SUSE SLED15 / SLES15 Security Update : kernel (SUSE-SU-2025:03290-1)

high Nessus Plugin ID 265749

Synopsis

The remote SUSE host is missing one or more security updates.

Description

The remote SUSE Linux SLED15 / SLED_SAP15 / SLES15 / SLES_SAP15 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2025:03290-1 advisory.

The SUSE Linux Enterprise 15 SP7 kernel was updated to receive various security bugfixes.


The following security bugs were fixed:

- CVE-2024-46733: btrfs: fix qgroup reserve leaks in cow_file_range (bsc#1230708).
- CVE-2024-49996: cifs: Fix buffer overflow when parsing NFS reparse points (bsc#1232089).
- CVE-2025-37885: KVM: x86: Reset IRTE to host control if *new* route isn't postable (bsc#1242960).
- CVE-2025-38006: net: mctp: Do not access ifa_index when missing (bsc#1244930).
- CVE-2025-38075: scsi: target: iscsi: Fix timeout on deleted connection (bsc#1244734).
- CVE-2025-38103: HID: usbhid: Eliminate recurrent out-of-bounds bug in usbhid_parse() (bsc#1245663).
- CVE-2025-38125: net: stmmac: make sure that ptp_rate is not 0 before configuring EST (bsc#1245710).
- CVE-2025-38146: net: openvswitch: Fix the dead loop of MPLS parse (bsc#1245767).
- CVE-2025-38160: clk: bcm: rpi: Add NULL check in raspberrypi_clk_register() (bsc#1245780).
- CVE-2025-38184: tipc: fix null-ptr-deref when acquiring remote ip of ethernet bearer (bsc#1245956).
- CVE-2025-38185: atm: atmtcp: Free invalid length skb in atmtcp_c_send() (bsc#1246012).
- CVE-2025-38190: atm: Revert atm_account_tx() if copy_from_iter_full() fails (bsc#1245973).
- CVE-2025-38201: netfilter: nft_set_pipapo: clamp maximum map bucket size to INT_MAX (bsc#1245977).
- CVE-2025-38205: drm/amd/display: Avoid divide by zero by initializing dummy pitch to 1 (bsc#1246005).
- CVE-2025-38208: smb: client: add NULL check in automount_fullpath (bsc#1245815).
- CVE-2025-38245: atm: Release atm_dev_mutex after removing procfs in atm_dev_deregister() (bsc#1246193).
- CVE-2025-38251: atm: clip: prevent NULL deref in clip_push() (bsc#1246181).
- CVE-2025-38360: drm/amd/display: Add more checks for DSC / HUBP ONO guarantees (bsc#1247078).
- CVE-2025-38439: bnxt_en: Set DMA unmap len correctly for XDP_REDIRECT (bsc#1247155).
- CVE-2025-38440: net/mlx5e: Fix race between DIM disable and net_dim() (bsc#1247290).
- CVE-2025-38441: netfilter: flowtable: account for Ethernet header in nf_flow_pppoe_proto() (bsc#1247167).
- CVE-2025-38444: raid10: cleanup memleak at raid10_make_request (bsc#1247162).
- CVE-2025-38445: md/raid1: Fix stack memory use after return in raid1_reshape (bsc#1247229).
- CVE-2025-38458: atm: clip: Fix NULL pointer dereference in vcc_sendmsg() (bsc#1247116).
- CVE-2025-38459: atm: clip: Fix infinite recursive call of clip_push() (bsc#1247119).
- CVE-2025-38464: tipc: Fix use-after-free in tipc_conn_close() (bsc#1247112).
- CVE-2025-38472: netfilter: nf_conntrack: fix crash due to removal of uninitialised entry (bsc#1247313).
- CVE-2025-38490: net: libwx: remove duplicate page_pool_put_full_page() (bsc#1247243).
- CVE-2025-38491: mptcp: make fallback action and fallback decision atomic (bsc#1247280).
- CVE-2025-38499: clone_private_mnt(): make sure that caller has CAP_SYS_ADMIN in the right userns (bsc#1247976).
- CVE-2025-38500: xfrm: interface: fix use-after-free after changing collect_md xfrm interface (bsc#1248088).
- CVE-2025-38506: KVM: Allow CPU to reschedule while setting per-page memory attributes (bsc#1248186).
- CVE-2025-38520: drm/amdkfd: Do not call mmput from MMU notifier callback (bsc#1248217).
- CVE-2025-38524: rxrpc: Fix recv-recv race of completed call (bsc#1248194).
- CVE-2025-38528: bpf: Reject %p% format string in bprintf-like helpers (bsc#1248198).
- CVE-2025-38531: iio: common: st_sensors: Fix use of uninitialize device structs (bsc#1248205).
- CVE-2025-38546: atm: clip: Fix memory leak of struct clip_vcc (bsc#1248223).
- CVE-2025-38560: x86/sev: Evict cache lines during SNP memory validation (bsc#1248312).
- CVE-2025-38563: perf/core: Prevent VMA split of buffer mappings (bsc#1248306).
- CVE-2025-38585: staging: media: atomisp: Fix stack buffer overflow in gmin_get_var_int() (bsc#1248355).
- CVE-2025-38591: bpf: Reject narrower access to pointer ctx fields (bsc#1248363).
- CVE-2025-38608: bpf, ktls: Fix data corruption when using bpf_msg_pop_data() in ktls (bsc#1248338).
- CVE-2025-38618: vsock: Do not allow binding to VMADDR_PORT_ANY (bsc#1248511).


