SUSE SLES15 Security Update : kernel (SUSE-SU-2025:03602-1)

medium Nessus Plugin ID 270860

Synopsis

The remote SUSE host is missing one or more security updates.

Description

The remote SUSE Linux SLES15 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2025:03602-1 advisory.

The SUSE Linux Enterprise 15 SP6 Confidential Computing kernel was updated to receive various security bugfixes.


The following security bugs were fixed:

- CVE-2025-39782: jbd2: prevent softlockup in jbd2_log_do_checkpoint() (bsc#1249526).
- CVE-2025-39773: net: bridge: fix soft lockup in br_multicast_query_expired() (bsc#1249504).
- CVE-2025-39746: wifi: ath10k: shutdown driver when hardware is unreliable (bsc#1249516).
- CVE-2025-39718: vsock/virtio: Validate length in packet header before skb_put() (bsc#1249305).
- CVE-2025-39705: drm/amd/display: fix a Null pointer dereference vulnerability (bsc#1249295).
- CVE-2025-39703: net, hsr: reject HSR frame if skb can't hold tag (bsc#1249315).
- CVE-2025-39691: fs/buffer: fix use-after-free when call bh_read() helper (bsc#1249374).
- CVE-2025-39682: tls: fix handling of zero-length records on the rx_list (bsc#1249284).
- CVE-2025-39678: platform/x86/amd/hsmp: Ensure sock->metric_tbl_addr is non-NULL (bsc#1249290).
- CVE-2025-38732: netfilter: nf_reject: do not leak dst refcount for loopback packets (bsc#1249262).
- CVE-2025-38730: io_uring/net: commit partial buffers on retry (bsc#1249172).
- CVE-2025-38722: habanalabs: fix UAF in export_dmabuf() (bsc#1249163).
- CVE-2025-38721: netfilter: ctnetlink: fix refcount leak on table dump (bsc#1249176).
- CVE-2025-38709: loop: Avoid updating block size under exclusive owner (bsc#1249199).
- CVE-2025-38705: drm/amd/pm: fix null pointer access (bsc#1249334).
- CVE-2025-38701: ext4: do not BUG when INLINE_DATA_FL lacks system.data xattr (bsc#1249258).
- CVE-2025-38679: media: venus: Fix OOB read due to missing payload bound check (bsc#1249202).
- CVE-2025-38678: netfilter: nf_tables: reject duplicate device on updates (bsc#1249126).
- CVE-2025-38676: iommu/amd: Avoid stack buffer overflow from kernel cmdline (bsc#1248775).
- CVE-2025-38668: regulator: core: fix NULL dereference on unbind due to stale coupling data (bsc#1248647).
- CVE-2025-38664: ice: Fix a null pointer dereference in ice_copy_and_init_pkg() (bsc#1248628).
- CVE-2025-38660: [ceph] parse_longname(): strrchr() expects NUL-terminated string (bsc#1248634).
- CVE-2025-38659: gfs2: No more self recovery (bsc#1248639).
- CVE-2025-38645: net/mlx5: Check device memory pointer before usage (bsc#1248626).
- CVE-2025-38643: wifi: cfg80211: Add missing lock in cfg80211_check_and_end_cac() (bsc#1248681).
- CVE-2025-38640: bpf: Disable migration in nf_hook_run_bpf() (bsc#1248622).
- CVE-2025-38639: netfilter: xt_nfacct: do not assume acct name is null-terminated (bsc#1248674).
- CVE-2025-38623: PCI: pnv_php: Fix surprise plug detection and recovery (bsc#1248610).
