SUSE SLES15 Security Update : kernel (SUSE-SU-2025:01972-1)

medium Nessus Plugin ID 240815

Synopsis

The remote SUSE host is missing one or more security updates.

Description

The remote SUSE Linux SLES15 host has a package installed that is affected by multiple vulnerabilities as referenced in the SUSE-SU-2025:01972-1 advisory.

The SUSE Linux Enterprise 15 SP7 RT kernel was updated to receive various security bugfixes.


The following security bugs were fixed:

- CVE-2024-28956: x86/ibt: Keep IBT disabled during alternative patching (bsc#1242006).
- CVE-2024-35840: mptcp: use OPTION_MPTCP_MPJ_SYNACK in subflow_finish_connect() (bsc#1224597).
- CVE-2024-46713: kabi fix for perf/aux: Fix AUX buffer serialization (bsc#1230581).
- CVE-2024-50223: sched/numa: Fix the potential null pointer dereference in (bsc#1233192).
- CVE-2024-54458: scsi: ufs: bsg: Set bsg_queue to NULL after removal (bsc#1238992).
- CVE-2024-58070: bpf: bpf_local_storage: Always use bpf_mem_alloc in PREEMPT_RT (bsc#1238983).
- CVE-2025-21648: netfilter: conntrack: clamp maximum hashtable size to INT_MAX (bsc#1236142).
- CVE-2025-21683: bpf: Fix bpf_sk_select_reuseport() memory leak (bsc#1236704).
- CVE-2025-21702: pfifo_tail_enqueue: Drop new packet when sch->limit == 0 (bsc#1237312).
- CVE-2025-21707: mptcp: consolidate suboption status (bsc#1238862).
- CVE-2025-21758: ipv6: mcast: add RCU protection to mld_newpack() (bsc#1238737).
- CVE-2025-21768: net: ipv6: fix dst ref loops in rpl, seg6 and ioam6 lwtunnels (bsc#1238714).
- CVE-2025-21787: team: better TEAM_OPTION_TYPE_STRING validation (bsc#1238774).
- CVE-2025-21792: ax25: Fix refcount leak caused by setting SO_BINDTODEVICE sockopt (bsc#1238745).
- CVE-2025-21814: ptp: Ensure info->enable callback is always set (bsc#1238473).
- CVE-2025-21919: sched/fair: Fix potential memory corruption in child_cfs_rq_on_list (bsc#1240593).
- CVE-2025-21962: cifs: Fix integer overflow while processing closetimeo mount option (bsc#1240655).
- CVE-2025-21963: cifs: Fix integer overflow while processing acdirmax mount option (bsc#1240717).
- CVE-2025-21964: cifs: Fix integer overflow while processing acregmax mount option (bsc#1240740).
- CVE-2025-22018: atm: Fix NULL pointer dereference (bsc#1241266).
- CVE-2025-22021: netfilter: socket: Lookup orig tuple for IPv6 SNAT (bsc#1241282).
- CVE-2025-22030: mm: zswap: fix crypto_free_acomp() deadlock in zswap_cpu_comp_dead() (bsc#1241376).
- CVE-2025-22056: netfilter: nft_tunnel: fix geneve_opt type confusion addition (bsc#1241525).
- CVE-2025-22057: net: decrease cached dst counters in dst_release (bsc#1241533).
- CVE-2025-22058: udp: Fix memory accounting leak (bsc#1241332).
- CVE-2025-22063: netlabel: Fix NULL pointer exception caused by CALIPSO on IPv4 sockets (bsc#1241351).
- CVE-2025-22064: netfilter: nf_tables: do not unregister hook when table is dormant (bsc#1241413).
- CVE-2025-22070: fs/9p: fix NULL pointer dereference on mkdir (bsc#1241305).
- CVE-2025-22094: powerpc/perf: Fix ref-counting on the PMU 'vpa_pmu' (bsc#1241512).
- CVE-2025-22102: Bluetooth: btnxpuart: Fix kernel panic during FW release (bsc#1241456).
- CVE-2025-22103: net: fix NULL pointer dereference in l3mdev_l3_rcv (bsc#1241448).
- CVE-2025-22104: ibmvnic: Use kernel helpers for hex dumps (bsc#1241550).
- CVE-2025-22107: net: dsa: sja1105: fix kasan out-of-bounds warning in sja1105_table_delete_entry() (bsc#1241575).
- CVE-2025-22109: ax25: Remove broken autobind (bsc#1241573).
- CVE-2025-23138: watch_queue: fix pipe accounting mismatch (bsc#1241648).
- CVE-2025-23140: misc: pci_endpoint_test: Avoid issue of interrupts remaining after request_irq error (bsc#1242763).