Tenable has extracted the preceding description block directly from the SUSE security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://bugzilla.suse.com/1012628

https://bugzilla.suse.com/1170284

https://bugzilla.suse.com/1213545

https://bugzilla.suse.com/1215199

https://bugzilla.suse.com/1221858

https://bugzilla.suse.com/1222323

https://bugzilla.suse.com/1230557

https://bugzilla.suse.com/1230708

https://bugzilla.suse.com/1232089

https://bugzilla.suse.com/1233120

https://bugzilla.suse.com/1240708

https://bugzilla.suse.com/1240890

https://bugzilla.suse.com/1241353

https://bugzilla.suse.com/1242034

https://bugzilla.suse.com/1242754

https://bugzilla.suse.com/1242960

https://bugzilla.suse.com/1244734

https://bugzilla.suse.com/1244930

https://bugzilla.suse.com/1245410

https://bugzilla.suse.com/1245663

https://bugzilla.suse.com/1245710

https://bugzilla.suse.com/1245767

https://bugzilla.suse.com/1245780

https://bugzilla.suse.com/1245815

https://bugzilla.suse.com/1245956

https://bugzilla.suse.com/1245973

https://bugzilla.suse.com/1245977

https://bugzilla.suse.com/1246005

https://bugzilla.suse.com/1246012

https://bugzilla.suse.com/1246181

https://bugzilla.suse.com/1246193

https://bugzilla.suse.com/1247057

https://bugzilla.suse.com/1247078

https://bugzilla.suse.com/1247112

https://bugzilla.suse.com/1247116

https://bugzilla.suse.com/1247119

https://bugzilla.suse.com/1247155

https://bugzilla.suse.com/1247162

https://bugzilla.suse.com/1247167

https://bugzilla.suse.com/1247229

https://bugzilla.suse.com/1247243

https://bugzilla.suse.com/1247280

https://bugzilla.suse.com/1247290

https://bugzilla.suse.com/1247313

https://bugzilla.suse.com/1247712

https://bugzilla.suse.com/1247976

https://bugzilla.suse.com/1248088

https://bugzilla.suse.com/1248108

https://bugzilla.suse.com/1248164

https://bugzilla.suse.com/1248166

https://bugzilla.suse.com/1248175

https://bugzilla.suse.com/1248178

https://bugzilla.suse.com/1248179

https://bugzilla.suse.com/1248180

https://bugzilla.suse.com/1248183

https://bugzilla.suse.com/1248186

https://bugzilla.suse.com/1248194

https://bugzilla.suse.com/1248196

https://bugzilla.suse.com/1248198

https://bugzilla.suse.com/1248205

https://bugzilla.suse.com/1248206

https://bugzilla.suse.com/1248208

https://bugzilla.suse.com/1248209

https://bugzilla.suse.com/1248212

https://bugzilla.suse.com/1248213

https://bugzilla.suse.com/1248214

https://bugzilla.suse.com/1248216

https://bugzilla.suse.com/1248217

https://bugzilla.suse.com/1248223

https://bugzilla.suse.com/1248227

https://bugzilla.suse.com/1248228

https://bugzilla.suse.com/1248229

https://bugzilla.suse.com/1248232

https://bugzilla.suse.com/1248240

https://bugzilla.suse.com/1248255

https://bugzilla.suse.com/1248297

https://bugzilla.suse.com/1248306

https://bugzilla.suse.com/1248312

https://bugzilla.suse.com/1248333

https://bugzilla.suse.com/1248334

https://bugzilla.suse.com/1248337

https://bugzilla.suse.com/1248338

https://bugzilla.suse.com/1248340

https://bugzilla.suse.com/1248341

https://bugzilla.suse.com/1248345

https://bugzilla.suse.com/1248349

