SUSE SLES15 Security Update : kernel (SUSE-SU-2025:02308-1)

high Nessus Plugin ID 242100

Synopsis

The remote SUSE host is missing one or more security updates.

Description

The remote SUSE Linux SLES15 / SLES_SAP15 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2025:02308-1 advisory.

The SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security bugfixes.


The following security bugs were fixed:

- CVE-2022-50085: dm raid: fix address sanitizer warning in raid_resume (bsc#1245147).
- CVE-2022-50087: firmware: arm_scpi: Ensure scpi_info is not assigned if the probe fails (bsc#1245119).
- CVE-2022-50200: selinux: Add boundary check in put_entry() (bsc#1245149).
- CVE-2024-26924: scsi: lpfc: Release hbalock before calling lpfc_worker_wake_up() (bsc#1225820).
- CVE-2024-27397: kabi: place tstamp needed for nftables set in a hole (bsc#1224095).
- CVE-2024-36978: net: sched: sch_multiq: fix possible OOB write in multiq_tune() (bsc#1226514).
- CVE-2024-46800: sch/netem: fix use after free in netem_dequeue (bsc#1230827).
- CVE-2024-53141: netfilter: ipset: add missing range check in bitmap_ip_uadt (bsc#1234381).
- CVE-2024-56770: sch/netem: fix use after free in netem_dequeue (bsc#1235637).
- CVE-2025-21700: net: sched: Disallow replacing of child qdisc from one parent to another (bsc#1237159).
- CVE-2025-21702: pfifo_tail_enqueue: Drop new packet when sch->limit == 0 (bsc#1237312).
- CVE-2025-21703: netem: Update sch->q.qlen before qdisc_tree_reduce_backlog() (bsc#1237313).
- CVE-2025-37752: net_sched: sch_sfq: move the limit validation (bsc#1242504).
- CVE-2025-37823: net_sched: hfsc: Fix a potential UAF in hfsc_dequeue() too (bsc#1242924).
- CVE-2025-37890: net_sched: hfsc: Fix a UAF vulnerability in class with netem as child qdisc (bsc#1243330).
- CVE-2025-37997: netfilter: ipset: fix region locking in hash types (bsc#1243832).
- CVE-2025-38000: sch_hfsc: Fix qlen accounting bug when using peek in hfsc_enqueue() (bsc#1244277).
- CVE-2025-38001: net_sched: hfsc: Address reentrant enqueue adding class to eltree twice (bsc#1244234).
- CVE-2025-38083: net_sched: prio: fix a race in prio_tune() (bsc#1245183).


Tenable has extracted the preceding description block directly from the SUSE security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://bugzilla.suse.com/1065729

