SUSE SLES15 / openSUSE 15 Security Update : kernel (SUSE-SU-2025:0428-1)

high Nessus Plugin ID 216191

Synopsis

The remote SUSE host is missing one or more security updates.

Description

The remote SUSE Linux SLES15 / SLES_SAP15 / openSUSE 15 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2025:0428-1 advisory.

The SUSE Linux Enterprise 15 SP6 Azure kernel was updated to receive various security bugfixes.


The following security bugs were fixed:

- CVE-2023-52489: mm/sparsemem: fix race in accessing memory_section->usage (bsc#1221326).
- CVE-2024-45828: i3c: mipi-i3c-hci: Mask ring interrupts before ring stop request (bsc#1235705).
- CVE-2024-48881: bcache: revert replacing IS_ERR_OR_NULL with IS_ERR again (bsc#1235727).
- CVE-2024-49948: net: add more sanity checks to qdisc_pkt_len_init() (bsc#1232161).
- CVE-2024-49951: Bluetooth: MGMT: Fix possible crash on mgmt_index_removed (bsc#1232158).
- CVE-2024-49978: gso: fix udp gso fraglist segmentation after pull from frag_list (bsc#1232101).
- CVE-2024-49998: net: dsa: improve shutdown sequence (bsc#1232087).
- CVE-2024-50151: smb: client: fix OOBs when building SMB2_IOCTL request (bsc#1233055).
- CVE-2024-50199: mm/swapfile: skip HugeTLB pages for unuse_vma (bsc#1233112).
- CVE-2024-50251: netfilter: nft_payload: sanitize offset and length before calling skb_checksum() (bsc#1233248).
- CVE-2024-50258: net: fix crash when config small gso_max_size/gso_ipv4_max_size (bsc#1233221).
- CVE-2024-50299: sctp: properly validate chunk size in sctp_sf_ootb() (bsc#1233488).
- CVE-2024-50304: ipv4: ip_tunnel: Fix suspicious RCU usage warning in ip_tunnel_find() (bsc#1233522).
- CVE-2024-53091: bpf: Add sk_is_inet and IS_ICSK check in tls_sw_has_ctx_tx/rx (bsc#1233638).
- CVE-2024-53164: net: sched: fix ordering of qlen adjustment (bsc#1234863).
- CVE-2024-53170: block: fix uaf for flush rq while iterating tags (bsc#1234888).
- CVE-2024-53172: ubi: fastmap: Fix duplicate slab cache names while attaching (bsc#1234898).
- CVE-2024-53175: ipc: fix memleak if msg_init_ns failed in create_ipc_ns (bsc#1234893).
- CVE-2024-53185: smb: client: fix NULL ptr deref in crypto_aead_setkey() (bsc#1234901).
- CVE-2024-53187: io_uring: check for overflows in io_pin_pages (bsc#1234947).
- CVE-2024-53195: KVM: arm64: Get rid of userspace_irqchip_in_use (bsc#1234957).
- CVE-2024-53196: KVM: arm64: Do not retire aborted MMIO instruction (bsc#1234906).
- CVE-2024-53198: xen: Fix the issue of resource not being properly released in xenbus_dev_probe() (bsc#1234923).
- CVE-2024-53203: usb: typec: fix potential array underflow in ucsi_ccg_sync_control() (bsc#1235001).
- CVE-2024-53227: scsi: bfa: Fix use-after-free in bfad_im_module_exit() (bsc#1235011).
- CVE-2024-53232: iommu/s390: Implement blocking domain (bsc#1235050).
- CVE-2024-53236: xsk: Free skb when TX metadata options are invalid (bsc#1235000).
- CVE-2024-53685: ceph: give up on paths longer than PATH_MAX (bsc#1235720).
- CVE-2024-55639: net: renesas: rswitch: avoid use-after-put for a device tree node (bsc#1235737).
- CVE-2024-55881: KVM: x86: Play nice with protected guests in complete_hypercall_exit() (bsc#1235745).
- CVE-2024-56372: net: tun: fix tun_napi_alloc_frags() (bsc#1235753).
- CVE-2024-56568: iommu/arm-smmu: Defer probe of clients after smmu device bound (bsc#1235032).
- CVE-2024-56569: ftrace: Fix regression with module command in stack_trace_filter (bsc#1235031).
- CVE-2024-56570: ovl: Filter invalid inodes with missing lookup function (bsc#1235035).
- CVE-2024-56588: scsi: hisi_sas: Create all dump files during debugfs initialization (bsc#1235123).
- CVE-2024-56589: scsi: hisi_sas: Add cond_resched() for no forced preemption model (bsc#1235241).
- CVE-2024-56600: net: inet6: do not leave a dangling sk pointer in inet6_create() (bsc#1235217).
- CVE-2024-56601: net: inet: do not leave a dangling sk pointer in inet_create() (bsc#1235230).
- CVE-2024-56602: net: ieee802154: do not leave a dangling sk pointer in ieee802154_create() (bsc#1235521).
- CVE-2024-56603: net: af_can: do not leave a dangling sk pointer in can_create() (bsc#1235415).
- CVE-2024-56605: Bluetooth: L2CAP: do not leave dangling sk pointer on error in l2cap_sock_create() (bsc#1235061).
- CVE-2024-56608: drm/amd/display: Fix out-of-bounds access in 'dcn21_link_encoder_create' (bsc#1235487).
- CVE-2024-56610: kcsan: Turn report_filterlist_lock into a raw_spinlock (bsc#1235390).
- CVE-2024-56611: mm/mempolicy: fix migrate_to_node() assuming there is at least one VMA in a MM (bsc#1235391).
- CVE-2024-56614: xsk: fix OOB map writes when deleting elements (bsc#1235424).
- CVE-2024-56615: bpf: fix OOB devmap writes when deleting elements (bsc#1235426).
- CVE-2024-56617: cacheinfo: Allocate memory during CPU hotplug if not done from the primary CPU (bsc#1235429).
- CVE-2024-56620: scsi: ufs: qcom: Only free platform MSIs when ESI is enabled (bsc#1235227).
- CVE-2024-56622: scsi: ufs: core: sysfs: Prevent div by zero (bsc#1235251).
- CVE-2024-56631: scsi: sg: Fix slab-use-after-free read in sg_release() (bsc#1235480).
- CVE-2024-56635: net: avoid potential UAF in default_operstate() (bsc#1235519).
- CVE-2024-56636: geneve: do not assume mac header is set in geneve_xmit_skb() (bsc#1235520).
- CVE-2024-56637: netfilter: ipset: Hold module reference while requesting a module (bsc#1235523).
- CVE-2024-56641: net/smc: initialize close_work early to avoid warning (bsc#1235526).
- CVE-2024-56643: dccp: Fix memory leak in dccp_feat_change_recv (bsc#1235132).
- CVE-2024-56648: net: hsr: avoid potential out-of-bound access in fill_frame_info() (bsc#1235451).
- CVE-2024-56649: net: enetc: Do not configure preemptible TCs if SIs do not support (bsc#1235449).