- CVE-2025-38622: net: drop UFO packets in udp_rcv_segment() (bsc#1248619).
- CVE-2025-38618: vsock: Do not allow binding to VMADDR_PORT_ANY (bsc#1248511).
- CVE-2025-38614: eventpoll: Fix semi-unbounded recursion (bsc#1248392).
- CVE-2025-38608: bpf, ktls: Fix data corruption when using bpf_msg_pop_data() in ktls (bsc#1248338).
- CVE-2025-38605: wifi: ath12k: Pass ab pointer directly to ath12k_dp_tx_get_encap_type() (bsc#1248334).
- CVE-2025-38597: drm/rockchip: vop2: fail cleanly if missing a primary plane for a video-port (bsc#1248378).
- CVE-2025-38595: xen: fix UAF in dmabuf_exp_from_pages() (bsc#1248380).
- CVE-2025-38593: kABI workaround for bluetooth discovery_state change (bsc#1248357).
- CVE-2025-38591: bpf: Reject narrower access to pointer ctx fields (bsc#1248363).
- CVE-2025-38590: net/mlx5e: Remove skb secpath if xfrm state is not found (bsc#1248360).
- CVE-2025-38585: staging: media: atomisp: Fix stack buffer overflow in gmin_get_var_int() (bsc#1248355).
- CVE-2025-38574: pptp: ensure minimal skb length in pptp_xmit() (bsc#1248365).
- CVE-2025-38560: x86/sev: Evict cache lines during SNP memory validation (bsc#1248312).
- CVE-2025-38556: HID: core: Harden s32ton() against conversion to 0 bits (bsc#1248296).
- CVE-2025-38546: atm: clip: Fix memory leak of struct clip_vcc (bsc#1248223).
- CVE-2025-38544: rxrpc: Fix bug due to prealloc collision (bsc#1248225).
- CVE-2025-38533: net: libwx: fix the using of Rx buffer DMA (bsc#1248200).
- CVE-2025-38531: iio: common: st_sensors: Fix use of uninitialize device structs (bsc#1248205).
- CVE-2025-38528: bpf: Reject %p% format string in bprintf-like helpers (bsc#1248198).
- CVE-2025-38527: smb: client: fix use-after-free in cifs_oplock_break (bsc#1248199).
- CVE-2025-38526: ice: add NULL check in eswitch lag check (bsc#1248192).
- CVE-2025-38524: rxrpc: Fix recv-recv race of completed call (bsc#1248194).
- CVE-2025-38520: drm/amdkfd: Do not call mmput from MMU notifier callback (bsc#1248217).
- CVE-2025-38514: rxrpc: Fix oops due to non-existence of prealloc backlog struct (bsc#1248202).
- CVE-2025-38506: KVM: Allow CPU to reschedule while setting per-page memory attributes (bsc#1248186).
- CVE-2025-38500: xfrm: interface: fix use-after-free after changing collect_md xfrm interface (bsc#1248088).
- CVE-2025-38499: clone_private_mnt(): make sure that caller has CAP_SYS_ADMIN in the right userns (bsc#1247976).
- CVE-2025-38491: mptcp: make fallback action and fallback decision atomic (bsc#1247280).
- CVE-2025-38488: smb: client: fix use-after-free in crypt_message when using async crypto (bsc#1247239).
- CVE-2025-38472: netfilter: nf_conntrack: fix crash due to removal of uninitialised entry (bsc#1247313).
- CVE-2025-38466: perf: Revert to requiring CAP_SYS_ADMIN for uprobes (bsc#1247442).
- CVE-2025-38464: tipc: Fix use-after-free in tipc_conn_close() (bsc#1247112).
