SUSE SLES12 Security Update : kernel (SUSE-SU-2025:03614-1)

high Nessus Plugin ID 270831

Synopsis

The remote SUSE host is missing one or more security updates.

Description

The remote SUSE Linux SLES12 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2025:03614-1 advisory.

The SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security bugfixes.


The following security bugs were fixed:

- CVE-2022-50233: Bluetooth: eir: Fix using strlen with hdev->{dev_name,short_name} (bsc#1246968).
- CVE-2022-50242: drivers: net: qlcnic: Fix potential memory leak in qlcnic_sriov_init() (bsc#1249696).
- CVE-2022-50244: cxl: fix possible null-ptr-deref in cxl_pci_init_afu|adapter() (bsc#1249647).
- CVE-2022-50252: igb: Do not free q_vector unless new one was allocated (bsc#1249846).
- CVE-2022-50258: wifi: brcmfmac: Fix potential stack-out-of-bounds in brcmf_c_preinit_dcmds() (bsc#1249947).
- CVE-2022-50265: kcm: annotate data-races around kcm->rx_wait (bsc#1249744).
- CVE-2022-50278: PNP: fix name memory leak in pnp_alloc_dev() (bsc#1249715).
- CVE-2022-50285: mm,hugetlb: take hugetlb_lock before decrementing h->resv_huge_pages (bsc#1249803).
- CVE-2022-50288: qlcnic: prevent ->dcb use-after-free on qlcnic_dcb_enable() failure (bsc#1249802).
- CVE-2022-50291: kcm: annotate data-races around kcm->rx_psock (bsc#1249798).
- CVE-2022-50294: wifi: libertas: fix memory leak in lbs_init_adapter() (bsc#1249799).
- CVE-2022-50297: wifi: ath9k: verify the expected usb_endpoints are present (bsc#1250250).
- CVE-2022-50304: mm: export bdi_unregister (bsc#1249725).
- CVE-2022-50311: cxl: Fix refcount leak in cxl_calc_capp_routing (bsc#1249720).
- CVE-2022-50312: drivers: serial: jsm: fix some leaks in probe (bsc#1249716).
- CVE-2022-50321: wifi: brcmfmac: fix potential memory leak in brcmf_netdev_start_xmit() (bsc#1249706).
- CVE-2022-50330: crypto: cavium - prevent integer overflow loading firmware (bsc#1249700).
- CVE-2022-50349: misc: tifm: fix possible memory leak in tifm_7xx1_switch_media() (bsc#1249920).
- CVE-2022-50352: net: hns: fix possible memory leak in hnae_ae_register() (bsc#1249922).
- CVE-2022-50359: media: cx88: Fix a null-ptr-deref bug in buffer_prepare() (bsc#1250269).
- CVE-2022-50365: skbuff: Account for tail adjustment during pull operations (bsc#1250084).
- CVE-2022-50375: tty: serial: fsl_lpuart: disable dma rx/tx use flags in lpuart_dma_shutdown (bsc#1250132).
- CVE-2022-50386: Bluetooth: L2CAP: Fix user-after-free (bsc#1250301).
- CVE-2022-50396: net: sched: fix memory leak in tcindex_set_parms (bsc#1250104).
- CVE-2022-50402: drivers/md/md-bitmap: check the return value of md_bitmap_get_counter() (bsc#1250363).
- CVE-2022-50405: net/tunnel: wait until all sk_user_data reader finish before releasing the sock (bsc#1250155).
- CVE-2022-50406: iomap: iomap: fix memory corruption when recording errors during writeback (bsc#1250165).
- CVE-2022-50408: wifi: brcmfmac: fix use-after-free bug in brcmf_netdev_start_xmit() (bsc#1250391).
- CVE-2022-50409: net: If sock is dead do not access sock's sk_wq in sk_stream_wait_memory (bsc#1250392).
- CVE-2022-50419: Bluetooth: hci_sysfs: Fix attempting to call device_add multiple times (bsc#1250394).
- CVE-2023-53148: igb: Do not bring the device up after non-fatal error (bsc#1249842).
- CVE-2023-53153: wifi: cfg80211: Partial revert 'wifi: cfg80211: Fix use after free for wext' (bsc#1249877).
- CVE-2023-53176: serial: 8250: Fix oops for port->pm on uart_change_pm() (bsc#1249991).
