SUSE SLES15 / openSUSE 15 Security Update : kernel (SUSE-SU-2025:02249-1)

high Nessus Plugin ID 241605

Language:

Synopsis

The remote SUSE host is missing one or more security updates.

Description

The remote SUSE Linux SLES15 / SLES_SAP15 / openSUSE 15 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2025:02249-1 advisory.

The SUSE Linux Enterprise 15 SP6 Azure kernel was updated to receive various security bugfixes.

The following security bugs were fixed:

- CVE-2023-52888: media: mediatek: vcodec: Only free buffer VA that is not NULL (bsc#1228557).
- CVE-2024-49568: net/smc: check v2_ext_offset/eid_cnt/ism_gid_cnt when receiving proposal msg (bsc#1235728).
- CVE-2024-57982: xfrm: state: fix out-of-bounds read during lookup (bsc#1237913).
- CVE-2024-58053: rxrpc: Fix handling of received connection abort (bsc#1238982).
- CVE-2025-21720: xfrm: delete intermediate secpath entry in packet offload mode (bsc#1238859).
- CVE-2025-21868: kABI workaround for adding an header (bsc#1240180).
- CVE-2025-21898: ftrace: Avoid potential division by zero in function_stat_show() (bsc#1240610).
- CVE-2025-21899: tracing: Fix bad hist from corrupting named_triggers list (bsc#1240577).
- CVE-2025-21920: vlan: enforce underlying device type (bsc#1240686).
- CVE-2025-21938: mptcp: fix 'scheduling while atomic' in mptcp_pm_nl_append_new_local_addr (bsc#1240723).
- CVE-2025-21959: netfilter: nf_conncount: Fully initialize struct nf_conncount_tuple in insert_tree() (bsc#1240814).
- CVE-2025-21997: xsk: fix an integer overflow in xp_create_and_assign_umem() (bsc#1240823).
- CVE-2025-22035: tracing: Fix use-after-free in print_graph_function_flags during tracer switching (bsc#1241544).
- CVE-2025-22111: kABI fix for net: Remove RTNL dance for SIOCBRADDIF and SIOCBRDELIF (bsc#1241572).
- CVE-2025-22113: ext4: define ext4_journal_destroy wrapper (bsc#1241617).
- CVE-2025-23155: net: stmmac: Fix accessing freed irq affinity_hint (bsc#1242573).
- CVE-2025-37738: ext4: ignore xattrs past end (bsc#1242846).
- CVE-2025-37743: wifi: ath12k: Avoid memory leak while enabling statistics (bsc#1242163).
- CVE-2025-37752: net_sched: sch_sfq: move the limit validation (bsc#1242504).
- CVE-2025-37756: net: tls: explicitly disallow disconnect (bsc#1242515).
- CVE-2025-37757: tipc: fix memory leak in tipc_link_xmit (bsc#1242521).
- CVE-2025-37786: net: dsa: free routing table on probe failure (bsc#1242725).
- CVE-2025-37800: driver core: fix potential NULL pointer dereference in dev_uevent() (bsc#1242849).
- CVE-2025-37801: spi: spi-imx: Add check for spi_imx_setupxfer() (bsc#1242850).
- CVE-2025-37811: usb: chipidea: ci_hdrc_imx: fix usbmisc handling (bsc#1242907).
- CVE-2025-37844: cifs: avoid NULL pointer dereference in dbg call (bsc#1242946).
