SUSE SLES12 Security Update : kernel (SUSE-SU-2025:0834-1)

high Nessus Plugin ID 232643

Synopsis

The remote SUSE host is missing one or more security updates.

Description

The remote SUSE Linux SLES12 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2025:0834-1 advisory.

The SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security bugfixes.

The following security bugs were fixed:

- CVE-2021-22543: Fixed improper handling of VM_IO|VM_PFNMAP vmas in KVM (bsc#1186482).
- CVE-2021-47634: ubi: Fix race condition between ctrl_cdev_ioctl and ubi_cdev_ioctl (bsc#1237758).
- CVE-2021-47644: media: staging: media: zoran: move videodev alloc (bsc#1237766).
- CVE-2022-48953: rtc: cmos: fix build on non-ACPI platforms (bsc#1231941).
- CVE-2022-48975: gpiolib: fix memory leak in gpiochip_setup_dev() (bsc#1231885).
- CVE-2022-49006: tracing: Free buffers when a used dynamic event is removed (bsc#1232163).
- CVE-2022-49076: RDMA/hfi1: Fix use-after-free bug for mm struct (bsc#1237738).
- CVE-2022-49080: mm/mempolicy: fix mpol_new leak in shared_policy_replace (bsc#1238033).
- CVE-2022-49089: IB/rdmavt: add lock to call to rvt_error_qp to prevent a race condition (bsc#1238041).
- CVE-2022-49124: x86/mce: Work around an erratum on fast string copy instructions (bsc#1238148).
- CVE-2022-49134: mlxsw: spectrum: Guard against invalid local ports (bsc#1237982).
- CVE-2022-49135: drm/amd/display: Fix memory leak (bsc#1238006).
- CVE-2022-49151: can: mcba_usb: properly check endpoint type (bsc#1237778).
- CVE-2022-49178: memstick/mspro_block: fix handling of read-only devices (bsc#1238107).
- CVE-2022-49182: net: hns3: add vlan list lock to protect vlan list (bsc#1238260).
- CVE-2022-49201: ibmvnic: fix race between xmit and reset (bsc#1238256).
- CVE-2022-49247: media: stk1160: If start stream fails, return buffers with VB2_BUF_STATE_QUEUED (bsc#1237783).
- CVE-2022-49490: drm/msm/mdp5: Return error code in mdp5_pipe_release when deadlock is (bsc#1238275).
- CVE-2022-49626: sfc: fix use after free when disabling sriov (bsc#1238270).
- CVE-2022-49661: can: gs_usb: gs_usb_open/close(): fix memory leak (bsc#1237788).
- CVE-2023-52572: Fixed UAF in cifs_demultiplex_thread() in cifs (bsc#1220946).
- CVE-2023-52853: hid: cp2112: Fix duplicate workqueue initialization (bsc#1224988).
- CVE-2023-52924: netfilter: nf_tables: do not skip expired elements during walk (bsc#1236821).
- CVE-2023-6606: Fixed an out of bounds read in the SMB client when receiving a malformed length from a server (bsc#1217947).
- CVE-2024-23307: Fixed Integer Overflow or Wraparound vulnerability in x86 and ARM md, raid, raid5 modules (bsc#1219169).
- CVE-2024-27397: netfilter: nf_tables: use timestamp to check for set element timeout (bsc#1224095).
- CVE-2024-49963: mailbox: bcm2835: Fix timeout during suspend mode (bsc#1232147).
- CVE-2024-49975: uprobes: fix kernel info leak via '[uprobes]' vma (bsc#1232104).
- CVE-2024-50036: net: do not delay dst_entries_add() in dst_release() (bsc#1231912).
- CVE-2024-50067: uprobe: avoid out-of-bounds memory access of fetching args (bsc#1232416).
- CVE-2024-50251: netfilter: nft_payload: sanitize offset and length before calling skb_checksum() (bsc#1233248).
- CVE-2024-50304: ipv4: ip_tunnel: Fix suspicious RCU usage warning in ip_tunnel_find() (bsc#1233522).
- CVE-2024-53217: nfsd: restore callback functionality for NFSv4.0 (bsc#1234999).
- CVE-2024-56633: bpf, sockmap: Fix repeated calls to sock_put() when msg has more_data (bsc#1235485).
- CVE-2024-56647: net: Fix icmp host relookup triggering ip_rt_bug (bsc#1235435).
- CVE-2024-56658: net: defer final 'struct net' free in netns dismantle (bsc#1235441).
- CVE-2024-56688: sunrpc: clear XPRT_SOCK_UPD_TIMEOUT when reset transport (bsc#1235538).
- CVE-2025-21638: sctp: sysctl: auth_enable: avoid using current->nsproxy (bsc#1236115).
- CVE-2025-21639: sctp: sysctl: rto_min/max: avoid using current->nsproxy (bsc#1236122).
- CVE-2025-21640: sctp: sysctl: cookie_hmac_alg: avoid using current->nsproxy (bsc#1236123).
- CVE-2025-21673: smb: client: fix double free of TCP_Server_Info::hostname (bsc#1236689).
- CVE-2025-21689: USB: serial: quatech2: fix null-ptr-deref in qt2_process_read_urb() (bsc#1237017).
- CVE-2025-21690: scsi: storvsc: Ratelimit warning logs to prevent VM denial of service (bsc#1237025).
- CVE-2025-21700: net: sched: Disallow replacing of child qdisc from one parent to another (bsc#1237159).
- CVE-2025-21753: btrfs: fix use-after-free when attempting to join an aborted transaction (bsc#1237875).


