SUSE SLES15 / openSUSE 15 Security Update : kernel (SUSE-SU-2025:4128-1)

medium Nessus Plugin ID 275760

Synopsis

The remote SUSE host is missing one or more security updates.

Description

The remote SUSE Linux SLES15 / SLES_SAP15 / openSUSE 15 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2025:4128-1 advisory.

The SUSE Linux Enterprise 15 SP6 Azure kernel was updated to fix various security issues

The following security issues were fixed:

- CVE-2025-38008: mm/page_alloc: fix race condition in unaccepted memory handling (bsc#1244939).
- CVE-2025-38539: trace/fgraph: Fix the warning caused by missing unregister notifier (bsc#1248211).
- CVE-2025-38552: mptcp: plug races between subflow fail and subflow creation (bsc#1248230).
- CVE-2025-38653: proc: use the same treatment to check proc_lseek as ones for proc_read_iter et.al (bsc#1248630).
- CVE-2025-38699: scsi: bfa: Double-free fix (bsc#1249224).
- CVE-2025-38700: scsi: libiscsi: Initialize iscsi_conn->dd_data only if memory is allocated (bsc#1249182).
- CVE-2025-38718: sctp: linearize cloned gso packets in sctp_rcv (bsc#1249161).
- CVE-2025-39673: ppp: fix race conditions in ppp_fill_forward_path (bsc#1249320).
- CVE-2025-39676: scsi: qla4xxx: Prevent a potential error pointer dereference (bsc#1249302).
- CVE-2025-39683: tracing: Limit access to parser->buffer when trace_get_user failed (bsc#1249286).
- CVE-2025-39697: nfs: remove dead code for the old swap over NFS implementation (bsc#1249319).
- CVE-2025-39702: ipv6: sr: Fix MAC comparison to be constant-time (bsc#1249317).
- CVE-2025-39756: fs: Prevent file descriptor table allocations exceeding INT_MAX (bsc#1249512).
- CVE-2025-39794: ARM: tegra: Use I/O memcpy to write to IRAM (bsc#1249595).
- CVE-2025-39812: sctp: initialize more fields in sctp_v6_from_sk() (bsc#1250202).
- CVE-2025-39813: ftrace: Fix potential warning in trace_printk_seq during ftrace_dump (bsc#1250032).
- CVE-2025-39851: vxlan: Fix NPD when refreshing an FDB entry with a nexthop object (bsc#1250296).
- CVE-2025-39866: fs: writeback: fix use-after-free in __mark_inode_dirty() (bsc#1250455).
- CVE-2025-39876: net: fec: Fix possible NPD in fec_enet_phy_reset_after_clk_enable() (bsc#1250400).
- CVE-2025-39881: kernfs: Fix UAF in polling when open file is released (bsc#1250379).
- CVE-2025-39895: sched: Fix sched_numa_find_nth_cpu() if mask offline (bsc#1250721).
- CVE-2025-39902: mm/slub: avoid accessing metadata when pointer is invalid in object_err() (bsc#1250702).
- CVE-2025-39911: i40e: fix IRQ freeing in i40e_vsi_request_irq_msix error path (bsc#1250704).
- CVE-2025-39945: cnic: Fix use-after-free bugs in cnic_delete_task (bsc#1251230).
- CVE-2025-39946: tls: make sure to abort the stream if headers are bogus (bsc#1251114).
- CVE-2025-39947: net/mlx5e: Harden uplink netdev access against device unbind (bsc#1251232).
- CVE-2025-39948: ice: fix Rx page leak on multi-buffer frames (bsc#1251233).
- CVE-2025-39949: qed: Don't collect too many protection override GRC elements (bsc#1251177).
- CVE-2025-39955: tcp: Clear tcp_sk(sk)->fastopen_rsk in tcp_disconnect() (bsc#1251804).
- CVE-2025-39968: i40e: add max boundary check for VF filters (bsc#1252047).
- CVE-2025-39969: i40e: fix validation of VF state in get resources (bsc#1252044).
- CVE-2025-39970: i40e: fix input validation logic for action_meta (bsc#1252051).
- CVE-2025-39971: i40e: fix idx validation in config queues msg (bsc#1252052).
- CVE-2025-39972: i40e: fix idx validation in i40e_validate_queue_map (bsc#1252039).
- CVE-2025-39973: i40e: add validation for ring_len param (bsc#1252035).
- CVE-2025-39978: octeontx2-pf: Fix potential use after free in otx2_tc_add_flow() (bsc#1252069).
- CVE-2025-40000: wifi: rtw89: fix use-after-free in rtw89_core_tx_kick_off_and_wait() (bsc#1252062).
- CVE-2025-40005: spi: cadence-quadspi: Implement refcount to handle unbind during busy (bsc#1252349).
- CVE-2025-40018: ipvs: Defer ip_vs_ftp unregister during netns cleanup (bsc#1252688).
- CVE-2025-40051: vhost: vringh: Modify the return value check (bsc#1252858).
- CVE-2025-40056: vhost: vringh: Fix copy_to_iter return value check (bsc#1252826).
- CVE-2025-40060: coresight: trbe: Return NULL pointer for allocation failures (bsc#1252848).
- CVE-2025-40078: bpf: Explicitly check accesses to bpf_sock_addr (bsc#1252789).
- CVE-2025-40080: nbd: restrict sockets to TCP and UDP (bsc#1252774).
- CVE-2025-40100: btrfs: do not assert we found block group item when creating free space tree (bsc#1252918).