- CVE-2024-56650: netfilter: x_tables: fix LED ID check in led_tg_check() (bsc#1235430).
- CVE-2024-56656: bnxt_en: Fix aggregation ID mask to prevent oops on 5760X chips (bsc#1235444).
- CVE-2024-56659: net: lapb: increase LAPB_HEADER_LEN (bsc#1235439).
- CVE-2024-56660: net/mlx5: DR, prevent potential error pointer dereference (bsc#1235437).
- CVE-2024-56664: bpf, sockmap: Fix race between element replace and close() (bsc#1235249).
- CVE-2024-56665: bpf,perf: Fix invalid prog_array access in perf_event_detach_bpf_prog (bsc#1235489).
- CVE-2024-56675: bpf: Fix UAF via mismatching bpf_prog/attachment RCU flavors (bsc#1235555).
- CVE-2024-56679: octeontx2-pf: handle otx2_mbox_get_rsp errors in otx2_common.c (bsc#1235498).
- CVE-2024-56693: brd: defer automatic disk creation until module initialization succeeds (bsc#1235418).
- CVE-2024-56694: bpf: fix recursive lock when verdict program return SK_PASS (bsc#1235412).
- CVE-2024-56704: 9p/xen: fix release of IRQ (bsc#1235584).
- CVE-2024-56707: octeontx2-pf: handle otx2_mbox_get_rsp errors in otx2_dmac_flt.c (bsc#1235545).
- CVE-2024-56708: EDAC/igen6: Avoid segmentation fault on module unload (bsc#1235564).
- CVE-2024-56712: udmabuf: fix memory leak on last export_udmabuf() error path (bsc#1235565).
- CVE-2024-56715: ionic: Fix netdev notifier unregister on failure (bsc#1235612).
- CVE-2024-56716: netdevsim: prevent bad user input in nsim_dev_health_break_write() (bsc#1235587).
- CVE-2024-56725: octeontx2-pf: handle otx2_mbox_get_rsp errors in otx2_dcbnl.c (bsc#1235578).
- CVE-2024-56726: octeontx2-pf: handle otx2_mbox_get_rsp errors in cn10k.c (bsc#1235582).
- CVE-2024-56727: octeontx2-pf: handle otx2_mbox_get_rsp errors in otx2_flows.c (bsc#1235583).
- CVE-2024-56728: octeontx2-pf: handle otx2_mbox_get_rsp errors in otx2_ethtool.c (bsc#1235656).
- CVE-2024-56729: smb: Initialize cfid->tcon before performing network ops (bsc#1235503).
- CVE-2024-56747: scsi: qedi: Fix a possible memory leak in qedi_alloc_and_init_sb() (bsc#1234934).
- CVE-2024-56748: scsi: qedf: Fix a possible memory leak in qedf_alloc_and_init_sb() (bsc#1235627).
- CVE-2024-56759: btrfs: fix use-after-free when COWing tree bock and tracing is enabled (bsc#1235645).
- CVE-2024-56763: tracing: Prevent bad count for tracing_cpumask_write (bsc#1235638).
- CVE-2024-56774: btrfs: add a sanity check for btrfs root in btrfs_search_slot() (bsc#1235653).
- CVE-2024-56775: drm/amd/display: Fix handling of plane refcount (bsc#1235657).
- CVE-2024-57791: net/smc: check return value of sock_recvmsg when draining clc data (bsc#1235759).
- CVE-2024-57793: virt: tdx-guest: Just leak decrypted memory on unrecoverable errors (bsc#1235768).
- CVE-2024-57795: RDMA/rxe: Remove the direct link to net_device (bsc#1235906).
- CVE-2024-57801: net/mlx5e: Skip restore TC rules for vport rep without loaded flag (bsc#1235940).
- CVE-2024-57802: netrom: check buffer length before accessing it (bsc#1235941).
- CVE-2024-57804: scsi: mpi3mr: Fix corrupt config pages PHY state is switched in sysfs (bsc#1235779).
- CVE-2024-57809: PCI: imx6: Fix suspend/resume support on i.MX6QDL (bsc#1235793).
- CVE-2024-57838: s390/entry: Mark IRQ entries to fix stack depot warnings (bsc#1235798).
- CVE-2024-57857: RDMA/siw: Remove direct link to net_device (bsc#1235946).
- CVE-2024-57884: mm: vmscan: account for free pages to prevent infinite Loop in throttle_direct_reclaim() (bsc#1235948).
- CVE-2024-57892: ocfs2: fix slab-use-after-free due to dangling pointer dqi_priv (bsc#1235964).
- CVE-2024-57896: btrfs: flush delalloc workers queue before stopping cleaner kthread during unmount (bsc#1235965).
- CVE-2024-57903: net: restrict SO_REUSEPORT to inet sockets (bsc#1235967).
- CVE-2024-57917: topology: Keep the cpumask unchanged when printing cpumap (bsc#1236127).
- CVE-2024-57929: dm array: fix releasing a faulty array block twice in dm_array_cursor_end (bsc#1236096).
- CVE-2024-57931: selinux: ignore unknown extended permissions (bsc#1236192).
- CVE-2024-57932: gve: guard XDP xmit NDO on existence of xdp queues (bsc#1236190).
- CVE-2024-57933: gve: guard XSK operations on the existence of queues (bsc#1236178).
- CVE-2024-57938: net/sctp: Prevent autoclose integer overflow in sctp_association_init() (bsc#1236182).
- CVE-2024-57946: virtio-blk: do not keep queue frozen during system suspend (bsc#1236247).
- CVE-2025-21632: x86/fpu: Ensure shadow stack is active before 'getting' registers (bsc#1236106).
- CVE-2025-21649: net: hns3: fix kernel crash when 1588 is sent on HIP08 devices (bsc#1236143).
- CVE-2025-21650: net: hns3: fixed hclge_fetch_pf_reg accesses bar space out of bounds issue (bsc#1236144).
- CVE-2025-21651: net: hns3: do not auto enable misc vector (bsc#1236145).
- CVE-2025-21652: ipvlan: Fix use-after-free in ipvlan_get_iflink() (bsc#1236160).
- CVE-2025-21653: net_sched: cls_flow: validate TCA_FLOW_RSHIFT attribute (bsc#1236161).
- CVE-2025-21655: io_uring/eventfd: ensure io_eventfd_signal() defers another RCU period (bsc#1236163).
- CVE-2025-21662: net/mlx5: Fix variable not being completed when function returns (bsc#1236198).
- CVE-2025-21663: net: stmmac: dwmac-tegra: Read iommu stream id from device tree (bsc#1236260).
- CVE-2025-21664: dm thin: make get_first_thin use rcu-safe list first function (bsc#1236262).
- CVE-2025-21674: net/mlx5e: Fix inversion dependency warning while enabling IPsec tunnel (bsc#1236688).
- CVE-2025-21676: net: fec: handle page_pool_dev_alloc_pages error (bsc#1236696).
- CVE-2025-21678: gtp: Destroy device along with udp socket's netns dismantle (bsc#1236698).
- CVE-2025-21682: eth: bnxt: always recalculate features after XDP clearing, fix null-deref (bsc#1236703).


