:novell:suse_linux:kernel-macros, p-cpe:/a:novell:suse_linux:ocfs2-kmp-default, p-cpe:/a:novell:suse_linux:kernel-default-livepatch-devel, p-cpe:/a:novell:suse_linux:kernel-64kb, p-cpe:/a:novell:suse_linux:kernel-64kb-devel, p-cpe:/a:novell:suse_linux:kernel-livepatch-6_4_0-150600_23_50-default

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 5/21/2025

Vulnerability Publication Date: 12/12/2023

Reference Information

CVE: CVE-2023-53034, CVE-2024-27018, CVE-2024-27415, CVE-2024-28956, CVE-2024-35840, CVE-2024-46763, CVE-2024-46865, CVE-2024-50038, CVE-2024-50083, CVE-2024-50162, CVE-2024-50163, CVE-2024-53124, CVE-2024-53139, CVE-2024-56641, CVE-2024-56702, CVE-2024-57924, CVE-2024-57998, CVE-2024-58001, CVE-2024-58018, CVE-2024-58068, CVE-2024-58070, CVE-2024-58071, CVE-2024-58088, CVE-2024-58093, CVE-2024-58094, CVE-2024-58095, CVE-2024-58096, CVE-2024-58097, CVE-2025-21683, CVE-2025-21696, CVE-2025-21707, CVE-2025-21729, CVE-2025-21755, CVE-2025-21758, CVE-2025-21768, CVE-2025-21792, CVE-2025-21806, CVE-2025-21808, CVE-2025-21812, CVE-2025-21833, CVE-2025-21836, CVE-2025-21852, CVE-2025-21853, CVE-2025-21854, CVE-2025-21863, CVE-2025-21867, CVE-2025-21873, CVE-2025-21875, CVE-2025-21881, CVE-2025-21884, CVE-2025-21887, CVE-2025-21889, CVE-2025-21894, CVE-2025-21895, CVE-2025-21904, CVE-2025-21905, CVE-2025-21906, CVE-2025-21908, CVE-2025-21909, CVE-2025-21910, CVE-2025-21912, CVE-2025-21913, CVE-2025-21914, CVE-2025-21915, CVE-2025-21916, CVE-2025-21917, CVE-2025-21918, CVE-2025-21922, CVE-2025-21923, CVE-2025-21924, CVE-2025-21925, CVE-2025-21926, CVE-2025-21927, CVE-2025-21928, CVE-2025-21930, CVE-2025-21931, CVE-2025-21934, CVE-2025-21935, CVE-2025-21936, CVE-2025-21937, CVE-2025-21941, CVE-2025-21943, CVE-2025-21948, CVE-2025-21950, CVE-2025-21951, CVE-2025-21953, CVE-2025-21956, CVE-2025-21957, CVE-2025-21960, CVE-2025-21961, CVE-2025-21962, CVE-2025-21963, CVE-2025-21964, CVE-2025-21966, CVE-2025-21968, CVE-2025-21969, CVE-2025-21970, CVE-2025-21971, CVE-2025-21972, CVE-2025-21975, CVE-2025-21978, CVE-2025-21979, CVE-2025-21980, CVE-2025-21981, CVE-2025-21985, CVE-2025-21991, CVE-2025-21992, CVE-2025-21993, CVE-2025-21995, CVE-2025-21996, CVE-2025-21999, CVE-2025-22001, CVE-2025-22003, CVE-2025-22004, CVE-2025-22007, CVE-2025-22008, CVE-2025-22009, CVE-2025-22010, CVE-2025-22013, CVE-2025-22014, CVE-2025-22015, CVE-2025-22016, CVE-2025-22017, CVE-2025-22018, CVE-2025-22020, CVE-2025-22025, CVE-2025-22027, CVE-2025-22029, CVE-2025-22033, CVE-2025-22036, CVE-2025-22044, CVE-2025-22045, CVE-2025-22050, CVE-2025-22053, CVE-2025-22055, CVE-2025-22058, CVE-2025-22060, CVE-2025-22062, CVE-2025-22064, CVE-2025-22065, CVE-2025-22075, CVE-2025-22080, CVE-2025-22086, CVE-2025-22088, CVE-2025-22090, CVE-2025-22093, CVE-2025-22097, CVE-2025-22102, CVE-2025-22104, CVE-2025-22105, CVE-2025-22106, CVE-2025-22107, CVE-2025-22108, CVE-2025-22109, CVE-2025-22115, CVE-2025-22116, CVE-2025-22121, CVE-2025-22128, CVE-2025-2312, CVE-2025-23129, CVE-2025-23131, CVE-2025-23133, CVE-2025-23136, CVE-2025-23138, CVE-2025-23145, CVE-2025-37785, CVE-2025-37798, CVE-2025-37799, CVE-2025-37860, CVE-2025-39728

SuSE: SUSE-SU-2025:01614-1