SUSE SLES15 Security Update : kernel RT (Live Patch 6 for SLE 15 SP6) (SUSE-SU-2025:02387-1)

high Nessus Plugin ID 242377

Synopsis

The remote SUSE host is missing one or more security updates.

Description

The remote SUSE Linux SLES15 host has a package installed that is affected by multiple vulnerabilities as referenced in the SUSE-SU-2025:02387-1 advisory.

This update for the Linux Kernel 6.4.0-150600_10_20 fixes several issues.

The following security issues were fixed:

- CVE-2024-53146: NFSD: Prevent a potential integer overflow (bsc#1234854).
- CVE-2024-53214: vfio/pci: Properly hide first-in-list PCIe extended capability (bsc#1235005).
- CVE-2024-53173: NFSv4.0: Fix a use-after-free problem in the asynchronous open() (bsc#1234892).
- CVE-2024-57893: ALSA: seq: oss: Fix races at processing SysEx messages (bsc#1235921).
- CVE-2025-22115: btrfs: fix block group refcount race in btrfs_create_pending_block_groups() (bsc#1241579).
- CVE-2025-21772: partitions: mac: fix handling of bogus partition table (bsc#1238912).
- CVE-2024-53166: block, bfq: fix bfqq uaf in bfq_limit_depth() (bsc#1234885).
- CVE-2024-57793: virt: tdx-guest: Just leak decrypted memory on unrecoverable errors (bsc#1235769).
- CVE-2024-56558: nfsd: make sure exp active before svc_export_show (bsc#1243648).

Tenable has extracted the preceding description block directly from the SUSE security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected kernel-livepatch-6_4_0-150600_10_20-rt package.

See Also

https://www.suse.com/security/cve/CVE-2024-53146

https://www.suse.com/security/cve/CVE-2024-53166

https://www.suse.com/security/cve/CVE-2024-53173

https://www.suse.com/security/cve/CVE-2024-53214

https://www.suse.com/security/cve/CVE-2024-57893

https://www.suse.com/security/cve/CVE-2024-56558

https://www.suse.com/security/cve/CVE-2024-57793

https://www.suse.com/security/cve/CVE-2025-21772

https://www.suse.com/security/cve/CVE-2025-22115

https://bugzilla.suse.com/1244337

https://bugzilla.suse.com/1238912

https://bugzilla.suse.com/1241579

https://bugzilla.suse.com/1234854

https://bugzilla.suse.com/1234885

https://bugzilla.suse.com/1234892

https://bugzilla.suse.com/1235005

https://bugzilla.suse.com/1235769

https://bugzilla.suse.com/1235921

https://bugzilla.suse.com/1243648

https://lists.suse.com/pipermail/sle-updates/2025-July/040785.html

Plugin Details

Severity: High

ID: 242377

File Name: suse_SU-2025-02387-1.nasl

Version: 1.1

Type: local

Agent: unix

Published: 7/19/2025

Updated: 7/19/2025

Supported Sensors: Continuous Assessment, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5

Vector: CVSS2#AV:L/AC:L/Au:S/C:C/I:C/A:C

CVSS Score Source: CVE-2024-53173

CVSS v3

Risk Factor: High

Base Score: 7.8

Temporal Score: 6.8

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:novell:suse_linux:kernel-livepatch-6_4_0-150600_10_20-rt, cpe:/o:novell:suse_linux:15

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 7/18/2025

Vulnerability Publication Date: 12/24/2024

Reference Information

CVE: CVE-2024-53146, CVE-2024-53166, CVE-2024-53173, CVE-2024-53214, CVE-2024-56558, CVE-2024-57793, CVE-2024-57893, CVE-2025-21772, CVE-2025-22115

SuSE: SUSE-SU-2025:02387-1