SUSE SLES15 Security Update : kernel (SUSE-SU-2025:3725-1)

high Nessus Plugin ID 271252

Synopsis

The remote SUSE host is missing one or more security updates.

Description

The remote SUSE Linux SLES15 host has a package installed that is affected by multiple vulnerabilities as referenced in the SUSE-SU-2025:3725-1 advisory.

The SUSE Linux Enterprise 15 SP7 RT kernel was updated to receive various security bugfixes.


The following security bugs were fixed:

- CVE-2023-53261: coresight: Fix memory leak in acpi_buffer->pointer (bsc#1249770).
- CVE-2024-58090: sched/core: Prevent rescheduling when interrupts are disabled (bsc#1240324).
- CVE-2025-22022: usb: xhci: Apply the link chain quirk on NEC isoc endpoints (bsc#1241292).
- CVE-2025-38119: scsi: core: ufs: Fix a hang in the error handler (bsc#1245700).
- CVE-2025-38216: iommu/vt-d: Restore context entry setup order for aliased devices (bsc#1245963).
- CVE-2025-38234: sched/rt: Fix race in push_rt_task (bsc#1246057).
- CVE-2025-38263: bcache: fix NULL pointer in cache_set_flush() (bsc#1246248).
- CVE-2025-38351: KVM: x86/hyper-v: Skip non-canonical addresses during PV TLB flush (bsc#1246782).
- CVE-2025-38402: idpf: return 0 size for RSS key if not supported (bsc#1247262).
- CVE-2025-38408: genirq/irq_sim: Initialize work context pointers properly (bsc#1247126).
- CVE-2025-38418: remoteproc: core: Release rproc->clean_table after rproc_attach() fails (bsc#1247137).
- CVE-2025-38419: remoteproc: core: Cleanup acquired resources when rproc_handle_resources() fails in rproc_attach() (bsc#1247136).
- CVE-2025-38456: ipmi:msghandler: Fix potential memory corruption in ipmi_create_user() (bsc#1247099).
- CVE-2025-38466: perf: Revert to requiring CAP_SYS_ADMIN for uprobes (bsc#1247442).
- CVE-2025-38488: smb: client: fix use-after-free in crypt_message when using async crypto (bsc#1247239).
- CVE-2025-38514: rxrpc: Fix oops due to non-existence of prealloc backlog struct (bsc#1248202).
- CVE-2025-38526: ice: add NULL check in eswitch lag check (bsc#1248192).
- CVE-2025-38527: smb: client: fix use-after-free in cifs_oplock_break (bsc#1248199).
- CVE-2025-38533: net: libwx: fix the using of Rx buffer DMA (bsc#1248200).
- CVE-2025-38544: rxrpc: Fix bug due to prealloc collision (bsc#1248225).
- CVE-2025-38556: HID: core: Harden s32ton() against conversion to 0 bits (bsc#1248296).
- CVE-2025-38574: pptp: ensure minimal skb length in pptp_xmit() (bsc#1248365).
- CVE-2025-38584: padata: Fix pd UAF once and for all (bsc1248343).
- CVE-2025-38590: net/mlx5e: Remove skb secpath if xfrm state is not found (bsc#1248360).
- CVE-2025-38593: kABI workaround for bluetooth discovery_state change (bsc#1248357).
- CVE-2025-38595: xen: fix UAF in dmabuf_exp_from_pages() (bsc#1248380).
- CVE-2025-38597: drm/rockchip: vop2: fail cleanly if missing a primary plane for a video-port (bsc#1248378).
- CVE-2025-38614: eventpoll: Fix semi-unbounded recursion (bsc#1248392).
- CVE-2025-38616: tls: handle data disappearing from under the TLS ULP (bsc#1248512).
- CVE-2025-38622: net: drop UFO packets in udp_rcv_segment() (bsc#1248619).
- CVE-2025-38623: PCI: pnv_php: Fix surprise plug detection and recovery (bsc#1248610).
- CVE-2025-38628: vdpa/mlx5: Fix release of uninitialized resources on error path (bsc#1248616).
- CVE-2025-38639: netfilter: xt_nfacct: do not assume acct name is null-terminated (bsc#1248674).
- CVE-2025-38640: bpf: Disable migration in nf_hook_run_bpf() (bsc#1248622).
- CVE-2025-38643: wifi: cfg80211: Add missing lock in cfg80211_check_and_end_cac() (bsc#1248681).
- CVE-2025-38645: net/mlx5: Check device memory pointer before usage (bsc#1248626).
- CVE-2025-38659: gfs2: No more self recovery (bsc#1248639).
- CVE-2025-38660: [ceph] parse_longname(): strrchr() expects NUL-terminated string (bsc#1248634).
- CVE-2025-38664: ice: Fix a null pointer dereference in ice_copy_and_init_pkg() (bsc#1248628).
- CVE-2025-38676: iommu/amd: Avoid stack buffer overflow from kernel cmdline (bsc#1248775).