Tenable has extracted the preceding description block directly from the SUSE security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://bugzilla.suse.com/1012628

https://bugzilla.suse.com/1194869

https://bugzilla.suse.com/1215199

https://bugzilla.suse.com/1216813

https://bugzilla.suse.com/1218470

https://bugzilla.suse.com/1220711

https://bugzilla.suse.com/1221326

https://bugzilla.suse.com/1222803

https://bugzilla.suse.com/1224049

https://bugzilla.suse.com/1225897

https://bugzilla.suse.com/1226980

https://bugzilla.suse.com/1228592

https://bugzilla.suse.com/1229833

https://bugzilla.suse.com/1231016

https://bugzilla.suse.com/1232087

https://bugzilla.suse.com/1232101

https://bugzilla.suse.com/1232158

https://bugzilla.suse.com/1232161

https://bugzilla.suse.com/1232421

https://bugzilla.suse.com/1232882

https://bugzilla.suse.com/1233055

https://bugzilla.suse.com/1233112

https://bugzilla.suse.com/1233221

https://bugzilla.suse.com/1233248

https://bugzilla.suse.com/1233259

https://bugzilla.suse.com/1233260

https://bugzilla.suse.com/1233488

https://bugzilla.suse.com/1233522

https://bugzilla.suse.com/1233638

https://bugzilla.suse.com/1233642

https://bugzilla.suse.com/1233778

https://bugzilla.suse.com/1234195

https://bugzilla.suse.com/1234619

https://bugzilla.suse.com/1234635

https://bugzilla.suse.com/1234683

https://bugzilla.suse.com/1234693

https://bugzilla.suse.com/1234726

https://bugzilla.suse.com/1234825

https://bugzilla.suse.com/1234863

https://bugzilla.suse.com/1234887

https://bugzilla.suse.com/1234888

https://bugzilla.suse.com/1234893

https://bugzilla.suse.com/1234898

https://bugzilla.suse.com/1234901

https://bugzilla.suse.com/1234906

https://bugzilla.suse.com/1234923

https://bugzilla.suse.com/1234931

https://bugzilla.suse.com/1234934

https://bugzilla.suse.com/1234947

https://bugzilla.suse.com/1234957

https://bugzilla.suse.com/1235000

https://bugzilla.suse.com/1235001

https://bugzilla.suse.com/1235011

https://bugzilla.suse.com/1235031

https://bugzilla.suse.com/1235032

https://bugzilla.suse.com/1235035

https://bugzilla.suse.com/1235037

https://bugzilla.suse.com/1235038

https://bugzilla.suse.com/1235039

https://bugzilla.suse.com/1235040

https://bugzilla.suse.com/1235042

https://bugzilla.suse.com/1235043

https://bugzilla.suse.com/1235046

https://bugzilla.suse.com/1235050

https://bugzilla.suse.com/1235051

https://bugzilla.suse.com/1235053

https://bugzilla.suse.com/1235054

https://bugzilla.suse.com/1235057

https://bugzilla.suse.com/1235059

https://bugzilla.suse.com/1235061

https://bugzilla.suse.com/1235065

https://bugzilla.suse.com/1235070

https://bugzilla.suse.com/1235073

https://bugzilla.suse.com/1235100

https://bugzilla.suse.com/1235112

https://bugzilla.suse.com/1235115

https://bugzilla.suse.com/1235117

https://bugzilla.suse.com/1235122

https://bugzilla.suse.com/1235123

https://bugzilla.suse.com/1235125

https://bugzilla.suse.com/1235132

https://bugzilla.suse.com/1235133

https://bugzilla.suse.com/1235155

https://bugzilla.suse.com/1235160

https://bugzilla.suse.com/1235217

https://bugzilla.suse.com/1235219

https://bugzilla.suse.com/1235220

https://bugzilla.suse.com/1235222

https://bugzilla.suse.com/1235223

https://bugzilla.suse.com/1235224

https://bugzilla.suse.com/1235227

https://bugzilla.suse.com/1235230

https://bugzilla.suse.com/1235241

https://bugzilla.suse.com/1235249

https://bugzilla.suse.com/1235251

https://bugzilla.suse.com/1235252

https://bugzilla.suse.com/1235389

https://bugzilla.suse.com/1235390

https://bugzilla.suse.com/1235391

https://bugzilla.suse.com/1235406

https://bugzilla.suse.com/1235410

https://bugzilla.suse.com/1235412

https://bugzilla.suse.com/1235413

https://bugzilla.suse.com/1235415

https://bugzilla.suse.com/1235416

https://bugzilla.suse.com/1235417

https://bugzilla.suse.com/1235418

https://bugzilla.suse.com/1235423

https://bugzilla.suse.com/1235424

https://bugzilla.suse.com/1235425

https://bugzilla.suse.com/1235426

https://bugzilla.suse.com/1235427

https://bugzilla.suse.com/1235428

https://bugzilla.suse.com/1235429

https://bugzilla.suse.com/1235430

https://bugzilla.suse.com/1235433

https://bugzilla.suse.com/1235437

https://bugzilla.suse.com/1235439

https://bugzilla.suse.com/1235444

https://bugzilla.suse.com/1235445

https://bugzilla.suse.com/1235449

https://bugzilla.suse.com/1235451

https://bugzilla.suse.com/1235454

https://bugzilla.suse.com/1235458

https://bugzilla.suse.com/1235459

https://bugzilla.suse.com/1235464

https://bugzilla.suse.com/1235466

https://bugzilla.suse.com/1235473

https://bugzilla.suse.com/1235479

https://bugzilla.suse.com/1235480