The following non security issues were fixed:

- ACPI: battery: Add synchronization between interface updates (git-fixes).
- KVM: PPC: Fix misleading interrupts comment in kvmppc_prepare_to_enter() (bsc#1215199).
- KVM: x86: Plumb in the vCPU to kvm_x86_ops.hwapic_isr_update() (git-fixes).
- KVM: x86: Process 'guest stopped request' once per guest time update (git-fixes).
- bpf: Allow helper bpf_get_[ns_]current_pid_tgid() for all prog types (bsc#1252364).
- cpufreq: intel_pstate: Fix object lifecycle issue in update_qos_request() (stable-fixes git-fixes).
- drm/amd/pm: fix smu table id bound check issue in smu_cmn_update_table() (git-fixes).
- ext4: fix checks for orphan inodes (bsc#1250119).
- hfsplus: fix KMSAN uninit-value issue in hfsplus_delete_cat() (git-fixes).
- kdb: Replace deprecated strcpy() with memmove() in vkdb_printf() (bsc#1252939).
- module: Prevent silent truncation of module name in delete_module(2) (git-fixes).
- net: mana: Use page pool fragments for RX buffers instead of full pages to improve memory efficiency (bsc#1248754).
- netfilter: nft_objref: validate objref and objrefmap expressions (bsc#1250237).
- perf/x86/intel: Allow to update user space GPRs from PEBS records (git-fixes).
- perf/x86/intel: Fix crash in icl_update_topdown_event() (git-fixes).
- phy: cadence: cdns-dphy: Update calibration wait time for startup state machine (git-fixes).
- powerpc/boot: Fix build with gcc 15 (bsc#1215199).
- powerpc/kvm: Fix ifdef to remove build warning (bsc#1215199).
- powerpc/powernv/pci: Fix underflow and leak issue (bsc#1215199).
- powerpc/pseries/msi: Fix potential underflow and leak issue (bsc#1215199).
- powerpc: floppy: Add missing checks after DMA map (bsc#1215199).
- proc: fix missing pde_set_flags() for net proc files (bsc#1248630)
- proc: fix type confusion in pde_set_flags() (bsc#1248630)
- sched/idle: Conditionally handle tick broadcast in default_idle_call() (bsc#1248517).
- skmsg: Return copied bytes in sk_msg_memcopy_from_iter (bsc#1250650).
- smb: client: fix crypto buffers in non-linear memory (bsc#1250491, bsc#1239206).
- smb: client: fix potential cfid UAF in smb2_query_info_compound (bsc#1248886).
- tcp_bpf: Fix copied value in tcp_bpf_sendmsg (bsc#1250650).
- tracing: Remove unneeded goto out logic (bsc#1249286).
- x86/idle: Sanitize X86_BUG_AMD_E400 handling (bsc#1248517).