- CVE-2025-38678: netfilter: nf_tables: reject duplicate device on updates (bsc#1249126).
- CVE-2025-38679: media: venus: Fix OOB read due to missing payload bound check (bsc#1249202).
- CVE-2025-38684: net/sched: ets: use old 'nbands' while purging unused classes (bsc#1249156).
- CVE-2025-38701: ext4: do not BUG when INLINE_DATA_FL lacks system.data xattr (bsc#1249258).
- CVE-2025-38705: drm/amd/pm: fix null pointer access (bsc#1249334).
- CVE-2025-38709: loop: Avoid updating block size under exclusive owner (bsc#1249199).
- CVE-2025-38710: gfs2: Validate i_depth for exhash directories (bsc#1249201).
- CVE-2025-38721: netfilter: ctnetlink: fix refcount leak on table dump (bsc#1249176).
- CVE-2025-38722: habanalabs: fix UAF in export_dmabuf() (bsc#1249163).
- CVE-2025-38730: io_uring/net: commit partial buffers on retry (bsc#1249172).
- CVE-2025-38732: netfilter: nf_reject: do not leak dst refcount for loopback packets (bsc#1249262).
- CVE-2025-39677: net/sched: Fix backlog accounting in qdisc_dequeue_internal (bsc#1249300).
- CVE-2025-39678: platform/x86/amd/hsmp: Ensure sock->metric_tbl_addr is non-NULL (bsc#1249290).
- CVE-2025-39681: x86/cpu/hygon: Add missing resctrl_cpu_detect() in bsp_init helper (bsc#1249303).
- CVE-2025-39682: tls: fix handling of zero-length records on the rx_list (bsc#1249284).
- CVE-2025-39691: fs/buffer: fix use-after-free when call bh_read() helper (bsc#1249374).
- CVE-2025-39703: net, hsr: reject HSR frame if skb can't hold tag (bsc#1249315).
- CVE-2025-39705: drm/amd/display: fix a Null pointer dereference vulnerability (bsc#1249295).
- CVE-2025-39718: vsock/virtio: Validate length in packet header before skb_put() (bsc#1249305).
- CVE-2025-39738: btrfs: do not allow relocation of partially dropped subvolumes (bsc#1249540).
- CVE-2025-39744: rcu: Fix rcu_read_unlock() deadloop due to IRQ work (bsc#1249494).
- CVE-2025-39746: wifi: ath10k: shutdown driver when hardware is unreliable (bsc#1249516).
- CVE-2025-39749: rcu: Protect ->defer_qs_iw_pending from data race (bsc#1249533).
- CVE-2025-39754: mm/smaps: fix race between smaps_hugetlb_range and migration (bsc#1249524).
- CVE-2025-39764: netfilter: ctnetlink: remove refcounting in expectation dumpers (bsc#1249513).
- CVE-2025-39766: net/sched: Make cake_enqueue return NET_XMIT_CN when past buffer_limit (bsc#1249510).
- CVE-2025-39770: net: gso: Forbid IPv6 TSO with extensions on devices with only IPV6_CSUM (bsc#1249508).
- CVE-2025-39773: net: bridge: fix soft lockup in br_multicast_query_expired() (bsc#1249504).
- CVE-2025-39782: jbd2: prevent softlockup in jbd2_log_do_checkpoint() (bsc#1249526).
- CVE-2025-39787: soc: qcom: mdt_loader: Deal with zero e_shentsize (bsc#1249545).
- CVE-2025-39797: xfrm: xfrm_alloc_spi shouldn't use 0 as SPI (bsc#1249608).
- CVE-2025-39816: io_uring/kbuf: always use READ_ONCE() to read ring provided buffer lengths (bsc#1249906).
- CVE-2025-39823: KVM: x86: use array_index_nospec with indices that come from guest (bsc#1250002).
- CVE-2025-39825: smb: client: fix race with concurrent opens in rename(2) (bsc#1250179).
- CVE-2025-39830: net/mlx5: HWS, Fix memory leak in hws_pool_buddy_init error path (bsc#1249974).
- CVE-2025-39834: net/mlx5: HWS, Fix memory leak in hws_action_get_shared_stc_nic error flow (bsc#1250021).
- CVE-2025-39835: xfs: do not propagate ENODATA disk errors into xattr code (bsc#1250025).
- CVE-2025-39838: cifs: prevent NULL pointer dereference in UTF16 conversion (bsc#1250365).
- CVE-2025-39842: ocfs2: prevent release journal inode after journal shutdown (bsc#1250267).
- CVE-2025-39857: net/smc: fix one NULL pointer dereference in smc_ib_is_sg_need_sync() (bsc#1250251).
- CVE-2025-39865: tee: fix NULL pointer dereference in tee_shm_put (bsc#1250294).
- CVE-2025-39885: ocfs2: fix recursive semaphore deadlock in fiemap call (bsc#1250407).
- CVE-2025-39922: ixgbe: fix incorrect map used in eee linkmode (bsc#1250722).
- CVE-2025-40300: x86/vmscape: Warn when STIBP is disabled with SMT (bsc#1247483).