- CVE-2025-23145: mptcp: fix NULL pointer in can_accept_new_subflow (bsc#1242596).
- CVE-2025-23150: ext4: fix off-by-one error in do_split (bsc#1242513).
- CVE-2025-23154: io_uring/net: fix io_req_post_cqe abuse by send bundle (bsc#1242533).
- CVE-2025-23160: media: mediatek: vcodec: Fix a resource leak related to the scp device in FW initialization (bsc#1242507).
- CVE-2025-37747: kABI workaround for perf-Fix-hang-while-freeing-sigtrap-event (References: bsc#1242520).
- CVE-2025-37748: iommu/mediatek: Fix NULL pointer deference in mtk_iommu_device_group (bsc#1242523).
- CVE-2025-37749: net: ppp: Add bound checking for skb data on ppp_sync_txmung (bsc#1242859).
- CVE-2025-37750: smb: client: fix UAF in decryption with multichannel (bsc#1242510).
- CVE-2025-37755: net: libwx: handle page_pool_dev_alloc_pages error (bsc#1242506).
- CVE-2025-37773: virtiofs: add filesystem context source name check (bsc#1242502).
- CVE-2025-37780: isofs: Prevent the use of too small fid (bsc#1242786).
- CVE-2025-37787: net: dsa: mv88e6xxx: avoid unregistering devlink regions which were never registered (bsc#1242585).
- CVE-2025-37789: net: openvswitch: fix nested key length validation in the set() action (bsc#1242762).
- CVE-2025-37790: net: mctp: Set SOCK_RCU_FREE (bsc#1242509).
- CVE-2025-37797: net_sched: hfsc: Fix a UAF vulnerability in class handling (bsc#1242417).
- CVE-2025-37798: codel: remove sch->q.qlen check before qdisc_tree_reduce_backlog() (bsc#1242414).
- CVE-2025-37799: vmxnet3: Fix malformed packet sizing in vmxnet3_process_xdp (bsc#1242283).
- CVE-2025-37803: udmabuf: fix a buf size overflow issue during udmabuf creation (bsc#1242852).
- CVE-2025-37804: io_uring: always do atomic put from iowq (bsc#1242854).
- CVE-2025-37809: usb: typec: class: Unlocked on error in typec_register_partner() (bsc#1242856).
- CVE-2025-37820: xen-netfront: handle NULL returned by xdp_convert_buff_to_frame() (bsc#1242866).
- CVE-2025-37823: net_sched: hfsc: Fix a potential UAF in hfsc_dequeue() too (bsc#1242924).
- CVE-2025-37824: tipc: fix NULL pointer dereference in tipc_mon_reinit_self() (bsc#1242867).
- CVE-2025-37829: cpufreq: scpi: Fix null-ptr-deref in scpi_cpufreq_get_rate() (bsc#1242875).
- CVE-2025-37830: cpufreq: scmi: Fix null-ptr-deref in scmi_cpufreq_get_rate() (bsc#1242860).
- CVE-2025-37831: cpufreq: apple-soc: Fix null-ptr-deref in apple_soc_cpufreq_get_rate() (bsc#1242861).
- CVE-2025-37833: net/niu: Niu requires MSIX ENTRY_DATA fields touch before entry reads (bsc#1242868).
- CVE-2025-37842: spi: fsl-qspi: Fix double cleanup in probe error path (bsc#1242951).
- CVE-2025-37870: drm/amd/display: prevent hang on link training fail (bsc#1243056).
- CVE-2025-37879: 9p/net: fix improper handling of bogus negative read/write replies (bsc#1243077).
- CVE-2025-37886: pds_core: make wait_context part of q_info (bsc#1242944).
- CVE-2025-37887: pds_core: handle unsupported PDS_CORE_CMD_FW_CONTROL result (bsc#1242962).
- CVE-2025-37949: xenbus: Use kref to track req lifetime (bsc#1243541).
- CVE-2025-37957: KVM: SVM: Forcibly leave SMM mode on SHUTDOWN interception (bsc#1243513).
- CVE-2025-37958: mm/huge_memory: fix dereferencing invalid pmd migration entry (bsc#1243539).
- CVE-2025-37960: memblock: Accept allocated memory before use in memblock_double_array() (bsc#1243519).
- CVE-2025-37974: s390/pci: Fix missing check for zpci_create_device() error return (bsc#1243547).
- CVE-2025-38152: remoteproc: core: Clear table_sz when rproc_shutdown (bsc#1241627).
- CVE-2025-38637: net_sched: skbprio: Remove overly strict queue assertions (bsc#1241657).


