SUSE SLES15 Security Update : kernel (SUSE-SU-2025:4188-1)

high Nessus Plugin ID 276794

Language:

Synopsis

The remote SUSE host is missing one or more security updates.

Description

The remote SUSE Linux SLES15 / SLES_SAP15 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2025:4188-1 advisory.

The SUSE Linux Enterprise 15 SP3 kernel was updated to fix various security issues

The following security issues were fixed:

- CVE-2022-50327: ACPI: processor: idle: Check acpi_fetch_acpi_dev() return value (bsc#1249859).
- CVE-2022-50334: hugetlbfs: fix null-ptr-deref in hugetlbfs_parse_param() (bsc#1249857).
- CVE-2022-50388: nvme: fix multipath crash caused by flush request when blktrace is enabled (bsc#1250293).
- CVE-2022-50423: ACPICA: Fix use-after-free in acpi_ut_copy_ipackage_to_ipackage() (bsc#1250784).
- CVE-2022-50432: kernfs: fix use-after-free in __kernfs_remove (bsc#1250851).
- CVE-2022-50488: block, bfq: fix possible uaf for 'bfqq->bic' (bsc#1251201).
- CVE-2022-50516: fs: dlm: fix invalid derefence of sb_lvbptr (bsc#1251741).
- CVE-2023-53282: scsi: lpfc: Fix use-after-free KFENCE violation during sysfs firmware write (bsc#1250311).
- CVE-2023-53365: ip6mr: Fix skb_under_panic in ip6mr_cache_report() (bsc#1249988).
- CVE-2023-53395: ACPICA: Add AML_NO_OPERAND_RESOLVE flag to Timer (bsc#1250358).
- CVE-2023-53500: xfrm: fix slab-use-after-free in decode_session6 (bsc#1250816).
- CVE-2023-53559: ip_vti: fix potential slab-use-after-free in decode_session6 (bsc#1251052).
- CVE-2023-53574: wifi: rtw88: delete timer and free skb queue when unloading (bsc#1251222).
- CVE-2023-53619: netfilter: conntrack: Avoid nf_ct_helper_hash uses after free (bsc#1251743).
- CVE-2023-53673: Bluetooth: hci_event: call disconnect callback before deleting conn (bsc#1251763).
- CVE-2023-53705: ipv6: Fix out-of-bounds access in ipv6_find_tlv() (bsc#1252554).
- CVE-2023-53722: md: raid1: fix potential OOB in raid1_remove_disk() (bsc#1252499).
- CVE-2025-38476: rpl: Fix use-after-free in rpl_do_srh_inline() (bsc#1247317).
- CVE-2025-39968: i40e: add max boundary check for VF filters (bsc#1252047).
- CVE-2025-39973: i40e: add validation for ring_len param (bsc#1252035).
- CVE-2025-40018: ipvs: Defer ip_vs_ftp unregister during netns cleanup (bsc#1252688).

Tenable has extracted the preceding description block directly from the SUSE security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://bugzilla.suse.com/1065729

