SUSE SLES15 Security Update : kernel (SUSE-SU-2025:0564-1)

high Nessus Plugin ID 216456

Language:

Synopsis

The remote SUSE host is missing one or more security updates.

Description

The remote SUSE Linux SLES15 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2025:0564-1 advisory.

The SUSE Linux Enterprise 15 SP6 Confidential Computing kernel was updated to receive various security bugfixes.


The following security bugs were fixed:

- CVE-2024-40980: drop_monitor: replace spin_lock by raw_spin_lock (bsc#1227937).
- CVE-2024-46858: mptcp: pm: Fix uaf in __timer_delete_sync (bsc#1231088).
- CVE-2024-49948: net: add more sanity checks to qdisc_pkt_len_init() (bsc#1232161).
- CVE-2024-49978: gso: fix udp gso fraglist segmentation after pull from frag_list (bsc#1232101).
- CVE-2024-50142: xfrm: validate new SA's prefixlen using SA family when sel.family is unset (bsc#1233028).
- CVE-2024-50251: netfilter: nft_payload: sanitize offset and length before calling skb_checksum() (bsc#1233248).
- CVE-2024-50258: net: fix crash when config small gso_max_size/gso_ipv4_max_size (bsc#1233221).
- CVE-2024-50304: ipv4: ip_tunnel: Fix suspicious RCU usage warning in ip_tunnel_find() (bsc#1233522).
- CVE-2024-53123: mptcp: error out earlier on disconnect (bsc#1234070).
- CVE-2024-53187: io_uring: check for overflows in io_pin_pages (bsc#1234947).
- CVE-2024-53203: usb: typec: fix potential array underflow in ucsi_ccg_sync_control() (bsc#1235001).
- CVE-2024-56592: bpf: Call free_htab_elem() after htab_unlock_bucket() (bsc#1235244).
- CVE-2024-56600: net: inet6: do not leave a dangling sk pointer in inet6_create() (bsc#1235217).
- CVE-2024-56601: net: inet: do not leave a dangling sk pointer in inet_create() (bsc#1235230).
- CVE-2024-56608: drm/amd/display: Fix out-of-bounds access in 'dcn21_link_encoder_create' (bsc#1235487).
- CVE-2024-56610: kcsan: Turn report_filterlist_lock into a raw_spinlock (bsc#1235390).
- CVE-2024-56633: tcp_bpf: Fix the sk_mem_uncharge logic in tcp_bpf_sendmsg (bsc#1235485).
- CVE-2024-56650: netfilter: x_tables: fix LED ID check in led_tg_check() (bsc#1235430).
- CVE-2024-56658: net: defer final 'struct net' free in netns dismantle (bsc#1235441).
- CVE-2024-56665: bpf,perf: Fix invalid prog_array access in perf_event_detach_bpf_prog (bsc#1235489).
- CVE-2024-56679: octeontx2-pf: handle otx2_mbox_get_rsp errors in otx2_common.c (bsc#1235498).
- CVE-2024-56693: brd: defer automatic disk creation until module initialization succeeds (bsc#1235418).
- CVE-2024-56707: octeontx2-pf: handle otx2_mbox_get_rsp errors in otx2_dmac_flt.c (bsc#1235545).
- CVE-2024-56715: ionic: Fix netdev notifier unregister on failure (bsc#1235612).