Tenable has extracted the preceding description block directly from the SUSE security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected kernel-livepatch-6_4_0-150700_7_3-rt package.

See Also

https://bugzilla.suse.com/1223096

https://bugzilla.suse.com/1223809

https://bugzilla.suse.com/1224013

https://bugzilla.suse.com/1224597

https://bugzilla.suse.com/1224757

https://bugzilla.suse.com/1230581

https://bugzilla.suse.com/1230764

https://bugzilla.suse.com/1231016

https://bugzilla.suse.com/1231103

https://bugzilla.suse.com/1232493

https://bugzilla.suse.com/1232649

https://www.suse.com/security/cve/CVE-2025-22070

https://www.suse.com/security/cve/CVE-2025-22075

https://www.suse.com/security/cve/CVE-2025-22085

https://www.suse.com/security/cve/CVE-2025-22086

https://www.suse.com/security/cve/CVE-2025-22088

https://www.suse.com/security/cve/CVE-2025-22091

https://www.suse.com/security/cve/CVE-2025-22093

https://www.suse.com/security/cve/CVE-2025-22094

https://www.suse.com/security/cve/CVE-2025-22097

https://www.suse.com/security/cve/CVE-2025-22102

https://www.suse.com/security/cve/CVE-2025-22103

https://www.suse.com/security/cve/CVE-2025-22104

https://www.suse.com/security/cve/CVE-2025-22107

https://www.suse.com/security/cve/CVE-2025-22108

https://www.suse.com/security/cve/CVE-2025-22109

https://www.suse.com/security/cve/CVE-2025-22112

https://www.suse.com/security/cve/CVE-2025-22116

https://www.suse.com/security/cve/CVE-2025-22125

https://www.suse.com/security/cve/CVE-2025-22126

https://www.suse.com/security/cve/CVE-2025-22128

https://www.suse.com/security/cve/CVE-2025-23129

https://www.suse.com/security/cve/CVE-2025-23131

https://www.suse.com/security/cve/CVE-2025-23134

https://www.suse.com/security/cve/CVE-2025-23136

https://www.suse.com/security/cve/CVE-2025-23138

https://www.suse.com/security/cve/CVE-2025-23140

https://www.suse.com/security/cve/CVE-2025-23145

https://www.suse.com/security/cve/CVE-2025-23150

https://www.suse.com/security/cve/CVE-2025-23154

https://www.suse.com/security/cve/CVE-2025-23160

https://www.suse.com/security/cve/CVE-2025-37747

https://www.suse.com/security/cve/CVE-2025-37748

https://www.suse.com/security/cve/CVE-2025-37749

https://www.suse.com/security/cve/CVE-2025-37750

https://www.suse.com/security/cve/CVE-2025-37755

https://www.suse.com/security/cve/CVE-2025-37773

https://www.suse.com/security/cve/CVE-2025-37780

https://www.suse.com/security/cve/CVE-2025-37787

https://www.suse.com/security/cve/CVE-2025-37789

https://www.suse.com/security/cve/CVE-2025-37790

https://www.suse.com/security/cve/CVE-2025-37797

https://www.suse.com/security/cve/CVE-2025-37798

https://www.suse.com/security/cve/CVE-2025-37799

https://www.suse.com/security/cve/CVE-2025-37803

https://www.suse.com/security/cve/CVE-2025-37804

https://www.suse.com/security/cve/CVE-2025-37809

https://www.suse.com/security/cve/CVE-2025-37820

https://www.suse.com/security/cve/CVE-2025-37823

https://www.suse.com/security/cve/CVE-2025-37824

https://www.suse.com/security/cve/CVE-2025-37829

https://www.suse.com/security/cve/CVE-2025-37830

https://www.suse.com/security/cve/CVE-2025-37831

https://www.suse.com/security/cve/CVE-2025-37833

https://www.suse.com/security/cve/CVE-2025-37842

