SUSE SLES15 Security Update : kernel (SUSE-SU-2025:01982-1)

high Nessus Plugin ID 240812

Synopsis

The remote SUSE host is missing one or more security updates.

Description

The remote SUSE Linux SLES15 / SLES_SAP15 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2025:01982-1 advisory.

The SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security bugfixes.


The following security bugs were fixed:

- CVE-2021-32399: Fixed a race condition when removing the HCI controller (bsc#1184611).
- CVE-2022-49110: netfilter: conntrack: revisit gc autotuning (bsc#1237981).
- CVE-2022-49139: Bluetooth: fix null ptr deref on hci_sync_conn_complete_evt (bsc#1238032).
- CVE-2022-49320: dmaengine: zynqmp_dma: In struct zynqmp_dma_chan fix desc_size data type (bsc#1238394).
- CVE-2022-49767: 9p/trans_fd: always use O_NONBLOCK read/write (bsc#1242493).
- CVE-2022-49769: gfs2: Check sb_bsize_shift after reading superblock (bsc#1242440).
- CVE-2022-49770: ceph: avoid putting the realm twice when decoding snaps fails (bsc#1242597).
- CVE-2022-49775: tcp: cdg: allow tcp_cdg_release() to be called multiple times (bsc#1242245).
- CVE-2022-49789: scsi: zfcp: Fix double free of FSF request when qdio send fails (bsc#1242366).
- CVE-2023-53039: HID: intel-ish-hid: ipc: Fix potential use-after-free in work function (bsc#1242745).
- CVE-2024-53168: net: make sock_inuse_add() available (bsc#1234887).
- CVE-2024-56558: nfsd: make sure exp active before svc_export_show (bsc#1235100).
- CVE-2024-56705: media: atomisp: add check for rgby_data memory allocation failure (bsc#1235568).
- CVE-2025-21812: ax25: rcu protect dev->ax25_ptr (bsc#1238471).
- CVE-2025-21999: proc: fix UAF in proc_get_inode() (bsc#1240802).
- CVE-2025-22028: media: vimc: skip .s_stream() for stopped entities (bsc#1241362).
- CVE-2025-22121: ext4: fix out-of-bound read in ext4_xattr_inode_dec_ref_all() (bsc#1241593).
- CVE-2025-37789: net: openvswitch: fix nested key length validation in the set() action (bsc#1242762).
- CVE-2025-37846: arm64: mops: Do not dereference src reg for a set operation (bsc#1242963).
- CVE-2025-40364: io_uring: fix io_req_prep_async with provided buffers (bsc#1241637).


Tenable has extracted the preceding description block directly from the SUSE security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://bugzilla.suse.com/1154353