https://bugzilla.suse.com/1248350

https://bugzilla.suse.com/1248354

https://bugzilla.suse.com/1248355

https://bugzilla.suse.com/1248361

https://bugzilla.suse.com/1248363

https://bugzilla.suse.com/1248368

https://bugzilla.suse.com/1248370

https://bugzilla.suse.com/1248374

https://bugzilla.suse.com/1248377

https://bugzilla.suse.com/1248386

https://bugzilla.suse.com/1248390

https://bugzilla.suse.com/1248395

https://bugzilla.suse.com/1248399

https://bugzilla.suse.com/1248401

https://bugzilla.suse.com/1248511

https://bugzilla.suse.com/1248573

https://bugzilla.suse.com/1248575

https://bugzilla.suse.com/1248577

https://bugzilla.suse.com/1248609

https://bugzilla.suse.com/1248614

https://bugzilla.suse.com/1248617

https://bugzilla.suse.com/1248621

https://bugzilla.suse.com/1248636

https://bugzilla.suse.com/1248643

https://bugzilla.suse.com/1248647

https://bugzilla.suse.com/1248648

https://bugzilla.suse.com/1248652

https://bugzilla.suse.com/1248655

https://bugzilla.suse.com/1248666

https://bugzilla.suse.com/1248669

https://bugzilla.suse.com/1248746

https://bugzilla.suse.com/1248748

https://bugzilla.suse.com/1249022

https://bugzilla.suse.com/1249346

http://www.nessus.org/u?f5ad3fc7

https://www.suse.com/security/cve/CVE-2023-3867

https://www.suse.com/security/cve/CVE-2023-4130

https://www.suse.com/security/cve/CVE-2023-4515

https://www.suse.com/security/cve/CVE-2024-26661

https://www.suse.com/security/cve/CVE-2024-46733

https://www.suse.com/security/cve/CVE-2024-49996

https://www.suse.com/security/cve/CVE-2024-58238

https://www.suse.com/security/cve/CVE-2024-58239

https://www.suse.com/security/cve/CVE-2025-37885

https://www.suse.com/security/cve/CVE-2025-38006

https://www.suse.com/security/cve/CVE-2025-38075

https://www.suse.com/security/cve/CVE-2025-38103

https://www.suse.com/security/cve/CVE-2025-38125

https://www.suse.com/security/cve/CVE-2025-38146

https://www.suse.com/security/cve/CVE-2025-38160

https://www.suse.com/security/cve/CVE-2025-38184

https://www.suse.com/security/cve/CVE-2025-38185

https://www.suse.com/security/cve/CVE-2025-38190

https://www.suse.com/security/cve/CVE-2025-38201

https://www.suse.com/security/cve/CVE-2025-38205

https://www.suse.com/security/cve/CVE-2025-38208

https://www.suse.com/security/cve/CVE-2025-38245

https://www.suse.com/security/cve/CVE-2025-38251

https://www.suse.com/security/cve/CVE-2025-38360

https://www.suse.com/security/cve/CVE-2025-38439

https://www.suse.com/security/cve/CVE-2025-38440

https://www.suse.com/security/cve/CVE-2025-38441

https://www.suse.com/security/cve/CVE-2025-38444

https://www.suse.com/security/cve/CVE-2025-38445

https://www.suse.com/security/cve/CVE-2025-38458

https://www.suse.com/security/cve/CVE-2025-38459

https://www.suse.com/security/cve/CVE-2025-38464

https://www.suse.com/security/cve/CVE-2025-38472

https://www.suse.com/security/cve/CVE-2025-38490

https://www.suse.com/security/cve/CVE-2025-38491

https://www.suse.com/security/cve/CVE-2025-38499

https://www.suse.com/security/cve/CVE-2025-38500

https://www.suse.com/security/cve/CVE-2025-38503

https://www.suse.com/security/cve/CVE-2025-38506