- CVE-2023-53178: mm: zswap: fix missing folio cleanup in writeback race path (bsc#1249827 git-fix).
- CVE-2023-53199: wifi: ath9k: hif_usb: clean up skbs if ath9k_hif_usb_rx_stream() fails (bsc#1249683).
- CVE-2023-53201: RDMA/bnxt_re: wraparound mbox producer index (bsc#1249687).
- CVE-2023-53226: wifi: mwifiex: Fix oob check condition in mwifiex_process_rx_packet (bsc#1249658).
- CVE-2023-53248: drm/amdgpu: install stub fence into potential unused fence pointers (bsc#1249779).
- CVE-2023-53254: drivers: base: cacheinfo: Fix shared_cpu_map changes in event of CPU hotplug (bsc#1249871).
- CVE-2023-53272: net: ena: fix shift-out-of-bounds in exponential backoff (bsc#1249917).
- CVE-2023-53277: wifi: iwl3945: Add missing check for create_singlethread_workqueue (bsc#1249936).
- CVE-2023-53288: drm/client: Fix memory leak in drm_client_modeset_probe (bsc#1250058).
- CVE-2023-53298: nfc: fix memory leak of se_io context in nfc_genl_se_io (bsc#1249944).
- CVE-2023-53302: wifi: iwl4965: Add missing check for create_singlethread_workqueue() (bsc#1249958).
- CVE-2023-53305: Bluetooth: L2CAP: Fix use-after-free (bsc#1250049).
- CVE-2023-53309: drm/radeon: Fix integer overflow in radeon_cs_parser_init (bsc#1250055).
- CVE-2023-53317: ext4: fix WARNING in mb_find_extent (bsc#1250081).
- CVE-2023-53321: wifi: mac80211_hwsim: drop short frames (bsc#1250313).
- CVE-2023-53335: RDMA/cxgb4: Fix potential null-ptr-deref in pass_establish() (bsc#1250072).
- CVE-2023-53344: can: bcm: bcm_tx_setup(): fix KMSAN uninit-value in vfs_write (bsc#1250023).
- CVE-2023-53348: btrfs: fix deadlock when aborting transaction during relocation with scrub (bsc#1250018).
- CVE-2023-53365: ip6mr: Fix skb_under_panic in ip6mr_cache_report() (bsc#1249988).
- CVE-2023-53384: wifi: mwifiex: avoid possible NULL skb pointer dereference (bsc#1250127).
- CVE-2023-53393: RDMA/mlx5: Fix mlx5_ib_get_hw_stats when used for device (bsc#1250114).
- CVE-2023-53395: ACPICA: Add AML_NO_OPERAND_RESOLVE flag to Timer (bsc#1250358).
- CVE-2023-53397: modpost: fix off by one in is_executable_section() (bsc#1250125).
- CVE-2023-53400: ALSA: hda: Fix Oops by 9.1 surround channel names (bsc#1250328).
- CVE-2023-53438: x86/MCE: Always save CS register on AMD Zen IF Poison errors (bsc#1250180).
- CVE-2023-53441: bpf: cpumap: Fix memory leak in cpu_map_update_elem (bsc#1250150).
- CVE-2024-53194: PCI: Fix use-after-free of slot->bus on hot remove (bsc#1235459).
- CVE-2024-58240: tls: separate no-async decryption request handling from async (bsc#1248847).
- CVE-2025-38488: smb: client: fix use-after-free in crypt_message when using async crypto (bsc#1247239).
- CVE-2025-38527: smb: client: fix use-after-free in cifs_oplock_break (bsc#1248199).
- CVE-2025-38553: net/sched: Restrict conditions for adding duplicating netems to qdisc tree (bsc#1248255).
- CVE-2025-38572: ipv6: reject malicious packets in ipv6_gso_segment() (bsc#1248399).
- CVE-2025-38574: pptp: ensure minimal skb length in pptp_xmit() (bsc#1248365).
- CVE-2025-38602: wifi: iwlwifi: Fix error code in iwl_op_mode_dvm_start() (bsc#1248341).
- CVE-2025-38604: wifi: rtl818x: Kill URBs before clearing tx status queue (bsc#1248333).
- CVE-2025-38623: PCI: pnv_php: Fix surprise plug detection and recovery (bsc#1248610).
- CVE-2025-38624: PCI: pnv_php: Clean up allocated IRQs on unplug (bsc#1248617).
- CVE-2025-38632: pinmux: fix race causing mux_owner NULL with active mux_usecount (bsc#1248669).