- CVE-2025-37859: page_pool: avoid infinite loop to schedule delayed worker (bsc#1243051).
- CVE-2025-37862: HID: pidff: Fix null pointer dereference in pidff_find_fields (bsc#1242982).
- CVE-2025-37865: net: dsa: mv88e6xxx: fix -ENOENT when deleting VLANs and MST is unsupported (bsc#1242954).
- CVE-2025-37874: net: ngbe: fix memory leak in ngbe_probe() error path (bsc#1242940).
- CVE-2025-37884: bpf: Fix deadlock between rcu_tasks_trace and event_mutex (bsc#1243060).
- CVE-2025-37909: net: lan743x: Fix memleak issue when GSO enabled (bsc#1243467).
- CVE-2025-37917: net: ethernet: mtk-star-emac: fix spinlock recursion issues on rx/tx poll (bsc#1243475).
- CVE-2025-37921: vxlan: vnifilter: Fix unlocked deletion of default FDB entry (bsc#1243480).
- CVE-2025-37923: tracing: Fix oob write in trace_seq_to_buffer() (bsc#1243551).
- CVE-2025-37927: iommu/amd: Fix potential buffer overflow in parse_ivrs_acpihid (bsc#1243620).
- CVE-2025-37933: octeon_ep: Fix host hang issue during device reboot (bsc#1243628).
- CVE-2025-37936: perf/x86/intel: KVM: Mask PEBS_ENABLE loaded for guest with vCPU's value (bsc#1243537).
- CVE-2025-37938: tracing: Verify event formats that have '%*p..' (bsc#1243544).
- CVE-2025-37945: net: phy: allow MDIO bus PM ops to start/stop state machine for phylink-controlled PHY (bsc#1243538).
- CVE-2025-37961: ipvs: fix uninit-value for saddr in do_output_route4 (bsc#1243523).
- CVE-2025-37967: usb: typec: ucsi: displayport: Fix deadlock (bsc#1243572).
- CVE-2025-37968: iio: light: opt3001: fix deadlock due to concurrent flag access (bsc#1243571).
- CVE-2025-37987: pds_core: Prevent possible adminq overflow/stuck condition (bsc#1243542).
- CVE-2025-37992: net_sched: Flush gso_skb list too during ->change() (bsc#1243698).
- CVE-2025-37995: module: ensure that kobject_put() is safe for module type kobjects (bsc#1243827).
- CVE-2025-37997: netfilter: ipset: fix region locking in hash types (bsc#1243832).
- CVE-2025-37998: openvswitch: Fix unsafe attribute parsing in output_userspace() (bsc#1243836).
- CVE-2025-38000: sch_hfsc: Fix qlen accounting bug when using peek in hfsc_enqueue() (bsc#1244277).
- CVE-2025-38001: net_sched: hfsc: Address reentrant enqueue adding class to eltree twice (bsc#1244234).
- CVE-2025-38011: drm/amdgpu: csa unmap use uninterruptible lock (bsc#1244729).
- CVE-2025-38018: net/tls: fix kernel panic when alloc_page failed (bsc#1244999).
- CVE-2025-38053: idpf: fix null-ptr-deref in idpf_features_check (bsc#1244746).
- CVE-2025-38057: espintcp: fix skb leaks (bsc#1244862).
- CVE-2025-38060: bpf: abort verification if env->cur_state->loop_entry != NULL (bsc#1245155).
- CVE-2025-38072: libnvdimm/labels: Fix divide error in nd_label_data_init() (bsc#1244743).