https://www.suse.com/security/cve/CVE-2025-38510

https://www.suse.com/security/cve/CVE-2025-38511

https://www.suse.com/security/cve/CVE-2025-38512

https://www.suse.com/security/cve/CVE-2025-38513

https://www.suse.com/security/cve/CVE-2025-38515

https://www.suse.com/security/cve/CVE-2025-38516

https://www.suse.com/security/cve/CVE-2025-38520

https://www.suse.com/security/cve/CVE-2025-38521

https://www.suse.com/security/cve/CVE-2025-38524

https://www.suse.com/security/cve/CVE-2025-38528

https://www.suse.com/security/cve/CVE-2025-38529

https://www.suse.com/security/cve/CVE-2025-38530

https://www.suse.com/security/cve/CVE-2025-38531

https://www.suse.com/security/cve/CVE-2025-38535

https://www.suse.com/security/cve/CVE-2025-38537

https://www.suse.com/security/cve/CVE-2025-38538

https://www.suse.com/security/cve/CVE-2025-38540

https://www.suse.com/security/cve/CVE-2025-38541

https://www.suse.com/security/cve/CVE-2025-38543

https://www.suse.com/security/cve/CVE-2025-38546

https://www.suse.com/security/cve/CVE-2025-38548

https://www.suse.com/security/cve/CVE-2025-38550

https://www.suse.com/security/cve/CVE-2025-38553

https://www.suse.com/security/cve/CVE-2025-38555

https://www.suse.com/security/cve/CVE-2025-38560

https://www.suse.com/security/cve/CVE-2025-38563

https://www.suse.com/security/cve/CVE-2025-38565

https://www.suse.com/security/cve/CVE-2025-38566

https://www.suse.com/security/cve/CVE-2025-38568

https://www.suse.com/security/cve/CVE-2025-38571

https://www.suse.com/security/cve/CVE-2025-38572

https://www.suse.com/security/cve/CVE-2025-38576

https://www.suse.com/security/cve/CVE-2025-38581

https://www.suse.com/security/cve/CVE-2025-38582

https://www.suse.com/security/cve/CVE-2025-38583

https://www.suse.com/security/cve/CVE-2025-38585

https://www.suse.com/security/cve/CVE-2025-38587

https://www.suse.com/security/cve/CVE-2025-38588

https://www.suse.com/security/cve/CVE-2025-38591

https://www.suse.com/security/cve/CVE-2025-38601

https://www.suse.com/security/cve/CVE-2025-38602

https://www.suse.com/security/cve/CVE-2025-38604

https://www.suse.com/security/cve/CVE-2025-38605

https://www.suse.com/security/cve/CVE-2025-38608

https://www.suse.com/security/cve/CVE-2025-38609

https://www.suse.com/security/cve/CVE-2025-38610

https://www.suse.com/security/cve/CVE-2025-38612

https://www.suse.com/security/cve/CVE-2025-38617

https://www.suse.com/security/cve/CVE-2025-38618

https://www.suse.com/security/cve/CVE-2025-38621

https://www.suse.com/security/cve/CVE-2025-38624

https://www.suse.com/security/cve/CVE-2025-38630

https://www.suse.com/security/cve/CVE-2025-38632

https://www.suse.com/security/cve/CVE-2025-38634

https://www.suse.com/security/cve/CVE-2025-38635

https://www.suse.com/security/cve/CVE-2025-38644

https://www.suse.com/security/cve/CVE-2025-38646

https://www.suse.com/security/cve/CVE-2025-38650

https://www.suse.com/security/cve/CVE-2025-38656

https://www.suse.com/security/cve/CVE-2025-38663

https://www.suse.com/security/cve/CVE-2025-38665

https://www.suse.com/security/cve/CVE-2025-38668

https://www.suse.com/security/cve/CVE-2025-38670