Tenable has extracted the preceding description block directly from the SUSE security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected kernel-livepatch-6_4_0-150700_7_19-rt package.

See Also

https://bugzilla.suse.com/1212533

https://bugzilla.suse.com/1216527

https://bugzilla.suse.com/1218644

https://bugzilla.suse.com/1227555

https://bugzilla.suse.com/1230062

https://bugzilla.suse.com/1236897

https://bugzilla.suse.com/1237449

https://bugzilla.suse.com/1237776

https://bugzilla.suse.com/1238782

https://bugzilla.suse.com/1240324

https://bugzilla.suse.com/1241166

https://bugzilla.suse.com/1241292

https://bugzilla.suse.com/1241866

https://bugzilla.suse.com/1243112

https://bugzilla.suse.com/1245538

https://bugzilla.suse.com/1245700

https://bugzilla.suse.com/1245963

https://bugzilla.suse.com/1246057

https://bugzilla.suse.com/1246190

https://bugzilla.suse.com/1246248

https://bugzilla.suse.com/1246298

https://bugzilla.suse.com/1246509

https://bugzilla.suse.com/1246782

https://bugzilla.suse.com/1247099

https://bugzilla.suse.com/1247126

https://bugzilla.suse.com/1247136

https://bugzilla.suse.com/1247137

https://bugzilla.suse.com/1247223

https://bugzilla.suse.com/1247239

https://bugzilla.suse.com/1247262

https://bugzilla.suse.com/1247442

https://bugzilla.suse.com/1247483

https://bugzilla.suse.com/1247963

https://bugzilla.suse.com/1248111

https://bugzilla.suse.com/1248121

https://bugzilla.suse.com/1248192

https://bugzilla.suse.com/1248199

https://bugzilla.suse.com/1248200

https://bugzilla.suse.com/1248202

https://bugzilla.suse.com/1248225

https://bugzilla.suse.com/1248296

https://bugzilla.suse.com/1248343

https://bugzilla.suse.com/1248357

https://bugzilla.suse.com/1248360

https://bugzilla.suse.com/1248365

https://bugzilla.suse.com/1248378

https://bugzilla.suse.com/1248380

https://bugzilla.suse.com/1248392

https://bugzilla.suse.com/1248512

https://bugzilla.suse.com/1248610

https://bugzilla.suse.com/1248616

https://bugzilla.suse.com/1248619

https://bugzilla.suse.com/1248622

https://bugzilla.suse.com/1248626

https://bugzilla.suse.com/1248628

https://bugzilla.suse.com/1248634

https://bugzilla.suse.com/1248639

https://bugzilla.suse.com/1248674

https://bugzilla.suse.com/1248681

https://bugzilla.suse.com/1248733

https://bugzilla.suse.com/1248734

https://bugzilla.suse.com/1248735

https://bugzilla.suse.com/1248775

https://bugzilla.suse.com/1249122

https://bugzilla.suse.com/1249123

https://bugzilla.suse.com/1249124

https://bugzilla.suse.com/1249125

https://bugzilla.suse.com/1249126

https://bugzilla.suse.com/1249143

https://bugzilla.suse.com/1249156

https://bugzilla.suse.com/1249163

https://bugzilla.suse.com/1249172

https://bugzilla.suse.com/1249176

https://bugzilla.suse.com/1249183

https://bugzilla.suse.com/1249186

https://bugzilla.suse.com/1249193

https://bugzilla.suse.com/1249199

https://bugzilla.suse.com/1249201

https://bugzilla.suse.com/1249202

https://bugzilla.suse.com/1249206