https://www.suse.com/security/cve/CVE-2025-37870

https://www.suse.com/security/cve/CVE-2025-37879

https://www.suse.com/security/cve/CVE-2025-37886

https://www.suse.com/security/cve/CVE-2025-37887

https://www.suse.com/security/cve/CVE-2025-37949

https://www.suse.com/security/cve/CVE-2025-37957

https://www.suse.com/security/cve/CVE-2025-37958

https://www.suse.com/security/cve/CVE-2025-37960

https://www.suse.com/security/cve/CVE-2025-37974

https://www.suse.com/security/cve/CVE-2025-38152

https://www.suse.com/security/cve/CVE-2025-38637

https://www.suse.com/security/cve/CVE-2025-40325

https://bugzilla.suse.com/1232882

https://bugzilla.suse.com/1233192

https://bugzilla.suse.com/1235149

https://bugzilla.suse.com/1235501

https://bugzilla.suse.com/1235526

https://bugzilla.suse.com/1236142

https://bugzilla.suse.com/1236208

https://bugzilla.suse.com/1236704

https://bugzilla.suse.com/1237312

https://bugzilla.suse.com/1238473

https://bugzilla.suse.com/1238527

https://bugzilla.suse.com/1238585

https://bugzilla.suse.com/1238714

https://bugzilla.suse.com/1238737

https://bugzilla.suse.com/1238745

https://bugzilla.suse.com/1238774

https://bugzilla.suse.com/1238862

https://bugzilla.suse.com/1238961

https://bugzilla.suse.com/1238983

https://bugzilla.suse.com/1238992

https://bugzilla.suse.com/1239079

https://bugzilla.suse.com/1239476

https://bugzilla.suse.com/1239487

https://bugzilla.suse.com/1239691

https://bugzilla.suse.com/1240557

https://bugzilla.suse.com/1240593

https://bugzilla.suse.com/1240655

https://bugzilla.suse.com/1240711

https://bugzilla.suse.com/1240717

https://bugzilla.suse.com/1240740

https://bugzilla.suse.com/1240966

https://bugzilla.suse.com/1241148

https://bugzilla.suse.com/1241266

https://bugzilla.suse.com/1241282

https://bugzilla.suse.com/1241305

https://bugzilla.suse.com/1241319

https://bugzilla.suse.com/1241332

https://bugzilla.suse.com/1241333

https://bugzilla.suse.com/1241341

https://bugzilla.suse.com/1241343

https://bugzilla.suse.com/1241344

https://bugzilla.suse.com/1241347

https://bugzilla.suse.com/1241351

https://bugzilla.suse.com/1241357

https://bugzilla.suse.com/1241361

https://bugzilla.suse.com/1241369

https://bugzilla.suse.com/1241376

https://bugzilla.suse.com/1241388

https://bugzilla.suse.com/1241402

https://bugzilla.suse.com/1241412

https://bugzilla.suse.com/1241413

https://bugzilla.suse.com/1241419

https://bugzilla.suse.com/1241424

https://bugzilla.suse.com/1241436

https://bugzilla.suse.com/1241441

https://bugzilla.suse.com/1241442

https://bugzilla.suse.com/1241443

https://bugzilla.suse.com/1241448

https://bugzilla.suse.com/1241456

https://bugzilla.suse.com/1241458

https://bugzilla.suse.com/1241459

https://bugzilla.suse.com/1241492

https://bugzilla.suse.com/1241512

https://bugzilla.suse.com/1241525

https://bugzilla.suse.com/1241528

https://bugzilla.suse.com/1241533

https://bugzilla.suse.com/1241535

https://bugzilla.suse.com/1241541

https://bugzilla.suse.com/1241545

https://bugzilla.suse.com/1241550

https://bugzilla.suse.com/1241573

https://bugzilla.suse.com/1241574

https://bugzilla.suse.com/1241575

https://bugzilla.suse.com/1241581

https://bugzilla.suse.com/1241590

https://bugzilla.suse.com/1241596

https://bugzilla.suse.com/1241597