- CVE-2024-56725: octeontx2-pf: handle otx2_mbox_get_rsp errors in otx2_dcbnl.c (bsc#1235578).
- CVE-2024-56726: octeontx2-pf: handle otx2_mbox_get_rsp errors in cn10k.c (bsc#1235582).
- CVE-2024-56727: octeontx2-pf: handle otx2_mbox_get_rsp errors in otx2_flows.c (bsc#1235583).
- CVE-2024-56728: octeontx2-pf: handle otx2_mbox_get_rsp errors in otx2_ethtool.c (bsc#1235656).
- CVE-2024-56763: tracing: Prevent bad count for tracing_cpumask_write (bsc#1235638).
- CVE-2024-57802: netrom: check buffer length before accessing it (bsc#1235941).
- CVE-2024-57882: mptcp: fix TCP options overflow. (bsc#1235914).
- CVE-2024-57884: mm: vmscan: account for free pages to prevent infinite Loop in throttle_direct_reclaim() (bsc#1235948).
- CVE-2024-57917: topology: Keep the cpumask unchanged when printing cpumap (bsc#1236127).
- CVE-2024-57931: selinux: ignore unknown extended permissions (bsc#1236192).
- CVE-2024-57938: net/sctp: Prevent autoclose integer overflow in sctp_association_init() (bsc#1236182).
- CVE-2024-57946: virtio-blk: do not keep queue frozen during system suspend (bsc#1236247).
- CVE-2025-21652: ipvlan: Fix use-after-free in ipvlan_get_iflink() (bsc#1236160).
- CVE-2025-21653: net_sched: cls_flow: validate TCA_FLOW_RSHIFT attribute (bsc#1236161).
- CVE-2025-21655: io_uring/eventfd: ensure io_eventfd_signal() defers another RCU period (bsc#1236163).
- CVE-2025-21663: net: stmmac: dwmac-tegra: Read iommu stream id from device tree (bsc#1236260).
- CVE-2025-21664: dm thin: make get_first_thin use rcu-safe list first function (bsc#1236262).
- CVE-2025-21665: filemap: avoid truncating 64-bit offset to 32 bits (bsc#1236684).
- CVE-2025-21666: vsock: prevent null-ptr-deref in vsock_*[has_data|has_space] (bsc#1236680).
- CVE-2025-21667: iomap: avoid avoid truncating 64-bit offset to 32 bits (bsc#1236681).
- CVE-2025-21668: pmdomain: imx8mp-blk-ctrl: add missing loop break condition (bsc#1236682).
- CVE-2025-21669: vsock/virtio: discard packets if the transport changes (bsc#1236683).
- CVE-2025-21670: vsock/bpf: return early if transport is not assigned (bsc#1236685).
- CVE-2025-21673: smb: client: fix double free of TCP_Server_Info::hostname (bsc#1236689).
- CVE-2025-21674: net/mlx5e: Fix inversion dependency warning while enabling IPsec tunnel (bsc#1236688).
- CVE-2025-21675: net/mlx5: Clear port select structure when fail to create (bsc#1236694).
- CVE-2025-21676: net: fec: handle page_pool_dev_alloc_pages error (bsc#1236696).
- CVE-2025-21678: gtp: Destroy device along with udp socket's netns dismantle (bsc#1236698).
- CVE-2025-21681: openvswitch: fix lockup on tx to unregistering netdev with carrier (bsc#1236702).
- CVE-2025-21682: eth: bnxt: always recalculate features after XDP clearing, fix null-deref (bsc#1236703).