- CVE-2025-38459: atm: clip: Fix infinite recursive call of clip_push() (bsc#1247119).
- CVE-2025-38458: atm: clip: Fix NULL pointer dereference in vcc_sendmsg() (bsc#1247116).
- CVE-2025-38456: ipmi:msghandler: Fix potential memory corruption in ipmi_create_user() (bsc#1247099).
- CVE-2025-38445: md/raid1: Fix stack memory use after return in raid1_reshape (bsc#1247229).
- CVE-2025-38444: raid10: cleanup memleak at raid10_make_request (bsc#1247162).
- CVE-2025-38441: netfilter: flowtable: account for Ethernet header in nf_flow_pppoe_proto() (bsc#1247167).
- CVE-2025-38439: bnxt_en: Set DMA unmap len correctly for XDP_REDIRECT (bsc#1247155).
- CVE-2025-38419: remoteproc: core: Cleanup acquired resources when rproc_handle_resources() fails in rproc_attach() (bsc#1247136).
- CVE-2025-38418: remoteproc: core: Release rproc->clean_table after rproc_attach() fails (bsc#1247137).
- CVE-2025-38408: genirq/irq_sim: Initialize work context pointers properly (bsc#1247126).
- CVE-2025-38402: idpf: return 0 size for RSS key if not supported (bsc#1247262).
- CVE-2025-38360: drm/amd/display: Add more checks for DSC / HUBP ONO guarantees (bsc#1247078).
- CVE-2025-38263: bcache: fix NULL pointer in cache_set_flush() (bsc#1246248).
- CVE-2025-38251: atm: clip: prevent NULL deref in clip_push() (bsc#1246181).
- CVE-2025-38245: atm: Release atm_dev_mutex after removing procfs in atm_dev_deregister() (bsc#1246193).
- CVE-2025-38208: smb: client: add NULL check in automount_fullpath (bsc#1245815).
- CVE-2025-38205: drm/amd/display: Avoid divide by zero by initializing dummy pitch to 1 (bsc#1246005).
- CVE-2025-38201: netfilter: nft_set_pipapo: clamp maximum map bucket size to INT_MAX (bsc#1245977).
- CVE-2025-38190: atm: Revert atm_account_tx() if copy_from_iter_full() fails (bsc#1245973).
- CVE-2025-38185: atm: atmtcp: Free invalid length skb in atmtcp_c_send() (bsc#1246012).
- CVE-2025-38184: tipc: fix null-ptr-deref when acquiring remote ip of ethernet bearer (bsc#1245956).
- CVE-2025-38160: clk: bcm: rpi: Add NULL check in raspberrypi_clk_register() (bsc#1245780).
- CVE-2025-38146: net: openvswitch: Fix the dead loop of MPLS parse (bsc#1245767).
- CVE-2025-38125: net: stmmac: make sure that ptp_rate is not 0 before configuring EST (bsc#1245710).
- CVE-2025-38103: HID: usbhid: Eliminate recurrent out-of-bounds bug in usbhid_parse() (bsc#1245663).
- CVE-2025-38075: scsi: target: iscsi: Fix timeout on deleted connection (bsc#1244734).
- CVE-2025-38006: net: mctp: Do not access ifa_index when missing (bsc#1244930).
- CVE-2025-37885: KVM: x86: Reset IRTE to host control if *new* route isn't postable (bsc#1242960).
- CVE-2025-22022: usb: xhci: Apply the link chain quirk on NEC isoc endpoints (bsc#1241292).
- CVE-2024-53125: bpf: sync_linked_regs() must preserve subreg_def (bsc#1234156).
- CVE-2024-46733: btrfs: fix qgroup reserve leaks in cow_file_range (bsc#1230708).