https://bugzilla.suse.com/1241598

https://bugzilla.suse.com/1241599

https://bugzilla.suse.com/1241601

https://bugzilla.suse.com/1241627

https://bugzilla.suse.com/1241628

https://bugzilla.suse.com/1241638

https://bugzilla.suse.com/1241648

https://bugzilla.suse.com/1241657

https://bugzilla.suse.com/1242006

https://bugzilla.suse.com/1242012

https://bugzilla.suse.com/1242119

https://bugzilla.suse.com/1242125

https://bugzilla.suse.com/1242172

https://bugzilla.suse.com/1242203

https://bugzilla.suse.com/1242205

https://bugzilla.suse.com/1242283

https://bugzilla.suse.com/1242307

https://bugzilla.suse.com/1242313

https://bugzilla.suse.com/1242314

https://bugzilla.suse.com/1242315

https://bugzilla.suse.com/1242321

https://bugzilla.suse.com/1242326

https://bugzilla.suse.com/1242327

https://bugzilla.suse.com/1242328

https://bugzilla.suse.com/1242332

https://bugzilla.suse.com/1242333

https://bugzilla.suse.com/1242335

https://bugzilla.suse.com/1242336

https://bugzilla.suse.com/1242342

https://bugzilla.suse.com/1242343

https://bugzilla.suse.com/1242344

https://bugzilla.suse.com/1242345

https://bugzilla.suse.com/1242346

https://bugzilla.suse.com/1242347

https://bugzilla.suse.com/1242348

https://bugzilla.suse.com/1242414

https://bugzilla.suse.com/1242417

https://bugzilla.suse.com/1242502

https://bugzilla.suse.com/1242506

https://bugzilla.suse.com/1242507

https://bugzilla.suse.com/1242509

https://bugzilla.suse.com/1242510

https://bugzilla.suse.com/1242513

https://bugzilla.suse.com/1242520

https://bugzilla.suse.com/1242523

https://bugzilla.suse.com/1242526

https://bugzilla.suse.com/1242528

https://bugzilla.suse.com/1242533

https://bugzilla.suse.com/1242534

https://bugzilla.suse.com/1242535

https://bugzilla.suse.com/1242536

https://bugzilla.suse.com/1242537

https://bugzilla.suse.com/1242538

https://bugzilla.suse.com/1242539

https://bugzilla.suse.com/1242540

https://bugzilla.suse.com/1242546

https://bugzilla.suse.com/1242556

https://bugzilla.suse.com/1242585

https://bugzilla.suse.com/1242596

https://bugzilla.suse.com/1242710

https://bugzilla.suse.com/1242762

https://bugzilla.suse.com/1242763

https://bugzilla.suse.com/1242778

https://bugzilla.suse.com/1242786

https://bugzilla.suse.com/1242831

https://bugzilla.suse.com/1242852

https://bugzilla.suse.com/1242854

https://bugzilla.suse.com/1242856

https://bugzilla.suse.com/1242859

https://bugzilla.suse.com/1242860

https://bugzilla.suse.com/1242861

https://bugzilla.suse.com/1242866

https://bugzilla.suse.com/1242867

https://bugzilla.suse.com/1242868

https://bugzilla.suse.com/1242875

https://bugzilla.suse.com/1242924

https://bugzilla.suse.com/1242944

https://bugzilla.suse.com/1242951

https://bugzilla.suse.com/1242962

https://bugzilla.suse.com/1242985

https://bugzilla.suse.com/1242993

https://bugzilla.suse.com/1243020

https://bugzilla.suse.com/1243044

https://bugzilla.suse.com/1243056

https://bugzilla.suse.com/1243077

https://bugzilla.suse.com/1243090

https://bugzilla.suse.com/1243115

https://bugzilla.suse.com/1243116

https://bugzilla.suse.com/1243215

https://bugzilla.suse.com/1243341

https://bugzilla.suse.com/1243342

https://bugzilla.suse.com/1243513

https://bugzilla.suse.com/1243519

https://bugzilla.suse.com/1243539