https://bugzilla.suse.com/1199304

https://bugzilla.suse.com/1205128

https://bugzilla.suse.com/1206893

https://bugzilla.suse.com/1210124

https://bugzilla.suse.com/1247317

https://bugzilla.suse.com/1249186

https://bugzilla.suse.com/1249857

https://bugzilla.suse.com/1249859

https://bugzilla.suse.com/1249988

https://bugzilla.suse.com/1250293

https://bugzilla.suse.com/1250311

https://bugzilla.suse.com/1250358

https://bugzilla.suse.com/1250742

https://bugzilla.suse.com/1250784

https://bugzilla.suse.com/1250816

https://bugzilla.suse.com/1250851

https://bugzilla.suse.com/1250946

https://bugzilla.suse.com/1251040

https://bugzilla.suse.com/1251047

https://bugzilla.suse.com/1251052

https://bugzilla.suse.com/1251072

https://bugzilla.suse.com/1251088

https://bugzilla.suse.com/1251091

https://bugzilla.suse.com/1251115

https://bugzilla.suse.com/1251169

https://bugzilla.suse.com/1251173

https://bugzilla.suse.com/1251182

https://bugzilla.suse.com/1251201

https://bugzilla.suse.com/1251202

https://bugzilla.suse.com/1251208

https://bugzilla.suse.com/1251222

https://bugzilla.suse.com/1251292

https://bugzilla.suse.com/1251300

https://bugzilla.suse.com/1251550

https://bugzilla.suse.com/1251723

https://bugzilla.suse.com/1251725

https://bugzilla.suse.com/1251730

https://bugzilla.suse.com/1251741

https://bugzilla.suse.com/1251743

https://bugzilla.suse.com/1251747

https://bugzilla.suse.com/1251763

https://bugzilla.suse.com/1251930

https://bugzilla.suse.com/1252035

https://bugzilla.suse.com/1252047

https://bugzilla.suse.com/1252480

https://bugzilla.suse.com/1252499

https://bugzilla.suse.com/1252516

https://bugzilla.suse.com/1252554

https://bugzilla.suse.com/1252688

https://bugzilla.suse.com/1252775

http://www.nessus.org/u?8c7110b0

https://www.suse.com/security/cve/CVE-2022-43945

https://www.suse.com/security/cve/CVE-2022-50327

https://www.suse.com/security/cve/CVE-2022-50334

https://www.suse.com/security/cve/CVE-2022-50388

https://www.suse.com/security/cve/CVE-2022-50423

https://www.suse.com/security/cve/CVE-2022-50432

https://www.suse.com/security/cve/CVE-2022-50470

https://www.suse.com/security/cve/CVE-2022-50480

https://www.suse.com/security/cve/CVE-2022-50484

https://www.suse.com/security/cve/CVE-2022-50488

https://www.suse.com/security/cve/CVE-2022-50489

https://www.suse.com/security/cve/CVE-2022-50493

https://www.suse.com/security/cve/CVE-2022-50494

https://www.suse.com/security/cve/CVE-2022-50496

https://www.suse.com/security/cve/CVE-2022-50504

https://www.suse.com/security/cve/CVE-2022-50513

https://www.suse.com/security/cve/CVE-2022-50516

https://www.suse.com/security/cve/CVE-2022-50532

https://www.suse.com/security/cve/CVE-2022-50534

https://www.suse.com/security/cve/CVE-2022-50544

https://www.suse.com/security/cve/CVE-2022-50546

https://www.suse.com/security/cve/CVE-2022-50549

https://www.suse.com/security/cve/CVE-2022-50563

https://www.suse.com/security/cve/CVE-2022-50574

https://www.suse.com/security/cve/CVE-2023-53282

https://www.suse.com/security/cve/CVE-2023-53365

https://www.suse.com/security/cve/CVE-2023-53395

https://www.suse.com/security/cve/CVE-2023-53500

https://www.suse.com/security/cve/CVE-2023-53559

https://www.suse.com/security/cve/CVE-2023-53564

https://www.suse.com/security/cve/CVE-2023-53566

https://www.suse.com/security/cve/CVE-2023-53574

https://www.suse.com/security/cve/CVE-2023-53619

https://www.suse.com/security/cve/CVE-2023-53673

https://www.suse.com/security/cve/CVE-2023-53705

https://www.suse.com/security/cve/CVE-2023-53722

https://www.suse.com/security/cve/CVE-2025-38476

https://www.suse.com/security/cve/CVE-2025-39968

https://www.suse.com/security/cve/CVE-2025-39973

https://www.suse.com/security/cve/CVE-2025-40018

https://www.suse.com/security/cve/CVE-2025-40082

Plugin Details

Severity: High

ID: 276794

File Name: suse_SU-2025-4188-1.nasl

Version: 1.1

Type: local

Agent: unix

Published: 11/25/2025

Updated: 11/25/2025

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 7.8

Temporal Score: 5.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C

CVSS Score Source: CVE-2022-43945

CVSS v3

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:novell:suse_linux:kernel-syms, p-cpe:/a:novell:suse_linux:cluster-md-kmp-default, p-cpe:/a:novell:suse_linux:dlm-kmp-default, p-cpe:/a:novell:suse_linux:kernel-64kb, p-cpe:/a:novell:suse_linux:reiserfs-kmp-default, p-cpe:/a:novell:suse_linux:kernel-source, p-cpe:/a:novell:suse_linux:ocfs2-kmp-default, p-cpe:/a:novell:suse_linux:kernel-preempt-devel, p-cpe:/a:novell:suse_linux:kernel-macros, p-cpe:/a:novell:suse_linux:kernel-preempt, p-cpe:/a:novell:suse_linux:kernel-default-devel, p-cpe:/a:novell:suse_linux:kernel-default-base, p-cpe:/a:novell:suse_linux:kernel-zfcpdump, p-cpe:/a:novell:suse_linux:kernel-default, p-cpe:/a:novell:suse_linux:kernel-64kb-devel, p-cpe:/a:novell:suse_linux:kernel-devel, p-cpe:/a:novell:suse_linux:kernel-obs-build, p-cpe:/a:novell:suse_linux:gfs2-kmp-default, cpe:/o:novell:suse_linux:15

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 11/24/2025

Vulnerability Publication Date: 9/4/2021

Reference Information

CVE: CVE-2022-43945, CVE-2022-50327, CVE-2022-50334, CVE-2022-50388, CVE-2022-50423, CVE-2022-50432, CVE-2022-50470, CVE-2022-50480, CVE-2022-50484, CVE-2022-50488, CVE-2022-50489, CVE-2022-50493, CVE-2022-50494, CVE-2022-50496, CVE-2022-50504, CVE-2022-50513, CVE-2022-50516, CVE-2022-50532, CVE-2022-50534, CVE-2022-50544, CVE-2022-50546, CVE-2022-50549, CVE-2022-50563, CVE-2022-50574, CVE-2023-53282, CVE-2023-53365, CVE-2023-53395, CVE-2023-53500, CVE-2023-53559, CVE-2023-53564, CVE-2023-53566, CVE-2023-53574, CVE-2023-53619, CVE-2023-53673, CVE-2023-53705, CVE-2023-53722, CVE-2025-38476, CVE-2025-39968, CVE-2025-39973, CVE-2025-40018, CVE-2025-40082

SuSE: SUSE-SU-2025:4188-1