Tenable has extracted the preceding description block directly from the SUSE security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://bugzilla.suse.com/1012628

https://bugzilla.suse.com/1215199

https://bugzilla.suse.com/1221858

https://bugzilla.suse.com/1222323

https://www.suse.com/security/cve/CVE-2024-26661

https://bugzilla.suse.com/1230557

https://bugzilla.suse.com/1234156

https://www.suse.com/security/cve/CVE-2024-53125

https://bugzilla.suse.com/1236897

https://bugzilla.suse.com/1240708

https://bugzilla.suse.com/1241166

https://bugzilla.suse.com/1242960

https://www.suse.com/security/cve/CVE-2025-37885

https://bugzilla.suse.com/1248108

https://bugzilla.suse.com/1241292

https://bugzilla.suse.com/1244734

https://bugzilla.suse.com/1245663

https://bugzilla.suse.com/1245956

https://bugzilla.suse.com/1245973

https://bugzilla.suse.com/1246012

https://bugzilla.suse.com/1246193

https://bugzilla.suse.com/1246248

https://bugzilla.suse.com/1247112

https://bugzilla.suse.com/1247976

https://bugzilla.suse.com/1248178

https://bugzilla.suse.com/1248179

https://bugzilla.suse.com/1248212

https://bugzilla.suse.com/1248223

https://bugzilla.suse.com/1248296

https://bugzilla.suse.com/1248306

https://bugzilla.suse.com/1248377

https://bugzilla.suse.com/1248511

https://bugzilla.suse.com/1248621

https://bugzilla.suse.com/1248748

https://www.suse.com/security/cve/CVE-2025-22022

https://www.suse.com/security/cve/CVE-2025-38075

https://www.suse.com/security/cve/CVE-2025-38103

https://www.suse.com/security/cve/CVE-2025-38184

https://www.suse.com/security/cve/CVE-2025-38185

https://www.suse.com/security/cve/CVE-2025-38190

https://www.suse.com/security/cve/CVE-2025-38245

https://www.suse.com/security/cve/CVE-2025-38263

https://www.suse.com/security/cve/CVE-2025-38464

https://www.suse.com/security/cve/CVE-2025-38499

https://www.suse.com/security/cve/CVE-2025-38512

https://www.suse.com/security/cve/CVE-2025-38513

https://www.suse.com/security/cve/CVE-2025-38515

https://www.suse.com/security/cve/CVE-2025-38546

https://www.suse.com/security/cve/CVE-2025-38556

https://www.suse.com/security/cve/CVE-2025-38563

https://www.suse.com/security/cve/CVE-2025-38565

https://www.suse.com/security/cve/CVE-2025-38617

https://www.suse.com/security/cve/CVE-2025-38618

https://www.suse.com/security/cve/CVE-2025-38644

https://bugzilla.suse.com/1213545

https://bugzilla.suse.com/1230708

https://bugzilla.suse.com/1233120

https://bugzilla.suse.com/1240890

https://bugzilla.suse.com/1241353

https://bugzilla.suse.com/1242034

https://bugzilla.suse.com/1242754

https://bugzilla.suse.com/1244930

https://bugzilla.suse.com/1245710

https://bugzilla.suse.com/1245767

https://bugzilla.suse.com/1245780

https://bugzilla.suse.com/1245815

https://bugzilla.suse.com/1245977

https://bugzilla.suse.com/1246005

https://bugzilla.suse.com/1246181

https://bugzilla.suse.com/1247057

https://bugzilla.suse.com/1247078

https://bugzilla.suse.com/1247116

https://bugzilla.suse.com/1247119

https://bugzilla.suse.com/1247155

https://bugzilla.suse.com/1247162

https://bugzilla.suse.com/1247167

https://bugzilla.suse.com/1247229

https://bugzilla.suse.com/1247280

https://bugzilla.suse.com/1247313

https://bugzilla.suse.com/1248088

https://bugzilla.suse.com/1248164

https://bugzilla.suse.com/1248166

https://bugzilla.suse.com/1248180

https://bugzilla.suse.com/1248183

https://bugzilla.suse.com/1248186

https://bugzilla.suse.com/1248194

https://bugzilla.suse.com/1248196

https://bugzilla.suse.com/1248198

https://bugzilla.suse.com/1248205

https://bugzilla.suse.com/1248206

https://bugzilla.suse.com/1248208

https://bugzilla.suse.com/1248209

https://bugzilla.suse.com/1248213

https://bugzilla.suse.com/1248214