Tenable has extracted the preceding description block directly from the SUSE security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://bugzilla.suse.com/1065729

https://bugzilla.suse.com/1113295

https://bugzilla.suse.com/1186482

https://www.suse.com/security/cve/CVE-2021-22543

https://bugzilla.suse.com/1190358

https://bugzilla.suse.com/1190428

https://bugzilla.suse.com/1188601

https://www.suse.com/security/cve/CVE-2021-37159

https://bugzilla.suse.com/1191881

https://bugzilla.suse.com/1051510

https://bugzilla.suse.com/1201420

https://www.suse.com/security/cve/CVE-2022-2991

https://bugzilla.suse.com/1203410

https://bugzilla.suse.com/1203935

https://bugzilla.suse.com/1207168

https://www.suse.com/security/cve/CVE-2023-0394

https://bugzilla.suse.com/1212051

https://bugzilla.suse.com/1217947

https://www.suse.com/security/cve/CVE-2023-6606

https://bugzilla.suse.com/1141539

https://bugzilla.suse.com/1219169

https://bugzilla.suse.com/1221816

https://www.suse.com/security/cve/CVE-2024-23307

https://bugzilla.suse.com/1220946

https://www.suse.com/security/cve/CVE-2023-52572

https://bugzilla.suse.com/1223509

https://www.suse.com/security/cve/CVE-2022-48650

https://bugzilla.suse.com/1223432

https://bugzilla.suse.com/1223512

https://bugzilla.suse.com/1223626

https://bugzilla.suse.com/1223627

https://bugzilla.suse.com/1223712

https://bugzilla.suse.com/1223715

https://bugzilla.suse.com/1223744

https://bugzilla.suse.com/1223819

https://www.suse.com/security/cve/CVE-2022-48636

https://www.suse.com/security/cve/CVE-2023-52646

https://www.suse.com/security/cve/CVE-2023-52653

https://www.suse.com/security/cve/CVE-2024-26929

https://www.suse.com/security/cve/CVE-2024-26930

https://www.suse.com/security/cve/CVE-2024-26931

https://www.suse.com/security/cve/CVE-2024-27054

https://www.suse.com/security/cve/CVE-2024-27388

https://bugzilla.suse.com/1224988

https://www.suse.com/security/cve/CVE-2023-52853

https://bugzilla.suse.com/1223524

https://bugzilla.suse.com/1231885

https://bugzilla.suse.com/1231941

https://bugzilla.suse.com/1232104

https://bugzilla.suse.com/1232163

https://bugzilla.suse.com/1232201

https://bugzilla.suse.com/1232262

https://www.suse.com/security/cve/CVE-2022-48664

https://www.suse.com/security/cve/CVE-2022-48953

https://www.suse.com/security/cve/CVE-2022-48975

https://www.suse.com/security/cve/CVE-2022-49006

https://www.suse.com/security/cve/CVE-2024-49867

https://www.suse.com/security/cve/CVE-2024-49975

https://bugzilla.suse.com/1232147

https://bugzilla.suse.com/1232159

https://bugzilla.suse.com/1232520

https://www.suse.com/security/cve/CVE-2024-49950

https://www.suse.com/security/cve/CVE-2024-49963

https://www.suse.com/security/cve/CVE-2024-50073

https://bugzilla.suse.com/1232919

https://www.suse.com/security/cve/CVE-2024-50115

https://bugzilla.suse.com/1225742

https://bugzilla.suse.com/1231920

https://bugzilla.suse.com/1232198

https://bugzilla.suse.com/1232416

https://www.suse.com/security/cve/CVE-2024-47701

https://www.suse.com/security/cve/CVE-2024-49884

https://www.suse.com/security/cve/CVE-2024-50067

https://bugzilla.suse.com/1224095

https://bugzilla.suse.com/1234853

https://bugzilla.suse.com/1234891

https://bugzilla.suse.com/1234963

https://bugzilla.suse.com/1234999

https://bugzilla.suse.com/1235061

https://www.suse.com/security/cve/CVE-2024-27397