Tenable has extracted the preceding description block directly from the SUSE security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://bugzilla.suse.com/1215199

https://bugzilla.suse.com/1222803

https://bugzilla.suse.com/1224049

https://bugzilla.suse.com/1226980

https://bugzilla.suse.com/1227937

https://bugzilla.suse.com/1231088

https://bugzilla.suse.com/1232101

https://bugzilla.suse.com/1232161

https://bugzilla.suse.com/1233028

https://bugzilla.suse.com/1233221

https://bugzilla.suse.com/1233248

https://bugzilla.suse.com/1233522

https://bugzilla.suse.com/1233778

https://bugzilla.suse.com/1234070

https://bugzilla.suse.com/1234683

https://bugzilla.suse.com/1234693

https://bugzilla.suse.com/1234947

https://bugzilla.suse.com/1235001

https://bugzilla.suse.com/1235217

https://bugzilla.suse.com/1235230

https://bugzilla.suse.com/1235244

https://bugzilla.suse.com/1235390

https://bugzilla.suse.com/1235418

https://bugzilla.suse.com/1235430

https://bugzilla.suse.com/1235441

https://bugzilla.suse.com/1235485

https://bugzilla.suse.com/1235487

https://bugzilla.suse.com/1235489

https://bugzilla.suse.com/1235498

https://bugzilla.suse.com/1235545

https://bugzilla.suse.com/1235578

https://bugzilla.suse.com/1235582

https://bugzilla.suse.com/1235583

https://bugzilla.suse.com/1235612

https://bugzilla.suse.com/1235638

https://bugzilla.suse.com/1235656

https://bugzilla.suse.com/1235686

https://bugzilla.suse.com/1235865

https://bugzilla.suse.com/1235874

https://bugzilla.suse.com/1235914

https://bugzilla.suse.com/1235941

https://bugzilla.suse.com/1235948

https://bugzilla.suse.com/1236127

https://bugzilla.suse.com/1236160

https://bugzilla.suse.com/1236161

https://bugzilla.suse.com/1236163

https://bugzilla.suse.com/1236182

https://bugzilla.suse.com/1236192

https://bugzilla.suse.com/1236245

https://bugzilla.suse.com/1236247

https://bugzilla.suse.com/1236260

https://bugzilla.suse.com/1236262

https://bugzilla.suse.com/1236628

https://bugzilla.suse.com/1236680

https://bugzilla.suse.com/1236681

https://bugzilla.suse.com/1236682

https://bugzilla.suse.com/1236683

https://bugzilla.suse.com/1236684

https://bugzilla.suse.com/1236685

https://bugzilla.suse.com/1236688

https://bugzilla.suse.com/1236689

https://bugzilla.suse.com/1236694

https://bugzilla.suse.com/1236696

https://bugzilla.suse.com/1236698

https://bugzilla.suse.com/1236702

https://bugzilla.suse.com/1236703

https://bugzilla.suse.com/1236732

https://bugzilla.suse.com/1236733

https://bugzilla.suse.com/1236757

https://bugzilla.suse.com/1236758

https://bugzilla.suse.com/1236759

https://bugzilla.suse.com/1236760

https://bugzilla.suse.com/1236761

http://www.nessus.org/u?dc1a97c4

https://www.suse.com/security/cve/CVE-2024-40980

https://www.suse.com/security/cve/CVE-2024-46858

https://www.suse.com/security/cve/CVE-2024-49948

https://www.suse.com/security/cve/CVE-2024-49978

https://www.suse.com/security/cve/CVE-2024-50142

https://www.suse.com/security/cve/CVE-2024-50251

https://www.suse.com/security/cve/CVE-2024-50258

https://www.suse.com/security/cve/CVE-2024-50304

https://www.suse.com/security/cve/CVE-2024-53123

https://www.suse.com/security/cve/CVE-2024-53187

https://www.suse.com/security/cve/CVE-2024-53203

https://www.suse.com/security/cve/CVE-2024-56592

https://www.suse.com/security/cve/CVE-2024-56600

https://www.suse.com/security/cve/CVE-2024-56601

https://www.suse.com/security/cve/CVE-2024-56608

https://www.suse.com/security/cve/CVE-2024-56610

https://www.suse.com/security/cve/CVE-2024-56633

https://www.suse.com/security/cve/CVE-2024-56650