https://bugzilla.suse.com/1243541

https://bugzilla.suse.com/1243547

https://bugzilla.suse.com/1243657

https://bugzilla.suse.com/1243658

https://bugzilla.suse.com/1243737

https://bugzilla.suse.com/1243805

https://bugzilla.suse.com/1243817

https://bugzilla.suse.com/1243919

https://bugzilla.suse.com/1243963

https://lists.suse.com/pipermail/sle-updates/2025-June/040321.html

https://www.suse.com/security/cve/CVE-2023-53034

https://www.suse.com/security/cve/CVE-2024-27018

https://www.suse.com/security/cve/CVE-2024-27415

https://www.suse.com/security/cve/CVE-2024-28956

https://www.suse.com/security/cve/CVE-2024-35840

https://www.suse.com/security/cve/CVE-2024-46713

https://www.suse.com/security/cve/CVE-2024-46763

https://www.suse.com/security/cve/CVE-2024-46865

https://www.suse.com/security/cve/CVE-2024-50083

https://www.suse.com/security/cve/CVE-2024-50106

https://www.suse.com/security/cve/CVE-2024-50223

https://www.suse.com/security/cve/CVE-2024-54458

https://www.suse.com/security/cve/CVE-2024-56641

https://www.suse.com/security/cve/CVE-2024-56702

https://www.suse.com/security/cve/CVE-2024-57998

https://www.suse.com/security/cve/CVE-2024-58001

https://www.suse.com/security/cve/CVE-2024-58070

https://www.suse.com/security/cve/CVE-2024-58093

https://www.suse.com/security/cve/CVE-2024-58094

https://www.suse.com/security/cve/CVE-2024-58095

https://www.suse.com/security/cve/CVE-2024-58096

https://www.suse.com/security/cve/CVE-2024-58097

https://www.suse.com/security/cve/CVE-2025-21648

https://www.suse.com/security/cve/CVE-2025-21683

https://www.suse.com/security/cve/CVE-2025-21702

https://www.suse.com/security/cve/CVE-2025-21707

https://www.suse.com/security/cve/CVE-2025-21758

https://www.suse.com/security/cve/CVE-2025-21768

https://www.suse.com/security/cve/CVE-2025-21787

https://www.suse.com/security/cve/CVE-2025-21792

https://www.suse.com/security/cve/CVE-2025-21814

https://www.suse.com/security/cve/CVE-2025-21852

https://www.suse.com/security/cve/CVE-2025-21853

https://www.suse.com/security/cve/CVE-2025-21919

https://www.suse.com/security/cve/CVE-2025-21929

https://www.suse.com/security/cve/CVE-2025-21962

https://www.suse.com/security/cve/CVE-2025-21963

https://www.suse.com/security/cve/CVE-2025-21964

https://www.suse.com/security/cve/CVE-2025-22018

https://www.suse.com/security/cve/CVE-2025-22021

https://www.suse.com/security/cve/CVE-2025-22025

https://www.suse.com/security/cve/CVE-2025-22027

https://www.suse.com/security/cve/CVE-2025-22030

https://www.suse.com/security/cve/CVE-2025-22033

https://www.suse.com/security/cve/CVE-2025-22044

https://www.suse.com/security/cve/CVE-2025-22050

https://www.suse.com/security/cve/CVE-2025-22056

https://www.suse.com/security/cve/CVE-2025-22057

https://www.suse.com/security/cve/CVE-2025-22058

https://www.suse.com/security/cve/CVE-2025-22062

https://www.suse.com/security/cve/CVE-2025-22063

https://www.suse.com/security/cve/CVE-2025-22064

https://www.suse.com/security/cve/CVE-2025-22065

Plugin Details

Severity: Medium

ID: 240815

File Name: suse_SU-2025-01972-1.nasl

Version: 1.1

Type: local

Agent: unix

Published: 6/27/2025

Updated: 6/27/2025

Supported Sensors: Nessus Agent, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.3