https://www.suse.com/security/cve/CVE-2024-53173

https://www.suse.com/security/cve/CVE-2024-53217

https://www.suse.com/security/cve/CVE-2024-56539

https://www.suse.com/security/cve/CVE-2024-56605

https://bugzilla.suse.com/1235054

https://bugzilla.suse.com/1235073

https://www.suse.com/security/cve/CVE-2024-53239

https://www.suse.com/security/cve/CVE-2024-56548

https://bugzilla.suse.com/1235538

https://bugzilla.suse.com/1235965

https://www.suse.com/security/cve/CVE-2024-56688

https://www.suse.com/security/cve/CVE-2024-57896

https://bugzilla.suse.com/1222803

https://bugzilla.suse.com/1233248

https://bugzilla.suse.com/1233522

https://bugzilla.suse.com/1236757

https://www.suse.com/security/cve/CVE-2024-50251

https://www.suse.com/security/cve/CVE-2024-50304

https://bugzilla.suse.com/1235441

https://bugzilla.suse.com/1236761

https://www.suse.com/security/cve/CVE-2024-26810

https://www.suse.com/security/cve/CVE-2024-56658

https://bugzilla.suse.com/1235485

https://bugzilla.suse.com/1236689

https://www.suse.com/security/cve/CVE-2024-56633

https://www.suse.com/security/cve/CVE-2025-21673

https://bugzilla.suse.com/1235435

https://bugzilla.suse.com/1236115

https://bugzilla.suse.com/1236122

https://bugzilla.suse.com/1236123

https://bugzilla.suse.com/1236821

https://bugzilla.suse.com/1237017

https://bugzilla.suse.com/1237025

https://bugzilla.suse.com/1237159

https://www.suse.com/security/cve/CVE-2023-52924

https://www.suse.com/security/cve/CVE-2024-56647

https://www.suse.com/security/cve/CVE-2025-21638

https://www.suse.com/security/cve/CVE-2025-21639

https://www.suse.com/security/cve/CVE-2025-21640

https://www.suse.com/security/cve/CVE-2025-21689

https://www.suse.com/security/cve/CVE-2025-21690

https://www.suse.com/security/cve/CVE-2025-21700

https://bugzilla.suse.com/1238033

https://www.suse.com/security/cve/CVE-2022-49080

https://bugzilla.suse.com/1050081

https://bugzilla.suse.com/1100823

https://bugzilla.suse.com/1101669

https://bugzilla.suse.com/1104731

https://bugzilla.suse.com/1112246

https://bugzilla.suse.com/1112894

https://bugzilla.suse.com/1112899

https://bugzilla.suse.com/1112902

https://bugzilla.suse.com/1112903

https://bugzilla.suse.com/1112905

https://bugzilla.suse.com/1112906

https://bugzilla.suse.com/1112907

https://bugzilla.suse.com/1120902

https://bugzilla.suse.com/1158082

https://bugzilla.suse.com/1174206

https://bugzilla.suse.com/1175165

https://bugzilla.suse.com/1179444

https://bugzilla.suse.com/1231912

https://bugzilla.suse.com/1237738

https://bugzilla.suse.com/1237758

https://bugzilla.suse.com/1237766

https://bugzilla.suse.com/1237778

https://bugzilla.suse.com/1237783

https://bugzilla.suse.com/1237788

https://bugzilla.suse.com/1237875

https://bugzilla.suse.com/1237982

https://bugzilla.suse.com/1238006

https://bugzilla.suse.com/1238041

https://bugzilla.suse.com/1238107

https://bugzilla.suse.com/1238148

https://bugzilla.suse.com/1238256

https://bugzilla.suse.com/1238260

https://bugzilla.suse.com/1238270

https://bugzilla.suse.com/1238275

http://www.nessus.org/u?60032dae

https://www.suse.com/security/cve/CVE-2021-47634

https://www.suse.com/security/cve/CVE-2021-47644

https://www.suse.com/security/cve/CVE-2022-49076

https://www.suse.com/security/cve/CVE-2022-49089

https://www.suse.com/security/cve/CVE-2022-49124

