SUSE SLES15 Security Update : kernel (SUSE-SU-2025:03344-1)

medium Nessus Plugin ID 265828

Language:

Synopsis

The remote SUSE host is missing one or more security updates.

Description

The remote SUSE Linux SLES15 / SLES_SAP15 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2025:03344-1 advisory.

The SUSE Linux Enterprise 15 SP5 kernel was updated to receive various security bugfixes.


The following security bugs were fixed:

- CVE-2022-49980: USB: gadget: fix use-after-free read in usb_udc_uevent() (bsc#1245110).
- CVE-2022-50116: kernel: tty: n_gsm: fix deadlock and link starvation in outgoing data path (bsc#1244824).
- CVE-2023-53117: fs: prevent out-of-bounds array speculation when closing a file descriptor (bsc#1242780).
- CVE-2024-42265: protect the fetch of ->fd[fd] in do_dup2() from mispredictions (bsc#1229334).
- CVE-2024-53093: nvme-multipath: defer partition scanning (bsc#1233640).
- CVE-2024-53177: smb: prevent use-after-free due to open_cached_dir error paths (bsc#1234896).
- CVE-2024-58239: tls: stop recv() if initial process_rx_list gave us non-DATA (bsc#1248614).
- CVE-2025-21701: net: avoid race between device unregistration and ethnl ops (bsc#1237164).
- CVE-2025-21971: net_sched: Prevent creation of classes with TC_H_ROOT (bsc#1240799).
- CVE-2025-38180: net: atm: fix /proc/net/atm/lec handling (bsc#1245970).
- CVE-2025-38184: tipc: fix null-ptr-deref when acquiring remote ip of ethernet bearer (bsc#1245956).
- CVE-2025-38323: net: atm: add lec_mutex (bsc#1246473).
- CVE-2025-38350: net/sched: Always pass notifications when child class becomes empty (bsc#1246781).
- CVE-2025-38352: posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del() (bsc#1246911).
- CVE-2025-38460: atm: clip: Fix potential null-ptr-deref in to_atmarpd() (bsc#1247143).
- CVE-2025-38468: net/sched: Return NULL when htb_lookup_leaf encounters an empty rbtree (bsc#1247437).
- CVE-2025-38477: net/sched: sch_qfq: Fix race condition on qfq_aggregate (bsc#1247314).
- CVE-2025-38494: HID: core: do not bypass hid_hw_raw_request (bsc#1247349).
- CVE-2025-38495: HID: core: ensure the allocated report buffer can contain the reserved report ID (bsc#1247348).
- CVE-2025-38497: usb: gadget: configfs: Fix OOB read on empty string write (bsc#1247347).
- CVE-2025-38498: do_change_type(): refuse to operate on unmounted/not ours mounts (bsc#1247374).
- CVE-2025-38499: clone_private_mnt(): make sure that caller has CAP_SYS_ADMIN in the right userns (bsc#1247976).
- CVE-2025-38546: atm: clip: Fix memory leak of struct clip_vcc (bsc#1248223).
- CVE-2025-38555: usb: gadget : fix use-after-free in composite_dev_cleanup() (bsc#1248297).
- CVE-2025-38560: x86/sev: Evict cache lines during SNP memory validation (bsc#1248312).
- CVE-2025-38563: perf/core: Prevent VMA split of buffer mappings (bsc#1248306).
- CVE-2025-38608: bpf, ktls: Fix data corruption when using bpf_msg_pop_data() in ktls (bsc#1248338).
- CVE-2025-38617: net/packet: fix a race in packet_set_ring() and packet_notifier() (bsc#1248621).
- CVE-2025-38618: vsock: Do not allow binding to VMADDR_PORT_ANY (bsc#1248511).
- CVE-2025-38644: wifi: mac80211: reject TDLS operations when station is not associated (bsc#1248748).


Tenable has extracted the preceding description block directly from the SUSE security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://bugzilla.suse.com/1229334