https://www.suse.com/security/cve/CVE-2024-56658

https://www.suse.com/security/cve/CVE-2024-56665

https://www.suse.com/security/cve/CVE-2024-56679

https://www.suse.com/security/cve/CVE-2024-56693

https://www.suse.com/security/cve/CVE-2024-56707

https://www.suse.com/security/cve/CVE-2024-56715

https://www.suse.com/security/cve/CVE-2024-56725

https://www.suse.com/security/cve/CVE-2024-56726

https://www.suse.com/security/cve/CVE-2024-56727

https://www.suse.com/security/cve/CVE-2024-56728

https://www.suse.com/security/cve/CVE-2024-56763

https://www.suse.com/security/cve/CVE-2024-57802

https://www.suse.com/security/cve/CVE-2024-57882

https://www.suse.com/security/cve/CVE-2024-57884

https://www.suse.com/security/cve/CVE-2024-57917

https://www.suse.com/security/cve/CVE-2024-57931

https://www.suse.com/security/cve/CVE-2024-57938

https://www.suse.com/security/cve/CVE-2024-57946

https://www.suse.com/security/cve/CVE-2025-21652

https://www.suse.com/security/cve/CVE-2025-21653

https://www.suse.com/security/cve/CVE-2025-21655

https://www.suse.com/security/cve/CVE-2025-21663

https://www.suse.com/security/cve/CVE-2025-21664

https://www.suse.com/security/cve/CVE-2025-21665

https://www.suse.com/security/cve/CVE-2025-21666

https://www.suse.com/security/cve/CVE-2025-21667

https://www.suse.com/security/cve/CVE-2025-21668

https://www.suse.com/security/cve/CVE-2025-21669

https://www.suse.com/security/cve/CVE-2025-21670

https://www.suse.com/security/cve/CVE-2025-21673

https://www.suse.com/security/cve/CVE-2025-21674

https://www.suse.com/security/cve/CVE-2025-21675

https://www.suse.com/security/cve/CVE-2025-21676

https://www.suse.com/security/cve/CVE-2025-21678

https://www.suse.com/security/cve/CVE-2025-21681

https://www.suse.com/security/cve/CVE-2025-21682

Plugin Details

Severity: High

ID: 216456

File Name: suse_SU-2025-0564-1.nasl

Version: 1.1

Type: local

Agent: unix

Published: 2/19/2025

Updated: 2/19/2025

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5

Vector: CVSS2#AV:L/AC:L/Au:S/C:C/I:C/A:C

CVSS Score Source: CVE-2025-21652

CVSS v3

Risk Factor: High

Base Score: 7.8

Temporal Score: 6.8

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:novell:suse_linux:kernel-coco_debug, p-cpe:/a:novell:suse_linux:kernel-syms-coco, p-cpe:/a:novell:suse_linux:kernel-coco, p-cpe:/a:novell:suse_linux:kernel-source-coco, p-cpe:/a:novell:suse_linux:kernel-coco_debug-devel, p-cpe:/a:novell:suse_linux:kernel-devel-coco, p-cpe:/a:novell:suse_linux:reiserfs-kmp-coco, p-cpe:/a:novell:suse_linux:kernel-coco-devel, cpe:/o:novell:suse_linux:15

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 2/17/2025

Vulnerability Publication Date: 7/12/2024

Reference Information

CVE: CVE-2024-40980, CVE-2024-46858, CVE-2024-49948, CVE-2024-49978, CVE-2024-50142, CVE-2024-50251, CVE-2024-50258, CVE-2024-50304, CVE-2024-53123, CVE-2024-53187, CVE-2024-53203, CVE-2024-56592, CVE-2024-56600, CVE-2024-56601, CVE-2024-56608, CVE-2024-56610, CVE-2024-56633, CVE-2024-56650, CVE-2024-56658, CVE-2024-56665, CVE-2024-56679, CVE-2024-56693, CVE-2024-56707, CVE-2024-56715, CVE-2024-56725, CVE-2024-56726, CVE-2024-56727, CVE-2024-56728, CVE-2024-56763, CVE-2024-57802, CVE-2024-57882, CVE-2024-57884, CVE-2024-57917, CVE-2024-57931, CVE-2024-57938, CVE-2024-57946, CVE-2025-21652, CVE-2025-21653, CVE-2025-21655, CVE-2025-21663, CVE-2025-21664, CVE-2025-21665, CVE-2025-21666, CVE-2025-21667, CVE-2025-21668, CVE-2025-21669, CVE-2025-21670, CVE-2025-21673, CVE-2025-21674, CVE-2025-21675, CVE-2025-21676, CVE-2025-21678, CVE-2025-21681, CVE-2025-21682

SuSE: SUSE-SU-2025:0564-1