https://bugzilla.suse.com/1249258

https://bugzilla.suse.com/1249262

https://bugzilla.suse.com/1249274

https://bugzilla.suse.com/1249284

https://bugzilla.suse.com/1249290

https://bugzilla.suse.com/1249295

https://bugzilla.suse.com/1249300

https://bugzilla.suse.com/1249303

https://bugzilla.suse.com/1249305

https://bugzilla.suse.com/1249306

https://bugzilla.suse.com/1249315

https://bugzilla.suse.com/1249333

https://bugzilla.suse.com/1249334

https://bugzilla.suse.com/1249374

https://bugzilla.suse.com/1249481

https://bugzilla.suse.com/1249482

https://bugzilla.suse.com/1249488

https://bugzilla.suse.com/1249494

https://bugzilla.suse.com/1249504

https://bugzilla.suse.com/1249508

https://bugzilla.suse.com/1249510

https://bugzilla.suse.com/1249513

https://bugzilla.suse.com/1249516

https://bugzilla.suse.com/1249524

https://bugzilla.suse.com/1249526

https://bugzilla.suse.com/1249533

https://bugzilla.suse.com/1249540

https://bugzilla.suse.com/1249545

https://bugzilla.suse.com/1249566

https://bugzilla.suse.com/1249604

https://bugzilla.suse.com/1249608

https://bugzilla.suse.com/1249770

https://bugzilla.suse.com/1249887

https://bugzilla.suse.com/1249906

https://bugzilla.suse.com/1249915

https://bugzilla.suse.com/1249974

https://bugzilla.suse.com/1250002

https://bugzilla.suse.com/1250021

https://bugzilla.suse.com/1250025

https://bugzilla.suse.com/1250057

https://bugzilla.suse.com/1250179

https://bugzilla.suse.com/1250251

https://bugzilla.suse.com/1250267

https://bugzilla.suse.com/1250294

https://bugzilla.suse.com/1250334

https://bugzilla.suse.com/1250336

https://bugzilla.suse.com/1250344

https://bugzilla.suse.com/1250365

https://bugzilla.suse.com/1250407

https://bugzilla.suse.com/1250522

https://bugzilla.suse.com/1250530

https://bugzilla.suse.com/1250574

https://bugzilla.suse.com/1250655

https://bugzilla.suse.com/1250722

https://bugzilla.suse.com/1250952

https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html

https://www.suse.com/security/cve/CVE-2023-53261

https://www.suse.com/security/cve/CVE-2023-5633

https://www.suse.com/security/cve/CVE-2024-58090

https://www.suse.com/security/cve/CVE-2025-22022

https://www.suse.com/security/cve/CVE-2025-38119

https://www.suse.com/security/cve/CVE-2025-38216

https://www.suse.com/security/cve/CVE-2025-38234

https://www.suse.com/security/cve/CVE-2025-38255

https://www.suse.com/security/cve/CVE-2025-38263

https://www.suse.com/security/cve/CVE-2025-38351

https://www.suse.com/security/cve/CVE-2025-38402

https://www.suse.com/security/cve/CVE-2025-38408

https://www.suse.com/security/cve/CVE-2025-38418

https://www.suse.com/security/cve/CVE-2025-38419

https://www.suse.com/security/cve/CVE-2025-38456

https://www.suse.com/security/cve/CVE-2025-38466

https://www.suse.com/security/cve/CVE-2025-38488

https://www.suse.com/security/cve/CVE-2025-38514

https://www.suse.com/security/cve/CVE-2025-38526

https://www.suse.com/security/cve/CVE-2025-38527