Tenable has extracted the preceding description block directly from the SUSE security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://bugzilla.suse.com/1151679

https://bugzilla.suse.com/1151680

https://bugzilla.suse.com/1151794

https://bugzilla.suse.com/1151927

https://bugzilla.suse.com/1210025

https://bugzilla.suse.com/1211226

https://bugzilla.suse.com/1215199

https://bugzilla.suse.com/1218184

https://bugzilla.suse.com/1223008

https://bugzilla.suse.com/1228557

https://bugzilla.suse.com/1228854

https://bugzilla.suse.com/1232504

https://bugzilla.suse.com/1232882

https://bugzilla.suse.com/1235490

https://bugzilla.suse.com/1235728

https://bugzilla.suse.com/1236208

https://bugzilla.suse.com/1237312

https://bugzilla.suse.com/1237913

https://bugzilla.suse.com/1238859

https://bugzilla.suse.com/1238982

https://bugzilla.suse.com/1240180

https://bugzilla.suse.com/1240577

https://bugzilla.suse.com/1240610

https://bugzilla.suse.com/1240686

https://bugzilla.suse.com/1240723

https://bugzilla.suse.com/1240814

https://bugzilla.suse.com/1240823

https://bugzilla.suse.com/1241166

https://bugzilla.suse.com/1241278

https://bugzilla.suse.com/1241414

https://bugzilla.suse.com/1241544

https://bugzilla.suse.com/1241572

https://bugzilla.suse.com/1241592

https://bugzilla.suse.com/1241617

https://bugzilla.suse.com/1242086

https://bugzilla.suse.com/1242163

https://bugzilla.suse.com/1242504

https://bugzilla.suse.com/1242515

https://bugzilla.suse.com/1242521

https://bugzilla.suse.com/1242556

https://bugzilla.suse.com/1242573

https://bugzilla.suse.com/1242725

https://bugzilla.suse.com/1242846

https://bugzilla.suse.com/1242849

https://bugzilla.suse.com/1242850

https://bugzilla.suse.com/1242907

https://bugzilla.suse.com/1242940

https://bugzilla.suse.com/1242946

https://bugzilla.suse.com/1242954

https://bugzilla.suse.com/1242982

https://bugzilla.suse.com/1243051

https://bugzilla.suse.com/1243060

https://bugzilla.suse.com/1243342

https://bugzilla.suse.com/1243467

https://bugzilla.suse.com/1243475

https://bugzilla.suse.com/1243480

https://bugzilla.suse.com/1243506

https://bugzilla.suse.com/1243523

https://bugzilla.suse.com/1243537

https://bugzilla.suse.com/1243538

https://bugzilla.suse.com/1243542

https://bugzilla.suse.com/1243544

https://bugzilla.suse.com/1243551

https://bugzilla.suse.com/1243571

https://bugzilla.suse.com/1243572

https://bugzilla.suse.com/1243620

https://bugzilla.suse.com/1243628

https://bugzilla.suse.com/1243698

https://bugzilla.suse.com/1243774

https://bugzilla.suse.com/1243782

https://bugzilla.suse.com/1243823

https://bugzilla.suse.com/1243827

https://bugzilla.suse.com/1243832

https://bugzilla.suse.com/1243836

https://bugzilla.suse.com/1243847

https://bugzilla.suse.com/1244100

https://bugzilla.suse.com/1244145

https://bugzilla.suse.com/1244172

https://bugzilla.suse.com/1244176

https://bugzilla.suse.com/1244229

https://bugzilla.suse.com/1244234

https://bugzilla.suse.com/1244241

https://bugzilla.suse.com/1244261

https://www.suse.com/security/cve/CVE-2025-38007

https://www.suse.com/security/cve/CVE-2025-38009

https://www.suse.com/security/cve/CVE-2025-38010

https://www.suse.com/security/cve/CVE-2025-38011

https://www.suse.com/security/cve/CVE-2025-38013

https://www.suse.com/security/cve/CVE-2025-38014

https://www.suse.com/security/cve/CVE-2025-38015

https://www.suse.com/security/cve/CVE-2025-38018

https://www.suse.com/security/cve/CVE-2025-38020

https://www.suse.com/security/cve/CVE-2025-38022

https://www.suse.com/security/cve/CVE-2025-38023

https://www.suse.com/security/cve/CVE-2025-38024

https://www.suse.com/security/cve/CVE-2025-38027

https://www.suse.com/security/cve/CVE-2025-38031

https://www.suse.com/security/cve/CVE-2025-38040

https://www.suse.com/security/cve/CVE-2025-38043

https://www.suse.com/security/cve/CVE-2025-38044

https://www.suse.com/security/cve/CVE-2025-38045

