SUSE SLES15 Security Update : kernel (SUSE-SU-2025:03314-1)

high Nessus Plugin ID 265799

Synopsis

The remote SUSE host is missing one or more security updates.

Description

The remote SUSE Linux SLES15 / SLES_SAP15 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2025:03314-1 advisory.

The SUSE Linux Enterprise 15 SP4 kernel was updated to receive various security bugfixes.


The following security bugs were fixed:

- CVE-2022-50116: kernel: tty: n_gsm: fix deadlock and link starvation in outgoing data path (bsc#1244824).
- CVE-2024-53177: smb: prevent use-after-free due to open_cached_dir error paths (bsc#1234896).
- CVE-2024-58239: tls: stop recv() if initial process_rx_list gave us non-DATA (bsc#1248614).
- CVE-2025-38180: net: atm: fix /proc/net/atm/lec handling (bsc#1245970).
- CVE-2025-38323: net: atm: add lec_mutex (bsc#1246473).
- CVE-2025-38352: posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del() (bsc#1246911).
- CVE-2025-38460: atm: clip: Fix potential null-ptr-deref in to_atmarpd() (bsc#1247143).
- CVE-2025-38498: do_change_type(): refuse to operate on unmounted/not ours mounts (bsc#1247374).
- CVE-2025-38499: clone_private_mnt(): make sure that caller has CAP_SYS_ADMIN in the right userns (bsc#1247976).
- CVE-2025-38546: atm: clip: Fix memory leak of struct clip_vcc (bsc#1248223).
- CVE-2025-38555: usb: gadget : fix use-after-free in composite_dev_cleanup() (bsc#1248297).
- CVE-2025-38560: x86/sev: Evict cache lines during SNP memory validation (bsc#1248312).
- CVE-2025-38563: perf/core: Prevent VMA split of buffer mappings (bsc#1248306).
- CVE-2025-38608: bpf, ktls: Fix data corruption when using bpf_msg_pop_data() in ktls (bsc#1248338).
- CVE-2025-38617: net/packet: fix a race in packet_set_ring() and packet_notifier() (bsc#1248621).
- CVE-2025-38618: vsock: Do not allow binding to VMADDR_PORT_ANY (bsc#1248511).
- CVE-2025-38644: wifi: mac80211: reject TDLS operations when station is not associated (bsc#1248748).


Tenable has extracted the preceding description block directly from the SUSE security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://bugzilla.suse.com/1234896

https://bugzilla.suse.com/1244824

https://bugzilla.suse.com/1245970

https://bugzilla.suse.com/1246473

https://bugzilla.suse.com/1246911

https://bugzilla.suse.com/1247143

https://bugzilla.suse.com/1247374

https://bugzilla.suse.com/1247518

https://bugzilla.suse.com/1247976

https://bugzilla.suse.com/1248223

https://bugzilla.suse.com/1248297

https://bugzilla.suse.com/1248306

https://bugzilla.suse.com/1248312

https://bugzilla.suse.com/1248338

https://bugzilla.suse.com/1248511

https://bugzilla.suse.com/1248614

https://bugzilla.suse.com/1248621

https://bugzilla.suse.com/1248748

http://www.nessus.org/u?a4390da0

https://www.suse.com/security/cve/CVE-2022-50116

https://www.suse.com/security/cve/CVE-2024-53177

https://www.suse.com/security/cve/CVE-2024-58239

https://www.suse.com/security/cve/CVE-2025-38180

https://www.suse.com/security/cve/CVE-2025-38323

https://www.suse.com/security/cve/CVE-2025-38352

https://www.suse.com/security/cve/CVE-2025-38460

https://www.suse.com/security/cve/CVE-2025-38498

https://www.suse.com/security/cve/CVE-2025-38499

https://www.suse.com/security/cve/CVE-2025-38546

https://www.suse.com/security/cve/CVE-2025-38555

https://www.suse.com/security/cve/CVE-2025-38560

https://www.suse.com/security/cve/CVE-2025-38563

https://www.suse.com/security/cve/CVE-2025-38608

https://www.suse.com/security/cve/CVE-2025-38617

https://www.suse.com/security/cve/CVE-2025-38618

https://www.suse.com/security/cve/CVE-2025-38644

Plugin Details

Severity: High

ID: 265799

File Name: suse_SU-2025-03314-1.nasl

Version: 1.1

Type: local

Agent: unix

Published: 9/24/2025

Updated: 9/24/2025

Supported Sensors: Nessus Agent, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: Critical

Score: 9.2

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5.6

Vector: CVSS2#AV:L/AC:L/Au:S/C:C/I:C/A:C

CVSS Score Source: CVE-2025-38555

CVSS v3

Risk Factor: High

Base Score: 7.8

Temporal Score: 7.2

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

CVSS Score Source: CVE-2024-53177

Vulnerability Information

CPE: p-cpe:/a:novell:suse_linux:cluster-md-kmp-default, p-cpe:/a:novell:suse_linux:kernel-syms, p-cpe:/a:novell:suse_linux:dlm-kmp-default, p-cpe:/a:novell:suse_linux:kernel-64kb, p-cpe:/a:novell:suse_linux:reiserfs-kmp-default, p-cpe:/a:novell:suse_linux:ocfs2-kmp-default, p-cpe:/a:novell:suse_linux:kernel-source, p-cpe:/a:novell:suse_linux:kernel-macros, p-cpe:/a:novell:suse_linux:kernel-default-base, p-cpe:/a:novell:suse_linux:kernel-zfcpdump, p-cpe:/a:novell:suse_linux:kernel-default-devel, p-cpe:/a:novell:suse_linux:kernel-default, p-cpe:/a:novell:suse_linux:kernel-64kb-devel, p-cpe:/a:novell:suse_linux:kernel-devel, p-cpe:/a:novell:suse_linux:kernel-obs-build, p-cpe:/a:novell:suse_linux:gfs2-kmp-default, cpe:/o:novell:suse_linux:15

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 9/23/2025

Vulnerability Publication Date: 5/22/2024

CISA Known Exploited Vulnerability Due Dates: 9/25/2025

Reference Information

CVE: CVE-2022-50116, CVE-2024-53177, CVE-2024-58239, CVE-2025-38180, CVE-2025-38323, CVE-2025-38352, CVE-2025-38460, CVE-2025-38498, CVE-2025-38499, CVE-2025-38546, CVE-2025-38555, CVE-2025-38560, CVE-2025-38563, CVE-2025-38608, CVE-2025-38617, CVE-2025-38618, CVE-2025-38644

SuSE: SUSE-SU-2025:03314-1