- CVE-2025-38639: netfilter: xt_nfacct: do not assume acct name is null-terminated (bsc#1248674).
- CVE-2025-38665: can: netlink: can_changelink(): fix NULL pointer deref of struct can_priv::do_set_mode (bsc#1248648).
- CVE-2025-38685: fbdev: Fix vmalloc out-of-bounds write in fast_imageblit (bsc#1249220).
- CVE-2025-38701: ext4: do not BUG when INLINE_DATA_FL lacks system.data xattr (bsc#1249258).
- CVE-2025-38702: fbdev: fix potential buffer overflow in do_register_framebuffer() (bsc#1249254).
- CVE-2025-38705: drm/amd/pm: fix null pointer access (bsc#1249334).
- CVE-2025-38712: hfsplus: do not use BUG_ON() in hfsplus_create_attributes_file() (bsc#1249194).
- CVE-2025-38713: hfsplus: fix slab-out-of-bounds read in hfsplus_uni2asc() (bsc#1249200).
- CVE-2025-38729: ALSA: usb-audio: Validate UAC3 power domain descriptors, too (bsc#1249164).
- CVE-2025-38735: gve: prevent ethtool ops after shutdown (bsc#1249288).
- CVE-2025-39677: net/sched: Fix backlog accounting in qdisc_dequeue_internal (bsc#1249300).
- CVE-2025-39691: fs/buffer: fix use-after-free when call bh_read() helper (bsc#1249374).
- CVE-2025-39705: drm/amd/display: fix a Null pointer dereference vulnerability (bsc#1249295).
- CVE-2025-39706: drm/amdkfd: Destroy KFD debugfs after destroy KFD wq (bsc#1249413).
- CVE-2025-39726: s390/ism: fix concurrency management in ism_cmd() (bsc#1249266).
- CVE-2025-39751: ALSA: hda/ca0132: Fix buffer overflow in add_tuning_control (bsc#1249538).
- CVE-2025-39754: mm/smaps: fix race between smaps_hugetlb_range and migration (bsc#1249524).
- CVE-2025-39757: ALSA: usb-audio: Fix size validation in convert_chmap_v3() (bsc#1249515).
- CVE-2025-39760: usb: core: config: Prevent OOB read in SS endpoint companion parsing (bsc#1249598).
- CVE-2025-39763: ACPICA: Fix error code path in acpi_ds_call_control_method() (bsc#1249615).
- CVE-2025-39764: netfilter: ctnetlink: remove refcounting in expectation dumpers (bsc#1249513).
- CVE-2025-39773: net: bridge: fix soft lockup in br_multicast_query_expired() (bsc#1249504).
- CVE-2025-39782: jbd2: prevent softlockup in jbd2_log_do_checkpoint() (bsc#1249526).
- CVE-2025-39787: soc: qcom: mdt_loader: Deal with zero e_shentsize (bsc#1249545).
- CVE-2025-39800: btrfs: abort transaction on unexpected eb generation at btrfs_copy_root() (bsc#1250177).
- CVE-2025-39808: HID: hid-ntrig: fix unable to handle page fault in ntrig_report_version() (bsc#1250088).
- CVE-2025-39824: HID: asus: fix UAF via HID_CLAIMED_INPUT validation (bsc#1250007).
- CVE-2025-39833: mISDN: hfcpci: Fix warning when deleting uninitialized timer (bsc#1250028).
- CVE-2025-39838: cifs: prevent NULL pointer dereference in UTF16 conversion (bsc#1250365).
- CVE-2025-39847: ppp: fix memory leak in pad_compress_skb (bsc#1250292).
- CVE-2025-39853: i40e: Fix potential invalid access when MAC list is empty (bsc#1250275).
- CVE-2025-39860: Bluetooth: Fix use-after-free in l2cap_sock_cleanup_listen() (bsc#1250247).
- CVE-2025-39863: wifi: brcmfmac: fix use-after-free when rescheduling brcmf_btcoex_info work (bsc#1250281).
- CVE-2025-39865: tee: fix NULL pointer dereference in tee_shm_put (bsc#1250294).
- CVE-2025-39869: dmaengine: ti: edma: Fix memory allocation size for queue_priority_map (bsc#1250406).
- CVE-2025-39885: ocfs2: fix recursive semaphore deadlock in fiemap call (bsc#1250407).
- CVE-2025-40300: x86/vmscape: Warn when STIBP is disabled with SMT (bsc#1247483).