https://www.suse.com/security/cve/CVE-2025-38053

https://www.suse.com/security/cve/CVE-2025-38057

https://www.suse.com/security/cve/CVE-2025-38059

https://www.suse.com/security/cve/CVE-2025-38060

https://www.suse.com/security/cve/CVE-2025-38065

https://www.suse.com/security/cve/CVE-2025-38068

https://www.suse.com/security/cve/CVE-2025-38072

https://www.suse.com/security/cve/CVE-2025-38077

https://www.suse.com/security/cve/CVE-2025-38078

https://www.suse.com/security/cve/CVE-2025-38079

https://www.suse.com/security/cve/CVE-2025-38080

https://www.suse.com/security/cve/CVE-2025-38081

https://www.suse.com/security/cve/CVE-2025-38083

https://bugzilla.suse.com/1244274

https://bugzilla.suse.com/1244275

https://bugzilla.suse.com/1244277

https://bugzilla.suse.com/1244309

https://bugzilla.suse.com/1244313

https://bugzilla.suse.com/1244337

https://bugzilla.suse.com/1244626

https://bugzilla.suse.com/1244725

https://bugzilla.suse.com/1244727

https://bugzilla.suse.com/1244729

https://bugzilla.suse.com/1244731

https://bugzilla.suse.com/1244732

https://bugzilla.suse.com/1244736

https://bugzilla.suse.com/1244737

https://bugzilla.suse.com/1244738

https://bugzilla.suse.com/1244739

https://bugzilla.suse.com/1244743

https://bugzilla.suse.com/1244746

https://bugzilla.suse.com/1244759

https://bugzilla.suse.com/1244789

https://bugzilla.suse.com/1244862

https://bugzilla.suse.com/1244906

https://bugzilla.suse.com/1244938

https://bugzilla.suse.com/1244995

https://bugzilla.suse.com/1244996

https://bugzilla.suse.com/1244999

https://bugzilla.suse.com/1245001

https://bugzilla.suse.com/1245003

https://bugzilla.suse.com/1245004

https://bugzilla.suse.com/1245025

https://bugzilla.suse.com/1245042

https://bugzilla.suse.com/1245046

https://bugzilla.suse.com/1245078

https://bugzilla.suse.com/1245081

https://bugzilla.suse.com/1245082

https://bugzilla.suse.com/1245083

https://bugzilla.suse.com/1245155

https://bugzilla.suse.com/1245183

https://bugzilla.suse.com/1245193

https://bugzilla.suse.com/1245210

https://bugzilla.suse.com/1245217

https://bugzilla.suse.com/1245225

https://bugzilla.suse.com/1245226

https://bugzilla.suse.com/1245228

https://bugzilla.suse.com/1245431

https://bugzilla.suse.com/1245455

https://lists.suse.com/pipermail/sle-updates/2025-July/040634.html

https://www.suse.com/security/cve/CVE-2023-52888

https://www.suse.com/security/cve/CVE-2024-26831

https://www.suse.com/security/cve/CVE-2024-49568

https://www.suse.com/security/cve/CVE-2024-50106

https://www.suse.com/security/cve/CVE-2024-56613

https://www.suse.com/security/cve/CVE-2024-56699

https://www.suse.com/security/cve/CVE-2024-57982

https://www.suse.com/security/cve/CVE-2024-58053

https://www.suse.com/security/cve/CVE-2025-21658

https://www.suse.com/security/cve/CVE-2025-21720

https://www.suse.com/security/cve/CVE-2025-21868

https://www.suse.com/security/cve/CVE-2025-21898

https://www.suse.com/security/cve/CVE-2025-21899

https://www.suse.com/security/cve/CVE-2025-21920

https://www.suse.com/security/cve/CVE-2025-21938

https://www.suse.com/security/cve/CVE-2025-21959

https://www.suse.com/security/cve/CVE-2025-21997

https://www.suse.com/security/cve/CVE-2025-22035

https://www.suse.com/security/cve/CVE-2025-22083

https://www.suse.com/security/cve/CVE-2025-22111

https://www.suse.com/security/cve/CVE-2025-22113

https://www.suse.com/security/cve/CVE-2025-22120

https://www.suse.com/security/cve/CVE-2025-23155

https://www.suse.com/security/cve/CVE-2025-37738

https://www.suse.com/security/cve/CVE-2025-37743

https://www.suse.com/security/cve/CVE-2025-37752

https://www.suse.com/security/cve/CVE-2025-37756

https://www.suse.com/security/cve/CVE-2025-37757

https://www.suse.com/security/cve/CVE-2025-37786

https://www.suse.com/security/cve/CVE-2025-37800

https://www.suse.com/security/cve/CVE-2025-37801

https://www.suse.com/security/cve/CVE-2025-37811

