SUSE SLES15 Security Update : kernel (SUSE-SU-2025:03310-1)

medium Nessus Plugin ID 265792

Synopsis

The remote SUSE host is missing one or more security updates.

Description

The remote SUSE Linux SLES15 / SLES_SAP15 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2025:03310-1 advisory.

The SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security bugfixes.


The following security bugs were fixed:

- CVE-2022-49492: nvme-pci: fix a NULL pointer dereference in nvme_alloc_admin_tags (bsc#1238954).
- CVE-2022-50116: tty: n_gsm: fix deadlock and link starvation in outgoing data path (bsc#1244824).
- CVE-2023-53117: fs: prevent out-of-bounds array speculation when closing a file descriptor (bsc#1242780).
- CVE-2024-42265: protect the fetch of ->fd[fd] in do_dup2() from mispredictions (bsc#1229334).
- CVE-2024-58239: tls: stop recv() if initial process_rx_list gave us non-DATA (bsc#1248614).
- CVE-2025-21971: net_sched: Prevent creation of classes with TC_H_ROOT (bsc#1240799).
- CVE-2025-22045: x86/mm: Fix flush_tlb_range() when used for zapping normal PMDs (bsc#1241433).
- CVE-2025-38180: net: atm: fix /proc/net/atm/lec handling (bsc#1245970).
- CVE-2025-38206: exfat: fix double free in delayed_free (bsc#1246073).
- CVE-2025-38323: net: atm: add lec_mutex (bsc#1246473).
- CVE-2025-38350: net/sched: Always pass notifications when child class becomes empty (bsc#1246781).
- CVE-2025-38352: posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del() (bsc#1246911).
- CVE-2025-38460: atm: clip: Fix potential null-ptr-deref in to_atmarpd() (bsc#1247143).
- CVE-2025-38468: net/sched: Return NULL when htb_lookup_leaf encounters an empty rbtree (bsc#1247437).
- CVE-2025-38477: net/sched: sch_qfq: Fix race condition on qfq_aggregate (bsc#1247314).
- CVE-2025-38498: do_change_type(): refuse to operate on unmounted/not ours mounts (bsc#1247374).
- CVE-2025-38499: clone_private_mnt(): make sure that caller has CAP_SYS_ADMIN in the right userns (bsc#1247976).
- CVE-2025-38546: atm: clip: Fix memory leak of struct clip_vcc (bsc#1248223).
- CVE-2025-38563: perf/core: Prevent VMA split of buffer mappings (bsc#1248306).
- CVE-2025-38608: bpf, ktls: Fix data corruption when using bpf_msg_pop_data() in ktls (bsc#1248338).
- CVE-2025-38617: net/packet: fix a race in packet_set_ring() and packet_notifier() (bsc#1248621).
- CVE-2025-38618: vsock: Do not allow binding to VMADDR_PORT_ANY (bsc#1248511).
- CVE-2025-38644: wifi: mac80211: reject TDLS operations when station is not associated (bsc#1248748).


Tenable has extracted the preceding description block directly from the SUSE security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://bugzilla.suse.com/1199657