Tenable has extracted the preceding description block directly from the SUSE security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://bugzilla.suse.com/1065729

https://bugzilla.suse.com/1082555

https://bugzilla.suse.com/1164051

https://bugzilla.suse.com/1190317

https://bugzilla.suse.com/1203332

https://bugzilla.suse.com/1205128

https://bugzilla.suse.com/1206883

https://bugzilla.suse.com/1206884

https://bugzilla.suse.com/1207629

https://bugzilla.suse.com/1209287

https://bugzilla.suse.com/1209291

https://bugzilla.suse.com/1210124

https://bugzilla.suse.com/1210584

https://bugzilla.suse.com/1211960

https://bugzilla.suse.com/1213015

https://bugzilla.suse.com/1213016

https://bugzilla.suse.com/1213040

https://bugzilla.suse.com/1213041

https://bugzilla.suse.com/1213133

https://bugzilla.suse.com/1213666

https://bugzilla.suse.com/1213747

https://bugzilla.suse.com/1214953

https://bugzilla.suse.com/1214967

https://bugzilla.suse.com/1216976

https://bugzilla.suse.com/1235459

https://bugzilla.suse.com/1238467

https://bugzilla.suse.com/1241353

https://bugzilla.suse.com/1245196

https://bugzilla.suse.com/1246968

https://bugzilla.suse.com/1247118

https://bugzilla.suse.com/1247239

https://bugzilla.suse.com/1247483

https://bugzilla.suse.com/1248199

https://bugzilla.suse.com/1248255

https://bugzilla.suse.com/1248333

https://bugzilla.suse.com/1248341

https://bugzilla.suse.com/1248365

https://bugzilla.suse.com/1248399

https://bugzilla.suse.com/1248610

https://bugzilla.suse.com/1248617

https://bugzilla.suse.com/1248648

https://bugzilla.suse.com/1248669

https://bugzilla.suse.com/1248674

https://bugzilla.suse.com/1248847

https://bugzilla.suse.com/1249037

https://bugzilla.suse.com/1249164

https://bugzilla.suse.com/1249166

https://bugzilla.suse.com/1249186

https://bugzilla.suse.com/1249194

https://bugzilla.suse.com/1249200

https://bugzilla.suse.com/1249220

https://bugzilla.suse.com/1249254

https://bugzilla.suse.com/1249258

https://bugzilla.suse.com/1249266

https://bugzilla.suse.com/1249288

https://bugzilla.suse.com/1249295

https://bugzilla.suse.com/1249300

https://bugzilla.suse.com/1249334

https://bugzilla.suse.com/1249346

https://bugzilla.suse.com/1249374

https://bugzilla.suse.com/1249413

https://bugzilla.suse.com/1249504

https://bugzilla.suse.com/1249513

https://bugzilla.suse.com/1249515

https://bugzilla.suse.com/1249524

https://bugzilla.suse.com/1249526

https://bugzilla.suse.com/1249538

https://bugzilla.suse.com/1249545

https://bugzilla.suse.com/1249598

https://bugzilla.suse.com/1249604

https://bugzilla.suse.com/1249615

https://bugzilla.suse.com/1249641

https://bugzilla.suse.com/1249647

https://bugzilla.suse.com/1249658

https://bugzilla.suse.com/1249667

https://bugzilla.suse.com/1249683

https://bugzilla.suse.com/1249687

https://bugzilla.suse.com/1249696

https://bugzilla.suse.com/1249700

https://bugzilla.suse.com/1249706

https://bugzilla.suse.com/1249715

https://bugzilla.suse.com/1249716

https://bugzilla.suse.com/1249720

https://bugzilla.suse.com/1249725

https://bugzilla.suse.com/1249727

https://bugzilla.suse.com/1249734

https://bugzilla.suse.com/1249739

https://bugzilla.suse.com/1249740

https://bugzilla.suse.com/1249743

https://bugzilla.suse.com/1249744

https://bugzilla.suse.com/1249779

https://bugzilla.suse.com/1249798

https://bugzilla.suse.com/1249799

https://bugzilla.suse.com/1249802

https://bugzilla.suse.com/1249803

https://bugzilla.suse.com/1249808

https://bugzilla.suse.com/1249810

https://bugzilla.suse.com/1249827

https://bugzilla.suse.com/1249842

https://bugzilla.suse.com/1249846

https://bugzilla.suse.com/1249853

https://bugzilla.suse.com/1249865

https://bugzilla.suse.com/1249867

https://bugzilla.suse.com/1249871

https://bugzilla.suse.com/1249872

https://bugzilla.suse.com/1249877

https://bugzilla.suse.com/1249880

https://bugzilla.suse.com/1249882

https://bugzilla.suse.com/1249894

https://bugzilla.suse.com/1249908

https://bugzilla.suse.com/1249911

https://bugzilla.suse.com/1249912

https://bugzilla.suse.com/1249917

https://bugzilla.suse.com/1249918

https://bugzilla.suse.com/1249920

https://bugzilla.suse.com/1249922

https://bugzilla.suse.com/1249925

https://bugzilla.suse.com/1249927

https://bugzilla.suse.com/1249936

https://bugzilla.suse.com/1249938

https://bugzilla.suse.com/1249944

https://bugzilla.suse.com/1249947