https://bugzilla.suse.com/1248216

https://bugzilla.suse.com/1248217

https://bugzilla.suse.com/1248227

https://bugzilla.suse.com/1248228

https://bugzilla.suse.com/1248229

https://bugzilla.suse.com/1248240

https://bugzilla.suse.com/1248255

https://bugzilla.suse.com/1248297

https://bugzilla.suse.com/1248312

https://bugzilla.suse.com/1248333

https://bugzilla.suse.com/1248337

https://bugzilla.suse.com/1248338

https://bugzilla.suse.com/1248340

https://bugzilla.suse.com/1248341

https://bugzilla.suse.com/1248345

https://bugzilla.suse.com/1248349

https://bugzilla.suse.com/1248350

https://bugzilla.suse.com/1248354

https://bugzilla.suse.com/1248355

https://bugzilla.suse.com/1248361

https://bugzilla.suse.com/1248363

https://bugzilla.suse.com/1248368

https://bugzilla.suse.com/1248374

https://bugzilla.suse.com/1248386

https://bugzilla.suse.com/1248390

https://bugzilla.suse.com/1248395

https://bugzilla.suse.com/1248399

https://bugzilla.suse.com/1248401

https://bugzilla.suse.com/1248573

https://bugzilla.suse.com/1248575

https://bugzilla.suse.com/1248577

https://bugzilla.suse.com/1248609

https://bugzilla.suse.com/1248614

https://bugzilla.suse.com/1248617

https://bugzilla.suse.com/1248636

https://bugzilla.suse.com/1248643

https://bugzilla.suse.com/1248648

https://bugzilla.suse.com/1248652

https://bugzilla.suse.com/1248655

https://bugzilla.suse.com/1248666

https://bugzilla.suse.com/1248669

https://bugzilla.suse.com/1248746

https://bugzilla.suse.com/1249022

https://bugzilla.suse.com/1249346

https://www.suse.com/security/cve/CVE-2023-3867

https://www.suse.com/security/cve/CVE-2023-4130

https://www.suse.com/security/cve/CVE-2023-4515

https://www.suse.com/security/cve/CVE-2024-46733

https://www.suse.com/security/cve/CVE-2024-58238

https://www.suse.com/security/cve/CVE-2024-58239

https://www.suse.com/security/cve/CVE-2025-38006

https://www.suse.com/security/cve/CVE-2025-38125

https://www.suse.com/security/cve/CVE-2025-38146

https://www.suse.com/security/cve/CVE-2025-38160

https://www.suse.com/security/cve/CVE-2025-38201

https://www.suse.com/security/cve/CVE-2025-38205

https://www.suse.com/security/cve/CVE-2025-38208

https://www.suse.com/security/cve/CVE-2025-38251

https://www.suse.com/security/cve/CVE-2025-38360

https://www.suse.com/security/cve/CVE-2025-38439

https://www.suse.com/security/cve/CVE-2025-38441

https://www.suse.com/security/cve/CVE-2025-38444

https://www.suse.com/security/cve/CVE-2025-38445

https://www.suse.com/security/cve/CVE-2025-38458

https://www.suse.com/security/cve/CVE-2025-38459

https://www.suse.com/security/cve/CVE-2025-38472

https://www.suse.com/security/cve/CVE-2025-38491

https://www.suse.com/security/cve/CVE-2025-38500

https://www.suse.com/security/cve/CVE-2025-38503

https://www.suse.com/security/cve/CVE-2025-38506

https://www.suse.com/security/cve/CVE-2025-38510

https://www.suse.com/security/cve/CVE-2025-38516

https://www.suse.com/security/cve/CVE-2025-38520

https://www.suse.com/security/cve/CVE-2025-38524

https://www.suse.com/security/cve/CVE-2025-38528

https://www.suse.com/security/cve/CVE-2025-38529

https://www.suse.com/security/cve/CVE-2025-38530

https://www.suse.com/security/cve/CVE-2025-38531

https://www.suse.com/security/cve/CVE-2025-38535

https://www.suse.com/security/cve/CVE-2025-38537

https://www.suse.com/security/cve/CVE-2025-38538

https://www.suse.com/security/cve/CVE-2025-38540

https://www.suse.com/security/cve/CVE-2025-38541

https://www.suse.com/security/cve/CVE-2025-38543

https://www.suse.com/security/cve/CVE-2025-38548

https://www.suse.com/security/cve/CVE-2025-38550

https://www.suse.com/security/cve/CVE-2025-38553

https://www.suse.com/security/cve/CVE-2025-38555