https://bugzilla.suse.com/1170891

https://bugzilla.suse.com/1173139

https://bugzilla.suse.com/1184350

https://bugzilla.suse.com/1184611

https://bugzilla.suse.com/1185010

https://bugzilla.suse.com/1190358

https://bugzilla.suse.com/1190428

https://bugzilla.suse.com/1201644

https://bugzilla.suse.com/1201664

https://bugzilla.suse.com/1201672

https://bugzilla.suse.com/1201673

https://bugzilla.suse.com/1201676

https://bugzilla.suse.com/1206073

https://bugzilla.suse.com/1206649

https://bugzilla.suse.com/1206886

https://bugzilla.suse.com/1206887

https://bugzilla.suse.com/1207198

https://bugzilla.suse.com/1210337

https://bugzilla.suse.com/1213476

https://bugzilla.suse.com/1232649

https://bugzilla.suse.com/1234887

https://bugzilla.suse.com/1235100

https://bugzilla.suse.com/1235568

https://bugzilla.suse.com/1237981

https://bugzilla.suse.com/1238032

https://bugzilla.suse.com/1238394

https://bugzilla.suse.com/1238471

https://bugzilla.suse.com/1240802

https://bugzilla.suse.com/1241362

https://bugzilla.suse.com/1241593

https://bugzilla.suse.com/1241637

https://bugzilla.suse.com/1242145

https://bugzilla.suse.com/1242147

https://bugzilla.suse.com/1242150

https://bugzilla.suse.com/1242154

https://bugzilla.suse.com/1242215

https://bugzilla.suse.com/1242232

https://bugzilla.suse.com/1242245

https://bugzilla.suse.com/1242264

https://bugzilla.suse.com/1242270

https://bugzilla.suse.com/1242352

https://bugzilla.suse.com/1242353

https://bugzilla.suse.com/1242355

https://bugzilla.suse.com/1242366

https://bugzilla.suse.com/1242378

https://bugzilla.suse.com/1242385

https://bugzilla.suse.com/1242387

https://bugzilla.suse.com/1242391

https://bugzilla.suse.com/1242392

https://bugzilla.suse.com/1242402

https://bugzilla.suse.com/1242409

https://bugzilla.suse.com/1242416

https://bugzilla.suse.com/1242440

https://bugzilla.suse.com/1242443

https://bugzilla.suse.com/1242449

https://bugzilla.suse.com/1242452

https://bugzilla.suse.com/1242455

https://bugzilla.suse.com/1242464

https://bugzilla.suse.com/1242473

https://bugzilla.suse.com/1242481

https://bugzilla.suse.com/1242484

https://bugzilla.suse.com/1242493

https://bugzilla.suse.com/1242527

https://bugzilla.suse.com/1242542

https://bugzilla.suse.com/1242545

https://bugzilla.suse.com/1242547

https://bugzilla.suse.com/1242548

https://bugzilla.suse.com/1242549

https://bugzilla.suse.com/1242551

https://bugzilla.suse.com/1242580

https://bugzilla.suse.com/1242597

https://bugzilla.suse.com/1242686

https://bugzilla.suse.com/1242689

https://bugzilla.suse.com/1242716

https://bugzilla.suse.com/1242733

https://bugzilla.suse.com/1242734

https://bugzilla.suse.com/1242736

https://bugzilla.suse.com/1242745

https://bugzilla.suse.com/1242749

https://bugzilla.suse.com/1242762

https://bugzilla.suse.com/1242835

https://bugzilla.suse.com/1242963

https://bugzilla.suse.com/1243919

https://lists.suse.com/pipermail/sle-updates/2025-June/040324.html

https://www.suse.com/security/cve/CVE-2020-36790

https://www.suse.com/security/cve/CVE-2020-36791

https://www.suse.com/security/cve/CVE-2021-32399

https://www.suse.com/security/cve/CVE-2022-3564

https://www.suse.com/security/cve/CVE-2022-49110

https://www.suse.com/security/cve/CVE-2022-49139

https://www.suse.com/security/cve/CVE-2022-49320

https://www.suse.com/security/cve/CVE-2022-49767

https://www.suse.com/security/cve/CVE-2022-49769

https://www.suse.com/security/cve/CVE-2022-49770

https://www.suse.com/security/cve/CVE-2022-49771

https://www.suse.com/security/cve/CVE-2022-49772

https://www.suse.com/security/cve/CVE-2022-49775

https://www.suse.com/security/cve/CVE-2022-49777

https://www.suse.com/security/cve/CVE-2022-49787

https://www.suse.com/security/cve/CVE-2022-49788

https://www.suse.com/security/cve/CVE-2022-49789

https://www.suse.com/security/cve/CVE-2022-49790

https://www.suse.com/security/cve/CVE-2022-49793

https://www.suse.com/security/cve/CVE-2022-49794

https://www.suse.com/security/cve/CVE-2022-49799

https://www.suse.com/security/cve/CVE-2022-49802

https://www.suse.com/security/cve/CVE-2022-49809

https://www.suse.com/security/cve/CVE-2022-49818

https://www.suse.com/security/cve/CVE-2022-49821

https://www.suse.com/security/cve/CVE-2022-49823

https://www.suse.com/security/cve/CVE-2022-49824

https://www.suse.com/security/cve/CVE-2022-49825

https://www.suse.com/security/cve/CVE-2022-49826