https://bugzilla.suse.com/1249949

https://bugzilla.suse.com/1249950

https://bugzilla.suse.com/1249951

https://bugzilla.suse.com/1249958

https://bugzilla.suse.com/1249979

https://bugzilla.suse.com/1249981

https://bugzilla.suse.com/1249988

https://bugzilla.suse.com/1249991

https://bugzilla.suse.com/1249994

https://bugzilla.suse.com/1250007

https://bugzilla.suse.com/1250014

https://bugzilla.suse.com/1250018

https://bugzilla.suse.com/1250023

https://bugzilla.suse.com/1250024

https://bugzilla.suse.com/1250028

https://bugzilla.suse.com/1250043

https://bugzilla.suse.com/1250044

https://bugzilla.suse.com/1250045

https://bugzilla.suse.com/1250049

https://bugzilla.suse.com/1250052

https://bugzilla.suse.com/1250055

https://bugzilla.suse.com/1250058

https://bugzilla.suse.com/1250071

https://bugzilla.suse.com/1250072

https://bugzilla.suse.com/1250081

https://bugzilla.suse.com/1250084

https://bugzilla.suse.com/1250088

https://bugzilla.suse.com/1250104

https://bugzilla.suse.com/1250114

https://bugzilla.suse.com/1250121

https://bugzilla.suse.com/1250125

https://bugzilla.suse.com/1250127

https://bugzilla.suse.com/1250131

https://bugzilla.suse.com/1250132

https://bugzilla.suse.com/1250140

https://bugzilla.suse.com/1250145

https://bugzilla.suse.com/1250150

https://bugzilla.suse.com/1250155

https://bugzilla.suse.com/1250156

https://bugzilla.suse.com/1250165

https://bugzilla.suse.com/1250168

https://bugzilla.suse.com/1250177

https://bugzilla.suse.com/1250180

https://bugzilla.suse.com/1250183

https://bugzilla.suse.com/1250187

https://bugzilla.suse.com/1250198

https://bugzilla.suse.com/1250247

https://bugzilla.suse.com/1250250

https://bugzilla.suse.com/1250257

https://bugzilla.suse.com/1250269

https://bugzilla.suse.com/1250275

https://bugzilla.suse.com/1250281

https://bugzilla.suse.com/1250292

https://bugzilla.suse.com/1250294

https://bugzilla.suse.com/1250301

https://bugzilla.suse.com/1250313

https://bugzilla.suse.com/1250323

https://bugzilla.suse.com/1250324

https://bugzilla.suse.com/1250328

https://bugzilla.suse.com/1250358

https://bugzilla.suse.com/1250363

https://bugzilla.suse.com/1250365

https://bugzilla.suse.com/1250391

https://bugzilla.suse.com/1250392

https://bugzilla.suse.com/1250393

https://bugzilla.suse.com/1250394

https://bugzilla.suse.com/1250395

https://bugzilla.suse.com/1250397

https://bugzilla.suse.com/1250406

https://bugzilla.suse.com/1250407

https://bugzilla.suse.com/1250522

https://bugzilla.suse.com/1250765

https://bugzilla.suse.com/1250774

https://bugzilla.suse.com/1250792

https://bugzilla.suse.com/1250799

https://bugzilla.suse.com/1250818

https://bugzilla.suse.com/1250831

https://bugzilla.suse.com/1250851

https://bugzilla.suse.com/1250853

https://bugzilla.suse.com/1250856

https://bugzilla.suse.com/1250879

https://bugzilla.suse.com/1250915

https://bugzilla.suse.com/1250928

https://bugzilla.suse.com/1250949

https://bugzilla.suse.com/1250963

https://bugzilla.suse.com/1250965

https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html

https://www.suse.com/security/cve/CVE-2022-36280

https://www.suse.com/security/cve/CVE-2022-43945

https://www.suse.com/security/cve/CVE-2022-49975

https://www.suse.com/security/cve/CVE-2022-50233

https://www.suse.com/security/cve/CVE-2022-50235

https://www.suse.com/security/cve/CVE-2022-50242

https://www.suse.com/security/cve/CVE-2022-50244

https://www.suse.com/security/cve/CVE-2022-50252

https://www.suse.com/security/cve/CVE-2022-50253

https://www.suse.com/security/cve/CVE-2022-50257

https://www.suse.com/security/cve/CVE-2022-50258

https://www.suse.com/security/cve/CVE-2022-50265

https://www.suse.com/security/cve/CVE-2022-50266

https://www.suse.com/security/cve/CVE-2022-50271

https://www.suse.com/security/cve/CVE-2022-50272

https://www.suse.com/security/cve/CVE-2022-50278

https://www.suse.com/security/cve/CVE-2022-50282

https://www.suse.com/security/cve/CVE-2022-50285

https://www.suse.com/security/cve/CVE-2022-50288

https://www.suse.com/security/cve/CVE-2022-50289

https://www.suse.com/security/cve/CVE-2022-50291

https://www.suse.com/security/cve/CVE-2022-50294

https://www.suse.com/security/cve/CVE-2022-50297

https://www.suse.com/security/cve/CVE-2022-50299

https://www.suse.com/security/cve/CVE-2022-50304

https://www.suse.com/security/cve/CVE-2022-50311