https://bugzilla.suse.com/1235483

https://bugzilla.suse.com/1235486

https://bugzilla.suse.com/1235487

https://bugzilla.suse.com/1235488

https://bugzilla.suse.com/1235489

https://bugzilla.suse.com/1235491

https://bugzilla.suse.com/1235494

https://bugzilla.suse.com/1235495

https://bugzilla.suse.com/1235496

https://bugzilla.suse.com/1235497

https://bugzilla.suse.com/1235498

https://bugzilla.suse.com/1235500

https://bugzilla.suse.com/1235502

https://bugzilla.suse.com/1235503

https://bugzilla.suse.com/1235519

https://bugzilla.suse.com/1235520

https://bugzilla.suse.com/1235521

https://bugzilla.suse.com/1235523

https://bugzilla.suse.com/1235526

https://bugzilla.suse.com/1235528

https://bugzilla.suse.com/1235532

https://bugzilla.suse.com/1235533

https://bugzilla.suse.com/1235534

https://bugzilla.suse.com/1235537

https://bugzilla.suse.com/1235538

https://bugzilla.suse.com/1235545

https://bugzilla.suse.com/1235552

https://bugzilla.suse.com/1235555

https://bugzilla.suse.com/1235557

https://bugzilla.suse.com/1235563

https://bugzilla.suse.com/1235564

https://bugzilla.suse.com/1235565

https://bugzilla.suse.com/1235568

https://bugzilla.suse.com/1235570

https://bugzilla.suse.com/1235571

https://bugzilla.suse.com/1235577

https://bugzilla.suse.com/1235578

https://bugzilla.suse.com/1235582

https://bugzilla.suse.com/1235583

https://bugzilla.suse.com/1235584

https://bugzilla.suse.com/1235587

https://bugzilla.suse.com/1235611

https://bugzilla.suse.com/1235612

https://bugzilla.suse.com/1235616

https://bugzilla.suse.com/1235622

https://bugzilla.suse.com/1235627

https://bugzilla.suse.com/1235632

https://bugzilla.suse.com/1235635

https://bugzilla.suse.com/1235638

https://bugzilla.suse.com/1235641

https://bugzilla.suse.com/1235643

https://bugzilla.suse.com/1235645

https://bugzilla.suse.com/1235646

https://bugzilla.suse.com/1235647

https://bugzilla.suse.com/1235650

https://bugzilla.suse.com/1235653

https://bugzilla.suse.com/1235656

https://bugzilla.suse.com/1235657

https://bugzilla.suse.com/1235663

https://bugzilla.suse.com/1235686

https://bugzilla.suse.com/1235700

https://bugzilla.suse.com/1235705

https://bugzilla.suse.com/1235707

https://bugzilla.suse.com/1235708

https://bugzilla.suse.com/1235710

https://bugzilla.suse.com/1235714

https://bugzilla.suse.com/1235716

https://bugzilla.suse.com/1235720

https://bugzilla.suse.com/1235723

https://bugzilla.suse.com/1235727

https://bugzilla.suse.com/1235730

https://bugzilla.suse.com/1235737

https://bugzilla.suse.com/1235739

https://bugzilla.suse.com/1235745

https://bugzilla.suse.com/1235747

https://bugzilla.suse.com/1235750

https://bugzilla.suse.com/1235753

https://bugzilla.suse.com/1235759

https://bugzilla.suse.com/1235764

https://bugzilla.suse.com/1235768

https://bugzilla.suse.com/1235776

https://bugzilla.suse.com/1235777

https://bugzilla.suse.com/1235778

https://bugzilla.suse.com/1235779

https://bugzilla.suse.com/1235793

https://bugzilla.suse.com/1235798

https://bugzilla.suse.com/1235806

https://bugzilla.suse.com/1235808

https://bugzilla.suse.com/1235812

https://bugzilla.suse.com/1235814

https://bugzilla.suse.com/1235818

https://bugzilla.suse.com/1235842

https://bugzilla.suse.com/1235865

https://bugzilla.suse.com/1235874

https://bugzilla.suse.com/1235894

https://bugzilla.suse.com/1235902

https://bugzilla.suse.com/1235903

https://bugzilla.suse.com/1235906

https://bugzilla.suse.com/1235918

https://bugzilla.suse.com/1235919

https://bugzilla.suse.com/1235920

https://bugzilla.suse.com/1235924

https://bugzilla.suse.com/1235940

https://bugzilla.suse.com/1235941

https://bugzilla.suse.com/1235946

https://bugzilla.suse.com/1235948

https://bugzilla.suse.com/1235952

https://bugzilla.suse.com/1235964

https://bugzilla.suse.com/1235965

https://bugzilla.suse.com/1235967

https://bugzilla.suse.com/1235969

https://bugzilla.suse.com/1235976

https://bugzilla.suse.com/1235977

https://bugzilla.suse.com/1236078

https://bugzilla.suse.com/1236080

https://bugzilla.suse.com/1236082

https://bugzilla.suse.com/1236088

https://bugzilla.suse.com/1236090

https://bugzilla.suse.com/1236091

https://bugzilla.suse.com/1236096

https://bugzilla.suse.com/1236097

https://bugzilla.suse.com/1236098

https://bugzilla.suse.com/1236101

https://bugzilla.suse.com/1236102

https://bugzilla.suse.com/1236104

https://bugzilla.suse.com/1236106

https://bugzilla.suse.com/1236120

https://bugzilla.suse.com/1236125

https://bugzilla.suse.com/1236127

https://bugzilla.suse.com/1236131

https://bugzilla.suse.com/1236138

https://bugzilla.suse.com/1236143

https://bugzilla.suse.com/1236144

https://bugzilla.suse.com/1236145