https://www.suse.com/security/cve/CVE-2025-38560

https://www.suse.com/security/cve/CVE-2025-38566

https://www.suse.com/security/cve/CVE-2025-38568

https://www.suse.com/security/cve/CVE-2025-38571

https://www.suse.com/security/cve/CVE-2025-38572

https://www.suse.com/security/cve/CVE-2025-38576

https://www.suse.com/security/cve/CVE-2025-38581

https://www.suse.com/security/cve/CVE-2025-38582

https://www.suse.com/security/cve/CVE-2025-38583

https://www.suse.com/security/cve/CVE-2025-38585

https://www.suse.com/security/cve/CVE-2025-38587

https://www.suse.com/security/cve/CVE-2025-38588

https://www.suse.com/security/cve/CVE-2025-38591

https://www.suse.com/security/cve/CVE-2025-38601

https://www.suse.com/security/cve/CVE-2025-38602

https://www.suse.com/security/cve/CVE-2025-38604

https://www.suse.com/security/cve/CVE-2025-38608

https://www.suse.com/security/cve/CVE-2025-38609

https://www.suse.com/security/cve/CVE-2025-38610

https://www.suse.com/security/cve/CVE-2025-38612

https://www.suse.com/security/cve/CVE-2025-38621

https://www.suse.com/security/cve/CVE-2025-38624

https://www.suse.com/security/cve/CVE-2025-38630

https://www.suse.com/security/cve/CVE-2025-38632

https://www.suse.com/security/cve/CVE-2025-38634

https://www.suse.com/security/cve/CVE-2025-38635

https://www.suse.com/security/cve/CVE-2025-38646

https://www.suse.com/security/cve/CVE-2025-38650

https://www.suse.com/security/cve/CVE-2025-38656

https://www.suse.com/security/cve/CVE-2025-38663

https://www.suse.com/security/cve/CVE-2025-38665

https://www.suse.com/security/cve/CVE-2025-38670

https://www.suse.com/security/cve/CVE-2025-38671

https://bugzilla.suse.com/1248334

https://bugzilla.suse.com/1248647

https://www.suse.com/security/cve/CVE-2025-38605

https://www.suse.com/security/cve/CVE-2025-38668

https://bugzilla.suse.com/1241866

https://bugzilla.suse.com/1246190

https://bugzilla.suse.com/1246509

https://bugzilla.suse.com/1247099

https://bugzilla.suse.com/1247126

https://bugzilla.suse.com/1247136

https://bugzilla.suse.com/1247137

https://bugzilla.suse.com/1247223

https://bugzilla.suse.com/1247239

https://bugzilla.suse.com/1247262

https://bugzilla.suse.com/1247442

https://bugzilla.suse.com/1248111

https://bugzilla.suse.com/1248121

https://bugzilla.suse.com/1248192

https://bugzilla.suse.com/1248199

https://bugzilla.suse.com/1248200

https://bugzilla.suse.com/1248202

https://bugzilla.suse.com/1248225

https://bugzilla.suse.com/1248357

https://bugzilla.suse.com/1248360

https://bugzilla.suse.com/1248365

https://bugzilla.suse.com/1248378

https://bugzilla.suse.com/1248380

https://bugzilla.suse.com/1248392

https://bugzilla.suse.com/1248610

https://bugzilla.suse.com/1248619

https://bugzilla.suse.com/1248622

https://bugzilla.suse.com/1248626

https://bugzilla.suse.com/1248628

https://bugzilla.suse.com/1248634

https://bugzilla.suse.com/1248639

https://bugzilla.suse.com/1248674

https://bugzilla.suse.com/1248681

https://bugzilla.suse.com/1248733

https://bugzilla.suse.com/1248734

https://bugzilla.suse.com/1248735

https://bugzilla.suse.com/1248775

https://bugzilla.suse.com/1249122

https://bugzilla.suse.com/1249123

https://bugzilla.suse.com/1249124

https://bugzilla.suse.com/1249125

https://bugzilla.suse.com/1249126

https://bugzilla.suse.com/1249143

https://bugzilla.suse.com/1249163

https://bugzilla.suse.com/1249172

https://bugzilla.suse.com/1249176

https://bugzilla.suse.com/1249186

https://bugzilla.suse.com/1249199

https://bugzilla.suse.com/1249202

https://bugzilla.suse.com/1249206

https://bugzilla.suse.com/1249258

https://bugzilla.suse.com/1249262

https://bugzilla.suse.com/1249284

https://bugzilla.suse.com/1249290

https://bugzilla.suse.com/1249295

https://bugzilla.suse.com/1249305