https://www.suse.com/security/cve/CVE-2022-50312

https://www.suse.com/security/cve/CVE-2022-50321

https://www.suse.com/security/cve/CVE-2022-50330

https://www.suse.com/security/cve/CVE-2022-50344

https://www.suse.com/security/cve/CVE-2022-50346

https://www.suse.com/security/cve/CVE-2022-50349

https://www.suse.com/security/cve/CVE-2022-50351

https://www.suse.com/security/cve/CVE-2022-50352

https://www.suse.com/security/cve/CVE-2022-50359

https://www.suse.com/security/cve/CVE-2022-50365

https://www.suse.com/security/cve/CVE-2022-50372

https://www.suse.com/security/cve/CVE-2022-50375

https://www.suse.com/security/cve/CVE-2022-50381

https://www.suse.com/security/cve/CVE-2022-50385

https://www.suse.com/security/cve/CVE-2022-50386

https://www.suse.com/security/cve/CVE-2022-50389

https://www.suse.com/security/cve/CVE-2022-50396

https://www.suse.com/security/cve/CVE-2022-50401

https://www.suse.com/security/cve/CVE-2022-50402

https://www.suse.com/security/cve/CVE-2022-50405

https://www.suse.com/security/cve/CVE-2022-50406

https://www.suse.com/security/cve/CVE-2022-50408

https://www.suse.com/security/cve/CVE-2022-50409

https://www.suse.com/security/cve/CVE-2022-50410

https://www.suse.com/security/cve/CVE-2022-50411

https://www.suse.com/security/cve/CVE-2022-50414

https://www.suse.com/security/cve/CVE-2022-50419

https://www.suse.com/security/cve/CVE-2022-50422

https://www.suse.com/security/cve/CVE-2022-50432

https://www.suse.com/security/cve/CVE-2022-50434

https://www.suse.com/security/cve/CVE-2022-50435

https://www.suse.com/security/cve/CVE-2022-50440

https://www.suse.com/security/cve/CVE-2022-50456

https://www.suse.com/security/cve/CVE-2022-50460

https://www.suse.com/security/cve/CVE-2023-1380

https://www.suse.com/security/cve/CVE-2023-28328

https://www.suse.com/security/cve/CVE-2023-3772

https://www.suse.com/security/cve/CVE-2023-39197

https://www.suse.com/security/cve/CVE-2023-53147

https://www.suse.com/security/cve/CVE-2023-53148

https://www.suse.com/security/cve/CVE-2023-53149

https://www.suse.com/security/cve/CVE-2023-53150

https://www.suse.com/security/cve/CVE-2023-53151

https://www.suse.com/security/cve/CVE-2023-53153

https://www.suse.com/security/cve/CVE-2023-53165

https://www.suse.com/security/cve/CVE-2023-53174

https://www.suse.com/security/cve/CVE-2023-53176

https://www.suse.com/security/cve/CVE-2023-53178

https://www.suse.com/security/cve/CVE-2023-53189

https://www.suse.com/security/cve/CVE-2023-53199

https://www.suse.com/security/cve/CVE-2023-53201

https://www.suse.com/security/cve/CVE-2023-53213

https://www.suse.com/security/cve/CVE-2023-53215

https://www.suse.com/security/cve/CVE-2023-53226

https://www.suse.com/security/cve/CVE-2023-53245

https://www.suse.com/security/cve/CVE-2023-53246

https://www.suse.com/security/cve/CVE-2023-53248

https://www.suse.com/security/cve/CVE-2023-53250

https://www.suse.com/security/cve/CVE-2023-53254

https://www.suse.com/security/cve/CVE-2023-53265

https://www.suse.com/security/cve/CVE-2023-53270

https://www.suse.com/security/cve/CVE-2023-53272

https://www.suse.com/security/cve/CVE-2023-53277

https://www.suse.com/security/cve/CVE-2023-53280

https://www.suse.com/security/cve/CVE-2023-53288

https://www.suse.com/security/cve/CVE-2023-53295

https://www.suse.com/security/cve/CVE-2023-53298

https://www.suse.com/security/cve/CVE-2023-53299

https://www.suse.com/security/cve/CVE-2023-53302

https://www.suse.com/security/cve/CVE-2023-53305

https://www.suse.com/security/cve/CVE-2023-53307

https://www.suse.com/security/cve/CVE-2023-53308

https://www.suse.com/security/cve/CVE-2023-53309

https://www.suse.com/security/cve/CVE-2023-53313

https://www.suse.com/security/cve/CVE-2023-53317

https://www.suse.com/security/cve/CVE-2023-53321

https://www.suse.com/security/cve/CVE-2023-53322

https://www.suse.com/security/cve/CVE-2023-53326

https://www.suse.com/security/cve/CVE-2023-53331

https://www.suse.com/security/cve/CVE-2023-53332

https://www.suse.com/security/cve/CVE-2023-53333

https://www.suse.com/security/cve/CVE-2023-53335

https://www.suse.com/security/cve/CVE-2023-53344

https://www.suse.com/security/cve/CVE-2023-53348

https://www.suse.com/security/cve/CVE-2023-53357

https://www.suse.com/security/cve/CVE-2023-53365

https://www.suse.com/security/cve/CVE-2023-53368

https://www.suse.com/security/cve/CVE-2023-53380