https://bugzilla.suse.com/1156395

https://bugzilla.suse.com/1199487

https://bugzilla.suse.com/1201160

https://bugzilla.suse.com/1201956

https://bugzilla.suse.com/1202095

https://bugzilla.suse.com/1202564

https://bugzilla.suse.com/1202716

https://bugzilla.suse.com/1202810

https://bugzilla.suse.com/1202860

https://bugzilla.suse.com/1205220

https://bugzilla.suse.com/1205514

https://bugzilla.suse.com/1206664

https://bugzilla.suse.com/1206878

https://bugzilla.suse.com/1206880

https://bugzilla.suse.com/1211226

https://bugzilla.suse.com/1212051

https://bugzilla.suse.com/1218184

https://bugzilla.suse.com/1224095

https://bugzilla.suse.com/1225820

https://bugzilla.suse.com/1226514

https://bugzilla.suse.com/1228659

https://bugzilla.suse.com/1230827

https://bugzilla.suse.com/1231293

https://bugzilla.suse.com/1232504

https://bugzilla.suse.com/1234381

https://bugzilla.suse.com/1234454

https://bugzilla.suse.com/1235637

https://bugzilla.suse.com/1237159

https://bugzilla.suse.com/1237312

https://bugzilla.suse.com/1237313

https://bugzilla.suse.com/1238303

https://bugzilla.suse.com/1238471

https://bugzilla.suse.com/1238570

https://bugzilla.suse.com/1239986

https://bugzilla.suse.com/1240785

https://bugzilla.suse.com/1241038

https://bugzilla.suse.com/1242414

https://bugzilla.suse.com/1242504

https://bugzilla.suse.com/1242924

https://bugzilla.suse.com/1243001

https://bugzilla.suse.com/1243330

https://bugzilla.suse.com/1243543

https://bugzilla.suse.com/1243627

https://bugzilla.suse.com/1243832

https://bugzilla.suse.com/1244234

https://bugzilla.suse.com/1244241

https://bugzilla.suse.com/1244277

https://bugzilla.suse.com/1244337

https://bugzilla.suse.com/1244764

https://bugzilla.suse.com/1244767

https://bugzilla.suse.com/1244770

https://bugzilla.suse.com/1244771

https://bugzilla.suse.com/1244773

https://bugzilla.suse.com/1244774

https://bugzilla.suse.com/1244776

https://bugzilla.suse.com/1244779

https://bugzilla.suse.com/1244782

https://bugzilla.suse.com/1244783

https://bugzilla.suse.com/1244786

https://bugzilla.suse.com/1244788

https://bugzilla.suse.com/1244790

https://bugzilla.suse.com/1244793

https://bugzilla.suse.com/1244794

https://bugzilla.suse.com/1244796

https://bugzilla.suse.com/1244797

https://bugzilla.suse.com/1244804

https://bugzilla.suse.com/1244813

https://bugzilla.suse.com/1244815

https://bugzilla.suse.com/1244816

https://bugzilla.suse.com/1244825

https://bugzilla.suse.com/1244834

https://bugzilla.suse.com/1244836

https://bugzilla.suse.com/1244838

https://bugzilla.suse.com/1244839

https://bugzilla.suse.com/1244841

https://bugzilla.suse.com/1244842

https://bugzilla.suse.com/1244845

https://bugzilla.suse.com/1244848

https://bugzilla.suse.com/1244849

https://bugzilla.suse.com/1244851

https://bugzilla.suse.com/1244853

https://bugzilla.suse.com/1244856

https://bugzilla.suse.com/1244861

https://bugzilla.suse.com/1244867

https://bugzilla.suse.com/1244868

https://bugzilla.suse.com/1244869

https://bugzilla.suse.com/1244881

https://bugzilla.suse.com/1244883

https://bugzilla.suse.com/1244884

https://bugzilla.suse.com/1244885

https://bugzilla.suse.com/1244886

https://bugzilla.suse.com/1244887

https://bugzilla.suse.com/1244899

https://bugzilla.suse.com/1244901

https://bugzilla.suse.com/1244902

https://bugzilla.suse.com/1244908

https://bugzilla.suse.com/1244936

https://bugzilla.suse.com/1244941

https://bugzilla.suse.com/1244943

https://bugzilla.suse.com/1244945

https://bugzilla.suse.com/1244948

https://bugzilla.suse.com/1244950

https://bugzilla.suse.com/1244956

https://bugzilla.suse.com/1244958

https://bugzilla.suse.com/1244959

https://bugzilla.suse.com/1244967

https://bugzilla.suse.com/1244968

https://bugzilla.suse.com/1244969

https://bugzilla.suse.com/1244976

https://bugzilla.suse.com/1244979

https://bugzilla.suse.com/1244984