https://bugzilla.suse.com/1236160

https://bugzilla.suse.com/1236161

https://bugzilla.suse.com/1236163

https://bugzilla.suse.com/1236168

https://bugzilla.suse.com/1236178

https://bugzilla.suse.com/1236180

https://bugzilla.suse.com/1236181

https://bugzilla.suse.com/1236182

https://bugzilla.suse.com/1236190

https://bugzilla.suse.com/1236192

https://bugzilla.suse.com/1236198

https://bugzilla.suse.com/1236227

https://bugzilla.suse.com/1236245

https://bugzilla.suse.com/1236247

https://bugzilla.suse.com/1236248

https://bugzilla.suse.com/1236260

https://bugzilla.suse.com/1236262

https://bugzilla.suse.com/1236628

https://bugzilla.suse.com/1236688

https://bugzilla.suse.com/1236696

https://bugzilla.suse.com/1236698

https://bugzilla.suse.com/1236703

https://bugzilla.suse.com/1236732

https://bugzilla.suse.com/1236733

https://bugzilla.suse.com/1236757

https://bugzilla.suse.com/1236758

https://bugzilla.suse.com/1236760

http://www.nessus.org/u?b178f6ef

https://www.suse.com/security/cve/CVE-2023-52489

https://www.suse.com/security/cve/CVE-2023-52923

https://www.suse.com/security/cve/CVE-2024-36476

https://www.suse.com/security/cve/CVE-2024-39282

https://www.suse.com/security/cve/CVE-2024-43913

https://www.suse.com/security/cve/CVE-2024-45828

https://www.suse.com/security/cve/CVE-2024-46896

https://www.suse.com/security/cve/CVE-2024-47141

https://www.suse.com/security/cve/CVE-2024-47143

https://www.suse.com/security/cve/CVE-2024-47809

https://www.suse.com/security/cve/CVE-2024-48873

https://www.suse.com/security/cve/CVE-2024-48881

https://www.suse.com/security/cve/CVE-2024-49569

https://www.suse.com/security/cve/CVE-2024-49948

https://www.suse.com/security/cve/CVE-2024-49951

https://www.suse.com/security/cve/CVE-2024-49978

https://www.suse.com/security/cve/CVE-2024-49998

https://www.suse.com/security/cve/CVE-2024-50051

https://www.suse.com/security/cve/CVE-2024-50106

https://www.suse.com/security/cve/CVE-2024-50151

https://www.suse.com/security/cve/CVE-2024-50199

https://www.suse.com/security/cve/CVE-2024-50251

https://www.suse.com/security/cve/CVE-2024-50258

https://www.suse.com/security/cve/CVE-2024-50299

https://www.suse.com/security/cve/CVE-2024-50304

https://www.suse.com/security/cve/CVE-2024-52332

https://www.suse.com/security/cve/CVE-2024-53091

https://www.suse.com/security/cve/CVE-2024-53095

https://www.suse.com/security/cve/CVE-2024-53164

https://www.suse.com/security/cve/CVE-2024-53168

https://www.suse.com/security/cve/CVE-2024-53170

https://www.suse.com/security/cve/CVE-2024-53172

https://www.suse.com/security/cve/CVE-2024-53175

https://www.suse.com/security/cve/CVE-2024-53185

https://www.suse.com/security/cve/CVE-2024-53187

https://www.suse.com/security/cve/CVE-2024-53194

https://www.suse.com/security/cve/CVE-2024-53195

https://www.suse.com/security/cve/CVE-2024-53196

https://www.suse.com/security/cve/CVE-2024-53197

https://www.suse.com/security/cve/CVE-2024-53198

https://www.suse.com/security/cve/CVE-2024-53203

https://www.suse.com/security/cve/CVE-2024-53227

https://www.suse.com/security/cve/CVE-2024-53230

https://www.suse.com/security/cve/CVE-2024-53231

https://www.suse.com/security/cve/CVE-2024-53232

https://www.suse.com/security/cve/CVE-2024-53233

https://www.suse.com/security/cve/CVE-2024-53236

https://www.suse.com/security/cve/CVE-2024-53239

https://www.suse.com/security/cve/CVE-2024-53685

https://www.suse.com/security/cve/CVE-2024-53690

https://www.suse.com/security/cve/CVE-2024-54680

https://www.suse.com/security/cve/CVE-2024-55639

https://www.suse.com/security/cve/CVE-2024-55881

https://www.suse.com/security/cve/CVE-2024-55916

https://www.suse.com/security/cve/CVE-2024-56369

https://www.suse.com/security/cve/CVE-2024-56372

https://www.suse.com/security/cve/CVE-2024-56531

https://www.suse.com/security/cve/CVE-2024-56532

https://www.suse.com/security/cve/CVE-2024-56533

https://www.suse.com/security/cve/CVE-2024-56538

https://www.suse.com/security/cve/CVE-2024-56543

https://www.suse.com/security/cve/CVE-2024-56546

https://www.suse.com/security/cve/CVE-2024-56548

https://www.suse.com/security/cve/CVE-2024-56557

https://www.suse.com/security/cve/CVE-2024-56558

https://www.suse.com/security/cve/CVE-2024-56568

https://www.suse.com/security/cve/CVE-2024-56569

https://www.suse.com/security/cve/CVE-2024-56570

https://www.suse.com/security/cve/CVE-2024-56571

https://www.suse.com/security/cve/CVE-2024-56572

https://www.suse.com/security/cve/CVE-2024-56573

https://www.suse.com/security/cve/CVE-2024-56574

https://www.suse.com/security/cve/CVE-2024-56575

https://www.suse.com/security/cve/CVE-2024-56577