https://www.suse.com/security/cve/CVE-2023-53384

https://www.suse.com/security/cve/CVE-2023-53393

https://www.suse.com/security/cve/CVE-2023-53395

https://www.suse.com/security/cve/CVE-2023-53397

https://www.suse.com/security/cve/CVE-2023-53400

https://www.suse.com/security/cve/CVE-2023-53427

https://www.suse.com/security/cve/CVE-2023-53436

https://www.suse.com/security/cve/CVE-2023-53438

https://www.suse.com/security/cve/CVE-2023-53441

https://www.suse.com/security/cve/CVE-2023-53446

https://www.suse.com/security/cve/CVE-2023-53451

https://www.suse.com/security/cve/CVE-2023-53456

https://www.suse.com/security/cve/CVE-2023-53499

https://www.suse.com/security/cve/CVE-2023-53506

https://www.suse.com/security/cve/CVE-2023-53512

https://www.suse.com/security/cve/CVE-2023-53521

https://www.suse.com/security/cve/CVE-2023-53526

https://www.suse.com/security/cve/CVE-2023-53530

https://www.suse.com/security/cve/CVE-2024-53194

https://www.suse.com/security/cve/CVE-2024-58240

https://www.suse.com/security/cve/CVE-2025-38465

https://www.suse.com/security/cve/CVE-2025-38488

https://www.suse.com/security/cve/CVE-2025-38527

https://www.suse.com/security/cve/CVE-2025-38553

https://www.suse.com/security/cve/CVE-2025-38572

https://www.suse.com/security/cve/CVE-2025-38574

https://www.suse.com/security/cve/CVE-2025-38602

https://www.suse.com/security/cve/CVE-2025-38604

https://www.suse.com/security/cve/CVE-2025-38623

https://www.suse.com/security/cve/CVE-2025-38624

https://www.suse.com/security/cve/CVE-2025-38632

https://www.suse.com/security/cve/CVE-2025-38639

https://www.suse.com/security/cve/CVE-2025-38665

https://www.suse.com/security/cve/CVE-2025-38685

https://www.suse.com/security/cve/CVE-2025-38701

https://www.suse.com/security/cve/CVE-2025-38702

https://www.suse.com/security/cve/CVE-2025-38705

https://www.suse.com/security/cve/CVE-2025-38712

https://www.suse.com/security/cve/CVE-2025-38713

https://www.suse.com/security/cve/CVE-2025-38727

https://www.suse.com/security/cve/CVE-2025-38729

https://www.suse.com/security/cve/CVE-2025-38735

https://www.suse.com/security/cve/CVE-2025-39677

https://www.suse.com/security/cve/CVE-2025-39691

https://www.suse.com/security/cve/CVE-2025-39705

https://www.suse.com/security/cve/CVE-2025-39706

https://www.suse.com/security/cve/CVE-2025-39726

https://www.suse.com/security/cve/CVE-2025-39754

https://www.suse.com/security/cve/CVE-2025-39757

https://www.suse.com/security/cve/CVE-2025-39760

https://www.suse.com/security/cve/CVE-2025-39763

https://www.suse.com/security/cve/CVE-2025-39764

https://www.suse.com/security/cve/CVE-2025-39773

https://www.suse.com/security/cve/CVE-2025-39782

https://www.suse.com/security/cve/CVE-2025-39787

https://www.suse.com/security/cve/CVE-2025-39800

https://www.suse.com/security/cve/CVE-2025-39808

https://www.suse.com/security/cve/CVE-2025-39824

https://www.suse.com/security/cve/CVE-2025-39833

https://www.suse.com/security/cve/CVE-2025-39838

https://www.suse.com/security/cve/CVE-2025-39847

https://www.suse.com/security/cve/CVE-2025-39853

https://www.suse.com/security/cve/CVE-2025-39860

https://www.suse.com/security/cve/CVE-2025-39863

https://www.suse.com/security/cve/CVE-2025-39865

https://www.suse.com/security/cve/CVE-2025-39869

https://www.suse.com/security/cve/CVE-2025-39885

https://www.suse.com/security/cve/CVE-2025-40300

Plugin Details

Severity: High

ID: 270831

File Name: suse_SU-2025-03614-1.nasl

Version: 1.1

Type: local

Agent: unix

Published: 10/21/2025

Updated: 10/21/2025

Supported Sensors: Continuous Assessment, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: High

Base Score: 7.8

Temporal Score: 5.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:N/A:N

CVSS Score Source: CVE-2023-39197

CVSS v3

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:novell:suse_linux:12, p-cpe:/a:novell:suse_linux:kernel-default-base, p-cpe:/a:novell:suse_linux:kernel-macros, p-cpe:/a:novell:suse_linux:kernel-default-devel, p-cpe:/a:novell:suse_linux:cluster-md-kmp-default, p-cpe:/a:novell:suse_linux:gfs2-kmp-default, p-cpe:/a:novell:suse_linux:kernel-default, p-cpe:/a:novell:suse_linux:kernel-devel, p-cpe:/a:novell:suse_linux:kernel-syms, p-cpe:/a:novell:suse_linux:ocfs2-kmp-default, p-cpe:/a:novell:suse_linux:dlm-kmp-default, p-cpe:/a:novell:suse_linux:kernel-source, p-cpe:/a:novell:suse_linux:kernel-default-man