Tenable has extracted the preceding description block directly from the SUSE security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://bugzilla.suse.com/1214954

https://bugzilla.suse.com/1012628

https://bugzilla.suse.com/1215199

https://bugzilla.suse.com/1220419

https://bugzilla.suse.com/1249608

https://bugzilla.suse.com/1250519

https://www.suse.com/security/cve/CVE-2025-39797

https://bugzilla.suse.com/1250237

https://bugzilla.suse.com/1215143

https://bugzilla.suse.com/1216396

https://bugzilla.suse.com/1239206

https://bugzilla.suse.com/1244939

https://bugzilla.suse.com/1248211

https://bugzilla.suse.com/1248230

https://bugzilla.suse.com/1248517

https://bugzilla.suse.com/1248630

https://bugzilla.suse.com/1248754

https://bugzilla.suse.com/1248886

https://bugzilla.suse.com/1249161

https://bugzilla.suse.com/1249182

https://bugzilla.suse.com/1249224

https://bugzilla.suse.com/1249286

https://bugzilla.suse.com/1249302

https://bugzilla.suse.com/1249317

https://bugzilla.suse.com/1249319

https://bugzilla.suse.com/1249320

https://bugzilla.suse.com/1249512

https://bugzilla.suse.com/1249595

https://bugzilla.suse.com/1250032

https://bugzilla.suse.com/1250119

https://bugzilla.suse.com/1250202

https://bugzilla.suse.com/1250274

https://bugzilla.suse.com/1250296

https://bugzilla.suse.com/1250379

https://bugzilla.suse.com/1250400

https://bugzilla.suse.com/1250455

https://bugzilla.suse.com/1250491

https://bugzilla.suse.com/1250650

https://bugzilla.suse.com/1250702

https://bugzilla.suse.com/1250704

https://bugzilla.suse.com/1250721

https://bugzilla.suse.com/1250742

https://bugzilla.suse.com/1250946

https://bugzilla.suse.com/1251024

https://bugzilla.suse.com/1251027

https://bugzilla.suse.com/1251028

https://bugzilla.suse.com/1251031

https://bugzilla.suse.com/1251035

https://bugzilla.suse.com/1251038

https://bugzilla.suse.com/1251043

https://bugzilla.suse.com/1251045

https://bugzilla.suse.com/1251052

https://bugzilla.suse.com/1251053

https://bugzilla.suse.com/1251054

https://bugzilla.suse.com/1251056

https://bugzilla.suse.com/1251057

https://bugzilla.suse.com/1251059

https://bugzilla.suse.com/1251060

https://bugzilla.suse.com/1251065

https://bugzilla.suse.com/1251066

https://bugzilla.suse.com/1251067

https://bugzilla.suse.com/1251068

https://bugzilla.suse.com/1251071

https://bugzilla.suse.com/1251076

https://bugzilla.suse.com/1251079

https://bugzilla.suse.com/1251081

https://bugzilla.suse.com/1251083

https://bugzilla.suse.com/1251084

https://bugzilla.suse.com/1251100

https://bugzilla.suse.com/1251105

https://bugzilla.suse.com/1251106

https://bugzilla.suse.com/1251108

https://bugzilla.suse.com/1251113

https://bugzilla.suse.com/1251114

https://bugzilla.suse.com/1251119

https://bugzilla.suse.com/1251123

https://bugzilla.suse.com/1251126

https://bugzilla.suse.com/1251132

https://bugzilla.suse.com/1251134

https://bugzilla.suse.com/1251143

https://bugzilla.suse.com/1251146

https://bugzilla.suse.com/1251150

https://bugzilla.suse.com/1251152

https://bugzilla.suse.com/1251153

https://bugzilla.suse.com/1251159

https://bugzilla.suse.com/1251161

https://bugzilla.suse.com/1251170

https://bugzilla.suse.com/1251177

https://bugzilla.suse.com/1251180

https://bugzilla.suse.com/1251206

https://bugzilla.suse.com/1251215

https://bugzilla.suse.com/1251216

https://bugzilla.suse.com/1251222

https://bugzilla.suse.com/1251230

https://bugzilla.suse.com/1251232

https://bugzilla.suse.com/1251233

https://bugzilla.suse.com/1251247