https://www.suse.com/security/cve/CVE-2022-49134

https://www.suse.com/security/cve/CVE-2022-49135

https://www.suse.com/security/cve/CVE-2022-49151

https://www.suse.com/security/cve/CVE-2022-49178

https://www.suse.com/security/cve/CVE-2022-49182

https://www.suse.com/security/cve/CVE-2022-49201

https://www.suse.com/security/cve/CVE-2022-49247

https://www.suse.com/security/cve/CVE-2022-49490

https://www.suse.com/security/cve/CVE-2022-49626

https://www.suse.com/security/cve/CVE-2022-49661

https://www.suse.com/security/cve/CVE-2024-50036

https://www.suse.com/security/cve/CVE-2025-21753

Plugin Details

Severity: High

ID: 232643

File Name: suse_SU-2025-0834-1.nasl

Version: 1.1

Type: local

Agent: unix

Published: 3/12/2025

Updated: 3/12/2025

Supported Sensors: Nessus Agent, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Medium

Base Score: 4.6

Temporal Score: 3.6

Vector: CVSS2#AV:L/AC:L/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2021-22543

CVSS v3

Risk Factor: High

Base Score: 7.8

Temporal Score: 7

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

CVSS Score Source: CVE-2024-57896

CVSS v4

Risk Factor: High

Base Score: 8.7

Threat Score: 7.2

Threat Vector: CVSS:4.0/E:P

Vector: CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:L/SC:H/SI:H/SA:L

Vulnerability Information

CPE: cpe:/o:novell:suse_linux:12, p-cpe:/a:novell:suse_linux:kernel-default-base, p-cpe:/a:novell:suse_linux:kernel-default-kgraft-devel, p-cpe:/a:novell:suse_linux:kernel-macros, p-cpe:/a:novell:suse_linux:kgraft-patch-4_12_14-122_250-default, p-cpe:/a:novell:suse_linux:kernel-default-devel, p-cpe:/a:novell:suse_linux:cluster-md-kmp-default, p-cpe:/a:novell:suse_linux:gfs2-kmp-default, p-cpe:/a:novell:suse_linux:kernel-default, p-cpe:/a:novell:suse_linux:kernel-devel, p-cpe:/a:novell:suse_linux:kernel-syms, p-cpe:/a:novell:suse_linux:ocfs2-kmp-default, p-cpe:/a:novell:suse_linux:kernel-default-kgraft, p-cpe:/a:novell:suse_linux:dlm-kmp-default, p-cpe:/a:novell:suse_linux:kernel-source, p-cpe:/a:novell:suse_linux:kernel-default-man

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 3/11/2025

Vulnerability Publication Date: 5/18/2021

Reference Information

CVE: CVE-2021-22543, CVE-2021-37159, CVE-2021-47634, CVE-2021-47644, CVE-2022-2991, CVE-2022-48636, CVE-2022-48650, CVE-2022-48664, CVE-2022-48953, CVE-2022-48975, CVE-2022-49006, CVE-2022-49076, CVE-2022-49080, CVE-2022-49089, CVE-2022-49124, CVE-2022-49134, CVE-2022-49135, CVE-2022-49151, CVE-2022-49178, CVE-2022-49182, CVE-2022-49201, CVE-2022-49247, CVE-2022-49490, CVE-2022-49626, CVE-2022-49661, CVE-2023-0394, CVE-2023-52572, CVE-2023-52646, CVE-2023-52653, CVE-2023-52853, CVE-2023-52924, CVE-2023-6606, CVE-2024-23307, CVE-2024-26810, CVE-2024-26929, CVE-2024-26930, CVE-2024-26931, CVE-2024-27054, CVE-2024-27388, CVE-2024-27397, CVE-2024-47701, CVE-2024-49867, CVE-2024-49884, CVE-2024-49950, CVE-2024-49963, CVE-2024-49975, CVE-2024-50036, CVE-2024-50067, CVE-2024-50073, CVE-2024-50115, CVE-2024-50251, CVE-2024-50304, CVE-2024-53173, CVE-2024-53217, CVE-2024-53239, CVE-2024-56539, CVE-2024-56548, CVE-2024-56605, CVE-2024-56633, CVE-2024-56647, CVE-2024-56658, CVE-2024-56688, CVE-2024-57896, CVE-2025-21638, CVE-2025-21639, CVE-2025-21640, CVE-2025-21673, CVE-2025-21689, CVE-2025-21690, CVE-2025-21700, CVE-2025-21753

SuSE: SUSE-SU-2025:0834-1