https://bugzilla.suse.com/1249315

https://bugzilla.suse.com/1249334

https://bugzilla.suse.com/1249374

https://bugzilla.suse.com/1249481

https://bugzilla.suse.com/1249482

https://bugzilla.suse.com/1249488

https://bugzilla.suse.com/1249504

https://bugzilla.suse.com/1249516

https://bugzilla.suse.com/1249526

https://bugzilla.suse.com/1249604

https://bugzilla.suse.com/1250057

https://bugzilla.suse.com/1250336

https://www.suse.com/security/cve/CVE-2025-38255

https://www.suse.com/security/cve/CVE-2025-38402

https://www.suse.com/security/cve/CVE-2025-38408

https://www.suse.com/security/cve/CVE-2025-38418

https://www.suse.com/security/cve/CVE-2025-38419

https://www.suse.com/security/cve/CVE-2025-38456

https://www.suse.com/security/cve/CVE-2025-38466

https://www.suse.com/security/cve/CVE-2025-38488

https://www.suse.com/security/cve/CVE-2025-38514

https://www.suse.com/security/cve/CVE-2025-38526

https://www.suse.com/security/cve/CVE-2025-38527

https://www.suse.com/security/cve/CVE-2025-38533

https://www.suse.com/security/cve/CVE-2025-38544

https://www.suse.com/security/cve/CVE-2025-38574

https://www.suse.com/security/cve/CVE-2025-38590

https://www.suse.com/security/cve/CVE-2025-38593

https://www.suse.com/security/cve/CVE-2025-38595

https://www.suse.com/security/cve/CVE-2025-38597

https://www.suse.com/security/cve/CVE-2025-38614

https://www.suse.com/security/cve/CVE-2025-38622

https://www.suse.com/security/cve/CVE-2025-38623

https://www.suse.com/security/cve/CVE-2025-38639

https://www.suse.com/security/cve/CVE-2025-38640

https://www.suse.com/security/cve/CVE-2025-38643

https://www.suse.com/security/cve/CVE-2025-38645

https://www.suse.com/security/cve/CVE-2025-38659

https://www.suse.com/security/cve/CVE-2025-38660

https://www.suse.com/security/cve/CVE-2025-38664

https://www.suse.com/security/cve/CVE-2025-38676

https://www.suse.com/security/cve/CVE-2025-38678

https://www.suse.com/security/cve/CVE-2025-38679

https://www.suse.com/security/cve/CVE-2025-38701

https://www.suse.com/security/cve/CVE-2025-38705

https://www.suse.com/security/cve/CVE-2025-38709

https://www.suse.com/security/cve/CVE-2025-38721

https://www.suse.com/security/cve/CVE-2025-38722

https://www.suse.com/security/cve/CVE-2025-38730

https://www.suse.com/security/cve/CVE-2025-38732

https://www.suse.com/security/cve/CVE-2025-39678

https://www.suse.com/security/cve/CVE-2025-39682

https://www.suse.com/security/cve/CVE-2025-39691

https://www.suse.com/security/cve/CVE-2025-39703

https://www.suse.com/security/cve/CVE-2025-39705

https://www.suse.com/security/cve/CVE-2025-39718

https://www.suse.com/security/cve/CVE-2025-39746

https://www.suse.com/security/cve/CVE-2025-39773

https://www.suse.com/security/cve/CVE-2025-39782

https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html

Plugin Details

Severity: Medium

ID: 270860

File Name: suse_SU-2025-03602-1.nasl

Version: 1.1

Type: local

Agent: unix

Published: 10/21/2025

Updated: 10/21/2025

Supported Sensors: Continuous Assessment, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: High

Score: 8.4

CVSS v2

Risk Factor: Medium

Base Score: 4.6

Temporal Score: 3.6

Vector: CVSS2#AV:L/AC:L/Au:S/C:N/I:N/A:C

CVSS Score Source: CVE-2024-53125

CVSS v3

Risk Factor: Medium

Base Score: 5.5

Temporal Score: 5

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:novell:suse_linux:kernel-coco_debug, p-cpe:/a:novell:suse_linux:kernel-syms-coco, p-cpe:/a:novell:suse_linux:kernel-coco, p-cpe:/a:novell:suse_linux:kernel-source-coco, p-cpe:/a:novell:suse_linux:kernel-coco_debug-devel, p-cpe:/a:novell:suse_linux:kernel-devel-coco, p-cpe:/a:novell:suse_linux:reiserfs-kmp-coco, p-cpe:/a:novell:suse_linux:kernel-coco-devel, cpe:/o:novell:suse_linux:15