https://www.suse.com/security/cve/CVE-2025-38533

https://www.suse.com/security/cve/CVE-2025-38544

https://www.suse.com/security/cve/CVE-2025-38556

https://www.suse.com/security/cve/CVE-2025-38574

https://www.suse.com/security/cve/CVE-2025-38584

https://www.suse.com/security/cve/CVE-2025-38590

https://www.suse.com/security/cve/CVE-2025-38593

https://www.suse.com/security/cve/CVE-2025-38595

https://www.suse.com/security/cve/CVE-2025-38597

https://www.suse.com/security/cve/CVE-2025-38614

https://www.suse.com/security/cve/CVE-2025-38616

https://www.suse.com/security/cve/CVE-2025-38622

https://www.suse.com/security/cve/CVE-2025-38623

https://www.suse.com/security/cve/CVE-2025-38628

https://www.suse.com/security/cve/CVE-2025-38639

https://www.suse.com/security/cve/CVE-2025-38640

https://www.suse.com/security/cve/CVE-2025-38643

https://www.suse.com/security/cve/CVE-2025-38645

https://www.suse.com/security/cve/CVE-2025-38659

https://www.suse.com/security/cve/CVE-2025-38660

https://www.suse.com/security/cve/CVE-2025-38664

https://www.suse.com/security/cve/CVE-2025-38676

https://www.suse.com/security/cve/CVE-2025-38678

https://www.suse.com/security/cve/CVE-2025-38679

https://www.suse.com/security/cve/CVE-2025-38684

https://www.suse.com/security/cve/CVE-2025-38701

https://www.suse.com/security/cve/CVE-2025-38703

https://www.suse.com/security/cve/CVE-2025-38705

https://www.suse.com/security/cve/CVE-2025-38709

https://www.suse.com/security/cve/CVE-2025-38710

https://www.suse.com/security/cve/CVE-2025-38721

https://www.suse.com/security/cve/CVE-2025-38722

https://www.suse.com/security/cve/CVE-2025-38730

https://www.suse.com/security/cve/CVE-2025-38732

https://www.suse.com/security/cve/CVE-2025-39677

https://www.suse.com/security/cve/CVE-2025-39678

https://www.suse.com/security/cve/CVE-2025-39681

https://www.suse.com/security/cve/CVE-2025-39682

https://www.suse.com/security/cve/CVE-2025-39691

https://www.suse.com/security/cve/CVE-2025-39695

https://www.suse.com/security/cve/CVE-2025-39703

https://www.suse.com/security/cve/CVE-2025-39705

https://www.suse.com/security/cve/CVE-2025-39707

https://www.suse.com/security/cve/CVE-2025-39711

https://www.suse.com/security/cve/CVE-2025-39718

https://www.suse.com/security/cve/CVE-2025-39738

https://www.suse.com/security/cve/CVE-2025-39744

https://www.suse.com/security/cve/CVE-2025-39746

https://www.suse.com/security/cve/CVE-2025-39747

https://www.suse.com/security/cve/CVE-2025-39749

https://www.suse.com/security/cve/CVE-2025-39754

https://www.suse.com/security/cve/CVE-2025-39764

https://www.suse.com/security/cve/CVE-2025-39766

https://www.suse.com/security/cve/CVE-2025-39770

https://www.suse.com/security/cve/CVE-2025-39773

https://www.suse.com/security/cve/CVE-2025-39782

https://www.suse.com/security/cve/CVE-2025-39787

https://www.suse.com/security/cve/CVE-2025-39797

https://www.suse.com/security/cve/CVE-2025-39807