https://bugzilla.suse.com/1251268

https://bugzilla.suse.com/1251269

https://bugzilla.suse.com/1251270

https://bugzilla.suse.com/1251282

https://bugzilla.suse.com/1251283

https://bugzilla.suse.com/1251286

https://bugzilla.suse.com/1251290

https://bugzilla.suse.com/1251319

https://bugzilla.suse.com/1251321

https://bugzilla.suse.com/1251323

https://bugzilla.suse.com/1251328

https://bugzilla.suse.com/1251529

https://bugzilla.suse.com/1251721

https://bugzilla.suse.com/1251732

https://bugzilla.suse.com/1251742

https://bugzilla.suse.com/1251743

https://bugzilla.suse.com/1251746

https://bugzilla.suse.com/1251748

https://bugzilla.suse.com/1251749

https://bugzilla.suse.com/1251750

https://bugzilla.suse.com/1251754

https://bugzilla.suse.com/1251755

https://bugzilla.suse.com/1251756

https://bugzilla.suse.com/1251758

https://bugzilla.suse.com/1251759

https://bugzilla.suse.com/1251760

https://bugzilla.suse.com/1251762

https://bugzilla.suse.com/1251763

https://bugzilla.suse.com/1251764

https://bugzilla.suse.com/1251769

https://bugzilla.suse.com/1251771

https://bugzilla.suse.com/1251772

https://bugzilla.suse.com/1251777

https://bugzilla.suse.com/1251780

https://bugzilla.suse.com/1251804

https://bugzilla.suse.com/1251810

https://bugzilla.suse.com/1251930

https://bugzilla.suse.com/1251967

https://bugzilla.suse.com/1252033

https://bugzilla.suse.com/1252035

https://bugzilla.suse.com/1252039

https://bugzilla.suse.com/1252044

https://bugzilla.suse.com/1252047

https://bugzilla.suse.com/1252051

https://bugzilla.suse.com/1252052

https://bugzilla.suse.com/1252056

https://bugzilla.suse.com/1252060

https://bugzilla.suse.com/1252062

https://bugzilla.suse.com/1252064

https://bugzilla.suse.com/1252065

https://bugzilla.suse.com/1252069

https://bugzilla.suse.com/1252070

https://bugzilla.suse.com/1252072

https://bugzilla.suse.com/1252074

https://bugzilla.suse.com/1252075

https://bugzilla.suse.com/1252078

https://bugzilla.suse.com/1252079

https://bugzilla.suse.com/1252082

https://bugzilla.suse.com/1252083

https://bugzilla.suse.com/1252236

https://bugzilla.suse.com/1252265

https://bugzilla.suse.com/1252332

https://bugzilla.suse.com/1252336

https://bugzilla.suse.com/1252346

https://bugzilla.suse.com/1252348

https://bugzilla.suse.com/1252349

https://bugzilla.suse.com/1252364

https://bugzilla.suse.com/1252479

https://bugzilla.suse.com/1252481

https://bugzilla.suse.com/1252489

https://bugzilla.suse.com/1252490

https://bugzilla.suse.com/1252492

https://bugzilla.suse.com/1252495

https://bugzilla.suse.com/1252496

https://bugzilla.suse.com/1252499

https://bugzilla.suse.com/1252534

https://bugzilla.suse.com/1252536

https://bugzilla.suse.com/1252537

https://bugzilla.suse.com/1252550

https://bugzilla.suse.com/1252553

https://bugzilla.suse.com/1252559

https://bugzilla.suse.com/1252561

https://bugzilla.suse.com/1252564

https://bugzilla.suse.com/1252565

https://bugzilla.suse.com/1252566

https://bugzilla.suse.com/1252632

https://bugzilla.suse.com/1252668

https://bugzilla.suse.com/1252678

https://bugzilla.suse.com/1252679

https://bugzilla.suse.com/1252685

https://bugzilla.suse.com/1252688

https://bugzilla.suse.com/1252772

https://bugzilla.suse.com/1252775

https://bugzilla.suse.com/1252785

https://bugzilla.suse.com/1252787

https://bugzilla.suse.com/1252789

https://bugzilla.suse.com/1252797

https://bugzilla.suse.com/1252822

https://bugzilla.suse.com/1252826

https://bugzilla.suse.com/1252841

https://bugzilla.suse.com/1252848

https://bugzilla.suse.com/1252849