https://bugzilla.suse.com/1233640

https://bugzilla.suse.com/1234896

https://bugzilla.suse.com/1236333

https://bugzilla.suse.com/1237164

https://bugzilla.suse.com/1240799

https://bugzilla.suse.com/1242414

https://bugzilla.suse.com/1242780

https://bugzilla.suse.com/1244309

https://bugzilla.suse.com/1244824

https://bugzilla.suse.com/1245110

https://bugzilla.suse.com/1245506

https://bugzilla.suse.com/1245711

https://bugzilla.suse.com/1245956

https://bugzilla.suse.com/1245970

https://bugzilla.suse.com/1245986

https://bugzilla.suse.com/1246211

https://bugzilla.suse.com/1246473

https://bugzilla.suse.com/1246781

https://bugzilla.suse.com/1246911

https://bugzilla.suse.com/1247143

https://bugzilla.suse.com/1247314

https://bugzilla.suse.com/1247347

https://bugzilla.suse.com/1247348

https://bugzilla.suse.com/1247349

https://bugzilla.suse.com/1247374

https://bugzilla.suse.com/1247437

https://bugzilla.suse.com/1247518

https://bugzilla.suse.com/1247976

https://bugzilla.suse.com/1248223

https://bugzilla.suse.com/1248297

https://bugzilla.suse.com/1248306

https://bugzilla.suse.com/1248312

https://bugzilla.suse.com/1248338

https://bugzilla.suse.com/1248511

https://bugzilla.suse.com/1248614

https://bugzilla.suse.com/1248621

https://bugzilla.suse.com/1248748

https://bugzilla.suse.com/1249353

http://www.nessus.org/u?c65fdc6c

https://www.suse.com/security/cve/CVE-2022-49980

https://www.suse.com/security/cve/CVE-2022-50116

https://www.suse.com/security/cve/CVE-2023-53117

https://www.suse.com/security/cve/CVE-2024-42265

https://www.suse.com/security/cve/CVE-2024-53093

https://www.suse.com/security/cve/CVE-2024-53177

https://www.suse.com/security/cve/CVE-2024-57947

https://www.suse.com/security/cve/CVE-2024-58239

https://www.suse.com/security/cve/CVE-2025-21701

https://www.suse.com/security/cve/CVE-2025-21971

https://www.suse.com/security/cve/CVE-2025-37798

https://www.suse.com/security/cve/CVE-2025-38088

https://www.suse.com/security/cve/CVE-2025-38120

https://www.suse.com/security/cve/CVE-2025-38177

https://www.suse.com/security/cve/CVE-2025-38180

https://www.suse.com/security/cve/CVE-2025-38184

https://www.suse.com/security/cve/CVE-2025-38323

https://www.suse.com/security/cve/CVE-2025-38350

https://www.suse.com/security/cve/CVE-2025-38352

https://www.suse.com/security/cve/CVE-2025-38460

https://www.suse.com/security/cve/CVE-2025-38468

https://www.suse.com/security/cve/CVE-2025-38477

https://www.suse.com/security/cve/CVE-2025-38494

https://www.suse.com/security/cve/CVE-2025-38495

https://www.suse.com/security/cve/CVE-2025-38497

https://www.suse.com/security/cve/CVE-2025-38498

https://www.suse.com/security/cve/CVE-2025-38499

https://www.suse.com/security/cve/CVE-2025-38546

https://www.suse.com/security/cve/CVE-2025-38555

https://www.suse.com/security/cve/CVE-2025-38560

https://www.suse.com/security/cve/CVE-2025-38563

https://www.suse.com/security/cve/CVE-2025-38608

https://www.suse.com/security/cve/CVE-2025-38617

https://www.suse.com/security/cve/CVE-2025-38618

https://www.suse.com/security/cve/CVE-2025-38644

Plugin Details

Severity: Medium

ID: 265828

File Name: suse_SU-2025-03344-1.nasl

Version: 1.1

Type: local

Agent: unix

Published: 9/25/2025

Updated: 9/25/2025

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: Critical

Score: 9.2

CVSS v2

Risk Factor: Medium

Base Score: 4.6

Temporal Score: 3.8

Vector: CVSS2#AV:L/AC:L/Au:S/C:N/I:N/A:C

CVSS Score Source: CVE-2024-53093

CVSS v3

Risk Factor: Medium

Base Score: 5.5

Temporal Score: 5.1

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:novell:suse_linux:dlm-kmp-default, p-cpe:/a:novell:suse_linux:kernel-64kb, p-cpe:/a:novell:suse_linux:cluster-md-kmp-default, p-cpe:/a:novell:suse_linux:kernel-syms, p-cpe:/a:novell:suse_linux:ocfs2-kmp-default, p-cpe:/a:novell:suse_linux:reiserfs-kmp-default, p-cpe:/a:novell:suse_linux:kernel-source, p-cpe:/a:novell:suse_linux:kernel-macros, p-cpe:/a:novell:suse_linux:kernel-default-base, p-cpe:/a:novell:suse_linux:kernel-zfcpdump, p-cpe:/a:novell:suse_linux:kernel-default-devel, p-cpe:/a:novell:suse_linux:kernel-default, p-cpe:/a:novell:suse_linux:kernel-devel, p-cpe:/a:novell:suse_linux:kernel-obs-build, p-cpe:/a:novell:suse_linux:gfs2-kmp-default, cpe:/o:novell:suse_linux:15, p-cpe:/a:novell:suse_linux:kernel-64kb-devel

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 9/24/2025

Vulnerability Publication Date: 4/10/2023

CISA Known Exploited Vulnerability Due Dates: 9/25/2025

Reference Information

CVE: CVE-2022-49980, CVE-2022-50116, CVE-2023-53117, CVE-2024-42265, CVE-2024-53093, CVE-2024-53177, CVE-2024-57947, CVE-2024-58239, CVE-2025-21701, CVE-2025-21971, CVE-2025-37798, CVE-2025-38088, CVE-2025-38120, CVE-2025-38177, CVE-2025-38180, CVE-2025-38184, CVE-2025-38323, CVE-2025-38350, CVE-2025-38352, CVE-2025-38460, CVE-2025-38468, CVE-2025-38477, CVE-2025-38494, CVE-2025-38495, CVE-2025-38497, CVE-2025-38498, CVE-2025-38499, CVE-2025-38546, CVE-2025-38555, CVE-2025-38560, CVE-2025-38563, CVE-2025-38608, CVE-2025-38617, CVE-2025-38618, CVE-2025-38644

SuSE: SUSE-SU-2025:03344-1