https://www.suse.com/security/cve/CVE-2022-49827

https://www.suse.com/security/cve/CVE-2022-49830

https://www.suse.com/security/cve/CVE-2022-49832

https://www.suse.com/security/cve/CVE-2022-49835

https://www.suse.com/security/cve/CVE-2022-49836

https://www.suse.com/security/cve/CVE-2022-49839

https://www.suse.com/security/cve/CVE-2022-49841

https://www.suse.com/security/cve/CVE-2022-49842

https://www.suse.com/security/cve/CVE-2022-49846

https://www.suse.com/security/cve/CVE-2022-49861

https://www.suse.com/security/cve/CVE-2022-49870

https://www.suse.com/security/cve/CVE-2022-49879

https://www.suse.com/security/cve/CVE-2022-49880

https://www.suse.com/security/cve/CVE-2022-49881

https://www.suse.com/security/cve/CVE-2022-49887

https://www.suse.com/security/cve/CVE-2022-49889

https://www.suse.com/security/cve/CVE-2022-49892

https://www.suse.com/security/cve/CVE-2022-49906

https://www.suse.com/security/cve/CVE-2022-49910

https://www.suse.com/security/cve/CVE-2022-49915

https://www.suse.com/security/cve/CVE-2022-49922

https://www.suse.com/security/cve/CVE-2022-49927

https://www.suse.com/security/cve/CVE-2023-1990

https://www.suse.com/security/cve/CVE-2023-53039

https://www.suse.com/security/cve/CVE-2023-53052

https://www.suse.com/security/cve/CVE-2023-53106

https://www.suse.com/security/cve/CVE-2024-53168

https://www.suse.com/security/cve/CVE-2024-56558

https://www.suse.com/security/cve/CVE-2024-56705

https://www.suse.com/security/cve/CVE-2025-21812

https://www.suse.com/security/cve/CVE-2025-21999

https://www.suse.com/security/cve/CVE-2025-22028

https://www.suse.com/security/cve/CVE-2025-22121

https://www.suse.com/security/cve/CVE-2025-37789

https://www.suse.com/security/cve/CVE-2025-37846

https://www.suse.com/security/cve/CVE-2025-40364

Plugin Details

Severity: High

ID: 240812

File Name: suse_SU-2025-01982-1.nasl

Version: 1.1

Type: local

Agent: unix

Published: 6/27/2025

Updated: 6/27/2025

Supported Sensors: Nessus Agent, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Medium

Base Score: 4.4

Temporal Score: 3.4

Vector: CVSS2#AV:L/AC:M/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2021-32399

CVSS v3

Risk Factor: High

Base Score: 7.8

Temporal Score: 7

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

CVSS Score Source: CVE-2024-53168

Vulnerability Information

CPE: p-cpe:/a:novell:suse_linux:kernel-macros, p-cpe:/a:novell:suse_linux:kernel-zfcpdump, p-cpe:/a:novell:suse_linux:kernel-64kb-devel, p-cpe:/a:novell:suse_linux:kernel-preempt-devel, p-cpe:/a:novell:suse_linux:ocfs2-kmp-default, p-cpe:/a:novell:suse_linux:dlm-kmp-default, p-cpe:/a:novell:suse_linux:kernel-default-base, p-cpe:/a:novell:suse_linux:kernel-64kb, p-cpe:/a:novell:suse_linux:kernel-preempt, p-cpe:/a:novell:suse_linux:kernel-default-devel, p-cpe:/a:novell:suse_linux:kernel-devel, p-cpe:/a:novell:suse_linux:gfs2-kmp-default, p-cpe:/a:novell:suse_linux:kernel-syms, cpe:/o:novell:suse_linux:15, p-cpe:/a:novell:suse_linux:cluster-md-kmp-default, p-cpe:/a:novell:suse_linux:kernel-obs-build, p-cpe:/a:novell:suse_linux:kernel-default, p-cpe:/a:novell:suse_linux:kernel-source, p-cpe:/a:novell:suse_linux:reiserfs-kmp-default

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 6/17/2025

Vulnerability Publication Date: 5/10/2021

Reference Information

CVE: CVE-2020-36790, CVE-2020-36791, CVE-2021-32399, CVE-2022-3564, CVE-2022-49110, CVE-2022-49139, CVE-2022-49320, CVE-2022-49767, CVE-2022-49769, CVE-2022-49770, CVE-2022-49771, CVE-2022-49772, CVE-2022-49775, CVE-2022-49777, CVE-2022-49787, CVE-2022-49788, CVE-2022-49789, CVE-2022-49790, CVE-2022-49793, CVE-2022-49794, CVE-2022-49799, CVE-2022-49802, CVE-2022-49809, CVE-2022-49818, CVE-2022-49821, CVE-2022-49823, CVE-2022-49824, CVE-2022-49825, CVE-2022-49826, CVE-2022-49827, CVE-2022-49830, CVE-2022-49832, CVE-2022-49835, CVE-2022-49836, CVE-2022-49839, CVE-2022-49841, CVE-2022-49842, CVE-2022-49846, CVE-2022-49861, CVE-2022-49870, CVE-2022-49879, CVE-2022-49880, CVE-2022-49881, CVE-2022-49887, CVE-2022-49889, CVE-2022-49892, CVE-2022-49906, CVE-2022-49910, CVE-2022-49915, CVE-2022-49922, CVE-2022-49927, CVE-2023-1990, CVE-2023-53039, CVE-2023-53052, CVE-2023-53106, CVE-2024-53168, CVE-2024-56558, CVE-2024-56705, CVE-2025-21812, CVE-2025-21999, CVE-2025-22028, CVE-2025-22121, CVE-2025-37789, CVE-2025-37846, CVE-2025-40364

SuSE: SUSE-SU-2025:01982-1