https://bugzilla.suse.com/1252850

https://bugzilla.suse.com/1252851

https://bugzilla.suse.com/1252854

https://bugzilla.suse.com/1252858

https://bugzilla.suse.com/1252865

https://bugzilla.suse.com/1252866

https://bugzilla.suse.com/1252873

https://bugzilla.suse.com/1252902

https://bugzilla.suse.com/1252904

https://bugzilla.suse.com/1252909

https://bugzilla.suse.com/1252918

https://bugzilla.suse.com/1252939

https://www.suse.com/security/cve/CVE-2023-53538

https://www.suse.com/security/cve/CVE-2023-53539

https://www.suse.com/security/cve/CVE-2023-53540

https://www.suse.com/security/cve/CVE-2023-53541

https://www.suse.com/security/cve/CVE-2023-53543

https://www.suse.com/security/cve/CVE-2023-53545

https://www.suse.com/security/cve/CVE-2023-53546

https://www.suse.com/security/cve/CVE-2023-53548

https://www.suse.com/security/cve/CVE-2023-53550

https://www.suse.com/security/cve/CVE-2023-53552

https://www.suse.com/security/cve/CVE-2023-53553

https://www.suse.com/security/cve/CVE-2023-53554

https://www.suse.com/security/cve/CVE-2023-53555

https://www.suse.com/security/cve/CVE-2023-53556

https://www.suse.com/security/cve/CVE-2023-53557

https://www.suse.com/security/cve/CVE-2023-53558

https://www.suse.com/security/cve/CVE-2023-53559

https://www.suse.com/security/cve/CVE-2023-53560

https://www.suse.com/security/cve/CVE-2023-53563

https://www.suse.com/security/cve/CVE-2023-53568

https://www.suse.com/security/cve/CVE-2023-53570

https://www.suse.com/security/cve/CVE-2023-53572

https://www.suse.com/security/cve/CVE-2023-53574

https://www.suse.com/security/cve/CVE-2023-53575

https://www.suse.com/security/cve/CVE-2023-53577

https://www.suse.com/security/cve/CVE-2023-53579

https://www.suse.com/security/cve/CVE-2023-53580

https://www.suse.com/security/cve/CVE-2023-53581

https://www.suse.com/security/cve/CVE-2023-53583

https://www.suse.com/security/cve/CVE-2023-53585

https://www.suse.com/security/cve/CVE-2023-53588

https://www.suse.com/security/cve/CVE-2023-53593

https://www.suse.com/security/cve/CVE-2023-53596

https://www.suse.com/security/cve/CVE-2023-53597

https://www.suse.com/security/cve/CVE-2023-53599

https://www.suse.com/security/cve/CVE-2023-53600

https://www.suse.com/security/cve/CVE-2023-53601

https://www.suse.com/security/cve/CVE-2023-53602

https://www.suse.com/security/cve/CVE-2023-53603

https://www.suse.com/security/cve/CVE-2023-53611

https://www.suse.com/security/cve/CVE-2023-53613

https://www.suse.com/security/cve/CVE-2023-53615

https://www.suse.com/security/cve/CVE-2023-53616

https://www.suse.com/security/cve/CVE-2023-53617

https://www.suse.com/security/cve/CVE-2023-53618

https://www.suse.com/security/cve/CVE-2023-53619

https://www.suse.com/security/cve/CVE-2023-53621

https://www.suse.com/security/cve/CVE-2023-53622

https://www.suse.com/security/cve/CVE-2023-53631

https://www.suse.com/security/cve/CVE-2023-53632

https://www.suse.com/security/cve/CVE-2023-53633

https://www.suse.com/security/cve/CVE-2023-53638

https://www.suse.com/security/cve/CVE-2023-53645

https://www.suse.com/security/cve/CVE-2023-53646

https://www.suse.com/security/cve/CVE-2023-53647

https://www.suse.com/security/cve/CVE-2023-53648

https://www.suse.com/security/cve/CVE-2023-53649

https://www.suse.com/security/cve/CVE-2023-53650

https://www.suse.com/security/cve/CVE-2023-53652

https://www.suse.com/security/cve/CVE-2023-53653

https://www.suse.com/security/cve/CVE-2023-53654

https://www.suse.com/security/cve/CVE-2023-53656