https://bugzilla.suse.com/1244986

https://bugzilla.suse.com/1244992

https://bugzilla.suse.com/1245006

https://bugzilla.suse.com/1245007

https://bugzilla.suse.com/1245024

https://bugzilla.suse.com/1245031

https://bugzilla.suse.com/1245033

https://bugzilla.suse.com/1245041

https://bugzilla.suse.com/1245047

https://bugzilla.suse.com/1245051

https://bugzilla.suse.com/1245057

https://bugzilla.suse.com/1245058

https://bugzilla.suse.com/1245072

https://bugzilla.suse.com/1245073

https://bugzilla.suse.com/1245098

https://bugzilla.suse.com/1245103

https://bugzilla.suse.com/1245117

https://bugzilla.suse.com/1245119

https://bugzilla.suse.com/1245121

https://bugzilla.suse.com/1245122

https://bugzilla.suse.com/1245125

https://bugzilla.suse.com/1245129

https://bugzilla.suse.com/1245131

https://bugzilla.suse.com/1245135

https://bugzilla.suse.com/1245136

https://bugzilla.suse.com/1245138

https://bugzilla.suse.com/1245139

https://bugzilla.suse.com/1245140

https://bugzilla.suse.com/1245146

https://bugzilla.suse.com/1245147

https://bugzilla.suse.com/1245149

https://bugzilla.suse.com/1245183

https://bugzilla.suse.com/1245195

https://bugzilla.suse.com/1245265

https://bugzilla.suse.com/1245348

https://bugzilla.suse.com/1245455

https://lists.suse.com/pipermail/sle-updates/2025-July/040707.html

https://www.suse.com/security/cve/CVE-2022-1679

https://www.suse.com/security/cve/CVE-2022-2586

https://www.suse.com/security/cve/CVE-2022-2905

https://www.suse.com/security/cve/CVE-2022-3903

https://www.suse.com/security/cve/CVE-2022-4095

https://www.suse.com/security/cve/CVE-2022-4662

https://www.suse.com/security/cve/CVE-2022-49934

https://www.suse.com/security/cve/CVE-2022-49936

https://www.suse.com/security/cve/CVE-2022-49937

https://www.suse.com/security/cve/CVE-2022-49942

https://www.suse.com/security/cve/CVE-2022-49945

https://www.suse.com/security/cve/CVE-2022-49948

https://www.suse.com/security/cve/CVE-2022-49950

https://www.suse.com/security/cve/CVE-2022-49952

https://www.suse.com/security/cve/CVE-2022-49954

https://www.suse.com/security/cve/CVE-2022-49956

https://www.suse.com/security/cve/CVE-2022-49968

https://www.suse.com/security/cve/CVE-2022-49977

https://www.suse.com/security/cve/CVE-2022-49978

https://www.suse.com/security/cve/CVE-2022-49981

https://www.suse.com/security/cve/CVE-2022-49984

https://www.suse.com/security/cve/CVE-2022-49985

https://www.suse.com/security/cve/CVE-2022-49986

https://www.suse.com/security/cve/CVE-2022-49987

https://www.suse.com/security/cve/CVE-2022-49989

https://www.suse.com/security/cve/CVE-2022-49990

https://www.suse.com/security/cve/CVE-2022-49993

https://www.suse.com/security/cve/CVE-2022-50010

https://www.suse.com/security/cve/CVE-2022-50012

https://www.suse.com/security/cve/CVE-2022-50019

https://www.suse.com/security/cve/CVE-2022-50020

https://www.suse.com/security/cve/CVE-2022-50022

https://www.suse.com/security/cve/CVE-2022-50027

https://www.suse.com/security/cve/CVE-2022-50028

https://www.suse.com/security/cve/CVE-2022-50029

https://www.suse.com/security/cve/CVE-2022-50030

https://www.suse.com/security/cve/CVE-2022-50032

https://www.suse.com/security/cve/CVE-2022-50033

https://www.suse.com/security/cve/CVE-2022-50036

https://www.suse.com/security/cve/CVE-2022-50038

https://www.suse.com/security/cve/CVE-2022-50045

https://www.suse.com/security/cve/CVE-2022-50051

https://www.suse.com/security/cve/CVE-2022-50059

https://www.suse.com/security/cve/CVE-2022-50061

https://www.suse.com/security/cve/CVE-2022-50065

https://www.suse.com/security/cve/CVE-2022-50067

https://www.suse.com/security/cve/CVE-2022-50072

https://www.suse.com/security/cve/CVE-2022-50083

https://www.suse.com/security/cve/CVE-2022-50084

https://www.suse.com/security/cve/CVE-2022-50085

https://www.suse.com/security/cve/CVE-2022-50087