https://www.suse.com/security/cve/CVE-2025-38671

Plugin Details

Severity: High

ID: 265749

File Name: suse_SU-2025-03290-1.nasl

Version: 1.1

Type: local

Agent: unix

Published: 9/23/2025

Updated: 9/23/2025

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: Critical

Score: 9.0

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5

Vector: CVSS2#AV:L/AC:L/Au:S/C:C/I:C/A:C

CVSS Score Source: CVE-2024-49996

CVSS v3

Risk Factor: High

Base Score: 7.8

Temporal Score: 6.8

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:novell:suse_linux:cluster-md-kmp-default, p-cpe:/a:novell:suse_linux:kernel-default-extra, p-cpe:/a:novell:suse_linux:kernel-syms, p-cpe:/a:novell:suse_linux:dlm-kmp-default, p-cpe:/a:novell:suse_linux:kernel-64kb, p-cpe:/a:novell:suse_linux:ocfs2-kmp-default, p-cpe:/a:novell:suse_linux:kernel-source, p-cpe:/a:novell:suse_linux:reiserfs-kmp-default, p-cpe:/a:novell:suse_linux:kernel-macros, p-cpe:/a:novell:suse_linux:kernel-default-base, p-cpe:/a:novell:suse_linux:kernel-zfcpdump, p-cpe:/a:novell:suse_linux:kernel-default-devel, p-cpe:/a:novell:suse_linux:kernel-default, p-cpe:/a:novell:suse_linux:kernel-devel, p-cpe:/a:novell:suse_linux:kernel-obs-build, p-cpe:/a:novell:suse_linux:kernel-64kb-devel, p-cpe:/a:novell:suse_linux:gfs2-kmp-default, cpe:/o:novell:suse_linux:15

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 9/22/2025

Vulnerability Publication Date: 4/2/2024

Reference Information

CVE: CVE-2023-3867, CVE-2023-4130, CVE-2023-4515, CVE-2024-26661, CVE-2024-46733, CVE-2024-49996, CVE-2024-58238, CVE-2024-58239, CVE-2025-37885, CVE-2025-38006, CVE-2025-38075, CVE-2025-38103, CVE-2025-38125, CVE-2025-38146, CVE-2025-38160, CVE-2025-38184, CVE-2025-38185, CVE-2025-38190, CVE-2025-38201, CVE-2025-38205, CVE-2025-38208, CVE-2025-38245, CVE-2025-38251, CVE-2025-38360, CVE-2025-38439, CVE-2025-38440, CVE-2025-38441, CVE-2025-38444, CVE-2025-38445, CVE-2025-38458, CVE-2025-38459, CVE-2025-38464, CVE-2025-38472, CVE-2025-38490, CVE-2025-38491, CVE-2025-38499, CVE-2025-38500, CVE-2025-38503, CVE-2025-38506, CVE-2025-38510, CVE-2025-38511, CVE-2025-38512, CVE-2025-38513, CVE-2025-38515, CVE-2025-38516, CVE-2025-38520, CVE-2025-38521, CVE-2025-38524, CVE-2025-38528, CVE-2025-38529, CVE-2025-38530, CVE-2025-38531, CVE-2025-38535, CVE-2025-38537, CVE-2025-38538, CVE-2025-38540, CVE-2025-38541, CVE-2025-38543, CVE-2025-38546, CVE-2025-38548, CVE-2025-38550, CVE-2025-38553, CVE-2025-38555, CVE-2025-38560, CVE-2025-38563, CVE-2025-38565, CVE-2025-38566, CVE-2025-38568, CVE-2025-38571, CVE-2025-38572, CVE-2025-38576, CVE-2025-38581, CVE-2025-38582, CVE-2025-38583, CVE-2025-38585, CVE-2025-38587, CVE-2025-38588, CVE-2025-38591, CVE-2025-38601, CVE-2025-38602, CVE-2025-38604, CVE-2025-38605, CVE-2025-38608, CVE-2025-38609, CVE-2025-38610, CVE-2025-38612, CVE-2025-38617, CVE-2025-38618, CVE-2025-38621, CVE-2025-38624, CVE-2025-38630, CVE-2025-38632, CVE-2025-38634, CVE-2025-38635, CVE-2025-38644, CVE-2025-38646, CVE-2025-38650, CVE-2025-38656, CVE-2025-38663, CVE-2025-38665, CVE-2025-38668, CVE-2025-38670, CVE-2025-38671

SuSE: SUSE-SU-2025:03290-1