https://www.suse.com/security/cve/CVE-2023-53657

https://www.suse.com/security/cve/CVE-2023-53658

https://www.suse.com/security/cve/CVE-2023-53659

https://www.suse.com/security/cve/CVE-2023-53660

https://www.suse.com/security/cve/CVE-2023-53662

https://www.suse.com/security/cve/CVE-2023-53663

https://www.suse.com/security/cve/CVE-2023-53665

https://www.suse.com/security/cve/CVE-2023-53666

https://www.suse.com/security/cve/CVE-2023-53668

https://www.suse.com/security/cve/CVE-2023-53670

https://www.suse.com/security/cve/CVE-2023-53672

https://www.suse.com/security/cve/CVE-2023-53673

https://www.suse.com/security/cve/CVE-2023-53674

https://www.suse.com/security/cve/CVE-2023-53681

https://www.suse.com/security/cve/CVE-2023-53686

https://www.suse.com/security/cve/CVE-2023-53687

https://www.suse.com/security/cve/CVE-2023-53693

https://www.suse.com/security/cve/CVE-2023-53697

https://www.suse.com/security/cve/CVE-2023-53698

https://www.suse.com/security/cve/CVE-2023-53699

https://www.suse.com/security/cve/CVE-2023-53703

https://www.suse.com/security/cve/CVE-2023-53704

https://www.suse.com/security/cve/CVE-2023-53707

https://www.suse.com/security/cve/CVE-2023-53708

https://www.suse.com/security/cve/CVE-2023-53711

https://www.suse.com/security/cve/CVE-2023-53713

https://www.suse.com/security/cve/CVE-2023-53718

https://www.suse.com/security/cve/CVE-2023-53721

https://www.suse.com/security/cve/CVE-2023-53722

https://www.suse.com/security/cve/CVE-2023-53725

https://www.suse.com/security/cve/CVE-2023-53726

https://www.suse.com/security/cve/CVE-2023-53727

https://www.suse.com/security/cve/CVE-2023-53728

https://www.suse.com/security/cve/CVE-2023-53729

https://www.suse.com/security/cve/CVE-2023-53730

https://www.suse.com/security/cve/CVE-2023-53731

https://www.suse.com/security/cve/CVE-2023-53733

https://www.suse.com/security/cve/CVE-2025-38008

https://www.suse.com/security/cve/CVE-2025-38539

https://www.suse.com/security/cve/CVE-2025-38552

https://www.suse.com/security/cve/CVE-2025-38653

https://www.suse.com/security/cve/CVE-2025-38699

https://www.suse.com/security/cve/CVE-2025-38700

https://www.suse.com/security/cve/CVE-2025-38718

https://www.suse.com/security/cve/CVE-2025-39673

https://www.suse.com/security/cve/CVE-2025-39676

https://www.suse.com/security/cve/CVE-2025-39683

https://www.suse.com/security/cve/CVE-2025-39697

https://www.suse.com/security/cve/CVE-2025-39702

https://www.suse.com/security/cve/CVE-2025-39756

https://www.suse.com/security/cve/CVE-2025-39794

https://www.suse.com/security/cve/CVE-2025-39812

https://www.suse.com/security/cve/CVE-2025-39813

https://www.suse.com/security/cve/CVE-2025-39841

https://www.suse.com/security/cve/CVE-2025-39851

https://www.suse.com/security/cve/CVE-2025-39866

https://www.suse.com/security/cve/CVE-2025-39876

https://www.suse.com/security/cve/CVE-2025-39881

https://www.suse.com/security/cve/CVE-2025-39895

https://www.suse.com/security/cve/CVE-2025-39902

https://www.suse.com/security/cve/CVE-2025-39911

https://www.suse.com/security/cve/CVE-2025-39931

https://www.suse.com/security/cve/CVE-2025-39934

https://www.suse.com/security/cve/CVE-2025-39937

https://www.suse.com/security/cve/CVE-2025-39938

https://www.suse.com/security/cve/CVE-2025-39945

https://www.suse.com/security/cve/CVE-2025-39946

https://www.suse.com/security/cve/CVE-2025-39947

https://www.suse.com/security/cve/CVE-2025-39948

https://www.suse.com/security/cve/CVE-2025-39949

https://www.suse.com/security/cve/CVE-2025-39952

https://www.suse.com/security/cve/CVE-2025-39955