https://www.suse.com/security/cve/CVE-2024-56578

https://www.suse.com/security/cve/CVE-2024-56584

https://www.suse.com/security/cve/CVE-2024-56587

https://www.suse.com/security/cve/CVE-2024-56588

https://www.suse.com/security/cve/CVE-2024-56589

https://www.suse.com/security/cve/CVE-2024-56590

https://www.suse.com/security/cve/CVE-2024-56593

https://www.suse.com/security/cve/CVE-2024-56594

https://www.suse.com/security/cve/CVE-2024-56595

https://www.suse.com/security/cve/CVE-2024-56596

https://www.suse.com/security/cve/CVE-2024-56597

https://www.suse.com/security/cve/CVE-2024-56598

https://www.suse.com/security/cve/CVE-2024-56600

https://www.suse.com/security/cve/CVE-2024-56601

https://www.suse.com/security/cve/CVE-2024-56602

https://www.suse.com/security/cve/CVE-2024-56603

https://www.suse.com/security/cve/CVE-2024-56606

https://www.suse.com/security/cve/CVE-2024-56607

https://www.suse.com/security/cve/CVE-2024-56608

https://www.suse.com/security/cve/CVE-2024-56609

https://www.suse.com/security/cve/CVE-2024-56610

https://www.suse.com/security/cve/CVE-2024-56611

https://www.suse.com/security/cve/CVE-2024-56614

https://www.suse.com/security/cve/CVE-2024-56615

https://www.suse.com/security/cve/CVE-2024-56616

https://www.suse.com/security/cve/CVE-2024-56617

https://www.suse.com/security/cve/CVE-2024-56619

https://www.suse.com/security/cve/CVE-2024-56620

https://www.suse.com/security/cve/CVE-2024-56622

https://www.suse.com/security/cve/CVE-2024-56623

https://www.suse.com/security/cve/CVE-2024-56625

https://www.suse.com/security/cve/CVE-2024-56629

https://www.suse.com/security/cve/CVE-2024-56630

https://www.suse.com/security/cve/CVE-2024-56631

https://www.suse.com/security/cve/CVE-2024-56632

https://www.suse.com/security/cve/CVE-2024-56634

https://www.suse.com/security/cve/CVE-2024-56635

https://www.suse.com/security/cve/CVE-2024-56636

https://www.suse.com/security/cve/CVE-2024-56637

https://www.suse.com/security/cve/CVE-2024-56641

https://www.suse.com/security/cve/CVE-2024-56642

https://www.suse.com/security/cve/CVE-2024-56643

https://www.suse.com/security/cve/CVE-2024-56644

https://www.suse.com/security/cve/CVE-2024-56648

https://www.suse.com/security/cve/CVE-2024-56649

https://www.suse.com/security/cve/CVE-2024-56650

https://www.suse.com/security/cve/CVE-2024-56651

https://www.suse.com/security/cve/CVE-2024-56654

https://www.suse.com/security/cve/CVE-2024-56656

https://www.suse.com/security/cve/CVE-2024-56659

https://www.suse.com/security/cve/CVE-2024-56660

https://www.suse.com/security/cve/CVE-2024-56661

https://www.suse.com/security/cve/CVE-2024-56662

https://www.suse.com/security/cve/CVE-2024-56663

https://www.suse.com/security/cve/CVE-2024-56664

https://www.suse.com/security/cve/CVE-2024-56665

https://www.suse.com/security/cve/CVE-2024-56670

https://www.suse.com/security/cve/CVE-2024-56672

https://www.suse.com/security/cve/CVE-2024-56675

https://www.suse.com/security/cve/CVE-2024-56677

https://www.suse.com/security/cve/CVE-2024-56678

https://www.suse.com/security/cve/CVE-2024-56679

https://www.suse.com/security/cve/CVE-2024-56681

https://www.suse.com/security/cve/CVE-2024-56683

https://www.suse.com/security/cve/CVE-2024-56687

https://www.suse.com/security/cve/CVE-2024-56688

https://www.suse.com/security/cve/CVE-2024-56690

https://www.suse.com/security/cve/CVE-2024-56691

https://www.suse.com/security/cve/CVE-2024-56693

https://www.suse.com/security/cve/CVE-2024-56694

https://www.suse.com/security/cve/CVE-2024-56698

https://www.suse.com/security/cve/CVE-2024-56700

https://www.suse.com/security/cve/CVE-2024-56701

https://www.suse.com/security/cve/CVE-2024-56704

https://www.suse.com/security/cve/CVE-2024-56705

https://www.suse.com/security/cve/CVE-2024-56707

https://www.suse.com/security/cve/CVE-2024-56708

https://www.suse.com/security/cve/CVE-2024-56709

https://www.suse.com/security/cve/CVE-2024-56712

https://www.suse.com/security/cve/CVE-2024-56715

https://www.suse.com/security/cve/CVE-2024-56716

https://www.suse.com/security/cve/CVE-2024-56722

https://www.suse.com/security/cve/CVE-2024-56723

https://www.suse.com/security/cve/CVE-2024-56724

https://www.suse.com/security/cve/CVE-2024-56725

https://www.suse.com/security/cve/CVE-2024-56726

https://www.suse.com/security/cve/CVE-2024-56727

https://www.suse.com/security/cve/CVE-2024-56728

https://www.suse.com/security/cve/CVE-2024-56729

https://www.suse.com/security/cve/CVE-2024-56739

https://www.suse.com/security/cve/CVE-2024-56741

https://www.suse.com/security/cve/CVE-2024-56745

https://www.suse.com/security/cve/CVE-2024-56746

https://www.suse.com/security/cve/CVE-2024-56747