https://www.suse.com/security/cve/CVE-2022-50091

https://www.suse.com/security/cve/CVE-2022-50092

https://www.suse.com/security/cve/CVE-2022-50093

https://www.suse.com/security/cve/CVE-2022-50094

https://www.suse.com/security/cve/CVE-2022-50097

https://www.suse.com/security/cve/CVE-2022-50098

https://www.suse.com/security/cve/CVE-2022-50099

https://www.suse.com/security/cve/CVE-2022-50101

https://www.suse.com/security/cve/CVE-2022-50102

https://www.suse.com/security/cve/CVE-2022-50104

https://www.suse.com/security/cve/CVE-2022-50108

https://www.suse.com/security/cve/CVE-2022-50109

https://www.suse.com/security/cve/CVE-2022-50118

https://www.suse.com/security/cve/CVE-2022-50124

https://www.suse.com/security/cve/CVE-2022-50126

https://www.suse.com/security/cve/CVE-2022-50127

https://www.suse.com/security/cve/CVE-2022-50136

https://www.suse.com/security/cve/CVE-2022-50138

https://www.suse.com/security/cve/CVE-2022-50140

https://www.suse.com/security/cve/CVE-2022-50141

https://www.suse.com/security/cve/CVE-2022-50142

https://www.suse.com/security/cve/CVE-2022-50143

https://www.suse.com/security/cve/CVE-2022-50146

https://www.suse.com/security/cve/CVE-2022-50149

https://www.suse.com/security/cve/CVE-2022-50152

https://www.suse.com/security/cve/CVE-2022-50153

https://www.suse.com/security/cve/CVE-2022-50156

https://www.suse.com/security/cve/CVE-2022-50158

https://www.suse.com/security/cve/CVE-2022-50160

https://www.suse.com/security/cve/CVE-2022-50161

https://www.suse.com/security/cve/CVE-2022-50162

https://www.suse.com/security/cve/CVE-2022-50164

https://www.suse.com/security/cve/CVE-2022-50165

https://www.suse.com/security/cve/CVE-2022-50169

https://www.suse.com/security/cve/CVE-2022-50172

https://www.suse.com/security/cve/CVE-2022-50173

https://www.suse.com/security/cve/CVE-2022-50176

https://www.suse.com/security/cve/CVE-2022-50179

https://www.suse.com/security/cve/CVE-2022-50181

https://www.suse.com/security/cve/CVE-2022-50185

https://www.suse.com/security/cve/CVE-2022-50191

https://www.suse.com/security/cve/CVE-2022-50200

https://www.suse.com/security/cve/CVE-2022-50209

https://www.suse.com/security/cve/CVE-2022-50211

https://www.suse.com/security/cve/CVE-2022-50212

https://www.suse.com/security/cve/CVE-2022-50213

https://www.suse.com/security/cve/CVE-2022-50215

https://www.suse.com/security/cve/CVE-2022-50218

https://www.suse.com/security/cve/CVE-2022-50220

https://www.suse.com/security/cve/CVE-2022-50222

https://www.suse.com/security/cve/CVE-2022-50229

https://www.suse.com/security/cve/CVE-2022-50231

https://www.suse.com/security/cve/CVE-2023-3111

https://www.suse.com/security/cve/CVE-2024-26924

https://www.suse.com/security/cve/CVE-2024-27397

https://www.suse.com/security/cve/CVE-2024-36978

https://www.suse.com/security/cve/CVE-2024-46800

https://www.suse.com/security/cve/CVE-2024-53141

https://www.suse.com/security/cve/CVE-2024-56770

https://www.suse.com/security/cve/CVE-2025-21700

https://www.suse.com/security/cve/CVE-2025-21702

https://www.suse.com/security/cve/CVE-2025-21703

https://www.suse.com/security/cve/CVE-2025-37752

https://www.suse.com/security/cve/CVE-2025-37798

https://www.suse.com/security/cve/CVE-2025-37823

https://www.suse.com/security/cve/CVE-2025-37890

https://www.suse.com/security/cve/CVE-2025-37932

https://www.suse.com/security/cve/CVE-2025-37953

https://www.suse.com/security/cve/CVE-2025-37997

https://www.suse.com/security/cve/CVE-2025-38000

https://www.suse.com/security/cve/CVE-2025-38001

https://www.suse.com/security/cve/CVE-2025-38083

Plugin Details

Severity: High

ID: 242100

File Name: suse_SU-2025-02308-1.nasl

Version: 1.1

Type: local

Agent: unix

Published: 7/15/2025

Updated: 7/15/2025

Supported Sensors: Continuous Assessment, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Critical