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 10/16/2025

Vulnerability Publication Date: 9/4/2021

Reference Information

CVE: CVE-2022-36280, CVE-2022-43945, CVE-2022-49975, CVE-2022-50233, CVE-2022-50235, CVE-2022-50242, CVE-2022-50244, CVE-2022-50252, CVE-2022-50253, CVE-2022-50257, CVE-2022-50258, CVE-2022-50265, CVE-2022-50266, CVE-2022-50271, CVE-2022-50272, CVE-2022-50278, CVE-2022-50282, CVE-2022-50285, CVE-2022-50288, CVE-2022-50289, CVE-2022-50291, CVE-2022-50294, CVE-2022-50297, CVE-2022-50299, CVE-2022-50304, CVE-2022-50311, CVE-2022-50312, CVE-2022-50321, CVE-2022-50330, CVE-2022-50344, CVE-2022-50346, CVE-2022-50349, CVE-2022-50351, CVE-2022-50352, CVE-2022-50359, CVE-2022-50365, CVE-2022-50372, CVE-2022-50375, CVE-2022-50381, CVE-2022-50385, CVE-2022-50386, CVE-2022-50389, CVE-2022-50396, CVE-2022-50401, CVE-2022-50402, CVE-2022-50405, CVE-2022-50406, CVE-2022-50408, CVE-2022-50409, CVE-2022-50410, CVE-2022-50411, CVE-2022-50414, CVE-2022-50419, CVE-2022-50422, CVE-2022-50432, CVE-2022-50434, CVE-2022-50435, CVE-2022-50440, CVE-2022-50456, CVE-2022-50460, CVE-2023-1380, CVE-2023-28328, CVE-2023-3772, CVE-2023-39197, CVE-2023-53147, CVE-2023-53148, CVE-2023-53149, CVE-2023-53150, CVE-2023-53151, CVE-2023-53153, CVE-2023-53165, CVE-2023-53174, CVE-2023-53176, CVE-2023-53178, CVE-2023-53189, CVE-2023-53199, CVE-2023-53201, CVE-2023-53213, CVE-2023-53215, CVE-2023-53226, CVE-2023-53245, CVE-2023-53246, CVE-2023-53248, CVE-2023-53250, CVE-2023-53254, CVE-2023-53265, CVE-2023-53270, CVE-2023-53272, CVE-2023-53277, CVE-2023-53280, CVE-2023-53288, CVE-2023-53295, CVE-2023-53298, CVE-2023-53299, CVE-2023-53302, CVE-2023-53305, CVE-2023-53307, CVE-2023-53308, CVE-2023-53309, CVE-2023-53313, CVE-2023-53317, CVE-2023-53321, CVE-2023-53322, CVE-2023-53326, CVE-2023-53331, CVE-2023-53332, CVE-2023-53333, CVE-2023-53335, CVE-2023-53344, CVE-2023-53348, CVE-2023-53357, CVE-2023-53365, CVE-2023-53368, CVE-2023-53380, CVE-2023-53384, CVE-2023-53393, CVE-2023-53395, CVE-2023-53397, CVE-2023-53400, CVE-2023-53427, CVE-2023-53436, CVE-2023-53438, CVE-2023-53441, CVE-2023-53446, CVE-2023-53451, CVE-2023-53456, CVE-2023-53499, CVE-2023-53506, CVE-2023-53512, CVE-2023-53521, CVE-2023-53526, CVE-2023-53530, CVE-2024-53194, CVE-2024-58240, CVE-2025-38465, CVE-2025-38488, CVE-2025-38527, CVE-2025-38553, CVE-2025-38572, CVE-2025-38574, CVE-2025-38602, CVE-2025-38604, CVE-2025-38623, CVE-2025-38624, CVE-2025-38632, CVE-2025-38639, CVE-2025-38665, CVE-2025-38685, CVE-2025-38701, CVE-2025-38702, CVE-2025-38705, CVE-2025-38712, CVE-2025-38713, CVE-2025-38727, CVE-2025-38729, CVE-2025-38735, CVE-2025-39677, CVE-2025-39691, CVE-2025-39705, CVE-2025-39706, CVE-2025-39726, CVE-2025-39754, CVE-2025-39757, CVE-2025-39760, CVE-2025-39763, CVE-2025-39764, CVE-2025-39773, CVE-2025-39782, CVE-2025-39787, CVE-2025-39800, CVE-2025-39808, CVE-2025-39824, CVE-2025-39833, CVE-2025-39838, CVE-2025-39847, CVE-2025-39853, CVE-2025-39860, CVE-2025-39863, CVE-2025-39865, CVE-2025-39869, CVE-2025-39885, CVE-2025-40300

SuSE: SUSE-SU-2025:03614-1