SUSE SLES15 Security Update : kernel (Live Patch 0 for SLE 15 SP6) (SUSE-SU-2025:02117-1)

high Nessus Plugin ID 240582

Synopsis

The remote SUSE host is missing one or more security updates.

Description

The remote SUSE Linux SLES15 host has a package installed that is affected by multiple vulnerabilities as referenced in the SUSE-SU-2025:02117-1 advisory.

This update for the Linux Kernel 6.4.0-150600_21 fixes several issues.

The following security issues were fixed:

- CVE-2024-56601: net: inet: do not leave a dangling sk pointer in inet_create() (bsc#1235231).
- CVE-2024-50127: net: sched: fix use-after-free in taprio_change() (bsc#1232908).
- CVE-2024-50279: dm cache: fix out-of-bounds access to the dirty bitset when resizing (bsc#1233708).
- CVE-2024-50301: security/keys: fix slab-out-of-bounds in key_task_permission (bsc#1233680).
- CVE-2024-56582: btrfs: fix use-after-free in btrfs_encoded_read_endio() (bsc#1235129).
- CVE-2024-53208: Bluetooth: MGMT: Fix slab-use-after-free Read in set_powered_sync (bsc#1236244).
- CVE-2024-50257: netfilter: Fix use-after-free in get_info() (bsc#1233245).
- CVE-2024-56605: Bluetooth: L2CAP: do not leave dangling sk pointer on error in l2cap_sock_create() (bsc#1235062).
- CVE-2024-50125: Bluetooth: SCO: Fix UAF on sco_sock_timeout (bsc#1232929).
- CVE-2024-50124: Bluetooth: ISO: Fix UAF on iso_sock_timeout (bsc#1232927).
- CVE-2024-40937: gve: Clear napi->skb before dev_kfree_skb_any() (bsc#1227903).

Tenable has extracted the preceding description block directly from the SUSE security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected kernel-livepatch-6_4_0-150600_21-default package.

See Also

https://bugzilla.suse.com/1227903

https://bugzilla.suse.com/1232908

https://bugzilla.suse.com/1232927

https://bugzilla.suse.com/1232929

https://bugzilla.suse.com/1233245

https://bugzilla.suse.com/1233680

https://bugzilla.suse.com/1233708

https://bugzilla.suse.com/1235062

https://bugzilla.suse.com/1235129

https://bugzilla.suse.com/1235231

https://bugzilla.suse.com/1236244

https://lists.suse.com/pipermail/sle-updates/2025-June/040477.html

https://www.suse.com/security/cve/CVE-2024-40937

https://www.suse.com/security/cve/CVE-2024-50124

https://www.suse.com/security/cve/CVE-2024-50125

https://www.suse.com/security/cve/CVE-2024-50127

https://www.suse.com/security/cve/CVE-2024-50257

https://www.suse.com/security/cve/CVE-2024-50279

https://www.suse.com/security/cve/CVE-2024-50301

https://www.suse.com/security/cve/CVE-2024-53208

https://www.suse.com/security/cve/CVE-2024-56582

https://www.suse.com/security/cve/CVE-2024-56601

https://www.suse.com/security/cve/CVE-2024-56605

Plugin Details

Severity: High

ID: 240582

File Name: suse_SU-2025-02117-1.nasl

Version: 1.1

Type: local

Agent: unix

Published: 6/26/2025

Updated: 6/26/2025

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5

Vector: CVSS2#AV:L/AC:L/Au:S/C:C/I:C/A:C

CVSS Score Source: CVE-2024-56605

CVSS v3

Risk Factor: High

Base Score: 7.8

Temporal Score: 6.8

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:novell:suse_linux:15, p-cpe:/a:novell:suse_linux:kernel-livepatch-6_4_0-150600_21-default

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 6/25/2025

Vulnerability Publication Date: 12/12/2023

Reference Information

CVE: CVE-2024-40937, CVE-2024-50124, CVE-2024-50125, CVE-2024-50127, CVE-2024-50257, CVE-2024-50279, CVE-2024-50301, CVE-2024-53208, CVE-2024-56582, CVE-2024-56601, CVE-2024-56605

SuSE: SUSE-SU-2025:02117-1