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5

Vector: CVSS2#AV:L/AC:L/Au:S/C:C/I:C/A:C

CVSS Score Source: CVE-2025-37803

CVSS v3

Risk Factor: High

Base Score: 7.8

Temporal Score: 6.8

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

CVSS v4

Risk Factor: Medium

Base Score: 5.7

Threat Score: 1.9

Threat Vector: CVSS:4.0/E:U

Vector: CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

CVSS Score Source: CVE-2024-28956

Vulnerability Information

CPE: p-cpe:/a:novell:suse_linux:kernel-livepatch-6_4_0-150700_7_3-rt, cpe:/o:novell:suse_linux:15

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 6/17/2025

Vulnerability Publication Date: 2/15/2024

Reference Information

CVE: CVE-2023-53034, CVE-2024-27018, CVE-2024-27415, CVE-2024-28956, CVE-2024-35840, CVE-2024-46713, CVE-2024-46763, CVE-2024-46865, CVE-2024-50083, CVE-2024-50106, CVE-2024-50223, CVE-2024-54458, CVE-2024-56641, CVE-2024-56702, CVE-2024-57998, CVE-2024-58001, CVE-2024-58070, CVE-2024-58093, CVE-2024-58094, CVE-2024-58095, CVE-2024-58096, CVE-2024-58097, CVE-2025-21648, CVE-2025-21683, CVE-2025-21702, CVE-2025-21707, CVE-2025-21758, CVE-2025-21768, CVE-2025-21787, CVE-2025-21792, CVE-2025-21814, CVE-2025-21852, CVE-2025-21853, CVE-2025-21919, CVE-2025-21929, CVE-2025-21962, CVE-2025-21963, CVE-2025-21964, CVE-2025-22018, CVE-2025-22021, CVE-2025-22025, CVE-2025-22027, CVE-2025-22030, CVE-2025-22033, CVE-2025-22044, CVE-2025-22050, CVE-2025-22056, CVE-2025-22057, CVE-2025-22058, CVE-2025-22062, CVE-2025-22063, CVE-2025-22064, CVE-2025-22065, CVE-2025-22070, CVE-2025-22075, CVE-2025-22085, CVE-2025-22086, CVE-2025-22088, CVE-2025-22091, CVE-2025-22093, CVE-2025-22094, CVE-2025-22097, CVE-2025-22102, CVE-2025-22103, CVE-2025-22104, CVE-2025-22107, CVE-2025-22108, CVE-2025-22109, CVE-2025-22112, CVE-2025-22116, CVE-2025-22125, CVE-2025-22126, CVE-2025-22128, CVE-2025-23129, CVE-2025-23131, CVE-2025-23134, CVE-2025-23136, CVE-2025-23138, CVE-2025-23140, CVE-2025-23145, CVE-2025-23150, CVE-2025-23154, CVE-2025-23160, CVE-2025-37747, CVE-2025-37748, CVE-2025-37749, CVE-2025-37750, CVE-2025-37755, CVE-2025-37773, CVE-2025-37780, CVE-2025-37787, CVE-2025-37789, CVE-2025-37790, CVE-2025-37797, CVE-2025-37798, CVE-2025-37799, CVE-2025-37803, CVE-2025-37804, CVE-2025-37809, CVE-2025-37820, CVE-2025-37823, CVE-2025-37824, CVE-2025-37829, CVE-2025-37830, CVE-2025-37831, CVE-2025-37833, CVE-2025-37842, CVE-2025-37870, CVE-2025-37879, CVE-2025-37886, CVE-2025-37887, CVE-2025-37949, CVE-2025-37957, CVE-2025-37958, CVE-2025-37960, CVE-2025-37974, CVE-2025-38152, CVE-2025-38637, CVE-2025-40325

SuSE: SUSE-SU-2025:01972-1