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 10/15/2025

Vulnerability Publication Date: 3/23/2024

Reference Information

CVE: CVE-2023-3867, CVE-2023-4130, CVE-2023-4515, CVE-2024-26661, CVE-2024-46733, CVE-2024-53125, CVE-2024-58238, CVE-2024-58239, CVE-2025-22022, CVE-2025-37885, CVE-2025-38006, CVE-2025-38075, CVE-2025-38103, CVE-2025-38125, CVE-2025-38146, CVE-2025-38160, CVE-2025-38184, CVE-2025-38185, CVE-2025-38190, CVE-2025-38201, CVE-2025-38205, CVE-2025-38208, CVE-2025-38245, CVE-2025-38251, CVE-2025-38255, CVE-2025-38263, CVE-2025-38360, CVE-2025-38402, CVE-2025-38408, CVE-2025-38418, CVE-2025-38419, CVE-2025-38439, CVE-2025-38441, CVE-2025-38444, CVE-2025-38445, CVE-2025-38456, CVE-2025-38458, CVE-2025-38459, CVE-2025-38464, CVE-2025-38466, CVE-2025-38472, CVE-2025-38488, CVE-2025-38491, CVE-2025-38499, CVE-2025-38500, CVE-2025-38503, CVE-2025-38506, CVE-2025-38510, CVE-2025-38512, CVE-2025-38513, CVE-2025-38514, CVE-2025-38515, CVE-2025-38516, CVE-2025-38520, CVE-2025-38524, CVE-2025-38526, CVE-2025-38527, CVE-2025-38528, CVE-2025-38529, CVE-2025-38530, CVE-2025-38531, CVE-2025-38533, CVE-2025-38535, CVE-2025-38537, CVE-2025-38538, CVE-2025-38540, CVE-2025-38541, CVE-2025-38543, CVE-2025-38544, CVE-2025-38546, CVE-2025-38548, CVE-2025-38550, CVE-2025-38553, CVE-2025-38555, CVE-2025-38556, CVE-2025-38560, CVE-2025-38563, CVE-2025-38565, CVE-2025-38566, CVE-2025-38568, CVE-2025-38571, CVE-2025-38572, CVE-2025-38574, CVE-2025-38576, CVE-2025-38581, CVE-2025-38582, CVE-2025-38583, CVE-2025-38585, CVE-2025-38587, CVE-2025-38588, CVE-2025-38590, CVE-2025-38591, CVE-2025-38593, CVE-2025-38595, CVE-2025-38597, CVE-2025-38601, CVE-2025-38602, CVE-2025-38604, CVE-2025-38605, CVE-2025-38608, CVE-2025-38609, CVE-2025-38610, CVE-2025-38612, CVE-2025-38614, CVE-2025-38617, CVE-2025-38618, CVE-2025-38621, CVE-2025-38622, CVE-2025-38623, CVE-2025-38624, CVE-2025-38630, CVE-2025-38632, CVE-2025-38634, CVE-2025-38635, CVE-2025-38639, CVE-2025-38640, CVE-2025-38643, CVE-2025-38644, CVE-2025-38645, CVE-2025-38646, CVE-2025-38650, CVE-2025-38656, CVE-2025-38659, CVE-2025-38660, CVE-2025-38663, CVE-2025-38664, CVE-2025-38665, CVE-2025-38668, CVE-2025-38670, CVE-2025-38671, CVE-2025-38676, CVE-2025-38678, CVE-2025-38679, CVE-2025-38701, CVE-2025-38705, CVE-2025-38709, CVE-2025-38721, CVE-2025-38722, CVE-2025-38730, CVE-2025-38732, CVE-2025-39678, CVE-2025-39682, CVE-2025-39691, CVE-2025-39703, CVE-2025-39705, CVE-2025-39718, CVE-2025-39746, CVE-2025-39773, CVE-2025-39782

SuSE: SUSE-SU-2025:03602-1