https://www.suse.com/security/cve/CVE-2025-39957

https://www.suse.com/security/cve/CVE-2025-39965

https://www.suse.com/security/cve/CVE-2025-39967

https://www.suse.com/security/cve/CVE-2025-39968

https://www.suse.com/security/cve/CVE-2025-39969

https://www.suse.com/security/cve/CVE-2025-39970

https://www.suse.com/security/cve/CVE-2025-39971

https://www.suse.com/security/cve/CVE-2025-39972

https://www.suse.com/security/cve/CVE-2025-39973

https://www.suse.com/security/cve/CVE-2025-39978

https://www.suse.com/security/cve/CVE-2025-39981

https://www.suse.com/security/cve/CVE-2025-39982

https://www.suse.com/security/cve/CVE-2025-39985

https://www.suse.com/security/cve/CVE-2025-39986

https://www.suse.com/security/cve/CVE-2025-39987

https://www.suse.com/security/cve/CVE-2025-39988

https://www.suse.com/security/cve/CVE-2025-39991

https://www.suse.com/security/cve/CVE-2025-39993

https://www.suse.com/security/cve/CVE-2025-39994

https://www.suse.com/security/cve/CVE-2025-39995

https://www.suse.com/security/cve/CVE-2025-39996

https://www.suse.com/security/cve/CVE-2025-39997

https://www.suse.com/security/cve/CVE-2025-40000

https://www.suse.com/security/cve/CVE-2025-40005

https://www.suse.com/security/cve/CVE-2025-40010

https://www.suse.com/security/cve/CVE-2025-40011

https://www.suse.com/security/cve/CVE-2025-40013

https://www.suse.com/security/cve/CVE-2025-40016

https://www.suse.com/security/cve/CVE-2025-40018

https://www.suse.com/security/cve/CVE-2025-40019

https://www.suse.com/security/cve/CVE-2025-40020

https://www.suse.com/security/cve/CVE-2025-40029

https://www.suse.com/security/cve/CVE-2025-40032

https://www.suse.com/security/cve/CVE-2025-40035

https://www.suse.com/security/cve/CVE-2025-40036

https://www.suse.com/security/cve/CVE-2025-40043

https://www.suse.com/security/cve/CVE-2025-40044

https://www.suse.com/security/cve/CVE-2025-40049

https://www.suse.com/security/cve/CVE-2025-40051

https://www.suse.com/security/cve/CVE-2025-40052

https://www.suse.com/security/cve/CVE-2025-40056

https://www.suse.com/security/cve/CVE-2025-40058

https://www.suse.com/security/cve/CVE-2025-40060

https://www.suse.com/security/cve/CVE-2025-40061

https://www.suse.com/security/cve/CVE-2025-40062

https://www.suse.com/security/cve/CVE-2025-40071

https://www.suse.com/security/cve/CVE-2025-40078

https://www.suse.com/security/cve/CVE-2025-40082

https://www.suse.com/security/cve/CVE-2025-40085

https://www.suse.com/security/cve/CVE-2025-40087

https://www.suse.com/security/cve/CVE-2025-40088

https://www.suse.com/security/cve/CVE-2025-40096

https://www.suse.com/security/cve/CVE-2025-40100

https://bugzilla.suse.com/1252774

http://www.nessus.org/u?c4598ca4

https://www.suse.com/security/cve/CVE-2025-40080

Plugin Details

Severity: Medium

ID: 275760

File Name: suse_SU-2025-4128-1.nasl

Version: 1.1

Type: local

Agent: unix

Published: 11/19/2025

Updated: 11/19/2025

Supported Sensors: Continuous Assessment, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: Low

Base Score: 3.8

Temporal Score: 3

Vector: CVSS2#AV:L/AC:H/Au:S/C:N/I:N/A:C

CVSS Score Source: CVE-2025-38008

CVSS v3

Risk Factor: Medium

Base Score: 4.7

Temporal Score: 4.2

Vector: CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:novell:suse_linux:kernel-source-azure, p-cpe:/a:novell:suse_linux:kernel-syms-azure, p-cpe:/a:novell:suse_linux:kernel-azure-devel, p-cpe:/a:novell:suse_linux:kernel-devel-azure, p-cpe:/a:novell:suse_linux:kernel-azure, cpe:/o:novell:suse_linux:15