https://www.suse.com/security/cve/CVE-2025-37844

https://www.suse.com/security/cve/CVE-2025-37859

https://www.suse.com/security/cve/CVE-2025-37862

https://www.suse.com/security/cve/CVE-2025-37865

https://www.suse.com/security/cve/CVE-2025-37874

https://www.suse.com/security/cve/CVE-2025-37884

https://www.suse.com/security/cve/CVE-2025-37909

https://www.suse.com/security/cve/CVE-2025-37917

https://www.suse.com/security/cve/CVE-2025-37921

https://www.suse.com/security/cve/CVE-2025-37923

https://www.suse.com/security/cve/CVE-2025-37927

https://www.suse.com/security/cve/CVE-2025-37933

https://www.suse.com/security/cve/CVE-2025-37936

https://www.suse.com/security/cve/CVE-2025-37938

https://www.suse.com/security/cve/CVE-2025-37945

https://www.suse.com/security/cve/CVE-2025-37946

https://www.suse.com/security/cve/CVE-2025-37961

https://www.suse.com/security/cve/CVE-2025-37967

https://www.suse.com/security/cve/CVE-2025-37968

https://www.suse.com/security/cve/CVE-2025-37973

https://www.suse.com/security/cve/CVE-2025-37987

https://www.suse.com/security/cve/CVE-2025-37992

https://www.suse.com/security/cve/CVE-2025-37994

https://www.suse.com/security/cve/CVE-2025-37995

https://www.suse.com/security/cve/CVE-2025-37997

https://www.suse.com/security/cve/CVE-2025-37998

https://www.suse.com/security/cve/CVE-2025-38000

https://www.suse.com/security/cve/CVE-2025-38001

https://www.suse.com/security/cve/CVE-2025-38003

https://www.suse.com/security/cve/CVE-2025-38004

https://www.suse.com/security/cve/CVE-2025-38005

Plugin Details

Severity: High

ID: 241605

File Name: suse_SU-2025-02249-1.nasl

Version: 1.1

Type: local

Agent: unix

Published: 7/9/2025

Updated: 7/9/2025

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: Critical

Score: 9.2

CVSS v2

Risk Factor: Medium

Base Score: 6.2

Temporal Score: 4.6

Vector: CVSS2#AV:L/AC:L/Au:S/C:C/I:N/A:C

CVSS Score Source: CVE-2025-21920

CVSS v3

Risk Factor: High

Base Score: 7.1

Temporal Score: 6.2

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:novell:suse_linux:kernel-source-azure, p-cpe:/a:novell:suse_linux:kernel-syms-azure, p-cpe:/a:novell:suse_linux:kernel-azure-devel, p-cpe:/a:novell:suse_linux:kernel-devel-azure, p-cpe:/a:novell:suse_linux:kernel-azure, cpe:/o:novell:suse_linux:15

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 7/8/2025

Vulnerability Publication Date: 4/17/2024

Reference Information

CVE: CVE-2023-52888, CVE-2024-26831, CVE-2024-49568, CVE-2024-50106, CVE-2024-56613, CVE-2024-56699, CVE-2024-57982, CVE-2024-58053, CVE-2025-21658, CVE-2025-21720, CVE-2025-21868, CVE-2025-21898, CVE-2025-21899, CVE-2025-21920, CVE-2025-21938, CVE-2025-21959, CVE-2025-21997, CVE-2025-22035, CVE-2025-22083, CVE-2025-22111, CVE-2025-22113, CVE-2025-22120, CVE-2025-23155, CVE-2025-37738, CVE-2025-37743, CVE-2025-37752, CVE-2025-37756, CVE-2025-37757, CVE-2025-37786, CVE-2025-37800, CVE-2025-37801, CVE-2025-37811, CVE-2025-37844, CVE-2025-37859, CVE-2025-37862, CVE-2025-37865, CVE-2025-37874, CVE-2025-37884, CVE-2025-37909, CVE-2025-37917, CVE-2025-37921, CVE-2025-37923, CVE-2025-37927, CVE-2025-37933, CVE-2025-37936, CVE-2025-37938, CVE-2025-37945, CVE-2025-37946, CVE-2025-37961, CVE-2025-37967, CVE-2025-37968, CVE-2025-37973, CVE-2025-37987, CVE-2025-37992, CVE-2025-37994, CVE-2025-37995, CVE-2025-37997, CVE-2025-37998, CVE-2025-38000, CVE-2025-38001, CVE-2025-38003, CVE-2025-38004, CVE-2025-38005, CVE-2025-38007, CVE-2025-38009, CVE-2025-38010, CVE-2025-38011, CVE-2025-38013, CVE-2025-38014, CVE-2025-38015, CVE-2025-38018, CVE-2025-38020, CVE-2025-38022, CVE-2025-38023, CVE-2025-38024, CVE-2025-38027, CVE-2025-38031, CVE-2025-38040, CVE-2025-38043, CVE-2025-38044, CVE-2025-38045, CVE-2025-38053, CVE-2025-38057, CVE-2025-38059, CVE-2025-38060, CVE-2025-38065, CVE-2025-38068, CVE-2025-38072, CVE-2025-38077, CVE-2025-38078, CVE-2025-38079, CVE-2025-38080, CVE-2025-38081, CVE-2025-38083

SuSE: SUSE-SU-2025:02249-1