https://www.suse.com/security/cve/CVE-2024-56748

https://www.suse.com/security/cve/CVE-2024-56759

https://www.suse.com/security/cve/CVE-2024-56760

https://www.suse.com/security/cve/CVE-2024-56763

https://www.suse.com/security/cve/CVE-2024-56765

https://www.suse.com/security/cve/CVE-2024-56766

https://www.suse.com/security/cve/CVE-2024-56767

https://www.suse.com/security/cve/CVE-2024-56769

https://www.suse.com/security/cve/CVE-2024-56774

https://www.suse.com/security/cve/CVE-2024-56775

https://www.suse.com/security/cve/CVE-2024-56776

https://www.suse.com/security/cve/CVE-2024-56777

https://www.suse.com/security/cve/CVE-2024-56778

https://www.suse.com/security/cve/CVE-2024-56779

https://www.suse.com/security/cve/CVE-2024-56780

https://www.suse.com/security/cve/CVE-2024-56787

https://www.suse.com/security/cve/CVE-2024-57791

https://www.suse.com/security/cve/CVE-2024-57792

https://www.suse.com/security/cve/CVE-2024-57793

https://www.suse.com/security/cve/CVE-2024-57795

https://www.suse.com/security/cve/CVE-2024-57798

https://www.suse.com/security/cve/CVE-2024-57801

https://www.suse.com/security/cve/CVE-2024-57802

https://www.suse.com/security/cve/CVE-2024-57804

https://www.suse.com/security/cve/CVE-2024-57809

https://www.suse.com/security/cve/CVE-2024-57838

https://www.suse.com/security/cve/CVE-2024-57849

https://www.suse.com/security/cve/CVE-2024-57850

https://www.suse.com/security/cve/CVE-2024-57857

https://www.suse.com/security/cve/CVE-2024-57874

https://www.suse.com/security/cve/CVE-2024-57876

https://www.suse.com/security/cve/CVE-2024-57884

https://www.suse.com/security/cve/CVE-2024-57887

https://www.suse.com/security/cve/CVE-2024-57888

https://www.suse.com/security/cve/CVE-2024-57890

https://www.suse.com/security/cve/CVE-2024-57892

https://www.suse.com/security/cve/CVE-2024-57893

https://www.suse.com/security/cve/CVE-2024-57896

https://www.suse.com/security/cve/CVE-2024-57897

https://www.suse.com/security/cve/CVE-2024-57899

https://www.suse.com/security/cve/CVE-2024-57903

https://www.suse.com/security/cve/CVE-2024-57904

https://www.suse.com/security/cve/CVE-2024-57906

https://www.suse.com/security/cve/CVE-2024-57907

https://www.suse.com/security/cve/CVE-2024-57908

https://www.suse.com/security/cve/CVE-2024-57910

https://www.suse.com/security/cve/CVE-2024-57911

https://www.suse.com/security/cve/CVE-2024-57912

https://www.suse.com/security/cve/CVE-2024-57913

https://www.suse.com/security/cve/CVE-2024-57915

https://www.suse.com/security/cve/CVE-2024-57916

https://www.suse.com/security/cve/CVE-2024-57917

https://www.suse.com/security/cve/CVE-2024-57922

https://www.suse.com/security/cve/CVE-2024-57926

https://www.suse.com/security/cve/CVE-2024-57929

https://www.suse.com/security/cve/CVE-2024-57931

https://www.suse.com/security/cve/CVE-2024-57932

https://www.suse.com/security/cve/CVE-2024-57933

https://www.suse.com/security/cve/CVE-2024-57935

https://www.suse.com/security/cve/CVE-2024-57936

https://www.suse.com/security/cve/CVE-2024-57938

https://www.suse.com/security/cve/CVE-2024-57940

https://www.suse.com/security/cve/CVE-2024-57946

https://www.suse.com/security/cve/CVE-2025-21632

https://www.suse.com/security/cve/CVE-2025-21645

https://www.suse.com/security/cve/CVE-2025-21646

https://www.suse.com/security/cve/CVE-2025-21649

https://www.suse.com/security/cve/CVE-2025-21650

https://www.suse.com/security/cve/CVE-2025-21651

https://www.suse.com/security/cve/CVE-2025-21652

https://www.suse.com/security/cve/CVE-2025-21653

https://www.suse.com/security/cve/CVE-2025-21655

https://www.suse.com/security/cve/CVE-2025-21656

https://www.suse.com/security/cve/CVE-2025-21662

https://www.suse.com/security/cve/CVE-2025-21663

https://www.suse.com/security/cve/CVE-2025-21664

https://www.suse.com/security/cve/CVE-2025-21674

https://www.suse.com/security/cve/CVE-2025-21676

https://www.suse.com/security/cve/CVE-2025-21678

https://www.suse.com/security/cve/CVE-2025-21682

Plugin Details

Severity: High

ID: 216191

File Name: suse_SU-2025-0428-1.nasl

Version: 1.1

Type: local

Agent: unix

Published: 2/12/2025

Updated: 2/12/2025

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5

Vector: CVSS2#AV:L/AC:L/Au:S/C:C/I:C/A:C

CVSS Score Source: CVE-2025-21652

CVSS v3

Risk Factor: High

Base Score: 7.8

Temporal Score: 6.8

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:novell:suse_linux:kernel-source-azure, p-cpe:/a:novell:suse_linux:kernel-syms-azure, p-cpe:/a:novell:suse_linux:kernel-azure-devel, p-cpe:/a:novell:suse_linux:kernel-devel-azure, p-cpe:/a:novell:suse_linux:kernel-azure, cpe:/o:novell:suse_linux:15