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 11/18/2025

Vulnerability Publication Date: 9/4/2021

Reference Information

CVE: CVE-2023-53538, CVE-2023-53539, CVE-2023-53540, CVE-2023-53541, CVE-2023-53543, CVE-2023-53545, CVE-2023-53546, CVE-2023-53548, CVE-2023-53550, CVE-2023-53552, CVE-2023-53553, CVE-2023-53554, CVE-2023-53555, CVE-2023-53556, CVE-2023-53557, CVE-2023-53558, CVE-2023-53559, CVE-2023-53560, CVE-2023-53563, CVE-2023-53568, CVE-2023-53570, CVE-2023-53572, CVE-2023-53574, CVE-2023-53575, CVE-2023-53577, CVE-2023-53579, CVE-2023-53580, CVE-2023-53581, CVE-2023-53583, CVE-2023-53585, CVE-2023-53588, CVE-2023-53593, CVE-2023-53596, CVE-2023-53597, CVE-2023-53599, CVE-2023-53600, CVE-2023-53601, CVE-2023-53602, CVE-2023-53603, CVE-2023-53611, CVE-2023-53613, CVE-2023-53615, CVE-2023-53616, CVE-2023-53617, CVE-2023-53618, CVE-2023-53619, CVE-2023-53621, CVE-2023-53622, CVE-2023-53631, CVE-2023-53632, CVE-2023-53633, CVE-2023-53638, CVE-2023-53645, CVE-2023-53646, CVE-2023-53647, CVE-2023-53648, CVE-2023-53649, CVE-2023-53650, CVE-2023-53652, CVE-2023-53653, CVE-2023-53654, CVE-2023-53656, CVE-2023-53657, CVE-2023-53658, CVE-2023-53659, CVE-2023-53660, CVE-2023-53662, CVE-2023-53663, CVE-2023-53665, CVE-2023-53666, CVE-2023-53668, CVE-2023-53670, CVE-2023-53672, CVE-2023-53673, CVE-2023-53674, CVE-2023-53681, CVE-2023-53686, CVE-2023-53687, CVE-2023-53693, CVE-2023-53697, CVE-2023-53698, CVE-2023-53699, CVE-2023-53703, CVE-2023-53704, CVE-2023-53707, CVE-2023-53708, CVE-2023-53711, CVE-2023-53713, CVE-2023-53718, CVE-2023-53721, CVE-2023-53722, CVE-2023-53725, CVE-2023-53726, CVE-2023-53727, CVE-2023-53728, CVE-2023-53729, CVE-2023-53730, CVE-2023-53731, CVE-2023-53733, CVE-2025-38008, CVE-2025-38539, CVE-2025-38552, CVE-2025-38653, CVE-2025-38699, CVE-2025-38700, CVE-2025-38718, CVE-2025-39673, CVE-2025-39676, CVE-2025-39683, CVE-2025-39697, CVE-2025-39702, CVE-2025-39756, CVE-2025-39794, CVE-2025-39797, CVE-2025-39812, CVE-2025-39813, CVE-2025-39841, CVE-2025-39851, CVE-2025-39866, CVE-2025-39876, CVE-2025-39881, CVE-2025-39895, CVE-2025-39902, CVE-2025-39911, CVE-2025-39931, CVE-2025-39934, CVE-2025-39937, CVE-2025-39938, CVE-2025-39945, CVE-2025-39946, CVE-2025-39947, CVE-2025-39948, CVE-2025-39949, CVE-2025-39952, CVE-2025-39955, CVE-2025-39957, CVE-2025-39965, CVE-2025-39967, CVE-2025-39968, CVE-2025-39969, CVE-2025-39970, CVE-2025-39971, CVE-2025-39972, CVE-2025-39973, CVE-2025-39978, CVE-2025-39981, CVE-2025-39982, CVE-2025-39985, CVE-2025-39986, CVE-2025-39987, CVE-2025-39988, CVE-2025-39991, CVE-2025-39993, CVE-2025-39994, CVE-2025-39995, CVE-2025-39996, CVE-2025-39997, CVE-2025-40000, CVE-2025-40005, CVE-2025-40010, CVE-2025-40011, CVE-2025-40013, CVE-2025-40016, CVE-2025-40018, CVE-2025-40019, CVE-2025-40020, CVE-2025-40029, CVE-2025-40032, CVE-2025-40035, CVE-2025-40036, CVE-2025-40043, CVE-2025-40044, CVE-2025-40049, CVE-2025-40051, CVE-2025-40052, CVE-2025-40056, CVE-2025-40058, CVE-2025-40060, CVE-2025-40061, CVE-2025-40062, CVE-2025-40071, CVE-2025-40078, CVE-2025-40080, CVE-2025-40082, CVE-2025-40085, CVE-2025-40087, CVE-2025-40088, CVE-2025-40096, CVE-2025-40100

SuSE: SUSE-SU-2025:4128-1