Score: 9.2

CVSS v2

Risk Factor: High

Base Score: 7.2

Temporal Score: 6

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2022-1679

CVSS v3

Risk Factor: High

Base Score: 7.8

Temporal Score: 7.2

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

CVSS Score Source: CVE-2024-53141

Vulnerability Information

CPE: p-cpe:/a:novell:suse_linux:kernel-macros, p-cpe:/a:novell:suse_linux:kernel-zfcpdump, p-cpe:/a:novell:suse_linux:kernel-64kb-devel, p-cpe:/a:novell:suse_linux:kernel-syms, cpe:/o:novell:suse_linux:15, p-cpe:/a:novell:suse_linux:cluster-md-kmp-default, p-cpe:/a:novell:suse_linux:kernel-obs-build, p-cpe:/a:novell:suse_linux:kernel-default, p-cpe:/a:novell:suse_linux:kernel-source, p-cpe:/a:novell:suse_linux:reiserfs-kmp-default, p-cpe:/a:novell:suse_linux:kernel-preempt-devel, p-cpe:/a:novell:suse_linux:ocfs2-kmp-default, p-cpe:/a:novell:suse_linux:dlm-kmp-default, p-cpe:/a:novell:suse_linux:kernel-default-base, p-cpe:/a:novell:suse_linux:kernel-64kb, p-cpe:/a:novell:suse_linux:kernel-preempt, p-cpe:/a:novell:suse_linux:kernel-default-devel, p-cpe:/a:novell:suse_linux:kernel-devel, p-cpe:/a:novell:suse_linux:gfs2-kmp-default

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 7/14/2025

Vulnerability Publication Date: 7/21/2021

CISA Known Exploited Vulnerability Due Dates: 7/17/2024

Reference Information

CVE: CVE-2022-1679, CVE-2022-2586, CVE-2022-2905, CVE-2022-3903, CVE-2022-4095, CVE-2022-4662, CVE-2022-49934, CVE-2022-49936, CVE-2022-49937, CVE-2022-49942, CVE-2022-49945, CVE-2022-49948, CVE-2022-49950, CVE-2022-49952, CVE-2022-49954, CVE-2022-49956, CVE-2022-49968, CVE-2022-49977, CVE-2022-49978, CVE-2022-49981, CVE-2022-49984, CVE-2022-49985, CVE-2022-49986, CVE-2022-49987, CVE-2022-49989, CVE-2022-49990, CVE-2022-49993, CVE-2022-50010, CVE-2022-50012, CVE-2022-50019, CVE-2022-50020, CVE-2022-50022, CVE-2022-50027, CVE-2022-50028, CVE-2022-50029, CVE-2022-50030, CVE-2022-50032, CVE-2022-50033, CVE-2022-50036, CVE-2022-50038, CVE-2022-50045, CVE-2022-50051, CVE-2022-50059, CVE-2022-50061, CVE-2022-50065, CVE-2022-50067, CVE-2022-50072, CVE-2022-50083, CVE-2022-50084, CVE-2022-50085, CVE-2022-50087, CVE-2022-50091, CVE-2022-50092, CVE-2022-50093, CVE-2022-50094, CVE-2022-50097, CVE-2022-50098, CVE-2022-50099, CVE-2022-50101, CVE-2022-50102, CVE-2022-50104, CVE-2022-50108, CVE-2022-50109, CVE-2022-50118, CVE-2022-50124, CVE-2022-50126, CVE-2022-50127, CVE-2022-50136, CVE-2022-50138, CVE-2022-50140, CVE-2022-50141, CVE-2022-50142, CVE-2022-50143, CVE-2022-50146, CVE-2022-50149, CVE-2022-50152, CVE-2022-50153, CVE-2022-50156, CVE-2022-50158, CVE-2022-50160, CVE-2022-50161, CVE-2022-50162, CVE-2022-50164, CVE-2022-50165, CVE-2022-50169, CVE-2022-50172, CVE-2022-50173, CVE-2022-50176, CVE-2022-50179, CVE-2022-50181, CVE-2022-50185, CVE-2022-50191, CVE-2022-50200, CVE-2022-50209, CVE-2022-50211, CVE-2022-50212, CVE-2022-50213, CVE-2022-50215, CVE-2022-50218, CVE-2022-50220, CVE-2022-50222, CVE-2022-50229, CVE-2022-50231, CVE-2023-3111, CVE-2024-26924, CVE-2024-27397, CVE-2024-36978, CVE-2024-46800, CVE-2024-53141, CVE-2024-56770, CVE-2025-21700, CVE-2025-21702, CVE-2025-21703, CVE-2025-37752, CVE-2025-37798, CVE-2025-37823, CVE-2025-37890, CVE-2025-37932, CVE-2025-37953, CVE-2025-37997, CVE-2025-38000, CVE-2025-38001, CVE-2025-38083

SuSE: SUSE-SU-2025:02308-1