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 2/11/2025

Vulnerability Publication Date: 2/15/2024

Reference Information

CVE: CVE-2023-52489, CVE-2023-52923, CVE-2024-36476, CVE-2024-39282, CVE-2024-43913, CVE-2024-45828, CVE-2024-46896, CVE-2024-47141, CVE-2024-47143, CVE-2024-47809, CVE-2024-48873, CVE-2024-48881, CVE-2024-49569, CVE-2024-49948, CVE-2024-49951, CVE-2024-49978, CVE-2024-49998, CVE-2024-50051, CVE-2024-50106, CVE-2024-50151, CVE-2024-50199, CVE-2024-50251, CVE-2024-50258, CVE-2024-50299, CVE-2024-50304, CVE-2024-52332, CVE-2024-53091, CVE-2024-53095, CVE-2024-53164, CVE-2024-53168, CVE-2024-53170, CVE-2024-53172, CVE-2024-53175, CVE-2024-53185, CVE-2024-53187, CVE-2024-53194, CVE-2024-53195, CVE-2024-53196, CVE-2024-53197, CVE-2024-53198, CVE-2024-53203, CVE-2024-53227, CVE-2024-53230, CVE-2024-53231, CVE-2024-53232, CVE-2024-53233, CVE-2024-53236, CVE-2024-53239, CVE-2024-53685, CVE-2024-53690, CVE-2024-54680, CVE-2024-55639, CVE-2024-55881, CVE-2024-55916, CVE-2024-56369, CVE-2024-56372, CVE-2024-56531, CVE-2024-56532, CVE-2024-56533, CVE-2024-56538, CVE-2024-56543, CVE-2024-56546, CVE-2024-56548, CVE-2024-56557, CVE-2024-56558, CVE-2024-56568, CVE-2024-56569, CVE-2024-56570, CVE-2024-56571, CVE-2024-56572, CVE-2024-56573, CVE-2024-56574, CVE-2024-56575, CVE-2024-56577, CVE-2024-56578, CVE-2024-56584, CVE-2024-56587, CVE-2024-56588, CVE-2024-56589, CVE-2024-56590, CVE-2024-56593, CVE-2024-56594, CVE-2024-56595, CVE-2024-56596, CVE-2024-56597, CVE-2024-56598, CVE-2024-56600, CVE-2024-56601, CVE-2024-56602, CVE-2024-56603, CVE-2024-56606, CVE-2024-56607, CVE-2024-56608, CVE-2024-56609, CVE-2024-56610, CVE-2024-56611, CVE-2024-56614, CVE-2024-56615, CVE-2024-56616, CVE-2024-56617, CVE-2024-56619, CVE-2024-56620, CVE-2024-56622, CVE-2024-56623, CVE-2024-56625, CVE-2024-56629, CVE-2024-56630, CVE-2024-56631, CVE-2024-56632, CVE-2024-56634, CVE-2024-56635, CVE-2024-56636, CVE-2024-56637, CVE-2024-56641, CVE-2024-56642, CVE-2024-56643, CVE-2024-56644, CVE-2024-56648, CVE-2024-56649, CVE-2024-56650, CVE-2024-56651, CVE-2024-56654, CVE-2024-56656, CVE-2024-56659, CVE-2024-56660, CVE-2024-56661, CVE-2024-56662, CVE-2024-56663, CVE-2024-56664, CVE-2024-56665, CVE-2024-56670, CVE-2024-56672, CVE-2024-56675, CVE-2024-56677, CVE-2024-56678, CVE-2024-56679, CVE-2024-56681, CVE-2024-56683, CVE-2024-56687, CVE-2024-56688, CVE-2024-56690, CVE-2024-56691, CVE-2024-56693, CVE-2024-56694, CVE-2024-56698, CVE-2024-56700, CVE-2024-56701, CVE-2024-56704, CVE-2024-56705, CVE-2024-56707, CVE-2024-56708, CVE-2024-56709, CVE-2024-56712, CVE-2024-56715, CVE-2024-56716, CVE-2024-56722, CVE-2024-56723, CVE-2024-56724, CVE-2024-56725, CVE-2024-56726, CVE-2024-56727, CVE-2024-56728, CVE-2024-56729, CVE-2024-56739, CVE-2024-56741, CVE-2024-56745, CVE-2024-56746, CVE-2024-56747, CVE-2024-56748, CVE-2024-56759, CVE-2024-56760, CVE-2024-56763, CVE-2024-56765, CVE-2024-56766, CVE-2024-56767, CVE-2024-56769, CVE-2024-56774, CVE-2024-56775, CVE-2024-56776, CVE-2024-56777, CVE-2024-56778, CVE-2024-56779, CVE-2024-56780, CVE-2024-56787, CVE-2024-57791, CVE-2024-57792, CVE-2024-57793, CVE-2024-57795, CVE-2024-57798, CVE-2024-57801, CVE-2024-57802, CVE-2024-57804, CVE-2024-57809, CVE-2024-57838, CVE-2024-57849, CVE-2024-57850, CVE-2024-57857, CVE-2024-57874, CVE-2024-57876, CVE-2024-57884, CVE-2024-57887, CVE-2024-57888, CVE-2024-57890, CVE-2024-57892, CVE-2024-57893, CVE-2024-57896, CVE-2024-57897, CVE-2024-57899, CVE-2024-57903, CVE-2024-57904, CVE-2024-57906, CVE-2024-57907, CVE-2024-57908, CVE-2024-57910, CVE-2024-57911, CVE-2024-57912, CVE-2024-57913, CVE-2024-57915, CVE-2024-57916, CVE-2024-57917, CVE-2024-57922, CVE-2024-57926, CVE-2024-57929, CVE-2024-57931, CVE-2024-57932, CVE-2024-57933, CVE-2024-57935, CVE-2024-57936, CVE-2024-57938, CVE-2024-57940, CVE-2024-57946, CVE-2025-21632, CVE-2025-21645, CVE-2025-21646, CVE-2025-21649, CVE-2025-21650, CVE-2025-21651, CVE-2025-21652, CVE-2025-21653, CVE-2025-21655, CVE-2025-21656, CVE-2025-21662, CVE-2025-21663, CVE-2025-21664, CVE-2025-21674, CVE-2025-21676, CVE-2025-21678, CVE-2025-21682

SuSE: SUSE-SU-2025:0428-1