https://bugzilla.suse.com/1229334

https://bugzilla.suse.com/1238954

https://bugzilla.suse.com/1240799

https://bugzilla.suse.com/1241433

https://bugzilla.suse.com/1242780

https://bugzilla.suse.com/1243278

https://bugzilla.suse.com/1244824

https://bugzilla.suse.com/1245970

https://bugzilla.suse.com/1246073

https://bugzilla.suse.com/1246473

https://bugzilla.suse.com/1246781

https://bugzilla.suse.com/1246911

https://bugzilla.suse.com/1247143

https://bugzilla.suse.com/1247314

https://bugzilla.suse.com/1247374

https://bugzilla.suse.com/1247437

https://bugzilla.suse.com/1247518

https://bugzilla.suse.com/1247976

https://bugzilla.suse.com/1248223

https://bugzilla.suse.com/1248306

https://bugzilla.suse.com/1248338

https://bugzilla.suse.com/1248511

https://bugzilla.suse.com/1248614

https://bugzilla.suse.com/1248621

https://bugzilla.suse.com/1248748

http://www.nessus.org/u?2ae881e6

https://www.suse.com/security/cve/CVE-2022-29900

https://www.suse.com/security/cve/CVE-2022-29901

https://www.suse.com/security/cve/CVE-2022-49492

https://www.suse.com/security/cve/CVE-2022-50116

https://www.suse.com/security/cve/CVE-2023-53117

https://www.suse.com/security/cve/CVE-2024-42265

https://www.suse.com/security/cve/CVE-2024-58239

https://www.suse.com/security/cve/CVE-2025-21971

https://www.suse.com/security/cve/CVE-2025-22045

https://www.suse.com/security/cve/CVE-2025-38180

https://www.suse.com/security/cve/CVE-2025-38206

https://www.suse.com/security/cve/CVE-2025-38323

https://www.suse.com/security/cve/CVE-2025-38350

https://www.suse.com/security/cve/CVE-2025-38352

https://www.suse.com/security/cve/CVE-2025-38460

https://www.suse.com/security/cve/CVE-2025-38468

https://www.suse.com/security/cve/CVE-2025-38477

https://www.suse.com/security/cve/CVE-2025-38498

https://www.suse.com/security/cve/CVE-2025-38499

https://www.suse.com/security/cve/CVE-2025-38546

https://www.suse.com/security/cve/CVE-2025-38563

https://www.suse.com/security/cve/CVE-2025-38608

https://www.suse.com/security/cve/CVE-2025-38617

https://www.suse.com/security/cve/CVE-2025-38618

https://www.suse.com/security/cve/CVE-2025-38644

Plugin Details

Severity: Medium

ID: 265792

File Name: suse_SU-2025-03310-1.nasl

Version: 1.1

Type: local

Agent: unix

Published: 9/24/2025

Updated: 9/24/2025

Supported Sensors: Nessus Agent, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: Critical

Score: 9.2

CVSS v2

Risk Factor: Low

Base Score: 2.1

Temporal Score: 1.7

Vector: CVSS2#AV:L/AC:L/Au:N/C:P/I:N/A:N

CVSS Score Source: CVE-2022-29900

CVSS v3

Risk Factor: Medium

Base Score: 6.5

Temporal Score: 6

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

CVSS Score Source: CVE-2022-29901

Vulnerability Information

CPE: p-cpe:/a:novell:suse_linux:kernel-syms, p-cpe:/a:novell:suse_linux:cluster-md-kmp-default, p-cpe:/a:novell:suse_linux:dlm-kmp-default, p-cpe:/a:novell:suse_linux:kernel-64kb, p-cpe:/a:novell:suse_linux:ocfs2-kmp-default, p-cpe:/a:novell:suse_linux:reiserfs-kmp-default, p-cpe:/a:novell:suse_linux:kernel-preempt-devel, p-cpe:/a:novell:suse_linux:kernel-source, p-cpe:/a:novell:suse_linux:kernel-macros, p-cpe:/a:novell:suse_linux:kernel-default-base, p-cpe:/a:novell:suse_linux:kernel-zfcpdump, p-cpe:/a:novell:suse_linux:kernel-preempt, p-cpe:/a:novell:suse_linux:kernel-default-devel, p-cpe:/a:novell:suse_linux:kernel-default, p-cpe:/a:novell:suse_linux:kernel-devel, p-cpe:/a:novell:suse_linux:kernel-obs-build, p-cpe:/a:novell:suse_linux:gfs2-kmp-default, cpe:/o:novell:suse_linux:15, p-cpe:/a:novell:suse_linux:kernel-64kb-devel

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 9/23/2025

Vulnerability Publication Date: 7/21/2021

CISA Known Exploited Vulnerability Due Dates: 9/25/2025

Reference Information

CVE: CVE-2022-29900, CVE-2022-29901, CVE-2022-49492, CVE-2022-50116, CVE-2023-53117, CVE-2024-42265, CVE-2024-58239, CVE-2025-21971, CVE-2025-22045, CVE-2025-38180, CVE-2025-38206, CVE-2025-38323, CVE-2025-38350, CVE-2025-38352, CVE-2025-38460, CVE-2025-38468, CVE-2025-38477, CVE-2025-38498, CVE-2025-38499, CVE-2025-38546, CVE-2025-38563, CVE-2025-38608, CVE-2025-38617, CVE-2025-38618, CVE-2025-38644

SuSE: SUSE-SU-2025:03310-1