https://www.suse.com/security/cve/CVE-2025-39811

https://www.suse.com/security/cve/CVE-2025-39816

https://www.suse.com/security/cve/CVE-2025-39823

https://www.suse.com/security/cve/CVE-2025-39825

https://www.suse.com/security/cve/CVE-2025-39830

https://www.suse.com/security/cve/CVE-2025-39834

https://www.suse.com/security/cve/CVE-2025-39835

https://www.suse.com/security/cve/CVE-2025-39838

https://www.suse.com/security/cve/CVE-2025-39842

https://www.suse.com/security/cve/CVE-2025-39857

https://www.suse.com/security/cve/CVE-2025-39865

https://www.suse.com/security/cve/CVE-2025-39885

https://www.suse.com/security/cve/CVE-2025-39890

https://www.suse.com/security/cve/CVE-2025-39922

https://www.suse.com/security/cve/CVE-2025-40300

Plugin Details

Severity: High

ID: 271252

File Name: suse_SU-2025-3725-1.nasl

Version: 1.1

Type: local

Agent: unix

Published: 10/23/2025

Updated: 10/23/2025

Supported Sensors: Nessus Agent, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.1

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5.3

Vector: CVSS2#AV:L/AC:L/Au:S/C:C/I:C/A:C

CVSS Score Source: CVE-2023-5633

CVSS v3

Risk Factor: High

Base Score: 7.8

Temporal Score: 7

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:novell:suse_linux:kernel-livepatch-6_4_0-150700_7_19-rt, cpe:/o:novell:suse_linux:15

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 10/22/2025

Vulnerability Publication Date: 10/23/2023

Reference Information

CVE: CVE-2023-53261, CVE-2023-5633, CVE-2024-58090, CVE-2025-22022, CVE-2025-38119, CVE-2025-38216, CVE-2025-38234, CVE-2025-38255, CVE-2025-38263, CVE-2025-38351, CVE-2025-38402, CVE-2025-38408, CVE-2025-38418, CVE-2025-38419, CVE-2025-38456, CVE-2025-38466, CVE-2025-38488, CVE-2025-38514, CVE-2025-38526, CVE-2025-38527, CVE-2025-38533, CVE-2025-38544, CVE-2025-38556, CVE-2025-38574, CVE-2025-38584, CVE-2025-38590, CVE-2025-38593, CVE-2025-38595, CVE-2025-38597, CVE-2025-38614, CVE-2025-38616, CVE-2025-38622, CVE-2025-38623, CVE-2025-38628, CVE-2025-38639, CVE-2025-38640, CVE-2025-38643, CVE-2025-38645, CVE-2025-38659, CVE-2025-38660, CVE-2025-38664, CVE-2025-38676, CVE-2025-38678, CVE-2025-38679, CVE-2025-38684, CVE-2025-38701, CVE-2025-38703, CVE-2025-38705, CVE-2025-38709, CVE-2025-38710, CVE-2025-38721, CVE-2025-38722, CVE-2025-38730, CVE-2025-38732, CVE-2025-39677, CVE-2025-39678, CVE-2025-39681, CVE-2025-39682, CVE-2025-39691, CVE-2025-39695, CVE-2025-39703, CVE-2025-39705, CVE-2025-39707, CVE-2025-39711, CVE-2025-39718, CVE-2025-39738, CVE-2025-39744, CVE-2025-39746, CVE-2025-39747, CVE-2025-39749, CVE-2025-39754, CVE-2025-39764, CVE-2025-39766, CVE-2025-39770, CVE-2025-39773, CVE-2025-39782, CVE-2025-39787, CVE-2025-39797, CVE-2025-39807, CVE-2025-39811, CVE-2025-39816, CVE-2025-39823, CVE-2025-39825, CVE-2025-39830, CVE-2025-39834, CVE-2025-39835, CVE-2025-39838, CVE-2025-39842, CVE-2025-39857, CVE-2025-39865, CVE-2025-39885, CVE-2025-39890, CVE-2025-39922, CVE-2025-40300

SuSE: SUSE-SU-2025:3725-1